Hi-Tech Surveillance Targeting and The Colonial Pipeline Hack by DarkSide: Explaining Group (Gang) Stalking
Experiencing stress and aggravation due to the electronic targeting of my electronic devices such as my cell phone and computers because someone doesn’t understand boundary violations and the privacy of others is an understatement. The solution that I’ve been provided with is “get rid of your cell phone and your social media accounts” by family members. This is the posed solution that will “solve all my problems”, in my opinion, is not a solution at all when people have the right to own cell phones and express their voice and opinion over social media/blogs. The fact my perpetrators demonstrate no sense of fear or concern for their actions, actions that may be prosecutable by the government, suggests two things to me. One, they possess no fear because they are psychopaths. And two, they assumed I won’t go to the authorities because I’m too stupid and nobody would miss me.
The following is a timeline of events with regard to my cell phone history. I frequently wipe my phone because I experience the painful side effects of electromagnetic frequency field targeting in my living environment as targeted electronic physical assaults and psychotronic torture to my head bombard my peaceful living arrangements. Yesterday my timeline was as follows:
Sept. 21,2021 (early-mid afternoon) — wiped my phone and shut it down
Sept. 21,2021 10:00PM- turned on phone. My cell phone automatically dialed an “unknown” number even before my cell phone main (desktop) screen image appeared.
Sept. 21,2021 10:38 PM- Personally sent a text message to my cell phone provider’s access portal regarding “data service” availability
Sept. 22, 2021 10:00AM- The following morning, I turned on my cell phone again by plugging it in because my battery went dead. Cellphone, again, automatically dials out to an “unknown number” as a signal to who? My cell phone provider that my phone was “up” and operating again. I make it a point to turn off “military time” readings over my cell phone. After my cell phone calls the “unknown number” my time stamps convert to military time. (Photos posted below as Image Table 1.)
The last photo posted in Image Table 1, shown at the bottom of this post below, it shows the “downloading arrow icon” that appeared while I took the screen capture. This is the arrow that indicates to the operator of the cell phone a download is in progress with regard to software updates and/or application downloads. This arrow is visible even though I turned off “software updates” in the “app settings” on my cell phone. In the photo below, I had specifically turned off “software updates” in the settings application in my phone but again my cell phone was high-jacked by my “service providers” communication satellite and it forced a software update over my phone.
I keep “location tracking” (GPS) and “software updates” turned off because there is a direct correlation between the electromagnetic fields my sensory nerves in my body pick up in both my head and lower abdomen (automatic and somatic nervous systems). Screen capture of this can be found in Image Table 2 below. That is to say, I have noticed there is some type of tether between the electromagnetic frequency of my mobile phone and the implants in my head, which may be due to dental implants done through dental surgery as jaw bone conduction is a possibility, and the sensory sensation I feel in my lower body (abdomen).
I have heard through second-hand accounts of sober men, who “don’t really drink alcohol” (meaning they never get drunk), who specifically go into bars and target drunk people by victimizing them. They steal their cash and credit card information. And what do these abusers have to say for themselves? They say, “Their victims were “drunks” who deserved to have their money stolen.” This statement demonstrates a high degree of narcissistic entitlement because they feel they are “more privileged” than other people and are entitled to other people’s property because these people are “inferior.”
I’ve witnessed this criminal behavior in other men as well, as I have myself been victimized in bars with regard to property theft as well as have suffered several sexual assaults both in date rape and other overt/covert sexual violations. Bars are notoriously connected with criminal operations such as drug dealing, prostitution, sexual assault, and property crime. These men who specifically target drunk people and steal their cash do so in a structured organized crime scheme that includes other rogue agents like bartenders. This is how credit card information can be stolen and provided to organized criminal networks working out of certain venues. How do my experiences with my mobile cell phone data, electronic targeted assaults, and psychotronic torture compare to these types of crimes (as well as warfare in general) by men who don’t understand the nature of boundaries and how to respect other people’s rights to privacy and property rights which include the victim’s right to their own body such is the case in sexual assault?
People might conclude that my targeting is domestic abuse-related as some of my family members are known domestic abusers. But there exists the possibility of a likely other outside source. That is to say, a foreign accomplice or accomplices, not of the family but privileged to the family circle. Another source, responsible for victimization because my whole family has been targeted in some way.
As a victim of Domestic Violence and Intimate Partner Violence, I have been arrested and taken to Behavioral Health Hospital as a “crisis patient” in an attempt to “protect” my welfare and distance me from my abusers. I can’t help but believe if Gabby Pepito was taken to a hospital, because she seemed to be experiencing a mental health crisis, she might still be alive. One of the hardest things for authorities to do is mandate a permanent separation between both parties. This is something the individual parties have to do on their own.
The point I am trying to make is this. In 1984, I made friends with a Carnegie Mellon professor in computers and mathematics who told me that we would all have pocket computers in the future. He was talking about Smartphones. We all have them today. He also talked about the field of virtual reality and how it would be an area of interest to developers not to mention artificial intelligence. This has been the intended goal of government, I believe, ever since space travel was a pioneering hope in the area of not only intelligence but military intelligence of man. If he told me this in 1984, imagine what they’re developing today with regard to satellites and artificial intelligence? International neurological brain initiatives and electronic targeted physical assaults and psychotronic torture are real issues neuroethic committees need to address simply because in the near possible future scientists may very well be hacking into your brains in order to “steal your data” void of the use of a cell phone devices.
Another aspect of my Group (Gang) Stalking is the fact that my bodily movement is being tracked while I walk about in my house via implants that may very well be tracked over an independent platform by a rogue intruder, possibly over satellite tracking, but definitely, I believe, through proximity. In other words, this person knows when I wake up, what time I eat, when I sleep, when I use my computer, when I’m using my cell phone, when I leave my house, where I travel to, as well as when I pass gas. Which makes me completely afraid and freaked out of cell phone surveillance. This type of surveillance I just described is primarily used by NSA and CIA in their acquisition of “intelligence” regarding “persons of interest” as a person’s personal habits are recorded to construct a “behavioral profile” so they know how to “take down their target” in which they can further the government/military operations and intelligence missions. Behavioral hospitals may be also interested in gathering this type of “data.” Of course, intelligence gathering and behavioral profiles go hand in hand in clandestine government operations as well as in any organized criminal syndication where a large cash pool could resource the purchase of hi-tech security technology to carry out such “intelligence-gathering operations”. And this is where boundary violations occur in such organized criminal groups demonstrating behaviors utilizing service security surveillance technology to gather intelligence in order to “steal money” from corporations. It is also termed “casing a target.” A similar behavioral profile has been demonstrated by the group known as DarkSide. DarkSide is the criminal group responsible for the Colonial Pipeline ransomware hack. To read one of the press releases from the U.S. Justice Department click on the link https://www.justice.gov/opa/pr/department-justice-seizes-23-million-cryptocurrency-paid-ransomware-extortionists-darkside
As a victim of domestic violence and intimate partner violence, I have been arrested and taken to behavioral health hospitals as a “crisis patient” in order to help “protect” me from my abusers. I can’t help but believe if Gabby Pepito was taken to a hospital because she was demonstrating symptoms of some type of mental breakdown, she might still be alive today. Of course, it may not have protected her from a violent death. I believe she was demonstrating symptoms of ADHD. However, these symptoms could have been caused by long-term abuse as well. I watched an informative YouTube video of a child with ADHD and that child described symptoms consistent with the behavior Gabby Petito was exhibiting the day she was pulled over in Moab Utah by police. She had said that morning she had “a lot of work to do on her computer.” I’m not saying she had ADHD or that computer hackers were responsible for her symptoms, I’m just saying there is a possibility she was suffering some type of affective disorder or possible mental breakdown resulting from long-term abuse. Technology can be so frustrating especially if you are being electronically harassed.
Image Table 1 (4 cell phone screen captures).
Image Table 2 (1 cell phone screen capture).
Subnote: With regard to the Gods of this world, tell me who you think God is? Because in the moments we all share together, it’s the moments where there is a clear observable hierarchy of power.
Other Published Information Pertinent To Aspects of Criminal Violations: