Nothing Special   »   [go: up one dir, main page]

Gang Stalking Methods

Marvel Manuza Gulane
3 min readFeb 13, 2021

--

Tactics used by stalkers to harass targeted individuals.

Physical & Digital Stalking

- Sleep deprivation day by day for social isolation.
- Always surrounded, never alone, no privacy.
- Neighbor stalking, rude behavior from random people.
- Workplace mobbing, breaking friendships through rumors.
- Character assassinations, rumors spread.
- Police and hospital funeral cars around you.
- Feedback about conversations nobody can know.
- Honking horns, shoving chairs, bouncing balls sounds for harassment.
- Receive random phone calls, sms, emails & at specific suspicious moments.

- Coughing, slamming door leaking tap and neighbor toilet flushing.(V2K.

- Stagnating DVD Player & Gaming Consoles.
- Plock sound from water heater, TV set, roof, radio program interference.

https://philosopherai.com (V2K Technology)

- Black dogs and cats crossing.
- Alarm sounds in shops, news articles sold out.
- Other shop counter opens while waiting.
- Blocking traffic, traffic at every corner (Traffic Jam's).
- Constructed car accidents and empty highways.
- Blinding headlights, cars with one headlights and rear lights.
- Open doors of home / car without people inside.
- Delight in your sufferings, Damage to your belongings.
- Drilling at neighbor and everywhere you go. (V2K)
- Neighbor going up and down stairs at all time. (V2K)
- Throwing sounds, saw machines or machete and knife outside.
- Synchronized passing vehicles, women and etch.
- Street Theaters.
- Holosonic devices for sound beaming.

Holosonic Devices Sample

- Flashlights aiming at your position.
- Lasers aiming at your position.
- Using laser to distribute sound through photoacoustic effect and heterodyning principle.

Sound Beamer Through Laser Sample

- Internet interruption via accessing routers gateway and (DOS) denial of service through deauthentication attacks in your personal routers.

- Monitoring your internet traffic. (ISP reports)
- Brute forcing your social media accounts.
- (V2K) cause internet disruption in WiFi due to radio frequencies.
- Using and manipulating people's voice that you thought come from their own subconscious / inner monologue. V2K Lies.

- Drones with luminous light and non-luminous for heterodyning and photoacoustic principles. (Ponytails)

One of the Ponytails Sample

- Using messenger and Facebook application to update about your location widely used in rural areas due to free data.

- Helicopters coming across the borders and its color is black, You know what I mean. :)

“Yep its true the possibility to distribute sound through beaming by the use of laser by the use of light and holosonic device.”

“In literal you cant control your subconscious mind and halt your inner-monologue. It is not your fault if what is in your mind. The more you ignore then, the more they get angry.”

https://www.nsa.gov/what-we-do/signals-intelligence

You can check other related technologies for this projects.

https://github.com/shayan-taheri/My_Publications

[Ghostbin Link] https://ghostbin.co/paste/ccd6p
[Github Account] https://github.com/maxanthonypablea/program-diary
[Github Account] https://github.com/maxanthonypablea/program-thesis
[Github Account] https://github.com/maxanthonypablea
[Patreon Account] https://www.patreon.com/maxanthonypablea

--

--

Marvel Manuza Gulane
Marvel Manuza Gulane

Written by Marvel Manuza Gulane

0 Followers

Developer Security Operations / Security Researcher / Coder

No responses yet