1. MY THEORY: GANG STALKING / ORGANIZED STALKING / ELECTRONIC HARASSMENT

TARGET PRACTICE for Future Domestic and Global Operations, and to
Recruit and Train the New Generations of Operatives, Spies, and Assassins;
Cornel West speaks at the Attica is all of us event at Riverside Church
 
Google: Targeted Individual - 
About 23,700,000 results
Google: Electronic Harassment About 10,200,000 results
Google: Organized Stalking About 328,000 results
Google: Gang Stalking About 1,280,000 results

Fruit of the poisonous tree
is a legal metaphor in the United States used to describe evidence that is obtained illegally.[1] The logic of the terminology is that if the source of the evidence (the "tree") is tainted, then anything gained from it (the "fruit") is as well.

The principle that prohibits the use of secondary evidence in trial that was culled directly from primary evidence derived from an illegal Search and Seizure.

http://legal-dictionary.thefreedictionary.com/Fruit+of+the+Poisonous+Tree

Not a single Targeted Individual would or could become Targeted without having first and foremost had a Targeted Hit or Contract Of Experimental Destruction, placed against their living lives by state agencies, corporations, institutions, citizen organizations, and/or individual's within.

From this point, State and/or Corporate Sponsored Professional Hit Squads/Terrorist Assassins', not unlike Team Themis are deployed.

Hitmen are Professional's with specialized skills -  hired to kill or destroy, a selected target.  

In the case of Targeted Individual's it is called: SLOW-KILL - via the 21st Century version of McCarthy Era Blacklisting by way of systematic destruction to character, credibility, reputation, careers, finances, relationships, living situation, quality of life, health, and ultimately shortening the quantity of life the Targeted Individual has left, due to the insidious violence inflicted upon every aspect of their living lives, by these State and/or Corporate Sponsored Professional Hit Squads coming from White & Blue Collar America via the help of their citizen recruits.  Most of this is done via a Slander and Libel Campaign, so if the Target comes forward to proper authorities, these authorities will deny and deprive these Target's of their fundamental Rights and Liberties.

By using their expertise in Military and other National Security Agencies Tactics, and Techniques in Information Operations, Psychological Warfare, Military Deception, and No Touch Torture, and Enhanced Interrogation via the use of Cognitive Neurotechnologies; in addition to the myriad of experimental cutting edge technologies in Electronic Warfare, Biometric Surveillance, Cyber and Telecom hacking, and shadowing, along with access to STUXNET, and its precursor DUQU or W32.Duqu DQ, and domination of the electromagnetic spectrum capabilities, which they have at their disposal; to include Human Intelligence. (Tainted Tree)

It would also appear that these State and Corporate Sponsored Terrorist's have access to "Sock-Puppet" software capabilities, form which they use Social Networking, to TARGET an INDIVIDUAL, by way of SPREADING RUMORS, INNUENDOS, and HATE, en-mass against the Target so that word spreads rather quickly to the civilian population, once the Go Live/Overt stages of Organized Stalking and Electronic Harassment begin. (Tainted Fruit)

Then, the State and/or Corporate Sponsored Professional Hit Squads/Terrorist Assassin's Design a Tainted and Poisoned/Negative False Light Narrative for the purpose of exploiting, and fabricating the information they obtain to further victimize the, law abiding, defenseless Targeted Individual.  (Tainted Fruit)


From this point, all illegally begotten information obtained by these State and/or Corporate Sponsored Professional Hit Squad/s via warrantless and due process free acquisition of information, to include continued WARANTLESS: cyber, computer, and telecommunication wiretapping, hacking and shadowing, audio and video surveillance, and other capabilities are then used to illegally and extensively PROFILE the Targeted Individual for the purpose of systemic destruction upon every aspect of their human lives by SETTING them UP, EXPLOITING any weakness' found of the TARGET, and then using anything gained as a weapon and in the most degrading, dehumanized manner possible so as to RECRUIT their CULT OF CITIZEN SLEEPER CELLS; who can then be called upon, at their choosing, and at anytime, to deploy and execute operations, for the NEXT NAME of a TARGETED INDIVIDUAL, GROUP, and/OR ORGANIZATION that these ROGUE STATE and CORPORATE SPONSORED TERRORIST have DECIDED.... MUST BE EXTERMINATED(Tainted Tree)

(AKA - MALICIOUS USE OF INFORMATION AND MALICIOUS PROSECUTION)

THIS BREAKDOWN WAS FIRST PUBLISHED AT THE FOLLOWING SITE, ON THURSDAY, MAY 27, 2010 - UNDER A. MYSTERIOSA:  http://rebelreports.com/post/637643638/dod-investigating-nine-cases-of-terrorism-related#disqus_thread

UPDATE:  http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks
http://cyberwarzone.com/cyberwarfare/cyber-misinformation-campaign-against-usa-today
HOW IT WORKS:


CHOOSE :

A SOLO HUMAN TARGET, A SCAPEGOAT – someone who is expendable – located in strategically selected communities/towns/cities scattered throughout the United States.  Covertly profile every aspect of the Target/s personal and professional life.  Use Human Intelligence to follow and stalk target to places they frequent, where they go and what they purchase, how often they purchase a particular item, what is the brand name, calculate their uses of products purchased basically EXTENSIVELY AND ILLEGALLY PROFILE the Targeted Individual.  Study likes and dislikes, political  religious, and other affiliations - Within privacy or home, without warrant use cyber and telecom capabilities to hack into or listen to private conversations, emails, websites frequented, online purchases, or online finances. 

Seek out any and all weakness', or negative aspects of the target so they can be exploited, expounded upon and exaggerated in the most negative false light for future psychological operations.   Covertly interview those closest to Target, from personal, professional, to organizational affiliations, and find out who the Target is from their perspective, take that information, to be reversed engineered for future deployment in psychologically manipulating the Target and the Target Audience aka Citizen Population. 

The Goal to find out every aspect of Solo Target so these State and Corporate Domestic Terrorist can take the good and make it bad, and take the bad and make it worse. 


SELECT:
TARGET AUDIENCE, –via PSYCHOLOGICAL OPERATIONS TEAMS, upon and against the citizens of that denied access area/location, a vast landscape of diversity, socio-economics, political, religious, ethnically diverse, to homogeneous cities, rural towns, big and small: Seek out religious, political, community leaders, and those individual who can influence their member base, in addition to seeking all weakness’, intolerance's and fears of these people. In particular youths, and women - Once the target audiences have been profiled, and analysis have been completed –

GO LIVE:

By Shaping the Narrative to their advantage via Targeted Individual and Target Audience’s Profiles, using False Flag Operations ( covert operations which are designed to deceive the public in such a way that the operations appear as though they are being carried out by other entities.) and against the SOLO HUMAN TARGET with an Aggressive Smear, Fear, Hate, Retaliation, and Revenge campaign, via Character and Credibility assassination of the Target – using Propaganda, Negative False Light– whatever it takes to PREY upon the citizens to TURN them against the Solo Human Target – becomes another goal.  In addition to having sufficiently manipulated the public so that they will act upon and against the target via Community Based Bullying – Without Question, Without Reservation, Without Remorse, and most of all without Regard to the Targets humanity and/or human life.

ONE STOP SHOP:

Places every aspect of Targeted Individual human life, to include living situation into a Laboratory and Breeding Ground Setting for recruitment, training, and deployment of operations, to include inviting experts from Science, Technology, Education, Corporate, and Medical to see how their REAL TIME HUMAN GUINEA PIG is doing, then do an analysis in order to advance their experimental agendas

This includes Extensive training in Military and other Agencies Expertise in the field of:  Information Operations Roadmap, and their Five Core Capabilities, in concert with specified supporting and related capabilities:
(1) Psychological Operations, (2) Military Deception, (3) Operations Security, (4) Computer Network Operations, and (5) Electronic Warfare.

  Information Operations Roadmap

All in STRATEGIC LOCATIONS spread throughout the United States for Real Time, Real World Application – from setting up biometric surveillance,  to psychological operations via Shaping a Negative Narrative, and False Flag in order to win over the hearts, minds, and emotions of the general public to their side, and against their set up Solo Target.  To using these Civilian Recruits under fraudulent pretenses for community policing and bullying.

To testing out and illegally experimenting with cutting edge military grade biological-technological weapons and technologies.

And, having ONE STOP locations where they can invite developers of new cutting edge surveillance cyber and telecommunication capabilities for electronic warfare, to biometrics (Facial, Emotion, Optical Recognition), neurotechnologies, biometric surveillance devices, directed energy non lethal /non-kinetic weapons, and other weaponized technologies, in order Experiment with, to calibrate power, to programming software, and be able to visualize in real world, real time, the biological, neurological, and psychological effects and affects the SOLO HUMAN TARGET is having

Not to mention monitor the speed with which these Assassin's can deploy and execute the operations, how fast they manipulate the public, and how quickly they can ultimately drive the Perceived  target/adversary of their Hate out of these communities, thus allowing them to follow the target, and set up shop – in yet another denied access location.

What the Rogue State and Corporate Sponsored Terrorist's never share with their Target Audience is the literal fact that they have Terrorized, Bombarded, Tortured, and TRAUMATIZED the Targeted Individuals - who not unlike a PERSON WHO IS TORTURED on a 24/7 basis; will SCREAM OUT IN UTTER DURESS, TRAUMA, PAIN AND/OR SUFFERING -

Something the State and Corporate Sponsored Terrorist's omit to share with their hearts and mind campaign to win over their Target Audience aka General Public, is NEVER TOLD ABOUT - . (Tainted Fruit) 

Think of it as a Magic Trick, what you see, is not necessarily what it is all about, but the result of planning, experimenting, and work behind the scenes in order to provide the viewing audience with a, Finished Product. 

Or, Think of it as a Theater or Film Production, it takes a much work behind the scenes: sets, props, lights, costumes, make-up, cameras, rehearsals, director, and actor's - and when the curtain goes up or the final cut takes place - it is called the Finished Product.

or

 Arthur C. Clarke's, Third Law - "Any sufficiently advanced technology is indistinguishable from magic"

As, such, if you see or hear the targeted individual responding negatively, doing those odd things in public: in order to get those reactions, to include provoking the target, there is much work that takes place behind the scenes, by these State and/or Corporate Sponsored Professional Hit Squad/s/Terrorist Assassin's so that their Target Audience aka Citizen Recruits'and Citizen Population will see exactly what they want them to see, and believe exactly what they want them to believe.

(some of the most comprehensive forms of psychological operations, and psychological manipulation ever deployed against American's, and now International Citizens' in what is known as a "Hearts and Mind Campaign" against their own TARGETED CITIZEN'S - in order manipulate their Target Audience into becoming their future snitches and sleeper cells, who are now brainwashed into striking out against another fellow citizen, all based on the lies their State and Coporate sponsored Terrorist' Leader's - deem necessary to Exterminate.






As such,  the next door of opportunity opens, where other institutions, and organizations use the Fruit of the Poisonous Tree LIES for the purpose of expanding their own goals, future profits, and agenda's.

If, the Target is made to look like a criminal - then it gives all sectors of law enforcement, from local, state, federal, Department of Defense and all agencies within, in addition to, the private sectors, to include Educational grants doing business for, an excuse to develop and experiment with cutting edge surveillance, cyber, biometrics, and neurotechnologies capabilities -  

If, the Targeted individual is made to look mental, then there are several, if not all 21 Government Agencies doing Research and Development, to include Defense and Defense Advanced Research Project (DARPA), the Department of Energy -along with Private Corporations and Universities working in the field of Neuroscience/Neurotechnologies for the purpose of human brain-computer interfaces, reverse engineering the human brain, using Neuroscience for the Law, for the purpose surveillance biometric software aka Facial, Emotion, Optical to Brain function recognition, in addition to forced Behavioral Modifications via transcranial or intracranial magnetic stimulations, Cognitive altering neural pharmacological, and/or for the purpose of Mass Subjugation.


if, the Target is made to look EVIL - a Religious organization might capitalize upon this in order to further recruit, manipulate and profit from their member base.

If, the Target sustains massive cyber and telecommunication targeting and attacks which continually disrupts service,  to the point of destroying electronic devices - A Telecommunication Corporation, not developing said weaponized technologies, but is interested in knowing if they truly have security breaches in their network. may ALLOW the Terrorist's to ATTACK the Targeted Individual's cyber and telecom capabilities, just to see where their Network security breaches are, or to hire these Terrorist's as their Cyber and Telecom Security Firms. 

If, the Target continues to be mobbed and stalked in public places, companies may be testing out their in store, and parking lot surveillance cameras, to see if the recognition software can actually identify the Mobs who are Attacking the Targeted Individual in public places. 

If the economy continues to crash, there will be a need for Crowd Control, non lethal weapons -

as such - 

the Targeted Individual is being used for TARGET PRACTICE by these State, Corporate, Educational and Citizen Recruits.





The point being, everyone, save the Targeted Individual's, appear to, for their own selfish purposes, hide behind the ORIGINAL POISONED LIES that were illegally begotten from the very start.  Instead of stepping up to the plate, these state agencies, private corporations, institutions, organizations, and individual's within -  chose to keep a collective code of silence in order to absolve themselves from their participation in Conspiring to Commit, and their Collective CRIMINAL RESPONSIBILITIES for the 1st DEGREE MURDER'S of those who did not survive their insidiously violent Targeting, and the ATTEMPTED MURDER'S on a DAILY BASIS of the Surviving Targeted Individual's because of these Terrorist Assassin's CRUSADE to develop, CRUSADE to experiment with, CRUSADE to profit from, CRUSADE to recruit. CRUSADE to train, and CRAUDE to DESTROY.  




These Hit Squads/Terrorist Assassin's will then deploy and execute all their expertise is the above described capabilities in order to premeditatedly destabilize the Target, and feed the fears in the eyes of the public aka Targeted Audience.





Recent Article about how these cyber and telecom capabilities are being used to EXPLOIT Targets.

Heather Brooke: Data Dealing Is A Bigger Scandal Than Phone Hacking.  Dina Rickman

http://www.huffingtonpost.co.uk/2011/08/17/heather-brooke-data-deali_n_928985.html


FOR MORE INFORMATION SEE:  TARGET'S WHAT TO EXPECT AND HOW THEY ARE RECRUITED.  to include close to the bottom of the page two links:  These links will give you an example of how extensive the profiling goes, to include recruitment of Look-Alikes, and Sound-Alikes.  In the case of the sound-alike, your very speaking mannerism's are being mimicked, copied and then used.  Due to the two links, at this time, there is NO TELLING what type of nefarious, illegal, criminal acts, and/or character and credibility assassinating theater, or operational ploys have been committed by these Female Frauds, in their paid quest to give the public even more False and Fabricated information - 

Shortly after the vocal sound-alike,. i was given another queue., when another female impersonator, who sounded like me, but was not as versed in my speaking mannerisms, as the female caller from the link -chose to begin spewing Racial Slurs.  

As such, it proved to me as the Targeted Victim of these Terrorist Assassin's they will profile you, and literally hire, train. and then deploy these IMPERSONATOR FRAUDS.  Who are used to further show the Targeted Individual in a negative false light, in order to facilitate the Hate Campaign, and to give the truly false impression of the Target in the eyes's of their Citizen Recruits. 




NONE OF THIS COULD BE POSSIBLE - WITHOUT FIRST AND FOREMOST - THE WARRANTLESS AND ILLEGAL STEALING OF PRIVATE AND PERSONAL INFORMATION, IN PARTICULAR THE BREAKING AND ENTERING INTO THE PRIVATE RESIDENCE WITHOUT NOTICE OR CONSENT - AND THE FILTERING THROUGH EVERY ITEM, TO INCLUDE PAPERS, WITH VARIOUS INFORMATION - WHICH MEAN - ONLY THROUGH THE ILLEGAL ENTRY INTO THE PRIVACY WITHOUT WARRANT - WITHOUT THE PRESENCES OF THE TARGETED INDIVIDUAL - NO STALKING AND TERRORISM PROTOCOL COULD BE DESIGNED - AS SUCH - THE FRUIT OF THE POISONOUS TREE - BECOME PARAMOUNT - IN ALL SUBSEQUENT - TARGETING -= TO INCLUDE DENIAL OF BASIC RIGHT AND LIBERTIES - BY LAW ENFORCEMENT AT THE LOCAL, STATE, AND FEDERAL LEVELS - DUE TO THE THE ARCHITECT'[S WHO ILLEGALLY WITHOUT A WARRANT AND DUE PROCESS - SEIZED INFORMATION - THEN SHARED THIS PRIVATE INFORMATION - WITH THESE AGENCIES - IN ADDITION TO THE PUBLIC CITIZENS -WHO WERE NOT ONLY PSYCHOLOGICALLY MANIPULATED - BUT LIED TO ABOUT THE TRUE INTENT - IN ADDITION, TO THE FACT THAT - BECAUSE THESE TERRORIST ARCHITECT'S - WERE WILLING TO MURDER IN THE 1ST DEGREE TARGETED INDIVIDUAL - IT STANDS TO REASON - THEY ARE PATHOLOGICAL IN THEIR ABILITIES TO LIE -=

FOR IF A PERSON KILLS ONE TARGET - AND PROCEEDS - KNOWING THE OUTCOME - AND THEN ANOTHER TARGET  AND ANOTHER - AND SO FORTH - FROM THE DEATH OF THE FIRST TARGET - ANY DEATH THEREAFTER - IS PREMEDITATED - AND ALL OF THIS IS DUE - TO THE FIRST - ILLEGAL ACTS WHICH WAS WARRANTLESS - WITHOUT DUE PROCESS - BREAKING AND ENTERING IN ORDER TO GAIN - FIRST HAND INFORMATION - THEN TURNING ABOUT - AND DESIGNING -= A NEGATIVE PROTOCOL - BY PUBLICLY EXPLOITING THE ILLEGAL INFORMATION OBTAINED -

SO - IT GOES BEYOND - THIS FRUIT - INTO THE PREMEDITATED ACTS OF MURDER -



To explain how extensive, pervasive, comprehensive, and all-encompassing the profiling is - the following links will explain what I as a Targeted Individual am currently dealing with;

A posting on You Tube in 2008 of a Female who claims to be the victim of electronic harassment - it is more like trying to discredit those who truly suffer from electronic harassment.  Why is this video so important - because the perp in the video has a striking resemblance to me, the only problem:  IT IS NOT ME.  Thus, the Hit Squads/Terrorist Assassin's search for look alike's - This can then lead to that person, doing any number of negative, nefarious, and illegal things, but giving the false impression that it is the Target - in this case, Myself. 

This other link, scroll to: 2:22.27 two hours, twenty two minutes and twenty seven seconds into the recording - The female who speaks at that queued time spot, sounded very similar to me, the most disturbing were her speaking mannerisms, as such - extensive profiling, and surveillance to include audio, so that a Perp's will attempt to Impersonate the voice of a Targeted Individual. 

By having the similar speaking mannerisms, and close audio match to me, there is no telling what these Hit Squad Leader's ask these Female Perps to do, in order to further victimize, discredit, and demonize the Targeted Individual in the eyes of those they are attempting to recruit.  Just to be real clear on why this of great concern to me at this point as a Targeted Individual.  A couple nights later, on another Targeted Individual show, another female perp who did not have my speaking mannerisms down, but sounded like me began spewing racial and derogatory slurs, and once again, it was NOT ME.  
http://recordings.talkshoe.com/TC-81062/TS-519565.mp3

In both cases, one call came from where I am located currently, the other where my cell phone number is located.

I also believe this was done by the Hit Squads/Terrorist Assassin's to let me know in an OVERT MANNER as a Targeted Individual how pervasive, and comprehensive their hate campaign to destroy me is all about, by way of finding look alikes, but most of all it takes study, to impersonate another person's entire speaking mannerisms.

Yet, I am a cog in the wheel, a virtual nobody, yet these terrorist assassin's appear to feel threatened enough by a law abiding cog in the wheel, to spend the time and money, to get female impostors to literally appear, or sound like me.

What this also does is open the door for those who find they can Capitalize upon the Set Up Targeted Individual, be it for Research and Development, Recruitment and Training, Experimenting with Weaponized Technologies, in particular in the field of Neuro/Nano-Science and Neuro/Nano-Technologies, whereby they use these negative reactions as an excuse to justify to the ALL, why their portion of doing what they are doing is necessary, as opposed to stating they are behind the scenes guiding these Hit Squads/Terrorist's Assassin's on what to do, how far to go, and what they can elicit.  



Think of them as the Medical Professional's, and other professional's who helped design, the CIA Torture Program aka Enhanced Interrogation, without them, those doing the Torturing, would not know what to do, how far they could go, or what they could intentionally elicit out of their detainees'.


MY GOAL: 
TO EDUCATE THE PUBLIC AND BRING THOSE WHO DARED TO VIOLATE MY RIGHTS AND LIBERTIES UNDER FALSE, FRAUDULENT, WARRANTLESS, ILLEGAL, NON CONSENTING OPERATIONS TO FULL SCALE CRIMINAL JUSTICE, AND CRUSADE TO OBTAIN FEDERAL LEGISLATION TO OUTLAWING THE USE OF THESE WEAPONIZED TECHNOLOGIES BE THEY CYBER TO BIOLOGICAL/BIOMETRICS.