2. TARGETED INDVIDUAL - WHY SO MUCH PROFILING?

WHY SO MUCH PROFILING:  WHAT IS THE POINT IF THE TARGETED INDIVIDUAL HAS DONE NOTHING WRONG?

There are many explanations provided on other sites about why one would become a Targeted Individual, and until any of us is TOLD outright, it is the Best Guess we can come up with. 

  • You could be someone who questions authority,
  • is a whistle-blower,
  • filed a complaint of some kind be it in the workplace or another area,
  • is politically or socially Aware and as such is active within said political groups/ organization,
  • is a strong supporter of the Constitution and the Rule of Law,
  • you are someone who speaks out about injustices,
  • or maybe it is simply someone who is affiliated with, or a member within these Terrorist Organization/s and does not like you because of your Views, is Jealous of you, or wants something from you,
  • or for some Targeted Individual's...It could literally be for no reasons at all.


Basically, it can be for any number of THEIR PERCEIVED reasons, and your guess is as good as mine, but for most Targeted Individuals they appear to be Older, Law Abiding, Non Violent, Unarmed individuals,  who have repeatedly requested protection, help, intervention, assistance, and investigation via all Proper Law Enforcement Authorities at the Local, State &/or Federal levels. 

Most all Targets have spoken to Attorney's, and/or Non Government Agencies, to NO AVAIL, and only to be continually DENIED their fundamental and basic Rights and Liberties.

It also appears, no matter what levels of insidious violence, terror, pain and/or suffering is inflicted on a daily basis in an almost ritualistic manner, Target's refuse to cross the line and continue to seek out the Justice System to put an End to their Targeting.  

This leads me to believe, they were chosen for this specific reason, meaning, they remain for the most part, non violent in their quest to get their targeting to stop.  If, these Architectural Operations are being used for the purpose of recruitment, training, and experimenting, their recruits and operators would be safe, as they were training.  

If, these Terrorist's did the same in a violent neighborhood, or with a Target who had affiliation with armed person's, chances are, violent retaliation would ensue.  As such, these Terrorist's need Target's who are law abiding, because they will use the very Justice System that continues to FAIL them.  Basically, if you were to look at SERE TRAINING in Prisoner of War - part of their Torture Training, as prisoner's of war is to REFUSE to COMPROMISE their Country.  Target's refuse to compromise on their CONSTITUTIONAL RIGHTS and the RULE OF LAW. therefore, THEY REFUSE TO COMPROMISE or GIVE UP ON THEIR COUNTRY although, their COUNTRY has GIVEN UP ON THEM...  

Most All Targeted Individuals will come to realize an extensive warrantless, illegal all intrusive Covert/Secretive PROFILING was conducted into every aspect of the Target's human life PRIOR to GOING LIVE and letting the Target KNOW in a Overt, Unconcealed manner they are now a Targeted Individual.

In order to design such a comprehensive Targeting Protocol, you need extensive funding, access to cutting edge National and Homeland Security grade, in addition to Private Security grade cyber, computer and telecommunication surveillance, shadowing and hacking capabilities, video and audio surveillance, in addition to these cutting edge experimental biometrics, to include neurotechnologies;
trained psychological operations teams, with specialty in Information Operations, Five Core Capabilities, and operation teams vetted in human intelligence, spying and data collection.   

It would appear to take a few years of Extensive Profiling every move the Target makes, studying and analyzing via experimental Biometric capabilities, in the of Privacy of the Targeted Individual's home, at work, in their vehicle, and within public settings, to the websites they visit, the phone conversations they have, what they purchase, to how much money they make, to their spending habits,  in addition their affiliation with various Organizations, such as religious, political, environmental.  Basically obsessively stalking the Targeted Individual's lifestyles, without warrant, knowledge, or informed consent. 

In addition to lifestyles, there are other teams of professional assassins with expertise in psychology, sociology, anthropology, and other members of the medical profession, humanities, law, science and those with technological expertise in software engineering who are involved the entire process of what the Targeted Individual's have been literally forced against their will as these WHORES - use them like disposable human target's, human guinea pigs, and think of them as disposable human trash.  This is accomplished by using their expertise in a Heart and Mind campaign, to get the general public aka citizen's to view the Targeted Individual's in the exact same manner. 

hat makes them happy, sad, angry, incensed, what shifts their moods and behaviors - Therefore, in addition to habits, and lifestyles being profiled.  

All of this data appears to be placed into some type of Human Profiling Software System/SERVER, that has the capacity to compile, and analyze the data, and output the best case scenarios on how to Manipulate the Targeted Individual.  Then these Teams with their various expertise Design Strategic Protocols to use against the Targeted Individual, and also their Target Audiences aka Citizen Population, from which these Terrorist's have targeted to psychologically manipulate and recruit to their side. 

The Architectural Operations are based on these fields of expertise, that are being aided and abetted by the development of cutting edge software with the capacity to conduct profiling, surveillance cyber, telecommunication, neurotechnologies, biometric, and other technologies that harness the electromagnetic spectrum, which are being weaponized to be used in future Military Operations, and for Domestic Crowd Control. 

These Psychological Operations Teams are also experts at FEAR Mongering and will use age old LIES to Discredit and give the false impression that the Target is dangerous, a criminal, a sex offender, has an addiction, or some mental disorder, whatever it takes to Prey upon the Target Audience aka Citizen Population in order to Feed their FEARS, win them over, and turn against the Solo Human Target.

(see ONE STOP SHOP)
Some Possible Scenarios used by the Operation Terrorist Team/Teams:

If, the Target is a Progressive Liberal, who believe in Equal Right, a Woman's right to choose, Freedom of ANY Religion, or no Religion at all, and/or Same Sex Marriage.

The Terrorist's Operators will then Use this information to sell to their TARGET AUDIENCE aka Civilian Population whom they know are INTOLERANT to the above type of person.  Which makes the Terrorist's operators jobs much easier in the psychological operations recruitment process.
 
On the FLIP SIDE - The Terrorist Operators may TARGET the very BELIEFS the TARGETED INDIVIDUAL HAS - by DESIGNING A PROTOCOL OF DELIBERATE REVERSE ENGINEERING IN ORDER TO MAKE THE TARGET APPEAR TO BE THE OPPOSITE OF WHAT THEIR OWN BELIEF SYSTEM IS.  Then turn around and design that protocol to show the Target in some Negative False Light as being the OPPOSITE of who they are.

In the case of the MORE PROGRESSIVE Groups, who are generally more liberal minded, may also be recruited with some type of false narrative that the TARGET has an IDENTITY PROBLEM, IS NOT WHO THEY CLAIM TO BE, and as such would be recruited to assist in getting TARGET to somehow admit to this.


SOME OF THE PROTOCOLS THAT ARE DEPLOYED BY THESE TERRORIST OPERATOR
TEAM/TEAMS

1. Once the Target Audience aka Citizen Recruits and/or Population have been thoroughly psychologically manipulated by these Terrorist Operator's; AN AGGRESSIVE AND VIOLENT MODE OF OPERATION is set in motion, IN WHICH  THE TERRORIST OPERATOR'S WILL USE THE PROFILED INFORMATION ABOUT THE TARGET, AND THE TARGET AUDIENCE TO NEGATIVELY EXPLOIT THE TARGET to the Target Audience aka Citizen Recruits and Population at large.

THE OTHER A MORE BENIN FORM WHEREBY THE RECRUITED THINK THEY ARE DOING IT FOR THE GREATER GOOD, THE GOOD OF THE TARGETED INDIVIDUAL,  and/or TO HELP THEM OUT, TO SHOW THEM THE WAY -

ALL RECRUITS WILL BE TOLD TO KEEP A UNIVERSAL CODE OF SILENCE -


By doing this, it leaves the Targeted Individual all the more vulnerable, if not the single most vulnerable because there is no telling what criminal, nefarious, exploitative negative false light these Human Persona Impersonators will COMMIT, or present themselves as being.  Such as, setting up a FALSE SOCIAL NETWORK SITE/s IMPERSONATING the Targeted Individual, posting words, vocal recordings, racy photos and videos showing what appears due to this fake human persona look-a-like or sound-alike to be the Targeted Individual in some premeditated comprising position that the Targeted Individual has no idea is being committed. 

It would appear there is no levels these BIOLOGICAL-TECHNOLOGICAL-CYBER TERRORIST, will stoop to in order to DESTROY the life of the Targeted Individual.  It also appears due to the levels of sophistication in these operations the Terrorist's are given access to MILITARY AND NATIONAL SECURITY GRADE WEAPONIZED TECHNOLOGIES, and TECHNIQUES IN ORDER TO COMMIT SUCH FELONIOUS CRIMES AGAINST THE TARGETED INDIVIDUAL. 

These Fabricated sites, sounds, and visuals of the Targeted Individual are then used to further Set Up, and give the wrong impression of, so these ORGANIZED TERRORIST'S can further advance in a myriad of ways, to include PREYING upon and psychologically manipulating their target audience aka civilian population into turning them against the set up, innocent targeted individual, based on these fabricated lies.

THE FOLLOWING ARE TWO CLIPS - OF THIS EXACT THING TAKING PLACE - BUT THE VOICE OF ONE, AND THE LOOK OF THE OTHER ARE CLOSE ENOUGH TO SOUNDING AND LOOKING LIKE ME - the ONLY PROBLEM - THESE TWO FEMALES ARE NOT ME - IT IS CLEAR - THESE INDIVIDUALS ARE A PART OF THE OPERATIONS BEING DEPLOYED BY THIS BIOLOGICAL-TECHNOLOGICAL-CYBER TERRORIST ORGANIZATION.

The OTHER EVENT - was VOCAL IMITATIONS - that came from the following link, whereby the Female on the phone, not only sounded very much like me, but also the female speaker mannerisms, emphasis on words, and the words used in sentence form - are all words and/or sentence I have used in some context over the years I have been targeted - be it COVERTLY or OVERTLY -

This shows that vocals are being recorded, then studied by the TEAM/TEAMS to find ways in which to impersonator/operative in order to get the almost exact mannerism of the Targeted Individual.  This shows that these Team/Teams that are working are doing so at the highest levels of the United States Government Intelligence and other Private Security firms working on behalf on their behalf. 


THE 2008 LOOK ALIKE - WHO TOTALLY DISCREDITS TRUE ELECTRONIC HARASSMENT - What this show is how FAR these Organized Terrorist's will GO to DISCREDIT, not only the Target, but the TRUTH about ORGANIZED STALKING and ELECTRONIC HARASSMENT
http://www.youtube.com/watch?v=I2HVhQYTRDE


the voice can be heard at: 2:22.27 two hours, twenty two minutes and twenty seven seconds -
http://recordings.talkshoe.com/TC-81062/TS-519565.mp3