What are some indicators that someone is being targeted with electronic surveillance, harassment, mobbing, or stalking? How can you determine if an innocent person is being targeted in this way?


Elle 

People know things about you that they’d know only if they were present with you, but weren’t. Instead, they were miles away clandestinely watching and listening to you via a hidden device. A year ago, a woman with whom I worked repeated things from conversations I held 100 miles away with people she doesn’t know. She did that with the intent to taunt me on multiple ocassions. Once, she had even stated, “I’ve been watching you…”. A man that has stalked me for ths last 6 years, recruited her to participate and help give him additional access and information. At times, I believe he allows her to watch and listen with him as he stalks me.

The signs are always there. Look for small devices with the appearance of tiny microphones installed into ceilings usually at your places of employment where no one would really notice or one dept. would assume the other dept installed it. Cell phone snapping pictures of you, mouse on computer moving absent any manipulation from you, notices from your cell phone that another device was trying to connect but couldn’t, computer’s speakers adjusting volume w/o manipulation from you, and strange activity on your cell phone such as duplicate software icons (text messaging and camera), etc. If you have a newer car with a computerized GPS screen, that can be remotely manipulated.

Look for evidence of someone having broken into your home or car, but nothing is missing. The intent of the break-in was to install voyeuristic devices (cameras and audio devices). Look for suspicious acting smoke detector. I’ve seen one flash like a camera, another hasn’t needed a battery change in 4 years, the light never goes out and the device never malfunctions. Strange activity with your internet service, have your internet provider to check the back end of incoming signals and interruptions. Each time your service is hacked, your ISP receives an error message that becomes part of a log.

I have found intellectual property deleted from my personal computers and USB drives. I have also been locked out of my employers network for multiple failed password attempts at a site away from the organization.

I have found devices that I had never purchased or owned in my purse and make up bag. Such devices include a small remote for a digital camera. Had never seen one in my life and had to take a picture of it and send to my contacts to get help identifying the device. I discarded the one I found in my purse and found another in my makeup bag a year later. I have also found usb devises that I don’t own conveniently placed among my things. I usually didn’t lock my locker at work, just placed my purse inside and walked away.

I worked a contract out of state, found a hidden camera in my hotel room, and covered it with paper. When I left for work I noticed that a strange man was standing at one of the side doors. I knew he was there about the camera and he knew what time I’d be leaving for work. So, I lapped the building and noticed that he hadn’t yet moved, but used a towel to prop the door so that he could get into the hotel using the side door and stairwell. I had noticed similar activity at other hotel rooms with smoke detectors flashing a light that shone so brightly in the dark it was like a scene from a horror movie. That was clearly a camera.

The dark web is not a myth. I believe that like any other service, people can subscribe to the dark web, get acccess to various hacked places (hotel rooms, grocery stores, college campuses, etc.) via hidden cameras throughout the world.

StillPositiveVibes 

The early tactics of my organized harassment began with weird things happening that didn’t make sense. One for instance , someone had tied a cellphone to my gate in my driveway facing my apartment The cellphone was recording, and a long extension cord was attached what seemed to be coming from the neighbors next door property. I would get neighborhood children ride their bicycles in the driveway yelling in my door or window we see you and they’re watching you! This was creepy as heck BTW. I had people ramaging through our trashcans looking for Intel I assume.

I was told that this is the investigation stage. I don’t believe this is an investigation it’s a persecution. It’s a gathering of pitchforks and knives ask questions later. Judge juror and execution. The imaginary crimes that they tell people we’re guilty of are just that imaginary. The perps are guilty of so many criminal acts but, they refer to this for the greater good a bigger plan. To weed out the bad seeds and begin a new. “ There must be kaos and destruction and out the ashes cones a new beginning .” We’re the bad seeds lol okay say’s the person holding the directed energy weapon torturing people. That’s laughable coming from Sociopaths.

Olivier Tikuna Ntemo 

YOUARENOTMYBIGBROTHERdotBLOG

Gw Jo 

May I ask what you used to find the camera in your room? Did you you find any cameras in your home, too? I have them all over.

WILL MYERS, SENIOR TI FOR OVER 60 YEARS AND AUTHOR OF “INTELLIGENT DESIGN AND BIBLICAL SCRIPTURE”

We must first consider the anticipation of your thoughts and mimic your thought life by the social machinery of the special-interest poisonous snakes. The actions of placing receiver devices covertly are a cover story of the first order to keep the snakes secret. Hyper-communism is coming like gangbusters.

Next, hiding a receiver device is very probable. The gang stalkers break all the laws. We TIs are thrust into a police state, whereas all of our rights become tentative, especially our privacy rights.

Unknown's avatar

About Will Myers

I am an "Intelligent Design" writer who has the Christian faith. Part of my background is that I have a degree in physics, and have been inducted into the National Physics Honor Society. Sigma Pi Sigma, for life. My interest has lead me into metaphysics, farther into Christianity. Optimum metaphysics becomes religion.
This entry was posted in Uncategorized and tagged , , , , . Bookmark the permalink.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.