Gang Stalking Worldwide II


Sheila Powers

If you’ve been gaslit about tech stalking read this. Our phones are literally logging it. I just pulled a log from my system and thought I should really start sharing this 🧠✨ Welcome to 2025: where your own brain has analytics reports you didn’t ask for. GreyMatter™ Apple’s brain-pattern tracking system is tied to foreign surveillance settings I never agreed to. Apparently, my screenshots, browser clicks, and emotional patterns are a hot topic in their data dungeon.

🎭 “homeCarrierName: unknown” yet “Verizon” is listed? Yeah, it says I’m on Verizon… but it also says my SIM carrier is “unknown.” Some kind of SIM voodoo… shadow cloning or virtual SIM hijacking. Either way, somebody’s running me like a puppet. Fun fact. This phone has no service or sim inside. It’s pathetic. They’re tapping into my phone like I’m a threat for defending myself. Securing my home and network is a threat to the nation now because there’s a $100 million dollar+ lie to maintain and truth to contain in Western Pennsylvania folks. And they’re trying to categorize my entire mental pattern to see what else I know and make their next move. 📱🧠👀 My phone has been a neural exhibit since 2019 and if you’re a TI yours is too…remote logging, baseband sniffing, surveillance profiling and today I see something called “GreyMatterCountryPolicy: ROW” ROW =Rest of World. (a generic foreign tracking policy.) 🇺🇸 Why is my phone using non-U.S. control protocols? This means my U.S. based phone is somehow being treated like it’s under a foreign monitoring policy commonly seen in enterprise/spyware/MDM control setups. (Classified CIA crimeware.) 🥸🤫 I looked this up from several sources. GreyMatter is Apple’s behavioral data pipeline used in enterprise surveillance + MDM (mobile device management). Think of it, your phone’s behavioral surveillance system named after YOUR ACTUAL BRAIN. I don’t know Android systems but it has to be similar. If my Gangstalking theory is correct, every TI phone’s policy is set to an international configuration. I should post about that too at some point. com.apple.screenshotserviceservice: 23 counts, com.apple.mobilesafari: 307 counts, someone’s logging every micro-move because nothing screams national security threat like me trying to interpret and analyze MY OWN PHONE while a mufflerless zombie van revs outside trying to intimidate me. “basebandChipset”: ice19, this is deep modem-level data.

“optIn3rdParty”: true. I didn’t opt into jack.

This shows 3rd-party data access is ON meaning someone flipped that switch remotely. Another feature of MDM/spying profiles. That’s not a bug. It’s a backdoor.

They’re profiling our brains like a TikTok algorithm. I’m “engaging” with apps I don’t use, more proof someone else is triggering processes remotely or my phone is haunted by another NSA intern who finds my network activity very sexy.

If you’re a TI or anyone dealing with weird digital stuff that looks like psyops in a trench coat then check your networking. The data doesn’t lie. The system will gaslight you, but logs like this are the digital breadcrumbs of modern stalking.

And to the creeps @ NSA running this: Get a life and get your own brain. Mine’s closed for extraction.

If you’re a TI , please check your logs. Ask questions. I wish more people would document the digital side of this stalking hell. Nothing is going to change until a whole lot of us do.

Will Myers 

Being a TI for over 60 years, my struggles had struggles and were artificially created by special-interest, poisonous, evil snakes that could monitor me down to the hour and at times down to the second. They destroyed my life’s desires and turned my life rotten.

Luke 6:31

And as ye would that men should do to you, do ye also to them likewise.

If you do unto a stranger at the behest of an organization, person, or government and would not like anyone to do the same to you, then you are a gang stalker—an active conspirator—part of the special-interest poisonous evil snakes movement.

Monica Frate 

hello! I think you should save all this info like you have it printed out with the file and the information and I’m not a fan of Donald Trump at all in any shape or form, but I’m sure he would be interested in seeing this. You can make an account on social. Find a way to send it or send it to the White House. Also, there’s ways to send it to him directly so I would start there because this is fascinating to me and you have actual proof and if other countries are using our devices to spy on Us and mess with us, I’m sure he’ll want to know about it. Again, I am not a fan of Donald Trump, but that’s where I would send it if I were you.

Nicholas Gerald Peterson AKA Nick The Louse 

I like Wigle WIFI for logging cell/wifi/bluetooth activity near me. It has enough users to where almost everything is logged.

Sheila Powers

If you’re serious about helping, I could use someone to help map any public-facing or open source telemetry tools that connect to:

• Siri logging systems

• Voice-based intent inference

• GreyMatter or other ‘Eligibility’ domains tied to device behavior

That’s where the real data is.

Nicholas Gerald Peterson AKA Nick The Louse 

Also, WIGLE wifi is precisely a telephone telemetry tool: worldwide. You just need to dig into it. Learn to read the logs. Don’t dance to a tune that may not exist as you are hearing it at the moment. An easy fix would be to get a degoogled phone from Brax.Me – Building Private Communities or somewhere similar

Sheila Powers ;”I know you know a lot more than you’re saying. I wish you would teach us and stop letting them control you.”

Profile photo for Nicholas Gerald Peterson AKA Nick The Louse

Nicholas Gerald Peterson AKA Nick The Louse 

Remove that photo, ASAP. Please. Potentially sensitive stuff to those who can string it all together. These two should give you a very firm start. Here’s an article specifically showing logs, etc. from the second blog. Helping you directly beyond this can cross legal lines for me, but you are allowed to interrogate your own devices as much as you want. Good luck. The way out is through outsmarting dumb/smart tech and people. I have decades of experience with things I would be a moron to discuss publicly, if you understand. Remove the photo and maybe change out your phone and router. Probably not a risk, but, if you can swap them, I would.

Angela Thompson 

How do I check my logs?

Sheila Powers

To access iPhone analytics,

navigate to Settings > Privacy & Security > Analytics & Improvements, then tap “Analytics Data” you’ll see a lot of threads there. You can enter them into AI.

THEN the real juicy files are found in the diagnostics.. (This is what I do) to generate the sysdiagnose on iPhone, go to settings>accessibility and turn on touch assist. An icon should appear that you can move around the screen. Ignore it and press and hold both volume buttons and the side button (or top button on some models) for about 1 to 1.5 seconds until you feel a short vibration and SOS pops up on screen. Don’t touch that but slide to power off. Wait a minute. Restart and go to the Home Screen. Double tap the touch assist icon. It should say “collecting sysdiagnose” or something similar. When it’s done it will notify you. Go to settings> privacy>analytics and find the sysdiagnose thread. It will most likely look empty but it’s there… tap the arrow to send it to your files then go into files and you see it there. If you do, let me know what logs you’re seeing. We all need to collect these logs so we can compare and identify. This is the basis of what proves our case.

Oh! You can also google it or better yet ask AI how to run sysdiagnose on your model of iPhone. The technique changes slightly in some models.

If you have any questions I’ll do the best I can to help!

There is an easy way to get Android logs too and I posted it here before. I just can’t remember where. 😒

if you search online it’ll be there and it’s not difficult but you’re basically unlocking the device. Every target needs this information. We all need to take this seriously.

AMS 

Try to use available AI app to help you to decipher more of this coding and what it means. Rebecca Brewer had some great results doing it.

Sheila Powers

Thank you for letting me know that. I am using AI now. They’re trained on mountains of open source exploits, and they’re designed to spot patterns we miss. lol. I’ve been staring at system files and diagnostics since 2019. I’ve spent weeks and months of my life on GitHub and Apple forums reading Apple crash logs and system internals. I loathe technology but using AI 💻 with the Apple developer forums 📱has been a tremendous breakthrough. I’ve been feeding hundreds of files into AI. It’s amazing. There’s so much information I want to share but I have to hold back because I don’t want to overwhelm.

AMS 

You are welcome. While I am nowhere close to good with technology, I have been using AI to decipher hacked security camera logs. Also doing research on certain legal issues.

For majority of TI tech and IT stuff, especially dealing with these kind of logs is info hard to understand but in reality lots of our targeting info sits right on our electeonic devices, wish i would know how to access these logs on iphone. For time being get more info and patterns, get it organized and presentable as larger picture. Probably start writing little instructional manual how to get these data, how to extract necessary info and eventually achieving goals of proving hundreds of thousands of cases. This is literally start of criminal investigation/ documentation of crimes against humanity: forensic.

Sheila Powers; “Yesssssss 💙 This is what I have been saying. I’ve been wanting to start a space for this. To access iPhone analytics, navigate to Settings > Privacy & Security > Analytics & Improvements, then tap “Analytics Data” you’ll see a lot of threads there. You can enter them into AI. THEN the real juicy files are found in the diagnostics.. (This is what I do) to generate the sysdiagnose on iPhone, go to settings>accessibility and turn on touch assist. An icon should appear that you can move around the screen. Ignore it and press and hold both volume buttons and the side button (or top button on some models) for about 1 to 1.5 seconds until you feel a short vibration and SOS pops up on screen. Don’t touch that but slide to power off. Wait a minute. Restart and go to the Home Screen. Double tap the touch assist icon. It should say “collecting sysdiagnose” or something similar. When it’s done it will notify you. Go to settings> privacy>analytics and find the sysdiagnose thread. It will most likely look empty but it’s there… tap the arrow to send it to your files then go into files and you see it there. If you do, let me know what logs you’re seeing. We all need to collect these logs so we can compare and identify. This is the basis of what proves our case. Oh! You can also ask AI how to run sysdiagnose your model of iPhone. The technique changes slightly in some models. If you have any questions I’ll do the best I can to help!”

AMS 

I sent you invite to become contributor in another TI group.

Unknown's avatar

About Will Myers

I am an "Intelligent Design" writer who has the Christian faith. Part of my background is that I have a degree in physics, and have been inducted into the National Physics Honor Society. Sigma Pi Sigma, for life. My interest has lead me into metaphysics, farther into Christianity. Optimum metaphysics becomes religion.
This entry was posted in Uncategorized and tagged , , , , . Bookmark the permalink.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.