GANGSTALKING TORQUAY

BLOG BY GOD FM


Gangstalking is real here is a copy of the handbook that the government give out to the hired members of staff and neighbourhood watch and neighbours that participate in this horrendous crime against innocent people. I am a living testimony that this is a real event and not only am I the only victim in my town but there are several victims. If you are a victim of gangstalking then what I strongly recommend you do is print off this book that I have printed below And have it distributed around your neighbourhood and knock on some doors and find out if there are other victims nearby because there are usually other victims along the street where the gang stalkers live because once they get started in it they become hooked and they train their own families in it and they get financial rewards and some of these people are Satanists And the police have turned the blind eye to it. You will be a victim of hacking stalking tracking following and torture with microwave weapons that you cannot see using frequency to cook your brain and also nano in your water and all sorts of things. They use Pegasus and stingray and various other things to get into every device that you ever own and it’s worse than having an ex stalking you or having your house burgled because this is an every day event where your neighbours are gagging at the door to come in your house and vandalise your things and vandalise your vehicles and interfere with all your emails and your telephone number so that you can’t keep a job and you can’t earn a living. The smear campaign that goes around is totally destructive and basically isolate you and they make out that you have schizophrenia Because they have decided that they don’t like you and that you are a threat or whatever it is someone in the Satanic group or the masons has decided that they don’t like you and have put you on this list. Once someone become a victim of this, you should know that you are watched filmed listen to and your life is completely transparent. You have no privacy. All of your human rights have been completely broken. This is a trafficking of people and what they like to do is they put their footage of all the filming that they have to view on the dark web for entertainment and they make a lot of money out of farming your energy And destroying your life and putting bets on whether you kill yourself. The people who do this are the sort of people who will cut people up and cook them in a pot. These are the sort of people that will strap someone to a bed in the town and have 100 men rape a woman And no one will help because just like one bad Apple going off in a bowl of apples once this type of crime gets going in a town, it becomes a sensational phenomenon and completely takes over and becomes a town like Sodom and Gomorrah. When you have the criminals running everything And overseeing hiding crimes. They are actively hiring people - crooks dregs of society and criminals are actually being hired to break into your house and pick locks and break into your house through the windows and through the loft and mess with your electrics and breaking in every day and follow you around and hit you with laser weapons while you’re driving and also while you’re sleeping in your bed, then we need to do something to stop This from continuing. For now I am raising awareness of this and if you are a victim of it I’m calling you to contact me and move to Torquay in Devon in the UK and join me so that we are stronger in numbers since we have been isolated by the town where we live and we are in a position where we Cannot get any help. For example, if you have a problem with your vehicle, they will get to anybody that is going to fix your vehicle so that they mess with your vehicle and it cost a lot of money if you have a job interview they’ll make it so you don’t get the job if you do correspondence and you have a business they’ll mess with the correspondence so that it has lots of errors and if you have a bank account, they’ll be snooping around having a look at what you’ve got in the bank all having a good old giggle every time they mess with everything and cost you money because it costs money to defend yourself Against criminals who are breaking into your home every day. Normally you would count on your neighbours to help you and keep an eye on your home but in this instance they recruit your neighbours into this activity through bribes and fear so neighbours are frightened that they will become the next victim And if they’re not frightened they will take a bribe or they are Satanists or witches and warlocks and they’re quite happy to sacrifice little animals and little children in the fire to get Demons to run around so that they can cause harm to innocent people. In my environment where I live I am a single lady and I’m a preacher of the Lord. The people who do this to me are carers during the day and then in the other half of the day they are torturing me actively climbing on my roof living in the shed next door messing with my water messing with my electrics gas and it’s consistent with all of the targeted individuals the same stories the same tactics each time over and over it’s all over the world. And you are made out to be completely crazy if you call the police, they will not help you And not only this. They will make out that you are crazy and try and put you in a mental hospital so then you have to deal with it all by yourself and if you talk about it, you are made to look crazy. I am here for the other victims as a support group And I am calling all of the victims to contact me for prayer so that I can pray with you and pray for you and give you all the tools of the Bible to fight this demonic stronghold that has established itself and taken over all ruling entities of this world. Jesus Christ was also a targeted individual and he told us that we would also be hated and we would be hunted and we will be tortured, but we do have the weapons to defend ourselves through the Bible and knowing our authority over demonic entities and structures whether they are physical or spiritual. It is my job to train you in the spiritual warfare and to give you all the tools you need and the support and the love in the mentoring that you need and you will only receive through Jesus Christ our Lord and Saviour. Our father who are in heaven Hello be the name thy kingdom come thine will be done on earth as it is in heaven give us this day our daily bread and forgive us our trespasses as we forgive those who trespass against us lead us not to temptation but deliver us from the evil one thine is the glory for ever & ever amen. We bring the kingdom of God to this earth and with it we bring the truth and we stand up for the truth and we stand up for righteousness and we stand up for the word of God and for his Bible. We are a family and we need to unite to gain strength from one another and take back what has been taken from us and fight for our freedom. Fear is from the enemy and we will not fear we will defeat any stronghold that comes up against us. Come and join me in Torquay and Devon and I promise you your life will change And together we can do this. Please contact me and I can give you some very useful information on how to combat back the attacks and reverse the weapons back at the sender as well as create devices that will convert the weapon to not hurt you but actually benefit you. I’ll leave you with some final information which I recommend you do. I recommend that you put Bible scripture on all of your windows facing outwards and put garlic outside every window and every door & all your mirrors in the blood of Jesus and to anoint all your windows in the blood of Jesus Christ. You need to do the same with your vehicles and you need to pray every day. You need to annoint your bed every night before you sleep in it and you need to make holy water and anoint it as holy in the blood of Jesus you are anointing the water as living as you touch it and then put the living water all over your house to cleanse it and make it holy because the Lord is holy. Search out your house and make sure that you haven’t got anything pagan. Make sure you get rid of any tarot reading things and any pyramids things from Egypt and any African art, peacock feathers funny little eye things and anything regarding other gods tarrot reading cards, anything with Apollo or any of the Greek gods must be removed. Look for the prayers that I have done you can find them on Podbean Spotify Amazon Samsung chrome and you can also find them on TikTok and X and Apple. Do the prayers that I have said to do. Play them on a loudspeaker and then write out your own version of the prayer and do it yourself this gives it more power because it’s personal to you and don’t forget to cast the Demons out of your house and open the door and demand that they go out and you may have to do this every day until you feel like you’re getting somewhere. You need to ask the Lord to come and live in your house with you to help you and you surrender everything over to the Lord Jesus. It may mean that you sell everything and you travel light - this is probably why Jesus Christ did as he did not have a house. if you have had problems getting help from the churches and you have wondered why this is, it is because they have not accepted what is happening in the world and have turned a blind eye. They have also been joined into this smear campaign against you and have been told not to help you. This is the case with anybody that you encounter because there is somebody else also getting all your phone calls and text messages and they’re also getting a recording of all your calls going out and everything going through your router is also put through a gateway duplicate 192168.one.one and also a DNS server and everything is operated through Bluetooth Wi-Fi the lights which is a system which is to enslave you which is why it’s so important that you contact me and start making plans so that we can escape slavery together happily as a family. I will defend you with my life and I will love you with everything I have. I promise you the Lord is with me and I trust in the Lord. It is my wish that we will together leave and go and live together peacefully in a new land that the Lord has promised me and you as well. It is not my land it is the Lord‘s land and it is for us. Also, the only way they can control you is by putting nano in the water so you need to cover all your taps with a sock and some hairbands. Every drain pipe needs to be covered and that includes all sinks as well and toilet inlet and outlet and washing machine needs to be filtered. Water is a major component in this operation. You need to put fly nets up against all your windows and if you’re going out, you probably need to wear a hat or a scarf so that they can’t throw a little bit of dust on your head And if you do go out, I strongly recommend that you brush yourself off with a strong brush before you go in your home to brush off all the nano that they like to throw it at you while you’re out. Also, your vehicle should be checked over and prayed over and you should put scripture inside your windows facing outwards in your vehicle as well and you should buy some clothes with scripture on so that you have protection and always carry a Bible. Get some scripture and start putting it around your house. I make up pictures with scripture for people, so if you need this, you can contact me. I’ve also got many Bibles so I can send out Bibles and I’ve also got teaching materials on the Bible. The Lord is with us because his name is IAM The most important thing that you need to know is that you were born for such a time as this and that the Lord loves you very much. And I love you very much as well. It helps to wear sunglasses Because it is the light that does this to your eyes and it has a reaction inside your body so you become very sensitive to light. If you do have little things biting you and you have blisters and you have problems with your feet your hands or behind your ears with any bites then you can use essential oils like lavender eucalyptus And you can also spray your hair with some modified water with essential oils and you can also wash your hair with the same. You can make your own toothpaste with a bit of coconut oil and some essential oils. With shampoo and conditioner it’s better to use coconut products or lavender products and a bar of soap is very good. Having extra zinc every day and vitamin C and also bicarbonate soda is also very good every day. Get some Demetrious earth and start having this every day. Make sure you clean your oven because this is another way they like to get in they do something and it makes chemicals inside the oven and it gives you sore eyes. So the best way to wash it is wash it down with some white spirit white spirit is excellent at removing nano from walls and so is steering fluid excellent at removing nano. It’s also very good for cleaning so you can make your own little bit of cleaning products with bleach baking soda essential oils much more natural products which are better anyway. Get yourself a nice scrubbing brush and start scrubbing your body when you’re in the bathroom & scrub between your legs scrub under your armpits have a good scrub behind your ears and in your ears all over your face all down your back And just generally have a good old scrub. Make sure your hairbrush is cleaned before and after use and burn the hair that comes off the hairbrush. Check all the plugs / sinks for hairs and remove them and burn those as well. Some orange peel inside your products will work wonders to repel nano. As it hates anything to do with orange. Also, it’s worthwhile having some garlic every day chop it up and just have a teaspoon of it every day. It may be worth making smoothies every day as well. If you have the orange peel and the banana peel and the passionfruit peel as well as the fruit liquidise &  it does wonders for your metabolism and your body and a strongly recommend you try that about once a week it will give you a boost of energy and you will feel much better. Stinging nettles are wonderful when you cook them with some tomatoes and some strong Italian seasoning very salty with rice or Millie pup or cornmeal is absolutely very yummy and cost nothing. I hope some of my tips have helped you. Also a bit of yeast is also good. It doesn’t seem to like wheat products and rice so you can also make up rice water to drink and use as a body lotion and also for your hair with rosemary and orange peel and it will also in house your skin And complexion. Because they are sucking the life out of you every day it’s worth getting some magnesium and some biotin. Because they fry your hair every day with the weapons and it singes your hair. If you have problems with fleas for your cats and dogs, then you can use Demetrius earth and a spray with water. And you can top up on flea treatments and a bit of eucalyptus oil on the back of the neck is excellent also. You can also start thinking of yourself like an animal that is repelling insects and parasites so you also need to go on a Routine of protecting yourself from parasitic things like spiders flies fleas, mites bedbugs and anything else that seems to be used, including mosquitoes. I’ve been bitten & stung by bees and spiders and I found it very hard to get rid of these bites and I’ve had to have antibiotics. Antibiotics seem to get rid of this stuff as well. But you will have problems getting antibiotics from doctors because they don’t like to give you antibiotics for anything. So you can buy things for your pets and you can buy things for you as well privately to get rid of worms. I also recommend fasting & doing intermittent fasting and also a 21 or 25 day water Fast With just extra vitamin C and a colon cleanse at the same time. Garlic enemas are also very useful to do. There’s so many things that will help you and really these are things that we should be doing anyway, even without the problems we’ve got at the moment. Don’t forget to hug your local tree because your tree is your friend and is connected with the Earth and will energise you because your energy is being depleted every day by energy vampires who like to cause destruction and distress and are paid for this very purpose so that you don’t get a single second peace in your life. Needless to say, you need several Bibles okay. God bless you it’s Aisha from God FM. Here’s your book.


—————————————————-

COULD YOU BE VICTEM OF STALKING?

Are you a victim of being hacked? Do you feel like you are being followed? Do you have a racing heart? When you sleep? Do your ears ring? Do you get itchy feet? And do you get really bad headaches? Do you get an aching back and shoulders? do you get an aching bum which feels like it’s being cooked from the inside out? Do you gently feel really tired where you would normally manage on eight hours sleep now? You need 12 to 18 hours sleep to get any rest. When you wake up in the morning, does it feel like you’ve been carrying a bus around all night? If this is a yes to any of this then it is possible that you are also being stalked and hacked.

Are you having problems connecting to the Internet? Does your phone keep disconnecting from apps to your app? Slow right down and you find that they just won’t connect. Do you find that people can’t get hold of you on your telephone number and when you dial out to your phone calls drop do you ever get squealing on your phone calls? Do you have problems with iMessage signing in and out of it and sending messages via it. Does your password not work? Do people say they can’t get hold of you. Do you have it where you have messages sent to you which you don’t receive for four or five days?

Do you feel that people are repeating conversations people that you don’t know? Seem to know a lot about you? Do you find that your friends behave strangely around you and pick up their phone and start looking around like that? Up to something strange. Do you get really bad headaches from your bathroom? Does your boiler give you very bad headaches. Do you have problems with your fridge and your TV and your washing machine. Do you get headaches? Do you find that you can’t control your TV and that your TV controller won’t raise the volume or change channels for you?

And your washing machine. Do you get headaches? Do you find that you can’t control your TV and that your TV controller won’t raise the volume or change channels for you?

Has your phone battery get flat really quickly? Does your phone get very hot? 

Did you have a hard childhood? Do you feel like you can’t trust anyone? Do you feel like you are rejected by the churches? Do you feel like you never fitted in in the world and you might be like me?

Did you have a hard childhood? Do you feel like you can’t trust anyone? Do you feel like you are rejected by the churches? Do you feel like you never fitted in in the world and you might be like me?

Have you noticed when you go to bed that it seems like there’s very bright lights up against your house at night? Do you know about lights and radiation and LED and how it all works? Because with the right equipment somebody can point a light at your house and activate all sorts of things inside it with the technology that we now have. 

If you want to talk more and you feel like this might be happening to then we offer support at God FM. Please contact me on WhatsApp +4407773577788 or contact me admin@God FM.org.uk. 


——————

GANG STALKING IS REAL - HERE IS A COPY OF THE GANG STALKING HAND BOOK

GS MANUAL - GANG STALKING MANUAL

 

This is their leaked how-to do terrorisim manual

Operations in general are of the “active surveillance” type. Passive surveillance is watching a target covertly, to obtain information about the target. Active p surveillance can include information gathering, but it (also) includes the agent making the target aware they are under surveillance. Beyond active surveillance, agents perform acts to keep the target uncomfortable, around the clock. Although operations are silently approved of, and covered for by the official justice system, (they are not) seen as criminal in nature by citizens who do not have a strong sense of right and wrong.

Agents must take great care that each and every act of punishment is DENIABLE. This means that should the target complain to police, (or) any other officials, or friends, neighbors, family members, or doctors, the nature of the punishment must be seen as the target’s “overactive imagination” or better yet, an indication the target is mentally ill.

(The system) has worked for years to recruit the medical establishment to help maintain deniability, and today, most targets (are) immediately labeled as mentally ill and often forced onto anti-psychotic medication when they complain. But their agents must still do their part skillfully (to) perform acts of punishment, so (that) almost anyone the target complains to will deny a crime against the target has taken place. As an agent, you will be trained in how to do this.

(The system) has been blessed with advanced technology which enables heavy punishment at times the target is in their home, silently, through walls, and this is very deniable. Agents must pass their initial training and demonstrate a high level of commitment to maintain community safety, and the ability to operate deniably, before they will be considered for advanced electronic punishment training. Electronic punishment training is beyond the scope of this manual.

The organization is very fortunate in that we have been able to recruit top specialists to back up field operations people. Psychologists are the key to finding ways to maximize feelings of stress and hopelessness in the target, and degrading the target’s health, from many individual “minor” invasive punishment acts. Technician’s in all fields- telecommunications, electric power, building electrical and alarm systems, and utility employees in all fields use their positions to inflict many absolutely “normal-looking” problems on targets on an ongoing basis. And of course, the services of many skilled locksmiths are invaluable in this. As a community-based agent (CBA) you will have the privilege of working with a team capable of delivering better “justice” than the official system.

2. SURVEILLANCE

Surveillance is the foundation of all operations. Both community-based agent (CBA) visual surveillance and advanced electronic surveillance are used. This chapter will cover only local agent visual surveillance. Your local lead agent will schedule surveillance watches for each target in that community. Every target will have at least one CBA watching them (at) all times, even while at home and asleep. Each CBA surveillance team will be given a cell phone number for reporting target actions and movement to the local Control Center (CC).

Actions to be reported include, but are not limited to:

Target turns lights on to start the day.

Target uses toilet or shower

Target exits residence

Target drives away

Target arrives at work, or

Target shops or visits any other establishment or location.

Target arrives home

Target eats meal, at home or in restaurant

Target engages in sexual activity

Target turns lights off at the end of the day

Target turns light on in the middle of the night

Target travels out of town

Some of these observations will be performed by the Electronic Corps (EC), but CBA’s should attempt to make and report as many detailed observations of target activity as possible. The reason such detail is necessary is that the punishment phase of active surveillance requires that supervisors customize each punishment action to match the personality of (the) target, and the need to make each punishment action appear to be “life’s normal breaks.”

One important punishment function of surveillance is to sensitize the target. Targets are never told they are under surveillance or being punished. Instead, close, active surveillance and other activities, happening far to frequently to be written off as “life’s normal breaks,” will eventually cause the target to realize they are under surveillance and punishment.

As a community-based agent (CBA), you will be given specific instruction(s) on exactly when, where, and how to carry out punishment actions. As long as you carry out punishment instructions exactly as given, there is no way the target will be believed if they complain, and you will not be exposed to risk of action by law enforcement.

How well the punishment actions work depends on how accurate and complete your reports are in many situations(. The) Control Center (CC) acquires access to properties or apartments immediately next to the target’s homes or apartments. Because EC (Electronic Corps) has through-the-wall surveillance and punishment equipment, they will be reporting target activity along with community-based agents. In a typical setup, CBA’s may be posted in a parked car where the target’s home or apartment can be observed overnight, for example.

In this setup, the CBA in the car may be instructed to call, using walkie-talkie-style cell phones, another CBA (or team) waiting or patrolling by car nearby to follow the target, or, you may be assigned to follow the target yourself. You will receive instructions from your local center as to following the target.

Targets in transit may be either covertly or visibly followed. When in doubt, hang back a bit, and contact the center for instructions, as targets in transit can present many unanticipated situations. The Center will always have the target’s position monitored, so if a target gives the CBA the slip, it will assign other appropriate community based agents to pick up the target at the earliest opportunity. Be sure to notify (the Control Center) immediately if you lose the target.

When applying the visible following of a target, making the target uncomfortable because of your presence, you will be given instructions as to when to break off the following. Another CBA or CBA team may pick up the visible following, but once you have broken away, they advise that you are clear and ready for the next assignment.

3. INTERCEPTS

Intercepts are where community-based agents (CBA) will appear to “just coincidentally” cross paths, on foot, with the target. Once the target has been sensitized to the point of realizing they are under surveillance and punishment, they will recognize, and be made appropriately uncomfortable by, the simple act of multiple CBA’s “just happening to” cross paths with them.

Your local control center will instruct you as to how you will be cued to perform an intercept. Often you will have an on-site supervisor (OSS) position you, and give you hand signals as to when to start your movement to intercept the target. Because targets moving about aren’t always totally predictaElectronic Corps who have means of monitoring the exact whereabouts of every target, and through computer programs, predict exactly when and where a target will be as they move about the community. Your local OSS has a special means of receiving instant, silent instructions for the Center.

1. Intercepting CBAs may be asked to perform one of the following forms of intercept:

2. Simple path crossing, requiring the target to take evasive action to avoid collision, multiple CBAs sometimes perform this several times during a single outing by a target.

On foot, walking for an extended period on the opposite side of the street from walking target.

3. Arriving at a place known to be a favorite of the target, and simply occupying that place just as the target is about to arrive (restaurants, parks, public facility seating, even bus seats are examples); sometimes just “hanging out” in such a location at times and places where people don’t ordinarily do that.

4. Smoking, coin-jingling, whistling, or toe-tapping near the target at a location where the target is known to need to stand, as to wait for the bus, or standing right behind a target at a water fountain.

5. A group, as many as a dozen CBAs, may be assigned to arrive at a store just ahead of a target, and form a queue ahead of the target, spending time buying lottery tickets, to delay the target. (The target) is very tired and eager to get home after work, for example, or in a hurry.

6. Community-based agents may be assigned to leave a next door home or apartment exactly the same time as the target, repeatedly. Alternatively, a CBA may intercept the target a short way before home and arrive at exactly the same time as the target.

While these may seem like trivial acts, keep in mind that the target will have these “trivial” things happen every single day, and repeated intercepts like these will force the target to always watch for such acts, essentially ensuring the target never “has a nice day.” This is the goal, to ensure the target’s punishment. Similar intercept operations are performed with vehicles. The Center can schedule these every day the target commutes, and both to and from work. Vehicle intercepts are particularly effective when the target sees the same vehicle in an intercept convoy both in the morning and in the evening commute. (Because vehicle intercepts can be dangerous, CBA assigned to vehicle intercept duty must successfully complete a special training course prior to actual assignment.) Here are some examples of vehicle intercepts a community-based agent (CBA) can expect to be assigned.

-Parking so as to prevent a target’s leaving a parking area, and then disappearing.

-Parking commercial vehicles often, near target’s home with something unusual about these vehicles, such as there is no need for that trade, or just unmarked white vans to make the target think the van is there to conduct surveillance.

-Simple following, or leading, a short distance, but every day. Doing this, both during target commutes and then other times makes the target very uncomfortable.

-Passing as side street stop sign, then stopping an uncomfortable distance into oncoming traffic just as target is about to arrive at the side street, causing the target to have to slam on the brakes (this requires Control Center assistance and prompting by walkie-talkie style cell phone.

-For a CBA vehicle convoy, boxing in the target during a commute, forcing the target to travel at a lower speed than the target wants to travel. In some locations, the Center will supply special license plates to CBA vehicles with short words which have special meaning to the target.

-For a CBA convoy, and where the target is at a location (and time) where traffic is normally very sparse, cause heavy traffic, forcing the target to notice.

The ultimate vehicle intercept is the staged accident. This can be dangerous and is only assigned to very senior agents. However, it is possible to stage an accident so only the target knows it was staged. This is an excellent means of punishment where a target has committed a serious offense specifically against secret services by revealing their criminality to the public. Generally, staged accidents are done in jurisdictions where police strongly support the operations, so that the CBA driver is protected.

4. PHYSICAL SABOTAGE

Physical sabotage is an especially effective form of punishment when it is carefully limited to low value items, below the value where police will take the report seriously. For example, burning a target’s house down, or even stealing an expensive appliance, would bring official investigators into the picture, so that is not done.

Sabotage producing extreme safety hazards is generally not suitable for operations, because of the potential for bringing official investigators to an accident scene. So while damaging the brake system of a target’s vehicle is not allowed for community-based agents (CBAs), draining some of the oil, transmission fluid or radiator antifreeze is allowed, but not all of it. The goal is to make it looks as if the target is negligent in maintaining fluid levels, and generally not causing a catastrophic failure that non-targets might see as sabotage.

It is very important to apply punishment by way of a large number of small value sabotage acts, because that makes it look like the target is forgetful, exaggerating, or in some cases even delusional, if they complain about many cases of small value damage. The target’s associates will simply refuse to believe that anyone but the target is responsible.

Sabotage is very important in that it lets the target know they are totally helpless to stop it, and can’t even complain about it effectively without appearing mentally ill. (The) organization (is) very fortunate in that some people, hearing about sabotage from a target did the sabotage themselves, “to get attention.”

Sabotage is applied at the target’s home, workplace, and on their vehicle. This requires the assistance of locksmiths and alarm technicians. Your local Control Center will supply this help, and will bring specialists in from a distance in the case of rural areas.

Here are some examples of sabotage a community-based agent (CBA) may be assigned to carry out:

-Entering a vehicle, or home, and changing control and radio settings.

-Replacing window washer fluid with water, possibly destroying the system in winter.

-Scratching the paint on the target’s vehicle, scratching furniture and valuables.

-Tire sabotage, from removing some air right up to slashing a sidewall if authorized by the Center.

-Simulating a break in electric window heater strips.

-Cutting off the 4-way flasher button.

-Removing substantial amounts of oil, transmission fluid or antifreeze but not enough to cause catastrophic failure.

-Moving things around inside the vehicle to show the target someone got in.

-Unlocking the vehicle and leaving it unlocked, possibly even with door open.

-Small cuts to car’s upholstery.

-Unlocking the target’s front or back door and leaving it ajar while the target is away, even at midnight at New Year for Y2 hour.

-Moving furniture or carpets around fairly frequently to show the target someone was there.

-Stealing low-value items, especially items like scissors which can be easily misplaced, keeping them until the target replaces the item, then return the missing item, often in a place the target checked.

-Stealing important papers, especially those which will cost money to replace.

-Stealing irreplaceable photographs.

-While target is at work, remove mail from their box and toss it around. Repeatedly making wall pictures crooked.

-Setting clocks to the wrong time.

-Repeatedly dumping consumable supplies (e.g. coffee) to make the target think they are no longer capable of managing their supplies well.

-Starting small rips in new clothing, which are widened on repeated visits.

-Ripping crotches out of the target’s underwear, or stealing finest underwear, swim suits, etc.

-Replacing clothing with similar items which are too small for the target, like for children what target does not have.

-Ironing inside button flags over, making buttoning the shirt or top difficult.

-Carefully working the tip of a knife through seams in any air mattress or cushion the target may own, including replacements, on a daily basis.

-Breaking zippers in clothes and bags, perhaps by pulling out a tooth or two.

-Shoving a knife through the soles of waterproof boots.

-At work, removing screws from the target’s office chair, or at home dinner table leaving only one screw of four, left to tilt the table with china.

-At work, damaging or destroying (if not extremely obvious) a target’s work from a previous day, (for example), the computer is broken again possibly worse.

-At work, replacing current copies of computer files with an older copy- particularly serious if target is a computer programmer.

-At work, where some employees are or can be recruited to be community-based agents, set up “mistaken deliveries” of heavy goods which block the target’s office.

-At work, if the target is responsible for parts of the operation which can be sabotaged, do so repeatedly just as the target starts eating lunch, or is about to leave for home.

-At work where the target is responsible for materials (that) can’t be locked up, sabotage or with special permission from the Control Center steal the material.

Thefts have to be carefully considered and authorized by your local Center, unless you have authorization, do not steal. One particularly effective type of theft is to remove small value, but often used items from the target’s premises. Once the target has been observed purchasing a replacement, the item is returned. This not only causes the target to spend money uselessly, (it also) imposes a feeing of total helplessness on the target.

5. SABOTAGING THE TARGET’S REPUTATION

Sabotaging the target’s reputation- and all that goes with it, such as ability to earn a living, business and personal relationships- is a very special operations category. Newer community-based agents will not be assigned to “engineer” the method, but will assist in passing “rumours,” which are the main means of destroying a target’s public image.

“Rumours” consist mainly of lies. However, in order to secure cooperation of specific members of the community to participate in the punishment phase, additional information keyed to appeal to the patriotic or community service sense of such community members may be used as well. As mentioned earlier, the organization has many top psychologists and psychiatrists on permanent staff at headquarters, and some in larger population centers. It is their responsibility to design the campaign to destroy the target’s reputation.

These people listed below can be approached and given information which will cause them to make the target’s association with them uncomfortable, or break off all contact with the target.

-Business contacts.

-Supervisors.

-Co-workers.

-Casual social contacts, such as clubs a target may be a member of, or a group that frequents a bar where the target is a patron.

-Friends.

-Local fraternal organizations- they are motivated by the public service, and are an excellent source of assistance in keeping the target under surveillance, and participating in the punishment phase as well.

-Store staffs at places the target shops.

-Target’s landlord.

-Target’s neighbors.

-Tradesmen who are likely to service the target’s home, car, or business.

-Bus drivers on the target’s route.

-Local children.

-City employees, including emergency medical technicians, ambulances.

-Homeless shelter staff and residents where applicable.

-Family members (surprisingly, many are ready to believe negative information.)

-Especially, personnel at places the target applies for work.

How intensely (these sabotage operations are carried out) is governed mainly by the need to prevent the target from (learning) that the negative rumors are being spread. The goal is to keep negative information covertly flowing into the community, in such a way that those receiving the information aren’t likely to tell the target. One might think that friends and family members would instantly notify the target and side with the target. Fortunately, experience shows that co-opting friends and family is surprisingly easy, once they are informed about the target’s criminal record. The Headquarters staff have developed techniques which by and large prevent that, but those techniques are beyond the scope of this manual. Suffice it to say that it is possible to apply “incentives” which cause even people closest to the target to cooperate. These incentives are applied by specialists from our organization at higher than the local level. For the community-level CBA, the work of sabotaging the reputation of the target takes the form of simply carrying out instructions from your Control Center as to what you say to whom, how, and when.

6. DISCREDITING TARGETS

While the powerful silent support of operations by the justice and psychiatric systems has been sufficient to prevent the target from informing the public, the area of discrediting targets is an ongoing activity. Like sabotaging the target’s reputation, discrediting their public statements, web sites, media appearances, letters to the editor and the like are done under the supervision of psychologists and psychiatrists on their staff. If a community-based agent (CBA) has a good track record of intelligently carrying out assignments, and has access to a computer, the CBA may apply to the local Control Center for assignment to discredit work. Excellent communications skills are required. Some of the activities CBAs carry out under supervision are:

-Monitoring message boards, Wogs, and open media like Indy media for target posts.

This is normally done in special shifts and under scheduling and control at a higher level than your local CC. This monitoring is assisted by blog scanning software which will detect and instantly flag posts relating to activities. The CBA doing this work will immediately reply with comments like “Someone isn’t taking their medication” or “target name” has provided absolutely no evidence.” The CBA will then report the post to higher level supervisors for possibly more detailed responses.

-Monitoring newspapers in your area for letters to the editor regarding activities. Most editors and many reporters have been recruited and are willing to assist in keeping the important work of monitoring and neutralizing quiet, but once in a while, a letter to the editor will slip through. In this case, comments like “Someone isn’t taking their medication” are not an appropriate response. Transcribe and forward such a letter to the editor to the supervisor, along with your proposed response. The supervisor may edit your response, and will assist in ensuring your response is printed.

-Your supervisor will have staff monitoring upcoming talk show appearances by targets. While most talk show hosts, even those somewhat sympathetic to targets, have received discrediting information and often will not host targets, some targets do manage to get on the air. In this case, your supervisor will assign you to call in to the show, and instruct you as to appropriate things to say, such as rebutting the target’s claims, pretending to be a target calling and making “wacko” statements such as “UFOs are harassing me,” or pulling the discussion away from real activities and to something like “media mind control.”

-Agents who have excellent persuasive communication skills can be assigned, with careful coaching and preparation from supervisors, to pretend to be a target and get on talk shows known to air targets as the guest. These opportunities are great ways to discredit targets by talking about UFOs, things like black helicopters following you, foil beanies, satellites “parked” just above your home, and perhaps events normally considered “paranormal” like seeing (things that) appear and disappear. These discrediting topics must be a total surprise to the host, only mentioned after the show is in progress.

-CBA can “casually” describe the “odd behavior” exhibited by the target as a result of around the clock activities to the target’s neighbors. The idea is to focus the neighbors’ attention to the target’s behavior, hinting that maybe the target is mentally ill. This is easy once the target has developed suspicion that “everyone is out to get” him or her.

It is a special “honor” for CBAs to be chosen for target discreditation work.

7. TRADE-RELATED PUNISHMENT

This section will give some examples of ways community-based agents (CBAs) with specific trades or situations in the community can apply deniable punishment to targets.

-Underground utility crews, where the management has been recruited, schedule messy, noisy maintenance at the target’s home (or business if the target runs a business). This can include having the street torn up for extended periods, or repeatedly. FundIng for unneeded work is available from headquarters. Taxi drivers can delay arriving when called by the target, especially when going to the airport.

-Bus drivers have leeway, in nasty weather for example, to stop one stop away from awaiting target and wait there for perhaps 5 minutes, ostensibly to “get back on schedule.” This can also cause a target to miss connections with the next bus or train. This is especially effective when the target, exposed to bad weather, can see the bus waiting up the street for no apparent reason, or not stopping at all at your bus stop.

-Repair trades people can keep “getting it wrong” necessitating many recalls, be late, be messy, over-bill the target, and even damage things which were OK. This is especially effective in the automobile repair trade.

-Medical lab technicians can substitute blood samples, or otherwise falsify results making the target appear to have absolutely no reason for their complaints.

-Police can frequently pull the target over for frivolous reasons.

-Telephone and cable TV technicians can re-route legitimate calls to the target’s number in large numbers, and this will cause the target to get very angry with these totally innocent callers.

-Store staff where the target shops frequently can be instructed to remove items the target is known to need when a target is known to be coming. Store management can stop ordering a target’s favorite items.

-Restaurants and food delivery services can tell the target they are out of an item known to be a favorite of a target.

The key to successful punishment by trades people is that while the target is very likely to know they are being punished, these punishment acts must appear to the general public as “life’s normal breaks.”

8. TARGET’S HOME

Punishing the target at the target’s (home) is essential for effectiveness of secret service operations. If the target were punished in the community but was allowed sanctuary in their home, the creation of a “prison without walls” would not be complete. One of the very first things the Control Center (CC) will arrange is for homes or apartments adjacent to the target’s home to be occupied by both community-based agents (CBAs) and members in the Electronic Operations manual. Because operations are carried out 24/7 in shifts, homes and apartments which are leased or owned by staff are not used as dwellings. The lease or deed will bear either an entirely false name, or the name of a senior staff member whose actual home will be at a different location.

Some adjacent homes or apartments are occupied by neighbors of the target who have offered to cooperate in punishment of the target. The initial contact of neighbors to determine their willingness to cooperate is done by senior staff, and incentives to cooperate are often tendered. Here are some commonly used punishment activities which are carried out both by CBAs and cooperating neighbors of the target. Activities are rotated among the choices, but at least one of them is applied daily:

-Noise. Noise must be of a type which the general public deems “normal.” Remember that the goal is to have the target aware they are being punished, but not be able to convince anyone else that that is the case. Observe local noise curfews, but plenty of punishment can occur outside noise curfew times. The target must not have easy cause to involve law enforcement. Examples:

-Start leaf blower, times precisely when the target attempts to enjoy their yard, or when EC operators cue the CBA that the target is trying to nap.

-Loud music from neighboring home. This is an excellent action, as it is common. Time it so every time the target opens a window the music starts. The timing makes the point it is intentional punishment. EC operator can apply music in adjacent apartments with exceptionally powerful bass, directed at the target’s unit.

-Frequent squealing of tires near target’s home.

-In apartments, frequent drilling into a scrap of wood or masonry held against the target’s wall, floors or ceiling as if “working.” Alternatively, hammering. Especially effective when cued by EC operators that the target is attempting to nap.

-Tossing golf or tennis balls against the target’s home when the target is known to be trying to fall asleep. Ideal for cooperating neighbor children.

-Frequent use of sirens near the target’s home. Many emergency services employees have a strong sense of community service and willingness to cooperate in this, or by people posing as Jehovah’s Witnesses.

-Knocking on the door for frivolous/nonsensical/wrong address reasons. Especially effective when the target is in bed or having a meal.

-Trash. Leave trash in the target’s yard. Frequently, but CC staff will assist in scheduling this so that the target can’t quite have a case on which law enforcement will act.

-Terrifying the target’s pet. This requires entry while the target is away from home for an extended period and must be scheduled by CC. Electronic Corps (EC) operators can render a dog or cat passive for safe entry of the community-based agents, by electromagnetic beam.

-Wounding or killing the target’s pet. Rarely used, scheduled when the target has acted in a way so as to deserve special punishment, like divulging the name of a criminally acting secret agent.

-Killing domestic animals or wildlife and leaving them on the target’s doorstep. Scheduled when the target has acted in a way so as to deserve special punishment.

-Where the target owns substantial land, noxious activities can be arranged and built for next to the property. In one case, a dump, an auto race track, and a prison were built adjacent to a target who owned a large farm in an area of natural beauty. While this is rare, it does illustrate commitment to delivering punishment to those “deserving” of it.

-Cooperating police departments can visibly watch the target’s home. Possibly being parked in front of the home when the target returns, repeatedly.

Police officers who refuse to take complaint of harassment and sabotage of the target, who they label “disturbed” – really are NOT allowed to make diagnoses, as only medical doctors can do, but may get a raise- price- for their unlawfulness afterward. Police follow orders by e.g. Stay Behind, Secret Military-led organization, created by the CIA after WWII in NATO countries. They give orders in secrecy to police, media, legal system, and judges, etc. Thus, being above parliaments and governments as demonstrated, for example, in Norway when in 1957 the Chief of “Stay Behind” Sven Ollestad gave the security code of Norway to MI6 (British Intelligence) in the UK acting on his own! “We have to trust our allies,” he had said. Today, the security code of Norway is kept in Wales. Originally, Stay Behind was created with good intentions to fight communism. Today it is out of control, and a new, much bigger Stay Behind 2 is active in Norway. The Stay Behind logo resembles the NATO logo.

In Italy, Stay Behind was called Gladio 2 and dealt with terrorism secretly in Western Europe. It was responsible, for example, for the kidnapping and killing of Prime Minister Aldo Moro in 1978, while the blame was pinned on the Red Brigade. Today, enemies are communists and NATO (is the) opposition.

On November 22, 1990, the European Union forbade Operation Gladio, but although Norway follows most EU decisions, this one is omitted. Italy and Belgium had terror actions by Stay Behind, and when the organizations (ceased to exist, the terror operations also ceased to exist). In Norway, Stay Behind is called E14. What was its role in Norway’s terror actions, if any? Some have tried to get control of Norwegian Stay Behind (armies) already years ago. Who are the back men giving orders to those “officially” in charge?

The late Chief Medical Officer of northern Finland, and Targeted Individual, Dr. Rauni-Leena Lukanen Kilde

————————————


Munzert Criminal Misuse of Microwave Weapons 



THE MISUSE OF MICROWAVE WEAPONS BY CRIMINALS AND

TERRORISTS

Dr. Reinhard Munzert, Germany, Erlangen

High Power Microwave (HPM) systems are among the most mature non-lethal weapons. They can be used effectively against electronic devices (anti-electronics) and/or persons (anti-personnel weapon).

Microwave weapons (Directed energy weapons/Radio frequency weapons) damage or destroy computers, disable the electronics of cars, ignite airbags, and take down airplanes. They have strong effects and can be used for military and police as well as terrorist and criminal activities.

Microwave devices are easily to obtain and can be built by terrorists or criminals with basic knowledge in electronics. To quote Jim Lewis, director of technology at the Center for Strategic and International Studies in Washington DC.: "It is unfortunately true that people anywhere around the globe get access to technology almost as advanced as the Department of Defense [has it]."

Not only the good guys can apply non-lethal weapons: "...there is mounting evidence that home-brew HPM weapons are being used to attack people...The latest research and finding on this horrific trend in Europe is quite frightening" (News from Infowar, Volume I Number 6, August 28, 2002).

Through the illegal usage of innovative high-tech weapons, people are not "shot", rather their living quarters are bathed in (high frequency electromagnetic waves. A hightech-gang in Germany is using and testing HPM-weapons that supply continous or pulsed waves over long periods of time. They have magnetrons, microwave-generators, amplifiers and integrated systems. The (pulsed) waves of two or more transmitters interfere in the target zone and strengthen their effects. There are also parabolic antennas modified to transmitters. Besides this, intelligent (adaptive) antenna systems (numerous small transmitters connected, instead of few large ones; for example hidden in parked cars/vans or buildings around the target/person(s) are used. In addition they apply through wall imaging methods. - The effects of the HPM-beam on the victims include headache, irregular heartbeat, painful testis, burned skin, eye damage and cancer.

It would be an error to think that non-lethal weapons are not available for law-breakers. "Unless we are aware of the possibilities, and acknowledge

them, there is no way we can begin to defend ourselves" (News from Infowar) - It is better to inform and to tackle than to wait anc ignore.

Targeting the Human with Directed Energy

Weapons

Dr. Reinhard Munzert 6. Sept. 2002

New arms threaten and destroy lives in strange ways. Directed energy weapons are among the high-tech arms of the century.

They hurt and kill with electromagnetic power. Microwave weapons can be aimed at computers, electronical devices and persons. They have strong physical and psychological effects and can be used for military and terrorist activities. These weapons are also part of crimes (in Europe) that almost nobody knows except the victims and the offenders. Until now they make the perfect crime possible.

No doubt, these weapons have a terrible future.

Key Points

  • Directed Energy Weapons (DEW)
  • DEW and Crime
  • Perfect Crime?
  • DEW and Terrorism

Topic 1

  • Manipulated Microwave Oven
  • Magnetrons and Generators
  • Intelligent Antenna Systems

Topic 2

  • Anti-Electronics Weapon
  • Anti-Personnel Weapon
  • Psychological Effects

Topic 3

  • DEW and Crime
  • License to Kill
  • Perfect Crime
  • Mental Strength & Fighting Back

Topic 4

• DEW as Terrorist Weapon

Unseen Terror Attac

Prevention and Protectio

Summary

• Prevention and Elimination

• Future Weapon! -Terrible Future?

MICROWAVE WEAPONS

New Technology in Crime

Activities and Sources

There is a new, effective weapon for criminals and terrorists. Lawbreakers often misuse modern technology. Through the illegal usage of innovative high-tech weapons, people are not "shot", rather their living quarters are bathed in (high frequency) electromagnetic waves for a length of time.

Directed Energy Weapons (DEW) are mostly intended for military purposes (U.S. Air Force, Russian and Chinese armies). High-tech company Raytheon states about DEW: "We believe they are a critical element of how ultimately wars will be fought. HPM (High power microwaves) is the most mature right now" (in Fulghum & Wall 2002).

The renowned German newspaper "DIE WELT" acknowledges microwave weapons as arms of the 21st century. In another German newspaper,

Süddeutsche Zeitung, a weapons expert has recommended the police to procure microwave (MW) weapons for police use.

Considering what certain criminals know about MW weapons, they have a significant advantage over the police until now. This puts the victims in extreme danger.

A primitive variation of a MW weapon would look like this: A microwave oven from the kitchen with the protective shielding removed from the door and replaced by a metal funnel. And then the waves can get through walls (Pictures 1, 2, 3).

The effects of the MW beam on the victims include extreme weariness, headache, irregular heartbeat, diarrhea, painful testis, damaged nervous system and internal organs, burned skin and eye damage. Later effects include blindness, heart attack, stroke and cancer. In the last months by some victims, cancerous tumors have been diagnosed.

In addition to that, victims (through intrigue and defamation) are seen as psychotic and dangerous; thus, they are completely helpless. At the same time, the new weapons (for certain contractors) are tested under ordinary circumstances and constantly improved.

HPM crimes are a new kind of crime with some very new characteristics.

The International Union of Radio Science

emphasizes in a resolution of 1999 on Criminal Activities using Electromagnetic Tools: "The fact that criminal activities using electromagnetic tools can be undertaken covertly and anonymously and that physical boundaries such as fences and walls can be penetraded by electromagnetic fields."

Expert Pevler stresses: "The development of high-power microwave

(HPM) weaponry, and its proliferation into subversive organizations, offers the means to commit the 'perfect crime'.

HPM attacks

typically leave no residual evidence and their effects can range from nuisance to catastrophic" (1997).

The HPM-weapons that the high-tech gang uses supply continous or pulsed waves over long periods of time - especially in the night - from cars or vans or buildings around the target/person(s). Thev use magnetrons, microwave-generators, amplifiers, integrated systems. In addition they apply through wall imaging methods.

There are already over 40 known victims in Germany, some of them even have been attacked while in hospital. But the police doesn't understand these new weapons.

Besides this the criminals use tactics of intormation wartare: Know all about the victims, let them know nothing about you, information dominance, disrupt the communication systems of the victims.

The criminal network has at its deposal plentiful first class technical know-how and high quality equipment. That assures high efficiency and precision strikes and enables to operate from cars or vans. The MW generators/transmitters can be camouflaged in an attaché case or hidden in a small suitcase.

Only through cooperative work between electronic specialists and physicists have we been able to shine a revealing light on this special high-tech criminal activity. For experts: The (pulsed) waves of two or more transmitters [MW generators] interfere in the target zone, and through that, strengthen their effects. There are also parabolic antennas modified to transmitters. Besides this, intelligent 


(adaptive) antenna systems (numerous small transmitters connected, instead of few large ones; for example hidden in parked cars) will be used. Sometimes frequency hopping is employed.

These methods work over several hundred feet, if everything is well adjusted.


We could find out where (electronic) components for highly potent

MW weapons or whole systems (pictures 4, 5, 6) can be bought legally.

The criminals follow a double strategy: One way the victims are weakened, injured, tortured and intimidated. On the other side, the victims experience extreme, unbelievable things; almost no one can believe their reports. Most interpret the information from the victims as chimerical thinking. Some experts who work for the German Army or Nato know very well about MW weapons, but secrecy keeps them from talking too much about in public.

In several German cities there are complaints of serious physical injury. One attorney represents the interests of many victims About 40 victims have built a community of interests. We are aware of many cases with amazing similarities that have been reported in the last few months. We have names and addresses of many victims and the cirumstances of the cases. We also have the names and addresses of some perpetrators.

In some cases, the lifestyles of the criminals are well known to us.

Similar to terrorists, many pretend good citizenship or student lifestyles to cover their crimes. Conventional criminal activities, (i.e. burglary) are undertaken by normal gangsters or former members of the Stasi (which was the secret service of former GDR). In this network, they have division of labor and a support structure that includes foreigners as well.

Terrorists could use MW as anti-electronics weapons too. With HP microwaves, they can attack the electronics of computers, cars, airplanes and so on successfully [see the other papers of the Workshop W8]. They can use microwave weapons (radio frequency weapons) to damage electronic systems in an unseen attack with all those bad consequencies.

Additional points to be covered in the workshop: Detection of microwaves and protection against attacks.

All that has nothing to do with MW beam fright, but is criminal high-tech forced on the people. It is frightening that these weapons are being increasingly used by criminals and terrorists.


References/Sources:

Fulghum, D. A. (1999): Microwave Weapons Await a Future War.

Aviation Week, 6/7/1999, p. 30.

Fulghum, D. A. (2002): Directed Energy Weapons To Arm Unmanned Craft. Aviation Week, 2/25/2002.

Fulghum, D. A. & Wall. R. (2002): Farnborough 2002: Raytheon Links Future To Network Prowess. Aviation Week, 7/19/2002.

Hecht, J. (2001): The Heat is on (Microwave beam weapon tested).

NewScientist, 10/27/2001, p. 26.

International Union of Radio Science (1999): Resolution on Criminal Activities using Electromagnetic Tools. General Assembly, Toronto

1999. http://www.intec.rug.ac.be/ursi/Tor99ResolENG.htm.

Laukenmann, J. (2001): "Hände hoch - oder es klebt!" Süddeutsche Zeitung, 9/25/2001.

Lövstrand, K. G. & Bäckström M. (2001): Intense Radio Frequency

(RF) as a Tool for Graded Action. In: Non-Lethal Weapons. Hrsg.:

Fraunhofer Institut Chemische Technologie.

Magdeburger Volksstimme (1999): Missbrauch elektromagnetischer

Wellen durch Terroristen möglich. 10/8/1999.

Munzert, R. (2001/2002): Neue Technologie im Verbrechen - Mikrowellen-Waffen. Informationstexte an das Bayerische Landeskriminalamt, Bundeskriminalamt und andere Sicherheitsorgane.

April 2001-march 2002, not published.

Nitsch, J. (1998): Gefahren erkennen. Wirkung von Hochleistungsmikrowellen. In: Elektromagnetische Vertraglichkeit

(EMV - ESD), Jahrgang 9, Ausgabe 3/98, p. 23- 26.

Nöldechen, A. & Dorra, B. (2001): "Europäer diskutieren über

Mikrowellen und Laserstrahlen als moderne Waffensysteme". Serie:

Waffen des 21. Jahrhunderts, 3. Teil. DIE WELT, 9/25/2001, p. 31.

Pevler, A.E. (1997), Security Implications of High-Power Microwave Technology, www.infowar.com/civil_DE/civil_090597a.html-ssi

Schimmelpfennig, U. (1999): Strahlenkanonen für jedermann

- Kein

Schutz gegen Erpressung und Terror? Tv-Beitrag in Kontraste SFB/ ARD, 11/18/1999.

Schwartau, W. (1996), Information Warfare, Second Edition, Thunder's Mouth Press.

Scott, W. B. (1999): ,Beam' Weapons Edging Into Arsenal. Aviation


Week, 7/ 5/ 1999, р. 53.

United States Air Force (1998): High Power Microwaves. Factsheet.

http://www.de.afrl.af.mil/factsheets/HPMicro.html

United States Air Force (2001): High Power Microwave Division.

Factsheets. http://www.de.afrl.af.mil/factsheets/HPM.html

Wall, R. (2000): Directed-Energy Threat Inches Forward. Aviation Week, 10/30/2000, S. 70.

Wilbers, A.T.M. et al. (2001): Susceptibility of COTS PC to microwave illumination. In: Non-Lethal Weapons. Hrsg.: Fraunhofer Institut Chemische Technologie.

Winkenbach, J. (2002): Mikrowelle als Nahkampfwaffe. Welt am Sonntag, Nr. 1.1/6/2002, S. 12.

July, 2002 Dr. Reinhard Munzert, Germany, Erlangen E-mail:

RMunzert@t-online.de

Pictures

Picture 1: Manipulated Mircowave Oven

Picture 2: Microwaves going through walls

Picture 3: Book that describes the manipulation of a microwave oven to a ray weapon

Picture 4: Magnetron

Picture 5: Magnetron

Picture 6: Generator

Picture 7: Active Denial Technology

Picture 8: Neuronal Networks in the Brain Terrorists and Synthetic Lightning

How Should We Decide What Hypothetical Threats to Worry About?

Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing mering and one threat ecurd ping ers ety asking tho

questions:

  1. Are some of the novel threats "niche threats" that should be addressed within existing security efforts?
  2. Which of the remaining threats are attackers most likely to execute successtully and should therefore be of greater concern for security planners?

If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once.

Source: RAND Summary (PDF; 100 KB) Full Document (PDF; 600

KB) PDF 31 Pages

[Excerpt]

The Variety of Emerging Threats Challenging Security Planning

Since the terrorist attacks of September 11, 2001, focused national attention on how terrorist operations could take advantage of previously unrecognized vulnerabilities in security or defensive measures, there has been significant focus in security analysis and planning on identifying and seeking to close other potential vulnerabilities. One part of this vulnerability-driven approach has been an effort to identify potential new attack modes or terrorist scenarios.

The nation's terrorist adversaries have been remarkably helpful and forthcoming in the search for these potential emerging threats.

Enabled by the World Wide Web and the desire of a broader community of people --particularly among individuals sympathetic to al-Qaeda and jihadist-inspired terrorism --to feel like they are participants in a larger terrorist struggle, vast numbers of hypothetical terrorist plots flow through Internet chat rooms and message boards.

Examples include speculation about what infrastructures might be vulnerable to what kinds of attack, how various esoteric chemicals might be used to injure or kill, and even how electrical generators might be used to create lightning to use as a weapon. Emphasizing that even jihadist sympathizers explicitly engage in threat brainstorming, a 2009 contribution to an Internet posting board specifically asked its members to offer up potential scenarios for al-Qaeda targeting of U.S. corporations ("Jihadists Offer Hypothetical Scenarios, Targets for Attack, " 2009).

Whether the authors of the threats are truly putting them forward for consideration as actual attacks, are trying to mislead, or are simply engaging in the terrorist equivalent of creative writing is not clear, but the potential for such scenarios to result in scattering the nation's resources and scrambling security plans is real whatever their intent or motivation.

The open nature of this discourse has made it easy for us to see, and this pool of many possible attacks is supplemented by information gathered by intelligence agencies through other means.

Though many (or most) of the operations detected during such activities are, in the words of John Pistole, Deputy Director of the Federal Bureau of Investigation, more "aspirational than operational" ("Alberto Gonzales Holds a News Conference on the Miami Terrorist Cell Arrests," 2006), if nothing else, they provide a constant stream of novel potential attacks to challenge security planners. Reports of possible attack scenarios also sometimes appear in the press when they become of sufficient concern that collected information is shared outside intelligence and security organizations. Over the last few years, examples of such threats have included concern

about specific ways terrorists might conceal explosives, the use of remote-control toys in attack scenarios on airplanes (Transportation Security Administration, 2007), and heightened concern about attacks on specific targets as a result of intelligence information.

Beyond the myriad of threats --many fanciful, some more practical

--that terrorists produce on their own, security planners' concern about the possibilities of unidentified, lurking vulnerabilities has led to a number of efforts to dream up new ways terrorists might attack.

These efforts often seek to identify novel or emerging threats by cross-pollinating the creativity of terrorism analysts with ideas from technology experts, novelists, and other creative personalities.

They have included government efforts such as the Department of Homeland Security Information Analysis and Infrastructure

Protection Division's Analytic Red Cell program (Mintz, 2004) or the Defense Threat Reduction Agency's Thwarting an Evil Genius research effort (Advanced Systems and Concepts Office, undated), threat brainstorming within larger study or planning efforts, interactions between Hollywood writers and creative talent and security analysts or planners to jointly dream up new types of attacks (Calvo, 2002), the work of individual analysts or esearchers examining single threats of potential concern (e.g. aird, 2006: Deshpande, 2009: Bunker, 2008: Lockwood, 2008 see also discussion in McGill, 2008), and even unsolicited contributions by groups such as science fiction authors voluntarily acting as outside sources of creativity (Hall, 2007; Magnuson,

2008; Barrie, 2008).

The fruits of these brainstorming activities are frequently not disclosed outside of government out of concern of giving "bad guys good ideas." However, examples from some are available publicly.

Scenarios examined in the Department of Homeland Security's red cell program reportedly included whether terrorists could take advantage of a hurricane in staging an attack and specific ways high-profile events might be targeted (Mintz, 2004). The science fiction writers group put forward that they thought there is "a strong possibility that Al Qaeda or someone else will set off five to ten nukes simultaneously around the country" (Andrews, 2007).

Other analyses have looked at whether specific weapon systems could be used to attack particular targets of concern, such as the use of high-tech mortars in assassination operations (Bonomo et al., 2007) or bringing heat-seeking missiles to bear on high-temperature components of electric power grids (Committee on Science and Technology for Countering Terrorism, 2002, p. 181).

Individual analysts have contributed scenarios ranging from the idea that "a small terrorist cell could very easily develop an insect-based weapon"5 for transmitting disease to the use of laser weapons (Bunker, 2008; Elias, 2005) to "pyro-terrorism" --the use of large fires to cause terror (Baird, 2006; Deshpande, 2009).

These sorts of efforts to inject imagination into security planning are reinforced each time a successful, apparently unforeseen attack occurs; where the occurance of the attack leads to the conclusion that past efforts to foresee new risks have involved insufficient --or the wrong kinds of --creativity.

[Excerpt]

Prioritizing Emerging Threat Scenarios

But what about attack scenarios that can't be treated as niches of more general threats? Terrorists using lasers as weapons (Bunker, 2008) or building devices to produce synthetic lightning are unusual enough scenarios that they are difficult to treat as lesser included cases of other, more-common threats

But just because

a threat is new does not mean security planners must worry about it. Given finite resources, security planners need approaches to help decide how much they should consider even genuinely novel threats and of those, which they should tackle first and how much should be spent doing so.

This problem is further complicated by the need to compare threats that are very different to make decisions regarding the allocation of limited security dollars. It is not easy to compare threats as diverse as laser attacks andsynthetic lighting , [15 - SITE Intelligence Group translation of jihadist internet posting on the al Ekhlaas forum, "

Suggestion to ISI

for Using Electricity as a Weapon," translation dated June 13, 2008.] much less compare them to more pedestrian terrorist tactics such as bombings or armed attack.

This difficulty in comparing threats can be a further pressure toward putting security measures in place for each of them individually, thereby sidestepping the need to compare them. But security planning undertaken in this manner can quickly get expensive. Common denominators are needed to make it possible to weigh different threat scenarios and make judgments about which merit customized security measures, which should be addressed by general measures like response and recovery, and which can most likely be ignored.

So how might security planners compare such disparate threats?

One obvious element is some estimate of potential consequences of an attack, where higher potential consequences --many casualties or a high degree of damage --would make an emerging threat of greater concern.

But focusing on consequences alone provides only a partial picture, ignoring the other two components of risk --threat and vulnerability

--that drive the likelihood of a terrorist attempting an attack via that mode and whether the potential targets would be damaged should such an attack be staged. However, for most emerging or hypothetical threats, a rigorous risk assessment is impossible because, almost by definition, planners cannot know the probability that such attacks will be attempted or what targets (vulnerable or not) they might be carried out against. To sidestep this problem, we use an approach that compares different terrorist operations by ranking them based on the estimated likelihood terrorist attackers will be able to carry them out successfully. This process includes asking questions about how easy or hard it would be for attackers to execute a specific attack scenario given its requirements and characteristics (an aspect of threat) and the potential effects of security measures on their likelihood of success (an aspect of vulnerability). To do so, we drill down into the details of each emerging threat scenario to uncover the practical elements of what would actually be involved in stagingan attack using a novel weapon or tactic.

At a detailed level, some attack modes are simply more likely to encounter problems than others. For example, terrorists relying on improvised weapons (e.g., homemade mortars) would --in general

--be more likely to encounter problems than groups using proven commercial weapons (e.g., mortars produced by an arms manufacturer). Similarly, very complicated operations (e.g., attacks dependant upon multiple events occurring in tight succession) would be more likely to break down than more-simple attack plans.

Sometimes terrorists can hedge against these risks; sometimes they cannot. In our work, we identified six general characteristics that affected the likelihood of a terrorist operation running into problems or failing entirely.

Continue reading RAND: Emerging Threats and Security Planning:

How Should We Decide What Hypothetical Threats to Worry About?

PDF 31 Pages

See also: Wicked: Energy Beams

Microwave Missiles: High-Energy Weapons in the Air Force

June 2009

The High Power Microwave Technologies Branch of the Air Force Research Laboratory is looking for an innovative approach for non-lethal weapons technology that targets enemies' electronic systems. Here are projects looking to turn microwaves into technology-disabling weapons.

New research into high-power microwaves could make them a crucial tool of electronic warfare. The U.S. Air Force's newest directed-energy weapon program, the Counter-Electronics High-Powered Microwave Advanced Missile Project (CHAMP), would create a weapon that fires powerful bursts of HPM, frying the electronics of multiple targets without harming people or other infrastructure. CHAMP's microwaves could be delivered from pods on airplanes,

unmanned aerial vehicles or even retrievable cruise missiles programmed to safely land near their points of origin, says Doug Beason, a member of the Air Force's Science Advisory Board who has worked on directed-energy weapons. "You want to fly close to the target. You do not want to hit the target kinetically," Beason says.

Hurdles to a usable system include miniaturizing the antennas and the power supply.

According to Air Force documents, the winner of the $40 million CHAMP contract, expected to be chosen this year, would have five years to demonstrate a working device.

+ High-Energy Research and Applications Program: The Air Force last year began the $75 million HERA program to research aerial and ground-based HPM weapons. Researchers will focus on zappers that can generate peak power in the multi-gigawatt range and devices emitting on narrow- and wide-band microwave loads.

+ Active Electronically Scanned Array Radar: AESA radars are made to scan the horizon for threats. However, if radio energy is concentrated on one spot, the radar can scramble the electronics of targets. U.S. warplanes currently carry the AESA radar, but officials do not speak publicly about their electronic warfare capabilities. + Active Denial System: The ADS system, mounted on a Humvee, focuses a high-power, 95-GHz microwave beam at a target using a planar array antenna. The microwave energy penetrates up to 0.5 mm into human skin, producing an intolerable heating sensation but, designers say, no permanent damage. The Navy is looking into a similar system for ships.

from a comment:

Microwave Missiles: High-Energy Weapons in the Air Force

Open Letter to the American People We are citizens of Germany and want to inform you that new possibilities of terror may arise from Germany. We don't want that once more there could be terror in the U.S. or other countries coming from persons or weapons from Germany! The USA could be attacked with microwave weapons (directed energy weapons / radio frequency weapons) that are already used by perpetrators, and organized crime in Germany. Microwave weapons and e-bombs are a real threat to people and critical infrastructures like computer networks, power grids, literally anything that works with electronics or computers. They can take down airplanes. The German police and law enforcement don't do anything to stop the misuse and testing of these weapons by criminals. For more information see THE MISUSE OF MICROWAVE WEAPONS BY CRIMINALS AND TERRORISTS http://www.mikrowellenterror.de/english/index

Best wishes from Germany Dr. Reinhard Munzert, contact:

RMunzert@t-online.de Diplom-Engineer Rudi Zotzmann, Diplom-Engineer Henriette Zotzmann and more than 200 other German citizens.

THE MISUSE OF MICROWAVE WEAPONS BY CRIMINALS AND TERRORISTS Dr. Reinhard Munzert, Germany, Erlangen

High Power Microwave (HPM) systems are among the most mature non-lethal weapons. They can be used effectively against electronic devices (anti-electronics) and/or persons (anti-

personnel weapon). Microwave weapons (Directed energy weapons/Radio frequency weapons) damage or destroy computers, disable the electronics of cars, ignite airbags, and take down airplanes. They have strong effects and can be used for military and police as well as terrorist and criminal activities.

Microwave devices are easily to obtain and can be built by terrorists or criminals with basic knowledge in electronics. To quote Jim Lewis, director of technology at the Center for Strategic and International Studies in Washington DC.: "It is unfortunately true that people anywhere around the globe get access to technology almost as advanced as the Department of Defense [has it]."

Not only the good guys can apply non-lethal weapons: "...there is mounting evidence that home-brew HPM weapons are being used to attack people...The latest research and finding on this horrific trend in Europe is quite frightening" (News from Infowar, Volume I 


Number 6, August 28, 2002).

Through the illegal usage of innovative high-tech weapons, people are not "shot", rather their living quarters are bathed in (high frequency) electromagnetic waves. A hightech-gang in Germany is using and testing HPM-weapons that supply continous or pulsed waves over long periods of time. They have magnetrons, microwave-generators, amplifiers and integrated systems. The (pulsed) waves of two or more transmitters interfere in the target zone and strengthen their effects. There are also parabolic antennas modified to transmitters. Besides this, intelligent (adaptive) antenna systems (numerous small transmitters connected, instead of few large ones; for example hidden in parked cars/vans or buildings around the target/person(s) are used. In addition they apply through wall imaging methods. - The effects of the HPM-beam on the victims include headache, irregular heartbeat, painful testis, burned skin, eye damage and cancer.

It would be an error to think that non-lethal weapons are not available for law-breakers. "Unless we are aware of the possibilities, and acknowledge them, there is no way we can begin to defend ourselves" (News from Infowar) - It is better to inform and to tackle than to wait and ignore. read more about this topic

E-Bombs And Terrorists: September 2001 Cover Story

http://www.popularmechanics.com

In the blink of an eye, electromagnetic bombs could throw civilization back 200 years. And terrorists can build them for $400.

The next Pearl Harbor will not announce itself with a searing flash of nuclear light or with the plaintive wails of those dying of Ebola or its genetically engineered twin. You will hear a sharp crack in the distance. By the time you mistakenly identify this sound as an innocent clap of thunder, the civilized world will have become unhinged. Fluorescent lights and television sets will glow eerily bright, despite being turned off. The aroma of ozone mixed with smoldering

plastic will seep from outlet covers as electric wires arc and telephone lines melt.

Your Palm Pilot and MP3 player will feel warm to the touch, their batteries overloaded. Your computer, and every bit of data on it, will be toast. And then you will notice that the world sounds different too. The background music of civilization, the whirl of internal-combustion engines, will have stopped. Save a few diesels, engines will never start again. You, however, will remain unharmed, as you find yourself thrust backward 200 years, to a time when electricity meant a lightning bolt fracturing the night sky. This is not a hypothetical, son-of-Y2K scenario. It is a realistic assessment of the damage the Pentagon believes could be inflicted by a new generation of weapons -E-bombs.

The first major test of an American electromagnetic bomb is scheduled for next year. Ultimately, the Army hopes to use E-bomb technology to explode artillery shells in midflight. The Navy wants to use the E-bomb's high-power microwave pulses to neutralize antiship missiles. And, the Air Force plans to equip its bombers, strike fighters, cruise missiles and unmanned aerial vehicles with E-bomb capabilities. When fielded, these will be among the most technologically sophisticated weapons the U.S. military establishment has ever built.

There is, however, another part to the E-bomb story, one that military planners are reluctant to discuss.

While American versions

of these weapons are based on advanced technologies, terrorists could use a less expensive, low-tech approach to create the same destructive power. "Any nation with even a 1940s technology base could make them," says Carlo Kopp, an Australian-based expert on high-tech warfare. "The threat of E-bomb proliferation is very real." POPULAR MECHANICS estimates a basic weapon could be built for $400.

An Old Idea Made New

The theory behind the E-bomb was proposed in 1925 by

physicist Arthur H. Compton -not to build weapons, but to study atoms. Compton demonstrated that firing a stream of highly energetic photons into atoms that have a low atomic number causes them to eject a stream of electrons. Physics students know this phenomenon as the Compton Effect. It became a key tool in unlocking the secrets

Ironically, this nuclear research led to an unexpected demonstration of the power of the Compton Effect, and spawned a new type of weapon. In 1958, nuclear weapons designers ignited hydrogen bombs high over the Pacific Ocean. The detonations created bursts of gamma rays that, upon striking the oxygen and nitrogen in the atmosphere, released a tsunami of electrons that spread for hundreds of miles. Street lights were blown out in Hawaii and radio navigation was disrupted for 18 hours, as far away as Australia. The United States set out to learn how to "harden" electronics against this electromagnetic pulse (EMP) and develop EMP weapons.

America has remained at the forefront of EMP weapons development. Although much of this work is classified, it's believed that current efforts are based on using high-temperature superconductors to create intense magnetic fields. What worries terrorism experts is an idea the United States studied but discarded

-the Flux Compression Generator (FCG). A Poor Man's E-Bomb

An FCG is an astoundingly simple weapon. It consists of an

explosives-packed tube placed inside a slightly larger copper coil, as shown below.

The instant before the chemical explosive is detonated, the coil is energized by a bank of capacitors, creating a magnetic field. The explosive charge detonates from the rear forward. As the tube flares outward it touches the edge of the coil,

thereby creating a moving short circuit. "The propagating short has the effect of compressing the magnetic field while reducing the inductance of the stator [coil]," says Kopp. "The result is that FCGs will produce a ramping current pulse, which breaks before the final disintegration of the device. Published results suggest ramp times of tens of hundreds of microseconds and peak currents of tens of millions of amps." The pulse that emerges makes a lightning bolt seem like a flashbulb by comparison.

An Air Force spokesman, who describes this effect as similar to a lightning strike, points out that electronics systems can be protected by placing them in metal enclosures called Faraday Cages that divert any impinging electromagnetic energy directly to the round foreign military analysts say this reassuring explanation is The India Connection

The Indian military has studied FCG devices in detail

because it fears that Pakistan, with which it has ongoing conflicts, might use E-bombs against the city of Bangalore, a sort of Indian Silicon Valley. An Indian Institute for Defense Studies and Analysis study of E-bombs points to two problems that have been largely overlooked by the West. The first is that very-high-frequency pulses, in the microwave range, can worm their way around vents in Faraday Cages. The second concern is known as the "late-time EMP effect," and may be the most worrisome aspect of FCG devices. It occurs in the 15 minutes after detonation.

During this period, the EMP that surged through electrical systems creates localized magnetic fields. When these magnetic fields collapse, they cause electric surges to travel through the power and telecommunication infrastructure. This string-of-firecrackers effect means that terrorists would not have to drop their homemade E-bombs directly on the targets they wish to destroy. Heavily guarded sites, such as telephone switching centers and electronic funds-transfer exchanges, could be attacked through their electric and telecommunication connections

Knock out electric power, computers and telecommunication and you've destroyed the foundation of modern society. In the age of Third World-sponsored terrorism, the E-bomb is the great equalizer. [image] In the 1980s, the Air Force tested E-bombs that used cruise-missile delivery systems.

[image] To ignite an E-bomb, a starter current energizes the stator coil, creating a magnetic field. The explosion (A) expands the tube, short-circuiting the coil and compressing the magnetic field forward (B). The pulse is emitted (C) at high frequencies that defeat protective devices like Faraday Cages


————————-


GOD FM GANG STALKING REPORT

👮 POLICE 👮

The police simply do not believe that this is possible. They think I’m a complete and utter nutcase and a crazy person. So not only have I got this awful evil set of criminals doing this to me. I’ve got no help and no one wants to believe me or help me or catch them. I have to prove that this is happening and I have to catch them and stop them myself. The fact that I have phoned action fraud so many times has meant that now I’m Seen as a raving lunatic. All my credibility as a woman as a single woman as a victim of crime is totally trashed. When I called the police at my old property because I could hear someone in the loft, I was told that I should call an ambulance because they think I’m crazy. In fact I was taken to a mental ward and I did have a rest for two weeks and I preached the gospel for two weeks and things just got much worse with the hacking. Anyway, the hospital couldn’t keep me much longer and wanted the bed back and also I think they were tired of me preaching the gospel. But you know what occurred to me is how many homeless people are on the street they could do with the help that I was given for two weeks. How many people are detained under the mental health act for reporting crimes committed against them and instead of the police investigating the criminal activity of the criminals they decide to put you down as a mental, crazy person, and not only have you now got to deal with a criminal matter and stop people breaking into your house and hacking your phone but you won’t get any help for it. And if you talk about it you’ll be seen as crazy. This is the reason why I am doing my report for you today because I’m not crazy and I have lots of evidence. And if nobody does anything to stop this, then I will be withdrawing myself from society in every possible way and I will be asking for my freedom away from here to exist as a human being without a phone or an email address, but communication will have to be in writing and I don’t want to participate in society anymore. Thank you and I don’t want to be a slave.

-What really makes me very cross is that this does happen to many people across the world and when you report this crime you are made out to be a complete crazy person. Let me tell you if this happens to you and every device and every time you try to connect to the Internet and you couldn’t make phone calls and no one could get hold of you when you couldn’t log into your banking and you couldn’t log into your emails and your TV didn’t work and all of these things started to happen to you then you would also keep phoning the police until somebody took you seriously. Why would I do this for fun? I’m not seeking attention. I’m trying to get control of my telephone numbers and my devices in order to operate in society. I can’t run my state agent when I’m being hacked.  My business has gone down the tubes. My ministry is also not able to operate because I’m not able to function. All because of what is happening and that is why I keep pushing to get some answers and someone to take me seriously. If this can happen to me, it can happen to you, it can happen to anybody.  Also, since Apple have removed the ADP which is the advanced data protection layer from its user accounts. This has meant that the government of the UK and any police officer with a grudge & the know-how can access the devices of anybody and this is so that they can monitor criminals and anybody they want to monitor. You do get police officers who are corrupt. And it is my belief that there is someone corrupt within the police, they must be doing this to me. This can’t be Mr average hacking tools. I can tell you that I’m not a threat to society and I’m not a criminal and I will put you all on notice including government and his Majesty the King Mr Charles. You have seven days to cease and desist this attack and destruction of my life. I have the right to exist in society freely as a human being and what is happening to me is a breach of my human rights. And I will talk to God about judgement for this, if I do not get some justice.

REPORTS MADE TO ACTION FRAUD SINCE SEPTEMBER 2023

REFERENCE NUMBERS

NFRC 230606001898

NFRC 230 706041671

NFRC 230605970798         

NFRC 230605967132

NFRC 230505962848

NFRC 230505362779

NFRC 230505947808

NFRC 230505943621

NFRC 230505943590

NFRC 230505943576

NFRC 230505943575

NFRC 230505943618

NFRC 230505943601

NFRC 230505943567

NFRC 230505943545

❤️UPDATE – 4.4.25 today I phoned action fraud and I was told that there was nothing more they could do and there’s no further they could go with the enquiries.. They really didn’t want to speak to me and they would not assist me in anyway. They told me that I could go to the frequently asked questions sections on their website and report my own satisfaction in the matter. They told me that the National fraud intelligence bureau and that the London police had informed them that they had taken the enquiries as far as they were prepared to take them.

-       It is worth noting that when I first contacted action fraud at my previous address action fraud, took it quite seriously and they did assist me. I believed at the time that it was my neighbours who were breaking into my property. They put up scaffolding and change the windows so that they did not have hinges and would break into my windows. I witnessed this and reported it on many occasions, but unfortunately nobody took me seriously and decided that I was suffering from a mental illness.

-        it is worth noting that I am a business owner and I manage peoples money in my estate agent. I’m quite familiar with setting up networks IP addresses DNS servers, hiding IP addresses and hiding the Wi-Fi and changing passwords for routers and putting up gateways. I’m very familiar with all the practices of data protection for my businesses and for me. I have taken all the measures I can to stop this hacking in the normal capacity of hacking. The police have told me to prove that this is happening to me. They have asked me to tell them who is doing this to me and why. I do not have the answers. I’m not able to obtain the DNS server information that they are feeding all of my information through. I can tell you how they doing it and I can send you images of proof. I can tell you that this is not the standard capacity of hacking. This isn’t just clicking a link. This is somebody who has all of my private information and is obtaining my information through the back door of my device by connecting it to a fake telephone mast and a gateway between my router and the outside world. My phone is automatically connecting up to any Wi-Fi and also it is connected through the managing networks and auto join. Asked to join Bluetooth is constantly being switched on on any device. There are many Other things that have been happening and I will list those below.

NETWORK PROVIDERS MOBILE NUMBERS

07773577788 EE

07778807388 EE

07908833444 EE

-        Let me tell you what the problem is I am having with my telephone numbers. My Sim cards will not work. They told me that there is no Sim card and the telephone number does not display on the phones. When I *#002# or *004# or *#21# to try and stop anybody from filtering my calls so that I don’t get my messages I get the message failed. For any number that I use. This includes the numbers I have listed but is not limited to just these numbers. It includes any number that I use for an iCloud account or an email address. As soon as I start using a number for validation purposes, the number stops working or is deactivated unless I register it with the network provider. I know the telephone number is 0D registered after a certain period of time. But this goes beyond that. I have 50 other numbers which have all been deactivated as soon as I start using them without registering them.

-        My phone will tell me that it is connected to the Internet and it will display 4G and full bars. But I won’t be able to connect to the Internet for updates and things like this my phone or tell me that it’s not connected to the Internet. When I’m uploading or downloading videos for my ministry work at God FM, it will tell me that I’m not connected to the Internet or we just stop working altogether. If I am sending a email, my emails won’t be sent because my Internet is not working for the email. I also have had many reports from many people trying to get hold of me on my telephone numbers. Sending me text messages and making phone calls to me and I don’t get the phone calls. All the text messages. Also every time I want to send a message even if I’m something out of iCloud. It tries to send it as an iMessage. I do not have iMessage for any of my numbers. And also when I send messages it often comes up as failed. When I want to send a message, I do not have the message icon To send a message when I click it it won’t work. It is greyed out. So then what I have to do is I have to phone the number and copy and paste the number and send a message this way. Because my phone won’t function normally. On many occasions, I have swapped Sim cards around to different devices to try and stop this from happening and I have been received messages which were sent to me five or six days ago. When trying to sign into WhatsApp, I am struggling to get text messages to validate my identity. Also for any Apple account. I am having problems receiving any messages as text messages. The same with Google and any other platform where I have to use a telephone number. Any email address that is attached to these telephone numbers will not work because somebody else takes over the telephone number and takes over the iCloud account associated with the telephone number and clones the phone & Clones the number. For example, I was able to put WhatsApp on two separate devices. How can this be possible.

 

PRE APPLE NOTES.

It is worth noting that I spoke with Apple about the 14th of March 2025 after the Lord God maker of heaven and earth revealed to me how the hackers were getting into my device. I took this information to Apple which included the analytics of my device with I would say close to 100 reports and uploaded this information to Apple, which include all the coding that had been modified on my device to report my location. My iCloud address my password, my network provider. This information was then filtered through back to the hackers so that they could get into everything. I can read code, so I sent all of this to Apple and since then we have heard 62 security updates on our latest update as of the 31st of March 2025. Most of the problems were resolved until today and yesterday when my phone started to play up, and I’ve noticed that there is new analytics with new instructions and code That has been put on my device and any device that I have you to hack my phones again. I feel like I need to go and work at Apple to stop them.

 

APPLE ICLOUD ACCOUNTS

wintertaylors@icloud.com

Admin@godfm.org.uk

Sheistgerock@icloud.com

& Many others hacked

EMAILS

admin@bigappleestates.com

Ajayhart@bigappleestates.com

Admin@godfm.org.uk

& many others hacked

 

APPLE PHONES

IPHONE 5

IPHONE 6

IPHONE 6S

IPHONE 7

IPHONE 8

IPHONE SE 2020

IPHONE 11

IPHONE 11 PRO MAX

IPHONE 12 PRO MAX

IPHONE 14 PRO MAX

 

APPLE TVS

APPLE TV 2ND GENERATION x 2

APPLE TV 3RD GENERATION X 3

APPLE TV 4TH GENERATION X 4

all of these devices somebody else is accessing them through Wi-Fi and controls these devices and signed me in and out of the apps. Changes all the settings on the devices to connect with Bluetooth AirPods and HomePod and anything else that they feel like modifying. Each of these devices haven’t now been sold or are being hacked every day. I have now hardwired my Apple TV, but somebody is still able to access my Apple TV, even though it is hardwired and the Wi-Fi switched off. My router is also controlled by my network provider and WPS and Wi-Fi are disabled. But somebody is still able to get into my Apple TV and make modifications so that they can control all sorts of aspects of my account. Again I have to have an iCloud account and a telephone number to sign into this and I have to sign back out so that nobody knows what my signing details are. I disabled Siri as well just as another security measure. Somebody keeps going into each app and modifying the app and changing passwords so that I cannot get into the app and then I have to delete the app and start again. I tried to reset my Apple TV about two weeks ago and I didn’t want to delete any apps, because it took a long time to install everything. So I went to reset it and all of the apps were completely deleted. The Apple TV also did not want to do an update and I really struggled to get this to work. When I was using the Wi-Fi, the Apple TV kept connecting and then disconnecting. So as I say now everything is hard wired.

 

APPLE

IPHONE TECHNICAL HACKING BACKGROUND

For example today I wiped my iPhone 12. I decided to set it up again. And while I was setting it up before I even got to the settings. I found that my phone was set to auto connect to any Wi-Fi asked to join. The Bluetooth is on and under the managing networks I have automatically been connecting up to the network providers free Wi-Fi or whatever it is. In the time it took me to set up my phone. Whoever is hacking, my phone is able to connect up to my device and modify the settings at the backend of Apple. I have learnt how to read code on Apple and my phone has got instructions to report my location my activities what network I am connecting with what Wi-Fi I am using what phone I am using et cetera et cetera and passwords of course. The iCloud identity of the device et cetera et cetera. It doesn’t actually matter if I sign out of a device because it signs itself back in. For example, last week I wiped three iPhones and reinstalled all of them. Nobody is watching what I’m doing. I hope anyway unless there are cameras in my house and I created passwords and logged into my iCloud and removed all devices and signed out of all Web browsers. And removed devices from the iCloud account. I have an iPhone 6 which was synchronising WhatsApp telegram and various other apps which are not able to be used on an old iPhone. So I disabled all of that. Then today I decided to try and sign into this iCloud account only to find that there were two other devices, the same as the one I’m using an iPhone 12 already signed into my account. As well as an iPhone 14. Now I removed all the devices from my account. When I signed out last week, I was quite confident that no one should be able to get into it. Unless of course they have access to the telephone number of the account. Now the telephone number associated with the iCloud account I am discussing today is kept in a pouch and it has a Sim pin as well as a passcode enabled so that nobody can take over the number but still the person has been able to get various devices signed into my account. I took a screenshot of this and I want to know from Apple, what devices are being signed into my account and are they getting verification codes and in what capacity is it through the number or an another device? That must be signed in. I asked Apple if there is a way to disable devices from signing into my iCloud account and removing devices permanently, but Apple was not able to help me with that. I have also had it where I have had to sell iPhones which have been hacked and then buy new iPhones as I have been advised sometimes this will help as well. And what do I have found? Is that the iPhones that I sold and have a receipt for selling them or signing into my iCloud account. I’ve also got the same problem with my banking. I’ve got devices that I sold signing into my banking. I’ve got somebody updating my address to my old address so that my card is declined. I’ve got somebody who is updating my address on my eBay so that I don’t get deliveries and it goes to the old address. I also have somebody who seems to Access any apps that I use and delete files and modify the apps.

BACK END

So at the back end of Apple, what I’m able to tell you is that there is some way that they are remotely accessing my phone and have created an interface. When I tried to sign out of my iPhone earlier today I was told that this was a managed account. Anyway, with some determination I managed to wipe the phone but it wasn’t easy. When I installed Norton and any other apps on the device I’m using right now, I have discovered that I cannot use these apps after many attempts I have deleted the apps And reinstalled the apps many times only to find that they will not work. And this is very frustrating if you have to pay for an app you don’t want to lose the app and the ability to use this application because you have to change your iCloud account every two seconds.

CONNECTIVITY

As I’ve already stated, this phone seems to be submitting all of my information and passwords to a DNS server, and also a IPV6 and an IPV 4 address. From what I can tell, this is not an Internet face that is being used, but a intranet. And my phone is connecting to it all the time.

 

HOW?

Well that is the question. How does somebody get access to all of your information without having the information to begin with through the normal hacking procedure. By installing a route kit which is operated by third-party remotely. This is what’s happening with any device that I use. I noticed if I set up a new phone because it is called iPhone, it is automatically trying to find a network like there is a transmitter of some kind nearby that is trying to connect. It is my opinion that when I connect through any of the numbers that are known by the hackers that they are connecting my phone to a different network than my provider. I noticed that if I use a different Sim card with data that that nobody else knows about then I can connect to the Internet and update my phone and make phone calls and send text messages. One of the things I have noticed is if I want to make a phone calls, I have to make various attempts first and if I want to update or do any data work – I found the only way I can do this with one of my telephone numbers is to phone myself at the same time as doing any uploading or downloading videos or sending emails because my phone won’t connect to the Internet.

 

IPHONE LIST OF PROBLEMS

START UP NEW DEVICE

When you start up a device and you are trying to set it up. There is nothing stopping anybody else who wants to hack you from accessing your device remotely as you are trying to set it up. What I have found is that by the time, I’ve got to set up the device and I land on the settings application to check what is going on on my device. I find that my phone is set to auto join any network and not only this and the manage networks. The phone is to auto join to any network as well. The phone is automatically named iPhone. This appears to be a trigger for a mast nearby that searches for anybody with a device that is being set up. By the time I can get to any of the settings, I find it everything that I don’t want switched on is switched on and it takes me hours to disable all of the modifications that have now taken place on my device as I have tried to set it up. When I checked the analytics, I am able to establish that someone has modified my device to connect with local networks and intranet. IP V6 and IPV4. The reports that managed on a interface by someone remotely now has access and full control of my device and what they can do is they can get a copy of all the passwords and connect to my device make modifications to any application and settings of my device. Every time I switch my phone on and off it is automatically trying to connect to any network and Bluetooth is on and it won’t work properly. It’s just a disabled Broken device as far as I’m concerned.

—-It is worth noting that while I was making my report for you today I was signed into my iCloud account on an iPhone 14 and an iPhone 12. I removed the iPhone 12 from the iCloud account and change the password because my phone was behaving funny. And by the time I finished doing this report, my iPhone 12 had signed back into my iCloud account and it was set to access the iCloud account on the web. Needless to say I quickly remove the iPhone 12. At least I tried to, but I could not do that so what I had to do was sign out of it in the end. I also find that on the settings when you are signed into an iCloud account it doesn’t actually list all the other devices that are signed into your device through a web browser. It’s like my phone isn’t really telling me what’s going on. The reason I know this is because when I sign out of my iCloud account and I want to sign back in it asked me for the passcode for many of my devices, which I no longer own anymore, and I have sold and have a receipt for. I also have duplicate devices that are signing into my iCloud. I only have one iPhone 12 but there are two other iPhone Twelves that are signing into my iCloud account. What also happens is I can go and disable whatever I want to disable on my device, but the settings have changed back again and it’s like I’m not really controlling my device somebody else’s. Also when I try and sign into iCloud it asks me for the passcode for my device and I try to put it in but when I do this it doesn’t give me the display of a dial pad, but instead gives me The option to put in a long numerical passcode and this means I can’t put my passcode into my phone to get into my iCloud account. Then it will ask me to give the passcode for other devices which should not be signed into my account but are. So I look at the devices that are signing in and those are devices that I no longer own anymore. And of course I don’t know the passcode for those devices because they’re not my devices. When I go onto safari, I can sign into my iCloud account and it won’t let me Modify the settings on iCloud, unless the web features ticked on the settings on my device so I go and I change this but I have problems changing it on my phone because my phone likes to switch it on and off by its self. And when I sign in, sometimes it signed me back out on safari. And when I sign in, I have photographs on there from another device that is not mine. I don’t have any of my photos synchronise to go on the iCloud. Then when I sign out Of all Web browsers, then I can’t sign back in again on my device. It’s like the phone is confused. It’s almost like somebody else is able to access everything I’m doing on my device. Safari is a problem. I can’t save any passwords on it. Because someone else seems to get all the passwords through safari. In fact I don’t really like to use safari now I like to download a different web browser. What is particularly frustrating is that I can change my number for my iCloud account and I can change my password but that does not stop these people getting into my iCloud account. I am quite intelligent and I have the ability to set up routers with hidden Wi-Fi et cetera et cetera et cetera. My own DNS server my own IP address. I can change my IP address. Nothing stops these people from getting into my device or my iCloud account. Also, when I give my phone a name, he does not display my name on my iPhone on the iCloud or on the Safari iCloud. It will display name from one of my devices for a name. I created several months ago for one of my devices. So then it shows me really, but I’m not really signing into my own iCloud account or this device is not connected to my iCloud account, but there is a duplicate of this device. Perhaps That is connected. It’s particularly frustrating when you need to sign into iCloud to get an app. It would be nice if Apple could make it so that we don’t have to sign in to download an app so that I can quickly remove apps that are a problem and re-download them when I feel that my phone is in a safer environment. Every time I sign into iCloud somebody gets control of my device. Also, when I purchase any apps these apps become a bit of a pain in the bum. Because they show up on my App Store in my iCloud as a Purchased app and these are modified by the hackers. For example, I reinstalled my iPhone 12 yesterday and I can’t get Norton to work properly or vivavideo. These apps will not work. The other thing is WhatsApp. I can have on two devices for the same number. I have difficulty setting a passcode for WhatsApp and in general, I have no control of anything on my device to be fair.

Widgets

-       Widgets is another one. iPhone that I end up with lots and lots of widgets and I have found it when I have checked the coding for the backend of the iPhone. The widgets and Siri are the first things to be set up on the device remotely when you are setting up your phone to report to a remote interface to upload and modify your device.

 

Apps

On iPhones, the latest default apps include Apple's core apps like Phone, Messages, Safari, Mail, Maps, and more, alongside productivity tools like Pages,

- Numbers- Keynote-  iMovie -GarageBand- and the App Store. Here's a more detailed list of the default apps you'll find on a new iPhone:

  • Phone: For making and receiving calls. 
  • Messages: For sending and receiving text messages. 
  • Safari: The default web browser. (This automatically is set to share with other devices.).
  • Mail: For managing emails. 
  • Maps: For navigation and location services. (Automatically. She has my location and has my ETA as an estimated time of arrival for the hacker).
  • Siri: Apple's voice assistant. (Siri is key in the hacking because they use Siri to make the instructions in the initial start-up of the device and Siri is pretty much disabled on my phone as much as possible to try and stop this.)
  • Photos: For managing and viewing photos and videos. (Hidden album and share photos. These are the things I get on my device and this is because it is always being hacked).
  • Camera: For taking photos and videos. (At the back end of the device, I am able to establish that they always connect to the camera and photos and clock and Siri and want to get a shared location through these applications).
  • Music: For playing music. (I delete this application, because it again is another opening for the hacker).
  • Podcasts: For listening to podcasts. (Podcast is one that they really like to get into and this is because it uses audio and they like to have control of all audio on my device). They also like to take control of Braille and have a recording of everything I’m doing three Braille).
  • TV: For watching videos and movies. (This is another application that I have to delete because I have an Apple TV and I don’t want them taking control of my Apple TV through my device.)
  • News: For reading news articles. (With this application, I have no control at all. If I don’t get this deleted on set up then news is set to automatically be on and I can’t control that. I really don’t want this application on my device and so I deleted).
  • Stocks: For tracking stock prices. (I don’t need to know the stocks and I don’t want to know the stocks.. Thank you. I normally delete this, because I also think this is another way for them to get into my device).
  • Reminders: For creating and managing reminders. (For many years, I was always getting reminders about things on my device and I realise now it’s because somebody had access to my iCloud account and they like to heck everything through reminders in calendars. I’d like to know where you’re going and they also delete appointments if you ever use the calendar so I don’t use the calendar and I delete it and I also delete reminders but even though I’ve deleted reminders and calendar and I’m not signed into iCloud or iTunes calendar features are still operating on my device and reporting various private information about me to my stalkers.).
  • Calculator: For performing calculations. (Calculator, yes we would like to have a calculator and I use this but really I probably will stop using it because I’d rather not use it. I’d rather download a different calculator because it is set up on the applications and the hackers can modify any of the applications that up on the set up of the device this is when I probably won’t be using for much longer).
  • Clock: For setting alarms and timers. (Clock is a problem because I noticed that the backend for the interface for the heck are they like to get a report from the clock and time and photos, so I now delete the clock from my device. Just try and stop this).
  • Weather: For checking the weather forecast. (Whether everybody likes to know the weather, but my device likes to share my location and also to allsorts of weird things, so I don’t really use the weather and I don’t delete it, but I have to disable all of the modifications that they have set up on my device).
  • FaceTime: For video and audio calls. FaceTime is a pain in my life. None of my telephone numbers or iCloud account or set up on FaceTime. I disable FaceTime and even though I’m not signed into an iCloud account or signed into a Apple Store account. My phone always switches on FaceTime. And start sending messages as I message. Every time I switch on my phone my phone says would you like to send your messages through iMessage or that you have been signed out of iMessage because somebody else has got control of my device and my iCloud and my iMessages. If they have control of my iMessages then I don’t get my text messages and this way someone else is getting my messages and this is a breach of My privacy and my human rights). It is worth noting that some years ago when I had children set up on iCloud on the same account we would all get each other’s messages. When my dad died, I did not find out through someone texting me. I found out through iMessage through a message that was sent to my daughter by the father of the children, and I know that he was also somehow connected through iMessage because I believe he’d like to find out where we are and what we were doing because the children had keys to my house and also they had iPhones or connected to my iCloud account).
  • Contacts: For managing your contacts. Contact is a problem because if I try and save any contact on my device as soon as I sign into an iCloud or an email suddenly everything is synchronising to my email address or my iCloud and when I sign out I find it I lose my contacts. The other one I have is that my contacts are synchronised to 15 years ago to win all my friends are dead. So I can’t have any contacts on my device. When I can’t use this feature and I have to disable it. I have a phone book. I noticed that contact is one of the main Where is that the Heckers like to get into my information is three contact sharing contacts because they like to synchronise the contacts to any of the other applications with notifications, etc etc.
  • Find My: For locating lost devices and contacts. (Find my lost device. I disable this and I delete the application but still this is operating in my advice and every time I sign in I have to disable it and I have to go into iCloud and disable it as well. Every day I have to go into privacy in settings and disable it. It’s a daily task of mine even though I’ve deleted find my iPhone from my phone and I’m not signed into iCloud or Apple Store. I still have find my iPhone being switched on all the time and I have to go and switch it off every day.
  • Settings: For managing your iPhone's settings. 
  • App Store: For downloading and updating apps. (With the App Store, even though I’m not signed into iCloud or the App Store when I go into the App Store as an app it’s set to auto download under 200 MB without asking even though I go and change all of the settings. I have to do this on a daily basis to stop my hackers from downloading all sorts of weird apps in the background.

Productivity Apps: 

  • Pages: For creating and editing documents. Peters is another one I don’t use I delete this app I don’t like it and I don’t want it on my phone because it is another doorway for the hacker to get into my device.
  • Numbers: For creating and editing spreadsheets. Numbers is another one I don’t need and I don’t want and I delete because it is another doorway for the haircut to get into my device.
  • Keynote: For creating and editing presentations. This is another app that I delete and I don’t use and I don’t want because it is another doorway for the haircuts to get into my device and take control of my device.
  • iMovie: For creating and editing videos. This is another app I don’t use and I delete because I just don’t want to be watching movies on my device. I want to use my device as a telephone. Every app that is installed is a risk for my hackers to get into my device.
  • GarageBand: For creating and editing music. I delete this app.
  • Clips: For creating and sharing short videos. Another app I delete. All additional apps that I don’t use are deleted for the reason that hackers can use them to get into your device.
  • Apple Store: For purchasing Apple products. App Store likes to sign in both self. Even if I’m not signed in, I find that I am already signed in and I have to keep signing out of it.
  • iTunes Remote: For controlling iTunes on your computer. Again, this is a very big doorway for my haircut to take control of my device, and I remove this app
  • Trailers: For watching Apple trailers. Again, this is a very big doorway for my haircut to take control of my device and I remove this app.

 

 

Settings

-       Air plane – I noticed that someone can still access my phone, even when it’s on Airplane Mode and modify all the settings.

-       WiFi – Connect to any Wi-Fi auto join. Manage networks are also auto connect to any network provider.

-       Bluetooth is automatically trying to connect to any device. Including my TV, which I have never connected my phone to or any Bluetooth speaker, which I also have not connected this device to.

-       Mobile service – roaming is automatically set to off, and my numbers, most of the time not displayed.

-       Personal hotspot. For some reason somebody keeps connecting to my personal hotspot, so I keep having to change the password on this as well.

-       And a data, my phone is switching on whatever part of the data it wants to by itself. I physically have to go and switch off everything and I particularly don’t like astronomy because I noticed that my phone gets hacked when it’s connected. So I only connect and allow myself to connect to what I am using to try and stop the hackers from getting into my device.

-       Charger: – I noticed that you’ve got a full report on what you are using here and this is great but not brilliant if you’ve got a hacker working out what you’re working on through your battery charger as well. I noticed that my battery runs very hot and it doesn’t stay charged for long.

General

-       About - iPhone is automatically displayed on the phone. If I change my name to my iPhone it doesn’t show the same name on my iCloud account. It’s like my phone is not connected to my iCloud account but there is a copy of my device and it will be called something that I called one of my devices a week or two weeks ago.

-       Software update. This seems to only want to update when I physically do it myself.

-       iPhone storage – I noticed that there is a clump of Apple folders which is fitness camera files and text altogether and these folders are the folders that I really struggle now to use, because I believe that this is the modified part of my phone.

-       Health data – I noticed when I go on the data and the data access and devices. I have about 30 devices all connected to my health data. I have photographs to prove this. And I have tried everything to get health data off my phone and I can’t.

-       AirDrop – my AirDrop is automatically set to connect to any device bring a device together. Use my mobile data.

-       Airplane, continuity - This again is transfer to HomePod automatically and automatically. AirPlay and Hahndorf is also automatically set to on continually with the camera. This is how they hack my phone. I would like this to be set as default off infect everything should be off until I want to switch it on.

-       Picture in picture is automatically set to one and again I would like that said to off automatically because I believe that my phone is being shadowed and mirrored.

-       CarPlay seems to be fine

-       Auto fill passwordS:- Automatically, this is set to on Automatically, and I wish that this was not automatically connected please.

-       Background app refresh. I wish that this would update with what you’re using instead of updating apps that you’re not using.

-       Date and time, dictionary, fonts all seem fine as far as I can tell

-       Keyboards – I really don’t want anyone connecting up with a keyboard to my device, and I wonder what this is

-       Language and region: – live text automatically set to one. I believe this is a problem because I don’t want to be recorded all the time I’d like to be able to control what my phone is doing.

-       VPN Seems fine, but sometimes people can hack you through your VPN

-       Transfer or reset iPhone: – I noticed that if I want to reset any of the section, my phone doesn’t fully reset it. It doesn’t like to update the privacy settings. And when I reset the network settings and things like this, I notice it’s very slow to do it and the little icon where it showing the ball of the percentage of the modified update for resetting whatever you’re resetting only goes to a certain point and then switches off and start up again.

ACCESSIBILITY

-       For me, this is the biggest section for hacking and I have to work very hard on it all the time because they like to set everything up so that they can record me as if I’m deaf, and there’s a keyboard for deaf people and all of this is set to on all the time.

-       VoiceOver – ok if set to off

-       Speech – I don’t like this, they should be off

-       Braille – I noticed that various parts of the Braille are working and operating in the background. For example, turn pages and panning and wordwrap.

-       Live recognition – I notice that this is all ticked. People, doors, scenes, point, and speak, text, furniture and I really don’t want this on in my iPhone automatically.

-       Text recognition. Is automatically said to on again I would only want that switched on if I want it on.

-       VERBOSITY :- Too many things switched on here I’m really not comfortable with all of this, but it seems to be all switched on and from what I can tell this is how they get into my device. I would like to switch to automatically not be on please Apple. For example, I am in the section now trying to switch it from some to none and it won’t let me so when I click back it’s automatically still on some.

-       AUDIO – Again, I don’t know what all of this is but everything seems to be on here and it’s about items being focused screen recognition, item activated navigation, wrapped backwards all sorts of things like this. I’m not quite sure if somebody else is controlling this on my device.

-       COMMANDS – I don’t like the keyboard shortcuts to be automatically set to on etc

-       BRAILLE - Again, I will say that that should not be on. Unless you put it on you and you wanted on. Because I believe Braille could be used to hack you.

-       QUICK SETTINGS – Again I would rather all of this was not set as standard please thank you I don’t like it.

-       SWITCH CONTROL – RECIPES – Again, I really don’t want the Sun please I don’t want to have recipes.

-       HEARING CONTROL CENTRE – I have headphones, accommodations, background sounds, live, listen, conversation boost. I really don’t want this on my phone please.

-       PERSONAL VOICE - My phone says share across all devices and this is on and I really don’t want this on. Can we not make the phone more simple so that we don’t have people listening and setting things in the background of your device to stalking her rest and watch and listen to you. Thank you.

-       KEYBOARDS AND TYPING – When I go into the section, it automatically go on as if somebody’s got a keyboard connected to my device, remotely accessing and controlling my device.

-       ACCESSIBILITY SHORTCUT :- I noticed that all of this is ticked and on and I don’t want it on I want it off. Please.

-       CAMERA – I notice that this part of the phone is always switched on like Siri really likes the camera. Again, is there a way we can have control of it please.

-       DISPLAY & BRIGHTNESS – It seems somebody else goes in switches this around on my device anyway. They like to have a two raised to week and also to autolock after 30 seconds. Then I don’t like this and I’d like it so it is default so that it doesn’t lock, unless you lock it and I don’t want to sound like I’m being pernickety, but I think that someone else can get him to so many parts of the phone through this.

-       SIRI – I noticed they like to hack me through Siri. It would be nice if everything was off as default because I noticed that it really like Siri and I don’t like Siri. Thank you. I don’t want to be listened to and I certainly don’t want to photograph taken of me by my iPhone every three seconds either please.

-       STANDBY – This is automatically set on and I don’t want it on. I want it off.

-       NOTIFICATIONS:- I noticed under the notifications that I get notifications about extreme alerts and all of the things for apps that I don’t even use, and I’ve disabled the function of the notification several times on my devices for FaceTime and other apps that they are able to get into my device and keep changing this and I wonder if it’s at all possible for me to be able to get control of my own iPhone some help please Apple.

-       SOUND & HAPTICS – I noticed that I have to go and change the settings on this and somebody else goes and changes them back again, so that every time I use the keyboard it makes a sound and when I lock my device it makes a sound, but I purposely go and turn all of this off, but somebody else is able to get into my device and change it all around somehow which is really frustrating. I also noticed calendar and reminders are all set up to give me reminders and have alerts when I haven’t even set it up and I’ve purposely remove calendar and reminders as apps from my phone, but they are still functioning somehow in my phone and said to remind me at 9 o’clock for an appointment, which I haven’t booked in and there’s no calendars and no email synchronised to my device.

-       FOCUS - Even though I have disabled focus, I have noticed that focus is always been changed on my device. Somebody else has control of focus on my device and they make sure that everything is shared across devices and this is always on and I have to go and turn it off all the time. A lot of the time I don’t get my calls and notifications of my calls because focus has been switched on by somebody else remotely on my device. Please could you disable this feature Apple.

-       FACE ID & PASSCODE:- this area of the phone is always been tampered with.. I noticed that I have little control of locking my device and the features with in the face ID and passcode feature. I cannot turn on accessories and it also wants to link everything to my iCloud account and I don’t want anything linked to my iCloud account because I keep getting hacked and someone takes over my device through my iCloud account.

-       PASSCODE TO SIGN IN TO APPLE:- I noticed when I sign into iCloud I can sign in on safari which is my passcode. Sometimes it asked me for my passcode and it won’t accept my passcode and it won’t sign me in. The other thing is I think this is a weak area of security, because if somebody is shattering your device or mirror in it, then they can get into your advice and your iCloud account this way.

-       PRIVACY & SECURITY – I noticed that many parts of privacy and security or taken control of by somebody else who has control of my device again. What they like to do is turn on find my iPhone fitness and various other parts of the device, including share my location and allsorts of other parts, which I do not have control of. I keep going to this section and re-visiting and turning everything off with somebody else keeps turning it all back on again. And I’m really tired of it. Please can you disable this feature and somehow put a passcode on this. Maybe it could be something in screen time. I noticed that you can’t modify In the settings of the device, when you have got screen time on and the screen time is to protect you from someone hacking you, so you’ve got to keep going and switching this feature walls in order for you to have control of your device in another section, which again I think it’s a security flaw. When I am inside this section under find my iPhone, my location, and my device is always for an old name of my device and not for the current name of my device and somehow my phone is not connecting with the features that I am updating.

-       LOCAL NETWORK :- Quite often and the local network. I’ve got 17 known local networks but I can’t see what they are and this I know he’s part of what they do when they hack my device. And it’s very hard to get this switched off. I have to reset my device constantly.

-       SAFETY CHECK – when I try and do the emergency reset, I can’t reset anything because my phone won’t stop sharing my information with fitness home and notes and maths and camera and various other things including Siri. When I trying to manage sharing and access then I also have problems because I can’t obtain the information in order for it to secure the device because they can’t connect to the server or whatever else. The other thing that I think is a weakness in all of this is that I have to be signed into an iCloud account in order to use this feature. It would be nice if you could secure your device without having to be signed into an iCloud account which could be hacked and synchronised and shared with all of your information about find your iPhone and your fitness, your location, maps, camera, photos, focus, and calendar and all of the other ones that they use to track me and monitor me and hack my phone.

-       ANALYTICS & IMPROVEMENTS :- I think that when my analytics are conducted on my device, they are not being sent through to the Apple because I can read code and I can tell you that through reading the analytics I can tell that my phone has got modifications that have been inserted remotely through a local connection, which I cannot see and it’s connecting to my device and changing all of the settings on my phone.

-       LOCKDOWN MODE:- In order to use my device I have to have it in lockdown mode all the time. And what I notice is I can’t do certain things like use safari and upload videos for God FM. I have to switch this off and they get into my device while I’m doing that, and it means I can’t do the work of the Lord.

-       GAME CENTRE:- I’m always signed into GameCenter. I cannot sign out because the little twirly thing won’t stop twirling in the middle. Very frustrating indeed. I believe everything is done through gaming and it’s very frustrating. Please could you remove GameCenter from my device. Thank you

APPS:-

-        APP STORE:- I noticed that App Store is automatically said to download and only ask as it is over 200 MB. And I keep having to change the setting because somebody else is downloading apps and modifying my phone in the background. I’m not signed into iCloud and I’m not signed into the App Store and I don’t want to download any apps at the moment. But my phone is doing it anyway.

-       CALENDER - Even though I have removed calendar from my phone, I’ve still got it showing as an app and it’s got reminders and allsorts of things even though I have to go and switch it all off every time but repeatedly all the time go through my phone because it won’t function and then I have to go and find out why and it’s usually calendars focus or notifications or downloading apps on the App Store without me knowing about it and it won’t download and he won’t upload my phone won’t work properly and I can’t sign into my iCloud and my phone just won’t work properly. I really would like to be able to remove calendars from my device, and in fact I’d like to be able to remove all of the apps that come when you set the phone up I’d like to be able to download them myself if I want them I don’t want them automatically on my phone because somebody’s hacking me through the standard apps that you have. Thank you

-       CONTACTS:- If I am not signed into iCloud and I save any contacts on my device then when I sign into an iCloud account I lose all my contacts after I sign out of it. So basically I can’t sign into iCloud and have contacts on my device. I can’t keep any contacts or synchronise anything to do with contacts because somebody keeps uploading contacts that I have from 15 years ago of people who are dead. So the people are doing this know me very well. Thank you

-       EMAIL :- If you are signed into iCloud, then your email automatically synchronise to the email account of the iCloud account and this is how I believe they also get into my account. So I dare not use the email on the Apple device and I download hey separate app that I know, can’t be modified and hope that I can use that instead.

-       FACETIME:- Even though I’m not signed into iCloud and I’m not signed into the Apple Store and I have gone and changed FaceTime to switch it off. It keeps switching on by its self. Really frustrating. Please could you disable this.

-       FIND MY IPHONE:- Even though I have switched off, find my iPhone and I’m not signed into iCloud this part of the device like to do its own thing and switch on as well. I have purposely remove the app, but for some reason the functionality of the app that I have removed is still functioning in my device. Is there a way we can make sure that if we remove a app that the function of it ceases to operate and that we have control of our devices please.

-       FITNESS:- This app I have removed and I don’t want it on my device and I have removed it because I don’t want it but it is still showing up as an app on my mobile phone just like all the other apps that I have removed. They are still operating in the background. And somebody likes to keep track of me through fitness and focus and work out when I’m sleeping and also make sure I don’t get my phone calls and things like this all through fitness and home and all the other apps I’ve had to try and remove, but still operate in the background.

-       HOME:- The whole map is something I really hate. I have removed it from my device but it still shows up on my device and when I try and do the safety check the home app is still running on my phone. I’m not signed into an iCloud account and I’ve disabled everything to do with iCloud on my iCloud account that the home app is still operating. And you can control everything in your house through the home app and I’m very old-fashioned and I don’t want the person who is hacking me do you have control of all of my appliances in my home, including my lighting, my washing machine, my cooker, my fridge, my audio equipment, my TV, my Wi-Fi or anything else. I really don’t want this on my phone and I want to be able to control this part of my phone please. Is it possible we could disable this and delete it as a feature from the iPhone unless you wanted of course and then you could download it. Is there a way we can permanently disable certain features like the home app and the fitness app from operating on a device

-       MAPS :- I have found it I don’t really use maps but maps likes to share my estimated time of arrival my ETA and it’s Got allsorts of extra things on it which I keep having to switch off because I don’t want to know about the air quality or weather conditions. I don’t want to rate photos or have rating suggestions on photos. I only want to use this app to find my way somewhere. I’d like to be able to have control of this app. Even if I remove this app and I am not signed into iCloud. Somebody else has control of maps on my device.

-       MESSAGES:- even though I am signed out of iCloud and the App Store, my iPhone likes to synchronise everything to messages with focus Siri notifications of extreme alerts and connect up to iMessage and also connect up with various apps that connect through iMessage including the audio Bible and TikTok. So again every day I have to go through my device and switch all of this off. I don’t want to share contact photos with anybody that I text in a message because it cost money to send photos and I believe that you can share your location through photos. I also don’t like the feature about mentions and notify me when I might be mentioned in a conversation because this seems like somebody is monitoring me and I don’t want this on my device. Thank you. Please could you disable this and just have normal text messages and if you want iMessage then you need to be signed in in order for iMessage to work. Every time I switch on my phone, it asked me if I’d like to sign into iMessage or that I can’t send messages any much longer Sign into iCloud and then I might get charged for sending messages and things like this. Please could you separate these things so that iMessage is a feature that you have to switch on in order for it to be operating in the background of your device. Because I hate iMessage. Because anybody who was signed into my iCloud and has hacked, my phone can read all my messages and these are automatically uploaded and downloaded to iCloud and controlled by the person who has control of my iCloud account and they then change the number around and can read any messages for any of the devices. Please help me thank you. NOTES:- I really used to love notes, but now I hate the notes feature in the notes in general. I don’t use at all. The reason for this is because somebody gets access to all my notes through iCloud which I’m not signed into. Things like mention notifications is always on and suggesting app links et cetera and converting to tag. All of these things are just so much of a excessive unnecessary part of notes that somebody else gets in through all of this and reads all my notes. So it would Be nice if we could control this app as well.

-       PHONE- there’s so much about this particular section under the notifications. We’ve got extreme alerts which is always going on. Often my number does not display on my device either. Often my incoming calls are silenced and it says announce calls never. This is because somebody else has got control of my device and so that way I won’t get notified if I get any calls. I noticed that share my name and photo is often on Wi-Fi calling is often on call recording is always on And I always have to go and switch it off. And the worst part about this one is at the bottom we’ve got DialAssist and somehow they get control of my device when this is on so I always have to go and switch it off.

-       REMINDERS:- Even though I’m not signed into iCloud or the App Store and I have disabled this and deleted the app. The features of the Apple still running in the background and always switching on and I always have to come and switch this part of my phone off all the time and I find it really frustrating. It would be really nice if we remove the app for the functionality of the app to also stopped functioning in the background and for us to have a choice about the weather. This is running on her phone.

-       SAFARI:- this is another app I have stopped using. The reason for this is because it has shared across devices so that whatever I look at on the Internet, I just recorded by my stalker who hacks my iCloud and synchronise my phone to an iCloud account. I’m not signed into and gets all my text messages through iMessage and focus. It would be nice if I could have control of what is happening when I’m switching things on the Internet because also I believe that my passwords are also being recorded by my hacker.

-       SUPPORT – I also noticed that when I download this app and I want to take control of my device or sign into another device for an iCloud account after Nicola asked for the pilot passcode and the passcode will be displayed without numbers without the keypad and the passcode I need to put in is for the numbers keypad and so therefore I cannot sign into that account. Even with the device I’m using because my passcode is not going to work on my device for this app. So I have problems with this app. Because somebody else has taken control of any app that I download onto my device.

-       TRANSLATE:- Even though I’m not signed into iCloud and I’m not signed into the App Store and I have removed this app. The app features are still operating in my device and I’d like to be able to have a choice about what I want is running in the background because in order to translate I have to speak to the phone and I believe absolute translate are used to record me and hack my phone.

-       WEATHER:- With the weather, I used to have problems with this app, but I don’t have any problems at the moment so it seems okay.

 

ICLOUD SETTINGS ON DEVICE:-

I generally have problems with iCloud. Because it has to be associated with the telephone number and the people who hacked me can take over any number. It doesn’t matter what number I use. They find out what the number is and then they take it over and then I found out that some card won’t work and the number has been taken over. It is the same actually with Gmail or anything. When I go and change all the settings so that nothing on my device is shared with my iCloud account. Then when I sign back in again later, everything is set to synchronise. I can’t switch off certain things like contacts, unless I switch off screen time passcode, and the whole thing about Screen Time is to protect your phone.

 

SECURITY

SCREEN TIME:- I really like screen time, but it Would be nice if you could have this set as part of the lockdown feature so that my location is not shared because I am a victim of crime and hacking and stalking. I really want to have some privacy because I don’t like being stalked it is like being raped over and over again. I want everything on my device to stay on my device and I don’t want to share it with any other devices and I don’t want it shared with the iCloud and I don’t want somebody else to be able to access my device remotely and change the settings on my device. I noticed that on this screen time feature, it also has share across devices. again, I don’t have another device that I’m sharing anything with and I don’t want this on and I wonder is there a way we can permanently disable some of these features on our devices. Can we have a anti-stalking hacking feature and can Apple design an app to scan your device to check the settings haven’t been changed at the backend of the device. Is there a way that Apple can check if two devices which have the same EMI number assigned into a device or a iCloud account and cannot not flag security. Because I have two devices with the same EMI number signing into my iCloud account. This must mean that my phone is cloned and my Sim card is also cloned. Sometimes when I’m signing into iCloud the iMessage feature is telling me that it’s an eSIM. And I don’t have any Sim. I have a physical Sim card.

I noticed that somebody can take control of my device remotely and I’m not able to operate in society. It’s the simple. I have had to abandon my businesses. I’m quite a clever lady and I am able to set up all sorts of things to stop people from hacking me, even putting in my IP address myself and changing it and changing the DNS server and hiding my Wi-Fi and changing my password for my router and giving myself really complicated passwords c Changing my passwords and changing my pass codes and it’s such a daily task for me every day. This is every second of every minute of every hour of every day that I have to go through my phone and disable all sorts of things on my device. There needs to be an app that Apple can create to do a security scan and a report back to Apple not only on the iPhone but on the iCloud associated with the device. If they are two devices with the same EMI number being used, then it needs to create a security flag and be put with the police. I have been told that I need to prove that this is happening to me. And it’s quite hard to catch a Hacker. It’s hard for me to be able to say who this could be, but I can tell you that my ex-husband Mr Jonathan Conway heart works for BT cyber security and hates my guts and he’s the only one I know who would be able to do this. And I also know that he would go to whatever levels are necessary to destroy my life and get in touch with people to participate in this hacking and destruction of my life. I will be sending this report to the police and also to Apple and anyone else, including my network providers to try and get assistance so that I can operate in society. If I don’t get any assistance, then I will be going to the government and withdrawing my birth certificate. My passport and I will be asking for a place to live where do not have to participate in the banking system or have a phone or an email because I cannot operate. I cannot. I serve God. And at the moment I’m not able to do the work of the Lord. I also know that this is happening too many many millions of people across the world. And I speak with him on a daily basis because I am a broadcast of God FM. I told people what is happening to me and the level and the capacity and the intelligence with the resources that have gone into the hacking of me, and it’s talking and the terrorising and the destruction of my life and my ability to operate in any capacity in society has been a very organised crime by gangsters criminals. Who are I believe Satanists. This can happen to anybody and we need to ask the question if I am signing into something on Google and I have to verify that I am a human being why do I need to? Very sorry I am a human being and sometimes it can take 20 minutes to go through all the different images to verify that I am human when I must ask the question why do I need to verify I am human. Do you have some non-human individuals running around that you need to identify or is it a case of working out who is human in the world. What is going on.

 

SECURITY:- I feel there is very little security that I can use to secure my device. Any device that I have to sign in with an iCloud account is vulnerable to being hacked. So I try and sign out of iCloud. It would be nice if Apple could come up with a security app that could modify and update the device that would be connected through the support app that it could do a scan on the device to make sure it is the device that is actually signing in to iCloud and not a duplicate of the device. It would also be nice if Apple had a flagging system for duplicate devices of cloned phones. Because there must be several clones of my devices that are signing into my Apple account. There should be a way to check whether the EMI number is correct on the device and also to do a remote scan through Apple and clearing cache, and all other bits of information that are slowing the device down and stopping it from operating and stopping hackers some way or other. It would be nice if Apple could come up with a app that resets the phone with additional security features so that it is in a similar mode to lock down and that you can disable iCloud and disable App Store and disable apps from running in the background. It would be nice if Apple could come up with a program that scanned all apps that have been put on the device including template preinstalled apps that come with Apple when you set up your device. It would be nice if Apple had a lock down type of feature when you set up your device so that it is automatically set to download these apps whether they are connected to the Internet or not and whether they are signed into iCloud or not. It would be nice if these were templated onto your device and set is pre-installed applications that are automatically downloaded with security features. That means that nobody could modify any of these preinstalled apps or get into your device through networking Wi-Fi DNS, IPV6/4 Or Bluetooth or anything else. It would be nice if we had the ability to change certain features on our device so that our EMI number is not so accessible to hackers and our IP address could be modified and I’ll connectivity to the local 4G and 5G network on Sim cards could be adapted and secured and modified so that a person looking for your device and your IP address for your device could not obtain that information very easily. It would be nice if Apple did a security app. I’m sure people would pay for a security app. I’m sure Apple could quite happily make quite a lot of money by creating a security app that was an additional purchase for additional security and you could call it anti-hacking and anti-stalking and you could have this as an app that you recommend to put on your device that would secure your device to stop people getting into your device. I’ll be more than happy to pay over £100 for a security app on my device. If it would mean that I could use my device and have control of it. Just to give you an idea I would happily pay a monthly subscription option as well. There is definitely a window of opportunity for Apple to make money and secure devices from hackers. Apple has an amazing name and reputation for having secure devices. It would be nice if I could continue using an iPhone and feel comfortable and safe and confident that my iPhone is not doing things in the background that I don’t want to do. It would be nice if Apple offered a guarantee that there phones were not Hackable. Have a nice day God bless you.—— also, it’s worth noting that while I’m doing this report, I’m trying to upload the backend of Apples analytics to Apple and I have two devices so I’m trying to email the documents from one device to another device so that I can upload this information to Apple because it is all about evidence. But what I have found the only way I can use my phone and connect to the Internet used to phone somebody at the same time as using my Internet. Because otherwise my phone will not connect to the Internet. And also when I send emails, there is something blocking my ability to send emails and attachments. There seems to be also a piggy in the middle on my telephone for my phone calls and my text messages and any app and also the Internet on the outside world and sending and receiving emails and verification code in general.

APPLE TV

APPLE END

 

WIFI FIXED INTERNET PROVIDER

I do not use Wi-Fi. I cannot use Wi-Fi even if it is a hidden Wi-Fi because as soon as I do I Hacked.  I, very recently Had Internet installed at my house, three good FM as a corporate entity. My network providers are very professional and they control my router remotely. My router when it arrived was locked away and only assembled and connected one so I had fitted a box which is lockable to the wall for the router to go into so that no one could access my router and no one could access my Wi-Fi password and this was my way of making sure that nobody could get into anything that I use the Wi-Fi for. For the first day, this was very good, but then after awhile I noticed that when I use my Wi-Fi my phones with playoffs so I would disconnect from my Wi-Fi and just use the telephone network Internet for my mobile. What would happen is I would switch off the Wi-Fi on the wall and my phone would still be connected to the Wi-Fi. Even though I had unplugged the telephone cable and switched it off at the wall and sometimes that this would happen for up to 5 minutes or 10 minutes. And it was at this time that I realised that somebody somehow had a duplicate of my WiFi. The 192,168.1.one has actually got two of those which means there’s a gateway between my router in the outside world. IPV six and IPV for operate on, 192.00.00.02 and my phone is connecting to this all the time. This is not an Internet. This is a intranet. This is a very local network. I believe that my phone is connecting up to a duplicate network. Whether this piece through Wi-Fi or through my telephone network provider for my mobile. As I say nobody has had access to my router and no one has had access to my telephone. No one should have the ability to know my passwords. Nobody should know my iCloud account name or the telephone number that I use for it, but somehow they do and they duplicate my phone and I keep having to buy new phones and this is very tiring. The evidence I have for this is quite substantial. I have several devices that are signing into my banking. There are four phones that I have sold. This should not happen. I feel like I live in a hostel where my Wi-Fi is being shared with druggie type people. I’m quite a private person, so I don’t really discuss my private affairs with anybody and I like it that way, but at the moment I’ve got no privacy and no ability to contact business when I’ve got other people accessing everything I do.

 

NETWORK PROVIDERS

EE – I recently took out a contract for my main number 07773577788. I keep having to get new Sim cards because my phone won’t work and I don’t get the phone calls and my Sim card says that it’s not recognised and people phone me and they can’t get hold of me and I don’t get text messages. I have problems using the Internet and I can’t operate any device when I’m using this Sim card. I have been in touch with the network provider, but I’m not able to use my Sim card and I will have to pay a huge amount of money to exit the contract because even though it’s a Sim only contract I have to pay about £500 to exit the contract in order to move provider because somebody keeps changing my information as well at EE offices. Several times I’ve been down to try and get a new Sim card when it wouldn’t work only to find that they won’t give me a Sim card because my information has been changed on their data system and now my name is reading incorrectly said they cannot give me my Sim card.

-        just recently, I tried to do an update on my device with the Sim card and it has data and it wouldn’t connect to the Internet and I couldn’t update my phone. But luckily I have another Sim card with some credit on it with a different provider and I was able to update it this way with the other Sim card. But basically in order to operate my business. I need to be able to connect to the Internet and I need to be able to connect to the Internet without being hacked and without connecting up to a fake telephone mast and without connecting up to a fake Wi-Fi. Because there’s no other way that someone is able to obtain all of my information to help me.

-        Because of the problems I’ve had with my main number. I did change my number and got another number and this helped for a little while but now I can’t use that number either and I also got another number which I changed to and now I can’t use that number either, because when I put the Sim card in to get a text message I don’t get text messages and when I phone myself on it, I don’t get phone calls and the Sim cards are not recognised and they do the same thing as the other Sim card. And it doesn’t matter which network provider I am with, they all do the same thing over and over and I have a problem with any telephone number. If I move network provider for my Sim cards, I normally get about two weeks of peace and quiet with nobody is getting into my emails. Which is really nice but then once that has come to an end then everything gets hacked again and I keep having to buy new phones wipe devices.

 

TV

I do have a smart TV. But it is hardwired. But still someone is able to access my TV and modify all the settings. They seem to have control of any Bluetooth speakers and the volume and they change all the settings. I noticed that I have problems with aerials also, so that is very tricky and that’s one of the reasons I have a smart TV.

 

SPEAKERS

I do have Bluetooth speakers which I use for the audio equipment for GOD FM. And I noticed that I have problems with my Bluetooth because when I use them sometimes they won’t work properly and because my phone keeps switching on Bluetooth and everything is easily so easily transferred from one device to another through Bluetooth. I have had problems with Bluetooth. I noticed if I use an iPhone to connect to one of my Bluetooth speakers, then I have problems with that iPhone and I’ve got to reset all sorts of settings and change passwords because somebody gets in it through Bluetooth.

 

AERIALS

Aerials Are also a problem. In my old house I had an old-fashioned TV and it was just plugged into the standard aerial that is provided in the wall.

 

And I was not able to control my TV with my remote. I couldn’t change channels and I couldn’t raise the volume or decrease the volume on the TV. And sometimes I have problems with my TV at this house with a controller where I can’t use the control and I have to switch the TV off and on again and things like this. Anyway, it’s not easy.

 

 

 

 

 

 

 

 

 

Bible study 

27 October 2021

Galatians 5 & 6 

 

Freedom in Christ

It is for freedom that Christ has set us free.(A) Stand firm,(B) then, and do not let yourselves be burdened again by a yoke of slavery.(C)

2 Mark my words! I, Paul, tell you that if you let yourselves be circumcised,(DChrist will be of no value to you at all. 3 Again I declare to every man who lets himself be circumcised that he is obligated to obey the whole law.(E) 4 You who are trying to be justified by the law(F) have been alienated from Christ; you have fallen away from grace.(G) 5 For through the Spirit we eagerly await by faith the righteousness for which we hope.(H) 6 For in Christ Jesus(I) neither circumcision nor uncircumcision has any value.(J) The only thing that counts is faith expressing itself through love.(K)

7 You were running a good race.(L) Who cut in on you(M) to keep you from obeying the truth? 8 That kind of persuasion does not come from the one who calls you.(N) 9 “A little yeast works through the whole batch of dough.”(O) 10 I am confident(P) in the Lord that you will take no other view.(Q) The one who is throwing you into confusion,(R) whoever that may be, will have to pay the penalty. 11 Brothers and sisters, if I am still preaching circumcision, why am I still being persecuted?(S) In that case the offense (T) of the cross has been abolished. 12 As for those agitators,(U) I wish they would go the whole way and emasculate themselves!

Life by the Spirit

13 You, my brothers and sisters, were called to be free.(V) But do not use your freedom to indulge the flesh[a];(W) rather, serve one another(X) humbly in love. 14 For the entire law is fulfilled in keeping this one command: “Love your neighbour as yourself.”[b](Y) 15 If you bite and devour each other, watch out or you will be destroyed by each other.

16 So I say, walk by the Spirit,(Z) and you will not gratify the desires of the flesh.(AA) 17 For the flesh desires what is contrary to the Spirit, and the Spirit what is contrary to the flesh.(AB) They are in conflict with each other, so that you are not to do whatever[c] you want.(AC) 18 But if you are led by the Spirit,(AD) you are not under the law.(AE)

19 The acts of the flesh are obvious: sexual immorality,(AF) impurity and debauchery; 20 idolatry and witchcraft; hatred, discord, jealousy, fits of rage, selfish ambition, dissensions, factions 21 and envy; drunkenness, orgies, and the like.(AG) I warn you, as I did before, that those who live like this will not inherit the kingdom of God.(AH)

22 But the fruit(AI) of the Spirit is love,(AJ) joy, peace,(AK) forbearance, kindness, goodness, faithfulness, 23 gentleness and self-control.(AL) Against such things there is no law.(AM) 24 Those who belong to Christ Jesus have crucified the flesh(AN) with its passions and desires.(AO) 25 Since we live by the Spirit,(AP) let us keep in step with the Spirit. 26 Let us not become conceited,(AQ) provoking and envying each other.

 

 

 

 

 

 

 





Bible study 

27 October 2021

Galatians 5 & 6 

 

Doing Good to All

6 Brothers and sisters, if someone is caught in a sin, you who live by the Spirit(A) should restore(B) that person gently. But watch yourselves, or you also may be tempted. 2 Carry each other’s burdens, and in this way you will fulfill the law of Christ.(C) 3 If anyone thinks they are something(D) when they are not, they deceive themselves.(E) 4 Each one should test their own actions. Then they can take pride in themselves alone,(F) without comparing themselves to someone else,(G) 5 for each one should carry their own load.(H) 6 Nevertheless, the one who receives instruction in the word should share all good things with their instructor.(I)

7 Do not be deceived:(JGod cannot be mocked. A man reaps what he sows.(K) 8 Whoever sows to please their flesh,(L) from the flesh will reap destruction;(M) whoever sows to please the Spirit, from the Spirit will reap eternal life.(N) 9 Let us not become weary in doing good,(O) for at the proper time we will reap a harvest if we do not give up.(P) 10 Therefore, as we have opportunity, let us do good(Q) to all people, especially to those who belong to the family(R) of believers.

Not Circumcision but the New Creation

11 See what large letters I use as I write to you with my own hand!(S)

12 Those who want to impress people by means of the flesh(T) are trying to compel you to be circumcised.(U) The only reason they do this is to avoid being persecuted(V) for the cross of Christ. 13 Not even those who are circumcised keep the law,(W) yet they want you to be circumcised that they may boast about your circumcision in the flesh.(X) 14 May I never boast except in the cross of our Lord Jesus Christ,(Ythrough which[a] the world has been crucified to me, and I to the world.(Z) 15 Neither circumcision nor uncircumcision means anything;(AAwhat counts is the new creation.(AB) 16 Peace and mercy to all who follow this rule—to[b] the Israel of God.

17 From now on, let no one cause me trouble, for I bear on my body the marks(AC) of Jesus.

18 The grace of our Lord Jesus Christ(AD) be with your spirit,(AE) brothers and sisters. Amen

 






.














RADIATION

I’d also like to report Radiation that is present in my home and very dangerous. I am getting readings for lights that are not powered on on the main fuse box of 500 and 600. I’m getting readings from my TV of 1700 and 1800. I get readings from my mobile phone of 1700 and 1900. I purchased a industrial Anti-radiation shield plug which should cover an industrial site working in a radiation environment for the workers. I have one of these plugs and it does not even touch the sides. It does a little bit when I first got it - it worked really well but now it doesn’t do anything at all. I noticed also from my boiler when my boiler is not switched on, even with the fuse taken out I am getting readings of 700 & 800 from my boiler. I stopped running my boiler until I need a bath and then I will run it if I need the hot water I won’t run the heating or anything now because I get such a headache from the boiler. I noticed I don’t get headaches as badly when I don’t run the boiler. I have the same problem, actually with the washing machine and the fridge and I don’t plug them into the usual plug sockets because if I do the radiation levels are so excessive they’re dangerous. I also have something burning my bum under my bed that makes blisters on my bum. I have checked underneath from the lounge on the ceiling and I’m getting radiation levels of 700 800 from under my bed when I do not have any electricity running under my bed or any plug sockets running in my bedroom. I do have a plug socket next to my bed which doesn’t work and it is my thinking somehow it is connected with the washing machine plug socket because when my bum is burning when I come downstairs and I check the plug socket for the washing machine the radiation levels are 1700 on the EMF detector. And then we have another plug socket in the lounge that doesn’t work and it’s from that area upstairs that I get really bad headaches and I get nauseous in my own home I feel unwell with headaches and racing heart problems, breathing problems with my eyes and flashing in my eyes All the symptoms of radiation. I don’t have anyone around me that has a 5G transmitter unless there is one in the drains because I have noticed that when I turn off the water, my radiation subsides in the home substantially from 100% down to 5%. So it’s got to be connected somehow with the water. Because I’ve had these, headaches and nausea and reactions burning blisters on my bum I have put shielding up in my home to try and alleviate what appears to be a reaction to smart meters and 5G and electricity that I am not able to be around it. At first I thought it’s me but I don’t think it’s me anymore I think due to the fact that I have now got an EMF detector And I am able to go around and assess for myself the EMF levels I am now able to tell you that the reason I am unwell and struggling with electricity and washing machines and fridges and cookers and boilers and things like this even if they’re not plugged in they are admitting a EMF reading which I have taken photographs of and videos. I will have to seek assistance in this because radiation is dangerous and it can be used as a weapon to hurt someone because it is an invisible weapon. If you are going to use a weapon of radiation against somebody you should have a license. There is something strange going on with my water. I am getting urine smells from the dripping water in the shed outside. I can often smell dog in my water when I bath. And I sometimes have fleas in the bathroom and I thought this might be due to the seagulls, but I don’t know where they come from but it seems that maybe they were connected with the outside shed and the roof. In my house up my stairs the wall that faces outside next to the shed outside the dampness is so severe that the wall is wet still even after having a new roof fitted. I have got antique books which have rotted and I have had to take them off the wall. Due to mould. I don’t know if you’re aware but mould and radiation come together. If you have radiation in your house, mould comes with it and so does decay of anything living and nonliving. Items of jewelry become rusty knives and forks and appliances become rusty and everything is wet all the time and it’s very hard to dry out the property. In my case it’s also very hard to keep the property clean because radiation attracts flies and dirt as well. I’m not a dirty person, but I spend a lot of time having to clean more than is Normal to keep a tiny little one bedroom house clean. This is due to radiation as far as I’m concerned. I do not think it is a coincidence that I am being hacked and I’m also suffering from EMF attack. I don’t think the two are in anyway a coincidence This is because the two go hand-in-hand. I noticed my neighbours Wi-Fi is stronger in my house & at my front door then my own Wi-Fi and I can’t use my Wi-Fi. I can’t upload anything. I get duplicate 192.168.1.1 I get duplicate DNS service I get duplicate Submnet masks and I found that all my calls that I make through my VoiceOver Internet protocol telephone app for my Business God FM are all rerouted through to my mobile number as voicemail. I don’t think this is a coincidence either. But my health is important to me and I wish to have someone look at this. Also, something is biting me severely to cause blisters. I have photos and videos of these blisters and bites and I don’t think that this is a coincidence either. I want to have somebody look at my water. I will take samples and I want to assess the water and see what is inside it because it is affecting me to drink it and to bath in it and I think something in the water is biting me.That is my thoughts on this matter which I will take to all the appropriate people to try and get some assistance.


—————————————-


Hacked stalked?


Are you a victim of being hacked? Do you feel like you are being followed? Do you have a racing heart? When you sleep? Do your ears ring? Do you get itchy feet? And do you get really bad headaches? Do you get an aching back and shoulders? do you get an aching bum which feels like it’s being cooked from the inside out? Do you gently feel really tired where you would normally manage on eight hours sleep now? You need 12 to 18 hours sleep to get any rest. When you wake up in the morning, does it feel like you’ve been carrying a bus around all night? If this is a yes to any of this then it is possible that you are also being stalked and hacked.



Are you having problems connecting to the Internet? Does your phone keep disconnecting from apps to your app? Slow right down and you find that they just won’t connect. Do you find that people can’t get hold of you on your telephone number and when you dial out to your phone calls drop do you ever get squealing on your phone calls? Do you have problems with iMessage signing in and out of it and sending messages via it. Does your password not work? Do people say they can’t get hold of you. Do you have it where you have messages sent to you which you don’t receive for four or five days?




Do you feel that people are repeating conversations people that you don’t know? Seem to know a lot about you? Do you find that your friends behave strangely around you and pick up their phone and start looking around like that? Up to something strange. Do you get really bad headaches from your bathroom? Does your boiler give you very bad headaches. Do you have problems with your fridge and your TV and your washing machine. Do you get headaches? Do you find that you can’t control your TV and that your TV controller won’t raise the volume or change channels for you?


 And your washing machine. Do you get headaches? Do you find that you can’t control your TV and that your TV controller won’t raise the volume or change channels for you?


Has your phone battery get flat really quickly? Does your phone get very hot? 


Did you have a hard childhood? Do you feel like you can’t trust anyone? Do you feel like you are rejected by the churches? Do you feel like you never fitted in in the world and you might be like me?


Did you have a hard childhood? Do you feel like you can’t trust anyone? Do you feel like you are rejected by the churches? Do you feel like you never fitted in in the world and you might be like me?


Have you noticed when you go to bed that it seems like there’s very bright lights up against your house at night? Do you know about lights and radiation and LED and how it all works? Because with the right equipment somebody can point a light at your house and activate all sorts of things inside it with the technology that we now have. 


If you want to talk more and you feel like this might be happening to then we offer support at God FM. Please contact me on WhatsApp +4407773577788 or contact me admin@God FM.org.uk. 

——————————


 WHO IS STALKING YOU

It is my wish to see how many other people are stalked by the same people that I am being stalked by.

The people I know are involved in the stalking of my life are the following people Mr Brian Harris of Vernon Court Torquay, Mr Dean don’t know the surname of Vernon CourtTorquay, they seem to run holiday apartments and they are very keen to have cameras everywhere and Wi-Fi and Bluetooth and very bright lights outside and they modify the water and put nano in the water and modify the drains. They work with a man who has a van with the word pink written all over it in pink.

Torquay, they seem to run holiday apartments and they are very keen to have cameras everywhere and Wi-Fi and Bluetooth and very bright lights outside and they modify the water and put nano in the water and modify the drains.

The other person involved is a guy from pink. He drives a van with pink written on it and also there’s a gentleman from Apex construction as well as Roman and many other including Aqua gas that I have seen. Some of these people may only have been doing work for the people involved, but I have recognise them on a daily basis at my property climbing on my roof & in my loft. Some of these people even moved in below me and appeared. They were doing work day and night. 24 hours a day with this operation. Lots of Electrician’s plumbers drain experts. And the reason I say it is strange is because these people would turn up at 8 o’clock or 6 o’clock on a Friday night and work right through to 11 12 o’clock at night and do the same the following night all through the weekend every weekend just about doing things downstairs upstairs next door it was just all the time with scaffolding everywhere All around my property. The hinges were missing from my windows, et cetera et cetera et cetera. It’s a highly organised group of people and there appears to be a little computer guy who dries around in a smart car or a Renault. A little blue/silver smarter and a silver bluish Renault. If you are a victim of stalking and you recognise any of these names and people then I urge you to contact me so that we can build a legal case against the criminals doing this. You can reach me on WhatsApp +4407773577788 and you can also ring me on 01803 500 888. 500 444. You can also email me admin@godfm.org.uk. 

I don’t think that this sort of crime should be allowed and if the police are going to turn a blind eye, then I want to find out who the other victims are in the town round up as many people as possible and help you and then have these people arrested put in jail and also sue them for financial damages.

There are some other names that may also appear in your life when this happens and I’m going to list those names as well: –

Daniel Hobin

Jonathan Hart BT cyber security

Cornelious Pieterse

Ian Murray

Gary Hodges.

David Watts

A Muslim man called Mo.

A South African called McIntosh.

Reese Anderson and his brother Michael

A Polish man called Damien.

A Polish man called Damien.

A Polish lady called Dita

A South African guy called Theo

Michael Halton

Luke Irons

Joe

Kia Docherty

Den - gardener old man

Brad

Amazon vans - lots of white vans and a plumbing company usually there’s plumbing companies and roofers and scaffolder who have to move into the area when this goes on so that they can rig up whatever they rig up so if you’ve had all of this and suddenly you’re being hacked then there’s no accident and this isn’t a coincidence so I want you to have a good old look through what I have said and contact me with anything you’ve got for the local area in Torquay. But you can do this in your own local area and you can get me to do a website for your local town as well if you like and I will. 

The other thing I’ve noticed is that there’s a correlation between the group of people and drug dealers as well as a correlation between these people and solar companies. I’ve also seen vehicles from the monarchy as well when all of this was going on and I want to include that in my notes here today.

Concentrate- And think about whether any of these names mean anything to you?

If any of these names appear when things are happening then there’s probably a connection I would think.

I’ve also noticed a lot of old men involved in this and also recruiting of neighbours by the senior kingpin organisers of the gang stalking. What they tend to do is they farm out work to individuals and usually they will link it to people you know. Because they have a copy of everything on your phone. What they do is a clone on your phone and clone your SIM card and then take over any email address and they also set up FAKE telephone masts as well as duplicating your Wi-Fi and also putting a gateway between your Internet and the outside world so that you’re completely isolated. It’s a highly organised gang and they are part of the masons and also a lot of these are cult/Satan worshippers and they get enjoyment out of causing suffering to people.

Have a wonderful day God bless you

DONT BE A VICTEM :- FIGHT BACK AGAINST STALKING! 

 

Ayesha Hart

GOD FM

www.godfm.org.uk

admin@godfm.org.uk

+4407773577788


————————-

NEIGHBOURS

In my gangstalking experience what I’ve come to realise is that the people that have decided to come after me have recruited my neighbours into this whole destruction of my life. So they set up Pegasus and stingray so that they infuse into my phone all sorts of malware which then records all my keystrokes my passwords they have a duplicate telephone mask and they also have a duplicate Wi-Fi 192.168.one.one and I know this cause I’ve done wire shock and then what they do is they do modifications to the actual application of the phone itself so that the phone is actually set up to be a torture device with a brain interface which they build into the main framework of the Apple Operating system. And then would they like to do is then they will send in people to live in the shed next door to climb on your roof to metal with all your plumbing so if you’ve got a central heating system running through a boiler, then they’re going to temper with a wiring so that they can connect to it and they will put a Bluetooth device inside the boiler so that they can switch it on And then they will link everything through the plumbing with nano water so that this is activated through lights and laser, which will torture you because you’re made of water. In my case, I’ve got a young boy who lives in the shed next door who I just happened to pass just now and this little boy also used to live at my old property in the holiday apartment below me. So I know that this is the same boy and his father or brother together they run Apex construction and they have been hired specifically for the task of hacking torturing and setting up all the devices which include but are not limited to Adding additional nano to the water digging up the drains and putting things in the drains which become transmitters of some current. Messing with your wiring and also they will break into your home as well and hire your other neighbours to watch stalk and participate in the destruction of your life. How do they get the neighbours to participate in the destruction of your life. Well the easy way is that they tell the residence around you that they are from MI5 or government and they want some extra support from the neighbours to keep an eye on the person who lives at this property. We want to monitor them because we see them as a threat to society, et cetera. They will tell lies and tell them all sorts of gossip or whatever and they will actively encourage the tenants around you or residence around you to participate in keeping a log of when you get up when you go to the toilet when you go out when you go in when you go to sleep and when you’re connecting to your Internet, you’re not really connecting to your Internet. You’re connecting up to the gang stalking website Internet which is now connected you to this sort of HiveMind interface which is operated through Wi-Fi and lights and Bluetooth. And they use those same devices to emit frequencies especially speakers and TVs to cause the pain and torture you. You are made of water and you are affected by frequencies. You can clean jewelry with frequencies and you can also cook somebody inside their bed through the wall with the frequencies that they are using through Garay and all of the other things, including laser and all sorts of other operating systems with technology that we don’t even know exists. So the neighbours will be asked to put on this light and put on this fan this liquid this vacuum machine so they can synchronise everything in your house including fire alarms if they’re all linked to the main building and lights of the main building will also be synchronised because they aren’t allowed the Wi-Fi and they also emit a sound a frequency which can cook your brain inside your skull. These are the same wavelength as microwaves and they operate through 5G And 60 G with the government’s initiative that they have put in place with the neighbourhood gang stalking which is operated through the neighbourhood watch. So you could say that the neighbourhood watch is actually the neighbourhood gang stalking community. And as things go on more and more people are hired in to participate in the destruction of your life. This also includes but he’s not limited to witchcraft and wizardry where they will sacrifice little babies in the fire as well as little animals and they will do rituals And use magic mirrors and magic birds to stalk monitor and watch you so that they are one step ahead and they can also transport themselves through magic mirrors, witchcraft birds and also TVs. So in my case I have a television which if I put the television on it means that my neighbour who lives in the little shed next door has made some modifications to the plumbing under my home and next to my home to my water supply and various other things including the lighting of the main building the door entry system the fire alarms And various other things, including the Internet for the main building and anybody else who lives in the building as well, their Wi-Fi and Internet will also be used to triangulate where you are and connect all the devices up for your torture. The worst times are the weekends in the evenings of course When people are off work and they are paid to do this. School holidays are even worse than any other time because the people who do this are training their children how to also commit evil act because they’ve got to have someone else doing it as well. If you are a preacher like me then you are protected by the Lord. But if they hire their 11-year-old little boy or you know whatever else child to break into your home or find a way in then This allows witchcraft into your house because children are innocent. Now what I have found is that there? Are people who actively participate in this for financial reward and then there are people who are mind controlled through the nano in the water and various other things and this is like a mind control that is a hypnosis that is taking place across the world. There are millions of victims of gang stalking around the world. You might know that the world economic forum have told you that they actually want to annihilate the human race. And they want you to eat bugs and live in a 15 minute city. They also want to control what you think and what you say. They also want to have full control of everything in your life through your phone. That is why you cannot take out your battery in your phone because they want to be able to switch it on and monitor everything you do every single app that you have on your phone is to monitor everything you’re doing. The idea is they want to call down the population to 500,000,000 people on this earth. They have told you this with the Georgia guide stones but not only this. Mr Bill Gates and Klaus Schwab of the world economic forum have told you that they will vaccinate you whether you want to be vaccinated or not Through whatever means are necessary and this includes through the mosquitoes insects fleas flies insect bites of any car, including spiders or anything that they can get to bite you. They will spray the skies and they will put nano in the skies and this looks a bit like morons when you breathe in. People are being filled with parasites with their water and through the air, and then when they switch on the sewing machine connects up all of the 5G And then the people who are vaccinated or controlled by the system will actively be possessed by demonic forces, who will control everything that they do. This is a hive mind of the beast system. We have in England a population that is full of English people. But happened to recently it was English 10 years ago maybe 20 years ago but now you will find it very hard to find an English person in England. Why because the government want you to not feel safe and to not feel at home to not have a heritage and not have any security not have anyone that you can depend on and to also lose your pride in every aspect of your life because if they can disable your ability to fight back Then they have full control of you. If there is someone like me Ayeisha heart from God FM who can fight back then they come after people like me and they send a team of Satan Masons who serve the devil to recruit in the neighbours to take me down in every possible way. For example I run an estate agent I cannot run this estate agent while I’m being hacked every two seconds. Not only this I have got neighbours actively participating and watching and keeping an eye on everything I do. This is worse than you would treat a prisoner. Everything I do is tempered with so if I send an email or I’m waiting for an email like today when I was trying to do the company house returns. I couldn’t get an email from company house because these people have interfered with all my emails. Even though I have two factor authentication, they have got control of my telephone number because they have a clone of my phone a clone of my SIM card and believe it or not they have a clone of me which I have revoked authority over and asked them to destroy. But these people are so evil these people are the sort of people that would chop people up and cook them in a pot in the kitchen with this membered body parts all over the kitchen with their children there. And not only this they have got children a lot of the people who do this to me have got children And these are the sort of people who will sexually molest their own children or they will become foster parents two children who they will sexually molest. You should know about the hunting parties as well where they actively hunt people little children and drink their blood and they also do their witchcraft under the trees to summon up the Demons to cause havoc with people like me. With the witchcraft mirrors and their witchcraft birds. But they’ve done a really good job of pretending that the devil is not real so that when something like this happens there is nobody who is skilled or trained or who believes that this is possible. So what do you have is AI which is run by the devil and his Demons and they have actually taken over the world. Every large company and every large government is run by AI and then we have the faces which present themselves as the owners of those companies and as leaders of the world, but they are not the ones that control everything. So you have already an operating system that is connected with the high mind of the devil with anybody who is receive the mark of the beast and has drank the poison of the nano which connects up your mind and upload it to the cloud And controls what you think and then also delete and replace memories inside your head. This should come as no surprise to you because the government have told you this is what they’re going to do. This is also why we have 5G towers inside all of the schools all of the car parks all of the shopping centres all of the holiday centres all of the government buildings And all of the towns are limited with 5G towers in every car park which all connect with the deep underground military bases with a traffic people and they rape people they kill people and they drink peoples blood. They chop people up in the kitchen. They have become so confident with the crimes that they commit Because they have convinced the police and everybody around them that nothing is happening and so nobody is going to get caught at least this is what they think. But I serve God and I can tell you that this system is going to come down. I am the very lady that will take the system down because they have come after me while I wanted to relax and read my Bible, I was not causing any harm to anybody Because they have decided to make my life a living hell to make me wish I was never born I have decided that I will do a website for every gang stalker that I know is operating in my neighbourhood and I will make them famous. And I will raise awareness of what is happening across the world and what will happen to every single living human being every person on this earth as of now this is happening. If you want to fight back and you don’t like what I’m telling you here then you need to contact me. My number is +4407773577788. You can reach me on WhatsApp. You can also email me admin admin@godfm.org.uk please contact me if you want to fight for freedom. I want to dethrone the king of England and I want to take his throne with the laws of God. I wish to rule over the whole of the Earth as I believe I am appointed for this purpose. If you want your freedom then contact me. I have no other agenda but to set the people free. God bless you

————————————————————-


WITCH CRAFT BIRDS & MAGIC MIRRORS 

In this post I want to talk about witchcraft mirrors and witchcraft birds. If you are a targeted individual then you might notice lots of birds hanging around wherever you are and even in the middle of the night they seem to be smoking and climbing on the roof and making a big racket well this is all part of the same Organisation and they use magic mirrors and witchcraft birds in this program. So what we have is a combination of AI microwave weapons hacking and stalking monitoring we have demonic forces and we have witches and wizards. It’s like something of a horror film and it wouldn’t be believable unless you were experiencing it and hopefully Some of what I’m saying will help others who are going through it at the moment. If you have any mirrors in your house, then you need to write on the back of the mirror that your house is sanctified in the blood of Jesus and you: the courts of heaven to put any witch or wizard trying to come into your life through the mirrors into damnation to be stuck in the mirrors for eternity in the blood and in the name of Jesus. And you also need to say that any witchcraft birds stay as they are where the human form that has transformed themselves into a witchcraft bird will stay in the shape of what ever animal they have transform themselves into because they can also use other animals in their witchcraft. What you might notice is that there seems to be busier periods within the week then other times and this is because the weekends is when they really like to come out and cause havoc. By the time Monday comes they have gathered their information they’ve done all their hacking intelligence gathering and tormenting and torturing so they filled with more energy if you like because they suck the energy from you Because you are emitting energy which they don’t have naturally. I guess you could say it’s feeding on adrenic chrome but a slightly different version of it. And how do they do that well because they’re emitting frequencies? They’re disrupting your brain ways and your body connectivity with the Earth so that you are not earth and you are unbalanced and your soul cannot happily reside Inside your body because all of the circuitry has been disrupted through voltage of sound and energy waves which have been directed at you and particularly they like to target the back of the head at the top and also the front of your eyes and the middle eye on your forehead. They also like to target your heart to jumpstart it if you like and make it race when you’re trying to sleep and they also like to cook your feet and cook your private areas and also cause backache and neckache And ear ringing as well as all sorts of sensations you may get itchy feet as well and itchy hands blisters and smelly feet this is all witchcraft and energy weapons combined with technology of Bluetooth Wi-Fi and the lights along with the drains and water which has got nano technology And then you’re made of water. So if you’re a targeted individual, they would’ve been inside your house several times probably every day they’re probably in your house more often than you are if you’re working but if you’re not working, they will be on top of your house or around your house full-time. If you work from home the same they will do everything they can to make sure that you don’t get a moment peace and quiet. Because they’ll be hacking you as well so that you’re always having to reset your phone and they will use the phone as a device to emit the frequencies and to watch in store can follow you because your phone is a magic mirror and so is the TV. Your lights are also emitting a frequency sound wave which will cook your brain Because you can clean jewelry with sand waves. The lights of the new Wi-Fi and you’ve also got fire alarms and then you’ve got all your smart meters. This all connect with things like your car keys and they will also connected up with your car and any smart chip or anything that is inside your car and they will modify appliances and put Bluetooth Transmitters inside devices. They will modify all the plugs so that they are permanently live and they will have a warrior coming into your home to activate various wiring lights fire alarms plug sockets and they will also do things in the drains and underneath the property and the way they like to do everything I have just discovered is they play a particular sound vibration Which is emitted through what I think is the toilet pipe and the water pipe and this activates the nano and then the nano is woken up and they also use vibration helicopters vibrating exhausts and this is to activate the nano and things inside you but also around you to emit a frequency a sound wave to activate various things to communicate and triangulate where you are and also pulsate your brain so that your brain is overloaded with two or three different frequencies? It’s hearing so that they can’t concentrate and this cooks the brain and that’s why you get the ringing but you also get the ring around your ears in your ears because there’s usually a bite or something around your neck or around your ears where they have thrown some funny nano dust at you or something in the water has bitten you and they like to put things on the inlet water for the toilet and for all water incoming into your home particularly boilers and washing machines Because when you wash your clothes, your clothes are now going to be covered in nano technology which they can activate as I’ve already explained by emitting certain sound waves and light waves because light is also sound and Wi-Fi and this is also communicating with Bluetooth devices as well. So they create a circuit which then communicate with all the devices in your home, including you because your brain has now admitted signal back to them and then they’ve sent it back to you with new instructions for your brain is getting overloaded with confusion And it doesn’t know how to cope with all of that information because your brain is meant to be left alone and it is not really meant to be messed with by frequencies which cook your brain from the inside. So what you might find is it’s all lovely and peaceful when you go to sleep and then somebody puts a light on outside and then everything starts to happen and this is as I say because the lights emit a sound wave vibration which penetrate through walls and through your skin as well And if you don’t wear sunglasses then it can penetrate your eyes into your brain. Your eyes on the window to your soul and your soul is inside your blood. So this is a several prong attack on the blood through contamination of the water sound waves frequencies through different radiation techniques which include but are not limited to sound waves, microwave, waves and there’s another wave they do which is invisible but they do that one as well. And how can you stop it? Well you can put up mirrors to where the brightest light is coming from and face it in that direction and you’ll be sending it back to the people who are trying to radiate you. If you notice when you have a good night, it’s not so bright outside. But when it’s really bright outside, you’re going to struggle that night because they have put on their frequency lights which remember emit a sound wave which activate the nano and it activates it in your eyes as well And it goes into the bloodstream. So my recommendation to you used to wear sunglasses at night and when you go to sleep shield your eyes and this will help you to be able to sleep better. It is a known fact that if you sleep with the lights on your brain cannot shut down and rest. Your brain relaxes when the lights are dark because it is able to truly relax. But if there is a light that is really bright shining in your eyes while you’re trying to sleep then you cannot sleep very well. Well, the lights that they are using don’t appear to be that bright but they are penetrating through walls and through your skin and through your skull And they like to be able to do this when you’re going to sleep. So when you notice that you’re ready to go to bed, everything seems perfect and then you go into bed. You climb into the bed and it’s lovely for about five minutes and then all the big bright light start to be very bright outside And you might start getting ringing in your ears and feel the bed or vibrational. Your heart might start racing and your ears will hurt and your head will hurt and your private areas will hurt and vibrate and your feet will start itching and your hands will start itching and you’ll feel like you’re slightly queasy. You might start feeling faint And you might also wish you were never born because it’s very depressing because this is a frequency that is being used against you and it is being transmitted into your brain through the walls and through the windows and also through the toilet pipe believe it or not they love the toilet pipe. Because this is an entry into your Home Just like a window and just like any fan as well, which is an entry into your home. So they will also pump your house with nano through the taps whether the taps are on or off they are blowing this stuff into the house and also through the drains as well. So I strongly recommend that you put a sock over your taps with a hairband and also cover all your drains with plugs and cover all fans that are not in use with some clingfilm or a Chris packet. With the toilet it’s probably worth disabling the inlet water pipe and minimising The attack of nano which will becoming very heavily through the toilet pipe and also the outlet pipe it’s worth doing a little wee wee and filling it with a bit of tissue to block the nano from blowing into your house. The other thing they like to do through the pipes is to gas you and this is to make you drowsy And also some of the victims have complained that they have been raped by the gang stalkers and this I believe happens when you are guested to go to sleep just like you drug somebody and you are tired and often you miss days there are days missing and there are hours missing which you cannot count for and so it is my thinking this is how that is done.. It is also strongly advisable to cover all drains outside with some anti-EMF shielding fabric and also all downpipes should also be shielded because their favourite trick is to pour water over the roof down the downpipes into the drains which then activates because it is activated through sound waves and light waves and gamma rays and all of the different ways that they activated Depending on the triangulation and what is connected through the Internet the Bluetooth the TV, the mirrors and the witchcraft birds. It is my thinking that they regularly do witchcraft under the trees during the week after they have completely drained your all your energy over the weekend then they go off and do their witchcraft and then they have their meetings to make arrangements for their next agenda and strategy for attack. And what I’ve also noticed is the other victims that I’ve been speaking to in America and in other countries in Germany in South Africa and in England is that they are using the same tactics and strategy and tormenting devices through the same operation. It’s like a template that they’ve rolled out that they’re now using. They also seem to follow the same set of protocol for hacking and when I look at the analytics of other devices, I’m able to see that they are using the same apps And they’re modifying the operating system of each device through an upload of stingray and Pegasus which infect your phone it spams your phone if you like from a distance and your phone gets modified and suddenly it’s starting to connect up with anybody’s Bluetooth than anybody’s Wi-Fi and it’s taking instructions as well and it’s permanently on and permanently monitoring and listening and also tormenting you it’s admitting a frequency and it will give you a headache and it’s taking a photograph of you every three seconds. So it’s important to cover your camera front and back and at the back I strongly recommend a little piece of a crisp packet just over the camera area will give you a very good peaceful day and it’ll be hard for them to be able to send any instructions to your phone. They always want access to your camera and the reason for this is because they use the flash in your camera to activate nano technology around you and admit a frequency because lights are the new Wi-Fi or also a soundwave and these transmit messages which convert and take instruction according to what has been programmed into your phone and then receives the instructions and then admits whatever the instruction has instructed it to do and this will include all key strokes and any of your photographs are accessible by any of the gang stalkers and neighbourhood watch if you like which is the gang stalking watch group for every neighbourhood eyes. I’ve already said I believe there is a kingpin for every street And I also believe they are far more victims of gang stalking in each town because they isolate everybody and make them out to be crazy. I believe also that the government when they recruit people the salary for a paid organiser of the gang talking receive £60-£70,000 per annum And then what happens is they recruit a smaller group and that group then recruit another group and it’s very much like the MI5 everybody is on. I need to know basis so the person who is switching on their washing machine and their cooker and their fire alarms and their lights to connect up to you. I’m not really aware that this also connect with something else. They just sent a message to do this at this time and they do that and also everything is also on time is so I’ve noticed time has come into this and often for them to get control of your computer they set the time to an hour behind the real time. With your emails and your iPhone it’s also on the wrong time even though it’s displayed the correct time for you it is actually the wrong time inside the phone. How do I know that? Well because I’ve become a bit of an expert at analytics and I’ve discovered that the time often doesn’t correlate when I’m checking the analytics with what I’ve actually been doing And it’s an hour behind the other thing. I’ve also discovered is they like to set everything for a different time in America so I might be in England but my phone actually thinks it’s in America and California or Florida time and that kind of thing keeps appearing on my analytics when I check it and also it keeps trying to connect with T-Mobile. The other thing I found is that it’s also joining up with iMessage so they’re downloading all my messages through iMessage even if I’m signed in or out And they are connecting to my WhatsApp because WhatsApp is connected up with FAKE work they’re connecting up with my Microsoft which is connected up with Skype and Zoom and all of these things and the reason this happens is because it’s the world of the meta and if this is the world of the dead. So if you know about the devil, you will know that the devil is dead because his name is lived backwards. So this is about taking the world of the living into the world of the dead and it’s also about bringing the world of the dead into the world of the living. Since your soul is contained inside your blood if they can contaminate your blood, then they can attempt to take your soul and they also are reading your brain waves and attempting to body snatch and steal your consciousness. If you can imagine when you go to sleep and you wake up in the morning you wake up in your bed. But can you imagine if you went to sleep in your bed and you woke up in a different country? Well this is the type of technology they are trying to use with us. It is my belief that they are actually changing the times and the places right now so when you wake up, they are manipulating the time and there has been dozens of times where I have woken up and I’ve checked the clock and it’s been 1 o’clock in the afternoon when I’ve woken up after a really long night of torture and torment and all the other bits and pieces Only to look over and find that it’s actually 830 in the morning. And I can’t explain this but this has happened to me so many times now that I think that there is a jewel reality occurring between the matrix and the fabric of time where the world of the dead is literally merging with the world of the living. So witchcraft in the world of gang stalking is a crucial element in their tactics against you. Because they do curses, they also Take your hair they take your private knickers and they take personal items and they do witchcraft over bowls and things like this sacrificing real children and animals to appease the demonic realm so that the Demons will give them power and a witch has no reason to exist unless they’ve got power so they want as much power as possible so the blood of a baby or an aborted fetus will give them tremendous power in the demonic realm where they can command Demons to come into your house and also give them supernatural abilities and powers through spells and all the other things that they do. Because the churches have not taught you about the Lord and they haven’t taught you about Demons they have not taught you how to fight Demons and also if you talk to anyone about Demons, they look at you like you’re crazy because people don’t really believe that Demons exist But they are very real and they are possessing. I would say 9 out of 10 people on this earth. Add to that AI which is controlled by the devil who runs this world and the Metaverse and your phone and magic mirrors and all the magic birdies that fly around Along with all the witches and wizards who are able to transform themselves and they use your mirrors and your TV and your phone to watch monitor and also transport themselves into your realm or to transport demonic entities into your realm to torment to terror you to make your life a living hell. So this is why it is so difficult to fight all of these different elements in one go because when your brain is overloaded with frequencies sound waves and you’re being tortured and you can’t sleep and you’re being hacked and you’ve got home invasions plus because we’ve got criminals using microwave weapons which they’re not trained in and these weapons are not regulated or tested. You are a free for all fun and game torture object for the amusement of all your neighbours and all of the kingpins of the neighbourhood watch who have orchestrated this attack and annihilation of the human race. And because they also tell you that they’re going to do this to you on the world economic forum and they publicly tell you that they want to cull off the human race And you still don’t believe them or listen to them then it’s no wonder that we’re in the mess we are in now. But also, if you contact the police, you will be put down as a crazy person because you are fighting a spiritual war but it’s also taken hold in the physical world. And this is about possession and the people who have taken the mark of the beast, they are connected to the high mind and they are under a mass hypnosis MK ultra Sleepy state. And then of course there’s the painful people as well the people who are paid £60-£70,000 by the government and then they obviously pay people as well to break into your home pick your locks vandalise your vehicles hack your bank account take over all your messages in and out all your phone calls they go through some stinky horrible old person probably down the road who probably **** a long while he watches you in the shower you know this is how gross it is. But anyway, this is why the system needs to be taken down and it’s important to know what you’re dealing with because when this comes against you, you’ll have no idea what’s going on why it is happening and how to deal with it and I’m hoping that by me discussing this and giving you some understanding that you will feel a bit more reassured, but also There may be comfort in the fact that you are not the only victim of gang stalking and not only this there is tools to overcome it and defeated and there are many other victims across the world. And if you’re reading this today and you’ve never heard of this then I would suggest you start reading up about it because this is coming for everybody. The people who are gangs talk now other people who have stood up for the truth and are a threat to the New World order Enslavement and annihilation of the human race. And if you don’t wake up soon, then you might find yourself waking up in the world of the dead in the Metaverse because it is my belief that when they steal your consciousness and your soul that you will go to sleep and you will not wake up in your bed but you will wake up in a deep underground military base Where they will have taken your consciousness and they will entrap you there and they will torment you and your life will cease to exist. They will put you in a clone copy of you once they have got everything they need and they don’t need you in this world anymore. So you do need to wake up and you need to wake up fast because this is happening right now. This is Ayeisha from God FM fighting for freedom. I would like to depose the king of England and take his throne. I would like to set the human race free I would like to rule the whole Earth with the Lord and his commandments not for my glory but for his glory, I don’t have a big ego but I want my freedom and if I’m gonna fight for my freedom then I will fight for yours in Jesus mighty name. You can reach me on WhatsApp +440777357 7788 and you can also reach me admin@godfm.org.uk. God bless you




 

 

 

 

DONT BE A VICTEM :- FIGHT BACK AGAINST STALKING! 

 

Ayesha Hart

GOD FM

www.godfm.org.uk

admin@godfm.org.uk

+4407773577788

JESUS FREE GIFT

We are given eternal life. And Jesus came to fulfil the law not to change it and remove anything from the law. So there are some churches who are teaching that you are forgiven past present and future and that you can carry on sinning - But this is wrong teaching. As I’ve already said the only reason Jesus came here was that we could communicate with God again and have the Holy Spirit so that we have eternal life. And once we have handed our lives to God and accepted the blood of Jesus Christ the lamb, we must turn away from our sins. And if you do soon then it is important to repent and ask forgiveness from the Lord. We are human after all and nobody can be perfect. And we are led by our flesh so it is quite hard for us to lead a life without sin. But we must remember that now we are saved we must represent ourselves in a good light. There is a quote in the Bible that says if you carry on singing then how are you any different from the singers. And the sinners have not been saved.  Basically what I am saying is that once you have received Jesus free gift and repented for your sins then you need to start to change. There needs to be a very large distinction between yourself as a true follower of Jesus Christ and people who follow Satan. And if you can’t see the difference than you know y’all still on the wrong road and you’ve got a little bit more work to do - quite simply. And the more you realise that you’re not on the right road then you realise that you’ve been lost and you need to come and find your way back to the light and repent and search for God. I hope that helps you understand what I’m trying to say.  Just like there’s a big difference between the darkness and the light you can think of this in the same fashion.

John 2:19-22 Jesus answered them, “Destroy this temple, and in three days I will raise it up.” The Jews then said, “It took forty-six years to build this temple, and will You raise it up in three days?” 

WE ARE THE CHURCH 

Ephesians 2:19-22 So then you are no longer strangers and aliens, but you are fellow citizens with the saints, and are of God’s household, having been built on the foundation of the apostles and prophets, Christ Jesus Himself being the corner stone, in whom the whole building, being fitted together, is growing into a holy temple in the Lord

THE TEMPLE OF GOD IS INSIDE YOU

1 corinthians 3:16 Don’t you know that you yourselves are God’s temple and that God’s Spirit dwells in your midst?

1 Corinthians 6:19-20 “Or do you not know that your body is a temple of the Holy Spirit within you, whom you have from God? You are not your own, for you were bought with a price. So glorify God in your body.”

YOU WERE BOUGHT FOR A PRICE 

ACTS 20:28 Be on guard for yourselves and for all the flock, among which the Holy Spirit has made you overseers, to shepherd the church of God which He purchased with His own blood.

WALKING WITH JESUS 

Ephesians 2:10 “we are His workmanship, created in Christ Jesus for good works, which God prepared beforehand so that we would walk in them.” 

SINNERS PRAYER  - TO CLEAR EVIL OUT AND HAND YOUR LIFE TO JESUS.  

Prayer of release from curses / spells Hexes etc Dear Lord Jesus 

 

I know that I am a sinner, and I ask for Your forgiveness. I believe You died for my sins and rose from the dead. I turn from my sins and invite You to come into my heart and life. I want to trust and follow You as my Lord and Saviour.

I thank you for your forgiveness. And I also forgive all the people that have hurt me. (Now I want you to list all the people that have hurt you that you forgive – and you need to fully forgive these people). I also ask for your forgiveness for anything my family have done Including if they were Freemasons or if they consulted mediums or witches or any occult practices (list them here). I promise to get rid of any occult objects from my home. I pray for complete healing and redemption - I renounce all all family curses or any thing that may be hindering me in my walk with you Jesus in the name of Jesus I ask that you Jesus release me from & renounce all generational curses &  I cast out all curses and Demons and Hexes and I accept Jesus free gift of eternal life, healing, washed clean by the blood of the lamb Jesus Christ. I thank you Jesus - I give you praise and thanks - mighty Jesus - Amen.

 

Please tell your friends & family that you have handed your life to Jesus Christ.

It also helps to share the fact that you’ve handed your life to God and to celebrate it because you are now part of the kingdom of God and you are one of Gods children. This truly is an amazing day for you and God wants you to totally enjoy it and celebrate it in your mind and in your heart and in your home with all your family & friends. Share this with everybody so they may also find eternal life Jesus free gift.

 

 

 

GOD FM ANNOUNCEMENT:- 

 

GOD FM BIBLE SCHOOL - Lessons on the bible on GOD FM BIBLE SCHOOL CHANNEL on telegram.

 

Hope you enjoy - Ayesha from GOD FM

————————-

 

GOD FM NEWS - STARTER PACK

 

Sinners Prayer. Sermon. 31 January 2022.

https://t.me/GODFM/124

 

KNOCK KNOCK.

Sermon. 19.1.22

https://t.me/GODFM/89

 

Going through the fire.

Sermon 8.1.22

https://t.me/godfmgroup/2645

 

The Ugly Duckling 1 & 2. Sermon. 15.1.22

https://t.me/GODFMSERMONS/86

 

https://t.me/GODFMSERMONS/87

 

I AM THE TEMPLE. Sermon. 12.1.22

https://t.me/GODFMSERMONS/56

 

Those are what I recommend you listen to to get you started with the Lord. It’ll help you get through whatever it is that you’re having problems with. Remember that the Lord loves you and that you are chosen by the Lord for today. If you are alive today then the Lord has anointed you and appointed you. He watches everything you do and he loves you. Trust in the lord because at these times we need him. God bless you.  GOD FM NEWS & GOD FM SERMONS

 

 

 

 

 

————————

ABOUT GOD FM

 

On our telegram Channel on GOD FM NEWS & SERMONS we discuss these topics - I figured out that they just continued with the Roman times 753 at the time of Jesus. Then the Gregorian CALENDERS were created and the times changed to AC BC - and 800 became 1800. Daniel 9 - talks of the 70 weeks. We are in the final week. The abomination of the temple on the wink of the temple is in the arm of us - the injection. We are the temple. Also the flood is mentioned in this section before the 7 years. We are in the last days. A clue to our times. Capricorn on our maps and the beginning of the year is also Capricorn - the goat. The goat with one horn - Satan. Also CALENDERS changed to exclude Gods proper celebrations starting in End of February with his new year. Also Noel sung by people at Satans Christmas is actually singing No God - Noel - because EL is another name for God. Plus Jesus talks about flying in the Bible. There was free energy and free electricity then too. Very interesting. Times are reset. Good treasure hunting. God bless you all.

——-

* BIBLE SCHOOL *

NOW - WE ALSO HAVE A BIBLE SCHOOL - So if you want to know more about the Bible in simple English then you need to come and visit the channel. God bless you

——-

If you are searching for the TRUTH -

 

-definitely join our platforms if you want to know all about the truth.

And there’s 3  of them really that you need to join.

1-  Join the GOD FM news channel with the chat facility.

2- Join the GOD FM Bible School with a chat facility.

3 - join  the GOD FM Sermons with the chat facility.

———*****————

GOD FM NEWS PODCASTS & SERMONS ON:

WhatsApp, Spotify, Podbean, TikTok, Amazon, Samsung, player FM, pod chaser, iHeartRadio, audible and telegram.

 

SPOTIFY

https://open.spotify.com/show/2Pq7wOqd0zgCGfzO8jfJZ8?si=IuClkx8iQ-q9KU8bJ_pc6Q

 

ALSO ON PODBEAN

https://www.podbean.com/pi/pbblog-rr759-d2a0ce

 

TELEGRAM.

1 —— For GOD FM News - Chat

https://t.me/godfmgroup

 

2 —— For GOD FM Bible School -  Chat

https://t.me/godfm11

 

3 —— For GOD FM Sermons - Chat new

https://t.me/GODFMSERMONS

 

GOD FM Ltd – company number12131587

Registered office:- 22 Wenlock Rd, London

England N1 7GU.  Tel: 02039624637

www.godfm.org.uk

Email:- admin@godfm.org.uk

Ayesha Hart - WhatsApp +4407773577788




Comments

Popular posts from this blog

THE LEADERS WANT TO KILL YOU - GARY WATERMAN PROOF