The source of Illuminati's power is the thought reading technology

- They've killed a lot of people arround the world by the gang stalking and electronic harassment -
-Final revision date: Novenber 14th 2016 (Mon) -

20161112_イルミナティ-min


In this blog, complete exposure of the Illuminati have been made.

The source of Illuminati's power is the thought reading technology which is technical backbone that organized stalking and electronic harassment victims are suffering. By this way, They killed various adversaries.

Through these technologies, people all over the world have been sacrificed. Exercising these methods makes it easy to drive the target to suicide. These methods has been developed from about 1960 by Illuminati related persons sneaking into the US government. At the same time, technology for population reduction by HAARP, Chemtrails and Earthquake Weapons has also been developed within the US government.

The assassination by these electronic harassment technologies is said to be mainly after 1990. Until then, the assassination by guns and drugs had been done. This is John F. Kennedy, John Lennon or Michael Jackson for example. In Japan, physical assassination has not been done, but it seems that such direct killing had been done in the United States.

In Japan, a specific emerging religious organization, which is said to be conducting organized stalking and electronic harassment, is comprehensively deploying these thought reading facilities in urban areas. A similar situation is assumed in the United States. Perhaps they are deploying facilities to conduct thought reading throughout the country. Currently, urban areas of advanced democratic countries are in a similar situation. The reason why they could realize the conquest of the world softly is the deployment of such thought reading technology.

I'd like to ask everyone in whole world. Spread the fact in a hurry that the source of power of Illuminati is the thought reading technology. Currently President Obama is striving to realize their expose at the end of his term.

Whether the Illuminati can be caught depends on whether you know this fact. I would like to wish for the relief of crime victims at the end of this article.

Everyone around the world, please spread this fact !!




Covert Harassment and Overt Harassment in Japan

- The document submitted to Mr. Mendez of the UN -
-Final revision date: October 21th 2015 (Wed) -

20151021_国連

The following is the document submitted to Mr. Juan E. Mendez (The UN Special Rapporteur on Torture and Other Cruel, Inhuman and Degrading Treatment and Punishment).

Submitted day: August 9, 2013

Presenter: Terukatsu Ishibashi (The Chief Director of the Technological Crime Victims Network Specified Nonprofit Organization in Japan)



Covert Harassment and Overt Harassment in Japan

I am the chairman of the Board of Directors Technological Crime victims Network Specified Nonprofit Organization, Terukatsu Ishibashi.
Today, I came here to inform you, Mr. Juan E. Mendez, about the current situation of the victims of covert harassment and overt harassment in Japan.
Firstly, I would like to thank from the bottom of my heart, Ms. Rhonda Pence, and Mr. Derrick Robinson of FFCHS, the organizers of this meeting, who gave us this opportunity for the first time.

It has been 15 years since this NPO’s private organization was established. During the 15 years, we held not only 137 regular meetings in Tokyo, where the main office is located, but we also held meetings all over Japan, such as in Sapporo, Aomori, Sendai, Nagoya, Osaka, Fukuoka and Okinawa, trying to understand the real situation of the damage.
In addition, the 17-page detailed survey we ask our members to respond when they join us has contributed to grasp the real situation of the damage. We have collected the responses from more than 1000 victims and finished totaling answers from 815 people. What I am going to talk about today is based on the total results. As a result of these activities, we have become capable of understanding the real situation of covert and overt harassments to a great extent. I am certain that what I am going to tell you about the situation in Japan will be some reference to you, too.
So, I would like to start with the reason I started organizing this kind of meeting before I start explaining about both harassments which also serves as an introduction of myself.
I realized that I was a victim of covert harassment when I experienced concentrated attacks that used invisible tactics starting May 17, 1995. The attack continued until the spring in the following year. Before the series of attacks, I had been receiving overt harassment since 1991 as a preliminary step. As the harassment escalated, my tap water became abnormal on May 17, 1995. My anger flared up when I thought about those who were harassing me with water, which was important to human beings. Back then, I could not even imagine that an invisible technology could make people sense an abnormality in the tap water, so I was seriously concerned about contamination of the water. When image transmittance was added, I was totally played by them. In other wards, I seriously believed that I could not drink the tap water at home. I drove around looking for water with 20-liter plastic containers in the car. Soon, image transmission directly to my brain started. The images were divided in two sides, one was attacking and the other was protecting. One of them was an image that when I start putting water in the container from the faucet in the public park, somebody sends electric waves to make the water abnormal. The other one was that they have many people making coils to make an electric wave transmitter to interfere the harmful electric waves with counter electric waves. The image of the press conference to announce the completion of the transmitter was sent, too. However, when they are about to use it, it failed and the image was changed to the one in which they started all over again to make the transmitter. I never thought that those images were fictions so that I seriously believed them and was played by them. As the water abnormality related images were escalated and changed, I thought those were true and kept moving all over Japan for a half year. Though, it finally became certain for me that covert harassment is true through these concentrated attacks. I thought that the only way to protect myself is to write a book about my experience and published my book, “Impeaching the Misuses of the Electric Waves as a Weapon!” I began selling the book on July 13, 1997, putting advertisement on Mainichi Newspaper. Since the book was published privately, I could not use established distribution channels, so I kept putting advertisements on newspapers once a month for about a half-year and asked book stores to sell my book one by one. I managed to sell 800 books in that year.

Through my book, I made connection with 24 people who claimed to be the victims of similar harassments. We agreed that this issue could not be solved by an individual; therefore, I addressed the launch of club and started the “Electric Wave Abuse Victims’ Society”, the origin of the NPO based on the approval of 14 people. The name was changed twice later and we
decided to use the current name at the time we changed the club to a NPO in 2007 and lead to the present. Currently, we have more than 360 members. It is important that I, myself, am a victim and I became confident about the covert harassment due to the concentrated attacks. Without the confidence, I think I could not have founded the society and managed to maintain it. Not
to mention there was no way that I could openly appeal to outsiders. Consequently, there is no doubt that firm belief about the harassment is very important in this problem.
Now, I would like to start explaining the outline of harassments. The base used to put everything together is the table I published in my book, “Impeaching the Misuses of the Electric Waves as a Weapon!” I was able to make such a table from my own experience only. We have been using this table as the base of improvement since we launched the society.

Table 1. Electric Wave Abuses Based on Experience

I. Abuses on People
1. Intervention to the brain ① peek into one’s mind, ② transmit images and intentions, ③ image insertion, ④ turn a person into a maniac, ⑤ intervention to one’s thoughts, ⑥ brain sharing (importance of lie detector completion and peeking during sleep, ⑦ suppression and activation of thoughts, ⑧ suppression and alteration of decision, ⑨ dream manipulation and ⑩ oblivion and ecollection (manipulation of memory)

2. Manipulation of Instinct ① appetite manipulation, ② sexual desiremanipulation and ③manipulation of desire to sleep

3. Manipulation of Emotion ① manic-depressive manipulation, ②amplification and relief of hatred ③ make one nervous ④ love manipulation and ⑤ impulse manipulation

4. Manipulation of Physical Functions ① excretion manipulation, ② body odor, ③ gas generation, ④ fatigue manipulation, ⑤ sleep paralysis, ⑥ motor function manipulation, ⑦ illness, ⑧ allergization, ⑨ motion sickness, ⑩ itch and numbness manipulation ⑪ make one’s habit worse ⑫ handwriting manipulation ⑬ loosening one’s lacrimal grand

II. Abuses on Equipment
1. Signal Control, 2. Phone Control, 3. Word Processor Control, 4. Copier Control, 5. TV and Radio Control, 6. Control of the Vehicle Engine Condition

III. Abuses on Natural Environment
1. Weather Control, 2. Water Disturbance, 3. Plant Growth Disturbance, 4. Wind Development (Tornedo Development) 5. Wave Development 6. Earthquake and Volcanic Eruption

Overt Harassment

I am going to explain the real situation of harassments based on the result total of questionnaire survey collected from 815 members. I start with overt harassment. The questionnaire survey conducted by the NPO describes 35 overt harassments and asks you to circle ones you are experiencing or experienced. The 35 items are the following:

Tapping and secret photographing, following (shadowing and stalking) and watch-keeping by people, following and watch-keeping using a car, following and watch-keeping with motorcycle, silent phone calls, threatening phone call, phone disturbance, house breaking, trespassing, loss of money and goods in the house, location change of money and goods in the house, throwing objects into the site, throwing objects into the house, house burglary, site ravaging, dumping dead animals in or around the premise, dumping feces in or around the premise, rape, assault, threatening, cussing, suspicious behavior, hostile attitude (i.e. glaring and spitting), suspicious behavior of the neighbors, suspicious behavior of the people at work, suspicious behavior of the police, gossips, bill distribution, ostracism (isolation), intervention to your PC, suspicious emails, failure of electrical devices, malfunction of electrical devices, malfunction of fluorescent lights, malicious mischief on your vehicle, bike or motorcycle, uncontrollable vehicle, an attack with alien substance when you are driving, malfunction of a car door, undelivered mail, suspicious treatment when you are shopping, suspicious behavior, attitude and the content of the program from TV caster or radio personality that gives you an impression of a personal attack

Table 2 shows the total results. However, there are too many items, so we divide them into 12 categories to explain for easier understanding.

· Following (Stalking)
· Hostility
· Suspicious Behavior of the Neighbors
· Phone Related Harassment
· Failure or Malfunction of Electric Devices
· Trespassing
· Harassment on Vehicles (Car, Bike and Motorcycle)
· Undelivered mails
· Suspicious (dubious) Treatment Experienced During Shopping
· Suspicious Behavior, Attitude and the Content of the Program from TV Caster or Radio Personality
· Implications at Work, etc.
· Tapping and Secret Photographing
I would like to explain each of them.

1. Following
First is following (stalking) harassment. It is a persistent kind of following, which starts as soon as you leave your house and they keep following you one after another. Normally, the victim encounters the next “hostility” at his/her destinations after “following”, and it makes the victim believe that the offender knows where he/she goes next. After all, the victim has no choice but believes his/her entire life is being watched.

2. Hostility
Hostility is executed with following. The victim experiences incidents of glaring, spitting, cussing (abuse) in passing, blocking of the path etc. more frequently. It happens even when you are our in your vehicle and it seems accurate to use an expression, “gang up” due to the number of people following you. Therefore, traffic jams occur all the time, and the offender makes it worse by controlling signals. Such sudden hostile attacks give significant psychological damage to the victim. It is not strange if a person who had peaceful life until yesterday becomes a target of hostile attacks and starts panicking. The hostile attack is so intense that it makes us wonder that the goal of the offender is to send the victim to a mental hospital.

3. Suspicious Behavior of the Neighbors
As a result of the questionnaire survey, many victims suspect their neighbors to be the main body of the crime. Abnormal incidents, such as unusual noise comes from the next door, too many visitors to the next door, sudden change of attitude, the neighbor watch you leave home and close their door loudly as you pass by, the trash he/she placed at the collection place is brought back to the house, your garden tree is cut, dumping trash, feces and dead animals in your premise, every house in the neighborhood repeatedly hangs yellow laundry items outside to dry. There is nobody who can remain peaceful if these incidents are repeated persistently.

4. Phone Related Harassment
Phone related harassment starts, along with the others. Those are silent phone calls, 1-ring calls, nuisance phone calls, abnormal noise from the phone, phone rings when you try to do something, disconnection during a conversation, the phone rings in one-hour intervals while asleep, outgoing call history that you did not make, malfunction, hear a voice that blames you during the subtle pause that the person you are speaking makes, etc. almost all victims believe their phones are tapped. Regarding phone related harassment, it seems possible to get help from the police or phone companies (NTT, KDDI etc.) to identify the offender if you record the date and time and phone number of each incident. However, I have not received any report of being able to get help from such organizations.

5. Failure or Malfunction of Electric Device
The victims also encounter a failure or malfunction of electric devices. In order to fix or buy a new one, they are forced to waste their time and money. Especially, PC malfunctions or failures are increasing nowadays, and some victims have stopped using PCs. It makes us imagine the existence of a specialized department that can control a victim’s PC from distance. When your electronic device fails, you call the customer support center, but they respond to you in a way that make you suspicious if they have been waiting for you to call. Therefore, we think that there may be a special group to harass people that commits in both causing PC failure and pretend to be customer service window. It thoroughly trains the staff to cause malfunctions and to respond to the victim’s request for a consultation, cause failure or malfunction from a distance and drive the victim into a corner by responding senselessly to the victim’s request for consultation. Some victims have been trying to keep and record the evidence, but we have cases in which the recording device broke down or the recording was deleted.

6. Trespassing
Here, nonsensical things occurs repeatedly, for example, things in the house change the location without the knowledge of the owner, lost things, the thing lost days ago comes out from the other place, broken locks, clothes are sewn, volume of the cosmetics decrease too fast or too slow, the room is wet, dust scattered all over the room, a newspaper is rolled up into shape of genitals and left in the room, food in the refrigerator is eaten, etc. Victims of this harassment cannot leave their house, since every time they leave the house they recognize some alterations. It continues even after they make a contract with a security company, so most of them cancel the contract. It seems that such obstinate trespassing is aiming to inflict psychological damage on the victims by letting them know that somebody was in the house.

7. Harassment on Vehicles (Car, Bike and Motorcycle)
There are reports of deflated tires, punctured tires, a sudden total failure of the car, a claim that somebody drew a hand that shows V-sign over the speed meter, as well as a fake accident.

8. Undelivered mails
Many victims send letters that reports the harassment and asking for help, but are very skeptical if those mails are truly delivered. About 20 % of the victims reported about undelivered mails and parcels via post office and home delivery services. We found that the all three letters, registered mail, express mail and regular mail, we sent to Mr. Soichiro Okuno, the member of the House of Representative in April, May and June, were not delivered. We asked his secretary to write a letter and sent it to the president of Japan Post Network Company with the certificate of content. We received a report of delivery in writing, but those three letters are still missing. Knowing what happened to our activity, there is no wonder that the members become more anxious.

9. Suspicious Treatment Experienced During Shopping
This is a type of harassment that the victim is treated impolitely at the register of a super market or home center, the service counter of the bank, post office or public office, a dining room, a restaurant, hair salon and others even though they are customers. The victim demands explanation when it happens, but they arrange people to observe it so that they can put the one assigned to do the job under the pressure that if he/she did not follow the direction, the person, too, would suffer violent harassment later.

10. Implication or Suspicious Attitude from TV Caster or Radio Personality
Some report that TV caster or radio personality implies something related to the victim’s privacy, use what the victim said or did at home in the TV program or peek them from the TV. In the digital broadcasting era, we need to be concerned about the fact that a special program is transmitted to the victim only. We are hoping that the perusal system will be established at the National Diet Library, so that all TV/ radio programs broadcasted nationwide are recorded and be able to review anytime when any suspicion occurs.

11. Implications at Work
There are an increasing number of victims who report implications of their privacy, which only the victim should know, by their coworker. Many people did not have a choice but resign their jobs due to the combination of the implication and harassment. However, there is a case that one of our members who won the trial at the court of final appeal using the recording on his IC recorder as the evidence. The case is a good reference.

12. Tapping and Secret Photographing
In order to coordinate these harassments that I have just explained, the offender must be able to read the victim’s activities. Therefore, overwhelming number of victims suspect tapping and secret photographing. We hire private detectives to investigate this matter, but they were unsuccessful. Thus, we begin to realize that considerably sophisticated monitoring technologies are used.

In addition to the explanation about overt harassments, I want to mention the fact that the victims are experiencing multiple harassments continuously. There is no doubt that these harassments are organized crimes since they are impossible to execute individually. I believe that observing overt harassment from its characteristics would help us better understand the real nature of the crime. So, I would like to explain the characteristics now.

We have found 11 characteristics of overt harassments from our survey.

1. Group Activity: This is a characteristic of harassing a certain individual as a group. This characteristic alone can indicate that overt harassment is an organized crime. Even though it is a senseless action, when you file a suit, you end up being asked, ‘Why so many people have to harass you?’, ‘Are you a very special person?’, ‘Who is paying the cost of use so many people? and ‘Isn’t it your paranoia?’ in reality.

2. Stalking: This is a characteristic that constantly follows a certain individual quietly. Not only while the victim is out, but also follows around even he/she is in the house and make a trouble with a superb timing. It is unbelievable in common-sense terms.

3. Continuous and Repetitive: The harassment lasts persistently 24 hours and 365 days a year.

4. Calculated Timing: The harassment often occurs at a superb timing. For example, the phone rings when you are just about to do something, electrical devices near you make a strange noise every time you move around the house, you hear foot steps from the floor above as you walk on the lower floor, and every time you go to the bathroom you hear somebody go to the bathroom next door. If it ends after a couple of times, it does not feel strange, but it is continuous and quite abnormal.

5. Monitoring: Harassing action with such a great timing cannot be done without monitoring the victim. Therefore, the victim have no choice but believe that somebody is monitoring him/her and hires a private investigator for tapping or secret photographing. Because they cannot find any evidence, we started to believe that considerably sophisticated tapping/secret photographing technology is in use.

6. Systematic: The superb timing of the harassment, which is not so unimportant like somebody peeps in the victim’s life and makes nuisance action, made us start believing that the offender reads victim’s behavior ahead of time and the type of the harassment is programmed in the system to automatically implement the operation. Harassments toward individuals have been highly developed.

7. Organized: Many victims move from place to place in order to escape from the harassment, but it is clear from the testimonies from those victims that harassment continues at the new location. Some moved from Kanto to Hokkaido, Hokkaido to Okinawa, Kanto to Tohoku or Kanto to Kansai, but the situation remained. Also, the victims live all over Japan. Consequently, it is obvious that overt harassments are operated by the crime groups organized nationwide.

8. Networking: The organizations that spread nationwide make their communication network dense and harass victims no matter where they try to escape. Therefore, good communication network is essential for them.

9. Manualized: Since there are victims of similar harassment globally, we think that manuals exist and the offenders are operating based on the manuals.

10. Historical: We have learned from the survey that we have a history of overt harassments that is over 40 years.

11. Preposterousness: The 10 characteristics listed above are all extremely preposterous, and this preposterousness can bind all these characteristics.

The 11th characteristic of preposterousness is especially important. If the harassment is within the bounds of common sense, there would always be somebody who helps the victim. The family member can listen to the victim’s story and friends can help, too. Police, lawyers, executive officers and politicians would listen to you and do something about it. However, the more preposterous the harassment is, the less people will listen to you. The main body of the crime is well aware of the fact, and we started understanding their strong intention to never do a kind of harassment within the bounds of common sense and focus on being senseless. It is extremely important that we clarify such intention of the main body of harassment.
On the other hand, victims become isolated because nobody listens to their complaints about such preposterous harassment. They are cornered and what is left for them is to commit suicide, be taken into the mental hospital or take self-defense measures. It has become to our knowledge that such ending is the picture the main body of the crime has drawn. The achievement of the NPO’s activities is the clear understanding of the crime organization’s strong intention and the picture they have drawn. Also, it is related to covert harassment.

Covert Harassment

Next, I would like to explain covert harassment. We believe that invisible electromagnetic waves and ultrasounds are used as medium. Covert harassment is a crime that uses such medium to attack and control its target’s mind and body accurately from a distance. Like overt harassment, the NPO stated the following 40 items on the questionnaire survey and ask the member to circle the ones they are experiencing or have experienced.

Hear a voice, hear a noise, see images, my thoughts are read by somebody, intervention to the consciousness, suppression and activation of the brain activity, unnatural dreams, anxiety of mind being violated, overeating, a poor diet, sexual excitement, loss of vitality, insomnia, sleep disturbance, strong sleepiness, mania, depression, amplified fear or anxiety, elevated suspicion, incontrollable impulse, amplified hatred, nervousness, diffident, zooming eyes, loss of eye sight, loss of hearing, hear a voice from a distance, loss of sense of smell, sense strange smell, loss of taste, strange feeling left in the mouth after eating, feel of touch on the genitals, feel of insertion in the anal, tightening or numb feeling on the head, headache, feel like the head is wrapped with something soft, feels like something is implanted in the head, extreme fatigue, feel like an electricity ran through the body, constipation, diarrhea, incontinence of urine and feces, slackness of anus, manipulation of excretory function such as poor excretion, the muscle moves against his/her will, listless feeling, strong body odor, gas,excessive perspiration, sudden fluctuation of pulse, unusual (food poisoning, drunkenness, motion sickness, cols symptoms-(coughs, sneezing, nasal inflammation etc.), a burn, vibration of the surroundings, vibration of the body, sleep paralysis, sensation of body tic (splattering), pain in organs such as a heart, pain in genitals, pain of something piercing through the body, sensation of burn on the back of eyeballs, bizarre air, pain of impact from air
bullets, fainting

As a result, I could make the following table. This, too, has so many items that I would like to explain by dividing them into 11 categories.

1. Harassment of Voice and Image Transmission: This is a typical covert harassment since 58% of the responders complained voice transmission and 65% complained about the noise transmission. Image transmission is 32%, less than voice and noise transmission, but can be considered as an abuse of same information transmission technology. Therefore, I am explaining about them together. As you have already known well, it is a harassment that makes you hear a sound in your head or hear a voice in the space even though there is nobody around you. The contents of the voice varies, for example, name calling, such as “Fool” and “Ugly”,
order or threat, such as “Cut your wrist”, “Jump and fall”, “Kill yourself”, “If you do not do what I say, I will hurt your family” and “Go to a certain place”, words that sound like the person is peeking what you are doing in the bathroom, an annotation for what you are doing, the voice reads the book that you are reading, answer to the thoughts in your head and interactive communication with the voice.
Harassments by sound are the sound of piano in the midnight, sound of drum, shattering sound, sound of slamming the door, high pitch noise, low pitch noise, etc.
Majority of victims who report harassment of voice testify that they hear the voice all the time as long as they are awake. Also, many of them confessed that they were manipulated by the voice in the beginning.
There is a possibility that the victim will take a huge risk by following the orders from the voice; for example, the victim is ordered to go the broadcasting station and do so, ordered to cut his/her wrist and do so or ordered to jump and fall and do so. So, this is a terrifying harassment.

2. Manipulation of three desires: The result of questionnaire survey shows that the most common covert harassment is sleep disturbance. About 69% of the members report this harassment saying that a voice wakes them up, cannot sleep because of the pain, some kind of awakening technology is being used. We can assume that manipulation of desire to sleep is implemented. There were a few people who could not sleep at all for almost a month and had to be admitted to the hospital. Sleep disturbance is one of the methods used to torture people; therefore, this is considered as a torture. As for the manipulation of sexual desire, Mr. Barrie Trower, whom you already know very well, testified that electronic wave of 6.6Hz can induce violent sexual drive, so I would
like to leave it to that.

3. Manipulation of Physiology: It is evident that they can freely manipulate physiology, such as incontinence, gas generation, diarrhea, hardness and softness of feces, body odor. Since I experienced stalking, which made me feel a slight need of using bathroom day and night, I believe that it has a stalking characteristic, in other words, it works not only at a certain place but wherever you go. The stalking nature is so strong that it does not leave alone and make you believe that it is your natural self.

4. Manipulation of Body and Motor Function: This is a harassment, which your body movement is controlled against your will. People notice it when your neck and limbs are moved against your will, so it is very troublesome. It sometimes controls all muscles related to excretion freely, and shows its amazing manipulative ability. We believe that it can easily control you to feel like your athletic ability improved all of the sudden or not to let you have positive results no matter how much you practice. We think that this technology is being used for professional sports considerably. It may play a role in directing a prearranged game, too. We believe that it is more effective than using drugs, so that it has possibly become the technology necessary for winning medals in Olympics. In this era, we believe that it is necessary to run a test for this technology in addition to doping tests.

5. Manipulation of Five Senses (Sight, Hearing, Taste, Smell, Touch): The harassment causes, zooming eyes, an intentional ear trouble caused by the fluctuation of air pressure, a strange feeling left in the mouth after eating, strange smell without the source in the area, feeling of insects crawling on the skin, feeling of touch, etc. The victims of strange smell often report that the smell comes from their neighbors and seals their house very well; though, the smell keeps coming. Somebody used an expression that chunks of the smell are coming down from the ceiling. One of the victims was suffering from the smell of spray and went to mountains on the motorcycle only to find that the smell did not disappear. This is a stalking act with a smell of spray. We can imagine that manipulation of five senses can have a stalking characteristic.

6. Manipulation of Emotions: There is harassment that makes you tear up when you are not sad or make you laugh uncontrollably when it is not funny. In this person’s case, he bursts into laughs when he is at the regular meeting and is worried that people may think he is suspicious. The other person was manipulated to laugh whenever he feels that both cheeks have started inflating. Since it is done repeatedly, it is extremely troublesome. This alone can keep you from going outside. We also believe that happy feeling and depressed feeling can be manipulated freely. They often use this to induce dark feeling on the target as they do
other harassment to increase the damage markedly.

7. False Sickness: (Sickness Manipulation): This is a harassment that induces sickness symptoms even though you are not sick. We believe that it can freely manipulate sneezing, runny nose, slight fever, blood pressure and pulse,. According to Mr. Barrie Trower, it can also induce mental sickness, heart attack and cancer, and he further testifies that, as for cancer, even the speed of progress can be controlled, and it agrees with the NPO’s survey results.

8. Mind Control: It is very important that many of the victims from voice transmission harassment testify that the voice responds to their thoughts or the voice communicates interactively. This harassment cannot be realized without the technology that connects human brain and computer. The victims of this harassment naturally believe that somebody is reading their thoughts and start insisting that their minds are eavesdropped. Mind eavesdropping is an ultimate invasion of privacy. Moreover, it is very frightening that something can get into your mind, because it indicates the possibility of being controlled by the idea from outside instead of your own. What I explained so far are all technologies that make you lose who you are, but it is such a grave fact that it can work on your mind, too. It is an ultimate form of privacy invasion and a technique that completely denies democratic living.

9. Physical Attack: This harassment can be rephrased as harassment by torturing technology. Sensation of needle stabs, sudden attacks to organs, attacks by small or large air bullets, sensation of electricity creeping up the body, sensation of burning behind the eye balls, sensation of virtual torture in which both cheeks are pierced with a wire, etc. are reported.

10. Others: Vibration on the body and vibration of the surroundings. One of the victims of this harassment was attacked to the degree that his house was cracked. Sleep paralysis and sensation of insertion into genitals or anus, which seem nothing but abnormal. Sometimes, it makes the victim feel as if his/her heart is grabbed and massaged directly and make us wonder if it can be explained as a work of some technology.

11. Murder: Dead people cannot testify, but 17 out of 1166 confirmed victims are already dead, so there is no doubt that it can kill people. Two people out of the 17 broke down by subarachnoid hemorrhage and one of them died directly from it. One died from heart attack. I believe it is not only the direct victim who dies but people around the victim are also targeted. I stood as a candidate four times to become a politician, won once of them and became the local assembly member, but the person who supported me and his family or those who probably voted for me died one after another. The causes of their deaths were a heart attack, cancer (some were scirrhus carcinoma), a sudden death while taking a bath, etc. These deaths were processed as deaths by natural cause, not by certain technology. We do firmly believe that there are many cases of murder, which the victim or the people around the victim do not realize it as a murder.

Above is the outline of covert harassment. In order to implement such harassment, the following technology is necessary. We, the NPO, put this together based on the result of the questionnaire survey, so the following are inferences from the result.

1. Stalking Technology: Since it is impossible to commit this crime without the stalking technology, which catches a particular individual and does not let go, we define this technology as the first basic technology used for covert harassment. It also requires the technology that can identify particular individuals, so we need to consider a microchip implant to be able to explain it. From my experience, I believe that stalking that relies on technology had already begun in early 70s. I also think we should consider their use of satellites. I think we can express it as biotelemetry technology employing satellites. You may have better way to address this technology. We use such expression, because we are just inferring based on the real situation from the tandpoint of the victims.

2. Voice and Image Transmission Technology: We consider this as echnology that bypass normal auditory organ or visual organ and irectly transmit voice or image into the brain. Some of the victims of oice transmission harassment testified that he/she heard the same voice in overseas; therefore, this harassment can be implemented in a global scale, and we suspect the use of satellites here, too. As for image transmission, I do not know anything more elaborate than what I experienced. I think it only works in and around the big cities, such as Tokyo and Osaka. I experienced it in Paris and Firenze, too, so it seems to work in foreign big cities, too. However, it was 15 years ago when I experienced it, so it may be able to reach over farther distance than before. Anyway, it abuses the communication technology that allows transmitting voice and image directly to the brain without a terminal
device.

3. Mind Eavesdropping Technology: Military is the one that is pursuing this technology the most. As for military, information collection technology is the most important technology, and the most crucial one is the technology to read the mind of military leaders. The crime cannot be implemented without technology that connects the human brain and computer. It is a brain-machine interface technology. It reads people’s minds, so it has to contain a device that catches brain signals and transmit it. I cannot deny the existence of microchip that can be implanted in the brain.

4. Technology that can influence human’s physiological functions, three desires, five senses, emotion and mind activities: Since human’s physiological functions, three desires, five senses, emotion, motor activities and mind activity are mainly controlled by the brain, the brainmachine interface technology, which I mentioned earlier, is essential for this technology. In addition, the brain functions must be thoroughly understood to make this happen, so the level of control depends on the level of the neuroscience development, we think. It is also necessary that the microchip is as close to the brain as possible to catch feeble brain waves.

5. Monitoring Technology: They can attack their target wherever they run or even in the house, which means they utilize very sophisticated monitoring technology. Moreover, they must be able to program when and what kind of attack they do, because they attack with miraculous timing.

6. Physical Attack Technology: First, they need technology that can aim each body part precisely, and technology that allows you to choose what kind of pain and control the strength of the pain is necessary. This harassment requires these technologies, and we believe that the brainmachine interface is the center of them. This technology connects human brain and computer, so that experiments on human bodies are necessary to complete the development. I won’t be surprised if there are many victims who are used for the development of this technology. Experimentation on humans is necessary to evaluate the product value, too. Furthermore, more experimentation on human is necessary to learn how to use the technology. As you can see, brain-machine interface technology requires experimentations on humans in many aspects. Therefore, there is no doubt that those departments which develop it, evaluate it, train with it, and control the technology are all committed to the crime in some ways. Therefore we need to investigate continuously where the technology is sold as a product, outflow situation of the program or whether similar product is brought from foreign country.

The NPO have been tackling covert and overt harassments in order to eradicate them. When we take a look at the scheme, to drive the victim into suicide, take them into mental hospital and corner them to take self-defense measures, which the main body of the crime pictures, we notice that it matches with three big social problems that we are facing in Japan now. Those are over 30, 000 and increasing number of suicides, increase of patients with mental disorder, which was once over 3 million patients and
increase of unbelievably atrocious crimes.

According to the suicide overview material for 2012 issued by the National Police Agent, 8,278 people, 29% of the total of 28,396 people, committed suicide due to mental problem (Breakdown: depression 5,904 people, schizophrenia 1,150 people and other mental disorders 1,224 people). As you know, when one says he/she can hear voices or see images in the head, he/she is diagnosed as schizophrenic. Sleeplessness is categorized in other mental disorders. There is a report saying, currently, one out of ten people are suffering from insomnia in Japan. Harassment to cause sleeplessness is considered as torture, and is a very serious offense. Victims have to go to psychiatrists for consultation to deal with the problems that should be managed by the police primarily as covert harassments. Naturally, no victims can be satisfied by the way they are handled. We can imagine that there are many people who were misdiagnosed with a mental disorder and end up committing suicide. By implementing overt harassment on a victim one after another, they can cause a panic attack and take the victim to mental hospital. So, we believe many victims of covert and overt harassment are included in the 30,000 people who committed suicide. Also, almost 3 million people have mental disorders, now, in Japan; therefore, if we take suicide and mental disorder seriously, we need to take measures against both covert and overt harassments.

Nowadays, unbelievably atrocious crimes are happening often in Japan. We can suspect that the taxi driver murder case in Yokosuka on March 19, 2009, the personal injury case near Toyo-cho subway station of Tozai line on March 19, 2013 and the other personal injury case in Saitamacity in May 2013, were all executed by the victims of voice transmission harassment. It is necessary to tackle covert harassment to reduce atrocious crimes that we cannot even imagine.

Since the scheme that the main entity of the crime draws and the social conditions match, we can imagine that the entity is directing the social conditions, too. It is important that these social problems, an increase of suicides, an increase of patients of mental disorder and an increase of atrocious crimes, are a possibly directed by the entity. Those three problems are treated as big social issues now, and so as these covert and overt harassment should be. The NPO is fighting to obtain the recognition from the society and for the development of laws by which both of those crimes are punished as criminal offenses by appealing the very point.

We think that such a big issue does not receive enough attention because of the strong international connection between those entities of the crime. Therefore, the group of victims should construct international circles to fight against them face to face. We hope that today would be the opportunity to make that happen.

Today, I talked about the situation regarding covert and overt harassment in Japan. In the end, I would like to say thank you again to Mr. Juan E. Mendez from the bottom of my heart for giving us this opportunity. Thank you very much.



 上記はNPOテクノロジー犯罪被害ネットワークの理事長、石橋輝勝氏が2013年8月9日に、国連の拷問報告官のユアン・メンデス氏に提出した文書です。日本語・英語の原文に関しては下記リンクよりお願いいたします。

Covert Harassment and Overt Harassment in Japan(日本語PDF)
Covert Harassment and Overt Harassment in Japan(英文PDF)

 なお、この訪問の直後にこのブログで紹介した日本の個別の被害者によるメンデス氏への訴えかけが行われました。これについては下記リンクよりご参照下さい。

被害への取り組み(27)
被害者全員で国連に被害を報告しよう (1)
~拷問に関する国連特別報告者、ジュアン・メンデス氏へのメールの書き方~


被害への取り組み(31)
被害者全員で国連に被害を報告しよう (2)
~ジュアン・メンデス氏への英文の書き方~



 日本の被害者の皆様におかれましても、これは最も国際的に評価されるべき石橋理事長のアクションです。この文書の存在をできるだけ多方面に広めていただければ幸いです。何卒よろしくお願いします。




Rush to form international treaties

- Unless there is regulation at an early stage, there is no future for mankind -
-Final revision date: June 1st 2015 (Mon) -

20150529_条約批准

 From this year, there has been an increase in international interaction between victims. This signifies that this problem is becoming a truly international issue. On this occasion, we would like to explain about the objectives of us victims in relation to this problem.

 The basic damage we have suffered is harassment from people, which is known as organized stalking and remote microwave-based attacks, which is called electronic harassment. These are generally referred to as overt harassment and covert harassment. Among these, the greatest threat to mankind is from microwave attacks. This is because this technology makes thought reading possible.

 Knowledge of victims has greatly increased, and we now know the following about microwave-based attacks.

1. Irradiation is possible from remote distances of up to 50km
2. They have extremely strong penetrability and cannot be protected against
3. When placed in vehicles, mobile attacks are possible

 I think this can be called the greatest threat to mankind. This is because our thoughts can be read in a defense-less state 24 hours a day. Speaking as my experience as a victim, the concept of our privacy does not exist. Generally, electronic harassment can be thought of as an invention on a par with the nuclear bomb in terms of its impact. The characteristic of the damage we have suffered is that an extremely large number of people have been driven to suicide, while suffering such attacks.

 What should be done to protect mankind from this threat? This is our proposal at this time. To put it in a phrase, “an international treaty on organized stalking and electronic harassment should be formed as quickly as possible and ratified by all states.”

 In this blog, we have long discussed the establishment of legislation from a domestic perspective. Organized stalking can be regulated if the “Anti-nuisance Ordinance” is elevated to the level of criminal law or the “Stalker Regulation Law” can be applied to the damage we suffer. On the other hand, the following two items have been stated about electronic harassment.

1.Prohibition on simple possession of microwave devices used for electronic harassment
 The Swords and Firearms Control Law can be used as reference. In Japan, it is possible for society to provide maximum protection from tragedies due to guns. The Swords and Firearms Control Law is the law that provides this regulation. Simple possession of a gun is prohibited. You will be exposed just for carrying a gun. In the case of electronic harassment as well, the simple possession of microwave devices can be regulated in the same way as the Swords and Firearms Control Law.

2.Total ban on the use of ultra-low frequency bandwidths used for malicious activities
 It is said that ultra-low frequencies are used for malicious activities. This is because, as stated above, they have extremely strong penetrability and protection is only possible in exceptional circumstances such as remote islands or deep within tunnels. The current unchecked state of use should be regulated through legislation. Use of these bandwidths should be prevented.

 These two items are necessary. They should be included in an international treaty and we should increase the number of countries ratifying this so we will be protected whatever country we go to. Further, it is also the job of victims to raise awareness and enlighten people about this situation. This will become an international issue moving forward.

 This damage is still producing tragic victims. Even domestically in Japan, we are being pushed to the limit and the cases where this leads to crimes continue to occur. This is the same in America as well. A prompt international approach is required.

All victims around the world need to stand together and fight. I would like to end this article with a prayer that there will be no more victims of this damage.
この英文記事は翻訳者に著作権が帰属します。無断使用を禁じます。



国際的な条約の形成を急ごう
~早期に規制できなければ人類に未来はありません~
-最終更新日: 2015年6月1日 (月) -

 本年度に入って、被害者間の国際交流がいっそう進んでいます。これは、この問題が国際的な課題となりつつあることを意味しています。今回は、この問題について我々被害者の目標とするところについて述べたいと思います。

 我々の被害の基本は、集団ストーカー と呼ばれる人による嫌がらせと、テクノロジー犯罪 と呼ばれる遠隔からの電磁波 による攻撃です。これは、一般に見える犯罪 と見えざる犯罪 と呼ばれます。このうち、人類にとって最も危機を伴うのが電磁波による攻撃です。なぜなら、この技術は思考盗聴 を可能にするからです。

 この被害者知識はかなり積み重ねられてきており、電磁波による攻撃についても以下のことが分かってきています。

1. 遠隔最大50kmほどから照射可能
2. 透過性が非常に強く、防御がほぼ不可能
3. 車載すれば移動しながらの攻撃が可能

 これは、人類最大の危機と呼べるかと思います。24時間、完全に無防備な状況で思考盗聴を受けてしまうからです。被害者としての経験から言わせてもらえば、我々にプライバシーという概念は存在しません。一般にテクノロジー犯罪は、その影響力から核兵器と同等の発明と言われています。その苦しみから、自殺に追い込まれてしまう被害者の方が極めて多いのが我々の被害の特徴です。

 この危機から人類を守るにはどうすればいいでしょうか。これが今回の私の提言です。一言で申し上げれば、「集団ストーカー・テクノロジー犯罪の規制に関する国際的な条約を一刻も早くつくり、すべての国家に批准させること」です。

 このブログで日本国内のことを想定しての法整備を以前から私は述べています。集団ストーカーに関しては「迷惑防止条例」を刑法に格上げするか、「ストーカー規制法」を我々の被害に適用するように拡大法改正すれば規制可能です。一方で、テクノロジー犯罪については以下の二つのことを述べてきました。

1.テクノロジー犯罪に用いられる電磁波機器 の単純所持の禁止
 参考になるのが銃刀法です。日本では銃による悲劇を最大限防ぐことを可能にしている社会です。この規制のための法律が銃刀法です。これは銃の単純所持を禁止しています。銃を持っていればそれだけで摘発されるのです。テクノロジー犯罪も、銃刀法と同じように電磁波機器単純所持を規制できるようにすればいいわけです。

2.加害行為に用いられる極低周波の帯域の全面使用禁止
 また、加害行為に用いられているのは、極低周波と言われています。これは、上で述べたように透過性が非常に強く、離島やトンネルの奥深くで例外的に防ぐことができるのが現状です。現在、この使用に関して野放しの状態になっているのを法規制します。この帯域を使用できなくすればいいわけです。

 この2点が必要です。これを国際的に条約にしてしまい、どの国に行っても守られるよう批准国を増やすのです。また、この被害に対する認知を行き渡らせ、啓蒙を行っていくのも被害者に課せられた仕事です。今後はこれが国際的な課題になってくるでしょう。

 この被害は、いまだ痛ましい犠牲者を発生させています。日本国内においても極限の状態にまで追い込まれ、犯罪を起こしてしまうケースが続発しています。これはアメリカにおいても同様です。一刻も早い国際的な取り組みが必要です。

世界中の被害者同士で手を取り合って頑張っていきましょう。この被害の犠牲者がなくなることを祈って今回の記事の末尾としたいと思います。




Technological Crime Victims Network Specified NPO

- Introduction to the victims organization in Japan -
-Final revision date: June 4th 2014 (Wednesday) -

20140529_テク犯
<NPO homepage>

 The Technological Crime Victims Network Specified NPO is the NPO corporation that has officially recognized the damage caused by organized stalking and electronic harrassment in Japan. On this occasion, I would like to explain about this organization.


 The Technological Crime Victims Network Specified NPO was inaugurated in 1998 in its previous embodiment as “Victims of Electronic Crime Group”, and Terukatsu Ishibashi has been active in the organization for many years. It received formal recognition from the Tokyo Metropolis as an NPO in November 2007 and, currently, has established its position as the only public victims network in Japan. The activities of this specified NPO corporation are as follows.


1 . Publicity and Petitioning Activities

STOP! Technology crimes and harassment crimes in Osaka demo march!(Youtube video)

 The NPO corporation carries out regular publicity activities. Initially, these were only carried out in Tokyo, but publicity activities are currently being performed by members in various regions, such as Osaka. Further, the first demo march was successfully completed in Osaka in October 2013.


List of Parties Petitioned by the NPO corporation

 Next, on to petitioning. The chairman has submitted petition documents and petitions have been made to the various ministers in the Japanese government, the assemblymen of the main political parties and various political institutions. However, despite these efforts, we have still not received an official response. We think that an approach needs to be achieved by government bodies as soon as possible.


2 . Self-help Activities Among Victims

20140604_自助

 The NPO corporation is holding gatherings of victims at 7 main cities, including Tokyo and Osaka. This provides a venue for those participants who have been damaged to tell their own stories of the damage they have received, and functions as a mutual self-help meeting between victims. Due to the increase in the number of victims, participants visit at the start of every month to the Osaka assembly where I am participating.


3 . Technology Crime Victims Forum

 A lecture meeting is held once a year in Tokyo and Osaka aimed at the general public. This is the Technology Crime Victims Forum. The 7th of these meetings was held in 2014. The image below is a leaflet for the forum.

20140326_第七回フォーラム

Event Overview
7th Technology Crime Victims Forum
~Aiming for Social Recognition and the Establishment of Laws related to Global Scale Crime (Technology Crime/Harassment Crime)~
Tokyo event April 27th 2014(Sunday)13:00~17:00
Osaka event May 10th 2014(Sunday)13:00~17:00




 This video is of the opening section of the lecture by Chairman Ishibashi. His explanation gives a general overview of the damage, and he appeals for the need for recognition and the establishment of legislation. The number of general participants is still low, but is increasing from year to year. We strongly request the participation of the media and government affiliates.


 The main approach of the NPO is described above. At the NPO, Ishibashi, the Chairman of the Board of Directors, travelled to America last year to meet with the FFCHS representative, Derek Robinson. Organized stalking technology crime is at the stage where mutual communication is accelerating between victims internationally. This crime has flourished, hidden in the blind spot of democratic nations, and must be stopped at the earliest possible stage. I hope you will continue to pay attention to the activities of the victims in Japan.


The 8th forum of Covert and Overt Harassments in Japan



- This video is the video recording of “The 8th forum of Covert and Overt Harassments in Japan" which is hosted and held every year by Technological Crime Victims Network Specified Nonprofit Organization. This forum was held in the convention hall of the Hibiya Library and Museum on April 26, 2015. This video recording is included the first part of the forum. -

この英文記事は翻訳者に著作権が帰属します。無断使用を禁じます。




NPOテクノロジー犯罪被害ネットワーク
~日本の被害者団体をご紹介します~
-最終更新日: 2014年6月4日 (水) -

 NPOテクノロジー犯罪被害ネットワークは、日本で公式に集団ストーカー・テクノロジー犯罪の被害を受理しているNPO法人です。この度は、この団体についてご説明させていただきたいと思います。

 NPOテクノロジー犯罪被害ネットワークは、前身を1998年発足の「電磁波被害者の会」とし、古くから石橋輝勝(Terukatsu Ishibashi)氏によって活動が行われていました。そして、2007年11月に東京都から正式にNPOとして認可を受け、現在では日本で唯一の公的な被害者団体としての地位を築いています。このNPO法人の活動は下記の通りです。

1.街宣・陳情活動
リンク: STOP! テクノロジー犯罪・嫌がらせ犯罪 in 大阪デモ行進!(Youtube動画)

 NPO法人では定期的に街宣活動を行っています。当初は東京のみで行われていましたが、現在は大阪など各地で会員による街宣活動が行われています。また、2013年10月には大阪で初のデモ行進を成功させています。


NPO法人の陳情先一覧

 そして陳情です。日本政府の各大臣、主要政党の議員、各政府機関に理事長が陳情書を提出して請願を行っています。しかし、その努力にもかかわらず、正式な回答が得られるに至っていません。われわれは一刻も早い国家機関による取り組みが実現しなければならないと考えています。


2.被害者間の自助活動

 NPO法人では、東京、大阪をはじめとする主要7都市で被害者の集まりを開催しています。そこでは、つらい被害を受けている参加者が自分の被害話を吐露する時間帯もあり、被害者相互の自助ミーティング(self-help meeting)として機能しています。被害者の増加により、私の参加している大阪の会合では毎月初参加者が訪れる状態です。


3.テクノロジー犯罪被害フォーラム

 年に一度、東京と大阪で一般の方向けに講演会を開催しています。それがテクノロジー犯罪被害フォーラムです。2014年には第7回を開催しました。下の画像がフォーラムのチラシです。

開催概要
第7回テクノロジー犯罪被害フォーラム
~地球規模の犯罪(テクノロジー犯罪・嫌がらせ犯罪)の社会的認知と法整備を求めて~
東京開催 2014年4月27日(日)13:00~17;00
大阪開催 2014年5月10日(日)13:00~17:00

この動画が石橋理事長の講演の冒頭部分です。被害を網羅する説明が行われ、認知と法整備の必要性を訴えています。一般の参加者はまだ少ないですが、年々増加しています。われわれは、メディア・政府関係者の参加を強く求めています。


以上がNPOの主要な取り組みとなっています。NPOでは、昨年石橋理事長がアメリカに渡米、FFCHSの代表、デレク・ロビンソン氏と会談しています。集団ストーカー・テクノロジー犯罪は国際的な被害者の相互交流が加速している段階にあります。民主主義国家の盲点を突いて蔓延するこの犯罪を一刻も早く食い止めなければなりません。われわれ日本の被害者の動きにぜひご注目ください。




To all of you in the international community

- Aiming for a resolution throughout the whole world -
-Final revision date: May 30th 2014 (Friday) -

20140530_whole the world

 This relates to the organized stalking and electronic harassment issue that is spreading around the whole world. With this blog, we have repeated observations aimed at its resolution over many years. On this occasion, I would like to explain the approach of Japan to all of you in the international community.

 Organized stalking and electronic harassment, as I have stated before, is the worst abuse of human rights in the history of mankind, and is happening right now in the present tense. Organized stalking, as the name suggests, are when an unspecified large number of perpetrators follow somebody using legal methods for harassment purposes. Electronic crimes are when torture is additionally applied electronically from a remote location. We victims are having the freedom of our actions and our privacy attacked, and are being tortured on a daily basis. Many victims suffer greatly and end up committing suicide.

 The Technological Crime Victims Network Specified Nonprofit Organization, which is a victims organization in Japan, has confirmed 1323 victims by 2014. This looks like being just the tip of the iceberg, and it is thought there are actually many more potential victims. Further, the American victims organization FFCHS is said to have confirmed more than 2000 victims domestically in the U.S.

 Faced with this problem in which there is an urgent need to enact global legislation and rescue victims, we, in Japan, started an approach 4 years ago. This is an approach using subliminal messages. We victims have received frequent harassment from a program that is financed by the perpetrators. As a countermeasure against this, program has been constructed and financed by those on the side of the victims that supports victims, hinting at a resolution. This is then relayed by a wide variety of people. Through this continued approach, the taboo has been removed, awareness has spread and opportunities for resolution have increased. Currently, the democratic states of the world have adopted this method and its resolution is spreading throughout the whole world.

 Currently, America, which was the starting point for this problem, has made progress to the point where this problem will soon be publicly recognized. We want to continue with this approach, with Japanese society taking the lead, in order to bring a good result for the victims as soon as possible. Now, at this time, new casualties are emerging. This needs to be urgently resolved. I hope that all of you in the international community will focus your attention on this approach.


〈Reference〉

Technological Crime Victims Network Specified Nonprofit Organization (Japan victims organization)
20140529_テク犯

FFCHS (American victims organization)
20140529_FFCHS.jpg

ICAACT (European victims organization)
20140529_ICAACT.jpg


Juan Mendez
20140529_JMendez.jpg

 At the Technological Crime Victims Network Specified Nonprofit Organization, Juan Mendez, special rapporteur for torture at the UN, has received a report on the damage. This was achieved through the visit to the United States of Terukatsu Ishibashi, Chairman of the Board of Directors for the NPO.I hope you will all stay up to speed with future developments.

この英文記事は翻訳者に著作権が帰属します。無断使用を禁じます。




国際社会の皆さまへ
~世界全体での解決を目指しています~
-最終更新日: 2014年5月30日 (金) -

 世界全体で蔓延している集団ストーカー・テクノロジー犯罪の問題。当ブログでは長年にわたって解決のための考察を行ってきました。この度は、国際社会の皆さんへ私たち日本の取り組みをご説明したいと思います。

 集団ストーカー・テクノロジー犯罪は、以前にも申し上げましたように、現在進行形で行われている人類史上最悪と言っていい人権侵害です。集団ストーカーとは、その名の通り不特定多数の加害者が特定個人を合法的な方法でつきまとい、嫌がらせを行うことです。テクノロジー犯罪とは、その上に遠隔から電磁波により拷問を与えることです。われわれ被害者は、行動の自由やプライバシーを奪われ、きつい拷問を受ける毎日を送っています。多くの方が苦しみのあまり自殺で亡くなっています。

 日本の被害者団体であるNPOテクノロジー犯罪被害ネットワークでは、2014年までに1323名の被害者を確認しています。これは氷山の一角であるとみられ、実際にはより多くの被害者が潜在的に存在しているものと考えられます。また、アメリカの被害者団体であるFFCHSではアメリカ国内で2000名を超える被害者を確認しているといわれています。

 世界的に法整備の制定・被害者の救済が急がれるこの問題において、われわれ日本人は4年前にある取り組みをはじめました。それが、サブリミナル・メッセージによる取り組みです。われわれ被害者は、加害勢力の資本出資を受けた番組でしばしば嫌がらせを受けます。これを逆手にとって、被害者にとって味方の勢力の出資した番組で、解決をほのめかすなどの被害者をサポートする番組構成を行います。そして、これを様々な人物がリレーで行います。この継続的な取り組みにより、この問題はタブー性が取り払われ、認知が広まり、解決の機運が高められてきました。現在では、世界の民主主義国家がこの方式を採用し、解決の広がりが世界中へ広まっています。

 現在では、この問題の発端となったアメリカがまもなくこの問題を公式に認めるだろうという段階にまで進んでいます。一刻も早く被害者にとってよい結果が得られるよう、日本社会が率先してこの取り組みを続けて参りたいと思っています。今この時間にも新たな犠牲者が発生しています。解決は急務であります。国際社会の皆様もこの取り組みにご注目いただけますと幸いです。

(国連で被害を受理しているユアン・メンデス氏)

 なお、NPOテクノロジー犯罪被害ネットワークでは国連の拷問に関する特別報告者のユアン・メンデス氏に被害を受理していただいています。これは、NPOの理事長である石橋輝勝氏の渡米により実現しました。こちらの動きにもご注目いただけますと幸いです。




拡散をお願いします !!

イルミナティの力の根源は思考盗聴技術

思考盗聴技術を元に全世界で集団ストーカー・テクノロジー犯罪を展開しています


20161113072913ec0-min.jpg

イルミナティの世界支配の力の根源は、思考盗聴技術をベースにした集団ストーカー・テクノロジー犯罪という見えない圧力です。この事実を世界に拡散してください !!



民進党をお頼りください

民進党は間もなく集団ストーカー被害を認知します
党員・サポーター・地元議員を頼ってください


20170314_民進党_小

被害者の皆様は、民進党は間もなく集団ストーカー・テクノロジー犯罪について認知する方針であり、サポーター・党員ができるサポートが拡充されました。ぜひ民進党をお頼りください。



ASKAさん、頑張って !!

700番 第二巻/第三巻 ASKA
ASKAさん、光を当てていただいてありがとうございます


20170216150912135_小

ASKAさんは、2017年2月17日発売の著書で集団ストーカー被害について触れられました。我々の犯罪に光を当てていただいたことになります。ASKAさんはこの犯罪に負けられる方ではありません。音楽活動、頑張ってください !!


700番 第一巻 ASKA
~ASKAさんは間違いなく未認定犯罪の被害者です~


20170319_ASKAさん_小

ASKAさんが、女友達の被害について相談に乗った後に、ASKAさんが盗聴盗撮被害を受けた経緯が克明にまとめられています。こちらも被害者必携の著書です。



京都大学であったこと

私が京都大学で集団ストーカー犯罪を受けた起源 支援者の皆様のおかげで卒業できました

20170220_kyotou_小

私が集団ストーカー加害行為を受けていた起源が、京都大学の1回生のころであることが調査によって分かりました。当時、助かる被害ではなく、岡田敬司先生杉原保史先生はじめ、皆様のサポートがなければ卒業できませんでした。当時私に関係した皆様にご覧になっていただきたいです。



緊急時のお問い合わせ 

孤立している方、緊急時の方は遠慮なくお問い合わせください。自殺を考えている方がおられましたら必ず踏みとどまってください。

20150308_緊急時のお問い合わせ

上記ボタンをクリックしてください。緊急時の方は積極的にご利用ください。ただし、ご返信は被害相談に限定させていただきます。


20161201_まとめ-min_小
集団ストーカー・テクノロジー犯罪 被害記事まとめ

お問い合わせをご検討の方、被害についてお知りになられたい方はまずこちらの記事をご覧になって下さい。被害のまとめ記事です。随時更新して参ります。
(2016年11月8日更新)


20150516190523cb7-min.jpg

プロフィール 

20130308183551b1b-min_1.jpg
author : Masanori Kawasaki
川崎正典

I am one of the victims of organized stalking and electronic harassment crimes in Japan.I am on the steering committee of the Technological Crime Victims Network Specified Nonprofit Organization. I am a graduate of Kyoto University.

集団ストーカー・テクノロジー犯罪被害者。2010年より集団ストーカー・テクノロジー犯罪の法制定を実現するために国会議員を目指してブログを開設。NPOテクノロジー犯罪被害ネットワーク広島進行役。京都大学総合人間学部卒。

My twitter ⇒ @masa_kawasaki



世界の被害者団体ほか

NPOテクノロジー
犯罪被害ネットワーク

(日本の被害者団体)
20140520231128317-min.jpg

FFCHS
(アメリカの被害者団体)
20160630081551bf8-min.jpg

ICAACT
(欧米の被害者団体)
20140520_ICAACT-min.jpg


COVERT HARASSMENT CONFERENCE 2015
(ベルリンの国際会議 2015年10月)
201503151204389a9-min.jpg




NPO出版の被害報告集

テクノロジー犯罪被害者による被害報告集―遠隔技術悪用を告発する33名の被害者自身による被害実態報告テクノロジー犯罪被害者による被害報告集―遠隔技術悪用を告発する33名の被害者自身による被害実態報告
(2010/05)
商品詳細を見る

テクノロジー犯罪被害者による被害報告集〈2〉遠隔技術悪用を告発する29名による実態報告テクノロジー犯罪被害者による被害報告集〈2〉遠隔技術悪用を告発する29名による実態報告
(2013/06)
商品詳細を見る

NPO法人で掲載者を募り、内山治樹氏のご努力により出版された被害報告集です。被害の実態がすべて記載されています。ぜひご覧になってください。




第9回テクノロジー犯罪被害フォーラム

201603261256282ab-min.jpg

今年もテクノロジー犯罪被害フォーラムが開催されました。詳しくは上記チラシをクリックしてください。動画、資料PDFをアップしております。また、NPOのホームページの情報もご参照ください。

HPはこちら ⇒ 【HPリンク



NPO広島集い

20150415075928b95-min.jpg

日時:3月26日(日)
場所:広島市中区舟入公民館 会議2
時間:13:00~

所定のアンケートを記入・持参した方でなければ参加できません。ご注意ください。なお、NPOでは本人確認を行うことを決定しました。免許証やパスポートなどの提示をお願いいたします。

HPはこちら ⇒ 【HPリンク】


これまでの成果

サブリミナル・メッセージの取り組みが成し遂げたもの

われわれのサブリミナル・メッセージの取り組みによって様々な事項が国際的合意を得ています。これら一連の成果のまとめ記事です。当ブログのサブリミナル・メッセージの取り組みをお知りになるために最も適した記事です。ぜひご覧になって下さい。

20151115121419279-min.jpg




過去のおすすめ記事

NO.1
201510211641457f0-min.jpg
被害者全員で国連に被害を報告しよう
拷問に関する国連特別報告者、ジュアン・メンデス氏へのメールの書き方



NO.2
20160610084049c09-min.jpg
集団ストーカー行為の被害集計
NPO法人による被害集計①



NO.3
20160610084047843-min.jpg
テクノロジー犯罪の被害集計
NPO法人による被害集計②



NO.4
20121227145740dba-min.jpg
サブリミナル・メッセージ
メディアで進められる水面下の交渉



NO.5
20140202060519b10-min_1.jpg
思考盗聴について
被害の経験によりここまで分かっています



NO.6
20130917135330161-min.jpg
私が提言する日本の被害者のとるべきスタンス 国際的に包括的に解決を進める必要があります


NO.7
20161108022836523-min.jpg
メディアのサブリミナル・メッセージの実態 解決したい勢力と加害勢力の熾烈な戦い


NO.8
201201111249533b8-min.jpg
原告団を形成して国の責任を追及する
被害者で団結して社会に訴えかけよう



NO.9
201511100620190b2-min.jpg
特定新興宗教団体は日本人の思考を読みたい放題 一刻も早く規制を実現しなければなりません


NO.10
20151110062021637-min.jpg
加害行為に利用される意識への介入
ほのめかしは実は電磁波による交信によって行われていた





ご家族の皆様へ


集団ストーカー被害は被害者一人で乗り越えるには大きな困難が伴います。場合によっては被害者本人が自殺に至る可能性もあります。それを防ぐにはご家族の方の理解がなければなりません。新たにカテゴリ「ご家族の皆様へ」を設け、集団ストーカー被害者のご家族の方へのメッセージを綴りたいと思います。ぜひご覧になってください。2015年11月11日、ご家族のためのQ&Aを追記しました。ご参考下さい。

2015111114094119c-min.jpg

第一回記事
家族は被害者をどう理解すればよいか
~問題解決に必要な家族の力~




被害者全員で国連に被害を報告しよう

国連の拷問に関する特別報告者、ジュアン・メンデス氏⇒国連サイトへのリンク)が全世界のテクノロジー犯罪・集団ストーカー被害の報告を受け付けるということです。これを機に日本のすべての被害者に呼びかけます。下記のアドレスに所定のフォームで被害報告をお送りください。(9月23日英文の書き方を解説しました。

なお、現在ではメンデス氏にすでにメールが送れなくなっているようです。日本の被害者の皆様はお気を付けください。日本での被害史上最も重要なアクションのため、この記述は残します。ご参考ください。

記事はこちら ⇒ 【記事リンク】

TAG index Webサイト
TAG index Webサイト
TAG index Webサイト
TAG index Webサイト
TAG index Webサイト
Please spread this fact !!

The source of Illuminati's power is the thought reading technology

- They've killed a lot of people arround the world by the gang stalking and electronic harassment -


20161113072913ec0-min.jpg

Illuminati achieved soft domination of the world by the thought reading technology. In this blog, we have opened their assassination methods. The world needs to get over this taboo. Please also take a look at this article.

-Nov 14, 2016-



The NPO's Action

Covert Harassment and Overt Harassment in Japan
- The document submitted to Mr. Mendez of the UN -


201510211641457f0-min.jpg

Presenter: Terukatsu Ishibashi (The Chief Director of Technological Crime Victims Network Specified Nonprofit Organization in Japan)

-October 21, 2015-



Our vision

Rush to form international treaties
- Unless there is regulation at an early stage, there is no future for mankind -


20150607083810ef8-min.jpg

From this year, there has been an increase in international interaction between victims. This signifies that this problem is becoming a truly international issue. On this occasion, we would like to explain about the objectives of us victims in relation to this problem...

-June 7, 2015-



Approach of this blog

To all of you in the international community
- Aiming for a resolution throughout the whole world -


201405311021486fc-min.jpg

This relates to the organized stalking and electronic harassment issue that is spreading around the whole world. With this blog, we have repeated observations aimed at its resolution over many years. On this occasion, I would like to explain the approach of Japan to all of you in the international community....

-May 30, 2014-



About the NPO

Technological Crime Victims Network Specified NPO
- Introduction to the victims organization in Japan -


201406041909471a6-min.jpg

The Technological Crime Victims Network Specified NPO is the NPO corporation that has officially recognized the damage caused by organized stalking and electronic harrassment in Japan. On this occasion, I would like to explain about this organization....

-June 4, 2014-

カテゴリ

openclose


サブリミナル・メッセージ記録ブログ
(サブリミナル・メッセージの記録は別サイトで行っています。ご参照ください。)



検索フォーム



リンクについて

リンクフリーです。集団ストーカー、テクノロジー犯罪の被害者の方やこの問題の認知を目的とされる方のリンクを心よりお待ちしています。

ただし、著作権は守ってください。画像・文書の転載はしないようお願い致します。また、英文の一部の記事は翻訳者に著作権がありますのでご注意ください。

最新記事の紹介(1)

頑張って、トランプさん

トランプ次期大統領がオバマ大統領の業績を引き継いでイルミナティ摘発を次期政権で実現することを快諾した。トランプ次期大統領の懐の深さの表れである。日本の被害者の皆さん、政権交代時の混乱はありません。ぜひトランプ次期大統領にご期待ください。

20170116_トランプ氏_小



最新記事の紹介(2)

バチカンも正常化します

過去のローマ法王からイルミナティのNO.3を輩出していたバチカン市国も正常化することとなった。英国王室に続き、イルミナティの闇と戦っていくとのことである。反イルミナティの動きが急速に広がっている。期待しよう。

20161122_バチカン_小-min



最新記事の紹介(3)

イルミナティの力の根源は思考盗聴技術

イルミナティの力の根源は、アメリカで技術開発されてきた思考盗聴技術である。現在、世界の都市部でテクノロジー犯罪のデバイスが配備されており、その圏内にいる人物はいつでも思考盗聴を受ける恐れがある。これによって彼らはソフトな世界支配を実現してきた。この記事をご覧の皆様は、ただちにこの情報を拡散して欲しい。人類はイルミナティに勝利する必要がある。今、その瀬戸際なのである。

20161113072913ec0-min.jpg



最新記事の紹介(4)

イギリス王室が正常化します

イギリスに激震が走った。トップの女性を除いてすべての英国王室の人物がイルミナティを脱退するというのである。現在、集団ストーカー・テクノロジー犯罪を取り巻く環境が大きく変わりつつある。これでタブーが外された。必ず公になるはずである。

2016111208121875f-min.jpg



最新記事の紹介(5)

トランプ次期大統領、イルミナティ摘発をお願いします

ドナルド・トランプ氏が次期アメリカ大統領に選出された。氏は、もともと反イルミナティに関しては親和的な政治家である。氏ならきっとオバマ大統領の遺志を受け継いで完全にイルミナティを摘発してくれるという期待を込めて書いた記事である。ぜひご覧になっていただきたい。

20161109154446d95-min.jpg



最新記事の紹介(6)

President Obama, we know you can do it.

イルミナティを摘発することができるのはオバマ大統領だけである。任期の最後にぜひ彼に摘発を成し遂げていただきたいと思っている方は多数である。頑張って、オバマ大統領 !!

20161103131903e4a-min.jpg



最新記事の紹介(7)

自民党の解決スタンス

このブログを路線転換する。これまで、私は民進党から立候補する前提でリベラル論を述べてきたが、被害者第三極を形成し、自民党の協力を得て解決を目指すことにした。政策遂行能力のある彼らと組まなければ、しばらく日本では解決できないだろうからだ。彼らは純粋な日本人の救済を目指している。ぜひご覧になっていただきたい。

20161025133835d37-min.jpg



最新記事の紹介(8)

集団ストーカー行為を防止する政治的枠組み ③

日本では、世界に対してメルクマールとなるような法案制定が行われなければならない。そのためには、ロスチャイルド財団・ロックフェラー財団によって健全化した自民党と組むことも求められる。被害者が第三極を形成して政権与党に与するのである。

20160925132109f1d-min.jpg



最新記事の紹介(9)

勝利宣言です

アメリカが、ロスチャイルド財団・ロックフェラー財団の協力を借りて、加害秘密結社最高機密施設への軍事突入を成功させた。犠牲者は一人も発生させなかった。これにより、事実上世界で集団ストーカー・テクノロジー犯罪が解決に向かうことになるだろう。人類の勝利である。

20160907043445be9-min.jpg



最新記事の紹介(10)

ユダヤ系の巨大財団が被害者迎合資本を投入しました

2016年8月に行われた加害勢力の総攻撃。これに対抗するためにオバマ大統領はユダヤ系の巨大財団に資本出資を依頼した。彼らはこれを快諾。日本の被害者は寸前で助けられた。この合意により、もう一方の共和党支持の巨大財団も被害者のための出資を約束。協調して解決行動を行っていくことで合意された。彼らには感謝の言葉もない。期待して見守ろう。

201608141827072a1-min.jpg
201608151149288f9-min.jpg



最新記事の紹介(11)

集団ストーカー・テクノロジー犯罪におけるマインドコントロールについて

我々の被害は非常に残酷なマインドコントロールを可能にする。思考登頂技術の存在によってプライバシーがない状態で熾烈な攻撃を受けるからである。今回は私の事例をもとに高度なマインドコントロールを解説した。ぜひご覧になっていただきたい。

201607130210494c6-min.jpg



最新記事の紹介(12)

同和社会が加害行為をやめる決断をしました

これまで同様に加害特定新興宗教団体から依頼を受けるなどして加害行為を歴史的に行ってきた同和社会が加害行為をやめ加害特定新興宗教団体から手を切ることを決断した。これにより解決主体に賛同する勢力が加害勢力と拮抗することになり、公になるのも間近と思われる。ご期待いただきたい。

201605031238388df-min.jpg



最新記事の紹介(13)

加害勢力の崩壊

特定新興宗教団体に属している在日の方々が、その特定新興宗教団体を裏切り、加害行為をやめることを決断した。もはやこの問題が公になる前の最後の出来事である。被害者の皆さんは注目していただきたい。歴史的な英断である。

20160210012101480-min.jpg



最新記事の紹介(14)

韓国社会の変化

在日社会が変化しようとしている。これまで加害特定新興宗教団体で急先鋒となってきて加害行為を行ってきた彼らが加害行為をやめ、被害者を防御する役割を担うことを誓った。構造的に動かすことができなかった問題が動こうとしている。日本人被害者の皆さんは、彼らの決断を受け入れてほしい。

201601220127406c5-min.jpg



最新記事の紹介(15)

ノーベル委員会がサブリミナル・メッセージの取り組みに参入

ノーベル委員会がその公式ページNobelprize.orgでサブリミナル・メッセージの取り組みに参入した。思考盗聴をはじめとするテクノロジー犯罪の技術が人類にとって最も深刻な危機であるという認識に立ったからだ。中立を前提とする彼らにあって、このようなアクションへの参入は極めてまれなことである。被害者として感謝この上ないことである。動向を注視したい。

20151103113647e91-min.jpg



最新記事の紹介(16)

中国は欧米の秘密結社に対峙します

この被害の胴元である欧米の秘密結社。彼らのパワーバランスが崩れる原因となったのが中国の台頭である。この彼らの影響力は見過ごすことはできない。この問題の解決に中国を巻き込むことは不可欠である。この観点から述べた記事。ぜひご覧になっていただきたい。

201506141251197f5-min.jpg



最新記事の紹介(17)

被害者はレイシズムに陥らないでください

以前にも書いたとおり、一部の被害者がヘイトスピーチの手法を用いて排外主義傾向を強めていることに対する警告である。在日韓国人の方々はすでに一般の市民に対しては集団ストーカーを行わないよう義務づけられている。彼らを加害特定新興宗教団体から切り離すのがオバマ大統領の狙いでもある。日本の集団ストーカー被害者も正常化すべき時に来ている。すべての被害者にご賢察をたまわりたい。

201505061258063a7-min.jpg