Fight on!! President Trump

- Only Trump can solve the problem of Illuminati gang stalking and electronic harassment -
-Final revision date: May 19th 2017 (Fri) -

20170521_トランプ大統領

 President Trump is facing a dilemma. Although he is receiving strong support from his grass roots supporters, his approval ratings are falling due to the daily attacks by the media.

 Looking from our perspective of solving the problem of gang stalking and electronic harassment by the Illuminati, there is nobody who can do this better than President Trump. The reason for this is that he is supported by a wealth of his own capital and thus does not need to lobby the media or major corporations. At the same time, as he is opposing the Illuminati, which contains a large number of the ruling classes, he is currently the victim of all-out attacks by the media.

 During the term of President Obama, the top religious leader in the Illuminati was arrested, and President Trump has inherited these investigations. On the appointment of President Trump, he provided important testimony. Based on this, President Trump is currently negotiating in a diligent way with the NO.1 and NO.2 of the Illuminati.

 As of May 2017, it is planned that President Trump shall travel overseas. This is due to include a meeting with the Pope. The objective of this is thought to be to deepen negotiations with Pope Francisco on how to persuade the NO.1 and NO.2 of the Illuminati. This is very promising.

 To repeat, there is nobody more capable of exposing the Illuminati than President Trump. Do you remember that the Illuminati celebrities and singers in the United States all supported Hillary Clinton during the last Presidential election? There will never be a better opportunity to expose the Illuminati than now. We hope that all American citizens will continue to give their firm support to President Trump.

 President Trump, we truly believe that you can set us free from the darkness of the Illuminati. This will make you the greatest President in history. We are supporting you from Japan. Keep fighting!!

この英文記事は翻訳者に著作権が帰属します。無断使用を禁じます。




頑張って!! トランプ大統領

~イルミナティの集団ストーカー・テクノロジー犯罪を解決 できるのはトランプ氏しかいません~
-最終更新日: 2017年5月19日 (金) -

 トランプ大統領が窮地に立たされています。盤石な支持層はトランプ大統領に対する強固な支持を続けていますが、連日メディア攻撃を受けて支持率が低下しています。

 我々のイルミナティの犯罪である集団ストーカー・テクノロジー犯罪の解決の観点からすると、トランプ大統領以上の方はいません。なぜなら、彼は自らの潤沢な資本に支えられており、メディアや大企業にロビイング活動を必要としないからです。同時に、支配者層を多く輩出するイルミナティと敵対しているため、彼は現在メディアから総攻撃を受けています。

 オバマ大統領の任期にイルミナティの宗教的司祭のトップが逮捕されましたが、トランプ大統領はこの取調べを継承。トランプ大統領の任期の際に、彼からの重要な証言が得られました。これによって、イルミナティNO.1、NO.2の人物に鋭意トランプ大統領が交渉している最中です。

 2017年5月現在、トランプ大統領がこれから外遊をされますが、その中にローマ法王と会う予定があります。これは、ローマ法王フランシスコに、イルミナティNO.1、NO.2の人物を説得するよう交渉を深める目的があるものと思われます。期待しましょう。

 再度申し上げますが、イルミナティの摘発において、トランプ大統領以上の人物はいません。アメリカのイルミナティの芸能人・歌手が皆、先日の大統領選ではヒラリー・クリントン氏を支持したのを覚えていらっしゃいますか?今をおいてイルミナティを摘発する好機はありません。アメリカ国民の皆様におかれましては、引き続き、トランプ大統領に対する強固な支持を継続していただければと思います。

 トランプ大統領、あなたなら必ずイルミナティの闇を解決できます。歴史上もっとも偉大な大統領になるでしょう。日本から応援しています。頑張ってください !!




Mind Reading

- We know the following from the experiences of victims up until now -
-Final revision date: May 7th 2017 (Sun) -

20170420_brain.jpg

 On this occasion, we would like to explain about mind reading, which is the most severe example of the invasion of human rights from among the harm we currently experience. As we have previously stated, the technology that makes electronic harassment possible is referred to as the “Frey effect”. This is technology acquired by the U.S. army and, as described in Wikipedia, this involves transmitting voices to specific people that other people cannot hear.

 Here, we can imagine that if the sense of hearing can be transmitted then other senses could also be easily transmitted. In actual fact, it is possible to transmit all five senses and three desires. Human thought is also a type of sense. Mind reading is the technology for connecting to humans like mobile telephones, where the connecting human senses the sensations (thoughts) of the victim. This is possible by transmitting microwaves with certain characteristics. Although it is difficult to communicate the sensation of images and the like, the sensation of thought can be communicated clearly with very weak radio waves at long distances.


Contents

1. How does the perpetrator read the thoughts of the victim ?
 1-1. Possession and carrying of a remodeled transceiver
 1-2. Loading devices on ordinary vehicle batteries
 1-3. Loading vehicles on large-scale vehicles/residences
2. The true nature of harmful radio waves is microwave pulses
3. In recent years, there have been automated attacks using PC automatic analysis and artificial intelligence
4. Please do not excessively fear mind reading
5. Information leaks due to mind reading
6. When dialog is established between the perpetrator and the brain
7. There is starting to be coverage on mind reading
8. The ringleader of mind reading in the world is the Illuminati
9. The book “How to Tame a Demon” written by Professor Robert Duncan



1. How does the perpetrator read the thoughts of the victim ?

 Please refer to the diagram. This is carried out by people with devices emitting microwaves in the band used for electronic harassment. Based on our experience, there are three basic patterns.

20170507_mindreading.jpg

(1) Possession and carrying of a remodeled transceiver
 My American friend told me about this. When electronic harassment occurs overseas, the harmful activity occurs by the transceiver being remodeled to emit electromagnetic waves in the microwave bands as output. This technology is simple, and is the reason for the spread of electronic harassment. A device covering several tens of meters is brought within a zone where it can establish the Frey effect with the victim, and perform harmful acts.

(2) Loading devices on ordinary vehicle batteries
 This is the most widely used method. By connecting an electromagnetic wave device to the vehicle battery, power is supplied, allowing the harmful actions to take place. As this covers a long distance(up to several km), the perpetrator can move and harmful actions performed wherever the victim moves.

(3) Loading vehicles on large-scale vehicles/residences
 Further, the perpetrators are committing powerful attacks. There are cases of connecting to vehicles in which large-scale batteries are loaded and connecting to the power in residences. This enables the electromagnetic waves to be discharged powerfully, and to cover several tens of km. Further, while mind reading can take place with weak electromagnetic waves, the intensity of electronic harassment is in proportion to the output, and in inverse proportion to the distance. Therefore, if electronic harassment takes place using these methods over very short distances, extreme pain is felt. In my case, I received an attack that gave a strong pain to my heart, to the extent that it changed the pulsations.





2. The true nature of harmful radio waves is microwave pulses

20170507_mindreading2.jpg

 Currently, the fact that mind reading and electronic harassment are possible using radar technology has been clarified by the American Technology Developer Professor Duncan. The cause of this discovery was the fact that a certain sound can be heard when radar at a specific frequency is irradiated on the human body. There are reports that this had already been discovered at the time of the Second World War.

 Therefore, if we suppose, for example, that a vehicle equipped with a mind reading device can send electromagnetic waves 5km ahead, then a person can be the victim of mind reading anywhere within a 5km radius. As shown in the figure, mind reading is possible within the circumference. To state this in easy-to-understand terms, this equates to the relationship between mobile telephones and base stations. Mobile telephones can be reached anywhere within the circumference of the effective radius from the base station. In the same way, with this attack, the electronic harassment device of the perpetrator synchronizes with the human body. Based on this, there is a connection between the senses of the operator and the victim, and a mind reading attacks are possible.

(As this is radar technology, Professor Duncan stated that by boarding a stealth fighter, it is possible to prevent exposure to radar. However, as this is military technology, it is not publicized, and it is virtually impossible for ordinary people to take such measures. )




3. In recent years, there have been automated attacks using PC automatic analysis and artificial intelligence

 The actual state of harmful actions is becoming clear through various reports. In the past, the operator made a direct connection with their own senses to read their thoughts in real-time, but currently, this is analyzed using a device.

 In concrete terms, sensory transmission technology is connected to a high-performance PC and the PC puts this into language form and records in real-time. In such a case, victims who are always at home are targeted, and the perpetrator for a specific home can automatically send electromagnetic waves. Even if they leave the house, this leaves a record in real-time. Human reading is considered to have already been introduced at this stage.

 Further, in the past, thoughts were read in real-time by connecting senses, and mind control was performed by returning words as a voice transmission. Nowadays, by reaching a certain level of artificial intelligence, it seems there is the harmful activity of automatically returning words. We have simultaneously entered the state in which machines automatically attack people and carry out mind control. Methods of gang stalking and electronic harassment are growing ever more sophisticated year by year, and becoming a huge threat to mankind.




4. Please do not excessively fear mind reading

 There is no complete method of preventing this mind reading. This is because the microwaves used in electronic harassment have such high levels of penetrability. For this reason, they cannot be prevented unless you are on a remote island or deep inside a tunnel. You can easily be the target of mind reading even if you are inside a concrete building. Further, water intercepts electromagnetic waves. As also stated below, in a mist sauna harmful electromagnetic waves are blocked and you experience your body feeling lighter. It may be good for victims to use water effectively. This mind reading has been prevented from becoming public by the taboos of the overseas Illuminati, and mankind has gotten hold of a forbidden technology that causes mankind to lose both human rights and privacy.

 However, harmful influences are extremely fearful of this problem being uncovered. Therefore, the only actual harm brought about by the individual information obtained through mind reading is use in the harmful activity of “insinuation”. In principle, there is the risk of listening in on the thoughts of business owners and carrying out insider trading, but recently there have been no such reports. There are also no reports currently of actual damage caused by the stealing of PC passwords and bank pin numbers. The perpetrators are not actually causing physical harm or damage, or murdering their victims. Harmful actions are virtually all being carried out with the aim of inflicting mental damage. Knowing this, there is no need to be unduly afraid.

 Of the damage we suffer, the ones most often appearing in damage statistics are wiretapping and voyeurism, but in fact there are very few cases in which wiretapping and voyeurism devices have been found. Nearly all relate to information leaks via mind reading. In the same way, PC information leaks are due to mind reading rather than viruses. This technology is also used when being tracked by gang stalkers. In this way, mind reading is being used in a wider range and more frequently for gang stalking and electronic harassment than previously thought.

 There have been reports by the Specified NPO Technological Crime Victims Network, which is a victims organization in Japan, of contractors receiving large-scale orders for the purpose of blocking electromagnetic waves for electronic harassment. However, nearly all reports state that even when paying several million yen to place magnetic shielding plates around the room, it has not been possible to prevent electronic harassment and mind reading. As stated by the Technology Developer Professor Duncan, there is currently no clear way of protecting against these harmful actions. It seems that, even in rooms commonly known as anechoic chambers, it is not possible to prevent against harmful electromagnetic waves. Please beware of such fraud.




5. Information leaks due to mind reading

 The most common harmful actions within our damage items involve having privacy exposed due to insinuation. This means being told by people passing by, having it written on Internet bulletin boards, or being told by news anchors and celebrities. These are currently known to be almost always resulting from information leaks due to mind reading.

 In principle, whatever the method of insinuation, the perpetrator must not expose information in a way that conflicts with the law. Information is always leaked through implicit means. This is not covered by current laws. Whichever way you look at it, you will receive mental damage, so it is necessary to take measures such as 1) avoiding going out if you are often the victim of insinuation from people passing by, (2) not looking at bulletin boards if things are written on Internet bulletin boards and (3) not watching television if things are said about you on television. Then, when you are in a comfortable physical and mental state, take notes and accumulate evidence on damage received.

 In case of focused harmful activities, the insinuation becomes overwhelmingly powerful through the use of these three methods. This time is the highest risk, and in the worst-case scenario, the victim may be put into a frenzy and admitted into a psychiatric hospital or driven to suicide. To prevent this, innovation is required to prevent being exposed to such harmful actions. Avoid, as much as possible, situations in which you will receive harmful activities. In addition, you should participate in a victims organization at an early stage. Interaction between victims will contribute the most to reducing the effects of mental damage. You can also take the approach of creating followers on Twitter and creating blogs also increases interaction between victims. If one can escape the sense of isolation, it is possible to hold up against this crime from a mental standpoint. You should definitely consider using such methods.




6. When dialog is established between the perpetrator and the brain

 This is the most dangerous mind reading attack. If the information obtained by mind reading is insinuated using the three methods described above it can be intercepted, but this can be directly spoken within the brain using voice transmission technology. It is impossible to guard against this. There are some victims who claim that their thoughts are connected with the perpetrators and they hear voices 24 hours per day, 365 days per year.

 In this case, you should completely ignore what the perpetrator is saying. When you have the capacity, you should make notes regarding the damage. The perpetrator practices mind control using this method. For this reason, they continue doing this however much they are threatened. It is likely that one shall be made to believe mistaken information, so completely blocking this kind of information is the only way to continue leading an ordinary life.

 This is difficult, but possible if become accustomed to it. Long-term victims are all able to do this. If one can remove mind control, it is possible to lead an ordinary life. However, those who have a tendency to listen to what the perpetrators say, should participate in an NPO and listen to the stories of the victims. Look objectively at the damage they have suffered. I think that if you listen to what victims say, you will realize that what the perpetrators are saying is all lies. Connections between victims are a valid measure against such damage.




7. There is starting to be coverage on mind reading (coverage in Japan)

1)The Keizai Shimbun introduced U.S reporting on mind reading



2)WIRED magazine Methods of cracking the brain



3)The Nikkei Shimbun and NHK, Facebook are developing a device that inputs characters just by you thinking of them



 Although they are all written in Japanese, I hope you will use the three articles mentioned above as reference. The Keizai Shimbun and WIRED magazine articles state that the process in which humans receive stimuli and feel sensations is based on electrical signals, and by elucidating these patterns, there are cases where hacking and cracking of the human brain is possible. Further, the technological development of Facebook Inc. has shown that it is already possible to implant an electrode in the human brain and eavesdrop on language information. In the case of electronic harassment and gang stalking, mind is reading is possible from remote locations through the irradiation of microwave pulses. All that is left is to prove this. Since the start of this year, there have been a series of news articles related to mind reading. Let us hope that this is just the start.




8. The ringleader of mind reading throughout the world is the Illuminati

 The crimes of gang stalking and electronic harassment that we are facing are methods of obliterating ordinary citizens developed, as separate projects, by the Illuminati, a clandestine organization that originated in 18th Century Europe and infiltrated the U.S government from 1960. Mind reading is the source of the strength with which they have achieved soft world domination. Without exposing them, it is not possible to be safe from damage caused by mind reading in the world. In Japan, specific new world religious cults are conducting gang stalking/electronic harassment harmful activities based on mind reading, but it is no exaggeration to say that they are also currently under the control of the Illuminati. To expose them, it is necessary to expose the Illuminati.

20161113072913ec0-min.jpg
The Source of Illuminati's Power is Mind Reading Technology
- Gang stalking and electronic harassment has developed throughout the world based on mind reading technology -





9. The book “How to Tame a Demon” written by Professor Robert Duncan

 The work "How to tame a Demon" has been written by Professor Robert Duncan, an electronic harassment technology developer in the United States. It is thought that the term “demon” implicitly suggests the organization perpetrating the harm to be a Satanic clandestine organization.


 In Japan, this work has been introduced within the NPO, and some of it has been translated. This is the only work for which current harmful technology and knowhow, only possible from a former technology developed, is published. I hope you can all use this as reference.



この英文記事は翻訳者に著作権が帰属します。無断使用を禁じます。





The Source of Illuminati’s Power is Mind Reading Technology

- Gang stalking and electronic harassment has developed throughout the world based on mind reading technology -
-Final revision date: April 18th 2017 (Tues) -

20161112_イルミナティ-min


 This article fully uncovers why the Illuminati are capable of exercising world dominance. The influence of the Illuminati peaked between the end of the Second World War and 2010. People who resisted them were always legally obliterated. Now is the time for the whole world to overcome their taboos. People of the world, be sure to spread this truth!


Mind reading technology has been used to the full in new world order plots.

 The source of the Illuminati’s power is mind reading technology, which is one of the technologies with which our gang stalking victims is receiving damage. 

 The technological foundations of mind reading technology are the voice transmission technologies for which the American army acquired patents in 1976. As explained in Wikipedia, these are generally known as Microwave Auditory effects (Frey effect). This is a technology in which sounds inaudible to others are transmitted to certain people. As an extension of this, it is possible for thoughts to be transmitted as well. Generally, in terms of the inventions of mankind, this can be considered a malicious invention to rival that of nuclear weapons.

20170507_brain.jpg
Mind Reading
- We know the following from the experiences of victims up until now -



Gang stalking/electronic harassment is the source of new world order pressure

 The Illuminati developed gang stalking/electronic harassment, based on mind reading technology, as a legal method of obliterating humans. Since the 1960s, a section has been partitioned in the American government for the development of this knowhow, through the infiltration of associates of the Illuminati. The Illuminati have sacrificed people throughout the world while developing this. By exercising this knowhow, it is easy to drive their targets to suicide. It is thought that many people have been the victims of this. This has become a function of the new world order plots they are pushing as the source of pressure to reduce the population and obliterate their enemies.


Even famous celebrities have fallen victim to the Illuminati

 Assassinations using the knowhow of gang stalking/electronic harassment are said to have emerged mainly since the 1990s. The majority of ordinary citizens are pushed into suicide or fall victims of crimes. Some are said to be forcibly admitted to psychiatric hospitals. The main objective of this is the undermining of social credibility.

 Even before this, assassinations were clearly taking place using guns and drugs. John F. Kennedy, John Lennon and Michael Jackson may be said to be cases of this. There are also those who thing Marilyn Monroe falls under this category as well. In Japan, physical assassinations do not take place, but in America, it is thought that such direct killings have occurred. For the Illuminati assassinations, which were previously thought to be the stuff of urban legend, the cases of assassination spread on the Net seem to be virtually all factual.


The cities in developed democratic countries seem to be virtually all within the range of Illuminati mind reading

 In Japan, the specific new religious groups said to be involved in harmful activity are comprehensively developing their electronic harassment activities in the cities. In this way, they always have a structure where they can read the thoughts of the cities within that zone. In America as well, the same kind of scenario is envisaged. They are probably developing facilities that will allow them to perform electronic harassment over the whole country. Currently, the urban areas in developed democratic countries are all facing the same situation. The reason that they are able to achieve world domination is due to the development of this kind of mind reading. It is necessary, therefore, to ban the simple possession of devices that can perform mind reading in the same way as for guns and knives, as well as clarifying and institutionalizing the law related to use microwave radar wave areas.

20150607083810ef8-min.jpg
Rush to form international treaties for regulating gang stalking and electronic harassment
Unless there is regulation at an early stage, there is no future for mankind



Hostility of the Rothschild and Rockefeller families against the Illuminati and working towards a resolution structure

 Finally, it seems that President Obama, with the cooperation of the Rothschild and Rockefeller families, last year, conducted a compulsory investigation into the Illuminati. This made it possible for the two families, who had previously financed the Illuminati, to go against them. Baron Jacob Rothschild spend his life battling the Illuminati and swore to save victims of gang stalking and electronic harassment. Currently, within the same family, he is at the stage of competing for financing with those people swearing allegiance to the Illuminati. They are being forced into a large-scale erosion of assets.


In 911 terror attacks, security staff and Islamic extremists were remotely controlled through mind reading and intervention of consciousness by Illuminati

 If mind reading and intervention of consciousness can be used in electronic harassment, any situation can be caused. This was discovered in the final stage of exposing the Illuminati, the 911 terror attacks were the result of obtaining the situation of the security staff through mind reading, and remotely controlling the Islamic extremists using intervention of consciousness, in order to succeed in their terrorist plot by finding the blind spots in security. Normally, the influence of terrorism would be completely exposed by the American army. This seems to be the truth of 911.

20170420_911.jpg


This is a request to all of you throughout the world. Please hurry to spread this truth that the source of the power of the Illuminati is in this mind reading technology!! Currently, former President Obama and President Trump are working tirelessly to expose them. Without exposing them, it will be impossible for freedom in the world and democracy to continue. We sincerely ask for your cooperation. I would like to close this article by praying that ours will soon be a society rich in human rights where no one in the world is forced to suffer mind reading.

この英文記事は翻訳者に著作権が帰属します。無断使用を禁じます。





Covert Harassment and Overt Harassment in Japan

- The document submitted to Mr. Mendez of the UN -
-Final revision date: October 21th 2015 (Wed) -

20151021_国連

The following is the document submitted to Mr. Juan E. Mendez (The UN Special Rapporteur on Torture and Other Cruel, Inhuman and Degrading Treatment and Punishment).

Submitted day: August 9, 2013

Presenter: Terukatsu Ishibashi (The Chief Director of the Technological Crime Victims Network Specified Nonprofit Organization in Japan)



Covert Harassment and Overt Harassment in Japan

I am the chairman of the Board of Directors Technological Crime victims Network Specified Nonprofit Organization, Terukatsu Ishibashi.
Today, I came here to inform you, Mr. Juan E. Mendez, about the current situation of the victims of covert harassment and overt harassment in Japan.
Firstly, I would like to thank from the bottom of my heart, Ms. Rhonda Pence, and Mr. Derrick Robinson of FFCHS, the organizers of this meeting, who gave us this opportunity for the first time.

It has been 15 years since this NPO’s private organization was established. During the 15 years, we held not only 137 regular meetings in Tokyo, where the main office is located, but we also held meetings all over Japan, such as in Sapporo, Aomori, Sendai, Nagoya, Osaka, Fukuoka and Okinawa, trying to understand the real situation of the damage.
In addition, the 17-page detailed survey we ask our members to respond when they join us has contributed to grasp the real situation of the damage. We have collected the responses from more than 1000 victims and finished totaling answers from 815 people. What I am going to talk about today is based on the total results. As a result of these activities, we have become capable of understanding the real situation of covert and overt harassments to a great extent. I am certain that what I am going to tell you about the situation in Japan will be some reference to you, too.
So, I would like to start with the reason I started organizing this kind of meeting before I start explaining about both harassments which also serves as an introduction of myself.
I realized that I was a victim of covert harassment when I experienced concentrated attacks that used invisible tactics starting May 17, 1995. The attack continued until the spring in the following year. Before the series of attacks, I had been receiving overt harassment since 1991 as a preliminary step. As the harassment escalated, my tap water became abnormal on May 17, 1995. My anger flared up when I thought about those who were harassing me with water, which was important to human beings. Back then, I could not even imagine that an invisible technology could make people sense an abnormality in the tap water, so I was seriously concerned about contamination of the water. When image transmittance was added, I was totally played by them. In other wards, I seriously believed that I could not drink the tap water at home. I drove around looking for water with 20-liter plastic containers in the car. Soon, image transmission directly to my brain started. The images were divided in two sides, one was attacking and the other was protecting. One of them was an image that when I start putting water in the container from the faucet in the public park, somebody sends electric waves to make the water abnormal. The other one was that they have many people making coils to make an electric wave transmitter to interfere the harmful electric waves with counter electric waves. The image of the press conference to announce the completion of the transmitter was sent, too. However, when they are about to use it, it failed and the image was changed to the one in which they started all over again to make the transmitter. I never thought that those images were fictions so that I seriously believed them and was played by them. As the water abnormality related images were escalated and changed, I thought those were true and kept moving all over Japan for a half year. Though, it finally became certain for me that covert harassment is true through these concentrated attacks. I thought that the only way to protect myself is to write a book about my experience and published my book, “Impeaching the Misuses of the Electric Waves as a Weapon!” I began selling the book on July 13, 1997, putting advertisement on Mainichi Newspaper. Since the book was published privately, I could not use established distribution channels, so I kept putting advertisements on newspapers once a month for about a half-year and asked book stores to sell my book one by one. I managed to sell 800 books in that year.

Through my book, I made connection with 24 people who claimed to be the victims of similar harassments. We agreed that this issue could not be solved by an individual; therefore, I addressed the launch of club and started the “Electric Wave Abuse Victims’ Society”, the origin of the NPO based on the approval of 14 people. The name was changed twice later and we
decided to use the current name at the time we changed the club to a NPO in 2007 and lead to the present. Currently, we have more than 360 members. It is important that I, myself, am a victim and I became confident about the covert harassment due to the concentrated attacks. Without the confidence, I think I could not have founded the society and managed to maintain it. Not
to mention there was no way that I could openly appeal to outsiders. Consequently, there is no doubt that firm belief about the harassment is very important in this problem.
Now, I would like to start explaining the outline of harassments. The base used to put everything together is the table I published in my book, “Impeaching the Misuses of the Electric Waves as a Weapon!” I was able to make such a table from my own experience only. We have been using this table as the base of improvement since we launched the society.

Table 1. Electric Wave Abuses Based on Experience

I. Abuses on People
1. Intervention to the brain ① peek into one’s mind, ② transmit images and intentions, ③ image insertion, ④ turn a person into a maniac, ⑤ intervention to one’s thoughts, ⑥ brain sharing (importance of lie detector completion and peeking during sleep, ⑦ suppression and activation of thoughts, ⑧ suppression and alteration of decision, ⑨ dream manipulation and ⑩ oblivion and ecollection (manipulation of memory)

2. Manipulation of Instinct ① appetite manipulation, ② sexual desiremanipulation and ③manipulation of desire to sleep

3. Manipulation of Emotion ① manic-depressive manipulation, ②amplification and relief of hatred ③ make one nervous ④ love manipulation and ⑤ impulse manipulation

4. Manipulation of Physical Functions ① excretion manipulation, ② body odor, ③ gas generation, ④ fatigue manipulation, ⑤ sleep paralysis, ⑥ motor function manipulation, ⑦ illness, ⑧ allergization, ⑨ motion sickness, ⑩ itch and numbness manipulation ⑪ make one’s habit worse ⑫ handwriting manipulation ⑬ loosening one’s lacrimal grand

II. Abuses on Equipment
1. Signal Control, 2. Phone Control, 3. Word Processor Control, 4. Copier Control, 5. TV and Radio Control, 6. Control of the Vehicle Engine Condition

III. Abuses on Natural Environment
1. Weather Control, 2. Water Disturbance, 3. Plant Growth Disturbance, 4. Wind Development (Tornedo Development) 5. Wave Development 6. Earthquake and Volcanic Eruption

Overt Harassment

I am going to explain the real situation of harassments based on the result total of questionnaire survey collected from 815 members. I start with overt harassment. The questionnaire survey conducted by the NPO describes 35 overt harassments and asks you to circle ones you are experiencing or experienced. The 35 items are the following:

Tapping and secret photographing, following (shadowing and stalking) and watch-keeping by people, following and watch-keeping using a car, following and watch-keeping with motorcycle, silent phone calls, threatening phone call, phone disturbance, house breaking, trespassing, loss of money and goods in the house, location change of money and goods in the house, throwing objects into the site, throwing objects into the house, house burglary, site ravaging, dumping dead animals in or around the premise, dumping feces in or around the premise, rape, assault, threatening, cussing, suspicious behavior, hostile attitude (i.e. glaring and spitting), suspicious behavior of the neighbors, suspicious behavior of the people at work, suspicious behavior of the police, gossips, bill distribution, ostracism (isolation), intervention to your PC, suspicious emails, failure of electrical devices, malfunction of electrical devices, malfunction of fluorescent lights, malicious mischief on your vehicle, bike or motorcycle, uncontrollable vehicle, an attack with alien substance when you are driving, malfunction of a car door, undelivered mail, suspicious treatment when you are shopping, suspicious behavior, attitude and the content of the program from TV caster or radio personality that gives you an impression of a personal attack

Table 2 shows the total results. However, there are too many items, so we divide them into 12 categories to explain for easier understanding.

· Following (Stalking)
· Hostility
· Suspicious Behavior of the Neighbors
· Phone Related Harassment
· Failure or Malfunction of Electric Devices
· Trespassing
· Harassment on Vehicles (Car, Bike and Motorcycle)
· Undelivered mails
· Suspicious (dubious) Treatment Experienced During Shopping
· Suspicious Behavior, Attitude and the Content of the Program from TV Caster or Radio Personality
· Implications at Work, etc.
· Tapping and Secret Photographing
I would like to explain each of them.

1. Following
First is following (stalking) harassment. It is a persistent kind of following, which starts as soon as you leave your house and they keep following you one after another. Normally, the victim encounters the next “hostility” at his/her destinations after “following”, and it makes the victim believe that the offender knows where he/she goes next. After all, the victim has no choice but believes his/her entire life is being watched.

2. Hostility
Hostility is executed with following. The victim experiences incidents of glaring, spitting, cussing (abuse) in passing, blocking of the path etc. more frequently. It happens even when you are our in your vehicle and it seems accurate to use an expression, “gang up” due to the number of people following you. Therefore, traffic jams occur all the time, and the offender makes it worse by controlling signals. Such sudden hostile attacks give significant psychological damage to the victim. It is not strange if a person who had peaceful life until yesterday becomes a target of hostile attacks and starts panicking. The hostile attack is so intense that it makes us wonder that the goal of the offender is to send the victim to a mental hospital.

3. Suspicious Behavior of the Neighbors
As a result of the questionnaire survey, many victims suspect their neighbors to be the main body of the crime. Abnormal incidents, such as unusual noise comes from the next door, too many visitors to the next door, sudden change of attitude, the neighbor watch you leave home and close their door loudly as you pass by, the trash he/she placed at the collection place is brought back to the house, your garden tree is cut, dumping trash, feces and dead animals in your premise, every house in the neighborhood repeatedly hangs yellow laundry items outside to dry. There is nobody who can remain peaceful if these incidents are repeated persistently.

4. Phone Related Harassment
Phone related harassment starts, along with the others. Those are silent phone calls, 1-ring calls, nuisance phone calls, abnormal noise from the phone, phone rings when you try to do something, disconnection during a conversation, the phone rings in one-hour intervals while asleep, outgoing call history that you did not make, malfunction, hear a voice that blames you during the subtle pause that the person you are speaking makes, etc. almost all victims believe their phones are tapped. Regarding phone related harassment, it seems possible to get help from the police or phone companies (NTT, KDDI etc.) to identify the offender if you record the date and time and phone number of each incident. However, I have not received any report of being able to get help from such organizations.

5. Failure or Malfunction of Electric Device
The victims also encounter a failure or malfunction of electric devices. In order to fix or buy a new one, they are forced to waste their time and money. Especially, PC malfunctions or failures are increasing nowadays, and some victims have stopped using PCs. It makes us imagine the existence of a specialized department that can control a victim’s PC from distance. When your electronic device fails, you call the customer support center, but they respond to you in a way that make you suspicious if they have been waiting for you to call. Therefore, we think that there may be a special group to harass people that commits in both causing PC failure and pretend to be customer service window. It thoroughly trains the staff to cause malfunctions and to respond to the victim’s request for a consultation, cause failure or malfunction from a distance and drive the victim into a corner by responding senselessly to the victim’s request for consultation. Some victims have been trying to keep and record the evidence, but we have cases in which the recording device broke down or the recording was deleted.

6. Trespassing
Here, nonsensical things occurs repeatedly, for example, things in the house change the location without the knowledge of the owner, lost things, the thing lost days ago comes out from the other place, broken locks, clothes are sewn, volume of the cosmetics decrease too fast or too slow, the room is wet, dust scattered all over the room, a newspaper is rolled up into shape of genitals and left in the room, food in the refrigerator is eaten, etc. Victims of this harassment cannot leave their house, since every time they leave the house they recognize some alterations. It continues even after they make a contract with a security company, so most of them cancel the contract. It seems that such obstinate trespassing is aiming to inflict psychological damage on the victims by letting them know that somebody was in the house.

7. Harassment on Vehicles (Car, Bike and Motorcycle)
There are reports of deflated tires, punctured tires, a sudden total failure of the car, a claim that somebody drew a hand that shows V-sign over the speed meter, as well as a fake accident.

8. Undelivered mails
Many victims send letters that reports the harassment and asking for help, but are very skeptical if those mails are truly delivered. About 20 % of the victims reported about undelivered mails and parcels via post office and home delivery services. We found that the all three letters, registered mail, express mail and regular mail, we sent to Mr. Soichiro Okuno, the member of the House of Representative in April, May and June, were not delivered. We asked his secretary to write a letter and sent it to the president of Japan Post Network Company with the certificate of content. We received a report of delivery in writing, but those three letters are still missing. Knowing what happened to our activity, there is no wonder that the members become more anxious.

9. Suspicious Treatment Experienced During Shopping
This is a type of harassment that the victim is treated impolitely at the register of a super market or home center, the service counter of the bank, post office or public office, a dining room, a restaurant, hair salon and others even though they are customers. The victim demands explanation when it happens, but they arrange people to observe it so that they can put the one assigned to do the job under the pressure that if he/she did not follow the direction, the person, too, would suffer violent harassment later.

10. Implication or Suspicious Attitude from TV Caster or Radio Personality
Some report that TV caster or radio personality implies something related to the victim’s privacy, use what the victim said or did at home in the TV program or peek them from the TV. In the digital broadcasting era, we need to be concerned about the fact that a special program is transmitted to the victim only. We are hoping that the perusal system will be established at the National Diet Library, so that all TV/ radio programs broadcasted nationwide are recorded and be able to review anytime when any suspicion occurs.

11. Implications at Work
There are an increasing number of victims who report implications of their privacy, which only the victim should know, by their coworker. Many people did not have a choice but resign their jobs due to the combination of the implication and harassment. However, there is a case that one of our members who won the trial at the court of final appeal using the recording on his IC recorder as the evidence. The case is a good reference.

12. Tapping and Secret Photographing
In order to coordinate these harassments that I have just explained, the offender must be able to read the victim’s activities. Therefore, overwhelming number of victims suspect tapping and secret photographing. We hire private detectives to investigate this matter, but they were unsuccessful. Thus, we begin to realize that considerably sophisticated monitoring technologies are used.

In addition to the explanation about overt harassments, I want to mention the fact that the victims are experiencing multiple harassments continuously. There is no doubt that these harassments are organized crimes since they are impossible to execute individually. I believe that observing overt harassment from its characteristics would help us better understand the real nature of the crime. So, I would like to explain the characteristics now.

We have found 11 characteristics of overt harassments from our survey.

1. Group Activity: This is a characteristic of harassing a certain individual as a group. This characteristic alone can indicate that overt harassment is an organized crime. Even though it is a senseless action, when you file a suit, you end up being asked, ‘Why so many people have to harass you?’, ‘Are you a very special person?’, ‘Who is paying the cost of use so many people? and ‘Isn’t it your paranoia?’ in reality.

2. Stalking: This is a characteristic that constantly follows a certain individual quietly. Not only while the victim is out, but also follows around even he/she is in the house and make a trouble with a superb timing. It is unbelievable in common-sense terms.

3. Continuous and Repetitive: The harassment lasts persistently 24 hours and 365 days a year.

4. Calculated Timing: The harassment often occurs at a superb timing. For example, the phone rings when you are just about to do something, electrical devices near you make a strange noise every time you move around the house, you hear foot steps from the floor above as you walk on the lower floor, and every time you go to the bathroom you hear somebody go to the bathroom next door. If it ends after a couple of times, it does not feel strange, but it is continuous and quite abnormal.

5. Monitoring: Harassing action with such a great timing cannot be done without monitoring the victim. Therefore, the victim have no choice but believe that somebody is monitoring him/her and hires a private investigator for tapping or secret photographing. Because they cannot find any evidence, we started to believe that considerably sophisticated tapping/secret photographing technology is in use.

6. Systematic: The superb timing of the harassment, which is not so unimportant like somebody peeps in the victim’s life and makes nuisance action, made us start believing that the offender reads victim’s behavior ahead of time and the type of the harassment is programmed in the system to automatically implement the operation. Harassments toward individuals have been highly developed.

7. Organized: Many victims move from place to place in order to escape from the harassment, but it is clear from the testimonies from those victims that harassment continues at the new location. Some moved from Kanto to Hokkaido, Hokkaido to Okinawa, Kanto to Tohoku or Kanto to Kansai, but the situation remained. Also, the victims live all over Japan. Consequently, it is obvious that overt harassments are operated by the crime groups organized nationwide.

8. Networking: The organizations that spread nationwide make their communication network dense and harass victims no matter where they try to escape. Therefore, good communication network is essential for them.

9. Manualized: Since there are victims of similar harassment globally, we think that manuals exist and the offenders are operating based on the manuals.

10. Historical: We have learned from the survey that we have a history of overt harassments that is over 40 years.

11. Preposterousness: The 10 characteristics listed above are all extremely preposterous, and this preposterousness can bind all these characteristics.

The 11th characteristic of preposterousness is especially important. If the harassment is within the bounds of common sense, there would always be somebody who helps the victim. The family member can listen to the victim’s story and friends can help, too. Police, lawyers, executive officers and politicians would listen to you and do something about it. However, the more preposterous the harassment is, the less people will listen to you. The main body of the crime is well aware of the fact, and we started understanding their strong intention to never do a kind of harassment within the bounds of common sense and focus on being senseless. It is extremely important that we clarify such intention of the main body of harassment.
On the other hand, victims become isolated because nobody listens to their complaints about such preposterous harassment. They are cornered and what is left for them is to commit suicide, be taken into the mental hospital or take self-defense measures. It has become to our knowledge that such ending is the picture the main body of the crime has drawn. The achievement of the NPO’s activities is the clear understanding of the crime organization’s strong intention and the picture they have drawn. Also, it is related to covert harassment.

Covert Harassment

Next, I would like to explain covert harassment. We believe that invisible electromagnetic waves and ultrasounds are used as medium. Covert harassment is a crime that uses such medium to attack and control its target’s mind and body accurately from a distance. Like overt harassment, the NPO stated the following 40 items on the questionnaire survey and ask the member to circle the ones they are experiencing or have experienced.

Hear a voice, hear a noise, see images, my thoughts are read by somebody, intervention to the consciousness, suppression and activation of the brain activity, unnatural dreams, anxiety of mind being violated, overeating, a poor diet, sexual excitement, loss of vitality, insomnia, sleep disturbance, strong sleepiness, mania, depression, amplified fear or anxiety, elevated suspicion, incontrollable impulse, amplified hatred, nervousness, diffident, zooming eyes, loss of eye sight, loss of hearing, hear a voice from a distance, loss of sense of smell, sense strange smell, loss of taste, strange feeling left in the mouth after eating, feel of touch on the genitals, feel of insertion in the anal, tightening or numb feeling on the head, headache, feel like the head is wrapped with something soft, feels like something is implanted in the head, extreme fatigue, feel like an electricity ran through the body, constipation, diarrhea, incontinence of urine and feces, slackness of anus, manipulation of excretory function such as poor excretion, the muscle moves against his/her will, listless feeling, strong body odor, gas,excessive perspiration, sudden fluctuation of pulse, unusual (food poisoning, drunkenness, motion sickness, cols symptoms-(coughs, sneezing, nasal inflammation etc.), a burn, vibration of the surroundings, vibration of the body, sleep paralysis, sensation of body tic (splattering), pain in organs such as a heart, pain in genitals, pain of something piercing through the body, sensation of burn on the back of eyeballs, bizarre air, pain of impact from air
bullets, fainting

As a result, I could make the following table. This, too, has so many items that I would like to explain by dividing them into 11 categories.

1. Harassment of Voice and Image Transmission: This is a typical covert harassment since 58% of the responders complained voice transmission and 65% complained about the noise transmission. Image transmission is 32%, less than voice and noise transmission, but can be considered as an abuse of same information transmission technology. Therefore, I am explaining about them together. As you have already known well, it is a harassment that makes you hear a sound in your head or hear a voice in the space even though there is nobody around you. The contents of the voice varies, for example, name calling, such as “Fool” and “Ugly”,
order or threat, such as “Cut your wrist”, “Jump and fall”, “Kill yourself”, “If you do not do what I say, I will hurt your family” and “Go to a certain place”, words that sound like the person is peeking what you are doing in the bathroom, an annotation for what you are doing, the voice reads the book that you are reading, answer to the thoughts in your head and interactive communication with the voice.
Harassments by sound are the sound of piano in the midnight, sound of drum, shattering sound, sound of slamming the door, high pitch noise, low pitch noise, etc.
Majority of victims who report harassment of voice testify that they hear the voice all the time as long as they are awake. Also, many of them confessed that they were manipulated by the voice in the beginning.
There is a possibility that the victim will take a huge risk by following the orders from the voice; for example, the victim is ordered to go the broadcasting station and do so, ordered to cut his/her wrist and do so or ordered to jump and fall and do so. So, this is a terrifying harassment.

2. Manipulation of three desires: The result of questionnaire survey shows that the most common covert harassment is sleep disturbance. About 69% of the members report this harassment saying that a voice wakes them up, cannot sleep because of the pain, some kind of awakening technology is being used. We can assume that manipulation of desire to sleep is implemented. There were a few people who could not sleep at all for almost a month and had to be admitted to the hospital. Sleep disturbance is one of the methods used to torture people; therefore, this is considered as a torture. As for the manipulation of sexual desire, Mr. Barrie Trower, whom you already know very well, testified that electronic wave of 6.6Hz can induce violent sexual drive, so I would
like to leave it to that.

3. Manipulation of Physiology: It is evident that they can freely manipulate physiology, such as incontinence, gas generation, diarrhea, hardness and softness of feces, body odor. Since I experienced stalking, which made me feel a slight need of using bathroom day and night, I believe that it has a stalking characteristic, in other words, it works not only at a certain place but wherever you go. The stalking nature is so strong that it does not leave alone and make you believe that it is your natural self.

4. Manipulation of Body and Motor Function: This is a harassment, which your body movement is controlled against your will. People notice it when your neck and limbs are moved against your will, so it is very troublesome. It sometimes controls all muscles related to excretion freely, and shows its amazing manipulative ability. We believe that it can easily control you to feel like your athletic ability improved all of the sudden or not to let you have positive results no matter how much you practice. We think that this technology is being used for professional sports considerably. It may play a role in directing a prearranged game, too. We believe that it is more effective than using drugs, so that it has possibly become the technology necessary for winning medals in Olympics. In this era, we believe that it is necessary to run a test for this technology in addition to doping tests.

5. Manipulation of Five Senses (Sight, Hearing, Taste, Smell, Touch): The harassment causes, zooming eyes, an intentional ear trouble caused by the fluctuation of air pressure, a strange feeling left in the mouth after eating, strange smell without the source in the area, feeling of insects crawling on the skin, feeling of touch, etc. The victims of strange smell often report that the smell comes from their neighbors and seals their house very well; though, the smell keeps coming. Somebody used an expression that chunks of the smell are coming down from the ceiling. One of the victims was suffering from the smell of spray and went to mountains on the motorcycle only to find that the smell did not disappear. This is a stalking act with a smell of spray. We can imagine that manipulation of five senses can have a stalking characteristic.

6. Manipulation of Emotions: There is harassment that makes you tear up when you are not sad or make you laugh uncontrollably when it is not funny. In this person’s case, he bursts into laughs when he is at the regular meeting and is worried that people may think he is suspicious. The other person was manipulated to laugh whenever he feels that both cheeks have started inflating. Since it is done repeatedly, it is extremely troublesome. This alone can keep you from going outside. We also believe that happy feeling and depressed feeling can be manipulated freely. They often use this to induce dark feeling on the target as they do
other harassment to increase the damage markedly.

7. False Sickness: (Sickness Manipulation): This is a harassment that induces sickness symptoms even though you are not sick. We believe that it can freely manipulate sneezing, runny nose, slight fever, blood pressure and pulse,. According to Mr. Barrie Trower, it can also induce mental sickness, heart attack and cancer, and he further testifies that, as for cancer, even the speed of progress can be controlled, and it agrees with the NPO’s survey results.

8. Mind Control: It is very important that many of the victims from voice transmission harassment testify that the voice responds to their thoughts or the voice communicates interactively. This harassment cannot be realized without the technology that connects human brain and computer. The victims of this harassment naturally believe that somebody is reading their thoughts and start insisting that their minds are eavesdropped. Mind eavesdropping is an ultimate invasion of privacy. Moreover, it is very frightening that something can get into your mind, because it indicates the possibility of being controlled by the idea from outside instead of your own. What I explained so far are all technologies that make you lose who you are, but it is such a grave fact that it can work on your mind, too. It is an ultimate form of privacy invasion and a technique that completely denies democratic living.

9. Physical Attack: This harassment can be rephrased as harassment by torturing technology. Sensation of needle stabs, sudden attacks to organs, attacks by small or large air bullets, sensation of electricity creeping up the body, sensation of burning behind the eye balls, sensation of virtual torture in which both cheeks are pierced with a wire, etc. are reported.

10. Others: Vibration on the body and vibration of the surroundings. One of the victims of this harassment was attacked to the degree that his house was cracked. Sleep paralysis and sensation of insertion into genitals or anus, which seem nothing but abnormal. Sometimes, it makes the victim feel as if his/her heart is grabbed and massaged directly and make us wonder if it can be explained as a work of some technology.

11. Murder: Dead people cannot testify, but 17 out of 1166 confirmed victims are already dead, so there is no doubt that it can kill people. Two people out of the 17 broke down by subarachnoid hemorrhage and one of them died directly from it. One died from heart attack. I believe it is not only the direct victim who dies but people around the victim are also targeted. I stood as a candidate four times to become a politician, won once of them and became the local assembly member, but the person who supported me and his family or those who probably voted for me died one after another. The causes of their deaths were a heart attack, cancer (some were scirrhus carcinoma), a sudden death while taking a bath, etc. These deaths were processed as deaths by natural cause, not by certain technology. We do firmly believe that there are many cases of murder, which the victim or the people around the victim do not realize it as a murder.

Above is the outline of covert harassment. In order to implement such harassment, the following technology is necessary. We, the NPO, put this together based on the result of the questionnaire survey, so the following are inferences from the result.

1. Stalking Technology: Since it is impossible to commit this crime without the stalking technology, which catches a particular individual and does not let go, we define this technology as the first basic technology used for covert harassment. It also requires the technology that can identify particular individuals, so we need to consider a microchip implant to be able to explain it. From my experience, I believe that stalking that relies on technology had already begun in early 70s. I also think we should consider their use of satellites. I think we can express it as biotelemetry technology employing satellites. You may have better way to address this technology. We use such expression, because we are just inferring based on the real situation from the tandpoint of the victims.

2. Voice and Image Transmission Technology: We consider this as echnology that bypass normal auditory organ or visual organ and irectly transmit voice or image into the brain. Some of the victims of oice transmission harassment testified that he/she heard the same voice in overseas; therefore, this harassment can be implemented in a global scale, and we suspect the use of satellites here, too. As for image transmission, I do not know anything more elaborate than what I experienced. I think it only works in and around the big cities, such as Tokyo and Osaka. I experienced it in Paris and Firenze, too, so it seems to work in foreign big cities, too. However, it was 15 years ago when I experienced it, so it may be able to reach over farther distance than before. Anyway, it abuses the communication technology that allows transmitting voice and image directly to the brain without a terminal
device.

3. Mind Eavesdropping Technology: Military is the one that is pursuing this technology the most. As for military, information collection technology is the most important technology, and the most crucial one is the technology to read the mind of military leaders. The crime cannot be implemented without technology that connects the human brain and computer. It is a brain-machine interface technology. It reads people’s minds, so it has to contain a device that catches brain signals and transmit it. I cannot deny the existence of microchip that can be implanted in the brain.

4. Technology that can influence human’s physiological functions, three desires, five senses, emotion and mind activities: Since human’s physiological functions, three desires, five senses, emotion, motor activities and mind activity are mainly controlled by the brain, the brainmachine interface technology, which I mentioned earlier, is essential for this technology. In addition, the brain functions must be thoroughly understood to make this happen, so the level of control depends on the level of the neuroscience development, we think. It is also necessary that the microchip is as close to the brain as possible to catch feeble brain waves.

5. Monitoring Technology: They can attack their target wherever they run or even in the house, which means they utilize very sophisticated monitoring technology. Moreover, they must be able to program when and what kind of attack they do, because they attack with miraculous timing.

6. Physical Attack Technology: First, they need technology that can aim each body part precisely, and technology that allows you to choose what kind of pain and control the strength of the pain is necessary. This harassment requires these technologies, and we believe that the brainmachine interface is the center of them. This technology connects human brain and computer, so that experiments on human bodies are necessary to complete the development. I won’t be surprised if there are many victims who are used for the development of this technology. Experimentation on humans is necessary to evaluate the product value, too. Furthermore, more experimentation on human is necessary to learn how to use the technology. As you can see, brain-machine interface technology requires experimentations on humans in many aspects. Therefore, there is no doubt that those departments which develop it, evaluate it, train with it, and control the technology are all committed to the crime in some ways. Therefore we need to investigate continuously where the technology is sold as a product, outflow situation of the program or whether similar product is brought from foreign country.

The NPO have been tackling covert and overt harassments in order to eradicate them. When we take a look at the scheme, to drive the victim into suicide, take them into mental hospital and corner them to take self-defense measures, which the main body of the crime pictures, we notice that it matches with three big social problems that we are facing in Japan now. Those are over 30, 000 and increasing number of suicides, increase of patients with mental disorder, which was once over 3 million patients and
increase of unbelievably atrocious crimes.

According to the suicide overview material for 2012 issued by the National Police Agent, 8,278 people, 29% of the total of 28,396 people, committed suicide due to mental problem (Breakdown: depression 5,904 people, schizophrenia 1,150 people and other mental disorders 1,224 people). As you know, when one says he/she can hear voices or see images in the head, he/she is diagnosed as schizophrenic. Sleeplessness is categorized in other mental disorders. There is a report saying, currently, one out of ten people are suffering from insomnia in Japan. Harassment to cause sleeplessness is considered as torture, and is a very serious offense. Victims have to go to psychiatrists for consultation to deal with the problems that should be managed by the police primarily as covert harassments. Naturally, no victims can be satisfied by the way they are handled. We can imagine that there are many people who were misdiagnosed with a mental disorder and end up committing suicide. By implementing overt harassment on a victim one after another, they can cause a panic attack and take the victim to mental hospital. So, we believe many victims of covert and overt harassment are included in the 30,000 people who committed suicide. Also, almost 3 million people have mental disorders, now, in Japan; therefore, if we take suicide and mental disorder seriously, we need to take measures against both covert and overt harassments.

Nowadays, unbelievably atrocious crimes are happening often in Japan. We can suspect that the taxi driver murder case in Yokosuka on March 19, 2009, the personal injury case near Toyo-cho subway station of Tozai line on March 19, 2013 and the other personal injury case in Saitamacity in May 2013, were all executed by the victims of voice transmission harassment. It is necessary to tackle covert harassment to reduce atrocious crimes that we cannot even imagine.

Since the scheme that the main entity of the crime draws and the social conditions match, we can imagine that the entity is directing the social conditions, too. It is important that these social problems, an increase of suicides, an increase of patients of mental disorder and an increase of atrocious crimes, are a possibly directed by the entity. Those three problems are treated as big social issues now, and so as these covert and overt harassment should be. The NPO is fighting to obtain the recognition from the society and for the development of laws by which both of those crimes are punished as criminal offenses by appealing the very point.

We think that such a big issue does not receive enough attention because of the strong international connection between those entities of the crime. Therefore, the group of victims should construct international circles to fight against them face to face. We hope that today would be the opportunity to make that happen.

Today, I talked about the situation regarding covert and overt harassment in Japan. In the end, I would like to say thank you again to Mr. Juan E. Mendez from the bottom of my heart for giving us this opportunity. Thank you very much.



 上記はNPOテクノロジー犯罪被害ネットワークの理事長、石橋輝勝氏が2013年8月9日に、国連の拷問報告官のユアン・メンデス氏に提出した文書です。日本語・英語の原文に関しては下記リンクよりお願いいたします。

Covert Harassment and Overt Harassment in Japan(日本語PDF)
Covert Harassment and Overt Harassment in Japan(英文PDF)

 なお、この訪問の直後にこのブログで紹介した日本の個別の被害者によるメンデス氏への訴えかけが行われました。これについては下記リンクよりご参照下さい。

被害への取り組み(27)
被害者全員で国連に被害を報告しよう (1)
~拷問に関する国連特別報告者、ジュアン・メンデス氏へのメールの書き方~


被害への取り組み(31)
被害者全員で国連に被害を報告しよう (2)
~ジュアン・メンデス氏への英文の書き方~



 日本の被害者の皆様におかれましても、これは最も国際的に評価されるべき石橋理事長のアクションです。この文書の存在をできるだけ多方面に広めていただければ幸いです。何卒よろしくお願いします。




Rush to form international treaties for regulating gang stalking and electronic harassment

- Unless there is regulation at an early stage, there is no future for mankind -
-Final revision date: June 1st 2015 (Mon) -

20150529_条約批准

 From this year, there has been an increase in international interaction between victims. This signifies that this problem is becoming a truly international issue. On this occasion, we would like to explain about the objectives of us victims in relation to this problem.

 The basic damage we have suffered is harassment from people, which is known as gang stalking and remote microwave-based attacks, which is called electronic harassment. These are generally referred to as overt harassment and covert harassment. Among these, the greatest threat to mankind is from microwave attacks. This is because this technology makes mind reading possible.

 Knowledge of victims has greatly increased, and we now know the following about microwave-based attacks.

1. Irradiation is possible from remote distances of up to 50km
2. They have extremely strong penetrability and cannot be protected against
3. When placed in vehicles, mobile attacks are possible

 I think this can be called the greatest threat to mankind. This is because our thoughts can be read in a defense-less state 24 hours a day. Speaking as my experience as a victim, the concept of our privacy does not exist. Generally, electronic harassment can be thought of as an invention on a par with the nuclear bomb in terms of its impact. The characteristic of the damage we have suffered is that an extremely large number of people have been driven to suicide, while suffering such attacks.

 What should be done to protect mankind from this threat? This is our proposal at this time. To put it in a phrase, “an international treaty on gang stalking and electronic harassment should be formed as quickly as possible and ratified by all states.”

 In this blog, we have long discussed the establishment of legislation from a domestic perspective. gang stalking can be regulated if the “Anti-nuisance Ordinance” is elevated to the level of criminal law or the “Stalker Regulation Law” can be applied to the damage we suffer. On the other hand, the following two items have been stated about electronic harassment.

1.Prohibition on simple possession of microwave devices used for electronic harassment
 The Swords and Firearms Control Law can be used as reference. In Japan, it is possible for society to provide maximum protection from tragedies due to guns. The Swords and Firearms Control Law is the law that provides this regulation. Simple possession of a gun is prohibited. You will be exposed just for carrying a gun. In the case of electronic harassment as well, the simple possession of microwave devices can be regulated in the same way as the Swords and Firearms Control Law.

2.Total ban on the use of ultra-low frequency bandwidths used for malicious activities
 It is said that ultra-low frequencies are used for malicious activities. This is because, as stated above, they have extremely strong penetrability and protection is only possible in exceptional circumstances such as remote islands or deep within tunnels. The current unchecked state of use should be regulated through legislation. Use of these bandwidths should be prevented.

 These two items are necessary. They should be included in an international treaty and we should increase the number of countries ratifying this so we will be protected whatever country we go to. Further, it is also the job of victims to raise awareness and enlighten people about this situation. This will become an international issue moving forward.

 This damage is still producing tragic victims. Even domestically in Japan, we are being pushed to the limit and the cases where this leads to crimes continue to occur. This is the same in America as well. A prompt international approach is required.

All victims around the world need to stand together and fight. I would like to end this article with a prayer that there will be no more victims of this damage.
この英文記事は翻訳者に著作権が帰属します。無断使用を禁じます。



国際的な条約の形成を急ごう
~早期に規制できなければ人類に未来はありません~
-最終更新日: 2015年6月1日 (月) -

 本年度に入って、被害者間の国際交流がいっそう進んでいます。これは、この問題が国際的な課題となりつつあることを意味しています。今回は、この問題について我々被害者の目標とするところについて述べたいと思います。

 我々の被害の基本は、集団ストーカー と呼ばれる人による嫌がらせと、テクノロジー犯罪 と呼ばれる遠隔からの電磁波 による攻撃です。これは、一般に見える犯罪 と見えざる犯罪 と呼ばれます。このうち、人類にとって最も危機を伴うのが電磁波による攻撃です。なぜなら、この技術は思考盗聴 を可能にするからです。

 この被害者知識はかなり積み重ねられてきており、電磁波による攻撃についても以下のことが分かってきています。

1. 遠隔最大50kmほどから照射可能
2. 透過性が非常に強く、防御がほぼ不可能
3. 車載すれば移動しながらの攻撃が可能

 これは、人類最大の危機と呼べるかと思います。24時間、完全に無防備な状況で思考盗聴を受けてしまうからです。被害者としての経験から言わせてもらえば、我々にプライバシーという概念は存在しません。一般にテクノロジー犯罪は、その影響力から核兵器と同等の発明と言われています。その苦しみから、自殺に追い込まれてしまう被害者の方が極めて多いのが我々の被害の特徴です。

 この危機から人類を守るにはどうすればいいでしょうか。これが今回の私の提言です。一言で申し上げれば、「集団ストーカー・テクノロジー犯罪の規制に関する国際的な条約を一刻も早くつくり、すべての国家に批准させること」です。

 このブログで日本国内のことを想定しての法整備を以前から私は述べています。集団ストーカーに関しては「迷惑防止条例」を刑法に格上げするか、「ストーカー規制法」を我々の被害に適用するように拡大法改正すれば規制可能です。一方で、テクノロジー犯罪については以下の二つのことを述べてきました。

1.テクノロジー犯罪に用いられる電磁波機器 の単純所持の禁止
 参考になるのが銃刀法です。日本では銃による悲劇を最大限防ぐことを可能にしている社会です。この規制のための法律が銃刀法です。これは銃の単純所持を禁止しています。銃を持っていればそれだけで摘発されるのです。テクノロジー犯罪も、銃刀法と同じように電磁波機器単純所持を規制できるようにすればいいわけです。

2.加害行為に用いられる極低周波の帯域の全面使用禁止
 また、加害行為に用いられているのは、極低周波と言われています。これは、上で述べたように透過性が非常に強く、離島やトンネルの奥深くで例外的に防ぐことができるのが現状です。現在、この使用に関して野放しの状態になっているのを法規制します。この帯域を使用できなくすればいいわけです。

 この2点が必要です。これを国際的に条約にしてしまい、どの国に行っても守られるよう批准国を増やすのです。また、この被害に対する認知を行き渡らせ、啓蒙を行っていくのも被害者に課せられた仕事です。今後はこれが国際的な課題になってくるでしょう。

 この被害は、いまだ痛ましい犠牲者を発生させています。日本国内においても極限の状態にまで追い込まれ、犯罪を起こしてしまうケースが続発しています。これはアメリカにおいても同様です。一刻も早い国際的な取り組みが必要です。

世界中の被害者同士で手を取り合って頑張っていきましょう。この被害の犠牲者がなくなることを祈って今回の記事の末尾としたいと思います。




拡散をお願いします !!

思考盗聴について

被害の経験によりここまで分かっています


20170507_brain.jpg

当ブログで最も参照されている記事です。集団ストーカー・テクノロジー犯罪を公にするには、思考盗聴技術の実態の周知が不可欠です。ご拡散いただけますと幸いです !!


イルミナティの力の根源は思考盗聴技術

思考盗聴技術を元に全世界で集団ストーカー・テクノロジー犯罪を展開しています


20161113072913ec0-min.jpg

イルミナティの世界支配の力の根源は、思考盗聴技術をベースにした集団ストーカー・テクノロジー犯罪という見えない圧力です。この事実を世界に拡散してください !!


911はイルミナティによって仕組まれていた

20170420093844680.jpg

911のテロはイルミナティが思考盗聴と意識の介入で警備員とイスラム教過激派を遠隔操作して成功させたというのが真実のようです。この事実もぜひご拡散ください !!


イルミナティの陰謀群

イルミナティの陰謀の数々
~世界の組織犯罪、先進国テロの大部分を占めていると言われています~


イルミナティの陰謀群についてまとめた記事です。世界中の組織犯罪、先進国テロに大きく関わっています。日本の方はこちらもご覧ください。随時更新してまいります。



統一被害者団体の結成

集団ストーカー被害者の会UNION(仮)の形成
~皆様にお願いです~


20170513_握手_小

ここで皆様に呼びかけさせていただきます。加害カルトに対して、純粋な被害者だけで形成される認定NPOを目指したいと思います。現在は素案の段階です。ぜひ皆さんのご意見をお寄せください。


日本人による純粋な被害者団体

集団ストーカー・認知撲滅の会
20170514_認知撲滅_小

集団ストーカー被害者の会ネットワーク
20170514_被害者の会ネットワーク_小

ACP 集団ストーカー犯罪(組織犯罪)防犯パトロール
20170514_ACPパトロール_小

集団ストーカー問題相談所
20170516_相談所_小

自由の砦
20170517_自由の砦_小

ぜひこの統一原告団の形成にご協力いただきたいのが、本当の被害者で構成されている4つの保守系団体の皆さんです。近年、集団ストーカー犯罪において、彼らが最も認知・周知に貢献したと言って差し支えないでしょう。同時に、我々が加害団体と定めているカルト宗教の被害者の会のリンクも掲載します。ぜひご協力ください。


参考図書

20170513_認知撲滅_小
集団ストーカー認知・撲滅
2014/8/8 安倍幾多郎 (著)


こちらの書籍は、読ませていただいて、特にローテクの集団ストーカー行為について、おそらく日本の資料の中で最も優れていると思います。被害者必携の著書です。未購入の被害者の皆さんはぜひご購入を !!


参考サイト

集団ストーカー現象について考える
20170518_集団ストーカー現象_小

AGSAS
20170518_アガサス_小

集団ストーカー.info
20170518_集団ストーカーinfo_小

集団ストーカー辞典
20170518_集団ストーカー辞典_小

これら4つのサイトは、集団ストーカーが認知される初期段階から被害について鋭く切り込んでいます。その情報は、今も色あせていません。日本の集団ストーカー周知の功労者です。ぜひご参照ください。



NPOから加害者の排除を

NPOには加害サイドの人物が多く参加することがあります
~勇気をもって申し上げます~


20170511_nocult1_小

NPO理事長あてに、運営サイドに入り込んでいる特定新興宗教団体員を定款によって参加できないようにする理事会決議を行うよう要請しました。これまで、加害者のやりたい放題だった都市もあります。NPOは、より健全な運営が必要です。このことは、避けて通れません。ひとりでも多くの健全な被害者に、運営サイドに立候補していただくようお願い申し上げます。



ASKAさん、頑張って !!

700番 第二巻/第三巻 ASKA
ASKAさん、光を当てていただいてありがとうございます


20170216150912135_小

ASKAさんは、2017年2月17日発売の著書で集団ストーカー被害について触れられました。我々の犯罪に光を当てていただいたことになります。ASKAさんはこの犯罪に負けられる方ではありません。音楽活動、頑張ってください !!


700番 第一巻 ASKA
~ASKAさんは間違いなく未認定犯罪の被害者です~


20170319_ASKAさん_小

ASKAさんが、女友達の被害について相談に乗った後に、ASKAさんが盗聴盗撮被害を受けた経緯が克明にまとめられています。こちらも被害者必携の著書です。



京都大学であったこと

私が京都大学で集団ストーカー犯罪を受けた起源 支援者の皆様のおかげで卒業できました

20170220_kyotou_小

私が集団ストーカー加害行為を受けていた起源が、京都大学の1回生のころであることが調査によって分かりました。当時、助かる被害ではなく、岡田敬司先生杉原保史先生はじめ、皆様のサポートがなければ卒業できませんでした。当時私に関係した皆様にご覧になっていただきたいです。



緊急時のお問い合わせ 

孤立している方、緊急時の方は遠慮なくお問い合わせください。自殺を考えている方がおられましたら必ず踏みとどまってください。

20150308_緊急時のお問い合わせ

上記ボタンをクリックしてください。緊急時の方は積極的にご利用ください。ただし、ご返信は被害相談に限定させていただきます。


20161201_まとめ-min_小
集団ストーカー・テクノロジー犯罪 被害記事まとめ

お問い合わせをご検討の方、被害についてお知りになられたい方はまずこちらの記事をご覧になって下さい。被害のまとめ記事です。随時更新して参ります。
(2016年11月8日更新)


20150516190523cb7-min.jpg

プロフィール 

20130308183551b1b-min_1.jpg
author : Masanori Kawasaki
川崎正典

I am one of the victims of organized stalking and electronic harassment crimes in Japan.I am on the steering committee of the Technological Crime Victims Network Specified Nonprofit Organization. I am a graduate of Kyoto University.

集団ストーカー・テクノロジー犯罪被害者。2010年より集団ストーカー・テクノロジー犯罪の法制定を実現するために国会議員を目指してブログを開設。NPOテクノロジー犯罪被害ネットワーク広島進行役。京都大学総合人間学部卒。

My twitter ⇒ @masa_kawasaki



世界の被害者団体ほか

NPOテクノロジー
犯罪被害ネットワーク

(日本の被害者団体)
20140520231128317-min.jpg

FFCHS
(アメリカの被害者団体)
20160630081551bf8-min.jpg

ICAACT
(欧米の被害者団体)
20140520_ICAACT-min.jpg


COVERT HARASSMENT CONFERENCE 2015
(ベルリンの国際会議 2015年10月)
201503151204389a9-min.jpg




NPO出版の被害報告集

テクノロジー犯罪被害者による被害報告集―遠隔技術悪用を告発する33名の被害者自身による被害実態報告テクノロジー犯罪被害者による被害報告集―遠隔技術悪用を告発する33名の被害者自身による被害実態報告
(2010/05)
商品詳細を見る

テクノロジー犯罪被害者による被害報告集〈2〉遠隔技術悪用を告発する29名による実態報告テクノロジー犯罪被害者による被害報告集〈2〉遠隔技術悪用を告発する29名による実態報告
(2013/06)
商品詳細を見る

NPO法人で掲載者を募り、内山治樹氏のご努力により出版された被害報告集です。被害の実態がすべて記載されています。ぜひご覧になってください。




第10回テクノロジー犯罪被害フォーラム

20170402_東京フォーラム_小

今年もテクノロジー犯罪被害フォーラムが開催されます。詳細は上記画像をクリックしてください。なお、昨年の公式HPの情報については次のリンク先をクリックしてください。

HPはこちら ⇒ 【HPリンク



NPO広島集い

20150415075928b95-min.jpg

日時:5月14日(日)
場所:広島市中区舟入公民館 和室
時間:13:00~

所定のアンケートを記入・持参した方でなければ参加できません。ご注意ください。なお、NPOでは本人確認を行うことを決定しました。免許証やパスポートなどの提示をお願いいたします。

HPはこちら ⇒ 【HPリンク】


これまでの成果

サブリミナル・メッセージの取り組みが成し遂げたもの

われわれのサブリミナル・メッセージの取り組みによって様々な事項が国際的合意を得ています。これら一連の成果のまとめ記事です。当ブログのサブリミナル・メッセージの取り組みをお知りになるために最も適した記事です。ぜひご覧になって下さい。

20151115121419279-min.jpg




過去のおすすめ記事

NO.1
201510211641457f0-min.jpg
被害者全員で国連に被害を報告しよう
拷問に関する国連特別報告者、ジュアン・メンデス氏へのメールの書き方



NO.2
20160610084049c09-min.jpg
集団ストーカー行為の被害集計
NPO法人による被害集計①



NO.3
20160610084047843-min.jpg
テクノロジー犯罪の被害集計
NPO法人による被害集計②



NO.4
20121227145740dba-min.jpg
サブリミナル・メッセージ
メディアで進められる水面下の交渉



NO.5
20140202060519b10-min_1.jpg
思考盗聴について
被害の経験によりここまで分かっています



NO.6
20130917135330161-min.jpg
私が提言する日本の被害者のとるべきスタンス 国際的に包括的に解決を進める必要があります


NO.7
20161108022836523-min.jpg
メディアのサブリミナル・メッセージの実態 解決したい勢力と加害勢力の熾烈な戦い


NO.8
201201111249533b8-min.jpg
原告団を形成して国の責任を追及する
被害者で団結して社会に訴えかけよう



NO.9
201511100620190b2-min.jpg
特定新興宗教団体は日本人の思考を読みたい放題 一刻も早く規制を実現しなければなりません


NO.10
20151110062021637-min.jpg
加害行為に利用される意識への介入
ほのめかしは実は電磁波による交信によって行われていた





ご家族の皆様へ


集団ストーカー被害は被害者一人で乗り越えるには大きな困難が伴います。場合によっては被害者本人が自殺に至る可能性もあります。それを防ぐにはご家族の方の理解がなければなりません。新たにカテゴリ「ご家族の皆様へ」を設け、集団ストーカー被害者のご家族の方へのメッセージを綴りたいと思います。ぜひご覧になってください。2015年11月11日、ご家族のためのQ&Aを追記しました。ご参考下さい。

2015111114094119c-min.jpg

第一回記事
家族は被害者をどう理解すればよいか
~問題解決に必要な家族の力~




被害者全員で国連に被害を報告しよう

国連の拷問に関する特別報告者、ジュアン・メンデス氏⇒国連サイトへのリンク)が全世界のテクノロジー犯罪・集団ストーカー被害の報告を受け付けるということです。これを機に日本のすべての被害者に呼びかけます。下記のアドレスに所定のフォームで被害報告をお送りください。(9月23日英文の書き方を解説しました。

なお、現在ではメンデス氏にすでにメールが送れなくなっているようです。日本の被害者の皆様はお気を付けください。日本での被害史上最も重要なアクションのため、この記述は残します。ご参考ください。

記事はこちら ⇒ 【記事リンク】

Please spread this fact !!

Mind Reading

- We know the following from the experiences of victims up until now -


20170507_brain.jpg

Mind reading is the technology for connecting to humans like mobile telephones, where the connecting human senses the sensations (thoughts) of the victim...


The Source of Illuminati’s Power is Mind Reading Technology

- Gang stalking and electronic harassment has developed throughout the world based on mind reading technology -


20161113072913ec0-min.jpg

This article fully uncovers why the Illuminati are capable of exercising world dominance. Now is the time for the whole world to overcome their taboos. People of the world, be sure to spread this truth!


- The 911 truth -

20170420_911_小

In 911 terror attacks, security staff and Islamic extremists were remotely controlled through mind reading and intervention of consciousness by Illuminati


Fight on !! President Trump

- Only Trump can solve the problem of Illuminati gang stalking and electronic harassment -


20170521_トランプ大統領_小

Looking from our perspective of solving the problem of gang stalking and electronic harassment by the Illuminati, there is nobody who can do this better than President Trump...

-May 7, 2017-



The NPO's Action

Covert Harassment and Overt Harassment in Japan
- The document submitted to Mr. Mendez of the UN -


201510211641457f0-min.jpg

Presenter: Terukatsu Ishibashi (The Chief Director of Technological Crime Victims Network Specified Nonprofit Organization in Japan)

-October 21, 2015-



Our vision

Rush to form international treaties for regulating gang stalking and electronic harassment
- Unless there is regulation at an early stage, there is no future for mankind -


20150607083810ef8-min.jpg

From this year, there has been an increase in international interaction between victims. This signifies that this problem is becoming a truly international issue. On this occasion, we would like to explain about the objectives of us victims in relation to this problem...

-June 7, 2015-



Approach of this blog

To all of you in the international community
- Aiming for a resolution throughout the whole world -


201405311021486fc-min.jpg

This relates to the organized stalking and electronic harassment issue that is spreading around the whole world. With this blog, we have repeated observations aimed at its resolution over many years. On this occasion, I would like to explain the approach of Japan to all of you in the international community....

-May 30, 2014-



About the NPO

Technological Crime Victims Network Specified NPO
- Introduction to the victims organization in Japan -


201406041909471a6-min.jpg

The Technological Crime Victims Network Specified NPO is the NPO corporation that has officially recognized the damage caused by organized stalking and electronic harrassment in Japan. On this occasion, I would like to explain about this organization....

-June 4, 2014-

カテゴリ

openclose


サブリミナル・メッセージ記録ブログ
(サブリミナル・メッセージの記録は別サイトで行っています。ご参照ください。)



検索フォーム




リンクについて

リンクフリーです。集団ストーカー、テクノロジー犯罪の被害者の方やこの問題の認知を目的とされる方のリンクを心よりお待ちしています。

ただし、著作権は守ってください。画像・文書の転載はしないようお願い致します。また、英文の一部の記事は翻訳者に著作権がありますのでご注意ください。

最新記事の紹介(1)

日本の加害団体についての総括

日本では、1) 日本最大の新興宗教団体をトップとした加害カルト群、2) 同和社会、3) 在日韓国人、4) 在日朝鮮人が加害行為を行っている。このうち、在日韓国人と同和社会はほぼ完全に健全化している。彼らを救済できるのは、彼らを支持母体としない政党である。ぜひご参考いただきたい。

20170520_加害団体_小



最新記事の紹介(2)


頑張って、トランプさん

トランプ次期大統領がオバマ大統領の業績を引き継いでイルミナティ摘発を次期政権で実現することを快諾した。トランプ次期大統領の懐の深さの表れである。日本の被害者の皆さん、政権交代時の混乱はありません。ぜひトランプ次期大統領にご期待ください。

20170116_トランプ氏_小



最新記事の紹介(3)

バチカンも正常化します

過去のローマ法王からイルミナティのNO.3を輩出していたバチカン市国も正常化することとなった。英国王室に続き、イルミナティの闇と戦っていくとのことである。反イルミナティの動きが急速に広がっている。期待しよう。

20161122_バチカン_小-min



最新記事の紹介(4)

イルミナティの力の根源は思考盗聴技術

イルミナティの力の根源は、アメリカで技術開発されてきた思考盗聴技術である。現在、世界の都市部でテクノロジー犯罪のデバイスが配備されており、その圏内にいる人物はいつでも思考盗聴を受ける恐れがある。これによって彼らはソフトな世界支配を実現してきた。この記事をご覧の皆様は、ただちにこの情報を拡散して欲しい。人類はイルミナティに勝利する必要がある。今、その瀬戸際なのである。

20161113072913ec0-min.jpg



最新記事の紹介(5)

イギリス王室が正常化します

イギリスに激震が走った。トップの女性を除いてすべての英国王室の人物がイルミナティを脱退するというのである。現在、集団ストーカー・テクノロジー犯罪を取り巻く環境が大きく変わりつつある。これでタブーが外された。必ず公になるはずである。

2016111208121875f-min.jpg



最新記事の紹介(6)

トランプ次期大統領、イルミナティ摘発をお願いします

ドナルド・トランプ氏が次期アメリカ大統領に選出された。氏は、もともと反イルミナティに関しては親和的な政治家である。氏ならきっとオバマ大統領の遺志を受け継いで完全にイルミナティを摘発してくれるという期待を込めて書いた記事である。ぜひご覧になっていただきたい。

20161109154446d95-min.jpg



最新記事の紹介(7)

President Obama, we know you can do it.

イルミナティを摘発することができるのはオバマ大統領だけである。任期の最後にぜひ彼に摘発を成し遂げていただきたいと思っている方は多数である。頑張って、オバマ大統領 !!

20161103131903e4a-min.jpg



最新記事の紹介(8)

自民党の解決スタンス

このブログを路線転換する。これまで、私は民進党から立候補する前提でリベラル論を述べてきたが、被害者第三極を形成し、自民党の協力を得て解決を目指すことにした。政策遂行能力のある彼らと組まなければ、しばらく日本では解決できないだろうからだ。彼らは純粋な日本人の救済を目指している。ぜひご覧になっていただきたい。

20161025133835d37-min.jpg



最新記事の紹介(9)

集団ストーカー行為を防止する政治的枠組み ③

日本では、世界に対してメルクマールとなるような法案制定が行われなければならない。そのためには、ロスチャイルド財団・ロックフェラー財団によって健全化した自民党と組むことも求められる。被害者が第三極を形成して政権与党に与するのである。

20160925132109f1d-min.jpg



最新記事の紹介(10)

勝利宣言です

アメリカが、ロスチャイルド財団・ロックフェラー財団の協力を借りて、加害秘密結社最高機密施設への軍事突入を成功させた。犠牲者は一人も発生させなかった。これにより、事実上世界で集団ストーカー・テクノロジー犯罪が解決に向かうことになるだろう。人類の勝利である。

20160907043445be9-min.jpg



最新記事の紹介(11)

ユダヤ系の巨大財団が被害者迎合資本を投入しました

2016年8月に行われた加害勢力の総攻撃。これに対抗するためにオバマ大統領はユダヤ系の巨大財団に資本出資を依頼した。彼らはこれを快諾。日本の被害者は寸前で助けられた。この合意により、もう一方の共和党支持の巨大財団も被害者のための出資を約束。協調して解決行動を行っていくことで合意された。彼らには感謝の言葉もない。期待して見守ろう。

201608141827072a1-min.jpg
201608151149288f9-min.jpg



最新記事の紹介(12)

集団ストーカー・テクノロジー犯罪におけるマインドコントロールについて

我々の被害は非常に残酷なマインドコントロールを可能にする。思考登頂技術の存在によってプライバシーがない状態で熾烈な攻撃を受けるからである。今回は私の事例をもとに高度なマインドコントロールを解説した。ぜひご覧になっていただきたい。

201607130210494c6-min.jpg



最新記事の紹介(13)

同和社会が加害行為をやめる決断をしました

これまで同様に加害特定新興宗教団体から依頼を受けるなどして加害行為を歴史的に行ってきた同和社会が加害行為をやめ加害特定新興宗教団体から手を切ることを決断した。これにより解決主体に賛同する勢力が加害勢力と拮抗することになり、公になるのも間近と思われる。ご期待いただきたい。

201605031238388df-min.jpg



最新記事の紹介(14)

加害勢力の崩壊

特定新興宗教団体に属している在日の方々が、その特定新興宗教団体を裏切り、加害行為をやめることを決断した。もはやこの問題が公になる前の最後の出来事である。被害者の皆さんは注目していただきたい。歴史的な英断である。

20160210012101480-min.jpg



最新記事の紹介(15)

韓国社会の変化

在日社会が変化しようとしている。これまで加害特定新興宗教団体で急先鋒となってきて加害行為を行ってきた彼らが加害行為をやめ、被害者を防御する役割を担うことを誓った。構造的に動かすことができなかった問題が動こうとしている。日本人被害者の皆さんは、彼らの決断を受け入れてほしい。

201601220127406c5-min.jpg



最新記事の紹介(16)

ノーベル委員会がサブリミナル・メッセージの取り組みに参入

ノーベル委員会がその公式ページNobelprize.orgでサブリミナル・メッセージの取り組みに参入した。思考盗聴をはじめとするテクノロジー犯罪の技術が人類にとって最も深刻な危機であるという認識に立ったからだ。中立を前提とする彼らにあって、このようなアクションへの参入は極めてまれなことである。被害者として感謝この上ないことである。動向を注視したい。

20151103113647e91-min.jpg



最新記事の紹介(17)

中国は欧米の秘密結社に対峙します

この被害の胴元である欧米の秘密結社。彼らのパワーバランスが崩れる原因となったのが中国の台頭である。この彼らの影響力は見過ごすことはできない。この問題の解決に中国を巻き込むことは不可欠である。この観点から述べた記事。ぜひご覧になっていただきたい。

201506141251197f5-min.jpg



最新記事の紹介(18)

被害者はレイシズムに陥らないでください

以前にも書いたとおり、一部の被害者がヘイトスピーチの手法を用いて排外主義傾向を強めていることに対する警告である。在日韓国人の方々はすでに一般の市民に対しては集団ストーカーを行わないよう義務づけられている。彼らを加害特定新興宗教団体から切り離すのがオバマ大統領の狙いでもある。日本の集団ストーカー被害者も正常化すべき時に来ている。すべての被害者にご賢察をたまわりたい。

201505061258063a7-min.jpg

TAG index Webサイト
TAG index Webサイト
TAG index Webサイト
TAG index Webサイト
TAG index Webサイト