Covert Harassment and Overt Harassment in Japan

- The document submitted to Mr. Mendez of the UN -
-Final revision date: October 21th 2015 (Wed) -

20151021_国連

The following is the document submitted to Mr. Juan E. Mendez (The UN Special Rapporteur on Torture and Other Cruel, Inhuman and Degrading Treatment and Punishment).

Submitted day: August 9, 2013

Presenter: Terukatsu Ishibashi (The Chief Director of the Technological Crime Victims Network Specified Nonprofit Organization in Japan)



Covert Harassment and Overt Harassment in Japan

I am the chairman of the Board of Directors Technological Crime victims Network Specified Nonprofit Organization, Terukatsu Ishibashi.
Today, I came here to inform you, Mr. Juan E. Mendez, about the current situation of the victims of covert harassment and overt harassment in Japan.
Firstly, I would like to thank from the bottom of my heart, Ms. Rhonda Pence, and Mr. Derrick Robinson of FFCHS, the organizers of this meeting, who gave us this opportunity for the first time.

It has been 15 years since this NPO’s private organization was established. During the 15 years, we held not only 137 regular meetings in Tokyo, where the main office is located, but we also held meetings all over Japan, such as in Sapporo, Aomori, Sendai, Nagoya, Osaka, Fukuoka and Okinawa, trying to understand the real situation of the damage.
In addition, the 17-page detailed survey we ask our members to respond when they join us has contributed to grasp the real situation of the damage. We have collected the responses from more than 1000 victims and finished totaling answers from 815 people. What I am going to talk about today is based on the total results. As a result of these activities, we have become capable of understanding the real situation of covert and overt harassments to a great extent. I am certain that what I am going to tell you about the situation in Japan will be some reference to you, too.
So, I would like to start with the reason I started organizing this kind of meeting before I start explaining about both harassments which also serves as an introduction of myself.
I realized that I was a victim of covert harassment when I experienced concentrated attacks that used invisible tactics starting May 17, 1995. The attack continued until the spring in the following year. Before the series of attacks, I had been receiving overt harassment since 1991 as a preliminary step. As the harassment escalated, my tap water became abnormal on May 17, 1995. My anger flared up when I thought about those who were harassing me with water, which was important to human beings. Back then, I could not even imagine that an invisible technology could make people sense an abnormality in the tap water, so I was seriously concerned about contamination of the water. When image transmittance was added, I was totally played by them. In other wards, I seriously believed that I could not drink the tap water at home. I drove around looking for water with 20-liter plastic containers in the car. Soon, image transmission directly to my brain started. The images were divided in two sides, one was attacking and the other was protecting. One of them was an image that when I start putting water in the container from the faucet in the public park, somebody sends electric waves to make the water abnormal. The other one was that they have many people making coils to make an electric wave transmitter to interfere the harmful electric waves with counter electric waves. The image of the press conference to announce the completion of the transmitter was sent, too. However, when they are about to use it, it failed and the image was changed to the one in which they started all over again to make the transmitter. I never thought that those images were fictions so that I seriously believed them and was played by them. As the water abnormality related images were escalated and changed, I thought those were true and kept moving all over Japan for a half year. Though, it finally became certain for me that covert harassment is true through these concentrated attacks. I thought that the only way to protect myself is to write a book about my experience and published my book, “Impeaching the Misuses of the Electric Waves as a Weapon!” I began selling the book on July 13, 1997, putting advertisement on Mainichi Newspaper. Since the book was published privately, I could not use established distribution channels, so I kept putting advertisements on newspapers once a month for about a half-year and asked book stores to sell my book one by one. I managed to sell 800 books in that year.

Through my book, I made connection with 24 people who claimed to be the victims of similar harassments. We agreed that this issue could not be solved by an individual; therefore, I addressed the launch of club and started the “Electric Wave Abuse Victims’ Society”, the origin of the NPO based on the approval of 14 people. The name was changed twice later and we
decided to use the current name at the time we changed the club to a NPO in 2007 and lead to the present. Currently, we have more than 360 members. It is important that I, myself, am a victim and I became confident about the covert harassment due to the concentrated attacks. Without the confidence, I think I could not have founded the society and managed to maintain it. Not
to mention there was no way that I could openly appeal to outsiders. Consequently, there is no doubt that firm belief about the harassment is very important in this problem.
Now, I would like to start explaining the outline of harassments. The base used to put everything together is the table I published in my book, “Impeaching the Misuses of the Electric Waves as a Weapon!” I was able to make such a table from my own experience only. We have been using this table as the base of improvement since we launched the society.

Table 1. Electric Wave Abuses Based on Experience

I. Abuses on People
1. Intervention to the brain ① peek into one’s mind, ② transmit images and intentions, ③ image insertion, ④ turn a person into a maniac, ⑤ intervention to one’s thoughts, ⑥ brain sharing (importance of lie detector completion and peeking during sleep, ⑦ suppression and activation of thoughts, ⑧ suppression and alteration of decision, ⑨ dream manipulation and ⑩ oblivion and ecollection (manipulation of memory)

2. Manipulation of Instinct ① appetite manipulation, ② sexual desiremanipulation and ③manipulation of desire to sleep

3. Manipulation of Emotion ① manic-depressive manipulation, ②amplification and relief of hatred ③ make one nervous ④ love manipulation and ⑤ impulse manipulation

4. Manipulation of Physical Functions ① excretion manipulation, ② body odor, ③ gas generation, ④ fatigue manipulation, ⑤ sleep paralysis, ⑥ motor function manipulation, ⑦ illness, ⑧ allergization, ⑨ motion sickness, ⑩ itch and numbness manipulation ⑪ make one’s habit worse ⑫ handwriting manipulation ⑬ loosening one’s lacrimal grand

II. Abuses on Equipment
1. Signal Control, 2. Phone Control, 3. Word Processor Control, 4. Copier Control, 5. TV and Radio Control, 6. Control of the Vehicle Engine Condition

III. Abuses on Natural Environment
1. Weather Control, 2. Water Disturbance, 3. Plant Growth Disturbance, 4. Wind Development (Tornedo Development) 5. Wave Development 6. Earthquake and Volcanic Eruption

Overt Harassment

I am going to explain the real situation of harassments based on the result total of questionnaire survey collected from 815 members. I start with overt harassment. The questionnaire survey conducted by the NPO describes 35 overt harassments and asks you to circle ones you are experiencing or experienced. The 35 items are the following:

Tapping and secret photographing, following (shadowing and stalking) and watch-keeping by people, following and watch-keeping using a car, following and watch-keeping with motorcycle, silent phone calls, threatening phone call, phone disturbance, house breaking, trespassing, loss of money and goods in the house, location change of money and goods in the house, throwing objects into the site, throwing objects into the house, house burglary, site ravaging, dumping dead animals in or around the premise, dumping feces in or around the premise, rape, assault, threatening, cussing, suspicious behavior, hostile attitude (i.e. glaring and spitting), suspicious behavior of the neighbors, suspicious behavior of the people at work, suspicious behavior of the police, gossips, bill distribution, ostracism (isolation), intervention to your PC, suspicious emails, failure of electrical devices, malfunction of electrical devices, malfunction of fluorescent lights, malicious mischief on your vehicle, bike or motorcycle, uncontrollable vehicle, an attack with alien substance when you are driving, malfunction of a car door, undelivered mail, suspicious treatment when you are shopping, suspicious behavior, attitude and the content of the program from TV caster or radio personality that gives you an impression of a personal attack

Table 2 shows the total results. However, there are too many items, so we divide them into 12 categories to explain for easier understanding.

· Following (Stalking)
· Hostility
· Suspicious Behavior of the Neighbors
· Phone Related Harassment
· Failure or Malfunction of Electric Devices
· Trespassing
· Harassment on Vehicles (Car, Bike and Motorcycle)
· Undelivered mails
· Suspicious (dubious) Treatment Experienced During Shopping
· Suspicious Behavior, Attitude and the Content of the Program from TV Caster or Radio Personality
· Implications at Work, etc.
· Tapping and Secret Photographing
I would like to explain each of them.

1. Following
First is following (stalking) harassment. It is a persistent kind of following, which starts as soon as you leave your house and they keep following you one after another. Normally, the victim encounters the next “hostility” at his/her destinations after “following”, and it makes the victim believe that the offender knows where he/she goes next. After all, the victim has no choice but believes his/her entire life is being watched.

2. Hostility
Hostility is executed with following. The victim experiences incidents of glaring, spitting, cussing (abuse) in passing, blocking of the path etc. more frequently. It happens even when you are our in your vehicle and it seems accurate to use an expression, “gang up” due to the number of people following you. Therefore, traffic jams occur all the time, and the offender makes it worse by controlling signals. Such sudden hostile attacks give significant psychological damage to the victim. It is not strange if a person who had peaceful life until yesterday becomes a target of hostile attacks and starts panicking. The hostile attack is so intense that it makes us wonder that the goal of the offender is to send the victim to a mental hospital.

3. Suspicious Behavior of the Neighbors
As a result of the questionnaire survey, many victims suspect their neighbors to be the main body of the crime. Abnormal incidents, such as unusual noise comes from the next door, too many visitors to the next door, sudden change of attitude, the neighbor watch you leave home and close their door loudly as you pass by, the trash he/she placed at the collection place is brought back to the house, your garden tree is cut, dumping trash, feces and dead animals in your premise, every house in the neighborhood repeatedly hangs yellow laundry items outside to dry. There is nobody who can remain peaceful if these incidents are repeated persistently.

4. Phone Related Harassment
Phone related harassment starts, along with the others. Those are silent phone calls, 1-ring calls, nuisance phone calls, abnormal noise from the phone, phone rings when you try to do something, disconnection during a conversation, the phone rings in one-hour intervals while asleep, outgoing call history that you did not make, malfunction, hear a voice that blames you during the subtle pause that the person you are speaking makes, etc. almost all victims believe their phones are tapped. Regarding phone related harassment, it seems possible to get help from the police or phone companies (NTT, KDDI etc.) to identify the offender if you record the date and time and phone number of each incident. However, I have not received any report of being able to get help from such organizations.

5. Failure or Malfunction of Electric Device
The victims also encounter a failure or malfunction of electric devices. In order to fix or buy a new one, they are forced to waste their time and money. Especially, PC malfunctions or failures are increasing nowadays, and some victims have stopped using PCs. It makes us imagine the existence of a specialized department that can control a victim’s PC from distance. When your electronic device fails, you call the customer support center, but they respond to you in a way that make you suspicious if they have been waiting for you to call. Therefore, we think that there may be a special group to harass people that commits in both causing PC failure and pretend to be customer service window. It thoroughly trains the staff to cause malfunctions and to respond to the victim’s request for a consultation, cause failure or malfunction from a distance and drive the victim into a corner by responding senselessly to the victim’s request for consultation. Some victims have been trying to keep and record the evidence, but we have cases in which the recording device broke down or the recording was deleted.

6. Trespassing
Here, nonsensical things occurs repeatedly, for example, things in the house change the location without the knowledge of the owner, lost things, the thing lost days ago comes out from the other place, broken locks, clothes are sewn, volume of the cosmetics decrease too fast or too slow, the room is wet, dust scattered all over the room, a newspaper is rolled up into shape of genitals and left in the room, food in the refrigerator is eaten, etc. Victims of this harassment cannot leave their house, since every time they leave the house they recognize some alterations. It continues even after they make a contract with a security company, so most of them cancel the contract. It seems that such obstinate trespassing is aiming to inflict psychological damage on the victims by letting them know that somebody was in the house.

7. Harassment on Vehicles (Car, Bike and Motorcycle)
There are reports of deflated tires, punctured tires, a sudden total failure of the car, a claim that somebody drew a hand that shows V-sign over the speed meter, as well as a fake accident.

8. Undelivered mails
Many victims send letters that reports the harassment and asking for help, but are very skeptical if those mails are truly delivered. About 20 % of the victims reported about undelivered mails and parcels via post office and home delivery services. We found that the all three letters, registered mail, express mail and regular mail, we sent to Mr. Soichiro Okuno, the member of the House of Representative in April, May and June, were not delivered. We asked his secretary to write a letter and sent it to the president of Japan Post Network Company with the certificate of content. We received a report of delivery in writing, but those three letters are still missing. Knowing what happened to our activity, there is no wonder that the members become more anxious.

9. Suspicious Treatment Experienced During Shopping
This is a type of harassment that the victim is treated impolitely at the register of a super market or home center, the service counter of the bank, post office or public office, a dining room, a restaurant, hair salon and others even though they are customers. The victim demands explanation when it happens, but they arrange people to observe it so that they can put the one assigned to do the job under the pressure that if he/she did not follow the direction, the person, too, would suffer violent harassment later.

10. Implication or Suspicious Attitude from TV Caster or Radio Personality
Some report that TV caster or radio personality implies something related to the victim’s privacy, use what the victim said or did at home in the TV program or peek them from the TV. In the digital broadcasting era, we need to be concerned about the fact that a special program is transmitted to the victim only. We are hoping that the perusal system will be established at the National Diet Library, so that all TV/ radio programs broadcasted nationwide are recorded and be able to review anytime when any suspicion occurs.

11. Implications at Work
There are an increasing number of victims who report implications of their privacy, which only the victim should know, by their coworker. Many people did not have a choice but resign their jobs due to the combination of the implication and harassment. However, there is a case that one of our members who won the trial at the court of final appeal using the recording on his IC recorder as the evidence. The case is a good reference.

12. Tapping and Secret Photographing
In order to coordinate these harassments that I have just explained, the offender must be able to read the victim’s activities. Therefore, overwhelming number of victims suspect tapping and secret photographing. We hire private detectives to investigate this matter, but they were unsuccessful. Thus, we begin to realize that considerably sophisticated monitoring technologies are used.

In addition to the explanation about overt harassments, I want to mention the fact that the victims are experiencing multiple harassments continuously. There is no doubt that these harassments are organized crimes since they are impossible to execute individually. I believe that observing overt harassment from its characteristics would help us better understand the real nature of the crime. So, I would like to explain the characteristics now.

We have found 11 characteristics of overt harassments from our survey.

1. Group Activity: This is a characteristic of harassing a certain individual as a group. This characteristic alone can indicate that overt harassment is an organized crime. Even though it is a senseless action, when you file a suit, you end up being asked, ‘Why so many people have to harass you?’, ‘Are you a very special person?’, ‘Who is paying the cost of use so many people? and ‘Isn’t it your paranoia?’ in reality.

2. Stalking: This is a characteristic that constantly follows a certain individual quietly. Not only while the victim is out, but also follows around even he/she is in the house and make a trouble with a superb timing. It is unbelievable in common-sense terms.

3. Continuous and Repetitive: The harassment lasts persistently 24 hours and 365 days a year.

4. Calculated Timing: The harassment often occurs at a superb timing. For example, the phone rings when you are just about to do something, electrical devices near you make a strange noise every time you move around the house, you hear foot steps from the floor above as you walk on the lower floor, and every time you go to the bathroom you hear somebody go to the bathroom next door. If it ends after a couple of times, it does not feel strange, but it is continuous and quite abnormal.

5. Monitoring: Harassing action with such a great timing cannot be done without monitoring the victim. Therefore, the victim have no choice but believe that somebody is monitoring him/her and hires a private investigator for tapping or secret photographing. Because they cannot find any evidence, we started to believe that considerably sophisticated tapping/secret photographing technology is in use.

6. Systematic: The superb timing of the harassment, which is not so unimportant like somebody peeps in the victim’s life and makes nuisance action, made us start believing that the offender reads victim’s behavior ahead of time and the type of the harassment is programmed in the system to automatically implement the operation. Harassments toward individuals have been highly developed.

7. Organized: Many victims move from place to place in order to escape from the harassment, but it is clear from the testimonies from those victims that harassment continues at the new location. Some moved from Kanto to Hokkaido, Hokkaido to Okinawa, Kanto to Tohoku or Kanto to Kansai, but the situation remained. Also, the victims live all over Japan. Consequently, it is obvious that overt harassments are operated by the crime groups organized nationwide.

8. Networking: The organizations that spread nationwide make their communication network dense and harass victims no matter where they try to escape. Therefore, good communication network is essential for them.

9. Manualized: Since there are victims of similar harassment globally, we think that manuals exist and the offenders are operating based on the manuals.

10. Historical: We have learned from the survey that we have a history of overt harassments that is over 40 years.

11. Preposterousness: The 10 characteristics listed above are all extremely preposterous, and this preposterousness can bind all these characteristics.

The 11th characteristic of preposterousness is especially important. If the harassment is within the bounds of common sense, there would always be somebody who helps the victim. The family member can listen to the victim’s story and friends can help, too. Police, lawyers, executive officers and politicians would listen to you and do something about it. However, the more preposterous the harassment is, the less people will listen to you. The main body of the crime is well aware of the fact, and we started understanding their strong intention to never do a kind of harassment within the bounds of common sense and focus on being senseless. It is extremely important that we clarify such intention of the main body of harassment.
On the other hand, victims become isolated because nobody listens to their complaints about such preposterous harassment. They are cornered and what is left for them is to commit suicide, be taken into the mental hospital or take self-defense measures. It has become to our knowledge that such ending is the picture the main body of the crime has drawn. The achievement of the NPO’s activities is the clear understanding of the crime organization’s strong intention and the picture they have drawn. Also, it is related to covert harassment.

Covert Harassment

Next, I would like to explain covert harassment. We believe that invisible electromagnetic waves and ultrasounds are used as medium. Covert harassment is a crime that uses such medium to attack and control its target’s mind and body accurately from a distance. Like overt harassment, the NPO stated the following 40 items on the questionnaire survey and ask the member to circle the ones they are experiencing or have experienced.

Hear a voice, hear a noise, see images, my thoughts are read by somebody, intervention to the consciousness, suppression and activation of the brain activity, unnatural dreams, anxiety of mind being violated, overeating, a poor diet, sexual excitement, loss of vitality, insomnia, sleep disturbance, strong sleepiness, mania, depression, amplified fear or anxiety, elevated suspicion, incontrollable impulse, amplified hatred, nervousness, diffident, zooming eyes, loss of eye sight, loss of hearing, hear a voice from a distance, loss of sense of smell, sense strange smell, loss of taste, strange feeling left in the mouth after eating, feel of touch on the genitals, feel of insertion in the anal, tightening or numb feeling on the head, headache, feel like the head is wrapped with something soft, feels like something is implanted in the head, extreme fatigue, feel like an electricity ran through the body, constipation, diarrhea, incontinence of urine and feces, slackness of anus, manipulation of excretory function such as poor excretion, the muscle moves against his/her will, listless feeling, strong body odor, gas,excessive perspiration, sudden fluctuation of pulse, unusual (food poisoning, drunkenness, motion sickness, cols symptoms-(coughs, sneezing, nasal inflammation etc.), a burn, vibration of the surroundings, vibration of the body, sleep paralysis, sensation of body tic (splattering), pain in organs such as a heart, pain in genitals, pain of something piercing through the body, sensation of burn on the back of eyeballs, bizarre air, pain of impact from air
bullets, fainting

As a result, I could make the following table. This, too, has so many items that I would like to explain by dividing them into 11 categories.

1. Harassment of Voice and Image Transmission: This is a typical covert harassment since 58% of the responders complained voice transmission and 65% complained about the noise transmission. Image transmission is 32%, less than voice and noise transmission, but can be considered as an abuse of same information transmission technology. Therefore, I am explaining about them together. As you have already known well, it is a harassment that makes you hear a sound in your head or hear a voice in the space even though there is nobody around you. The contents of the voice varies, for example, name calling, such as “Fool” and “Ugly”,
order or threat, such as “Cut your wrist”, “Jump and fall”, “Kill yourself”, “If you do not do what I say, I will hurt your family” and “Go to a certain place”, words that sound like the person is peeking what you are doing in the bathroom, an annotation for what you are doing, the voice reads the book that you are reading, answer to the thoughts in your head and interactive communication with the voice.
Harassments by sound are the sound of piano in the midnight, sound of drum, shattering sound, sound of slamming the door, high pitch noise, low pitch noise, etc.
Majority of victims who report harassment of voice testify that they hear the voice all the time as long as they are awake. Also, many of them confessed that they were manipulated by the voice in the beginning.
There is a possibility that the victim will take a huge risk by following the orders from the voice; for example, the victim is ordered to go the broadcasting station and do so, ordered to cut his/her wrist and do so or ordered to jump and fall and do so. So, this is a terrifying harassment.

2. Manipulation of three desires: The result of questionnaire survey shows that the most common covert harassment is sleep disturbance. About 69% of the members report this harassment saying that a voice wakes them up, cannot sleep because of the pain, some kind of awakening technology is being used. We can assume that manipulation of desire to sleep is implemented. There were a few people who could not sleep at all for almost a month and had to be admitted to the hospital. Sleep disturbance is one of the methods used to torture people; therefore, this is considered as a torture. As for the manipulation of sexual desire, Mr. Barrie Trower, whom you already know very well, testified that electronic wave of 6.6Hz can induce violent sexual drive, so I would
like to leave it to that.

3. Manipulation of Physiology: It is evident that they can freely manipulate physiology, such as incontinence, gas generation, diarrhea, hardness and softness of feces, body odor. Since I experienced stalking, which made me feel a slight need of using bathroom day and night, I believe that it has a stalking characteristic, in other words, it works not only at a certain place but wherever you go. The stalking nature is so strong that it does not leave alone and make you believe that it is your natural self.

4. Manipulation of Body and Motor Function: This is a harassment, which your body movement is controlled against your will. People notice it when your neck and limbs are moved against your will, so it is very troublesome. It sometimes controls all muscles related to excretion freely, and shows its amazing manipulative ability. We believe that it can easily control you to feel like your athletic ability improved all of the sudden or not to let you have positive results no matter how much you practice. We think that this technology is being used for professional sports considerably. It may play a role in directing a prearranged game, too. We believe that it is more effective than using drugs, so that it has possibly become the technology necessary for winning medals in Olympics. In this era, we believe that it is necessary to run a test for this technology in addition to doping tests.

5. Manipulation of Five Senses (Sight, Hearing, Taste, Smell, Touch): The harassment causes, zooming eyes, an intentional ear trouble caused by the fluctuation of air pressure, a strange feeling left in the mouth after eating, strange smell without the source in the area, feeling of insects crawling on the skin, feeling of touch, etc. The victims of strange smell often report that the smell comes from their neighbors and seals their house very well; though, the smell keeps coming. Somebody used an expression that chunks of the smell are coming down from the ceiling. One of the victims was suffering from the smell of spray and went to mountains on the motorcycle only to find that the smell did not disappear. This is a stalking act with a smell of spray. We can imagine that manipulation of five senses can have a stalking characteristic.

6. Manipulation of Emotions: There is harassment that makes you tear up when you are not sad or make you laugh uncontrollably when it is not funny. In this person’s case, he bursts into laughs when he is at the regular meeting and is worried that people may think he is suspicious. The other person was manipulated to laugh whenever he feels that both cheeks have started inflating. Since it is done repeatedly, it is extremely troublesome. This alone can keep you from going outside. We also believe that happy feeling and depressed feeling can be manipulated freely. They often use this to induce dark feeling on the target as they do
other harassment to increase the damage markedly.

7. False Sickness: (Sickness Manipulation): This is a harassment that induces sickness symptoms even though you are not sick. We believe that it can freely manipulate sneezing, runny nose, slight fever, blood pressure and pulse,. According to Mr. Barrie Trower, it can also induce mental sickness, heart attack and cancer, and he further testifies that, as for cancer, even the speed of progress can be controlled, and it agrees with the NPO’s survey results.

8. Mind Control: It is very important that many of the victims from voice transmission harassment testify that the voice responds to their thoughts or the voice communicates interactively. This harassment cannot be realized without the technology that connects human brain and computer. The victims of this harassment naturally believe that somebody is reading their thoughts and start insisting that their minds are eavesdropped. Mind eavesdropping is an ultimate invasion of privacy. Moreover, it is very frightening that something can get into your mind, because it indicates the possibility of being controlled by the idea from outside instead of your own. What I explained so far are all technologies that make you lose who you are, but it is such a grave fact that it can work on your mind, too. It is an ultimate form of privacy invasion and a technique that completely denies democratic living.

9. Physical Attack: This harassment can be rephrased as harassment by torturing technology. Sensation of needle stabs, sudden attacks to organs, attacks by small or large air bullets, sensation of electricity creeping up the body, sensation of burning behind the eye balls, sensation of virtual torture in which both cheeks are pierced with a wire, etc. are reported.

10. Others: Vibration on the body and vibration of the surroundings. One of the victims of this harassment was attacked to the degree that his house was cracked. Sleep paralysis and sensation of insertion into genitals or anus, which seem nothing but abnormal. Sometimes, it makes the victim feel as if his/her heart is grabbed and massaged directly and make us wonder if it can be explained as a work of some technology.

11. Murder: Dead people cannot testify, but 17 out of 1166 confirmed victims are already dead, so there is no doubt that it can kill people. Two people out of the 17 broke down by subarachnoid hemorrhage and one of them died directly from it. One died from heart attack. I believe it is not only the direct victim who dies but people around the victim are also targeted. I stood as a candidate four times to become a politician, won once of them and became the local assembly member, but the person who supported me and his family or those who probably voted for me died one after another. The causes of their deaths were a heart attack, cancer (some were scirrhus carcinoma), a sudden death while taking a bath, etc. These deaths were processed as deaths by natural cause, not by certain technology. We do firmly believe that there are many cases of murder, which the victim or the people around the victim do not realize it as a murder.

Above is the outline of covert harassment. In order to implement such harassment, the following technology is necessary. We, the NPO, put this together based on the result of the questionnaire survey, so the following are inferences from the result.

1. Stalking Technology: Since it is impossible to commit this crime without the stalking technology, which catches a particular individual and does not let go, we define this technology as the first basic technology used for covert harassment. It also requires the technology that can identify particular individuals, so we need to consider a microchip implant to be able to explain it. From my experience, I believe that stalking that relies on technology had already begun in early 70s. I also think we should consider their use of satellites. I think we can express it as biotelemetry technology employing satellites. You may have better way to address this technology. We use such expression, because we are just inferring based on the real situation from the tandpoint of the victims.

2. Voice and Image Transmission Technology: We consider this as echnology that bypass normal auditory organ or visual organ and irectly transmit voice or image into the brain. Some of the victims of oice transmission harassment testified that he/she heard the same voice in overseas; therefore, this harassment can be implemented in a global scale, and we suspect the use of satellites here, too. As for image transmission, I do not know anything more elaborate than what I experienced. I think it only works in and around the big cities, such as Tokyo and Osaka. I experienced it in Paris and Firenze, too, so it seems to work in foreign big cities, too. However, it was 15 years ago when I experienced it, so it may be able to reach over farther distance than before. Anyway, it abuses the communication technology that allows transmitting voice and image directly to the brain without a terminal
device.

3. Mind Eavesdropping Technology: Military is the one that is pursuing this technology the most. As for military, information collection technology is the most important technology, and the most crucial one is the technology to read the mind of military leaders. The crime cannot be implemented without technology that connects the human brain and computer. It is a brain-machine interface technology. It reads people’s minds, so it has to contain a device that catches brain signals and transmit it. I cannot deny the existence of microchip that can be implanted in the brain.

4. Technology that can influence human’s physiological functions, three desires, five senses, emotion and mind activities: Since human’s physiological functions, three desires, five senses, emotion, motor activities and mind activity are mainly controlled by the brain, the brainmachine interface technology, which I mentioned earlier, is essential for this technology. In addition, the brain functions must be thoroughly understood to make this happen, so the level of control depends on the level of the neuroscience development, we think. It is also necessary that the microchip is as close to the brain as possible to catch feeble brain waves.

5. Monitoring Technology: They can attack their target wherever they run or even in the house, which means they utilize very sophisticated monitoring technology. Moreover, they must be able to program when and what kind of attack they do, because they attack with miraculous timing.

6. Physical Attack Technology: First, they need technology that can aim each body part precisely, and technology that allows you to choose what kind of pain and control the strength of the pain is necessary. This harassment requires these technologies, and we believe that the brainmachine interface is the center of them. This technology connects human brain and computer, so that experiments on human bodies are necessary to complete the development. I won’t be surprised if there are many victims who are used for the development of this technology. Experimentation on humans is necessary to evaluate the product value, too. Furthermore, more experimentation on human is necessary to learn how to use the technology. As you can see, brain-machine interface technology requires experimentations on humans in many aspects. Therefore, there is no doubt that those departments which develop it, evaluate it, train with it, and control the technology are all committed to the crime in some ways. Therefore we need to investigate continuously where the technology is sold as a product, outflow situation of the program or whether similar product is brought from foreign country.

The NPO have been tackling covert and overt harassments in order to eradicate them. When we take a look at the scheme, to drive the victim into suicide, take them into mental hospital and corner them to take self-defense measures, which the main body of the crime pictures, we notice that it matches with three big social problems that we are facing in Japan now. Those are over 30, 000 and increasing number of suicides, increase of patients with mental disorder, which was once over 3 million patients and
increase of unbelievably atrocious crimes.

According to the suicide overview material for 2012 issued by the National Police Agent, 8,278 people, 29% of the total of 28,396 people, committed suicide due to mental problem (Breakdown: depression 5,904 people, schizophrenia 1,150 people and other mental disorders 1,224 people). As you know, when one says he/she can hear voices or see images in the head, he/she is diagnosed as schizophrenic. Sleeplessness is categorized in other mental disorders. There is a report saying, currently, one out of ten people are suffering from insomnia in Japan. Harassment to cause sleeplessness is considered as torture, and is a very serious offense. Victims have to go to psychiatrists for consultation to deal with the problems that should be managed by the police primarily as covert harassments. Naturally, no victims can be satisfied by the way they are handled. We can imagine that there are many people who were misdiagnosed with a mental disorder and end up committing suicide. By implementing overt harassment on a victim one after another, they can cause a panic attack and take the victim to mental hospital. So, we believe many victims of covert and overt harassment are included in the 30,000 people who committed suicide. Also, almost 3 million people have mental disorders, now, in Japan; therefore, if we take suicide and mental disorder seriously, we need to take measures against both covert and overt harassments.

Nowadays, unbelievably atrocious crimes are happening often in Japan. We can suspect that the taxi driver murder case in Yokosuka on March 19, 2009, the personal injury case near Toyo-cho subway station of Tozai line on March 19, 2013 and the other personal injury case in Saitamacity in May 2013, were all executed by the victims of voice transmission harassment. It is necessary to tackle covert harassment to reduce atrocious crimes that we cannot even imagine.

Since the scheme that the main entity of the crime draws and the social conditions match, we can imagine that the entity is directing the social conditions, too. It is important that these social problems, an increase of suicides, an increase of patients of mental disorder and an increase of atrocious crimes, are a possibly directed by the entity. Those three problems are treated as big social issues now, and so as these covert and overt harassment should be. The NPO is fighting to obtain the recognition from the society and for the development of laws by which both of those crimes are punished as criminal offenses by appealing the very point.

We think that such a big issue does not receive enough attention because of the strong international connection between those entities of the crime. Therefore, the group of victims should construct international circles to fight against them face to face. We hope that today would be the opportunity to make that happen.

Today, I talked about the situation regarding covert and overt harassment in Japan. In the end, I would like to say thank you again to Mr. Juan E. Mendez from the bottom of my heart for giving us this opportunity. Thank you very much.



 上記はNPOテクノロジー犯罪被害ネットワークの理事長、石橋輝勝氏が2013年8月9日に、国連の拷問報告官のユアン・メンデス氏に提出した文書です。日本語・英語の原文に関しては下記リンクよりお願いいたします。

Covert Harassment and Overt Harassment in Japan(日本語PDF)
Covert Harassment and Overt Harassment in Japan(英文PDF)

 なお、この訪問の直後にこのブログで紹介した日本の個別の被害者によるメンデス氏への訴えかけが行われました。これについては下記リンクよりご参照下さい。

被害への取り組み(27)
被害者全員で国連に被害を報告しよう (1)
~拷問に関する国連特別報告者、ジュアン・メンデス氏へのメールの書き方~


被害への取り組み(31)
被害者全員で国連に被害を報告しよう (2)
~ジュアン・メンデス氏への英文の書き方~



 日本の被害者の皆様におかれましても、これは最も国際的に評価されるべき石橋理事長のアクションです。この文書の存在をできるだけ多方面に広めていただければ幸いです。何卒よろしくお願いします。


関連記事


拡散をお願いします !!

イルミナティの力の根源は思考盗聴技術

思考盗聴技術を元に全世界で集団ストーカー・テクノロジー犯罪を展開しています


20161113072913ec0-min.jpg

イルミナティの世界支配の力の根源は、思考盗聴技術をベースにした集団ストーカー・テクノロジー犯罪という見えない圧力です。この事実を世界に拡散してください !!


911はイルミナティによって仕組まれていた

20170420093844680.jpg

911のテロはイルミナティが思考盗聴と意識の介入で警備員とイスラム教過激派を遠隔操作して成功させたというのが真実のようです。この事実もぜひご拡散ください !!



ASKAさん、頑張って !!

700番 第二巻/第三巻 ASKA
ASKAさん、光を当てていただいてありがとうございます


20170216150912135_小

ASKAさんは、2017年2月17日発売の著書で集団ストーカー被害について触れられました。我々の犯罪に光を当てていただいたことになります。ASKAさんはこの犯罪に負けられる方ではありません。音楽活動、頑張ってください !!


700番 第一巻 ASKA
~ASKAさんは間違いなく未認定犯罪の被害者です~


20170319_ASKAさん_小

ASKAさんが、女友達の被害について相談に乗った後に、ASKAさんが盗聴盗撮被害を受けた経緯が克明にまとめられています。こちらも被害者必携の著書です。



京都大学であったこと

私が京都大学で集団ストーカー犯罪を受けた起源 支援者の皆様のおかげで卒業できました

20170220_kyotou_小

私が集団ストーカー加害行為を受けていた起源が、京都大学の1回生のころであることが調査によって分かりました。当時、助かる被害ではなく、岡田敬司先生杉原保史先生はじめ、皆様のサポートがなければ卒業できませんでした。当時私に関係した皆様にご覧になっていただきたいです。



緊急時のお問い合わせ 

孤立している方、緊急時の方は遠慮なくお問い合わせください。自殺を考えている方がおられましたら必ず踏みとどまってください。

20150308_緊急時のお問い合わせ

上記ボタンをクリックしてください。緊急時の方は積極的にご利用ください。ただし、ご返信は被害相談に限定させていただきます。


20161201_まとめ-min_小
集団ストーカー・テクノロジー犯罪 被害記事まとめ

お問い合わせをご検討の方、被害についてお知りになられたい方はまずこちらの記事をご覧になって下さい。被害のまとめ記事です。随時更新して参ります。
(2016年11月8日更新)


20150516190523cb7-min.jpg

プロフィール 

20130308183551b1b-min_1.jpg
author : Masanori Kawasaki
川崎正典

I am one of the victims of organized stalking and electronic harassment crimes in Japan.I am on the steering committee of the Technological Crime Victims Network Specified Nonprofit Organization. I am a graduate of Kyoto University.

集団ストーカー・テクノロジー犯罪被害者。2010年より集団ストーカー・テクノロジー犯罪の法制定を実現するために国会議員を目指してブログを開設。NPOテクノロジー犯罪被害ネットワーク広島進行役。京都大学総合人間学部卒。

My twitter ⇒ @masa_kawasaki



世界の被害者団体ほか

NPOテクノロジー
犯罪被害ネットワーク

(日本の被害者団体)
20140520231128317-min.jpg

FFCHS
(アメリカの被害者団体)
20160630081551bf8-min.jpg

ICAACT
(欧米の被害者団体)
20140520_ICAACT-min.jpg


COVERT HARASSMENT CONFERENCE 2015
(ベルリンの国際会議 2015年10月)
201503151204389a9-min.jpg




NPO出版の被害報告集

テクノロジー犯罪被害者による被害報告集―遠隔技術悪用を告発する33名の被害者自身による被害実態報告テクノロジー犯罪被害者による被害報告集―遠隔技術悪用を告発する33名の被害者自身による被害実態報告
(2010/05)
商品詳細を見る

テクノロジー犯罪被害者による被害報告集〈2〉遠隔技術悪用を告発する29名による実態報告テクノロジー犯罪被害者による被害報告集〈2〉遠隔技術悪用を告発する29名による実態報告
(2013/06)
商品詳細を見る

NPO法人で掲載者を募り、内山治樹氏のご努力により出版された被害報告集です。被害の実態がすべて記載されています。ぜひご覧になってください。




第10回テクノロジー犯罪被害フォーラム

20170402_東京フォーラム_小

今年もテクノロジー犯罪被害フォーラムが開催されます。詳細は上記画像をクリックしてください。なお、昨年の公式HPの情報については次のリンク先をクリックしてください。

HPはこちら ⇒ 【HPリンク



NPO広島集い

20150415075928b95-min.jpg

日時:4月23日(日)
場所:広島市中区舟入公民館 会議2
時間:13:00~

所定のアンケートを記入・持参した方でなければ参加できません。ご注意ください。なお、NPOでは本人確認を行うことを決定しました。免許証やパスポートなどの提示をお願いいたします。

HPはこちら ⇒ 【HPリンク】


これまでの成果

サブリミナル・メッセージの取り組みが成し遂げたもの

われわれのサブリミナル・メッセージの取り組みによって様々な事項が国際的合意を得ています。これら一連の成果のまとめ記事です。当ブログのサブリミナル・メッセージの取り組みをお知りになるために最も適した記事です。ぜひご覧になって下さい。

20151115121419279-min.jpg




過去のおすすめ記事

NO.1
201510211641457f0-min.jpg
被害者全員で国連に被害を報告しよう
拷問に関する国連特別報告者、ジュアン・メンデス氏へのメールの書き方



NO.2
20160610084049c09-min.jpg
集団ストーカー行為の被害集計
NPO法人による被害集計①



NO.3
20160610084047843-min.jpg
テクノロジー犯罪の被害集計
NPO法人による被害集計②



NO.4
20121227145740dba-min.jpg
サブリミナル・メッセージ
メディアで進められる水面下の交渉



NO.5
20140202060519b10-min_1.jpg
思考盗聴について
被害の経験によりここまで分かっています



NO.6
20130917135330161-min.jpg
私が提言する日本の被害者のとるべきスタンス 国際的に包括的に解決を進める必要があります


NO.7
20161108022836523-min.jpg
メディアのサブリミナル・メッセージの実態 解決したい勢力と加害勢力の熾烈な戦い


NO.8
201201111249533b8-min.jpg
原告団を形成して国の責任を追及する
被害者で団結して社会に訴えかけよう



NO.9
201511100620190b2-min.jpg
特定新興宗教団体は日本人の思考を読みたい放題 一刻も早く規制を実現しなければなりません


NO.10
20151110062021637-min.jpg
加害行為に利用される意識への介入
ほのめかしは実は電磁波による交信によって行われていた





ご家族の皆様へ


集団ストーカー被害は被害者一人で乗り越えるには大きな困難が伴います。場合によっては被害者本人が自殺に至る可能性もあります。それを防ぐにはご家族の方の理解がなければなりません。新たにカテゴリ「ご家族の皆様へ」を設け、集団ストーカー被害者のご家族の方へのメッセージを綴りたいと思います。ぜひご覧になってください。2015年11月11日、ご家族のためのQ&Aを追記しました。ご参考下さい。

2015111114094119c-min.jpg

第一回記事
家族は被害者をどう理解すればよいか
~問題解決に必要な家族の力~




被害者全員で国連に被害を報告しよう

国連の拷問に関する特別報告者、ジュアン・メンデス氏⇒国連サイトへのリンク)が全世界のテクノロジー犯罪・集団ストーカー被害の報告を受け付けるということです。これを機に日本のすべての被害者に呼びかけます。下記のアドレスに所定のフォームで被害報告をお送りください。(9月23日英文の書き方を解説しました。

なお、現在ではメンデス氏にすでにメールが送れなくなっているようです。日本の被害者の皆様はお気を付けください。日本での被害史上最も重要なアクションのため、この記述は残します。ご参考ください。

記事はこちら ⇒ 【記事リンク】

TAG index Webサイト
TAG index Webサイト
TAG index Webサイト
TAG index Webサイト
TAG index Webサイト
Please spread this fact !!

The Source of Illuminati’s Power is Thought Reading Technology

- Gang stalking and electronic harassment has developed throughout the world based on thought reading technology -


20161113072913ec0-min.jpg

This article fully uncovers why the Illuminati are capable of exercising world dominance. Now is the time for the whole world to overcome their taboos. People of the world, be sure to spread this truth!


- The 911 truth -

20170420_911_小

In 911 terror attacks, security staff and Islamic extremists were remotely controlled through thought reading and intervention of consciousness by Illuminati

-Apl 18, 2017-



The NPO's Action

Covert Harassment and Overt Harassment in Japan
- The document submitted to Mr. Mendez of the UN -


201510211641457f0-min.jpg

Presenter: Terukatsu Ishibashi (The Chief Director of Technological Crime Victims Network Specified Nonprofit Organization in Japan)

-October 21, 2015-



Our vision

Rush to form international treaties for regulating gang stalking and electronic harassment
- Unless there is regulation at an early stage, there is no future for mankind -


20150607083810ef8-min.jpg

From this year, there has been an increase in international interaction between victims. This signifies that this problem is becoming a truly international issue. On this occasion, we would like to explain about the objectives of us victims in relation to this problem...

-June 7, 2015-



Approach of this blog

To all of you in the international community
- Aiming for a resolution throughout the whole world -


201405311021486fc-min.jpg

This relates to the organized stalking and electronic harassment issue that is spreading around the whole world. With this blog, we have repeated observations aimed at its resolution over many years. On this occasion, I would like to explain the approach of Japan to all of you in the international community....

-May 30, 2014-



About the NPO

Technological Crime Victims Network Specified NPO
- Introduction to the victims organization in Japan -


201406041909471a6-min.jpg

The Technological Crime Victims Network Specified NPO is the NPO corporation that has officially recognized the damage caused by organized stalking and electronic harrassment in Japan. On this occasion, I would like to explain about this organization....

-June 4, 2014-

カテゴリ

openclose


サブリミナル・メッセージ記録ブログ
(サブリミナル・メッセージの記録は別サイトで行っています。ご参照ください。)



検索フォーム




リンクについて

リンクフリーです。集団ストーカー、テクノロジー犯罪の被害者の方やこの問題の認知を目的とされる方のリンクを心よりお待ちしています。

ただし、著作権は守ってください。画像・文書の転載はしないようお願い致します。また、英文の一部の記事は翻訳者に著作権がありますのでご注意ください。

最新記事の紹介(1)

頑張って、トランプさん

トランプ次期大統領がオバマ大統領の業績を引き継いでイルミナティ摘発を次期政権で実現することを快諾した。トランプ次期大統領の懐の深さの表れである。日本の被害者の皆さん、政権交代時の混乱はありません。ぜひトランプ次期大統領にご期待ください。

20170116_トランプ氏_小



最新記事の紹介(2)

バチカンも正常化します

過去のローマ法王からイルミナティのNO.3を輩出していたバチカン市国も正常化することとなった。英国王室に続き、イルミナティの闇と戦っていくとのことである。反イルミナティの動きが急速に広がっている。期待しよう。

20161122_バチカン_小-min



最新記事の紹介(3)

イルミナティの力の根源は思考盗聴技術

イルミナティの力の根源は、アメリカで技術開発されてきた思考盗聴技術である。現在、世界の都市部でテクノロジー犯罪のデバイスが配備されており、その圏内にいる人物はいつでも思考盗聴を受ける恐れがある。これによって彼らはソフトな世界支配を実現してきた。この記事をご覧の皆様は、ただちにこの情報を拡散して欲しい。人類はイルミナティに勝利する必要がある。今、その瀬戸際なのである。

20161113072913ec0-min.jpg



最新記事の紹介(4)

イギリス王室が正常化します

イギリスに激震が走った。トップの女性を除いてすべての英国王室の人物がイルミナティを脱退するというのである。現在、集団ストーカー・テクノロジー犯罪を取り巻く環境が大きく変わりつつある。これでタブーが外された。必ず公になるはずである。

2016111208121875f-min.jpg



最新記事の紹介(5)

トランプ次期大統領、イルミナティ摘発をお願いします

ドナルド・トランプ氏が次期アメリカ大統領に選出された。氏は、もともと反イルミナティに関しては親和的な政治家である。氏ならきっとオバマ大統領の遺志を受け継いで完全にイルミナティを摘発してくれるという期待を込めて書いた記事である。ぜひご覧になっていただきたい。

20161109154446d95-min.jpg



最新記事の紹介(6)

President Obama, we know you can do it.

イルミナティを摘発することができるのはオバマ大統領だけである。任期の最後にぜひ彼に摘発を成し遂げていただきたいと思っている方は多数である。頑張って、オバマ大統領 !!

20161103131903e4a-min.jpg



最新記事の紹介(7)

自民党の解決スタンス

このブログを路線転換する。これまで、私は民進党から立候補する前提でリベラル論を述べてきたが、被害者第三極を形成し、自民党の協力を得て解決を目指すことにした。政策遂行能力のある彼らと組まなければ、しばらく日本では解決できないだろうからだ。彼らは純粋な日本人の救済を目指している。ぜひご覧になっていただきたい。

20161025133835d37-min.jpg



最新記事の紹介(8)

集団ストーカー行為を防止する政治的枠組み ③

日本では、世界に対してメルクマールとなるような法案制定が行われなければならない。そのためには、ロスチャイルド財団・ロックフェラー財団によって健全化した自民党と組むことも求められる。被害者が第三極を形成して政権与党に与するのである。

20160925132109f1d-min.jpg



最新記事の紹介(9)

勝利宣言です

アメリカが、ロスチャイルド財団・ロックフェラー財団の協力を借りて、加害秘密結社最高機密施設への軍事突入を成功させた。犠牲者は一人も発生させなかった。これにより、事実上世界で集団ストーカー・テクノロジー犯罪が解決に向かうことになるだろう。人類の勝利である。

20160907043445be9-min.jpg



最新記事の紹介(10)

ユダヤ系の巨大財団が被害者迎合資本を投入しました

2016年8月に行われた加害勢力の総攻撃。これに対抗するためにオバマ大統領はユダヤ系の巨大財団に資本出資を依頼した。彼らはこれを快諾。日本の被害者は寸前で助けられた。この合意により、もう一方の共和党支持の巨大財団も被害者のための出資を約束。協調して解決行動を行っていくことで合意された。彼らには感謝の言葉もない。期待して見守ろう。

201608141827072a1-min.jpg
201608151149288f9-min.jpg



最新記事の紹介(11)

集団ストーカー・テクノロジー犯罪におけるマインドコントロールについて

我々の被害は非常に残酷なマインドコントロールを可能にする。思考登頂技術の存在によってプライバシーがない状態で熾烈な攻撃を受けるからである。今回は私の事例をもとに高度なマインドコントロールを解説した。ぜひご覧になっていただきたい。

201607130210494c6-min.jpg



最新記事の紹介(12)

同和社会が加害行為をやめる決断をしました

これまで同様に加害特定新興宗教団体から依頼を受けるなどして加害行為を歴史的に行ってきた同和社会が加害行為をやめ加害特定新興宗教団体から手を切ることを決断した。これにより解決主体に賛同する勢力が加害勢力と拮抗することになり、公になるのも間近と思われる。ご期待いただきたい。

201605031238388df-min.jpg



最新記事の紹介(13)

加害勢力の崩壊

特定新興宗教団体に属している在日の方々が、その特定新興宗教団体を裏切り、加害行為をやめることを決断した。もはやこの問題が公になる前の最後の出来事である。被害者の皆さんは注目していただきたい。歴史的な英断である。

20160210012101480-min.jpg



最新記事の紹介(14)

韓国社会の変化

在日社会が変化しようとしている。これまで加害特定新興宗教団体で急先鋒となってきて加害行為を行ってきた彼らが加害行為をやめ、被害者を防御する役割を担うことを誓った。構造的に動かすことができなかった問題が動こうとしている。日本人被害者の皆さんは、彼らの決断を受け入れてほしい。

201601220127406c5-min.jpg



最新記事の紹介(15)

ノーベル委員会がサブリミナル・メッセージの取り組みに参入

ノーベル委員会がその公式ページNobelprize.orgでサブリミナル・メッセージの取り組みに参入した。思考盗聴をはじめとするテクノロジー犯罪の技術が人類にとって最も深刻な危機であるという認識に立ったからだ。中立を前提とする彼らにあって、このようなアクションへの参入は極めてまれなことである。被害者として感謝この上ないことである。動向を注視したい。

20151103113647e91-min.jpg



最新記事の紹介(16)

中国は欧米の秘密結社に対峙します

この被害の胴元である欧米の秘密結社。彼らのパワーバランスが崩れる原因となったのが中国の台頭である。この彼らの影響力は見過ごすことはできない。この問題の解決に中国を巻き込むことは不可欠である。この観点から述べた記事。ぜひご覧になっていただきたい。

201506141251197f5-min.jpg



最新記事の紹介(17)

被害者はレイシズムに陥らないでください

以前にも書いたとおり、一部の被害者がヘイトスピーチの手法を用いて排外主義傾向を強めていることに対する警告である。在日韓国人の方々はすでに一般の市民に対しては集団ストーカーを行わないよう義務づけられている。彼らを加害特定新興宗教団体から切り離すのがオバマ大統領の狙いでもある。日本の集団ストーカー被害者も正常化すべき時に来ている。すべての被害者にご賢察をたまわりたい。

201505061258063a7-min.jpg