TAKE CONTROL OF ORGANIZED GANG STALKING WITH TACTICS THAT WORKS… okay, point A, is your phone, your text message is sent, intercepted and broadcasted to others under the tactic direct connection of organized gangstalking also happens to your emails. This is done illegally and is very horrible, over the years got tired of law enforcement doing nothing so started to research this topic and found out only the recipient of the email or text message can complain. So knowing you have this illegal intercept nobody wants to help you stop then use that to your advantage, send an email or text message to yourself. You can send this to your own account or another free yahoo or google email account or another phone. Now you control the information and nobody will complain about what you say in the message because you are not going to tell on yourself. Now you own point A and point B controlling what is being said. WHY, do this ? Because there is NO THIRD PARTY LIABILITY FOR ILLEGAL INTERCEPTS OF YOUR MESSAGES. You have a blank check to say anything about anyone and it gets broadcasted to ALL those in this illegal direct connection circle. Use that to your advantage include perps picture in the text message, say nasty text about them, and it is broadcasted to everyone. Use the sound file, SAY THERE NAME other nasty things about them. Then this is not a silent text message. Anyone standing around the open text message with a sound file you recorded will here what you said. REVERSE GANGSTALK THEM. Can do this both on the internet with emails and with text messages using attachments on your smartphone. Use your smartphone cameria get a picture of them to use, if you know there full name check out facebook and search for picture to use of them. Also do not forget to check nothing like using there mugshot picture, usually your worst picture. Of course advertise there criminal record sure to have one if involved in organized gangstalking being a PERP OR PERV OR PSYCHO. Excellent way to REVERSE THE STALKING, they hate to be EXPOSED. DO IT !!! Next TACTIC is my FAVORITE called SPAM OUT THE SCUM Knowing I control point A and point B nobody can complain of what I do legally, and point C is illegally intercepted so they can not complain then the stage is set for the ATTACK ON THE SMART PHONE. Forget any fancy backdoor tricks, to access the smart phone we have knowledge of this illegal intercept, position, and using there technology to our advantage. We are going to create a text message on our smart phone as large as we can use up all the characters with a space bar, include picture, sound file. My file I created maximum was 348 kilo bytes. Now we are going to use the group send function on our smart phone, we can type in 20 phone numbers and send any message to this selective group. WE ARE GOING TO BE ALL TWENTY GROUP MEMBERS, so we are going to type in our phone number 20 times. When you select new message and type in the phone number other slots should appear where you can type in more phone numbers, this is where you type in your phone number into all the slots. When you finished and select OK, will say “ group message “. References: So, one push of the SEND KEY, we will multiply ourselves and send 20 large files. In my case I sent 20 times 348 kb. Sent this to an old flip phone with a refill card as my point B. My point A is my smart phone with the virus on it. The flip phone or any other smart phone is just your receiving phone. Started out sending message To my own phone which prevented me from using the phone, sending and receiving so many messages but also, stop the others from using there phone at point C. Once I used a receiving phone was faster at sending more messages and was able to totally lock down the receiving phone from being used. Using one phone, is a trick so you do not get the downloadable files and that is to select “BLOCK ALL” incoming text messages. This will CANCEL incoming text, so you can SEND ONLY ! Took me a while to learn this trick. The reason you would want to use two phones is to set the second phone, receiving phone, to an area code across state lines so now this would be a Federal Felony for Illegally Intercepting a wireless transmission. With one phone legally would be just a state felony. Changed the port speed to max on point A and point B, and all text message are sent with HIGH PRIORITY. What is happening at point B, is also happening at point C – THE GROUP OF SCUM, PERPS. Now, just going to push the group send button once every two minutes for an hour. Any smart phone while receiving the downloadable files is unable to be used, can only receive a text message or a call. Other function are on hold until the download is completed. So keep pusing the send button never let all the files complete downloading. Just have to wait for the files to get downloaded but you are unaware at point C, the traffic coming from point A which can be about 200-800 messages all requiring time to download . You can see at point B, this phone is totally SPAMMED OUT, TOTALLY USELESS and point C is broadcasting the same. You decide after three hours to stop, and that SCUM and PERPS at point C will block your intercept to avoid being SPAMMED OUT AGAIN ! This would be a “ blocking “ counter terrorism tactic, block the perps for as long as you want from doing more evil. This is a good start and can be done during peak times of the day and on weekends. Of course, you can not do this ALL THE TIME ! However since the name of the game is to “ GANG UP ON “ then we will use the power of the internet and sign up for FREE EMAILS, sent daily, and have those emails sent to our phone to create annoying long term traffic. Create a few free email accounts sign up for FREE Horoscopes, Daily Prayer to email accounts. Using two gmail accounts myself, gmail is straight forward to forward to your phone. Reference While I am at a FREE site not just going to sign up one gmail account but both gmail accounts, trying to create useless information as traffic so really does not matter. My structure for using two gmail accounts is to forward one gmail account to my phone daily and the other gmail account on weekends and holidays. Always have the option of using both gmail accounts for daily traffic at your decision. Start by signing up to 5 different FREE HOROSCOPES, DAILY PRAYERS a week for both accounts each and every week. Slowly build the traffic up until the PERPS just disconnect ! reference Also, you can create traffic to your emails for FREE by signing up for end of the day stock market data, breaking news, and lottery daily results. Does not matter the information you want the traffic of useless data. This will be a slight annoyance for you, but a protective shield you just have to live behind to keep the PERPS annoyed. Keep signing up for 5 FREE whatever a week for both gmail accounts after about 4-7 weeks you GANGED UP on the PERPS. This is done automatically everyday, once the infrastructure is created the game begins, and the numbers are on your side ! The idea is to DE-NETWORK THE GREAT EVIL ! Of course, you can still spam yourself, on top of the automatic spam. Also, using my twitter account to send spam to my phone which happens at all hours of the day. On twitter you can select Mobile Notification and type directly in your phone number, select all notifications. And on twitter you can select Email notification select all notifications, use one of your daily gmail account. If you do not have a twitter account think about getting one just for the extra spam generation ability. Remember most PERPS walk around with there smartphone ON and a beep goes off when they get a new email or a new text message, EXACTLY, keep BEEPING them ! ROFL LOL lol As a targeted individual you should NEVER walk around with your phone ON all the time, take the battery out and leave the battery out while you travel. Stop somewhere but the battery in turn on, get your messages, then turn that phone off take the battery out ! makes it harder for you to be tracked. This will get your text message all at one time, not BEEPED ALL DAY ! LOL The best defense is an offense. David 423-208-5599

LEARN THE TRUTH ABOUT AND BECOME AWARE OF
GANGSTALKING - TARGETED INDIVIDUALS (TI'S)
DIRECTED ENERGY WEAPONS (DEW'S)
THESE ARE NOT STREET GANGS
This site will evolve as we work to get the TRUTH OUT and learn more - Updated 6-24-2020
Terry Brewer Portland, Oregon U.S.A. Targeted Individual Began Jan 2015 THANKS FOR VISITING Website founded Oct 13 2016

Targeted Individual portion of our Website
Targeted Individuals Please fill out a Fill out SURVIVORS form for our DATA-BASE
This is very important to our fight to build data
*WE NEED YOU TO HELP STOP THESE CRIMES AGAINST HUMANITY*
Outstanding David. I love all of your suggestions. I am doing the texting and need to set up the emails. Thank you so much for sharing!! I love your ideas.....keep them flowing.
Tiflordia, are you in Florida?
I only found out recently that the gang stalkers could access my email and text messages. Very disturbing, that. I've heard that one can encrypt their email, but don't know how to go about accomplishing that. Any tips on how to do this?
Does this also go for files and pictures stored on my personal computer, laptop and memory cards/flash drives? Can they access those, and if so, how do I protect my files from being accessed and read by these stupid trolls? How can I recover my duplicated data if they already have stolen it?
Appreciate the tips, though would need to read it again to make sure I fully understand the process behind doing so.
They can't see our comments here, can they? I would sincerely hope not.
Wonder if I could intentionally install a virus on my phone and send it to my other phone in mass text. I’d do it I don’t care about either phone anymore, but it would be interesting to see if it spread elsewher.
I have and am a victim of Ultra Sonic, email, and Instagram, and on another site that shows every thing i do
Look up Ultrasound and infrasound detector for phone and laptop, These 2 things can hack and send commands to any device, Also hear anything
I have Written code after fighting 5 years of being instagram famous I am in Centreville Virginia
Look up Sparrrow 2020 @ Github .com , I am not selling I want to help. I can do remote support. This is pooling my talent in, I would like every one to do the same. The latest mis-spelling on my code was an Infrasound hack. It is that easy
I am an EC Council Certified Ethical Hacker
invicta-lesa.business.site business is slow I can talk