Insert body text here ...
This is where the Globalist Oligarchs
are directing human evolution to:
The Network by Anthony K Forwood
NOTE: This is a SPECULATIVE look at the possible structure and organization of the secret network that I believe lies behind organized gang-stalking and mind control. What I describe here is based on my own research, observations, and personal experiences. How I depict the gang-stalking network within this document may not precisely reflect the way it’s actually structured or how it operates, but it seems to be pretty close to how things really are. Whatever the case, the structure and operational methods described here are completely workable in all respects and the security measures used would be quite effective in keeping the network and its activities under a very tight blanket of secrecy. This document complements ‘Social Self-Destruction: A Secret War of Controlled Chaos’, which can be found here. It is highly recommended that you read that one first.This document can still be greatly extended and improved on, and probably will be at some point.
"The great strength of our Order lies in its concealment, let it never appear, in any place in its own name, but always covered by another name, and another occupation.”
Adam Weishaupt, founder of The Grand Lodge of the Illuminati
Creation of the Network and its Membership
What I describe here I will call ‘The Network’, but this is only for the purpose of giving a name to something that doesn’t necessarily have one nor otherwise have a requirement for one, at least for the public at large, because there is very little chance that it will ever be talked about by anyone who can be certain of its existence.
The Network is made up of many isolated individuals and groups throughout the UK, the US, Canada, and in many other countries around the world. The term ‘group’ can be defined here as any group of people at all who hold a common bond of unity, and might be of any type or size,from small social groups of just a few people to entire workforces of large corporations, memberships of international organizations, and governments. But it even goes beyond just this, since it appears that just about any method that might be used to draw people in will likely be applied. Most large corporate workforces and many smaller ones have already been brought wholesale into this Network through ‘Occupational Health and Safety’ laws that require employees and employers to report anything in the workplace that might be considered suspicious or threatening activity. Anyone who is reported on is assessed (without their knowledge) to determine if they should be put on a ‘watch list’.
Watch lists are a key aspect of the Network’s operations, and will be discussed further on. Similar ‘Community Health and Safety’ laws have also been established in many countries so that these reporting systems also extend into school environments, church congregations, social groups, neighborhoods and public streets, and even private homes. A special reporting system has also been set up to accommodate these laws and manage everything, and various types of recruitment programs are routinely conducted within workplaces, community groups, and elsewhere, to enlist ‘citizen agents’ and to promote the security advantages that Network members receive. This includes receiving instant notifications by phone whenever a dangerous person is in their area. This notification service is only available to members who have signed a secrecy oath or non-disclosure agreement. This is explained more fully in a later section.The Network connects all of its members to a central command system that is very sophisticated and highly automated, and is able to handlev irtually all of the work involved in normal Network operations. This includes managing members, handling communications, information gathering, planning operations, performing logistics, directing operations, tracking both members and targets, profiling, etc. Very few human resources are needed to manage this system, and direct contact between management levels and operational levels is very minimal. Except during recruitment, all contact is conducted through a highly secure Network communications system.
Soon after these health and safety laws were enacted and the reporting system was set up, a significant number of people were quickly recruited into this Network and have since been under strict secrecy oaths. People are being recruited all the time, and the Network is constantly growing. As new members, they are joining a secret force of eyes and ears in the workplace and community, assigned to report on any suspicious or threatening activity through this system, and to monitor someone who has been put on a watch list. These targeted individuals are constantly tracked, and members receive cell phone text notifications whenever they are in their area, and they are expected to assist in monitoring and ‘policing’ these people under the pretext of maintaining the safety of the community. If a member is a good candidate for deeper involvement, various different opportunities to take part in ‘special operations’ can be offered. These opportunities are only made available to members who match a certain psychological profile and have been cleared for these activities.
Certain individuals and groups that lie outside mainstream society –drug dealers, street gangs, biker clubs, prostitutes, criminals, drug addicts, homeless people, alternative groups, illegal immigrants – are also brought into the Network through other means than those described above. Any person or group is a candidate for being recruited into this Network, and there are various different classifications of membership for different types of candidates, which is determined through careful profile matching.The many individuals and groups that make up the Network’s vast and varied membership are kept as isolated as possible from other members and completely unaware of the full extent of the Network, and they don’t know about or even expect that many of the other individuals and groups are involved, and identities between members are kept as anonymous as possible. However, some groups of members will necessarily be aware of each other’s involvement to some capacity, but these groups remain otherwise just as anonymous and isolated within the Network.
As well as them not being aware of the full extent of the Network and who other members might be, none of the members ever know anything more about what they are involved in beyond what they are informed of through the Network. All information circulated through the Network is carefully controlled, and cover stories can be given for the activities that members engage in, as well as the pretexts for doing so.Covert monitoring of every member’s communications assures early warning of possible security breaches.
Besides the normal operations involving monitoring and policing targeted individuals, certain individuals and groups are also put to use in various ‘special projects’ that have to do with deeper levels of the Network, and usually involve the exploitation of targeted individuals in some way.Many groups and many individuals have been absorbed into the Network one after the other for many years, until now virtually any given group that exists could have a significant number of Network members within it, acting through that group or as part of another. Since its inception (as early as the 1980s), this secret Network has expanded beyond corporate workforces, community groups, and various other organizations that were brought into it early on, it has come to include street gangs, biker clubs, immigrants, homeless people, tourists,and even children. There is no person or group that the Network doesn’t have a use for.
Copyright 2012 All rights reserved By Anthony Forwood
The Network is open-ended, so that it’s capable of unlimited expansion and can encompass any number of individuals and groups into itself for any number of purposes. It is intended that eventually every person on the planet will be included within its database, either as a member or as a targeted individual, and will be under constant watch and direction. The Network is ideally suited for incorporating a variety of new functionalities into its structure, not the least of which are mind-control technologies (discussed further on). The central computer system runs specially designed artificial intelligence software that gives it the ability to learn and evolve new functionalities that can be incorporated into normal operations or special projects. The Network is connected into every communication system, information network, and database on the planet, and incorporates these into its data collection procedures. It also takes full advantage of ECHELON, the NSA’s global surveillance system. Virtually any information that exists in digital form can be accessed by the Network system for real-time surveillance and intelligence gathering purposes. The monitoring of communications also includes the ability to interfere. This means that information flow can be controlled by various covert ‘denial of access’ techniques, and on a person-by-person basis.
Full-time GPS links to members and targets through their cell phones are used by the Network system for tracking and logistics purposes. Covert use of RFID chips make it possible to track anyone who doesn’t own or carry a cell phone. With these and other connected resources, the Network’s command center can constantly gather, analyze, and update an extensive amount of information on any person, as well as instantly locate and track themin real-time. The Network incorporates advanced profiling systems into many of its automated processes, such as for selecting, evaluating, and managing members when recruiting, planning operations, assigning operational tasks, etc.As a policing system, the Network maintains a separate database for individuals who have been flagged as targets for monitoring and policing, which will be carried out by Network members through various assigned operational tasks. Targets are determined through the reporting system described earlier, which involves receiving threat or suspicion reports from members, assessing these reports and the individuals involved, and determining whether they should be placed ona watch list. To do this, extensive information is gathered on a reported individual and analyzed, and if they match certain qualifications then specific operational procedures are determined for handling them. Once an individual is placed on a list, the target is constantly tracked by the Network system and monitoring tasks will immediately be assigned to members within the target’s neighborhood or workplace, or whereverelse they might go. Manual monitoring by members will include regular reporting to the Network command center.
Because the Network is officially non-existent and must always appear that way in order to maintain its security and achieve its ultimate ends, it is important to those who manage it that knowledge of it is minimizedas much as possible by keeping meticulous records of what information each member is privy to or might be aware of, as well as what cover stories they have been given regarding their involvement in any operations. This minimization of awareness means that members should be kept from knowing how extensive the Network and its capabilities are, the details of membership activities, and the identity of othermembers. The Network is therefore kept highly compartmentalized into isolated individuals and groups that work anonymously to each other but are coordinated through the Network’s command center so that their individual activities can be perfectly integrated into precisely timed and tightly controlled operations, such as in street theatre activities.
This strict compartmentalization of members to restrict their knowledge about the Network and other members not only assures the security of the system and its operations, but also assures that upper management levels can avoid direct responsibility, should anything go wrong. Network compartmentalization also allows members to be unknowingly become targets, as well as for members and member groups to be unknowingly pitted against each other to achieve certain desired results, without them ever realizing that they’re being manipulated. Compartmentalization assures that a member who might become a target at some point doesn’t jeopardize other members or lead to revealing any sensitive information about the Network or its operations that they might be privy to. Therefore, the identity of members and groups and all details regarding their participation in operations is kept as confidential as possible and cover stories are implemented as pretexts for assigned tasks whenever possible to facilitate these ends. It’s equally desirable to keep members as anonymous to each other as possible, and although this isn’t always possible, such as when dealing with groups where the members already know each other’s identities as members, the identity of members will otherwise be secured from other members and member groups as much as possible.
Members who are recruited into the Network are initially used within operational assignments by being given certain specific tasks to complete. Operational assignments are carried out by any number of members who are usually unaware of the identity of the other members involved in the same operation, unless they’re operating from within the same member group. When an operational directive is entered into the central command computer by management, the computer system collects all the relevant data it needs and does an analysis of the situation, works out a plan of action, breaks it down into individual tasks, organizes members, and coordinates the execution of the operation. All communications during the execution of an operation will be conducted strictly through the use of cell phone text messages, and pass through the secured Network system. There are both ‘official’ and ‘unofficial’ operations. An ‘official’ operation will strictly involve acting as a ‘citizen agent’ to monitor a workplace or community for suspicious or threatening activity, or to police targeted
Individuals who have been placed on a watch list. All members are expected to take part in these sorts of operations. An ‘unofficial’ operation goes beyond these activities, and includes any activities that members might engage in of their own free will that are approved activities, or which they have been given clearance for. Members aren’t usually directly informed about these approved activities, but are left to learn about them on their own, or covertly influenced to engage in them, if and when they reach the deeper levels of the Network. This is to remove any direct responsibility from upper level management while allowing them to take place in a controlled manner. Certain ‘unofficial’ operations will include activities that are covertly influenced through the manipulation of a member or group in order to cause them to believe that they are acting of their own free willing carrying out tasks that result in fulfilling a certain operational directive. These types of ‘unofficial’ operations always involve the testing or application of mind-control technologies.
New members are continually being recruited into this Network so that it has continually been expanding as it has drawn in more and more of the general population over the years and recruited them into membership. These new recruits are carefully screened for selection using profiling systems to determine various qualifications, such as for classification into different membership levels, and for assigning operational tasks. Upon approval for membership, each recruit is made to sign a lifetime secrecy oath or non-disclosure agreement in order to legally bind them to a lifetime contract of cooperation and commitment. Once signed, they will be forbidden to ever talk about the Network or their involvement, and must pretend complete ignorance of its existence to others. All members will thereafter be under constant electronic surveillance to track and monitor them for security reasons, as well as to accumulate data that can be used for determining management procedures for them and usability in operations. This information will also be used to control a member in the case that they become security risk or step out of line. Penalties that include lengthy jail terms for breaches of secrecy oaths or violation of non-disclosure agreements are only the first deterrent against exposure of the Network. Further deterrents are also available,
many of them involving blackmail, as well as mind-control technologies that are incorporated into the system. However, the greatest deterrent for any member will be the threat of being rejected from the system once they have been accepted into it and come to understand what might happen to them if they are. Although most knowledge about the Network and its operations and activities can be easily controlled and contained in the event of any unforeseen situation, it is still sometimes necessary that a balance be maintained between what a particular member might know about the Network and how much control can be maintained over that member, and this can leave the Network vulnerable if care isn’t taken so that maximum control is always maintained. The more controllable member is, the easier it will be to assure that problems don’t arise that might jeopardize the Network, and the more they can be brought intuits deeper levels. Tight control of members also allows for greater flexibility in Network operations and activities, allowing it to expand anew application possibilities arise. Therefore, a variety of control mechanisms can be incorporated into the system, ranging from very crude to highly sophisticated. One method of gaining the membership of a candidate into the Networks to give exaggerated praise for whatever traits or skills that candidate has that they might pride themselves in, and to lead them into believing that those traits or skills are highly sought and will allow the candidate to receive special advantages and have doors opened for them through their dedicated service to the Network. This might be any sort of trait or skill at all, as long as it can be made use of within Network operations or activities. This includes both legitimate as well as criminal traits and skills. The police, acting as a major member group within the Network, take advantage of those criminal elements that they come into contact with during their official duties, and routinely recruit them by first building the recruit’s confidence in their criminal abilities, and leading them into believing that they would benefit by helping the police with the use of these skills. Criminals are highly sought for certain illegal tasks that the police want performed which they and other members will not dare to engage in themselves.
Although a crude form of control, blackmail is still highly effective and completely within the repertoire of methods used to recruit, control, and silence members. As such, blackmail situations are put to good use and are standard practice within certain groups that are part of the Network. Normally, it will be used where secrecy oaths or non-disclosure agreements aren’t as practical or effective, such as will be the case with criminal groups who aren’t necessarily intimidated by the legal ramifications of legally binding security oaths. Blackmail can therefore be used as a substitute to secrecy oaths adnoun-disclosure agreements during recruitment into the Network, but should always be perceived by recruited members as part of an initiation into a group and not as part of the Network. The blackmail procedure will serve to bind a new member to an oath of silence and commitment to that group, and must be as effective as a secrecy oath or non-disclosure agreement would be. It will normally consist of recording the new member engaging in a suitably compromising act, with the recording being secured as insurance against any breaches that could jeopardize the Network and its operations. There are two basic types of blackmail that are used: sexual and criminal. The most widely used blackmail is sexual blackmail that can bemused to destroy a member’s character, social status, and reputation. When more effective blackmail is necessary, it will involve criminal acts that can go so far as to involve murder. Since blackmail is a criminal act and the upper management levels of the Network seek to distance themselves from all responsibility for activities that its members engage in, these blackmail operations are executed in such a way that responsibility for them or anything at all that might go wrong will fall on individual members or member groups in order to maintain the security and functioning of the Network. This will necessitate providing a certain degree of autonomy of the groups that perform the blackmail procedures, and includes a certain amount of freedom in the decision-making abilities that certain members of these groups have (or at least the perception of such freedom and autonomy)that don’t require prior authorization by upper management levels of the Network. Only members who have been properly programmed and trained for special tasks are ever given clearance for such decision-making abilities and only as far as specific tasks and activities require. Recruitment or initiation that involves collecting blackmail insurance must always be done under the guise of a member group, and in such a way that the recruit doesn’t know that the group is part of a largernetwork. Only after collecting blackmail insurance and establishing oaths of silence and commitment might the new member be brought further into the Network itself. In this sort of situation, the recruit might think that he or she is being initiated into a club, secret society, cutlet, and will undergo an initiation process that will usually involve them voluntarily putting themselves into a suitably compromising situation that is recorded and secured as blackmail insurance. In these cases, the recruit will see it as a proof of loyalty to the group they are involved with, and will be led to believe that only that group knows about the compromising act they engaged in. Sometimes, a recruit might need to be put into a blackmail situation involuntarily, in order to garner their full cooperation when a voluntary blackmail situation isn’t possible. Whatever the case, the blackmail procedure should guarantee that the recruit will want to remain loyal tithe Network (through the group) and never speak about their knowledge of it or its activities. The most important thing when collecting blackmail insurance is that it should always be seen to be tied to the member group, and not perceived as anything to do with the larger Network. Blackmail is only used with certain types of members within certain types of member groups. As mentioned earlier, there are both voluntary and involuntary blackmail situations. A voluntary situation is where staged act that compromises the member is previously agreed on between the new recruit and other group members, usually as part of their initiation into the group and for binding their loyalty to that group through a secrecy oath. An involuntary blackmail situation is less straightforward in how it might be carried out, and this will usually depend on whether any compromising material can be discovered about the member, or can otherwise be created. This will involve assessing the member’s main weaknesses and then creating staged situations to tempt those weaknesses, leading the member unsuspectingly into the compromising act. In either case, the compromising act is recorded on tape, and if the blackmail is involuntary, then the recording will be presented to the member and it will be made clear that it will be used against them if they should ever disclose anything about the group or its activities. Involuntary blackmail is more commonly applied to members who are not part of any group tied to the Network. Although blackmail offers the obvious ability to force a person to act against their will and do the blackmailer’s bidding, the Network is designed so that blackmail can be used to make them act willingly, without conscience or remorse. The Network selectively and gradually introduces certain members to a completely different form of life than normal, in which their exposure to this new lifestyle is carefully controlled and their perceptions molded so that they begin to be conditioned to accept a new set of attitudes and behaviors that they come to live by. Blackmail operates through the level of guilt or fear that can be associated with it. In other words, the more guilt a person feels towards a compromising act that they have been involved in and the fear of being found out, the more effectively it can be used to control them. The easier it is to control them, the easier it is to lead them into further compromising acts to increase the guilt and strengthen the effectiveness of the blackmail insurance. A member under the pressure of blackmail seeks any means to alleviate their feelings of guilt, including the use of scapegoats, and these are provided through the Network in the form of targets. As a member progresses into the deeper levels of the Network, their perceptions slowly change and they are influenced to see targets as more guilty than they are, and this can serve to alleviate their own guilt in acting out against those targets. Using blackmail insurance to secure a member’s silence and continuing cooperation and participation in Network activities also provides means to lead these members into certain deeper levels of the Network’s structure, where certain types of special privileges or rewards can be made available if they take part in certain Network activities that lie outside of ‘official’ operations. These other activities, referred to earlier as ‘special projects’, are designed to keep members engaged in Network activities, while also serving to strengthen their loyalty and oath of silence. Unless a member is receiving adequate mind-control programming to make it unnecessary, suitable blackmail insurance is absolutely required before a member can be cleared to participate inane of the activities that take place at the deeper levels of the Network.
How They Test the Code of Silence
It’s a matter of routine for those who keep secrets to take steps to assure that those people who are party to those secrets are trustable. There is a standard method that is used for assuring and testing such trustworthiness. Within all groups that are part of the Network, members will be required to immediately report any inappropriate activity that they witness other group members engaging in. This will include saying anything about the Network or its activities. The members will also be made aware that their trust will be tested from time to time, in that a staged security breach or breaking of the rules will be conducted that they will witness, usually by someone they’re known to be friends with or who is their superior within the group, and their reaction to this staged breach will be used to determine their trust. The member will never know whether the breach is a test or not, and will therefore be forced to report it, or face the possible consequences for not doing so. Since this is a secret government program involving on-disclosure agreements and secrecy laws, as well as blackmail, the prep will be facing potential criminal repercussions, or equivalent damage to their life (including targeting), for failing to comply. The method described here is very effective for testing a member’s loyalty and trust, either to another member, a member group, or the Network itself. This method of testing and maintaining the code of silence will also assure that information regarding a target is safe to disseminate among Network members, and the content of that information could therefore be quite extensive. This means that this information does not have to be accurate, as long as each member who receives it believes that it is and can never discover otherwise.
The Network’s Underground Society
An underground society exists deep within the Network, unknown of by many of its members, and certainly not by anyone who isn’t a member. Access to this underground society and its activities is only given to those members who have been properly initiated into it. Even among those members who have access to it, most of them will only have access to limited parts of it, and only if they meet strict security protocols and have been cleared to take part. These protocols absolutely require that blackmail insurance is first collected, or that adequate mind-control procedures are applied that will guarantee the member’s cooperative involvement. Although blackmail insurance has traditionally been collected when recruiting members into this underground, it’s being phased out as more sophisticated methods of electronic mind-control are being more widely incorporated into the system. On first exposure, this underground might be seen by its newly introduced members as nothing more than activities that lie outside the Network itself, either as part of the member group they belong to, or by invitation from other members who they don’t know are members and who have been specifically tasked to invite them to participate. Only through progressive exposure to and involvement in certain activities does a member learn anything about the underground, and all of this is carefully controlled at every step.
Many of the people who are brought into the Network are severely lacking in any morals when they’re recruited, and are therefore easy to involve in the deeper levels of this Network underground, and quickly gravitate to taking part in it. These particular members are usually connected to the Network through fringe groups, such as street gangs, motorcycle clubs, drug or prostitution rings, police informants, etc., but not necessarily. Many members who end up in the deepest levels of the underground are just as likely to be business professionals, police officers, teachers, and church leaders. The easiest members to draw into the Network’s underground, however, are young adults, and sex is the most popular enticement. Sex is a major weakness for a lot of people, and it’s routinely used within the Network as a means for collecting blackmail insurance, but also for pleasure and entertainment, which is made available to members of the underground through various special projects.
Sex can be used to draw in new recruits, and special groups have been set up within the Network that operate as sex rings and are regularly used for recruitment purposes, usually assisting in collecting blackmail insurance, but also provide ‘rewards’ or entertainment privileges for members. Some of these rings are exclusive to select members in the Network, but there are also sex rings set up that cater to a wider membership, and are made available to any member who has gone through an initiation and provided blackmail insurance as an oath of silence and loyalty. Until a member has done so, they will never beware that these rings exist, but when they do, a whole new world is opened to them that will draw them further into the Network.
These members join into the lifestyle of the underground, where sex is heavily promoted and widely engaged in between members of these rings. Drugs are also cheaply and easily available to Network members once they have entered into this underground. Corruption is the main purpose of these underground activities, and it is part of the design of the Network system to bring as many members into it as possible. Since members are signing a lifetime contract when joining the Network, and young people are more easily enticed into corrupt activities, they are the most likely to eventually be drawn in, and their total corruption is only a matter of time. The sex rings in particular provide an enticing introduction into a secret world with darker motives. Sex is used to tempt members into an underground society that caters to every sin and pleasure imaginable.
This underground society is used to lead these members into ever deeper and darker levels of corruption. As soon as they get involved in the Network at this level and discover that they have this whole new source of pleasure and excitement available to them and they begin to explore it with a little guided influence, there’s no turning back for them. One of the things that I feel are taking place at even deeper levels of this Network are actual satanic activities, including all manner of ritual abuse, satanic worship, and even human sacrifices. These activities are engaged in those who control this Network, and this Network is their means for drawing the entire population into this as well. Therefore, they must maintain very tight security against its exposure, so full-blown mind-control is a necessity for any members who will reach these darker levels of the Network’s underground. This mind-control is applied to the extent that each member will have one or more ‘alter’ personalities created in them (either through trauma or hypnosis), and will be completely unaware of the fact. The different personalities are switched in and out through triggers, and prior programming will assure that these members are incapable of remembering or otherwise discovering their involvement in these dark activities. As the Network continues to draw in its members, more and more people are being led into these satanic aspects and being enslaved through this most insipid form of control.
Membership Motivations and Rewards
Members of this Network aren’t usually paid, but instead they will either volunteer themselves freely, be tricked into it, or forced. Usually, they begin doing it as part of something else that they’ve already committed themselves to, such as a church or business organization, and their Network activities are seen by them as part of their current commitments with that group. As such, neither the existence of the larger Network, nor the group’s connection to it, has to be known about by more than one or a few in their group (usually in leadership positions), and even then, their knowledge of the Network is still very limited. A group’s involvement in Network operations is just seen by its members as serving the group’s interests. Those members of the group who know anything about the larger Network will usually be affiliated with it through membership in another group and will be acting through their service to that other group to involve the current group in serving those interests as well.
Motivations to act in favor of the Network’s needs are provided to individual members or groups with carefully crafted cover stories that are specific to that member or group and are usually crafted around whatever a group’s official purpose is, or whatever can be used to motivate a member. Usually, a member or group can be motivated withal simple appeal of ‘service to community’. Many people feel obligated and even honored to do something for their community when approached and asked in the right way, and so they can be easily led to think that they are doing so when they’re involved in Network activities. When they see the level of sophistication that’s used in these operations, they automatically assume that what they’re doing must be important and under the direction of a legitimate authority, no matter what they might be drawn in to doing. Of course, other motivators exist, as we’ve already seen, and these aroused to draw in those people who aren’t so easily motivated by a sense of duty or obligation. In fact, these are the preferred type of people to draw into the Network, because they’re already closer to the mindset that this Network is intended to develop within the general population. Selfishness, greed, carnal pleasures, criminality, etc., are easier to take advantage of and use to control a person, so cultivating these traits serves the ultimate purpose of the Network. As we’ve already seen, reward systems have been set up to cater to member’s pleasures in various ways, but these aren’t the only reward systems that exist. Virtually anything might be offered to entice member to do the bidding of the Network, since those who control the Network have the power to fulfill just about any desire that a person might have, and people are always seeking pleasure and excitement. Special projects are set up at the deeper levels of the Network that are involved in catering to the pleasures of members or rewarding them income way. These special projects involve activities that might be carried out by a single member group, or they can be broken up into compartmentalized operations that involve various members or groups who perform their assigned tasks in isolation and remain unaware of the fuller operation, which will be an ongoing enterprise of some sort, such as a free adult website for members that exploits the private lives of targets. Exploitation of targeted individuals is a high priority of the Network. In the example just mentioned, the tasks will be divided up so that one member might tasked with entering the targets residence and planting cameras in strategic locations such as the bathroom and bedroom, another will be tasked with capturing and editing footage and uploading it to the website, and another with maintaining a website. None of these members ever have to come in contact with the other members involved or know who they are. The member planting the cameras cane kept totally unaware of the exploitative purposes the footage will be put to, and might be led to believe the cameras are for general surveillance. The member who handles the editing of the footage can be kept unaware of the identity of the target and where they reside (which might be anywhere in the world). The webmaster can also be kept unaware of this information about the target, and may even be led to believe that the footage they receive is voluntarily submitted by people who are exhibitionists. Members who are given access to the website and can view this footage can be led to believe whatever they might be told, perhaps also believing that the target is an exhibitionist. Footage of a target might be made available to members that live in the target’s community, in order to influence those member’s actions towards the target, or it might be made available only to members who will never come in contact with the target, and offered as ‘entertainment’. Such website might offer thousands of different channels to choose from, so that a member can eavesdrop on any number of targets, watching and listening to them in the privacy of their own homes. The above example is just one type of special project that is used for motivating and rewarding members who are admitted into the Network’s underground, and the possibilities for motivating members through rewards and exploiting targeted individuals is virtually unlimited.
The Network Phone System
The Network relies on various technologies to effectively keep all of its members invisibly ensnared within its electronic web of control and operating in isolation to each other. Every member requires a cell phone-in order to take part in Network activities, and the cell phone provides means for central command to track, communicate with, and monitor each member. Cell phones are very important to the functioning of this Network and its ultimate goal. Those who are responsible for putting together this Network have thought very carefully about the security of their system and know that Network members are often sloppy and stupid, so they have taken pains to secure against this while conducting their operations through cell phone communications.
With the levels of power of those who are involved in creating and maintaining this secret Network, the ability to bypass or change standard phone operating functions are relatively easy, and a member’s cell phone might be specially configured so that normal functionality is enhanced in order to implement special security measures against that member’s potential sloppiness or stupidity. What follows describes how the security of the Network and member activities are able to be preserved against anyone who might accidentally come across a member’s cell phone. This section is intended as an outline so that readers can gain a better perspective of the situation and how it can be accomplished without any chance of exposure, and to show how gang-stalking operations are able to be conducted efficiently while maintaining tight security measures. Should someone outside the Network ever come across a member’s cell phone, this could easily lead to exposure if any suspicious or incriminating information was ever to be discovered on the phone (such as command center telephone numbers, text messages related to operations or targets, etc.). Therefore, this section describes how precautions might be taken to minimize any possibility of discovery. It will serve to answer questions that any doubters might have as to the possibility that such a secret Network could ever possibly exist without risk of exposure.
Securing communications between central command and participating parties:
All Network communications must be strictly conducted through text-based cell phone calls.
Member’s cell phones are registered on the central computer, and only calls from registered cell phones will be allowed to connect.
A member’s registered cell phone is required to use a nondescript name entry for the command center phone number held in the cell phone directory listing. A silent ring-tone should always be assigned to this number. The cell phone will also be configured so that text messages sent to or received from the command center can’t be saved or forwarded.
Members are assigned a personal identity number and must use it when calling into the Network commend center. This is necessary to validate who they are and to secure against unauthorized access by non-members. This personal identity number must be memorized for security reasons, and never written down or recorded anywhere that it might be found by others.
Member’s cell phones must have a phone lock feature activated whenever the member is away from their phone, with a special identity number that must be entered before any communications with the Network can be initiated. This assures that there will beano unauthorized access to the Network or Network communications by non-members.
Lost or stolen cell phones must be reported immediately through a special 0800 number in order that it can be deactivated from the system.
The above measures will effectively secure the Network against discovery and infiltration by non-members who might gain access to member’s cell phone and attempt to connect with the commend center or otherwise discover confidential information related to the Network orbits activities. The weakest link in this system, no matter how it might be designed and operated, is going to be the carelessness of the participating member. The Network system is capable of implementing special cell phone hardware or software measures that will enhance a cell phone so that communications to and from the command center will be far more secure than could normally be possible with ordinary phone features. Such enhancements will include disabling copying, saving, and forwarding of Network communications. It will also include special monitoring capabilities, to assure that the cell phone isn’t tampered with. That any member’s cell phone should fall into the wrong hands and risk exposure of this Network, the participation of that member, or any details of Network activities or targets, demands that such special hardware/software enhancements are used, making the earlier listed phone security measures far less necessary. Nonetheless, the foregoing outline should give readers an idea of how such a system might be designed so that it would allow for secure cell phone networking and communications to be implemented. The one thing that can’t be easily hidden on a member’s cell phone will be the phone number to the Network command center. Special enhancements can be made to the phone so the Network number isn’t even needed, and all Network communications can be automatically received and then erased once they’ve been viewed by the member, or after having been written and sent by the member. With this sort of setup, incoming Network calls will have special coded ring tones to signify various types of calls:
An ordinary incoming call will have whatever ring tone is normally assigned. Network calls, however, are always silent for security reasons, and might be one of three possible types: a query, an alert, or a task. A query is an incoming Network call for assistance in an operation. An alert warns when a target is in the immediate vicinity. A task gives instructions during operations. These incoming communications are answered by entering a special key combination to bring it up on the phone’s screen. There is also a simple code system that’s used by members for communicating to the network’s command center. In order to respond to a query, alert, or task, the member enters a simple one or two digit code, depending on their response. If the member is inactive or on standby and wants to reject an incoming query for assistance, they might press 0 and then ‘send’. Otherwise, they might press 1 followed by ‘send’, and the command center would automatically respond back by sending more information about the query, which can be immediately displayed on the phone’s screen until another button is pressed, at which point it’s deleted. This phone system is designed to make Network communications as secure and efficient as possible. During an operation, all participating members will be directly linked to the command center and their phone will receive and display Network messages instantaneously without the member having to press any buttons except when a response is necessary. This allows members who are engaged in a street theatre operation to receive information and instructions more quickly and perform their tasks more easily and with complete anonymity to other participating members while still maintaining the coordination of movements and timing. There are no delays in communicating like there are with normal cell phone communications, and the specialized functioning of the member’s cell phone makes it virtually impossible for these communications to be non-secure. It is my experience that a target’s picture often seems to be circulated with any alert messages concerning the target that are distributed through the Network. These pictures will be updated as regularly as is possible, and it’s not unlikely that there will be a gallery of different pictures and video clips of each target that are stored on the Network system that can be made available to members for their perusal, in order for them to familiarize themselves with a particular target’s appearance so they can properly identify them. However, for security reasons, a Network member will never be able to copy or store any of these pictures or other information on their own cell phone (or computer), and can only view them while connected to the Network. The main foundational structure for this Network is the global electronic communications network. This provides the means to tie all of the other components of the system into this Network, which have each been introduced in rapid succession immediately after this foundation was in place. After the communications network was put in place, the proliferation of computers and computerized automation was the next component of the Network to be implemented, which serves to allow for a massive surveillance system (ECHELON) that was immediately put to use in compiling information on every individual and group within the general population. Immediately after this came the introduction of cell phones, which provided a way to expand the surveillance and information gathering while also providing the platform for applying mind-control programming to a large part of the population while being able to tailor the programming on an individual basis. Cell phones also offer tracking capabilities through internal GPS chips. Cell phones have been very useful in the gang-stalking operations that Network members routinely engage in, and these operations are quickly becoming the new method of policing and punishing more and more people within the population who are becoming listed as targeted individuals. Cell phones are the main tool used in these gang-stalking operations, acting as most member’s only link to the Network and other members. Cell phones provide communications between Network members and central command in such a way that strict control of both the members and any information they might be privy to is always controlled and contained, assuring the continued security of the Network, its members, and its operations.
Cell Phones and Mind Manipulation
Most people own a cell phone and carry it wherever they go and are using them more and more often in communicating with friends, family, and whoever else they might ever talk to, and this not only makes cell
phones perfect tools for surveillance, but also for mind-control. This is because a cell phone is capable of transmitting microwave frequencies that will affect the brainwaves of anyone standing within a few feet of it. Specific frequencies will induce specific symptoms, such as confusion, paranoia, aggression, suggestibility, etc. When the cell phone is held to the ear, these effects are much more intense. Cell phones can also be used to send subliminal audio messages via pulsed microwaves (V2K) to affect a person’s thoughts and actions without their awareness. Members are expected to always have their cell phones nearby in case they need to be contacted in an emergency, and they might be told that it’s for their security against dangerous targets, or that they are needed in an operation, but mind control is a significant part of the reason as well. As members become involved with the Network, they will be continuously subjected to very sophisticated mind-control programming techniques day in and day out, and will never notice anything. The mind control will begin with basic behavioral conditioning through a continual stream of subliminal suggestions that are custom designed for each member, based on psychological profiles that will reveal characteristics about them that can be taken advantage of for manipulation. These subliminal suggestions can be transmitted whether or not the phone is turned on, as long as it has a power source. Subliminal programming has certain limitations. Its effect is short lasting when a suggestion is applied only once, but when it’s applied regularly, it begins to have a more permanent effect. Short-term effects are useful for influencing a person to act a certain way on compulsion, while long-term effects are best suited for changing a person’s general attitudes and perceptions of things. Specific microwave frequencies that affect a member to cause such feelings as aggression or fear will also be applied to members, but this is reserved for when it is most useful, at precise moments when the member is in close proximity to a target, so as to help in influencing desired response from that member as part of an operation. Another form of mind control that can be applied through cell phones involves electronic hypnosis, which is effected through the use of specific electromagnetic frequencies to entrain the brainwaves of a person and create a state of high suggestibility in them. After such a state is induced, suggestions or commands can be subliminally inserted directly into the subconscious without the person noticing anything.Hypnosis is far more versatile than subliminals. The hypnotic suggestions or instructions can be far more elaborate, and detection of being hypnotized is virtually impossible, both during and after the fact. No matter what form of mind-control a person might be subjected to, the Network can be used to control and direct them. Each Network member is certainly being subjected to it in one form or another, and in many cases it may even go so far as to involve trauma-induced alter personalities. Whatever the case might be, its application is always kept very covert and measures to safeguard against its discovery are taken whenever possible. Members are usually kept completely unaware of being manipulated and think that they’re in full control of their own thoughts and behaviors when really they will do whatever they’ve been instructed to do. Each Network member undergoes a long-term programming schedule that’s been carefully designed and follows a regimented procedure to assure that it’s properly conducted and failsafe, and more control of that member is achieved over time. This requires that progressive levels of mind-control programming are established in each member and each level will have a particular intended result that must be fully achieved before that member will graduate to the next level of mind-control. Each of these levels of programming will be reflected in their level of involvement in the Network and its activities, so that the higher the level of programming, the more involved a member will be in Network operations and activities, and, more importantly, the more controllable they will be. Since the ultimate intention of the Network is to create a totally mind-controlled society of unwitting slaves who will serve the satanic elite, covert mind-control programming will begin to be subjected to every Network member as early as possible. The different levels of mind-control that members will undergo can be assumed to follow a general order to achieve certain necessary requirements. The first and foremost of these requirements is the continued security of the Network and the activities of its members. Further levels of programming will be more task-specific, and each group within the Network will have specific methods of mind-control programming for its members. Each new member of the Network is categorized according to the member group that they originate from, and that programming is further tailored for them depending on their psychological profiles, social situation, special skills, attitudes and beliefs, etc. Each of these groups will be designated general mind-control programming scripts according to the organization of that group, its goals, the type of activities it normally engages in, etc. Network members will be further categorized according to their usefulness in respect to the needs and goals of the Network, and further mind-control programming will be tailored to suit these needs and goals. Although mind-control is a part of every group in the Network, the groups themselves will usually have no knowledge of this fact and it will all be handled covertly by the upper management levels of the Network and initiated solely through the Network system. The only exception to this is when a group has been cleared for involvement in special projects. There might be certain actions that members of a group will engage in as part of another member’s programming, but when this occurs, these actions will be conducted under some other pretext that relates to the normal activities of the group. Sometimes, a Network member might undergo special programming sessions where another member will be used to handle special programming procedures, such as when creating an alter personality in a member, which requires especially trained programmer. Certain carefully selected members of the Network are trained in these skills and used for this purpose. The first level of mind-control that all members are subjected to is the establishment of the loyalty of the member so that they will never reveal what secrets they might ever become privy to as part of the Network. This subjection might go so far as to involve trauma-based mind-control to create one or more alter personalities that can be called up to take over the member’s consciousness whenever there to be used in Network activities, but this is usually reserved for the deeper levels of initiation that are usually only ever reached by certain members and groups within the Network. More commonly, the member might undergo less intense methods of mind-control to achieve the required results. This is most often achieved through the use of advanced hypnosis techniques coupled with ongoing subliminal reinforcement. Each level of mind-control programming will be dependent on the effectiveness of the previous levels, as well as the other factors listed earlier on in this document. Since members of the Network are effectively making lifetime commitments by involving themselves in this system, the programming will be established for long-term involvement, and it will be progressive in its development so that neither the member nor anyone else will likely ever notice any changes in their personality. However, the member will be changed over time, most notably in their beliefs, attitudes, morals, and values, in order to become more compliant with Network goals and activities.
The Network is technology-based, with a carefully designed structure that serves to trap members within its sticky web so that there is no escape once they become involved. This Network has been long in planning and each component of the final overall structure has been carefully put in place each in turn and without it being obvious what these components effectively add up to now that they have all been connected together. Since the inception of its early technological roots, the Network has grown and expanded from isolated pockets of individuals and groups into a globally reaching interconnected web of control that has the capability to not only oversee and direct the events that take place in the lives of the individuals of an entire society, but also to mold and manipulate each of these individuals to think, speak, and act in whatever way the controllers might desire. Further, the Network incorporates whatever means will work to corrupt these individuals and break them from the morals and ethics that would otherwise allow for a peaceful and cooperative society based on respect and understanding. The Network is designed to destroy these higher ideals in the human race, and replace them with a sense of continual chaos and uncertainty that leaves every individual and group at the mercy of those who control this system.
Purchase Anthony K Forwoods book on the following link:
Operation Gladio is undisputed historical fact. Gladio was part of a post-World War II program set up by the CIA and NATO supposedly to thwart future Soviet/communist invasions or influence in Italy and Western Europe. In fact, it became a state-sponsored right-wing terrorist network, involved in false flag operations and the subversion of democracy.
The existence of Gladio was confirmed and admitted by the Italian government in 1990, after a judge, Felice Casson, discovered the network in the course of his investigations into right-wing terrorism. Italian prime minister Giulio Andreotti admitted Gladio’s existence but tried to minimize its significance.
The main function of the Gladio-style groups, in the absence of Soviet invasion, seems to have been to discredit left-wing groups and politicians through the use of “the strategy of tension,” including false-flag terrorism. The strategy of tension is a concept for control and manipulation of public opinion through the use of fear, propaganda, agents provacateurs, terrorism, etc. The aim was to instill fear into the populace while framing communist and left-wing political opponents for terrorist atrocities.