Please visit the Scalar Wave to Subjugate TI's link for some details about the degree of subtlety involved in here...
It's like slowly getting ruined and murdered in a lawless situation ...Even in it's most primitive form, it's like staying in an Organized Crime Wave Soup, that is "penetrating" you non-consensually and affecting your brain , body, mind , air , water and sky even ..You don't see this because this is all invisible waves, rays and radiations stuffs , that can get you murdered also very easily ..Hence it's a big crime and criminal conspiracy all the way ...
From Operation Mind Control (excerpts from) by Walter H. Bowart:
Mind control is the most terrible imaginable crime because it is committed not against the body, but against the mind and the soul. Dr. Joost A. M. Meerloo expresses the attitude of the majority of psychologists in calling it ‘mind rape,’ and warns that it poses a great ‘danger of destruction of the spirit’ which can be ‘compared to the threat of total physical destruction . . .’ … [p. 23]
--------------
Gang stalking and electronic harassment are tools that are used to murder a person mentally or physically. Not in a moment of rage but systematically, like turning pages in a book, we are talking about premeditated murder here. The mind of the target is forced into such a a state that he/she will do everything to get rid of this mental and/or physical torture. Gang stalking and electronic harassment are used to rape the mind of a target over and over again until the target collapses mentally or physically..
--------------
Artificial telepathy also offers an ideal means for complete invasion of privacy. If all thoughts can be read, then Passwords, PIN numbers, and personal secrets simply cannot be protected. One cannot be alone in the bathroom or shower. The criminal network has at its deposal plentiful first class technical know-how and high quality equipment."
1). Microwave hearing and torture with intense loud electronic sounding noise
2). Visual disturbances, visual hallucinations
3). Manipulation of will, emotions, feelings, perceptions
4). Manipulation of human behavior: forced speech, involuntary body movements, transmission of specific commands into the subconscious, compulsory execution of these commands
5). Reading thoughts remotely, retrieving memories, implanting personalities
6). Debilitation of mental acuity, inability to concentrate, disruption of ability to think rationally and independently
7). Loss of memory and knowledge
8). Inadequate states, which targeted individuals have never experienced before (states of narcotic intoxication, depression, obsessive desires and so on)
9). Control of sleep patterns: sleep deprivation or uncontrollable sleep
10). Blurred vision
11). Cramps, seizures and spasms
12). Excruciating artificial pain in any part of the body, for example, heart attacks and other symptoms.
- Blood.
- Cardiovascular System.
- Cells.
- Central Nervous System.
- Digestive System.
- Glands.
- Metabolism.
- Reproduction.
- Visual System.
- Internal Sound Perception.
Please clink on this link to get some more idea about TI symptoms and all..
How the brain targeting works?
"The EMF emissions from the brain can be decoded into current thoughts, images and sounds in the subject’s brain. It sends complicated codes and electromagnetic pulse signals to activate evoked potentials inside the brain, thus generating sounds and visual images in the neural circuits. With its speech, auditory and visual communication systems, RNM allows for a complete audio-visual brain to brain link or a brain-to-computer link."
"Of course, the mechanism needs to decode the resonance frequency of each specific site to modulate the insertion of information in that specific location of the brain. RNM can also detect hearing via electromagnetic microwaves, and it also features the transmission of specific commands into the subconscious, producing visual disturbances, visual hallucinations and injection of words and numbers in to the brain through electromagnetic radiation waves. Also, it manipulates emotions and thoughts and reads thoughts remotely, causes pain to any nerve of the body, allows for remote manipulation of behavior, controls sleep patterns through which control over communication is made easy.
"Invasion of privacy is the intrusion into the personal life of another, without just cause, which can give the person whose privacy has been invaded a right to bring a lawsuit for damages against the person or entity that intruded."
"An otherwise non-public individual has a right to privacy from:
-----------------------------------------------------------------------------------
“One who intentionally intrudes, physically or otherwise, upon the solitude of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person,” the CIC picked up the definition from the US Restatement of the Law on Torts."
------------------------------
Intentional infliction of emotional distress (IIED) is a tort claim of recent origin for intentional conduct that results in extreme emotional distress. Some courts and commentators have substituted mental for emotional, but the tort is the same. Some jurisdictions refer to IIED as the tort of outrage.
---------------------------------
In most civil law jurisdictions, defamation is dealt with as a crime rather than a tort
---------------------
INTERCEPTION OF PRIVATE COMMUNICATION
Section 184(1) of the Criminal Code sets out the general rule that it is illegal to willfully intercept a private communication:
Everyone who, by means of any electro-magnetic, acoustic, mechanical or other device, willfully intercepts a private communication is guilty of an indictable offence and liable to imprisonment for a term not exceeding five years. This involves wiretapping and second lines.
Everyone who, fraudulently and without colour of right,
UNAUTHORIZED USE OF A COMPUTER
(a) obtains, directly or indirectly, any computer service,
(b) by means of an electro-magnetic, acoustic, mechanical or other device, intercepts or causes to be intercepted, directly or indirectly, any function of a computer system,
(c) uses or causes to be used, directly or indirectly, a computer system with intent to commit an offence under paragraph (a) or (b) or an offence under section 430 in relation to data or a computer system, or
(d) uses, possesses, traffics in or permits another person to have access to a computer password that would enable a person to commit an offence under paragraph (a), (b) or (c)
is guilty of an indictable offence and liable to imprisonment for a term not exceeding ten years, or is guilt.