Pourriez-vous me pistonner, insister pour que ce travail soit contracté, soutenu et recommandé par les autorités nationales ?

Pourriez-vous m’aider à trouver des fonds d’urgence, un /des investisseurs sur l’avenir plus sain, un/des sponsors ? (visibilité fortement croissante et impacts internationaux garantis).

Je suis à la recherche d’un radioamateur et d’un humint-opérateur ayant survolé la description de la situation et pret à consacrer un peu de temps (necessité d’opérer au finish et dans ce cas protection privée par mes soins si besoin et par précaution, suivis sur le terrain par équipe privée et annihilations assurés ).
B.SIMON linkedin.com

The perpetrators of gang stalking are serious criminals who do great damage, and the acts done are very serious crimes by any measure. Gang stalking is a highly criminal campaign, one directed at a target individual, and one that aims to destroy an innocent persons life through covert harassments, malicious slander and carefully crafted and executedpsychological assaults. This harassment includes electronic mind/body attacks, street harassment skits, destruction of family and other relationships and destruction of careers.

Gang stalking deprives the targeted individual of their basic constitutional rights and destroys their freedom, setting a stage for the destruction of a person, socially, mental and physical, through a ceaseless assault that pervades all areas of a persons life.What drives such campaigns may be revenge for whistleblowing, or for highly critical individuals, as outspoken people have become targets.

The criminals planning a gang stalking endeavor study the target long before the stalking begins. Psychological profiling is done, and this is to assist in the overall campaign that includes intense psychological harassments and demoralizations.Tactics used go well beyond fear, demoralization and psychological harassment.

For example, the perpetrators (who appear to frequently have access to their targets homes) may sometimes come into the house while the target is out and move things around a little bit, or spread some dirt on the floor or on furniture, or move an item from the house to the car. But usually they won’t cause enough damage to involve the Police. This shows that this activity is a psychological game of cat and mouse, and has little to do with any overt kind of damage that may be caused, such as burning someone’s house down or stealing valuables.

In some cases, the target doesn’t know s/he is being targeted. It just looks as though the world is full of very rude people, and everything s/he owns breaks constantly (“bad luck”). According to Lawson, the perpetrators don’t need the target to know s/he is targeted in order to fill the need within themselves that they are in control.

One especially invasive attack method in the arena of ‘psycho-electronic’ mind control is voice to skull. Voice to skull is the transmission of voice, or any other audible or subliminal sound, directly into the hearing sense of the mind control victim. This is sometimes done around the clock and can be one of the severest forms of torture. Voice to skull technology is sometimes referred to as “synthetic telepathy”. Eleanor White

The buzzsaw is a powerful system of censorship in this country that is revealed to those reporting on extremely sensitive stories, usually having to do with high level government or corporate malfeasance. It often has a fatal effect on one’s career. … A journalist who has been through the buzzsaw is usually described as « radioactive », which is another word for unemployable.



H-waves, Hacheuse, Digital, Troughts, Perpetrators, Rotshild, Surveillance, Domestic terrorism, Snitching, Chemtrails, Tapping, Subvocal, People Cookers, Masint, Maser, Triangle, TM-SW7905, Diffraction, Echelon, Multi-victims, Stalking, Waves guides, WHY PINK FLOYD ?

Pink floyd fight exactly this terrorism….I am one of the first fan of Waters, I have almost all his records on vinyls… but before being gang stalked I did not understand it .The wall is the movie I’ve seen the most times and before to be a victim and have problems with cointelpro and stalkers.

What is a Perpetrator?
A Perpetrator is anyone who has been trained to harass, torture, maim, and kill a Target, either by direct means, or by covert means including, electronic, biological,or “accidental” means. Career perps make a good living dealing misery to hapless individuals. Perps usually do not know the victim personally, but are supplied enough information to allow a well oiled campaign of gang stalking and harassment. Dr Allen Barker

Chain Reaction
What is clear after researching theinformant system is that there is achain reaction happening insociety and that chain reaction is at the heart of much of the corruption that we are seeing in our legal system and other sectors of society. This system is responsible for enslaving and transforming large portions of communities into informants. Once a target is turned into an informant they in turn are sent back out into society to recruit, entrap, and turn others into informants. Many in society are not aware that this is happening. When it comes to Gang Stalking many people feel that it would be impossible or just too expensive to have someone monitored and placed under surveillance 24/7, much less arranging to have them tracked this way when they move or change jobs, but what research into the informant system and the chain reaction that is occurring within society has shown is that it is very possible. This chain reaction that is happening within society if left unchecked has the potential to infect and destroy the very core of society that we know and are dependent upon. The informant system is an infection on the soul of society and if not cured it could in time become malignant to the very society it was designed to assist. Gmb Bailey

Oorsprong: Groepstalking is een fenomeen dat waarschijnlijk oorspronkelijk in de VS is ontwikkeld door de KuKluxKlan en gebruikt wordt om ‘ongewenste elementen’ uit hun omgeving te verdrijven.Doel van groepstalking: zelfmoord Groepstalking komt voor in westerse landen en is een onderdeel van een verfijnde methode om mensen uit te schakelen. Het slachtoffer moet geisoleerd worden, werkeloos, uitgeput en (financieel) afhankelijk gemaakt, maar vooral buitenzinnen worden gebracht. Het doel van deze methode (met groepstalking als onderdeel van), is dat het slachtoffer zelfmoord pleegt, gepsychiatriseerd raakt, zijn buren aanvalt en/of vermoord, e.d. Dus, de geestelijke en/of lichamelijke dood van het slachtoffer. Dat maakt degenen die hier aan meewerken medeplichtig aan moord met voorbedachten rade of anders gezegd, moordenaars. Het is belangrijk te realiseren dat de meeste mensen die dit aangedaan wordt niet eens zullen begrijpen wat hun precies overkomt. Peter Mooring

Domestic War Rooms- C2 Center
Military campaigns have been typically directed from war rooms. They are also called command centers, or command and control centers (C2). A C2 center is a military term for a station which allows the planning, direction and control of operations, monitoring,decisionmaking, and execution.The word communications was added to this term, making it C3, and eventually computers were added, amounting to C4. It is now referred to as C4ISR with the addition of intelligence, surveillance, and reconnaissance.4 A more detailed explanation of this term follows.Command is the formulation of intent such as planning, control is the information obtained from the results of the action taken, as well as the conclusion as to whether or not the action was successful. Communications and computers are the hardware and software used to implement the command and control.Intelligence, surveillance, and reconnaissance are the hardware and software systems of sensors, people, data collectors, and platforms as well as the use of tools to extract the information from data. These are collectively referred to as C4ISR. M Rich

Silent Sound Technology – “S-quad”
Silent (converted-to-voice AM) hypnosis can be transmitted using a voice frequency modulator to generate the”voice.” It is a steady tone, near the high end of hearing range (15,000 Hz), plus a hypnotist’s voice, varying from 300 – 4,000 Hz. These two signals are frequency modulated. The output now appears as a steady tone, like tinnitus,but with hypnosis embedded. The FM-voice controls the timing of the transmitter’s pulse.Dr Richard Allan Miller

Through-wall surveillance methods:
This includes top end of microwave (near infrared), and the so-called”millimeter wave” scanning. This method uses the very top end of the microwave radio signal spectrum just below infrared. To view small objects or people clearly, the highest frequency that will penetrate non-conductive or poorly-conductive walls is used.Millimeter wave scanning radar can be used in two modes: The first is passive (no radiated signal) and uses background radiation already in the area to be scanned. It is totally undetectable. The active system uses a (low power millimeter wave) “flashlight” attached to the scanner. Dr Richard Allan Miller

EMF Brain Stimulation
It works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neuralcircuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control.Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information whiletransmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain).
freedomfchs.com fr.spirou.wikia.com

The pigs exploit your desperation.
You are under torture. You are rightfully desperate. The “bad Nazi” is harassing you. So the “good Nazi” has an opportunity. The “good Nazi” keeps promising to help you. As a torture victim, you tend to keep paying attention to the “good Nazi,” because there is no alternative. In the “real” world no one even knows (or admits to knowing) what is going on. You are under an intolerable torture. The “good Nazi” exploits this. The “good Nazi” can even turn “bad Nazi” from time to time and the victim will stay tuned in, because that seems to be the only hope. The “good Nazi” will promise help and anything else, as long as it is only between the lines or otherwise deniable. The “good Nazi” can appear on any FIP, for example as another voice on the nonconsensual voice­to­skull send. Or it might be a collaborator on a normally legitimate channel ­­ pigs at a Mockingbird newspaper, for example. But if you buy the bait they dangle to a desperate human being under torture, they then start trying to manipulate you. Whoops! If only you hadn’t done that! Well, your freedom was all lined up if you hadn’t done that! Your basic human rights will be restored soon, if only you will…Nazis pig theorem.Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Dr Allen Barker


Silent weapons for quiet wars An introductory programming manual,Operations Research,Technical Manual TM-SW7905.1
This publication marks the 25th anniversary of the Third World War, called the “Quiet War“,being conducted using subjective biological warfare, fought with “silent weapons”.This book contains an introductory description of this war, its strategies, and its weaponry.It is patently impossible to discuss social engineering or the automation of a society, i.e., the engineering of social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of social control and destruction of human life, i.e., slavery and genocide.With the creation of the maser in 1954, the promise of unlocking unlimited sources of fusion atomic energy from the heavy hydrogen in sea water and the consequent availability of u nlimited social power was a possibility only decades away.The combination was irresistible. The Quiet War was quietly declared by the International Elite at a meeting held in 1954. This volume marks the 25th anniversary of the beginning of the Quiet War. Already this domestic war has had many victories on many fronts throughout the world. Google search: silent sound, quiet war,, false flags, dirty little game, harassment, mind blowing, TM-SW7905.1, OS/EH? H waves, sanguine, human monitoring.

The primary psychiatric diagnostic manual used within the United States and many other western countries is the Diagnostic and Statistics Manual IV-TR (DSM-IV-TR), which is written and published by the American Psychiatric Association (APA, 2000). Based on my understanding of its contents, which is informed somewhat by a Bachelor of Science degree in Psychology (non-clinical) and spending close to a decade in psychotherapy as a patient, people who claim that they are being stalked by multipleperpetrators could receive a diagnosis of persecutory delusional disorder or paranoid schizophrenia. Dr Robin B. Webster

L’invalidation de certains phénomènes comme le stalking organisationnel par les forces de l’ordre et les psychiatres au profit d’allégations fallacieuses sur le délire de persécution ou la schizophrénie nous semblent des postulats dépassés à l’heure de la radiogoniométrie, de l’existence des nacelles de contrôle visuel équipant les chasseurs (le Rafale, le Mirage, le F16, etc.)et de l’ensemble de moyens de surveillance dont dispose l’industrie policière et sécuritaire. Les Cahiers du journalisme, N.Desurmont (belgian criminologist)

This letter is to ask for your help for the many victims who are being attacked with Psychotronic (or Mind Control,Electronic, Directed Energy, Neurological, Non-lethal) Weapons. Some of our ELECTRONIC TORTURE, ABUSE AND EXPERIMENTATION CASES detail the most extreme and totalitarian violations of human rights in human history, including the most horrendous psychological tortures, rapes, sexual abuse, physical assaults, surgical mutilations, ‘mind control’, and other mental and physical mutilations. Among other things the perpetrators of these crimes can place the human subject under continuous surveillance no matter where he/she is; they can monitor the human brain, including thoughts, reactions, motor commands, auditory events and visual images; they can continuously alter consciousness, introduce voices, noises, other disturbances, commands, images and “dreams” into the brain; and they can directly abuse, torture and hit bodies – includingperforming advanced medical procedures – from remote locations. The technology they are using is so advanced that it allows the controller(s) to see through the eyes of the targeted individual, essentially seeing whatever the victim sees. Many of us are being tortured and abused in these ways 24 hours a day, 7 days a week – year in year out.

Différents droits nationaux réglementent l’usage des armes électromagnétiques.
Ils incriminent dans certains cas leur utilisation aux fins de harcèlement. Le harcèlement électromagnétique est en effet une nouvelle forme de criminalité apparue suite au développement de nouvelles armes, techniques et appareils. Louis Freyheit.

Alain Winants (Sûreté de l’Etat) :« La Belgique fait un peu pâle figure »
Pour Alain Winants, administrateur général de la Sûreté de l’Etat, les cyberattaques constatées jusqu’ici en Belgique, bien qu’elles soient en recrudescence, n’ont pas encore montré de cas de cyber­sabotage , qui résulte dans la destruction de matériel ou de données (comme ce fut le cas en Iran avec Stuxnet). Mais en matière de cybersécurité, notre pays est bel et bien en retard.Quand une administration comme les Affaires étrangères est aujourd’hui attaquée, qui trouve ­t­on derrière ces attaques ?La Belgique est ­elle capable de se défendre ?Il n’y a pas encore au niveau belge de plan de cybersécurité général dans lequel la Sûreté pourrait s’inscrire avec d’autres partenaires, et dans le cadre duquel nous pourrions nous répartir les tâches. La Sûreté, seule, n’est pas à même d’assurer ce genre de responsabilité : elle doit travailler avec le SGRS, le FCCU (NDLR : Federal Computer Crime Unit), etc. On est en train d’élaborer depuis un certain temps déjà, au niveau du gouvernement, un plan général dans lequel il faudra tout à la fois prendre en considération les cyberattaques, la cyberdéfense, la cybersécurité et la protection physique des infrastructures critiques.Le soir, Lalleman A.


Gang stalking = man-in-the-middle attack, spoofing.
Techniques appliquée par les terroristes dans l’étendue du spectre electromagnétique et pour tout les moyens de communications non physiques et francs. (recording + speech to word to speech recognition in real time, e-mailing,web, gsm, radios, forums, facebook, fax, mailing, databases, banks, inssurances ..).http://gangstalkingbelgium.wordpress.com/Computer security, the man-in-the-middle attack (often abbreviated MITM)[1] is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point, can insert himself as a man-in-the-middle). From Wikipedia, the free encyclopediaTo begin the attack the perpetrator can put a link to the false WWW (a copy) on a website that they know the target visits. Or they can send the target an email with a link to the false web. They may also be able to get their false web indexed on a search engine. These attacks can be launched using an unwitting person’s PC as a proxy which would conceal the location of the perpetrators. Most of the clues that would alert a target that their web has been spoofed can be concealed. One is the status line located at the bottom of most browsers, which provides the address of a web site that’s in the process of loading. Normally, if a user clicks on a site, the status line reveals the actual site being loaded, regardless of the label on the hyperlink that was clicked. Also, the URL location line at the top of most browsers where sites can be typed in, will display the current site. Mark Rich

Intrusion dans mon pc, harassments informatiques snapshot, Komposer, avec les commentaires par v2s + Fishing permanent , surtout ds facebook.

Le domaine C4ISTAR (Command, Control, Communications and Computers for Intelligence, Surveillance, Target Acquisition and Reconnaissance) regroupe une large gamme de sous-domaines et de technologies et touche différents types de données (voix, images, vidéos, fichiers, messages, fax). Il participe à la réalisation du concept « Network Enabled Capability » (NEC).L’amélioration constante des systèmes C4ISTAR reste un domaine d’intérêt. Quelles que soient leurs localisation et dimension, la structure de commandement et les circonstances, il envisage l’intégration réseau-centrée, automatique, cohérente, souple, modulaire, adaptable, agile et flexible de détecteurs, de systèmes C2, de vecteurs et d’effecteurs, et l’amélioration de la diffusion, du partage et du traitement de l’information. Les systèmes « Command and Control » (C2) doivent permettre d’obtenir une meilleure capacité ISTAR en opérations. Ils doivent surveiller l’environnement sécuritaire,faire de la prévention, identifier et neutraliser les menaces et contenir leurs effets à leur minimum, protéger les infrastructures et zones sensibles.Dans le domaine des communications, cette niche comprend le spectre complet des communications (sans fil) et les différentes manières de sécuriser à différents niveaux ces communications. Pour des applications militaires, ces réseaux doivent être robustes, légers, fiables et interopérables à tous les niveaux opérationnels sans perdre de vue les aspects de « self-configurability »,de redondance et de qualité de services et les mesures de guerre électronique et de cyberwarfare ou CNO (ComputerNetwork Operations). Au sein de la défense, l’accent est mis sur les applications NCO (Network Centric Operations),le « tout en réseau », le « tout sur IP (Internet Protocol) » tant au niveau services que réseaux, fixes et/ou (semi-)mobiles, civils et/ou militaires dont par exemple le programme d’acquisition de la radio du futur: la SDR (Software Defined Radio).Appel_a_projets_F_2012,Jean-Paul MARCEL

NEWS/ OPEN MIND CONFERENCE 2012 20-23SEPTEMBER / DENMARK / SKANDERBORG / AUDONICONICAACT.ORG is honored to have the opportunity to participate in a gathering of some of the brightest minds of today.We have been asked to give a presentation addressing “Remote Influencing Technologies, The New Terrorism of the 21st Century”. Special guest will include Dr. Barrie Trower (British Physicist), Niels Harrit (Chemistry Professor), Rasmus Foldbjerg (Molecular Biologist), Lars Drudgaard (ICAACT), and others of prestiege and influence. ICAACT is committed to educating the public and representing victims of electronic terrorism throughout the globe.

J’ai tout les éléments depuis longtemps pour que ces ordures soient écrouées, .….sans contacts ni même un papier officiel malgré ces 3 ans d’enfer et ces deux ans et demi de travail à temps plein week-end en sus. Je suis scientifique de formation et je dispose des meilleures références y compris par rapport a ce travail qui me fait vomir. Mais la Belgique n’est pas là.J’ai tout les éléments pour que ces ordures soient écroués, .….sans contacts ni même un papier officiel malgré ces 3 ans d’enfer et ces deux ans et demi de travail à temps plein week-end en sus. Mais la Belgique n’est pas là.

Le 6 octobre 2012,

Je me suis rendu à un meeting à l’université de Ghent organisé par icaact.org. (Jesse Beltram, Barrie Trowers, Lars Drudgaard, …)
L’université mettait aimablement ses locaux et sa chambre anéchoique à notre diposition et deux spécialistes étrangers équipé du matériel de mesure had-oc et bien sur breveté et calibré ont effectué les mesures.
Les résultats montrent que je suis visé “accroché” au niveau des tempes gauches et droites par une arme a énergie dirigée emettant du silent sound sur une fréquence très précise (chiffres exacts et vidéo de la séance de mesure disponible).

Nous étions une douzaine pour lesquels les mesures étaient positives ainsi que quelques temoins.
Cette technique de harassment verbal se nome “voice to skull”. Le silent sound est l’arme par excellence de la guerre avec des armes à énergie dirigée emit par des ordures pour le tracking, le mind-blowing, l’espionnage ainsi que la torture physique.(echelon, tempest, mk-ultra, monarch, illuminati terrorism, ..)

interview by Transparent Flemish-Dutch Radio.

Des bâtards m’ont assassinés et je n’ai pas d’aide pourtant je les ai…la police Cinacienne n’en veut pas et m’a laissé dans une situation de grand danger alors que je leur ai balancé ce réseau en août 2011 sous forme de 3.5 Gigas de documents et de preuves
(1 an et demi de travail afin de pouvoir déposer et à propos d’un assassinat decouvert lors de cette recherche).
Comme je leur ai indiqué ce dossier exigeait ma déclaration et un minimum de collaboration pour être efficient.
Malgré mes post-insistances, un papier officiel, d’autres déclarations en rapport direct avec ce dossier, un quatre yeux, un minimum de franchise, ont été impossible à obtenir, et pire.

Le 11 novembre 2012.

La semaine dernière, suite a une convocation emanant de l’agent à qui j’avais remis le dossier, c’est un toubib généraliste qui est arrivé au poste.

Il m’a questionné a propos d’une photo de revolver! (www.gang-stalking.be),de mes possibles assuétudes, de l’usage du mot « nazis ».
Il m’a demandé si je marquerais mon accord quant à un séjour en hôpital psychiatrique, une médication, un suivi par un psychiatre.

Cette entrevue venait d’une demande du parquet de Dinant (une convocation d’un Juge d’insruction arrivée le meme jour qu’une convocation de la part du Procureur) suite à un épais courrier que j’aurais envoyé à la Substitute du Procureur du Roi ?

Le fait est que je n’ai rien envoyé à cette dame, la police m’a empeché de le dire, je n’ai pu voir l’épais dossier en question.

Une preuve de démarche judiciaire m’a encore été refusée !!!

Benjamin Simon 0032497615904 Support needed

Benjamin Simon
46b Corbion 5590 Ciney (stalked)
27 ruelle Burton, Gesves (to find me)


Benjamin Simon