Comprehensive Information on Surveillance Operators & Their Occult Ties
I. Introduction: What I've Learned from TI Literature & Experience
This post is a synthesis of what I have personally endured and patterns documented in books by American authors on Targeted Individual (TI) and gang‑stalking cases. The key revelation is that the people directly harassing me 24/7 are not the "elites" themselves; rather, they are cult operatives hired and directed by elite institutions, corporations, and wealthy families.
II. The Two‑Tier Structure of Perpetrators
A. The Elite Funders & Corporations (Corporate & Military Affiliates)
- Old American "elite" families, corporations (you hear of sketchy people like Black Rock, affiliations with Peter Thiel, etc.), defense contractors, and intelligence‑adjacent entities.
- They commission the harassment for multiple reasons:
- Psychopathic entertainment: they do it "because they can."
- Evil research agendas, such as Project Monarch‑style mind‑control programming, testing psychopathy and pedophilia on vulnerable populations.
- Occult sacrifice: they view victims as offerings to Baal, Satan, or other false gods, hoping to curse bloodlines, sow catastrophe, and influence geopolitical outcomes.
- Human trafficking and ritual abuse: using victims in satanic or Baal rituals to "dedicate" suffering to their deities.
Corporate Affiliates: These could include defense contractors, tech companies, and private security firms that provide funding, technology, or operational support. Some have government contracts; others operate in the private sector but maintain connections to military and intelligence networks.
Military Affiliates: Some individuals in this tier could have direct or indirect ties to military intelligence, research units, or redacted defense programs. Their involvement suggests that some of the technology and methodology used in this harassment originates from or is adapted from military applications.
B. The Cult Operatives
These are the people I hear, sometimes see, and who harass me daily. They are:
- Recruited from various backgrounds: some have exhibited symptoms of pre‑existing psychopathy or narcissism; others are drawn to the sense of purpose the cult provides.
- Given a sense of purpose: the cult provides belonging, identity, and permission to act on their darkest impulses.
- Paid or supported: they receive money, housing, or other benefits from the elites to perform this 24/7 harassment.
- Projecting their own issues: many accusations (narcissism, racism, jealousy, pedophilia, greed, elitism) reflect their own nature.
The books confirm that many operatives are themselves victims in a sense: they are exploited for their vulnerabilities, kept in a cult mindset, and discarded if no longer useful.
III. The Technology: Beyond My Direct Knowledge
I am not a technician, but the literature (and my experience) points to a combination of:
- Gauss meters and EMF devices, used to monitor, target, and inflict physical sensations.
- Directed energy weapons, for microwave hearing, skin sensations, and psychological manipulation.
- V2K (Voice to Skull), transmitting voices directly into a target's head without external sound.
- AI‑generated (or other forms of this quantum-based Gauss meter or EMF technology) imagery and voice, to occasionally project racist, implied violent, or sexual caricatures of me, my family, or flashes of distressing and traumatizing imagery.
I defer to the authors of the books below for the scientific and technical details. My role is to testify that this technology is being used on me and others, and it is real.
IV. Occult Ideology: The Spiritual Warfare Dimension
The harassment is not random; it is ritualized. The operators and their elite handlers believe they are engaged in spiritual warfare against God and His creation.
| Occult Goal | How It Manifests |
|---|---|
| Dedicate suffering to Baal or Satan | Every act of abuse is framed as a "sacrifice." They tell me I am being made "more expensive" or "cheaper for their cult," often calling me a "buck" or a "cent." |
| Curse bloodlines and heritage | Because I am Chinese Canadian, they view destroying me as a symbolic victory against China, my family line, and the next generation. |
| Force complicity in evil | They try to make me participate in their perverse, violent, or "satanic" acts, even if only through forced intrusive thoughts, so they can claim I "chose" evil. |
| Steal or corrupt destinies | They believe that by tormenting me, they can steal my blessings, my purpose, and my place in God's plan. |
| Sow catastrophe on Earth | They target specific individuals to create ripple effects, wars, cultural decline, and generational trauma, which they then "dedicate" to their false gods. |
I rebuke all of this in the name of Jesus Christ, my Lord and Savior. Their rituals have no power over me except what I allow through fear. I choose faith.
V. Why These Victims? (Vulnerability & Equity)
The books and my experience show that victims are often chosen because they are:
- Not well‑connected: lacking resources, education, or social proof to be believed.
- Already vulnerable: isolated, elderly, struggling with mental health, health, or finances.
- Or, paradoxically, "strong": sometimes successful individuals are targeted to "take them down" as a display of power.
This is fundamentally a terrible equity problem: the powerful use the vulnerable (both as operatives and as victims) to maintain a system of abuse. The elites pay operatives to carry out this activity for entertainment, research, and occult purposes.
VI. The "Project Monarch" and Mind‑Control Connection
Many TI books reference Project Monarch, the alleged CIA‑backed mind‑control program that used trauma, drugs, and ritual abuse to create programmed "sleeper" agents and psychopathic operatives.
I am not claiming to know the full history, but my experience aligns with:
- Attempts to split my personality (making me "mean," "hateful," "incel‑like").
- Forced trauma bonding and love bombing.
- Efforts to get me to dissociate or accept their reality as mine.
If such programs exist, they are now being used in privatized, cult‑based harassment for hire.
VII. The Operatives' Personalities: A Portrait
From daily contact, I have observed that quite a few of the operatives show patterns of:
- Psychopathy: they show little empathy; they laugh at distress.
- Sexual deviancy: their inside jokes and fixations reveal their nature.
- Narcissism: they project their own issues onto me.
- Cowardice: they hide behind anonymity, technology, and the cult structure.
- Cult dependence: they need the group to feel powerful.
VIII. Conclusion: Why This Expanded Detail Matters
I am documenting all of this because:
- The public deserves to know that organized, occult‑driven harassment exists and is being funded by elites.
- Other targeted individuals need to see they are not alone, and that the patterns are known and documented.
- Accountability: these operatives and their handlers must be exposed.
- Spiritual clarity: this is not just a crime; it is a spiritual battle. My faith in Jesus Christ is my shield.
I rebuke every curse, every ritual, every attempt to harm me, my family, or my bloodline in the name of Jesus Christ. Amen.
IX. References & Further Reading
The following books (and their authors) provide background on the science, technology, and patterns of organized stalking. I am not affiliated with them, but their work helped me understand what I was experiencing:
- Advice for the Targeted Individual & Gang Stalking Victim (ISBN: 1505826047)
- Hey Mom, I'm a Targeted Individual (ISBN: 1980676143)
- The Story of a Targeted Individual (ASIN: B0CVMDXHYV)
These authors are American and have documented the technology (e.g., Gauss meters) and the personality types recruited into cult networks. Their work confirms that many operatives are vulnerable individuals recruited by elites to carry out this abuse.
Visual Evidence: The Faces Behind the Abuse
This section is an addition to the post above.
The Hierarchy of the Cult: A Visual Guide
Words alone cannot fully convey who these people are. Below are AI-generated images representing some of the individuals involved in this organized stalking campaign. They are presented here for accountability and transparency, because they have taken my image and voice without consent, projected degrading caricatures of me and my family, and hidden behind anonymity while carrying out their activities.
A Note on Prejudice
I want to be clear: this post is not intended to sow prejudice against any group of people based on appearance, ethnicity, or background. Many people who share similar features to those depicted in these images are not affiliated with this activity at all. I have no prejudice toward these features, and I recognize that there are many decent, kind people who may look like the images below. I am presenting these images in good faith because they are generated from reference photos of the actual individuals involved, not because I hold any bias against people with certain appearances. If you see similarities to yourself or someone you know, please understand that these images are specific to the individuals I have encountered, and I do not assume anyone else with similar features is connected to this.
Why I Am Publishing These Images
Some of the cult operators have sometimes been projecting racist, implied violent, and demeaning caricatures of me, my mother, my father, and other innocent people with their technology. Beyond that, they have shown me flashes of violence, perversion, nudity, OCD inducing, and suggestive images of animals, babies, minors, random people, and even people in my own life. I assume they use these projections to disturb, to unsettle, and to test boundaries and my "character", based on my responses and physiology.
They have taken my image and voice without consent and used it in degrading ways. It is only fair that I now publish images representing them, so the world can see who is behind this. They hide in darkness. I am bringing light. To make this fair, I am also including a photo of myself.
Legal Context: Publishing AI-Generated Look-Alikes
I am a Canadian resident publishing this material. The individuals depicted are based in the United States. I have considered the legal frameworks of both countries.
In Canada: Privacy laws (PIPEDA) regulate the collection and use of personal information. However, these images are AI-generated representations, not direct photographs. Defamation law requires that statements be false and damaging. I am presenting these images as representations based on my experiences, not as direct identifications. The Criminal Code addresses harassment and intimidation. My publication is defensive, a response to ongoing targeted harassment against me.
In the United States: The First Amendment protects free speech, including criticism and public accountability. Defamation claims would require proving falsity and malice. I am presenting these images in good faith as accurate representations based on what I have observed. Right of publicity laws vary by state but generally protect against commercial use. This is non-commercial, testimonial speech. Anti-SLAPP statutes in many states protect individuals from lawsuits intended to silence public accountability.
A Note on These Images
All of the images below are AI-generated. With a few of the images, I had reference photos of real people to help generate them, so they are relatively accurate representations. The expressions shown are not ones I deliberately chose; they reflect the type of expressions these individuals have projected onto my mind space using their technology, both during dreams and in real-life encounters.
Overlapping Affiliations
Many individuals in these networks have overlapping roles. A person with corporate ties may also have military connections. A researcher may also be involved in cult activities. The streams below are not rigid silos; they are overlapping networks.
The Multiple Streams Within the Network
Most people within this network do not show their faces openly. But I have encountered them through projection, through real-life sightings, and through the patterns they cannot hide. They come from different streams, each with its own role, and many have overlapping affiliations.
1. The Elite Families, Corporations & Military Affiliates
These individuals have generational wealth, corporate connections, defense industry ties, and links to secret societies. They fund and direct the overall operation.
Corporate Affiliates: Defense contractors (Lockheed Martin, Raytheon, Northrop Grumman, etc.), tech companies providing surveillance infrastructure, private security firms, consulting firms with government contracts.
Military Affiliates: Individuals with ties to military intelligence (DIA, NSA, etc.), former or current defense personnel, redacted military research programs.
Key characteristics: Old money, often with distinctive phenotypes (narrow faces, red hair), corporate attire, military bearing.
Role: They fund and influence the operation. They provide the resources, contracts, and political cover.
2. The University, Research & Military Technology Institutions
These are individuals from universities, research institutions, military labs, and government-linked facilities. They are involved in redacted projects and research linked to defense activities.
Institutions may include: DARPA-linked research centers, university defense research labs, private research firms with government contracts, national laboratories.
Key characteristics: Appear as academics or researchers; may have both civilian and military affiliations.
Role: They provide the technological infrastructure: V2K, directed energy weapons, Gauss meters, AI projection systems. They develop and maintain the tools used in this operation.
3. The Cult Operatives
These are the operatives who perform the 24/7 surveillance and direct interaction. Some are recruited through Scientology and other cult networks. Others are drawn from vulnerable backgrounds and given a sense of purpose.
Key characteristics: Normal-looking individuals; may have cult-dependent personalities. They are typically much younger than the elite and corporate tiers, often around my age or younger. Many of them operate across multiple realms, meaning they may have cross-contact with the corporate, military, or research streams, serving as the boots on the ground while also maintaining connections to the higher tiers.
Role: They perform daily surveillance, direct interaction, and psychological tactics. Their youth and proximity make them the most visible presence in the day-to-day harassment.
The Technology That Enables This
These individuals have access to technology that most civilians cannot imagine, including:
- V2K (Voice to Skull): transmitting voices directly into a target's head
- Directed energy weapons: for microwave hearing and psychological manipulation
- Gauss meters and EMF devices: to monitor and inflict physical sensations
- AI-generated or "mind-space microwave" imagery: projecting images of targets and their families, including disturbing content
- Astral projection or ghost presence: interacting with the environment without being physically visible
- Body projection and space manipulation technology: remote physical sensations
How They Justify Their Actions
From what I have observed, the individuals involved justify their complicity in various ways:
- They frame it as an equity issue, claiming I am "psychopathic," "crazy," a "liar," "wicked," or deserve this attention.
- They say I am capable of lawlessness because I can remain "relatively calm" under pressure.
- They point to moments when I have said mean or harsh things directed at them, moments when I was not in a right state of mind due to the trauma they were inflicting.
- They use my ability to endure and articulate my experience as evidence against me.
None of these justifications hold up under scrutiny. But this is how they rationalize their involvement to themselves.
A Note on Scientology
It is documented in Scientology literature and exposés that the organization has engaged in surveillance of individuals labeled "suppressive persons." Some operatives in my case show patterns consistent with Scientology recruitment. While some Scientologists also identify as Christians, their involvement with this surveillance network makes them complicit in activities I believe are not based on Biblical teachings.
Bohemian Grove: A Reference Point
For those unfamiliar, Bohemian Grove is a private retreat in California where powerful men gather annually. It has been documented to involve ritualistic ceremonies linked by critics to occult practices. (Sources: Inside the Bohemian Grove by Philip Weiss, investigative reporting by The Guardian and San Francisco Chronicle.)
Some individuals in my case could have ties to such networks. I state this as alleged.
What These Images Represent
These AI-generated images represent individuals who are complicit in the activities described above. They operate with anonymity, technology, and a network structure. Many have overlapping affiliations: corporate and military, research and cult, elite and operative.
Now, their representations, generated from reference photos of real people, are public. This is not to sow hatred. It is simply to show the reality of how they look and to provide accountability.
A Note on Safety and Accountability
I understand that publishing these images carries risks. I am aware of potential backlash and retaliation. I am doing this because I believe it is the right thing to do: for myself, for other Targeted Individuals, and for the public who deserves to know what is being done in darkness.
References & Further Reading
- Advice for the Targeted Individual & Gang Stalking Victim, ISBN: 1505826047
- Hey Mom, I'm a Targeted Individual, ISBN: 1980676143
- The Story of a Targeted Individual, ASIN: B0CVMDXHYV
- Surviving and Thriving as a Targeted Individual Under Surveillance, ISBN: 1549542931
- Inside the Bohemian Grove, Philip Weiss (investigative reporting)
- The Bohemian Grove Exposed, investigative documentation
- Scientology exposés on surveillance practices (various sources)
I rebuke every curse, every ritual, every attempt to harm us, our nations, our family, or our bloodlines in the name of Jesus Christ. Amen.






















Comments
Post a Comment