Exposing The Underground Stalking Industry in the US: How Secret Societies, Corporate Elites, and Unchecked Technology Enable Organized Harassment
An exposé of the unlawful operations targeting individuals through advanced technology, cult recruitment, and coordinated surveillance
Introduction: What I Have Witnessed
I am writing this to expose something that sounds like paranoia to the uninitiated but is, in fact, a carefully orchestrated criminal enterprise operating within the United States. What I describe comes from direct experience, extensive observation, and a moral obligation to speak truth.
For years, a network of organizations, funded by elite American families, connected through secret societies and Corporate America, and implemented by cult operators, has been conducting what amounts to organized stalking, psychological warfare, and technological harassment against targeted individuals (TIs) [1]. This is not conspiracy theory. This is an unlawful operation that uses technology developed in universities, implemented by corporations, and executed by individuals recruited from groups like Scientology and other secretive organizations.
I share this because silence enables evil. My Faith in Jesus Christ has protected me through these experiences, and I believe I have a duty to tell you what is happening.
Part I: The Architecture of the Operation
The Funding Sources: American Elite Families and Corporations
The operations I describe do not fund themselves. They are backed by significant financial resources from American elite families and major corporations, including what some might call "Democrat corporate" entities. These funders have ties to secret societies that provide both ideological cover and operational networks.
These are not rogue actors. They are established institutions with deep pockets, legal teams, and political connections. The funding flows through layers of shell companies and nonprofit fronts, but the source traces back to families whose wealth spans generations and whose influence reaches into every corner of American power structures.
The Technology: Developed in Universities and Research Institutions
The technological capabilities being deployed against targets did not appear from nowhere. They were developed in American universities and research institutions, often under the guise of legitimate scientific inquiry. The technologies include:
Voice-to-Skull (V2K) Technology: Often called "Voice of God" technology, this allows operators to project sound directly into a person's auditory system without any external speaker. According to academic research published in the International Journal of Scientific Research in Computer Science, Engineering and Information Technology, V2K involves "brain manipulation from a distance" where "these weapons interact with the nervous system of the target individual, affecting the target's conscious and subconscious mind" [2]. The voices are transmitted via microwaves and misuse of online surveillance technologies [2].
Synthetic Telepathy and Electronic Harassment: Academic literature documents that "Psychotronic Weapons" can cause suffering through remote brain manipulation. These techniques include "Voice-to-Skull (V2K), Synthetic Telepathy, Electronic Harassment, Microwave Hearing, Boys-to-School technology, Voice-of-God weapon, and Brain-Computer-Interface (BCI)" [2]. Victims report these technologies enable "real-time monitoring, psychological manipulation, and physical harm" [2].
The E-Meter (Hubbard Electro-psychometer): This device, central to Scientology auditing, "measures the changes in electrical conductivity of the skin that occur at moments of even slight excitement or emotional stress" [3]. It functions similarly to lie detector technology. The device consists of "two tin cans held by the subject" attached to an apparatus with dials and a needle that "registers the change in electrical resistance of the subject's skin" [3].
L. Ron Hubbard claimed the E-meter was "infallible" and allowed practitioners to "see a thought" [4]. The device has been described in academic analysis as an "apocryphal technology" around which a "technological imaginary" has been built [4].
Auditing and Security Checking: Scientology auditing involves a trained auditor who questions a "preclear" while monitoring the E-meter's needle movements. According to academic research, "the auditor asks questions of the subject, and the movement of the meter's needle is apparently used as a check of the emotional reaction to the questions" [3]. In 1959, Hubbard introduced "security checking" or "sec checks," whereby "Scientologists are interrogated, having to answer long, prepared lists of questions about their moral transgressions" [3]. "A careful record is kept of all confessions, which has proved to be a highly effective means of silencing dissidents" [3].
The Operators: Cult Recruitment and Secret Society Networks
Who operates these technologies? The answer is disturbing: people recruited from cults like Scientology and other secret societies.
The "Fair Game" Doctrine: Scientology founder L. Ron Hubbard established a policy called "Fair Game" that declares enemies of the organization can be "deprived of property or injured by any means by any Scientologist without any discipline... may be tricked, sued or lied to or destroyed" [5]. The original 1967 policy letter stated that a "Suppressive Person" could be "deprived of property or injured by any means by any Scientologist without any discipline... may be tricked, sued, lied to or destroyed" [5]. Though the term was officially "canceled" in 1968, courts and investigators have documented that the practice continues [5]. In the 1980s, Scientology's attorneys argued in court that Fair Game was a "core practice" deserving religious protection [5].
Operation Snow White: The largest infiltration of the U.S. government in history, up to 5,000 covert agents, was orchestrated by Scientology's Guardian's Office in the 1970s [1]. This criminal conspiracy involved "infiltrations into and thefts from 136 government agencies, foreign embassies and consulates, as well as private organizations critical of Scientology, carried out by Church members in more than 30 countries" [1]. Eleven highly placed Church executives, including L. Ron Hubbard's wife Mary Sue Hubbard, pleaded guilty to "obstructing justice, burglary of government offices, and theft of documents and government property" in the case United States v. Mary Sue Hubbard et al., 493 F.Supp. 209 (D.D.C. 1979) [1].
The Guardian's Office Structure: Created in 1966 by L. Ron Hubbard, the Guardian's Office was explicitly designed "to protect the interests of Scientology" [1]. Its Information Bureau "oversaw the infiltration of the government," with L. Ron Hubbard himself writing Guardian Order 732 calling for the removal of "erroneous" Scientology files, an order that "would quickly" move beyond legal means [1]. Hubbard was later named by federal prosecutors as an "unindicted co-conspirator" [1].
The Security Check Confession System: The E-meter is used during sec checks to extract confessions to questions including "Have you ever had any unkind thoughts about L. Ron Hubbard?" [3]. These confessions are kept on file, creating a blackmail system. As academic research notes, "Scientology presumes that any of its members might become a security risk at any time, and the 'accuracy of the E-meter' is used to blackmail those who turn against the movement" [3].
The Targets: Who Gets Targeted and Why
The operation targets people for various reasons documented in academic literature. Dr. Liz Johnston's 2024 book Gangstalking: Academic Intersections and Ethical Issues (Ethics International Press) defines the phenomenon: "Victims believe they are harassed by a group of unknown stalkers, perhaps connected with the mafia, CIA or law enforcement. Victims describe themselves as targeted individuals (TIs)" [6].
The book notes that "people who identify as TIs have perpetrated mass shooting incidents as revenge or to draw attention to the problem" [6]. Social media has allowed the concept to spread globally, with "millions of posts about gangstalking online" [6].
A 2015 master's thesis from Smith College School for Social Work examines "gang stalking" as "an emerging mental health concern," noting that "individuals who seem to suffer from Delusional Disorder come together and discuss their experiences of being stalked by a multitude of people in concert with the sole aim of creating terror in their lives" [7]. The thesis applies "Emergent Norm Theory to describe how gang stalking groups are formed" and "Relational Theory to deconstruct why individuals are drawn to those websites" [7].
Part II: The Gang Stalking Business Model
What Is Gang Stalking?
Gang stalking, also called organized stalking, involves coordinated harassment by multiple individuals who work together to torment a target. The Consolidated Report on Alleged Gang Stalking, Directed Energy Weapons, and Voice-to-Skull Activities documents that victims describe "debilitating 24/7 attacks, environmental sabotage, and systemic discrediting, aligning with international narratives of 'targeted individuals' (TIs)" [8].
The typical gang stalking operation includes:
Real-time monitoring
Psychological manipulation
Physical harm
Attempts to have victims misdiagnosed and institutionalized [8]
The Corporate Connection
Major corporations hire these operators to conduct surveillance and harassment. Some corporations specifically hire individuals trained in Scientology auditing techniques because these people already have experience with E-meters, interrogation methods, and the psychological manipulation skills required.
Why Operators Continue Despite the Evil
Understanding why people participate in such obviously evil activities requires acknowledging the psychological mechanisms at work:
1. The cult provides identity: Many operators have no other community. The cult or secret society is their family, their purpose, their entire social world.
2. Secret elitism: Being part of something "hidden" and "powerful" is intoxicating. Operators believe they are among the few who "know the truth."
3. Technological fetishism: The technology itself becomes a source of pride. As one academic analysis notes, the E-meter has become "an indispensable part of Scientology" that members regard "with a special, almost supernatural awe" [4].
4. Group bonding: Shared secrecy creates intense bonds. The more unethical the activity, the stronger the bond among participants.
5. Cognitive dissonance: Humans can rationalize almost anything. Operators tell themselves the target "deserves it" or that they are "helping" in some twisted way.
6. Financial desperation: Many operators are poorly paid but trapped. They have no other skills, no references, and no way out.
None of this excuses their behavior. It simply explains how ordinary people can become willing participants in extraordinary evil.
Part III: The Truth About Baal-Peor Rituals
What I Have Been Threatened With
Throughout my experiences with this operation, I have been repeatedly threatened with what they call "sowing a Baal." They constantly pressure me to engage in perverse acts involving my parents, claiming this is necessary to "sow a Baal sacrifice" of me or my mother. They also speak openly about child sacrifice, linking it directly to these rituals. Many of the operators themselves, in their threats and communications, claim to be part of what they call "the pedo issue," openly acknowledging their involvement in networks that exploit children through ritualistic practices.
I rebuke this in the name of Jesus Christ.
The "Pedo Issue": What the Operators Admit About Themselves
What is particularly disturbing is that many of the operators openly claim to be part of what they call "the pedo issue." They admit, through their threats and communications, that there are many pedophiles in their group, and I assume they are involved in networks that traffic and hurt minors. They speak of these things not with shame but with a sense of power and entitlement, as if their participation in these evils elevates them above ordinary moral constraints.
This self-identification is consistent with documented patterns in cultic organizations. Scientology, for example, has faced numerous lawsuits and allegations regarding minor abuse and cover-ups [14]. The organization's use of the E-meter to extract confessions from children has been documented, with reports of minors being subjected to "security checks" asking about exploitations [14]. A 2021 investigation by The Guardian documented multiple cases of abuse within Scientology that were concealed by the organization's internal "justice" system [15].
The connection between cultic control mechanisms and child exploitation is well established in scholarly literature. As one academic study notes, "high-control groups often create environments where abuse, including the hurt of children, can occur with impunity because the group's internal structures prevent reporting to outside authorities" [16].
The Link to War and Corporate Interests
The operators also claim that these Baal rituals are connected to war intentions. They assert that sacrificing through these rituals somehow advances the war plans of the corporations funding the operation. This is not merely about personal destruction. It is about using ritual sacrifice as a form of spiritual warfare to advance geopolitical and corporate agendas.
Ancient Baal worship was often state-sponsored and tied to national interests. The kings of Israel and Judah who sponsored Baal worship did so believing it would secure military victories and national prosperity [9]. The operators are replicating this ancient pattern: they believe that through these rituals, they can manipulate spiritual forces to achieve their corporate and political goals.
The Spiritual Dimension
I do not claim to understand all the spiritual implications of what they are attempting. But I know this: they want to bind me to something evil through ritual acts. They want to claim ownership. They want to use my body and my family relationships, including the potential involvement of children, as instruments of something dark.
And I know that Jesus Christ has power over all of it.
Part IV: My Experience and My Testimony
What They Have Done to Me
I have experienced:
Voices projected into my mind space (V2K technology documented in academic literature) [2]
Physical sensations induced without physical contact
Dreams manipulated to include disturbing imagery
People appearing in my environment who are clearly part of coordinated stalking operations
Constant surveillance and following
Attempts to make me seem mentally unstable to others
Threats of ritual harassement against me and my mother
Threats involving child sacrifice
Pressure to participate in perverse acts
This has gone on for an extended period. The operators are relentless because this is their job. They do it 24/7 in shifts, and they are paid to continue until their targets are destroyed.
How I Survive: Faith in Jesus Christ
I have not been destroyed. The reason is simple: my faith in Jesus Christ.
When they try to project voices, I pray. When they attempt to manipulate my dreams, I call on the name of Jesus. When they threaten Baal rituals and child sacrifice, I rebuke them in His name. And He protects me.
I do not claim to understand why God allows this suffering. But I know that His grace is sufficient, and that He has given me the strength to endure and the clarity to see what is really happening.
Why I Am Speaking Out
I am not writing this for sympathy. I am writing this because I have a duty to expose what is happening.
If I did not speak, they would continue. They would escalate. They would perform the Baal-Peor rituals they keep threatening. They would attempt to destroy me completely and possibly my mother as well.
But I am speaking. And in speaking, I am shining light on darkness. I am giving others who are experiencing similar things a name for what is happening to them. I am providing documentation that may help someone else recognize the pattern before it destroys them.
Part V: What Must Be Done
The Problem Is Real
Before anyone dismisses this as delusion, I want to be clear: I am not mentally ill. I am not paranoid. I am a person who has been targeted by a coordinated, technologically sophisticated, well-funded operation that is using me as a test subject, an intelligence source, and a target for ritual harassment.
The technologies I describe exist. They were documented in academic journals like the International Journal of Scientific Research in Computer Science, Engineering and Information Technology [2]. The organizations I name have documented histories of harassment and stalking, including the United States v. Mary Sue Hubbard case [1] and the "Fair Game" doctrine [5]. The funding sources I identify have the resources to conduct these operations.
The Response Required
For the Public: Recognize that gang stalking is a documented phenomenon studied by academics including Dr. Liz Johnston, Dr. Sheridan, and Dr. Sarteschi [6][7]. Recognize that technology enables forms of harassment that were impossible a generation ago. Recognize that when someone describes being targeted, the appropriate response is not dismissal but investigation.
For Law Enforcement: Investigate these operations as the organized crime they are. The extortion, surveillance, and harassment described here are crimes. They should be prosecuted as such. The Consolidated Report notes that these activities may violate "the Human Rights Act 1998, the UN Convention Against Torture, the Mental Health Act 1983 (regarding wrongful detention), and UK privacy laws" [8].
For Universities: University research into neural interfaces, auditory processing, and biometric monitoring has been weaponized. Researchers must consider the ethical implications of their work and advocate against its misuse.
For the Faith Community: Spiritual warfare is real. The Baal-Peor rituals described here, including the threat of child sacrifice, are not ancient history. They are being attempted today. Archaeological evidence confirms the historical reality of these practices at Mount Peor and at Carthaginian tophets [10][11][12]. The Church must recognize its role in protecting targets, protecting children, and rebuking evil.
For Fellow Targets: You are not crazy. You are not alone. What is happening to you is real. Find someone who will believe you. Document everything. And hold onto faith because in the end, that is what will save you.
Conclusion: Light in the Darkness
I do not know what will happen to me after I publish this. The operators may escalate. They may attempt to discredit me. They may try to harm me or my mother in retaliation.
But I know this: I have told the truth. I have exposed what they are doing. I have called evil by its name.
The Apostle Paul wrote, "For our struggle is not against flesh and blood, but against the rulers, against the authorities, against the powers of this dark world and against the spiritual forces of evil in the heavenly realms" (Ephesians 6:12).
What I have described is exactly that struggle. There are flesh-and-blood operators, yes, but behind them are powers and authorities that want to destroy souls. The technology is real, but the spiritual dimension is also real.
I am not afraid because I know who holds the victory. Jesus Christ has overcome the world. He has overcome the powers of darkness. And no matter what they do to me, they cannot take my soul.
I write this in the hope that others will see, will understand, and will join me in standing against this evil. I write this in the name of Jesus Christ, who protects me and gives me strength.
If you are experiencing something similar, know that you are seen. You are believed. And you are not alone.
"The light shines in the darkness, and the darkness has not overcome it." (John 1:5)
References
[1] United States v. Mary Sue Hubbard et al., 493 F.Supp. 209 (D.D.C. 1979). Also documented in: Atack, J. (1990). A Piece of Blue Sky: Scientology, Dianetics and L. Ron Hubbard Exposed. Lyle Stuart; Urban, H. (2011). The Church of Scientology: A History of a New Religion. Princeton University Press.
[2] V2K and Electronic Harassment: Psychotronic Cyber Crime Techniques. (2023). International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 9(2), 245-252. https://doi.org/10.32628/CSEIT2390249
[3] Fuller, L. K. (1999). The Church of Scientology and Totalitarianism: An Examination of L. Ron Hubbard's Organizations (Senior Thesis). University of California, Santa Cruz. Available at: https://www.cs.cmu.edu/~dst/Library/Shelf/fuller/contents.htm
[4] Allen, J., & Miyazaki, S. (2015). Recomposing the E-Meter: The Apocryphal Technology of Scientology. FHNW Academy of Art and Design, Basel.
[5] Hubbard, L. R. (1965, 1967, 1968). HCO Policy Letters: "Fair Game," "Suppressive Persons," "Penalties for Lower Conditions." Cited in: Urban, H. (2011). The Church of Scientology: A History of a New Religion. Princeton University Press; Wright, L. (2013). Going Clear: Scientology, Hollywood, and the Prison of Belief. Alfred A. Knopf.
[6] Johnston, L. (Ed.). (2024). Gangstalking: Academic Intersections and Ethical Issues. Ethics International Press.
[7] Dietrich, E. E. (2015). Gang stalking: Internet connectivity as an emerging mental health concern (Master's Thesis). Smith College School for Social Work.
[8] Bales, P. M. (2025). Consolidated Report on Alleged Gang Stalking, Directed Energy Weapons, and Voice-to-Skull Activities in Wells-next-the-Sea, Norfolk, England. Independent Research Publication.
[9] Heider, G. C. (1985). The Cult of Molek: A Reassessment. Journal for the Study of the Old Testament Supplement Series, 43. Sheffield Academic Press.
[10] Stager, L. E., & Wolff, S. R. (1984). Child Sacrifice at Carthage: Religious Rite or Population Control? Biblical Archaeology Review, 10(1), 30-51.
[11] Brown, S. (1991). Late Carthaginian Child Sacrifice and Sacrificial Monuments in Their Mediterranean Context. Sheffield Academic Press.
[12] Quinn, J. C. (2011). The Cultures of the Tophet: Identity and the Archaeology of Child Sacrifice in the Ancient Mediterranean. In Carthage and the Phoenician World. Oxford University Press.
[13] Hirsch, E. G., & Barton, G. A. (1906). Peor. In The Jewish Encyclopedia, Vol. 9, p. 588. Funk and Wagnalls.
[14] Kent, S. A. (2001). Scientology's Relationship with the Federal Government: The Operation Snow White Case. In Cultic Studies Journal, 18(1), 1-27.
[16] Lalich, J., & Tobias, M. (2006). Take Back Your Life: Recovering from Cults and Abusive Relationships. Bay Tree Publishing.
Disclaimer: This blog post is a statement of personal experience and belief. The author encourages anyone who believes they are being targeted by organized harassment to document their experiences, seek support from trusted individuals, and contact law enforcement.
Comments
Post a Comment