dicktripover

COINTELPRO2.0B

Apr 25th, 2020
239
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 23.15 KB | None | 0 0
  1. COINTELPRO2.0B
  2. https://meshnewsdotorg.blogspot.com/2019/11/cointelpro-20-survival-guide.html?m=1
  3. COINTELPRO 2.0 // A Survival Guide
  4.  
  5. Table of Contents
  6. (Tap/Click to Jump to Section // If Link is Broken Scroll to Section)
  7.  
  8. Why is This Happening to You?
  9. How to Solve Your Problem (FOCUS ON THIS)
  10. Intro to COINTELPRO 2.0
  11. Setting the Scene
  12. A Brief Explanation
  13. The Feeling of "They're Everywhere"
  14. Framework of Destroying Someones Life
  15. Touchless Assault Weapons - Radiation as a Tool
  16. Side Effects of Radiation Exposure
  17. Hiding Your Radiation Abuse From You
  18. Radiation Used to Initiate Heart Attack
  19. Pharmaceutical Assault
  20. No Device Safe from Manipulation
  21. Psychological Warfare
  22. Digital Psychological Warfare
  23. Fleecing the Sheep
  24. Making a Mass Murderer
  25. Food Terrorism
  26. Money Games
  27. Character Assassination Model
  28. Can You Trust Your Media(Side Effect)
  29. Mobbing
  30. Mail Interception and Package Tampering
  31. Interacting with Law Enforcement
  32. Hedonic Adaptation (Abuse Management)
  33. Microwave & Radio Wave Radiation (symptoms & effects on humans)
  34. Privacy Invasion - Methods of Though
  35. Fight Back With Liquid Ass
  36. Evolving Narrative
  37. Pit of Despair (engineered nervous breakdown)
  38. Why Won't They Stop Harrassing You?
  39. Is the Government Reading Your Mind?
  40.  
  41. Catch New Content From Official Twitter @COINTELPRO2zero
  42.  
  43. Tweets by @COINTELPRO2zero
  44.  
  45. =======¥=======
  46.  
  47. // before you go forward, know this is constantly getting updated, and a lot was logged on the road via Voice to Text and this web site and everything Mesh News does is made entirely with a cell phone.
  48.  
  49. So, keep in mind voice to text isn't the greatest sometimes, and we are combing through this to correct the wonkyness that V2T didn't translate right, and the guides formatting.
  50.  
  51. excuse our dust
  52.  
  53. =======¥=======
  54. Why is This Happening to You?
  55.  
  56.  
  57. This might be happening for a100 reasons. Your not going to be told why it's happening because there's lots of money to be made in this industry of organized harassment and torture.
  58.  
  59. Usually it's one of five categories.
  60.  
  61. *Government Sponsored
  62. *Corporation Hired a Private Contractor
  63. *Organized Crime
  64. *Municipalities or Cities
  65. *Training New Regional Managers of the Program
  66.  
  67. 1587542952286997-0
  68.  
  69. Government-sponsored category is obviously because the government does not like you. You might have made them believe you're a terrorist. The government might see you as a obstacle that is gaining more influence then they think they can safely manage. If you found out some secret information and might be at risk for leaking it. If you did leak government information.
  70.  
  71. Lots of people who are Target's of this program are former military or intelligence. Lots of homeless people who are former military are targets of this abuse because they leaked information and the government buried them. Lots of these military and intelligence victims of this program are true patriots. Most of them just we're trying to get out information about government abuses and failed in getting the word out before they were "surrounded." Edward Snowden is a success story, there are many failed attempts at the same action.
  72.  
  73. Corporation Hired a Private Contractor or third party. This is a service that private military contractors and private intelligence companies offer many Fortune 500 companies. These companies reach out to the specialist to silence whistleblowers, to discredit companies and inventors whom they have stolen intellectual property from, or even to cause damage to a competitor by harassing one of their lead engineers or designers. Keeping them with a competitive advantage.
  74.  
  75. Organized Crime who were taught by former managers of this program who now went private sector, or taught a certain mafia/cartel the skillet for a price. The criminal organization then used their new skill set to discredit people who are witness to their crimes, and even to commit life insurance fraud by making someone perceived to have mental illness, or use the training to make them a social pariah. This criminal organization will then put into place measures to deplete the health of the target victim but doing away so it looks like natural causes. Usually by inducing cancer or some sort of specific organ failure. But that looks like a natural cause, 6 to 8 months after the person has died a large substantial illegally obtained life insurance policy will be cashed out.
  76.  
  77.  
  78. Municipalities or cities will participate in many facets of the Cointelpro 2.0 program for gentrification to push certain people out of the community to obtain land or houses. Cities will engage a target for community social health purposes, or "taking out the trash" as most put it in these illegal kangaroo court committees. These committees are private and self-appointed and in cities with ingrained corruption into the municipality. There is not a paper trail usually, considering the numerous federal crimes committed to engage a Target. Some loosely put together some sort of kangaroo court and elect certain people from the community they think deserve mistreatment, or need to be moved for gentrification reasons. Sheriff's, judges, mayor's, and even local politicians are also involved in the decision of who to Target.
  79.  
  80. Training a new head or regional director of the COINTLEPRO 2.0 Program it's also a reason why you can be under this abuse. Usually people on the fringes of society or introverted hermits that don't have a voice or funds to make a noise about the abuse are used to train on and teach new managers this program. They are taught how to use each discipline of the COINTLEPRO 2.0 program efficiently, and how to cover up evidence of the abuse. Just being good at the abuse isnt an effective unless you know how to cover it up, or fix a mistake where the target has recorded abuse that will get them out of their torture.
  81.  
  82. This program in its more common and intense forms involves exposure to microwaves and x-rays/gamma ray radiation, financial ruin, character assassination, drugging, entrapment, and psychological torture. The video example of the honking campaign above is the mildest and rarest form of organized abuse towards a target.
  83.  
  84. Most targets health is severely damaged, reputations are dragged through the dirt, relationships are destroyed, career and finances are blacklisted and squandered trying to fight the abuse.
  85.  
  86. Many people who have the situational awareness that they are a victim of this abuse have been fighting a battle you know nothing about and only somebody who's truly been to the program can sympathize.
  87.  
  88. How To SOLVE Your Problem
  89.  
  90. *LOGGING THE ABUSE (video, pictures that tell a story, logs of illegal access to online accounts, bank records, credit report records, identity theft proof, recorded phone calls, screenshots or video of your computer or device screens from internet NSA contractors harassing you online or modifying your computer/device)
  91.  
  92. *KEEPING RECORDS OF CHANGES IN YOUR HEALTH AFTER EVENTS HAPPENS
  93.  
  94. -White Blood Cell (dips during radiation exposure)
  95. -Blood Work
  96. -Organ Functionality
  97. -Changes in What Your Allergic
  98. -Hair Loss
  99. -Immunity
  100. -Heart Rate & Heart Related Illness
  101. -Blood Pressure
  102. -Onset of Kidney, Liver, Pacreatic, or Gall Bladder Problems
  103. -Brain Scan to Check for Cranial Radiation Exposure to Enduce Cancer, Strokes, Lesions, Water on the Brain
  104. -Nerve Damage Caused by Radiation Exposure
  105.  
  106. *TRYING TO LOG EVENTS WITH THE POLICE DEPARTMENT (if they won't write a report because little evidence ask them for a Incident Report - it's a report based on your testimony not evidence but it's still logged into the law enforcement database)
  107.  
  108. *GETTING A LAWYER (if no money reach out to ACLU)
  109.  
  110. *REACHING OUT TO REPORTER WITH YOUR BODY OF EVIDENCE ASKING THEM TO DO A STORY ON YOU WITH YOUR FULL NAME IN IT AND WHERE THE ABUSE IS HAPPENING/ORIGINATED
  111.  
  112. Intro // COINTELPRO 2.0
  113.  
  114.  
  115. It's been covered by VICE, there have been countless documentaries about it and there is a growing number of survivors trying to reach out online to others.
  116.  
  117. Some call it gang stalking, mobbing, or contract harassment. Ultimately it's a method of torture that uses a system of abuse The FBI used for decades up until it was declassified during the Nixon administration. The methods employ psychological warfare techniques meant to degrade your life and break your will
  118.  
  119. Known by those contracted to do it, as a Celebrity Cruise but its original name was COINTELPRO
  120.  
  121. Cointelpro was Declassified during the Nixon Administration. The tactics were originally created as a recipe any federal or regional government organization within its jurisdiction could easily replicate to disrupt. COINTELPRO was used on the Black Panther Political Parties and to squash Communist Party organizers in the United States during the 60s and 70s, but later these skills got passed down to private sector security contractors as public sector Intel employees who went to the private sector.
  122.  
  123. During the 80's 90s and early to 2k's these tactics were turned inward to squash anti-government dissidents, government leakers, and even to destroy personal & political rivals.
  124.  
  125. The best way to understand how the FBI Cointelpro program works is to set the scene. We're going to create a hypothetical situation that will run parallel to a person's life. We will call her Heather and then show you the simple tactics and the subtle nudges that are used to discredit truth sayers, assassinate someone's character and leave them with nothing, not even there health in the end. This initial introduction will show how a person's actions can be manipulated to leave a person without a support network to help them.
  126.  
  127. In the next video, we will introduce you to Heather and show you how in just four days these tactics can start removing cornerstones in a person's life. I'm creating this video series because I personally have gone through this experience myself, and I am still reverse-engineering the damage done, but I would like to pass on what I have learned to you. So please, use this information purely for educational uses, not to hurt your enemies, or cause harm to anyone you might consider your adversary, for any reason.
  128. Setting the Scene // COINTELPRO 2.0
  129. Imagine you're living your day-to-day, and you're in your car getting into a heated argument with a friend. After the clash, you part ways and go home to go to sleep because you have work in the morning
  130. On your way to work the next day, you stop to get a coffee while and you're waiting in line somebody behind you repeats verbatim and mockingly the most heated moment of yesterday's argument you turn around the person smiles, coughs twice and leaves
  131. This is usually the beginning of the victim's awareness of their celebrity cruise or COINTELPRO ride has started
  132. That first encounter seems weird but you shrug it off you mentioned it to your significant other later that day
  133. later that night you're on your phone and you notice a story in your feed mentioning how your significant other is more likely to cheat in the morning
  134. Before you go to bed your partner will tell you they're going to meet a friend at the gym in the morning and it puts you on guard
  135. In the morning, you're driving to work in your car playing Pandora radio and a commercial for a local PI that specialize in cheating spouses comes on in between songs
  136. On your lunch break, you realize your partner hasn't called you all day and as you scroll your feeds on your lunch break you see a comment mentioning how YOU are abusing your mentor position at church and that no one likes you
  137. you shake it off, save the post to comment later then go back to work
  138. You get to your desk and shortly after one of your clients calls and chew you out for an unfulfilled purchase order, the person yells at you is very rude then hangs up
  139. At the end of work, you notice your significant other still hasn't called you which makes you suspicious by this time and you pick up dinner. Before going home and while in line at the grocery store a stranger says your name while having a conversation with another person but to mention in the conversation how her friend had to leave her church group to save her marriage
  140. On your way home your streaming service plays nothing but songs about cheating boyfriends you get home and see your significant other with another person of the opposite sex, you get out of the car your spouse says his phone didn't work all day for some reason and his card isn't working so he couldn't buy gas that's why the person (who is also female) drove him home, not to mention she is a new client of his
  141. You both get in the house and an argument starts. You accuse your spouse of cheating, she gets mad and leaves
  142. You eat dinner by yourself go back and check on that negative comment you saw online at lunch but it's not there anymore
  143. Suddenly you're waking up, not remembering falling asleep and you hear a noise in your house so you call out your spouse with no answer. Hear a door slam then silence
  144. You text your partner "why'd you leave?"
  145. they reply "I haven't been back and I'm still mad talk to you later"
  146. Now that you know that wasn't your spouse you check your house find nothing but the lights on and open cabinet doors but nothing missing
  147. You call the cops, they checked the house and see nothing missing or out of place. The police then ask you things like if you've been abusing alcohol or drugs. You reply in defense of yourself but the cops refused to file a report since they've seen nothing like a threat and asked if you would like to see a psychiatrist you refuse, claim you're not crazy and they leave
  148. So, now you're unable to sleep now and go to work as the morning arrives
  149. After you arrive your boss asks to meet you, tells you a large client you maintain called and is taking her business elsewhere and because of this you are fired
  150. you clean out your office and now you're on your way home to a house you don't feel safe at upon arriving you see that your significant other is moving his stuff out while you were at work and after another fight, he leaves
  151. Now home alone in your house stressed out and not feeling safe you try to wind down with some wine in your Harvard College sweats and watch some TV
  152. Pull out your phone and scroll your fees and begin seeing ads for the exact same Harvard sweatshirt you're wearing
  153. You getting creeped out by that so you go to Reddit to get away from your social media and start seeing posts about "how did you cause your break up?" then a post about how "Unless you went to Harvard you shouldn't wear the sweatshirt" but after that I post about "My friend Heather is a fuck-up, how should I tell her?"
  154. Okay a little creepy but you clicked on it because you're curious is start to scroll down on the comments restart off mention how horrible Heather is, saying that she's a fuck-up at work, another saying "that she's a wino and never be smart enough to go to Harvard"
  155. You have now reached, situational awareness, you are being watched and your watchers feel like they are in such a good position to do so, that they can directly ridicule you
  156. Your phone freezes up then turns off but you already know now that you're being watched right now. The situational awareness stage is about 6 months to a year into your COINTELPRO AKA celebrity cruise, but most importantly now you know you have an enemy who's embedded themselves in your life.
  157. So now let's backtrack through the past 4 days in the breakdown of what's happened here, and the way Heather's life was hijacked and simple methods to invade her life without her knowing
  158.  
  159.  
  160.  
  161. A Brief Explanation // COINTELPRO 2.0
  162. So day one wasn't actually day one. Previous to day one Heather's background was gone through with a fine-toothed comb for about six weeks to six months prior. Her friends, family, & associates were thoroughly researched and have been possibly contacted by her provocateurs. Posing as new church members, local neighbors, & concerned police claiming to care about Heather's well being.
  163.  
  164. Her computer and phone were hacked into, as well as other smart devices. Overall, data has been getting gathered via her phone and personal network much longer than she understands.
  165.  
  166. So for all intents and purposes, you can start to understand where something strange can seem like just a coincidence & quickly start to pop up over and over again.
  167.  
  168. Monday, the stranger at the coffee shop, heard her car argument live via a hot mic from her phone which is why he was able to mock the tone, timing, and words with such accuracy, ensuring she would take notice.
  169.  
  170. Then later that night on her phone, she was getting shown clickbaity stories about her significant other cheating, most likely was some evolution of the prism software, Edward Snowden, is so famously known for revealing.
  171.  
  172. Coincidentally, Heather's partner also tells her that he is leaving to meet a friend in the morning. This probably means his phone is also hacked, and the people who've been contracted to manipulate Heather's internet are using information from a phone call he had earlier that day. So what would be a normal situation now has been seeded with doubt for Heather
  173.  
  174. Something that would have tipped Heather off would be the dates of the posts because the news article she read from her feed about cheating spouses in the morning was actually from months prior. This allows it to look like the algorithm picked the story, and wasn't injected into her feed. One of the tricks this social media feed tweaking software does is inject things into your newsfeed hoping to give you an emotional response or even something called behavioral priming. Something you see as just an algorithm to put content in your feed can be edited and hijacked to nudge your behavior.
  175.  
  176. Day 3 when Heather was listening to music on the phone Advanced prism-like software and Industry level back doors have now turned every app, notification and even function in Heather's phone into something that can be easily edited.
  177.  
  178. Her phone is less of a pocket computer and now more of a window of what they want heather to see & hear
  179.  
  180. Later that day our mark, Heather, sees comments that bad mouth her activities at church, then later that night it's gone. The official name for this is the sock puppet account, and this kind of tactic is used to get a response, then delete the original comments so just your crass comments to the harassment are left for your friends to see, but the sock puppets are gone.
  181.  
  182. Sock puppet refers to accounts on social media that seem friendly or ones that you follow you but aren't in fact copies, or mirrors of friends accounts used to cause strife, confusion or give you conflict igniting information and then remove it after the objective is met.
  183.  
  184. The lady on the phone at work probably did send her order in time and Heather did her job too but this is what having a hacked computer will do your performance at work. Once your work computer is hacked an agent can hide files, use databases and manage email as if they were sitting right there at the computer. This is possible by the creation of something called RAT or R-A-T software, short for remote access tools.
  185.  
  186. Believe it or not, presidential candidate Beto O'Rourke was a hacker in the group called Cult of the Dead cow which developed early versions of the software to back door and remotely operate windows computers, much like how Heather's phone is being manipulated now
  187.  
  188. This software could have easily been installed by a cleaning service, malicious email or even physical contact with the device weeks prior
  189.  
  190. We're moving fast but we're going to go over each step in detail after this short explanation...and if you watch each micro clip explaining every element of this targeted harassment, you can build a congruent picture and even help others who don't understand they are targets of this abuse.
  191.  
  192. Now the mark, Heather, who is stressing about her boyfriend could also have had his phone controlled by this same back door software & had his SIM card copied. Regardless of the method to gain control, gatekeeping traffic such as messages, alerts, app traffic, etc; and depending on the hack could shut the phone off or even brick the device.
  193.  
  194. Most people see your phone as a mini-computer where you keep your personal info on and keep not so private things in the cloud. The reality is, your phone can be converted into just a window into the web. With the right access, a government worker or contractor can gain access add & removes files, even remote control actions on your phone itself as the user
  195.  
  196. Moving on day 3 and Heather can't reach her boyfriend, she had a bad day at work and now she's out the grocery store and people start having a conversation right next to her and she notices because she hears her name
  197.  
  198. Hearing your name is an obvious trigger just like the phrase "trigger warning" you hear a word or phrase that sets you off or grabs your attention, the way this was used was a harassment method called indirect conversation
  199.  
  200. This allows a person to address the target with information or harassing words without actually talking to them, then use that opening listening channel to communicate an idea whether it's harassing or something that the target can digest and associated with ideas later in the day that is also part of this harassment
  201.  
  202. On the way home, she listens to what seems random but is a very curated list of songs reinforcing seeds of ideas pertaining to possible infidelity of her spouse, So when she gets home and sees her other half with another woman it triggers an emotional response associated with the idea that she must have a cheating partner
  203.  
  204. After her fight with her boyfriend, she's home alone and she eats her food and then she wakes up some hours later. when she wakes up and the drama of the home intruder happens, it's coordinated, and her food was laced with a sedative at the actual restaurant.
  205.  
  206. These little intrusions making her come to the realization that she is not safe nor will her private life be, but she sure as hell can try and call the cops who are most likely for sale and they have no problem with fucking her over for a quick buck while she tries to fight this threat off
  207.  
  208. Day 4, Heather's sleep cycle or circadian rhythm has been now hijacked and that booby trap at work that's been set with the pissed-off client is now costing Heather her job, she goes home to a now empty house she no longer feel safe in and she is well aware that she is being watched and the police will not help her
  209.  
  210. This puts her at the beginning of what is called a pit of despair mindset or conditioned helplessness, and the beginnings of years of her life wasted. She will extinguish all her resources and relationships trying to fight this.
  211.  
  212. Does this sound like somebody you know?. Could you be getting into a career where telling the truth is an option you're always going to take? If this sounds like you or somebody you know, or if you're just curious of how this formula for destroying a life is done its important for you to listen to me as I will give you a field guide for surviving COINTELPRO 2.0 torture
  213.  
  214. This preliminary video is to lay a groundwork for expectations and understanding. In the next short videos, we will give you a 360 for each piece of the recipe, that can upheaval even millionaires and politicians, let alone an American citizen who has a high respect for exposing the truth.
  215. The Feeling of "They're Everywhere"
Add Comment
Please, Sign In to add comment