Page 1 of 69
Page 2 of 69 Stolen Liberties The Hidden High-Tech Crime Network of America Author Ash Wilkz
Page 3 of 69 Disclaimer Copyright © Year 2020 All Rights Reserved. All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the author, except for the inclusion of brief quotations in a review. This is a work of expository nonfiction. This book has been written for information purposes only. Every effort has been made to make this book as complete and accurate as possible. However, there may be mistakes in typography or content. Also, this book provides information only up to the publishing date, so it may not account for any new changes relevant to the subject discussed therein. The author and the publisher do not warrant that the information contained in this book is fully complete and shall not be responsible for any errors or omissions. The author and publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by this book.
Page 4 of 69 About the Author Ash Wilkz is a native of Texas and a graduate of University of Houston. She resides in California. She holds a Masters in Psychology. She has worked in the field of social services with persons from complicated backgrounds that struggle with homelessness, mental health issues, drug addictions and criminal circumstances. Ash is an activist in her own right, but more importantly, she is a woman, a black woman, a mother, a sister, a daughter, and an American. Her objective is not simply to bring awareness to a hidden high-tech crime but to motivate law enforcement and policy makers to take action to resolve it. Thirteen years ago Ash was made aware of the high-tech criminal network and attempted to report it to law enforcement multiple times, and they refused to address it. She then attempted to reach out the Federal Bureau of Investigation, where her initial phone call and attempt to report it was met with an agent’s laughter as he hysterically dismissed her attempts to report her knowledge of and direct encounter with members of a wireless network that hacked her computer and threaten her and demanded she move from her home, he disconnected the call. Things escalated quickly to offline. Over the years she has attempted to report the very serious crimes, and get them addressed by law enforcement. In 2019 she went to the FBI in Oakland and after several failed attempts, an agent finally documented a mostly accurate report of the crime. Yet no action has been taken and since that time several government personnel have reportedly being assaulted in various ways by wireless and energy based technologies. Instead of action, law enforcement agents in Texas and California have taken a back seat to this crime, and in several cases they expressed fear of the network. She has been repeatedly told that law enforcement does not have the resources to police this type of crime and as a result the dangerous public safety threat that is this hidden wireless criminal network continues to engage in their class of hidden crimes from coast to coast against children and women specifically, in the United States and abroad. Now they are targeting persons in government , this should be very alarming especially given that the network secretly violates businesses, homes, governments, children and adults. But the things they can do with their technology to planes, vehicles, computers, cellphones, in-home electronics, electricity, gas pumps, devices, alarms and cameras – all wirelessly is no laughing matter. In an effort to speed up what should be an enough motivation to look into this crime, Ash has drafted this book. Over the last 13 years she has spoken with hundreds of victims of this wireless crime, spoke at events involving Traditional Human Trafficking, listened to the stories of victims, viewed their photos and observed what is undeniable evidence of violence by a wireless network that is a public safety threat and is very familiar with the brutality in which the network subjects their victims to. Recent news reports detailing information that now government personnel have reported that they are being assaulted by wireless technology shows that the network of wireless criminals are getting bolder , which more than likely means their families are at risk of being violated. The network has attempted to silence Ash and prevent this book from being drafted , that is until now. This book is not purposed to frighten, and it is not based on conspiracy theories but instead real crimes thru a summarization of its hidden victims testimonies. Law enforcement and policy
Page 5 of 69 makers are our only resource and the goal is to motivate the men and women of government agencies across the country to action. Law enforcement officers have a important role in our society and without them this crime cannot be addressed. This book is purposed to cast this crime in a light that makes the reader understand that though this network’s crimes seem futuristic , they are occurring now, and their prey is vulnerable women and children that have no way to protect, defend or escape. But the reality is that they could violate anyone, with no regulating body of government or law enforcement looking into their activities and without the correct information about the crime, the network has complete discretion in their dealings. Before this problem evolves, lets encourage law enforcement and policy makers to stop overlooking this crime and address it! This book was written during the COVID -19 Pandemic. While most were taking time to put into perspective the importance of life , health and family, victims of this crime have been violated and abused excessively. This network has used this crisis as an opportunity to cause more harm , trauma and carry out abuses. We are not meant to live in a world where oppressions, administered high-tech or otherwise of this nature exists. Where our children and our homes are not safe, where law enforcement elects to look over a crime of this magnitude and places victims and themselves in positions where they are utterly helpless. We hold these truths to be self evident that all mean are created equal with certain unalienable rights...
Page 6 of 69 These are photos taken of three different victims. The upper two photos are of the same persons. The left photo was taken 32 years ago. The other recently. The left bottom photos are of a mass shooter, pay attention to the dark laser like brandings on the darkened photos. The right bottom photo is of a white female. The photos are of victims that were burned by wireless energy on their faces & bodies under the dermis by the anonymous criminals while inside of their own homes . Changes in the filters reveal the marking
Page 7 of 69 Table of Content Introduction Chapter 1 – Hidden High-Tech Crime Network Chapter 2 – Red Rooms on the Dark Web Chapter 3 – High-Tech Crimes against Children Chapter 4 – Technology Paired with Organized High-Tech Crime Chapter 5 – Victims Chapter 6 – Link Between Mass Shootings and this Crime Chapter 7 – What lies ahead?
Page 8 of 69 A secret society exists, and is living among all of us. They are neither people nor animals, but something in-between. – Keren White
Page 9 of 69 Introduction Hidden from the public, a high-tech criminal organization exists that has established an illegal network that makes use of technology to carry out their human rights abuses, long-term conspiracies, and crimes. They should not be confused with what is already known about cyber-based crimes, for it is an entirely different engagement in all aspects. It is a hidden crime made so secret that most are even unaware of its existence, and as of today, law enforcement has refused to acknowledge this level of advance high-tech crime. Weaponizing interactive technology par excellence, the hidden high-tech network is actively engaged in crimes that involve wireless crimes against unsuspecting , and at times unknowing persons. As it stands today, the individuals on this hidden network use a variety of stealth and energy based technologies to remotely violate privacy , exploit their victims but also the network is involved in the wireless sale of access to children and adults for viewership, ownership and predatism to persons on their secret network. This network is also involved in other organized criminal activities and crimes against government and businesses in the private sector. This hidden crime runs deep. The network of criminals has approached their activities contrastingly. Their standard of conduct is to seek out people that are vulnerable in some parameter of their life. Once selected, the victim is subjected to a life-changing conspiracy. They are often set up, groomed, harassed, traumatized and forced to live in depravity and then the organization proceeds with their transgressions. Though this crime is not well known today, it will be within the coming years. As recent new reports of government diplomats and personnel flood the internet, that have reported that they have been assaulted by directed energy, it is clear that the network has expanded their criminal interest and even government actors are being targeted for wireless and aggravated crimes by technology. This book seeks to explore the network, its organization, and activities. Based on the accounts of victims, research and reports, this book discusses a hidden threat from the perspectives of its hidden victims from a less technical perspective. To date, there is little accurate information about this hidden crime, though, for decades, the network has operated underground. Every year, countless lives are lost either to suicide or murder, crimes that are covered by this network. For those victims that remain alive, many are driven to mental instability as a direct result of the constant harassment, abuse and terror they are made to endure – an unthinkable tragedy yet one very real and happening around us at present. But it is the crimes that are undocumented that government and its workers, should be concerned about. The use of wireless technology gives the network the ability to intrude on any government agency, foreign or domestic , individual, home or business leaving all at risk of being at the receiving end of a crime that currently is not being policed by law enforcement. Unless someone speaks up about this crime, it will continue unabated and more lives will be ruined unnecessarily. It is important that this crime is no longer a secret that is portrayed as claims by persons that a mentally unstable, and in leu of recent reports from government
Page 10 of 69 personnel that have boldly shared their experiences being violated by energy based technologies, it is apparent that this crime is now growing and its victim base continues to increase. There are thousands of victims of this hidden crime, particularly children and women but men as well. They cannot go to the police, cannot protect themselves, and are living in the most deplorable and inhuman circumstances. Though many of these victims are longtime victims , the reality is that their circumstances could easily be that of any individual that this network elects to begin violating. This high-tech crime is like nothing you have ever heard about but certainly a public safety threat that could make its way to your front door.
Page 11 of 69 Chapter 1 – Hidden High-Tech Crime Network There exist many unlawful activities in this world that have remained hidden from the public eye. Crimes such as the Ariel Castro kidnappings and Epstein private Island logs offer us just a mere hint of the vast underground dealings and interconnected criminal world involving crimes against women and children. Often such crimes are kept hidden from the public even when they occur within our own communities; others are concealed by the corrupt and the powerful. There remains countless other hidden underground crimes that occur that have yet to be exposed. One , nameless network and hidden network stands out in its prolific use of advanced technologies to engage in the violation of people wirelessly and undetected. It is a network that engages in a variety of organized crimes and crimes that threaten public safety and national security, most recently, the network has initiated crimes against government actors using the same wireless energy based technologies they have violated their victims with secretly for decades. Though these wireless crimes appear to be new, they are anything but that. For decades the network has managed a wireless crime network that has evolved , where its members seek out and prey upon the most vulnerable in our population, children and women using innovative technologies violating their victims in their homes, as they go thru their days, work, while driving and attending school. Their criminal operations are not like any you might have heard of. As our society becomes increasingly digitalized, becoming dominated by computers, wireless communication, and data , the network has clandestinely expanded its tendrils ever deeper into our daily existence, all-pervading in its reach towards undermining our human, legal, and privacy rights. Similarly to how pedophile and sex trafficking rings manage their black-market human rights abuses, this hidden and wireless network of criminals has adopted methods that allow them to
Page 12 of 69 engage in their large scale human rights abuses discreetly. The means through which this network operates are substantially more advanced. Whereas other hidden crime networks operate through decentralized and encrypted networks of private servers, this network has incorporated the use of sophisticated means and less well-known technologies. The use of advanced technology has incentivized these anonymous individuals on the network to engage in more sinister, ongoing, and sadistic crimes. The use of wireless technology has given this network capabilities and more avenues to violate the individual more aggressively and for long durations of time with minimal risks. This crime has been concealed both negligently and at times fraudulently by individual law enforcement actors from coast to coast. Attempts made to report the crime have been met with lawlessness. It is time that this crime be acknowledged and made a priority . As a direct result of the failure to acknowledge this aspect of high-tech and violent crimes, technology is actively being used as a black-market weapon by a dangerous network of individuals that maintain an operation that extends from one coast to the other. Rather than the technology being used for communication and data transmissions, for quite some time it has been used by the network for gang crimes, organized crimes, perverse and predatory violent remote crimes and now crimes against government officials. The use of advanced technology has incentivized the anonymous individuals responsible for the commission of thousands secret of crimes against children and adults daily, and the ruined lives of victims that have spent years living while being terrorized and with restricted liberties. The network has weaponized energy based technologies. Many readers may well be aware of the infamous Silk Road. For years, this network served to facilitate criminals and their clients in their activity to solicit murders, traffic narcotics, sell child pornography and weapons as well as coordinate acts of terrorism. By making use of computers
Page 13 of 69 with layered encryption and cryptocurrency, their activity remained untraceable and unknown to much of the common public. However, Silk Roads suffered a huge blow when law enforcement was finally able to identify and apprehend its founder. Known under the moniker Dread Pirate Roberts, Ross William Ulbricht was convicted by the US court in 2015 and sentenced to double life sentences plus 40 years without the possibility of parole. Justice was served. Silk Roads is just one of the many hidden networks that exist in our society that has transcended out of cyberspace and made impacts outside the digital realm. The high-tech crime network and its criminal organization, while vaguely similar, is by many characteristics, drastically different. The network is involved in wireless crimes, and like most other criminal organizations, it can be presumed given the technological advancements at their disposal that they are also involved in the narcotics trade, international and traditional human trafficking. According to reports of many victims , this network is actively involved in a variety of wireless sex crimes against children and adults, peonage, black market gaming and gambling, conspiracies to murder, murders, race, class and gender-based conspiracies, high-tech gang activities, blackmail, theft of information, privacy violations, schemes, scams, fraud, white-collar crimes like insider trading, weapons dealing, murder for hire, and for quite some time this network has carried out crimes in the high-tech parameter monopolizing the use of their black-market technology for crimes outside of cyberspace. A lesser known part of their crimes involves the network carrying out individualized reoccurring acts of terrorization of its victims as they are living their lives, while broadcasting their crimes on an hidden and exclusive network for persons to watch victims and participant “paying to play” , along with coordinated acts of domestic terrorism – they have been pscyhologically abusing select victims and driving them to kill across the country, then covering it up by portraying the victims as mentally ill. What is more disturbing is a major part of their
Page 14 of 69 operation is dedicated to wireless human rights abuses, which has encouraged this book to be drafted. This is a crime that a network of individuals has carried out in a parameter that is both inside and outside of cyberspace. Utilizing technology that is significantly more advance than most would even be aware exist outside of research institutions, government and medicine, for quite some time a network has used progressive technologies for black market high-tech crime . This type of high tech crime has enabled the criminals to liberally carry out abuses, organized crimes and injustices, throughout this country and abroad, secretly. Their technology has added another element to the sex trade industry, human rights abuses culpability, high-tech crimes, risks for national security , mass violence and new form of domestic terrorism. Domestic terrorism where the terrorist are high tech, and instead of carrying out acts of violence themselves, they condition random individuals to kill at their request for their purposes. They subject victims to rigorous abuses over years that in many documented cases have successfully driven persons to carry out violence’s and other crimes. Until recent news reports involving White House personnel and government diplomats being assaulted by wireless energy based technologies, referenced as “direct energy weapons” was solely associated with mental health diagnoses rather than a hidden and high tech crime that actively threatens public safety. Now the Pentagon, Homeland Security , CIA, and FBI are reportedly making serious inquiries into crimes involving government actors that reported they sustained injuries and became ill after encounters with an unknown wireless technologies. But they do not appear to be looking in the correct direction, if at all. The acts committed against government personnel result from a homegrown high-tech, nameless domestic terrorist threat and their transnational operations abroad.
Page 15 of 69 Though the recent introduction to the use of wireless and energy based technologies for aggravated crimes appears to be new to government actors, it is anything but new to the hidden victims of the high-tech crime network located in nearly every state in the United States, and several countries aboard. The wireless crime is not to be taken with restraint. Government must be prepared to brace themselves because the network of high tech criminals does not take resistance for an answer and believes they are not to challenged or reported. In this crime, the criminals profit from many means but it is their wireless crimes against people, narcotics, gun trade, black market gambling and gaming and murder for hire amongst other criminal activities that should the focus . They have existed for decades, different generations of criminals and ever expanding network that is growing in numbers and diversifying its organization to ensure they can continue their operations. It appears this organization was once a white supremacist’s group, but has since expanded to include hackers, minority street criminals, child sex criminals, cartels, terrorist groups abroad, and gangs. They work separately and engage in crimes collectively. This unification has made the network more powerful and increased their numbers. They have a length criminal resume , one that has remained elusively concealed. According to one source, a longtime victim the network has been involved in secret assassins of people, race, class and gender based conspiracies, and surveillancing of government agencies. She has proof to supplement her claims that is undeniable. A photograph is truly worth a thousands words in the case of her claims. The criminals crimes are getting bolder and more flagrant , this may be due to problems within the network , and conflicts of criminal interest amongst the individuals that make up the network, or possibly recent developments in the area of neurotechnology, wireless communication
Page 16 of 69 technology and science and a risk for them being detected. It appears that the network, that has remained hidden for decades now has strategically decided that before they are investigated they are exposing themselves first. Or their acts may a bougie , to draw attention and resources in the direction they want they to go, allowing the network to reestablish itself in another way. Government is likely to look to Russia or China or other countries for the source of the recent attacks, but allocating investigation resources solely outside of the United States given that there are thousands of United States Americans that have been living as victims of the network , would neglect the homegrown division and its victims that are living while its members violate, exploit and assault them – daily. The network is a transnational group of criminals and they have divisions across the world, persons that are also violating individuals and government in other countries. Victims have stated that the network practice is to misdirect and misinform law enforcement , so it is hoped that they will be prepared. But without accurate knowledge about the network and their strategic ways of managing a wireless crime network, how can they be? The wireless networks members are prepared to wage a high-tech war that the United States government is ill prepared for, and given the way reports of this wireless crime have been managed by law enforcement , truly this problem is going to get much worse if not addressed appropriately. The bad news is, the criminals have already started , they have just done so quietly thru discreet acts of high tech domestic terrorism and a class of secret crimes that are so invasive that they render the individual helpless. Law enforcement officers, policy makers, judges , their families and children are not safe. No one is off limits. The networks technology permits them to have access to any person , any place, any technology, any environment, any vehicle, and most importantly as it relates to warfare – any government missal, plane, weapon or
Page 17 of 69 device – without ever stepping foot within a thousand mile radius. The network is not a friendly gathering of people on network using technologies as weapons for solely advanced “peeping tom” activities, watching people as they go about their daily lives and broadcasting random persons on a hidden network for profit, on the network narcotics, guns, access to children and adults is sold wirelessly, right under the noses of government and the American people. The use of energy for crimes has been long disregarded as trumped up stories developed by mentally unstable persons. Yet, recent news accounts featuring statements made by government personnel reveal that wireless energy based attacks impacted their brain function, health, breathing, coordination, and caused extreme pain using non-visible energy. It appears that the “unknown source” using the wireless technology and the secret organization that has represented itself to victims during their crimes as “government agencies” , and left many government actors in a state of confusion and questions about the mental states of reportees that believe government is responsible for the crimes enacted upon them, is targeting government agents now. The network has pit its victims and government against each other in a brilliant scheme developed to ensure their crimes remain hidden. If government thinks victims of potentially the most dangerous crime in history are mentally unstable and victims think the horrible crimes committed against them are carried out by government , there exists a conflict. Victims do not report it, and law enforcement ignores victims when they attempted to. The criminals remain unaddressed. Victims that have reported their experiences over many years , state the horrors they have suffered thru are exponentially worse than those recently documented in the news from government persons. The anonymous victims contacted have shared stories that all involve constant, relentless, wireless and aggravated physical and sexual assault paired with wireless
Page 18 of 69 harassment, psychological abuse and actual conspiracies structured as “games” played by the patrons on the network using unwilling persons. Though victims do not view the acts of crime and abuse impressed upon them as “games”, apparently the members of the wireless network have inducted its victims into a for profit racketing circuit where its members use victims for sport exploitation, interchangeably. Victims state they are treated as property, where its members have been heard making wagers, and bidding on outcomes that its multi-user network of persons competitively arrange in the lives of victims, while watching as they are just trying to live their lives. The crimes according to victims are exhausting, debilitating , traumatic , pscyhologically abusive, menacing and inescapable. How does one escape energy based technology that is non-visible? Exactly. Which is why victims need law enforcement and government intervention, or else they simply die victims. The wireless criminals technologies can see , hear, interact, and they have black market and non-invasive neurotechnology. Though you may be reluctant to accept that a criminal and dangerous group of predators has access to technologies which they have been using to violate anyone – to access ones criminals to not only carry out major privacy violations but psychological abuse and victimizations that stem from such activities. Such advance technologies utilized on unsuspected persons is dangerous and though you may be unaware of it, it has also had deadly consequences for victims, secretly. This is their most dangerous weapon, and much like the technology they are using to carry out wireless energy based assaults, the use of this relative progressive wireless and non-invasive neurotechnology has increased their criminal capabilities and their abilities to engage in human rights abuses in ways that are detrimental to its victims.
Page 19 of 69 The networks neurotechnologies can impact brain function and can cause aggression, depression, panic, anxiety, drug use , hypersexual activity, amnesia , perversion, along with suicidal ideation and propensity for violence – and they have. It allows them to trigger states that are uncontrollable, impacting neurotransmitters, cognitive functions, memory and emotional states , without awareness of such violations. They can impact victims while they are awake or sleeping soundly within their homes. Supplementing the use of their wireless technologies for aggravated offenses, has aided the network is arming themselves with not only technologies that have aided them in the commission of their large scale crimes, but also the application of advance psychological practices that when used together can cause significant harm to the individual and others . Regardless of what professionals in the field say about the existence or non-existence of such developments that are wireless and non-invasive, consider that the criminals are running a hidden crime operation and they have many technological assets that have aided them in not only hiding their existence , technologies and activities, but to carry out crimes in ways that present no risk. It unlikely that researchers and scientist would have the knowledge about a criminal enterprise unless they worked for them. Ultimately, technology is only as limited as the persons that can take their ideas and bring them to life, which this network has certainly done. Where as research institutions are limited by red tape and funding in the areas of development of brain technologies and wireless systems , the criminal network does not have such problems and therefore have sped past government and the private sector and are using technological developments that published journal articles from prestige’s institutions claim they just invented , or will not be possible for years to come for secret crimes against individuals and government . Advanced black market brain technologies have given the network an unmeasurable advantage
Page 20 of 69 in their crimes to carry out the violation of ones neurorights – anyone , anytime, anyplace. Before , you become a skeptic , know that it is doubted that a hidden criminal network and its activities would be known, if they are hidden. The criminals use of wireless technology to watch, listen, assault, communicate and to access all technologies utilizing any form of electromagnetic energy in their environment at will, is only the surface of their abilities. With the use of other technologies this network not only abuses, sets up, traumatized, and conspires. With developed that are wireless and enable access to not just ones environment but ones brain, well – there is nothing they cannot do. It is up to law enforcement to take a special interest in this level of crime – as its continued growth and expansion could mean terror on a much larger scale. The network is established and has managed its organization so well that for decades their activities have been mystified and casted as conspiracy theories, not by accident by design. But the secret murders they been responsible for and covered up are real, along with the victims that died in mass shootings carried out by persons that lived as victims of this hidden crime and the families that lost loved ones unnecessarily and the mourning each act of violence directly related to this hidden crime puts our country in. In a documentary aired by 60 Minute in 2019 Diplomat Catherine Warner reported she was assaulted by wireless technology, also deemed “Havana Syndrome” while on assignment in Asia. She described her experiences being assaulted by the wireless technology providing details about hearing sounds inside of her head . During her interview she stated she woke up “with headaches every day, woke up tired every day and the symptoms grew worse daily”. She described oscillating pressure and pain during the attack. She highlighted that others diplomats
Page 21 of 69 had experienced hearing loss, and other impairments due to the use of wireless technologies in separate incidences and countries. Warner was simply doing her job for her country and she was attacked by wireless technology. Though most would like to attribute what occurred to international threats solely, what is known is that in the United States for decades individuals have reported that they are forced to live while they are beamed by some unknown energy based technology daily. Often victims are not permitted to report the occurrences to law enforcement by law enforcement that countless victims have reported threaten their freedom , threaten them with commitment or begin a pattern of abuse that discouraged future attempts. Victims contacted for commentary about such experiences , agreed that they experienced the same outcomes. It would reasonable to suspect that the sources of the attacks to victims are domestic in nature, given that many of these victims have been reporting such acts for decades. Recently attacks on government were suspected to have been derived from international governments, and though that it a slim possibility , it is more likely that the network or one of its many subsidy’s is the culprit. The United States has its own high-tech domestic crime network and they have been using wireless technology for crimes against children and adults 365 days a years, from coast to coast and thousands of individuals are living while being subjected to wireless experiences far more violent and predatory than that of Warner and other government personnel daily, for some 24 hours a day. Our home grown problem is certainly not to be overlooked rather explored, inquires made, investigations initiated and action taken. Victims of this hidden crime like Warner were just trying to live their lives, and were preyed upon. Except victims of this crime have no platform, no connections to government or its resources. They are parents, workers, children, seniors, young adults, and individuals that have
Page 22 of 69 no way to speak out. Many have expressed that they have made attempts , but given the networks advantages all attempts are Without a full understanding of the practices used by the network it would be impossible to understand the complete array of abilities the network has adopted for crime. It is time that it is understood, if the crime is ever to be addressed legally . In this crime a single act of wireless violence will almost always evolve to the an individual being subjected to aggressive wireless crimes and surveillances to ensure they do not report the encounters they experienced with the criminals or continue after the report is made, if it is successful. The crimes according to victims is one that one can expect to learn to live with and will include wireless aggravated assault by energy that burns, brands, and penetrates the body (sexual organs , heart, lungs, breast, private areas, kidneys etc) and brain assaults, causing varying levels of pain, headaches, blackouts, impacts to memory, and all other cognitive functions, wireless harassment twenty four hours a day (by individuals that use stealthy wireless sound transmission to transmit their audio thru ambient for as part of their psychological abuse the anonymous persons subject persons to anonymous individuals screaming profanities, racial slurs, berating statements, threats of harm of family or friends, perverted leading commentary, persecuting and menacing chanting while showering, driving, sleeping, they can transmit while eavesdropping anywhere a person travels , cause sleep deprivation and other criminal acts. Victims state that the network has enough anonymous criminals logged on to subject persons to reoccurring abuses all day. Those victims perceived as problematic are abused more frequently then others. It can be suspected that this is why major of victims do not make attempts to report the crime , especially if they have children or do not to encounter situations that they cannot financially or socially take on.
Page 23 of 69 The network is actively violating children and adults across the country and no one is doing a damn thing about it. Recently, Senators from several states appear to be putting pressure on the Biden Administration to find out what and who is responsible for the mysterious attack on government officials, according to a CNN report. The source of the problem is what this book is about. Lets hope that government officials grasp the seriousness of their recent attacks and makes the proper inquires. Many victims have longed believed that government agencies, countries like Russia and China among others have been responsible for the use of wireless technology for various long term abuses and heinous crimes committed against them by way of wireless technologies. Though such countries may own technologies that enable energy to be transmit wireless energy, the crimes carried out against victims in the United States is the result of a transnational high tech criminal network of criminals that resides in the United States. Reports of government personnel being assaulted has breath contradictions into past suspicions. Hidden victims of the hidden network long believed that the energy attacks they have suffered from over years was the result of government projects but it is revealed only now to be an attack against government, its personnel and the constituents in which they serve. Law enforcement and policy makers should be concerned , this network is ruthless and they have done far worse than cause headaches, nausea and oscillating pressure in ones head – they run a wireless child sex ring and adult exploitation ring, where people on the network pay to take part in using the wireless technology to violate child and adults in their homes, as they drive, walk, fly, inside , outside, and even in the air. The human rights abuses and related criminal activities of the hidden high-tech network requires exploration and investigation. The crimes committed and the methods employed on this network
Page 24 of 69 are of a different nature – more sinister yet more discreet, intrusive, violent and long term. They have no risk of being identified and no legal motivation to stop their crimes so they simply continue them secretly. Criminals rarely stop committing crimes without law enforcement intervention. Unless the anonymous criminals operating on the network are made to do so. Though hacking is the most familiar computer-based crime today, the network is not exclusively involved in computer intrusion. The network engages in both cybercrimes and crimes outside of cyberspace – offline, in our communities, violating people within their homes and outside of them, using interactive wireless technology. They never have to step foot in your environment. With complete freedom and virtually no risk, the network is actively maintaining a wireless black market business that profits from selling access to children and adults, and now the commission of crimes against government and its personnel, as they remain in their own environments. With progressive technology that many of us would only think of existing in fiction, this network can accomplish criminal feats that few can imagine even to be possible today – using technology. Their advanced technology has removed the limitations that once confined criminals to cyberspace. Their black market technologies have enabled them to carry out crimes offline using digital processes. Using technology that is wireless, long-range, and interactive, the nameless criminals engage in acts to violate privacy, assault, traumatize, oppress, and harass remotely. Their technology is not limited and is instead limitless. It has helped this network to remain elusive freely attacking and watching unsuspecting persons, children specifically that are defenseless and have no way of escaping or protecting their physical persons. With the wireless technology , the network can cause loss of life, and stage it so that it appears like it was natural causes or random external circumstances, wirelessly. Government personnel experiences sicknesses and disabilities was a
Page 25 of 69 prelude to what the network can really do. Longtime victims reported that they were healthy before the network begin their abuses, following which they developed major and minor health problems with their hearts, lungs, thyroid, headaches, cancers, digestive problems, breathing problems, blood clotting issues, some have had strokes and heart attacks, others report living exhausted daily, being made to feel drained and tired . But there is a part of the crime that is not known to government, victims of it have been sharing photographs of laser like brandings and marking that have been left on the faces and bodies of the child and adult victims. These markings are made by the wireless criminals, used to catalogue, communicate about, and humiliate the victim. At first glance if not identified these laser like marks below the dermis might be overlooked as “normal” scarring , but photos of victims with different filters, best when taken with a forensic UV camera, reveal letters, numbers, words, shapes , designs, racial emblems , and messages left by the criminals for others on the network to view . This crime is not simply abusive for some it has been deadly. Though hacking is the most familiar computer-based crime today, the network is not exclusively involved in computer intrusion. Its members have a number of older and young hackers that are involved in regularly accessing government computers, personal computers, planting evidence, stealing information, setting people up, tapping cellphones, and other technological crimes more than likely the network is using methods that model practices notably used by government agencies in the past. These practices include using radio wave and frequency transmission ( forms of wireless power) rather than traditional hacking methods. RF is acclaimed for its ability to gain access to nearly any form of technology without requiring passwords or being detected. But they may be using other wireless energy means in combination with RF.
Page 26 of 69 According to victims of this crime, the network engages in both cybercrimes and crimes outside of cyberspace – offline, in our communities, violating people within their homes and outside of them, using interactive wireless technology. They do not need to gain access to a person's computer or other devices to gain access to one's private lives or homes. This is not that type of crime. This crime is more of a threat.The criminals never enter the environment of their victim physically. The network has adopted technology that enables them to use some forms of energy-based systems that do not require wires, connections, or for devices to be present within the environment of their victim. Interest in their child and adult victims lies not in simple data theft but wireless in-home and environmental exploitation and major privacy violations. The network's members have been running a wireless exploitation network that profits from inhumane crimes to include torture, selling access to children and adults for wireless sexual exploitation, conspiracies, hits, oppression of groups based on race, class and gender, live murders, keeping victims are pets wirelessly and over years, schemes , scams, frauds, frameups, competitive victimization, depriving their victims of their liberties etc. But this is only the surface of their activities. The persons that make up this network never physically enter the environment of their victim, nor do they have to. Wireless and energy based technology has equipped them with the ability to interact, communicate, and abuse remotely. The network is interested in treating their victims like property rather than people. Thus, far they have done just that for decades secretly. Secretly they have maintained a group of persons in which they have violated concurrently , some of which state the crimes begin when they were minors , and have extended into their adulthood. Quite a long stretch of time to spend being abused. But with a crime that people do not yet know exist, a victim with limited resources , and still maintaining the responsibility of sustaining their lives thru work , paying bills and trying to keep some form
Page 27 of 69 of normalcy and sanity, as a band predators invade their spaces and bodies liberally without any escape, defense or ability to speak out – these crimes have simple just gone on. It should not be surprising now that reports of the use of wireless technology have been made by persons deemed credible sources. For lack of any other word , victims are actively being held hostages by wireless criminals and they can do nothing about it . But government officials and law enforcement can. The real question is will they? Will they ignore the hidden victims that have lived in homeless circumstances? The children that are actively spending their childhood being subjected to aggravated wireless assaults, being touched by energy, being violated as they sleep, and trying to discovered the world. This is not the world that they should be suffering. Victims can not just leave a circumstance where a gang of wireless offenders are transmitting thru the air every place they frequent. Over time the network impacts their lives, isolates them to ensure they keep the contained and limited so that they are in states where the crimes can continue and persons will not speak out , physical health declines, and mental states crumble due to reoccurring violence and abuses. One of the most bizarre aspect of the networks human rights abuses is that victims have reported that not only do various persons on the network stake ownership over them, referring to them as their property and multiple victims state it appears that the technology is being used for voyeurism of them in their homes and as they go thru their day and the individuals with access to the network use wireless technology that can transmit sound, eavesdrop, and assault them with a stealth beam. Victims state that on the network persons collect and select from child and adult victims to buy time and access to direct the technologies violating them, to interact with the victim, set up situations, and hazards as the persons watch and cheer in the most extreme cases
Page 28 of 69 (sound is transmitted thru ambient air and is audible) . They state they are being broadcasted , for all persons logged in to view and watch their private lives. Chapter 2: Red Rooms on the Dark Web There are aspects of the network’s crimes that correlate with the convoluted digital domain that is the Dark Web . The Dark Web is the underground realm of the internet that offers pedophiles, predators of all sorts criminals - gang members , street criminals, computer criminals, extremists groups, and organized criminals a place to cohort and do business in a sphere that offers privacy and complete anonymity. Money and information is exchanged. People are protected by virtual networks that do not allow tracing and IP identification. Individuals are able to safely trade guns, stolen credit card numbers, social security numbers, narcotics, children and women, and even access to voyeuristic shows. The high-tech sex trade business is extremely profitable. But not all aspects of it are known. Offline people are trade , drop off locations exchanged and even voyeuristic access can be tapped into if you know where to look, or have an associate that can provide you access. Utilizing TOR web browsers and VPNs that anonymize the user allowing individuals to access .onion sites that are not available on the regular web. Computers are connected by private servers, and most of the people that cohort there are often not seeking out free published journals articles. They are not there for interest in freedom of expression. Many of them are there to seek out illegal activities, that is black market business. The “Hidden Wiki” offers a snapshot of the outlawed black market operations available on the Dark Web. There is however an even darker side to it, that is deep within the Dark Web there lies a lesser known faction called, “Red Rooms”. Many people believe that Red Rooms are simply a dark web legend that may not exist at all. However, Peter Scully, a pedophile that hosted a Red Room “Pay for Preview” site in the Philippines, carried out a less sophisticated ,
Page 29 of 69 yet the closest related crime to that of this wireless criminal network’s black market live broadcasting for profit business. He is now doing life in prison. If you are familiar with “Red Rooms “ you already know that they are not places for the faint of heart, but instead are a mecca for individuals that have detestable interest. It should be no surprise that according to several published sources that these dark web rooms are generally highly guarded and only a few are given access to enter. For those that do enter , they do so at a cost. They are “Pay for View” torture sites. These rooms model legal cam shows that advertisements populate for, where men and women are employees of the sex industry and their business is selling sex online by live broadcast, though legally. Red Rooms are illegal and generally the persons being broadcasted either are captives, minor or unwilling. Red Rooms, cater to a different audience , persons that are willing to pay to fulfill their perversion . According to reports these rooms do not stream movies instead they stream real life, live action broadcast , voyeuristic and inhumane crimes, sex crimes, violence, schemes, pranks, violence against children and women, brutality, torture of persons held captive, showing persons being humiliated and have included murder on live stream. Peter Scully, a pedophile in the Philippines established a Red Room site on the Dark Web, where pedophiles paid him up to $10,000 to torture and abuse a baby girl. In an article published online, it was reported that in one of Scully’s live streams a baby girl was tied up and beaten by Scully and a masked woman. They were tracked down by law enforcement , and Scully was sentenced to life and is currently in prison today. People like Scully are only a fraction of the persons that access these sites, many of them are young, college, research students, hackers and others that seek out these environments gaining access to the criminal underworld to watch such activities.
Page 30 of 69 Regular people , criminals, gangs , groups and many wealthy persons seeking out deviant sexual experiences involving infants , children and girls , boys, men and women make up these Red Rooms audiences according to reports online. Secrecy amongst those that frequent the highly illegal environments is maintained to protect the persons that access, and many an unaware that these environments exist outside of those with access. People pay to play for voyeuristic experiences they deem as entertainment involving the dehumanization of a living and unwilling person . For them, this is amusement giving them entertainment that fills their daily lives. For the rest of us this is sick, criminal and illegal behavior that needs to be addressed. Generally access is streamed and live, and the viewers pay in cryptocurrency to instruct the captor to carry out acts as they watch. The most disturbing piece is that in these rooms , reportedly anything goes if you have the money to cover the request. The Dark Web appears to play a huge role in how the hidden network has structured the live broadcast profiteering aspect of its crimes and where they may have recruited persons they employ to work on their network , and how they are now profiting on a larger scale from their criminal activities. It is suspected that the crimes committed by the individuals on this hidden network involve the use of wireless energy and power technology or directed energy used outside of the internet what is known is that the use of energy based systems that have long range capabilities are allowing anonymous criminals to gain access to peoples homes, and other environments with and without their knowledge. The networks crimes occur in real time and are live. The network much like the internet is readily accessible to those with access sum 24 hours a day, and because the persons behind the technology can gain access to homes across the country and world, victims are in abundance. Whether watching government, children, women – the network technology can access any environment. The other element of the networks hidden
Page 31 of 69 crimes is that the hidden network utilization of wireless energy gives the network the ability to not simply interact, but to engage in aggravated physical and sexual assault remotely, when the anonymous criminals elect to they can even transmit their audio establishing two-way communication within the environments of the victims they violate. Victims have reported the networks members often attempt to frighten them, transmitting bizarre and ghostly sounds, following which the networks members often establish communication with them transmitting into their persons environments. Long term victims claim that they are threaten, warned, intimidated and by the anonymous criminals often who claim that if they report them they will be deemed mentally ill or they will be retaliated against. This often results in victims remaining silent to the detriment of its victims. Most state silence always leads to the network continuing to harassing them , and over time escalating their activities to aggravated wireless physical and sexual assault and other crimes. The black-market and high-tech crime has been disregarded, and often dismissed as a reports from delusional persons rather than individuals whos human rights are being actively violated over long periods of time secretly. For many of the victims of this hidden high-tech crime they feel that this network is not simply oppressing them without purpose, aside from racial, class and gender motives, their interest has turned to profit from their individual and ongoing victimization , dually as well as various conspiracies and “hits” where victims are targeting specifically at the request of persons that seek to harm them using the persons on this network. It must be considered that given that the network , though wireless is an organized criminal network and technology has not limited traditional organized criminal abilities, it has instead supported other forms of crimes with identical impacts and those far worse than those associated
Page 32 of 69 with organized crime groups. Whether murder, intimidation, oppression, terror, theft, or assault, the network appears to do it all. Reports from victims state that at points during their crimes, hundreds of anonymous individuals were heard as they communicated in their environments wirelessly or within earshot in ambient air. Given that the victims that made the claims have no direct connections and describe identical experiences , and the photographic proof obtained could only be possible by way of technology. The descriptions provided by victims aligns with that of traditional Red Rooms formats, like the one ran by Peter Scully. Some report the criminals have spent decades taunting, berating, and pscyhologically abusing them by subjecting them to repetitive and obscene, harassment, chanting , laughter, manipulations, “punishment’s” that is menacing and interferes with their lives daily. Many victims state that they have been threaten along with their families and were forced to remain silent in the beginning of the networks exposing their organization, and by the time they mustered up the courage to speak out the network had already established themselves in their lives and carried out life altering and traumatizing crimes , conspiracies and set up events to discredit them or portray them as mentally unstable so that they ensure they remain oppressed. The victims are therefore forced to live as they endure daily abuses and they are “punished” by aggravated torture by some form of energy weapon that is not visible to the naked eye. Victims have reported they are sodomized, teeth are decayed, faces are branded and burned, internal organs are penetrated, their hair is burned out, and over time their health is impacted causing debilitating health issues , for victims have resulted in permanent disabilities and death. It is clear that their stories differ from persons that have natural mental health issues. Some victims have even captured photographic evidence of areas of their bodies that clearly have been branded by wireless technology, in some cases more extreme abuses have been captured, such as lacerations,
Page 33 of 69 varying degree of burns, area marked with X’s that are circle, to identify areas of assault, and video where as they are asleep within their own homes they are being subjected to aggravated assault. Female victims have described experiences where they have woke up , and their vaginal areas and rectums were in pain due to the assault. Victims agreed that if they acknowledge the networks crimes to others, attempt to report them or make any effort to get the network addressed that often individual law enforcement officers intimidate them, respond completely with threatening behaviors, even in some cases have attempted to detain or arrest them for speaking about the network. Victims state reports are often not taken and the experiences are so terrifying that they are deterred from making future attempts. Victims state that the networks members have unlimited access to their homes, personal information, families , and has developed well thought out schemes that have entrapped them in circumstances that they are not prepared or capable of addressing without legal assistance. So for now they are living with limited freedom while being terrorized daily by wireless criminals that find new ways to torment them daily. Except this network, appears to broadcast the terror victims are subjected to on a live stream and hidden network where its members congregated to take part in what the anonymous persons view as sport and apparently given the length of time this crime has going on – legal. If this class of hidden victims speak up, they are branded as mentally ill by law enforcement and medical professionals that have taken this crime and its networks activities dismissingly and failed to understand that allowing this crime to simple exist has put them and their children and homes at risk at well. As a safeguard to their activities this network has characterized victims of their crimes as mentally unstable persons and with the assistance of individual law enforcement
Page 34 of 69 across the country in states where victims are located to prevent documentation and reporting the network crimes. Meanwhile, the victims of the hidden crime are being sold and traded like digital assets on a wireless market that has been collecting people as property in the United States. Not only is this crime innovatively carried out, it is one in which is inescapable. The crime is carried out as persons are living and wireless technology is the catalyst that has permitted access to the homes, and the children within them. Victims account that the members of the hidden network have made statements regarding the sale of access to them and the violation of their children, for exploitation and abuses , remotely. Reports include the members of this network referring to victims as “cows”, “chattel”, “cars”, “pets” and “property”. The network continues to profit daily. But sport and sadistic amusement is only part of the networks objectives. For some victims, the network preys on them due to their race, class, gender, age, sexual preference, personal dislike, career objectives, family ties, political, government and business ties. With crimes involving crimes that have access nationwide , and are not limited by locality or distance, and no policing agency to regulate this level of high-tech crime, its members are free to kill, assault, abuse, oppress, scam, exploit, terrorize, mentally abuse, torture and deprive its victims of access to liberties , at will. And this is exactly what they have done, both while their victims are living from day to day, and many of their crimes occur as persons are unaware, in their own beds and homes – the network indiscriminately using its technology to carry out perverse crimes , using its wireless technology. The high-tech criminal network crimes have attributes consistent with what is known of Red Room live broadcast streaming on the Dark Web. Except for victims of this crime, they are not held captive and are not removed from their environment but live while a live stream situation
Page 35 of 69 exists. The use of wireless energy, microwave, or aerial radio wave technologies or other means, that have long range capabilities when modified transmission from coast to coast is possible , or some other derivative is more than likely the source of this networks ability to remotely gain access to their victims from long ranges. Whichever means this network is using, it certainly is not limited to accessing ones computer or cell phone and instead involves wireless means of intruding upon the homes , and environments of individuals, specifically children, and anyone this network elects to prey upon. Victims report being tortured, subjected to aggravated physical and sexual violence, penetrated, branded, being subjected to black market games, forced to comply , unable to see the persons violating them but when they enable their sound, the networks members freely communicate using wireless technology. If victims speak up – this network counteracts their reports by using law enforcement or medical professionals that appear to willing and at times knowingly aid this network believe the schemes they used, where victims are portrayed in negative lights. According to victims it has become clear that frequently many law enforcement or medical professionals are not simply acting out of ignorance but are convinced to act and interfere with the victims ability to report its activities, aiding the networks attempts to silence the reportee. Hundreds of victims report that the networks members electively turn on audio while engaging in their crimes, audio that others claim not to hear. It should no surprise witnesses would be fearful about admitting or acknowledging the wireless criminals activities , observing laser like burns on the faces and bodies used to mark victims seem to easily convince the boldest individual to remain silent, about the wireless terrorists. In Urban culture the network has been spoken about in ways that are intimidating. The network is called “ The New World Order”, or “Illuminate”, but they are instead a domestic terrorist
Page 36 of 69 organization . The network appears to have adopted the name of the ancient order for the purpose of intimidation. People fear acknowledging the network. Similarly to offline organized criminal pressuring’s , the network has established a reputation as being an organization that is not to be opposed. Enduring such invasions of ones life is described by victims as “their lives being held hostage every day”., except they still maintain the same responsibilities as persons not being violated. They are still responsible for maintaining their lives, and all necessary needs, the added stress of the crime is stated to be overwhelming. Victims are forced to adapt , to remain calm, to ignore the pain, the verbal and obscene abuses, and the offensive ways in which they are being forced to live. Several victims have correlated the intrusions similar to the way in which bees swarm to explain the magnitude of the abuse , specifically in situations where the victim is potentially problematic and might report their activities. The network has enough people and often looks to persons from low socioeconomic status, hackers, gangs, students and young professionals, in which appear to be eager to part in the revolting crime. As described by victims, the networks multiuser systems involves dozens of persons logging on simultaneously , but there could hundreds, each group has plays a specific role , whether it be to manage victims, prevent interruptions, damage control, diversions, etc. Many victims of this crime report that they are now on disability, after years of attempting to report the network and a refusal from law enforcement to aid them, they admit being driven to states where work is restricted by the criminals, their finances are drained from trying to liberate themselves and therefore they now rely on the system. Nearly all state they would love to be able to live in peace, to work and provide for themselves but the network wont allow them to do so.
Page 37 of 69 Instead they are forcing them to remain isolated, and are removed from society, and therefore live with restricted liberties. Instead of being in a hidden location, with an abducted victim as most Red Room live broadcast are set up, the use of technology has enabled the networks members to subject victims to crimes in their own environments. Victims have reported that their cars have been set on fire, car accidents have been arranged , conflicts involving victims being attacked or followed are common. The pain victims describe is certain conveyed by them is certainly real. Which clarifies the branding observed on the faces and bodies of nearly all victims of this hidden crime , going back decades. Victims report being humiliated, forced to live in deplorable circumstances concurrently. Profitability for this crime would be infinite gains for the right audience. BDSM, pedophiles, voyeurs, sadomachoistic are adequate audiences. This not a low-level crime, though its criminals are. This is well thought-out , designed and executed by a multi-person criminal operation that is operating in the United States and also abroad. Undoubted narcotics and weapons play a significant role in the success of the network thus far, and the money and power behind its success. Where as Red Rooms on the Dark Web offer simple viewership and the ability for the participants to make requests related to torture for payment simply watching as their requested are filled, in this crime wireless energy is utilized, and allows the individuals on this network to take part in the abuses using computers , possibly a innovative haptic system that allows a life like interactive experience, and use wireless communication systems and other technologies that permit them do much more than simply beam energy. Regardless , if they are using wireless power systems or radio broadband systems that transmits thru free space, or microwave energy as was reported by recognized news reports, the crimes they are involved in give its members
Page 38 of 69 complete freedom , and all persons, child and adult, and all crimes are permitted. It is up to law enforcement to delve more into this crime and find out. The ease of the individuals on this network being able to portray their victims as mentally ill persons so that they can violate them and even driving the victims they violate to violence, and in some cases death, as they watch is a public safety problem and threat to national security. At any time, they could carry our crimes that impair, disable or murder persons that are responsible for carrying out government , military, or law enforcement functions, or citizens , on a mass level. This is more than simply a theory. It is not a coincidence that several mass shooters across the country claimed prior to their acts of violence that they were being violated by energy based technologies, and carried out violence as a direct result of the abuses they endured according the social media post, video logs left by several mass shooters. If this correlation is accurate, and it appears that it is, this network has been responsible for carrying out secret crimes, which involve conditioning and abusing persons and driving them to carry out a violent acts as they watch remotely , leaving no traces of their involvement and solely shifting the blame to the perceived preparator . Had the persons not documented their experiences before the tragic acts, there would be no record of what drove them to commit some of the most heinous acts of violence this country has ever witnessed. Victims of this crime claim that they are actively living in circumstances in which they are subjected to concurrent wireless abuses and harassment today. Red Room environments offer a different type of live broadcast experience, audiences seeking out experiences are more than simply taboo, they are criminal. Wireless access allows the criminals to intrude upon the privacy of environments discreetly, which for this crime is ideal for this networks barrage of criminal activities. It is possible this black-market activity has other
Page 39 of 69 motives. More detestable them just amusement. It know that though there are victims from all backgrounds , it appears those that are female , child and minority are treated far more inhumanely. The interest of the secret organization may also be derived from a practice that may believed was long extinct – “Human Hunting”. Approximately between 1849-1870 100 thousand Native Americans in California were slaughtered, raped and enslaved during what has been coined the “California Genocide”. White males hunted the Native Americas seeking the “cleanse” the area according to Los Angles Times (2016) article titled, “Its time acknowledge the Genocide of California” . The state endorsed the genocide, along with newspapers, law enforcement and political officials. Though the barbaric practice seems long ago, it has been revived in the wireless networks crimes. It is apparent that the network has taken aspects of “human hunting” and incorporated into their crime as a sport that involves its members “stalking” , “entrapping”, “imprisoning”, and “capturing” their victims within the restrictions of their wireless crime. Victims describe that they are technically “chased” by the criminals, and instead of rifles such as those used in the for mentioned human hunting actions carried out in person over a century ago, they wield technologies that touch, and play psychological games using practices that are distressful, degrading, and dehumanizing , impacting many areas of the victims life. Wireless technologies have forced the individuals on the network to incorporate other means to reaching their goals but the outcomes are relatively the same. The network many not outright murder each victim they violate, and instead for them to live in what they describe as their own personal hells, they decay parts of their life so extremely they cause an effect that is similar death, in various areas of their life.
Page 40 of 69 Psychotheraputic practices such as hypnosis as persons are sleeping and behavior modification techniques, where the behaviors (often negative) in which the criminals seek to have victims elicit are rewarded, and good behaviors are punished, over time this brings about changes in behavior and even the most strongest of will persons eventually succumb to the networks abuses. With the use of technology that is instantly about to impact brain function, the network is able to cause its victims and random people (who are also victims) to carry out acts conflict with their moral standards, beliefs, religion, and free will. Both abilities are an invaluable asset to the network and make for amusing episodes of abuse that are exploited by the networks members and participants that have access to the networks system. Instead of using of guns to murder people, the network micromanages the lives of its victims, extinguished careers, allowing victims to work in only places they deem safe for their crimes, dreams, victims are not allowed to freely move forward with their career, education, relationship, relocation or health choices. Victims are conditioned to accept living within the confines of the networks abuses. Neurotechnology and secretly subjecting victims to hypnosis gives the network the ability to modulate brain function at will, decreasing production of certain chemicals in the brain that have impacts on thinking ability, decision making, memory, hyperactivity level, concentration, and energy levels limits potential and mobility in life. If you are a physician and suddenly your cannot remember what dosage for a specific persons height and weight, or names of various medications, then you cannot possibility practice successfully and therefore you might be inclined to leave the field. Thru the use of organized setup and frameups organized by the wireless criminals , that work in sync, and tactially, victims experiences situations that cannot possibly be prepared for or respond calming to due to the frequent nature of events the network sets up. Rather than a single event the network repeatedly arranges events daily that cause social
Page 41 of 69 , legal , and financial harm, thru abuse and violence they drive victims to states in which cause severe and long time impacts to their mental health, rending them completely stagnate. People are not emotionless beings, so it should not be outlandish that many victims experience shock, trauma, depression or demotivation, amongst other emotions. In this crime isolation is used a weapon. It allows the network to expose themselves freely , given that the only witness is the victim. They often confine young victims to their homes by secretly conditioning them to develop features of anxiety , social anxiety and agoraphobia. When the victim adopts the desired behaviors, and are alone its members carry out secret exploitation, using technology that can do much more to sexually and physically violate the victim in some cases. In others the network has advanced their crimes and actively violate the victim revealing its networks, members communicate and harass , they manipulate , frighten and threaten the victim , keeping them isolated and terrorizing them day and night. Victims are contained by being kept from socializing, limiting their ability to branch out . But their crimes go further than that. The network has a practice of intercepting attempts made by persons to establish a social relationship with the victim by using their technology to make disparaging comments, claiming they are untrustworthy, dishonest, or have other issues to keep persons at bay. All of this is done for the purpose of keep victims isolated so that its members can proceed with their activities, but helps to reduce witnesses, good samatarians that might report their activities to law enforcement. them so that its members have easy access to carry out crimes , and to prevent potential witnesses from observing and reporting the bizarre crimes they subject them to daily.
Page 42 of 69 But for those young and attractive women are girls, the network encourages elicit sexual activities and deviancies . Victims have reported that the network uses various schemes during their youth. Convincing many victims that they owe them a debt , and that in order to pay it off they have to “put on a good show”. Where they set them up and claim they are retaliating for something they arrange but the victim believes they are responsible for. Frequently , the network uses psychological conditions and other persuasions that manipulate the victim into engaging in sexual experiences that she would not otherwise seek to. The victim is called a “Lesbian”, “ a predator”, or the network introduces drugs thru social connections they set up. In traditional human trafficking it is well known that often traffickers force their sex slaves to take drugs. The network uses the same tactic, except they subject victims to pain and verbal abuse, and other mentally abusive acts, isolating them, and once they are at a place of desperation the network has already preselected an individual for the victim to meet , with the goal of either encouraging excessive drinking or elicit drug use. Due to the previous isolating state the network imposes on the victim, to ensure that they do not remain alone, victims have reported engaging in acts that they did not want to do because they did not want to be isolated by the criminals so they did what was necessary to ensure that did not happen. The live stream of these events appears to be viewable by its members that have aided a competitive and profitable component to their crime. This is tragic crime, truly a plague on our society that has stagnant it probably much more than it is realized. With such a technological advantage , it is no upraise the crime group has safety measures in place that have been implemented to protect a high-tech crime of this magnitude, given the risk for the criminals. Elaborate schemes that portray potential reportees as mentally ill persons has been adopted , orchestrated conspiracies that set up victims for criminality to discredit them, even setting
Page 43 of 69 victims up years or months before they begin their overt crimes, and even claims where the victims are portrayed as addicts, prostitutes, thieves and sex offenders is common in this crime. They are gaslighted , treated as if they are delusional, dismissed and as a result this crime has grown to a threat that even government agents cannot protect themselves from. What is next? It would be a rational assessment to state that given the seriousness and penalties of a crime of such a nature that devising methods and schemes that inadvertently disguise the crime in a manner that ensures the safety of its members, and patrons would require coordination and elaborate machinate. Cloaking victims by portraying them as mentally ill persons would be a relatively multi-purposed objective. It has allowed this network to commit crimes against persons in the wide open, risklessly. It must be emphasized that this network is not simply broadcasting live voyeuristic shows of victims they are holding wireless captives, persons that are in a peculiar state of involuntary servitude. Its members are selling access to their victims, without ever entering their homes, treating them as chattel and forcing them to remain silent or suffer the networks retaliation. Which far from comeuppance. The network has tried to make their crimes appear like acts of justice. But the torture of children and adults it not just, it is criminal. Victims are not displaced to remote locations in this crime. Whether law enforcement, government official or any person, can be sought out as a victim at any time. In the past, government has claimed to have no knowledge of the wireless crimes until recently, however, they surely would not want to be introduced to the uncensored crimes in which this network carries out against its hidden victims over time. Privacy is not a barrier instead with the networks technology, it is non-existent. Their technology allows complete violation of ones personal and digital privacy, secretly. It must be accepted and understood these violations are not
Page 44 of 69 limited to the homes of individuals, but those in government, government agencies, domestic and abroad. Like most predatory crimes, the profitability factor is all in the market. It is well known there is a market for persons that are interested in crimes against children, sadomasochism – BDSM, and other sexual fetishism , from coprophilia, water sports, etc. But for crimes against government, secrets about projects, investigations, personal information, private data, financial information , war plans, military weapons, under cover agents, their locations, families, and other government secrets , are quite valuable to other countries, criminal groups and terrorist seeking to cause harm on a mass level. The criminals operating on the network are anonymous, they could be anyone, anywhere and have any motive, from cause loss of lives of a mass level or simply murdering people for sport. These persons could be planning the next 9/11 or be seeking to cause harm to any government official when the opportunity presents. Nothing is stopping them. Victims have reported that this network uses their technology engage in aggravated physical and sexual assault of their private areas, and it is said amongst victims that this network appears to cater to persons that actively are participants in not simply exploitation but beaming their victims in their private areas, soiling them, sodomizing them, causing them to urinate involuntarily as well as utilizing their technology to violently penetrate their victim, specifically those that are female mutilating their vaginas . This must be known. These crimes are the extremist of actions to carry out, and given that the network liberally violates children, its members are surely carrying out such acts against minors. Dehumanization appears to be a large part of this networks crimes. They have an established network that is involved in sadistic crimes, but it must be remembered, that a network with a
Page 45 of 69 victim base that is spread out throughout the country and abroad is surely not solely involved in wireless exploitative crimes. There is always more. This network appears to be running its own version of “Red Rooms” except they are using wireless technology that allows them to make any child or adults home, and life a Red Room experience. The human rights abuses level of their crimes, gives insight into the networks propensity to engage in certain behaviors , and show that if ignored the network continues their activities. One could logically theorize , how such criminal activities could evolve given their current state today. Unlike the Dark Web Red Rooms, the use of technology allows actual touch experiences . For the pedophiles and predators with interest in child, having access to children without the risk associated with their heinous crimes are an invaluable asset. Concealment of this level of high-tech has only aided the network in continuing their abuses and violations. Only when this crime is openly acknowledged and spoken about honestly can the network be dealt with legally and measures taken to eliminate this level of high-tech crime. Until that time, innocent child and adult victims are forced to spend their days suffering in silence. Meanwhile, it appears that this network has begin to challenge our government and its officials. How they manage the threat in wake of public exposure will sent the precedent for the networks future activities. Failures to begin real and serious investigations not only put national security at risk, but now the persons that work within our most crucial infrastructures.
Page 46 of 69
Page 47 of 69
Page 48 of 69 Chapter 2: Technology Paired with Organized High-Tech Crime The use of advanced technologies has equipped anonymous members of the hidden criminal network with the tools to perpetrate crimes more efficiently, effectively, and with lower risks. Technology remains constant in our society even though there is a lack of familiarity with its limitless capabilities; new developments continue to flood our society. New technological pathways are introduced, older technological systems and methods based on outdated developments, and approaches still have functionality and uses in modern times. For the experienced high tech criminals on this network, that for quite some time have engaged in their crimes, it appears that their choice to utilize lesser-known technologies and concepts for crime has allowed them to carry out criminal activities in ways that are most would never be familiar with. Whether by combining and exploiting various technological concepts and practices such as Wireless Power and Energy, Sound Wave, Magnetic Energy, Radio Wave, or some form of 360-degree freedom laser-like beam systems paired with advanced computers that use artificial intelligence or some other means, it is clear that this network is actively engaging in wireless criminal activities without physically entering the environment of those that they violate. It is also clear that the use of these methods is purposed solely to engage in crimes discreetly , without being detected, crimes that would have no way of being discovered given the methods being used. But for the individuals that this network has and continues to violate the human rights of reporting their experiences online and to law enforcement, speaking out. The adoption of wireless technology for crimes would certainly be for the purpose of preventing detection , and easily would allow the anonymous persons that make up the hidden network to remain elusive during their crimes.
Page 49 of 69 Several Federal and local law enforcement agencies throughout the United States contacted about this crime have claimed they are ill-prepared to manage a threat of this nature or that a crime of this sort is impossible, its victims would disagree. So they do nothing while public safety remains at risk, and a criminal network grows increasingly more intrepid. It is this network's dedication to not simply violating their victims but instead ensnaring them by wireless crimes, and murdering them using technology to cause them to become sick and the commission of social conspiracies that the network uses persons that interact with the victim to remain silent, punish , shun or retaliate against them, if they speak up about the network. Victims state that if people knew what the network was really doing with their technology and the crimes they commit against children, and adults, that they would never want to keep a crime of this nature hidden. Like most technology, the network has complete discretion of when they turn off and turn on specific features of the weapons they are using for crimes. Making it rather uncomplicated to conceal their crime when needed and shifting the burden of proof when reports of their activities are provided to law enforcement. Proving a crime that is carried out by wireless means using energy based technologies that are classifiably weapons has certainly proven to be a nearly impossible feat. But recent new articles describing experiences involving multiple government personnel while on assignment that reported to federal law enforcement agencies that some type of “directed energy weapon” assaulted them have shone light to the existence and effects of energy based weapons. For civilians, across the United States that have reported for years that energy weapons are actively being used to assault them, government personnel’s reports of singular experiences are simply a prelude of experiences that get much worse if allowed and not investigated. By using
Page 50 of 69 wireless technology to violate and assault the network frightens victims, and often manipulates them convincing them they own they a debt, committed a wrong or they are a government agency. They are not a government agency. They are criminals. Improper responses to the crime, that is not reporting them leads to the network secretly violating the individual for long periods of time. The network's flagrant lawlessness can easily be attributed to the fact that law enforcement has failed to acknowledge and address this level of crime and so it is escalating. Imagine living while some unknown energy burn, lacerate, shock, attack, penetrate, and assault stealthily, inside and outside of one's own home, and while they are mobile and in mid-flight. It appears that a significant part of the network's criminal activities is completely dedicated to committing concurrent acts of recurring sexual and physical violence, psychological abuse, and actual torture, while its members orchestrate and maintain long-term conspiracies that ensure victims are rendered helpless and remain vulnerable. The network appears to utilize well-developed conspiracies to prevent victims of its crimes from having access to certain liberties and opportunities so that they remain oppressed and therefore victimized. In order to ensure that certain victims remain oppressed and are inadvertently silenced, this networks conspiracies are effectively able to force their victims in circumstances that are conducive to their crimes. Victims have reported that they are set up or framed for crimes they did not commit, they are denied work opportunities, they are forced to remain isolated, and often are set up for situations that involve conflict and other abuses regularly. This is in addition to regular wireless assault by energy of their bodies and head. Any attempts to advance in any way or report the network's activities result in being subjected to psychological abuses and wireless harassment is designed to impair, confuse, disorient and in
Page 51 of 69 some cases have involved direct attempts to murder victim indirectly. Victims have also reported that this network's members engage in a variety of other criminal acts, and have even established a sport like means for its networks patrons and members to profit for their own amusement. Victims report being subjected to abuses that involve anonymous persons on this black market wireless network that appear to profit from gambling and games using unwilling victims. Wagers are made based on competitive games played by groups of persons on the wireless network, that often group themselves according to race, gang affiliation, gender and location. Using victims they militantly partake in abusing the victims , with dual objectives in mind. Not only do they organize and stage real life circumstances that are harmful but it appears that there is real money on the table for the group that can cause the most extreme reactions or circumstances . Victims report that the groups appear to competitively work to carry out defensive and offensive actions (crimes) and events within their victims life, for money. While these serious crimes are viewed as facetious by the networks members, the tournaments of sorts, in actuality masks life altering conspiracies, aid in traumatic psychological abuse, and crimes that they have turned into a black-market sport , making it profitable by making their crimes competitive amongst its members. For decades, the network's criminal activities have gone unnoticed, but this is not attributed to a lack of reports of this crime network. Quite the contrary, victims of the crime and others that have made attempts to report it are usually written off as conspiracy theorists, confused, or mentally ill and are thus quickly dismissed and ignored. No claim gets investigated by law enforcement, and no victim has yet to find real justice. Often victims are not allowed to report this crime, and if they try, yet again, this criminal network responds with violence and may have a person detained by law enforcement unlawfully. Meanwhile, this network continues to embed
Page 52 of 69 itself in the very fabric of society, engaging hidden and complex high-tech human rights abuses and organized crime without interference. Their organization, regardless of name, has discreetly gained a reputation as an ominous network that is to be feared and regarded as an authority. It appears that through organized crime, they have the ability to discreetly regulate the actions of individual law enforcement officers, who in some cases use their power to silence and conceal this crime either due to ignorance, fear, conspiracy, or by manipulation of the criminals. The network engages in organized crime; they simply do so remotely. Human rights abuses are a major part of their network's crimes and success as a hidden criminal organization. They are seeking out and violating children as young as under the age of one year of age thru teens, and adults alike – whether the violations are remotely carried out using high-tech technology or in-person, the activities are a crime. High-tech crimes of this nature have yet to be explored. The use of wireless technology as a weapon that transmits some form of energy that enables the criminals to attack, abuse, violate one's physical person, and privacy is predatory in nature. Compared to other technologically-savvy criminals, the network has taken their crime a step further and, instead of interest in securing profits by computer-based financial crimes, their profits also come from exploitation. There are a number of reasons why this network is different, but their practice is carrying out multi-year, even decade long victimizations of children into their adulthood and adults. Yet, the public has no idea that this type of crime is going on and that the network responsible for it is a threat to public safety and national security. Instead of committing a single act of violence, with the use of their black-market technology that is wireless and has long-range capabilities, they are allowed unrestricted access to their people at all times. Their victims experiences provide a snapshot of the true inhumanity of the networks crimes. Their innovative technology allows this network to remotely gain access to any home, business,
Page 53 of 69 or individual at any time. According to victims of this crime, the network has been selling access to children and adults, more than likely profiting from the viewership, wireless exploitation, and aggravated sexual assault of their child and adult victims by wireless means. The patrons of this network pay to use technology to wirelessly physically and sexually touch, torture, and abuse victims. Though this crime appears to be different than other sex crimes , in reality, a closer look at it might reveal that it simply mimics traditional child sex rings, human trafficking, and involuntary servitude abuses – it is however, just wireless. This network's ability to engage in remote privacy violations allows them to violate the privacy of persons within their own environments, watching people that would have no way of knowing that this network was violating them – that is, unless they elect to reveal their organization and expose their activities. Which strangely enough, they frequently do with many of their victims. These high-tech peeping toms are not peering in through windows or at least not in person. Instead, their wireless technologies give them the ability to use varying forms of energy, and with it, they have some technologically enhanced ability that enables them to engage in voyeurism that is see-through walls, windows, doors, and access video feeds wirelessly. Not to mention, this network can gain access to any cell phone, hijack radio and television broadcasts, tamper with electrical devices of all types, vehicles and medical devices. It is clear that whatever security protocols that are in place to detect these invasions are ineffective. The network utilizes methods that supersede current detection capabilities. The use of high-tech technology is not the only reason in which this crime has remained hidden. This network has been crafty. Over decades this network has managed their victims and created a secret reputation amongst law enforcement, claiming they are a "watchdog agency" or part of the "deep state" of sorts that combat crimes and injustices, as it relates to their most rapacious
Page 54 of 69 crimes, those involving vulnerable children and women, drug trafficking and other criminal acts. This network has been portraying its organization as one in place to protect our communities. This con has enabled them to operate freely, unchecked by law enforcement in most cases. The use of schemes and misrepresenting their crime organization using any scheme relevant to the individual, playing on ones affiliations, interest, family allegiances, needs, wants and grievances, is a also common during their manipulations. It can be assumed that over time to establish themselves, they have developed an understanding of the importance of using law enforcement as a tool to prevent their specific crimes from being looked into further . It would not be shocking given reports that as acts of good faith, on occasion this night might actually have used or uses their technological resources to establish a level of rapport and credibility, by aiding law enforcement and others, given that they have technologies that permit them to discreetly eavesdrop, access homes, buildings, actually viewing documents by scanning them, as well as the ability to instantly transmit their energy based systems regardless of distance , structure or mode of travel. Establishing their organization as per say, in the same way in which “confidential informants” are viewed, would be a valid reason for their existence to remain undisclosed. But the organization is no “source”, instead they are a nuisance, a threat, dangerous, ruthless , manipulative, cunning, and predator gang of persons that have approached crime from an educated perspective. Using the diverse backgrounds of the patrons and members on the hidden network, their tactics have granted them the ability to operate freely . It must be emphasis the network does not have the same interest as law enforcement, are not concerned about protecting any person outside of their own interest, and the hidden crimes that they have spent decades carrying out are more necessary to address then any tip they could ever provide.
Page 55 of 69 Maintaining a working relationship and developing an understanding with law enforcement is purposed to present their organization as one that should be overlooked for the benefit of society and safety. This scam has enabled them to operate for decades, building their organization and its network and a victim base of children and adults whom many of which they have actively violated over decades. But those poor minorities and whites are sought out specifically due to their lack of resources, support, understanding of this level of technology, and time to report their activities. Like the historical Greek story of the Trojan Horse, where Odysseus and his men hid inside a wooden horse that was delivered to the Greeks during the Trojan War, and in the cover of night they emerged to overtake the Trojans, winning the war, this network has disguised their activities in a way that has allowed them to inadvertently remain undetected while they engage in the most heinous of human rights abuses right under the noses of the American people. Though evidence clearly shows that this network exists, one of the most well thought out conspiracies this network has maintained is casting persons that they violate as mentally unstable. Effectively they have indirectly silenced those who seek or might seek to report their crimes by having outspoken victims classified as mentally ill persons. If their organization and its network do not exist, then they cannot be held accountable. If victims are perceived as mentally unstable, then their reports are not viewed as credible. This ploy has supported the concealment of their crimes and the black-market technological weapons that they use for them. It appears that victims that have attempted to report the wireless crimes have had identical experiences from all over the United States, though their suspicious about the motives and parties responsible for the crimes vary. They are classified as mentally unstable if they report the crime, yet many of them have and had careers, families, lives, education and often time had no
Page 56 of 69 prior mental health problems before encountering the network or speaking about this network crime. For most, they are often not permitted to report the crimes, are detained or intimidated into remaining silent and discouraged from making future reports by individual law enforcement officers from coast to coast who either are unaware of this crime or are well aware of it and act at the request of the wireless criminals knowingly concealing reports of the crime. The crime network has pit law enforcement against victims and vice versa, which has been an ingenious way to prevent victims from reporting this crime and getting it addressed, investigating it, and identifying and prosecuting the anonymous persons responsible for it. People cannot begin to understand the impacts this network has had on the individual and our communities. In order to ensure that victims of this crime appear as if they are mentally ill, this network has strategically aligned the way in which they commit their crimes identically to the way in which various mental health diagnoses present, specifically schizophrenia. For decades this network has engaged in human rights abuses and then concealed them by using advanced technology that few would be familiar with, which allows them to arouse in their victims' states similar to various mental illnesses by way of technology, constant wireless harassment, and psychological conditioning carried out daily and as persons are asleep in their own homes. This crime is the greatest scheme ever concocted by a criminal network. The criminals have devised a way to engage in human rights abuses, profit from predatory crimes against children and adults while removing their victim's ability to report the acts inflicted upon them. Therefore, their crimes are able to remain ongoing, and for victims are indefinite. Using intricate black-market technology that is able to transmit invisible forms of energy, the individuals belonging to this network are able to harass, violate privacy, and engage in other
Page 57 of 69 types of ongoing wireless crimes. They are able to impact health, motor functions, cognitive processes, and even cause loss of life. But this is only a fraction of their crimes. Much like most crimes, the network engages in individually centered crimes rather than exposing their organization to large groups. Victims state that this network personalizes their crimes, actually securing information about their person of interest thru secret surveillance using wireless technology which makes available to them all forms of personal information by eavesdropping, securing video by way of wireless and energy based technology, and accessing other personal data thru hacking when necessary . This network frequently uses personalized attacks , manipulation, intimidation, violence, and bribery to gain cooperation and silence of those that are solicited for victimization or other purposes. Using technology that is invasive and stealth has given the network a dangerous advantage and unlimited opportunities for predation. Not only is the hidden network able to remotely violate people, but they can violate government and its officials, and they do. Their technology enables the persons on the wireless network to transmit their sound, to isolate it, so it's audible to a single person, allowing them to communicate wirelessly, and with noise-isolating abilities. With technology they can harass a person in a manner where others would not hear the audio. This has aided them in remaining hidden and setting up their victims to appear insane. Their use of technology that is stealthy and is therefore not visible, allows aggravated sexual and physical assault and wireless eavesdropping and communication, when they elect to. Because their technological weapons transmit some form of energy and therefore are not visible, they are able to surveillance persons and furtively carry out their abuses. One victim at a time, the anonymous syndicate actively violates people, going from home to home, place to place, abusing , terrorizing, assaulting , psychologically conditioning , and in
Page 58 of 69 some cases murdering persons that they have either violated and seek to conceal their activities or for organized crime or sports means, secretly of course. This network makes sure that their crimes are always appear to be attributed to other sources. These crimes are carried out daily, yearly, and even over the decades against some of their victims. For those victims, this network deems potentially problematic, this network violates them 24 hours a day. The network operates 365 days and is similar to any other crime network, housing many divisions, types of criminals, engaging in varying criminal activities, unifying their operations when attempts are made to address their activities. On this network, like in prison gang systems, white supremacist, minority street gangs, pedophiles, hackers, other types of criminals work together for the benefit of their individual operations. The members of this network are accustomed to misrepresenting their organization and their intentions persons and to law enforcement. Do not expect to have heard of their organization as documented here. Very few are bold enough to speak truthful , for fear of retribution or assault. They are not a shadow government in place to protect our society, they are criminals, benefiting financially from crimes against our children, adults, government, narcotics, guns, digital currency, technology, free access to our information and lives. The reality is that given the nature of the wireless offenses , it would be assumed that not all criminals would have access to such capabilities and those that did would be part of an isolated network of persons with the financial and technical skills capable of either developing and maintaining technologies that allowed transnational crimes. The network has carried out secret crimes across the country and undoubtedly the world. They are allowed to operate unchecked. This network also impersonates law enforcement or government agencies such as the CIA, Sec-ret Service, FBI, local police, etc. They frequently
Page 59 of 69 convince victims that they have committed an offense that has warranted their abuse, and as a result, the network is violating them. By convincing victims of this falsity, that their criminal organization is a government entity, they ensure that from the onset of their crimes that victims never seek assistance from law enforcement. One would hope that in the cases reported by multiple victims of the wireless crime that in situations where law enforcement officers harassed , threaten or detained them, that they were manipulated into inadvertently assisting the criminals by targeting, harassing and violating their rights, unaware of the true nature of this networks crimes or their practice of cornering the victims so that they can continue or proceed with their crimes. The hurdles encountered by victims has allowed the network a substantial amount of time and no obstructions to their activities. It is also important to know there is real criminal money and power is backing this crime. With technology that has been weaponized , and a range of schemes in tote that are utilized at any given moment, these anonymous people that make up the hidden network have maintained an exceptional upper hand. They have the ability to manage threats to their operation quickly and effectively. Persecuting, criminalizing, and framing their victims are only a few of this networks tactics to ensure access to those they have interest in violating, or seek to keep silent. The reality is that the use of their technologies enables them to have unlimited access to the American people, government , any of our infrastructures, technologies, confidential research, financial information, even military weapons and computer systems, both those domestic and abroad. Though there are thousands of individuals that have come forward and have shared their accounts online, anyone can become a victim of the network. It can be assumed that by maintaining technological advancements well more progressive than that of law enforcement , and the freedom to use them in ways other than they were purposed for
Page 60 of 69 that this network has achieved a position of power. This has fueled their human rights abuses, and as an indirect result it has encouraged the development of crimes that are bizarre in nature but extremely profitable and offer sport and entertainment. People hunt animals, but the network hunts people. The network has found a way to profit in the same way in which traditional human traffickers and pedophile rings do, without removing their victims from their environment . This form of high-tech crime is not a smash-grab type of crime. It is an elaborate , carefully designed, intricate web of organizations that have maintained the hidden network. The men and women that make up this network are a part of a crime network that has revolutionized the way in which high-tech crimes can be committed using technologies that are years ahead of our most profound research institutions. In this crime, its victims hold the sole responsibility of reporting the crimes committed against them, yet they cannot yet openly report this level of crime without backlash or retaliation from the criminals . Victims shared experiences describing the impacts of the crime of the quality of their lives. They described living in a state where they have no safety or privacy. Some reported that they were set up, often framed, and steered to encounter high risk situations and people by the network to impact their lives , careers, relationships, finances and in many cases health during the networks peak of their abuses. There is a social element to this crime. The network appears to arrange for people to meet, and interact, even stablish social or personal relationships for one objective or another. The consensus amongst victims is that they are characterized as mentally unstable , liars, thieves, whores, or criminals if they speak openly about the crimes committed against them, so instead most remain silent and simply endure the crimes impressed upon them. Female victims state they are forced to engage in sexual activity during the early
Page 61 of 69 years of the crime, peonage , told they owe a debt, and once they refuse they are forced to appear disheveled, their faces and bodies are burned, and branded by some form of laser like weapon. The networks technology is not limited to its ability to lacerate and brand or burn the skin. It also the ability to non-invasively penetrate brain, externally this networks technologies have the ability to darken or lightening the skin completely, which more than like is by the use of ultraviolet energy, impact the dexterity of the skin, tighten muscles and trap air within the body. They appear to be using the same forms of energy that are utilized in non-invasive cosmetic procedures , for parts of their wireless aggravated crimes. Female victims have reported that the network uses their technology to penetrate the private areas, and then to retighten the area during moments in which they have coordinated forced sexual experiences. More than likely the use of these abilities are employed on child victims as well. The network is involved in concealing the marking left on their child and adult victims bodies, by darkening the victims skin prior to doctors visits or social gatherings , making them less visible. Once this network has exploited their adult victims, their practice is to disfigure and age them, portraying them as disgusting by forcing them to dress and live in disheveled ways, making them unattractive to ensure they are unable to establish social or personal relationships. They spread rumors using their technology to communicate at will, claiming the victim of their crime is sexually promiscuous. Tarnishing the charter of a victim they have sexually violated combined with disfiguring them, makes the crimes committed against them less important. Negating the fact that the networks members have carried out inhumane crimes.
Page 62 of 69 This network subjects their female victims to aggravated assault if they engage in hygiene practices, attempt to take care of their bodies, appearance , or health. This is not without purpose. Victims state however when the network seeks to arrange a sexual experience victims are permitted to care for their appearance. When you look good, you feel confident, empowered, you are more inviting to others and welcomed easier. It can be suspected that the networks practice is not very different from the traditional sexual exploitation industry in that often victims appearances are downplayed to deter people from interacting with the victim, or reporting various things that they might observe. To carry out these acts, the network uses both technology and their wireless workforce to bring about major changes in the way the victim carries herself, speaks and lives. Because when the network transit+ `t5tions from secret crimes to overt crimes against their victim, they actively are involved in wireless and aggravated harassment carrying out their abuses when the victim is within the walls of their own home victims are deprived of all rights normally afforded to persons within their own dwelling. Modeling what occurs in traditional human trafficking where once victims become less profitable , this network has also adopted the same practice of disfiguring , mutilating, disabling and in some case murdering victims once they have no use for them. Though this sounds very bizarre, this crime is social and psychological as well as exploitive. The network uses whatever means necessary to secure their victims in positions in which they are isolated and its members can freely carry out their indiscretions. You must remember this is not a traditional crime, and neither are the methods used by the criminals responsible for it. Because this network has embarked on the commission of wireless exploitation, and the identities of the men and women operating on the network or hidden, they have found other ways of discarding
Page 63 of 69 their victims. Whether making them homeless, impacting their health, isolating them, causing traumatic experiences that lead to mental health breakdowns, and physical disabilities, to victims of this crime they state its almost like though they remain alive every part of their life is dead because it has been impacted by the crime and given that years , even decades pass while they are being violated the harm caused is irreparable. More than half of the victims claim they are subjected to aggravated assault by technology majority of their day, these victims also have laser like burns on their skin that though many of them have never met, and do not know of each others existence , the markings on their bodies are similar – light markings below the dermis, letters, numbers, shapes, that are easily concealed but visible when the filters of photographs are modified showing clear evidence of markings that are consistent with the statements of individuals that have reported being victims of this wireless crime and waking up with various laser like burns on their faces and body daily. The network is using wireless technology for many means, one of which involves branding the bodies of their child and adult victims, cataloging and communicating non-verbally about the victim but also as a deterrence to inspire fear into those that might seek to report the network. Such acts would only be necessary if the anonymous persons behind the technology had a means of viewing the markings wirelessly. Branding victims by wireless technology is a common practice in this hidden crime. This heinous act extends to infants and other minor victims, the network does not discriminate. What should alarming is that this network has many different divisions, some of which are involved in domestic and international terrorism, white collar crimes, narcotics trade, and other organized criminal activities. But it appears that the crimes involving children , are extensions of crimes carried out against the adult victims.
Page 64 of 69 Chapter 3: High-Tech Crimes against Children This network has carried out a hidden wireless child sexual exploitation ring, and it appears that they have paired it with their adult exploitation ring . Where by extension of their crimes against adults, they also have access to children in the home of the adult victims they are violating, and in some cases this network has violated entire households. Logically, this practice of inherited victimization has reduced the risk of reporting of their activities and resistance by attempts to report the network. Parents that were victims prior to having children often learn thru various acts of punishment that remaining silent about the network ensures that they are allowed access to more liberties, so they remain silent . When the adult victims become parents, the understanding that has been achieved thru their own victimization is an assurance that they will remain silent about the observations of crimes committed against their children by wireless means , due to the imminent threat posed by the network for risk of harm or denial of ones rights or access to various liberties. This dark understanding and ability to draw inferences of the risk from ones own experience appears to be enough for parents across to the country to remain silent about this crime for decades. There are victims from over three generations in some families that are actively being violated by the network. Even now parents contacted were concerned with protecting their privacy to ensure that agencies like Child Protective Services would not take their children and were fearful of reporting the crime because law enforcement is not handling the reports of the network appropriately and have been portraying the network as one that does not exist, removing children from their homes . This is dangerous given the nature of the criminals crimes and their practice of arranging victims to be harmed, raped and abused by persons in the environment of the victim. The adequate response a law enforcement investigation and addressing the crime seriously.
Page 65 of 69 The lack of understanding that the network is involved in actual harm of children and people thru not only wireless violence, but conspiracies that involve the network arranging for people to be harmed for profit and sport. Several victims shared that members of the wireless criminal network arranged for them to be raped by a random person as they watched wirelessly. Or that the criminals set them up to encounter an individual entirely for the purpose of harming them, having them attacked or assaulted , in person. This would leave one to be concerned. If part of the networks crimes involve live broadcast of sadistic acts, and wireless crimes against children then thru the same processes the network is likely to arrange for a victim they are already exploiting to be placed in a environment where they will be not only violated wirelessly but violated by individuals in which the network arranged for them to placed with. By far this crime is not simple crime in the least. Grasping why persons would commit such acts of atrocity is pointless. What is known is that in cases such as Peter Scully, where it is documented that he ran a Red Room which was able to profit from the sale of a live broadcast of a child being tortured , where individuals from around the world who had similar interest, paid , watched and supported the torture and murder of a child is enough to contradict that such criminal acts do not occur. Victims have been photographing the bodies of their children over years that have been burned by wireless energy based technology used by the network of anonymous criminals. Photos that when lightened and darkened reveal laser like brands , on the most violated victims from head-to-toe. Such photographs are so graphic and heart retching that for parents this trauma alone is enough to scar them emotionally . They are rendered helpless . They cannot report the crimes, cannot protect their child, and cannot defend them legally in the presence of law enforcement officers who according to many parents even when presented with photos that clearly show
Page 66 of 69 visible laser like markings they have dismissed reports and made attempts to flip the claims and even accuse the parent of causing harm to their child (even though the photos reveal laser like burns under the dermis). In cases like these, all individual law enforcement officers have had direct and undeniable knowledge of the wireless network . It is in cases such as these that the network reveals itself in order to solicit assistance from law enforcement either thru means that victims suspect include bribery, intimidation, threats, blackmail or racist allegiances. Crimes against the diplomats were tragic, but the crimes actively going on secretly against children across our country carried out by an anonymous wireless network are due to failures. Failures in law enforcement . Failures in government to be concerned enough with those most vulnerable to demand action to address a level a crime that has shown itself to be indiscriminately savage. The network has the technological resources to violate any home in America, government employees are not off limits. But presumably like most predators, the persons on the network everyday criminals practices is to seek out vulnerable individuals, single parents, struggling with finances, homes with multiple children, those from low socioeconomic statuses, children of existing victims, and those in which they develop an interest for during their search for new victims. The reality is that any child is at risk. The network forces victims to remain silent or they set them up for tickets, arrest, job loss, to be attacked by strangers, and engages in aggravated physical and sexual assault. Outside of victims that have children and knew about the wireless crimes prior to having children, parents would not be knowledgeable about crimes committed using wireless technology even if they were going on in their own home. The networks members do not creep into bedrooms and carry out offenses. Instead they use stealth, wireless , interactive and touch
Page 67 of 69 technologies that enable to have full interactive and engaging experiences in the homes of victims. Furthermore, the network has a class of technologies that permit them to render persons unconscious instantly, and to keep them unconscious. Much like hospital monitoring systems that detect when patients are in state of REM sleep, resting and awake, the network has non-invasive and wireless technologies that permit them to measure when these states present. At these times, they simply stop impacting the child. Parents have shared stories about how the anonymous criminals used technology to cause narcoleptic episodes that rendered them unconscious, and once they woke they observed laser like brands and burn like markings in the shape of emblems, numbers and letters that covered the bodies of their child. The network is well planned. In situations in which they seek to engage in the wireless exploitation of children, they have already prepared circumstances for their victim of interest, so that they reduce the risk of being detected, and ensures that they can market the child for wireless exploitation. As stated in previous chapters, the network carries out isolating conspiracies, limits social relationships, finances, opportunities, prevents the persons from connecting with family and friends, often for females they are denied relationships or even as a protective act when they encounter victims that are outspoken , the network has a practice of arranging for these victims to meet men that are documented sex offenders, with the strategic objective to shift the blame to a physical person if their wireless crimes are detected. The members of the network are well prepared and planned at all times. A crime of this magnitude with so many levels of crime, the network has many schemes and maneuvers they use. They have no operated for decades without being reported and investigated without being skilled at what they do.
Page 68 of 69 Though it may seem unlikely that white supremacist, street criminals, hackers and drug traffickers would unite for the purpose of very different criminal activities, in actuality this coordinator of resources, people , finances and skills has protected the underground network of criminals and supported their continued black-market operations. A problem for a single group operating on the network like with any organization , puts them all at risk for legal consequences. As a result , they work collectively to ensure that the network remains secreted. Though most would suspect that the persons on the network fit the traditional profile of the children predator, this not the case. Victims claim a number of the individuals that have access to the black market network are align with the type profile of the dark web criminal. Young white, black, Hispanic and Asian men and women from various backgrounds, sought out for the purpose of contracting with the anonymous persons that manage the wireless network. These persons according to victims are hired to create diversions. This is their job. To engage in wireless harassment, menacing taunting , aggravated sexual and physical assault by wireless technologies, frame ups, etc. This crime is one where persons on the network obviously have abnormal interest, but these interest also extend to sexual gratification from inflicting emotional, physical, and mental pain on persons for their own pleasure. It can be assumed that when persons opt to seek out wireless and secret networks to access of this nature that part of their interest is in unscripted , live broadcast, obscure viewer experiences and entertainment. The crimes involving children model those the network commits against adults. Technology is used by the anonymous persons who watch, touch, fondle, sodomize, brand and burn and in some cases subject their victims infant and other minors to circumstances that have caused serious harm and even death. The experiences described by parents involving observing brand
Page 69 of 69 and laser like burns on the faces and bodies of their children, notable behavior changes, mysterious health conditions, changes in teeth size and color, even acts caused by the wireless criminals to harm the child have been reported. Several victims claimed that they made attempts to report the crimes they observed but were dismissed or law enforcement attempted to report their claims to mental health divisions which quickly discouraged future reports of the incidences. The crimes simply continue. Parents whos children are now adults state that they observed the incidences of aggravated sexual abuse beginning days after the birth of their child or children and it extended over the course of the child’s life. Rather than magnify a problem and cause distress they simply learned to live with the crime, often never discussing it due to fear of the networks response. Parents have reported that they noticed psychological changes , changes in temperament and behaviors and that their once bright and beaming child, upon reaching their teens , suddenly drifted into crime, developed mental health conditions, rebellious, almost always sexual deviancy, drug addictions, abnormal preoccupation with sex, problems with learning, retaining information, school, completing task, and other social problems that drastically impacted their lives. Response to this level of crime should be without question. A network of anonymous persons has unrestricted access to child in any home in America at any time . An established wireless network that profits from a range of crimes, one of which involves wireless exploitation is able to carry out remote sex crimes. The network has technologies that can cause loss of life, or result in harm, at any given time. Law enforcement and policy recent encounters with government personnel being assaulted by wireless energy should be enough evidence for the network to be priority one on their agenda.