Return to flip book view

Liberties Stolen_Havana Syndome_SecondEdit

Page 1

Page 1 of 121 1/=-poklo,l,l;[ mg v kj njv jmv fv nmn nmmnjnn jbm g ngmkj I j j kj fj j jC

Page 2

Page 2 of 121 Liberties Stolen

Page 3

Page 3 of 121 Liberties Stolen There is more to Havana Syndrome than you know The Hidden High-Tech Crime Network of America By AW Hightechcrimeawareness@gmail.com

Page 4

Page 4 of 121 © 2021 by A.W. All rights reserved. This book or any portion thereof may not be reproduced or used in any manner whatsoever without the express written permission of the publisher except for the use of brief quotations in a book review. ISBN: [Insert ISBN]

Page 5

Page 5 of 121 Disclaimer This is a work of expository nonfiction. This book has been written for information purposes only. Every effort has been made to make this book as complete and accurate as possible. However, there may be mistakes in typography or content. Also, this book provides information only up to the publication date, so it may not account for any new changes relevant to the subject discussed herein. The author and the publisher do not warrant that the information contained in this book is fully complete and shall not be responsible for any errors or omissions. The author and publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by this book.

Page 6

Page 6 of 121 A secret society exists, and is living among all of us. They are neither people nor animals, but something in-between. —Karen White

Page 7

Page 7 of 121 About the Author A.W. is a native of Texas and a graduate of the University of Houston. She resides in California. She holds a master’s in psychology. She has worked in the field of social services with persons from complicated backgrounds who struggle with homelessness, mental health issues, drug addictions, and criminal circumstances. Ash is an activist in her own right, but more importantly, she is a woman, a mother, and an American. Her objective is not simply to bring awareness to a hidden high-tech crime but to motivate law enforcement and policy makers to take action to resolve it for all. She is not only an activist but she is very personally familiar with the wireless crime as is law enforcement agents in the City of Houston. Ash started reporting that a wireless and hidden high tech network of criminals was using wireless technology to violate children and women in Houston beginning 13 years ago, officers at that time refused to address it and even concealed the crime. As a result, now the network of criminal is involved in crimes against government persons and their families. She was therefore forced to relocate to California solely due to law enforcements responses over the decade since she begin reporting the wireless crime. Thirteen years ago A.W. attempted to report the wireless crime to law enforcement multiple times, and they refused to address it. They even tried to detain her for mentioning the wireless crimes that was not as well known at that time, even though evidence was provided regarding their wireless crimes against children and women. She then attempted to reach out to the Federal Bureau of Investigation in the City of Houston, where her initial phone call and attempt to report it was met with an agent’s laughter as he hysterically dismissed her attempts to report her knowledge of and direct encounter with members of a wireless network who had hacked her computer and threatened her and demanded she move from her home. He disconnected the call. Over the years she has attempted to report the very serious crimes and get

Page 8

Page 8 of 121 them addressed by law enforcement, reporting that a wireless criminal network is using wireless technologies to violating women, children, homes and government employees but they have refused to do anything about her reports. In January 2020 she went to the FBI in Oakland, and after several failed attempts, an agent finally documented a mostly accurate report of the crime. Yet law enforcement has yet to make inquiries into the reports made, and when contacted Ash was informed that the complaint she made regarding a child and young woman being wireless branded by the same source of the recent government attacks was “forgotten and a message would be sent to the agent on the case”. A year after her complaint, in 2021 several reports flooded the news describing government personnel all over the world and in the United States reportedly describing their encounters being subjected to assaults in various ways by wireless and energy-based technologies. Instead of action, law enforcement agents in Texas specifically have placed government and public safety at risk with their lawlessness, using their power to keep reports of this very heinous crime from being made and forcing victims to keep quiet and endure abuses or lose their freedom. California law enforcement was at least willing to take reports, yet it appears they have also taken a back seat to this crime, and in several cases Texas law enforcement officers have expressed fear of the network. Ash has been repeatedly told by law enforcement that they do not have the resources to police this type of crime for many years. As a result the dangerous public safety threat that is this hidden wireless criminal network continues to engage in a class of hidden wireless crimes from coast to coast, against children and women specifically, in the United States and abroad. Now government persons are being targeted for violence, this should be very alarming.

Page 9

Page 9 of 121 The unknown sources using wireless technology in the United States has secretly violated businesses, homes, governments, children, and adults. But their technologies pose a threat to our entire economic structure. The network has at their disposal wireless weapons that can impact airplane functionality, vehicle operation, computers, cell phones, in-home electronics, street lights, traffic signals, gas pumps, alarms, and cameras —all wirelessly. In an effort to speed up what should have been enough motivation to look into this crime, Ash has drafted this book. Over the last thirteen years, she has spoken with hundreds of victims of this wireless crime, spoken at events involving traditional human trafficking to bring awareness to this hidden crime, listened to the stories of victims, viewed their photos, and observed what is undeniable evidence of violence by a wireless network that is a public safety threat. She is very familiar with the brutality to which the network subjects their victims. Recent news reports detailing information that now government personnel have reported that they are being assaulted by wireless technology show that the network of wireless criminals is now bolder No longer are they concerned with being detected. This book is not purposed to frighten, and it is not based on conspiracy theories but instead real crimes through a summarization of its hidden victims’ testimonies. Law enforcement and policy makers are our only resource, and the goal is to motivate the men and women of government agencies across the country to action. Law enforcement officers have an important role in our society, and without them this crime cannot be addressed. This book is purposed to cast this crime in a light that makes the reader understand that though this network’s crimes seem futuristic, they are occurring now, and their primary prey is vulnerable women and children who have no way to protect, defend, or escape. But the reality is that they could violate anyone. Without acknowledging the victims that have been reporting this crime for decades, a clear

Page 10

Page 10 of 121 understanding of the threat cannot be achieved. Though for most this crime appears to be new information, to its victims it is overdue. Before this problem evolves, we must encourage law enforcement and policy makers to make addressing this crime a priority. This book was written during the COVID-19 pandemic. While most were taking time to put into perspective the importance of life, health, and family, victims of this crime have been violated and abused excessively. This network has used this crisis as an opportunity to cause more harm and trauma and carry out abuses. It appears they have no intention of ceasing their criminal activities, even with recent reports of the use of wireless technologies for violent crimes. We are not meant to live in a world where invasions and oppression, administered high-tech or otherwise, of this nature exists. Where our service men and women can be rendered powerless, where children and our homes are not safe. Where law enforcement elects to look over a crime of this magnitude and places victims and themselves in positions where they are utterly helpless. We hold these truths to be self-evident: that all men are created equal with certain unalienable rights…

Page 11

Page 11 of 121 These are photos taken of three different victims but the author has collected hundreds of other photos that reveal light laser like burns made by the wireless criminals on the faces and bodies of its long time victims. The upper two photos are of the same persons. The left photo was taken

Page 12

Page 12 of 121 thirty-two years ago, the other recently. Which shows how long this network has engaged in crimes against the former child, now adult victim. The left bottom photos are of a mass shooter; pay attention to the dark laser-like brandings on the darkened photos. The right bottom photo is of a white female. The photos are of victims who were burned by wireless energy on their faces and bodies under the dermis by the anonymous criminals while inside of their own homes. Changes in the filters reveal the marking left by the criminals wireless technology deemed “Havana Syndrome”.

Page 13

Page 13 of 121 Table of Contents Introduction Chapter 1: Hidden High-Tech Crime Network Chapter 2: Red Rooms on the Dark Web Chapter 3: High-Tech Crimes against Children Chapter 4: Technology Paired with Organized High-Tech Crimes Chapter 5: Who Are the High-Tech Criminals? Chapter 6: Use of Wireless Energy Technology Chapter 7: Link Between Mass Shootings and Wireless Crimes Chapter 8: Victims Chapter 9: Dealing with the Threat

Page 14

Page 14 of 121 Introduction Hidden from the public, a high-tech criminal organization exists that has established an illegal network that makes use of technology to carry out their major privacy violations, human rights abuses, aggravated wireless crimes and other activities. They should not be confused with what is already known about cyber-based crimes, for it is an entirely different engagement in all aspects. It is a hidden crime made so secret that most are not even aware of its existence, and as of today law enforcement is still refusing to acknowledge this level of advanced high-tech criminal activity. Weaponizing interactive technology with excellence, the hidden high-tech network is actively engaged in wireless crimes against unsuspecting persons globally. This wireless crime has now been dubbed Havana Syndrome. But there is more to the crime than you know and it’s not just a crime that is occurring against government employees. For decades , this hidden crime has been going on globally and its victims are regular people, children, men and women, who have had to lived while an anonymous network of transnational criminals have been violating them inside their homes and as they go thru their day, using varying forms of wireless energy. As it stands today, individuals on this hidden network use a variety of stealth and energy-based technologies to remotely violate privacy of government and individuals a like, but they have been managing a hidden and high tech black market network that profits from the wireless exploitation of their victims. The network is also involved in the wireless sale of access to children and adults for viewership, ownership, and predation to persons on their secret network. Using technology that has been referred to as “directed energy” but may also be wireless power or another derivative, the hidden network is actively involved in other organized criminal

Page 15

Page 15 of 121 activities . The recent reports of crimes against government employees and diplomats is simply the surface of the networks activities. The network of criminals has approached their activities contrastingly. Their standard of conduct has been to engage in wireless crimes across the United States and abroad, seeking out people who are vulnerable in some parameter of their life. Once selected, the victim is subjected to an intrusion invasion of their homes by wireless technology and often crimes that involve the network subjecting them to a life-changing conspiracy. They are often harassed and surveillanced by the wireless criminals, following which they are set up, traumatized, and forced to live in depravity and abuse, and then the organization proceeds with their real transgressions. Though this crime is not well-known today, it will be in the coming years. As the internet is flooded by recent news reports of government diplomats and personnel who have reported that they have been assaulted by directed energy, referred to as “Havana Syndrome” it is clear that the network has expanded their criminal interest, and even government actors are being targeted for wireless and aggravated crimes by technology. But what government does not know is that this is not a new crime instead, one that has existed for decades and gone on under the noses of the American people . This crime is a threat to public safety. This book seeks to explore the network, its organization, and its activities from information compiled from and based on the accounts of victims, research, and reports, this book discusses the public safety threat from the perspectives of its hidden victims, from a less technical perspective. To date, there is limited information about the hidden crimes that have been going at present, though for decades the network has operated secretly. They have divisions of their organization in countries across the world and victims that are actively being violated

Page 16

Page 16 of 121 currently. What should be known is that every year countless lives of victims of this crime are lost to either suicide or to circumstances that have not yet been realized are related to this specific wireless crime. Though you may believe “Havana Syndrome” is a new threat that only poses a risk to government, what you should know is that there are thousands of child and adult victims that have been living while a network of anonymous criminals violates their homes , lives and bodies. For those victims who remain alive, they have suffered immensely—an unthinkable tragedy, yet one very real and happening around us at present. Though most victims of this crime have not report the crime and simply live while a wireless crimes are committed against them , these undocumented experiences are more relevant now than ever. The use of wireless technology gives the network the ability to intrude on any foreign or domestic government agency, individual, home, or business, leaving all at risk of being at the receiving end of a crime. Unless someone speaks up about this crime and cast it in its appropriate light, it will continue unabated, and more lives will be ruined unnecessarily. This is by far not an ordinary crime. A group of anonymous men and women located in the United States and abroad, have maintained a secret network that uses wireless technologies to watch people secretly, spying on homes and the persons within them. It also permits “wireless aggravated physical and sexual assault” by energy that is stealth and allows the branding of ones skin under the dermis, wireless harassment and eavesdropping, voyeurism, wireless harassment, interference with electronics and other invasions. It is important that this crime is no longer misrepresented as a “theory” or “delusion” of persons who are mentally unstable. Given that according to one reputable newspaper, “ over a hundred government personnel have reported being attacked while working or on assignment,

Page 17

Page 17 of 121 several spouses and their minor children by energy-based technologies, it is apparent that this crime is now growing, and its victim base will continue to increase and with it other crimes. There are thousands of victims of this hidden crime, particularly children and women, but men as well. They cannot go to the police - they will be detained, cannot protect themselves- the crime is wireless, and are living in the most deplorable and inhuman circumstances. Though many of these victims are longtime victims, the reality is that their circumstances could easily be those of any individual who this network elects as a target. This high-tech crime is like nothing you have ever heard about but is certainly a public safety threat that could make its way to your front door.

Page 18

Page 18 of 121 Chapter 1: Hidden High-Tech Crime Network There exist many unlawful activities in this world that have remained hidden from the public eye. Crimes such as the Ariel Castro kidnappings and Epstein’s private island offer us a mere hint of the vast underground dealings and interconnected criminal world involving crimes against women and children. Often such crimes are kept hidden from the public even when they occur within our own communities; others are concealed by the corrupt and the powerful. There remain countless other underground crimes that have yet to be exposed. One nameless and very hidden high tech crime network stands out in its prolific use of advanced technologies to engage in a class of wireless crimes and the violation of people , homes, businesses and government using technology to remain undetected. It is a network that engages in a variety of organized crimes that threaten public safety and national security. Most recently the network may have initiated crimes against government actors and their families using wireless and energy-based technologies that have been dubbed “Havana Syndrome”. Though these recent reports from government persons appear to be new crimes, in reality the network has been operating clandestinely within the borders of the United States and outside of it for decades. Given that the technology being used is not yet available to an abundance of criminals, it is likely that the individuals that make up the hidden network are part of a large scale criminal enterprise that is now targeting government and the people they serve. Their criminal operations are not like any you might have heard of. As our society becomes increasingly digitalized, becoming dominated by computers, wireless communication, haptic, laser, ambient technologies and data, the network has clandestinely expanded its tendrils ever deeper into our daily existence, all-pervading in its reach toward undermining our human, legal, and privacy rights.

Page 19

Page 19 of 121 For decades a secret crime has existed. This crime is high tech crime that involves the use of wireless power, directed energy, radio frequency and other types of wireless and interactive systems that are used by a group of anonymous individuals that are located within the United States and abroad. They have an established criminal operation with an extensive resume. Similarly to how pedophile and sex trafficking rings manage their black market human rights abuses, the hidden and wireless network of criminals has adopted methods that allow them to engage in their large-scale human rights abuses discreetly, among other activities. The means through which this network operates are substantially more advanced than other criminal groups. Whereas other hidden crime networks operate through decentralized and encrypted networks of private servers, this network has incorporated the use of sophisticated means and less well-known technologies. The use of advanced technology has incentivized these anonymous individuals to engage in more sinister, ongoing, and sadistic crimes. The use of wireless technology has given this network capabilities that extend outside of those associated with computer intrusion. It has allowed the networks members to gain access to more avenues to violate the individual , businesses and government more aggressively and for long durations of time with minimal risks. This crime is one that victims have been reporting for decades. It appears that it has been concealed both negligently and at times fraudulently by individual law enforcement actors from coast to coast who adopted the practice of penalizing persons that make attempts to report the crime. Attempts made to report the crime have been met with lawlessness. It is time that this crime be acknowledged and made a priority. As a direct result of the failure to acknowledge this aspect of high-tech and violent crimes, technology is actively being used freely as a black market weapon by a dangerous network of anonymous individuals that maintain an operation that extends from one coast to the other. Rather than the

Page 20

Page 20 of 121 technology being used for communication and data transmissions, for quite some time it has been used for their criminal interest: gang crimes, organized crimes, perverse and predatory violent remote crimes, terroristic crimes, and now crimes against government officials and even their children. The use of advanced technology has incentivized the anonymous individuals responsible for the commission of thousands secret of crimes against children and adults daily and resulted impacts to the health, mental states, careers, families, communities and now government. There are long time victims of the crime that have spent years being terrorized and lived with their liberties restricted. Though these victims appear to be free citizen, they are subjected to ongoing high-tech violence by an anonymous criminal group that spends their days violating them. Until recently , the media often overlooked these crime victims as disturbed persons. Disregarding the reports of the wireless crime and refusing to acknowledge a crime that has appears to become more threatening the longer it is allowed to continue. The network has weaponized, energy-based technologies. They are currently using them secretly for major crimes. Until now, high-tech weapons were often associated with science fiction books. But real world use of wireless weapons is characterized accurately by the account of its secret victim and those in government that have shared the horrors inflicted upon their lives , are very much non-fiction. Many readers may well be aware of the infamous Silk Road. For years this network served to facilitate criminals and their clients in their activity to solicit murders, sell personal information, traffic narcotics, sell child pornography and weapons, as well as coordinate acts of terrorism. By making use of computers with layered encryption and cryptocurrency, their activity remained untraceable and unknown to the common public. However, Silk Road suffered a huge blow when law enforcement was finally able to identify and apprehend its founder. Known under

Page 21

Page 21 of 121 the moniker “Dread Pirate Roberts,” Ross William Ulbricht was convicted by the US court in 2015 and sentenced to double life sentences plus forty years without the possibility of parole. Justice was served. Silk Road is just one of the many black market networks that exist in our society that have transcended out of cyberspace and made impacts outside the digital realm. It provides an example of the nihilism that exist for criminals that are able to disconnect from humanity by when they are able to hide behind technology. The nameless high-tech crime network and the members that make up the criminal organization, while vaguely similar, are by many characteristics drastically different. The network is involved in wireless crimes. Advance technology has equipped the criminals to commit crimes using technology that is wireless while they remain in some remain location, while directed systems by computers that occur in our environment, homes and businesses secretly. According to reports of victims, the network also manages a Darknet market, and like with most other criminal organizations it can be presumed given the technological advancements at their disposal that its members come from backgrounds much like Ulbricht who went to an Ivy League school and worked in the field of computer science, and much like those that congregated on networks like Silk Roads, that many the members of this network come from less prominent backgrounds. The network appears to be involved in the narcotics trade as well as racketeering, illegal surveillance , weapons trading, cybercrimes, terrorism, international and traditional human trafficking. According to reports of many victims, the network is actively involved in a variety of wireless sex crimes against children and adults, peonage, black market gaming and gambling, conspiracies to murder, murders, conspiracies based in race, class, and gender, high-tech gang

Page 22

Page 22 of 121 activities and organized crime, blackmail, theft of information, privacy violations, schemes, scams, fraud, and white-collar crimes like insider trading etc. But this may be the surface of their activities. For quite some time, the network has carried out crimes in the high-tech parameter using stealth technologies for secret home, business and government surveillance, monopolizing the use of their black market technology for crimes outside of cyberspace – wireless intrusions offline. A lesser-known part of their crimes involves the network carrying out individualized reoccurring acts of terrorization on its victims as they are living their lives using stealth technologies that transmit energy from their location to the location they designate. These crimes appear to be broadcasted on a hidden server , where access is provided by the network for persons to watch, participant and engage in a black-market phenomenon that is best described as “pay-to-play” activities. This is not simply human rights abuses by a sport. The criminals appear to be organized and have introduced competitive gaming as crimes that involve monetary wagers paired with coordinated acts of violence to increase profits, morale, encourage participation, viewership and sport. This network has been broadcast their activities for others on their network view in real-time. Not only have the networks members been illegally using technology to violate individuals and families, government and businesses, it appears the individuals on the network have enacted crimes that are long term. These crimes reportedly involve its victims being subjected to aggravated physical and sexual violence by wireless technology, psychological abuse, wireless harassment, sleep deprivation and pain and conspiracies. What is more disturbing is that until recent reports from government employee’s wireless crimes were said to not be possible in the media, by law enforcement and by many psychologists. Yet, a class of hidden victims have been reporting that wireless and anonymous individuals were

Page 23

Page 23 of 121 using some form of energy based technology to subject them to unimaginable abuses, impacts to their health, mental states and life, for decades. This black market crime is not the type of crime people openly discuss. Explaining ones experience is certainly no simple task. This crime is the first of its kind. It has never been addressed and the members of this long running network have successfully maintained it over many decades. Victims of the hidden high-tech crime are rendered defenseless. They cannot see the perpetrator, yet they can be burned or lacerated, pulsated, penetrated or even shocked by some form of stealth technology. The duration of the violence is completely at the discretion of the anonymous criminals behind the technology, as is the selection process of its victims. In an article that explored the experiences of the Canadian Diplomats and their children that reported they were assaulted by wireless energy in 2017, victims state that they continue to experience cognitive problems, headaches and their children have reported hearing sounds, noises and experiencing physiological symptoms presently. Non-government victims have asserted that the members of the hidden network’s technology can see inside of their homes, workplaces, transmit wireless sound, electing to allow the audio of its members to be transmitted and as easily, turn it off and their technology can transmit sound and painful forms of energy while they are in moving modes of transportation thru what appears like air. This crime threatens privacy and provides an advantage for the hidden persons that are behind the technology. They are therefore able to carry out crimes both inside and outside of cyberspace. The members on the network’s use of wireless and undetectable technology has other abilities. It enables them to impact not only the individual but all forms of technological devices, systems , vehicles, airplanes, medical equipment and media devices.

Page 24

Page 24 of 121 Utilizing technology that is significantly more advanced than most are even aware exists outside of research institutions, government, and medicine, for quite some time, the network has used progressive technologies for black market, high-tech crime. This type of crime has enabled the criminals to liberally and secretly carry out abuses, organized crimes, and injustices throughout this country and abroad. Their technology has added another element to the sex trade industry, human rights abuses culpability, high-tech crimes, risks for national security, mass violence, murder, and a new form of domestic terrorism. This form of domestic terrorism involves complicity, where criminal acts are not only encouraged by the wireless criminal acts but organized for their own motivations and dually to set up the victim. Using random victims, the networks practice of psychological abuse, manipulation, threats or bribery , its members are able to drive unwilling persons to act on their behalf. Instead of carrying out acts of violence themselves on large scales, the members of the network drive their victims to. Victims of the crime report being subjected to rigorous abuses over years, and, in many documented cases, such as mass shooters Aaron Alexis and Myron May, in the video logs left after their heinous acts of violence, they both stated they were “driven” to out mass violence due to the abuses they were suffering. Though at the time in which the two highly publicized mass shooters carried out their crimes, discussions of “Havana Syndrome” were not occurring. What is clear is that their claims were disregarded as reports from delusional persons. What is not yet correlated is interdependence of the hidden wireless crime and its relationship with several incidences of mass gun violence, though evidence left by the shooters clearly show that a relationship exists. The question now should be, how many people have they harmed and why is this threat not a priority on every agenda.

Page 25

Page 25 of 121 Until recent news reports involving White House personnel and government diplomats being assaulted by wireless energy-based technologies, referenced as “direct energy weapons,” and “Havana Syndrome” reports of persons claiming to be terrorized by wireless criminals using technologies were solely associated with mental health diagnoses rather than a hidden and high-tech crime that actively threatens public safety. Wireless crime victims across the country have been reporting identical, and more gruesome wireless crimes for decades than those reported by government agents. Some of the reporters that have tried to report the crime to law enforcement were committed to mental health institutions, others had their children taken and many live with fear of mentioning the crime given the experiences of other victims during attempts to report it. Now the Pentagon, Homeland Security, the CIA, and the FBI are reportedly making serious inquiries into crimes involving government actors who have reported they sustained injuries and became ill after encounters with an unknown wireless technology. In 2021, the HAVANA Act was introduced and approved by Senators Collins, Warner, Rubio and Shaheen providing financial assistance for injured government employees. But what about the thousands of hidden victims of the wireless crime that are actively being violated daily. It may be difficult to believe that a crime of such magnitude would be going on under the nose of the public and government but this seems to be the case. It is unlikely that a network of criminals secretly using wireless energy technology for crimes across the US and the world, and is actively committing wireless human rights abuses, would not be linked to the crimes that occurred against government personnel. Not every criminal group is using wireless energy based systems at present. It would be reasonable to state only an isolated group of criminals would have access to such advancements. The acts committed against government personnel may indeed result from a homegrown, high-tech, nameless domestic terrorist threat and their

Page 26

Page 26 of 121 transnational operations abroad. This is certainly a crime that requires law enforcements attention and immediate government action for the safety of the American people. News reports have portrayed the use of wireless and energy-based technologies for aggravated crimes as “new crimes” to the public . These wireless crimes is anything but new to the child and adult victims located in nearly every state in the United States and several countries abroad. The wireless crime is not to be taken with restraint. This network is managing a wireless pedophile ring and a racketeering business that sells access to children and adults for wireless long term exploitation , and carrying out conspiracies to deprive its victims of access to liberties and opportunities, not stealing government secrets. Governments have no idea the danger the individuals on this network pose to public safety at present to children, women, our government and its infrastructures. This network has already been responsible for the deaths and suicide of thousands of persons that secretly died directly due to the crime. But there are crimes that the network has been responsible for that government has not yet acknowledged and may not without public awareness. These crimes involve the use of wireless technologies to impact airplanes, telephone systems, emergency broadcast and communication systems, vehicles and medical equipment. Government must be prepared to brace themselves because the network of high-tech criminals does not take resistance for an answer, and believes they are not to be challenged or reported. In this crime the criminals have complete discretion about their activities and the duration of them. With technological weapons and AI computing systems far more advance and established than those used by governments, the network is free to carry out crimes indiscriminately. Their crimes involve in-home and business wireless invasions and the violations of the persons within them, secretly. They have existed for decades: different

Page 27

Page 27 of 121 generations of criminals and an ever-expanding network that is growing in numbers and diversifying its organization to ensure they can continue their operations. Many young minority and white persons appear to have been given access and employment on the network for lucrative pay, which has aided them in evolving in their criminal practices. It appears this organization was once a white supremacist group but has since expanded to include hackers, minority street criminals, researchers , black market physicians and psychologist, scientist, child sex criminals, cartels, terrorist groups abroad, and gangs. These persons work separately and engage in crimes collectively. This unification has made the network more powerful and increased their numbers. They have a lengthy criminal resume, one that has remained elusively concealed. According to one source, a longtime victim, the network has been involved in secret assassins of people, organized mass shootings using victims of their crimes that they condition to carry out mass acts of violence, conspiracies based in race, class, and gender, and surveillance of government agencies, are just a few of their activities. The criminals’ crimes are getting bolder and more flagrant. They have shifted from concealing their network , the existence of its wireless technologies, and preventing all reports of any crime involving the use of “directed energy” to allowing reports to succeed and even be reported on in the news. This may very well be a scheme or some sort, concocted as a devious ploy to commit other illegal acts. Or it is possible the decision to expose the use of wireless technology criminally by attacking diplomats is possibly related to recent developments in the areas of neurotechnology, wireless communication technology, and science, and a risk of the hidden crime being detected before the criminals were prepared. It appears that the world wide network has remained hidden for decades yet now there is a surge of attacks within a short time span. This may be due attempts to intentionally expose their crimes before they are investigated,

Page 28

Page 28 of 121 which could mean that they have prepared, hidden its members, traces of money, and have established themselves in a safe position so that moving forward its members would be difficult to locate. The government is likely to look to Russia or China or other countries for the source of the recent attacks, but allocating investigation resources solely outside of the United States—given that there are thousands of United States citizens who have been living as chattel —would neglect the homegrown criminal organization here. Though a significant number of the reports of attacks on government employees have occurred outside of the United States government may be being directed to look outside of it’s borders. The network is a transnational group of criminals, and they have divisions across the world with persons who are also violating individuals and governments in other countries. A secret network of criminals has actively engaged in crimes in the US for decades. Preparing for the moment crimes involving wireless energy are openly discussed. It can only be hoped that government is prepared to manage the threat. But without accurate knowledge about the network and the ruses used to cover up their crimes, how can they be? The wireless network’s members are prepared to wage a high-tech war that the United States government seems ill prepared for, and given the way reports of this wireless crime have been handled by law enforcement in prior years, this problem is going to get much worse if not addressed appropriately. The bad news is the criminals have already started; they have just done so quietly through discreet acts of high-tech domestic terrorism and a class of secret crimes that are so invasive that they render the individual helpless. Law enforcement officers, policy makers, judges, and their families and children are not safe and neither is the public . No one is off-limits for these criminals. The network’s technology permits them to gain access to any person, any

Page 29

Page 29 of 121 home or place and interfere with any technology. It can speculated that that if they elect to, they can access warfare information, military equipment, plane or boat system—without ever stepping foot within thousands of miles. The network is not a friendly gathering of people that are using potentially deadly technologies as weapons. They have murdered. They are not simply engaging in advanced “Peeping Tom” activities, watching people as they go about their daily lives and broadcasting random persons on a hidden network for profit. They torturing children and adults daily. On the network, its members are subjecting unsuspecting people to psychological abuses, encouraging high risk behaviors, inciting violence, encouraging drug use, impacting emotional states, organizing rapes of women, sexual abuse of children as they watch, impacting health, health, driving people to suicide, aggravated wireless sexual abuse and assault, murders, arranging for people to contract HIV and other STIs, conspiracies that deny people the right to work , to obtain housing , that drive people to homelessness, and even suicide. They are destroying lives and families. These wireless crimes have been occurring right under the noses of the government and the American people. Unless the network is addressed their crimes will continue. Victims of it, could be anyone, so before it is believed that this crime is isolated to “certain” persons it is important to understand that this unregulated criminal threat that has complete discretion about who they violate. Today, its children and minorities, yesterday it was government personnel, who is next? The use of energy for crimes has been long disregarded as a trumped-up story developed by mentally unstable persons. Yet recent news accounts featuring statements made by government personnel reveal that wireless energy-based attacks impacted their brain function, health, breathing, and coordination and caused extreme pain using invisible energy. It appears

Page 30

Page 30 of 121 that the “unknown source” using the wireless technology and the secret organization that has represented itself to victims during their crimes as “government agencies” has pitted its victims and the government against each other in a brilliant scheme developed to ensure their crimes remain hidden. If the government thinks victims of potentially the most dangerous crime in history are mentally unstable and victims think the horrible crimes committed against them are carried out by the government, there exists a conflict. Victims do not report it, and law enforcement ignores victims when they attempt to. The criminals remain unaddressed. Before government actors disregard the countless attempts made by bold victims over decades to report the wireless crimes consider that the anonymous persons on the network have controlled the narratives of the victims lives they are violating without circumscription. The persons operating on this network seek to get away scot-free. If their victims are disguised and do not appear like victims, then there is no crime. If their victims are gravely disabled they cannot report the crime or articulate it. If their victims are deceased, so is the most viable witnesses. Characterizing victims in socially unacceptable and damaging lights so that they are discredited has supported the concealment of this crime for years. Government actors maybe in a state of confusion about whether the reporters of this crime are mentally unstable, but enduring abuses of this nature is bound to have impacts on the entire person. Mental health problems do not automatically disqualify a person from being able to discern if they are victims of a crime. Victims who have reported their experiences over many years state the horrors they have suffered through are exponentially worse than those recently documented in the news from government persons. The anonymous victims contacted have shared stories that all involve constant, relentless, wireless, and aggravated physical and sexual assault paired with wireless harassment, psychological abuse, and actual conspiracies structured as “games” played by the

Page 31

Page 31 of 121 patrons on the network using unwilling persons. Though victims do not view the acts of crime and abuse impressed upon them as “games,” apparently the members of the wireless network have inducted their victims into a for-profit racketeering circuit where its members use victims for sport exploitation interchangeably. Victims state they are treated as property. Members have been heard making wagers and bidding on outcomes that its multi-user network of persons competitively arranges into the lives of victims while watching as they are just trying to live their lives. The crimes, according to victims, are exhausting, debilitating, traumatic, psychologically abusive, menacing, and inescapable. How does one escape energy-based technology that is invisible? Exactly. Which is why victims need law enforcement and government intervention, or else they simply die victims. The wireless criminals’ technologies can see, hear, and interact, and they have black market and noninvasive neurotechnology. Though you may be reluctant to accept that a criminal and dangerous group of predators has access to technologies which they have been using to violate anyone, they not only carry out major privacy violations but psychological abuse and victimizations that stem from such activities. Such advance technologies utilized on unsuspecting persons is dangerous, and though you may be unaware of it, it has also had deadly consequences for victims secretly. This is their most dangerous weapon, and much like the technology they are using to carry out wireless energy-based assaults, the use of this relatively progressive wireless and noninvasive neurotechnology has increased their criminal capabilities and their abilities to engage in human rights abuses in ways that are detrimental to their victims. The network’s neurotechnology can impact brain function and cause aggression, depression, panic, anxiety, drug use, hypersexual activity, amnesia, and perversion, along with suicidal ideation and propensity for violence—and they have. It allows them to trigger states that

Page 32

Page 32 of 121 are uncontrollable, impacting neurotransmitters, cognitive functions, memory, and emotional states without awareness of such violations. They can impact victims while they are awake or sleeping soundly within their homes. Supplementing the use of their wireless technologies for aggravated offenses has aided the network in arming themselves with not only technologies that have aided them in the commission of their large-scale crimes but also the application of advanced psychological practices that, when used together, can cause significant harm to the individual and others. Regardless of what professionals in the field say about the existence or nonexistence of such developments that are wireless and noninvasive, consider that the criminals are running a hidden crime operation and they have many technological assets that have aided them in not only hiding their existence and activities but in carrying out crimes in ways that present no risk for them only those they violate. It unlikely that researchers and scientists would have the knowledge about a hidden criminal enterprise unless they worked for them. Ultimately technology is only as limited as the persons who can take their ideas and bring them to life, which this network has certainly done. Whereas research institutions are limited by red tape and funding in the areas of development of brain technologies and wireless systems, the criminal network does not have such problems and therefore has sped past the government and the private sector and is using technological developments—which published journal articles from prestigious institutions claim they’ve just invented or will not be possible for years to come—for secret crimes against individuals and the government. Advanced black market brain technologies have given the network an unmeasurable advantage in their crimes to carry out the violation of one’s

Page 33

Page 33 of 121 neurological rights—anyone, anytime, anyplace. Before you become a skeptic, know that it is doubtful that a hidden criminal network and its activities would be known if they are hidden. The criminals’ use of wireless technology to watch, listen, assault, communicate, and access all technologies utilizing any form of electromagnetic energy in their environment at will is only the surface of their abilities. With the use of other technologies, this network does not only abuse, set up, traumatize, and conspire. With developments that enable access to not just one’s environment but one’s brain, well—there is nothing they cannot do. It is up to law enforcement to take a special interest in this level of crime—as its continued growth and expansion could mean terror on a much larger scale. The network is established and has managed its organization so well that for decades their activities have been mystified and casted as conspiracy theories, not by accident but by design. But the secret murders they have been responsible for and covered up are real, along with the victims who died in mass shootings carried out by persons who lived as victims of this hidden crime and the families who lost loved ones unnecessarily and the mourning of each act of violence directly related to this hidden crime. The victims have developed cancer in areas they are assaulted in, major health issues or died suspiciously, should also be unsettling. In a documentary aired by 60 Minutes in 2019, diplomat Catherine Werner reported she was assaulted by wireless technology, also deemed “Havana Syndrome,” while on assignment in Asia. She described her experiences being assaulted by the wireless technology, providing details about hearing sounds inside of her hotel room . During her interview she stated she woke up “with headaches every day, woke up tired every day, and the symptoms grew worse daily.” She described oscillating pressure and pain during the attack. She highlighted that other diplomats

Page 34

Page 34 of 121 had experienced hearing loss and other impairments due to the use of wireless technologies in separate incidences and countries. Werner was simply doing her job for her country, and she was attacked by wireless technology. Though most would like to attribute what occurred to international threats solely, what is known is that in the United States, for decades individuals have reported that they are forced to live while they are beamed by some unknown energy-based technology daily. Often victims are not permitted to report the occurrences to law enforcement. Countless victims have reported having their freedom threatened and being threatened with commitment , experiencing patterns of abuse that discourages future attempts. Victim contacted for commentary about such experiences agreed that they experienced the same outcomes. What is evident , is the division of the high-tech domestic crime network located in the US has used wireless technologies for crimes 365 days a year from coast to coast. It appears that thousands of individuals are living while being subjected to wireless experiences far more violent and predatory than that of Werner and other government personnel daily—for some, twenty-four hours a day. Our homegrown high-tech problem is certainly not to be overlooked, rather explored with inquires made, investigations initiated, and action taken. Victims of this hidden crime, like Werner, were just living their lives and were preyed upon. Except victims of this crime have no platform and connections to the government or its resources. They are parents, siblings, children, seniors, young adults, students, and individuals who have no way to speak out. Many have expressed that they have made attempts, but for now, there has been no real success in getting law enforcement to launch an investigation into what they are using, where they are located , how they can transmitting such distances and who the persons are, so they can be addressed.

Page 35

Page 35 of 121 In this crime a single act of wireless violence will almost always evolve to an individual being subjected to aggressive wireless crimes and surveillance to ensure they do not report the encounters they have experienced or continue after the report is made, if it is successful. But if the network violates an adult with children, they almost always violate the minor child and others within the family unit. The crime, according to victims, is one that one can expect to learn to live with and will include: wireless aggravated assault by energy that burns, brands, and penetrates the body (sexual organs, heart, lungs, breasts, private areas, kidneys, etc.); brain assaults, causing varying levels of pain, headaches, blackouts, and impacts to memory and all other cognitive functions, attempted murder; and wireless harassment twenty-four hours a day by individuals who use stealthy wireless sound transmission to transmit their audio through ambience, for as part of their psychological abuse, the anonymous persons subject persons to anonymous individuals screaming profanities, racial slurs, berating statements, threats of harm to family or friends, perverted leading commentary, and persecuting and menacing chanting. It has also been reported that sounds and laser-like displays. Whether the victim is showering, driving, or sleeping, they can transmit while eavesdropping anywhere a person travels, cause sleep deprivation, and commit other criminal acts. Victims state that the network has enough anonymous criminals logged on to subject persons to reoccurring abuses all day. Victims perceived as problematic are abused more frequently than others. This is certainly purposed to impact mental and physical health, interfere with liberties, and naturally it reduces life expectancy. It can be suspected that this is why the majority of victims do not make attempts to report the crime, especially if they have children or do not want to encounter situations that they cannot financially or legally take on.

Page 36

Page 36 of 121 The network is actively violating children and adults across the country, and no one is doing a damn thing about it. Recently senators from several states appear to be putting pressure on the Biden administration to find out what and who is responsible for the mysterious attack on government officials, according to a CNN report. The source of the problem is what this book is about, or at least a major part of it. Let’s hope that government officials grasp the seriousness of their recent attacks and make the proper inquiries. Many victims have long believed that government agencies, countries like Russia and China, contracted persons, among others, have been responsible for the use of wireless technology for the various long-term abuses they suffer. But given the experiences described by victims are nearly identical in most cases, crimes are being committed therefore they are “criminals”. Though other governments may own technologies that enable energy to be transmitted wirelessly, the crimes carried out against victims in the United States are the result of a transnational high-tech network of criminals that reside in the United States. Reports of government personnel being assaulted have breached contradictions into past suspicions. Many victims of the hidden network have been led to believe that the energy attacks they have suffered was due to whistleblowing, retaliation, malevolence or it’s the government. It is reported that the wireless criminals often misrepresent themselves and uses such schemes. It is revealed only now to be an attack against the government, its personnel, and the constituents whom they serve. Law enforcement and policy makers should be concerned; this network is ruthless, and they have done far worse than cause headaches, nausea, and oscillating pressure in one’s head—they also run a wireless child sex ring and an adult exploitation ring that tortures, in which people on the network pay to take part in using the wireless technology to violate children and adults in their homes and as they drive, walk, and fly, inside, outside, and even in the air.

Page 37

Page 37 of 121 The human rights abuses and related criminal activities of the hidden high-tech network require exploration and investigation. The crimes committed and the methods employed by this network are of a different nature—more sinister yet more discreet, intrusive, violent, and long-term. They have no risk of being identified and no legal motivation to stop their crimes, so they simply continue them secretly. Pressurizing or manipulating people into remaining silent using threats, intimidation and violence is one reason in which the crime is not well known. Without reports of the crime, wireless network cannot be addressed. Criminals rarely stop committing crimes without law enforcement intervention. Though hacking is the most familiar computer-based crime today, the network is not exclusively involved in computer intrusion. The network engages in both cybercrimes and crimes outside of cyberspace—offline, in our communities, violating people within their homes and outside of them using interactive wireless technology. They never have to step foot in your environment. With complete freedom and virtually no risk, the network is actively maintaining a wireless black market business that profits from selling access to children and adults and now the commission of crimes against the government and its personnel as they remain in their own environments. With progressive technology that many of us would only think of existing in fiction, this network can accomplish criminal feats that few can imagine even to be possible today—using technology. Their advanced technology has removed the limitations that once confined criminals to cyberspace. Their black market technologies have enabled them to carry out crimes offline using digital processes. Using technology that is wireless, long-range, and interactive, the nameless criminals engage in acts to violate privacy, assault, traumatize, oppress, and harass remotely. Their

Page 38

Page 38 of 121 technology is not limited and is instead limitless. It has helped the network to remain elusive, freely attacking and watching unsuspecting persons, children specifically, who are defenseless and have no way of escaping or protecting their physical persons. It is true that they are committing many crimes, but the crimes against individuals should be concerning to use all. With the wireless technology, the network can cause major health complications and loss of life, and given that they remain hidden, easily it could be staged it resulted from natural causes or random external circumstances. Government personnel experiencing sicknesses and disabilities was a prelude to what the network can really do. Longtime victims reported that they were healthy before the network begin their overt abuses, following which they developed major and minor health problems with their hearts, lungs, and thyroid, as well as headaches, cancers, digestive problems, breathing problems, and blood clotting issues. Some have had strokes and heart attacks; others report living exhausted daily. But there is a part of the crime that is not known to the government; victims of it have been sharing photographs of laser-like brandings and markings that have been left on the faces and bodies of the child and adult victims in which have shared their stories. These markings are made by the wireless criminals technology, more than likely used to identify ownership, catalogue, communicate about, and humiliate the victim. At first glance, if not identified, these laser-like marks left below the dermis might be overlooked as “normal” scarring, but photos of victims with different filters (best when taken with a forensic UV camera) reveal letters, numbers, words, shapes, designs, racial emblems, and messages left by the criminals for others on the network to view. This crime is not simply abusive; for some it has been deadly. The network has a number of old and young hackers who are involved in regularly accessing government computers and personal computers, planting evidence, stealing

Page 39

Page 39 of 121 information, setting people up, tapping cell phones, and committing other technological crimes. But given that their technology allows It’s more than likely that the network is using methods that model practices notably used by government agencies in the past. These practices include using radio waves and frequency transmission (forms of wireless power) rather than traditional hacking methods. RF is acclaimed for its ability to gain access to nearly any form of technology without requiring passwords or being detected. But they may be using other wireless energy means in combination with RF. The network does not need to gain access to a person’s computer or other devices to gain access to one’s private life or home. This is not that type of crime. This crime is more of a threat. The criminals never enter the environment of their victim physically. The network has adopted technology that enables them to use some forms of energy-based systems that do not require wires or connections and do not require devices to be present within the environment of their victim. Interest in their child and adult victims lies not in simple data theft but in wireless, in-home and environmental exploitation and major privacy violations. The network’s members have been running a wireless exploitation network that profits from inhumane crimes including torture, selling access to children and adults for sexual exploitation, conspiracies, hits, oppression of groups based on race, class, and gender, murders, keeping victims as pets over years, schemes, scams, fraud, frame-ups, competitive victimization, depriving their victims of their liberties, etc. But this is only the surface of their activities. The persons who make up this network never physically enter the environment of their victim, nor do they have to. Wireless and energy-based technology has equipped them with the ability to interact, communicate, and abuse remotely. The network is interested in treating their victims like digital property rather than people. Thus far they have done just that for decades. Secretly they have maintained a group of persons whom

Page 40

Page 40 of 121 they have violated concurrently, some of whom state the crimes began when they were minors and have extended into their adulthood. Quite a long stretch of time to spend being abused. But with a crime that people do not yet know is established and actively poses a risk to their personal safety, the network maintains the upper hand. Victims still maintain the responsibility of sustaining their life through work, paying bills, and trying to keep some form of normalcy and sanity as a band of predators invades their space and body liberally without any escape, defense, or ability to speak out—these crimes have simply just gone on. What is alarming is that it has taken the reports of multiple persons that work in government for wireless and energy based crimes to be acknowledged as if the thousands of victims that have made attempts over decades are not “credible sources”. For lack of any other word, victims are actively being held as hostages by wireless criminals, and they can do nothing about it. But government officials and law enforcement can. The real question is: will they? Will they ignore the hidden victims who have been driven to financial ruins because the networks conspiracies and violent crimes? Or ignore the abundance children who are actively spending their childhood being subjected to aggravated wireless assaults, being touched by energy, being violated as they sleep in their homes? Will they ignore the symptoms imposed upon them daily – headaches, lethargy, cognitive problems and pain? Will they ignore the connection this crime has to several mass shooters, who reported prior to acts of violence they were being assaulted by “directed energy weapons”? Let us hope not. Victims cannot just leave a situation in which a gang of wireless offenders is transmitting through the air in every place they frequent. Over time the network impacts their lives and isolates them to ensure they are in a state where the crimes can continue and the persons will not

Page 41

Page 41 of 121 speak out, their physical health declines, and their mental states crumble due to reoccurring violence and abuses. One of the most bizarre aspects of the network’s human rights abuses is that victims have reported that various persons on the network stake ownership over them, referring to them as their property- slaves, and multiple victims state it appears that the technology is being used for not only voyeurism of them in their homes but their children, other families, and allows the criminals to have access to all personal information ( not simply social security numbers, but account numbers, investments, identity numbers, personal documents, work information and all information ones stores privately). The networks members have complete access to their victims bodies, homes and children. It is reported that its members liberally use its technology to violate their victims, and at any time could harm them or their families. The criminals are anonymous and they have complete discretion over what they do to victims and their lives. The use wireless neurotechnology gives the networks members access to more personal information and allows them to take their psychological abuse to new levels. Numerous of reports from victims state that they are subjected to verbal abuses, and other forms of conditioning that overtime is purposed to make them neurotic and violent, and their goals are to drive them to commit suicide, crimes, to act out, to have mental breakdowns and in some cases they have encouraged victims to arm themselves, chanting phrases during their wireless harassment and aggravated assault using wireless technology, “If you kill the pain will stop”. The use of wireless and non-invasive technology gives the network the ability to gain access to the brain and gives the network the ability to manipulate, impair , confuse and disturb normal brain function. Victims state that on the network, persons select from child and adult victims to buy time and access to direct the technologies violating them via a computer system, interact with the

Page 42

Page 42 of 121 victim by wireless energy assault or harassment, and set up situations and hazards as the persons watch and even cheer in the most extreme cases (sound is transmitted through ambient air and is audible). They state they are being broadcasted for all persons logged in on their network to view and watch their private lives. This book seeks to shed light on a crime that for decades, has impacted our communities and globally. This crime is more than just crimes against government, it is also crimes against the public, democracy and our children. Law enforcement and policy makers have responsibility to make the proper inquires into this uncharted territory that is wireless high tech crime.

Page 43

Page 43 of 121 65 Chapter 2: Red Rooms on the Dark Web There are aspects of the network’s crimes that correlate with the convoluted digital domain that is the dark web. The dark web is the underground realm of the internet that offers pedophiles, predators of all sorts, gang members, street criminals, computer criminals, extremist groups, and organized criminals a place to meet and do business in a sphere that offers privacy and complete anonymity. Money and information is exchanged. People are protected by virtual networks that do not allow tracing and IP identification. Individuals are able to safely trade guns, stolen credit card numbers, social security numbers, narcotics, children and women, and even access to voyeuristic shows. The high-tech sex trade business is extremely profitable. But not all aspects of it are known. Offline people are traded, drop-off locations are exchanged, and even voyeuristic access can be tapped into if you know where to look or have an associate who can provide you access. One can utilize Tor web browsers and VPNs that anonymize the user, allowing individuals to access .onion sites that are not available on the regular web. Computers are connected by private servers, and most of the people who meet there are often not seeking out free published journal articles. They are not there for interest in freedom of expression. Many of them are there to seek out illegal activities, that is, black market business. The “Hidden Wiki” offers a snapshot of the outlawed black market operations available on the dark web. There is, however, an even darker side to it; that is, deep within the dark web, there lies a lesser-known faction called “red rooms.” Many people believe that red rooms are simply a dark web legend that may not exist at all. However, Peter Scully, a pedophile who hosted a red room “pay for view” site in the Philippines, carried out a less sophisticated version,

Page 44

Page 44 of 121 yet it was the closest related crime to that of this wireless criminal network’s black market live broadcasting for-profit business. He is now doing life in prison. If you are familiar with “red rooms,” you already know that they are not places for the faint of heart but instead are a mecca for individuals who have detestable interests. It should be no surprise that according to several published sources, these dark web rooms are generally highly guarded, and only a few are given access to enter. For those who do enter, they do so at a cost. They are “pay for view” torture sites. These rooms model legal cam shows that advertisements populate for, in which men and women are employees of the sex industry, and their business is selling sex online by live broadcast, though legally. Red rooms are illegal, and generally the persons being broadcasted are captives, minors, or unwilling. Red rooms cater to a different audience: persons who are willing to pay to fulfill their perversions. According to reports these rooms do not stream movies; instead they stream real-life, live-action broadcasts, voyeuristic and inhumane crimes, sex crimes, violence, schemes, pranks, violence against children and women, brutality, torture of persons held captive, persons being humiliated, and murder. Peter Scully, a pedophile in the Philippines, established a red room site on the dark web, where pedophiles paid him up to $10,000 to torture and abuse a baby girl. In an article published online, it was reported that in one of Scully’s livestreams, the baby girl was tied up and beaten by Scully and a masked woman. They were tracked down by law enforcement, and Scully was sentenced to life and is currently in prison today. People like Scully are only a fraction of the persons who access these sites; many of them are young, old, affluent, college students, research students, hackers, and others who seek out these environments to gain access to the criminal underworld and watch such activities.

Page 45

Page 45 of 121 Regular people, criminals, gangs, groups, and many wealthy persons seeking out deviant sexual experiences involving infants, children, girls, boys, men, and women make up these red room audiences, according to reports online. Secrecy among those who frequent the highly illegal environments is maintained to protect the persons who access, and many are unaware that these environments exist outside of those with access. People pay to play for voyeuristic experiences they deem as entertainment involving the dehumanization of a living and unwilling person. For them this is amusement, giving them entertainment that fills their daily lives. For the rest of us, this is sick, criminal, and illegal behavior that needs to be addressed. Generally access is streamed and live, and the viewers pay in cryptocurrency to instruct the captor to carry out acts as they watch. The most disturbing piece is that in these rooms, reportedly anything goes if you have the money to cover the request. The dark web appears to play a huge role in how the hidden network has structured the live broadcast profiteering aspect of its crimes, where they may have recruited persons they employ to work on their network, and how they are now profiting on a larger scale from their criminal activities. It is suspected that the crimes committed by the individuals on this hidden network involve the use of wireless energy and power technology or directed energy used outside of the internet. What is known is that the use of energy-based systems that have long-range capabilities is allowing anonymous criminals to gain access to people’s homes and other environments with and without their knowledge. The network’s crimes occur in real time and are live. The network, much like the internet, is readily accessible to those with access twenty-four hours a day, and because the persons behind the technology can gain access to homes across the country and the world, victims are in abundance. Whether watching government officials, children, or women, the networks technology can access any environment. The other element of

Page 46

Page 46 of 121 the network’s hidden crimes is that its utilization of wireless energy gives the network the ability to not simply interact but to engage in aggravated physical and sexual assault remotely. When the anonymous criminals elect to, they can even transmit their audio, establishing two-way communication within the environments of the victims they violate. Victims have reported the network’s members often attempt to frighten them, transmitting bizarre and ghostly sounds, following which, the network’s members often establish communication with them by transmitting into their environment. Long-term victims claim that they are threatened, told that the organization is the “FBI or CIA” or another government agency to convince them they have committed a crime to intimidate them, threats are made by the unseen persons who claim that if they report them, they will be harmed, deemed mentally ill or they will be retaliated against. This often results in victims remaining silent, to the detriment of its victims. Most state silence always leads to the network continuing to harass them and, over time, escalating their activities to aggravated wireless assaults and other crimes. Black market and high-tech crime has been disregarded and often dismissed as reports from delusional persons rather than individuals whose human rights are secretly being actively violated over long periods of time. For many of the victims of this hidden high-tech crime, they feel that this network is not simply oppressing them without purpose. Aside from race, class, and gender motives, their interest has turned to profit from their individual and ongoing victimization to amusement for the criminals who organized conspiracies that have been reported and referenced as “hits” by the criminals. These acts , according to victims involving them being targeted specifically at the request of persons who seek to harm them using the persons on this network. It must be considered that, given that the network, though wireless, is an organized criminal network, and technology has not limited traditional organized criminal abilities, it has

Page 47

Page 47 of 121 instead supported other forms of crimes with identical impacts and those far worse than those associated with organized crime groups today. Whether murder, intimidation, oppression, terror, theft, or assault, the network appears to do it all. Reports from victims state that at points during their crimes, hundreds of anonymous individuals were heard as they communicated in their environments wirelessly or within earshot in ambient air. The victims who made the claims have no direct connections and describe identical experiences, and the photographic proof obtained could only be possible by way of technology. The descriptions provided by victims align with that of traditional red rooms formats like the one run by Peter Scully. Some report the criminals have spent decades taunting, berating, and psychologically abusing them by subjecting them to repetitive and obscene harassment, chanting, laughter, manipulations, and “punishments” that are menacing and interfere with their daily lives. Many victims state that they have been threatened along with their families and were forced to remain silent in the beginning of the network’s exposing their organization, and by the time they mustered up the courage to speak out, the network had already established themselves in their lives, carried out life-altering and traumatizing crimes and conspiracies, and set up events to discredit them or portray them as mentally unstable so that they remain oppressed. The victims are therefore forced to live as they endure daily abuses, and they are tortured through aggravated assault by some form of energy weapon that is not visible to the naked eye. Victims have reported they are sodomized, teeth are decayed, faces are branded and burned, internal organs are penetrated, their hair is burned out, and, over time, their health is impacted, causing debilitating health issues for victims that have resulted in permanent disabilities and death. It is clear that their stories differ from persons who have natural mental health issues. Some victims have even captured photographic evidence of areas of their bodies that clearly

Page 48

Page 48 of 121 have been branded by something, that something is technology; in some cases more extreme abuses have been captured, such as lacerations, varying degree of burns, and areas marked with X’s that are circled, numbers and letters. Many victims have also secured videos in which, reveal that while sleep, the technology is being used to violate their bodies. Female victims have described experiences where they have woken up, and their vaginal areas and rectums were in pain due to the wireless assault. Victims agreed that if they acknowledge the network’s crimes to others, attempt to report them, or make any effort to get the network addressed, often individual law enforcement officers intimidate them and respond with threatening behaviors; in some cases they have even attempted to detain or arrest them for speaking about the network. Victims state that reports are often not taken, and the experiences are so terrifying that they are deterred from making future attempts. Victims state that the network’s members have unlimited access to their homes, personal information, and families and have developed well-thought-out schemes that have entrapped them in circumstances that they are not prepared for or capable of addressing without legal assistance. So for now they are living with limited freedom while being terrorized daily by wireless criminals who find new ways to torment them daily. Except this network appears to broadcast the terror victims are subjected to on a livestream and hidden network where its members congregate to take part in what the anonymous persons view as sport and the victims as commodities rather than people. If this class of hidden victims speak up, they are branded as mentally ill by law enforcement and medical professionals who have dismissed this crime and its network’s activities and failed to understand that the crime has been set up intentionally to model features reported by real mentally ill persons to conceal it. Allowing this crime to simply exist has put

Page 49

Page 49 of 121 them and their children and homes at risk as well. As a safeguard to their activities, this network has used law enforcement to characterized victims of their crimes as mentally unstable persons and with the assistance of individual law enforcement across the country in states where victims have made attempts to report the crime, where victims have been met with lawlessness, it should no surprise that there is a lack of documentation and reporting of the network’s crimes. Meanwhile the victims of the hidden crime are being sold and traded like digital assets on a wireless market that has been collecting people as property in the United States. Not only is this crime innovatively carried out, it is one which is inescapable. The crime is carried out as persons are living, and wireless technology is the catalyst that has permitted access to the homes and the children and adults within them. Victims account that the members of the hidden network have made statements regarding the sale of access to them and the violation of their children for exploitation and abuses remotely. Reports include the members of this network referring to victims as “cows,” “chattel,” “cars,” “pets,” and “property.” The network continues to profit daily by terrorizing and abusing its victims. But sport and sadistic amusement is only part of the network’s objectives. For some victims the network preys on them due to their race, class, gender, age, sexual preference, personal dislikes, statements, behaviors, career objectives, family ties, or political, government, and business ties. With criminals that have nationwide access and are not limited by locality or distance and no policing agency to regulate this level of high-tech crime among the public, its members are free to kill, assault, abuse, oppress, scam, exploit, terrorize, watch , mentally abuse, torture, and deprive its victims of access to liberties at will. This is exactly what they have done, both while their victims are living from day to day and as persons are unaware that in their own

Page 50

Page 50 of 121 beds and homes—the network is an can indiscriminately violate their privacy and they are left vulnerable for other crimes by the network. The high-tech criminal network crimes have attributes consistent with what is known of red room live broadcast streaming on the dark web. Except for victims of this crime, they are not held captive and are not removed from their environment but live while a livestream situation exists. The use of wireless energy, microwave, or aerial radio wave technologies or other means that have long-range capabilities when modified transmission from coast to coast is possible, or some other derivative is more than likely the source of this network’s ability to remotely gain access to their victims from long ranges. Whichever means this network is using, it certainly is not limited to accessing one’s computer or cell phone and instead involves wireless means of intruding upon the homes and environments of individuals, specifically children, that this network elects to prey upon. Victims report being tortured, subjected to aggravated physical and sexual violence, penetrated, branded, subjected to black market games, and forced to comply, unable to see the persons violating them. When they enable their sound, the network’s members freely communicate using wireless technology. If victims speak up, this network counteracts their reports by using law enforcement or medical professionals who appear to willingly and at times knowingly aid this network and who believe the schemes they use, where victims are portrayed in negative lights. According to victims it has become clear that frequently many law enforcement or medical professionals are not simply acting out of ignorance but are convinced to act and interfere with the victims’ ability to report its activities or attempts to seek law enforcement intervention, aiding the network’s attempts by silencing the victim. Hundreds of victims report that the network’s members electively turn on audio while engaging in their

Page 51

Page 51 of 121 crimes—audio that others claim not to hear. It should be no surprise witnesses would be fearful about admitting or acknowledging the wireless criminals’ activities. Observing laser-like burns on the faces and bodies used to mark victims seems to easily convince even the boldest individuals to remain silent about the wireless terrorists. This may explain why victims are forced to remain destitution and denied the right to obtain access to certain career opportunities, due to the network organizing collusive arrest and convincing employers not to hire the victim. Which drives them to require government assistance or in some cases, homelessness. In urban culture the network has been spoken about in ways that are meant to sound intimidating. The network is called “The New World Order” or “Illuminati,” but they are instead a domestic terrorist organization. The network appears to have adopted the name of the ancient order for the purpose of intimidation. People fear acknowledging the network. Often mention of the hidden network is encoded in rap music and other genres that illude to the existence of this mysterious organization. This may be a starting point for law enforcement to locate the persons behind the technology. Similarly to offline organized criminal pressuring, the network has established a reputation as being an organization that is not to be opposed. Enduring such invasions of one’s life is described by victims as “their lives being held hostage every day,” except they still maintain the same responsibilities as persons not being violated. They are still responsible for maintaining their lives and all necessities; the added stress of the crime is stated to be overwhelming. Victims are forced to adapt, remain calm, silent, and ignore the pain, the verbal and obscene abuses, and the offensive ways in which they are being forced to live. On the outside the appear to have normal lives, but their lives are anything but that. Daily they are made to suffer and forced to remain silent for fear of the networks retaliation

Page 52

Page 52 of 121 or even being arrested if they speak out. As a result over time victims mental states decline, along with their health and in some cases will to live. Several victims have compared the intrusions to the way in which bees swarm to explain the magnitude of the abuse, specifically in situations where the victim is viewed as potentially problematic and might report their activities. The network has enough people and often looks for persons from low socioeconomic status, hackers, gangs, students, and young professionals who appear to be eager to take part in the revolting crime. As described by victims, the network’s multiuser systems involve hundreds of persons logging on simultaneously, but there could be thousands. Each group plays a specific role, whether it be to manage victims, prevent interruptions, provide damage control, psychological abuse, games, conduct diversions, etc. Many victims of this crime report that they are now on disability. After years of attempting to report the network and a refusal from law enforcement to aid them, they admit to being driven into states where work is restricted by the criminals. Their finances are drained from trying to liberate themselves, and therefore they now rely on the system. Nearly all state that they would love to be able to live in peace, work, and provide for themselves, but the network won’t allow them to do so. Instead they are forcing them to remain isolated and removed from society, alienated and therefore they live with restricted liberties. Instead of being in a hidden location with an abducted victim, as most red room live broadcasts are set up, the use of technology has enabled the network’s anonymous members to subject victims to crimes in their own environments. Victims have reported that their cars have been set on fire, car accidents have been arranged, and conflicts involving victims being attacked or followed are common. With their technologies all of the acts are possible using wireless technologies. The pain victims describe is certainly real, which clarifies the branding observed

Page 53

Page 53 of 121 on the faces and bodies of nearly all victims of this hidden crime going back decades. Victims report being humiliated and forced to live in deplorable circumstances. Profitability for this crime would be infinite for the right audience. BDSM aficionados, pedophiles, voyeurs, live action enthusiast and sadomasochists are adequate audiences. This not a low-level crime, though its criminal workforce is. This is well-thought-out, designed, and executed by a multi-person criminal operation that is operating in the United States and also has folks abroad. Undoubtedly narcotics and weapons play a significant role in the success of the network thus far, as well as the money and power behind its success. But also traditional human trafficking and abductions. Using wireless technology of this nature for crimes allows anonymous criminals to locate vulnerable children and adults that might be the lowest risk of recovery for the purpose of, in person abductions. There is a high likelihood that the network is linked to several crimes involving missing persons. Besides, having access to persons homes opens more avenues for criminals looking to profit from human rights abuses. Whereas red rooms on the dark web offer simple viewership and the ability for the participants to make requests related to torture for payment while simply watching as their request are filled, in this crime wireless energy is utilized and allows the individuals on this network to take part in the abuses using computers, paired with innovative haptic systems that allows a lifelike interactive experience remotely (digital wireless contact and bilateral sensations), and use wireless communication systems and other technologies that permit them to do much more than simply beam energy – create haptic touch in ambient air. Naturally, computers are directing the technologies. Regardless, if they are using wireless power systems, radio broadband systems that transmit through free space, or microwave energy, as was reported by recognized news reports, the crimes they are involved in give its members complete freedom,

Page 54

Page 54 of 121 and all persons, child and adult, and all crimes are permitted. It is up to law enforcement to delve more into this crime and find out. The ease of the individuals on this network being able to portray their victims as mentally ill persons so that they can violate them and their ability to use psychological abuse to modify behaviors, causing high-risk, drug using and violent conduct is a public safety problem and threat to national security. At any time they could carry out crimes that impair, disable, or murder persons who are responsible for carrying out government, military, or law enforcement functions, as well as citizens, on a mass level. This is more than simply a theory that needs to be explored, it is a crime worthy of a nationwide and global investigation. It is not a coincidence that several mass shooters across the country claimed prior to their acts of violence that they were being violated by energy-based technologies and carried out violence as a direct result of the abuses they endured, according to the social media posts and video logs left by them. If this correlation is accurate, and it appears that it is, this network has been responsible for carrying out secret crimes, which according to living and deceased victims involve the network assaulting them with technology while conditioning and abusing the persons as they watch. In the case of mass shooters and the profitability factor, ask Peter Scully. People paid him money to kill a baby. What would people pay to watch someone kill multiple people. No traces of the wireless criminals involvement is left and if victims of the crime keep quiet , no one would know this type of threat exists. In all cases the blame was shifted solely to the perceived preparators mental health state. Had the persons not documented their experiences before the tragic acts, there would be no record of what drove them to commit some of the most heinous acts of violence this country has ever witnessed. Victims of this crime claim that they are actively living in circumstances in which they are subjected to concurrent wireless abuses

Page 55

Page 55 of 121 and harassment today. These abuses appear to be goal driven. If the criminals surveillance twenty four hours a day, they had to be watching as shooters armed themselves, yet they did not prevent the tragedies. This may be because they wanted it to succeed. Red room environments offer a different type of live broadcast experience. Audiences seek out experience are more than simply taboo; they are criminal. Wireless access allows the criminals belonging to the hidden organization to intrude upon the privacy of environments discreetly, which, for this crime, is ideal for this network’s barrage of criminal activities. It is possible this black market activity has other motives more detestable than just amusement. These criminals are using black market games to conspire and terrorize its victims. It is known that though there are victims from all backgrounds, it appears those who are women, children, and minorities are treated far more inhumanely. The interest of the secret organization may also be derived from a practice that many believe is long extinct—“human hunting.” Approximately between 1849 and 1870, one hundred thousand Native Americans in California were slaughtered, raped, and enslaved during what has been coined the “California genocide.” White males hunted the Native Americans seeking to “cleanse” the area, according to a Los Angeles Times (2016) article titled “It’s time to acknowledge the genocide of California’s Indians.” The state endorsed the genocide, along with newspapers, law enforcement, and political officials. Though the barbaric practice seems long ago, in its own way, it has been revived in the wireless network’s crimes. It is apparent that the network has taken aspects of “human hunting” and incorporated them into their crime as a sport that involves its members “stalking,” “entrapping,” “imprisoning,” and “capturing” their victims within the restrictions of their wireless crime. Victims describe that they are technically “chased” by the criminals, and instead of rifles such as those used in the aforementioned human hunting carried out in person

Page 56

Page 56 of 121 over a century ago, they wield technologies that touch and play psychological games using practices that are distressful, degrading, and dehumanizing, impacting many areas of the victim’s life. They solicit random people to harass, steal, follow and harm the victim. Besides, who would decline a wireless devious mystery voice that manifests from thin air. One might be coerced or manipulated into acts at the networks request. Wireless technologies have forced the individuals on the network to incorporate other means to reaching their goals, but the outcomes are relatively the same. The network may not outright murder each victim they violate, and instead, opt for them to live in what they describe as their own personal hells, where their rights are restricted, suffer alienation and isolation as the network decays parts of their life so extremely that the effect is similar to a living death. Psychotherapeutic practices—such as hypnosis as persons are sleeping and behavior modification techniques in which negative behaviors are rewarded and good behaviors are punished—are also used by the network. Over time this brings about changes in behavior, and even the most strong of will persons eventually succumb to the network’s abuses. With the use of technology that instantly impacts brain function, the network is able to cause its victims and random people (who are also victims) to carry out acts that conflict with their moral standards, beliefs, religion, and free will. Both abilities are invaluable assets to the network and make for amusing episodes of abuse that are exploited by the network’s members and participants who have access to the network’s system. Instead of using of guns to murder people, the network micromanages the lives of its victims, extinguishing careers and allowing victims to work in only places they deem safe for their crimes. Victims are not allowed to freely move forward with their career, education, relationships, relocation, or health choices. Victims are conditioned to accept living within the

Page 57

Page 57 of 121 confines of the network’s abuses. Neurotechnology and secretly subjecting victims to hypnosis gives the network the ability to modulate brain function at will. Decreasing production of certain chemicals in the brain that have impacts on thinking ability, decision making, memory, hyperactivity level, concentration, and energy levels limits potential and mobility in life. If you are a physician and suddenly you cannot remember what dosage is correct for a specific person’s height and weight, or names of various medications, then you cannot possibility practice successfully and therefore you might be inclined to leave the field. Through the use of organized setups and frame-ups that work in sync and tactically, victims experience situations that they cannot possibly be prepared for or respond to calmly due to the frequent nature of events the network sets up and the excessive way in which its members violate them. Rather than a single criminal event, the network often concurrent engages in abuses daily that cause social, legal, health, behavioral and financial harm. Through abuse and violence, they drive victims to states that cause severe and longtime impacts to their ability to live a healthy and fulfilled life, rendering them stagnant. People are not emotionless beings, so it should not be outlandish that many victims experience shock, trauma, depression, or demotivation among other emotions. In this crime isolation is used a weapon. It allows the network to expose themselves freely, given that the only witness is the victim. They often confine young victims to their homes by secretly conditioning them to develop features of anxiety, social anxiety, and agoraphobia. When the victim adopts the desired behaviors and are alone, its members carry out secret exploitation using technology that can do much more to sexually and physically violate the victim in some cases. Revealing their network involves members communicating and harassing, manipulating, frightening, and threatening the victim, keeping them isolated and terrorizing them day and night.

Page 58

Page 58 of 121 Victims are contained by being kept from socializing, limiting their ability to branch out, work or have housing. But their crimes go further than that. The network has a practice of intercepting attempts made by persons to establish a social relationship with the victim by using their technology to make disparaging comments, claiming they are untrustworthy, dishonest, or have other issues to keep persons at bay. All of this is done for the purpose of keeping victims isolated so that its members can proceed with their activities, but it also helps to reduce witnesses and Good Samaritans who might report their activities to law enforcement. Its members have easy access to carry out crimes and to prevent potential witnesses from observing and reporting the bizarre crimes they subject them to daily. But for young and attractive women and girls, the network encourage them to elicit sexual deviancies thru peonage scams or threats of harm. Victims have reported that the network uses various schemes during their youth, convincing many victims that they owe them a debt and that in order to pay it off, they have to “put on a god show.” Or they set them up and claim they are retaliating for something they arrange but the victim believes they are responsible for. Frequently the network uses psychological conditions and other persuasions that manipulate the victim into partaking in unwanted sexual experiences. The victim is called derogatory names that are manipulative or they secret arrange for narcotics to be introduced by coordinate a meeting with a person who’s role is to introduce drug use or other behaviors. In traditional human trafficking, it is well-known that often traffickers force their sex slaves to have sex and take drugs. The network uses the same tactics, except the people they are being sold to use technology to violate their bodies and lives remotely. Victims live while the networks members subject them to pain, verbal abuse, and other mentally abusive acts, and most are not allowed to establish healthy lives , only permitted what is needed to keep up appearances and not draw attention.

Page 59

Page 59 of 121 The livestream of these events appears to be viewable by its members and offers them a competitive and profitable all access pass to prohibited experiences. This is tragic crime, truly a plague on our society that has stagnated it probably much more than is realized. With such a technological advantage and no obstructions to their criminal activities, it is no surprise the crime group has safely carried out crimes and measures to protect a high-tech crime of this magnitude, given the risk for the criminals. Elaborate schemes that portray potential reporters as mentally ill persons have been adopted, including orchestrated conspiracies that set up victims for criminality to discredit them, even setting victims up years or months before they begin their overt crimes, and many victims claim they are portrayed as addicts, prostitutes, thieves, and sex offenders in this crime by the network. They are gaslighted, treated as if they are delusional, and dismissed, and as a result, this crime has grown to be a threat that even government agents cannot protect themselves from. Meanwhile, this network is managing a wireless pedophile ring, young criminals, who have built their lives from their wireless crime activities. What is next? It would be a rational to state that given the seriousness and penalties of a crime of such a nature, devising methods and schemes that inadvertently disguise the crime in a manner that ensures the safety of its members, and patrons would require coordination and elaborate machination. Cloaking victims by portraying them as mentally ill persons would be a relatively multi-purposed objective. It has allowed this network to commit crimes against persons in the wide open without risk, individually and by communicating wireless request to persons when needed. It must be emphasized that this network is not simply broadcasting live voyeuristic shows of victims; they are holding wireless captives, persons who are in a peculiar state of involuntary servitude. They are assaulted inside of their homes, as they sleep, along with their children who the network preys upon liberally . They are psychologically abused subjected to

Page 60

Page 60 of 121 actual transmission of sound and images into the brain, wireless and non-invasive neurotechnologies that penetrate the brain and cause aggression, depression and psychopathic states by activating and stimulating various areas of the brain. These acts are purposed to drive mentally health people to insanity, while covering up their crimes. Victims are attacked by persons the criminals solicit to carry out in person crimes. They are deprived of sleep, safety and privacy. Though these acts are simply the surface of their activities .Such acts are criminal and intentioned to cause harm to the individual and others, the reality is that these predator acts put us all at risk. For them this is amusement, terror, abuse, violence, murder and assault are all forms of amusement. For the rest of us this should frightening and upsetting, as the persons behind the technology are dangerous and they are free to harm at will. Its members are selling access to their victims without ever entering their homes, treating them as chattel and forcing them to remain silent or suffer the network’s retaliation, which is far from comeuppance. The network has tried to make their crimes appear like acts of justice as if their victims have committed acts that warrant their behavior. When in fact this network secretly violates its victims, children into adulthood concurrently, and then later pretends they have committed acts, when often its members have set them up solely for the purpose of their scheme, and later they torture them. The networks anonymous members are notorious for conspiracies , planting evidence, schemes, blackmail and secret coercions. Especially, when they are seeking to have access to a child victim or the victim is an adult and was a child victim of its crime. The torture of children and adults is not just; it is criminal. Victims are not displaced to remote locations in this wireless crime. The network invades homes and goes after each child and adult within them when they are interested in profiting or

Page 61

Page 61 of 121 concealing their crimes. Law enforcement, government officials, or any person can be sought out as a victim at any time. In the past the government has claimed to have no knowledge of the wireless crimes until recently. However, they surely would not want to be introduced to the uncensored crimes that this network carries out against its hidden victims over time. The network has very advance technological abilities and they are well aware that life in prison is on the table given their crimes, in states where the death penalty does not apply. What would they do to remain out of prison – anything necessary to flip their crimes and portray those that they are violating as other than victim’s. Privacy is not a barrier; instead, with the network’s technology, it is nonexistent. Their technology allows for the complete violation of one’s personal and digital privacy. It must be accepted and understood that these violations are not limited to the homes of individuals but also includes those in government agencies, domestic and abroad. Like most predatory crimes, the profitability factor is all in the market. It is well-known there is a market for persons interested in crimes against children and those interested in sadomasochism, BDSM, and other sexual fetishism from coprophilia, water sports, etc. But for crimes against the government, secrets about projects, investigations, personal information, private data, financial information, war plans, military weapons, undercover agents, their locations, securing person information that can be used to persuade them keep quiet or aid international or domestic adversaries of the US is easily obtained, access to all data agents families, and other government secrets that are quite valuable to other countries, criminal groups and terrorists seeking to cause harm on a mass level. The criminals operating on the network are anonymous; they could be anyone, be anywhere, and have any motive from causing the loss of lives on a mass level to simply murdering people for sport. These persons could be planning the

Page 62

Page 62 of 121 next 9/11 or seek to cause harm to any government official when the opportunity presents. Nothing is stopping them. Victims have reported that many of the wireless criminals have accents clearly distinguishable from New York, Chicago, New Jersey and California specifically. Victims have reported that this network uses their technology to engage in aggravated physical and sexual assault of their private areas, and it is said among victims that this network appears to cater to persons who actively are participants in not simply exploitation but also beaming their victims in their private areas, soiling them, sodomizing them, causing them to urinate involuntarily, as well as utilizing their technology to violently penetrate their victim, specifically those who are female, mutilating their vaginas and for males impotency. This must be known. It was reported that many of the mass shooters suffered from impotency and other sexual problems. The network can brand the body, leaving laser like burns under the dermis, then they would also freely be able to venture into violations of ones private area. These crimes are the most extreme of actions to carry out, and given that the network liberally violates children, its members are also committing such acts against minors. Convincing victims to remain silent is as simple as a threat of harm or other punishing act. Dehumanization appears to be a large part of this network’s crimes. They have an established network that is involved in sadistic crimes, but it must be remembered that a network with a victim base that is spread out throughout the country and abroad is surely not solely involved in wireless exploitative crimes. There is always more. Crimes involving keeping certain classes , people, races and of sexual orientations from having access to employment fields, housing options and lifestyles. The network arranges relationships with incompatible persons and watches conflicts ensues, and even tries to get female victims to get pregnant with the objective of having access to an infant to sell access to wirelessly. They have a practice of attempting to

Page 63

Page 63 of 121 arrange women to conceive female children in higher numbers by pairing women with men that have daughters rather than sons. This network has operated carrying out crimes against people for many decades. They have forced its victims to live in inhumane states so that they can continue to exploit them, and for those with children, their children are violated from the time they are born throughout the rest of their lives. Children of adult victims are in abundance and though many parents learn quickly that remaining silent is the best avenue , the network uses threat of harm to force potential reporters of their crimes to keep quiet or they harm their child, disable or murder them. This network appears to be running its own version of “red rooms,” except they are using wireless technology that allows them to make any child or adult’s home and life a red room experience. The human rights abuse level of their crimes gives insight into the network’s propensity to engage in certain behaviors and shows that if ignored, the network continues their activities unabated. One could logically theorize how such criminal activities could evolve, given their current state today. Unlike the dark web red rooms, the advance technology exclusively used by the network allows actual wireless touch experiences. A Scientific American Journal article titled, “ New Virtual Reality Interface Enables ‘Touch’ Across Long Distances” written by Sophie Bushwick in 2019 explores a new interface that requires a patch be placed on the body of one individual and the use of a haptic glove by another in a different location, to simulate touch remotely. Though she is exploring the use of wearable technologies, she examines the technology’s use of actuators and the developers potential expansion into the use of wireless power. Though most of unaware of the network of criminals or their crimes, some victims report that its members have already developed significantly more advance technology than that mentioned by Bushwick.

Page 64

Page 64 of 121 According to reports the members of this network have adopted wireless energy based systems that allow touch and feeling of hands on the bodies of victims created using energy that is transmitted into their environment. The network does not only burn and brand its victims, they can touch its victims and feel their bodies wirelessly. For the pedophiles and predators with interest in children, having access to children without the risk associated with their heinous crimes is an invaluable asset. Concealment of this level of high tech has only aided the network in continuing their abuses and violations. This is a person to person crime. Part of the networks crimes are exclusively dedicated toward its members terrorizing children and adults, and profiting from wireless crimes against people, that is when they are not trafficking narcotics, guns, carrying out murder or acts deemed terroristic - secretly. Only when this crime is openly acknowledged and spoken about honestly can the network be dealt with legally and measures be taken to eliminate this level of high-tech crime. Until that time innocent child and adult victims are forced to spend their days suffering in silence. Meanwhile it appears that this network has begun to challenge our government employees and its agent’s families . How they manage the threat in wake of public exposure will set the precedent for the network’s future activities. Failure to begin real investigations into the crimes and not into their victims, not only puts national security at risk, but determines what the network will do to its victims that they have tortured and if their crimes will continue or its victims with die.

Page 65

Page 65 of 121 Chapter 3: High-Tech Crimes against Children This network has maintained a hidden wireless child sexual exploitation ring, and it appears that they have paired it with their adult exploitation ring where, through extension of their crimes against adults, they also have access to children in the homes of the adult victims they are violating, and, in some cases, this network has violated entire households. Logically this practice of inherited victimization has reduced the risk of reporting of their activities and resistance by attempts to report the network. Parents who were victims prior to having children often learn through various acts of punishment that remaining silent about the network ensures that they are allowed access to more liberties, therefore it should not be shocking they remain silent. When the adult victims become parents, the understanding that has been achieved through their own victimization is an assurance that they will remain silent about the observations of crimes committed against their children by wireless means due to the imminent threat posed by the network for risk of harm or denial of one’s rights or access to various liberties. This dark understanding and ability to draw inferences of the risk from one’s own experience appears to be enough for parents across to the country to remain silent about this crime for decades. There are victims from over three generations in some families who are actively being violated by the network today. Even now parents contacted were concerned with protecting their privacy to ensure that agencies like Child Protective Services would not take their children and were fearful of reporting the crime because law enforcement is not handling the reports of persons not employed by government agencies appropriately and has been portraying the network as one that does not exist. This is dangerous, given the nature of the criminals’ crimes and their practice of arranging victims to be harmed, raped, and abused by persons in the environment of the victim

Page 66

Page 66 of 121 by an assailant they arrange to be at a specific place and at a specific time. The adequate response is a law enforcement investigation and addressing the crime seriously. There is a lack of understanding that the network is involved in the actual harm of children and people through not only wireless violence but also conspiracies that involve the network arranging for people to be harmed for profit and sport. Several victims shared that members of the wireless criminal network arranged for them to be attacked or even raped by a random person as its members watched wirelessly. Or that the criminals set them up to encounter an individual entirely for the purpose of harming them or having them attacked or assaulted in person. This would leave one concerned. If part of the network’s crimes involve live broadcasts of sadistic acts and wireless crimes against children, then through the same processes, the network is likely to arrange for a victim they are already exploiting to be placed in an environment where they will be not only violated wirelessly but also violated by individuals with whom the network arranged for them to be placed. This crime is not a simple crime in the least. Grasping why persons would commit such acts of atrocity is pointless. What is known is that cases such as that of Peter Scully, where it is documented that he ran a red room which was able to profit from the sale of a live broadcast of a child being tortured and where individuals from around the world who had similar interest paid, watched, and supported the torture and murder of a child, are enough to contradict the notion that such criminal acts do not occur. Victims have been photographing the bodies of their children over years who have been burned by wireless energy-based technology used by the network of anonymous criminals. These photos, when lightened and darkened, reveal laser-like brands on the most violated victims from head to toe. Such photographs are so graphic and heart-wrenching that, for parents, this trauma

Page 67

Page 67 of 121 alone is enough to scar them emotionally. They are rendered helpless. They cannot report the crimes, cannot protect their children, and cannot defend themselves legally in the presence of law enforcement officers who, according to many parents, even when presented with photos that clearly show visible laser-like markings, have dismissed reports and even reportedly made attempts to flip the claims and even accuse the parents of causing harm to their children (even though the photos reveal laser-like burns under the dermis). In cases like these, all individual law enforcement officers have had direct and undeniable knowledge of the wireless network, yet did nothing. It is in cases such as these that the network reveals itself in order to solicit assistance from law enforcement through means that victims suspect include bribery, intimidation, threats, blackmail, or racist allegiances. Crimes against diplomats are tragic, but the crimes actively going on secretly against children across our country, carried out by an anonymous wireless network, are due to failures. Failures in law enforcement. Failures in government to be concerned enough with those most vulnerable to demand action and address a level a crime that has shown itself to be indiscriminately savage. There are aspects of the networks activities that should raise eyebrows. According to the Center for Missing and Exploited Children in 2020 365,348 entries were made for missing children. Given that the network is involved in wireless crimes against children, how simple would it be to use their technology to locate children for the purpose of abduction. The networks use of wireless technology that allows them the ability to see inside homes would also give them the ability to identify homes where work parents were outside of the homes, and children were available or vulnerable and be easy targets for abductions. This network could and more than likely has, found child victims at the requestion of predators on their network who might be interested in offline interactions and arrange for the victim to arrive at a certain place

Page 68

Page 68 of 121 and at a specific time, where they could be abducted and trafficked offline. This network has no limits to what they are willing to for profit and with technologies that allow them access inside of homes secretly they could arrange an abduction for money of any child , and make them disappear without a trace. The question is , how many children have they helped get abducted? The network has the technological resources to violate any home in America; government employees are not off-limits. But presumably, like most predators, the everyday criminal practices that persons on the network carry out is to seek out vulnerable individuals, single parents struggling with finances, homes with multiple children, those from low socioeconomic statuses, children of existing victims, and those in which they develop an interest during their search for new victims. The reality is that any child is at risk and any adult. The network forces victims to remain silent, convinces them they have committed a wrong doing, and they proceed with their crimes . Which for nearly all are indefinite. Outside of victims who have children and know about the wireless crimes prior to having children, parents would not be knowledgeable about crimes committed using wireless technology even if they were going on in their own home. The network’s members do not creep into bedrooms and carry out offenses. Instead they use stealthy, wireless, interactive touch technologies that enable them to have full interactive and engaging experiences in the homes of victims. Most of their sickest crimes are carried out against sleeping persons. It is true this form of criminality is not well known, use of black market wireless and non-invasive neurotechnologies sound like something out of movie. However, for the network of criminals it has aided them in subjecting its victims to psychological abuses that effect their emotional and mental states and behaviors once they awake. This network has developed high tech ways to conspire against persons and they been doing so for decades. Not only have they carried out race

Page 69

Page 69 of 121 crimes, but they have also driven persons to commit murders , violence, to suicide , to drug use and other behaviors that have harmed society as a whole. Furthermore the network has a class of technologies that permit them to render persons unconscious instantly and to keep them unconscious. Much like hospital monitoring systems that detect when patients are in state of REM sleep, resting, and awake, the network has noninvasive and wireless technologies that permit them to measure when these states present. At these times they simply stop impacting the child or adult they are violating. Parents have shared stories about how the anonymous criminals used technology to cause narcoleptic episodes that rendered them unconscious, and, once they woke, they observed laser-like brands and burn-like markings in the shape of emblems, numbers, and letters that covered the bodies of their child. The network is well planned. In situations in which they seek to engage in the wireless exploitation of children, they have already prepared circumstances for their victim of interest so that they reduce the risk of being detected and ensure that they can market the child for wireless exploitation. As stated in previous chapters, the network carries out isolating conspiracies, limits social relationships, finances, and opportunities, discredits, and prevents the persons from connecting with family and friends and only allows the persons to establish or maintain relationships with others if the individuals are persons that would not report their crimes . For a crime of this magnitude with so many levels, the network has many schemes and maneuvers they use. They have not operated for decades without being reported and investigated without being skilled at what they do. Though it may seem unlikely that white supremacist, street criminals, hackers, and drug traffickers would unite for the purpose of very different criminal activities, in actuality this coordinator of resources, people, finances, and skills has protected the underground network of

Page 70

Page 70 of 121 criminals and supported their continued black market operations. A problem for a single group operating on the network, like with any organization, puts them all at risk for legal consequences. As a result they work collectively to ensure that the network remains secret and like prison gangs they operate as individual groups in other matters. Though most would suspect that the persons on the network fit the traditional profile of a child predator, this not the case. Victims claim a number of the individuals who have access to the black market network are aligned with the type of profile of the dark web criminal. Young white, black, Hispanic, and Asian men and women from various backgrounds are sought out for and appear to be contracted to work as employees on the wireless network, after all this is a business. This crime is one where persons on the network obviously have abnormal interests, and enjoy human rights abuse as a sport. Their interests also extends to sexual gratification from inflicting emotional, physical, and mental pain on persons for their own pleasure. It can be assumed that when gaining access to persons lives in unscripted, live, unobscured manner and illegal experiences is entertainment. The crimes involving children model those the network commits against adults. Technology is used by the anonymous persons who watch, touch, fondle, sodomize, brand, burn, and, in some cases, subject their victims—infants and other minors—to circumstances that have caused serious harm and even death. The experiences described by parents involving observing brands and laser-like burns on the faces and bodies of their children, notable behavior changes, mysterious health conditions, changes in teeth size and color, and even acts caused by the wireless criminals to harm the child have been reported.

Page 71

Page 71 of 121 Several victims claimed that they’ve made attempts to report the crimes they observed but were dismissed, or law enforcement attempted to report their claims to mental health divisions, which quickly discouraged future reports of the attempts. The crimes simply continue. Parents whose children are now adults state that they observed the incidences of aggravated sexual abuse beginning days after the birth of their child or children, and it extended over the course of the child’s life. Rather than magnify the problem and cause distress, they simply learned to live with the crime, often never discussing it due to fear of the network’s response. Parents have reported that they noticed psychological changes and changes in temperament and behaviors, and that their once bright and beaming child, upon reaching their teens, suddenly drifted into crime, developed mental health conditions, became rebellious, almost always became sexually deviant, developed drug addictions, had an abnormal preoccupation with sex, developed problems with learning and retaining information, struggled with completing tasks, and developed other social problems that drastically impacted their lives. Response to this level of crime should be without question. A network of anonymous persons has unrestricted access to children in any home in America at any time. An established wireless network that profits from a range of crimes, one of which involves wireless exploitation, is able to carry out remote sex crimes. The network has technologies that can cause loss of life or result in harm at any given time. Recent encounters with government personnel being assaulted by wireless energy should be enough evidence for the network to be priority one on their agenda.

Page 72

Page 72 of 121 Chapter 4: Technology Paired with Organized Dark Web Crimes The use of advanced technologies has equipped anonymous members of the hidden criminal network with the tools to perpetrate crimes more efficiently, effectively, and with lower risks. Technology remains constant in our society even though there is a lack of familiarity with its limitless capabilities; new developments continue to flood our society. New technological pathways are introduced, while older technological systems and methods based on outdated developments and approaches still have functionality and uses in modern times. For the experienced high-tech criminals on this network who, for quite some time, have engaged in their crimes, it appears that their choice to utilize lesser-known technologies and concepts for crime has allowed them to carry out criminal activities in ways that most would never be familiar with. Whether by combining and exploiting various technological concepts and practices such as wireless power and energy, sound waves, magnetic energy, radio waves, some form of 360-degree freedom, or laser-like beam systems paired with advanced computers that use artificial intelligence or some other means, it is clear that this network is actively engaging in wireless criminal activities without physically entering the environment of those who they violate. It is also clear that the use of these methods is purposed solely to engage in crimes discreetly without being detected—crimes that would have no way of being discovered, given the methods being used. But for the individuals whom this network has and continues to violate the human rights of reporting their experiences online and to law enforcement, speaking out does not help. The adoption of wireless technology for crimes would certainly be for the purpose of preventing detection and would easily allow the anonymous persons who make up the hidden network to remain elusive during their crimes.

Page 73

Page 73 of 121 Several federal and local law enforcement agencies throughout the United States contacted about this crime have claimed they are ill-prepared to manage a threat of this nature or that a crime of this sort is impossible; its victims would disagree. So they do nothing while public safety remains at risk, and a criminal network grows increasingly more intrepid. It is this network’s goal to not simply violate their victims but instead ensnare them by wireless crimes and murder them slowly using technology to cause them to become sick or cause death by other means. The network commits social conspiracies by using persons who interact with the victim to force them to remain silent and otherwise punish, shun, or retaliate against them if they speak up about the network. Victims state that if people knew what the network was really doing with their technology and the crimes they commit against children and adults, they would never want to keep a crime of this nature hidden. But many have no choice , lest they want to lose employment, living arranges, be impacted financially or suffering violence, wireless harassment or aggravated crimes by wireless assault. Like most technology, the network has complete discretion of when they turn off and turn on specific features of the weapons they are using for crimes, making it rather uncomplicated to conceal their crime when needed and shifting the burden of proof when reports of their activities are provided to law enforcement. Law enforcements practice is to ignore reports of this crime, or at least it has been for several decades. Proving a crime that is carried out by wireless means using energy-based technologies that are classifiably weapons has certainly proven to be a nearly impossible feat for the ordinary person. But recent new articles describing experiences involving multiple government personnel while on assignment who reported to federal law enforcement agencies that some type of “directed energy weapon” assaulted them have shone light on the existence and effects of energy-based weapons. Many reports claim that even the children of

Page 74

Page 74 of 121 diplomats and agents were assaulted by an unknown source. What they may not know is that this once the crimes against a person is initiated that the members of the criminal network simply continue them secretly. They remain silent, beaming victims, their children and continue their abuses indefinitely. This is the story of thousands of victims, many who suffer from mental illness today due the networks excessive violence and psychological abuse designed to drive victims to mental instability so that they cannot report their activities and instead live in states where they do not pose a risk of such activities. For civilians across the United States who have reported for years that energy weapons are actively being used to assault them, government personnel’s reports of singular experiences are simply a prelude of experiences that get much worse if allowed and not investigated. By using wireless technology to violate and assault, the network frighten runs elaborate schemes on the victims in which they find within our communities. They often manipulate them by convincing them they own they a debt, they have committed a wrong, or the network is a government agency. They are not a government agency. They are criminals. Improper responses to the crime—that is, not accepting reports of them by law enforcement or investigating them —leads to the network secretly violating the individual for long periods of time. Which is why government personnel is being harmed today. The network’s flagrant lawlessness can easily be attributed to the fact that law enforcement has failed to acknowledge and address this level of crime, and so it is escalating. Imagine living while some unknown energies burn, lacerate, shock, attack, penetrate, and assault stealthily inside and outside of one’s own home and while one is mobile and mid-flight. Victims have no privacy and the networks members invade their homes, keeping a close eye on them, and liberally disturbing not only their peace but micromanaging their lives secretly, using aggravated

Page 75

Page 75 of 121 assault to harm their children and their physical persons if they attempt to take legal actions against them. It appears that a significant part of the network’s criminal activities is completely dedicated to committing concurrent acts of recurring sexual and physical violence, psychological abuse, and actual torture while its members orchestrate and maintain long-term conspiracies that ensure victims are rendered helpless and remain vulnerable. The network appears to utilize well-developed conspiracies to prevent victims of its crimes from having access to certain liberties and opportunities so that they remain oppressed and therefore victimized. In order to ensure that certain victims remain oppressed and are inadvertently silenced, this network’s conspiracies are effectively able to force their victims into circumstances that are conducive to their crimes. Victims have reported that they are set up or framed for crimes they did not commit, they are denied work opportunities, they are forced to remain isolated, and they are often set up for situations that involve conflict and other abuses regularly. This is in addition to regular wireless assault by energy against their bodies and heads. Any attempts to advance in any way or report the network’s activities result in being subjected to psychological abuses and wireless harassment designed to impair, confuse, and disorient, and, in some cases, have involved direct attempts to murder victims indirectly. Victims have also reported that this network’s members engage in a variety of other criminal acts and have even established a sport-like means for its patrons and members to profit for their own amusement. Victims report being subjected to abuses that involve anonymous persons on this black market wireless network who appear to profit from gambling and games using unwilling victims. Wagers are made based on competitive games played by groups of persons on the wireless network who often group themselves according to race, gang affiliation, gender, and location. They militantly partake in abusing the victims with dual objectives in mind. Not only

Page 76

Page 76 of 121 do they organize and stage real-life circumstances that are harmful, but it appears that there is real money on the table for the racketing portion of their crime infused by wireless aggravated crimes, the group who can cause the most extreme reactions or circumstances profits. Victims report that the groups appear to competitively work to carry out defensive and offensive actions (crimes) and events within their victims’ lives for money. While these serious crimes are viewed as facetious by the network’s members, the tournaments of sorts in actuality masks life-altering conspiracies and aid in traumatic psychological abuse and crimes that they have turned into a black market sport, making it profitable by making their crimes competitive among its members. For decades the network’s criminal activities have gone unnoticed, but this is not attributed to a lack of reports. Quite the contrary: victims of the crime and others who have made attempts to report it are usually written off as conspiracy theorists, confused, or mentally ill and are thus quickly dismissed and ignored. No claim gets investigated by law enforcement, and no victim has yet to find real justice. Often victims are not allowed to report this crime, and if they try, yet again this criminal network responds with violence and may have a person detained by law enforcement unlawfully. Meanwhile this network continues to embed itself in the very fabric of society, engaging hidden and complex high-tech human rights abuses and organized crime without interference. Their organization, regardless of name, has discreetly gained a reputation as an ominous network that is to be feared and regarded as an authority. It appears that through organized crime, they have the ability to discreetly regulate the actions of individual law enforcement officers, who, in some cases, use their power to silence and conceal this crime due to ignorance, fear, conspiracy, or by manipulation by the criminals. Or at least this is what has occurred over many decades.

Page 77

Page 77 of 121 The network engages in organized crime; they simply do so remotely. Human rights abuses are a major part of their network’s crimes and success as a hidden criminal organization. They are seeking out and violating children as young as under the age of one year along with teens and adults alike—whether the violations are remotely carried out using high-tech technology or in-person, the activities are a crime. High-tech crimes of this nature have yet to be explored. The use of wireless technology as a weapon that transmits some form of energy that enables the criminals to attack, abuse, violate one’s physical person, and privacy is predatory in nature. Compared to other technologically-savvy criminals, the network has taken their crime a step further, and, instead of interest in securing profits by computer-based financial crimes, their profits also come from exploitation. There are a number of reasons why this network is different, but their practice is carrying out multi-year and even decades-long victimizations of children into their adulthood. Yet the public has no idea that this type of crime is going on and that the network responsible for it is a threat to public safety and national security. Instead of committing a single act of violence, with the use of their black market technology that is wireless and has long-range capabilities, they are allowed unrestricted access to their people at all times. Their victims’ experiences provide a snapshot of the true inhumanity of the network’s crimes. Their innovative technology allows this network to remotely gain access to any home, business, or individual at any time remotely. According to victims of this crime, the network has been selling access to children and adults, more than likely profiting from the viewership, wireless exploitation, and aggravated sexual assault of their child and adult victims by wireless means. The patrons of this network pay to use technology to wirelessly physically and sexually touch, torture, and abuse victims. Though this crime appears to be different than other sex crimes, in

Page 78

Page 78 of 121 reality, a closer look at it might reveal that it simply mimics traditional child sex rings, human trafficking, and involuntary servitude abuses—it is, however, just wireless. This network’s ability to engage in remote privacy violations allows them to violate the privacy of persons within their own environments, watching people who would have no way of knowing that this network was violating them—that is, unless they elect to reveal their organization and expose their activities. Which, strangely enough, they frequently do with many of their victims. These high-tech Peeping Toms are not peering in through windows, or at least, not in person. Instead their wireless technologies give them the ability to use varying forms of energy, and with it, they have some technologically enhanced ability that enables them to engage in voyeurism that sees through walls, windows, and doors and accesses video feeds wirelessly. Not to mention this network can gain access to any cell phone, hijack radio and television broadcasts, and tamper with electrical devices of all types, including vehicles and medical devices. It is clear that whatever security protocols that are in place to detect these invasions are ineffective. The network utilizes methods that supersede current detection capabilities. The use of high-tech technology is not the only reason this crime has remained hidden. This network has been crafty. Over decades this network has managed their victims and created a secret reputation among law enforcement, claiming they are a “watchdog agency” or part of the “deep state” of sorts that combats crimes and injustices, as it relates to their most rapacious crimes, those involving vulnerable children and women, drug trafficking, and other criminal acts. This network has been portraying its organization as one in place to protect our communities. This con has enabled them to operate freely, unchecked by law enforcement in most cases and aided by individual law enforcement. In some cases they have stated they are part of various white supremacist or masonic groups, or other fraternal orders in which the network observes the

Page 79

Page 79 of 121 individual officer is a member of. They wirelessly get intel of every officer that encounters one of its victims and use whatever scheme is needed to gain their assistance. The use of schemes and misrepresenting their crime organization using any scheme relevant to the individual and playing on one’s affiliations, interests, family allegiances, needs, wants, and grievances is also common during their manipulations. It can be assumed that over time to establish themselves, they have developed an understanding of the importance of using law enforcement as a tool to prevent their specific crimes from being looked into further. It would not be shocking, given reports that as acts of good faith, on occasion this network might actually have used their technological resources to establish a level of rapport and credibility by aiding law enforcement and others, given that they have technologies that permit them to discreetly eavesdrop, access homes and buildings, view documents by scanning them, and instantly transmit their energy-based systems regardless of distance, structure, or mode of travel. In 2015 Daily News reported a story involving an officer that was led by a “mysterious voice” to find a child submerged in a car after mom drowned. This incident was an act carried out by the wireless criminals, who from time to time step away from their aggravated and predatory wireless crimes and actually aid people. But, this should not convince persons that its network is engaging in crimes that aid persons, especially given that its members are actively violating children and adults domestically and abroad. As if their interest were crimefighting given the sheer number of victims of this crime, they could have invested their resources into exclusively crime fighting activities but instead they have an entire network in which sets up its victims, child and adult, abuses and torturing them using wireless energy – at least majority of the persons on this wireless network do.

Page 80

Page 80 of 121 Establishing their organization per say, in the same way in which “confidential informants” are viewed, would be a valid reason for their existence to remain undisclosed. But the organization is no “source,” instead they are a nuisance, a threat, dangerous, ruthless, manipulative, cunning, and a predatory gang of persons who have approached crime from an educated perspective. Using the diverse backgrounds of the patrons and members on the hidden network, their tactics have granted them the ability to operate freely. It must be emphasized that the network does not have the same interests as law enforcement and are not concerned about protecting any person outside of their own interests. Their miscellaneous crime fight activities are purposed to deceive, and encourage their activities to remain unaddressed as their real crimes involve violence and murder. The hidden crimes that they have spent decades carrying out are more necessary to address than any tip they could ever provide. Maintaining a working relationship and developing an understanding with law enforcement is purposed to present their organization as one that should be overlooked for the benefit of society and safety. This scam has enabled them to operate for decades, building their organization and its network and a victim base of children and adults, many of whom they have actively violated over decades. But those poor minorities and whites are sought out specifically due to their lack of resources, support, understanding of this level of technology, and time to report their activities are the most gravely harmed. Like the historical Greek story of the Trojan horse, in which Odysseus and his men hid inside a wooden horse that was delivered to the Greeks during the Trojan War and, in the cover of night, emerged to overtake the Trojans and win the war, this network has disguised their activities in a way that has allowed them to inadvertently remain undetected while they engage in

Page 81

Page 81 of 121 the most heinous of human rights abuses right under the noses of the American people and now its government employees. Though evidence clearly shows that this network exists, one of the most well-thought-out conspiracies this network has maintained is casting persons whom they violate as mentally unstable. Effectively they have indirectly silenced those who seek or might seek to report their crimes by having outspoken victims classified as mentally ill persons giving the network time to abuse them until they are driven to mania, depression, psychosis and even violence. If their organization and its network do not exist, then they cannot be held accountable. If victims are perceived as mentally unstable, then their reports are not viewed as credible. This ploy has supported the concealment of their crimes and the black market technological weapons that they use for them. It appears that victims of the crime interviewed for this book, who have attempted to report the wireless crimes have had identical experiences from all over the United States, though their suspicions about the motives and parties responsible for the crimes vary. They are classified as mentally unstable if they report the crime, yet many of them have had careers, families, lives, and education and often had no prior mental health problems before encountering the network or speaking about this network’s crime. For most, they are often not permitted to report the crimes or are detained or intimidated into remaining silent and discouraged from making future reports by individual law enforcement officers from coast to coast and internationally who either are unaware of this crime or are well-aware of it and act at the request of the wireless criminals, knowingly concealing reports of the crime. The crime network has pitted law enforcement against victims and vice versa, which has been an ingenious way to prevent victims from reporting this crime and getting it addressed,

Page 82

Page 82 of 121 investigating it, and identifying and prosecuting the anonymous persons responsible for it. It have given them time to hide, as their crimes are like most criminal organizations family activities, in which its members relatives, children and partner are active participants in. People cannot begin to understand the impacts this network has had on the individual and our communities. In order to ensure that victims of this crime appear as if they are mentally ill, this network has strategically aligned the way in which they commit their crimes identically to the way in which various mental health diagnoses present, specifically schizophrenia. For decades this network has engaged in human rights abuses and then concealed them by using advanced technology that few would be familiar with, which allows them to arouse in their victims states similar to various mental illnesses by way of technology, constant wireless harassment, and psychological conditioning carried out daily and as persons are asleep in their own homes. They can drive a person to mental instability by using neurotechnology that excites neurotransmitters or impacts various areas of ones brain. This too has been a big resource for the criminals have opted to mentally destabilizing victims after exploiting them, as a means of not advancing with murder, unless the victim refuses to keep quiet about their crimes. In other cases this network has a practice of causing cancer in its victims, subjecting them to aggravated assault by wireless technology to cause cancer to develop slowly causing the victim to have an inability to report due to their health. This crime is the greatest criminal enterprise and scheme ever concocted by a criminal network. The criminals have devised a way to engage in human rights abuses and profit from predatory crimes against children and adults while removing their victims’ ability to report the acts inflicted upon them. Therefore their crimes are able to remain ongoing indefinitely – until death for most.

Page 83

Page 83 of 121 Using intricate black market technology that is able to transmit invisible forms of energy, the individuals belonging to this network are able to harass victims, violate privacy, and engage in other types of ongoing wireless crimes. They are able to impact health, motor functions, and cognitive processes and even cause loss of life. But this is only a fraction of their crimes. Much like most crimes, the network engages in individually centered crimes rather than exposing their organization to large groups. Victims state that this network personalizes their crimes, actually securing information about their person of interest through secret surveillance using wireless technology which makes available to them all forms of personal information by eavesdropping, securing videos by way of wireless and energy-based technology, and accessing other personal data through hacking when necessary. This network frequently uses personalized attacks, manipulation, intimidation, violence, and bribery to gain the cooperation and silence of those who are solicited for victimization or other purposes. Using technology that is invasive and stealthy has given the network a dangerous advantage and unlimited opportunities for predation. Not only is the hidden network able to remotely violate people, but they can violate government and its officials, and they do. Their technology enables the persons on the wireless network to transmit their sound and isolate it so it’s audible to a single person, allowing them to communicate wirelessly and with noise-isolating abilities. With technology they can harass a person in a manner where others would not hear the audio or they simply turn it out. While its members use wireless technology that laugh, taunt, engage in obscene harassment and attempt to force their victims to respond so they appear mentally ill. This has aided them in remaining hidden and setting up their victims to appear insane. Their use of technology that is stealthy and not visible allows aggravated sexual and physical assault and wireless eavesdropping and communication when they elect to. Because their technological weapons transmit some form of

Page 84

Page 84 of 121 energy and therefore are not visible, they are able to surveillance persons and furtively carry out their abuses. One victim at a time, the anonymous syndicate actively violates people, going from home to home, place to place, abusing, terrorizing, assaulting, psychologically conditioning, and, in some cases, murdering persons whom they have violated to conceal their activities or for organized crime or sports means—secretly, of course. This network makes sure that their crimes always appear to be attributed to other sources. These crimes are carried out daily, yearly, and even over the course of decades against some of their victims. For the victims this network deems potentially problematic, this network violates them twenty-four hours a day. For women and children they are sold on their wireless network to persons that have interest in predatory and sexually motivate crimes. They have persons in place that are purposed to allow the individuals who are paying for wireless sexual experiences to create diversions so that the time they have purchased for aggravated and wireless crimes, they get to violate their victims without interruptions. They pay for time with the victim. The network operates 365 days a year and is similar to any other crime network, housing many divisions and types of criminals, engaging in varying criminal activities, and unifying their operations when attempts are made to address their activities. On this network, like in prison gang systems, white supremacists, minority street gangs, pedophiles, hackers, and other types of criminals work together for the benefit of their individual operations. The members of this network are accustomed to misrepresenting their organization and their intentions to law enforcement. Do not expect to have heard of their organization as documented here. Very few are bold enough to speak truthfully for fear of retribution or assault. They are not a shadow government in place to protect our society; they are criminals benefiting

Page 85

Page 85 of 121 financially from crimes against our children, adults, government, narcotics, guns, digital currency, technology, and free access to our information and lives. The reality is that, given the nature of the wireless offenses, it would be assumed that not all criminals would have access to such capabilities and those that did would be part of an isolated network of persons with the financial and technical skills capable of developing and maintaining technologies that allowed transnational crimes. The network has carried out secret crimes across the country and undoubtedly the world. They are allowed to operate unchecked. This network also impersonates law enforcement and government agencies such as the CIA, secret service, the FBI, local police, etc. They frequently convince victims that they have committed an offense that has warranted their abuse, and, as a result, the network is violating them. By convincing victims of this falsity that their criminal organization is a government entity, they ensure that, from the onset of their crimes, victims never seek assistance from law enforcement. One would hope that in the cases reported by multiple victims of the wireless crime, in situations where law enforcement officers harassed, threatened, or detained them, they were manipulated into inadvertently assisting the criminals by targeting, harassing and violating their rights, unaware of the true nature of this network’s crimes or their practice of cornering the victims so that they can continue with their crimes but in many cases with full knowledge of the networks activities and still they are refusing to address reports . The hurdles encountered by victims have allowed the network a substantial amount of time and no obstructions to their activities. It is also important to know there is real criminal money and power backing this crime and more importantly the criminals are young and old pedophiles who have worked together to keep their organization going given the profitability factor. They have been working with

Page 86

Page 86 of 121 individual law enforcement to keep this crime going on and to prevent reports of the network from being investigated. With technology that has been weaponized and a range of schemes in tote that are utilized at any given moment, these anonymous people who make up the hidden network have maintained an exceptional upper hand. They have the ability to manage threats to their operation quickly and effectively. Persecuting, criminalizing, and framing their victims are only a few of this network’s tactics to ensure access to those they have interest in violating or seek to keep silent. The reality is that the use of their technologies enables them to have unlimited access to the American people, government, any of our infrastructures, technologies, confidential research, financial information, and even military weapons and computer systems both domestic and abroad. Though there are thousands of individuals who have come forward and shared their accounts online, anyone can become a victim of the network. It can be assumed that by maintaining technological advancements well more progressive than that of law enforcement and the freedom to use them in ways other than they were purposed, this network has achieved a position of power. This has fueled their human rights abuses, and, as an indirect result, it has encouraged the development of crimes that are bizarre in nature but extremely profitable and offer sport and entertainment. People hunt animals, but the network hunts people - remotely. The network has found a way to profit in the same way in which traditional human traffickers and pedophile rings do without removing their victims from their environment. This form of high-tech crime is not a smash-grab type of crime. It is an elaborate, carefully designed, intricate web of organizations that have maintained the hidden network. The men and women who make up this network are a part of a crime network that has revolutionized the way in which

Page 87

Page 87 of 121 high-tech crimes can be committed using technologies that are years ahead of those of our most profound research institutions. In this crime its victims hold the sole responsibility of reporting the crimes committed against them, yet they cannot openly report this level of crime without backlash or retaliation from the criminals and individual law enforcement officers who refuse to take reports or attempt to intimidate victims who are bold enough to try. Victims shared experiences describing the impacts of the crime to the quality of their lives. They described living in a state where they have no safety or privacy. Some reported that they were set up, often framed, and steered to encounter high-risk situations and people by the network to impact their lives, careers, relationships, finances, and, in many cases, health during the network’s peak of their abuses. There is a social conspiracy element to this crime. The network appears to arrange for people to meet, interact, and even establish social or personal relationships for one objective or another for the benefit of them carrying out their exploitation. The network denies victims of it crimes to socialize with persons that would not remain silent about it. The consensus among victims is that they are characterized as mentally unstable, liars, thieves, whores, or criminals if they speak openly about the crimes committed against them, so instead most remain silent and simply endure the crimes impressed upon them. Female victims state they are forced to engage in sexual activity during the early years of the crime, forced into peonage, or told they owe a debt, and once they refuse, they are forced to appear disheveled; their faces and bodies are burned and branded by some form of laser-like weapon. Often individual law enforcement officers harass victims at the request of the wireless criminals, while the anonymous criminals work to set them up so that they are financially limited and therefore

Page 88

Page 88 of 121 are unable to defend themselves. They work with individual law enforcement officers. This has been the trend. Specifically, in the City of Houston and other major cities. The network’s technology is not limited to its ability to lacerate and brand or burn the skin. It also has the ability to noninvasively penetrate the brain; externally this network’s technologies have the ability to darken or lighten the skin completely—which more than likely by the use of ultraviolet energy—impact the dexterity of the skin, tighten muscles, and trap air within the body. They appear to be using the same forms of energy that are utilized in noninvasive cosmetic procedures for parts of their wireless aggravated crimes. Female victims have reported that the network uses their technology to penetrate the private areas and then to retighten the area during moments in which they have coordinated forced sexual experiences. More than likely the use of these abilities is employed on child victims as well. The network is involved in concealing the markings left on their child and adult victims’ bodies by darkening the victims’ skin prior to doctor’s visits or social gatherings, making them less visible. Once this network has exploited their adult victims, their practice is to disfigure and age or discolored them, portraying them as disgusting by forcing them to dress and live in disheveled ways, making them unattractive to ensure they are unable to establish social or personal relationships. They spread rumors, using their technology to communicate at will, claiming the victim of their crime is sexually promiscuous. Tarnishing the character of a victim they have sexually violated, combined with disfiguring them, makes the crimes committed against them less important, negating the fact that the network’s members have carried out inhumane crimes. They frequently assert themselves as being a white supremacist group when dealing with white

Page 89

Page 89 of 121 officers and groups like masons when dealing with minority officers to gain cooperation so that they can continue their abuses. This network subjects their female victims to aggravated assault if they engage in hygiene practices or attempt to take care of their bodies, appearance, or health. This is not without purpose. Victims state, however, when the network seeks to arrange a sexual experience, victims are permitted to care for their appearance. When you look good, you feel confident and empowered, and you are more inviting to others and welcomed easier. It can be suspected that the network’s practice is not very different from the traditional sexual exploitation industry in that often victims’ appearances are downplayed to deter people from interacting with the victim or reporting various things that they might observe. To carry out these acts, the network uses both technology and their wireless workforce to bring about major changes in the way the victim carries herself, speaks, and lives. Because when the network transitions from secret crimes to overt crimes against their victim, they actively are involved in wireless and aggravated harassment, carrying out their abuses when the victim is within the walls of their own home, victims are deprived of all rights normally afforded to persons within their own dwelling. Modeling what occurs in traditional human trafficking when once victims become less profitable, this network has also adopted the same practice of disfiguring, mutilating, disabling, and, in some cases, murdering victims once they have no more use for them. Though this sounds very bizarre, this crime is social and psychological as well as exploitive. The network uses whatever means necessary to secure their victims in positions in which they are isolated and its members can freely carry out their indiscretions. You must remember this is not a traditional crime, and neither are the methods used by the criminals responsible for it. Because this network has embarked on the commission of wireless

Page 90

Page 90 of 121 exploitation, and the identities of the men and women operating on the network are hidden, they have found other ways of discarding their victims. Whether by making them homeless, impacting their health, isolating them, or causing traumatic experiences that lead to mental health breakdowns and physical disabilities, to victims of this crime, it’s almost like, although they remain alive, every part of their life is dead because it has been impacted by the crime. Given that years and even decades pass while they are being violated, the harm caused is irreparable. More than half of the victims claim they are subjected to aggravated assault by technology for the majority of their day. These victims also have laser-like burns on their skin that, though many of them have never met and do not know of each other’s existence, are similar—light markings below the dermis, letters, numbers, and shapes that are easily concealed but visible when the filters of photographs are modified, showing clear evidence of markings that are consistent with the statements of individuals who have reported being victims of this wireless crime and waking up with various laser-like burns on their faces and bodies daily. The network is using wireless technology for many means, one of which involves branding the bodies of their child and adult victims, cataloging and communicating nonverbally about the victim, but also as a deterrence to inspire fear into those who might seek to report the network. Such acts would only be necessary if the anonymous persons behind the technology had a means of viewing the markings wirelessly. Branding victims by wireless technology is a common practice in this hidden crime. This heinous act extends to infants and other minor victims; the network does not discriminate. What should be alarming is that this network has many different divisions, some of which are involved in domestic and international terrorism, white-collar crimes, narcotics trading, and

Page 91

Page 91 of 121 other organized criminal activities. But it appears that the crimes involving children are extensions of crimes carried out against the adult victims.

Page 92

Page 92 of 121 Chapter 5: Who are the High-Tech Criminals? In our popular imagining of a dystopia, we think of “Big Brother” or other authoritative Orwellian systems taking over our society. While our society is certainly heading toward a dystopia, it is not of this type but rather its opposite—networks of “powerful” and dangerous criminals in control of technologies that enable them anonymously to prey on unsuspecting people at will. People are under the impression that their homes and lives are private and they are safe, when in actuality this network’s crimes reveal that they can violate people at will. It has been this network’s choice to use their technology for the purpose of human rights abuses. Their acts are criminal. Influencing the lives of those who they violate to ensure they encounter repeated psychological abuses and using technology to attempt to trigger and encourage aggression, violence, high-risk behaviors, misfortunes, and calamity is nothing less than a conspiracy to deprive them of their rights and liberties for the purpose of a different type of exploitation. Several law enforcement agencies have claimed that investigation procedures require that victims provide information that can assist law enforcement in initiating their investigation of a crime. This crime cannot be held to the same standards. The individuals who make up this wireless network are anonymous. They are nameless. They are wireless. They are using wireless technology that permits them to be located in a separate location yet has reaches offline in our environment regardless of distance. It should be expected that victims would have no way of identifying or describing the persons who are operating on the network, except victims who the network has liberally exposed themselves to, given the risk of such persons reporting their activities. Is one expected to be able to identify and describe the hacker who accesses their computer illegally and steals their

Page 93

Page 93 of 121 financial information? In traditional crimes of rape, involving victims that are ambushed, blindfolded, and sexually assaulted, is the victim expected to be able to describe every detail? In crimes where homes are invaded, are the homeowners supposed to be able to provide descriptions if they were asleep during the burglary? No. Then why have multiple reports from victims state that law enforcement officers began a mental evaluation and, in some cases, refused to accept reports involving this wireless criminal network and its crimes, stalling efforts to report a crime that should have been addressed decades ago? By its design, the individuals on the network use technology that is wireless, therefore, much like computer intrusion, the victims would have no way of identifying the persons responsible for it. They are wireless, and with such abilities come many advantages for the criminals. Hidden behind wireless technology and computers, the individuals who make up this criminal network remain comfortably nestled behind the safety of the wireless technology they use. Therefore their actual identities, names, and physical descriptions remain unknown. According to the accounts of victims, it is suspected that the high-tech network appears to be made up of individuals who may belong to several smaller “interest criminal groups” that have come together to engage in human rights abuses. It appears that they have circulated their black market technology among their groups. The individual groups may be spread out in different parts of the country and the world, but victims report identifying many persons with accents that are from the east and north coast of North America, Europe, Russia, Australia, Asia, France, and other countries. Though the focus here is primarily victims within the United States, this crime has been reported internationally as well. Technology has enabled these criminals to carry out crimes remotely. Because this network has the ability to use technology to transmit their sound through ambient air, it has been

Page 94

Page 94 of 121 reported that while verbally abusing and taunting victims, members of this criminal network are clearly audible and make various claims about their location. This network also misrepresents themselves as their victims’ local law enforcement and government agencies to make their activities appear localized. This has also supported the belief of victims that the crime is local rather than transnational. Locating and identifying victims could provide a roadmap to the location of this network’s members. Once again law enforcement has the resources, capabilities, and training to facilitate such a process, and it should not be up to victims to develop their own theories and do their own police work. The individuals operating on this hidden network appear to be as diverse as the crimes they engage in. They have kept their organization nameless, leaving victims to speculate and come to their own conclusions about who they are and their motives for engaging in their crimes. Regardless the crimes they engage in are inhumane and perverted, violent, and oppressive. This crime has existed for decades. The growth of gangs in the United States has shown us that over time, enlisting new members aids sustainability and growth. Many victims have claimed that the anonymous persons on this network have made racially charged statements during their harassment, and, in some cases, symbols consistent with the Jewish religion and white supremacy have been remotely burned onto their flesh. It can be suspected that this crime originated as one that aligned with white supremacy agendas and appears to be in control of the other groups. Their interest is reportedly of a pedophilic nature, sexual, and violent. But white males and females have not been the only persons reported. The reports from victims state the minorities mirror their activities and have adopted the same racial undertones and interest. According to reports persons with different criminal interests, gangs, pedophiles, narcotics traffickers, hackers, students, or persons hired are allowed to access this network log on

Page 95

Page 95 of 121 and, like an ambient air teleconference, they transmit their sound through the air. It appears that all parties, regardless in their particular “interest,” whether child or adult, drugs or torture, all have a vested interested in securing this network’s continued success and operation. Distributing the hidden technology on the black market to several criminal groups with different interests would help them to disguise the nature of their crimes and diversify its activities so that it would be difficult to narrow down and categorize this level of crime. With different types of criminals who have different motivations and interests, the stakes are higher, and therefore the parties involved remain assuredly invested in keeping the technology being used for their respective criminal activities hidden at all costs. A problem for one group on this network engaging in, say, crimes involving the wireless sexual exploitation of children—for another group that is using the capabilities of this technology to prosperously traffic heroin, cocaine, methamphetamine, weapons, and human beings traditionally, it would be significant for persons engaging in white-collar crime. It would easier to manage problems if the criminals worked together. This is what victims state is occurring. Diversity not only has allowed them to greatly expand their operations but also diversify their respective crimes. Pooling their resources and manpower has worked effectively to aid them in keeping their already hidden high-tech network from being discovered. It has afforded them greater anonymity and lowered the risk of engaging in crime due to the added knowledge pool and the fact that a group lacking a coherent set of characteristics makes its members harder to isolate, identify, and track. The patrons of the criminal network are many, as it would take a large group or several groups of individuals to maintain a network of thousands of victims while operating 365 days a year. Also crimes involving exploitation are only profitable if a service is provided. “Service” providers, specifically for wealthy or professional predators, would have just

Page 96

Page 96 of 121 as much interest in keeping this network hidden as the street criminals being paid to guard its operations. This network’s criminal activity may have grown to become even more diverse as their own membership has expanded. This network has monopolized the use of the wireless black market technologies they are using for crimes—their network and its organization alone appear to have access to it. It is up to law enforcement to launch an investigation into who is committing these wireless crimes and how. For now, victims are left to speculate.

Page 97

Page 97 of 121 Chapter 6: Use of Wireless Energy Technology It is often said that the truth can be far stranger than fiction—and in regard to the sophisticated tech that the network employs, this case is certainly no different. As our society becomes increasingly interconnected and fully begins its transition into the digital age, new threats have come to emerge, making use of wireless and energy-based tech to carry out violations beyond the domain of formal cyberspace, with the intent of conducting bodily and psychological harm rather than just data theft. The network has been the biggest and perhaps the first organization to engage in these new-age remote crimes. They have monopolized the use of their technology in the realm of high-tech crime. They employ technology largely unknown to the majority of the public or at a level of advancement to be virtually incomprehensible to the uninformed, some of which even the most prolific researchers and advanced government agencies do not have access to and, in some cases, are unaware that such developments exist today. The network’s crimes have been unimpeded and are designed to be undetected. In this chapter we will be delving deeper into the use of high tech by the network, what type of technology they may have in their arsenal, and technologies similar in concept to those being used by this wireless network as described by victims of this hidden crime. But the first point of our discussion should be the most fundamental aspect behind the forming and functioning of any hidden organization: communication. Wireless power offers many benefits for this type of high-tech crime. Nikola Tesla is known for his early breakthroughs in the areas of production, application, and transmission of power, notably wireless power transfer, the World Wireless System, and Wardenclyffe Tower. He discovered a way to transfer electricity without wires or a physical link. In his design an

Page 98

Page 98 of 121 electromagnetic field is generated, which transmits power across space. What is interesting is that today engineers know that the Earth is made up of electromagnetic energy, and therefore it is readily abundant everywhere in our environment. He could not have known this information during his time period. Born in 1856, Tesla made contributions that have driven wireless communication and data transmission capabilities and developments today. But his most relevant design was the Wardenclyffe Tower, purposed to send messages, audio transmissions, and fax images across the Atlantic to England and ships at sea, using the Earth to conduct signals. Interesting enough this closely aligns with a viable method which the network could be using to carry out their wireless crimes. The use of wireless power in crime would enable this network to instantly power on any device and would enable them to transmit electromagnetic energy, stealthily utilizing it to invade privacy and to interact with physical persons or objectives indiscriminately. Guglielmo Marconi, born in 1874, was an electrical engineer known for his development of long-distance radio transmission, a wireless radio telegraph system, which uses electromagnetic induction, and ground conduction telegraph systems, which are still widely used by amateur radio enthusiasts and by the military for emergency communication. These are definitely concepts law enforcement might benefit from starting with. There are many innovations that were made from the 1700s to the 1950s. Many of those developments can be widely exploited today. What is clear is that, as early if not earlier than the 1700s, wireless power and energy transfer were being studied and utilized. Though the terminology has changed, and most have given no thought to such practices and its uses for modern day crime, there is a possibility that this hidden network adopted its uses for crime decades ago, which would have enabled them to discreetly carry out crimes for several decades now.

Page 99

Page 99 of 121 This crime has been dubbed as “Havana Syndrome” and though many suspect it is carried out with “directed energy”, this diverse network has many means in which they utilize for their crimes. What is known by victims of this crime is that the criminal network has a number of means through which its members can remotely communicate with each other as well as their victims. Instead of solely using private servers and simple encryption-based channels and hacking, for harassment this network employs much more sophisticated and less traceable wireless technology concepts. It can be suspected that this network may use other approaches such as sound waves, light, radio waves, solar, radiofrequency, and laser-based technology, which ensures transmutable methods that equip them to uses multiple processes for the purpose of crime. There are hackers on the network that hold degrees and have worked in many fields, donating their expertise to ensuring the networks technologies continue to expand and function. Using multiple methods could allow them to send and receive energy midair as long as the intended coordinates are known and the frequency is accurate. There is a chance they may have drifted into the use of other means—this is for law enforcement to determine when they investigate their crimes. But for now, what we know and what logic says is that information and data can digitally travel in the form of frequency through technologies wirelessly and cable-connected devices. Information in the form of energy can be picked up from any location that the algorithm designates. Whether through a special receiver chip, cable, or free space (i.e. the air), it is the responsibility of law enforcement to identify what methods are being utilized by the network. Technology has already shown us that wireless systems allow indiscriminate communication and capabilities. Whether energy transmissions for cell phones, broadband radio communication, Wi-Fi, cable television, radar detection, laser transmissions, or uses for medical equipment, it powers

Page 100

Page 100 of 121 everything in our modern-day society. Why would it not be a tool exploited by criminals for the purpose of crimes—or in this case, human rights abuses? According to a lesson written on manipulating waves by the National Aeronautics and Space Administration, different types of antennae are able to transmit electromagnetic waves with varying directional and focal control. Proper antennae even allow transmission and reception as far as outer space. Reflection allows bouncing of a wave from a surface. Refraction allows bending of a wave’s path. Magnification increases or decreases the size of an image by manipulating electromagnetic waves. All in all, for the expert technology or computer specialist, understanding and utilizing this information enables the use of technology and the transmission and manipulation of energy to be rather feasible. Radical frequencies may even be hijacked and manipulated to allow them to be received conventionally (even anonymously) by ordinary wave towers. One of the many methods this network may be using is frequency wavelength manipulation of some sort that allows them to transfer their sound within the vicinity of victims, for voyeurism and aggravated physical and sexual assault by wireless technology, and without need for a formal medium in the form of a wireless device. This is one of many probable theories but also an attempt to frame the descriptions provided by victims who themselves are left to speculate about how the crimes are being committed, what they are being committed with, and who is committing them, using existing technical analysis and familiar processes. This network appears to utilize many forms of technology, one of which is their use of some form of wireless technology for encrypted and discreet communication exploiting the most unlikely source: our environment and the people within it. This network has been known to make use of their wireless technology to even shape clouds into the shape of objects, symbols, or hidden codes, serving as hints toward the execution of a certain action to others on their network.

Page 101

Page 101 of 121 Possibly for decades it has been used to notify its members of law enforcement activities or to report status remotely. Observations of clouds that form shapes as it relates to this crime are not to confused with pareidolia. Pareidolia is classified as an incorrect perception of a stimulus as an object, pattern, or meaning. It is a psychological phenomenon where people often assign human characteristics to objects. If this is accurate, then photos captured of shapes in the clouds where the wireless network has used their technology to shape actual letters, words, gang symbols, cartoon characters, animals, beasts, mythical creatures, symbols, and body parts that are clearly distinguishable do not fall under the same definition. It has come to be known that the organization has access to highly functional, advanced, energy-based tech that enables them to acquire a view inside anyone’s private lives at any time, even if they lack any computer or any other connectable device. The technology appears to have been used for decades now among different generations of this crime organization. This be assumed from the varying ages of its victims. Although the exact details of said technology are not known, one must rely on the descriptions and reports of real victims of this clandestine crime. According to victims’ reports, it is clear that this network’s technologies enable them to acquire a visual projection of what is happening behind walls in real time. With an advanced computer that utilizes AI algorithms to further refine the results, there is no limit to their ability to invade privacy. But privacy violations are only part of this network’s activities. This network has the ability to use energy as a weapon, which has allowed them to carry out a different class of crimes. The bottom line is that the network uses technology to secretly violate people, specifically when they are in their own homes. But with no restrictions enforcing regulatory or prevention procedures in place, this network has been able to freely engage in its activities,

Page 102

Page 102 of 121 which, by extension, actively allows them to find and violate unsuspecting children and adults for long durations of time. If their ability to secretly watch you in your home and listen in as you engage with your loved ones is not enough to make you feel violated, it has also been reported that they use some type of stealthy energy source that allows them to wirelessly touch, feel, and somehow transmit aromas for their perverse ends. This black market technology is used by the criminals for aggravated physical and sexual assault, harassment, and psychological conditioning—a large part of this network’s activities. They can even use this interactive tech to directly speak to the individual by transmitting their sound through freespace. With sound isolating abilities, they are able to isolate their audio, making themselves audible within earshot of a single person with or without them being heard by anyone else, even in a filled room. The process could be carried out by using several methods, not all of which are recognized or familiar. Long-range wireless power uses transducers, transmitters, receivers, and software that deliver wireless power at a distance. Research confirms that electromagnetic and radio frequency waves can be transmitted and absorbed by the skin, and they can penetrate tissue, heat material, and permeate surfaces, walls, or sound waves. They could be using all or none of these methods. This is for law enforcement to determine through investigation of the crimes. What is clear from photographic images and reports from thousands of victims is that this network’s use of technology to transmit wireless energy has allowed them to gain access to people, their homes, and technologies without consent. Take, for example, the latest Vault 7 leak from WikiLeaks on the CIA. It shows us that government agencies are not completely unfamiliar with advanced technologies. In the Vault 7

Page 103

Page 103 of 121 leak, it was documented that the government possesses the technology to tap into any internet-connected device, be it a smartphone, smart TV, smart car, or even your home’s CCTV and turn it into a spying device. Moreover government agencies are able to make the device appear as if it is turned off, but in reality it can still be recording audio or video of whatever is happening within a room. While government agencies are restricted and limited to what they are permitted to do, criminals have no such limitations or restrictions; therefore they have liberally developed technologies that enable them to violate privacy in other ways right under our noses. Accessing computers, cell phones, and other technologies is not their primary means of criminality, even though they would like for you to think it is. For this hidden network, the use of wireless technology supersedes all current technology crimes and is actively being used by this network for exploiting, harnessing, and transmitting energy through structures (even those that are classified as opaque), inside and outside dwellings, and midair, all stealthily. You would never suspect that you were being watched in your own home, but this network is actively doing just that from coast to coast. Now you might say that the government is not affiliated with the criminal network, but they do not need to be for the secret criminal organization to get its hands on such technology. Black market technologies are circulated by criminal underground organizations, and groups fetch a hefty profit selling their skills, expertise, experience, and equipment. Most of the real criminals do not have documented histories. The infamous Silk Road’s founder, Ross Ulbricht, provides an excellent example of a person who has an Ivy League education and yet elects to commits the most criminal of acts. We find in another interesting leak from the whistleblower and former NSA employee named Edward Snowden that the coveted cyber weapons of intelligence agencies can be stolen.

Page 104

Page 104 of 121 In his leaks he described one such instance within the NSA, where an online criminal group called the Shadow Brokers were able to steal equipment from one of their elite hacking units called the Equation Group. Afterward they auctioned off the stolen “goods” to the highest bidder. You are not expected to be familiar with every aspect of technology or method used by criminals to accept that this crime is occurring. But if you are to be realistic about technology and criminals, it’s more than likely you know that a hidden crime is designed to not be detected, and, with that in mind, keeping a crime of this nature hidden for decades would mean that the network responsible for it has taken extreme measures to conceal their activities and prevent law enforcement intervention. In the case of this crime, not only is standard technology utilized but several other advanced, lesser-known technologies. Development of an invention does not mean it enters the public market immediately. It can take years, decades, or even a century before that happens. To explain this further, let’s take the example of the humble light bulb. The first workable light bulb was invented in 1840, yet its cost continued to remain so high that it didn’t become commercial until 1880, when Thomas Edison was able to massively reduce the cost of its manufacturing. Even still, moving forward, it was not even widespread until the early twentieth century. From its first inception until its mainstream acceptance, there was a time span of nearly eight decades. Many of the technologies that we may think of as mere elements of science fiction—brain technologies, laser technologies, wireless power and energy, haptics, and holograms—have been around for decades. Often new developments are introduced decades after they have been researched and tested. Eventually such developments trickle into the mainstream and become commercialized at some point. However, the criminal use of these advanced technologies is

Page 105

Page 105 of 121 occurring at present, and, as of right now, this network is actively engaging in some of the most gruesome crimes against those most vulnerable. Lack of knowledge about advancements in the areas of science, telecommunication, wireless systems, AI, neuroscience, and the high-tech sector in general should not be a reason that crime is allowed to continue. Victims of this crime are suffering now, and for some, they have either already lost their lives due to this crime or are on the brink of it. There is no more time to waste. This crime should be addressed now. The longer this network is allowed to operated unchecked by law enforcement, the better they get at hiding their activities. This network is not a problem that our society and the people within it can afford to see expand. This crime is a threat that has already had casualties; it is time for law enforcement and the government to move to action. Technological leverage of this nature has placed public safety at risk, and that means that you too are at risk.

Page 106

Page 106 of 121 Chapter 7: Link Between Mass Shootings and Wireless Crimes Given their technological advantages, inherently this network also has the ability to terrorize and psychologically violate their victims. Impacting brain function using energy-based technologies is documented; however, the use of such wireless technologies is not yet known or rather acknowledged. But it has been used on the black market for wireless and secret crimes. It would not be far-fetched to state their crimes are directly linked to decades of mass acts of violence across the country—acts that would not be known to law enforcement, given that they are just now beginning to acknowledge this level of crime. It should raise questions that several notable acts of violence that have occurred over the last decade involving mass shootings have involved persons who have directly made mention of this hidden wireless network prior to their shootings. Though the verbiage used by the persons who carried out acts of mass violence was different, their claims align very closely to those of thousands of victims reporting experiences with this hidden crime, and some of whom are now government personnel who have reported experiences identical to the experiences of longtime victims. Such persons who have carried out mass acts of violence who made mention of the wireless crime have included: Aaron Alexis, the Navy Yard shooter of 2013; Myron May, former district attorney, in 2013; Gavin Long, mass shooter in Louisiana in 2016; Nikolas Cruz, airport mass shooter of Florida in 2018; and Kevin Douglas Limbaugh, the shooter of Officer Natalie Corona in Davis in 2019. But newly discovered information about this network’s tactics may indicate that Stephen Paddock, a Las Vegas shooter from 2017, and Seung-Hui Cho, the 2007 Virginia Tech mass shooter, may have also been motivated to carry out two of the worst mass shootings in history at the direction of this hidden and wireless network of individuals, who use psychological abuse and encourage violence. The list is not exhaustive.

Page 107

Page 107 of 121 But if you are to be honest, you will admit there is a trend that has presented. Many of the individuals listed above claimed prior to their violent acts that they were victims of a wireless crime, according to their own reports and information from investigation reports shared online. But for others, the motives were inconclusive. Though violent actors have not used the exact terminology when referencing the “wireless criminal network,” if they made mention of anything apparent, they shared similar accounts and experiences as victims of this hidden crime prior to carrying out the acts of violence consistent with victims of this crime. But what is also a very convincing link between this hidden wireless criminal network and their wireless crimes lies within several photographs of the mass shooters and of many persons who claim to be victims of this crime. Most victims of this wireless crime appear to have what can only be described as brand-like markings on their faces and bodies, as stated previously. A close look at the photos of victims and mass shooters under different filters reveals that the faces of nearly all of the mass shooters listed were burned in the same way in which thousands of victims of the wireless crime have reported on social media, easily confirmed by their photos posted all over the internet. This network has a practice of branding their victims’ faces and bodies remotely using their technology. Marking their victims presumably similarly to the way in which gangs tag walls with graffiti, this network appears to mark their victims’ bodies, claiming ownership and territory and for identification purposes. Quite similar to the traditional human trafficker known to often use branding for the same purposes, this network too has adopted the same practices; they simply can do so remotely. Without knowledge of this modus operandi, it could easily be overlooked evidence, especially if you did not know of this network’s practice of “marking” (assaulting) the victims of

Page 108

Page 108 of 121 their crimes on their flesh using technology remotely unless it was pointed out. But even in the face of this evidence being presented to multiple law enforcement agencies, it has still been ignored. Law enforcement has even claimed, when presented with such evidence, that they cannot visually see the markings that are clearly visible on the faces and bodies of victims who have made attempts to report these activities, yet on social media platforms, thousands of victims meet, and, when viewing the same photographic evidence, they are clearly able to identify the laser-like burns marks with ease. The evidence does not lie. This information sheds light on a network of criminals’ ability to carry out aggravated crimes that are wireless with technology. If this is the case, which it is, this network has engaged in crimes against persons, and it is apparent, according to many of the statements of the mass shooters left prior to their acts of violence, that the network led, drove, and encouraged them to commit acts of violence. Prior to Aaron Alexis committing his crime, reports state that he filed a police report in 2013 claiming to be a victim of electronic harassment and that he was under the belief he was being assaulted and influenced by extremely low frequency magnetic waves. News reports stated that he scratched the phrase “My ELF weapon! Not what y’all say! End to the torment!” on his sawed-off shotgun. This would mean that while he was preparing to carry out a mass shooting that the wireless criminals were watching and made no attempts to stop his activities , instead encouraged them by continuing their wireless crimes. Myron May contacted several people prior to the FSU shooting, stating that he had “government stalkers harassing him and were using a directed energy weapon to hurt him.” Though delving into this aspect of the crime requires an extensive knowledge of the methods used in psychological abuses to terrorize, given that the network can communicate wirelessly

Page 109

Page 109 of 121 through the air and established communication with anyone, it can be suspected that easily convincing random persons to participate at their request would not be difficult. The other of Gavin Long, the Baton Rouge police shooter, claimed that her son once reported that he “believed the CIA was following him.” Nikolas Cruz reportedly stated prior to the Parkland school shooting that he heard “voices, described as demons, giving him instructions on what to do to conduct the attack,” law enforcement sources told ABC News. It is important to note that is urban areas the wireless criminals are often referred to as “voices” – an urban way of discussing the crime without mentioning the crime. Kevin Limbaugh, killer of Officer Natalie Corona of Davis, California, left a letter stating, “Davis police has been hitting me with ultrasonic waves…I did my best to appease them, but they have continued for years, and I can’t live this way anymore.” This was yet another case of a person that claimed he was violated by wireless energy, however he was lead to believe the source was law enforcement. This misrepresentation of its organization being law enforcement is common, as the network has a practice of soliciting assistance from individual law enforcement officers to help them violate victims but using law enforcement officers across the country to harass it victims at times and places they designate. But even more chilling, though reports from news outlets state that Steve Paddock’s motives were inconclusive, his photos reveal a different story. One of his photos clearly reveals the number fifteen burned into the right side of his face along with other symbols. Seung-Hui Cho, the 2007 Virginia Tech mass shooter, stated, “You love to crucify me. You loved inducing cancer in my head, terror my heart, and ripping my soul all this time…you have torched my conscience…what did you expect me to do, you violators of human rights?”

Page 110

Page 110 of 121 Though his manifesto was rather cryptic, there are photos that show that he too was burned on his face in similar ways to all of the mass shooters and victims of this hidden crime. These similarities cannot possibly be simply by chance. There has to be a correlation between the network’s crimes and mass shootings. The real question for all is: why has this not been investigated further? Though most might assert that mental illness played a role in all of the tragedies that occurred, mental illness had nothing to do with why, when their photos are darkened or lightened, you see clear shapes, numbers, symbols, and lines burned into the skin of the mass shooters. Now the question is: where did those markings come from? All of the shooters were in different states, committed their crimes in different years, and came from very different backgrounds, yet, for most of them, reports state they claimed they were being harassed, assaulted, and conspired against remotely. The lack of acknowledgement of this type of crime and refusal to acknowledge it may in fact be what is motiving these acts of violence to continue. Even in lieu of evidence, there have been thousands of reports from victims who assert similar experiences to many of the mass shooters, and law enforcement has neglected to launch an investigation into these connections. The network has the ability to entice random people to carry out acts of mass violence anywhere within the United States at any time. If this information is not clear enough to draw questions for law enforcement about the role this hidden high-tech crime has played in mass acts of violence, what will be? Law enforcement will have to assess it to determine the validity of such information. But they must first stop lying and carry out their duties if the crime is to be addressed. If it is found to be accurate, this means that individuals belonging to a wireless and hidden network have been operating in our country for decades, driving people to murder and individual law enforcement officers have turned a blind eye which has put us all at risk of their

Page 111

Page 111 of 121 next wave of criminality. If this information is not enough to motivate an inquiry into this crime, maybe the photos that follow will. Mental illness has been used as a scapegoat for persons in law enforcement who are unwilling to address this crime, refuse to acknowledge it, or have a lack of information about it. Mass shootings have not been examined under the scope of the probability that this wireless crime is occurring. Doing so would be in the best interest of public safety. What must be made clear is that it is possible that many of the persons who are listed had true mental illnesses, but generally persons who suffer from mental illnesses are not all violent and frequently do not construct a strategy and arm themselves with the objective to murder innocent people. They simply live their lives with or without treatment. But many victims of this have reported that this network encourages violence and high-risk behaviors and that they violate the physical bodies of their victims egregiously and offensively and, for most, excessively. Victims have reported and provided photos where their faces, buttocks, inner thighs, breasts, and entire bodies were burned. They stated that they were sodomized and fondled, their private areas were penetrated and, in some cases for women, mutilated, and many males stated that the criminals forced them to remain impotent. If this network can assault government personnel in their heads, then its technology can surely be used on other regions of the body. While engaging in aggravated physical and sexual assault, victims have reported this network engages in taunting, mocking, berating, obscene, perverted, repetitive, and endless harassment, streamed into their environments for those victims who are perceived as problematic—victims state this occurs twenty-four hours a day. Victims are denied adequate rest,

Page 112

Page 112 of 121 isolated, and denied the right to engage in life and activities that support healthy and happy living. They stated that their lives as victims consist of trying to protect themselves from this network’s conspiracies and games. The persons on this wireless network meet in numbers, and at different times, different persons are logged on. Victims are not only subjected to unwanted sexual contact, but this network causes reoccurring trauma, assaults to the brain, imposed lethargy, confuse, speech impacts, even their mobility can be impacted, and part of their psychological abuse is purposed to cause breakdowns, both mental and physical. Abuse of such a nature is bound to have lasting impacts on the victims. Over time being denied one’s privacy and being silenced while being subjected to aggravated physical and sexual violence is bound to drive the victim to cope with the trauma in one way or another. Most victims appear to adjust and unwillingly accept that they are stuck; others work to bring awareness to this crime, but not everyone has the same sentiments. People with certain personality traits and characteristics, or even persons who are religious, may not respond to their bodies, lives, homes, and liberties being violated and instead might be driven to violence—Aaron Alexis is evidence. But in reality this network could easily violate you, and if they did so in the same ways in which thousands of victims claim they are violated frequently, what would your response be? This is a question we must all pose to ourselves, because without law enforcement action, everyone is vulnerable and available to be victimized in these heinous ways. The point is that with coercion, limited rest, silence, and physical violence, their acts have been encouraged and aided by members of a criminal network. They could have planned to use the shooters and enacted abuses that were purposed to cause a breakdown of persons who they knew already had fragile mental states.

Page 113

Page 113 of 121 The biggest connection between victims of this wireless crime and mass shooters lies within the photographs showing encrypted messages or simply defacing marks on the bodies of persons whom this network remotely assaults. Whether these markers are a display of power and humiliation for victims or used by the individuals on this network to identify and mark the person for specific intents, this evidence is too spot-on to be ignored. Let’s hope it will not be. It would be virtually impossible for each individual victim of this hidden crime, located in a different location, to have markings burned and etched into their faces and bodies similarly unless there was a direct connection between the victims of the hidden wireless crime and mass shooters across the United States. There is: the hidden wireless network and their remote crimes. The nature of this criminal network’s activities is rooted in human rights abuses of all sorts. Their crimes drive people to states of violence and harm on many levels. But because their organization is hidden and its activities are overlooked, their involvement in acts of violence is never factored in. For those who are vulnerable and subjected to wireless terror, undoubtedly it could be what pushes them over the edge. This network expects their crimes to continue and their victims to remain accountable for this network’s actions. Or possibly this network wants to show what happens if they are challenged? Maybe they are threatening public safety so that people have a clear understanding of what happens when their network is challenged or what could happen? Either way, it is hoped that law enforcement will view this crime as nothing less than a different form of domestic terrorism disguised as organized crime. But law enforcement is qualified to make these assessments. The real question is: why have they not?

Page 114

Page 114 of 121 Chapter 8: Victims On the internet, you will come across many stories of individuals sharing details about their experiences as victims. Prior to this network’s overt crimes, these persons claim they were normal people who suddenly began being violated, stalked, and followed by wireless harassment that could be heard from midair. Victims state the criminals transmit their sound, boldly harassing them, and paired with various other abuses, they are subjected to relentless abuses that involve constant headaches, pressure, pain, lethargy, and sleep deprivation. Victims’ accounts include their computers and documents being modified and hacked, wireless hijacking of television broadcast, waking up and observing numbers, shapes, and symbols burned on their faces and bodies, and their private areas being tampered with—noticeable changes. Other bizarre things begin to occur, such as sudden reoccurring conflicts, tickets, and other forms of external harassment its members elect to subject them to. Victims stating these experiences confirms that something actual is occurring rather than the suspicion of it. Many victims state that by the time they realize what is occurring, the crime has gone on for quite some time, and any efforts employed to report it are futile. They describe “radiating heat” , “ pressure”, “shocks”, or “pulsating”, and provide photos collected over years where, from day to day, the marks change. There are letters and shapes, and then the next day their skin has a different emblem. Some show lacerations and actual bleeding both under and above the skin. Victims claim that some energy or something can be felt and often causes varying degrees of pain. But photographs from victims from coast to coast who have never connected online, interacted, or known of each other’s existence would not all have laser-like burn marks or

Page 115

Page 115 of 121 brandings similar in nature and often different in text and languages for victims of that area—unless the source was the same. For adult victims, being a victim of the network is described as feeling similar to being in prison every day of your life, and though you can see the outside world, you are trapped. This network makes victims lose control of their own life with the intention to exploit them , watching them as they struggle to report their crimes and maintain their own lives. But this is only one aspect of their crimes. This network not only engages in harassment, but they are involved in setting their victims up for crimes, for arrest, and for conflict daily. Victims are denied access to opportunities that would place them in an advantageous position financially or vocationally. Many victims stated that they were isolated and denied the right to live private and peaceful lives through the direct acts of the persons on this network. Attractive young and older women state that this network engages in different crimes that are mostly of a sexually driven nature. Parents of child victims are afraid to speak out, given that this crime has remained hidden. But they have reported observing laser-like burn markings on their children as well as behavior changes, and, often because they are already victims of the crime, its members have verbalized their perverted intent. These victims count on the response of law enforcement and the public. It is our responsibility to ensure that our children remain protected and safe from such threats. This network’s adaptation of wireless technology has opened up an entire parameter of criminality, one which places those most vulnerable at an increasing risk of being violated. This crime is being carried out by a hidden group of individuals who have made their profit from many organized crime activities and have developed a means to provide for their children, live lives of luxury, and cloth and feed their children off of the violation of defenseless

Page 116

Page 116 of 121 persons. They have made their lives about violating ours. Who are they? Where are they? Once again, this is for law enforcement to find out. With their use of advanced wireless technology, their covert yet domineering influence within law enforcement agencies, media, and the government, as well as their ability to manipulate and terrorize their victims, getting this crime acknowledged and addressed has been a task. After all, as we already discussed in the previous chapters, such attempts have been quite futile. But it is common that, for those who present this crime as what it is, a crime—and presents the criminals for what they are, criminals—activism efforts to get their crime addressed is met with violence and deprivation from the criminals and ill-received responses by law enforcement. Nonetheless, activists still work to shed light on this crime with the hope that eventually some law enforcement agency or government entities will take the proper action to react in the interest of public safety and address their crimes. The network is watching and managing persons who seek to get their crimes addressed. It appears their expectation is that if they murder their victims, keep them oppressed, drive them insane, impact their ability to work, affect their lives, threaten their families, violate their children, and use individual government officers as tools, they can get away with their crimes and will never have to be held accountable for them. Meanwhile many of the victims of this crime are fearful, especially those with children and careers. Police antagonize reporters of the crime and often seek to take their children rather than address the crime. They have heard the stories of victims who have attempted to speak out and report this crime. However, virtually all of them have been met with institutionalization threats—arrest, in some cases, and otherwise, mental health examinations that are humiliating

Page 117

Page 117 of 121 and dehumanizing. Other victims have been so severely abused they have developed debilitating mental health conditions that limit their lives substantially. Fear has been used as a tool by the network to control their victims and to keep them oppressed. Unless victims are mobilized in a way that is organized and introduces this hidden crime for what it is—a crime carried out by anonymous criminals who use technology for wireless criminal activities—the cycle of violence seeks to continue.

Page 118

Page 118 of 121 Chapter 9: Dealing with the Threat Victims of the network such as Aaron Alexis and Myron May tried repeatedly to report this crime. Though most saw such persons as mentally ill persons, a relative of May’s stated he was not a violent person but was a prosecutor who was perceived as the life of the party, and they would have never thought he would have committed such an act, knowing him as closely as they did. The network drives victims to violence and watches and encourages acts, and they can violate anyone, turning random persons into violent individuals, given that they have complete freedom to carry out their crimes and subject victims to abuses that are purposed to direct the victims’ behaviors—secretly, of course. Easily they can portray their victims as mentally ill persons when in actuality they are victims of crimes. Conditioning mass shooters is not a complicated task for these criminals. But also using pain, torture, and psychological abuse, they can cause any targeted behavior to arise in their victims or any persons at any time. The network of individuals responsible for the wireless crimes discussed in this book is a criminal organization, and they more than likely are responsible for recent attacks on government personnel. One victim reported that prior to the news reports of the crime that an anonymous criminal operating on the network stated they were going to carry out acts at the White House. This reliable source has attempted to report the crime multiple times. Their crimes have extended from coast to coast, and they expect to continue without interference and at the cost of lives as they have for decades underground. The network would like people to be unconcerned with their activities, but we should all be concerned. The persons operating on this network have already carried out violent crimes secretly; their victims are already living in states of oppression and have been for decades. They have already established themselves within our infrastructures along with the technologies they

Page 119

Page 119 of 121 are utilizing for crimes. It must be acknowledged that this is not a new crime, and with that knowledge, the exploration of the collateral damage of this hidden crime can be assessed. Believing that this crime is one that just emerged within the last few decades is erroneous; it does not shed light on the magnitude of the network’s impacts to our people, society, and government as a whole. The crimes they commit do not happen in a vacuum—the consequences of it are not just limited to the victims. With every crime there is always collateral damage. The first and most direct are the loved ones of the victims, who themselves may suffer by extension of their deep relationship with the suffering individual. The next tier of collateral is the community, our society, and the government. As we explored in detail in previous chapters, because the individuals they abuse and those they mentally break cannot articulate and have a lack of understanding about the true nature of the crime, the responsibility is on those entrusted to protect our society in politics and law enforcement to do what they cannot. Crimes such as these are not supposed to happen in the United States, but they are, they have, and they do. This crime has secretly shaped our society, our thoughts about mental illness, gun laws politics, the way that law enforcement polices crimes, and, given the way victims are treated, how effectively debilitating conspiracies can be to individuals and how harmful they are to the public. Observe all around you; we live in a much less free world where mass surveillance exists, and technology that infringes upon our privacy is increasingly being progressed further. This has been the outcome of not an unlucky coincidence but deliberate design. The network of criminals benefits from our silence and inaction. Allowing them to liberally engage in violating our rights and privacy and undermining the law is what has resulted in their organization’s continued

Page 120

Page 120 of 121 growth. As we become more reliant on technology, the network seeks to extend their crimes well beyond the isolated victim base, and this isolated group seeks to gain acceptance on a wider level. In doing so, we allow them to violate our homes, to control our police, to impact policy, to harm our children, to sexually assault and exploit our women and men, and to decide which persons live and who dies, when, and how. To prevent further harm, the only action and simplest response is for law enforcement to investigate this network and for policy makers to do their jobs and enact policies that demand action. The public and government must stand together and demand that law enforcement launch a mass scale investigation that identifies the persons who make up this criminal network so that they may be brought to justice one by one and protect those bold enough to report their crimes. Concealing this crime is as simple as the persons on this network turning off their technologies; that is, unless you know where to look. The first step is to be realistic and accept that technology is more advanced than we are privy to in mainstream society. It must be arrived at that with new developments in the technological sector happening almost daily, it should not be surprising that this type of crime exists at all, given that criminals are always seeking out new ways to engage in crimes with lower risk and more potential for monetary gain and power. We know that much of their technology is energy-based, wireless power, laser-like beams, sound waves, radio frequencies, and electromagnetic energy, though whichever matters very little. What should be concerning is that this network of dangerous persons could be violating you or someone you love. They could be watching your children and planning to exploit and violate them because they have developed an interest in them. They could decide that you should not have your career and salary and ruin it as easily as they could plot to end your

Page 121

Page 121 of 121 life because the actions you carried out in your private offended or enticed them. These criminals are ruthless, dangerous, and completely deserving of life in prison for their activities—past and present. But without action they remain free. Without law enforcement looking in the right direction this hidden crime continues to go on unabated.