DHNET.BE | Créer un Blog | Envoyer ce Blog à un ami | Avertir le modérateur


TM-SW7905.1 is probably the reference of the devices used to monitor this nazi stalking network.

Ce site décrit un crime actuel qu’est le GANG-STALKING, méconnu car sous couvert, hyper-invasif et destructeur que des réseaux d’assassins perpètrent via logiciels et ondes sous la forme de réactions en chaîne et de jeux d’ordures issus de protocoles nazis (nazis pigs theorem, obedience to authority, karpman deviances, rats-wares, spy-wares network, worm, trackers, mk-ultra, domestic surveillance, brain tapping, hearing for the deaf, silent sound, human tracking, coils, microwaves, radar, trough the wall, stalkers).



Pink Floyd

What is a Perpetrator?
A Perpetrator is anyone who has been trained to harass, torture, maim, and kill a Target, either by direct means, or by covert means including, electronic, biological,or “accidental” means. Career perps make a good living dealing misery to hapless individuals. Perps usually do not know the victim personally, but are supplied enough information to allow a well oiled campaign of gang stalking and harassment.

Chain Reaction
What is clear after researching the informantsystem is that there is a chain reaction happening in society and that chain reaction is at the heart of much of the corruption that we are seeing in our legal system and other sectors of society. This system is responsible for enslaving and transforming large portions of communities into informants. Once a target is turned into an informant they in turn are sent back out into society to recruit, entrap, and turn others into informants. Many in society are not aware that this is happening. When it comes to Gang Stalking many people feel that it would be impossible or just too expensive to have someone monitored and placed under  surveillance 24/7, much less arranging to have them tracked this way when they move or change jobs, but what research into the informant system and the chain reaction that is occurring within society has shown is that it is very possible. This chain reaction that is happening within society if left unchecked has the potential to infect and destroy the very core of society that we know and are dependent upon. The informant system is an infection on the soul of society and if not cured it could in time become malignant to the very society it was designed to assist., Bailey

Oorsprong: Groepstalking is een fenomeen dat waarschijnlijk oorspronkelijk in de VS is ontwikkeld door de KuKluxKlan en gebruikt wordt om ‘ongewenste elementen’ uit hun omgeving te verdrijven.
Doel van groepstalking: zelfmoord Groepstalking komt voor in westerse landen en is een onderdeel van een verfijnde methode om mensen uit te schakelen. Het slachtoffer moet geisoleerd worden, werkeloos, uitgeput en (financieel) afhankelijk gemaakt, maar vooral buitenzinnen worden gebracht. Het doel van deze methode (met groepstalking als onderdeel van), is dat het slachtoffer zelfmoord pleegt, gepsychiatriseerd raakt, zijn buren aanvalt en/of vermoord, e.d. Dus, de geestelijke en/of lichamelijke dood van het slachtoffer. Dat maakt degenen die hier aan meewerken medeplichtig aan moord met voorbedachten rade of anders gezegd, moordenaars. Het is belangrijk te realiseren dat de meeste mensen die dit aangedaan wordt niet eens zullen begrijpen wat hun precies overkomt.

Domestic War Rooms- C2 Center
Military campaigns have been typically directed from war rooms. They are also called command centers, or command and control centers (C2). A C2 center is a military term for a station which allows the planning, direction and control of operations, monitoring,decisionmaking, and execution.The word communications was added to this term, making it C3, and eventually computers were added, amounting to C4. It is now referred to as C4ISR with the addition of intelligence, surveillance, and reconnaissance.4 A more detailed explanation of this term follows.Command is the formulation of intent such as planning, control is the information obtained from the results of the action taken, as well as the conclusion as to whether or not the action was successful. Communications and computers are the hardware and software used to implement the command and control.Intelligence, surveillance, and reconnaissance are the hardware and software systems of sensors, people, data collectors, and platforms as well as the use of tools to extract the information from data. These are collectively referred to as C4ISR.M Rich

Silent Sound Technology – « S-quad » 
Silent (converted-to-voice AM) hypnosis can be transmitted using a voice frequency modulator to generate the »voice. » It is a steady tone, near the high end of hearing range (15,000 Hz), plus a hypnotist’s voice, varying from 300 – 4,000 Hz. These two signals are frequency modulated. The output now appears as a steady tone, like tinnitus,but with hypnosis embedded. The FM-voice controls the timing of the transmitter’s pulse.

Through-wall surveillance methods: 
This includes top end of microwave (near infrared), and the so-called »millimeter wave » scanning. This method uses the very top end of the microwave radio signal spectrum just below infrared. To view small objects or people clearly, the highest frequency that will penetrate non-conductive or poorly-conductive walls is used.
Millimeter wave scanning radar can be used in two modes: The first is passive (no radiated signal) and uses background radiation already in the area to be scanned. It is totally undetectable. The active system uses a (low power millimeter wave) « flashlight » attached to the scanner.

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neuralcircuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control.Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information whiletransmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain).

The pigs exploit your desperation.  You are under torture.  You are rightfully desperate.  The « bad Nazi » is harassing you.  So the « good Nazi » has an opportunity.  The « good Nazi » keeps promising to help you.  As a torture victim, you tend to keep paying attention to the « good Nazi, » because there is no alternative.  In the « real » world no one even knows (or admits to knowing) what is going on.  You are under an intolerable torture. The « good Nazi » exploits this.  The « good Nazi » can even turn « bad Nazi » from time to time and the victim will stay tuned in, because that seems to be the only hope.  The « good Nazi » will promise help and anything else, as long as it is only between the lines or otherwise deniable.  The « good Nazi » can appear on any FIP, for example as another voice on the nonconsensual voice­to­skull send.  Or it might be a collaborator on a normally legitimate channel ­­ pigs at a Mockingbird newspaper, for example. But if you buy the bait they dangle to a desperate human being under torture, they then start trying to manipulate you.  Whoops!  If only you hadn’t done that!  Well, your freedom was all lined up if you hadn’t done that!  Your basic human rights will be restored soon, if only you will…Nazis pig theorem.Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

Silent weapons for quiet wars An introductory programming manual,Operations Research,Technical Manual TM-SW7905.1

This publication marks the 25th anniversary of the Third World War, called the « Quiet War« ,being conducted using subjective biological warfare, fought with « silent weapons ».This book contains an introductory description of this war, its strategies, and its weaponry.It is patently impossible to discuss social engineering or the automation of a society, i.e., the engineering of social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of social control and destruction of human life, i.e., slavery and genocide.
With the creation of the maser in 1954, the promise of unlocking unlimited sources of fusion atomic energy from the heavy hydrogen in sea water and the consequent availability of u nlimited social power was a possibility only decades away.
The combination was irresistible. The Quiet War was quietly declared by the International Elite at a meeting held in 1954. This volume marks the 25th anniversary of the beginning of the Quiet War. Already this domestic war has had many victories on many fronts throughout the world.  Google search: silent sound, quiet war, genocides, false flags, mind slaves, harrassment, mind reading, TM-SW7905.1, OS/EH? H waves, sanguine, human monitoring.

Elf-EEG-Entrainment-sanguine-H-psychotronic A.Barker

Silent-weapons-for-quiet-wars-Rotchil-Technical Manual-TM-SW7905.1

The primary psychiatric diagnostic manual used within the United States and many other western countries is the Diagnostic and Statistics Manual IV-TR (DSM-IV-TR), which is written and published by the American Psychiatric Association (APA, 2000). Based on my understanding of its contents, which is informed somewhat by a Bachelor of Science degree in Psychology (non-clinical) and spending close to a decade in psychotherapy as a patient, people who claim that they are being stalked by multipleperpetrators could receive a diagnosis of persecutory delusional disorder or paranoid schizophrenia. Dr Robin B. Webster  Victims-of-Organized-Stalking-Delusional-Schizophrenic-or...

L’invalidation de certains phénomènes comme le stalking organisationnel par les forces de l’ordre et les psychiatres au profit d’allégations fallacieuses sur le délire de persécution ou la schizophrénie nous semblent des postulats dépassés à l’heure de la radiogoniométrie, de l’existence des nacelles de contrôle visuel équipant les chasseurs (le Rafale, le Mirage, le F16, etc.)
et de l’ensemble de moyens de surveillance dont dispose l’industrie policière et sécuritaire. Les Cahiers du journalisme, N.Desurmont (belgian criminologist)
PETITION -OVER-1300-TORTURE-CASES.This letter is to ask for your help for the many victims who are being attacked with Psychotronic (or Mind Control,Electronic, Directed Energy, Neurological, Non-lethal) Weapons. Some of our ELECTRONIC TORTURE, ABUSE AND EXPERIMENTATION CASES detail the most extreme and totalitarian violations of human rights in human history, including the most horrendous psychological tortures, rapes, sexual abuse, physical assaults, surgical mutilations, ‘mind control’, and other mental and physical mutilations. Among other things the perpetrators of these crimes can place the human subject under continuous surveillance no matter where he/she is; they can monitor the human brain, including thoughts, reactions, motor commands, auditory events and visual images; they can continuously alter consciousness, introduce voices, noises, other disturbances, commands, images and « dreams » into the brain; and they can directly abuse, torture and hit bodies – including
performing advanced medical procedures – from remote locations. The technology they are using is so advanced that it allows the controller(s) to see through the eyes of the targeted individual, essentially seeing whatever the victim sees. Many of us are being tortured and abused in these ways 24 hours a day, 7 days a week – year in year out.

Alain Winants (Sûreté de l’Etat) : « La Belgique fait un peu pâle figure » Pour Alain Winants, administrateur général de la Sûreté de l’Etat, les cyberattaques constatées jusqu’ici en Belgique, bien qu’elles soient en recrudescence, n’ont pas encore montré de cas de cyber­sabotage , qui résulte dans la destruction de matériel ou de données (comme ce fut le cas en Iran avec Stuxnet). Mais en matière de cybersécurité, notre pays est bel et bien en retard.Quand une administration comme les Affaires étrangères est aujourd’hui attaquée, qui trouve ­t­on derrière ces attaques ?
La Belgique est ­elle capable de se défendre ?
Il n’y a pas encore au niveau belge de plan de cybersécurité général dans lequel la Sûreté pourrait s’inscrire avec d’autres partenaires, et dans le cadre duquel nous pourrions nous répartir les tâches. La Sûreté, seule, n’est pas à même d’assurer ce genre de responsabilité : elle doit travailler avec le SGRS, le FCCU (NDLR : Federal Computer Crime Unit), etc. On est en train d’élaborer depuis un certain temps déjà, au niveau du gouvernement, un plan général dans lequel il faudra tout à la foisprendre en considération les cyberattaques, la cyberdéfense, la cybersécurité et la protection physique des infrastructures critiques.(et la protection des personnes…?) Le soir,Lalleman A.   Belgique-une-cible-trop-facile-en-cas-de-cybersabotage-Alain-Winant-LALLEMAND-20-juin-2012.pdf

The mind has no firewall By Tim Rifat -2001

Gang stalking = man-in-the-middle attack, spoofing. Techniques appliquée par les terroristes dans l’étendue du spectre electromagnétique et pour tout  les moyens de communications non physiques et francs. (recording + speech to word to speech recognition in real time, e-mailing,web, gsm, radios, forums, facebook, fax, mailing, databases, banks, inssurances ..).
Computer security, the man-in-the-middle attack (often abbreviated MITM)[1] is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point, can insert himself as a man-in-the-middle).  From Wikipedia, the free encyclopedia
To begin the attack the perpetrator can put a link to the false WWW (a copy) on a website that they know the target visits. Or they can send the target an email with a link to the false web. They may also be able to get their false web indexed on a search engine. These attacks can be launched using an unwitting person’s PC as a proxy which would conceal the location of the perpetrators. Most of the clues that would alert a target that their web has been spoofed can be concealed. One is the status line located at the bottom of most browsers, which provides the address of a web site that’s in the process of loading. Normally, if a user clicks on a site, the status line reveals the actual site being loaded, regardless of the label on the hyperlink that was clicked. Also, the URL location line at the top of most browsers where sites can be typed in, will display the current site. Mark Rich

Le domaine C4ISTAR (Command, Control, Communications and Computers for Intelligence, Surveillance, Target Acquisition and Reconnaissance) regroupe une large gamme de sous-domaines et de technologies et touche différents types de données (voix, images, vidéos, fichiers, messages, fax). Il participe à la réalisation du concept « Network Enabled Capability » (NEC).
L’amélioration constante des systèmes C4ISTAR reste un domaine d’intérêt. Quelles que soient leurs localisation et dimension, la structure de commandement et les circonstances, il envisage l’intégration réseau-centrée, automatique, cohérente, souple, modulaire, adaptable, agile et flexible de détecteurs, de systèmes C2, de vecteurs et d’effecteurs, et l’amélioration de la diffusion, du partage et du traitement de l’information. Les systèmes « Command and Control » (C2) doivent permettre d’obtenir une meilleure capacité ISTAR en opérations. Ils doivent surveiller l’environnement sécuritaire,faire de la prévention, identifier et neutraliser les menaces et contenir leurs effets à leur minimum, protéger les infrastructures et zones sensibles.
Dans le domaine des communications, cette niche comprend le spectre complet des communications (sans fil) et les différentes manières de sécuriser à différents niveaux ces communications. Pour des applications militaires, ces réseaux doivent être robustes, légers, fiables et interopérables à tous les niveaux opérationnels sans perdre de vue les aspects de « self-configurability »,de redondance et de qualité de services et les mesures de guerre électronique et de cyberwarfare ou CNO (ComputerNetwork Operations). Au sein de la défense, l’accent est mis sur les applications NCO (Network Centric Operations),le « tout en réseau », le « tout sur IP (Internet Protocol) » tant au niveau services que réseaux, fixes et/ou (semi-)mobiles, civils et/ou militaires dont par exemple le programme d’acquisition de la radio du futur: la SDR (Software Defined Radio).Appel_a_projets_F_2012,Jean-Paul MARCEL


ICAACT.ORG is honored to have the opportunity to participate in a gathering of some of the brightest minds of today.We have been asked to give a presentation addressing “Remote Influencing Technologies, The New Terrorism of the 21st Century”. Special guest will include Dr. Barrie Trower (British Physicist), Niels Harrit (Chemistry Professor), Rasmus Foldbjerg (Molecular Biologist), Lars Drudgaard (ICAACT), and others of prestiege and influence. ICAACT is committed to educating the public and representing victims of electronic terrorism throughout the globe.


J’ai tout les éléments depuis longtemps pour que ces ordures soient écrouées, .….sans contacts ni même un papier officiel malgré ces 3 ans d’enfer et ces deux ans et demi de travail à temps plein week-end en sus. Je suis scientifique de formation et je dispose des meilleures références y compris par rapport a ce travail qui me fait vomir. Mais la Belgique n’est pas là.J’ai tout les éléments pour que ces ordures soient écroués, .….sans contacts ni même un papier officiel malgré ces 3 ans d’enfer et ces deux ans et demi de travail à temps plein week-end en sus.
Mais la Belgique n’est pas là.
Des bâtards m’ont assassinés et je n’ai pas d’aide pourtant je les ai…la police Cinacienne n’en veut pas et m’a laissé dans une situation exécrable alors que je leur ai balancé ce réseau en août 2011 sous forme de 3.5 Gigas de documents et de preuves (1 an et demi de travail afin de pouvoir déposer et à propos d’un assassinat). Comme je leur ai indiqué ce dossier exigeait ma déclaration et un minimum de collaboration pour être efficient. Malgré mes post-insistances, un papier officiel, d’autres déclarations en rapport direct avec ce dossier, un quatre yeux, un minimum de franchise, ont été impossible à obtenir, et pire. La semaine dernière, suite a une convocation emanant de l’agent à qui j’avais remis le dossier, c’est un toubib généraliste qui est arrivé au poste. Il m’a questionné a propos d’une photo de revolver!, des mes possibles assuétudes, de l’usage du mot « nazis ». M’a demandé si je marquerais mon accord quant à un séjour en hôpital psychiatrique, une médication, un suivi par un psychiatre. Cette entrevue venait d’une demande du parquet de Dinant . Une preuve de démarche judiciaire m’a encore été refusée !!!

Benjamin Simon 46b Corbion 5590 Ciney. 27 ruelle Burton, Gesves

Special thanks to Tom


Saturday 6, there was a meeting of detection in a anechoic room at the University of Ghent by international specialists .

ICAACT.ORG STARTS PHASE III TESTING On October 6, 2012, we began phase III of our international radio frequency scanning.
We had participants arrive from many countries. Those countries included, Denmark, Sweeden,Spain, United States, and areas throughout Europe.When the leadership of ICAACT arrived in Belgium they were asked to conduct a radio

interview by Transparent Flemish-Dutch Radio.

The results show that I am targeted and fixed at the temples left and right with silent sound waves. Silent sound is the ultimate weapon of war called non-lethal, It seems that the technique is shown in the video below.


Pink Floyd

Pink Floyd H poeple cooker rotchild masint


Buzz, polémiques, web : la liberté d’expression devient soviétisation
The Succor Punch Orgone Generators
C4ISTAR for Hacking and Cyber Conflict (
DoD Cover-Up: Gitmo Detainee Found Hanged With Hands Tied Behind Back(
Necessary Spending? (
Mind control europe …..(2008) (
The NSA’s Global Spying Network (
Satellite Mind Control – Bioelectric Weapon (
Murder, Inc. State Assassinations (
Gang Stalking – You think you can’t lose your freedom? Think again!(
Debunking 10 Myths About The CIA’s Psychological Occupation of The American Mind(
Ways I Have Been Tortured In The Past 18 Years (
Patents and Inventors of Satellite Microwave delivered technology(
Ark. judge fines Johnson & Johnson more than $1.1B in Risperdal case (
J&J Marketed Risperdal to Kids Despite Warnings, Jurors Told (
A+KIDS: Important Information for Children with ASD who Receive Behavior Medications(
The Marketing of antipsychotic Risperdal to kids: I was by now fully alert and fighting the impulse to stand up and say, “Are you serious?” the trial (
Newborn infants experience withdrawal from psychiatric drugs (
Gang Stalking – Hand signals used by Nazis and still used today in U.S.(