What I think.

10 Jan

The Company-How it works
You are respected for the mark you bring to the table. Numerous assets coupled with a high level of naiveté means higher favor of course. First, they invade the marks home to set up audio and video and get into their computer; now they can build a complete profile on the TI. Data is collected and experimenting on the mark with subliminal conditioning begins. With the aid of computer and remote control smart technology most home appliances can be easily adjusted to emanate frequencies that when naturally demodulated by the brain can be made to sound like spoken dialogue to the targeted receiver (in essence a fan can sound like its speaking to you)..
Appliances are manipulated to emanate a command or idea and the observer merely inputs the command either manually or allows a computer to decide; for example, whenever the TI enters the kitchen the refrigerator emanates the words “your fat!” The TI’s response is recorded in its entirety meaning: how long the response took, changes in vitals, everything is collected and stored to later be used in the psych-ops portion of their attack. Laser technology allows the observer to keep an unbreakable connection with the TI using eye, and voice recognition.
Sensor mapping an entire house can be done with ease once the house has been analyzed and a grid of stable or constant reflective points by which beams can be reflected and bounced to every/all points in the area has been calculated. Once these points have been established throughout an area a three dimensional grid is created. Keep in mind the before mentioned tasks are done without entering the TI’s dwelling at all. Tiny beams of light called nano beams are bounced throughout the grid using the reflected points: at the end of each coordinate a beam that bounces back to its origin point to a receiver. When any of the thousands of beams is broken its exact position is recorded and a computer generated image in the shape of the object responsible for breaking the beam of light is created. This technology is simple and very effective in producing an image of an area capable of recording the movement and shape of any and all objects (as small as an ant) without ever entering the area. This vital information is also used to manipulate objects in the gridded area, even living objects (i.e., bugs pets etc.)
The same system used for bouncing the tracking beams can simultaneously be used to gather sound data with laser microphone technology so any sound strong enough to create a wave big enough for a nano beam to record can be used to gather audio as faint as a whisper. Now that communication from the target to the technician has been established communication from the technician to the target must be completed.
Again the same system can simultaneously be used, with Directed sound technology, to direct inaudible frequency waves at the target allowing the technician to speak directly to the targeted individual with such accuracy that a person standing next to the TI hears nothing at all.
Next the marks assets are taken in a series of seemingly misfortunate events or detrimental mistakes that are instigated by the gang assigned to you. There job is to harass and confuse the TI with misdirection, miscommunication, and misinformation. The harassment and confusion assist the technician with breaking down the TI so assets security measures are weakened (ATM card left in the ATM, on checkout counter). Little mistakes that have big consequences especially when persons assigned to the TI are poised and ready to exploit these opportunities to the fullest extreme.
While a TI’s finances are attacked, personnel within the TI’s job are contacted and a hostile work environment is created. A love interest or friendship is introduced, a mechanism later used as an emotional trigger to the TI. Connections are made within the fabric of family and friends later used to mold opinions that count regarding the TI’s support group.
It does not take 100’s of people to accomplish this it takes but a mere few positioned in key areas who are experienced and highly organized and cash, but not even a lot of cash because ultimately once the dismantling begins your own finances are stolen to fund your destruction as well as pay the team assigned to you.
As the targeted individual’s entire life’s work including; years of work establishing report and credit with the people in their community, friends, family, co-workers and bosses begins to corrode under the pressure of these criminals activities. Following is the recruitment/cover-up stage. Once the TI is convinced there is no light at the end of the tunnel they are offered a life preserver of hope. They are told they can recover their lives and prosper again. All they have to do is sign a consent form allowing the gang to do what has already been done insurance that no formal charges be brought against the team assigned to you for the theft and harassment. Plus, a position within their organization is offered to each victim that can bring to the table someone of equal or higher value than themselves- insurance the game will continue at an ever growing prosperity to the house(s) hosting the game and detriment to literally everyone else.
This is all done under the disguise of drug rehabilitation, but in actuality is an insidious and odious social trend that is eating away at the fabric of our society creating a cast class system widening the gap between the have and have-nots in America. While victimizing the rich seems like poetic justice let’s not forget the rich are responsible for paying back the enormous bills of the country as well as driving the cogs of big business in America. Although their contribution of taxes and retention of sufficient moral fiber maybe debatable this swing in the nation’s financial makeup is not without consequences. I believe these consequences are being felt today.
So before you buy “in”, “in” to the lies, understand pyramid schemes and they way they work or more importantly the way they don’t work. As defined in any college text book used in Basic Business 101, defines the pyramid business model as an unsustainable business model involving promising participant’s payment or services…primarily for enrolling other people into the scheme, rather than supplying any real investment. The
The long and short of it, playing the disgusting game for the sake of playing the disgusting game; seeking the demise of others as a way of easing one’s own losses at the expense of others. A social leech that feeds off the fear of desperate people with good intentions, but phenomenally bad judgement. Finally, this evil activity enslaves our children into a vile social trend from which there is no liberation while sending a clear message to the next generation. The message-fellow American’s are nothing but toy’s to be used and exploited as a means to an end that will never come. The message-the “game” is a viable solution to a problem our local police department failed to handle from the beginning because they failed to educate themselves about the emerging bullying trend. This is saying nothing of the perils this technology poses to an individual’s right to privacy and protection from forces abroad as well as on American soil that would use terror to control and victimize its citizens.