CounterTruth.com
Menu

: : THE CRIMES : :


Tweet
Picture

​I ​believe that the crimes addressed on this site will continue to exist as long as tangible evidence can remain concealed. Legislative relief is not to be expected.  Relief from these crimes will require another American Hero coming forward to divulge tangible evidence indicating the existence of the New Cointelpro and its organized Surveillance and harassment programs being directed at citizens. 

Another requirement is the development of an economical Energy Detection Device that can monitor dangerous levels of energy.  Such a device would be akin to a household smoke detector, except that it would unobtrusively and effectively detect and notify the consumer about the presence of "various" forms of dangerous directed energy. Though this would be a cost and technological challenge, it is greatly needed in this electromagnetic soup of a world we call home.
​

[ What Are These Monstrosities ? ]

In recent years, revelations of the frightening surge in government surveillance of citizen communications have been made, but they have only exposed the tip of the iceberg.  Below the surface lies a vast government sponsored surveillance and monitoring program that is being implemented, unconstitutionally, against select segments of the population.  Blacklists circulated throughout government agencies, contractors and Community Watch Groups are a big part of the problem.  Listed below are four particular elements of this covert program that are of interest here.

  • Remote Monitoring refers to the ability to track a person anywhere, anytime, using directed energy in the form of signals intelligence (SIGINT). 
 
  • DEW's (Directed Energy Weapons) can basically be defined as devices that can be used to survey, convey, pacify, disable or kill using electromagnetic, ionizing, acoustic, particle or plasma energy forms.  These are the primary tools used in Electronic Harassment campaigns.
 
  • Electronic Harassment involves the use of DEW's or SIGINT, or both, to invade one’s privacy through surveillance or to cause annoyance or physical harm.  Electronic Harassment campaigns allow the perpetrators to reach a person within the confines of their homes, making accessible even the most difficult and hard-to-reach targets.
 
  • Organized Surveillance (aka, organized stalking) involves intrusive, around-the-clock, monitoring or intimidation of targeted individuals by agents, "Surveillance Role Players" (SuRPs) or individuals from "Community Watch Groups."

Victims of these surveillance and monitoring programs may experience only one or any combination of the aforementioned elements.  Besides the obvious information gathered from surveillance, the program's additional plausible intent is to experiment with, marginalize, silence, pacify or eliminate those who are targeted.  The victims are often collectively referred to as "Targeted Individuals."  These claims are not some loony conspiracy theory; this is honestly happening to certain segments of the population.  Simply put, this is the New COINTELPRO --- It never really went away!

surveillance crimes
Directed Energy and Signals Intelligence (SIGINT) are central elements used in the surveillance campaigns.  For those who may be unfamiliar with energy technology, it may be easier to relate your thoughts to common items like a radio, cell phone, or wi-fi computer. These items all utilize or process electromagnetic radio waves in a passive form.  Law enforcement agencies may use energy technology in the active forms of speeding radar, through-the-wall imaging devices and anti-personnel or crowd control devices (they've replaced spraying water cannons with spraying microwaves with LRAD).  For perspective, your microwave oven could be crudely converted into an active DEW, but the type of weapons we're concerned with here happen to be much more advanced and refined and are most likely composed of, or derived from, military-grade designs.

DEW's and SIGINT (Signals Intelligence) have been some of the most aggressive areas of Defense research in recent years.  Directed Energy use has many, many forms, including radar, communications, survey, non-lethal and lethal weapons, non-penetrating and penetrating imaging, silent sound, subliminal communications (used in Iraq and similar to advertising used by large consumer stores), thought redirection and manipulation, surveillance, Remote Monitoring, and the list goes on. 

Persons of interest can be monitored, in their homes, 24 hours a day via SIGINT technology.  It is essentially a euphemistic "ankle-bracelet monitor" that can't be seen.  This is not openly disclosed, naturally, because of the fears it would instill in citizens. This type of surveillance is a human rights violation, and especially offensive if the individuals it is being utilized against have not committed any crimes.



Any discovery that could possibly be utilized as a weapon, will indeed be used as a weapon in some form at some point in time.
​


charlatan wolf in sheeps clothing
DEW's have come a long way since the Nazi's first began to weaponize electromagnetic energy.  Because of the stealth nature of the medium, these weapons can be used in ways that are extremely frightening.  Firstly, energy waves are invisible, so you can't see them.  Secondly, energy waves are silent, so you can't hear them (depending on the frequency range).  Additionally, you can't smell or taste their presence.  You can't even feel some forms of directed energy (although, the energy forms that you can physically feel could plausibly be used to torture, cause harm, or even kill). 

So, if a weapons system that can evade all forms of human perception and one which has the documented capability to be All-seeing, All-knowing and lethal, does not frighten you, then you may need to check your pulse!  All-seeing refers to the optical, through-wall and infrared technological capabilities of the energies as well as their employ in anything from satellites to home electronics (you can buy the hand-held Xaver millimeter wave models online).  All-knowing refers to the capabilities of energy systems that can utilize algorithms to interpret neural processes, or thoughts!  And lethal simply means that there is documentation that DEW's can kill --- undetected.  So, what this leaves us with is a weapons system that escapes detection --- an invisible bullet.  That's scary.  This is the perfect weapon for the perfect crime, and crime is exactly where this technology has found itself.    
​
[ Why Would This Be Happening ]

In many regards these harassment campaigns mirror some of the techniques used in the FBI's infamous COINTELPRO (COunter INTELligence PROgram) that was supposedly disassembled after the Congressional Church Committee hearings in the '70's.  What we are witnessing now is CointelPro 2.0.  A plausible explanation for the revival of the New CointelPro model may lie in its use as a counter-intelligence tool to circumvent possible citizen dissent that could have arisen when the US decided to conduct military campaigns in Iraq and Afghanistan.  It is well accepted that American media and citizen dissent had a powerful effect on the outcome of the Vietnam campaign.  So, from a governmental perspective, if there was to ever be any future successes with military campaigns, there would have to be some way that the government could stifle civilian and media dissent.  And, the CointelPro model could fit that bill.  So, now it appears that the illegal measures used by the original program have been resurrected to quell any counter voices to the actions being carried out in the Middle East.
 
Then we have the effects of Terrorism, caused from nearly 70 years of meddling in Middle Eastern affairs and exacerbated by the invasions of Iraq and Afghanistan.  Terrorism opened the doors wide open for even further Draconian surveillance measures for monitoring and manipulating further segments of the population. The surveillance program has evolved over the years to include Occupational Safety measures and more NGO participation from the likes of Community Watch groups and to include the blacklisting, watchlisting and targeting of people for reasons beyond "national security."  These surveillance programs represent an exercise in extra-judicial prosecution which goes against everything that America and its Constitution stand for.

[ Who's Being Targeted ]

This surveillance program has woven itself into the fabric of our communities and workplaces.  To my knowledge, there have been no scientific polls conducted on the demographics of victims, but we can assume that the expected swathe of the population being affected would include intellectuals, whistle-blowers, activists, writers, journalists, lawyers, dissidents, eccentrics, patriots, multi-culturalist, secularist, minority groups, independent people, ex-cons and anyone who doesn't fit with the creed, cadre, faith, philosophies or politics of the offenders.  I can only imagine the number  of women whose privacy is being perversely violated by the surreptitious surveillance that is being used in these campaigns.  The most unfortunate victims will be the children of our future who have to bear with this crime because their parent's generation did not act or take these warnings seriously.



In the words of the Air Force Secretary, in 2007, "...nonlethal weapons should be tested on U.S. civilians before being used on the battlefield,...”
​


Update
Section below on 02 July, 2016

big brother big government
[ Who Is Doing This ]

It has been noted that an uptick in citizen complaints coincides with the commencement of the first Gulf War and the ensuing creation of the overreaching Department of Homeland Security (DHS) and abusive powers afforded by the Patriot Act, Department Of Defense Directive 5240.1-R (1994), National Defense Authorization Act (2012) and subsequent Executive Orders, which have all provided carte blanche for government infringement upon the civil liberties of US citizens.  On the web you will find many juicy theories of who the offenders of these crimes are, ranging from satanists, corporations, banks, global secret societies, Israeli intelligence, powerful elite families, and the Illuminati.  This is pure nonsense and deception, in my estimation, and is simply misdirection meant to pique interest and lead the reader further away from the truth of who the real culprits are.  I get occasional emails from persons claiming stuff about reptillian aliens and psychic nonsense --- this is either from bona fide crazy people or simply attempts at misdirection.  (Though, it is noted that ties do exist between constituents within US government and organizations such as the Council on Foreign Relations, Trilateral Commission, et cetera ; there is no evidence to suggest that these entities interests are directly tied to organized surveillance or electronic harassment campaigns.)  For a basic description of the New World Order (NWO) or Illuminati (constituents of Shadow Governments or Deep State), Click Here.

By keeping it simple and looking at motive, technology, financing, resources, power and infrastructure, everything points to only one entity capable of implementing such a sophisticated campaign and that sits squarely with a government body. Though, this doesn't preclude these campaigns from possibly being subsidized and sub-contracted to NGO's or other entities, and it's that diversification and delegation of this program that gives rise to these juicy theories of who is really behind the perpetration of these crimes.  It's smoke, mirrors and shadows.  Several government and NGO programs, such as TIPS, Weed & Seed, Citizen Corps, Infragard and Law Enforcement Intelligence Unit (LEIU) show intent to permeate our communities. 

With all of this taken into consideration, along with circumstantial evidence, it is my estimation that the offenders of these surveillance crimes may arise from the the network of the Department of Homeland Security (DHS), US Intelligence Agencies, Security Contractors, LEIU & military personnel, "Community Watch Groups" & NGO's, "Surveillance Role Players" and anyone charged with a crime who has made a plea deal to become a "community Informant."  This is all held together under the guise of National Security, Occupational Safety and Community Watch.  IT IS SMPLY THE NEW COINTELPRO. Instead of being run by just the FBI, executive orders have made it easier for any and all agencies to partake in the spoils.

The reasons for which someone is added to a target list may dictate which agency or entity is most likely to be instrumental in their surveillance.  A whistle-blower could probably expect more "state" and law enforcement sponsored involvement while an ex-con should expect more "community watch" group harassment.  Some targets appear to be black-listed in a way that they receive harassment from the full gamut.  The electronic harassment component is most probably carried out through government-based channels with, perhaps, some contractor involvement.



​We forget, but President Eisenhauer tried to warn us about the dangers of the "Military-Industrial Complex."
​

jurisprudence oppressive laws
[ Where Is The Evidence ]  

This surveillance program was designed to be virtually impossible to prosecute due to the invisibility of the directed energy medium and the plausible deniability of the surveillance players.  The evidence is intangible, by design, in the forms of physics and psychology.  Though direct physical evidence is lacking to show that government entities are directly complicit in these attacks on American citizens, the circumstantial evidence in victim testimonies, law suits, various state laws, existing patents, unclassified military weapons, literature, publications and statements by government associated officials add veracity to the existence of this unethical surveillance program. 

Direct evidence is elusive because the electronic attacks are invisible, silent and difficult to detect --- it's the perfect crime.  Instruments used for detecting directed energy, such as broadband spectrum analyzers, can cost more than the annual income of most Americans and the expertise required to operate this instrumentation does not come overnight.  Not to mention, we are most probably dealing with military-grade weapons technology that can be pulsed and cloaked.  Additionally, parties involved with government programs are bound to secrecy by Non-Disclosure Agreements with the threat of serious legal prosecution and most probably Blackmail via compromising personal information that is private and intimate in nature (perhaps, this is also why green and ambitious politicians that make bold promises end up like the status quo, hence nothing gets done in Congress).  Again, only a State or Government power could possess the high degree of finance, technology, resources and organizational sophistication required to both fund these campaigns and keep them insulated from the media, the public and the justice of law.

If you believe that the government would never venture into something so vile and unconstitutional, then I suggest that you consider how its history has already laid precedent with COINTELPRO, MK ULTRA, MHCHAOS, the Monarch program, Operation Northwoods, Project Mockingbird and many other black operations including, the nuclear tests on military personnel, Syphilis tests on African American military personnel & Central Americans, psychological-drug experiments performed on citizens and college students, pre-knowledge of the Pearl Harbor attack, Gulf of Tonkin Lies, World Trade Center Thermite & Beam Shearing and experimental vaccine testing on Gulf War military personnel.

denied & nullified
[ Deception ]

In order to cover-up and obfuscate the reality of this surveillance program, disinformation campaigns can be utilized for marginalizing victims by using trolls or websites that post far-out claims or incoherent gibberish in the vein of being a true victim.  This is a subterfuge.  It's an old-school activism-101 tool, whereby the victim's credibility is tarnished when an offender masquerades as a victim and disseminates erroneous information that makes the true victim’s claims appear to be irrational and delusional.  The problem arises when someone's first introduction to this crime turns out to be one of these erroneous postings which leaves the reader thinking that this is just a bunch of crazy loons blabbing about conspiracies.  They will leave that experience and never pay any credibility to the subject again.  So, please use discretion when reading internet posts and literature on this topic. 

There are several reasons why there is so much incongruity and outlandish material posted  on the internet about these crimes:
  • Internet disinformation artists who are part of the surveillance campaigns troll the web, posting gibberish and damaging material that makes the true victims appear loony;
  • Many victims (including myself) are initially in shock when they discover that all of the misfortune and odd experiences they've been witnessing, are actually orchestrated surveillance and it is actually happening to them.  At first you are shocked, then you feel violated and then you start seeking answers.  At this point you do sound like a babbling fool, as anyone who has ever been in shock can attest to;
  • Many victims (including myself) are prone to believing and repeating everything that they first read about after they discover that they have been targeted.  Some of the information is erroneous and it gets spread about further by those who are rushing to discover the truths behind their dilemma;
  • These campaigns are classified and covert.  This means that they are veiled from prosecution and so there is no "specific" culprit that can be identified.  This ultimately leads to speculation and grandiose conjecture that absurdly points the finger at such things as Satanists and the Illuminati.

If you think that Government is too noble to possibly be involved in "unconstitutional" endeavors, then I suggest that you research Project Mockingbird.  Marginalization is a common method used to reduce the threat and effectiveness of a foe.  We can all recognize how powerful a single word can be once it is cast upon someone or something in a negative light.  Think of the multitude of people who have had their names, careers and lives tarnished simply by having a label applied to their name.  Murderer, rapist, pedophile, terrorist, racist, bigot, mentally ill, diseased, dumb, delusional --- these are just a few dirty words that can brand a person for life, whether justified OR not. 

It is a common smear campaign technique to label electronic harassment victims as delusional.  Agencies within the government have mastered the art of disinformation, so it is not difficult to tarnish victim's claims through the "labeling" process.  Besides all of the factual information involving the existence and increasing usage of DEW's by government, some still try to write-off victims claims as delusional.  It is preposterous to label, as delusional, all of the proclaimed victims who have strikingly similar claims of harassment, which incidentally mirror a COINTELPRO model type of approach.  The same type of "tactics" are apparently being used on these victims which defies all measures of coincidence.  So, let's accept the truth about the crime without labels.

Fortunately, precedence has been laid where victims, labeled as delusional or conspiratorial, have prevailed as the truth was unveiled.  Were the claims of victims called delusional under the infamous FBI COINTELPRO program before the truth was revealed to the American public by activist whistle-blowers?  Yes, and the victims were redeemed by the TRUTH.  How about those who had complained about privacy infringements before Edward Snowden enlightened us all?  Were they delusional conspiracy theorists?



Conspiracy [ kən-'spir-ə-sē ] ( con·spir·a·cy ) noun:   A secret plan or agreement between two or more people to commit an illegal or subversive act.
​


as long as you do as you are told you have nothing to fear
Conspiracy Theory --- a term created by CIA disinformation agents to discredit inquiring minds whom are simply raising a question about something that doesn't seem to be answered by foregoing explanations, due to either incongruities, extraordinary coincidences or deviation from the laws of probability.  "Conspiracy Theory" is a nice example of "labeling" and wordplay usage that turns something into a dirty word.  With the definition of conspiracy just provided, you see that there's nothing odd or dirty about it.  People conspire all of the time --- just watch the news.  The same holds true with the word "theory."  Theories provide scientist, and in turn, each of us, with amazing innovations.  Combine the two words and you get a term that actually holds integrity.  Some intellects theorized that the NSA was conspiring to obtrusively obtain vast and unnecessary amounts of data on common citizens.  Those intellects were labeled "Conspiracy Theorists."  And, then Andrew Snowden enlightened us, as such, that the theory of a conspiracy was, indeed ... a conspiracy.



[ Why I Consider These Matters Significant ] 

Some day it could be yourself, your children or your grandchildren who become victims of these harassing surveillance and monitoring program campaigns. These campaigns do not mesh with the moral fabric that the U.S. claims to uphold.  Americans are being tortured by this program on American soil.  The DEW's used in some of these campaigns have the ability to silently kill and to cause many types of disease without any proof that they were ever used against a victim.  That's significant.  Equally significant, is the fact that these injustices are not addressed by the legal system, so extra-judicial prudence is left to those in conflict.  Also significant is the fact that these weapons allow for our privacy and coveted human properties  --- our thoughts,  emotions, and decisions --- to be violated, manipulated and potentially exposed.  Will we no longer be "individuals" in the future if we can't even hold secrets to call our own?  Could "Thought Police" and "Pre-Crime Units" be a reality in our near future?

Detailed, technical information regarding the construct and implementation of SIGINT and Directed Energy Weapon technology can be intricate and because these details are largely classified, it would be superfluous conjecture to attempt to cover such material in-detail, and therefore it has been omitted.  The Dirt page contains some veritable information about the real technology being utilized in these surveillance campaigns.  Individuals such as Dr. Robert Duncan labor in this type of information, though I can not vouch for the validity thereof. ( NOTE:  It's become apparent that whistle-blowers with the title of "Dr." or those who have been in "official" employ by government are particularly susceptible to smear campaigns aimed at marginalizing their credibility. )



​
​
Click here to see some hypothetical, "outside the box" circumstances where DEWs could be creatively applied. 






- Tag Cloud -
101 , ATF , Activist , Aerial vehicles , Autism , Alzheimer , ADHD , Allan Frey , acoustics , anarchist , aluminum foil , Americans , America , adrenaline , aneurism , anxiety , Anechoic Chamber , Anechoic Tile , Army Reserve , Artificial Telepathy , Aaron Alexis , Artificial Intelligence , argenmesh , audio surveillance , assasination , silent assasination , barcodes , big brother , biometric surveillance , biometrics , blackmail , biotelemetry , bioelectromagnetics , booby trap , Blacklisted , Brain Mapping , brainwashing , brainwash , brain wash , brainwaves , brainwave monitoring , brainwave scanning , bunker , carbon , carbon fiber , carbon nanotube , Carnivore , cataract , Cause Stalking , ceramic , CIA , CSS , civil rights violations , constitution , constitutionalist , copper , Civil Disobedience , Conservative Christian , Christian Right , Christian Crimes , Christian Atrocities , chemtrails , conductor , COINTELPRO , Community Based Harassment , Citizen Corps , chest pain , Community Watch , Community Oriented Policing , computer hacking , computer monitoring equipment , computer surveillance , covert abuse , Covert Harassment , campaign , countertruth , curling and cramping , counter truth , covert manipulation , covert surveillance , Covert technology , Covert Murder, , Covert War , Crook or Stiff Neck , Deep Web , DHS , Department of Homeland Security , dissident , DeepWeb , Deep Net , DeepNet , DarkNet , Dark Net , DarkWeb , Dark Web , Democracy , DARPA , DEW , Diary of a Targeted Individual , dielectric , DIA , diabetes , Directed Energy Weapon , DEWs , disinformation , DNA tracking , DOD , DOD Directive 5240.1 , DOD Regulation 5240.1.R , DOJ , dr. robert duncan , domestic spying . domestic surveillance , domestic terrorism , domestic terrorist , drones , dumbing down , EEG , EEG cloning , electroencephalogram , executive order , EDOM , EEG heterodyning , extremely low frequency , ELF , Echelon , eugenics , Edward Snowden , electronic harassment , electromagnetic technology , electromagnetic weapons , Electromagnetism , Electromagnetic Shielding , EMF , EMI , EMR , EMP , electromagnetic pulse , Electronic Assault , eye floaters , electronic harassment , electronic stalking , electronic surveillance , electronic torture , electronic surveillance laws , electronic weapons torture , Executive Branch , extremely low frequencies , facial recognition technology , fascism , FBI , FCC , FOIA , False Flag Operation , freedom fighter , Faraday Cage , Foreign Power , fatigue , Fort Meade , Ft. Meade , food tampering , Frey effect , Fusion Centers , gang stalking , George Orwell , Geral Sosbee , Global Agenda , Global Initiative , globalization , Government Intelligence , gaslighting , GWEN , HAARP , Handlers , hair raising , Headache , Head pressure , High-pitch tone , hearing drop , heterodyning , HPM , high power microwave , hearing voices technology , hidden camera , heart attack , heart valve damage , home surveillance , human experiment , human experimentation , human guinea pig , human rights violations , Illuminati , satellite imaging , implants , ionosphere , infrasound , Infragard , insulator , infrasound weapon , ionizing radiation , interferometry , Iris biometric tracking , John Fleming , John Hall , Jesse Ventura , Joint Intelligence Centers , Joint Operations Center , Joint Regional Intelligence Center , Joint Targeting Efforts , JRIC , kidney disease , kidney failure , leukemia , Luddite , Lupus , Law Enforcement , Law of the USA , laws of the US , laws of USA , lead shield , magnetic ressonance , masers , mass murder , Mass Population Control , mass technological manipulation , MEDUSA , Microchip , microchip implant , microwave communication towers , microwave weapon , microwave harassment , microwave interferometry , metamaterial , misinformation , militant , Military Intelligence , Military Mind Control , Military propaganda , military psy ops , mind control , Multiple Sclerosis , Muscle jerks and twitching , myoclonus , Muscle stasis , Mind Control Handlers , mind control patents , militia , mind control technology , mind reading technology , mumetal , mu metal , mylar , memory loss , millimeter wave , Myron May , Natural Law , Nazi , Nazi mind control , neural mapping , NGO , neural telemetry , neuralizer , neodynium , NWO , new world order , nausea , nerve , nerve tingling , nerve damage , Neurophone , nanotube , Nikola Tesla’s inventions , non-lethal weapons , nonlethal weapons , non lethal weapons , NSA , NWO , OSHA , Organized gang stalking , Organized stalking , Organized Stalking Electronic Harassment , Organized Vigilante Stalking , Organized Surveillance , OS/EH , particle beams , plasma , Patric Flanagan , POTUS , patriots , Patriot Act , pain amplification , pc surveillance , personal computer hacking , pc monitoring , Posse Comitatus , police abuse , police brutality , police cops , Parkinson's Disease , panic attack , police misconduct , pb , pins and needles , portable microwave energy weapon , Predator Drones , Project MK ULTRA , poisoining , poison , Propaganda , phasor , priapism , pancreatitis , induced priapism , ED , Psy Ops , psyops , Psychiatry , psychotronic , psychotronics , quantum physics , radar laser beam , radar gun , radiating weaponry , radiation , RFID , Radical Right , radio waves , radio frequency mind control , real time surveillance , Remote Brain Targeting , Remote Control of Human Nervous System , Remote Control of Humans , racing heart , remote heart attack , Remote Sensing , remote interrogations , remote brain wave monitoring , runaway adrenaline attack , Remote Monitoring , RFID chip , rubber , SCOTUS , SATAN , Satellite Guided GPS , semiconductor , scalar wave , scalar energy , sinus spasm , surveillance , Sleeping hands or limbs , satellite terrorism , sexual orientation manipulation , Schizophrenia , sneeze attack , science , Shielding Material , shielding , street theater , street theatre , Shocking , silver , Silent Massacre , sneak and peak , space preservation act , sovereign citizens , space based weapons , sham rage , spastic colon , sleep disruption , silent sound , subliminal , sound spotlight , stroke , survivalism , survivalist , Spy Drones , Spy Satellites , Stalking by Proxy , Star Wars , surreptitious entry , subliminal message , Surveillance Laws , surveillance programs , surveillance , SIDS , synthetic telepathy , targeted individuals , tasers , tactics , terrorism , terrorist , technology , thyroid cancer , thyroid , tennitis , Ted Gunderson , TEMPEST , TIA , Tesla , TIPS , tremors , through the wall imaging , through-wall imaging , Total Information Awareness , Tortured in America , UAVs , US Code Title 50 , ultrasonic , ultrasound , ultrasound weapons , V2K , VDI induction , Verichip , Voice Recognition , Voice of God , Voice to Skull , War on Terrorism , Warfare , War Room , We the People , whistleblower , whistleblowers , what is harassment , Weed and Seed , x-ray vision , yawning attack , Zap , Zetas , zombie apocalypse , zombie , 101 , organized stalking help , gang stalking help , electronic harassment help , organized stalking tactics , Law Enforcement Intelligence Unit (LEIU) red burning ear syndrome
Tweet
Picture

HOME


about
​

contact
​

Organized stalking, gang stalking and electronic harassment by the use of microwave weapons is a reality that targeted individuals experience. This is not some conspiracy theory or act carried out by the supposed illuminati. This is just another aspect of the governments sweeping surveillance apparatus. It is a reality.Picture
Counter-attacking the lies, disinformation and
propaganda to bring you the truth ---
the  Counter Truth !

© 2015 - 2020  Countertruth.com . All Rights Reserved.
  • HOME
  • THE CRIMES
  • THE DIRT
  • HEALTH
  • SECURITY
  • SHIELDING
  • VICTIMS
  • OFFENDERS
  • DOCUMENTS
  • BLOG
  • HOME
  • THE CRIMES
  • THE DIRT
  • HEALTH
  • SECURITY
  • SHIELDING
  • VICTIMS
  • OFFENDERS
  • DOCUMENTS
  • BLOG