Download - The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

Transcript
Page 1: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and broke down the technology, we used every available source over the internet to collate and compile every piece of information out there needed to break down the technology, we have

listed the sources of information at the bottom, if anyone’s been left out, let us know and we will amend.

This documents is for people who have already read the basic information about Targeted Individuals, if you’re new to

this subject, you should read the documents at the bottom of the page first in the order they are numbered.

This document is written from a British perspective.

Who Runs IT & How it’s Deployed Against The Civilian Population: The whole thing is coordinated by the security services, however you can be put on the program for anything, if a freemason does not like you they can get you Ring Fenced. This was a term used by Masons when i first started getting stalked, i was told by an ex member of the Masons who left because he would not get involved in the stalking. They then stalked him, so he told me everything about it and how they do it. As time moved on the Masons could no longer manage the number of people being stalked so they started to go out of house, starting with low level crimi-nals they have a hold over. This was then called Gang Stalking, and is done by members of fra-ternities like the Round Table, the Lions Club and more recently the British Drug Mafia who are controlled by the Masons. They also rope in anyone by telling them lies (See Gang Stalking FAQ below). This also became problematic in numbers and government programs were brought in to take over the electronic surveillance side. Now it’s called being a Targeted Individual, but it’s all the same thing it’s the Masons using the security services as their own private army, same in the USA, there is not one case i have investigated that was not Mason related.

Security Service Involved: In Britain it’s the National Crime Agency, MI6, MI5, and Police authorities. I was told some years ago by Dr Barry Trower (MI6) that he had been consulting on the use of Microwave Auditory Ef-fect (MAE) with all UK police authorities. He started using the system in 1969 working for MI6 De briefing cold war spies. As MKULTRA supposedly ended in the USA due to the CIA having its budget withdrawn by congress, so instead they moved it to the UK using MI6. So it stands to common sense and reason that any new technology doing the same thing would also be deployed in the same manner. I started to look into the obvious culprits, GCHQ, MI5 and MI6, it’s clear that MI5 and MI6 could not hide the resource and are focused on delivery not development, so that only left GCHQ in the UK as the new National Cyber Security Centre (NCSC) opened its new London headquarters Feb-ruary 14 2017, so it was not open when all this started!

Page 2: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

I have already found out that the technology was developed by DARPA, Defence Advanced Re-search Projects Agency, after US Naval Intelligence had finished with Patrick Flanagan it was handed to Robert Duncan and others at the CIA. I thought i would take the simple approach, i had been shown the full National Security brief on the roll out of the program of mind control by DARPA and the CIA, so i looked at the DARPA web-site in the commercial section and low and behold they are already selling it commercially. Some information from the DARPA website: http://www.darpa.mil/news-events/2016-08-03

Defense Advanced Research Projects Agency News And Events: Implantable “Neural Dust” Enables Precise Wireless Recording of Nerve Activity First in vivo tests demonstrate ultrasound can be used to wirelessly power and communicate with millimeter-scale devices surgically placed in muscles and nerves. [email protected] 8/3/2016

I then started to look around at who was using this apart from the Military and Security Services. I quickly came across this page, please note the date on the article and the release date of the DARPA information above: August 3rd 2016, showing that it was an orchestrated release to de classify the technology. ------------------------------------------------------

Wireless 'Neural Dust' Could Monitor Your Brain Sand-sized sensor implants give instant feedback from nerve cells By Charles Q. Choi August 3, 2016

https://www.popsci.com/tiny-wireless-implants-could-monitor-your-brain

Page 3: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

ON THE TIPS OF OUR FINGERS: "Neural dust" wireless, implantable sensors are currently only 3 millimetres in length. This new healthcare tech could be even more groundbreaking, as scientists are working to shrink the sen-sors to microns wide, about the width of a human hair.

Watch this video, it explains the whole process and how and what they are doing to Targeted Individuals: https://dai.ly/x4n1nwx Let the video run after it moves on to other videos of interest, sorry about the adverts it’s not our video: The video shows the earlier version of the dust now being used as per this link http://www.targeted-individuals.co.uk/nano_2_rfid_powder.pdf Ryan Neely / UC Berkeley

Science fiction that features wires connecting brains to computers might now be obsolete. Wire-less powered implants, each smaller than a grain of rice, could serve as "neural dust" that can one day scan and stimulate brain cells. Such research could one day help lead to next-generation brain-machine interfaces for controlling prosthetics, exoskeletons and robots, as well as "electro-ceuticals" to treat disorders of the brain and body. The new prototypes, made by scientists at the University of California at Berkeley, are each roughly 3 millimetres long, 1 millimetre high and 4/5 of a millimetre thick. Each neural dust mote

Page 4: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

possesses a piezoelectric crystal that can convert mechanical power from ultrasonic pulses broad-cast from outside the body into electrical power. The energy from these 60 ultrasonic pulses broadcast each second drives sensors and other electronics on the motes. The piezoelectric crystals reflect some of the incoming ultrasonic pulses. Electronics in the neural dust motes can alter the pulses that get scattered outward, and so can wirelessly transmit data they gathered. In experiments with rats, the researchers found that neural dust motes implanted in nerve and muscle fibers in the leg could record and transmit electrical data. "I was really sceptical of this concept at first, since it was so out of the box," says Doug Weber, a bioengineer and neuroscientist at DARPA, who helped fund the neural dust research. "But it's a really elegant approach, and it works pretty well." The researchers wanted to create wireless implants to avoid irritating the body. Conventional elec-tronic implants that connect to nerves rely heavily on wires that can inflame tissues over time. "The approach they're taking is ingenious," says neuroengineer Jacob Robinson at Rice University, who did not take part in this research. "They've addressed one of the most important challenges out there when it comes to neural interfaces."

WITHIN THE BODY These sensors can currently be placed within the peripheral nervous system, the nerves that work throughout our arms and legs. One day, scientists hope to use sensors in the central nervous system, including the brain and spinal cord. Ryan Neely / UC Berkeley

Page 5: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

The scientists had previously explored using radio waves to power and communicate with neural dust motes. However, radio waves are not good at reaching deep within the body, while decades of ultrasonic imaging has revealed that ultrasonic pulses are very good at penetrating soft tissues, says researcher Michel Maharbiz, an electrical engineer at the University of California at Berkeley. "This is a breakthrough technology that really changes what's possible in terms of sensing and stimulating nerve activity, especially nerves deep inside the body," Weber says. Ultimately, the researchers want to shrink neural dust motes down to just 50 microns wide, or roughly half the average width of a human hair. At that size, "the body should tolerate them much longer," Maharbiz says. The scientists are currently developing motes that can also electrically stimulate the body. If they are successful, this means that neural motes can not only monitor health, but actively serve as electroceutical therapies to treat brain disorders such as epilepsy. Experiments so far with neural dust motes have only involved the peripheral nervous system, which serves the limbs and organs, and not the central nervous system consisting of the brain and spinal cord. Still, electroceutical therapies may still have many applications in the peripheral nerv-ous system, such as bladder control or appetite suppression, says researcher Jose Carmena, a neuroscientist and electrical engineer at the University of California at Berkeley. In the long run, the scientists want neural dust motes in the brain and spinal cord. One challenge that neural dust targeting the central nervous system faces is how ultrasound does not pass well through bone, Weber says. "That raises challenges if you want to create a brain-machine inter-face, but I'm not saying it's impossible by any means," Weber adds. The researchers are now working on miniaturizing the motes further, discover more biocompatible materials to package them in so they can last in the body longer, and incorporate other sensors into them. Eventually motes could find use anywhere in the body, not just the nervous system, Maharbiz says. "In the long term, we want to be able to send energy to and communicate with implants all over the body, to record data from a variety of organs in many different ways, maybe even report on the conditions of tumors or cancer therapies," Maharbiz says. The scientists detailed their findings online August 3 in the journal Neuron.

tags: wireless sensors neural implants ------------------------------------------------ Further reading found many more links:

Scientists Can Now Control Mice Brains Wirelessly

https://www.popsci.com/researchers-control-mouse-movements-remote-control-device

------------------------------------------------

Neural Implants Let Paralyzed Woman Fly Plane With Her Mind

Page 6: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

In a DARPA simulation, that is By Kelsey D. Atherton March 3, 2015

https://www.popsci.com/darpa-neural-implants-let-paralyzed-woman-fly-plane-simulator-her-

mind

--------------------------------------------------------

So it was clear that DARPA were already using this technology for mind control as all the projects they were funding were all related to the neural control of animals. Now i would like each of you to bring your considerable expertise to bare on these two images and tell me if you can see any similarities.

Since this information was released i have looked into the scaling down of this commercial device to dust sized particles. http://www.targeted-individuals.co.uk/nano_2_rfid_powder.pdf So it’s being used by the security services and there are many ways they can get it into you, in a drink, via a riffle device, via the air just breathing it in, in short just about everyone on the planet is on the latest version. Run by AI (Artificial Intelligence) which is already on line compiling and being used by the Military and Security Services. This is what all the chemtrail people are talking about although they don’t know it. Also the Russian government gave an official warning to the USA government for spraying it over Russia (They are of course doing the same to entire coun-tries as a follow on from the woodpecker programs). I started to look a lot harder for proof that GCHQ were involved in this type of research, and they are up to their necks in it. Its run and funded by a branch of GCHQ very similar to how DARPA are doing it. They get commercial companies to do the research and then are compiling the results and data for their own use. So no one knows the whole, only them, an old tactic, divide up the work and results so no one knows what’s going on only the Security Services. This branch is called JTRIG (Joint Threat Research Intelligence Group) Here is the information on their funding of projects linked to the Targeted Individuals program. -------------------------------------------------------------------

Page 7: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

U.K.'s Own 'DARPA' Will Pour £165 Million Into Cyber Se-curity Startups

https://www.forbes.com/sites/parmyolson/2015/11/17/uk-165-million-darpa-fund-cyber-security-startups/#4ace0fa64793

Britain's Finance Minister George Osborne. (Photo credit should read EMMANUEL DU-

NAND/AFP/Getty Images)

The British government has announced a bold series of new programs to boost its cyber security defences, including a new, £165 million ($250 million) fund that will see the government buy or invest in cyber security startups. Britain will also double its public spending on fighting cybercrime to £1.9 billion a year by 2020. The extra money will be spent on protecting the British public’s online assets as well as public infrastructure like hospitals and electricity grids, Chancellor George Osborne said in a speech at GCHQ, Britain’s main intelligence service focused on cyber crime.

The £165 million Defence and Cyber Innovation Fund will “support innovative procurement across both defence and cyber security,” Osborne said. “It will mean that we support our cyber sector at the same time as we need to solve investing in solutions to the hardest cyber problems that gov-ernment faces.”

"The threats to our country in cyber space come from a range of places – from individual hackers, criminal gangs, terrorist groups and hostile powers," he added.

Page 8: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

The new program is similar in its intent to DARPA, the American Department of Defence agency that provides funding to startups who are creating cutting-edge technology, whose intellectual property can then be shared with the U.S. government. Among the projects DARPA is funding are jetpacks that can help soldiers run as fast as Olympic athletes and implants known as 'neuro-prosthetics' that can treat memory loss.

Britain's fund is dwarfed in its scope by DARPA, which had a budget of nearly $3 billion for 2015. It may also end up being more closely aligned with another U.S. funding agency known as In-Q-Tel, based in Arlington, Virginia.

While DARPA covers a broad range of technologies including robotics and health, In-Q-Tel targets software startups and particularly those focused on data analytics, with the aim of supporting America’s Central Intelligence Agency and other intelligence services.

Since it was created in 1999, In-Q-Tel has reportedly funded 200 companies with investments in the $1 million to $3 million range.

British startups with a focus on cyber security and analytics software will see the new pub-lic funding as great news for their fundraising prospects, at a time where Silicon Valley’s leading venture capitalists have warned that the days of privately funding startups at ultra-high valua-tions are coming to an end and private funding may be harder to come by.

Eileen Burbidge, a partner at venture capital firm Passion Capital and advisor to Cyber London, a local incubator for cyber security startups, says she and local firms have been waiting for "years" for a funding announcement like this from the government, one that emulates the likes of In-Q-Tel.

"Devil is always in the details but I'm genuinely encouraged to see emphasis and investment committed to public and private sector collaboration," Burbidge said.

---------------------------------------------------------------------

So how do we know that GCHQ is involved in the Targeted Individuals program for sure? It’s clear they are involved in the technology. Upon further digging i found this document by a world renowned reporter. Please keep in mind that the document here is issued by GCHQ through JTRIG and that it is an official training document to train agents to infiltrate activists, and any-body they decide, or the Masons decide they need Gang Stalked, basically anyone who opposes them or that they have stolen from, to silence them. --------------------------------------------------------------------

How the dirty tricks campaigns are run and by who: JTRIG Produced a document entitled: The Art of Deception: Training for Online Covert Operations: https://theintercept.com/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/ Note the date 2014, this is the date roughly my V2k started, i was put on the system by a corrupt ex MI6 gut working for a scum bag Masons called Anthony Keaton also a Mason and MI6 Agent.

Page 9: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

HOW COVERT AGENTS INFILTRATE THE INTERNET TO MANIPULATE, DECEIVE, AND DESTROY REPUTATIONS

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

Page 10: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

Page 11: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

Then there are the tactics used to destroy companies the agency targets:

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”

Page 12: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

Page 13: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Page 14: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell,” devoted to “online human intelligence” and “strategic influence and disruption”:

Page 15: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” while dissecting how human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance”:

Page 18: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

Page 20: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?

As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”

These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.

Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

Documents referenced in this article: The Art of Deception: Training for a New Generation of Online Covert Operations https://theintercept.com/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/ CONTACT THE AUTHOR:

Glenn Greenwald [email protected]@ggreenwald

Original Report Written By Glenn Greenwald, February 25 2014

https://theintercept.com/2014/02/24/jtrig-manipulation/ ---------------------------------------------------------- If you want to know how they do it technically, and where from, read all the agencies involved here: https://en.wikipedia.org/wiki/Global_surveillance

Systems Used By The Security Agencies:

XKeyscore | PRISM | ECHELON | Carnivore | DISHFIRE | STONEGHOST | Tempora | Frenchelon |

Fairview | MYSTIC | DCSN | Boundless Informant | BULLRUN | PINWALE | Stingray | SORM

Page 21: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

International Agencies Involved:

Five Eyes | BND | DGSE | FSB | MSS ------------------------------------------------------------- It should now be clear to everyone who reads this document that GCHQ through JTRIG and the Security Services controlled by the Masons are the people behind the Targeted Individuals Pro-gram. If you are unsure about any of the information please read the documents below for clarification. You can contact me or the Targeted Individuals Association here: To join the TIA (Targeted Individuals Association) here: https://www.facebook.com/groups/1410714778954477/ The TIA website is: www.targeted-individuals.co.uk You can chat to me live here: https://www.facebook.com/AIIZband My personal site is: www.gary-owens.com My music career website is here: www.aiiz.co.uk

Reward £1,000,000. If anyone has information on who’s involved in the Targeted Individuals Program in Spain or the UK, i will pay them £100,000 for information leading to the capture and imprisonment of the people involved, and £1,000,000 if you can provide the location the information is stored in. Read the documents in the order they are numbered:

1/ http://www.targeted-individuals.co.uk/targeted_individuals_information.html 2/ http://www.targeted-individuals.co.uk/gang_stalking.html 3/ http://www.targeted-individuals.co.uk/fight_gangstalking.html 4/ http://www.targeted-individuals.co.uk/v2k_voice_to_skull.html 5/ http://www.targeted-individuals.co.uk/neurophone_support_information_1.html 6/ http://www.targeted-individuals.co.uk/neurophone_support_information_2.html 7/ http://www.rfid_implant_gangstalking.html 8/ http://www.v2k_report_2_rfid_implant_nano_tech.html 9/ http://www.v2k_report_2_rfid_implant_nano_tech_medical.html 10/ http://www.targeted-individuals.co.uk/energy_weapons.html

Page 22: The Targeted Individuals Program...The Targeted Individuals Program 01/12/2017 Targeted Individuals Association GB – Author: Gary Owens Mr Gary Owens wrote the collated article and

11/ http://www.targeted-individuals.co.uk/targeted_individuals_association_library.html 12/ http://www.targeted-individuals.co.uk/ti_referance_guides.html

Targeted Individuals Program 01/12/2017 Targeted Individuals Association – Author: Gary Owens Mr Gary Owens wrote the collated article and broke down the technology, we used every available source over the

internet to collate and compile every piece of information out there needed to break down the technology, we have listed the sources of information at the bottom, if anyone’s been left out, let us know and we will amend.