SlideShare a Scribd company logo
1 of 9
Download to read offline
A Practical Survival Guide To OSEH
                                          Written by F Viray 2011


It’s been a year of struggles since I discovered            “Evil will never wins! Ever!” – this mantra will
that I am a targeted individual. I am still here. I         make your life easier. You’re the one who is
learned a lot. Although my goal of getting a job            being harassed. You are the good person. You
and being independent again has become a                    are not the one doing evil crime. Make sure you
distant goal, I have no regrets. I am writing this          always think this mantra when the harassment
blog to help out. I know there are other targeted           are getting out of control.
individuals out there who are struggling. Who
are probably being drugged.                  Being          “I am the boss here, I am in control” – take
institutionalized. Who are homeless or at risk of           charge. This mantra will help you sort out what
becoming one. Who are being harassed. And                   you will allow them to do. Some harassments
maybe contemplating on giving-up. Please do                 are unavoidable. For example, one has to take
not cave-in.      This is what I learned, and               a shower or pee. Voices coming out of running
hopefully will help you to keep your spirit up and          water are sometimes unavoidable. Or the daily
to keep on fighting.                                        on-going noise campaign, you cannot control
                                                            them, to stop them, what you can do is to stop
                                                            the noise campaign get into you.




Personal Mantras: Since most of the
harassments are mind games, you have to
develop or maintained your core beliefs. This is            “They can never be trusted, ever!” – one
probably the first thing that targeted individuals          targeted individuals said, “unless it happened to
lose. You will be robbed of your identity. The              you twice, do not assume everyone are there to
perpetrators’ main goal is to take full control of          harassed you, sometimes people are just there
your being. They will erase what is good about              because they are inconsiderate.” This is very
you. If you are emphatic, compassionate and                 true. This mantra of “trust” will help targeted
spiritual being. They will slowly change you.               individuals ignore the perpetrators. Ignore their
They will destroy your religion, desensitize you            deceitful voices. Ignore the microwave hearing
with violence and make you a heartless cold                 tactics and other harassments.
person. Making sure your “core beliefs” are
intact is the first step in regaining control.              Health Related: Targeted individuals will
                                                            experience a decline in health during the
“Your Brain, your thoughts” – no matter what                harassments. My research indicated that there
they do, always keep this mantra. Keep it in                are three stages of harassments. The first is the
your head and heart. You will be bombarded                  preliminary surveillance followed by intense
with unwanted voices that may sounds like your              organized stalking/mind game and then the
own. No matter what you hear, it is still your              harmful electronic harassments using direct
brain, your thoughts, own it, take charge.                  energy weapons. Although the second one
                                                            normally will result in targeted individuals’ being

                                       A Practical Survival Guide To OSEH
                                             Written by F Viray 2011
                                                         1
institutionalized and heavily drugged, the last             fruits and vegetables that are rich with Anti-
stage was the most harmful.                                 oxidants.

“A game of chess, a chase of sanity” – one                  Exercise.   Do house chores (avoid using
targeted individual indicated that the whole                vacuum cleaner if your voice to skull
harassment/targeting is a “mind game.”        The           harassments are intense). Walk.
perpetrators main goal is steal your sanity. They
want you to know they are there. They want                  If you can avoid, do not go to psychiatrist. If you
your undivided and constant attention. In short,            can avoid, do not take anti-depression pills. Do
they want you to be paranoid and delusional.                not take Paxil. Be aware of a sudden change in
You have to learn to block them from your                   your mood. Emotions like sadness, shyness,
consciousness. Do not give them gratification.              anxieties are not an automatic sign of mental
                                                            disorder or chronic depression. These are
Take Charge of your Thoughts – It is your brain,            normal human emotions.
It is your thoughts. They are going to whisper
ideas,     commands,       visual   pictures,   all         Learned about “informed consent.” If you are
masquerading like your own thoughts. They will              forced to be institutionalized, your have the right
eventually informed you that it was them who                to know all aspect of your treatments. You have
put these pictures, ideas, commands, in your                the right to know your medications. You have
brain. Ignore them. Own it. Its your brain, it              the right to know the reason why you are there.
your thoughts. While this may take some time to             If you can, learned to walk away.
practice, your “core beliefs” and mantras (see
the list above) will help you figure this up. Take          Do not commit suicide, this is the perpetrators’
charge, take the credit, own it. Own the positive.          ultimate prize.
Own what you think is yours. Own what will
make you feel happy. Own what will benefit                  Negative thoughts are poison and these are the
you. And then give away all the trash, the filth,           perpetrators first tactics. To induced negativity
the negative thoughts. The one that will harm               in your psyche.
you.
                                                            While I am still investigating about how to deal
Control your thoughts, once they starts the                 with induced dreams, you will get familiarize with
negativity, stop! If you find yourself starting to          the pattern. Most of the time, they will induced
think fearful or have negative thoughts, fight with         dreams relating to your past and will do “role-
pleasant thoughts.                                          playing” acts while you are sleeping. They are
                                                            reading a script patterned to the information and
                                                            on-going harassment protocol they gathered.
                                                            The main goal is to induced negative thoughts,
                                                            the feeling of shame or guilt are the most
                                                            common example. The success of induced
                                                            dreams will be carry forward to targeted
                                                            individual’s harassment particularly once he or
                                                            she woke up. These are mostly the negativity
                                                            embedded in one’s brain or mood. Hence most
                                                            of the time, targeted individuals wakes up feeling
                                                            sad, tired, or fatigue. Some indicated that they
                                                            felt like they had a hanged over. Other will
Targeted individuals will be attack with direct             developed cold or allergies due to the lack of
energy weapons. The most common is the                      “real” natural sleep or rest.
radiation coming from everywhere. Most of the
time, when there is an electrical grid. When it             Some targeted individuals deals with sleep
comes to this, use shielding products to                    deprivations with nutrients (eating bran oats)
minimize the harmful effects.                               and meditations. All are effective way to induce
                                                            sleeps naturally. Another way, are to not just lay
You need to help your body to undo the damage               in bed and stare at the ceiling. If one is not in a
of electromagnetic radiation with consumption of            vegetable state, get up and do something.
                                                            Cleaning is a way of taking charge. Doing

                                       A Practical Survival Guide To OSEH
                                             Written by F Viray 2011
                                                         2
something to counteracts the thoughts of “you              The perps will corrupt you to do petty crime be
cannot sleep” or when the perpetrators are in a            very aware.
state of rambo or running “amok” as they
continue to attack you with non-stop trash talk            Always work hard and your boss will notice.
about non-sense. Once you done something, It
will eventually tired you out that physically your         Educate your self with workplace mobbing,
body will shut down and hence will make you                harassment, discrimination and work related
feel sleepy.                                               legislation.

                                                           Always be aware of the changes in your
                                                           workload and your health. An increase in
                                                           workload and stress related sickness are a
                                                           telltale signs of OSEH. Be aware of frequent
                                                           intense headache, a sign of electronic
                                                           harassments (DEW).

                                                           Balance your work and personal lives and be
                                                           aware of the changes in your relationship. If you
                                                           noticed that one by one your friends are
Financial Related:      Once your perpetrator              disappearing, this is a telltale signs that your
succeeded in ruining your health, the next                 friends are getting infiltrated and probably being
outcome is to your ability to make money. The              brainwash. A smear campaign is probably being
perpetrators will corrupt you.       They will             done. As they are being bribed one by one, they
encourage you to accrue debts. They will entice            will turned against you and become
you to have a luxurious lifestyles. Manipulate             perpetrators. Don’t worry about this, you will be
you to learned vices like gambling and                     thankful in the end, a true friend will not turn
alcoholism. They will encourage you to live a              their back on you.
life beyond your means.        These are very
common to anyone, except, targeted individuals             At a later stage, targeted individuals will
are pre-meditated, a well planned manipulations            experienced financial hardship due to loss of
of someone’s lives.                                        income, employment, and debts. One alternative
                                                           is to apply for government assistance.
Do not accrue debts, if you don’t have the                 Perpetrators will induced negative thoughts of
money to spend, don’t spend.                               targeted individuals being marginalized, be
                                                           aware of this tactics.
Do not apply for credit cards.
                                                           The thoughts of on “welfare” and all that
Do not apply for student loans, the most                   negative bullshit. They will insult you that you
effective way is to work and save a portion of             can’t find job, that you are worthless. They will
your income for this goal. Or work full-time and           insult you’re education, your job experience and
study part-time. Some company will pay for                 all that crap. Truth is, the perpetrators are the
your tuition.                                              ones who needed you financially, without you,
                                                           they will not get their income or the funding their
Do not trust anyone with easy money or easy                organization need to sustain their expensive
job.                                                       operation.

Do not accrue cash advances and other high                 So, although they have succeeded in ruining you
interest loans from anyone including your                  financially, do not feel marginalized and get the
relatives.                                                 financial assistance that is available, it’s a small
                                                           change compare to the big money they are
Pay yourself. Save a portion of your income.               getting.
Be very aware of bank fees. If the fees
exceeded earn interest on your monthly                     Organized Stalking: Stalking is the first
balances, go to other bank and shop around for             noticeable signs of targeting. Its main goal is to
a better service.                                          induced mental disorder or the perception of


                                      A Practical Survival Guide To OSEH
                                            Written by F Viray 2011
                                                        3
one.     Paranoia, delusional, anxiety,       fear,         making sure not to have any chance of being
agitations are the common outcomes.                         label or perceived as paranoid or delusional.

                                                            As targeted individuals become super-attentive
                                                            to what is going on, eventually, he or she will
                                                            realized that this will probably go on for the rest
                                                            of their lives. Until some major disaster or
                                                            events happened, this phenomenon will
                                                            probably continue. Therefore, one must learn
                                                            to adapt.      One must try to neutralize the
                                                            harassers’ efforts. You can achieve this by
                                                            learning and education. For example, the tactic
                                                            of “entrapment.” Targets who previously had
                                                            debt problems will get several credit card offers
One of the targeted individual said, “this is a             via e-mail and other media.               Avoid this
game of chess, a chase to one’s sanity.” So be              temptations. Those who are religious will get
very aware of the mind game they are playing.               some nasty sex-related junk e-mail. Trashed
They want you to feel paranoid. They want you               this. Those who are actively involved in politics
to be super sensitive, to be very observant. In             will get unsolicited e-mail/propaganda about
other word, they want you to take notice every              their political affiliations or rival organizations.
aspect of the harassment. So you have to learn              Read and delete.           All of this, are there to
to ignore them. To take control and not give                manipulate someone’s emotions. To provoke a
them any attention they are desperately seeking.            reaction. Targeted individuals must learn to
                                                            adapt to this regular daily occurrences and
Noise campaign, including helicopter/aircraft and           identify, ignore or trash it.
other public harassment are tactics to induced
paranoia and other mental illness. Mobbing is
used to invade targeted individuals’ personal
space and privacy. They normally do this to
induce isolation, so that you will feel
uncomfortable in public place and with many
people surrounds you.       Counteract this by
thinking this as a time for you to socialize, be
friendly.

Do not think everyone is there to harass you.
Do not give them the attention and the
impression of you’re getting impatient specially if
you’re in the store or public places, waiting in            Another example of how to adapt or neutralize
line. Relax and take your time, the more time               the harassments is, when targeted individuals
you spend with them, the more money their                   decides to do activism, unsolicited news or
organizer will spend (which includes the                    propaganda will flow or come in via social
helicopter!).                                               network rigorously. All are aimed to heighten
                                                            emotions. They wanted you to feel angry. They
Targeted individuals will experienced break and             wanted you to have a strong opinion about
entering. Normal occurrences are invaluable                 everything. The most common is the feeling that
items will disappear and reappear. Furniture                your civil/human rights are being violated.
being moved. Gas stove being left turned-on.                Making targeted individuals combative and
They will leave a signs that someone was inside             agitated. If you decide to go public, avoid to
your properties like cigarette butts in your front          have a perception that you’re “loosing it” with
door. These are tactics to induced paranoia and             your public tirade and agitation.
delusions.
                                                            You have to learn to filter out what is a diversion
One have to learn to gather evidence and then               news/propaganda and which are authentic
properly planned the reporting to the authorities,          information and adopt this to your own needs or


                                       A Practical Survival Guide To OSEH
                                             Written by F Viray 2011
                                                         4
situations. Be very aware of the perps posing as            insinuate some sort of punishments imitating
targeted individuals.                                       spanking or a blow in the head. At first I was
                                                            bothered by this physical assault but I learned to
Electronic Harassment: The third stage of                   bypass/ignore this.
targeting is the electronic harassments. This
involve direct energy weapons (electromagnetic
radiation), microwave hearing, voice to skull,
computer hacking, and other harassments that                Hearing versus Listening – Hearing is simply the
involves electronics. The perpetrators can                  act of perceiving sound by the ear. If you are not
access the house alarm, air condition, heater,              hearing-impaired, hearing simply happens.
fridge, television show, alarm clock, cell phones,          Listening,    however,     is   something     you
landlines, computer. They can change the                    consciously choose to do. Listening requires
display dates and clocks on your electronic                 concentration so that your brain processes
appliances. They can reprogrammed your                      meaning from words and sentences. Listening
television or computer. They can emit radiation             leads to learning (d.umn.edu). In this
on your television or computer.                             description, treat, voice to skull as hearing, it’s
                                                            an unavoidable sound that simply happens. The
                                                            sounds of an old door opening, the sound of the
                                                            tree branches on a windy day, the sounds of
                                                            creaky floors while walking. Voice to skull
                                                            doesn’t need your concentration, your attention,
                                                            it doesn’t need your brain to process it, its
                                                            nothing, and it’s meaningless. When it’s
                                                            meaningless, you don’t have to listen to it.

                                                            The perpetrators will harassed you by
                                                            impersonating your own voice while reading.
                                                            My elementary teacher thought me to “read with
                                                            your eyes and not with your lips,” this tip are
                                                            very true with targeted individuals. It will take
                                                            sometime for someone to learn how to read with
                                                            your eyes as we are trained to read with our
                                                            mouth and the harassers’ technology relies on
I come to believe that targeted individuals’
                                                            the sounds that’s coming from your mouth while
harassment is broadcast globally. The perps will
                                                            reading.     There are techniques that can
do their very best to make you think that this is a
                                                            distinguish your own voice to the perps.’
violation of your human rights which is by the
way, is true. All to make you feel angry and
                                                            Learn to “slow-read,” ‘rewind or fast forward,” all
frustrated.     Counteract this, by using the
                                                            while reading. You will see that they will loss
broadcasting as a platform for your activism.
                                                            their rhythm.       Also, when you realize the
Always think that people are not stupid, that
                                                            perpetrators are reading way ahead of you, stop
there are still many decent and sane people out
                                                            and let them read by themselves.            When
there and people who knows what is right and
                                                            watching a movie and reading the end credits,
wrong and people who still believe in human
                                                            stare at the screen, like looking at a blank
rights, freedom and decency. Although other
                                                            screen and avoiding reading any letters or
“countermeasure sounds” like white noise,
                                                            words. Let them read by themselves and you
colorbars and six radio tracks do works, targeted
                                                            will see that they are useless without your vision
individuals can also play mp3 tracks about
                                                            or cooperation. Without you they can’t read!
OSEH while the harassments are being
                                                            So take charge and take full control.       Since
broadcast globally.
                                                            sometimes you can’t stop them to read while
                                                            your doing the same, take charge. Ignore them.
Targeted individuals will experienced physical
                                                            You are the one who will decide what to read,
threats verbally and through induced sounds. In
                                                            how to read it (whether backward, forward, slow,
my case, the induced sounds normally
                                                            or fast!), when to read it and where to read it!
happened to me during the early hours of the
                                                            It’s your brain, own it!
morning, normally to wake me up. It also

                                       A Practical Survival Guide To OSEH
                                             Written by F Viray 2011
                                                         5
When targeted individuals are being harassed                this died down, its all boils down to – everyone
using voice to skull or microwave hearing, the              are getting something back, and that is money!
harassers used tailored harassment protocols.
Use the “hearing vs listening” technique and
take control of the protocols. Once you start
hearing negativity, counteracts this with “Stop”
button technique. Only positive thoughts will
pass the door for processing. You only allow
those thoughts that you wanted. Take full
control what you wanted to think. You’re brain,
you’re the boss. Without you they’re nothing.
Without you they will not get their
funding/income. So take charge.

Voice to skull or microwave hearing – Do not
participate! Whatever accusations, cursing,
filthiness, nastiness the perps says, do not
engage with then with any arguments! Do not
give them any attention. Remember they are
already getting paid and you’re not getting
anything back except the physical and
psychological harm. Since they are forcing                  Microwave hearing – Targeted individuals will
themselves into you, do not give them anything              hear voices in running water in the
more but stare and silence which is more than               faucet/shower, counteract this by not turning the
enough.                                                     faucet in full maximum capacity, reducing the
                                                            sounds into minimum.        This technique will
As they will play with your emotions, they will             reduce the soundwave coming from the running
use all possible tricks imaginable. They are                water and will also reduce the intensity of
mostly a bunch of bad actors! They will act and             harassments (voices).
impersonate you. They will beg for your pity
using dialogue familiar to you. If targeted                 One will also have to learn not to flush the toilet
individuals likes movies, they will use movie               while still inside the room, do this before exiting
lines taken from targeted individuals favorite              so that you will avoid hearing the sounds of
movies. They will cry, impersonating you, like              refilling the water tank. While taking shower,
you’re asking you for mercy or they will shout              again, do not turn the shower in maximum level,
like asking you to fight back. Sometimes they               minimize the running water into minimum, if you
will use other voices, the most common, a child             notice that the harassment (voices) are getting
or a group of children crying, laughing, or                 too intense even with the minimum level, wet
shouting. These are all to get your attention and           your body so you can lather with soap then turn
get you involve with their role-playing or scripts.         the water on, only when its time for you to rinse.
Do not participate.
                                                            While you can minimize the sound coming from
With all the time and effort the perpetrators               running water, I am still investigating how to
spends on you, do not think that they’re not                prevent or minimize the harassment coming
getting anything back.       They will create a             from air vents, microwave and fridge. You can
perception that this is for “national security,” for        turn this off as usual or put some insulation so
“counter-terrorism,”     of     for     ‘behavioral         that it will be reduce the noise while its running.
modifications.”   All lies!    Unfortunately, the
primary motive for this operations is money!                Do not use the black cassette tape ribbons as a
Contracts     being    developed      and     paid.         shield pasted in your hats. This does not work.
Companies and organizers profiting. Technician              The tape ribbons are magnetic and will attract
getting a decent income and other benefits. It’s            radiation. Your head will be cook.
all about making money nothing else. All other
are just a bonus. A few laughs there, a few                 Unless your Oprah, and I assume you are not
entertainment here, but as the hype of having               and you cannot afford to buy the expensive anti-
this technologies and the novelties attached to             electromagnetic fabrics, use this techniques.

                                       A Practical Survival Guide To OSEH
                                             Written by F Viray 2011
                                                         6
Wear several underwear for protection to                  comments, that seeks your attentions or
radiation attacks in your genitals. Wear thick            opinions on facebook. If you decided to use
sweater and hood to cover your head and chest             social media as your platform, be ready with all
area. When sleeping, use several blanket and              this harassments. Sometimes it will test your
pillows to minimize the sting of pulse radiation          patience. And again, do not assume everyone
attacks.                                                  is there to harass you.          Despite all the
                                                          manipulations of your internet use, treat all the
Take note of the symptoms of the                          social network, other internet sites and uses as
electromagnetic radiation so that you can lessen          a platform for your activism, as a networking tool
the pains. There are regular attack hours and             to reach out and to meet new friends.
there are some intervals of rest. The whole
sequence is to make it sure no one will notice or         If you are maintaining a blog, expect typos and
no one will question the torture.      The most           errors. Sometimes your mind can’t keep up with
common outcomes of the torture are cancer and             the harassments and you will type several
heart attacks. Daily symptoms are: racing or              spelling or grammatical errors. Do not loss your
irregular heart beat, hard/heavy pumping of               cool. Nobody is perfect. Sometimes you will
heart, fatigue/exhaustion, dizziness, loss of             have your web-site being manipulated. Even
balance, intense headaches, skin dryness,                 times and dates on your PC and web-sites you
intense body itchiness followed by scarring.              regularly visits changed. All to make you feel
                                                          confused. Make sure to have a paper calendar
Unless you have no way of other means of                  and other reliable source of info.
communication, do not use cell or mobile
phones. These devices can use to zap you or               If you are looking for a job, you’ll notice visible
attack you with radiation. Cell phone can also            job ads both online and newspaper that matches
use for harassment and tracking devices. Be               or appeared to be tailored made to your
very aware of the mobile companies who are                credentials, you’ll apply for it and will received
also used to make sure that targeted individuals          automatic replies saying, the person you
accumulate bills/debts. It is also used for               contacted is on maternity leave or not available
unsolicited telemarketing calls.                          and the e-mail will give another contact person.
                                                          This is another example of cyber harassment.
When it comes to hacking, targeted individuals            You can check this by trying to use the same e-
will experience several computer crashes even             mail in a few days and week and you will get the
with anti-virus software stored or used. The              same results. I found this accidentally when I try
perpetrators will have access to your computer            invite all my contacts to LinkedIn and facebook
at home and at work. They will have access to             and received the same replies from the
your personal files.     They will used and               organizations I have applied before. Make a list
manipulate your files so that you will feel               of all the companies and avoid them. You don’t
violated and induced the feeling of you have              want to work for organization or companies who
something to hide.                                        participate in crime.

If you have nothing to hide, you have nothing to
worry about but just in case they got crazy,
protect yourself by saving your personal files
using external devices like USB and discs.
Avoid visiting sex related internet sites as they
can use this to harass you even if you think that
there is nothing wrong with this as you are an
adult. Keep your personal documents out of
your hard drives and have a paper copies.

Do not get mad if you cannot download your
files faster or if you loss connections while
downloading your files to you tube and other
social network.      These are part of the
harassments. You will received friend requests
from people you don’t know and other

                                     A Practical Survival Guide To OSEH
                                           Written by F Viray 2011
                                                       7
Dis-infomations: Filtering – Learn how to filter,           Unfortunately, several sector of the society
not only the unwanted voices or the daily noise             participate in this crime. No clear motive for the
campaign but also the daily propaganda in the               reason why this crime is being perpetrated
media. Most of targeted individuals will noticed            except for money. As everyone profits, the
that even in the mainstream newspaper, articles             health care industry, the military, the
related to his or her situations are manifested             governments, financial institutions and private
with innuendo in several articles and seeking his           households.       Mainstream media will induced
or her attention. For example, the targeted felt            conspiracy      theories   like  UFOs,      NWO,
like shopping for something, a sale ad will be              globalization, and all that crap but all of these
visible. If he or she is looking for a job, an ad           are diversions to the actual motive of these
will be in the paper tailored made to his or her            operations. It all boils down to money, nothing
credentials. In addition to this, there will be             more nothing less.
diversion news that might interest him or her and
will play an important role in diverting his or her         The most visible targeted individual perhaps is
attention to do the more important chores of the            the revelations of one Hollywood actor who
day. Be aware of this tactics. Take charge.                 publicly admitted being harassed this year. This
Allow only the ones who serves you. Meaning if              celebrity mentioned several actors who are
you like the diversion, go ahead and enjoy it but           being targeted and in fact some died recently. I
make sure you know your priorities.                         noticed that most of these death has some sort
                                                            of mental disorder that can be attributed to
Another disinformation are those activities                 substance abuse or has the signs of
perpetrated by phony or fake targeted                       misdiagnosis of drug overdose. These deaths
individuals visible in social networks. They are            are also very sudden. I can only imagine that
there to make sure the public get the                       publicized reasons for their deaths are false and
impressions that most targeted individuals are              all diversionary tactics to mask the truth. Who
mental case, mostly delusional and or paranoid.             knows. No one know if these dead celebrities
They are there to make sure that the public will            are actually targeted individuals.
have the impressions that most targeted
individuals are terrorists, perverts, antichrist,
anarchist, anti-governments, anti-this and that.
Their basic functions are to misinformed the
public, plant seed of doubts to targeted
individuals themselves and their groups. These
fake-targeted individuals are provocateurs who
will initiate fight between targeted individuals so
that any events or activism fails or become
disorganized. They are also there to instigate
hatred to different communities, plant rumor and
misinformed the public about issues affecting
targeted individuals. Real targeted individuals
will eventually developed a trait on how to
identify these kind harassers.

Knowledge is bliss! They know their actions are             As the symptoms of OSEH are like daily normal
crime that’s why they are hiding in with their              occurrences, it is very hard to detect who is
high-tech gadgets! Here are the facts: this                 being targeted and who are not. It’s hard to get a
operation violates human rights, constitutional             factual statistic of the number of targeted
rights and civil rights that highly industrialized          individuals globally. One thing is for sure, it is
and developed countries adopted. In addition to             happening around the world. As I experienced
most common countries’ criminal legislation,                being attacked in the air (while traveling inside a
these perpetrators are essentially terrorists!              plane from Ontario to Vancouver, BC), on water
Their tactics are designed to be nearly                     (while traveling inside a inter-island transboat
impossible to prove, aimed to make targeted                 from Vancouver to Victoria, BC), on land (while
individuals look and sounds crazy, so don’t fall            traveling by bus from BC to San Francisco, CA
to their trap.                                              USA) I realized that all this attacks are done via
                                                            satellite.

                                       A Practical Survival Guide To OSEH
                                             Written by F Viray 2011
                                                         8
are acting insane. I went to a job interview in
Another fact: the harassments are broadcast via             Vancouver one time and while I was waiting for
satellite and can be hear in all major cities, atl          the person who supposed to be interviewing me,
east to the cities I have been. Unless deaf,                there was this woman running back and forth in
targeted individuals will hear the broadcast                front of me, acting like a chicken with no head
harassments anywhere. Another fact: I noticed               or direction and with her high heels making
an increased in recruitment of young                        noise to the whole hall way. The receptionist
perpetrators. I wonder what brainwashing                    acted like as if nothing noticeable was going on.
method they have done.         They are being               Another example was a perpetrator appeared
desensitize with the violence and hatred. They              while I was walking, heading to the bus stop, he
are normally seen as street or field agents with            was driving this heavy concrete track.      After
their ipod in their ears and cell phone in their            idling for a few minutes, he drove around the
hands.                                                      blocks, only to re-appear to the same spot
                                                            where I seen him first. He seem lost. He has
I also noticed an increase infiltration of the              done the assignment don’t know what to do
religious sector. It is ironic that religious sector        next. I can only assumed that the perpetrators
and not for profit organizations participate in this        has lost the capacity to think for themselves as
ungodly operations. The same organizations                  they are waiting for their controllers command.
that are supposed to be the guardians of the                Crazy acts like these seems to confirm how
oppressed and the ones who I expected to have               insane this whole organization are.           My
a high regard for social justice, equality and              perpetrator kept on saying: “Imagine, a world full
human rights.                                               of perpetrators, harassing each other!” and then
                                                            someone will shout, “money, money, money!”
On a lighter note, I noticed that those who                 This one I passed. They are still figuring this
participate in this campaign seem at lost or who            out.


Video Links:
       Organized Stalking What You Need To Know http://www.youtube.com/watch?v=9oiTlywAiYE
       Hearing Voices not a mental illness http://www.youtube.com/watch?v=fx-gCifwtyk
       Microwaves Used in Mind Control http://www.youtube.com/watch?v=zaPb3R5YTo4
       Street-Roving Scanner Van http://www.youtube.com/watch?v=DB0gwxJ2rH0
       LRAD-Putting Voices In The Head http://www.youtube.com/watch?v=sigL6Psm6RQ

Related Reading:
       The EMF Safety SuperStore
       http://lessemf.com/index.html
       Full-Body Scan Technology Deployed In Street-Roving Vans
       http://vigilantcitizen.com/?p=4690
       US to Use Microwave Weapons On America Citizens
       http://www.viewzone.com/microwave.html
       Electromagnetic Radiation Weapons: As Powerful As The Atomic Bomb
       http://www.mindjustice.org/emr13.htm
       Michigan Passes Anti Electronic Harassment Law Including Life in Prison
       http://emhdf.com/mich-law.htm

Wod Reference:
      TI - Targeted Individual - is a person being targeted with OSEH by a group of individual called
      "perp" for the purpose of human experimentation.
      OSEH - Organized Stalking Electronic Harassment - are methods use by perps in targeting a
      specific person for the purpose of inducing harm and possibly death.
      DEW - Direct Energy Weapon - are device used for OSEH purposes, weapons can be microwave
      with pulp frequencies, v2k or other electronic and hearing devices.
      V2K - voice to skull device - is a weapon use for transmitting voices with low or high frequencies.
      Voices can be for commands or harassments attacks that may look like the TI's own voice. V2K
      can also use to induce or manipulate dreams or to deprived TI sleeps.

                                       A Practical Survival Guide To OSEH
                                             Written by F Viray 2011
                                                         9

More Related Content

Viewers also liked

Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Karlos Svoboda
 
Vint big data research privacy technology and the law
Vint big data research privacy technology and the lawVint big data research privacy technology and the law
Vint big data research privacy technology and the lawKarlos Svoboda
 
Emotional Multi-Agents System for Peer to peer E-Learning
Emotional Multi-Agents System for Peer to peer E-LearningEmotional Multi-Agents System for Peer to peer E-Learning
Emotional Multi-Agents System for Peer to peer E-LearningKarlos Svoboda
 
Bag of Pursuits and Neural Gas for Improved Sparse Codin
Bag of Pursuits and Neural Gas for Improved Sparse CodinBag of Pursuits and Neural Gas for Improved Sparse Codin
Bag of Pursuits and Neural Gas for Improved Sparse CodinKarlos Svoboda
 
Committee against torture - Cat
Committee against torture - CatCommittee against torture - Cat
Committee against torture - CatKarlos Svoboda
 
Stalking victimization in the us
Stalking victimization in the usStalking victimization in the us
Stalking victimization in the usKarlos Svoboda
 
Caat box of rabbit with the tata box of cattle,buffalo camel and rat
Caat box of rabbit with the tata box of cattle,buffalo camel and ratCaat box of rabbit with the tata box of cattle,buffalo camel and rat
Caat box of rabbit with the tata box of cattle,buffalo camel and ratKarlos Svoboda
 
Human Performance Human Performance Human Performance
Human Performance Human Performance Human PerformanceHuman Performance Human Performance Human Performance
Human Performance Human Performance Human PerformanceKarlos Svoboda
 

Viewers also liked (8)

Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...
 
Vint big data research privacy technology and the law
Vint big data research privacy technology and the lawVint big data research privacy technology and the law
Vint big data research privacy technology and the law
 
Emotional Multi-Agents System for Peer to peer E-Learning
Emotional Multi-Agents System for Peer to peer E-LearningEmotional Multi-Agents System for Peer to peer E-Learning
Emotional Multi-Agents System for Peer to peer E-Learning
 
Bag of Pursuits and Neural Gas for Improved Sparse Codin
Bag of Pursuits and Neural Gas for Improved Sparse CodinBag of Pursuits and Neural Gas for Improved Sparse Codin
Bag of Pursuits and Neural Gas for Improved Sparse Codin
 
Committee against torture - Cat
Committee against torture - CatCommittee against torture - Cat
Committee against torture - Cat
 
Stalking victimization in the us
Stalking victimization in the usStalking victimization in the us
Stalking victimization in the us
 
Caat box of rabbit with the tata box of cattle,buffalo camel and rat
Caat box of rabbit with the tata box of cattle,buffalo camel and ratCaat box of rabbit with the tata box of cattle,buffalo camel and rat
Caat box of rabbit with the tata box of cattle,buffalo camel and rat
 
Human Performance Human Performance Human Performance
Human Performance Human Performance Human PerformanceHuman Performance Human Performance Human Performance
Human Performance Human Performance Human Performance
 

Similar to A practical-survival-guide-to-oseh

Mastering the mind by Dr.Mahboob Khan Phd
Mastering the mind by Dr.Mahboob Khan PhdMastering the mind by Dr.Mahboob Khan Phd
Mastering the mind by Dr.Mahboob Khan PhdHealthcare consultant
 
Automatic negative thoughts (ANTs)
Automatic negative thoughts (ANTs)Automatic negative thoughts (ANTs)
Automatic negative thoughts (ANTs)Babu Appat
 
Dont worry be happy
Dont worry be happyDont worry be happy
Dont worry be happyMrsunny4
 
The Coping Brain
The Coping Brain The Coping Brain
The Coping Brain Ashlesh2015
 
7 Ways Anxiety Might Be Slowly Eating Away Your Life.pdf
7 Ways Anxiety Might Be Slowly Eating Away Your Life.pdf7 Ways Anxiety Might Be Slowly Eating Away Your Life.pdf
7 Ways Anxiety Might Be Slowly Eating Away Your Life.pdfNisa T
 
The power of subconscious mind
The power of subconscious mindThe power of subconscious mind
The power of subconscious mindAkshay Parmar
 
7 Ways Anxiety Might Be Slowly Eating Away Your Life
7 Ways Anxiety Might Be Slowly Eating Away Your Life7 Ways Anxiety Might Be Slowly Eating Away Your Life
7 Ways Anxiety Might Be Slowly Eating Away Your LifeKarthik Karthi
 
The Magic Key to Parenting & GrandParenting
The Magic Key to Parenting & GrandParentingThe Magic Key to Parenting & GrandParenting
The Magic Key to Parenting & GrandParentingSandyFindlay
 
7 ways anxiety might be slowly eating away your life | Improve self esteem | ...
7 ways anxiety might be slowly eating away your life | Improve self esteem | ...7 ways anxiety might be slowly eating away your life | Improve self esteem | ...
7 ways anxiety might be slowly eating away your life | Improve self esteem | ...Kumar Vikram
 
Understand your power within
Understand your power withinUnderstand your power within
Understand your power withinochamberla
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligenceChelse Benham
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligenceguest139968
 

Similar to A practical-survival-guide-to-oseh (20)

Mastering the mind by Dr.Mahboob Khan Phd
Mastering the mind by Dr.Mahboob Khan PhdMastering the mind by Dr.Mahboob Khan Phd
Mastering the mind by Dr.Mahboob Khan Phd
 
Automatic negative thoughts (ANTs)
Automatic negative thoughts (ANTs)Automatic negative thoughts (ANTs)
Automatic negative thoughts (ANTs)
 
Modern report
Modern reportModern report
Modern report
 
The power of our subconscious mind
The power of our subconscious mindThe power of our subconscious mind
The power of our subconscious mind
 
Heaven and Earth
Heaven and EarthHeaven and Earth
Heaven and Earth
 
Dont worry be happy
Dont worry be happyDont worry be happy
Dont worry be happy
 
The Coping Brain
The Coping Brain The Coping Brain
The Coping Brain
 
7 Ways Anxiety Might Be Slowly Eating Away Your Life.pdf
7 Ways Anxiety Might Be Slowly Eating Away Your Life.pdf7 Ways Anxiety Might Be Slowly Eating Away Your Life.pdf
7 Ways Anxiety Might Be Slowly Eating Away Your Life.pdf
 
FEAR.pptx
FEAR.pptxFEAR.pptx
FEAR.pptx
 
Intuition: Leading Edge for You and Your Clients
Intuition: Leading Edge for You and Your ClientsIntuition: Leading Edge for You and Your Clients
Intuition: Leading Edge for You and Your Clients
 
Intuition, The Leading Edge for You and Your Clients
Intuition, The Leading Edge for You and Your ClientsIntuition, The Leading Edge for You and Your Clients
Intuition, The Leading Edge for You and Your Clients
 
The power of subconscious mind
The power of subconscious mindThe power of subconscious mind
The power of subconscious mind
 
unconsious mind.pdf
unconsious mind.pdfunconsious mind.pdf
unconsious mind.pdf
 
7 Ways Anxiety Might Be Slowly Eating Away Your Life
7 Ways Anxiety Might Be Slowly Eating Away Your Life7 Ways Anxiety Might Be Slowly Eating Away Your Life
7 Ways Anxiety Might Be Slowly Eating Away Your Life
 
Subconscious self sabotage
Subconscious self sabotageSubconscious self sabotage
Subconscious self sabotage
 
The Magic Key to Parenting & GrandParenting
The Magic Key to Parenting & GrandParentingThe Magic Key to Parenting & GrandParenting
The Magic Key to Parenting & GrandParenting
 
7 ways anxiety might be slowly eating away your life | Improve self esteem | ...
7 ways anxiety might be slowly eating away your life | Improve self esteem | ...7 ways anxiety might be slowly eating away your life | Improve self esteem | ...
7 ways anxiety might be slowly eating away your life | Improve self esteem | ...
 
Understand your power within
Understand your power withinUnderstand your power within
Understand your power within
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligence
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligence
 

More from Karlos Svoboda

Human vs and part machine - TVP magazine
Human vs and part machine - TVP magazineHuman vs and part machine - TVP magazine
Human vs and part machine - TVP magazineKarlos Svoboda
 
Moral science - Human subjects
Moral science - Human subjectsMoral science - Human subjects
Moral science - Human subjectsKarlos Svoboda
 
Existential Risk Prevention as Global Priority
Existential Risk Prevention as Global PriorityExistential Risk Prevention as Global Priority
Existential Risk Prevention as Global PriorityKarlos Svoboda
 
A taxonomy for descriptive research in law and technology
A taxonomy for descriptive research in law and technologyA taxonomy for descriptive research in law and technology
A taxonomy for descriptive research in law and technologyKarlos Svoboda
 
Brain computer interaction and medical access to the brain
Brain computer interaction and medical access to the brainBrain computer interaction and medical access to the brain
Brain computer interaction and medical access to the brainKarlos Svoboda
 
A rights based model of governance - the case of human enhancement
A rights based model of governance - the case of human enhancementA rights based model of governance - the case of human enhancement
A rights based model of governance - the case of human enhancementKarlos Svoboda
 
Evropská dohoda o ochraně obratlovců
Evropská dohoda o ochraně obratlovcůEvropská dohoda o ochraně obratlovců
Evropská dohoda o ochraně obratlovcůKarlos Svoboda
 
Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28Karlos Svoboda
 
Ethical aspect of ICT Implants in the Human body
Ethical aspect of ICT Implants in the Human bodyEthical aspect of ICT Implants in the Human body
Ethical aspect of ICT Implants in the Human bodyKarlos Svoboda
 
Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...
Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...
Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...Karlos Svoboda
 
Neural devices will change humankind
Neural devices will change humankindNeural devices will change humankind
Neural devices will change humankindKarlos Svoboda
 
Nanotechnology, ubiquitous computing and the internet of things
Nanotechnology, ubiquitous computing and the internet of thingsNanotechnology, ubiquitous computing and the internet of things
Nanotechnology, ubiquitous computing and the internet of thingsKarlos Svoboda
 
Identity REvolution multi disciplinary perspectives
Identity REvolution   multi disciplinary perspectivesIdentity REvolution   multi disciplinary perspectives
Identity REvolution multi disciplinary perspectivesKarlos Svoboda
 
MBAN medical body area network - first report and order
MBAN   medical body area network - first report and orderMBAN   medical body area network - first report and order
MBAN medical body area network - first report and orderKarlos Svoboda
 
Intimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviourIntimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviourKarlos Svoboda
 
Making perfect life european governance challenges in 21st Century Bio-engine...
Making perfect life european governance challenges in 21st Century Bio-engine...Making perfect life european governance challenges in 21st Century Bio-engine...
Making perfect life european governance challenges in 21st Century Bio-engine...Karlos Svoboda
 
GRAY MATTERS Integrative Approaches for Neuroscience, Ethics, and Society
GRAY MATTERS Integrative Approaches for  Neuroscience, Ethics, and SocietyGRAY MATTERS Integrative Approaches for  Neuroscience, Ethics, and Society
GRAY MATTERS Integrative Approaches for Neuroscience, Ethics, and SocietyKarlos Svoboda
 

More from Karlos Svoboda (20)

Human vs and part machine - TVP magazine
Human vs and part machine - TVP magazineHuman vs and part machine - TVP magazine
Human vs and part machine - TVP magazine
 
Jan Hus De ecclesia
Jan Hus De ecclesia Jan Hus De ecclesia
Jan Hus De ecclesia
 
Moral science - Human subjects
Moral science - Human subjectsMoral science - Human subjects
Moral science - Human subjects
 
Existential Risk Prevention as Global Priority
Existential Risk Prevention as Global PriorityExistential Risk Prevention as Global Priority
Existential Risk Prevention as Global Priority
 
A taxonomy for descriptive research in law and technology
A taxonomy for descriptive research in law and technologyA taxonomy for descriptive research in law and technology
A taxonomy for descriptive research in law and technology
 
Brain computer interaction and medical access to the brain
Brain computer interaction and medical access to the brainBrain computer interaction and medical access to the brain
Brain computer interaction and medical access to the brain
 
A rights based model of governance - the case of human enhancement
A rights based model of governance - the case of human enhancementA rights based model of governance - the case of human enhancement
A rights based model of governance - the case of human enhancement
 
Evropská dohoda o ochraně obratlovců
Evropská dohoda o ochraně obratlovcůEvropská dohoda o ochraně obratlovců
Evropská dohoda o ochraně obratlovců
 
Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28
 
Ethical aspect of ICT Implants in the Human body
Ethical aspect of ICT Implants in the Human bodyEthical aspect of ICT Implants in the Human body
Ethical aspect of ICT Implants in the Human body
 
Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...
Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...
Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...
 
Neural devices will change humankind
Neural devices will change humankindNeural devices will change humankind
Neural devices will change humankind
 
Nanotechnology, ubiquitous computing and the internet of things
Nanotechnology, ubiquitous computing and the internet of thingsNanotechnology, ubiquitous computing and the internet of things
Nanotechnology, ubiquitous computing and the internet of things
 
Identity REvolution multi disciplinary perspectives
Identity REvolution   multi disciplinary perspectivesIdentity REvolution   multi disciplinary perspectives
Identity REvolution multi disciplinary perspectives
 
MBAN medical body area network - first report and order
MBAN   medical body area network - first report and orderMBAN   medical body area network - first report and order
MBAN medical body area network - first report and order
 
Intimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviourIntimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviour
 
Human enhancement
Human enhancementHuman enhancement
Human enhancement
 
Making perfect life european governance challenges in 21st Century Bio-engine...
Making perfect life european governance challenges in 21st Century Bio-engine...Making perfect life european governance challenges in 21st Century Bio-engine...
Making perfect life european governance challenges in 21st Century Bio-engine...
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
GRAY MATTERS Integrative Approaches for Neuroscience, Ethics, and Society
GRAY MATTERS Integrative Approaches for  Neuroscience, Ethics, and SocietyGRAY MATTERS Integrative Approaches for  Neuroscience, Ethics, and Society
GRAY MATTERS Integrative Approaches for Neuroscience, Ethics, and Society
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

A practical-survival-guide-to-oseh

  • 1. A Practical Survival Guide To OSEH Written by F Viray 2011 It’s been a year of struggles since I discovered “Evil will never wins! Ever!” – this mantra will that I am a targeted individual. I am still here. I make your life easier. You’re the one who is learned a lot. Although my goal of getting a job being harassed. You are the good person. You and being independent again has become a are not the one doing evil crime. Make sure you distant goal, I have no regrets. I am writing this always think this mantra when the harassment blog to help out. I know there are other targeted are getting out of control. individuals out there who are struggling. Who are probably being drugged. Being “I am the boss here, I am in control” – take institutionalized. Who are homeless or at risk of charge. This mantra will help you sort out what becoming one. Who are being harassed. And you will allow them to do. Some harassments maybe contemplating on giving-up. Please do are unavoidable. For example, one has to take not cave-in. This is what I learned, and a shower or pee. Voices coming out of running hopefully will help you to keep your spirit up and water are sometimes unavoidable. Or the daily to keep on fighting. on-going noise campaign, you cannot control them, to stop them, what you can do is to stop the noise campaign get into you. Personal Mantras: Since most of the harassments are mind games, you have to develop or maintained your core beliefs. This is “They can never be trusted, ever!” – one probably the first thing that targeted individuals targeted individuals said, “unless it happened to lose. You will be robbed of your identity. The you twice, do not assume everyone are there to perpetrators’ main goal is to take full control of harassed you, sometimes people are just there your being. They will erase what is good about because they are inconsiderate.” This is very you. If you are emphatic, compassionate and true. This mantra of “trust” will help targeted spiritual being. They will slowly change you. individuals ignore the perpetrators. Ignore their They will destroy your religion, desensitize you deceitful voices. Ignore the microwave hearing with violence and make you a heartless cold tactics and other harassments. person. Making sure your “core beliefs” are intact is the first step in regaining control. Health Related: Targeted individuals will experience a decline in health during the “Your Brain, your thoughts” – no matter what harassments. My research indicated that there they do, always keep this mantra. Keep it in are three stages of harassments. The first is the your head and heart. You will be bombarded preliminary surveillance followed by intense with unwanted voices that may sounds like your organized stalking/mind game and then the own. No matter what you hear, it is still your harmful electronic harassments using direct brain, your thoughts, own it, take charge. energy weapons. Although the second one normally will result in targeted individuals’ being A Practical Survival Guide To OSEH Written by F Viray 2011 1
  • 2. institutionalized and heavily drugged, the last fruits and vegetables that are rich with Anti- stage was the most harmful. oxidants. “A game of chess, a chase of sanity” – one Exercise. Do house chores (avoid using targeted individual indicated that the whole vacuum cleaner if your voice to skull harassment/targeting is a “mind game.” The harassments are intense). Walk. perpetrators main goal is steal your sanity. They want you to know they are there. They want If you can avoid, do not go to psychiatrist. If you your undivided and constant attention. In short, can avoid, do not take anti-depression pills. Do they want you to be paranoid and delusional. not take Paxil. Be aware of a sudden change in You have to learn to block them from your your mood. Emotions like sadness, shyness, consciousness. Do not give them gratification. anxieties are not an automatic sign of mental disorder or chronic depression. These are Take Charge of your Thoughts – It is your brain, normal human emotions. It is your thoughts. They are going to whisper ideas, commands, visual pictures, all Learned about “informed consent.” If you are masquerading like your own thoughts. They will forced to be institutionalized, your have the right eventually informed you that it was them who to know all aspect of your treatments. You have put these pictures, ideas, commands, in your the right to know your medications. You have brain. Ignore them. Own it. Its your brain, it the right to know the reason why you are there. your thoughts. While this may take some time to If you can, learned to walk away. practice, your “core beliefs” and mantras (see the list above) will help you figure this up. Take Do not commit suicide, this is the perpetrators’ charge, take the credit, own it. Own the positive. ultimate prize. Own what you think is yours. Own what will make you feel happy. Own what will benefit Negative thoughts are poison and these are the you. And then give away all the trash, the filth, perpetrators first tactics. To induced negativity the negative thoughts. The one that will harm in your psyche. you. While I am still investigating about how to deal Control your thoughts, once they starts the with induced dreams, you will get familiarize with negativity, stop! If you find yourself starting to the pattern. Most of the time, they will induced think fearful or have negative thoughts, fight with dreams relating to your past and will do “role- pleasant thoughts. playing” acts while you are sleeping. They are reading a script patterned to the information and on-going harassment protocol they gathered. The main goal is to induced negative thoughts, the feeling of shame or guilt are the most common example. The success of induced dreams will be carry forward to targeted individual’s harassment particularly once he or she woke up. These are mostly the negativity embedded in one’s brain or mood. Hence most of the time, targeted individuals wakes up feeling sad, tired, or fatigue. Some indicated that they felt like they had a hanged over. Other will Targeted individuals will be attack with direct developed cold or allergies due to the lack of energy weapons. The most common is the “real” natural sleep or rest. radiation coming from everywhere. Most of the time, when there is an electrical grid. When it Some targeted individuals deals with sleep comes to this, use shielding products to deprivations with nutrients (eating bran oats) minimize the harmful effects. and meditations. All are effective way to induce sleeps naturally. Another way, are to not just lay You need to help your body to undo the damage in bed and stare at the ceiling. If one is not in a of electromagnetic radiation with consumption of vegetable state, get up and do something. Cleaning is a way of taking charge. Doing A Practical Survival Guide To OSEH Written by F Viray 2011 2
  • 3. something to counteracts the thoughts of “you The perps will corrupt you to do petty crime be cannot sleep” or when the perpetrators are in a very aware. state of rambo or running “amok” as they continue to attack you with non-stop trash talk Always work hard and your boss will notice. about non-sense. Once you done something, It will eventually tired you out that physically your Educate your self with workplace mobbing, body will shut down and hence will make you harassment, discrimination and work related feel sleepy. legislation. Always be aware of the changes in your workload and your health. An increase in workload and stress related sickness are a telltale signs of OSEH. Be aware of frequent intense headache, a sign of electronic harassments (DEW). Balance your work and personal lives and be aware of the changes in your relationship. If you noticed that one by one your friends are Financial Related: Once your perpetrator disappearing, this is a telltale signs that your succeeded in ruining your health, the next friends are getting infiltrated and probably being outcome is to your ability to make money. The brainwash. A smear campaign is probably being perpetrators will corrupt you. They will done. As they are being bribed one by one, they encourage you to accrue debts. They will entice will turned against you and become you to have a luxurious lifestyles. Manipulate perpetrators. Don’t worry about this, you will be you to learned vices like gambling and thankful in the end, a true friend will not turn alcoholism. They will encourage you to live a their back on you. life beyond your means. These are very common to anyone, except, targeted individuals At a later stage, targeted individuals will are pre-meditated, a well planned manipulations experienced financial hardship due to loss of of someone’s lives. income, employment, and debts. One alternative is to apply for government assistance. Do not accrue debts, if you don’t have the Perpetrators will induced negative thoughts of money to spend, don’t spend. targeted individuals being marginalized, be aware of this tactics. Do not apply for credit cards. The thoughts of on “welfare” and all that Do not apply for student loans, the most negative bullshit. They will insult you that you effective way is to work and save a portion of can’t find job, that you are worthless. They will your income for this goal. Or work full-time and insult you’re education, your job experience and study part-time. Some company will pay for all that crap. Truth is, the perpetrators are the your tuition. ones who needed you financially, without you, they will not get their income or the funding their Do not trust anyone with easy money or easy organization need to sustain their expensive job. operation. Do not accrue cash advances and other high So, although they have succeeded in ruining you interest loans from anyone including your financially, do not feel marginalized and get the relatives. financial assistance that is available, it’s a small change compare to the big money they are Pay yourself. Save a portion of your income. getting. Be very aware of bank fees. If the fees exceeded earn interest on your monthly Organized Stalking: Stalking is the first balances, go to other bank and shop around for noticeable signs of targeting. Its main goal is to a better service. induced mental disorder or the perception of A Practical Survival Guide To OSEH Written by F Viray 2011 3
  • 4. one. Paranoia, delusional, anxiety, fear, making sure not to have any chance of being agitations are the common outcomes. label or perceived as paranoid or delusional. As targeted individuals become super-attentive to what is going on, eventually, he or she will realized that this will probably go on for the rest of their lives. Until some major disaster or events happened, this phenomenon will probably continue. Therefore, one must learn to adapt. One must try to neutralize the harassers’ efforts. You can achieve this by learning and education. For example, the tactic of “entrapment.” Targets who previously had debt problems will get several credit card offers One of the targeted individual said, “this is a via e-mail and other media. Avoid this game of chess, a chase to one’s sanity.” So be temptations. Those who are religious will get very aware of the mind game they are playing. some nasty sex-related junk e-mail. Trashed They want you to feel paranoid. They want you this. Those who are actively involved in politics to be super sensitive, to be very observant. In will get unsolicited e-mail/propaganda about other word, they want you to take notice every their political affiliations or rival organizations. aspect of the harassment. So you have to learn Read and delete. All of this, are there to to ignore them. To take control and not give manipulate someone’s emotions. To provoke a them any attention they are desperately seeking. reaction. Targeted individuals must learn to adapt to this regular daily occurrences and Noise campaign, including helicopter/aircraft and identify, ignore or trash it. other public harassment are tactics to induced paranoia and other mental illness. Mobbing is used to invade targeted individuals’ personal space and privacy. They normally do this to induce isolation, so that you will feel uncomfortable in public place and with many people surrounds you. Counteract this by thinking this as a time for you to socialize, be friendly. Do not think everyone is there to harass you. Do not give them the attention and the impression of you’re getting impatient specially if you’re in the store or public places, waiting in Another example of how to adapt or neutralize line. Relax and take your time, the more time the harassments is, when targeted individuals you spend with them, the more money their decides to do activism, unsolicited news or organizer will spend (which includes the propaganda will flow or come in via social helicopter!). network rigorously. All are aimed to heighten emotions. They wanted you to feel angry. They Targeted individuals will experienced break and wanted you to have a strong opinion about entering. Normal occurrences are invaluable everything. The most common is the feeling that items will disappear and reappear. Furniture your civil/human rights are being violated. being moved. Gas stove being left turned-on. Making targeted individuals combative and They will leave a signs that someone was inside agitated. If you decide to go public, avoid to your properties like cigarette butts in your front have a perception that you’re “loosing it” with door. These are tactics to induced paranoia and your public tirade and agitation. delusions. You have to learn to filter out what is a diversion One have to learn to gather evidence and then news/propaganda and which are authentic properly planned the reporting to the authorities, information and adopt this to your own needs or A Practical Survival Guide To OSEH Written by F Viray 2011 4
  • 5. situations. Be very aware of the perps posing as insinuate some sort of punishments imitating targeted individuals. spanking or a blow in the head. At first I was bothered by this physical assault but I learned to Electronic Harassment: The third stage of bypass/ignore this. targeting is the electronic harassments. This involve direct energy weapons (electromagnetic radiation), microwave hearing, voice to skull, computer hacking, and other harassments that Hearing versus Listening – Hearing is simply the involves electronics. The perpetrators can act of perceiving sound by the ear. If you are not access the house alarm, air condition, heater, hearing-impaired, hearing simply happens. fridge, television show, alarm clock, cell phones, Listening, however, is something you landlines, computer. They can change the consciously choose to do. Listening requires display dates and clocks on your electronic concentration so that your brain processes appliances. They can reprogrammed your meaning from words and sentences. Listening television or computer. They can emit radiation leads to learning (d.umn.edu). In this on your television or computer. description, treat, voice to skull as hearing, it’s an unavoidable sound that simply happens. The sounds of an old door opening, the sound of the tree branches on a windy day, the sounds of creaky floors while walking. Voice to skull doesn’t need your concentration, your attention, it doesn’t need your brain to process it, its nothing, and it’s meaningless. When it’s meaningless, you don’t have to listen to it. The perpetrators will harassed you by impersonating your own voice while reading. My elementary teacher thought me to “read with your eyes and not with your lips,” this tip are very true with targeted individuals. It will take sometime for someone to learn how to read with your eyes as we are trained to read with our mouth and the harassers’ technology relies on I come to believe that targeted individuals’ the sounds that’s coming from your mouth while harassment is broadcast globally. The perps will reading. There are techniques that can do their very best to make you think that this is a distinguish your own voice to the perps.’ violation of your human rights which is by the way, is true. All to make you feel angry and Learn to “slow-read,” ‘rewind or fast forward,” all frustrated. Counteract this, by using the while reading. You will see that they will loss broadcasting as a platform for your activism. their rhythm. Also, when you realize the Always think that people are not stupid, that perpetrators are reading way ahead of you, stop there are still many decent and sane people out and let them read by themselves. When there and people who knows what is right and watching a movie and reading the end credits, wrong and people who still believe in human stare at the screen, like looking at a blank rights, freedom and decency. Although other screen and avoiding reading any letters or “countermeasure sounds” like white noise, words. Let them read by themselves and you colorbars and six radio tracks do works, targeted will see that they are useless without your vision individuals can also play mp3 tracks about or cooperation. Without you they can’t read! OSEH while the harassments are being So take charge and take full control. Since broadcast globally. sometimes you can’t stop them to read while your doing the same, take charge. Ignore them. Targeted individuals will experienced physical You are the one who will decide what to read, threats verbally and through induced sounds. In how to read it (whether backward, forward, slow, my case, the induced sounds normally or fast!), when to read it and where to read it! happened to me during the early hours of the It’s your brain, own it! morning, normally to wake me up. It also A Practical Survival Guide To OSEH Written by F Viray 2011 5
  • 6. When targeted individuals are being harassed this died down, its all boils down to – everyone using voice to skull or microwave hearing, the are getting something back, and that is money! harassers used tailored harassment protocols. Use the “hearing vs listening” technique and take control of the protocols. Once you start hearing negativity, counteracts this with “Stop” button technique. Only positive thoughts will pass the door for processing. You only allow those thoughts that you wanted. Take full control what you wanted to think. You’re brain, you’re the boss. Without you they’re nothing. Without you they will not get their funding/income. So take charge. Voice to skull or microwave hearing – Do not participate! Whatever accusations, cursing, filthiness, nastiness the perps says, do not engage with then with any arguments! Do not give them any attention. Remember they are already getting paid and you’re not getting anything back except the physical and psychological harm. Since they are forcing Microwave hearing – Targeted individuals will themselves into you, do not give them anything hear voices in running water in the more but stare and silence which is more than faucet/shower, counteract this by not turning the enough. faucet in full maximum capacity, reducing the sounds into minimum. This technique will As they will play with your emotions, they will reduce the soundwave coming from the running use all possible tricks imaginable. They are water and will also reduce the intensity of mostly a bunch of bad actors! They will act and harassments (voices). impersonate you. They will beg for your pity using dialogue familiar to you. If targeted One will also have to learn not to flush the toilet individuals likes movies, they will use movie while still inside the room, do this before exiting lines taken from targeted individuals favorite so that you will avoid hearing the sounds of movies. They will cry, impersonating you, like refilling the water tank. While taking shower, you’re asking you for mercy or they will shout again, do not turn the shower in maximum level, like asking you to fight back. Sometimes they minimize the running water into minimum, if you will use other voices, the most common, a child notice that the harassment (voices) are getting or a group of children crying, laughing, or too intense even with the minimum level, wet shouting. These are all to get your attention and your body so you can lather with soap then turn get you involve with their role-playing or scripts. the water on, only when its time for you to rinse. Do not participate. While you can minimize the sound coming from With all the time and effort the perpetrators running water, I am still investigating how to spends on you, do not think that they’re not prevent or minimize the harassment coming getting anything back. They will create a from air vents, microwave and fridge. You can perception that this is for “national security,” for turn this off as usual or put some insulation so “counter-terrorism,” of for ‘behavioral that it will be reduce the noise while its running. modifications.” All lies! Unfortunately, the primary motive for this operations is money! Do not use the black cassette tape ribbons as a Contracts being developed and paid. shield pasted in your hats. This does not work. Companies and organizers profiting. Technician The tape ribbons are magnetic and will attract getting a decent income and other benefits. It’s radiation. Your head will be cook. all about making money nothing else. All other are just a bonus. A few laughs there, a few Unless your Oprah, and I assume you are not entertainment here, but as the hype of having and you cannot afford to buy the expensive anti- this technologies and the novelties attached to electromagnetic fabrics, use this techniques. A Practical Survival Guide To OSEH Written by F Viray 2011 6
  • 7. Wear several underwear for protection to comments, that seeks your attentions or radiation attacks in your genitals. Wear thick opinions on facebook. If you decided to use sweater and hood to cover your head and chest social media as your platform, be ready with all area. When sleeping, use several blanket and this harassments. Sometimes it will test your pillows to minimize the sting of pulse radiation patience. And again, do not assume everyone attacks. is there to harass you. Despite all the manipulations of your internet use, treat all the Take note of the symptoms of the social network, other internet sites and uses as electromagnetic radiation so that you can lessen a platform for your activism, as a networking tool the pains. There are regular attack hours and to reach out and to meet new friends. there are some intervals of rest. The whole sequence is to make it sure no one will notice or If you are maintaining a blog, expect typos and no one will question the torture. The most errors. Sometimes your mind can’t keep up with common outcomes of the torture are cancer and the harassments and you will type several heart attacks. Daily symptoms are: racing or spelling or grammatical errors. Do not loss your irregular heart beat, hard/heavy pumping of cool. Nobody is perfect. Sometimes you will heart, fatigue/exhaustion, dizziness, loss of have your web-site being manipulated. Even balance, intense headaches, skin dryness, times and dates on your PC and web-sites you intense body itchiness followed by scarring. regularly visits changed. All to make you feel confused. Make sure to have a paper calendar Unless you have no way of other means of and other reliable source of info. communication, do not use cell or mobile phones. These devices can use to zap you or If you are looking for a job, you’ll notice visible attack you with radiation. Cell phone can also job ads both online and newspaper that matches use for harassment and tracking devices. Be or appeared to be tailored made to your very aware of the mobile companies who are credentials, you’ll apply for it and will received also used to make sure that targeted individuals automatic replies saying, the person you accumulate bills/debts. It is also used for contacted is on maternity leave or not available unsolicited telemarketing calls. and the e-mail will give another contact person. This is another example of cyber harassment. When it comes to hacking, targeted individuals You can check this by trying to use the same e- will experience several computer crashes even mail in a few days and week and you will get the with anti-virus software stored or used. The same results. I found this accidentally when I try perpetrators will have access to your computer invite all my contacts to LinkedIn and facebook at home and at work. They will have access to and received the same replies from the your personal files. They will used and organizations I have applied before. Make a list manipulate your files so that you will feel of all the companies and avoid them. You don’t violated and induced the feeling of you have want to work for organization or companies who something to hide. participate in crime. If you have nothing to hide, you have nothing to worry about but just in case they got crazy, protect yourself by saving your personal files using external devices like USB and discs. Avoid visiting sex related internet sites as they can use this to harass you even if you think that there is nothing wrong with this as you are an adult. Keep your personal documents out of your hard drives and have a paper copies. Do not get mad if you cannot download your files faster or if you loss connections while downloading your files to you tube and other social network. These are part of the harassments. You will received friend requests from people you don’t know and other A Practical Survival Guide To OSEH Written by F Viray 2011 7
  • 8. Dis-infomations: Filtering – Learn how to filter, Unfortunately, several sector of the society not only the unwanted voices or the daily noise participate in this crime. No clear motive for the campaign but also the daily propaganda in the reason why this crime is being perpetrated media. Most of targeted individuals will noticed except for money. As everyone profits, the that even in the mainstream newspaper, articles health care industry, the military, the related to his or her situations are manifested governments, financial institutions and private with innuendo in several articles and seeking his households. Mainstream media will induced or her attention. For example, the targeted felt conspiracy theories like UFOs, NWO, like shopping for something, a sale ad will be globalization, and all that crap but all of these visible. If he or she is looking for a job, an ad are diversions to the actual motive of these will be in the paper tailored made to his or her operations. It all boils down to money, nothing credentials. In addition to this, there will be more nothing less. diversion news that might interest him or her and will play an important role in diverting his or her The most visible targeted individual perhaps is attention to do the more important chores of the the revelations of one Hollywood actor who day. Be aware of this tactics. Take charge. publicly admitted being harassed this year. This Allow only the ones who serves you. Meaning if celebrity mentioned several actors who are you like the diversion, go ahead and enjoy it but being targeted and in fact some died recently. I make sure you know your priorities. noticed that most of these death has some sort of mental disorder that can be attributed to Another disinformation are those activities substance abuse or has the signs of perpetrated by phony or fake targeted misdiagnosis of drug overdose. These deaths individuals visible in social networks. They are are also very sudden. I can only imagine that there to make sure the public get the publicized reasons for their deaths are false and impressions that most targeted individuals are all diversionary tactics to mask the truth. Who mental case, mostly delusional and or paranoid. knows. No one know if these dead celebrities They are there to make sure that the public will are actually targeted individuals. have the impressions that most targeted individuals are terrorists, perverts, antichrist, anarchist, anti-governments, anti-this and that. Their basic functions are to misinformed the public, plant seed of doubts to targeted individuals themselves and their groups. These fake-targeted individuals are provocateurs who will initiate fight between targeted individuals so that any events or activism fails or become disorganized. They are also there to instigate hatred to different communities, plant rumor and misinformed the public about issues affecting targeted individuals. Real targeted individuals will eventually developed a trait on how to identify these kind harassers. Knowledge is bliss! They know their actions are As the symptoms of OSEH are like daily normal crime that’s why they are hiding in with their occurrences, it is very hard to detect who is high-tech gadgets! Here are the facts: this being targeted and who are not. It’s hard to get a operation violates human rights, constitutional factual statistic of the number of targeted rights and civil rights that highly industrialized individuals globally. One thing is for sure, it is and developed countries adopted. In addition to happening around the world. As I experienced most common countries’ criminal legislation, being attacked in the air (while traveling inside a these perpetrators are essentially terrorists! plane from Ontario to Vancouver, BC), on water Their tactics are designed to be nearly (while traveling inside a inter-island transboat impossible to prove, aimed to make targeted from Vancouver to Victoria, BC), on land (while individuals look and sounds crazy, so don’t fall traveling by bus from BC to San Francisco, CA to their trap. USA) I realized that all this attacks are done via satellite. A Practical Survival Guide To OSEH Written by F Viray 2011 8
  • 9. are acting insane. I went to a job interview in Another fact: the harassments are broadcast via Vancouver one time and while I was waiting for satellite and can be hear in all major cities, atl the person who supposed to be interviewing me, east to the cities I have been. Unless deaf, there was this woman running back and forth in targeted individuals will hear the broadcast front of me, acting like a chicken with no head harassments anywhere. Another fact: I noticed or direction and with her high heels making an increased in recruitment of young noise to the whole hall way. The receptionist perpetrators. I wonder what brainwashing acted like as if nothing noticeable was going on. method they have done. They are being Another example was a perpetrator appeared desensitize with the violence and hatred. They while I was walking, heading to the bus stop, he are normally seen as street or field agents with was driving this heavy concrete track. After their ipod in their ears and cell phone in their idling for a few minutes, he drove around the hands. blocks, only to re-appear to the same spot where I seen him first. He seem lost. He has I also noticed an increase infiltration of the done the assignment don’t know what to do religious sector. It is ironic that religious sector next. I can only assumed that the perpetrators and not for profit organizations participate in this has lost the capacity to think for themselves as ungodly operations. The same organizations they are waiting for their controllers command. that are supposed to be the guardians of the Crazy acts like these seems to confirm how oppressed and the ones who I expected to have insane this whole organization are. My a high regard for social justice, equality and perpetrator kept on saying: “Imagine, a world full human rights. of perpetrators, harassing each other!” and then someone will shout, “money, money, money!” On a lighter note, I noticed that those who This one I passed. They are still figuring this participate in this campaign seem at lost or who out. Video Links: Organized Stalking What You Need To Know http://www.youtube.com/watch?v=9oiTlywAiYE Hearing Voices not a mental illness http://www.youtube.com/watch?v=fx-gCifwtyk Microwaves Used in Mind Control http://www.youtube.com/watch?v=zaPb3R5YTo4 Street-Roving Scanner Van http://www.youtube.com/watch?v=DB0gwxJ2rH0 LRAD-Putting Voices In The Head http://www.youtube.com/watch?v=sigL6Psm6RQ Related Reading: The EMF Safety SuperStore http://lessemf.com/index.html Full-Body Scan Technology Deployed In Street-Roving Vans http://vigilantcitizen.com/?p=4690 US to Use Microwave Weapons On America Citizens http://www.viewzone.com/microwave.html Electromagnetic Radiation Weapons: As Powerful As The Atomic Bomb http://www.mindjustice.org/emr13.htm Michigan Passes Anti Electronic Harassment Law Including Life in Prison http://emhdf.com/mich-law.htm Wod Reference: TI - Targeted Individual - is a person being targeted with OSEH by a group of individual called "perp" for the purpose of human experimentation. OSEH - Organized Stalking Electronic Harassment - are methods use by perps in targeting a specific person for the purpose of inducing harm and possibly death. DEW - Direct Energy Weapon - are device used for OSEH purposes, weapons can be microwave with pulp frequencies, v2k or other electronic and hearing devices. V2K - voice to skull device - is a weapon use for transmitting voices with low or high frequencies. Voices can be for commands or harassments attacks that may look like the TI's own voice. V2K can also use to induce or manipulate dreams or to deprived TI sleeps. A Practical Survival Guide To OSEH Written by F Viray 2011 9