RICHARD LIGHTHOUSE : WE ARE ALL BEING TRACKED -CORRECTED VERSION
|
Time
Text
Hi, everyone. everyone.
I'm Carrie Cassidy from Project Camelot and very happy to be here tonight.
We have a very fascinating guest tonight, Richard Lighthouse, and he is quite an extraordinary person in my view because he's written, I think, 100 books is how it goes, and that seems absolutely impossible to me, but we're going to talk to him more about that And if you'll stand by, what I'm going to do is I'll bring Richard on the screen here.
Anyway, for the moment, we're live and we should just go ahead.
So tell us, Richard, what has been going on?
This is kind of a new...
I talked to you a few years ago and I think this is a relatively recent area of research for you.
Is that true, or have you been researching this all along?
That's a good question, Carrie.
I became aware of government corruption within the FBI and CIA a few years back and began researching it seriously in January of 2016 and just trying to understand what it was, who was involved, To nail down many of the prime players.
I haven't identified everybody, but I think I've been able to identify the main groups that are involved and where the funding comes from.
So I would say that's fairly key.
Okay, I'm just going to interrupt.
I'm sorry here.
People are saying that they can't hear.
I have changed something, so maybe it has improved the sound.
So people, please do stand by.
See if this is getting better, because I think it might get better.
I have adjusted something and I want to see if this works.
Okay, I'm going to turn you a little louder at my end and see if that helps.
Okay, Richard, and I'm keeping my video off, so that should keep the low bandwidth.
If we have to switch to audio on your end, we can do that as well.
So that would also cut down on the drag.
Okay, someone says it's getting better.
Alright, so the question was sort of what sent you in this direction?
Is this a new area of research?
And you were starting to talk about the fact that it sounds like you do not know where the funding is coming from to create the targeting?
No, we do know where the funding comes from.
It comes from the National Intelligence Program.
Which is basically run by the CIA and all of the people that they have specially selected for the Office of the Director of National Intelligence.
Of course, the CIA is involved in a lot of handpicking those people that are put into those high-level posts.
So, we do know it comes from the black budget, basically.
And the CIA basically runs that.
So they choose who gets funded.
They help to direct the funds for the National Intelligence Program.
And if you look up any charts or diagrams of the CIA, they will claim to be a, quote, independent agency, which I find odd.
Does that mean they don't report to anybody?
So...
They're just kind of doing their own thing and being kind of brazen about it, I'll add.
So I do have a diagram of that that I have passed around.
If some of the folks can find this on my website, it's what I call the overview, and it shows the CIA with Elizabeth Kimber, who is the head of CIA operations.
She reports to Gina Haspel.
At the CIA. So all these are done under the CIA operational division.
And the three main organizations that report to her or get funding from this program are General Raymond at Air Force Space Command, Susan Gordon and her group at the Office of the Director of National Intelligence, and John Dewars at the Department of Justice.
So those three people then coordinate and filter and direct the funds to set up those budgets.
For example, the Gang Stalking Program for the tracking of targeted individuals in a database.
And then ultimately, these targeted individuals are hit with the directed energy weapons that come from the Air Force Space Command in Colorado Springs under the 50th wing.
Okay, I'm going to have to ask you to turn your video off.
Very sorry about this, but people are still complaining about the sound.
And I'm not sure why, because it's fine at my end and you can hear fine, but apparently the people who are listening on YouTube are not able.
Do you know how to shut your camera off?
You just click the camera and it gets a slash through it.
That means it's off.
Okay, how's that?
Yeah, that's what you do.
It's not ideal, but it's the best.
Some people would think that we should restart.
I can't shut down the YouTube window without having to move this entire broadcast to another channel.
YouTube window, and you won't be able...
I don't know if it'll show up on the right place.
Okay.
Well, it's...
My internet is slow because I'm broadcasting and talking.
Well, of course, I'm always broadcasting and talking, but we don't usually have such an issue.
We do feel that there is an issue with people targeting this...
No videos doesn't help.
Well, Richard, I guess I could hang up on you and call you back and see if we can bring you on a phone line if we have to.
That's the only thing I can think of at this exact moment.
Anyone else?
I'm not sure what else to suggest, actually.
So...
Let's hang up this call, and I'll call you back on Skype.
If that doesn't work, then you can give me a phone number to call you on, and we'll try you on a phone line.
Is that alright?
Yeah, that sounds fine, Carrie.
Alright, so stand by.
by I'm going to call you back.
Hello.
Hi.
Okay.
We can see if the audience thinks this is any better.
Keep the video off and we'll continue.
Alright.
So, very sorry.
Can you just back up a couple steps?
You were talking about some individuals that you think are heading up the targeting program.
That's correct.
The CIA handles the funds from the black budget, and those funds go to what's called the National Intelligence Program, and the Office of the Director of National Intelligence doles out those funds, but really does it at the discretion of the CIA. So the CIA is highly involved in that process.
The three main recipients are the Air Force Space Command, the 15th Wing, the Office of the Director of National Intelligence, and the Department of Justice under John Dewars.
And I do have a chart on that.
The gang stalking is run out of the fusion centers.
How do we know that?
We know that because three police whistleblowers last year came forward and told us that the fusion centers are The control stations for all the gang-stalking, there's a minimum of one fusion center in every state, and that's how the gang-stalking is organized in each state.
In Texas, we've actually got, I believe, three or four fusion centers, and the main one is in Austin, the capital, but we also have one near Dallas and one in Houston.
So the local offices will handle that gang-stalking operation, and grant money is provided from the National Intelligence Program to set up and hire all these people that then go about harassing these targeted individuals 24 hours a day.
And it's all done under the guise, and here's the code word, counterterrorism.
Counterterrorism really means gang-stalking.
Ninety percent of what they do is gang-stalking.
The other ten percent of the time they spend pretending that they're fighting terrorists.
They talk about terrorism.
They talk about, you know, difficult terrorists in foreign countries.
But the main reason that we know that this is all a shill is in 2012, the State Department, in fact, every year the State Department puts out a list They have each one of their country managers, so the State Department has set up regions like the Middle East or Asia, and then under that, each country has country managers and analysts that analyze everything going on in that specific country.
Okay, I'm very sorry.
You know, they're really, I guess they're really hitting us hard.
What I want to do here is call you on a phone line.
So Richard, let's back up slightly and go back to the individuals that you believe are running the program and how, perhaps you can tell us how you got, you zeroed in on those particular people.
Okay, yeah, that's a good place to back up.
So, I do have a slide that's called Figure P1, P as in Paul.
It's on my website.
It's in a number of my books, my recent books that are free at rlighthouse.com.
All of my ebooks for targeted individuals are free.
So, this is what I've been able to track down.
The CIA operations group is headed by Elizabeth Kimber.
She handles the day-to-day operations at the CIA that includes the targeted individual program.
In this overview slide, and again, there are many more people involved than just these people I've identified on this chart.
The entire groups and organizations that I've identified, for example, in the Justice Department, they have a group called the National Security Division.
So basically everyone in that division, and they've got a number of sub-managers that manage specific tasks, But their ultra-high secrecy and their onus on a day-to-day basis has nothing to do with national security.
That's a shill.
Their goal is control of the population.
And they are one segment out of that agenda.
So we have at the top Elizabeth Kimber.
Directed energy weapons are run out of Schreiber Air Force Base.
The commander there is General John Raymond.
The 50th Wing is where all of the illegal activity is focused.
And I'll get into the details of how that plays into the bigger picture.
I'll get into some of the details of how the tracking works.
But I wanted to lay out an overview of the TI program because it's a subset and explain why the Air Force had to have this tracking system.
And then they decided they would roll it out and just use it on everyone.
So they started tracking everyone, even if you're not a targeted individual.
By obtaining the precise GPS coordinates from one second to the next, it gives them the The ability to hit your head with subliminal messages, and that's the end goal of the tracking.
Just knowing where you are from one second to the next, particularly in our country where people have cell phones, where cell phone usage is very high, that's not particularly helpful information.
But knowing the precise GPS coordinates of your head and being able to aim Subliminal messages that are sent through focused microwave beams at your head 24 hours a day, that's valuable.
That's the purpose of the system.
The system is used for tracking you so they can take advantage of you.
That's really what it's all about.
And I summarized that on another diagram that's called How the U.S. Air Force Tracks Everyone.
And I do mean everyone, including children.
Most people will discover if they sit in a very quiet moment, they'll discover that they have ringing in one or both ears.
It's a very high-pitched, noticeable ringing that's fairly constant.
That ringing is there because you're getting hit with microwaves.
And as soon as the microwaves get turned off, that ringing will go away.
So what it's doing is it's vibrating your brain.
There's a number of scientists that worked for the military for many years.
If you go to a website called biggerthansnowden.com, you'll find Dr.
Douglas Rock, R-O-K-K-E. He was involved with some of the system design that discovered The Phi Effect, which actually goes all the way back to about 1960, could send messages to your brain.
But the reason that works so well is because your brain actually has a natural resonant frequency in the same way that a wine glass Or a tuning fork has a natural resonant frequency.
Your brain also has a natural resonant frequency.
And it's between about 400 megahertz, about 420 megahertz to about 480 megahertz for most people.
Now, what can be done is the people that are suffering from the U2K, the voice to skull phenomenon, what they're doing is they're using that optimal range within that frequency so that the voice comes through loud and clear.
But if they go outside of that range, say up to 520 megahertz, what happens is the message is still present and your subconscious mind can pick it up.
So what I'm really saying is everyone gets the voice-to-skull phenomenon that they use.
A frequency that's less efficient so that your brain picks it up subliminally and doesn't actually hear it, doesn't get translated into a frequency range that's audible to your conscious mind.
So it's really, they're using the same phenomena that's used for voice to call and they use it at a non-optimal frequency which causes it to be picked up by the subliminal mind, if that makes sense.
Let me get back to organization charts because that helps people understand who all is involved.
For 30 years, people have been filing lawsuits on this issue and trying to get Senators and Congressmen aware of what's going on.
This is an unacknowledged special access program.
It's called a USAP. All USAPs are illegal.
They violate the Constitution.
If you're a whistleblower and you blow the whistle on an illegal program such as a USAP, you cannot be charged with a crime because the program itself is illegal.
So, I encourage whistleblowers to come out.
You cannot be charged with a crime for exposing a USAP. And the person that has explained that repeatedly is Dr.
Stephen Greer.
And he's one of the experts in terms of being exposed to many, many whistleblowers, just like you, Kerry.
And his opinion is, to date, no one has been charged with crime or exposing a USAP. So that's helpful information.
If you're on the fence and you're involved in one of these programs, we encourage you to blow the whistle.
There's a number of good ways to do that.
Cary is certainly one of the best resources for whistleblowers.
There's other ones out there, and there's ways that you can get messages that are fully encrypted to whomever, and I encourage you to research that, not on your work computer, and find out the best way to do that so that you don't have to deliberately expose yourself.
Okay, so people are still complaining about the sound.
I'm not sure why.
I don't know what is going on.
As I can say, I can hear you fine.
Some people don't...
I don't know.
They're acting as though they can't hear.
I don't really...
They're saying silence, no sound.
It's really the oddest thing.
That means that they're going through YouTube to screw with me, basically.
so it doesn't matter what we're doing at our end apparently um okay I can't understand I've got my volume up as high as it will go.
I've been doing this.
I had a perfectly fine reception last night.
There was no problems.
So, I guess what I can do is kind of keep you on the line and start another, you know, YouTube session and see if we solve it that way.
And in the meanwhile, I'll just have to let everyone in the chat know that's what we're doing and people that can hear us that aren't possibly in the chat Okay.
I'm just typing because they seem to act as though they can't hear me.
I'm just typing.
Because that's the only thing I can imagine.
They're directly interfering with this particular broadcast.
So, strangely, YouTube may have recorded this.
So, when I close it down, it will go immediately onto YouTube, what we've talked about so far.
So, it's not lost.
I've also been recording on my own on another device.
So, none of this is lost.
So, don't despair.
And we will come back.
You stay right where you are on the phone and...
We will see if we can do another YouTube, okay?
So stay right there.
I'm starting over here with the YouTube because I have done other shows where YouTube directly does interfere with me.
I've even had them completely hang up on me.
And these things are supposed to be unheard of because they have so much bandwidth and they have so much this and that.
But if they want to attack me, they do.
And they've done that a few times.
So stand by and we'll see where we go from here.
So I just ended that show.
What I'm going to do at the same time, before I start up, I'm rebooting my computer in case there's some weird thing that they've gotten into my computer.
And And I'll see you
next time.
Hi, everyone. everyone.
I'm Carrie Cassidy from Project Camelot, and we are doing part two with Richard Lighthouse because we've been having so much interference and YouTube refused to broadcast our sound.
I don't know whether it was recorded on YouTube or not, the previous part one, but we're going to hope for the best in this version.
So I'm going to quickly put on the identifying the name of the show and so on and so forth and then also reintroduce you just very briefly to our guest who is Richard Lighthouse as I say formally with NASA and Richard you are now on the screen and please say hello everyone Hi
good evening everyone and Kerry thanks for having me on your show Hi.
Okay, so at this point, what we're going to do is hope the previous version was recorded, but if you need to go over any sort of particulars, feel free to do that, and then we're going to hope that the sound is clear.
Some people are saying that they can hear us this time around.
So...
Maybe what we didn't do last time is we didn't cover your background, and so why don't you talk a little bit about your background?
You have written 100 books.
You've got to be very motivated to write 100 books, I think.
That's correct, Carrie.
I am very motivated.
I want to solve this fundamental problem.
The corruption in our government is, unfortunately, way out of control.
The deep state has taken over many of our government agencies, and we've seen the rise of a police state in a very short period of time.
And the targeted individual program is certainly one segment of that, but exposing it It's extremely helpful because it identifies these specific departments at the Department of Justice, the FBI, the Department of Homeland Security.
Now we know specifically which groups and organizations are hidden within the shadow government that are involved with this level of corruption.
And it's truly mind-boggling the level of horrific activities that some of these departments and senior leaders can get into And go to work every day and torture people.
That is beyond my comprehension.
And yet they do it.
So I can't explain why anyone would be willing to participate in that.
But I will outline the specific people and groups that we have found and I'll tell you how we know.
Before we do that, I would like you to explain why you're qualified, and you are very qualified, to tell people what your background is such that you were able to identify these players and also understand the technology.
Well, I would say my background in engineering, I have a bachelor's degree in aerospace engineering, and I was involved in the aerospace field for a number of years.
I then got a master's degree in mechanical engineering from Stanford.
I continued my own development of rocket engines.
I came up with my own design, built, tested, and fired them early on, or I should say later on in my career.
So I became very knowledgeable on a number of levels that was unusual back in the late 80s and early 90s.
So my father worked back during the golden era, the Apollo moon landings.
He was close friends with a number of astronauts, so I saw that as a young boy and was really enthralled with it.
So that was a big part of my inspiration.
So I was exposed very early on to the various technologies, how orbital mechanics work, the equations that revolve, why issues around the mass are so sensitive, And critical to the design.
So all of those things that you study in aerospace engineering, I was exposed to at a very early age.
I started flying airplanes when I was 15 years old and actually flew an airplane by myself when I was 16 before I had my driver's license.
So I was actually taking a bus or riding my motorcycle down to Hobby Airport and flying an airplane by myself, but I wasn't legally allowed to drive a car.
So that's kind of unusual.
So my interest in technology and aviation and aerospace goes way back.
I love math.
I'm very good at math.
And I'm not sure if that qualifies me any better than anyone else.
It's just the background that I had that helped me solve some of these problems.
Okay, now you have been focusing on various areas in your various books.
Can you cover some of the topics your other books are concerned with and how you ended up here with the targeting issue?
Well, I got exposed to the targeting and really wanted to understand it.
I'm disappointed I wasn't able to figure it out sooner, but I do know The government agencies are involved.
I was the first person to identify Shriver Air Force Base as the operations center for the directed energy weapons.
Dr.
Bill Deagle gave an excellent, and it's available on my website, it's about a five minute video.
He certainly exposed some of the deep state activities that have been going on there for a number of years.
But, excuse me, but I don't think he had any idea That the early beginnings of the targeted individual program were being run out of Schreber Air Force Base.
It's a deep underground base, or I should say deep underground military base, what they call a dumb base, D-U-M-B. And he was exposed to it and has spent a great deal of time on talk shows telling people what's going on.
And there are many people that are not targeted individuals that are aware of the corruption at Schreber Air Force Base and in the Air Force Base Command.
Now it's clear that the President wants to take that group and use it as a core to build a new space command.
And my concerns are the fact that we're already violating the 1967 Outer Space Treaty, so putting this group together and flagrantly telling the world not only are we violating our treaties, we're going to do it worse.
And so the correct thing to do would be not violate the treaty in the first place, which we've been doing for many years.
I'll touch on briefly, in a few minutes, the latest GPS tracking satellite that was launched here in December.
It's called the Block III technology.
This is a very advanced version of these tracking satellites, and one satellite can literally track everyone in North America.
Everyone.
So I would say, based on my calculations, about 800 million people can be tracked from one satellite.
That's everyone in North America.
It's an amazing technical feat.
Now, what they plan to do is they plan to build 10 of these satellites.
And if you quickly do the math, you'll figure out, well, that means roughly 8 billion people can be tracked.
Our planet now holds about 7.5, so it's very clear the direction they're going with this capability.
They want to track everyone on the planet, not just the people in the Western countries.
So that's interesting and disturbing on a whole new level.
If I can kind of segue back around, I'll cover the overview of the targeted individual program and the reason why this segues into understanding how people are being tracked This was the original reason they wanted to track people, so that they could hit them with these directed energy weapons.
And it wasn't until they incorporated the Fry Effect and realized that they could also send subliminal messages 24 hours a day at anyone that they could track.
If you know the precise coordinates of the top back of their head, you can take off two or three inches and move it two or three inches forward and hit them all day long, all night long, With a subliminal message.
It could be anything.
It could be anything.
What we're seeing, some of the things that we're seeing, is extremely high suicide rate with veterans.
That is absolutely unbelievable.
Why is the suicide rate so extreme for veterans?
In my opinion, this is part of the culling.
They have decided to use this subliminal technology to convince people that their lives are not worth living.
And these people are not, they're being set up.
They're being hit with subliminal messages over and over and over again, possibly as well as the directed energy weapons that can cause a great deal of pain.
And so we're seeing an extremely high suicide rate in veterans.
And it's not just recent veterans, it's veterans going back to the Vietnam War and even earlier.
So no one has been able to explain what is going on with our veterans.
It's my opinion that they are the victims of the very technology that I'm describing.
So very important to understand what that technology can do.
Alright, so hopefully people can hear me.
People said the sound started out good.
They're now saying it's problematic.
I don't know if that's true or not.
What I can say is, for those of you who think it's my ineptitude, I do this all the time, listen to my other shows.
You can hear them in most cases unless they're trying to interfere, which they are doing with this guest.
This guest has a lot of very important things to say.
I don't know if you can't understand me or him, but please know that we are recording this and we will put it up when the interview is done because we are recording this on a different device.
YouTube is interfering with us.
And if you don't like what's happening here, if you're not willing to try to get the best information out there, which Project Camelot has, you must understand that we are being sabotaged, and this is not the only time that has happened, okay?
And I appreciate everyone's trying to listen.
I'm sorry for the trouble.
But we are going to be recording this and get it up after the interview is over.
I believe we'll salvage it.
So I'm not going to be able to comment further on this.
We're just going to go through the interview and just rest assured we'll put it up after this is over and try to improve the sound as best we can.
It's actually fine at my end, believe it or not, and I think Richard can hear me fine.
Yes, I can.
I hear you loud and clear, Carrie.
Excellent.
Okay, so go right ahead.
We're going to continue now.
And the one question you didn't answer is, what are the topics of your other books?
If you could just briefly run down a list of topics that you have written books on.
It doesn't have to be everything, because obviously there's a hundred of them, so we can't cover everything.
Well, one of the topics, and we covered this in the April 2017 interview that I did with you, Kerry.
Thank you for that.
We covered what I feel is a very important scientific discovery.
And it's difficult to get your arms around it first, but it solves a large number of problems in physics quite handily.
And the basic concept is that our universe literally blinks off and on.
And that cycle is about 1.1 trillion cycles per second.
What that means, we're going to have to rewrite physics and our understanding of the universe because it means that all of time and space are an illusion.
It's not a continuous event.
Time itself is simultaneous.
It's not sequential and it is discrete.
That's disturbing on a number of levels because it tells us that we're going to have to change what we understand about Newtonian as well as Einstein mechanics.
It does solve...
I've presented a number of simple equations for scientists and mathematicians to look at.
I've successfully unified gravity and electromagnetism.
No one has ever provided simple mathematical proof to show how those two things can become one.
Very, very important.
I've provided the first equations that show how the four fundamental forces are really derived from a single force.
They are different aspects of one force.
That's very important.
No one has ever presented any math to suggest that.
That's the goal.
That was Einstein's goal for many years.
Unifying physics.
And the unification is achieved by understanding that our universe literally blinks off and on.
So I think it's a big deal.
Unfortunately, it creates a new technology that can be exploited for weapons.
And that's my biggest concern for it.
I have no intention of helping the weapons manufacturers develop new weapons.
And for that reason, I have not presented some of my ideas or published them because I know what they can be used for.
So I have held back.
As much as I've published, there are things that I have not published.
So, that's a brief segue on my background and I think one of the reasons that these intelligence agencies became interested in my work and trying to keep it hidden, unfortunately.
But I do think it's been published and it's been out there and available to other countries and governments and I think it can improve, it has the ability to improve the standard of living for everyone on the planet.
It can extend human life.
I published a paper suggesting that it can extend human life to 300 years or more by using, exploiting this technology that the universe blinks on and off.
It will basically allow us to reverse aging using electrical charges.
There's so many applications for this.
So many.
Floating cities can be designed and built.
I published a book on that.
Jumping, instantaneous jumps from, say, Los Angeles to New York City can be done with this technology.
It has so many applications and uses that it will literally overhaul the world that we know and understand very quickly.
So I'm excited about it.
I continue to talk about it while also trying to solve this puzzle of why folks in our government would want to harm other people.
It makes absolutely no sense to me.
It's been going on for at least 30 years.
Harlan Gerrard was one of the first people that made note of, I believe around 1987, that he was being hit with satellite weapons, and he's quite certain they were coming from satellites, and he was correct.
The name of the weapon was not available until I identified it through my research.
It's called a Vercator.
It was patented by a man named Donald J. Sullivan in 1982.
And he was working under an Air Force research contract for Mission Research Corporation in Albuquerque.
When he received that patent, he immediately signed it to the U.S. Air Force.
And the Air Force gave it to a company called the Titan Corporation in San Leandro, California.
And they began to produce it.
And they produced, I want to say, somewhere around 24 to 30 of these in the late 1980s that were put into orbit.
And they started doing a number of tests on them.
The fact that Harlan was hit very quickly in 1987 tells us the Star Wars program, as described by President Reagan, that was a cover for what they really wanted to do, was target people on the ground, which is what they did to Harlan.
He became a research subject and a victim of these assaults.
And the fact that our government, the Air Force, would put up these weapons that should be designed to take out a missile, not a person, and Within a very short period of time, they started pointing at people on the ground.
It's mind-boggling to me why anyone would even think of doing that.
Attacking your own citizens in your own country.
Why would anybody do that?
It violates the Constitution on so many levels.
It's immoral, it's unethical, and it's a violation of the Geneva Conventions.
Yes, it was used during the Iraq war on the troops in Iraq that were trying to defend Iraq and that were on the side of Saddam Hussein.
If you recall, there were stories of them laying down their weapons and walking away.
It was a mind control targeting that happened and they've been using it as a wartime weapon.
Of course, it is now being turned on And has been turned on the populations.
Yes.
So let's go briefly over your charts that you've got, and if you could redirect people again to your charts.
Sure, Karen, yeah.
The overview program, or the overview slide is this one.
It's available on my website, a number of websites.
And in many of my e-books.
It's fairly recent.
I've updated it a number of times.
You'll see the basic organization.
You'll see where the gang stalking comes in.
You'll see that David Glaw heads up the fusion centers functionally and provides the funding through the National Intelligence Program.
This is part of the one segment of the targeted individual program that includes tracking and databases and being exposed to the directed energy weapons.
So I've got those folks listed.
I've listed the groups.
The main groups involved are CIA operations, the Air Force Space Command 50th Wing, the Office of the Director of National Intelligence, Department of Homeland Security Intelligence and Analysis Office, the Department of Justice National Security Division,
Headed by John Dewars, and the FBI National Security Branch that's actually headed by JTAB. Now, I'm not showing him on here, but Charles Cable actually runs the database, and his boss is a man by the name of JTAB. And then the Homeland Security Intelligence Committee is a meeting place that puts many of these people into the room to solve various technical issues and coordinate between the departments.
So that's kind of an overview.
It's very helpful.
Now, the reason that everyone's being tracked, let's get back to why are they trying to track people.
Initially, they wanted to track folks just for the targeted individual program, but their force quickly realized that as they scaled up these computers that were based on these satellites, they could track very precisely within one centimeter The top part of anybody's head,
and this is not just targeted individuals, this is true for anybody, you can put your hand firmly, place it firmly on the top back part of your head and hold it there for about 30 seconds, and you will start to feel microwave pulses.
If that doesn't work, you can try your forearm, put your forearm over that, and you should be able to feel the pulses.
What they use from that is they identify the location of your head specifically, So that they can shoot subliminal messages at your head night or day, particularly when you're sleeping.
So one of the things that I suggest to filter and block these very negative subliminal messages is I will only react to constructive suggestions.
That's a very powerful subconscious or subliminal programming that will block much of the negative suggestions that people such as our veterans are experiencing.
I wish I could inform people about this because it's very effective.
Let me walk through these six different steps that the Air Force uses.
And again, this is a very basic overview.
There's lots of complexities to this.
They've got nine different weapon systems that they can input into this system to use to fire at anybody in the world, whether they're civilian or an opposing military force.
So this is just a basic overview, okay?
I've gotten a lot of questions about where's the verticators.
Well, I'm just trying to show people how they're tracked.
But within that tracking, they can also use other weapons once they know your precise GPS coordinates.
And that's true for anybody, not just targeted individuals.
So the first satellite that they use for the tracking is called the NAVSTAR. This is a very old satellite program.
It goes back many years.
It is a GPS satellite.
Its function is to precisely identify your GPS coordinates.
Latitude, longitude, and elevation.
Now there's a couple of ways they can do that.
They don't have to bounce a beam off the top of your head.
They can also use four different satellites that simultaneously track your head and they know precisely what the elevation is.
So they don't have to bounce a beam.
This is one of the ways they can do it.
That satellite is operated by the 2nd Squadron in the 50th Space Wing at Schriever Air Force Base, the underground facility.
The frequency that they use to do that is between 3600 and 3750 MHz.
I've measured it many times in many different locations.
Same frequency.
If you look up on the FCC tables, it tells you this frequency band is reserved for satellite to ground signals.
They tell you what it's reserved for.
So, That reflected signal is then relayed, and you go to number three there, the precise coordinates are sent to what are called the WGS satellites, the wideband gap satellites.
Those satellites are stationed in geosynchronous orbit because the NASSTAR GPS satellite is about 12,000 nautical miles up.
It's like halfway to a geosynchronous orbit, and it has an orbital time of about 12 hours Whereas the WGS satellites are stationary above a single point.
So they can relay one of the precise coordinates that you're at to the WGS satellite that will then download it to Schriever Air Force Base.
So even though the satellite might be out of range, it might be over Australia.
And it's taking a reading or getting a position or fix on someone, and it sends it to a WGS satellite, That's above the United States that then transmits it to Schriever.
So that's why you've got this relay system built in.
And these WGS satellites are designed just to capture and transmit data at very high rates of speed.
That's all they do.
Actually, they could have a weapon in it as well, but the primary purpose is simply to transfer data from the NASSTAR, primarily the NASSTAR satellites, to Schriever Air Force Base.
That's their function.
They're operated by the 4th Squadron.
Now, at Schriever Air Force Base, They've got 1,300 personnel in the 50th Wing.
How do we know that?
They announced it on social media.
We've got a number of folks that bragged about all the things they were doing at Schriever Air Force Base.
And I'm not going to name any names, but I did save the information.
And in particular, one of them said, we've got nine different weapon systems in orbit.
They're in seven different satellite constellation systems.
And there's 1,300 operational People that are trained and know how to fire those weapons.
Operate the satellites, maintain them, and fire the weapons.
So that's not a huge number when you think about it.
We've got more than 1 million targeted individuals worldwide, and the primary operations of those satellites is run by 1,300 people.
So that tells us right away it has to be automated.
You can't manually track and target that many people when you've only got 1,300 to work with.
So we know it has to be automated.
That's what the supercomputer does.
It takes those coordinates and feeds them sequentially so that the satellites that you do tracking or the weapon system can be fired many, many times.
Now this is...
This is something that most people are going to have difficulty getting their arms around, but some of these antennas do what's called digital beamforming.
Look that term up.
What it does is it takes a satellite antenna and it uses it to form what you would call a bullet.
And it can do it a hundred million times a second and direct that bullet in a different direction.
It's all done electrically, electromagnetically.
It's not like mechanically firing a rifle and then having to use a mechanical gear that moves it and then fires it again.
It's not like that.
The antenna can change the direction that it's firing instantly, 100 million times a second or more.
So they can track and hit people at an incredible rate.
It's really an incredible feat of engineering.
Unfortunately, they're using it for some really horrible things.
So, we would like to shut that down.
The main thing that they want, that the deep state wants, is control.
They want control of your mind.
So this entire system is set up so that they can send subliminal messages at your head 24 hours a day.
That's the purpose of this tracking system.
If we can get you to do anything we say 24 hours a day, mostly have control.
Now, to what degree?
There's a lot of debate on what to do.
But I encourage everyone, whether you're a targeted individual or not, everyone is being hit with these messages, not just targeted individuals.
The targeted individual community gets it the worst, but everybody basically gets the same tracking system and the same subliminal messages.
They're just not aware of it.
When I mean everybody, I mean even the Air Force personnel, even the CIA personnel.
They haven't told them that they're on the list to be tracked.
That's what's so amazing about it.
The Council on Foreign Relations, their people are getting hit in track, and they're completely unaware of it.
It's really, truly both amazing and disturbing that this is going on, but I'm hoping by getting this information out that we can shut down this program.
So here's a couple of suggestions I can do for those folks that want to learn more.
There's a website called, and it's listed on this diagram down here in the bottom corner, You'll see a website called inthesky.org, and I've got a specific reference.
What you can do is pull that up, and it will show you a map, a circular map, where you sit at the center of the map.
You've got to put in your location, whether it's Houston, Texas, or Los Angeles, or wherever you're at.
You've got to put in the right city for that, and you've got to put in the right time of day, and it will show you where all of these NASSTAR satellites are located over you, And then you can put your hand on your head and you can feel the direction that the one is coming from.
You can identify the specific satellite that is hitting you on the top of the head.
How about that?
Anyone can do this.
Pretty amazing.
That is amazing.
Now I'm going to actually put this on the screen here since we are...
We're recording this for, and I don't know whether we'll have visual.
I will try to actually do an edited version of this where we do edit in some visuals.
And if you want to make some available to me, that would be great.
I'm looking at, let's see, inthesky.org and where it's at right now.
So it says it's in Los Angeles, longitude 3405 north.
118.24 West and Pacific Time Zone.
Okay.
And if you go to the tab that says Satellites, if you click on the tab that says Satellites, you'll see a black circle that comes up and you're located at the middle of that circle.
Okay.
Do you see that?
Look, I see the middle of the circle.
It says GPS 6.
There you go.
Okay.
So, now you have to pay attention to the north and south orientation on that map.
So what you want is you want the south to be at the top.
Okay?
And then what you do is you take that south location and you hold it over your head while you're facing north and you look up.
And you can see you will be able to literally point to the satellite that's hitting you on the back of the head.
Does that make sense?
You want to stand looking north and put the south on the top of the page and hold it over your head like that.
You're at the center of that circle and you'll notice that the satellite that is the closest to you to your south is the one that's hitting you almost all the time.
That's the way the system is designed and you can feel it yourself.
You can feel the pulses on the back of your head And you can wave your hand over the direction.
Sometimes it'll be further south at maybe a 45 degree angle.
Sometimes it'll be near vertical.
But you can wave your hand back and forth and you can literally feel the pulses.
It's about once a second.
And you'll be able to feel that.
And you can identify the specific satellite.
They move very slowly across the sky.
They've got a 12 hour orbital period.
So it would be equivalent to Moving only twice as fast as the sun across the sky.
So it's very slow.
And you can point at that satellite and say, that's the one that's tracking me right now.
And it sounds like in your case it might be GPS number 6.
But it'll be the one that's the closest to the center and immediately to your south if you're facing north.
Does that make sense?
Yeah.
Anybody can do that.
Alright.
Excellent.
Alright, so now you've named some of the people that you think are the perpetrators.
Where are you going to go with this information?
I mean, you're on my show.
We're getting all kinds of interference.
What is your suggestion, really?
Well, we need to inform our senators and congressmen, and we need to shut it down.
That's the first thing.
I encourage folks to write to their senators and congressmen.
Just a short message would be very helpful.
If you go to your elected representatives, they've got a website, and they'll have a little form you can fill out online just to send them a short message on anything.
Excuse me, I'm amazed at how many people have never done that.
Send your senator and elected congressman a short message and say, we are all being tracked by the Air Force Space Command, the 50th Wing at Schriever Air Force Base, and I want it stopped.
I don't want my tax dollars spent on this.
It's illegal.
It's unconstitutional.
And most likely the president doesn't even know about it.
Many congressmen and senators don't know about it.
It's that classified.
We've got to shut it down.
The best way, one of the best ways to shut it down, is transparency.
Bring it out in the light of day.
Tell people it's happening.
Now these folks that I've identified that run the gang stalking and the database Pretending that targeted individuals are terrorists when they're really non-investigative subjects.
There's another code word.
I want to talk about code words very quickly.
This is apparently true all over the world because they've put this same program, they've tried to scale it up and spread it out all over the world.
So, counter-terrorism is the code word for gang-stalking.
90% of the time they're talking about gang-stalking, not terrorism.
Okay?
Counterintelligence, that's another code word.
It has nothing to do with intelligence.
It's disinformation and propaganda.
When you see in the Target of Justice a group that's called counterintelligence, they ain't doing anything with intelligence.
They're propaganda and disinformation.
That's their job.
And they're going to cover it up and say, it's national security, we can't tell you what we're doing.
Baloney.
Their primary mission is disinformation.
That's what they do with that counterintelligence.
Another code word, non-investigative subject.
Ninety percent or more of all of the people listed as terrorists in the terror watch list are targeted individuals.
They are non-investigative subjects.
They have nothing to do with terrorism.
How do we know that?
In 2012, the latest data that I have found is 2012, the State Department has country experts that were told to count up the number of terrorist organizations.
I think right now there's around 51 or 55 organizations worldwide that have been identified as terroristic organizations.
Now, I have reason to be skeptical about that, but they're just not toeing the line that the CIA wants, so they're listed as a terrorist organization.
But these country managers are told to count up the possible number of terrorists in this group, so-called terrorists.
They do this every year.
In 2012, the total number That the State Department could count up.
And this is using the most generous numbers they could find.
So if they said, well, we think this Al-Qaeda group that's an affiliate in Yemen, we think they've got anywhere from 1 to 300 people.
So the number they put on the list is 300.
It's a maximum number.
And they do that deliberately because they want to justify more expenditures on this stuff.
So if the country manager says it's 1 to 300 people, they'll put down 300 on the list.
The total number they came up with worldwide was 184,000 people in 2012.
Do you know how many terrorist records there were in the database at that time?
Almost one million.
So the FBI and the National Counterterrorism Center claim that they know the names and addresses and birth dates for almost a million terrorists, but the State Department can't find any more than 184,000.
And that was in 2012.
And the two numbers have diverged even more.
Now we've got more than 2 million records, something like 2.5 million records, I think.
You get varying accounts, depending on which senator and congressman you ask, but the number has grown somewhere north of 2 million today.
And...
Clearly, the vast majority of names on this list are not terrorists.
They're targeted individuals that are being tracked globally.
That's the whole point of this exercise, is to get control of people.
And they're going to use this group, try to leverage this group, as fear and intimidation on other people so they don't blow the whistle, so they stay in line, so they do what they're told.
That's the whole point of this exercise.
But they've got to be able to track them, and they've got to be able to hit them with the weapons, but at the same time they're doing that, they're also hitting everybody else with subliminal message.
So the targeted individuals get the worst of it, and the general population still gets the voice messages that are received subliminally.
They still get tracked, and they get microwaves on the top of their head, and they still get brain damage from it.
So the general population is getting the same thing that targeted individuals get.
This is a huge program.
It is a conspiracy that is beyond any conspiracy in the history of mankind.
This is big, big.
In terms of your book and your research, have you written only one book on this particular topic so far?
For those that want to learn more about the tracking and the technology, I recommend my free e-book that's called Satellites and Weapons of the Air Force Space Command.
Write that down.
Satellites and Weapons of the Air Force Space Command.
What I do is I divide up the 50th wing group and I show you how they're organized.
I show you which squadrons are operating which weapons and which satellites.
That's very important for people that want to understand how this is being done.
For people that want to understand where the money goes to the fusion centers for the gang stalking, that goes through the Department of Homeland Security, the Intelligence and Analysis Group.
And as you can tell, very quickly, it has nothing to do with intelligence.
It has to do with gang stalking.
But these are the code words they use to tell everybody it's national security and we can't talk to you about it.
So they had to come up with these code words.
So the Department of Homeland Security, the way they control the fusion centers, very important, The fusion centers actually are supposedly privately held, but all the money or the vast majority of the money for funding them comes from the Department of Homeland Security and the Director of National Intelligence.
So by controlling those purse strings, they can tell them, no, you need to do this, you'll follow this procedure, you'll follow this policy, and this is how you're going to handle these people, and when we transfer a phone call from a targeted individual, this is the way you're going to handle it.
And if you don't do that, you're not going to get funded next year.
So they have absolute control of these fusion centers.
They are not privately controlled.
They're controlled by the Department of Homeland Security.
Okay, now when you're referring to fusion centers, what exactly are you talking about?
Are you talking about FEMA centers that are set up when there's an emergency, like the California fires?
Are you talking about that?
Or when fusion center, what exactly do you mean by that word?
Okay, good question, Kerry.
A fusion center generally, and I've visited one of them.
There's one here in Houston on the north side of town.
And it's actually a city property building that's been rented out.
And early on a Sunday morning, I counted something like 150 cars there at 6 o'clock in the morning on a Sunday and a routine Sunday.
Nothing going on.
150 cars there.
And I'm thinking, what are they?
That's not even the emergency call center.
The emergency call center is on a completely different block five miles away.
What is 150 people doing at 6 o'clock on a Sunday morning?
I mean, it's pretty obvious if you go up to one of these fusion centers, do any amount of research, and you're going to find out it doesn't make sense.
What the heck are these guys doing?
So it's a well-staffed building that has sort of a war room and a command operations center, and they're supposed to be able to get Emergency calls.
They're supposed to be able to listen to police radios.
They're supposed to be able to talk to some of these support groups they use like InfraGard and Neighborhood Watch.
So these are the guys that carry out some of their gang stalking.
They're not the only ones.
They're just some of them that we have a lot of confidence that are involved.
So I encourage...
I'm not finished researching that.
I encourage others to research that.
I also want to stay generically...
I'm not asking anyone to take my word on any of this.
Do the research yourself.
I always put that in my e-books.
Don't take my word for it.
I've told you where to look.
Go and look for yourself.
I've given you the websites, dni.gov, justice.gov, dhs.gov.
Go and look up the org charts yourself and make your own conclusions.
I'm not asking anyone to take me at my word.
The best way for you to believe what's happening is to do the research yourself, and I encourage folks to do that.
Excellent.
Alright, so where are you going to go from here?
What's your next area of research?
Well, I may have identified two possible means for shutting down the targeted individual program.
It's speculative, but I am going to throw it out there.
It's an idea.
I'm allowed to express that idea as freedom of speech.
Whether or not somebody likes it, they can like it or lump it.
I don't really care.
The targeted individual program is unconstitutional.
It's wrong.
The way they handle the input, and I've posted some documents that were received from the ACLU through Freedom of Information requests.
They date back 10 years.
And if you go through those, you get a very good sense of how the terrorist screening center works.
That's Charles Cable at the FBI. Of how they input people.
It's all done manually.
So if they receive a form, and I've published a book where it's called the Standard Nomination Form, this is how they nominate someone to be a targeted individual.
They put them on the watch list.
And there's a very specific form they use to fill out, but it's not a government form.
There's no markings on it that identify it as a government form.
It has not gone through a very rigorous law that was called the Paperwork Reduction Act of 1995 that specifies how forms have to be done.
You won't find that form in the General Services Administration list of forms.
You will not find it in the Department of Defense listed forms.
In fact, you will find no country in the world where that form is listed.
It could belong to anybody, for all we know.
It is simply characters on a page that are filled out.
It says begin watch list data, and it asks for a name, an exact birth date, etc.
And I've got that listed in a book called the standard nomination form.
I encourage folks to look at that.
If you're a targeted individual, that's the form they use to make you and nominate you as a targeted individual.
Somebody filled that form out and handed it in.
So I encourage you to go look at it.
And you'll notice at the bottom, there's no signature.
Anybody can turn it in.
It's bizarre beyond belief.
Anybody can fill out that form and turn it in.
Anybody.
Now, because the system is manual, it's possible to flood it or jam it up with input.
And I sincerely hope that some governments and countries out there that are not friendly to the deep state will start logjamming that system by putting out bogus data and submitting it to...
This crooked watch list system that was set up primarily to track and target targeted individuals.
That's its primary function and purpose.
I hope that somebody's able to do that.
With a bot program or a network of computers, it would be very easy to train it to send bogus data 24 hours a day and completely flood and jam their system.
So it's completely dysfunctional.
That's one method.
Another method that I think is a little more practical is make the senior commanders in the Air Force and the CIA and the Council on Foreign Relations realize they're being tracked too.
They're completely unaware that their head is being hit with microwaves, their children's heads are being hit with microwaves and tracked, and those microwaves cause brain damage.
Make them aware of the program that they bought into that's being used against them.
They've been double-crossed by the CIA, that's what I'm saying.
All of these agencies and all of these corporations, including AT&T, Lockheed Martin, Boeing, all their employees, all the executives, are getting tracked and hit with the same microwave system.
It causes brain damage.
And the goal is to control them, too.
That's what they want.
These people are designing the satellite system.
They have no idea that it's being turned on them, including the Council on Foreign Relations.
I am hopeful that they will turn this around and shut it down.
Alright, are you aware of the network of nanosatellites that has been put in low Earth orbit by the Lockheed Martin scientists?
I think I mentioned it to you on an interview one time.
Anthony Sanchez is a software executive.
In Silicon Valley, who was contacted by these Lockheed Martin scientists, who went on the run, who told him it's called Project Leonid.
He has had his life threatened numerous times.
I did a very in-depth interview with him.
Afterwards, he went home.
He put his car in the garage.
He locked it.
He rolled up the windows.
He went to sleep.
He woke up in the morning, went out to his garage to get into his car.
And in the window, with the car still locked, was a message saying, stop talking or you will die.
And then I was also contacted by a Deep Black agent who asked me to deliver the message that they knew he was a patriot, that he wouldn't violate national security if he did, that he and his family would die.
I had to deliver that message to him.
These Lockheed Martin scientists did a test and found out and they started disappearing.
The scientists noticed their colleagues disappearing.
They went on the run.
They went into hiding.
But before they did that, they did a test to see what are the chances these self-replicating AI nanosatellites would turn on humans.
And they found that there was a 60% chance.
At that point, they didn't want to do it anymore, but it was too late.
Are you aware of this network of nanosatellites?
I have read a bit about the nanosatellites, yes.
I've heard some stories that seem to not completely corroborate other stories, but in general, it does appear to be a very aggressive research program that's Does not have good ends.
Right.
So, that's just another layer on what you're talking about.
Now, I want to ask you about the impact of 5G on all of this, because that has to be pretty monumental.
That's correct.
The real reason the government or the deep state wants the 5G is because they can track and hit more people at the same time.
With one of these new 5G antennas, you can track and hit...
Thousands and thousands of people from a single antenna all at the same time because it's got so much bandwidth and it does what's called digital beamforming.
I mentioned that before and I want you to look up that term.
I want listeners to look up that term.
What it means if you've got like a rectangular shaped antenna, the antenna itself is electromagnetically directing each bullet that's fired.
And it doesn't need to aim.
There's no gears that need to move or reorient the system because it's all done electrically.
And it can fire a microwave bullet that's generally about a half an inch in diameter, sometimes a little smaller.
And it can fire it up to 100 million times.
Some of these systems can fire 100 million times a second at a different target.
It's like having a machine gun that can automatically pick the next target much faster than you can think about it.
So that digital beamforming is a technology that's almost perfected when you go to 5G because it can handle much higher throughput.
And that's the real reason they want the 5G. You don't need to run streaming, you know, generally.
I know we had an example today that wasn't a good example, but the 5G, the kids that want to stream stuff and stream movies and everything else, going to a hundred times faster system is...
It's not really necessary, particularly given the risks that are involved with the microwaves.
And the microwaves will be used to harm people.
They are and they will be.
And so, yes, I am opposed to the 5G systems being outlaid.
Here's the key.
Here's the key to disrupt the weapons on them.
I wrote a book on it.
Vibration.
That's how you disrupt a satellite weapon.
That's how you disrupt a cell tower weapon.
Vibration.
You can do it by putting in a system that beats the base of the pole.
You can put a wash in it.
Any way that you can get it to vibrate or shake that pole, remotely or directly, it makes the weapon useless.
And that's true whether it's on a satellite or based on a cell tower.
If you shake it or vibrate it, the weapon becomes useless.
It cannot be pointed precisely.
Does that make sense?
Vibration is their biggest enemy.
And it's very effective.
Okay, so in terms of what I was told about the 5G is that it's not going to help our bandwidth, believe it or not.
That's what they're saying.
They're saying it is not going to help things like broadcasting and bandwidth.
Yeah, that doesn't surprise me.
I think it's an unfortunate overextension of our technology.
People have not been informed about it.
The FCC is kind of just shoving this down, our community collective wisdom, and it's just not right.
I do not support the outlay of the 5G. It's not needed, not necessary.
It's very dangerous.
It's being used for purposes other than telecommunications.
Okay.
Are you familiar with a researcher in England Whose name is Steel.
His last name is Steel.
I think his first name is Mark.
I'm trying to get him on the show.
He is British.
He's an electronic weapons expert.
He is saying that 5G is a weapons system.
I agree.
I absolutely agree.
Okay, what more can you tell us about any research you've done around the other agencies that are part of this and is the same thing going on in Europe?
Yes, good question, Terry.
What I want to encourage folks to do, the names that I've put out, my most recent e-book that I published that's free on my website, rlighthouse.com, Is what I consider, what I've labeled as the ten most wanted.
Ten most wanted people in the deep state that are affecting the targeted individual community.
And I've provided their names, I've provided their home addresses.
I am not encouraging anybody to commit an act of violence.
If you're a targeted individual, I abhor violence.
Why would I encourage?
That's the main reason I'm opposed to these programs.
So I am not encouraging violence in any way, shape, or form.
That's not going to help the situation.
Nor is it going to help the situation for someone to go and harass these people.
What will help is informing them.
Tell their family members and friends and neighbors what it is they do.
If you go up to David Glaw's neighbors where he lives, tell them what he does.
He works for the Department of Homeland Security, and he's the lead gang stalker.
And if you don't believe me, look it up.
Do your research.
This guy is involved in gang stalking.
Tell his neighbors.
Watch how fast it's going to cause problems in their lives.
Give them the proof.
Hand them a flyer.
These are the neighbors, the family members.
Tell them what's going on.
They have no idea.
None of them are aware.
I'm quite certain of it.
Tell them what their friend or family member is doing.
It's incomprehensible.
That will help to shut it down.
Tell them what they're doing.
Very simple.
Very effective.
And your second question was, is this going on in Europe?
Absolutely.
The gang stalking and the directed energy weapons has been well documented by Catherine Horton, Melanie Richan, a number of groups in Germany and Belgium, Norway.
It is a global phenomenon.
And the reason you can't escape it is if you go to that GPS satellite overhead map that I showed you, go anywhere in the world.
And what you find is those GPS satellites, there's at least four of them everywhere you go.
Everywhere.
You can't move to Nigeria and say, well, I'm going to get away from these directed energy waves.
No.
They're overhead.
They're satellites.
You're not going to get away from them.
Now, that's not necessarily bad news, but I hope you don't waste your money trying to get away from them.
What could get you away from them is a deep underground location.
Now, I've had a few people tell me they went into some of these deep caves trying to get away from them, and they were still getting hit.
And so my next question is, is there electrical lights down there?
And he said, well, yeah.
Well, then guess how they're doing it.
If they've got electricity at 600 feet down in the cave, then they've got a method to power a directed energy weapon even down in the cave.
That ain't rocket science.
Look for a private cave.
Go deep in the cave.
There is a limit to the technology.
Every technology has a limitation.
You can find that.
So I encourage folks to do that.
I've got two books that I'll reference for fighting back.
The first is called How to Fight Back.
If you're a targeted individual, I've got a long list of things you can do to fight back.
Some of them are very effective.
If you're getting gang stalked, read my book, Advice About Gang Stalking.
I've had so many people contact me and say, you know what, I did a few of the things that you suggested.
It shut down.
I haven't seen a gang stalker in weeks.
It works.
Look at the methods that I've suggested.
They're very simple and they work because you have to understand...
Their system is based on security clearances.
And if you violate their security clearances by giving people that are low on the totem pole information they're not allowed to have, the whole system breaks down.
Even their boss is not supposed to have that information.
So the only thing they can do is clear them out, saying, leave him alone.
He's going to give you a flyer that tells you stuff you're not allowed to know.
It shuts down very quickly.
I encourage folks to try.
It's very effective.
And it's the vulnerability they have is their security system.
They are very rigid about security clearance and who is allowed to know what.
And by giving the low people on the totem pole information they're not supposed to know and not supposed to have, the whole system paralyzes.
You're not supposed to have that.
You can't have that.
You're not allowed to know that.
They're not allowed to know the content on targetedjustice.com or many of the things on your website, Terry, or some of the things on my website, rlighthouse.com.
Those things are the highest security clearances for their people, and the people that work for them are not allowed to have that information.
So the whole system paralyzes when you give it to them.
Try it.
I encourage folks to try it.
Great.
Now, do you want to list some of those things that people can do in the interest of this video, or do you have other subjects related to this that you want to cover?
Well, sure.
Some of the things, some of the simple tricks you can do if you're a targeted individual, and I'm not the first one to cover this.
A lot of folks have covered this.
Putting little stickers on your car, let's say TargetedJustice.com or PAX International or Rethink911.org.
These are pieces of information that the perps, they call them perps, they're not supposed to have.
They're not supposed to know about those things.
What they're told, what these perps are told, is you're a terrorist.
So this is a bad person, and we know they're going to do bad stuff, so we need you out there harassing them every day.
That's how we keep them from doing bad stuff.
This is what they tell these perps, and these people actually believe it.
They never think for a second, wait a minute, this is illegal, you can't do that.
I guess the money's so good, it just flashes right through their head.
But they're told that these targeted individuals are bad people, and so we need to do these things to them.
Well, that's the farthest thing from the truth.
So by informing the perks what's going on, the whole system locks up.
Very effective.
Put stickers on the back of your car.
Put yard signs up.
You can get yard signs for $1 to $2 and put any little sign on it you want.
You can get them at Home Depot, Lowe's.
Put anything you want in there.
You can buy the stickers at Office Depot where they're pre-cut, pre-made letters.
And make your own sign.
This isn't a great expense.
For a few dollars, you can make a sign that will literally stop most of your game stalking.
Put a sign in your yard that says rethink911.org or targetedjustice.com.
That's information they're not supposed to have.
They're not supposed to know about that.
Very effective.
The car following, if you're being followed in your car on a regular basis, put the words or letters on the back of your window.
It doesn't have to be much.
It's just enough Excuse me.
They're not allowed to know.
They rigidly comply with that security system.
That is one of their greatest weaknesses.
And we can exploit that weakness.
They're very vulnerable.
You've got to know what they're vulnerable.
Their security system is their weakness.
Water pillows.
I strongly recommend water pillows for all TIs and non-TIs.
If you're getting hit with microwaves, and literally everyone is, You can buy small water pillows for anywhere from $15 to $30.
You can get them on Amazon or Walmart.
And you fill them up with one or two gallons of water.
The water literally absorbs some of the microwaves.
It doesn't absorb at all.
Your body is made of water.
Your body is mostly made of water.
But it will absorb and reduce the intensity of the microwave pulses.
So I get emails from all over the world of women that are being attacked In disturbing places on their body.
And I always recommend get a plastic bag and fill it with water.
One, two, three of them.
Get the gallon size baggies.
You can get them at Kroger's or HEB or whatever, Safeway.
Fill it with water.
Put a little bit of bleach in it.
And the bleach will, if you keep it a long time, will keep it from turning mildewy inside the bag.
And the ions actually help to block the signal as well.
So I recommend that.
Water bags or water pillows.
Very helpful.
So I recommend that.
Join a group.
Targetjustice.com has a membership of more than a thousand people.
Meetup.com has a large following of...
There's at least a dozen different meetup groups all over the United States.
If you're a targeted individual, join one of the groups.
Find out what's going on.
Try to help other people.
You can more effectively help yourself if you learn how to help other people.
And yes, I understand, particularly for the ladies, they're concerned that there's going to be perps at the meetings.
I get that, okay?
You would be surprised how unwilling those perps are to go to a meeting where 10 or 15 or 20 people there are not perps.
And a lot of those ladies have good intuition and they'll pick up on who's the perp right away.
They know.
They've gotten very good at it.
So...
It's not good territory for a perp.
And that's my experience after a couple of years of going to some of these meetups.
You're not likely to see a bunch of perps.
I have seen one or two.
It's not bad.
So I encourage the ladies to get out of the house.
And here's the primary reason for the ladies.
Get a buddy.
Find one or two ladies in that group that you feel comfortable with and trade phone numbers.
Get somebody that you can talk to that's not going to question your sanity.
It will try to help you if you get into a pinch.
That's always a good idea.
I suggest that for the ladies particularly.
The majority of targeted individuals that we've been able to identify, it's a majority female community.
So that's why I encourage the ladies to get to a meet-up group and find another lady or two that you feel you can connect with and trade phone numbers.
And you don't have to tell anybody else about it.
But having that buddy list is very helpful and very important, so I strongly recommend that.
Meetup.com, go there.
There's, as I mentioned, a number of groups.
If you're in Canada, Europe, there's groups there as well.
Join the groups.
Go to the meetings.
You can't sit in your house and be fearful for the rest of your life.
That's not any way to live your life.
Get out and meet other people and try to help.
You're not just going there to get help.
You can go there and help.
That's what I encourage you to do.
Maybe that was a long-winded response.
No, that's excellent.
Thank you.
Thank you very much.
I'm sure people will find those suggestions valuable.
Any other practical ways to deal with this satellite targeting?
Because many people, you know, I deal with targeted individuals.
I interview them constantly.
I'm constantly asked to interview them.
It's becoming repetitive, I'm afraid, but this is the name of the game right now, apparently, on planet Earth with the targeting.
I did mention, and I have mentioned, you can switch magnets in your pockets.
You can't keep them in your pockets for a long time, it's not healthy, but you can switch them around and interfere with the targeting for a bit.
And also switching crystals.
If you wear rings that have gems, you know, in essence crystals, switch your rings, take them off, put them in salt, sea salt, cleanse them, and then put other crystals on your body.
It confuses the beams.
Well, that's...
I encourage, if I can summarize, Kerry, I encourage folks to go and download my latest e-books.
They're free.
I never charge TIs for my free e-books.
They're downloaded all over the world.
I get questions.
I try to answer questions.
Unfortunately, my email and phone system are routinely blocked For hours at a time.
I don't know what I can do about that, but if I can get to your question, I will.
So please write to me.
My email address is available in most of my e-books, and I will try to help as much as I care.
Okay.
So going forward, is there anything else you want to talk about to do with, you know, Where do you see this going?
It sounds like you're working with some other people.
Do any of these other people have suggestions as to what direction people might go in the future?
There's a number of groups that are working on technical issues.
The Faraday Cage, there's a number of groups working on the Faraday Cages.
I have published some information and talked with a number of technical people about it.
Please know that there are technical people working to solve that problem.
If it was easy, we would have solved it a long time ago.
But there are people working on, for example, a decoder that will decode the V2K. And that's done with a software program called Software Defined Radio, SDR. And it is possible to decode the voices that are being beamed at your head so that everybody can hear it.
So it's just a frequency.
It's a higher frequency than we use for most radio transmissions, but it can be received on these small radio software systems and decoded off of the carrier way.
So there are a number of folks working on that.
We're very close to solving that.
That would go a long way.
It would be very effective evidence in a courtroom.
There are a number of people working to solve the Faraday cage issue.
I've done some of my own tests.
I've had some moderate success by using what I call an electric fence charger combined with a grounding system for the Faraday cage.
And I believe that's the right direction to work towards, is a medium to higher voltage system.
For these electric fence chargers, it's typically about 8,000 volts.
And it has a rotary switch, or I should say a digital switch, that sends it out about a pulse a second.
We actually need a higher pulse rate than that, and we need something that's variable.
So it's something I'm working on, but it clearly is, in my opinion, it's the right direction to go, so I'm working on that, as well as some other people that are working on it.
So please don't lose the faith.
There are folks working to solve these problems.
We are very aware that many people are struggling out there, and we want to help.
So I encourage you to join Targeted Justice in the lawsuit.
Pax International, Dr.
Katherine Horton has some excellent information on her website.
Ramola D. has some excellent information on her website, Everyday Concerned Citizen.
Ella Free is doing some amazing interviews.
Frank, up in Target, Massachusetts, is doing some outstanding work and helping folks in that part of the country.
So please join one of these groups and chime in, and you might even be able to help.
I really encourage you all to do that.
Okay, very good.
It looks like someone was asking about home break-ins, apparently, that aren't caught on camera.
Home surveillance cameras aren't catching these individuals.
Have you heard of that?
Yes, the cameras can get hacked.
There's no firewall on the cameras and there's no encryption.
When it's running the code, when the software or the firmware on the camera is running, it has no firewall and it has no protection.
The lines of code are not encrypted or protected anyway.
And that's standard for most electronic devices.
There's no protection on it.
So it's very easy for the NSA and the CIA and the FBI to hack these things.
And they can pause it and shut it off and do all kinds of weird things with it.
And there's a number of things that you can do that will help you use a camera for a short-term period of time.
For example, keep the battery and the little SD chip That carries the files, keep it outside the camera or partially removed from the camera all the time until you want to use it.
That makes it less susceptible and less vulnerable to being hacked.
It doesn't mean they won't hack it, but it's going to be hard for them to delete your files if it's not plugged into the camera.
So there's some simple things that you can do to protect against the deletion of those files, and I hear that kind of story a lot.
Unfortunately, The technology has just not evolved to where the firmware is encrypted or protected in any way.
But things are moving in that direction.
That's the good news.
Okay.
All right.
Fair enough.
We've been going for a while.
I'm sure you're kind of worn out by this, and I know that you're being targeted at this point.
And so I do appreciate you've been a trooper.
I really want to thank you so much for enduring these interruptions and this craziness.
Apparently, I've been looking to see periodically.
It looks like YouTube has absolutely not been broadcasting the picture.
They're recording it.
They're recording this, so I don't know what they're recording.
It's going to be a mystery when we're done with this.
We'll see what we end up with.
I'm recording this, so if we end up with nothing but audio, then that's what we've got.
But we might have a picture if we're lucky as well.
So, you know, needless to say, thank you so much.
I really do appreciate it.
And I know that everyone does appreciate your information.
And Richard, you're a wonderful man, and thank you so much for being there.
Thank you, Carrie.
Thanks very much for your time and your show.
Thank you.
All right.
So you take care.
I'm going to wind this up here and let you go.
So stand by.
I'm going to hang this up there.
Okay, everyone.
Thanks again for listening and for being there tonight.
It's been a crazy night, and I don't know.
YouTube has really been just brutal, and I don't know if even this statement here is being recorded or not, but I can tell you that...
It's been crazy.
So, okay, thank you for watching, and Camelot will be back tomorrow at 1 o'clock in the afternoon.
We'll be talking to a man named Mark Ward, who has a solution for taking down the Fed and also 5G, and so we'll talk to him about that, hopefully with no interference.