Pages

Targeted Individuals *

<Repost with revision from original post of 5/23/2021 ej-rim.blogspot.com>

Targeted individuals are people chosen or contracted for physical and electronic stalking, harassment, sabotage, eavesdropping, mobbing in the neighborhood, workplace, and while driving, and threats of bodily injuries and murder.

People are targeted for retaliation by using criminal entrapment frauds to destroy their personal and professional reputations, as well as their economic livelihoods, often perpetrated by institutional terrorists (law enforcement, first responders).

Institutional terrorists are also RICO gangs that are made up of former or current members of institutions such as banks, credit unions, labor unions, institutions in law, medicine, nursing, NGOs, churches, and government agencies.

Then why do people become targeted individuals?

For many reasons but mainly for two reasons:

One is retaliation. Personal and corporate retaliations are the primary reason of targeting targeted individuals.

Corporate, personal (nationality, ethnicity, religion, political, military), and family vendettas can all be attributed to this reason.

The second most prevalent reason is profitability.

Targeted people are usually old, retired, and isolated, but they have considerable assets, including paid-off houses, bank accounts, and investments. Targeted individuals are often targeted for life insurance, wills and estate administration fraud via premeditated murder and getting rid of potential competing beneficiaries for various reasons.

These institutional terrorists often target isolated individuals, particularly those who are living alone, have mobility issues, or are living in communities where the targeted individual's race or ethnicity is in an extreme minority.

Targeted individuals like these are destroyed without any traces or criminal evidence pointing to institutional terrorists.

Their main weapons for attacking isolated targeted individuals are financial and criminal entrapment frauds using these institutional terrorists' well-accumulated targeted individuals' personal, medical, and ID information.

These institutional terrorists have the most intimate personal information of targeted individuals: family history, family make-up, relatives, friends, co-workers, and other useful personal information acquired from many different sources, including the targeted individual's own old family acquaintances, friends, neighbors, co-workers, or their networks of law enforcement, intelligence, first responders, and international criminal cartel members.

These illegally acquired personal information allows institutional terrorists to commit sophisticated criminal frauds of entrapment to defraud and destroy their targeted individuals.

Physical and electronic stalking, surveillance, harassment, sabotaging, eavesdropping, and hacking are carried out by these criminals 24/7/365, making a targeted individual's daily life almost unbearable.

Targeted individuals are constantly forced to make unsound financial and life-supporting decisions by these institutional terrorists due to constant harassment such as hacking, transactional sabotages, eavesdropping, organized institutional, often cross-agencies stalking, harassment, and entrapment criminal frauds.

These criminals often lead their targeted individuals to death spiral literally, causing medical problems from the stress of being subjected to 24/7/365 harassment, stalking and sabotage, often requiring them hospitalizations, and eventually to their death beds immobilized.

Using real-time computer and cell phone interruptions, manipulations, text message alteration, the-man-in-the-middle attack to illegally eavesdropping, track physical GPS locations to lay traps, and hijacking, reading, stealing, re-routing, manipulating, inserting, replacing, and synchronizing re-delivery of USPS mail, these institutional terrorists completely take over targeted individuals' communication links to the outside.

These criminals can re-route calls to impersonators to further sabotage financial transactions, frustrate targeted individuals and use information gathered to plan elaborate fraud schemes with other fraud experts.

Rich and powerful individuals often hire and use domestic institutional terrorists who are made up of rogue or criminal law enforcement, trade unions, and religion-related NGO members.

These terror sponsors often hire on-site local handlers, domestic institutional terrorists of former or current law enforcement professionals to do all the dirty works such as hiring, paying, leading daily stalking harassment activities.

The handlers provide the real perpetrators, the sponsors, who order and fund (often through intangible incentives, i.e., promotions, attractive job offers) these contract-hit jobs with deniability if their crimes become exposed.

If there are to be any investigations into these attackers who have continuously harassed and attacked me, laying deadly traps to snare me to injury and death for the past seven years, you will find many of these attackers and their sponsors were in the business of insurance and other insurance-related professions that deal with insurance claims, investigation, negotiation, and litigation.

In my case, I believe my corporate and personal enemies are the same. I do not mean to say that they are the same individuals who are my corporate and personal enemies, but they are related—in-laws, childhood friends, family friends, alumni, former co-workers, former business clients, same church members, and other close business and personal relationships.

This is why I believed these attacks were planned well before December 8, 2017. I believe these attacks were planned around 1993, all the way through my last employment in 2016 as an accountant. Employees of my former employers knew my personal enemies—those who tried to destroy me for all my life—and together they planned to destroy me in the most insidious and hidden ways to frame me as a fall guy via criminal or financial entrapment frauds, so they both benefit from my downfall.

They had to just watch me all along, waiting for just the right moment to attack me, finish the job, without anyone ever finding out who they are.

About that "inheritance will" you left on the internet **

I want to ask you whose idea it was that you decide to leave your inheritance “will” on the public domain internet. People do not normally l...