Pages

11. Targeted individuals *

Targeted individuals are people chosen or contracted for stalking, physical-electronic stalking, harassment, sabotage, eavesdropping, mobbing in the neighborhood, workplace, and while driving, and threats of bodily injuries and murder.

Innocent people are targeted for retaliation purposes by using criminal fraud entrapments to destroy their personal and professional reputations, as well as their economic livelihoods, often perpetrated by institutional terrorists.

Institutional terrorists are RICO gangs that are made up of rogue or criminal former or current members of institutions such as law enforcement, first responders, law, banking, finance, medicine, nursing, trade unions, corporations, NGOs, and other government agencies.

Then why do people become targeted individuals?

For many different reasons, but mainly for two reasons: 

Retaliation is the primary reason for targeting targeted individuals. 

Corporate, personal (nationality, ethnicity, religion, political, military), and family vendettas can all be attributed to this reason.

The second most prevalent reason is profitability. 

Targeted people are usually old, retired, and isolated, but they have considerable assets, including paid-off houses, bank accounts, and investments. Targeted individuals are targeted for life insurance via premeditated murder, auto insurance, and medical insurance fraud.

These institutional-domestic terrorists often target isolated individuals, particularly those who are old, retired, living alone, have mobility issues, or are living in communities where the targeted individual's race or ethnicity is an extreme minority. 

Targeted individuals like these are destroyed without any traces or criminal evidence pointing to institutional terrorists.

Their main weapons of attacking isolated targeted individuals are financial and criminal entrapment frauds using these institutional terrorists' well-accumulated targeted individuals' personal, medical, and ID information. 

These institutional terrorists have the most intimate personal information of targeted individuals: family history, family make-up, relatives, friends, co-workers, and other useful personal information acquired from many different sources, including the targeted individual's own old family acquaintances, friends, neighbors, co-workers, or their networks of law enforcement, intelligence, first responders, and international criminal cartel members. 

These illegally acquired personal information allows institutional terrorists to commit sophisticated criminal frauds of entrapment to defraud and destroy their targeted individuals.

Blatant physical stalking, surveillance, harassment, sabotaging, electronic eavesdropping, and hacking are carried out by these criminals 24 hours a day, 7 days a week, making a targeted individual's daily life almost unbearable.

Targeted individuals are constantly forced to make unsound financial and life-supporting decisions by these institutional terrorists due to constant harassment such as hacking, transactional sabotages, eavesdropping, organized institutional, often cross-agencies stalking, harassment, and entrapment criminal frauds.

These criminals often lead their targeted individuals to death spiral literally, causing medical problems from the stress of being subjected to 24/7/365 harassment, stalking, and sabotage, often requiring them hospitalizations, and eventually to their death beds immobilized. 

Using real-time computer and cell phone interruptions, manipulations, text message alteration, the man-in-the-middle attack to illegally eavesdrop, track physical GPS locations to lay traps, and hijacking, reading, stealing, re-routing, manipulating, inserting, replacing, and synchronizing re-delivery of USPS mail, these institutional terrorists completely take over targeted individuals' communication links to the outside. 

These criminals can re-route calls to impersonators to further sabotage financial transactions, frustrate targeted individuals, and use information gathered to plan elaborate fraud schemes with other fraud experts. 

Rich and powerful individuals often hire and use domestic institutional terrorists who are made up of rogue or criminal law enforcement, trade unions, and religion-related NGO members.

These terror sponsors often hire on-site local handlers, domestic institutional terrorists of former or current law enforcement professionals, to do all the dirty work, such as hiring, paying, and leading daily stalking harassment activities. 

The handlers provide the real perpetrators, the sponsors, who order and fund (often through intangible incentives, i.e., promotions, attractive job offers) these contract-hit jobs with deniability if their crimes are exposed.

About that "inheritance will" you left on the internet **

I want to ask you whose idea it was that you decide to leave your inheritance “will” on the public domain internet. People do not normally l...