Friday 31 August 2007

The Home Turned Gas Chamber

When DEW's cannot do as much harm as required, or the property cannot be entered to contaminate the area in order to achieve the desired results, then gas attacks on the property of the target may become the norm.

If they are that desperate to eliminate you then, trust me, they will use any means available to them to achieve that end.

This article is divided into the following sections:


Personal Experiences of Gas Attack

Ever since I knew I was under attack and that people were surreptitiously entering my flat, I have taken care to avoid direct contact with my living quarters if there are no security systems installed that I can trust. I take every article that I use on a daily basis with me in a bag. Upon return, I make sure that I wipe every surface clean, making sure to wear rubber gloves while at it, before relaxing.

At my present address, before I installed CCTV, my flat would get broken into at least four times every week. It was usual to come home and find the measures I made to detect entry had been moved about. These measures are outlined in the book, and are simple to install. I find them much more effective at detecting surreptitious entry than the kind of equipment available at retail outlets, including spy shops.

These very locks and other security equipment happen to be the material on which prospective spies or perps are trained to bypass.

Frankly, it surprises me that the perp entering my premises could even have dared make an illegal entry. He must think I am a fool, or that the attacks have rendered my mind into a state where I would not be capable of devising something that he could not undo then replace without me knowing, something capable of informing me of unwelcome entry.

The system I use involves leaving markings on locking devices that can be recorded and carried along on a day to day basis. Knowing how to make these markings and on which part of the lock to place them requires some knowledge of locking mechanisms and their vulnerabilities. For example, some combination padlocks can be safer than brass, shackle or lever ones, and vise versa. It all depends on how they are designed. Many padlocks can be unlocked from the top through the gaps where the shackle enters the body, whereas though lever and shackle padlocks do away with this vulnerability, they can still be picked or forced.

A quantitative measure of a padlock’s resistance to forced and surreptitious entry can be determined with tests developed by organizations such as ASTM, Sold Secure (England), CEN (Europe), and TNO (Holland). You can use this knowledge to select the lock you will use to secure your property, but I have heard by way of rumor that there is only one lock in existence that the major intelligence agencies (MOSSAD, MI6, CIA, etc) have all failed to pick.

I doubt whether they would divulge the secret of which one that is.

The seals that I place on the padlock are simple to make, take a few minutes of my time every morning to attach, and are designed to obstruct the particular lock's vulnerable spot. They are placed specifically in those areas where the perp will attempt to open the device using his training. Once in place, only me, the owner, can open the padlock, once the seals have been checked for tampering. My seals are also placed in such a manner that I do not need to check for tampering at the door. I can safely open the lock even on a dark night when visibility is poor and later still be able to see whether the seal has been tampered with or not.

To put it simply, I leave markings on the lock that cannot be undone then put back in place without leaving evidence of tampering since the perp will have to replace the bits and pieces, the lines and dots in exactly the same way that I did, which is impossible, even when the perp observes me making these markings using technology that enables one to see through walls.

Upon return to the property, all I have to do is check with the pictures I took or the drawings of specific markings and dimensions. Simple changes can be allowed because some of the material I use warps over time, but there is no room for doubt when the markings on the lock's seal, or the positions of the objects within the flat pictured that same day, and automatically dated by the camera device, have completely been altered, which is what was happening at my flat every second day.

These incursions into my private space didn't stop even after I reported the issue to the police.

Only after I had installed surveillance cameras did there come an end to these activities. Seals within the flat remained untouched; the objects taken on a photo remained in the same position for weeks after that. I eventually got enough courage to walk through the property bare foot without the discomfort in the limbs that would accompany such activity when I was foolish enough to dare prior to this.

On Friday the 10th of August this year, about three weeks ago from the date of this post, I forgot to top-up my electricity and, like clockwork, returned to find the seals had been tampered with. In fact, there was even shredded wood at the front entry to my flat. Someone had anticipated the electricity would go off on that day, someone who no doubt was near enough in the building to either notice the appliances go off, or actually check the reading on the meter located at the entry to the flats. This individual could not have been the neighbor across the street from me.

The CCTV camera broke down shortly after that. After the new camera arrived, I connected it to the recorder using the old cable and got a distorted image. I almost thought I had been sent a defective device until I used a different cable. When the camera worked properly, I checked the older camera and confirmed it was still not working. Close examination of the old ten meter cable revealed no visible signs of damage. Somehow, somewhere, some wires were short-circuited, which was very strange because the ten meter cable was shielded and the video and audio leads were separated. It had solid, thicker than usual insulation and I had not passed it through corners, for example door entrances, where it could be clipped and short circuited/damaged.

I topped up the electricity account and have not noticed any tampering since.

I have been struggling with updating the defenses against DEW's for some time now, and have suffered visibly as a result of the slow progress. Earthing my faraday cage construction increased its strength significantly, but not to safe enough levels. Increasing the number of layers was the only option since the strength of a faraday cage shield depends on this, but it remained a slow process due to a meager budget. Making myself invisible to attackers would have helped somewhat, but I was dissuaded from applying a phase and frequency current to the construction due to plumbing issues in the adjoining flat (illogical to a techie like me), and am still looking for an appliance that can generate a safe current.

The only option left was to wait it out, suffer it out... increase the layers every time I had some change in my pocket until I no longer felt the waves playing on my body, exciting my genitals, piercing my chest, etc. which I have finally succeeded in doing.

Gas attacks were used before, during the cat and mouse game that saw shielding erected then weapon upgraded to overcome this, and so on, but now it has become apparent that due to the power levels necessary to penetrate my improved shield, gas attacks have become the mainstay of attack. Commencing when the sun sets, the flat gets fumes pumped in that leave me red eyed and dizzy. Once, I awoke to find myself out of breath, having serious difficulty breathing, a burning pain at the back of my neck, my lungs feeling as though I had just smoked ten cigars within a minute.

I threw all the doors to my flat open. When this didn't help, I wandered into the park behind my flat where eventually I started feeling better. Wearing a gas mask while in the place helps prevent death, but then come morning I get marks on my face that only disappear after a while. Despite the markings on my face, I do look much better if I wore a mask the entire night than I do without, and feel much better too even though it limits the air that I can breath in, thus discounting the possibility what I am experiencing is coming from within my own body, for example asthma. Problem is sleeping with a mask on the face is not very comfortable. It isn't something that any individual can do for prolonged periods.

Installing a fan that channels the air flow through the flat proved to be the best remedy. I immediately saw good results.

I am certain that the attackers are using different substances in the gasses, and can also state with certainty that biological attacks have been used. Gasses that can be absorbed by the skin have also been deployed when the perps realized I was wearing a gas mask in the property. Becoming aware that this is the case is easy once you are covering and uncovering the body with blankets. The level of sensitivity to the external atmosphere and immediate mental sensation points to this reality.

Gas attacks are always masked to prevent passers-by getting suspicious, especially when the windows are open. Foul smells are first pumped into the property, mixed with deadly substances. In my case, initially, the gas attacks would not take place when I had left my front window open during the night. As time passed, the perps got desperate. The masking of the attacks with foul smells was done more and more, even during the day. I soon noticed that this gradually influenced the opinion of neighbors against me, this in itself opening up the way for attacks to happen at any time of day.

Measures Against Gas Attacks

Gas attacks are hard though not impossible to defend against. The first thing to do is check for the location the gasses are being pumped into your living quarters. Rather than use the body as a testing ground for gas attacks, it is better to use the imagination to find out the areas within the house where drilling could best be done without alerting the occupant to the hole, or the windows that can easily be accessed by perps. The walls of these vulnerable spots, most of which would be hidden behind furniture, and the walls in rooms where the most time is spent, should be finished in such a manner as to make it easy to notice if any changes have been made. Windows through which attacks can surreptitiously be launched should be watched when open, otherwise protected with security equipment, sealed, or have the ventilation controlled so the air flow from these areas does not enter the premises.

A fan once strategically placed does a very good job of controlling the air flow within the living space, whisking the dangerous gasses away before they can be inhaled. In the same manner an air filtration system can achieve the same results, even better if it can filter out toxic substances. Gas detectors are a must when gas attacks have been identified. Their only vulnerability can be a limited detection range.

If these measures are beyond reach, then the best thing to do is wear a gas mask while in the property, and in the mean time work on making possible the installing of the measures outlined above. In case of inhalation of dangerous substances, then medical remedies mush be sought as soon as possible.

Coming up next: Measures Against the Defiling of the Water Supply

Wednesday 8 August 2007

Excerpt

Coherent Madness: Effective Defense Against
Covert Warfare


“Believe nothing, no matter where you read it, or who said it, no matter if I have said it, unless it agrees with your own reason and your own common sense.” Buddha (563BC-483BC).

Table of Contents

Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 1:Prologue. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 2: Who Are These People?. . . . . . . . . . . . . . . . . .
Historical Parallels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Personality Profile of the Average Gang Member . . . . . . . . . .
Organization: Hierarchy and Connections . . . . . . . . . . . . . . .
Institutionalization of Covert Warfare . . . . . . . . . . . . . . . . .
Chapter 3: What are The Attack Methods? . . . . . . . . . . . . . .
Psychological Harassment . . . . . . . . . . . . . . . . . . . . . . . .
Direct Physical Violence . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 4: Why People Become Targets of Covert Warfare. . .
Preemptive Strategy: Potential Threat Elimination. . . . . . . . .
Mentacide: Deliberate Destruction of the Mind. . . . . . . . . . .
Relational and Other Problems. . . . . . . . . . . . . . . . . . .
Xenophobic and Racial. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Political and Economic. . . . . . . . . . . . . . . . . . . . . . . .
Chapter 5: Dispelling Doubt. . . . . . . . . . . . . . . . . . . . . . .
Clearing the Fog Of Doubt. . . . . . . . . . . . . . . . . . . . . . . . . .
Weighing Security System Vulnerabilities. . . . . . . . . . . . . . . .
Personalized Security Systems. . . . . . . . . . . . . . . . . . . . .
Last Resort: the Mobile Home. . . . . . . . . . . . . . . . . . . .
Chapter 6: Keeping Accounts. . . . . . . . . . . . . . . . . . . .
Poison Deposit Zones. . . . . . . . . . . . . . . . . . . . . . . . .
Other Personal Accounts. . . . . . . . . . . . . . . . . . . . . .
Chapter 7: Securing Your Home. . . . . . . . . . . . . . . . . . . .
Contaminants in Solids and Liquids. . . . . . . . . . . . . . . . . . .
Airborne Attacks. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 8: Blocking Directed Energy Weapon Attacks. . . . . .
History. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How DEW work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Obstruction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 9: Securing External Property. . . . . . . . . . . . . . . .
Chapter 10: Safety While Out and About. . . . . . . . . . . . . . .
Staying Alert When You Mingle. . . . . . . . . . . . . . . . . . . . . .
Securing Your Shopping. . . . . . . . . . . . . . . . . . . . . . . . . .
Going on the Run. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 11: Mental and Physical Health. . . . . . . . . . . . . . .
Health Check and Medication. . . . . . . . . . . . . . . . . . . . . . .
Meditation Based Healing. . . . . . . . . . . . . . . . . . . . . . . . .
Physical Exercise. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Healthy Mental Attitude. . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 12: Conclusion. . . . . . . . . . . . . . . . . . . . . . . . .
Bibliography. . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . .
Glossary . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . .
1
3
11

11
12
18
23
27
27
30
33
33
36
47
48
48
51
53
58
61
64
67
67
68
71
72
79
85
88
89
90
93
95
95
101
102
105
105
107
108
108
115
117
121


Introduction

I will take it for granted you already know, or have heard of people who died of what were natural causes, deaths that nonetheless raised suspicion among some people due to one anomaly or another. I will assume you know of cases where men and women, mostly activists, who were in their prime at the time, suddenly succumbed to an unlikely terminal affliction, or some other condition, be this from a sudden stroke, rapid growth of a terminal cancer, etc. Others may have taken their lives, and still some met their end through sudden, sometimes accidental, often gratuitous violence. In most social circles, especially among some races, the number of incidences of death under suspicious circumstances is indeed significant, and occurrences of such deaths repetitive enough for there to be a discernible pattern, for there to be justifiable talk of not only foul play, but a hidden agenda.

As a man who has over a prolonged period been a target of covert warfare by groups of people unknown to me, for reasons I have only recently grasped, I intend to prove that I, and an ever increasing number of people bringing forth similar accounts, are in fact survivors of a method of elimination that claimed some of the deaths considered before, a method of attack carefully designed to appear like the victim was not murdered, but died of natural causes, or unfortunate accident.

These accounts, especially the fact they have similar points of convergence, point to peculiar methods that have been adopted by law enforcement, governments, and corporations globally to eliminate those who pose a threat to them. Additionally, they imply knowledge gained through scientific research, spying and elimination methods and technologies mostly developed for the purpose of war, are now being used not to keep real enemies at bay, or to fight justified wars against threats to human freedom, but to eliminate innocent civilians, especially those who think for themselves, those who ask questions. I will then proceed to share knowledge I have gained through my ordeal, in what has been a trying and lengthy game of cat and mouse between my stalkers and me, which hopefully teaches effective methods of coping, if not defeating covert warfare.

Keep an open mind as you go along so that you avoid jumping to conclusions, because what I will write down in this book will readily resemble a lot of states and conditions that can easily stand in as viable explanations. This is unfortunately a part of the strategy of such attacks; this is what has made this method of elimination so successful to date. People who have never been exposed to certain realities seldom phantom the possibility, making them prone to rely on what they know to explain what they are hearing or seeing.

I remind you that you do not have to wait until you, a close or loved one, gets into a situation from which you cannot escape before you take actions that protect you from the full force of such attacks. You do not have to become a victim of, for example, the real habit of housing agencies in many developed countries to relocate a blacklisted individual to neighborhoods inhabited exclusively by people employed by such criminals, turning your daily life into a nightmare, or prison. You do not have to wait until you or a loved one is attacked by a criminal in the employ of these people, or gets a sudden and inexplicable physical condition before you take this seriously.

Browse through this book and take mental notes as these will prove useful in situations you may be confronted with in real life. Learn of the various methods employed in this elimination process, learn of the extent even innocuous social institutions have been infiltrated, as this will be vital in helping you identify situations where you could fall into a trap. You should especially know who qualifies for covert government harassment or elimination so you know where you, and the various personalities of those you know or will bring forth, stand.

If you do not see yourself bending to the kind of pressure those who want to keep you in the dark and in bondage will bring to bear on you to maintain or achieve this state, because you are convinced you are doing the right thing; or see the possibility someone you know will inevitably end up a victim, then you need to learn how to build a strong defense against what is as such an imminent threat. Have this information handy, to share or use for self should it become necessary. These measures against covert attack do not need actual proof of the activity to be set up, just as you would never wait to be robbed before you install security equipment. Knowing of the possibility should be a good enough incentive.

Wednesday 1 August 2007

News

Subscribe to my Newsletter

Posted August 19 2011

From now on, I will only post partial articles. I shall do my best to give as much of a hint of the direction the article shall go, enough to inform or set those incapable of paying the amount I ask on a course to the truth as I see it, enough not to defeat the purpose.

Click on the paypal link below (or on the right hand column) to get subscribed, and receive the complete article delivered to the email address you use with paypal.
















Send in Your Book for Free

Posted August 14 2008

If between the 01/12/2008 and 18/03/2008 you purchased either one or both of the two books on covert warfare by Mukazo Mukazo Vunda (Coherent-Madness: Effective Defence Against Covert Warfare and/or Unspeakable Truth: The Role Covert Warfare Plays In Western Culture) that are printed in font too small to properly read, you can send the book(s) back and get a large font replacement without incurring any charge whatsoever.

Postage will be refunded provided the item(s) is sent using Paypal. The condition of the book(s) is not important, provided the pages are still intact.

Use the email address on our contact page to get more information on this.

Contact Information

Email: mukazo@gmail.com
Whatsapp: https://wa.me/+260979127158
Telegram: https://t.me/MukazoVunda
Twitter: @MukazoVunda