Jit Guide - First Aid
Jit Guide - First Aid
JIT/20180830/007/G/KH/V1
Abstract
Becoming the victim of the Secret Services is a terrifying experience as the methods
3 of disintegration, torture and destruction from the worst systems that humanity has
ever produced like the East German Stasi and the Nazi's Gestapo in WW2 Germany
are applied to the victim, along with a host of modern military technology that has
6 been classified for decades and is therefore outside the experience or knowledge of
most people. This can leave the victim isolated from family and social support
networks and with no one to talk to about the problems. In fact, social isolation is
9 one of the goals of this program. This Guide is intended as a quick help manual for
victims of the Secret Services. It summarises the main forms of attack on the victim
and gives basic advice on how to counter attacks and how to shield from them. It
12 takes the form of bullet points to give a quick overview over each topic. The guide is
by no means complete and does not claim to have all the answers, but it is intended
to serve as a first start for those who are startled and disconcerted by what is
15 happening to them or as a document to turn to when the attacks get unbearable.
Further information can be found on the website of the Joint Investigation Team
https://jointinvestigation.org and Dr. Katherine Horton's website https://stop007.org.
Table of Contents
1 Gang-Stalking......................................3 6 Secret Service Criminality...................7
2 Directed Energy Weapon Attacks........4 7 Secret Societies....................................7
3 Non-Consensual Implanting................5 8 Genocide..............................................8
4 Neurotechnology Attacks....................6 9 Systems Analysis for Better Systems. .8
5 Asset-Stripping....................................6 10 The Joint Investigation Team.............9
Page 2 of 8 First Aid for Victims JIT/20180830/007/G/KH/V1
1 Gang-Stalking
• It is a world-wide terror network of stalkers.
3 • It is using the national surveillance network of the Intelligence Agencies and
their contractors.
• It's based on the FBI's COINTELPRO, the Stasi's Zersetzung and the terror
6 methods of the Gestapo.
• The NSA whistle-blower and former Joint Investigation Team member Karen
Melton-Stewart found out that Lockheed Martin is running gang-stalking in
9 47 of the 50 US States.
• All Western Intel went through a phase of rapid expansion since 2001.
• In that expansion, Western Intel have recruited people in droves from all
12 walks of life but mostly from low-income backgrounds.
• Often gang-stalkers are paid off the books in, for example, gift cards so that
it doesn't leave a money trail.
15 • There is something called Pay-Stalking whereby people earn money through
an app for stalking a person. This has been set-up by Intel to farm out and
gamify their stalking operations.
18 • In the US, the gang-stalkers likely come from the large pool of those who
were turned into food-stamp users by the last financial crisis. After the
financial crisis of 2008, the number of food-stamp users became as large as
21 the population of Spain. This means that effectively an entire nation is
available to descend down on the productive part of the population for asset-
stripping.
24 • The gang-stalking also includes home break-ins as “Standard Operating
Procedure”.
• Sabotage of cars is also common, as are death threats and mock assassination
27 attempts on the victims to keep the victims in a non-stop state of terror.
3 Non-Consensual Implanting
• This has been conducted on a vast scale for several decades now.
3 • An astoundingly large fraction of the population appears to be implanted
with radio-frequency chips in the US and in Europe. I suspect it's the same
around the world.
6 • People are covertly implanted at night in hotel rooms, in private homes and
in hospitals.
• During operations there appears to be chips planted into the wound as a
9 “Standard Operating Procedure”.
• People are typically implanted with several dozen body implants and
additional nanotechnology.
12 • The chips form a Body Area Network, whereby there appear to be strong
transmission and reception units implanted typically at the back of the head,
top of the head or in the neck. That unit then coordinates the smaller
15 distributed chips all across the body.
• The plans are now for these covert body chips to communicate with other
people's body chips in Body-to-Body networks.
18 • There are many more versatile implants: ear-implants for voice transmissions
(Voice-to-Skull), eye implants for deception and the broadcasting of movies,
throat implants for reading out sub-vocal speech, Melanie had a strangulator
21 implanted in her throat.
• The head chips (combined most likely with brain-chips) can steer brain
function to a shocking degree. Forced thoughts and repetitive thoughts are
24 often reported by victims, as is total mental paralysis.
• The remote-control of hands, limbs and individual muscles is a near-daily
occurrence for victims.
27 • Other bodily functions are also remote-controlled like heart-beat, breathing,
urination, defecation.
4 Neurotechnology Attacks
• Neurotech uses head implants for a complete take-over of a person.
3 • During the take-over the victims are completely helpless.
• Sometimes victims are placed into a trance or hypnotic state and do not have
a recollection of what happened.
6 • Sometimes victims are entirely conscious and witness their body movements
being taken over.
• Mood changes can be induced to trigger unprovoked sadness, aggression,
9 fear and lust.
• Thoughts can also be induced and steered.
21 5 Asset-Stripping
• The financial destruction of the victim is the goal of these Zersetzung
programs.
24 • There have been reports about fraudulent life insurances taken out on the
victims. For example, victims are written down as directors of fraudulent
companies and in case of their death the insurance pays out.
27 • The standard money-making schemes seem to arise out of the victim
incurring costs in mitigating the damage done to property and health.
Valuables are stolen in some cases.
30 • The property, inheritance and other assets of the victims are also stripped.
7 Secret Societies
27 • Secret Societies originally developed as an attempt to circumvent and
undermine the societal order.
• Their power and reach has grown over centuries or even millennia in some
30 cases and is shockingly vast today.
• The Freemasons and the Jesuits are global powers that have created a global
parallel society within the nation states and have steered the world covertly
33 for centuries.
• By the same process of Deep Capture that affects Secret Services, Secret
Societies are also under the rule of organised crime, psychopaths and serial
36 killers.
• It is the Secret Services and the Secret Societies that are behind the
systematic subversion of national security and global covert mass murder.
JIT/20180830/007/G/KH/V1 First Aid for Victims Page 7 of 8
8 Genocide
• Deborah Tavares published the fact that most governments have signed
3 Genocide Treaties at the start of the 20th century.
• Several high-profile witnesses testify to high level insiders openly discussion
engineered depopulation, planned genocide and “The Great Cull”.
6 • There is evidence for such planned global mass murder being executed
through several methods: destruction of health through irradiation
(radioactive and electromagnetic), targeted poisoning or infection, targeted
9 mutilation with Directed Energy Weapons and covert implants, targeted
murder, targeted mass murder through (not so) natural disaster.