Cybertorture and coordinated stalking have a long and sordid history in the UK, the US and other counties around the world. However, many had never heard of either of these tactics until actress Leah Remini shared her own personal experiences, including that of others in her circle, in a documentary series entitled “Scientology and the Aftermath”. In this documentary, coordinated stalking and some forms of cybertorture are referred to as “The Fair Game Law.

In October 2017, a huge story related to these types of intimidation techniques appeared in the news. It was the terrible scandal involving Hollywood film executive Harvey Weinstein, who sexually assaulted more than 80 women over 30 years and then went to extraordinary lengths to neutralize them to not dare speak out against him.

But these tools and tactics have not only been utilized on celebrities. They have been used on ordinary people as well. In 2011 for instance, the Sedgwick County court panel in Kansas had to issue a first of its kind protection order to, James Walbert banning his former business partner from using “electronic means” to harass him. This is a case involving extremely sophisticated technology.

These are not isolated cases. There have been more of such cases involving the use of high tech devices. Click here for some more examples.

The cybertorture and coordinated stalking epidemic hasn’t ceased. In the past few years it has continued to grow exponentially . Earlier this year, Nils Melzer, the United Nations Special Rapporteur on Torture and Other Cruel, Inhumane or Degrading Treatment or Punishment, expressed serious concerns about this phenomenon: He warned that Psychological torture is being exploited by states to circumvent the more widely understood ban on physically inflicting pain and may open the way to a future of cybertorture… What’s even more troubling about these torture methods is that they leave very few physical marks and almost no trail of evidence behind, making prosecution extremely hard to achieve.

 

What is Cybertorture?

Cybertorture is the act of assaulting an individual with a new generation of weaponry that utilizes electromagnetic energy to inflict emotional and bodily harm. These weapons can penetrate through walls, ceilings, and even concrete floors, leaving victims with few options to defend themselves from the torment or heal from the attacks after they have taken place.

What is Coordinated Stalking ?

Coordinated Stalking is a series of planned malicious actions carried out to cause mental instability in a specific person. These actions can drive a victim to harm themselves or others, and in the most extreme cases the victim may even go as far as ending their own life.

What are the different methods

of Cybertorture ?

There are three primary methods of Cybertorture.

Both devices mentioned below utilize electromagnetic radiation, making it nearly impossible for a victim to escape or protect themselves without proper protective equipment.

1) Direct Energy Weapons

Electronic Harassment/Microwave

The devices are hostile technology that can inflict physical, psychological, and sometimes even sexual trauma on victims. They can induce intense heat in the body, mimicking the signs of a terrible fever or hot flashes but in a much more unpleasant manner.

2) Remote Neural Monitoring

Synthetic Dreams

Potentially the worst in the cybertorture arsenal, these devices are capable of sending sounds and messages directly into an individual’s head. It is said that these messages are impossible to block out, and could include a victim hearing voices in their head. These devices can enable the user to remotely interrogate, read the mind, and even control the behaviour of the person on the receiving end. This can be done to multiple victims simultaneously.

3) Coordinated Stalking
Mobbing

Coordinate stalking is a series of malicious activities designed to torment or otherwise monitor an individual. It usually takes place in public, in full view of the entire community, however, it can be virtually undetectable to anyone else not undergoing the abuse. It is composed of slander campaigns, illegal surveillance, noise campaigns, cyber-bullying; and the so-called “stingray” or “IMSI catcher” which is illegally utilized to interfere with victim’s private phone conversations. Even breaking and entering, assaulting or raping someone within their own home can take place.

 

 

 

 

 

 

 

 

Who are the most

likely victims ?

 

 

 

 

 

 

 

 

Who participates in these

horrendous crimes?

How You Can Help

Donation
Donation
Help support victims and programs by donating money, goods or volunteer.
Sharing
Sharing
Be an advocate for those hurt by this type of torment and torture.
Affiliate Giving
Affiliate Giving
let us know which companies do employee matching or give out small community grants.
Other Campaign
Other Campaign
Your voice matter to us. See more causes that deserves your urgent attention.