14 Comments
User's avatar
Targeted Justice, Inc.'s avatar

There continue to be scams from people that claim they can remove your name from the TSDB list. You will be asked to send money. We warned you not to do this...

Expand full comment
Lalainia's avatar

I deleted my x, they attack my family even past family, the family does not know but I see the pattern. Very frustrating and sick.

Expand full comment
SoleSista 4MySoulBros&Sistas's avatar

#TheyDEWattackPets

I created a twitter (X) account - @DEWattackPets - to bring awareness to the tortuous attacks inflicted on animals that belong to Victims of Government Weaponization.

Please tap the link below to follow and tweet videos of your pet being torturedโ€ฆ

๐Ÿ‘‡๐Ÿพ๐Ÿ‘‡๐Ÿพ๐Ÿ‘‡๐Ÿพ

https://x.com/DEWattackPETS

Expand full comment
Brady AAA's avatar

Writing to the White House works

Expand full comment
Patrick Glennon's avatar

Did you get a reply?

Expand full comment
ti nodox's avatar

I have the thought that unless our devices and communication networks are secure, hacking of our social media accounts is not necessarily done by the admins (or interlopers) at the social media site. Hacking our social media (or any activity on the device) can be accomplished at the device level. Security is a multi-layer. One of the ways that we, as TIs, and citizens in general, are harmed is by placing trust where it is not merited. Have a read on how our (logical) assumption of security and professionalism, ie. trust, in satelitte communications has been unfounded:

https://securityboulevard.com/2025/10/sky-high-hack-how-600-unlocked-global-secrets-streaming-from-space/

My experience with library security would lead me to assess their networks and computers as low-level and generally incompetent. YMMV!

Expand full comment
Roman America's avatar

Last night I woke up and heard a beeping sound, then noticed a light scanning around the perimeter of the wall near the ceiling. Has anyone had a similar experience? This isnโ€™t the first time.

Expand full comment
Henry Comesaลˆa's avatar

Am I blocked, or muted by @Targeted Justice, Inc. , @Ana Toledo or just Substack, or all?

Besides not receiving post notifications, a few of my past comments/replies are missing.

In Particular, in response to a post encouraging us to spread the word, advert on social media, etc I did just that, and immediately received a response from Courtney Turner, whom welcomed a TJ interview on her podcast, copied to TargetedJustice, Ana Toledo, but I have yet to see that come to fruition.

She also hosts the OmniWar symposiums.

Was it because it came by way of me? (the marxists' & useful-idiots' TI target of smears, few of any have had the fairness, common sense even, to hear-verify to Truth about from me. I was without TI contact/support long before I heard of TJ, TI , Long before I converted to Islam -Ignorants' smear tool, as a Christian, as a youth, and know very Isolated in every material sense, so it's not new, but I'd like to know)

Expand full comment
Ana Toledo's avatar

I do not know what you are talking about.

You do not seem to have figured out yet that all of our social media is interfered with.

Criminals are unsubscribing people from our newsletters.

Expand full comment
Henry Comesaลˆa's avatar

Understood.

Contact: https://substack.com/@courtenayturner?utm_source=share&utm_medium=android&r=272ccu

She answered my suggestion, and welcomed to interview someone from TJ on her podcast.

She has briefly mentioned the topic of โ€œTargeted Individualsโ€ in a prior symposium.

Expand full comment
Lloyd Hamilton's avatar

thanks but after being hacked through over 325 electronic devices over 35+yrs what they are doing is brute force attacking hacking your password for your home modem wifi then they are taking over administrator priveledges then cloning your devices mac address which is your device personal fingerprint identity then once cloned they can run it through some software to get your imei and cell phone number which they will now be able to intercept collect redirect yourt in and out data and comm audio video recordings all without a warrant

Expand full comment
Pab Marq's avatar

This is another domestic terroristic games in addition to the vomit in my refrigerator, spitti g on mumy miirors, shitting next to the toilet, leaving the tiny screws that belong to the bottom of your computerโ€ฆ.

https://www.facebook.com/share/v/19tbSFWPq9/

Expand full comment
Targeted Justice, Inc.'s avatar

We told you how to secure your house or apartment. Obviously you did not read it.

Search for it in our prior newsletters. "Secure"

Expand full comment
Hertz's avatar

These GPS Spoofing apps are quite useless against targeting; but they can obscure the data of surveillance capitalism (just consider that any app is a potential backdoor). As long as the GPS device is active at the hardware level, and the smartphone is active and connects with IMSI towers, the spoofers do not stop tracking or monitoring.

A serious solution would be to use a dumb phone with a removable battery, and carry it in a faraday pouch (sim and battery removed), and sometimes use internet cafรฉ for usual things; More over, the tracking can be operated from above (satellites, drones), via surveillance camera network, or by classical shadowing...

Expand full comment