There continue to be scams from people that claim they can remove your name from the TSDB list. You will be asked to send money. We warned you not to do this...
I created a twitter (X) account - @DEWattackPets - to bring awareness to the tortuous attacks inflicted on animals that belong to Victims of Government Weaponization.
Please tap the link below to follow and tweet videos of your pet being torturedโฆ
I have the thought that unless our devices and communication networks are secure, hacking of our social media accounts is not necessarily done by the admins (or interlopers) at the social media site. Hacking our social media (or any activity on the device) can be accomplished at the device level. Security is a multi-layer. One of the ways that we, as TIs, and citizens in general, are harmed is by placing trust where it is not merited. Have a read on how our (logical) assumption of security and professionalism, ie. trust, in satelitte communications has been unfounded:
Last night I woke up and heard a beeping sound, then noticed a light scanning around the perimeter of the wall near the ceiling. Has anyone had a similar experience? This isnโt the first time.
Am I blocked, or muted by @Targeted Justice, Inc. , @Ana Toledo or just Substack, or all?
Besides not receiving post notifications, a few of my past comments/replies are missing.
In Particular, in response to a post encouraging us to spread the word, advert on social media, etc I did just that, and immediately received a response from Courtney Turner, whom welcomed a TJ interview on her podcast, copied to TargetedJustice, Ana Toledo, but I have yet to see that come to fruition.
She also hosts the OmniWar symposiums.
Was it because it came by way of me? (the marxists' & useful-idiots' TI target of smears, few of any have had the fairness, common sense even, to hear-verify to Truth about from me. I was without TI contact/support long before I heard of TJ, TI , Long before I converted to Islam -Ignorants' smear tool, as a Christian, as a youth, and know very Isolated in every material sense, so it's not new, but I'd like to know)
thanks but after being hacked through over 325 electronic devices over 35+yrs what they are doing is brute force attacking hacking your password for your home modem wifi then they are taking over administrator priveledges then cloning your devices mac address which is your device personal fingerprint identity then once cloned they can run it through some software to get your imei and cell phone number which they will now be able to intercept collect redirect yourt in and out data and comm audio video recordings all without a warrant
This is another domestic terroristic games in addition to the vomit in my refrigerator, spitti g on mumy miirors, shitting next to the toilet, leaving the tiny screws that belong to the bottom of your computerโฆ.
These GPS Spoofing apps are quite useless against targeting; but they can obscure the data of surveillance capitalism (just consider that any app is a potential backdoor). As long as the GPS device is active at the hardware level, and the smartphone is active and connects with IMSI towers, the spoofers do not stop tracking or monitoring.
A serious solution would be to use a dumb phone with a removable battery, and carry it in a faraday pouch (sim and battery removed), and sometimes use internet cafรฉ for usual things; More over, the tracking can be operated from above (satellites, drones), via surveillance camera network, or by classical shadowing...
There continue to be scams from people that claim they can remove your name from the TSDB list. You will be asked to send money. We warned you not to do this...
I deleted my x, they attack my family even past family, the family does not know but I see the pattern. Very frustrating and sick.
#TheyDEWattackPets
I created a twitter (X) account - @DEWattackPets - to bring awareness to the tortuous attacks inflicted on animals that belong to Victims of Government Weaponization.
Please tap the link below to follow and tweet videos of your pet being torturedโฆ
๐๐พ๐๐พ๐๐พ
https://x.com/DEWattackPETS
Writing to the White House works
Did you get a reply?
I have the thought that unless our devices and communication networks are secure, hacking of our social media accounts is not necessarily done by the admins (or interlopers) at the social media site. Hacking our social media (or any activity on the device) can be accomplished at the device level. Security is a multi-layer. One of the ways that we, as TIs, and citizens in general, are harmed is by placing trust where it is not merited. Have a read on how our (logical) assumption of security and professionalism, ie. trust, in satelitte communications has been unfounded:
https://securityboulevard.com/2025/10/sky-high-hack-how-600-unlocked-global-secrets-streaming-from-space/
My experience with library security would lead me to assess their networks and computers as low-level and generally incompetent. YMMV!
Last night I woke up and heard a beeping sound, then noticed a light scanning around the perimeter of the wall near the ceiling. Has anyone had a similar experience? This isnโt the first time.
Am I blocked, or muted by @Targeted Justice, Inc. , @Ana Toledo or just Substack, or all?
Besides not receiving post notifications, a few of my past comments/replies are missing.
In Particular, in response to a post encouraging us to spread the word, advert on social media, etc I did just that, and immediately received a response from Courtney Turner, whom welcomed a TJ interview on her podcast, copied to TargetedJustice, Ana Toledo, but I have yet to see that come to fruition.
She also hosts the OmniWar symposiums.
Was it because it came by way of me? (the marxists' & useful-idiots' TI target of smears, few of any have had the fairness, common sense even, to hear-verify to Truth about from me. I was without TI contact/support long before I heard of TJ, TI , Long before I converted to Islam -Ignorants' smear tool, as a Christian, as a youth, and know very Isolated in every material sense, so it's not new, but I'd like to know)
I do not know what you are talking about.
You do not seem to have figured out yet that all of our social media is interfered with.
Criminals are unsubscribing people from our newsletters.
Understood.
Contact: https://substack.com/@courtenayturner?utm_source=share&utm_medium=android&r=272ccu
She answered my suggestion, and welcomed to interview someone from TJ on her podcast.
She has briefly mentioned the topic of โTargeted Individualsโ in a prior symposium.
thanks but after being hacked through over 325 electronic devices over 35+yrs what they are doing is brute force attacking hacking your password for your home modem wifi then they are taking over administrator priveledges then cloning your devices mac address which is your device personal fingerprint identity then once cloned they can run it through some software to get your imei and cell phone number which they will now be able to intercept collect redirect yourt in and out data and comm audio video recordings all without a warrant
This is another domestic terroristic games in addition to the vomit in my refrigerator, spitti g on mumy miirors, shitting next to the toilet, leaving the tiny screws that belong to the bottom of your computerโฆ.
https://www.facebook.com/share/v/19tbSFWPq9/
We told you how to secure your house or apartment. Obviously you did not read it.
Search for it in our prior newsletters. "Secure"
These GPS Spoofing apps are quite useless against targeting; but they can obscure the data of surveillance capitalism (just consider that any app is a potential backdoor). As long as the GPS device is active at the hardware level, and the smartphone is active and connects with IMSI towers, the spoofers do not stop tracking or monitoring.
A serious solution would be to use a dumb phone with a removable battery, and carry it in a faraday pouch (sim and battery removed), and sometimes use internet cafรฉ for usual things; More over, the tracking can be operated from above (satellites, drones), via surveillance camera network, or by classical shadowing...