On the night of Thursday, April 17, an entry from an outside source was recorded on this computer. I observed it as they explored recently updated files. Despite the fact that the most advanced monitoring software available to the public is installed on my computers, I was unable to track this intrusion to its source.

I have been keeping a record of these intrusions for over a year, and have consulted with an attorney about them. There is absolutely no legal reason that any governmental agency would have to invade my privacy and violate my rights in this manner, or to commit any other act of sabotage or intimidation of any person connected with me or working for me.

Dreamland Video podcast
To watch the FREE video version on YouTube, click here.

Subscribers, to watch the subscriber version of the video, first log in then click on Dreamland Subscriber-Only Video Podcast link.

38 Comments

  1. Lets hope the dream you had
    Lets hope the dream you had about your assassination wasnt a character assassination ?

  2. Lets hope the dream you had
    Lets hope the dream you had about your assassination wasnt a character assassination ?

  3. I am totally embarrassed by
    I am totally embarrassed by what my government does in our names. The government is morally bankrupt, tyrannical and without any redeeming value. I am so sorry that they have targeted you and Ann.

  4. I am totally embarrassed by
    I am totally embarrassed by what my government does in our names. The government is morally bankrupt, tyrannical and without any redeeming value. I am so sorry that they have targeted you and Ann.

  5. This happens a lot. A
    This happens a lot. A Lot.

    I’ve been speaking informally to a few selected friends about a forthcoming ICE event here in the UK. At work, two ‘temps’ showed up, couple of months apart.

    They both lingered, and both struck up a conversation that was catalysed by amazing coincidences that they both offered up. The first guy, I joked with.. ‘so you’re not an MI6 snoop then?’ He didn’t laugh, lol. Aye Caramba!

    The next chap was last week. He ‘by chance’ happened to be familiar with my home area and steered the conversation around to remote viewing. I mentioned Bob Munroe’s conversation on a level with a bigger central being who said ‘Greetings little one, what gifts do you bring me?’ (or thereabouts).

    Thursday was a busy day it seems. Cycling to work in the pitch dark, a car passed me. No-one is about in those country lanes at 4am. After a few minutes, I saw two cars parked ahead of me, men gathered in the dark. I rode past in silence, not caring.

    Shortly, one car passed me again, the other car presumably heading to my home to gain entry again, now that they were sure I was gone… People have been letting themselves in for months, unaware I had installed a camera in the trees.

    The Lemons that do these things are told one thing but someone much higher knows much much more. Pay grades eh?

    For this to have been stepped up, suggests to me that we’re close to the events here at least..

    I suggest looking to Dr Judy Wood’s interview on Caravan to Midnight with John B Wells for a clearer suggestion of the level of illusion and sophistry involved. The Oxford event will be smaller, more of a National Land Grab. Prime Farmland round those there parts, pardner. Agenda 21 etc.

    What a shame it’s come to this. I know they’re dropping subtle warnings but am too sick to care anymore.

    London, Oxford.

  6. This happens a lot. A
    This happens a lot. A Lot.

    I’ve been speaking informally to a few selected friends about a forthcoming ICE event here in the UK. At work, two ‘temps’ showed up, couple of months apart.

    They both lingered, and both struck up a conversation that was catalysed by amazing coincidences that they both offered up. The first guy, I joked with.. ‘so you’re not an MI6 snoop then?’ He didn’t laugh, lol. Aye Caramba!

    The next chap was last week. He ‘by chance’ happened to be familiar with my home area and steered the conversation around to remote viewing. I mentioned Bob Munroe’s conversation on a level with a bigger central being who said ‘Greetings little one, what gifts do you bring me?’ (or thereabouts).

    Thursday was a busy day it seems. Cycling to work in the pitch dark, a car passed me. No-one is about in those country lanes at 4am. After a few minutes, I saw two cars parked ahead of me, men gathered in the dark. I rode past in silence, not caring.

    Shortly, one car passed me again, the other car presumably heading to my home to gain entry again, now that they were sure I was gone… People have been letting themselves in for months, unaware I had installed a camera in the trees.

    The Lemons that do these things are told one thing but someone much higher knows much much more. Pay grades eh?

    For this to have been stepped up, suggests to me that we’re close to the events here at least..

    I suggest looking to Dr Judy Wood’s interview on Caravan to Midnight with John B Wells for a clearer suggestion of the level of illusion and sophistry involved. The Oxford event will be smaller, more of a National Land Grab. Prime Farmland round those there parts, pardner. Agenda 21 etc.

    What a shame it’s come to this. I know they’re dropping subtle warnings but am too sick to care anymore.

    London, Oxford.

  7. Maybe you can have some
    Maybe you can have some experts see if they can set some kind of tracking?
    Could someone be trying to steal your writing ideas?

  8. Maybe you can have some
    Maybe you can have some experts see if they can set some kind of tracking?
    Could someone be trying to steal your writing ideas?

  9. Whitely,
    I am wondering –

    Whitely,

    I am wondering – could this have anything to do with the Heartbleed security flaw that is plaguing the internet?

    http://en.wikipedia.org/wiki/Heartbleed

    Is your site’s security protocols one of those vulnerable?

  10. Whitely,
    I am wondering –

    Whitely,

    I am wondering – could this have anything to do with the Heartbleed security flaw that is plaguing the internet?

    http://en.wikipedia.org/wiki/Heartbleed

    Is your site’s security protocols one of those vulnerable?

  11. Whitley,
    In the event

    Whitley,
    In the event anything happens to your site that directly affects our information, I hold you harmless. Right now, everything we hold near & dear seems challenged. Also, many miraculous things are possible due to this timeframe we’re in.

    Last night when I discovered there were 20 Electronic Warfare specialists on board the “missing” plane, that I can’t believe is “really” gone, it sort of feels like we all need our wits about us to remain totally connected to our highest selves. I’m sure there are at least 2 governments involved. With all the technology, tracking AND cloaking/invisibility devices/knowledge those 20 EW specialists have–anything is possible right now.

    Because the NSA has overpowering access to all internet information, none of us is really exempt from falling prey to any crime they want to commit. My prayers are for continued open-hearted connection in print, in our personal conversations & relationships with our families and communities. I appreciate your honesty with us and the calibre of work you present.

    With much love and deep regard for you, Anne & family.

  12. Whitley,
    In the event

    Whitley,
    In the event anything happens to your site that directly affects our information, I hold you harmless. Right now, everything we hold near & dear seems challenged. Also, many miraculous things are possible due to this timeframe we’re in.

    Last night when I discovered there were 20 Electronic Warfare specialists on board the “missing” plane, that I can’t believe is “really” gone, it sort of feels like we all need our wits about us to remain totally connected to our highest selves. I’m sure there are at least 2 governments involved. With all the technology, tracking AND cloaking/invisibility devices/knowledge those 20 EW specialists have–anything is possible right now.

    Because the NSA has overpowering access to all internet information, none of us is really exempt from falling prey to any crime they want to commit. My prayers are for continued open-hearted connection in print, in our personal conversations & relationships with our families and communities. I appreciate your honesty with us and the calibre of work you present.

    With much love and deep regard for you, Anne & family.

  13. I hope (meditate, pray) for
    I hope (meditate, pray) for us all, especially Whitley and Anne!

  14. I hope (meditate, pray) for
    I hope (meditate, pray) for us all, especially Whitley and Anne!

  15. Perhaps this will work for
    Perhaps this will work for you:
    1) Either get yourself a new PC, or format the disk of an existing PC and load it with an operating system from scratch. Never connect this machine to the network. Use this PC to write, do spreadsheets or whatever. This is your secure machine. If you never connect this machine to the network, no one should be able to remote into it. Accessing its files will require physical access.
    2) Get yourself a cheap chromebook. Acer sells some good ones (e.g., via Amazon). The nature of the chromebook is that it doesn’t have a disk drive where miscreants can load Trojans and other malware so they don’t need any antivirus software. Use the chromebook to surf the web, send emails, etc…. You can have both the chromebook and the PC side by side. When you need to send a file from your PC to someone (or vice versa), put it on a thumbdrive (and for example, access it via a mail program like gmail on the chromebook). To be most safe, it would be best to power up the chromebook from scratch (they really power up fast). (In the case of the mail use case, go nowhere else but to your mail program before you put the thumbdrive in. Then remove the thumbdrive after the file is sent). Even if some miscreant figures out how to place malware on the thumbdrive, once it gets back into your PC, they won’t be able to remote in and examine the files there because the PC is not connected to the Internet.

    1. Access can still be made
      Access can still be made through the wifi.
      Sorry

  16. Perhaps this will work for
    Perhaps this will work for you:
    1) Either get yourself a new PC, or format the disk of an existing PC and load it with an operating system from scratch. Never connect this machine to the network. Use this PC to write, do spreadsheets or whatever. This is your secure machine. If you never connect this machine to the network, no one should be able to remote into it. Accessing its files will require physical access.
    2) Get yourself a cheap chromebook. Acer sells some good ones (e.g., via Amazon). The nature of the chromebook is that it doesn’t have a disk drive where miscreants can load Trojans and other malware so they don’t need any antivirus software. Use the chromebook to surf the web, send emails, etc…. You can have both the chromebook and the PC side by side. When you need to send a file from your PC to someone (or vice versa), put it on a thumbdrive (and for example, access it via a mail program like gmail on the chromebook). To be most safe, it would be best to power up the chromebook from scratch (they really power up fast). (In the case of the mail use case, go nowhere else but to your mail program before you put the thumbdrive in. Then remove the thumbdrive after the file is sent). Even if some miscreant figures out how to place malware on the thumbdrive, once it gets back into your PC, they won’t be able to remote in and examine the files there because the PC is not connected to the Internet.

    1. Access can still be made
      Access can still be made through the wifi.
      Sorry

  17. Lorem,
    What a simple

    Lorem,

    What a simple solution! I think we forget that we do not have to be connected 24/7. Yes, what you suggest entails a little more work and less convenience—so what? If we really want to protect ourselves (and our work, in Whitley’s case) we should be willing to take some extra steps.

    Has it occurred to anyone that our obsession with being constantly connected may be tied to our personal issues with ‘letting go’? Is it also a metaphor for our fear of death and being alone? And doesn’t it also prevent us from engaging in face to face interaction, being willing to take the hard knocks of a ‘real’ relationship, our higher selves,and that all important connection to natural world?

  18. Lorem,
    What a simple

    Lorem,

    What a simple solution! I think we forget that we do not have to be connected 24/7. Yes, what you suggest entails a little more work and less convenience—so what? If we really want to protect ourselves (and our work, in Whitley’s case) we should be willing to take some extra steps.

    Has it occurred to anyone that our obsession with being constantly connected may be tied to our personal issues with ‘letting go’? Is it also a metaphor for our fear of death and being alone? And doesn’t it also prevent us from engaging in face to face interaction, being willing to take the hard knocks of a ‘real’ relationship, our higher selves,and that all important connection to natural world?

  19. Lorem advice although
    Lorem advice although seeming to be correct is actualy incorrect, if you have a computer with a monitor of any kind and information is readable, even with out a monitor and it is on, it is able to be accessed in read mode, read write mode is possible you can expect, but would take a serious commitment with a localised presence.

    What you would have to do is do what Lorem said then ether
    – Place that computer in a steel or EMF shielded room, that is at least 3mm of steel panelling, or obviously put the machine in a tesla cage.
    Just to share a story.

    I used to like camping, get way from the busy life of town and I took my IPAD 3 which had a number of fun games and educational videos like “the great courses”.

    Any way, I was basically at least 2 miles from the nearest person, and I was settled down on a bank and I pulled out my IPAD, switched it on (no 3g or wifi on) and with in 4 minutes a Black Helicopter swooped down over to my left and I felt the seriousness of the moment, he dropped down with their right side facing towards me and I’m fairly sure I had at least thermal scan ran on me, it was the same feeling as when you go through an air port scanner.

    EMF and the electronic frontier is one aspect of “total spectrum dominance”, to think you can switch on a modern electronic device and it not be inspect-able from the to be fair extremely large amounts of bleed over and noise.

    One small device in your home or so and a possible repeater 500 yards away if required and your home and every thing in it is an open book.

    Final point about this kind of thing is that, in the 80’s, the late 80’s this subject was already advanced beyond comprehension, then factor in a couple of decades and limitless budgets.

    Its not Gene Hackman The Conversation any more, its a bit better than that today.

  20. Lorem advice although
    Lorem advice although seeming to be correct is actualy incorrect, if you have a computer with a monitor of any kind and information is readable, even with out a monitor and it is on, it is able to be accessed in read mode, read write mode is possible you can expect, but would take a serious commitment with a localised presence.

    What you would have to do is do what Lorem said then ether
    – Place that computer in a steel or EMF shielded room, that is at least 3mm of steel panelling, or obviously put the machine in a tesla cage.
    Just to share a story.

    I used to like camping, get way from the busy life of town and I took my IPAD 3 which had a number of fun games and educational videos like “the great courses”.

    Any way, I was basically at least 2 miles from the nearest person, and I was settled down on a bank and I pulled out my IPAD, switched it on (no 3g or wifi on) and with in 4 minutes a Black Helicopter swooped down over to my left and I felt the seriousness of the moment, he dropped down with their right side facing towards me and I’m fairly sure I had at least thermal scan ran on me, it was the same feeling as when you go through an air port scanner.

    EMF and the electronic frontier is one aspect of “total spectrum dominance”, to think you can switch on a modern electronic device and it not be inspect-able from the to be fair extremely large amounts of bleed over and noise.

    One small device in your home or so and a possible repeater 500 yards away if required and your home and every thing in it is an open book.

    Final point about this kind of thing is that, in the 80’s, the late 80’s this subject was already advanced beyond comprehension, then factor in a couple of decades and limitless budgets.

    Its not Gene Hackman The Conversation any more, its a bit better than that today.

  21. Whitley,
    You might be

    Whitley,
    You might be interested to know that over the past year I have had a number of Visitor-related incidents on my Mac, and even my cell phone. Odd alpha-numeric strings, random phrases and words have been left on note-taking apps, such as Evernote. And late last year, two programs were installed on my computer when I left it unattended for several days. My home network is protected by strong encryption and it is unlikely this was any standard hacking stunt.

  22. Whitley,
    You might be

    Whitley,
    You might be interested to know that over the past year I have had a number of Visitor-related incidents on my Mac, and even my cell phone. Odd alpha-numeric strings, random phrases and words have been left on note-taking apps, such as Evernote. And late last year, two programs were installed on my computer when I left it unattended for several days. My home network is protected by strong encryption and it is unlikely this was any standard hacking stunt.

  23. Whitley,
    Do you have proof

    Whitley,

    Do you have proof that it is a government agency? Could it be a different kind of attack?

  24. Whitley,
    Do you have proof

    Whitley,

    Do you have proof that it is a government agency? Could it be a different kind of attack?

  25. Did you ever consider that
    Did you ever consider that the chief reason the NSA is wanting to track everyone in the world might be to determine who amongst us are the aliens?

  26. Did you ever consider that
    Did you ever consider that the chief reason the NSA is wanting to track everyone in the world might be to determine who amongst us are the aliens?

  27. Several years ago I was
    Several years ago I was staying at a motel and noticed a very slow connection, so I ran some packet capturing software. I found a few odd IP addresses that had made connection and I did a WHOIS search. I found that the IP addresses were registered to the US Secret Service. As I was not and am not involved in any illegal activities, their search would’ve been fruitless; yet still the intrusion is unwelcome.

  28. Several years ago I was
    Several years ago I was staying at a motel and noticed a very slow connection, so I ran some packet capturing software. I found a few odd IP addresses that had made connection and I did a WHOIS search. I found that the IP addresses were registered to the US Secret Service. As I was not and am not involved in any illegal activities, their search would’ve been fruitless; yet still the intrusion is unwelcome.

  29. Several years ago I was
    Several years ago I was staying at a motel and noticed a very slow connection, so I ran some packet capturing software. I found a few odd IP addresses that had made connection and I did a WHOIS search. I found that the IP addresses were registered to the US Secret Service. As I was not and am not involved in any illegal activities, their search would’ve been fruitless; yet still the intrusion is unwelcome.

  30. Several years ago I was
    Several years ago I was staying at a motel and noticed a very slow connection, so I ran some packet capturing software. I found a few odd IP addresses that had made connection and I did a WHOIS search. I found that the IP addresses were registered to the US Secret Service. As I was not and am not involved in any illegal activities, their search would’ve been fruitless; yet still the intrusion is unwelcome.

  31. Be careful, Stan Romanek was
    Be careful, Stan Romanek was just charged with child-porn, and he has documented people hacking his computer for years. Evidently, if “they” want to shut you up, there is no low they won’t sink to.

  32. Be careful, Stan Romanek was
    Be careful, Stan Romanek was just charged with child-porn, and he has documented people hacking his computer for years. Evidently, if “they” want to shut you up, there is no low they won’t sink to.

  33. Lately I have been thinking
    Lately I have been thinking abou

  34. Lately I have been thinking
    Lately I have been thinking abou

Comments are closed.