Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
SPEAKER_00 (00:03):
Hello everyone.
Welcome to the Diary of a SameBlack Woman.
I'm Marie, your host.
Welcome back.
I know I've been away for acouple of weeks.
Um, I had some very importantthings to take care of.
I had some very important peoplethat I needed to spend some time
with.
And so I took that some time offjust to take care of that.
(00:26):
But in the interim, life hasbeen lifing.
You know, the battle doesn'tstop just because I'm not here
speaking to you all or recordingor providing you updates, right?
I'm still being targeted.
The attacks are still coming.
And so I wanted to use today'sepisode as a reflection on some
(00:51):
of the things, not everything,right?
Um, it's always hard to includeeverything in one episode, but
to include some of the thingsthat I've actually been
experiencing.
And the title, or I would rathersay the scripture that I want to
focus on today is the scripturethat talks about the enemy comes
(01:17):
to kill, steal, and destroy.
And but God actually comes togive life and life more
abundantly.
And so while the enemy comes tokill, steal, and destroy, I am
choosing the life, the abundantlife that God is offering me and
has already given me, right?
(01:39):
Because we have everything inall spiritual blessings in
Christ Jesus, right?
Before even the foundation ofthe world.
So we have these things.
It's in us, we just need to knowhow to tap into it.
And so looking at the scripturefrom John 10, 10, it says that
(01:59):
the thief comes only, right?
Only, the word is only keyword.
The thief comes only to steal,kill, and destroy.
I have come that they may havelife and have it to the full.
(02:28):
So it may just be neighbors thatare trying to record what I'm
saying as I'm speaking to youand recording.
I just want to make sure that Iam documenting things as they
are happening, real time, inreal time.
A lot has been happening even asI was preparing, you know, how I
was going to speak about myexperiences over the past few
(02:52):
weeks and just how I've beenfeeling.
Anything from, you know, peoplecoming outside strategically,
people trying to crash mysystem, cars parking outside, so
forth and so on, which I'll gointo a little bit more when it
gets to that part.
So just as a reflection, youknow, this verse is a very key
(03:15):
verse to this episode.
And it's my reality, and youknow, it's actually what I'm
facing today.
And I, you know, it's notdiluted, you know, I'm trying to
be as sincere and candid aspossible.
You know, if you've ever felttargeted, if you've ever felt
(03:37):
tracked or spiritually sabotagedor sabotaged in your natural
life, you know, this is for you.
For those who want to learn moreabout what it's like to be a
targeted individual, you know,this is also a good episode to
listen to.
I've lived through, you know,everything that I'm speaking
about.
I've experienced this scripture,especially the first half of the
(04:01):
scripture about how the enemycomes to kill, still, and
destroy.
So if the enemy is attacking youin your life, they're not there
to help you or to make your lifebetter.
They're they're there.
The enemy is here or there tomake your life a living hell by
any means necessary.
And by any means necessary meansthrough technology, through
(04:23):
spiritual sabotage, whether it'scurses, hexes, incantations,
ill-spoken words, whatever it isthat they're using, rituals,
sacrifices, whatever it is thatthey may be using basically to
destroy your life, uh,collaborating with others to
sabotage you digitally throughtechnological warfare and
(04:44):
attacks, spying on you, so forthand so on, reporting back to
individuals, and so forth and soon.
And so there's a lot of peoplethat are basically, I would say,
accessory to what's happening.
They may not be the person thatactually launched the initial
attack, but they are definitelywell aware of what's going on,
(05:07):
and they are being used, andthey are willingly being used to
actually facilitate, you know,the the stalking, the hacking,
the data leakage, and whateverelse, you know, is actually
happening.
And so I'm here to say I'm stillhere, I'm still standing, I'm
(05:29):
still sane in my right mind,regardless of all of the
tactics, the psychologicalwarfare that has been launched
against me to try to drive mecrazy, to try to embarrass me,
to try to destabilize me.
I am still here by the grace ofGod.
And so I thank God.
(05:49):
I thank him for his grace, hismercy.
That is new every morning.
I thank him so much for that.
I thank God, I thank God, and Ithank God.
I can't thank God enough becauseI am still here because of his
grace and his mercy.
And so I just want to take alook now into the first aspect
(06:12):
of the scripture that I want tolook at at is the enemy's
blueprint.
And so the enemy comes to kill,steal, and destroy.
And that's across every domain,right?
It doesn't matter what it is,the enemy wants it, the enemy
doesn't just want your soul, theenemy wants your livelihood, the
(06:36):
enemy wants your joy, yourpeace, your privacy, your
reputation, your harvest, youropportunities, your your money,
your finances, whatever it is,however, whatever it can use to
basically try to destroy you.
So whatever and however theenemy will try to use tactics,
(07:00):
individuals, strategies todestroy you.
And so when spiritual attacksdon't work, the enemy will then
try to use human beings toattack you.
When humans don't work, they usetechnology.
And oftentimes, especially in mysituation, all three is being
used at once, right?
(07:20):
Let's use technology to run asmear campaign.
Let's use technology to try toruin her relationships.
Let's use technology to try to,you know, destroy opportunities.
Let's use technology to try topsychologically harass her and
destabilize her.
And so that is what ishappening.
(07:41):
Let's use technology to spy onher to know what she's doing,
like her next move, so that theycan basically try to destroy
that.
And so, just a few examples ofexactly what I'm talking about,
right?
Last week, I was following upwith an individual regarding
something that was actually veryimportant to me.
(08:03):
And I actually didn't leave amessage, but the person called
me back and they called me back,and they were like, Oh, I was a
little confused when I got thecall because on the other end,
the person did not see my name.
They saw a business name.
And I'm not gonna say thebusiness name here, I'll just
(08:24):
leave it at just a businessname.
And it was interesting that theperson was seeing that on their
end.
And I know that I want to saymaybe earlier that week I had
issues with my phone.
Like I wasn't even getting adial tone.
So, first they tried to sabotagemy phone where I wasn't able to
(08:46):
actually use it.
And then finally, when I got itto work, it was showing up as
some uh business, right?
So this was just an attempt tobasically cause me, to block me,
to sabotage opportunities, andto defame me.
And so that's just one example.
(09:06):
And I also want to highlighthere, and I'll probably go into
it later as well, that theseattacks are not just external
attacks.
And when I say external, I meanpeople that don't know you well,
right?
So external could be neighborsbecause you know, unless you
(09:28):
have a close relationship withthat person, they're still
external parties or strangers.
These attacks are also internal,right?
So people that you may think youhave a close relationship with
or that you probably should havea close relationship with due to
the dynamics of yourrelationship.
(09:50):
And so you would consider themas someone that is in your
internal relationship, right?
And or an internal relationshipor internal court, as they use
in a Bible, because you have youknow different courts.
So with that being said, withinthat, right, within like people
(10:12):
that you know that are part ofthe internal courts, you also
have service providers, right?
Service providers, whetherthat's your internet provider,
your telephone company, yoursoftware provider, you know,
your antivirus softwareprovider, whomever, right?
So those are also internal,right?
Because they're they're part ofyour team.
(10:33):
They should be part of yourteam, they should be helping
protect you, they should be, youknow, helping basically defend
you from like these attacks.
And what I've witnessed, notjust over the past few months,
but I would say over the pastyear and a half to two years,
(10:55):
that there has been a lot ofcorruption and compromise and
internally from certain serviceproviders where they are
actually also launching attacksagainst me as a targeted
individual.
So instead of helping me,they're actually helping
(11:17):
facilitate these attacks.
And I'll leave it at that fornow.
And I say for now because therewill be a time when I come and I
speak about it in more depth.
But, you know, I've also noticedthat and I've been experiencing
that where, you know, they'llknow and they'll see signs of
(11:38):
what's happening, but thenthey'll stay quiet about it,
which is just as bad asparticipating, or they'll
actually help launch attacksagainst, you know, the
individual in this case, whichis, you know, who is me, right?
I'm I'm the targeted individualin this case.
So the other example of likedifferent tactics um used by the
(12:02):
enemy to come kill and destroy,I can give you a perfect example
of neighbors, uh, especially myneighbor upstairs.
Whenever I turn on mytechnology, regardless of where
I'm sitting, he tends to move towherever I'm sitting.
And I know that is a strategy toprobably try to, whatever it is
(12:26):
that he's using to um surveil metechnologically, that probably
gives him more proximity to mydevice so that he can extract
whatever he's trying to extract,manipulate whatever he's trying
to manipulate.
And so I notice that.
Like I'll hear his footsteps,he'll move.
And then not only that, but Isometimes can feel the
(12:48):
technology, the the waves thatis, you know, that are coming
from the technology or whateverit is that he's using.
I can sometimes feel it, so Iknow.
And these are also spiritualattacks too.
So it's not just technologicalattacks, these are spiritual
attacks because literally when Igo to sleep, and I think I've
(13:10):
mentioned this on a few of myepisodes, I could literally hear
certain like a rhythmic footstepabove my head.
If I change direction and Isleep in a different direction,
I can still hear it.
And you know, I've seen thingsin the spiritual realm that
basically confirms that arethere are things that are being
(13:31):
done spiritually when I go tosleep.
or whatever it is that I'msaying, they go and run water.
(13:56):
They try to cancel my prayer.
And what I always say is,especially when I'm saying, cast
into hell Satan, and all theevil powers that roam around the
earth, you know.
So if you're not an evil power,if you're not, you know, on that
side, why do you need to runwater after I say cast into hell
(14:17):
Satan?
Why do you need to do that?
So for me, that's kind of like,oh, that's a red flag, right?
If I'm saying cast into hell,Satan, and all the evil spirits
that, you know, roam around theearth, you know, seeking souls
to devour or whatever, andyou're running water right after
I say this prayer, or what rightafter I pray that prayer, why
(14:42):
are you so afraid of thatprayer?
If you're not on the, you know,on that side.
Also, any prayer, not just thatprayer, anything that I pray,
they run water.
Uh that's a means to cancel myprayer.
Initially, when I first, when Ifirst moved here, they used to
(15:03):
run the Incorator, I think it'scalled.
It's like the garbage disposal.
I think that that's like, youknow, I think they have those
prayer bowls where you can it'sbasically like a send back to
sender kind of thing.
It it the pro it makes a sound.
(15:23):
I don't use I don't use thosebowls, but I know of them.
I've seen people use themonline, so I think it's it's a
similar, it's kind of like asimilar strategy, but they
haven't really used, you know,the garbage disposal.
They haven't run it as much.
It's more so running water.
(15:44):
They run water a lot whenever Ipray after I take a bath.
It's really strange.
Every time I go into thebathroom, they go into the
bathroom too.
It's pretty creepy.
And I I I think, you know, it'sit's not one thing that's
happening.
Um, it's a lot of differentthings happening happening at
(16:05):
once when I go into thebathroom.
They are monitoring metechnologically.
I don't know what they'rethey're they're recording, what
they're doing, what it is, whatdata they're grabbing while I'm
in the bathroom, but they domonitor me when I go into the
bathroom.
Sometimes they come outside, andyou know, I use the bathroom
(16:27):
like everyone else.
They monitor me.
That's supposed to be a veryprivate and intimate time, but
whenever I go into the bathroom,they're there, especially when I
go to take a shower, and youknow, they hover above me, and
then right after, right after Itake a bath, they run the water
(16:49):
again to try to cancel whateverit is that they're trying to
cancel.
And that's fine.
That is quite fine, but I'm hereto say that that happens.
And, you know, so that's some ofthe things that happen that
happens.
Drones overhead drones.
(17:09):
I've been talking about dronesfor like over a month now.
I've been, you know, last weekit was pretty interesting
because every time I crossed acertain area, the drones were
there.
And I was like, oh, is this acoincidence that, you know, it
doesn't matter what time of daythat I went, you know, through
that particular area, the dronewas there and it was crossing as
(17:31):
I was crossing.
So to me, it was evident that,you know, someone was trying to
track me.
And, you know, as I waspreparing for this podcast, we
had people gathering outside,you know, coming outside with
their children, um, park carsoutside.
(17:53):
There's a red pickup truckoutside.
I don't know if it's stilloutside, but you know, the guy
usually likes to park outside sohe can extract data.
They know what they're doing.
They park in front of my housebecause once they park in front
of the house and they turn theircar on, they're able to extract
data.
And that same guy that with thered pickup truck, literally, I
(18:16):
think it was, was it last weekwhen the the cable guy came?
He came outside, he had hisheadphones, and he was basically
pacing back and forth, basicallyspying on me, basically to try
to figure out okay, what is shetalking to him about?
And so that's the extent of likethe obsession of knowing my
(18:37):
every move.
If I'm not in my house andthey're not able to monitor what
I'm saying or doing, and I'mlike basically, I mean, I don't
have any technology that theythey can track me with, and they
they come outside.
They come outside to try tofigure out, okay, what's
happening?
What is she doing?
What is she talking to himabout?
(18:59):
And so he was pacing back andforth.
You know, he did he he asked mehow I was, and you know, I made
small talk, but I knew that hewas there to basically monitor
me.
And I also saw him in the parkthe other day as I was walking
through the park, and I'm sureit was to monitor me as well.
And ladies and gentlemen, thisisn't paranoia, it's definitely
(19:23):
a pattern of recognition, it's acombination of spiritual
warfare, technological warfare,psychological warfare.
It's uh it's it's it's all theabove.
And, you know, speaking ofparanoia, I was watching an
interview with the former CIO ofthe White House, her name is
(19:45):
Teresa Payton, and I believe itwas on the YouTube channel
called Scammers Payback, and shementioned that it's only
paranoia if it's not true.
And so if I'm saying like thesepeople are on their phones
following me, tracking me, andif I notice every instance that
(20:06):
it's happening and I'm pointingit out, I it's not paranoia,
it's actually happening.
And you know, I I think one ofthe things for me that was
probably the most triggeringlast week when I go into, you
know, when I go into that storywas not really what was actually
happening.
(20:27):
It it was m probably more so theexplanation of what was
happening to, you know, peoplethat were very close to me, but
they did not seem to understand,you know, what was happening.
And for me, I think that wasmore frustrating than anything
(20:48):
else because they couldn'tunderstand what was actually
happening.
And I'm, you know, I'm prayingthat God may open their eyes so
that they can actually seewhat's happening, not only to
me, but to them as well, becauseunfortunately, they have also
become a target as a result ofeverything that is happening.
And yeah, so you know, we Italked about the external and
(21:15):
internal sabotage, right?
In the very beginning.
So the external attacks can comefrom people close to you, some
vulnerable and unaware, andothers fully aware and willing
to worsen the situation.
And I'll give you an example ofthat.
Someone that's close to you,that's vulnerable and unaware,
(21:35):
you know, they're in yournetwork, right?
And so if they if their deviceshave been somewhat compromised
and you're in comp communicationor constant contact with them,
even if you try to take thenecessary measures to protect
yourself and to shield yourself,you will always somehow be open
(22:00):
to attacks to a certain extent,right?
As that saying is you're asstrong as your weakest link.
And so if like from a securitystandpoint, let's just talk
about like from a cybersecuritystandpoint, if they're they have
like a weak link because one,they've you know, they're
unaware of like what'shappening, and or they've
(22:24):
decided to dismiss that.
Okay, these things are actuallyhappening or that they're
happening at that level, thenthey become vulnerable, but you
also become vulnerable too.
So that's like you know, adouble whammy.
And the other the other aspectof it is you know, when we talk
(22:46):
about internal sabotage, thosethat are aware, right?
So sometimes it could be a closefriend, it could be, you know,
someone that is you consider arelative that is actually part
of the network of harassmentthat is actually facilitating
(23:07):
things, you know, for you know,the perpetrators that are, you
know, this person is now sharingthings via group chats, or
they're calling you, or callingsomeone that is close to you at
a certain time because they wantto try to trigger something.
And so, you know, you have that.
(23:31):
And when we talk about internalsabotage, I mentioned it before.
You have your phone company,software providers, ISPs who
become compromised, corrupt, andso they collaborate um with the
sabotage.
And so then that amplifies itand makes it worse.
And, you know, you basically andyou you're now in a probably a
(23:56):
worse state than you werebefore.
And you know, I've I've alreadymentioned, you know, the the the
heavy surveillance that I'veexperienced with just, you know,
neighbors or people parking bymy house.
And as I was preparing for thisparticular, you know, podcast,
(24:22):
my system crashed a few times.
You know, it crashed because umcertain things that I was typing
and keywords, you know, probablytriggered the crash.
And then also some of the thingsthat I was typing, I kind of,
you know, it it basicallytriggered them to reenact it in
(24:47):
real time, right?
Whether it be someone wearingthe same t-shirt or a t-shirt
rather, with certain messages,subliminal messages, a certain
hairstyle, you know, someoneparking in front of my house.
Like there was a, you know, aMercedes-Benz parked around, not
(25:08):
directly in front of my house,but you know, right where I
think the cable boxes.
And, you know, my system hadcrashed around that time.
Then my neighbor who washovering over my head as I was
trying to type about what hadjust happened, he walked to the
(25:28):
front and I guess he was doingsomething unsure what it was,
but whatever it was that he didtriggered a crash.
And I've seen that beforebecause usually when he walks
over my head, he'll walk over myhead, then he'll walk to the
front.
I don't know what he has upfront, so he probably has like,
you know, his gadgets and thingsset up in different areas so
(25:49):
that they can basically grabinformation, but that also
triggered a crash.
And so, you know, those arethings, you know, that's
happened.
They've tried to tamper with mycameras, they tried to tamper
with evidence, they've tried totamper with my laptops, trying
(26:11):
to give me viruses and thingslike that.
They've done a lot of differentthings, and that's like, you
know, people that are, I want tosay both external and internal,
right?
External are people that I don'tknow, people that are either
perfect strangers or people thatI just, you know, even if I see
(26:33):
them every day, but I don't havea relationship with them, I
still consider them as external,like neighbors and things like
that.
You know, I just recently movedhere, so I'm not familiar with
anyone.
And to be honest, everyonepretty much hates me.
They everyone is against me, andeveryone is all basically they
they wake up and they live tobasically try to destroy my
(26:57):
life.
And insider, like an insiderthreat, would be anyone that is
on the inside, whether it'sloved one or a quote-unquote
loved one, someone that is, youknow, in your actual system that
should be able to help andprotect your system, but is
(27:20):
actually doing the oppositewhen, you know, and that comes,
you know, when we're talkingabout like your internet service
providers and so forth.
And so, you know, these peopleare not just watching, they're
acting, and they are networked,and they want to basically
(27:40):
destroy you by any meansnecessary.
So when we talk about digitalstalking, I mentioned before
psychological warfare, right?
That's one of the ways that theytry to basically destabilize
you.
You know, they'll follow youaround even when you don't have
(28:02):
any technology on you, becauseif they spot you on the street,
if they spot you on camera, thenyou know, someone will get a
message and say, Whoa, she'soutside, right?
Like if I go throughout thegarbage, if I go do the laundry,
if I go outside with notechnology, they'll spot me and
they'll send someone to go andcome and track me.
(28:26):
And obviously, it's worse if Ihave technology on me or if I'm
driving, because the other nightI came in and it was so funny.
This woman, she had, and I'llI'm I'm just purposely
describing what she has or whatshe had on.
She had a she had her pajamas onand she had a uh red and black
(28:50):
plaid pants.
It was her pajama pants, and shecame outside with her, you know,
as I was coming inside the gate,she I don't want to say she ran
back outside or ran back inside,she she went back inside her
house very quickly as I pulledup.
(29:12):
And so I'm sure, I'm assuming,this is just my guess, that she
got a message that I was coming,I was driving by, and she was
trying to extract as muchinformation as she could, or she
whatever instructions that shewas given.
And then as she saw me coming,she she went back inside.
And to me, you know, that showsa very high level of obsession
(29:38):
and desperation to track me andto get my data that instead of
being inside your home at nightand relaxing, you have to run
outside to try to track me.
And last week I was pretty busy,you know.
(29:58):
I went outside, you know.
I've been pretty much homeboundfor I would say the past month
or so.
So last week I went out a lotmore than I usually do in a
week's time.
And I was definitely triggered.
Not so much, because I mean alot of the things that happen,
(30:21):
I've seen them happen before,but you know, I kind of went
outside without like a strategy.
And, you know, like a normalperson, right?
But I am, I'm not a normalperson because of my situation
and you know the fact that I ambeing triggered.
(30:44):
And so, you know, you havepeople randomly leaving objects
on the street, you know, wearingcertain things, doing certain
behavior, you know, writing, youknow, someone had like a note on
their car.
Some some like two two uh women,I don't know, maybe they're like
(31:10):
college a like undergradstudents, they were sitting in
front of a store that I was in,and as soon as I came out, they
had their camera up, you know,trying to film me.
So like just different thingsthat happened that was very
triggering to me.
And um, I think it's probablybecause I went out and I I I
(31:32):
didn't go out to basicallydefend myself or I didn't think
of of being like on the defense.
I just kind of went out becauseyou know, I was out with loved
ones and I, you know, was outand about doing trying to live a
normal life.
And so it was a bit triggering,but I think what also triggered
(31:55):
me was that at the time as I wastrying to explain what was
happening, I I don't think that,you know, the people that I I
was, you know, the people I waswith, I don't think they fully
understood the the extent ofwhat was actually happening.
(32:17):
They tried to understand, butyou know, the this stuff is
really hard to explain tosomeone that has not either
experienced it or is unawarethat they are actually
experiencing it.
Because again, I believe thatsome people that are within my
network are also experiencingit, but they just don't know
(32:40):
that they're experiencing it.
And so yeah, I I think some ofthe things that happen, a lot of
people might say, well, youknow, that's nothing, you know,
just ignore it.
You know, that's just likeminor, like this is it's not a
(33:03):
big deal, you know, just ignoreit.
I think what ends up happening,and again, I hear my echo again.
I don't know if it's random orif it's someone trying to record
me.
I think what makes it triggeringis that we have like these
(33:28):
microaggressions, thesemicroaggressions happening,
these tactics, these coordinatedtactics.
You have the street theater andyou have all these things, you
have people following youaround, and if it's just one
thing that happens once in awhile, or one thing that happens
(33:51):
in you know, in just one time,that's one thing.
But if you're having like thesethings happen to you over and
over and over again, I like tocompare this to the one mosquito
bite versus being bitten by likea million mosquitoes, right?
(34:13):
So you have one microaggressionact versus like a million acts,
you know, compounded into likeyour daily life every single
day, every single thing that youdo, it's there.
And so, yeah, that one thingthat seems, I guess, minor
(34:38):
becomes something that isactually a lot more impactful in
a negative sense because so muchof it is happening at once with
so many people, and so you know,that can trigger you, that can
(34:59):
cause you to act and or respondnegatively, right, in a negative
way.
And the Bible talks about thatin Psalms 37.
It says, not to allow the enemyto trigger you, right?
The enemy thinks that they cancontinue to do whatever they're
(35:23):
doing forever, that no one willsee them.
That's what Psalm 64 says.
And Psalm 37 says not to worrywhen the enemy prospers in their
ways, you know, because it'sonly for a season, it's only for
a certain time that this willhappen, but it also reminds us
(35:44):
not to be triggered or provoked.
And I must say, I did definitelyallow myself to be triggered.
And again, you know, I I didn'tfully, I wasn't prepared the way
that I should have preparedmyself because especially I
haven't gone out in a while, andand so I know how I would have
(36:06):
handled it had I been prepared,or if I was, you know, by
myself, but it it was quitedifferent.
The dynamics were different lastweek.
And so I stepped out withoutstrategy and I moved, you know,
like a normal person, not likesomeone that was under constant
surveillance.
And so, you know, I I paid thethat price, and so I was
(36:29):
triggered, and I didn't walk intemperance.
So the microaggressions hithard.
And so the narrative was ready,right?
The the angry black woman, thecrazy black woman, the unstable
black woman, right?
Not the one being attacked, notthe one being stalked, just the
(36:50):
one who reacted, right?
Because everyone will hide theirhands.
We're not gonna talk abouteverything that they've been
doing to me and the you know howthey coordinate their attacks to
attack me everywhere I go, butthey want to talk about my
reaction, right?
They provoke you, then theypoint fingers.
(37:12):
But I know who I am and I knowwhat I carry.
I know that number one, I'mforgiven.
I know that I'm working out mysalvation daily, and so I never
profess to be a perfectChristian from day one of
launching this podcast.
I know it's a process.
I know that I work out mysalvation daily, you know.
(37:36):
I am saved, I was saved, and Iam being saved daily on a daily
basis.
The Bible says that a righteousman falls seven times a day.
At least, right?
At least.
And so, you know, it's not bymight, not by power, but it's by
the spirit, the spirit of God.
(37:57):
And so here I am.
I was provoked, I walked out oftemperance, I did not use that
fruit at all.
It's a fruit of the spirit, andthat's an area that I definitely
need God's grace and mercy.
And I I never I I definitelyneed to stir up that fruit.
(38:19):
I need to walk in temperance,and I know it's it's hard.
And in the situation that I'min, it's hard.
Sometimes I do feel like I I Iwant to and I need to confront
the situation, and at othertimes I actually ignore it.
Like there's so there's been somany times that I've ignored
certain things, but there arecertain instances where I feel
(38:42):
compelled to react.
And I think the important thingis I need to know whether I'm
acting out of the flesh or thespirit, because there is a time
for everything, right?
There is a time to speak out, atime to react.
But there are times where weshould not react.
(39:04):
And so I think the importantthing is to make sure that
you're being led by the spiritand not by your flesh, to kill
that flesh and to walk in thetemperance that you know God has
instilled in you.
And so I I am praying for thattemperance.
I'm praying for God to stir upthat fruit within me and to help
(39:26):
me as I I go through thesetrials and these these attacks.
And so I want to look attechnology as a spiritual
weapon.
We used to talk about monitoringspirits as Christians, right?
(39:52):
We're always talking aboutmonitoring spirits, monitoring
spirits.
But to be honest, a lot of themonitoring spirits that we are
encountering today in this dayand age are primarily
technological devices and toolsand strategies that people are
(40:13):
using to monitor us.
So we we we talk about drones,malware, signal leakage,
hacking, spyware.
The enemy doesn't need demonsanymore, right?
It has devices.
We know that the enemy comesaround like a roaring lion
(40:36):
seeking who he may devour.
And so these technologicaldevices and tactics actually
facilitate the attacks.
Whatever else is, you know, theythey want to know what are you
working on?
What what what do you have goingon?
(40:58):
What opportunities do you havecoming down the pipeline?
Are you happy?
Are you depressed?
If you're happy, how can I tryto ruin your day?
If you have something good goingon, how can I mess that up?
How can I spiritually attack youbetter?
Oh, you're praying about this.
(41:18):
Let me pray the contrary.
Oh, you just prayed, let me tryto undo your prayer.
I mean, I talked about it in thebeginning, right?
And I gave you an example,specific example of someone that
I know who is constantly doingthat around the clock.
So the enemy basically wants todestroy you.
The enemy wants to destroy me.
(41:41):
I know that.
So the enemy wants to literallyand like spiritually blow out
your candle.
Anything that you have thatshows any aspect of light or
anything that is good, they wantto try to destroy it.
And so when we talk aboutmonitoring spirits and we talk
(42:06):
about evil and we talk aboutusing technology to do evil,
it's real, ladies and gentlemen.
Not only are they using thesedevices, right?
Whether it's fat viruses,malware, adware, spyware,
whatever it is to do bad, butthen it it there's a there's
(42:27):
another layer and even a deeperlayer.
I I mean, I've always kind ofyou know uh thought about like I
I've always looked at technologyfrom two different lenses,
right?
You know, the the good and thebad aspects of technology and
how you know it could just turninto like something very, very
(42:49):
bad for humanity.
But the other day, like a coupleof weeks ago, I heard an
interview.
It was on uh Tucker Carlson'spodcast, and the person that he
was interviewing mentioned thatone of the creators of AI
actually consulted or summoned ademon or demons to develop the
(43:15):
AI technology, and so that to meis very alarming.
And there are other things thatwere mentioned on that podcast
that was quite alarming to me.
And like one of the questionsthat they asked, which was very
(43:37):
kind of intriguing, was like, isthis something new?
Like, is it a new technology, ordid we give a body to something
that did not already exist?
And I'm using like bodyfiguratively, like the structure
of technology to like a demonicentity like within the
(44:01):
technological structure, we'regiving AI like a body.
I mean, that was you know, moreor less what that question was,
right?
And and I think I think I thinkit was Tucker that asked him
that question, if if I remembercorrectly.
I mean, go and watch the goahead and watch the interview.
(44:23):
I don't I don't recall.
There there were a lot ofinteresting pieces.
It was a very interestinginterview, although there were
some parts that kind of left abad taste in my mouth, but for
the most part, it was a very itwas a very interesting and uh
very good interview and veryinsightful, very insightful.
(44:46):
This is not related to the to tolike what I'm talking about
today.
The other thing that hementioned, which I need to do
some research on, he alsomentioned something about the
King James Version and how thatwas translated, and what or who
was summoned to translate theKing James Version of the Bible.
(45:09):
So that has given me some pauseas well.
So, you know, I don't want torepeat something that's wrong
without verifying it, but thatactually gave me some pause, and
it's definitely something I wantto look into to see, okay, how
(45:31):
did we get to the King JamesVersion of our Bible and who
actually did the translating orwho inspired the translation of
the King James Version.
He talks about that in in thatepisode.
So, I mean, check it out and youknow, see it for yourself and
you know, cross-check it,fact-check it, whatever you guys
(45:53):
want to do.
But it was a it was aninteresting episode.
And I I say all this to say howwe live in a world, right?
We live in a sinful world, andthe demonic is all around us,
the enemy is all around us.
The enemy comes to kill, steal,and destroy, and so it'll
(46:14):
infiltrate even what's good,right?
To try to destroy it.
And, you know, technology,obviously, at least I would
hope, was not created to destroyus, right?
But to make us better at what wedo, to make us more efficient.
But, you know, as humans,unfortunately, we are now using
(46:36):
it to basically destroy eachother, and that is unfortunate.
And that's another aspect of theenemy coming to kill, still, and
destroy.
And the the the the the KingJames version still kind of um
has me kind of questioning a lotof different things, and I need
(46:57):
to to look into that more beforespeaking on it, but I I you know
I I was uh I was baffled by someof the things that he was saying
and intrigued in some otherinstances, and just kind of
(47:17):
like, wow, that's a lot ofinformation, and a lot of the
things that some people wouldsay were like conspiracy
theories or things of thatnature, he kind of verified like
these things are actuallyhappening, like it's not like a
conspiracy theory, like thisstuff is actually happening, so
(47:41):
yeah.
In any event, speaking of theenemy coming to kill, steal, and
destroy, you know, I'vementioned this before.
My podcast has been under attacksince its launch.
So the the interesting thingabout it is that they want they
want to know what I'll say next.
(48:03):
They they'll listen, right?
They'll listen in hiding,whether it's in their car,
trying to tap into my network,trying to eavesdrop, trying to
record me illegally.
They'll try to distribute thator live stream it via their
group chats.
They'll even try to duplicate orregurgitate, you know, my
(48:23):
experiences or what I'm saying,both to I I want to say like to
troll, but also to actually theyknow that okay, she's making
good points, but we're trying towe're sabotaging her anyway, so
we'll pass this off as ourexperience, as if we're actually
(48:46):
going through this, or it wasour thought, or whatever, or
we'll do this to troll her, andyou know, I've seen that, but
you know, they're listening,they are listening.
I mean, so don't let the numbersfool you.
They are actively watching, theyare actively listening, they
(49:06):
always want to know what Marieis doing next.
If Marie's home, they are tunedin.
What is Marie doing?
What is she eating?
When is she going to thebathroom?
When is Marie going to take ashower?
Marie's outside, oh my gosh.
Marie's throwing out thegarbage, Marie's doing laundry.
Those they are constantlywatching.
(49:29):
So when I decide to speak, orwhenever whenever I decide to
talk and about a particulartopic on my podcast, about a
specific experience, they aretuned in.
They are tuned in and they arelistening.
So, I mean, that is what hasbeen happening.
(49:51):
You know, they they'll try tocrash my system, as I mentioned.
They'll try to obstruct myuploads, just different
interference, which I mentionedbefore.
You know, like I said in in theopening of this segment, they
literally want to blow out mycandle.
But I've got oil that they can'ttouch.
(50:16):
That's for sure.
That's for sure.
They can try to blow it out asmuch as possible.
And so the the other types ofattacks, we talked about
psychological attacks, we talkedabout symbolic harassment or
psychological warfare, right?
(50:36):
So I mentioned earlier, youknow, as I was typing literally
mid-sentence, like my neighborssent their children past my
apartment randomly.
They were really loud.
And it happened a few timesduring this recording, actually,
just to try to disrupt me.
(50:58):
But also they dressed them inlike subliminal t-shirts with
you know messaging on there,whether it's a a written message
or a picture or something,right?
And so it's kind of like, okay,you're actually vetting what I'm
saying because now you're notonly vetting that you're
(51:20):
surveilling me because nowyou're reacting and sending
people basically to prove whatI'm saying is happening, but
you're doing it in real time,right?
So you're vetting thesurveillance, you're also
vetting the harassment.
And I also mentioned about theMercedes Benz that was parked
(51:42):
outside during the system crash.
And when I saw the car, I said,okay, I'm going, I'm going
outside.
And I typed, there's aMercedes-Benz parked outside,
and as I went outside, they weregone.
So literally, literally, theyare basically monitoring my
every move.
(52:05):
And so, you know, they arewatching, they're not just
watching, they're reacting,right?
Because now they're watching,they're spying, they're
listening, and they're reacting,basically trying to create more
triggers.
And I just want to tell y'all, Iwas not triggered.
I don't get, I don't easily gettriggered.
(52:27):
I was triggered last week for avariety of reasons, but I've
managed to go through this stuffso many times over the past two
and a half years.
It's been going on a lot longer,but I only use the past two and
a half years because that's whenit actually magnified.
(52:51):
And so I have learned to ignorea lot of things.
I think the most important thingto me now is to basically try to
contain and come up with a wayto resolve the invasion of my
technology, the invasion of myprivacy.
(53:14):
That's what I'm trying tocontain right now.
I know even after I do that, thethe harassment, or at least the
subliminal, the subliminalharassment might still continue,
but you know, I'll just ignoreit as much as possible.
And if the Holy Spirit leads meto react or to act, I will.
(53:39):
But aside from that, you know,I'll do whatever God leads me to
do.
I mean, there is a time foreverything, as it says in
Ecclesiastes, and also the theword of God also says faith
without works is dead.
And so there are times where wehave to yield, right?
(54:01):
After we've made a request orafter we've done what God said
to do, where we just it'swaiting and yielding and waiting
on God, but there are timeswhere God wants us to act.
Which brings me to the secondhalf of John 10:10, right?
(54:22):
Which says that God has come togive us life more abundantly.
We we see in the earlier or thefirst half of that scripture, it
talks about how the enemy comesto kill, steal, and destroy, but
God has come to give us lifemore abundantly into the full.
I think that's what theamplified version says.
(54:43):
So we first, in order to livelife more abundantly, or that
part of the scripture, we firsthave to learn when it's the
right time to yield, right?
When is the right time to yieldwith God?
When is the right time to yieldto God and how to collaborate
with God and when it's when Godneeds us to collaborate with
(55:07):
Him, right?
Because as I mentioned, faithwithout works is dead.
And so we partner with God asthe Spirit leads us, the Holy
Spirit leads us, and then wealso yield as the Holy Spirit
leads us.
We yield when God says yield, weact when the spirit says act,
(55:28):
and we pray strategically,prophetically, and persistently.
We don't lean on our ownunderstanding at as it says in
the scripture, but we trust thatyou know God is going to direct
our steps and that we'retrusting in the vision and that
it is a for an appointed timeand that it will surely come to
(55:50):
pass despite what you know thedelays that it may, although it
may seem like it's a delay orwhatever, we know that God is
going to bring things to past.
And so for me, in my personalexperience, for those who have
gotten to know me through mypodcasts, you know, the first
(56:14):
two seasons, we're we're inseason two now.
You've gotten to know me over 10episodes from the first season,
and you're getting to know mebetter now in this second
season.
And some people think they knowme, but they don't because
they're seeing what has beenused to paint me in a certain
(56:37):
light.
But with all that being said, Ithink one thing that most people
know about me, even the onesthat don't know me or that don't
have a full picture of me, isthey know that I pray.
I pray a lot.
I have a pretty I think I have agood prayer life.
(57:02):
Um, I think there are thingsthat I can do to change that
still, you know.
I'm not a perfect person, butI've been praying for a long
time.
And I can say I've definitelyseen God's protection, I've seen
God's mercy, I've seen God'sgrace, but I've also experienced
(57:22):
delays, sabotage, and what Iwould like to call loss.
But I also know that God worksall things together for the good
of them that love him.
And so I think one of the thingsthat I need to work on, in
addition to temperance, right?
(57:44):
I talked about temperance is anarea that I know that God is
also dealing with me as I ambeing triggered, right?
And and rightfully so, right?
Any person in my shoes wouldprobably react in the same way,
or if not worse.
But I know what the Bible saysabout temperance and not being
(58:05):
allowing the enemy to provokeyou.
So I want to act in accordanceto what the Bible says.
I also want to yield, right?
I don't want to play God, Idon't want to be the God of my
life.
I want to rely on God.
(58:28):
And so when I pray, I want toyield at the right time, right?
I want to have that discernment.
My old pastor, Dr.
Ireland from Christchurch, andthe only reason why he's my old
pastor is because I've moved,I've relocated to another state.
He's a wonderful pastor.
(58:52):
We were doing, he was doing aseries on praying, and he used
the acronym pray.
P is for praise, R is forrepent, ask, A is for ask, and Y
is for yield.
(59:12):
And so in that order, right?
So when we pray, we first praiseGod, we then repent, we then
ask, and then we yield.
And so I've done, I'vedefinitely done the first three.
I know I've done the firstthree.
I've done the first three.
I've definitely repented, I'vedefinitely asked.
(59:36):
I think I probably need to domore of the first part, the
praise and the yield.
I think those two areas I areprobably deficient.
I've done a lot of repenting,I've done a lot of asking.
While I've done praising, Ithink I could do more praising.
(59:57):
And actually, praising isactually.
More effective, and I've heardthis a lot in different
spiritual circles, but even likeI've done a lot of reading on
exorcisms, and that is actuallyone of the most effective uh
(01:00:18):
weapons that you can use morethan casting, I cast you out or
whatever it is.
Like praising God is one of themost effective weapons that you
can use.
And so, you know, I want tocommit to more praising and also
yielding to God.
(01:00:39):
You know, the scripture says,cast your cares on the Lord
because his burden is light andhis yoke is easy, and so I want
to experience that easy yoke.
I want to experience thatabundant life that God talks
about.
And I need to yield.
I I I I I recognize that.
(01:01:06):
I recognize that.
And, you know, I mentioned Iwas, you know, I spent time with
loved ones, you know, the pastweek, and that was something
that I was reminded of.
Like, you know, if you you'repraying, you believe God is
gonna do it, you believe God isgonna handle things, why are
you, you know, why are youreacting?
(01:01:27):
Why are you upset?
Like, you know, let God be God.
And you know, that that's true.
Let God be God.
Let God be God.
Yield.
And I want to yield when it'stime to yield, and I want to act
when it's time to act, accordingto how God and the Holy Spirit
(01:01:52):
leads me.
And finally, I want to reflectlike from a spiritual
standpoint, in terms of like whyso many people can come against
one person, one voice, onedestiny, right?
(01:02:12):
People point fingers, you know,they'll say it's my fault that
I'm being attacked, that I'mbeing punished, it's karma, like
I've heard all things,reckoning, whatever it is that
they want to use, that I'm theproblem.
And, you know, I I beg todiffer.
I'm not perfect by any means,and you know, I'm working out my
(01:02:39):
salvation daily.
I definitely count it all joy,right?
So from a spiritual standpoint,the trials that I'm facing, not
from a natural standpoint,because like this is this is
horrible what's happening.
But with that being said, Idon't believe I I deserve it.
(01:03:01):
I don't believe the attacks arewarranted.
And, you know, I've beenmislabeled, I've I've I've I've
been misjudged, I've beenblamed, you know, for reacting
to oppression or being attacked.
I've been, you know, I've beendoxxed, I've been sabotaged in
(01:03:26):
so many different ways.
A lot of things have been doneto me, and like it's just a
group of people basicallyganging up on me, right?
That's why it's called gangstalking.
Like people are ganging up onyou to attack you in every
aspect of your life.
And, you know, you watch peoplethat that participate in those
(01:03:48):
attacks, right?
They become guilty byassociation, right?
You're you're actually nowfacilitating the attacks because
now you're you're you're uhintermediary between the
attacker and me, and you'rebasically providing updates,
sharing information, making thatphone call as you pass by my
(01:04:10):
house so that somehow you cantap into my network, whatever it
is that you're doing, you'rejust as guilty.
And, you know, also seeing thesame people who point fingers
and you know, they carry theirown hidden sins, right?
We all have sinned and fallenshort of the glory of God.
And I've seen people like getupset and over, I'll say
(01:04:36):
overreact in quotes for a lotless than what I'm going through
right now.
And they're the same peoplebecause they thought someone
might have compromised somethingthat they said or something that
what they deemed private, andthey're the same people that are
actually leading the attacks,that are leading, you know, all
(01:05:01):
of these, you know, the smearcampaigns and everything that
are facilitating things, thatare sharing screens, sharing
information, you know, trying todestroy relationships and and
things like that.
And so, and and I've said thisbefore, if this many people are
(01:05:24):
coming against one person, thatperson, in in which case, or in
this case, you know, is me, mustcarry weight.
And and if that many people,whomever they are, if they were
innocent, they become guilty,the moment they participate in
(01:05:47):
the oppression, the moment youturn a blind eye when you know
it's happening.
So, you know, I I just want toclose in saying that every
attempt to kill, steal, ordestroy what God has for me is
reversed.
(01:06:08):
My voice is encrypted in heaven,and my platform is sealed by
God.
I walk in abundance, and notactic of the enemy shall
prosper.
My prayers are not undone, theyare multiplied, my peace is not
stolen, it is fortified, myharvest is not delayed, it is
(01:06:33):
protected.
Thank you for joining me.
I know this was a longerepisode, but we needed to catch
up, and hopefully, I'll see yousooner than later.
Thank you for joining the diaryof a sane black woman.