Gang Stalking, Cyber Vigilantes, Mobbing, Cellphone Stalking

Ever since researching the Human Flesh Search Engine people are probably a little confused. What is the difference between something like that and Gang Stalking?

Well I thought that this would be a good time to briefly go over some of the harassment’s that are similar, and what the differences are. If I have forgotten anything forgive me in advance.

Mobbing

-Subtle and Covert. Mobbing has many aspects similar to Gang Stalking. The emotional and psychological abuse that the Targeted Individual suffers is very similar to what targets of workplace mobbing suffer. On this level the mobbing community are our closest relations, and this is why Gang Stalking has also been termed community mobbing by some.

http://gangstalkingworld.com/Media/2006/10/what-is-mobbing/

Mobbing can be understood as the stressor to beat all stressors. It is an impassioned, collective campaign by co-workers to exclude, punish, and humiliate a targeted worker. Initiated most often by a person in a position of power or influence, mobbing is a desperate urge to crush and eliminate the target. The urge travels through the workplace like a virus, infecting one person after another. The target comes to be viewed as absolutely abhorrent, with no redeeming qualities, outside the circle of acceptance and respectability, deserving only of contempt. As the campaign proceeds, a steadily larger range of hostile ploys and communications comes to be seen as legitimate. …

Not infrequently, mobbing spelled the end of the target’s career, marriage, health, and livelihood. From a study of circumstances surrounding suicides in Sweden, Leymann estimated that about twelve percent of people who take their own lives have recently been mobbed at work.”

~ Kenneth Westhues, Professor of Sociology

Mobbing can be ongoing for years, it can cause health problems, and can even cause the targets to become violent, or have emotional breakdowns. Mobbing is hard to prove, and changing jobs might stop the mobbing, but it may not. Mobbing can cause you to be blacklisted from your field of employment.

Cellphone Stalking

-This is an overt form of harassment that involves 24/7 surveillance . The targets cell or cameraphones are used to track and monitor them 24/7.

Emotionally it’s stressing to the targets just like Gang Stalking, but with cellphone stalking and the overt nature of the harassment, targets often have evidence to present to the police. Also the targets could get rid of their phones to stop the harassment.

Human Flesh Search Engine

-This is often overt and swift. In Korea it’s called Cyber Violence, and in America it’s called Cyber Vigilantism.

http://technology.timesonline.co.uk/tol/news/tech_and_web/article4213681.ece#

http://gangstalkingworld.com/Media/category/articles/mobbing-articles/

Human flesh search engines: Chinese vigilantes that hunt victims on the web
A new phenomenon is sweeping China after the quake: digital witch hunts of those who dare to be outspoken or criticise

Ms Wang’s Chinese name, Chinese identification number and contact details in America were tracked down and posted across the internet. She received hate mail and threats that if ever she returned to China, she would be “chopped into 10,000 pieces”. Her parents’ address in China was published and they were forced to go into hiding.

Tibetans have also been targeted. After 44-year-old Lobsang Gendun was photographed protesting at the Olympic torch relay in London, Paris and San Francisco, the human flesh search engine whirred into action.

With huge overseas communities, it took just a couple of hours for Chinese web users to collate the pieces of Mr Gendun’s life – replete with Google satellite map and photos of his American home.

“I suggest assassination,” wrote one poster. “Execution by shooting,” said another. No, no, insisted yet another: “Use China’s most ancient form of execution – dismember him.”

In an unfortunate case of mistaken identity, it turned out there was another exiled Tibetan called Lobsang Gendun living in Utah. Since the targeting of his namesake began, Mr Gendun, a self-proclaimed “Olympic supporter”, has received hundreds of aggressive emails and telephone calls.

http://www.cracked.com/article_17170_8-awesome-cases-internet-vigilantism.html

The speed to which the vigilantes can mount an attack is amazing, not just in China, but in Korea and America as well.

The Snoop Next Door

The digital age allows critics to quickly find a fair amount of information about their targets. One day last November, at about 11:30 a.m., a blog focused on making New York streets more bike-friendly posted the license plate number of an SUV driver who allegedly accelerated from a dead stop to hit a bicycle blocking his way.

At 1:16 p.m., someone posted the registration information for the license plate, including the SUV owner’s name and address. (The editor of the blog thinks the poster got the information from someone who had access to a license-plate look-up service, available to lawyers, private investigators and police.) At 1:31 p.m., another person added the owner’s occupation, his business’s name and his title. Ten minutes later, a user posted a link to an aerial photo of the owner’s house. Within another hour, the posting also included the accused’s picture and email address.

The SUV’s owner, Ian Goldman, the chief executive of Celerant Technology Corp. in the New York City borough of Staten Island, declined to comment for this article. According to an email exchange posted on the blog, Mr. Goldman said that he had lent the vehicle in question to a relative with “an urgent medical situation” and that he was not aware of any incident. The alleged victim has decided to drop the matter since the damage to the bicycle, which he was standing next to at the time, was under $20. Last month, Aaron Naparstek, editor of the blog, says he removed Mr. Goldman’s home and email addresses from the site after receiving a “lawyerly cease and desist” email asking that the whole posting be deleted.

This is in America and I see very little difference to some of the stories that happened in China.

Here is one more from Korea where they call it cyber violence, or online Mobbing.

http://gangstalkingworld.com/Media/2006/09/cyberviolence/

SEOUL Kim Myong Jae’s estranged girlfriend was found dead in her room in Seoul on April 22 last year, six days after she poisoned herself.

Two weeks later, Kim, a 30-year-old accountant, found that he had been transformed into the No. 1 hate figure of South Korea’s Internet community, a victim of a growing problem in a country that boasts the world’s highest rate of broadband use.

First, death threats and vicious text messages flooded his cellphone. Meanwhile, spreading fast through blogs and Web portals were rumors that Kim had jilted his girlfriend after forcing her to abort his baby, that he had assaulted her and her mother, and that his abuse had finally driven her to suicide.

“By the time I found out the source of this outrage, it was too late. My name, address, photographs, telephone numbers were all over the Internet,” Kim said. “Tens of thousands of people were busy sharing my identity and discussing how to punish me. My name was the most-searched phrase at portals.” News reports and portals confirmed that his name was at the top of such lists.

The next time someone tells you that people would not waste the time in harassing others, or stalking others, just smile knowingly and point to these articles.

Gaslighting

-This is often covert and done over a period of time, and the goal is to drive the person crazy, or to freak them out, or give them a breakdown.

http://en.wikipedia.org/wiki/Gaslighting

Gaslighting is a form of intimidation or psychological abuse in which false information is presented to the victim, making them doubt their own memory and perception. The classic example of gaslighting is to change things in a person’s environment without their knowledge, and to explain that they “must be imagining things” when they challenge these changes. Popular usage of the term can be traced to at least the late 1970s.[1]

The term derives from the 1938 stage play Gas Light, in which a wife’s concerns about the dimming of her house’s gas lights are dismissed by her husband as the work of her imagination, when he has actually caused the lights to dim. His action is part of a wider pattern of deception in which the husband manipulates small elements of his wife’s environment, and insists that she is mistaken or misremembering, hoping to drive her to insanity.

Use in real life

An example of gaslighting being used in real life was by the Manson Family during their “creepy crawler” burglaries during which nothing was stolen, but furniture in the house was rearranged[2].

http://www.amazon.com/Gaslighting-Drive-Your-Enemies-Crazy/dp/1559501138

Apparently this is an ongoing storyline. However if you want to see a really good storyline look up Drucilla being Gaslighted, also from the same soap opera, but from a few years ago. That was so well done, that the character ended up in a mental ward. It was a wonderful example of Gaslighting. I have not seen the Ashley storyline yet.

Gang Stalking

-Covert and ongoing. On an emotional and psychological level this is very similar to mobbing.

http://www.amazon.com/Bridging-Gap-Gmb-Bailey/dp/1441448845

Bridging The Gap is a disturbing, yet poignant look into modern day democratic surveillance societies. The book examines how this structure is used to discredit, disenfranchise, and destroy innocent citizens. Gang Stalking, The Buzzsaw, Cointelpro, what do these words mean and more importantly what do they have in common? They are names that have been used to describe the systemic apparatus that reaches out to destroy and discredit those declared enemy by the state. This book will open your eyes to how the informant system has taken over these democratic countries, and how they are being used to further create a surveillance society where no one will be out of reach, should they too become persona non grata by the system.

I would say it’s a tie between stasi Germany and what happened under Cointelpro, however Stasi Germany probably most mirrors what is happening now.

-ACLU Investigations

http://blog.aclu.org/2009/04/30/mass-con-fusion/

Mass Con-Fusion

You mean to tell me that it is legal for corporations from the private sector to team up with local law enforcement officials in efforts to spy on innocent members of our society? You also mean to tell me that the synthesis of law enforcement authority and the drive of for-profit companies operate under little to no guidelines or restrictions and it is unclear to whom they are responsible to?

Cointelpro

http://en.wikipedia.org/wiki/COINTELPRO

COINTELPRO (an acronym for Counter Intelligence Program) was a series of covert, and often illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at investigating and disrupting dissident political organizations within the United States. The FBI used covert operations from its inception, however formal COINTELPRO operations took place between 1956 and 1971.[2] The FBI’s stated motivation at the time was “protecting national security, preventing violence, and maintaining the existing social and political order

-Stasi

http://en.wikipedia.org/wiki/Stasi

The Ministry for State Security, (German: Ministerium für Staatssicherheit, commonly known as the Stasi [ˈʃtazi] (abbreviation German: Staatssicherheit, literally State Security), was the official secret police of East Germany. The MfS was headquartered in East Berlin, with an extensive complex in Berlin-Lichtenberg and several smaller facilities throughout the city. It was widely regarded as one of the most effective and repressive intelligence and secret police agencies in the world. The MfS motto was “Schild und Schwert der Partei” (Shield and Sword of the Party), showing its connections to the Socialist Unity Party of Germany (SED), the equivalent to the Communist Party of the Soviet Union.

Cults

The bigger picture is that the structure functions like a cult does.
In how it keeps the members in line, how they obey and how they punish and try to destroy those outside the cult and those who would leave the cult.

This is just a very quick and brief introduction to this subject matter. To learn more, I suggest doing your own research and reading up on the subject matter.

Advertisements

Electronic Harassment

Attribution:

http://www.abovetopsecret.com/forum/thread1143/pg1

ultra_phoenix
Newly De-Classified US Electronic Harassment Technologies

January 19, 1998

This page lists articles from technology publications which show how these technologies are being marketed in commercial form, and have also been and are being used to harass covert weapons testing victims:

The reader is asked to remember that ANNOUNCED inventions with potential for “national security” use are ALWAYS already in use covertly when announced. The SR-71 “Blackbird” surveillance aircraft was in use for many years before the public saw it.

This page lists articles from technology publications which show how these technologies are being used to harass covert weapons testing victims, and are now coming out in commercial form, or have been announced to the public:

1. Aviation Week & Space Technology, March 10, 1997 “Radar Warns Birds of Impending Aircraft”

This article by Bruce Nordwall (Washington bureau) describes research being carried on by the USAF Wright Laboratory at Dayton Ohio. The article describes the use of MODULATED radar signals to produce AUDIBLE SOUND within the brains of birds near airport runways to cause them to fly away and avoid collisions with landing aircraft.

Other references on work with animals or humans with “audible microwaves”:

Science, vol. 181, 27 July 73, page 356 Nature, vol. 216, DEC 16 1967, page 1139 Nature, vol. 210, May 7 1966, page 636 Journal Acoustical Society of America, June 1982, page 1321 Bioelectromagnetics conference, 1992, 13:323-328 (pages 323-328)

This list was furnished by the lab at Wright- Patterson Air Force Base where this type of unclassified development is now in progress.

** The transmission via MODULATED microwave pulses carrying voices to selected weapons testing victims has been carried on for more than two decades, as reported by the victims. There has been little published about this phenomenon, and since direct-to-skull voice transmissions are consistently mis-interpreted by psychiatrists as ‘schizophrenia’, getting this information to the public needs concerted attention.

2. Electronic Business Today, February 1997 “Business Trends” section, page 20

Inventor Elwood Norris, and his small company, (American Technology Corp., Poway CA) have designed a market ready device called an “acoustical heterodyne”.

This device sends out two sound signals in the ultrasonic (above-human-hearing) range which, when they impact a surface, which may be a living creature, then and only then produce a sound at a frequency equal to the DIFFERENCE (“heterodyne”) of the two ultrasound frequencies.

** This technology has been used extensively by harassers who follow a walking or driving victim and bounce raucous, unnatural bird calls and other strange sounds off surfaces near the victim. This type of sound is tape recordable.

ATC Corporate Headquarters 13114 Evening Creek Dr. S. San Diego, CA 92128 (800)41-RADIO (417-2346) (619)679-2114 (619)679-0545 FAX atc-info@atcsd.com http:/www.atcsd.com

3. New York Times, April 7, 1997, “Devices May Let Police Find Hidden Guns on Street” article

This article, with photos supplied by Millitech Corporation, describes recently unclassified “millimeter wave” cameras (and some other see- thru technologies less well developed.)

These units operate like camcorders, giving the user a real-time thru-clothing, thru- luggage image for detecting weapons and drugs.

Technology like this does not just pop out of nowhere overnight, and it probably has its roots in the 1960’s classified microwave weapon “renaissance” – about the same time as the U.S. embassy staff in Moscow discovered they were being bathed in Soviet microwave signals.

OEM Magazine, February 1997, page 20 “Electronic Dipstick” article

This article describes “micropower impulse radar” or “MIR” radar, developed at Lawrence Livermore Lab in California, and licensed to several large companies for consumer products. Basically, this radar uses the highest radio frequencies and does not require the supporting hardware like rotary antennas which ‘conventional’ radar does.

Uses include vehicle blind-spot sensors, traffic control sensors, heart muscle response monitors, and ** see thru plaster ** stud finders.

** Thru the wall radar has been covertly used for a number of years on weapons testing victims. One common use has been to detect where the victim is standing or walking in their apartment, and ‘follow’ the victim’s position by rapping floor, walls, or ceiling from an adjacent apt. This is designed to let the victim know he/she is under constant surveillance.

4. Defense Electronics, July 1993, page 17

DOD, INTEL AGENCIES LOOK AT RUSSIAN MIND CONTROL CLAIMS

Federal law enforcement officials considered testing a Russian scientist’s acoustic mind control device on cultist David Koresh a few weeks before the fiery conflagration that killed the Branch Davidian leader and 70 of his followers in Waco, Texas, DEFENSE ELECTRONICS has learned.

In a series of closed meetings beginning March 17 in suburban northern Virginia with Dr. Igor Smirnov of the Moscow Medical Academy, FBI officials were briefed on the Russian’s decade- long research on a computerized acoustic device allegedly capable of implanting thoughts in a person’s mind without that person being aware of the source of the thought.

His account of the meetings was confirmed by Psychotechnologies Corp., a Richmond, Virginia based firm that owns the American rights to the Russian technology.

[Not necessarily unclassified, but at least made known to a limited segment of the public]

5. Dan Rather’s CBS Evening News, Dec. 9, 1997

Police helicopters were the topic, and one of the features soon to be added to police heli- copters was “an electromagnetic ray gun which can stop speeding cars dead.”

While this is primitive technology compared with that used to manipulate the minds and nervous systems of e-weapons victims of the 1990’s, it does demonstrate quite clearly that government is putting substantial re- sources into electromagnetic weapons devel- opment.

6. Canadian version, Discovery Channel, “Invention” segment, Thursday December 25, 1997

During part of the show, it was stated that the current development of polygraphs (lie detectors) using massive computer-aided database comparisons was now a reality and these machines were making substantial progress towards near- perfect accuracy.

The final statement in that segment was: It is expected that the next stage in polygraph devel- opment will be REMOTE MICROWAVE detection of bodily functions, which will mean the polygraph can then be used SECRETLY, at a distance.

7. Associated Press: (Dec. 2, 1997)

TOKYO – Tired of reaching for the remote control every time you surf the channels? Help is on the way – at a price. A Japanese company plans to market a device that changes television channels and activates household appliances at the flicker of a brain wave. The price: roughly 600,000 yen ($4,800). The product, called the Mind Control Tool Operating System, or MCTOS, is the result of a collaboration between the Technos Japan Co. and the Himeji Institute of Technology in southwestern Japan.

Say you want to turn on the air conditioner. Simply focus on that icon on the MCTOS computer display menu while wearing a pair of beta-wave trapping goggles. Then, according to Technos spokesman Sadahiro U#ani, say something like “Ei!!” inside your head. Soon your air conditioner will be pumping cool air into the room.

MCTOS is scheduled to go on sale in April, 1998.

8. On Jan. 19 the Washington Post had an article about a device for remotely detecting heartbeats by detecting the electromagnetic pulses emitted by beating hearts.

URL: www.washingtonpost.com… 1998-01/19/017l-011998-idx.html

An excerpt:

“The pumping of the human heart is controlled by electrical signals, which doctors measure in electrocardiograms. The heart’s activity generates an irregular, ultralow-frequency electric field that extends in a circle around the body.

“The field is faint, but it can pass through almost any physical barrier. The LifeGuard can pick up on the strongest part of the field, the heart, through barriers including concrete walls, heavy foliage and rocks. Company officials say the LifeGuard can detect a person in less than five seconds and can pinpoint his or her location with a high degree of accuracy.”

The company is marketing the device for potentially locating people in need of rescue, or detecting where individuals are located inside a building.

— submitted by: Allen L. Barker www.cs.virginia.edu

Here is more info on this type of device:

69. VSE – Life Assesment Detector System DATE 020597 93% (Nasdaq: VSEC) LIFE ASSESMENT DECTECTOR SYSTEM (LADS) Patent Pending The Life Assessment Detector System (LADS), a microwave Doppler movement measuring device, can detect human body surface motion, including heartbeat and respiration, at ranges up.. www.vsecorp.com… 3296 bytes, 08Feb97 —

9. Nature magazine, Vol 391, January 22, 1998, page 316, “Advances in neuroscience may threaten human rights” by Declan Butler

(PARIS – Pasteur Institute – Speech by Chairman of the French national bioethics committee Jean-Pierre Changeaux)

“But neuroscience also poses potential risks, arguing that advances in cerebral imaging make the scope for invasion of privacy immense.

“Although the equipment needed is still highly spec- ialized, it will become commonplace and capable of being used at a distance, he predicted. That will open the way for abuses such as invasion of personal liberty, control of behaviour, and brainwashing.”

“These are far from being science-fiction concerns, said Changeaux, and constitute a serious risk to society.”

Also in that article:

“Denis LeBihan, a researcher at the French Atomic Energy Commission, told the meeting that the use of imaging techniques has reached the stage where we can almost read people’s thoughts.”

NOTE: These scientists are speaking ONLY about the UNCLASSIFIED scientific arena. Classified technology can always be assumed well ahead of unclassified.
ourworld.cs.com…

Some closing thoughts

Closing

Many people think that stopping Gang Stalking should be as simple as going to the police. However targets who have gone to the police have not received the expected support that we should be able to count on from law enforcement. Some targets have been disbelieved. Some who were believed were still told that there was nothing that could be done. Others have been falsely institutionalised, or asked to have mental health evaluations, because they sought help for one of the most frightening experiences of their lives.

These are some of the primary reasons that targets do not go to the police. They have seen what has happened to other targets who sought help.

Others think that the solution is for targets to simply move, that will fix this. The thing is targets do move, just like myself and it does not stop the harassment. They continually follow and stalk targets wherever they go in order to destroy their lives.

Just like McCarthyism and Cointelpro were destructive to the innocents of that time period that were caught up in it’s snear, Gang stalking is equally destructive to the innocent targets caught up in this time period. In some cases it’s happening in secrecy and this is why we seek to bring public awareness to the issue.

Gang Stalking like other forms of harassment can be stopped, but it takes work and a willingness to stand up to this and say no. People just like in every other time period need to come together and say no, this is not right. They need to oppose what’s happening to others.

What we are calling Gang Stalking might seem new in it’s present form, however it’s becoming increasingly clear that this is simply a modern day form of Cointelpro and McCarthyism, and the techniques used are historic. The method used to stop the above travesties were also historic. Just like the human nature that allows these things to happen, it was the human will that was finally able to conquer and stop these things from happening.

Gang Stalking just like all those other events in history can be changed, but it needs awareness and human opposition to make that a reality. Please do not stand idly by and let this happen once again.

“All that is necessary for the triumph of evil is that good men do nothing.” (Edmund Burke)

“Without the players there can be no game. Don’t play the game.” (GmB)

What is Gang Stalking?

What is Gang Stalking?

Gang Stalking is a systemic form of control, which seeks to control every aspect of a Targeted Individuals life. Gang Stalking has many similarities to workplace mobbing, but takes place outside in the community. It called Gang Stalking, because the target is followed around and placed under surveillance by groups of organised Civilian Spies/Snitches 24/7.

Many Targeted Individuals are harassed in this way for months or even years before they realise that they are being targeted by an organised protocol of harassment.

What happens during Gang Stalking is very similar to what happened to many innocent individuals in the former East Germany or Activists and Dissidents in Russia. Many innocent people in the former East Germany would be targeted for these harassment programs, and then their friends, family, and the community at large would be used to monitor, prosecute, and harass them. In Russia it was used by the state to declare activist, dissidents or anyone they thought to be an enemy of the state as mentally unfit and many were institutionalised using this form of systemic control.

The closest thing to Gang Stalking that democratic countries have seen before is McCarthyism, Cointelpro, and RED SQUAD programs. Red Squad programs were used for monitoring, and harassment of various groups and they have been in place for over a hundred years.

Civilian spies are recruited from every level and sector of society. Just like with Cointelpro investigations, everyone in the targets life is made a part of this ongoing never ending systemic form of control and harassment. These actions are specifically designed to control the target and to keep them in line. These actions are also designed to destroy the target over years, make them look crazy and leave them with no form of support.

For the targets of this harassment, Gang Stalking is experienced as a covert psychological, emotional and physical attack, that is capable of immobilizing and destroying a target over time. For the state it’s a way to keep the targets in line, control them, or destroy them.

Worldwide programs of control and conformity have been used with equal success and lethality. What we are seeing now is a global co-ordinated and organised effort of control and conformity. Reports of Gang Stalking are not only coming in from democratic countries, but they are coming in from many other countries as well.

The modern day systemic form of control could only be funded at higher governmental levels, just like it has in other societies where these similar types of harassment programs have been implemented. It’s all part of a system of control and conformity that has been in place for many years. A system of control with many local groups and appendages taking part.

What are other Names for Gang Stalking?

There are many names for this form of systemic control and harassment. Under the Gang Stalking label you will also find such terms as Organised Stalking, Cause Stalking, Multi-Stalking, Community Mobbing, but it’s all part of the same harassment protocol. What many people do not realise is that Gang Stalking is just one appendage of this systemic form of control. There are other forms of control used to repress, and keep individuals in line. Other forms or appendages include, but are not limited to: Mobbing, Cointelpro, The Buzzsaw, Covert War, Electronic Harassment, etc. These are the just some of the names being given to a very old game, that is once again being played by governments on their unsuspecting citizens.

How are targets chosen?

Targets can be chosen because of many reasons. They can be chosen for political views. They can be chosen for whistle-blowing. They can be chosen because they belong to a dissident movement. They can be chosen because they asserted there rights at work. They can be chosen because they made the wrong enemy. Were considered to be too outspoken, unwittingly investigated something that the state did not want investigated, signed a petition, wrote a letter. They were deemed as suspicious by a civilian spy/snitch and their names were handed over.

It’s becoming apparent that targets might be chosen for this systemic form of control, if they are not already in some way a part of this controlled system. Eg. Many Targeted Individuals seem to be unaware that large chunks of our society are snitching and spying on each other.

What are the goals of Gang Stalking?

The goal is to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalisation, or forced suicide. Other goals of this harassment is to destroy the targets reputation and credibility. Make the target look crazy or unstable.

Other goals involve sensitizing the target to every day stimuli’s as a form of control, which is used to control targets when they get out of line.

These people also want to make the targets of this harassment vulnerable, they want to make them destitute. The secondary goals seem to be to make the target homeless, jobless, give them a breakdown, and the primary goals seems to be to drive the target to forced suicide, just like what they did with some of the targets of Cointelpro. It’s a useful way of eliminating perceived enemies of the state.

Who gets targeted?

Targeting can happen to anyone in society. Primary targets in the past have been but are not limited to: minorities, outspoken individuals, whistle blowers, dissidents, people who go up against large wealthy corporations, woman’s groups, (single) women, anti-war proponents, and other innocent individuals. The majority of the targets are often not aware that they are being targeted in this way. When a target moves, changes jobs, the harassment still continues. Every time the target moves, the same lies and slander will be spread and the systemic harassment will continue.

Who takes part?

People from all walks of life are being recruited to be the eyes and ears of the state. People from all races, ages, genders. Every sector of society that you can think of is a part of this. Civilian Spies/Snitches include, but are not limited to: General labourers, the wealthy, bikers, drug dealers, drug users, street people, punks, hip hop culture, KKK, black activists, church groups, youth groups, Firemen, police officers, lawyers, health care workers, store keepers, maids, janitors, cable installers, phone repair persons, mail carriers, locksmiths, electricians, etc. There really is no minimum or maximum age range.

Some of these citizens might be recruited via programs such as, Citizen Corp, Weed and Seed, Citizens On Phone Patrol, (COPP), City Watch, T.I.P.S. Many started with good intentions to help patrol and monitor their cities and neighbourhoods. Others are recruited via their families, others at school, others at work. Since every sector, class, race in society takes part, recruitment is multi-faceted.

Many do not understand or care that the end consequence of this harassment protocol is to destroy a person.

Why people participate in Gang Stalking?

There are many reasons that someone takes part in this activity.

1. Some do it for the sense of power that it gives them.

2. Others do this as a way to make friends and keep friends. It’s something social and fun for them to do. Many in society use the one handed sign language to communicate and it’s very effective in breaking down race, gender, age, social barriers.

3. Others are forced or black mailed by the State or the police into taking part.

4. They are told that they are part of homeland or national security and being used to help keep and eye on dangerous or emotionally disturbed individuals. They see themselves as heroic spies for the state.

Civilian spies can come from a variety of different programs such as the Citizen Corp, Citizen On Phone Patrol COPP, Weed and Seed, T.I.P.S., City Watch or some other centralized government program used for patrolling and monitoring cities.

5. Others are just local thugs or Informants who are already being used for other activities, and their energies are just diverted over into these community spy programs. Eg. Some may be given the choice of Spying for the State or the police vs going to jail.

6. Others are told outright lies and slander about the target to get them to go along with ruining the targets life.

7. Many are however just average citizens who have been recruited by the state the same way citizens were recruited in the former East Germany and other countries. It’s the way the society is.

What are some techniques used against targets?

A few of the most common techniques are listed below.

a) Classical conditioning.

Getting a Targeted Individual sensitized to an everyday stimuli. The targeted individual over a period of months, or even years is negatively sensitised to an everyday stimuli, which is then used to harass them. It’s used out in public to let them know they are constantly being harassed and monitored. Some examples of everyday stimulus that might be used include: sounds, colors, patterns, actions. Eg. Red, white, yellow, strips, pens clicking, key jangling, loud coughing, loud whistling, loud smacking of clapping of hands together, cell phones, laptops, etc.

b) 24/7 Surveillance This will involve following the target everywhere they go. Learning about the target. Where they shop, work, play, who their friends and family are. Getting close to the target, moving into the community or apartment where they live, across the street. Monitoring the targets phone, house, and computer activity.

c) Isolation of said target.

This is done via slander campaigns, and lies. Eg. People in the targets community are told that the target is a thief, into drugs, a prostitute, pedophile, crazy, in trouble for something, needs to be watched. False files will even be produced on the target, shown to neighbours, family, store keepers.

d) Noise and mimicking campaigns.

Disrupting the targets life, sleep with loud power tools, construction, stereos, doors slamming, etc. Talking in public about private things in the targets life. Mimicking actions of the target. Basically letting the target know that they are in the targets life. Daily interferences, nothing that would be too overt to the untrained eye, but psychologically degrading and damaging to the target over time.

e) Everyday life breaks and street theatre.

Flat tires, sleep deprivation, drugging food, putting dirt on targets property. Mass strangers doing things in public to annoy targets. These strangers might get text messaged to be at a specific time and place, and perform a specific action.

It might seem harmless to these strangers, but it could be causing great psychological trauma for the target. Eg. Blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit a response from targets. Etc.

Where does the support or funding for this come from?

Though Gang Stalking itself is immoral and unethical in nature, programs such as this in democratic countries, and none democratic countries have always been funded by the Government. They are the only ones with enough money, coordination, and power to keep such a system in place. These Co-ordinated efforts then join hands with others for this systemic form of control and harassment.

“Ruling the community with an iron fist. “Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants and federal agencies could form alliances without causing public outcry.” Covert Action Quarterly, summer 1997.”

http://www.albionmonitor.com/9711b/policing.html

What can you do to help?

1. If you know someone who is being targeted in this way please don’t go along with it. Don’t assume that the person is guilty or a bad person. Many innocent people are currently being targeted, and people are being told lies. This form of harassment is systemic and it’s about state control and conformity. The express goal of this harassment is to destroy the individual over time.

2. If you are aware of someone being harassed in this way, subtly direct them to websites that deal with Gang Stalking, or sites for Targeted Individuals. Knowledge is power.

3. You can subtly offer your support to someone who is being unfairly treated, in very small little ways.

4. You can bring up the subject of Gang Stalking or Targeted Individuals.

6. You can subtly suggest that your local newspapers or community papers print articles about Targeted Individuals or even an write an objective piece about Gang Stalking.

How do participants communicate?

Communication happens in a number of ways. When on the street or in cars patrolling, they use baseball or Stasi like signals.

These include things like tapping the side of the nose, corner of the eye, brushing back the hair 3 times, the infamous double blink, etc.

Here is a list of Stasi signals that the East German Army use to use. Stasi secret police. http://www.nthposition.com/stasiland.php

SIGNALS FOR OBSERVATION

1. Watch out! Subject is coming – touch nose with hand or handkerchief

2. Subject is moving on, going further, or overtaking – stroke hair with hand, or raise hat briefly

3. Subject standing still – lay one hand against back, or on stomach

4. Observing Agent wishes to terminate observation because cover threatened – bend and retie shoelaces

5. Subject returning – both hands against back, or on stomach

6. Observing Agent wishes to speak with Team Leader or other Observing Agents – take out briefcase or equivalent and examine contents.

What resources are there?

There are many resources on the Internet and elsewhere about this form of harassment.

Report: 1. http://www.kersplebedeb.com/mystuff/police/pdq-eng.PDF

Books: 1. Ward Churchill, Jim Vander Wall “Cointelpro Papers”

       2. Protectors of Privilege: Red Squads and Police Repression in Urban America        3. Anna Funder “Stasiland”        4. Gloria Naylor. “1996″        5. Victor Santoro  “GASLIGHTING How To Drive Your Enemies Crazy “        6. Anthony Brina “Suburban Spies”        7. Stephen Knight “The Brotherhood”        8. Alex Constantine “The Covert War Against Rock”        9. Jim Redden  “Snitch Culture”        10. Frank Donner “The Age of surveillance”        11. Kristina Borjesson "Into the Buzzsaw"        12. Niki F. Raapana "2020"        13. Noa Davenport "Mobbing: Emotional Abuse in the American WorkPlace"        14. Dr. Andrew M. Lobaczewski. Political Ponerology:             The science on the Nature of Evil.

Movies:

1. The lives of others. http://www.imdb.com/title/tt0405094/ (A movie about covert investigations in the former East Germany)

2. The Matrix. (Sci-fi Movie.) Neo a target wakes up and realises not only is he being watched without knowing why, but that the world is a lie, that has been created to pull the truth over people’s eyes.

Videos: Cointelpro.

1. http://www.youtube.com/watch?v=si1bHa45u18

2. http://www.youtube.com/watch?v=PJqMcafwFJ8

3. http://www.youtube.com/watch?v=fN9TZDL4WqI

4. http://www.youtube.com/watch?v=vbMsOGWN_ts

Articles: 1. http://www.corbettreport.com/articles/20080214_snitch_state.htm

              2. http://www.iht.com/articles/2006/08/14/news/korea.php
              3. http://educate-yourself.org/cn/groupstalking17aug05.shtml
              4. http://www.newswithviews.com/Stuter/stuter78.htm
              5. http://www.disinfo.com/archive/pages/article/id730/pg1/index.html
              6. http://www.selfgrowth.com/articles/Dunn15.html
              7. http://film.guardian.co.uk/News_Story/Guardian/0,,2013976,00.html
              8. http://www.alternet.org/story/12753/
              9. http://www.powells.com/review/2003_06_27.html
              10. http://www.time.com/time/magazine/article/0,9171,658321-1,00.html

Cointelpro: 1. http://www.albionmonitor.com/9711b/policing.html    

                   2. http://findarticles.com/p/articles/mi_m1132/is_n6_v43/ai_11559671
                   3. http://portland.indymedia.org/en/2007/02/354278.shtml
                   4. http://gangstalkingworld.com/Forum/YaBB.pl?num=1170563559
                   5. http://www.buzzflash.com/contributors/2002/07/19_Spies.html
                   6. http://nord.twu.net/acl/agenda21.html
                   7. http://rwor.org/a/v24/1161-1170/1161/tips.htm
                   8. http://www.totse.com/en/law/justice_for_all/redfiles.html

Websites: 1. http://www.Gangstalkingworld.com

                2. http://www.Cointelpro2.com
                 3. http://www.TargetedIndividuals.com
                 4. http://www.Thehiddenevil.com
                     http://www.gangstalkingworld.com/Handbook/TheHiddenEvil.pdf
                 5. http://www.harassment101.com
                 6. http://stopcovertwar.com