Bridging the gap

Misdiagnosed as having paranoid delusions. This is exactly where many of our workplace mobbing cousins were 15 years ago before credible research was done into the phenomenon of workplace mobbing. They were often thought to be paranoid, some I am sure were equally locked away or put on medications, but a decade and a half later with more understanding into this deliberate phenomenon we not only realise how far reaching it is, but how systemic it is as well.

As a clinician, Leymann made his priority the healing of post-traumatic stress in those most severely affected by mobbing. With the support of the Swedish health service, he opened a clinic for mobbing victims in 1994, and published detailed research on the first 64 patients treated there. That clinic no longer exists and Leymann himself died in 1999, but 200 patients are currently treated in a similar clinic that opened in Saarbruecken, Germany, this year.

Competent, well-informed treatment of the many mobbing targets who suffer mental breakdown is obviously in order, especially since they have often in the past been misdiagnosed as having paranoid delusions.

Psychiatric injury, however, is but one possible harmful result of being mobbed. Some mobbing targets keep their sanity but succumb to cardiovascular disease–hypertension, heart attack, or stroke. Most suffer loss of income and reputation. Marital breakdown and isolation from friends and family are also common outcomes.

When a problem is not understood, especially by outsides who might have a cold, calculating, or even dispassionate interest in the subject matter it’s easy to falsely label something that is not understood. Such as the people that are part of that phenomenon or the phenomenon itself.

Today the concept of workplace mobbing is well understood, and has become more normalised in society, thanks to research by credible professors such as K. Westhues. Himself a target of workplace mobbing, he was able to ward off what was happening to him, and spent the next decade studying the phenomenon and assisting other targets. He is now a widely respected researcher in the field.

With subject matters such as bullying, gang stalking, mobbing, mind control, because the outside world is often unaware of the devastating effect the harassment is having, it’s often up to the insiders of that community to bring knowledge and understanding to the forefront, and to the outside world at large.

10 years ago, bullying was not understood that well, but with the persistence of people like Tim Fields, it’s now a household word, and a very well understood concept.

We as a community in the Gang Stalking World are on the precipice, where the term is becoming more well known, but with limited understanding, and preconceived prejudices about gang stalking, by people in various fields and outside communities.

This might also have been recently complicated by being falsely termed as an extreme community. We are not so much an extreme community as a misunderstood community. We are about 3-5 years behind where our fellow counterparts were. We do need more research into the subject matter, but because what is happening to us, is being enacted by the very governments we trust, this further complicates exposing what’s happening to the general population, and then getting assistance, validation and understanding from the world at large.

We are at the crossing over stage, and for every move we do try to make forward, we have silent watchers in the background, from what the New York Times article stated, at times misdiagnosing our community, and mislabeling the members of that community, without giving any actual credence to the research being presented and the very real possibility that what we are saying is true, and that this is in fact really happening to us.

http://www.nytimes.com/2008/11/13/fashion/13psych.html?partner=rss&emc=rss

The key emphasis then still relies on mechanisms within the Gang Stalking community to prove our innocence, because we have already been declared by some as guilty, or rather mislabeled as paranoid, delusional, or mentally ill. There is strength in unity, we have seen this with our cousin community, yet this is still a key point that alludes our community due to several key internal factors.

In moving forward, there has to be more focus on maintaining a unified community, which is hard at times because we do remain fragmented in many ways. We still have to place key emphasis on Awareness, and exposure. There is a lot of good research coming out in high profile mediums and those should be used to bridge that gaps that have hitherto prevented us from crossing over to where our cousins in the mobbing community are.

Areas of study to consider when researching Gang Stalking

In researching Gang Stalking there are many factors to be considered. It’s not a subject matter that should be studied lightly. Also the average psychiatrist if not familiar with some of the other issues that are affecting members of many communities might not be able to make an iron clad assessment without looking at several factors. Here are factors that I think should be considered.

Areas to be aware of when studying Gang Stalking.

Workplace Mobbing.

It’s our nearest and dearest cousin on an emotional and psychological level. The methodology used in workplace mobbing are some of the same that we see happening with Gang Stalking.

http://mobbing-usa.com/

The Snitching system

Websites such as http://www.November.org are doing a really nice job of showing the world the other side of snitching, and it’s true affect on society.

Also Alexandra Natapoff has done some wonderful research into the wider and more impacting issues of the Informant system and how it’s affecting members of some communities. In some areas over 50% or more of ethnic communities had been inducted into becoming police informants. Both men and women.

http://www.youtube.com/watch?v=Mav9tOvmWcQ
http://www.lls.edu/academics/faculty/natapoff-snitching.html

From what I have seen, the numbers are higher than this and it’s no longer limited to the communities focused on in her research.

Community Based Policing

This method of policing is changing how societies think, react and interact. It’s basically turning our communities into societies like what they have in China, had in Russia, or East Germany. There is a U.N. agenda called 2020 that seeks to adapt this model for every country in the world by 2020.

http://www.albionmonitor.com/9711b/policing.html

“Ruling the community with an iron fist. “Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants and federal agencies could form alliances without causing public outcry.” Covert Action Quarterly, summer 1997.”

http://www.newswithviews.com/Raapana/niki4.htm
http://www.newswithviews.com/Raapana/niki2.htm

Crisis Centers

When I tried to follow up on some of the research that “Norma” over at gangstalking.ca had done in conjunction with crisis center I found out that these are some of the places that targets were turning to for help. Before the Gang Stalking websites were available, woman and to a much smaller extent men were calling the crisis centers, more specifically the Rape Crisis Center to get some help, or to find anyone who knew about Gang (Organised) Stalking.

See what some of these psychiatrist do not realise is that before the websites were available, the beliefs were not going away. People were not accepting the false explanation that they were delusional. This was in many cases, too, real, to obvious, and far too life impacting. So when the police failed, doctors, psychiatrists, etc. They were calling the crisis centers.

Online before the Gang Stalking websites, they were visiting Mobbing, Conspiracy, Bullying, and mind control sites. These were the only places that were close to having any information, shared stories, or experiences that might help the target to further understand what they were going through.

Systemic corruption.

Before his death Tim Fields who shed some much needed light on the Bully phenomenon also saw a very obvious pattern of collusion amongst the targets that were seeking help. He started to research it and then passed away before he could get further.

http://www.bullyonline.org/action/obstruct.htm

Tim Fields is not the only person to have noticed this type of systemic corruption when it comes time to finding help for issues of Bullying, Workplace Mobbing, etc but he might have been the one to shed the brightest light on it, had he lived.

http://www.crvawc.ca/documents/WorkplaceHarassmentandViolencereport.pdf

http://www.harassment101.com/Article5.html

Unchecked Surveillance

The unchecked surveillance that is happening to many private citizens all across the globe. We live in a new reality, but the diagnosis is the same. Think you are being followed around? Must be paranoia. Yet had the family in this article gone for help, thinking they were being spied upon, they might well have been diagnosed as paranoid, when in fact their concerns would have been fully warranted.

http://www.dailymail.co.uk/news/article-559130/Why-didnt-just-knock-door-ask-couple-tailed-weeks-council-spies.html?printingPage=true

http://www.dailymail.co.uk/debate/columnists/article-559123/Why-earth-Stasi-state-spying-families.html

This very average, unassuming family were spied upon, 24/7, followed around by (Informants) Covert Human Intelligence Sources, had their play by play activity recorded, all because someone thought they were falsifying the school district that they lived in. This is just a glimpse at what our societies have turned into and how these laws and unchecked surviellances ae being used and abused, to the unchecked power that has been handed out to many branches within society.

Lastly is the concern or question of wither Gang Stalking website help to enhance, or feed a delusion, and can these website prevent someone from seeking help for an illness?

It’s a great question and one that no one can answer definitively. If someone believes that something is wrong and traditional points of reference are not providing answers or a solution, they will clearly look towards other points of healing. This is what was happening with Gang Stalking.

Before the websites were here, the beliefs were still held by individuals. When the websites were not here, people were still desperately seeking help and assistance. They were using outside sources which at times could not always formulate a basis of reference for what they were experiencing, but they were still using those points of references, because it was the best available at the time.

If someone goes to a mobbing website and it confirms a belief that they already have that co-workers are out to get them, then it’s up to the individual how they further choose to use the information. The same is true with someone using the bullying website who believes that there is collusion within the system and that is what is happening to them.

The Gang Stalking websites are here, just like mobbing, bullying, etc and they are providing information, research, and shared experiences for the website visitor that chooses to review and consider the information provided.

The Structure of our oppression

The Structure of our oppression.

The following article will try to put into perspective some of the societal structures that are most likely responsible for the targeting some of those in the Targeted Individual community are experiencing.

For years Targeted Individuals have been saying that they are being followed around, stalked, monitored while at home, and out in public. They have complained of a system that is capable of 24/7 surveillance, able to harassment at home, work, in the community, and even while traveling abroad. For several years there has been a great deal of disbelief that such occurrences could even be possible. The follow article, will try to explain referencing sources already available and documented how this could be happening.

The following article represents the views and opinions of the GangStalkingWorld.com website and does not necessarily reflect the views of any other person, or website in the community.

It has long been a widely expressed view that the monitoring is being done by various groups of citizen informants, members of various community policing type programs. Based on recent research conducted it seems most likely that the people being used to follow Targeted Individuals around are what society and the government in some countries refer to as, “covert human intelligence sources”. They can also be known as own as Citizen Informants. Another slang terms that is often used to describe these individuals is the term Snitch or Snitches.

Covert human intelligence sources

A recent article came out in the London Telegraph, saying that Children as young as 8 are being employed by the state as “Covert human intelligence sources” aka Snitches. Targeted Individuals often complain that the harassment is being perpetrated by all members of the community including children.

Children are being hired and used by the government to spy on their neighbors in the Uk. and “being encouraged to photograph or video neighbors guilty of dog fouling, littering or “bin crimes” The article says there are “hundreds of Junior Streetwatchers, aged 8-10 years old, who are trained to identify and report enviro-crime issues such as graffiti and fly-tipping.” The adult spies according to authorities are recruited via newspaper ads.

[quote]”Other local authorities recruit adult volunteers through advertisements in local newspapers, with at least 4,841 people already patrolling the streets in their spare time.

Some are assigned James Bond-style code numbers, which they use instead of their real names when they ring a special informer’s hotline.

This escalation in Britain’s growing surveillance state follows an outcry about the way councils are using powers originally designed to combat terrorism and organised crime to spy on residents. In one case, a family was followed by council staff for almost three weeks after being wrongly accused of breaking rules on school catchment areas.” 1[/quote]

Community Oriented Policing

Though the article primarily focuses on the United Kingdom, it should be noted that other countries are setting up such community structures, via community oriented policing programs. These programs are a

[quote]”a systemic approach to policing with the paradigm of instilling and fostering a sense of community, within a geographical neighborhood, to improve the quality of life. It achieves this through the decentralization of the police and the implementation of a synthesis of three key components: (1) strategic-oriented policing—the redistribution of traditional police resources; (2) neighborhood-oriented policing—the .interaction of police and all community members to reduce crime and the fear of crime through indigenous proactive programs; and (3) problem-oriented policing-a concerted effort to resolve the causes of crime rather than the symptoms. ” 2[/quote]

Fusion Centers

The ACLU has released a report on Fusion Centers. 800,000 operatives will be dispersed throughtout every American city and town. Set to report on even the most common everyday behaviors which will go into state, local and regional, linked data bases. These linked databases are not just emerging in the United States, they have already emerged in many countries around the world in the wake of implied terrorist threats.

[quote]”We pointed out that, while diverse and often still in the early stages of formation, they often seem to be characterized by ambiguous lines of authority, excessive secrecy, troubling private-sector and military participation, and an apparent bent toward suspicionless information collection and datamining.” 3[/quote]

The article then goes on to point out that in a short space of many of the warning in the report had come to pass. The article talks about the fact that this apparatus is responsible for watching and recording the everyday activity of a growing number of individuals. The reports are then gathered together and then they are accessible to any law enforcement agency that is a part of these fusion centers.

[quote]”In the six months since our report, new press accounts have borne out many of our warnings. In just that short time, news accounts have reported overzealous intelligence gathering, the expansion of uncontrolled access to data on innocent people, hostility to open government laws, abusive entanglements between security agencies and the private sector, and lax protections for personally identifiable
information.
Overall, it is becoming increasingly clear that fusion centers are part of a new domestic intelligence apparatus. The elements of this nascent domestic surveillance system include:
• Watching and recording the everyday activities of an ever-growing list of individuals
• Channeling the flow of the resulting reports into a centralized security agency
• Sifting through (“data mining”) these reports and databases with computers to identify individuals for closer scrutiny
Such a system, if allowed to permeate our society, would be nothing less than the creation of a total surveillance society.” 3[/quote]

These fusion center will have the capacity to circumvent laws that are in place to limit federal vs local authorities and the access that each has to specific information.

[quote]”Even more troubling is the fact that these centers are networked together and seamlessly exchange information with the intelligence community through the Director of National Intelligence’s Information Sharing Environment (ISE). The Washington Post report was based on a document produced from a survey of fusion centers, which shows their intent to maximize the access each of the fusion centers has to the various databases. This would allow a state fusion center that under state law or local policy is prohibited from buying credit reports, as an example, to circumvent its own restrictions by simply calling a
fusion center in Pennsylvania to and asking Pennsylvania authorities to access the records it wants to analyze. This “policy shopping” process guts state and local privacy protections and gives the participating agencies, including the federal intelligence community, access to information they may not legally have on their own.” 3[/quote]

These centers if allowed to expand will create a one way justice system. Your information, even your daily activities will be allowed to be gathered, collected, and possibly used against you. When you then request information to confirm if you are a target of surveillance, the information will be stored in a secret database and not available for you to access.

[quote]”Even as fusion centers are positioned to learn more and more about the American public, authorities are moving to ensure that the public knows less and less about fusion centers. In particular, there appears to be an effort by the federal government to coerce states into exempting their fusion centers from state open government laws.31 For those living in Virginia, it’s already too late; the Virginia General Assembly passed a law in April 2008 exempting the state’s fusion center from the Freedom of Information Act.32

According to comments by the commander of the Virginia State Police Criminal Intelligence Division and the administrative head of the center, the federal government pressured Virginia into passing the law, with the threat of withholding classified information if it didn’t.33 Such efforts suggest there is a real danger
fusion centers will become a “one-way mirror” in which citizens are subject to ever-greater scrutiny by the authorities, even while the authorities are increasingly protected from scrutiny by the public.” 3[/quote]

Public Employees

The next aspect of the targeted that has been reported by the Targeted Individual community is the fact that public servants seem to be taking a part in the continuous monitoring and harassment private citizens. American Civil servants, firefighters, police officers, Corporate Employees, learning to collect data and spy. The information then goes into secret data bases. They will also communicate in code. Many targets have expressed a belief not only that they are being tracked, but that their stalkers are communicating via a one handed sign language similar to that which the Stasi used.

Watch Video
http://www.youtube.com/watch?v=KU-xsQ3Xepw

[quote]”They are entrusted with hunting for “suspicious activity,” and then they report their findings, which end up in secret government databases.

What constitutes “suspicious activity,” of course, is in the eye of the beholder. But a draft Justice Department memo on the subject says that such things as “taking photos of no apparent aesthetic value” or “making notes” could constitute suspicious activity, Finley wrote. ” 4[/quote]

Not only will this program used the civil servant already mentioned, but it will expand who is used in the program. They will have secret sources of communication available to them. The members of these programs will connect with the fusion centers. None disclosure agreement or a confidential disclosure agreements will be signed by many in these programs to ensure that the information is protected.

[quote]”And the private sector would be involved, too. “The program would eventually be expanded to include Health Care personnel and representatives from private, critical infrastructure entities, with communication systems specifically tailored to their needs.”

In this regard, Terrorism Liaison Officers resemble InfraGard members. (See “The FBI Deputizes Business”.) This FBI-private sector liaison group now consists of more than 26,000 members, who have their own secure channels of communication and are shielded, as much as possible, from scrutiny.

Terrorism Liaison Officers connect up with so-called “Fusion Centers”: intelligence sharing among public safety agencies as well as the private sector. The Department of Justice has come up with “Fusion Center Guidelines” that discuss the role of private sector participants.

“The private sector can offer fusion centers a variety of resources,” it says, including “suspicious incidents and activity information.”

It also recommends shielding the private sector. “To aid in sharing this sensitive information, a Non-Disclosure Agreement may be used. The NDA provides private sector entities an additional layer of security, ensuring the security of private sector proprietary information and trade secrets,” the document states.” 4[/quote]

Other than the United States many other countries have similar programs in place where they have requested that public servants in the course of doing their day to day activities keep an eye out on what is happening.

Stalking and Monitoring.

Though I do not in believe the family in this video are targets of Gang Stalking I will say that the example shown explains very well how someone could be stalked, monitored and spied on 24/7 as this family was. I do not believe they are targets of Gang Stalking, because Gang Stalking is often covert, what this family experienced was extremely overt and left behind lot’s of verification and proof, the harassment targeted individuals experience does not often offer any overt evidence.

The stalking they believe was done primarily using their cell-phone. They were followed 24/7. Their phone conversations listened to. When the mother was in the kitchen making lemonade, the phone rang, and the caller told her, he preferred limes. When the family heard someone at their door in the middle of the night banging, they called the police, when the police arrived the invaders had already left. After the police left this happened again, the family called the police, the invaders had left, this happened a third time and finally the family stopped trying. After filing a complaint with the police, the family were sent a recording of their conversation with the police, by the stalker. They installed a camera system, the stalker called to say that he already knew the code.

The list goes on, and apparently there were a total of three families in the area that the cell phone stalking happened to. The case has received wide media attention, including the Tyra Banks show. There is technology out there designed to do this. A company which I will not name in this report, has a service for cheating spouses, where you can use a phone to know where they are and listen into their conversations. There are also programs which will allow the camera on a phone to be used to spy on the person with the camera phone.

http://www.youtube.com/watch?v=sV_I7cgkqXc

[quote]”The families say the calls come in at all hours of the night, threatening to kill their children, their pets and grandparents. Voice mails arrive, playing recordings of their private conversations, including one with a local police detective. ”

“The caller knows, the families said, what they’re wearing and what they’re doing. And after months of investigating, police seem powerless to stop them. ”

“It got worse. The Kuykendalls and two other Fircrest families told ABC News that they believe the callers are using their cell phones to spy on them. They say the hackers know their every move: where they are, what they’re doing and what they’re wearing. The callers have recorded private conversations, the families and police said, including a meeting with a local detective. ” 5[/quote]

Not all members of the Targeted Individual community have a cameraphone, but this example is just to show how one family could be terrorized by an encounter such as this. What we experience is ongoing, and often just as upsetting, but we often do not have the same proof that this family had, which enabled them to go to the police.

[quote]”Recently, the stalkers have begun to come to their home in the early hours of the morning, banging on their doors. The mother said that the first time they came, she immediately called 911, but as soon as the police arrived, the stalkers had fled. The police, unable to do anything, left, and the stalkers returned right away. She said every time this happens she contacts the police, but after about the third call and then the third return, she just stops trying.” 6[/quote]

Regulation of Investigatory Powers

Regulation of Investigatory Powers is a United Kingdom law, which enables public bodies to carry out investigations and surveillance on individuals. Authorities can use directed surveillance or intrusive surveillance for months or years. These types of operations often employ “covert human intelligence sources’. Recently these laws were abused by using them to spy on families for anti-social behaviours and noise complaints.

[quote]”Directed surveillance’ is covert surveillance of individuals during a specific but non-intrusive investigation’ (our emphasis). Surveillance is covert where it is carried out in such a way to ensure that those targeted are unaware that it is taking place (cl.25(8)). ‘Surveillance’ is defined as including any monitoring, observing and listening to persons, their movements, conversations or other activities or communications. It also includes any recording of such activity and surveillance by or with assistance of a device.”

” Intrusive surveillance’ is defined as covert surveillance in relation to anything taking place on residential premises or a private vehicle. It may be carried out either by a person or device inside residential premises or a private vehicle or by a device placed outside” 7[/quote]

Secret Databases

A new story also came out this year claiming that information is being kept on Canadians, in secret databases that they have no access to.

[quote]”Jennifer Stoddart, the Privacy Commissioner of Canada, has released a 48-page report warning that the RCMP (Canada’s national police force) is keeping thousands of files on regular citizens in secret databases which cannot be seen by the accused.

One of the many disturbing facets of Stoddart’s report are the examples she cites of information for these secret files coming from citizen informants. In one case a man was put into the secret database because a resident of his daughter’s school neighborhood saw him entering a rooming house and—believing drugs were involved—called the police. The police investigation concluded that the man had only stepped out of his car to have a cigarette, but the file was still in the national security databank seven years later.

Another incident cited in the Stoddart report involved a neighbour who saw two men carrying “something that resembled a large drum, wrapped in canvas” into their house. Police were called to investigate but found nothing resembling the reported item, yet the data was still sitting in a top secret databank five years later. As Stoddart points out in the CBC story on the report, this is potentially disastrous for the individuals named in the files, because it “could potentially affect someone trying to obtain an employment security clearance, or impede an individual’s ability to cross the border.” 8[/quote]

References:

1. http://www.telegraph.co.uk/news/uknews/2689996/Children-aged-eight-enlisted-as-c%20ouncil-snoopers.html

2. http://www.amazon.ca/Community-Oriented-Policing-Systemic-Approach/dp/0130141100

3. http://www.aclu.org/pdfs/privacy/fusion_update_20080729.pdf

4. http://www.progressive.org/mag/mc070208

5. http://abcnews.go.com/TheLaw/Story?id=3312813&page=1

6. hs.riverdale.k12.or.us/maverick/?q=node&page=18

7. http://www.fipr.org/rip/JRP2HRA.html

8. http://www.corbettreport.com/articles/20080214_snitch_state.htm

Other Sources:

1. http://www.telegraph.co.uk/news/uknews/2696031/Anti-terrorism-laws-used-to-spy-on-noisy-children.html.

2. http://www.youtube.com/watch?v=sV_I7cgkqXc

Some closing thoughts

Closing

Many people think that stopping Gang Stalking should be as simple as going to the police. However targets who have gone to the police have not received the expected support that we should be able to count on from law enforcement. Some targets have been disbelieved. Some who were believed were still told that there was nothing that could be done. Others have been falsely institutionalised, or asked to have mental health evaluations, because they sought help for one of the most frightening experiences of their lives.

These are some of the primary reasons that targets do not go to the police. They have seen what has happened to other targets who sought help.

Others think that the solution is for targets to simply move, that will fix this. The thing is targets do move, just like myself and it does not stop the harassment. They continually follow and stalk targets wherever they go in order to destroy their lives.

Just like McCarthyism and Cointelpro were destructive to the innocents of that time period that were caught up in it’s snear, Gang stalking is equally destructive to the innocent targets caught up in this time period. In some cases it’s happening in secrecy and this is why we seek to bring public awareness to the issue.

Gang Stalking like other forms of harassment can be stopped, but it takes work and a willingness to stand up to this and say no. People just like in every other time period need to come together and say no, this is not right. They need to oppose what’s happening to others.

What we are calling Gang Stalking might seem new in it’s present form, however it’s becoming increasingly clear that this is simply a modern day form of Cointelpro and McCarthyism, and the techniques used are historic. The method used to stop the above travesties were also historic. Just like the human nature that allows these things to happen, it was the human will that was finally able to conquer and stop these things from happening.

Gang Stalking just like all those other events in history can be changed, but it needs awareness and human opposition to make that a reality. Please do not stand idly by and let this happen once again.

“All that is necessary for the triumph of evil is that good men do nothing.” (Edmund Burke)

“Without the players there can be no game. Don’t play the game.” (GmB)

Gang Stalking and history

Gang Stalking in History

The components that have gone into making up gang stalking have been around for many decades if not hundreds of years. You will find many aspects of this harassment have been used quite successfully in other time periods, and controlled states.

What Gang Stalking does is it takes the successful aspects of those programs and it uses them, plus a couple of new ones to harass and torture individuals to the point of a nervous breakdown, institutionalization, suicide, devastation and ruin. The following are just a few of the components of previous programs used by others that have helped to make up Gang Stalking.

Red Squads

http://en.wikipedia.org/wiki/Red_squad

Red Squads are police intelligence units that specialize in infiltrating, harassing, and gathering intelligence on political and social groups. Dating as far back as the Haymarket Riot in 1886, Red Squads became common in larger cities such as Chicago, New York, and Los Angeles during the First Red Scare of the 1920s. They were set up as specialized units of city police departments, as a weapon against labor unions, communists, anarchists, and other dissidents. In New York, former City Police Commissioner Patrick Murphy traced their origin there to an “Italian Squad” formed in 1904 to monitor a group of Italian immigrants under suspicion[1]. However, it is their association with fighting communism which provides the basis for the name “Red Squad.” They became more commonplace in the 1930s, often conceived of as a countermeasure to Communist organizers who were charged with executing a policy of dual unionism – namely, building a revolutionary movement in parallel with membership in above-ground labor organizations. Similar units were established in Canada in this period, although only the Toronto police used the name.

http://www.albionmonitor.com/9711b/policing.html

Throughout the Cold War, these guardians of political compliance spied on and harassed law-abiding activists who veered too far left of the political center. Dedicated civil rights advocates and others fought back and won on local, state, and federal fronts. But their success was often short-lived. New technologies; new laws; and increased interaction among international, federal, military, state, and local law enforcement, intelligence agencies, and private corporations are threatening not only to put Red Squads back in business nationwide, but to increase the scope of their power to pry, to harm, and to imprison.

Although community policing has not been as successful in curbing street crime as its proponents might have hoped, it has been a public relations success and enjoys the support of many well- intentioned liberals. But heirs to the Red Squads have found it an excellent mechanism as well. Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants, and federal agencies could form alliances without causing public outcry. Riding on fears from the trumped-up missing children campaign of the 1980s to the anti-drug hysteria of the 1990s community policing has been the public face of under-the-radar efforts to create an impenetrable web of surveillance and enforcement.

http://findarticles.com/p/articles/mi_m1132/is_n6_v43/ai_11559671

Police departments recruited both professional and civilian informers. The numbers are unknown, but may well have reached five figures. By the late 1960s there were over two thousand professional and amateur spies in Chicago alone. For regular police officers, undercover work was a rapid route to advancement. Some civilians enlisted for patriotic reasons, others were police groupies who hoped that working with the red squad might get them a job with the force. In Philadelphia policemen’s wives became “pin money” spies. The activities of these informers varied. Some took on single assignments; others, like Chicago veteran Sheli Lulkin, who infiltrated eighty-eight separate organizations, made it a career.

All of these police activities–overt and concealed–were clearly designed to destroy the targeted organizations. In some cities, notably Philadelphia, which experienced a virtual reign of police terror under Frank Rizzo in the late 1960s and early 1970s, the harassment blossomed into a full-scale physical attack on all dissent. Elsewhere, the use of violence was a bit more discriminating: it targeted the Black Panthers. And it was successful. Though Donner does not try to assess the extent to which this repression contributed to the decline of the radical left in the late 1960s and early 1970s, the scope of red squad activism, as well as the self-defeating paranoia that it understandably encouraged within the left, could not but have made a massive contribution to the demise of the movement.

Gaslighting

The term Gaslighting refers to the subtle art of trying to drive your enemies crazy. It done through various subtle psychological attacks over time, that wear down the victim and destroy their perception of their environment and things around them.

 http://en.wikipedia.org/wiki/Gaslighting
It is based on a 1944 movie in which a man tries to use subtle methods to drive his wife crazy.
The term was again used to describe some tactics used by the Manson family. Sometimes when they would break into homes they would just move the furniture about and leave everything else undisturbed.
There is also a 1994 book called. Gaslighting how to drive your enemies crazy. It’s written by Victor Santoro.
In the book he gives various methods on how to drive your enemies crazy. Below are just a few of the suggestions that he makes.

Some of the tactics covered include:

Collecting information on your target
Preparing for a gaslighting attack
Creating tension, anxiety and sleeplessness
Messing with your target’s car, telephone and mail
Gaslighting at your target’s workplace and home
Turning neighbors and co-workers against the target
Covering your tracks
Stasi East German Police

This was an agency set up after the end of the second world war in East Germany. After WWII Germany was divided into the East and the West. The Western half being democratic and the Eastern half being a communist state. It was set up for many reasons, but the primary reason seems to have been for keeping an eye on dissidents, and citizens of the state. At it’s peek the Stasi East German secret police had 300,000 paid spies on it’s pay roll. This was about 1 for every 63 German citizens. This figure does not include occasional informants, when they are tallied into the figure the number per citizen increases significantly.

The Stasi were able to spy on a country of 16 million people by using just 300,000 spies and paid informants. The tactics the Stasi used involved.

Bugging and video taping citizens, dissidents and spies.
Following some 24/7.
Creating profiles on citizens.
They even used radio active chemicals and X-ray machines to make dissidents glow in the dark, so they could follow them better. http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2001/01/04/wstas04.xml
Getting their friends, family, spouses and close acquaintances to spy on them. This included husbands on wives, mothers on sons, brothers on sisters, close friends spied and turned each other.
It created a constant environment of mistrust and anxiety, because people never knew who they could trust. They always knew that at any social gathering or event, there would be a Stasi spy.

http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2002/04/07/wmum07.xml&sSheet=/news/2002/04/07/ixworld.html

The Stasi even spied on the future catholic pope. Years before he ever became pope. Their profiling system was so accurate they were able to predict that he would be appointed to a future position two full years before it happened.

According to the report, Ratzinger was so closely followed that the Stasi was able to predict his being named prefect of the Congregation for the Doctrine of the Faith _ the post he held before being named pope _ two years before it happened in 1981.

http://newsfromrussia.com/world/2005/10/03/64339.html

After the fall of the Berlin Wall the American CIA agency were able to obtain the code names of many of the Stasi spies that worked for the former East German Government and recently they appointed the former head of the Stasi Secret police Marcus Wolf to help with homeland security, and they also hired a former head of the KGB, General Yevgeni Primakov as a consultant for homeland security. The United States wanted to have 1 million spies working for them to keep an eye on their citizens.

http://www.prisonplanet.com/articles/december2004/061204wolfhired.htm

The lives of others

In this 2006 movie set in the former East Germany, an innocent playwrite is targeted by the Stasi because an official has an interest in his girlfriend. The Stasi are asked to spy on him and to try to find out any dirt that they can on him. At the start of the movie the playwrite is a supporter of the state, but throughout the movie and after the loss of one of his friends who has been blacklisted by the state, he turns against the state, and writes statistics on the states suicide rates.

The Stasi agent who is asked to spy on this couple grows increasingly more caught up in the lives of this innocent pair, and goes to lenghts to protect them, as he realises the truth behind this covert investigation, into the lives of others.

http://www.imdb.com/title/tt0405094/

McCarthyism

Joe Mccarthy was a United States senator who decided in the 1950 to go on a campaign against communist forces and influences that might be penatrating the U.S.

In his hunt for communist he ruined several people with good character and implicated many others who had nothing to do with communism. During his time in office, many intellectuals and artist actually left the U.S. to go and live in Europe.

For his witch hunt for communist in the States he had full corporation of the media, churches, teachers, unions, etc. Many good democratic leaders lost their jobs and thousands of others during his campaign against communism. There were many wrong things happened during the years of the McCarthy era including:

Charlie Chaplin the famous comedian being deported from the United States.
Many artists were not given permission to travel. Similar to the no fly list of this time period.
Many people were blacklisted and unable to find jobs.
Trials were set up for those suspected and accused of being communists.
Lawyers, Judges, and Juries who sided with the defendants were threatened and harassed. If they refused to hand down guilty verdicts their jobs were threatened.
Communists were arrested, some charged with plotting to overthrow the government by force and violence, all charges were false, but the hysteria at the time kept the hunt in full gear.
The FBI used illegal practices in its pursuit of information on Communists, including burglaries, opening mail and illegal wiretaps. J. Edgar Hover lead the FBI during this time period.

During trials informants and false witness could always be produced against the defendants.

http://members.tripod.com/~HazelWolf/Hazel_Witchhunt.html http://en.wikipedia.org/wiki/McCarthyism

Cointelpro

The American program set up in the 50’s under J. Edgar Hover. This program was set after he could not go as far as he wanted with his witch hunt for communist. It was set up to investigate and disrupt dissident programs. It was also famous for targeting leaders of those programs. One famous leader this program targeted was Martin Luther King. The leader of the civil rights movement. Under the direction of J. Edgar Hover, they did everything in their power to bring him and his movement to the ground. http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIb.htm

Some of the methods that this program employed on activists and dissidents included:

Disruption of their movement via infiltration of snitches and informants.
Rumour and slander campaigns.
Planting of false media stories with collaborating media companies.
Portraying real dissidents as snitches or informants
False evidence and perjured statements by police to make dissidents look like criminals.
24/7 Surveillance and harassment campaigns.
Use of force against dissidents and their property including, but not limited to, break-ins, vandalism, assaults.
Official terrorism on dissidents, including assassinations.
Mail disruption and tampering.
Psychological Warfare on targets of this program.
http://www.icdc.com/~paulwolf/cointelpro/cointel.htm

http://www.dickshovel.com/coin.html

http://en.wikipedia.org/wiki/COINTELPRO

Gang Stalking has many other similarities to how Blacks were treated by the KKK in the American South and how Jews were treated by Hitler’s Brown coats before and during WWII.

Gang Stalking is pretty new in it’s present form, but the methods and techniques used are historic, just like the human nature that allows these things to happen and the human will that is finally able to conquer and stop these things from happeing.

Gang Stalking just like all those other events in history can be changed, but it needs awareness and human opposition to make that a reality. Please do not stand idly by and let this happen once again.

“All that is necessary for the triumph of evil is that good men do nothing.” (Edmund Burke)

Coping with Gang Stalking

Coping

Covert investigations are about power and control. It’s about suppression and censorship. Squashing dissidence. Overnight the target of these investigations will wake up and litterally find themselves enemies of the state, and the agents of the state. Their lives will be disrupted in unspeakable ways, and their livelyhoods. Many targets are broken to the point where they have very limited means of survival. This makes targets prime for suicide, false instituationalization, arrest, instigated car accidents, other accidents, or just assassination meant to look like an accident.

Being harassed in this way is a psychological battle that many targets are not ready for, and have to be ready for, if they are to survive. Survival also becomes more than just a psychological battle, because their lives are interfared with. These people will try to get them removed from their jobs, so they have no means of income or support. They will try to get them ostracisedin their communities, with former friends and family. It will psychologically, and emotionally feel like the world is against you, and because so many people are taking part in this activity, that assessment will not be too far from the truth.

Survival will become a game of skill, craft, and a lot of luck. Don’t discount prayers. Many of the targeted that I have encountered had a profound faith in God and many seem to be very intellegent people.

Live your life to the best of your ability.
Stay in control. It’s your life and not their life.
Try to meditate and pray as you start your day.
Continue with your normal activities as best as possible.
Try not to loose your temper in public. This is what they want. In public stay as calm and serene as possible.

They have observed you, now it’s your time to observe them. They have limited functions, once you tune into what they are doing, you can out smart them.
Do not interact with them to the best of your ability. They crave the attention and interaction with targets. Try not to give it to them.
If you start to fight back and they increase the attacks at first, that’s normal. Keep at it, be persistent. You will wear them down.
Do research on Gas-lighting, Cointelpro, Stasi secret police, psychopaths, cults, mobbing. Read books, watch movies, learn how they work.
Keep a journal of what’s happening.
Rebuild your social circle. The way this works is by putting you into exile. The thing that you want to do is rebuild a social circle. If you live in a small town, try to find maybe someone in another town, or someone who is not taking part in the gang stalking. This works by cutting of your network, the best defence is to try to build or rebuild a network.
Make people aware of what is happening. This works well in silence. However in small towns this works because too many people are taking part. Go online if you have to, start a blog, call people on the phone. Do an awareness campaign. Get the word out.

Gang Stalking Techniques

Techniques

Gang Stalking Techniques

The following techniques are several types that are often used against Targeted Individuals. There are other techniques used, but these are some of the primary ones.

A Psychiatric Reprisal
This was used in Russia to have dissidents listed as mentally ill. This practice is now being used against workers in America and other democratic countries.

“Across the United States, companies have seized upon concerns about workplace violence to quash dissent. Hundreds of large corporations have hired psychiatrists and psychologists as consultants to advise them on how to weed out “threatening” employees. They say they are only responding to a 1970 directive from the U.S. Occupational Safety and Health Administration that they maintain a “safe and secure work environment.” But by drawing the definition of “threatening” as broadly as possible, they are giving themselves a new club to bang over the heads of workers. “

A Violent Person Registry
Some targets might find that they are being targeted because they have been placed on a Violent Person Registry. This means that they will have a flag that comes up anywhere they go listing them as violent or potentially violent. This can happen to anyone, for simple reasons and without your knowledge. This can go on for years. Please read Jane Clift’s Story.

Many countries have similar lists. In Canada and the U.S. this type of listing falls under Occupational Safety and Health.

Air Stalking
This is when helicopters are used to track targets that are on foot, or in cars. They fly over head and follow the targets from one location to the next. Some will monitor the targets shortly after they leave their homes.

Brighting
As targets walk on the street, usually at night, civilian spies/snitches will turn on their high beams. This might be flashed once or twice at targets.
This might be used to let targets know they are being watched, however these signals might also be a way for Informants in cars at night, to communicate with their fellow counterparts.
The foot patrols will then communicate back to the Informant in the car, using a combination of hand signals.

Cell Phone Stalking
Using a targets cellphone to track and monitor them. The microphone and video cameras on cellphones can be used to monitor targets. Even when the phone is off, the microphone can be used to listen into conversation. The camera can be used to view activity in the room. Cellphones can also be used in conjunction with several Internet programs to locate the Targeted Individuals within a few feet.

Crowding/Mobbing
When the target is in public, civilian spies/snitches will usually try to box the target in. Eg. They will surround the target in a square like formation if possible. They will stand too close to the target, or swarm them.

Directed Conversations
These are conversations that complete strangers will have out in public relating to the target and their personal situations. Eg. They will repeat things a target said in their home, or on the phone. They will let drop very personal details into the conversation, that could only be related to the target.

Eg. Civilian Spy #1. It’s a shame Uncle Ed won’t be able to come.

Civilian Spy #2. Yeah since he died golfing on Saturday.

The target will just have learned of a death of a favored uncle, (possibly named Ed.) while out golfing.

Electronic Harassment
Electromagnetic weapons and frequencies will be used on a target on their homes. The purpose of using the EMF (Electromagnetic Frequency) on targets and their belonging are multifaceted. Electronic frequencies can destroy electronic equipment.

Electronic frequencies can be used for monitoring and tracking inside the home, and at work. It can also be used for purposes of sleep disturbance. When those conducting these covert investigations feel that they have psychologically destroyed the target to where they are near breakdown they will start to use these weapons. They will also use these weapons if targets are not going along with their harassment protocol.

Visit

http://www.eharassment.ca

http://www.stopcovertwar.com/dew.html

Emotional Sapping
This is similar to the concept of an energy or psychic vampire. You know negative people who drain your energy when you are around them, or who are really good at transferring their negativity onto you. As a target you are being exposed to dozens of people on a daily basis, many of them who do not wish you well, or want to hurt you even though they don’t know you.

Without realising it you are also being emotionally, mentally, and spiritually harmed on a daily basis. After time this can get to you and weaken your defences. This is when you might notice that you are more susceptible to this form of energy drain. It’s a very real phenomenon and one to be on the look out for. Once you are drained of energy this way, you will notice that it’s easier for these people to access your life and cause you harm in other ways. There are emotional shielding techniques that can be used to help try to prevent this. There are also lot’s of books being written about these types of negative energy draining people.

Entrapment
To lure into dangerous, difficult, or a compromising situations. The Civilian Spies/Snitches will try to lure targets into various situations for the sole purpose of setting them up. Setting up targets could involve getting them arrested, institutionalised, set up on fake sexual harassment charges, drug charges, illegal pornographic materials, etc. Once this happens, it put’s targets at risk for entrapment into becoming civilian spies themselves.

Fake Credibility Reports
Fake Credibility Reports. It’s the opinion of Gang Stalking World, that fake credibility reports are being used to subtly discredit and attack legitimate websites, including the Gang Stalking World website. Under the guise of doing good for the community.

What’s interesting about the fake credibility reports are which sites get targeted and which sites do not.

To find out more, please visit this thread. http://gangstalking.wordpress.com/2009/04/10/credibility-reviews-and-terms

Files
It has been indicated that targets will have files shown to relatives, store keepers and friends. The files are usually not left behind, but they are used to show legitimacy and to further slander targets. These files can be used to engender the corporation of friends and associates of the targets.

The files might have a picture of the target, and information about some alleged crime that they might be under investigation for. The information is usually very convincing and helps to further get targets harassed by those around them.

Gaslighting

  • Doing little things to try to make the target think that they are going crazy.
  • Coming into their homes, moving their furniture around.
  • Changing clothing that they bought and replacing it with similar, but inferior items.
  • Taking small items and then replacing them later on.

    Gassing/Poisoning
    Spraying fumes or scents into a targets home. Tampering with their food to make them become very ill.

    Heat and Vibrations
    Sometimes targets experience vibrations and heat in the home. There can be many sources. I have been advised that informants use many objects. Radar guns, lasers, etc. However one of the most likely causes of the vibrations in the home might be transducers.

    “And perps can purchase transducers of the type used in industrial sonic baths and mechanically fix them with screws to floor joists or wall studs underneath repaired drywall, completely hidden from view of normal inspection. The transducers will make your floors vibrate and probably create heat. They spend a lot of time hiding their stuff in houses or apartments so it won’t be found under simple visual inspection. If somebody really decides to start looking they *will* start finding these things. These tactics are part of the never ending “smoke and mirrors” routine. Apparently the perps get a “charge” out of inducing false perceptions.”

    Illegal Entry

  • To gaslight the target.
  • It’s used to help profile the target.
  • To set up illegal surveillance.
  • It’s a way to find out intimate details about the targets. This can be used later to set up the target by using people in photo albums, or by directed conversations about things in the targets apartment.

    Illegal Surveillance
    This involves setting up audio and some visual surveillance of the target.

  • Bugging the targets phone.
  • Surveillance in the targets residence
  • Listening to cell phone and hard line conversations.
  • Hacking into their computers and learning all about what the target is doing, sites they frequent.
  • This also helps to build a profile of the target, and it’s also used for later psychological attacks against the target.

    Illuminating Targets
    This is something that the East German Statsi secret police did to targets. They would spray the targets clothing with materials that would make them glow, or they would irradiate the targets with X-ray machines so that targets would start to glow in the dark, making it easier to follow them. Some targets have reported extreme visibility at night. It’s hard to believe countries outside of East Germany would use such a practice, but it’s a possiblity that should not be over looked.

    Illuminating Targets

    This is one possibility that targets can examine.

    Intimate Infiltration
    This is where civilian spies/snitches will go out of their way to get into a targets life. They will try to form friendships with targets. They will try to form intimate relationships with targets.

    They will get close to people that are affiliated with targets. Years before the target ever realises they are targets they will try to get into a targets life.

    Eg. If they can’t get into your life, but you have a best friend, their new significant other might just be a civilian spy/snitch. The same goes for siblings and the people that enter their lives.

    Isolation
    For this harassment to be successful, it’s important to be able to isolate the target from friends, family members, co-workers and even spouses. To accomplish this isolation many methods are used included, but not limited to: slander, lies, fake files, sabotage, anything that will get the target into a situation where they have no support system. This is important for them to succeed.

    Laser Microphones
    Laser microphones are microphones with a laser beam. They detect vibrations with a laser and convert it to a digital signal. Lasers are usually bounced off a window, or off any object near to the conversation monitored. Any object which can resonate/vibrate (for example, a picture on a wall) will do so in response to the pressure waves created by noises present in a room. The minute differences in the distance travelled by the light to pick up this resonance is detected interferometrically. Light that is subject to the varying distance is mixed with light that travels a constant distance. The interferometer converts the variations in distance to intensity variations and electronics are used to convert these variations to digital signals that can be interpreted as sound.

    This technology can be used to secretly eavesdrop on people with minimal chance of exposure. However, specialized light sensors may be used to detect the light from the beam. It was designed by Ethal Hussenburn in the 1970s during the Cold War. During the making the technology was advanced by the NSA and CIA making it smaller and compact. The Shelby laser Microphone was then invented (Soruce Wikepedia)

    Mail and Email tampering
    civilian spies/snitches will steal your mail. They will delay the delivery of your mail, and they will also make sure that your mail does not arrive. The other thing they are known for is the tampering of email. They will delay email, delete email, and stop email that you have sent from arriving

    Mimicking
    This is trying to copy things in a targets life.

  • Leaving when they do.
  • Dressing like they dress.
  • Throwing out the garbage
  • Going to the bathroom
  • Doing whatever the target is doing.

    This is all designed to be psychological warfare, so that the target again feels like they are under observation at all times.

    Noise Disturbance
    This will include anything from doors slamming above you and below you. Garbage disposal doors, car doors, loud stereos, stomping, moaning at specific times, loud coughing, pots slamming, water running, cupboard doors being slammed, fridge motor running all night, power tools, etc.

    Profiling
    Targets will be observed and profiled long before they ever become aware that they are targeted for this sort of harassment. Profiles will be created on targets by:

  • Following them.
  • Following people close to them.
  • Breaking into their homes and going through their stuff.
  • Listening to their calls.
  • Hacking into their computers.
  • Gathering information from friends, and family.
  • Seeing where they like to shop and eat.
  • What are their weaknesses?
  • What things do they like and dislike?
  • What are their weaknesses?
  • What things do they like and dislike?
  • What can you bribe them with?
  • What can you blackmail them with?
  • How can you bully them?
  • How can they best be controlled?

    This will all be used to put together a profile of the target and then to get them into situations for their detriment.

    Random Encounters
    This will be people on the street who you randomly and unexpectedly run into. It looks completely natural and it seems to be a random encounter.

    They might ask for your phone number after engaging you in conversation. Ask you out, or just ask you where you are going. Anything from small talk to lengthier conversations.

    All with the purpose of finding out something about you, or even just getting you to do something.

    Ruined Relationships
    When targets are in a relationship, the civilian spies/snitches will try to ruin that relationship. This could be friendships, family or significant others.

    If it’s a romantic relationship, they will find out what your significant other likes and try to get them to cheat, or leave you.

    If it’s a friendship they will tell lies to come between you. The same goes for family. This is done so that targets will have no means of support, once they do realise that something is going wrong in their lives.

    Sensitization
    This is getting targets sensitive to an everyday stimuli. Eg. Colors, patterns or everyday actions. Eg. Red, stripes, pens, whistles, loud coughing, clapping, waves, keys jingling.

    Eg. Joe will be mobbed at work and as part of that daily mobbing his coworkers will loudly cough at him every time they harass him by calling him names like loser, worthless, lame, demented. They will slander him and have others as they are slandering him show disgust by glaring and coughing at him.

    Out in public they will follow him loudly and obnoxiously coughing at him. When he goes to stores they will get others to do the same. After months or years of this, Joe has become sensitive to this stimuli and it can be used to harass him without the names and the glaring looks. The association has been formed because of all the other harassment.

    Eg. A girl is sexually assaulted and a sock is shoved in her mouth , during the assault. To keep her quite or stop her from pressing charges, the assailant, his friends and family will follow her around and throw socks in her path, mention it everywhere she goes and show her their socks every chance they get. She will get the message they are sending. Because of the brutal attack, she and what’s happened after she is now sensitised.

    Sensors
    These are used around the home or the apartment of a target to let others know the location or room that the target is in. These can also be used on auto pilot. Eg. When a target trips a sensor it can turn on a silent alarm or even the sound of running water. This effect can be used when targets are in the bathroom to let them think that their movements are being watched and observed.

    Signals/Symbols
    civilian spies/snitches will also communicate with each other on the street by using Statsi like signals. Below are some examples. SIGNALS FOR OBSERVATION

    1. Watch out! Subject is coming – touch nose with hand or handkerchief
    2. Subject is moving on, going further, or overtaking – stroke hair with hand, or raise hat briefly
    3. Subject standing still – lay one hand against back, or on stomach
    4. Observing Agent wishes to terminate observation because cover threatened – bend and retie shoelaces
    5. Subject returning – both hands against back, or on stomach
    6. Observing Agent wishes to speak with Team Leader or other Observing Agents – take out briefcase or equivalent and examine contents.

    Slander
    They will go behind the targets back and tell lies about them. Often the lies will consist of the target being into something illegal, or is someone dangerous, or just needs to be watched for some vague reason.

    Eg. The they will say the target is a prostitute, drug dealer, crazy, terrorist, gay, racist, pedophile, etc.

    Sleep Deprivation
    Depriving the target of sleep is a really good way of leaving the target stressed out. It’s also a way of leaving them disoriented and functioning at less than 100%. Then the targets can be baited into reacting in public, or getting into a car accident.

    Strange Encounters or Street Theatre
    This is running into people that are acting very unusual, or people that are putting on a show or production, known as street theater.

    Eg. This could be as minor as public rudeness, or people acting out a skit or skits for your benefit. There will usually be someone near by to see how you react to it. This is again looking for weakness or reactions. If you show an adverse reaction they will try to embellish on this and use it against you later on.

    Telephone Redirects
    When you make a telephone call, get the name and ID of the person that you are speaking to. Covert Investigations have redirected phone calls. This means that when you dial a number they will intercept that phone call and pretend to be the service or repair person you were trying to call. Eg. If you call the cable company, gas or phone company be sure you know that it’s actually them that you are speaking to.

    Theft
    Breaking into a targets home and taking small items, usually nothing of value. However there are exceptions to every rule. Perps will usually try to see what they can get away with.

    Tracking
    The targets are tracked by various methods.

  • Targets are tracked on foot by foot soldiers.
  • They are tracked in their cars.
  • Targets can be tracked by using their cell phones, laptops, and other electronic devices. If their cell phone number is know, there are Internet programs that will track a target to within a few feet.
  • GPS tracking on their cars. These are all ways that targets are tracked where they go and their activities monitored.

    Vandalism
    If the target owns property this can be as simple as broken door handles, knobs, to actual slashing of tires. They will also break in and do small damage to items the target owns. Eg. If you buy a new sweater, they might break in and cut holes in it. Holes in undergarments.

    If you go to a store to get a repair done check for damages. This goes for boots, and coats. Eg. Zippers and the heals of long heeled boots.

    Voice2skull
    Also known as V2K. If you are hearing voices you might not be crazy. Eg. You can be in the room with someone else and be hearing voices and they will hear nothing.

    There is a commercial version which can perform this task.

    http://www.usatoday.com/tech/news/techinnovations/2003-05-19-hss_x.htm

    What targets have reported is however more advanced than this and can go directly through walls. What has been reported by targets is technology that can bypass the ears and send sound signals directly to the brain.

    Wrong Number Calls
    Targets will daily get wrong number calls. These can be automated or they can be persons pretending to be wrong number calls. Civilian spies will use this as a means to monitor and psychologically harass targets. They want to know where the target is at all times.