Gang Stalking Redefined

Gang Stalking is a covert investigation that is opened on an individual, or a list that a Targeted Individual is placed on.

Jane Clift

Mrs Clift’s name in the “Violent Person Register”. She was rated as medium risk, her name to remain on the register for 18 months.

Individuals can be placed on such lists designating them as potentially Violent Person’s or persons who have displayed inappropriate behaviours, and it flags them as individuals to be watched. An innocent person can be added to a Violent Person’s Registry without knowing it, and given a Violent Person Designation, which will flag and send their names out to every area they visit. Jane Clift was targeted this way and spent four year clearing her name.

Individuals without their knowledge are being placed on lists. In many countries these lists fall under Occupational Safety and Health.

http://www.wcb.pe.ca/photos/original/wcb_wpviolence.pdf
The Canadian Center of Occupational Health and Safety

Workers have the ’ right to know ‘ all risks and safe work procedures associated with the job. This may involve identifying individuals with a history of unpredictable or violent behavior.

The identity of the person and the nature of the risk must be given to staff likely to come into contact with that person. While workers have the right to know the risks, it is important to remember that this information cannot be indiscriminately distributed.

Other countries have such lists or similar lists. It seems that employers, educational facilities, and community centers are in some cases placing innocent individuals on such lists as a means of retaliation, silencing, or controlling members of society.

http://www.harassment101.com/Article5.html

They both are victims of an increasingly popular employer weapon against whistleblowers: the psychiatric reprisal.

The individual is then placed under overt and covert forms of surveillance. Everywhere the Targeted Individual goes, their name is flagged. In a big city this could mean that thousands upon thousands of people are getting a flag with the targets information. The person is followed around 24/7. Foot patrols and vehicle patrols are used to follow the Individual around, as part of the monitoring process. During these patrols a one handed sign language is used to assist the citizen informants with communicating to each other. They will use this to silently communicate to any business the target enters, or other areas.

Gang Stalking can be viewed by the Targeted Individual as a systemic form of control, which seeks to control every aspect of a Targeted Individuals life. Gang Stalking has many similarities to workplace mobbing, but takes place outside in the community. It called Gang Stalking, because the target is followed around and placed under intrusive and directed surveillance by groups of organised “Covert Human Intelligence Sources” also known as Citizen Informants 24/7. Using anti-terror laws to spy on ordinary people.

Many Targeted Individuals are harassed and placed under surveillance in this way for months or even years before they realise that they are being targeted by an organised protocol of harassment.

What happens during this surveillance is very similar to what happened to many innocent individuals in the former East Germany or Activists and Dissidents in Russia. Many innocent people in the former East Germany would be targeted for these harassment programs, and then their friends, family, and the community at large would be used to monitor, prosecute, and harass them. The same persecutions and harassments are now happening in democratic countries.

Once a person is flagged the community becomes hypervigilant, and within this structure there is a targeted and illegal protocol of harassment that happens. Electronic means are used to monitor, harass and torture the target. When the target tries to describe what is happening to them, it sounds as if they have had a mental breakdown. The reality is electronic means are being used to make it appear as if the target has had a breakdown.

In Russia similar means were used by the state to declare activist, dissidents or anyone they thought to be an enemy of the state as mentally unfit and many were institutionalised using this form of systemic control.

The closest thing to Gang Stalking that democratic countries have seen before this is McCarthyism, Cointelpro, and RED SQUAD programs. Red Squad programs were used for monitoring, and harassment of various groups. They have been in place for over a hundred years, and they also employed Covert Human Intelligence Sources.

Civilian Spies, also known as “Covert Human Intelligence Sources” are recruited from every level and sector of society. Remember anyone the Targeted Individual comes into contact with gets a warning about the target.

Just like with Cointelpro investigations, everyone in the targets life is made a part of this ongoing never ending, systemic psychological harassment and manipulation of the target. These actions are specifically designed to control the target and to keep them in line. These actions are also designed to destroy the target over years, make them look crazy and leave them with no form of support. The individuals around the target carry out actions and tasks as they are instructed, without realising that the structure is psychologically designed to break the target down.

For the targets of this harassment, Gang Stalking is experienced as a covert psychological, emotional and physical attack, that is capable of immobilizing and destroying a target over time. For the state it’s a way to keep the targets in line, control them, or destroy them.

Worldwide programs of control and conformity have been used with equal success and lethality. What we are seeing now is a global co-ordinated and organised effort of control and conformity. Many countries around the world are currently using a model of policing called: Community Oriented Policing. It’s described as a systemic approach to policing. It focuses on instilling a sense of community within a geographically located neighborhood. Communities come together and discuss what values they would like to have in their community, community development, and it’s also a time to discuss any problems that might be happening in a specific area. If a problem is identified an investigation might be opened. These local programs in many countries have been forming partnerships with other government run programs at, provincial, state and federal levels.

http://news.cnet.com/8301-13578_3-20000550-38.html

With agents going undercover, state and local police coordinate their online activities with the Secret Service, FBI and other federal agencies in a strategy known as “deconfliction

A process called Deconfliction allows them to share information. Reports of Gang Stalking are not only coming in from democratic countries, but they are coming in from many other countries as well.

http://www.eff.org/files/filenode/social_network/20100303__crim_socialnetworking.pdf

The modern day systemic form of control could only be funded at governmental levels, just like it has in other societies where these similar types of harassment programs have been implemented. It’s all part of a system of control and conformity that has been in place for many years. A system of control with many local groups and appendages taking part. Many targets report that their information is passed and shared between country boarders, and that the surveillance continues even when they travel.

What are the goals of Gang Stalking?

The official goal is listed as a means of flagging or investigating dangerous, or potentially dangerous individuals. The real goal however seems to be to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalisation, or forced suicide. Other goals of this harassment is to destroy the targets reputation and credibility. Make the target look crazy or unstable.

Other goals involve sensitizing the target to everyday stimuli’s as a form of control, which is used to control targets when they get out of line. Once the target is sensitized, the Citizen Informants have an easier time identifying the Targeted Individual in public. The targets sensitivity is most likely added to their file as a warning marker and sign to watch for future reactions to.

These programs are designed to make the targets of this harassment vulnerable, they want to make them destitute. The secondary goals seems to be to make the target homeless, jobless, give them a breakdown, and the primary goals seems to be to drive the target to forced suicide, just like what they did with some of the targets of Cointelpro. It’s a useful way of eliminating perceived enemies of the state.

What are other Names for Gang Stalking?

There are many names for this form of systemic control and harassment. Under the Gang Stalking label you will also find such terms as Violent Person’s Registry, Organised Stalking, Cause Stalking, Multi-Stalking, Community Mobbing, but it’s all part of the same harassment protocol. What many people do not realise is that Gang Stalking is just one appendage of this systemic form of control. There are other forms of control used to repress, and keep individuals in line. Other forms or appendages include, but are not limited to: Mobbing, Cointelpro, The Buzzsaw, Covert War, Electronic Harassment, etc. These are the just some of the names being given to a very old game, that is once again being played by governments on their unsuspecting citizens.

How are targets chosen?

Officially targets can be flagged and investigated for suspected, or reported behaviours. Unofficially the Targets can be chosen because of many other reasons. They can be chosen for political views. They can be chosen for whistle-blowing. They can be chosen because they belong to a dissident movement. They can be chosen because they asserted there rights at work. They can be chosen because they made the wrong enemy. Were considered to be too outspoken, unwittingly investigated something that the state did not want investigated, signed a petition, wrote a letter. They were deemed as suspicious by a civilian spy/snitch and their names were handed over.

It’s becoming apparent that targets might be chosen for this systemic form of control, if they are not already in some way a part of this controlled system. Eg. Many Targeted Individuals seem to be unaware that large chunks of our society are now being used as Citizen Informants.

Who gets targeted?

Targeting can happen to anyone in society. In the past primary targets of programs such as Cointelpro have been minorities. Targeting however can happen to anyone. Individuals are often targeted for being outspoken, whistle blowers, dissidents, people who go up against wealthy corporations, woman’s groups, (single) women, minorities, extremists, conspiracy theorists, anti-war proponents, individuals identified or targeted as problems at these community meetings, and other innocent individuals. The majority of the targets are often not aware that they are being targeted in this way. When a target moves, changes jobs, the harassment still continues, because they are still flagged. Every time the target moves, the same information, lies, and slander will be spread out into the new community and the systemic monitoring and harassment will continue.

http://gangstalkingworld.com/Forum/YaBB.pl?num=1205738832/0

Who takes part?

People from all walks of life are being recruited to be the eyes and ears of the state. People from all races, ages, genders. Every sector of society that you can think of is a part of this. Civilian Spies/Snitches include, but are not limited to: General labourers, the wealthy, bikers, drug dealers, drug users, street people, punks, hip hop culture, KKK, black activists, church groups, youth groups, Fire Fighters, police officers, lawyers, health care workers, store keepers, maids, janitors, cable installers, phone repair persons, mail carriers, locksmiths, electricians, etc. There really is no minimum or maximum age range. An article came out recently in the UK, saying they were recruiting children as young as eight years old to be Covert Human Intelligence Sources.

Public individual that the Targeted Individual comes in contact with are given this warning. Some of these citizens might be recruited via programs such as Citizen Corp, Weed and Seed, Citizens On Phone Patrol, (COPP), City Watch, T.I.P.S. Many started with good intentions to help patrol and monitor their cities and neighbourhoods. Others are recruited via their families, others at school, others at work. Since every sector, class, race in society takes part, recruitment is multi-faceted.

Many do not understand or care that the end consequence of this flagging, this harassment protocol is to destroy a person.

Why people participate in Gang Stalking?

There are many reasons that someone takes part in this activity.

1. Some do it for the sense of power that it gives them.

2. Others do this as a way to make friends and keep friends. It’s something social and fun for them to do. Many in society use the one handed sign language to communicate and it’s very effective in breaking down race, gender, age, social barriers.

3. Others are forced or black mailed by the State or the police into taking part.

4. They are told that they are part of homeland or national security. They are told that they are being used to help keep and eye on dangerous or emotionally disturbed individuals. They see themselves as heroic spies for the state.

Civilian spies can come from a variety of different programs such as the Citizen Corp, Citizen On Phone Patrol COPP, Weed and Seed, T.I.P.S., City Watch or some other centralized government program used for patrolling and monitoring cities.

5. Others are just local thugs or Informants who are already being used for other activities, and their energies are just diverted over into these community spy programs. Eg. Some may be given the choice of Spying for the State or the police vs going to jail.

6. Others are told outright lies and slander about the target to get them to go along with ruining the targets life.

7. Many are however just average citizens who have been recruited by the state the same way citizens were recruited in the former East Germany and other countries. It’s the way the society is.

What are some techniques used against targets?

A few of the most common techniques are listed below.

a) Classical conditioning.

Getting a Targeted Individual sensitized to an everyday stimuli. The targeted individual over a period of months, or even years is negatively sensitised to an everyday stimuli, which is then used to harass them. It’s used out in public to let them know they are constantly being harassed and monitored. Some examples of everyday stimulus that might be used include: sounds, colors, patterns, actions. Eg. Red, white, yellow, strips, pens clicking, key jangling, loud coughing, loud whistling, loud smacking of clapping of hands together, cell phones, laptops, etc.

b) 24/7 Surveillance This will involve flagging and following the target everywhere they go. Learning about the target. Where they shop, work, play, who their friends and family are. Getting close to the target, moving into the community or apartment where they live, across the street. Monitoring the targets phone, house, and computer activity. Surveillance Policy.

c) Isolation of said target.

This is done via reports. The reports are meant to warn the community, but they act as little more than slander campaigns. They present a one sided assessment of the targets behavior and activity. The target is never allowed to tell their side of the story or to clear their name. This one sided assessment can include false reports, lies, and legitimate incidents where the target was set up. Eg. People in the targets community are told that the target is crazy, dangerous, a thief, into drugs, a prostitute, pedophile, in trouble for something, needs to be watched. This very flagging in and of itself is capable of creating paranoia, and false interpretation of everyday incidents.

Files will even be produced on the target, shown to neighbours, family, store keepers.

d) Noise and mimicking campaigns.

Disrupting the targets life, sleep with loud power tools, construction, stereos, doors slamming, etc. Talking in public about private things in the targets life. Mimicking actions of the target. Basically letting the target know that they are in the targets life. Daily interferences, nothing that would be too overt to the untrained eye, but psychologically degrading and damaging to the target over time.

e) Everyday life breaks and street theatre.

Flat tires, sleep deprivation, drugging food, putting dirt on targets property. Mass strangers doing things in public to annoy targets. These strangers might get text messaged to be at a specific time and place, and perform a specific action.

It might seem harmless to these Citizen Informants, but it could be causing great psychological trauma for the target. Eg. Blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit a response from targets. Etc. It’s like the death of a thousand paper cuts. One or two minor incidents will not cause any harm to the target, but over time the target is slowly worn down.

Where does the support or funding for this come from?

Though the systemic harassment that Targeted Individuals refer to as Gang Stalking is immoral and unethical in nature, programs such as this in democratic countries, and none democratic countries have always been funded by the Government. They are the only ones with enough money, coordination, and power to keep such a system in place. These Co-ordinated efforts then join hands with others for this systemic form of control and harassment.

“Ruling the community with an iron fist. “Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants and federal agencies could form alliances without causing public outcry.” Covert Action Quarterly, summer 1997.”

Ruling the community

“You mean to tell me that it is legal for corporations from the private sector to team up with local law enforcement officials in efforts to spy on innocent members of our society? You also mean to tell me that the synthesis of law enforcement authority and the drive of for-profit companies operate under little to no guidelines or restrictions and it is unclear to whom they are responsible to?”

ACLU Blog

What can you do to help?

1. If you know someone who is being targeted in this way please don’t go along with it. Don’t assume that the person is guilty or a bad person. Many innocent people are currently being targeted, and people are being told lies. This form of harassment is systemic and it’s about state control and conformity. The express goal of this harassment is to destroy the individual over time.

2. If you are aware of someone being harassed in this way, subtly direct them to websites that deal with Gang Stalking, or sites for Targeted Individuals. Knowledge is power.

3. You can subtly offer your support to someone who is being unfairly treated, in very small little ways.

4. You can bring up the subject of Gang Stalking or Targeted Individuals.

6. You can subtly suggest that your local newspapers or community papers print articles about Targeted Individuals or even an write an objective piece about Gang Stalking.

How do participants communicate?

Communication happens in a number of ways. When on the street or in cars patrolling, they use baseball or Stasi like signals. Citizen Informants also seem to get verbal ques via cellphone and earphones.

These include things like tapping the side of the nose, corner of the eye, brushing back the hair 3 times, the infamous double blink, etc.

http://gangstalkingworld.com/Media/2010/02/informant-signals/

Here is a list of signals that the former East German Secret Police the Stasi used. http://www.nthposition.com/stasiland.php

SIGNALS FOR OBSERVATION

1. Watch out! Subject is coming – touch nose with hand or handkerchief

2. Subject is moving on, going further, or overtaking – stroke hair with hand, or raise hat briefly

3. Subject standing still – lay one hand against back, or on stomach

4. Observing Agent wishes to terminate observation because cover threatened – bend and retie shoelaces

5. Subject returning – both hands against back, or on stomach

6. Observing Agent wishes to speak with Team Leader or other Observing Agents – take out briefcase or equivalent and examine contents.

Books:

1. GmB Bailey, “Bridging The Gap.”

2. Gloria Naylor. “1996″

3. Kristina Borjesson “Into the Buzzsaw”

4. Jim Redden “Snitch Culture”

5. Noa Davenport “Mobbing: Emotional Abuse in the American WorkPlace”

6. Ward Churchill, Jim Vander Wall “Cointelpro Papers”

7. Anna Funder “Stasiland”

8. Protectors of Privilege: Red Squads and Police Repression in Urban America

9. Victor Santoro “GASLIGHTING How To Drive Your Enemies Crazy “

10. Anthony Brina “Suburban Spies”

11. Stephen Knight “The Brotherhood”

12. Alex Constantine “The Covert War Against Rock”

13. Frank Donner “The Age of surveillance”

14. Niki F. Raapana “2020″

15. Dr. Andrew M. Lobaczewski. Political Ponerology: The science on the Nature of Evil.

16. Community Oriented Policing. A Systemic approach.

Movies:

1. The lives of others. http://www.imdb.com/title/tt0405094/ (A movie about covert investigations in the former East Germany)

2. The Matrix. (Sci-fi Movie.) Neo a target wakes up and realises not only is he being watched without knowing why, but that the world is a lie, that has been created to pull the truth over people’s eyes.

Advertisements

Areas of study to consider when researching Gang Stalking

In researching Gang Stalking there are many factors to be considered. It’s not a subject matter that should be studied lightly. Also the average psychiatrist if not familiar with some of the other issues that are affecting members of many communities might not be able to make an iron clad assessment without looking at several factors. Here are factors that I think should be considered.

Areas to be aware of when studying Gang Stalking.

Workplace Mobbing.

It’s our nearest and dearest cousin on an emotional and psychological level. The methodology used in workplace mobbing are some of the same that we see happening with Gang Stalking.

http://mobbing-usa.com/

The Snitching system

Websites such as http://www.November.org are doing a really nice job of showing the world the other side of snitching, and it’s true affect on society.

Also Alexandra Natapoff has done some wonderful research into the wider and more impacting issues of the Informant system and how it’s affecting members of some communities. In some areas over 50% or more of ethnic communities had been inducted into becoming police informants. Both men and women.

http://www.youtube.com/watch?v=Mav9tOvmWcQ
http://www.lls.edu/academics/faculty/natapoff-snitching.html

From what I have seen, the numbers are higher than this and it’s no longer limited to the communities focused on in her research.

Community Based Policing

This method of policing is changing how societies think, react and interact. It’s basically turning our communities into societies like what they have in China, had in Russia, or East Germany. There is a U.N. agenda called 2020 that seeks to adapt this model for every country in the world by 2020.

http://www.albionmonitor.com/9711b/policing.html

“Ruling the community with an iron fist. “Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants and federal agencies could form alliances without causing public outcry.” Covert Action Quarterly, summer 1997.”

http://www.newswithviews.com/Raapana/niki4.htm
http://www.newswithviews.com/Raapana/niki2.htm

Crisis Centers

When I tried to follow up on some of the research that “Norma” over at gangstalking.ca had done in conjunction with crisis center I found out that these are some of the places that targets were turning to for help. Before the Gang Stalking websites were available, woman and to a much smaller extent men were calling the crisis centers, more specifically the Rape Crisis Center to get some help, or to find anyone who knew about Gang (Organised) Stalking.

See what some of these psychiatrist do not realise is that before the websites were available, the beliefs were not going away. People were not accepting the false explanation that they were delusional. This was in many cases, too, real, to obvious, and far too life impacting. So when the police failed, doctors, psychiatrists, etc. They were calling the crisis centers.

Online before the Gang Stalking websites, they were visiting Mobbing, Conspiracy, Bullying, and mind control sites. These were the only places that were close to having any information, shared stories, or experiences that might help the target to further understand what they were going through.

Systemic corruption.

Before his death Tim Fields who shed some much needed light on the Bully phenomenon also saw a very obvious pattern of collusion amongst the targets that were seeking help. He started to research it and then passed away before he could get further.

http://www.bullyonline.org/action/obstruct.htm

Tim Fields is not the only person to have noticed this type of systemic corruption when it comes time to finding help for issues of Bullying, Workplace Mobbing, etc but he might have been the one to shed the brightest light on it, had he lived.

http://www.crvawc.ca/documents/WorkplaceHarassmentandViolencereport.pdf

http://www.harassment101.com/Article5.html

Unchecked Surveillance

The unchecked surveillance that is happening to many private citizens all across the globe. We live in a new reality, but the diagnosis is the same. Think you are being followed around? Must be paranoia. Yet had the family in this article gone for help, thinking they were being spied upon, they might well have been diagnosed as paranoid, when in fact their concerns would have been fully warranted.

http://www.dailymail.co.uk/news/article-559130/Why-didnt-just-knock-door-ask-couple-tailed-weeks-council-spies.html?printingPage=true

http://www.dailymail.co.uk/debate/columnists/article-559123/Why-earth-Stasi-state-spying-families.html

This very average, unassuming family were spied upon, 24/7, followed around by (Informants) Covert Human Intelligence Sources, had their play by play activity recorded, all because someone thought they were falsifying the school district that they lived in. This is just a glimpse at what our societies have turned into and how these laws and unchecked surviellances ae being used and abused, to the unchecked power that has been handed out to many branches within society.

Lastly is the concern or question of wither Gang Stalking website help to enhance, or feed a delusion, and can these website prevent someone from seeking help for an illness?

It’s a great question and one that no one can answer definitively. If someone believes that something is wrong and traditional points of reference are not providing answers or a solution, they will clearly look towards other points of healing. This is what was happening with Gang Stalking.

Before the websites were here, the beliefs were still held by individuals. When the websites were not here, people were still desperately seeking help and assistance. They were using outside sources which at times could not always formulate a basis of reference for what they were experiencing, but they were still using those points of references, because it was the best available at the time.

If someone goes to a mobbing website and it confirms a belief that they already have that co-workers are out to get them, then it’s up to the individual how they further choose to use the information. The same is true with someone using the bullying website who believes that there is collusion within the system and that is what is happening to them.

The Gang Stalking websites are here, just like mobbing, bullying, etc and they are providing information, research, and shared experiences for the website visitor that chooses to review and consider the information provided.

The Structure of our oppression

The Structure of our oppression.

The following article will try to put into perspective some of the societal structures that are most likely responsible for the targeting some of those in the Targeted Individual community are experiencing.

For years Targeted Individuals have been saying that they are being followed around, stalked, monitored while at home, and out in public. They have complained of a system that is capable of 24/7 surveillance, able to harassment at home, work, in the community, and even while traveling abroad. For several years there has been a great deal of disbelief that such occurrences could even be possible. The follow article, will try to explain referencing sources already available and documented how this could be happening.

The following article represents the views and opinions of the GangStalkingWorld.com website and does not necessarily reflect the views of any other person, or website in the community.

It has long been a widely expressed view that the monitoring is being done by various groups of citizen informants, members of various community policing type programs. Based on recent research conducted it seems most likely that the people being used to follow Targeted Individuals around are what society and the government in some countries refer to as, “covert human intelligence sources”. They can also be known as own as Citizen Informants. Another slang terms that is often used to describe these individuals is the term Snitch or Snitches.

Covert human intelligence sources

A recent article came out in the London Telegraph, saying that Children as young as 8 are being employed by the state as “Covert human intelligence sources” aka Snitches. Targeted Individuals often complain that the harassment is being perpetrated by all members of the community including children.

Children are being hired and used by the government to spy on their neighbors in the Uk. and “being encouraged to photograph or video neighbors guilty of dog fouling, littering or “bin crimes” The article says there are “hundreds of Junior Streetwatchers, aged 8-10 years old, who are trained to identify and report enviro-crime issues such as graffiti and fly-tipping.” The adult spies according to authorities are recruited via newspaper ads.

[quote]”Other local authorities recruit adult volunteers through advertisements in local newspapers, with at least 4,841 people already patrolling the streets in their spare time.

Some are assigned James Bond-style code numbers, which they use instead of their real names when they ring a special informer’s hotline.

This escalation in Britain’s growing surveillance state follows an outcry about the way councils are using powers originally designed to combat terrorism and organised crime to spy on residents. In one case, a family was followed by council staff for almost three weeks after being wrongly accused of breaking rules on school catchment areas.” 1[/quote]

Community Oriented Policing

Though the article primarily focuses on the United Kingdom, it should be noted that other countries are setting up such community structures, via community oriented policing programs. These programs are a

[quote]”a systemic approach to policing with the paradigm of instilling and fostering a sense of community, within a geographical neighborhood, to improve the quality of life. It achieves this through the decentralization of the police and the implementation of a synthesis of three key components: (1) strategic-oriented policing—the redistribution of traditional police resources; (2) neighborhood-oriented policing—the .interaction of police and all community members to reduce crime and the fear of crime through indigenous proactive programs; and (3) problem-oriented policing-a concerted effort to resolve the causes of crime rather than the symptoms. ” 2[/quote]

Fusion Centers

The ACLU has released a report on Fusion Centers. 800,000 operatives will be dispersed throughtout every American city and town. Set to report on even the most common everyday behaviors which will go into state, local and regional, linked data bases. These linked databases are not just emerging in the United States, they have already emerged in many countries around the world in the wake of implied terrorist threats.

[quote]”We pointed out that, while diverse and often still in the early stages of formation, they often seem to be characterized by ambiguous lines of authority, excessive secrecy, troubling private-sector and military participation, and an apparent bent toward suspicionless information collection and datamining.” 3[/quote]

The article then goes on to point out that in a short space of many of the warning in the report had come to pass. The article talks about the fact that this apparatus is responsible for watching and recording the everyday activity of a growing number of individuals. The reports are then gathered together and then they are accessible to any law enforcement agency that is a part of these fusion centers.

[quote]”In the six months since our report, new press accounts have borne out many of our warnings. In just that short time, news accounts have reported overzealous intelligence gathering, the expansion of uncontrolled access to data on innocent people, hostility to open government laws, abusive entanglements between security agencies and the private sector, and lax protections for personally identifiable
information.
Overall, it is becoming increasingly clear that fusion centers are part of a new domestic intelligence apparatus. The elements of this nascent domestic surveillance system include:
• Watching and recording the everyday activities of an ever-growing list of individuals
• Channeling the flow of the resulting reports into a centralized security agency
• Sifting through (“data mining”) these reports and databases with computers to identify individuals for closer scrutiny
Such a system, if allowed to permeate our society, would be nothing less than the creation of a total surveillance society.” 3[/quote]

These fusion center will have the capacity to circumvent laws that are in place to limit federal vs local authorities and the access that each has to specific information.

[quote]”Even more troubling is the fact that these centers are networked together and seamlessly exchange information with the intelligence community through the Director of National Intelligence’s Information Sharing Environment (ISE). The Washington Post report was based on a document produced from a survey of fusion centers, which shows their intent to maximize the access each of the fusion centers has to the various databases. This would allow a state fusion center that under state law or local policy is prohibited from buying credit reports, as an example, to circumvent its own restrictions by simply calling a
fusion center in Pennsylvania to and asking Pennsylvania authorities to access the records it wants to analyze. This “policy shopping” process guts state and local privacy protections and gives the participating agencies, including the federal intelligence community, access to information they may not legally have on their own.” 3[/quote]

These centers if allowed to expand will create a one way justice system. Your information, even your daily activities will be allowed to be gathered, collected, and possibly used against you. When you then request information to confirm if you are a target of surveillance, the information will be stored in a secret database and not available for you to access.

[quote]”Even as fusion centers are positioned to learn more and more about the American public, authorities are moving to ensure that the public knows less and less about fusion centers. In particular, there appears to be an effort by the federal government to coerce states into exempting their fusion centers from state open government laws.31 For those living in Virginia, it’s already too late; the Virginia General Assembly passed a law in April 2008 exempting the state’s fusion center from the Freedom of Information Act.32

According to comments by the commander of the Virginia State Police Criminal Intelligence Division and the administrative head of the center, the federal government pressured Virginia into passing the law, with the threat of withholding classified information if it didn’t.33 Such efforts suggest there is a real danger
fusion centers will become a “one-way mirror” in which citizens are subject to ever-greater scrutiny by the authorities, even while the authorities are increasingly protected from scrutiny by the public.” 3[/quote]

Public Employees

The next aspect of the targeted that has been reported by the Targeted Individual community is the fact that public servants seem to be taking a part in the continuous monitoring and harassment private citizens. American Civil servants, firefighters, police officers, Corporate Employees, learning to collect data and spy. The information then goes into secret data bases. They will also communicate in code. Many targets have expressed a belief not only that they are being tracked, but that their stalkers are communicating via a one handed sign language similar to that which the Stasi used.

Watch Video
http://www.youtube.com/watch?v=KU-xsQ3Xepw

[quote]”They are entrusted with hunting for “suspicious activity,” and then they report their findings, which end up in secret government databases.

What constitutes “suspicious activity,” of course, is in the eye of the beholder. But a draft Justice Department memo on the subject says that such things as “taking photos of no apparent aesthetic value” or “making notes” could constitute suspicious activity, Finley wrote. ” 4[/quote]

Not only will this program used the civil servant already mentioned, but it will expand who is used in the program. They will have secret sources of communication available to them. The members of these programs will connect with the fusion centers. None disclosure agreement or a confidential disclosure agreements will be signed by many in these programs to ensure that the information is protected.

[quote]”And the private sector would be involved, too. “The program would eventually be expanded to include Health Care personnel and representatives from private, critical infrastructure entities, with communication systems specifically tailored to their needs.”

In this regard, Terrorism Liaison Officers resemble InfraGard members. (See “The FBI Deputizes Business”.) This FBI-private sector liaison group now consists of more than 26,000 members, who have their own secure channels of communication and are shielded, as much as possible, from scrutiny.

Terrorism Liaison Officers connect up with so-called “Fusion Centers”: intelligence sharing among public safety agencies as well as the private sector. The Department of Justice has come up with “Fusion Center Guidelines” that discuss the role of private sector participants.

“The private sector can offer fusion centers a variety of resources,” it says, including “suspicious incidents and activity information.”

It also recommends shielding the private sector. “To aid in sharing this sensitive information, a Non-Disclosure Agreement may be used. The NDA provides private sector entities an additional layer of security, ensuring the security of private sector proprietary information and trade secrets,” the document states.” 4[/quote]

Other than the United States many other countries have similar programs in place where they have requested that public servants in the course of doing their day to day activities keep an eye out on what is happening.

Stalking and Monitoring.

Though I do not in believe the family in this video are targets of Gang Stalking I will say that the example shown explains very well how someone could be stalked, monitored and spied on 24/7 as this family was. I do not believe they are targets of Gang Stalking, because Gang Stalking is often covert, what this family experienced was extremely overt and left behind lot’s of verification and proof, the harassment targeted individuals experience does not often offer any overt evidence.

The stalking they believe was done primarily using their cell-phone. They were followed 24/7. Their phone conversations listened to. When the mother was in the kitchen making lemonade, the phone rang, and the caller told her, he preferred limes. When the family heard someone at their door in the middle of the night banging, they called the police, when the police arrived the invaders had already left. After the police left this happened again, the family called the police, the invaders had left, this happened a third time and finally the family stopped trying. After filing a complaint with the police, the family were sent a recording of their conversation with the police, by the stalker. They installed a camera system, the stalker called to say that he already knew the code.

The list goes on, and apparently there were a total of three families in the area that the cell phone stalking happened to. The case has received wide media attention, including the Tyra Banks show. There is technology out there designed to do this. A company which I will not name in this report, has a service for cheating spouses, where you can use a phone to know where they are and listen into their conversations. There are also programs which will allow the camera on a phone to be used to spy on the person with the camera phone.

http://www.youtube.com/watch?v=sV_I7cgkqXc

[quote]”The families say the calls come in at all hours of the night, threatening to kill their children, their pets and grandparents. Voice mails arrive, playing recordings of their private conversations, including one with a local police detective. ”

“The caller knows, the families said, what they’re wearing and what they’re doing. And after months of investigating, police seem powerless to stop them. ”

“It got worse. The Kuykendalls and two other Fircrest families told ABC News that they believe the callers are using their cell phones to spy on them. They say the hackers know their every move: where they are, what they’re doing and what they’re wearing. The callers have recorded private conversations, the families and police said, including a meeting with a local detective. ” 5[/quote]

Not all members of the Targeted Individual community have a cameraphone, but this example is just to show how one family could be terrorized by an encounter such as this. What we experience is ongoing, and often just as upsetting, but we often do not have the same proof that this family had, which enabled them to go to the police.

[quote]”Recently, the stalkers have begun to come to their home in the early hours of the morning, banging on their doors. The mother said that the first time they came, she immediately called 911, but as soon as the police arrived, the stalkers had fled. The police, unable to do anything, left, and the stalkers returned right away. She said every time this happens she contacts the police, but after about the third call and then the third return, she just stops trying.” 6[/quote]

Regulation of Investigatory Powers

Regulation of Investigatory Powers is a United Kingdom law, which enables public bodies to carry out investigations and surveillance on individuals. Authorities can use directed surveillance or intrusive surveillance for months or years. These types of operations often employ “covert human intelligence sources’. Recently these laws were abused by using them to spy on families for anti-social behaviours and noise complaints.

[quote]”Directed surveillance’ is covert surveillance of individuals during a specific but non-intrusive investigation’ (our emphasis). Surveillance is covert where it is carried out in such a way to ensure that those targeted are unaware that it is taking place (cl.25(8)). ‘Surveillance’ is defined as including any monitoring, observing and listening to persons, their movements, conversations or other activities or communications. It also includes any recording of such activity and surveillance by or with assistance of a device.”

” Intrusive surveillance’ is defined as covert surveillance in relation to anything taking place on residential premises or a private vehicle. It may be carried out either by a person or device inside residential premises or a private vehicle or by a device placed outside” 7[/quote]

Secret Databases

A new story also came out this year claiming that information is being kept on Canadians, in secret databases that they have no access to.

[quote]”Jennifer Stoddart, the Privacy Commissioner of Canada, has released a 48-page report warning that the RCMP (Canada’s national police force) is keeping thousands of files on regular citizens in secret databases which cannot be seen by the accused.

One of the many disturbing facets of Stoddart’s report are the examples she cites of information for these secret files coming from citizen informants. In one case a man was put into the secret database because a resident of his daughter’s school neighborhood saw him entering a rooming house and—believing drugs were involved—called the police. The police investigation concluded that the man had only stepped out of his car to have a cigarette, but the file was still in the national security databank seven years later.

Another incident cited in the Stoddart report involved a neighbour who saw two men carrying “something that resembled a large drum, wrapped in canvas” into their house. Police were called to investigate but found nothing resembling the reported item, yet the data was still sitting in a top secret databank five years later. As Stoddart points out in the CBC story on the report, this is potentially disastrous for the individuals named in the files, because it “could potentially affect someone trying to obtain an employment security clearance, or impede an individual’s ability to cross the border.” 8[/quote]

References:

1. http://www.telegraph.co.uk/news/uknews/2689996/Children-aged-eight-enlisted-as-c%20ouncil-snoopers.html

2. http://www.amazon.ca/Community-Oriented-Policing-Systemic-Approach/dp/0130141100

3. http://www.aclu.org/pdfs/privacy/fusion_update_20080729.pdf

4. http://www.progressive.org/mag/mc070208

5. http://abcnews.go.com/TheLaw/Story?id=3312813&page=1

6. hs.riverdale.k12.or.us/maverick/?q=node&page=18

7. http://www.fipr.org/rip/JRP2HRA.html

8. http://www.corbettreport.com/articles/20080214_snitch_state.htm

Other Sources:

1. http://www.telegraph.co.uk/news/uknews/2696031/Anti-terrorism-laws-used-to-spy-on-noisy-children.html.

2. http://www.youtube.com/watch?v=sV_I7cgkqXc

About Us

The Gang Stalking World website was created to bring attention and awareness to the growing and devastating phenomenon that some are calling Gang Stalking. To find out more about Gang Stalking and what it is you can start here http://www.gangstalkingworld.com/GSFAQ.html

Gang Stalking has many aspects to it. The emotional and psychological abuse that the Targeted Individual suffers is very similar to what targets of workplace mobbing suffer. On this level the mobbing community are our closest relations, and this is why Gang Stalking has also been termed community mobbing by some.

http://arts.uwaterloo.ca/~kwesthue/ohs-canada.htm
http://mobbing-usa.com/
Gang Stalking is also very similar in relationship to the Cointelpro program that was instituted by the American Government to disrupt and destroy dissidence. During her post as U.S. State representative Cynthia McKinney had sought to have investigations into Cointelpro re-opened. Just like many others she felt that some aspects of this program had continued into the present.

http://www.scoop.co.nz/stories/WO0609/S00610.htm
http://uk.youtube.com/watch?v=ZgeDj8ji3m0

Further research has also shown that what is happening to targets is comparable to what happened in East Germany and other countries with armies of Citizen Informants being employed by the State to place Targeted Individuals under 24/7 surveillance. Research is showing that there are in fact networks of individuals being hired by the state in various countries to track and spy on average citizens. The spying includes email and phone taps. Being followed around in public by hired Covert Human Intelligence Sources. Having these same Informants move into the houses around the target when possible. Following them around in vehicle and foot patrols, plus many other forms of intrusive surveillance.

http://www.dailymail.co.uk/debate/columnists/article-559123/Why-earth-Stasi-state-spying-families.html

http://www.dailymail.co.uk/debate/columnists/article-559123/Why-earth-Stasi-state-spying-families.html

http://www.sundayherald.com/news/heraldnews/display.var.2342364.0.how_local_counay%20cils_use_antiterror_laws_to_spy_on_ordinary_people.php

http://www.aclu.org/pdfs/privacy/fusion_update_20080729.pdf

http://www.youtube.com/watch?v=dLpHitaKk1s

Individuals and Families under these types of surveillance are often not aware, and if they do become aware and go to seek help, they are often written off by the establishment as paranoid, psychotic, or crazy. The modern day reality is that without proper investigations, Freedom Of Information Act requests, and other proper forms of inquiry a true assessment might be impossible to determine. The secondary problem is that many of these investigations are ending up in secret databases, which the public has no access to. F.O.I.A. requests are no longer a sure fire way to determine if an individual is under surveillance.

http://www.dailymail.co.uk/news/article-559130/Why-didnt-just-knock-door-ask-couple-tailed-weeks-council-spies.html
http://www.corbettreport.com/articles/20080214_snitch_state.htm

In other time periods where people have suffered unjust prosecution and injustice this modern day targeting is no different and only by bridging the awareness gap and helping people to waking up to the reality of what is really happening can we begin to affect the change needed to stop this.

Electronic Harassment

Attribution:

http://www.abovetopsecret.com/forum/thread1143/pg1

ultra_phoenix
Newly De-Classified US Electronic Harassment Technologies

January 19, 1998

This page lists articles from technology publications which show how these technologies are being marketed in commercial form, and have also been and are being used to harass covert weapons testing victims:

The reader is asked to remember that ANNOUNCED inventions with potential for “national security” use are ALWAYS already in use covertly when announced. The SR-71 “Blackbird” surveillance aircraft was in use for many years before the public saw it.

This page lists articles from technology publications which show how these technologies are being used to harass covert weapons testing victims, and are now coming out in commercial form, or have been announced to the public:

1. Aviation Week & Space Technology, March 10, 1997 “Radar Warns Birds of Impending Aircraft”

This article by Bruce Nordwall (Washington bureau) describes research being carried on by the USAF Wright Laboratory at Dayton Ohio. The article describes the use of MODULATED radar signals to produce AUDIBLE SOUND within the brains of birds near airport runways to cause them to fly away and avoid collisions with landing aircraft.

Other references on work with animals or humans with “audible microwaves”:

Science, vol. 181, 27 July 73, page 356 Nature, vol. 216, DEC 16 1967, page 1139 Nature, vol. 210, May 7 1966, page 636 Journal Acoustical Society of America, June 1982, page 1321 Bioelectromagnetics conference, 1992, 13:323-328 (pages 323-328)

This list was furnished by the lab at Wright- Patterson Air Force Base where this type of unclassified development is now in progress.

** The transmission via MODULATED microwave pulses carrying voices to selected weapons testing victims has been carried on for more than two decades, as reported by the victims. There has been little published about this phenomenon, and since direct-to-skull voice transmissions are consistently mis-interpreted by psychiatrists as ‘schizophrenia’, getting this information to the public needs concerted attention.

2. Electronic Business Today, February 1997 “Business Trends” section, page 20

Inventor Elwood Norris, and his small company, (American Technology Corp., Poway CA) have designed a market ready device called an “acoustical heterodyne”.

This device sends out two sound signals in the ultrasonic (above-human-hearing) range which, when they impact a surface, which may be a living creature, then and only then produce a sound at a frequency equal to the DIFFERENCE (“heterodyne”) of the two ultrasound frequencies.

** This technology has been used extensively by harassers who follow a walking or driving victim and bounce raucous, unnatural bird calls and other strange sounds off surfaces near the victim. This type of sound is tape recordable.

ATC Corporate Headquarters 13114 Evening Creek Dr. S. San Diego, CA 92128 (800)41-RADIO (417-2346) (619)679-2114 (619)679-0545 FAX atc-info@atcsd.com http:/www.atcsd.com

3. New York Times, April 7, 1997, “Devices May Let Police Find Hidden Guns on Street” article

This article, with photos supplied by Millitech Corporation, describes recently unclassified “millimeter wave” cameras (and some other see- thru technologies less well developed.)

These units operate like camcorders, giving the user a real-time thru-clothing, thru- luggage image for detecting weapons and drugs.

Technology like this does not just pop out of nowhere overnight, and it probably has its roots in the 1960’s classified microwave weapon “renaissance” – about the same time as the U.S. embassy staff in Moscow discovered they were being bathed in Soviet microwave signals.

OEM Magazine, February 1997, page 20 “Electronic Dipstick” article

This article describes “micropower impulse radar” or “MIR” radar, developed at Lawrence Livermore Lab in California, and licensed to several large companies for consumer products. Basically, this radar uses the highest radio frequencies and does not require the supporting hardware like rotary antennas which ‘conventional’ radar does.

Uses include vehicle blind-spot sensors, traffic control sensors, heart muscle response monitors, and ** see thru plaster ** stud finders.

** Thru the wall radar has been covertly used for a number of years on weapons testing victims. One common use has been to detect where the victim is standing or walking in their apartment, and ‘follow’ the victim’s position by rapping floor, walls, or ceiling from an adjacent apt. This is designed to let the victim know he/she is under constant surveillance.

4. Defense Electronics, July 1993, page 17

DOD, INTEL AGENCIES LOOK AT RUSSIAN MIND CONTROL CLAIMS

Federal law enforcement officials considered testing a Russian scientist’s acoustic mind control device on cultist David Koresh a few weeks before the fiery conflagration that killed the Branch Davidian leader and 70 of his followers in Waco, Texas, DEFENSE ELECTRONICS has learned.

In a series of closed meetings beginning March 17 in suburban northern Virginia with Dr. Igor Smirnov of the Moscow Medical Academy, FBI officials were briefed on the Russian’s decade- long research on a computerized acoustic device allegedly capable of implanting thoughts in a person’s mind without that person being aware of the source of the thought.

His account of the meetings was confirmed by Psychotechnologies Corp., a Richmond, Virginia based firm that owns the American rights to the Russian technology.

[Not necessarily unclassified, but at least made known to a limited segment of the public]

5. Dan Rather’s CBS Evening News, Dec. 9, 1997

Police helicopters were the topic, and one of the features soon to be added to police heli- copters was “an electromagnetic ray gun which can stop speeding cars dead.”

While this is primitive technology compared with that used to manipulate the minds and nervous systems of e-weapons victims of the 1990’s, it does demonstrate quite clearly that government is putting substantial re- sources into electromagnetic weapons devel- opment.

6. Canadian version, Discovery Channel, “Invention” segment, Thursday December 25, 1997

During part of the show, it was stated that the current development of polygraphs (lie detectors) using massive computer-aided database comparisons was now a reality and these machines were making substantial progress towards near- perfect accuracy.

The final statement in that segment was: It is expected that the next stage in polygraph devel- opment will be REMOTE MICROWAVE detection of bodily functions, which will mean the polygraph can then be used SECRETLY, at a distance.

7. Associated Press: (Dec. 2, 1997)

TOKYO – Tired of reaching for the remote control every time you surf the channels? Help is on the way – at a price. A Japanese company plans to market a device that changes television channels and activates household appliances at the flicker of a brain wave. The price: roughly 600,000 yen ($4,800). The product, called the Mind Control Tool Operating System, or MCTOS, is the result of a collaboration between the Technos Japan Co. and the Himeji Institute of Technology in southwestern Japan.

Say you want to turn on the air conditioner. Simply focus on that icon on the MCTOS computer display menu while wearing a pair of beta-wave trapping goggles. Then, according to Technos spokesman Sadahiro U#ani, say something like “Ei!!” inside your head. Soon your air conditioner will be pumping cool air into the room.

MCTOS is scheduled to go on sale in April, 1998.

8. On Jan. 19 the Washington Post had an article about a device for remotely detecting heartbeats by detecting the electromagnetic pulses emitted by beating hearts.

URL: www.washingtonpost.com… 1998-01/19/017l-011998-idx.html

An excerpt:

“The pumping of the human heart is controlled by electrical signals, which doctors measure in electrocardiograms. The heart’s activity generates an irregular, ultralow-frequency electric field that extends in a circle around the body.

“The field is faint, but it can pass through almost any physical barrier. The LifeGuard can pick up on the strongest part of the field, the heart, through barriers including concrete walls, heavy foliage and rocks. Company officials say the LifeGuard can detect a person in less than five seconds and can pinpoint his or her location with a high degree of accuracy.”

The company is marketing the device for potentially locating people in need of rescue, or detecting where individuals are located inside a building.

— submitted by: Allen L. Barker www.cs.virginia.edu

Here is more info on this type of device:

69. VSE – Life Assesment Detector System DATE 020597 93% (Nasdaq: VSEC) LIFE ASSESMENT DECTECTOR SYSTEM (LADS) Patent Pending The Life Assessment Detector System (LADS), a microwave Doppler movement measuring device, can detect human body surface motion, including heartbeat and respiration, at ranges up.. www.vsecorp.com… 3296 bytes, 08Feb97 —

9. Nature magazine, Vol 391, January 22, 1998, page 316, “Advances in neuroscience may threaten human rights” by Declan Butler

(PARIS – Pasteur Institute – Speech by Chairman of the French national bioethics committee Jean-Pierre Changeaux)

“But neuroscience also poses potential risks, arguing that advances in cerebral imaging make the scope for invasion of privacy immense.

“Although the equipment needed is still highly spec- ialized, it will become commonplace and capable of being used at a distance, he predicted. That will open the way for abuses such as invasion of personal liberty, control of behaviour, and brainwashing.”

“These are far from being science-fiction concerns, said Changeaux, and constitute a serious risk to society.”

Also in that article:

“Denis LeBihan, a researcher at the French Atomic Energy Commission, told the meeting that the use of imaging techniques has reached the stage where we can almost read people’s thoughts.”

NOTE: These scientists are speaking ONLY about the UNCLASSIFIED scientific arena. Classified technology can always be assumed well ahead of unclassified.
ourworld.cs.com…

Citizens on Phone Patrol

COPPThe Citizen On Phone Patrol. These programs have been in effect as far back as 1998 or even before in some communities. I fully approve of helping out ones community and keeping an eye on things. However this is not what gang stalking is about. Gang stalking is different in many regards. http://www.iht.com/articles/2006/08/14/news/korea.php

The problem is some elements of gang stalking are taking advantage of these programs and using or incorporating them to help harass innocent people.

Police, politicians, Companies, and many others in most communities are aware of these groups, many people are taking part in these groups, and these groups are fully supported by the above mentioned people.

Below is information about the (COPP) program in Longview Texas. These programs are however operational in many cities in America and Canada, and some are being abused to help target, watch and harass innocent people via gang stalking.

Citizens on Patrol (C.O.P.) acts as extra eyes and ears for the Longview Police Department in the cities neighborhoods. Private citizens volunteer their time and resources to actively patrol their neighborhoods to observe and report suspicious and/or criminal activities to the appropriate authorities.

C.O.P’s primary purpose is to help reduce crime and/or illegal drugs within the city through cooperation with the police department.

Within the C.O.P. program, citizens are needed to patrol their neighborhoods for 8 to 16 hours per month.

If you can spare at least 8 hours per month for the betterment of your community, C.O.P. needs you. None of our volunteers receive pay or reimbursements for any of our services.

Patrols are conducted in the Volunteer’s personal vehicles with the C.O.P. logo on magnetic signs for maximum visible identification. Also, shirts and jackets imprinted with the logo are supplied to each volunteer. Cell-Phones as well as Programed 800 mhz Two-way Radios are provided for patrollers ever constant contact with the Longview Police Dept. There must be two (2) or more patrollers in each patrol vehicle. Good friends, buddies or husbands and wives make an optimum patrol situation. COP is a non-profit organization incorporated by the state of Texas. We are 501 ( C ) (3) designated by the IRS to receive grants and donations.

VOLUNTEERS MUST BE AGE 21 OR OLDER.

C.O.P. VOLUNTEERS ARE NOT POLICE OFFICERS and ARE TRAINED TO

OBSERVE and REPORT ONLY.

 CITIZENS ON PATROL OBJECTIVES:

 1. To assist the Longview Police Department through observing and reporting

 2. To help reduce crime in neighborhoods

 3. To increase cooperation between citizens and police

 4. To educate citizens on crime prevention

 5. To increase police authorized presence in neighborhoods

 6. To unite residents for a dedicated reason

 7. To increase crime awareness among the citizens in our own neighborhoods

 8. To improve the quality of life in all areas of Longview

 9. To provide a safe, secure environment for all neighborhood residents

 10. To make a difference in our city

Increased citizen involvement can and will deter crime in your neighborhood. These patrols are a visible presence of police authority that helps to prohibit and deter criminal activities. C.O.P. also develops a closer relationship between the police and the community. This enhances and improves the overall quality of life within the city of Longview, Texas.

YOU CAN MAKE A DIFFERENCE.

C.O.P. participants will attend one eight-hour training session. During this time they will learn the observation techniques and police procedures necessary for safety and the smooth operation of patrolling. Each C.O.P. volunteer is required to participate in at least one ride-along with a uniformed patrol officer prior to starting patrols. This allows the citizens to experience the complexities of law enforcement, possibly from a different perspective.

YOU CAN MAKE A DIFFERENCE.

If you are thinking about joining Citizens On Patrol here is some information

Simply call the Information phone number below or

Call the Community Resource Officer in your area. (See item 7 below)

Attend training class for C.O.P. (8 hours classroom plus hands on instructions).

Complete one ride-along with a Longview Police Officer.

Remember you must be 21 or older.

For information & application: Call: ….903-237-8883

Or Contact Any Community Resource Officer at:

District A——— Community Resource Office: 903-295-8634

District B———-Community Resource Office: 903-758-3816

District C———-Community Resource Office: 903-236-4363

Return to top

 The C.O.P. program assists the police department in crime prevention by:

 actively patrolling neighborhoods and being visible

 observing and recording activities and

 reporting suspicious crime and/or illegal drug activity to the police.
The C.O.P. program increases the lines of communication between

Longview citizens and the Longview Police Officers by:

increasing direct interaction among citizens and officers;

informing and educating private citizens in the daily activities

of the police department; sharing with the concerned citizens of Longview

that they do have a voice and it’s time to be heard; empowering, uniting and

consolidating as many citizens as possible to support the police department.

More information about these programs can be used by following the links below.

http://www.gov.sk.ca/newsrel/releases/2006/05/08-366.html

http://www.eastpointpolice.org/copp.htm

http://www.citizensonpatrol.mb.ca/

http://www.longviewcop.com/#How_to_Join

http://www.waco-texas.com/city_depts/police/citizenpatrol.htm

http://www.uscg.mil/D13/can/CANObservcerGuidebook.pdf

http://www.portsmouthva.gov/ppd/neighborhoodwatchinformation/NW%20Guide4.pdf

http://www.prisonplanet.com/articles/march2005/040305citizenpatrols.htm

What are Informants?

Informants

Many people in our society commit crimes or do something that gets them into trouble with the police. Instead of going to jail some are offered a way out. Some are offered the choice of becoming snitches or informants.

Many are offered these programs without the benefit of seeing a lawyer or they are told that if they see a lawyer the offer will be withdrawn. Many see this as a way out, a get out of jail free card, however this becomes a package that can have many draw backs, not just for the informants, but for the society at large, when they are left to roam free and continue some of the same activities that brought them to the attention of law enforcement in the first place.

The spy programs being used in many cities are similar to the Statsi system that was used in the former East Germany. Informants are asked to go back and spy on friends, family, neighbours. It’s not a good life style and many find that they are no better than indentured slaves trapped in a program that is nothing better than a life time jail without a cell.

Unlike a 20 year prison sentence that has a time frame, once they become parts of these programs, they are trapped and owned by the state for life and there is often no way out. Some who have tried to get out, have had unfortunate endings. However to many people who are offered these programs, they initially seem like life lines out of a life behind bars. For some it is, for others it’s something much worst.

The other aspect of these programs that many are just starting to look into is entrapment. Other snitches who go out of their way to get innocent people into situations where they can be forced to become parts of these programs. There are people who are parts of these programs that are specifically looking to go out and find others that they can entrap in these programs, sometimes if they can not get you into the program by legitimate means, they will get you in by other means.

The best thing you can do for yourself if you are caught in something that is illegal or embarassing is buy yourself enough time to think things through, see a lawyer if you can. Don’t let anyone force or pressure you into these programs, because once in, unlike jail, there does not seem to be a way out.

To find out more about some of these programs, you can read some of the following articles.

Articles

http://www.theglobeandmail.com/servlet/ArticleNews/

freeheadlines/LAC/20060808/INFORMANTS08/national/National

http://www.slate.com/id/2132092

http://www.law.uc.edu/lawreview/uclaw73pdf/0645natapoff.pdf

http://www.informationclearinghouse.info/article13970.htm

http://www.csmonitor.com/2006/0731/p06s01-woam.html

http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/01/28/BAGHUGV3AE1.DTL

http://www.hiphopmusic.com/archives/001245.html

http://www.canadafreepress.com/2006/wajsman052006.htm

http://www.canadafreepress.com/2006/wajsman052006.htm

http://www.thenation.com/doc/20060403/william

http://www.usatoday.com/news/nation/2006-03-28-stop-snitching_x.htm

http://www.oscweb.com/writing/crime10.htm

Websites

http://www.November.org

http://www.whosarat.com