Gang Stalking Redefined

Gang Stalking is a covert investigation that is opened on an individual, or a list that a Targeted Individual is placed on.

Jane Clift

Mrs Clift’s name in the “Violent Person Register”. She was rated as medium risk, her name to remain on the register for 18 months.

Individuals can be placed on such lists designating them as potentially Violent Person’s or persons who have displayed inappropriate behaviours, and it flags them as individuals to be watched. An innocent person can be added to a Violent Person’s Registry without knowing it, and given a Violent Person Designation, which will flag and send their names out to every area they visit. Jane Clift was targeted this way and spent four year clearing her name.

Individuals without their knowledge are being placed on lists. In many countries these lists fall under Occupational Safety and Health.

http://www.wcb.pe.ca/photos/original/wcb_wpviolence.pdf
The Canadian Center of Occupational Health and Safety

Workers have the ’ right to know ‘ all risks and safe work procedures associated with the job. This may involve identifying individuals with a history of unpredictable or violent behavior.

The identity of the person and the nature of the risk must be given to staff likely to come into contact with that person. While workers have the right to know the risks, it is important to remember that this information cannot be indiscriminately distributed.

Other countries have such lists or similar lists. It seems that employers, educational facilities, and community centers are in some cases placing innocent individuals on such lists as a means of retaliation, silencing, or controlling members of society.

http://www.harassment101.com/Article5.html

They both are victims of an increasingly popular employer weapon against whistleblowers: the psychiatric reprisal.

The individual is then placed under overt and covert forms of surveillance. Everywhere the Targeted Individual goes, their name is flagged. In a big city this could mean that thousands upon thousands of people are getting a flag with the targets information. The person is followed around 24/7. Foot patrols and vehicle patrols are used to follow the Individual around, as part of the monitoring process. During these patrols a one handed sign language is used to assist the citizen informants with communicating to each other. They will use this to silently communicate to any business the target enters, or other areas.

Gang Stalking can be viewed by the Targeted Individual as a systemic form of control, which seeks to control every aspect of a Targeted Individuals life. Gang Stalking has many similarities to workplace mobbing, but takes place outside in the community. It called Gang Stalking, because the target is followed around and placed under intrusive and directed surveillance by groups of organised “Covert Human Intelligence Sources” also known as Citizen Informants 24/7. Using anti-terror laws to spy on ordinary people.

Many Targeted Individuals are harassed and placed under surveillance in this way for months or even years before they realise that they are being targeted by an organised protocol of harassment.

What happens during this surveillance is very similar to what happened to many innocent individuals in the former East Germany or Activists and Dissidents in Russia. Many innocent people in the former East Germany would be targeted for these harassment programs, and then their friends, family, and the community at large would be used to monitor, prosecute, and harass them. The same persecutions and harassments are now happening in democratic countries.

Once a person is flagged the community becomes hypervigilant, and within this structure there is a targeted and illegal protocol of harassment that happens. Electronic means are used to monitor, harass and torture the target. When the target tries to describe what is happening to them, it sounds as if they have had a mental breakdown. The reality is electronic means are being used to make it appear as if the target has had a breakdown.

In Russia similar means were used by the state to declare activist, dissidents or anyone they thought to be an enemy of the state as mentally unfit and many were institutionalised using this form of systemic control.

The closest thing to Gang Stalking that democratic countries have seen before this is McCarthyism, Cointelpro, and RED SQUAD programs. Red Squad programs were used for monitoring, and harassment of various groups. They have been in place for over a hundred years, and they also employed Covert Human Intelligence Sources.

Civilian Spies, also known as “Covert Human Intelligence Sources” are recruited from every level and sector of society. Remember anyone the Targeted Individual comes into contact with gets a warning about the target.

Just like with Cointelpro investigations, everyone in the targets life is made a part of this ongoing never ending, systemic psychological harassment and manipulation of the target. These actions are specifically designed to control the target and to keep them in line. These actions are also designed to destroy the target over years, make them look crazy and leave them with no form of support. The individuals around the target carry out actions and tasks as they are instructed, without realising that the structure is psychologically designed to break the target down.

For the targets of this harassment, Gang Stalking is experienced as a covert psychological, emotional and physical attack, that is capable of immobilizing and destroying a target over time. For the state it’s a way to keep the targets in line, control them, or destroy them.

Worldwide programs of control and conformity have been used with equal success and lethality. What we are seeing now is a global co-ordinated and organised effort of control and conformity. Many countries around the world are currently using a model of policing called: Community Oriented Policing. It’s described as a systemic approach to policing. It focuses on instilling a sense of community within a geographically located neighborhood. Communities come together and discuss what values they would like to have in their community, community development, and it’s also a time to discuss any problems that might be happening in a specific area. If a problem is identified an investigation might be opened. These local programs in many countries have been forming partnerships with other government run programs at, provincial, state and federal levels.

http://news.cnet.com/8301-13578_3-20000550-38.html

With agents going undercover, state and local police coordinate their online activities with the Secret Service, FBI and other federal agencies in a strategy known as “deconfliction

A process called Deconfliction allows them to share information. Reports of Gang Stalking are not only coming in from democratic countries, but they are coming in from many other countries as well.

http://www.eff.org/files/filenode/social_network/20100303__crim_socialnetworking.pdf

The modern day systemic form of control could only be funded at governmental levels, just like it has in other societies where these similar types of harassment programs have been implemented. It’s all part of a system of control and conformity that has been in place for many years. A system of control with many local groups and appendages taking part. Many targets report that their information is passed and shared between country boarders, and that the surveillance continues even when they travel.

What are the goals of Gang Stalking?

The official goal is listed as a means of flagging or investigating dangerous, or potentially dangerous individuals. The real goal however seems to be to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalisation, or forced suicide. Other goals of this harassment is to destroy the targets reputation and credibility. Make the target look crazy or unstable.

Other goals involve sensitizing the target to everyday stimuli’s as a form of control, which is used to control targets when they get out of line. Once the target is sensitized, the Citizen Informants have an easier time identifying the Targeted Individual in public. The targets sensitivity is most likely added to their file as a warning marker and sign to watch for future reactions to.

These programs are designed to make the targets of this harassment vulnerable, they want to make them destitute. The secondary goals seems to be to make the target homeless, jobless, give them a breakdown, and the primary goals seems to be to drive the target to forced suicide, just like what they did with some of the targets of Cointelpro. It’s a useful way of eliminating perceived enemies of the state.

What are other Names for Gang Stalking?

There are many names for this form of systemic control and harassment. Under the Gang Stalking label you will also find such terms as Violent Person’s Registry, Organised Stalking, Cause Stalking, Multi-Stalking, Community Mobbing, but it’s all part of the same harassment protocol. What many people do not realise is that Gang Stalking is just one appendage of this systemic form of control. There are other forms of control used to repress, and keep individuals in line. Other forms or appendages include, but are not limited to: Mobbing, Cointelpro, The Buzzsaw, Covert War, Electronic Harassment, etc. These are the just some of the names being given to a very old game, that is once again being played by governments on their unsuspecting citizens.

How are targets chosen?

Officially targets can be flagged and investigated for suspected, or reported behaviours. Unofficially the Targets can be chosen because of many other reasons. They can be chosen for political views. They can be chosen for whistle-blowing. They can be chosen because they belong to a dissident movement. They can be chosen because they asserted there rights at work. They can be chosen because they made the wrong enemy. Were considered to be too outspoken, unwittingly investigated something that the state did not want investigated, signed a petition, wrote a letter. They were deemed as suspicious by a civilian spy/snitch and their names were handed over.

It’s becoming apparent that targets might be chosen for this systemic form of control, if they are not already in some way a part of this controlled system. Eg. Many Targeted Individuals seem to be unaware that large chunks of our society are now being used as Citizen Informants.

Who gets targeted?

Targeting can happen to anyone in society. In the past primary targets of programs such as Cointelpro have been minorities. Targeting however can happen to anyone. Individuals are often targeted for being outspoken, whistle blowers, dissidents, people who go up against wealthy corporations, woman’s groups, (single) women, minorities, extremists, conspiracy theorists, anti-war proponents, individuals identified or targeted as problems at these community meetings, and other innocent individuals. The majority of the targets are often not aware that they are being targeted in this way. When a target moves, changes jobs, the harassment still continues, because they are still flagged. Every time the target moves, the same information, lies, and slander will be spread out into the new community and the systemic monitoring and harassment will continue.

http://gangstalkingworld.com/Forum/YaBB.pl?num=1205738832/0

Who takes part?

People from all walks of life are being recruited to be the eyes and ears of the state. People from all races, ages, genders. Every sector of society that you can think of is a part of this. Civilian Spies/Snitches include, but are not limited to: General labourers, the wealthy, bikers, drug dealers, drug users, street people, punks, hip hop culture, KKK, black activists, church groups, youth groups, Fire Fighters, police officers, lawyers, health care workers, store keepers, maids, janitors, cable installers, phone repair persons, mail carriers, locksmiths, electricians, etc. There really is no minimum or maximum age range. An article came out recently in the UK, saying they were recruiting children as young as eight years old to be Covert Human Intelligence Sources.

Public individual that the Targeted Individual comes in contact with are given this warning. Some of these citizens might be recruited via programs such as Citizen Corp, Weed and Seed, Citizens On Phone Patrol, (COPP), City Watch, T.I.P.S. Many started with good intentions to help patrol and monitor their cities and neighbourhoods. Others are recruited via their families, others at school, others at work. Since every sector, class, race in society takes part, recruitment is multi-faceted.

Many do not understand or care that the end consequence of this flagging, this harassment protocol is to destroy a person.

Why people participate in Gang Stalking?

There are many reasons that someone takes part in this activity.

1. Some do it for the sense of power that it gives them.

2. Others do this as a way to make friends and keep friends. It’s something social and fun for them to do. Many in society use the one handed sign language to communicate and it’s very effective in breaking down race, gender, age, social barriers.

3. Others are forced or black mailed by the State or the police into taking part.

4. They are told that they are part of homeland or national security. They are told that they are being used to help keep and eye on dangerous or emotionally disturbed individuals. They see themselves as heroic spies for the state.

Civilian spies can come from a variety of different programs such as the Citizen Corp, Citizen On Phone Patrol COPP, Weed and Seed, T.I.P.S., City Watch or some other centralized government program used for patrolling and monitoring cities.

5. Others are just local thugs or Informants who are already being used for other activities, and their energies are just diverted over into these community spy programs. Eg. Some may be given the choice of Spying for the State or the police vs going to jail.

6. Others are told outright lies and slander about the target to get them to go along with ruining the targets life.

7. Many are however just average citizens who have been recruited by the state the same way citizens were recruited in the former East Germany and other countries. It’s the way the society is.

What are some techniques used against targets?

A few of the most common techniques are listed below.

a) Classical conditioning.

Getting a Targeted Individual sensitized to an everyday stimuli. The targeted individual over a period of months, or even years is negatively sensitised to an everyday stimuli, which is then used to harass them. It’s used out in public to let them know they are constantly being harassed and monitored. Some examples of everyday stimulus that might be used include: sounds, colors, patterns, actions. Eg. Red, white, yellow, strips, pens clicking, key jangling, loud coughing, loud whistling, loud smacking of clapping of hands together, cell phones, laptops, etc.

b) 24/7 Surveillance This will involve flagging and following the target everywhere they go. Learning about the target. Where they shop, work, play, who their friends and family are. Getting close to the target, moving into the community or apartment where they live, across the street. Monitoring the targets phone, house, and computer activity. Surveillance Policy.

c) Isolation of said target.

This is done via reports. The reports are meant to warn the community, but they act as little more than slander campaigns. They present a one sided assessment of the targets behavior and activity. The target is never allowed to tell their side of the story or to clear their name. This one sided assessment can include false reports, lies, and legitimate incidents where the target was set up. Eg. People in the targets community are told that the target is crazy, dangerous, a thief, into drugs, a prostitute, pedophile, in trouble for something, needs to be watched. This very flagging in and of itself is capable of creating paranoia, and false interpretation of everyday incidents.

Files will even be produced on the target, shown to neighbours, family, store keepers.

d) Noise and mimicking campaigns.

Disrupting the targets life, sleep with loud power tools, construction, stereos, doors slamming, etc. Talking in public about private things in the targets life. Mimicking actions of the target. Basically letting the target know that they are in the targets life. Daily interferences, nothing that would be too overt to the untrained eye, but psychologically degrading and damaging to the target over time.

e) Everyday life breaks and street theatre.

Flat tires, sleep deprivation, drugging food, putting dirt on targets property. Mass strangers doing things in public to annoy targets. These strangers might get text messaged to be at a specific time and place, and perform a specific action.

It might seem harmless to these Citizen Informants, but it could be causing great psychological trauma for the target. Eg. Blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit a response from targets. Etc. It’s like the death of a thousand paper cuts. One or two minor incidents will not cause any harm to the target, but over time the target is slowly worn down.

Where does the support or funding for this come from?

Though the systemic harassment that Targeted Individuals refer to as Gang Stalking is immoral and unethical in nature, programs such as this in democratic countries, and none democratic countries have always been funded by the Government. They are the only ones with enough money, coordination, and power to keep such a system in place. These Co-ordinated efforts then join hands with others for this systemic form of control and harassment.

“Ruling the community with an iron fist. “Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants and federal agencies could form alliances without causing public outcry.” Covert Action Quarterly, summer 1997.”

Ruling the community

“You mean to tell me that it is legal for corporations from the private sector to team up with local law enforcement officials in efforts to spy on innocent members of our society? You also mean to tell me that the synthesis of law enforcement authority and the drive of for-profit companies operate under little to no guidelines or restrictions and it is unclear to whom they are responsible to?”

ACLU Blog

What can you do to help?

1. If you know someone who is being targeted in this way please don’t go along with it. Don’t assume that the person is guilty or a bad person. Many innocent people are currently being targeted, and people are being told lies. This form of harassment is systemic and it’s about state control and conformity. The express goal of this harassment is to destroy the individual over time.

2. If you are aware of someone being harassed in this way, subtly direct them to websites that deal with Gang Stalking, or sites for Targeted Individuals. Knowledge is power.

3. You can subtly offer your support to someone who is being unfairly treated, in very small little ways.

4. You can bring up the subject of Gang Stalking or Targeted Individuals.

6. You can subtly suggest that your local newspapers or community papers print articles about Targeted Individuals or even an write an objective piece about Gang Stalking.

How do participants communicate?

Communication happens in a number of ways. When on the street or in cars patrolling, they use baseball or Stasi like signals. Citizen Informants also seem to get verbal ques via cellphone and earphones.

These include things like tapping the side of the nose, corner of the eye, brushing back the hair 3 times, the infamous double blink, etc.

http://gangstalkingworld.com/Media/2010/02/informant-signals/

Here is a list of signals that the former East German Secret Police the Stasi used. http://www.nthposition.com/stasiland.php

SIGNALS FOR OBSERVATION

1. Watch out! Subject is coming – touch nose with hand or handkerchief

2. Subject is moving on, going further, or overtaking – stroke hair with hand, or raise hat briefly

3. Subject standing still – lay one hand against back, or on stomach

4. Observing Agent wishes to terminate observation because cover threatened – bend and retie shoelaces

5. Subject returning – both hands against back, or on stomach

6. Observing Agent wishes to speak with Team Leader or other Observing Agents – take out briefcase or equivalent and examine contents.

Books:

1. GmB Bailey, “Bridging The Gap.”

2. Gloria Naylor. “1996″

3. Kristina Borjesson “Into the Buzzsaw”

4. Jim Redden “Snitch Culture”

5. Noa Davenport “Mobbing: Emotional Abuse in the American WorkPlace”

6. Ward Churchill, Jim Vander Wall “Cointelpro Papers”

7. Anna Funder “Stasiland”

8. Protectors of Privilege: Red Squads and Police Repression in Urban America

9. Victor Santoro “GASLIGHTING How To Drive Your Enemies Crazy “

10. Anthony Brina “Suburban Spies”

11. Stephen Knight “The Brotherhood”

12. Alex Constantine “The Covert War Against Rock”

13. Frank Donner “The Age of surveillance”

14. Niki F. Raapana “2020″

15. Dr. Andrew M. Lobaczewski. Political Ponerology: The science on the Nature of Evil.

16. Community Oriented Policing. A Systemic approach.

Movies:

1. The lives of others. http://www.imdb.com/title/tt0405094/ (A movie about covert investigations in the former East Germany)

2. The Matrix. (Sci-fi Movie.) Neo a target wakes up and realises not only is he being watched without knowing why, but that the world is a lie, that has been created to pull the truth over people’s eyes.

Gang Stalking, Cyber Vigilantes, Mobbing, Cellphone Stalking

Ever since researching the Human Flesh Search Engine people are probably a little confused. What is the difference between something like that and Gang Stalking?

Well I thought that this would be a good time to briefly go over some of the harassment’s that are similar, and what the differences are. If I have forgotten anything forgive me in advance.

Mobbing

-Subtle and Covert. Mobbing has many aspects similar to Gang Stalking. The emotional and psychological abuse that the Targeted Individual suffers is very similar to what targets of workplace mobbing suffer. On this level the mobbing community are our closest relations, and this is why Gang Stalking has also been termed community mobbing by some.

http://gangstalkingworld.com/Media/2006/10/what-is-mobbing/

Mobbing can be understood as the stressor to beat all stressors. It is an impassioned, collective campaign by co-workers to exclude, punish, and humiliate a targeted worker. Initiated most often by a person in a position of power or influence, mobbing is a desperate urge to crush and eliminate the target. The urge travels through the workplace like a virus, infecting one person after another. The target comes to be viewed as absolutely abhorrent, with no redeeming qualities, outside the circle of acceptance and respectability, deserving only of contempt. As the campaign proceeds, a steadily larger range of hostile ploys and communications comes to be seen as legitimate. …

Not infrequently, mobbing spelled the end of the target’s career, marriage, health, and livelihood. From a study of circumstances surrounding suicides in Sweden, Leymann estimated that about twelve percent of people who take their own lives have recently been mobbed at work.”

~ Kenneth Westhues, Professor of Sociology

Mobbing can be ongoing for years, it can cause health problems, and can even cause the targets to become violent, or have emotional breakdowns. Mobbing is hard to prove, and changing jobs might stop the mobbing, but it may not. Mobbing can cause you to be blacklisted from your field of employment.

Cellphone Stalking

-This is an overt form of harassment that involves 24/7 surveillance . The targets cell or cameraphones are used to track and monitor them 24/7.

Emotionally it’s stressing to the targets just like Gang Stalking, but with cellphone stalking and the overt nature of the harassment, targets often have evidence to present to the police. Also the targets could get rid of their phones to stop the harassment.

Human Flesh Search Engine

-This is often overt and swift. In Korea it’s called Cyber Violence, and in America it’s called Cyber Vigilantism.

http://technology.timesonline.co.uk/tol/news/tech_and_web/article4213681.ece#

http://gangstalkingworld.com/Media/category/articles/mobbing-articles/

Human flesh search engines: Chinese vigilantes that hunt victims on the web
A new phenomenon is sweeping China after the quake: digital witch hunts of those who dare to be outspoken or criticise

Ms Wang’s Chinese name, Chinese identification number and contact details in America were tracked down and posted across the internet. She received hate mail and threats that if ever she returned to China, she would be “chopped into 10,000 pieces”. Her parents’ address in China was published and they were forced to go into hiding.

Tibetans have also been targeted. After 44-year-old Lobsang Gendun was photographed protesting at the Olympic torch relay in London, Paris and San Francisco, the human flesh search engine whirred into action.

With huge overseas communities, it took just a couple of hours for Chinese web users to collate the pieces of Mr Gendun’s life – replete with Google satellite map and photos of his American home.

“I suggest assassination,” wrote one poster. “Execution by shooting,” said another. No, no, insisted yet another: “Use China’s most ancient form of execution – dismember him.”

In an unfortunate case of mistaken identity, it turned out there was another exiled Tibetan called Lobsang Gendun living in Utah. Since the targeting of his namesake began, Mr Gendun, a self-proclaimed “Olympic supporter”, has received hundreds of aggressive emails and telephone calls.

http://www.cracked.com/article_17170_8-awesome-cases-internet-vigilantism.html

The speed to which the vigilantes can mount an attack is amazing, not just in China, but in Korea and America as well.

The Snoop Next Door

The digital age allows critics to quickly find a fair amount of information about their targets. One day last November, at about 11:30 a.m., a blog focused on making New York streets more bike-friendly posted the license plate number of an SUV driver who allegedly accelerated from a dead stop to hit a bicycle blocking his way.

At 1:16 p.m., someone posted the registration information for the license plate, including the SUV owner’s name and address. (The editor of the blog thinks the poster got the information from someone who had access to a license-plate look-up service, available to lawyers, private investigators and police.) At 1:31 p.m., another person added the owner’s occupation, his business’s name and his title. Ten minutes later, a user posted a link to an aerial photo of the owner’s house. Within another hour, the posting also included the accused’s picture and email address.

The SUV’s owner, Ian Goldman, the chief executive of Celerant Technology Corp. in the New York City borough of Staten Island, declined to comment for this article. According to an email exchange posted on the blog, Mr. Goldman said that he had lent the vehicle in question to a relative with “an urgent medical situation” and that he was not aware of any incident. The alleged victim has decided to drop the matter since the damage to the bicycle, which he was standing next to at the time, was under $20. Last month, Aaron Naparstek, editor of the blog, says he removed Mr. Goldman’s home and email addresses from the site after receiving a “lawyerly cease and desist” email asking that the whole posting be deleted.

This is in America and I see very little difference to some of the stories that happened in China.

Here is one more from Korea where they call it cyber violence, or online Mobbing.

http://gangstalkingworld.com/Media/2006/09/cyberviolence/

SEOUL Kim Myong Jae’s estranged girlfriend was found dead in her room in Seoul on April 22 last year, six days after she poisoned herself.

Two weeks later, Kim, a 30-year-old accountant, found that he had been transformed into the No. 1 hate figure of South Korea’s Internet community, a victim of a growing problem in a country that boasts the world’s highest rate of broadband use.

First, death threats and vicious text messages flooded his cellphone. Meanwhile, spreading fast through blogs and Web portals were rumors that Kim had jilted his girlfriend after forcing her to abort his baby, that he had assaulted her and her mother, and that his abuse had finally driven her to suicide.

“By the time I found out the source of this outrage, it was too late. My name, address, photographs, telephone numbers were all over the Internet,” Kim said. “Tens of thousands of people were busy sharing my identity and discussing how to punish me. My name was the most-searched phrase at portals.” News reports and portals confirmed that his name was at the top of such lists.

The next time someone tells you that people would not waste the time in harassing others, or stalking others, just smile knowingly and point to these articles.

Gaslighting

-This is often covert and done over a period of time, and the goal is to drive the person crazy, or to freak them out, or give them a breakdown.

http://en.wikipedia.org/wiki/Gaslighting

Gaslighting is a form of intimidation or psychological abuse in which false information is presented to the victim, making them doubt their own memory and perception. The classic example of gaslighting is to change things in a person’s environment without their knowledge, and to explain that they “must be imagining things” when they challenge these changes. Popular usage of the term can be traced to at least the late 1970s.[1]

The term derives from the 1938 stage play Gas Light, in which a wife’s concerns about the dimming of her house’s gas lights are dismissed by her husband as the work of her imagination, when he has actually caused the lights to dim. His action is part of a wider pattern of deception in which the husband manipulates small elements of his wife’s environment, and insists that she is mistaken or misremembering, hoping to drive her to insanity.

Use in real life

An example of gaslighting being used in real life was by the Manson Family during their “creepy crawler” burglaries during which nothing was stolen, but furniture in the house was rearranged[2].

http://www.amazon.com/Gaslighting-Drive-Your-Enemies-Crazy/dp/1559501138

Apparently this is an ongoing storyline. However if you want to see a really good storyline look up Drucilla being Gaslighted, also from the same soap opera, but from a few years ago. That was so well done, that the character ended up in a mental ward. It was a wonderful example of Gaslighting. I have not seen the Ashley storyline yet.

Gang Stalking

-Covert and ongoing. On an emotional and psychological level this is very similar to mobbing.

http://www.amazon.com/Bridging-Gap-Gmb-Bailey/dp/1441448845

Bridging The Gap is a disturbing, yet poignant look into modern day democratic surveillance societies. The book examines how this structure is used to discredit, disenfranchise, and destroy innocent citizens. Gang Stalking, The Buzzsaw, Cointelpro, what do these words mean and more importantly what do they have in common? They are names that have been used to describe the systemic apparatus that reaches out to destroy and discredit those declared enemy by the state. This book will open your eyes to how the informant system has taken over these democratic countries, and how they are being used to further create a surveillance society where no one will be out of reach, should they too become persona non grata by the system.

I would say it’s a tie between stasi Germany and what happened under Cointelpro, however Stasi Germany probably most mirrors what is happening now.

-ACLU Investigations

http://blog.aclu.org/2009/04/30/mass-con-fusion/

Mass Con-Fusion

You mean to tell me that it is legal for corporations from the private sector to team up with local law enforcement officials in efforts to spy on innocent members of our society? You also mean to tell me that the synthesis of law enforcement authority and the drive of for-profit companies operate under little to no guidelines or restrictions and it is unclear to whom they are responsible to?

Cointelpro

http://en.wikipedia.org/wiki/COINTELPRO

COINTELPRO (an acronym for Counter Intelligence Program) was a series of covert, and often illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at investigating and disrupting dissident political organizations within the United States. The FBI used covert operations from its inception, however formal COINTELPRO operations took place between 1956 and 1971.[2] The FBI’s stated motivation at the time was “protecting national security, preventing violence, and maintaining the existing social and political order

-Stasi

http://en.wikipedia.org/wiki/Stasi

The Ministry for State Security, (German: Ministerium für Staatssicherheit, commonly known as the Stasi [ˈʃtazi] (abbreviation German: Staatssicherheit, literally State Security), was the official secret police of East Germany. The MfS was headquartered in East Berlin, with an extensive complex in Berlin-Lichtenberg and several smaller facilities throughout the city. It was widely regarded as one of the most effective and repressive intelligence and secret police agencies in the world. The MfS motto was “Schild und Schwert der Partei” (Shield and Sword of the Party), showing its connections to the Socialist Unity Party of Germany (SED), the equivalent to the Communist Party of the Soviet Union.

Cults

The bigger picture is that the structure functions like a cult does.
In how it keeps the members in line, how they obey and how they punish and try to destroy those outside the cult and those who would leave the cult.

This is just a very quick and brief introduction to this subject matter. To learn more, I suggest doing your own research and reading up on the subject matter.

Gang Stalking Techniques

Techniques

Gang Stalking Techniques

The following techniques are several types that are often used against Targeted Individuals. There are other techniques used, but these are some of the primary ones.

A Psychiatric Reprisal
This was used in Russia to have dissidents listed as mentally ill. This practice is now being used against workers in America and other democratic countries.

“Across the United States, companies have seized upon concerns about workplace violence to quash dissent. Hundreds of large corporations have hired psychiatrists and psychologists as consultants to advise them on how to weed out “threatening” employees. They say they are only responding to a 1970 directive from the U.S. Occupational Safety and Health Administration that they maintain a “safe and secure work environment.” But by drawing the definition of “threatening” as broadly as possible, they are giving themselves a new club to bang over the heads of workers. “

A Violent Person Registry
Some targets might find that they are being targeted because they have been placed on a Violent Person Registry. This means that they will have a flag that comes up anywhere they go listing them as violent or potentially violent. This can happen to anyone, for simple reasons and without your knowledge. This can go on for years. Please read Jane Clift’s Story.

Many countries have similar lists. In Canada and the U.S. this type of listing falls under Occupational Safety and Health.

Air Stalking
This is when helicopters are used to track targets that are on foot, or in cars. They fly over head and follow the targets from one location to the next. Some will monitor the targets shortly after they leave their homes.

Brighting
As targets walk on the street, usually at night, civilian spies/snitches will turn on their high beams. This might be flashed once or twice at targets.
This might be used to let targets know they are being watched, however these signals might also be a way for Informants in cars at night, to communicate with their fellow counterparts.
The foot patrols will then communicate back to the Informant in the car, using a combination of hand signals.

Cell Phone Stalking
Using a targets cellphone to track and monitor them. The microphone and video cameras on cellphones can be used to monitor targets. Even when the phone is off, the microphone can be used to listen into conversation. The camera can be used to view activity in the room. Cellphones can also be used in conjunction with several Internet programs to locate the Targeted Individuals within a few feet.

Crowding/Mobbing
When the target is in public, civilian spies/snitches will usually try to box the target in. Eg. They will surround the target in a square like formation if possible. They will stand too close to the target, or swarm them.

Directed Conversations
These are conversations that complete strangers will have out in public relating to the target and their personal situations. Eg. They will repeat things a target said in their home, or on the phone. They will let drop very personal details into the conversation, that could only be related to the target.

Eg. Civilian Spy #1. It’s a shame Uncle Ed won’t be able to come.

Civilian Spy #2. Yeah since he died golfing on Saturday.

The target will just have learned of a death of a favored uncle, (possibly named Ed.) while out golfing.

Electronic Harassment
Electromagnetic weapons and frequencies will be used on a target on their homes. The purpose of using the EMF (Electromagnetic Frequency) on targets and their belonging are multifaceted. Electronic frequencies can destroy electronic equipment.

Electronic frequencies can be used for monitoring and tracking inside the home, and at work. It can also be used for purposes of sleep disturbance. When those conducting these covert investigations feel that they have psychologically destroyed the target to where they are near breakdown they will start to use these weapons. They will also use these weapons if targets are not going along with their harassment protocol.

Visit

http://www.eharassment.ca

http://www.stopcovertwar.com/dew.html

Emotional Sapping
This is similar to the concept of an energy or psychic vampire. You know negative people who drain your energy when you are around them, or who are really good at transferring their negativity onto you. As a target you are being exposed to dozens of people on a daily basis, many of them who do not wish you well, or want to hurt you even though they don’t know you.

Without realising it you are also being emotionally, mentally, and spiritually harmed on a daily basis. After time this can get to you and weaken your defences. This is when you might notice that you are more susceptible to this form of energy drain. It’s a very real phenomenon and one to be on the look out for. Once you are drained of energy this way, you will notice that it’s easier for these people to access your life and cause you harm in other ways. There are emotional shielding techniques that can be used to help try to prevent this. There are also lot’s of books being written about these types of negative energy draining people.

Entrapment
To lure into dangerous, difficult, or a compromising situations. The Civilian Spies/Snitches will try to lure targets into various situations for the sole purpose of setting them up. Setting up targets could involve getting them arrested, institutionalised, set up on fake sexual harassment charges, drug charges, illegal pornographic materials, etc. Once this happens, it put’s targets at risk for entrapment into becoming civilian spies themselves.

Fake Credibility Reports
Fake Credibility Reports. It’s the opinion of Gang Stalking World, that fake credibility reports are being used to subtly discredit and attack legitimate websites, including the Gang Stalking World website. Under the guise of doing good for the community.

What’s interesting about the fake credibility reports are which sites get targeted and which sites do not.

To find out more, please visit this thread. http://gangstalking.wordpress.com/2009/04/10/credibility-reviews-and-terms

Files
It has been indicated that targets will have files shown to relatives, store keepers and friends. The files are usually not left behind, but they are used to show legitimacy and to further slander targets. These files can be used to engender the corporation of friends and associates of the targets.

The files might have a picture of the target, and information about some alleged crime that they might be under investigation for. The information is usually very convincing and helps to further get targets harassed by those around them.

Gaslighting

  • Doing little things to try to make the target think that they are going crazy.
  • Coming into their homes, moving their furniture around.
  • Changing clothing that they bought and replacing it with similar, but inferior items.
  • Taking small items and then replacing them later on.

    Gassing/Poisoning
    Spraying fumes or scents into a targets home. Tampering with their food to make them become very ill.

    Heat and Vibrations
    Sometimes targets experience vibrations and heat in the home. There can be many sources. I have been advised that informants use many objects. Radar guns, lasers, etc. However one of the most likely causes of the vibrations in the home might be transducers.

    “And perps can purchase transducers of the type used in industrial sonic baths and mechanically fix them with screws to floor joists or wall studs underneath repaired drywall, completely hidden from view of normal inspection. The transducers will make your floors vibrate and probably create heat. They spend a lot of time hiding their stuff in houses or apartments so it won’t be found under simple visual inspection. If somebody really decides to start looking they *will* start finding these things. These tactics are part of the never ending “smoke and mirrors” routine. Apparently the perps get a “charge” out of inducing false perceptions.”

    Illegal Entry

  • To gaslight the target.
  • It’s used to help profile the target.
  • To set up illegal surveillance.
  • It’s a way to find out intimate details about the targets. This can be used later to set up the target by using people in photo albums, or by directed conversations about things in the targets apartment.

    Illegal Surveillance
    This involves setting up audio and some visual surveillance of the target.

  • Bugging the targets phone.
  • Surveillance in the targets residence
  • Listening to cell phone and hard line conversations.
  • Hacking into their computers and learning all about what the target is doing, sites they frequent.
  • This also helps to build a profile of the target, and it’s also used for later psychological attacks against the target.

    Illuminating Targets
    This is something that the East German Statsi secret police did to targets. They would spray the targets clothing with materials that would make them glow, or they would irradiate the targets with X-ray machines so that targets would start to glow in the dark, making it easier to follow them. Some targets have reported extreme visibility at night. It’s hard to believe countries outside of East Germany would use such a practice, but it’s a possiblity that should not be over looked.

    Illuminating Targets

    This is one possibility that targets can examine.

    Intimate Infiltration
    This is where civilian spies/snitches will go out of their way to get into a targets life. They will try to form friendships with targets. They will try to form intimate relationships with targets.

    They will get close to people that are affiliated with targets. Years before the target ever realises they are targets they will try to get into a targets life.

    Eg. If they can’t get into your life, but you have a best friend, their new significant other might just be a civilian spy/snitch. The same goes for siblings and the people that enter their lives.

    Isolation
    For this harassment to be successful, it’s important to be able to isolate the target from friends, family members, co-workers and even spouses. To accomplish this isolation many methods are used included, but not limited to: slander, lies, fake files, sabotage, anything that will get the target into a situation where they have no support system. This is important for them to succeed.

    Laser Microphones
    Laser microphones are microphones with a laser beam. They detect vibrations with a laser and convert it to a digital signal. Lasers are usually bounced off a window, or off any object near to the conversation monitored. Any object which can resonate/vibrate (for example, a picture on a wall) will do so in response to the pressure waves created by noises present in a room. The minute differences in the distance travelled by the light to pick up this resonance is detected interferometrically. Light that is subject to the varying distance is mixed with light that travels a constant distance. The interferometer converts the variations in distance to intensity variations and electronics are used to convert these variations to digital signals that can be interpreted as sound.

    This technology can be used to secretly eavesdrop on people with minimal chance of exposure. However, specialized light sensors may be used to detect the light from the beam. It was designed by Ethal Hussenburn in the 1970s during the Cold War. During the making the technology was advanced by the NSA and CIA making it smaller and compact. The Shelby laser Microphone was then invented (Soruce Wikepedia)

    Mail and Email tampering
    civilian spies/snitches will steal your mail. They will delay the delivery of your mail, and they will also make sure that your mail does not arrive. The other thing they are known for is the tampering of email. They will delay email, delete email, and stop email that you have sent from arriving

    Mimicking
    This is trying to copy things in a targets life.

  • Leaving when they do.
  • Dressing like they dress.
  • Throwing out the garbage
  • Going to the bathroom
  • Doing whatever the target is doing.

    This is all designed to be psychological warfare, so that the target again feels like they are under observation at all times.

    Noise Disturbance
    This will include anything from doors slamming above you and below you. Garbage disposal doors, car doors, loud stereos, stomping, moaning at specific times, loud coughing, pots slamming, water running, cupboard doors being slammed, fridge motor running all night, power tools, etc.

    Profiling
    Targets will be observed and profiled long before they ever become aware that they are targeted for this sort of harassment. Profiles will be created on targets by:

  • Following them.
  • Following people close to them.
  • Breaking into their homes and going through their stuff.
  • Listening to their calls.
  • Hacking into their computers.
  • Gathering information from friends, and family.
  • Seeing where they like to shop and eat.
  • What are their weaknesses?
  • What things do they like and dislike?
  • What are their weaknesses?
  • What things do they like and dislike?
  • What can you bribe them with?
  • What can you blackmail them with?
  • How can you bully them?
  • How can they best be controlled?

    This will all be used to put together a profile of the target and then to get them into situations for their detriment.

    Random Encounters
    This will be people on the street who you randomly and unexpectedly run into. It looks completely natural and it seems to be a random encounter.

    They might ask for your phone number after engaging you in conversation. Ask you out, or just ask you where you are going. Anything from small talk to lengthier conversations.

    All with the purpose of finding out something about you, or even just getting you to do something.

    Ruined Relationships
    When targets are in a relationship, the civilian spies/snitches will try to ruin that relationship. This could be friendships, family or significant others.

    If it’s a romantic relationship, they will find out what your significant other likes and try to get them to cheat, or leave you.

    If it’s a friendship they will tell lies to come between you. The same goes for family. This is done so that targets will have no means of support, once they do realise that something is going wrong in their lives.

    Sensitization
    This is getting targets sensitive to an everyday stimuli. Eg. Colors, patterns or everyday actions. Eg. Red, stripes, pens, whistles, loud coughing, clapping, waves, keys jingling.

    Eg. Joe will be mobbed at work and as part of that daily mobbing his coworkers will loudly cough at him every time they harass him by calling him names like loser, worthless, lame, demented. They will slander him and have others as they are slandering him show disgust by glaring and coughing at him.

    Out in public they will follow him loudly and obnoxiously coughing at him. When he goes to stores they will get others to do the same. After months or years of this, Joe has become sensitive to this stimuli and it can be used to harass him without the names and the glaring looks. The association has been formed because of all the other harassment.

    Eg. A girl is sexually assaulted and a sock is shoved in her mouth , during the assault. To keep her quite or stop her from pressing charges, the assailant, his friends and family will follow her around and throw socks in her path, mention it everywhere she goes and show her their socks every chance they get. She will get the message they are sending. Because of the brutal attack, she and what’s happened after she is now sensitised.

    Sensors
    These are used around the home or the apartment of a target to let others know the location or room that the target is in. These can also be used on auto pilot. Eg. When a target trips a sensor it can turn on a silent alarm or even the sound of running water. This effect can be used when targets are in the bathroom to let them think that their movements are being watched and observed.

    Signals/Symbols
    civilian spies/snitches will also communicate with each other on the street by using Statsi like signals. Below are some examples. SIGNALS FOR OBSERVATION

    1. Watch out! Subject is coming – touch nose with hand or handkerchief
    2. Subject is moving on, going further, or overtaking – stroke hair with hand, or raise hat briefly
    3. Subject standing still – lay one hand against back, or on stomach
    4. Observing Agent wishes to terminate observation because cover threatened – bend and retie shoelaces
    5. Subject returning – both hands against back, or on stomach
    6. Observing Agent wishes to speak with Team Leader or other Observing Agents – take out briefcase or equivalent and examine contents.

    Slander
    They will go behind the targets back and tell lies about them. Often the lies will consist of the target being into something illegal, or is someone dangerous, or just needs to be watched for some vague reason.

    Eg. The they will say the target is a prostitute, drug dealer, crazy, terrorist, gay, racist, pedophile, etc.

    Sleep Deprivation
    Depriving the target of sleep is a really good way of leaving the target stressed out. It’s also a way of leaving them disoriented and functioning at less than 100%. Then the targets can be baited into reacting in public, or getting into a car accident.

    Strange Encounters or Street Theatre
    This is running into people that are acting very unusual, or people that are putting on a show or production, known as street theater.

    Eg. This could be as minor as public rudeness, or people acting out a skit or skits for your benefit. There will usually be someone near by to see how you react to it. This is again looking for weakness or reactions. If you show an adverse reaction they will try to embellish on this and use it against you later on.

    Telephone Redirects
    When you make a telephone call, get the name and ID of the person that you are speaking to. Covert Investigations have redirected phone calls. This means that when you dial a number they will intercept that phone call and pretend to be the service or repair person you were trying to call. Eg. If you call the cable company, gas or phone company be sure you know that it’s actually them that you are speaking to.

    Theft
    Breaking into a targets home and taking small items, usually nothing of value. However there are exceptions to every rule. Perps will usually try to see what they can get away with.

    Tracking
    The targets are tracked by various methods.

  • Targets are tracked on foot by foot soldiers.
  • They are tracked in their cars.
  • Targets can be tracked by using their cell phones, laptops, and other electronic devices. If their cell phone number is know, there are Internet programs that will track a target to within a few feet.
  • GPS tracking on their cars. These are all ways that targets are tracked where they go and their activities monitored.

    Vandalism
    If the target owns property this can be as simple as broken door handles, knobs, to actual slashing of tires. They will also break in and do small damage to items the target owns. Eg. If you buy a new sweater, they might break in and cut holes in it. Holes in undergarments.

    If you go to a store to get a repair done check for damages. This goes for boots, and coats. Eg. Zippers and the heals of long heeled boots.

    Voice2skull
    Also known as V2K. If you are hearing voices you might not be crazy. Eg. You can be in the room with someone else and be hearing voices and they will hear nothing.

    There is a commercial version which can perform this task.

    http://www.usatoday.com/tech/news/techinnovations/2003-05-19-hss_x.htm

    What targets have reported is however more advanced than this and can go directly through walls. What has been reported by targets is technology that can bypass the ears and send sound signals directly to the brain.

    Wrong Number Calls
    Targets will daily get wrong number calls. These can be automated or they can be persons pretending to be wrong number calls. Civilian spies will use this as a means to monitor and psychologically harass targets. They want to know where the target is at all times.