Extreme assessments and paranoid conclusions

After giving the New York Times article a little bit more time to settle there are three points that I wanted to review further.

The first was how the article came to use the term extreme communities. I did read over the Vaughan Bell article where a reference is made to such communities.

http://arginine.spc.org/vaughan/Bell_2007_JMH_Preprint.pdf

According to what Dr Bell wrote in the article it was views considered extreme or unacceptable by the mainstream. Using this definition I wondered if things such as the 9/11 truth movement would be an extreme community? Their views are not considered mainstream. I also wondered who else might fall into this list based on Dr Bell’s definition?

Websites that cover conspiracy topics might well meet his definition of extreme communities. Many of the subject matters covered on websites such as http://www.AboveTopSecret.com would fall into this category. They would be a website of mini patches of extreme communities.

Another factor that I thought should be calculated in when defining a community as an extreme community is the obvious, is the community helpful vs harmful? What kind of purpose do they serve? If I go to a website that has what by some is considered an extreme view that encourages me to kill myself, then that should be considered different than going to a website that expounds none traditional views, but steers the website viewer away from inflicting harm to themselves?

There are lot’s of websites that conform to traditional or more traditional mainstream views that in my opinion are probably fairly harmful to some aspects of society, but we turn a blind eye, because it does pass mainstream muster.

The definition as is, in my opinion is fairly broad, and the references to the term were limited except for references to Dr Bell’s work and the New York Times article.

The other point that I am wondering about is who or what now defines what is mainstream or normal? In today’s society we have so many different variables to consider. At one time spending all your time online might have been considered the actions of lonely desperate people. Now with websites such as Facebook, and much of web 2.0 culture, being online is considered normal, and spending many hours online as long as it’s spent socialising is considered a fairly normal and healthy activity.

According to a report from Mediamark Research in a 30 day period 2.5 million adults participated in online dating. I am sure they find this to be completely normal and mainstream, but I am sure there are patches of society that do not agree with this.
http://www.mediamark.com/PDF/Nearly%202.5%20Million%20Adults%20Participated%20in%20Online%20Dating%20in%20Last%2030%20Days.pdf

World of WarCraft reached 11 Million monthly Subscribers. Many of them sane individuals who go online to take part in these roleplaying games. For that community, I am sure they consider themselves normal and mainstream, just by their sheer numbers. I am sure there are still many in society who would not however consider going online to roleplay normal, mainstream or even healthy.

http://www.1up.com/do/newsStory?cId=3170971

Thus what would be considered as abnormal or extreme view offline is often a normal and accepted view online, in many different circles. Eg. 9/11 conspiracy offline, might still be considered anti-government or none traditional, but online they are a fairly regular part of web culture and discussions. When defining mainstream and referencing the Internet, we might have to start finding different ways to do so.

Eg. I just read an article today, that talks about a real life couple getting divorced because he is cheating online with a virtual girlfriend. Traditional definitions are having to be adapted and redefined to accommodate an online culture.

http://ca.news.yahoo.com/s/afp/081114/world/lifestyle_britain_family_divorce_internet_offbeat

A second woman in Japan was arrested because she killed her online husband. She killed his virtual self. That’s right, she did not kill him, or have any intention of killing the real him, but when his online virtual self divorced her, she got even and killed him. She was arrested for hacking into the computer and other things, and now if she is formally charged, she could face up to 5 years in jail.

http://ca.news.yahoo.com/s/capress/081023/koddities/japan_avatar_murder

It is becoming more and more clear that it is the offline world that is having to adapt to the new online realities and not often the other way around. Therefore what we considered traditional and mainstream yesterday for an offline reality, in many ways is being redefined, and it does not seem as if some offline structures are keeping up to date with this reality.

The third point of concern with the New York Times article is that people were being considered paranoid with simple offline assessments. Are these offline assessments adequate for some of the challenges that people are facing in the modern day world to define Targeted Individuals as paranoid?

Recent research has unearth a great deal of information to show that when people are being termed as paranoid, it might not be the case.

Research is showing that there are in fact networks of individuals being hired by the state in various countries to track and spy on average citizens. The spying includes email and phone taps. Being followed around in public by hired Covert Human Intelligence Sources. Having these same Informants move into the houses around the target when possible. Following them around in vehicle and foot patrols, plus many other forms of intrusive surveillance.

http://img.dailymail.co.uk/i/pix/2008/04_02/007graphic1_468x1052.jpg

http://www.dailymail.co.uk/debate/columnists/article-559123/Why-earth-Stasi-state-spying-families.html

http://www.dailymail.co.uk/debate/columnists/article-559123/Why-earth-Stasi-state-spying-families.html

http://www.sundayherald.com/news/heraldnews/display.var.2342364.0.how_local_counay%20cils_use_antiterror_laws_to_spy_on_ordinary_people.php

http://www.aclu.org/pdfs/privacy/fusion_update_20080729.pdf

http://www.youtube.com/watch?v=dLpHitaKk1s

Individuals and Families under these types of surveillance are often not aware, and if they do become aware and go to seek help, they are often written off by the establishment as paranoid, psychotic, or crazy. The modern day reality is that without proper investigations, Freedom Of Information Act requests, and other proper forms of inquiry a true assessment might be impossible to determine. The secondary problem is that many of these investigations are ending up in secret databases, which the public has no access to. F.O.I.A. requests are no longer a sure fire way to determine if an individual is under surveillance.

http://www.dailymail.co.uk/news/article-559130/Why-didnt-just-knock-door-ask-couple-tailed-weeks-council-spies.html
http://www.corbettreport.com/articles/20080214_snitch_state.htm

I think it’s fair and safe to say that before a community is considered extreme many factors should be considered, and the definition itself should factor into consideration what’s considered normal online as well as offline. Assessing if a community or individual is paranoid or psychotic in today’s modern surveillance society should be done with care and caution. It’s been shown time and time again that anti-terror laws are being abused, National Security Letters are being handed out left right and center, with over 30,000 being issued per year, and many groups and individuals are being spied upon and placed on watch lists, unfairly.

http://www.washingtonpost.com/wp-dyn/content/article/2005/11/05/AR2005110501366.html

In a society as the one described above, it is not only normal to have concerns about surveillance, but when there is a suspicion of such, the job of therapists in the future might not be first subscribing the patient to medication, it might be first asking if they have placed a F.O.I.A. request.

Society might even have to make it a mandatory law for psychiatrist to be notified if a person is under surveillance so that they are not falsely labelled, committed or medicated. This does not happen, the culture and society have changed within the last decade, but the methods used for determining paranoia, psychosis, and mental illness, in regards to the belief that one is under surveillance are still fairly antiquated in many cases, and might not pass muster for the realities of a modern day surveillance society.

Advertisements

Areas of study to consider when researching Gang Stalking

In researching Gang Stalking there are many factors to be considered. It’s not a subject matter that should be studied lightly. Also the average psychiatrist if not familiar with some of the other issues that are affecting members of many communities might not be able to make an iron clad assessment without looking at several factors. Here are factors that I think should be considered.

Areas to be aware of when studying Gang Stalking.

Workplace Mobbing.

It’s our nearest and dearest cousin on an emotional and psychological level. The methodology used in workplace mobbing are some of the same that we see happening with Gang Stalking.

http://mobbing-usa.com/

The Snitching system

Websites such as http://www.November.org are doing a really nice job of showing the world the other side of snitching, and it’s true affect on society.

Also Alexandra Natapoff has done some wonderful research into the wider and more impacting issues of the Informant system and how it’s affecting members of some communities. In some areas over 50% or more of ethnic communities had been inducted into becoming police informants. Both men and women.

http://www.youtube.com/watch?v=Mav9tOvmWcQ
http://www.lls.edu/academics/faculty/natapoff-snitching.html

From what I have seen, the numbers are higher than this and it’s no longer limited to the communities focused on in her research.

Community Based Policing

This method of policing is changing how societies think, react and interact. It’s basically turning our communities into societies like what they have in China, had in Russia, or East Germany. There is a U.N. agenda called 2020 that seeks to adapt this model for every country in the world by 2020.

http://www.albionmonitor.com/9711b/policing.html

“Ruling the community with an iron fist. “Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants and federal agencies could form alliances without causing public outcry.” Covert Action Quarterly, summer 1997.”

http://www.newswithviews.com/Raapana/niki4.htm
http://www.newswithviews.com/Raapana/niki2.htm

Crisis Centers

When I tried to follow up on some of the research that “Norma” over at gangstalking.ca had done in conjunction with crisis center I found out that these are some of the places that targets were turning to for help. Before the Gang Stalking websites were available, woman and to a much smaller extent men were calling the crisis centers, more specifically the Rape Crisis Center to get some help, or to find anyone who knew about Gang (Organised) Stalking.

See what some of these psychiatrist do not realise is that before the websites were available, the beliefs were not going away. People were not accepting the false explanation that they were delusional. This was in many cases, too, real, to obvious, and far too life impacting. So when the police failed, doctors, psychiatrists, etc. They were calling the crisis centers.

Online before the Gang Stalking websites, they were visiting Mobbing, Conspiracy, Bullying, and mind control sites. These were the only places that were close to having any information, shared stories, or experiences that might help the target to further understand what they were going through.

Systemic corruption.

Before his death Tim Fields who shed some much needed light on the Bully phenomenon also saw a very obvious pattern of collusion amongst the targets that were seeking help. He started to research it and then passed away before he could get further.

http://www.bullyonline.org/action/obstruct.htm

Tim Fields is not the only person to have noticed this type of systemic corruption when it comes time to finding help for issues of Bullying, Workplace Mobbing, etc but he might have been the one to shed the brightest light on it, had he lived.

http://www.crvawc.ca/documents/WorkplaceHarassmentandViolencereport.pdf

http://www.harassment101.com/Article5.html

Unchecked Surveillance

The unchecked surveillance that is happening to many private citizens all across the globe. We live in a new reality, but the diagnosis is the same. Think you are being followed around? Must be paranoia. Yet had the family in this article gone for help, thinking they were being spied upon, they might well have been diagnosed as paranoid, when in fact their concerns would have been fully warranted.

http://www.dailymail.co.uk/news/article-559130/Why-didnt-just-knock-door-ask-couple-tailed-weeks-council-spies.html?printingPage=true

http://www.dailymail.co.uk/debate/columnists/article-559123/Why-earth-Stasi-state-spying-families.html

This very average, unassuming family were spied upon, 24/7, followed around by (Informants) Covert Human Intelligence Sources, had their play by play activity recorded, all because someone thought they were falsifying the school district that they lived in. This is just a glimpse at what our societies have turned into and how these laws and unchecked surviellances ae being used and abused, to the unchecked power that has been handed out to many branches within society.

Lastly is the concern or question of wither Gang Stalking website help to enhance, or feed a delusion, and can these website prevent someone from seeking help for an illness?

It’s a great question and one that no one can answer definitively. If someone believes that something is wrong and traditional points of reference are not providing answers or a solution, they will clearly look towards other points of healing. This is what was happening with Gang Stalking.

Before the websites were here, the beliefs were still held by individuals. When the websites were not here, people were still desperately seeking help and assistance. They were using outside sources which at times could not always formulate a basis of reference for what they were experiencing, but they were still using those points of references, because it was the best available at the time.

If someone goes to a mobbing website and it confirms a belief that they already have that co-workers are out to get them, then it’s up to the individual how they further choose to use the information. The same is true with someone using the bullying website who believes that there is collusion within the system and that is what is happening to them.

The Gang Stalking websites are here, just like mobbing, bullying, etc and they are providing information, research, and shared experiences for the website visitor that chooses to review and consider the information provided.

Electronic Harassment

Attribution:

http://www.abovetopsecret.com/forum/thread1143/pg1

ultra_phoenix
Newly De-Classified US Electronic Harassment Technologies

January 19, 1998

This page lists articles from technology publications which show how these technologies are being marketed in commercial form, and have also been and are being used to harass covert weapons testing victims:

The reader is asked to remember that ANNOUNCED inventions with potential for “national security” use are ALWAYS already in use covertly when announced. The SR-71 “Blackbird” surveillance aircraft was in use for many years before the public saw it.

This page lists articles from technology publications which show how these technologies are being used to harass covert weapons testing victims, and are now coming out in commercial form, or have been announced to the public:

1. Aviation Week & Space Technology, March 10, 1997 “Radar Warns Birds of Impending Aircraft”

This article by Bruce Nordwall (Washington bureau) describes research being carried on by the USAF Wright Laboratory at Dayton Ohio. The article describes the use of MODULATED radar signals to produce AUDIBLE SOUND within the brains of birds near airport runways to cause them to fly away and avoid collisions with landing aircraft.

Other references on work with animals or humans with “audible microwaves”:

Science, vol. 181, 27 July 73, page 356 Nature, vol. 216, DEC 16 1967, page 1139 Nature, vol. 210, May 7 1966, page 636 Journal Acoustical Society of America, June 1982, page 1321 Bioelectromagnetics conference, 1992, 13:323-328 (pages 323-328)

This list was furnished by the lab at Wright- Patterson Air Force Base where this type of unclassified development is now in progress.

** The transmission via MODULATED microwave pulses carrying voices to selected weapons testing victims has been carried on for more than two decades, as reported by the victims. There has been little published about this phenomenon, and since direct-to-skull voice transmissions are consistently mis-interpreted by psychiatrists as ‘schizophrenia’, getting this information to the public needs concerted attention.

2. Electronic Business Today, February 1997 “Business Trends” section, page 20

Inventor Elwood Norris, and his small company, (American Technology Corp., Poway CA) have designed a market ready device called an “acoustical heterodyne”.

This device sends out two sound signals in the ultrasonic (above-human-hearing) range which, when they impact a surface, which may be a living creature, then and only then produce a sound at a frequency equal to the DIFFERENCE (“heterodyne”) of the two ultrasound frequencies.

** This technology has been used extensively by harassers who follow a walking or driving victim and bounce raucous, unnatural bird calls and other strange sounds off surfaces near the victim. This type of sound is tape recordable.

ATC Corporate Headquarters 13114 Evening Creek Dr. S. San Diego, CA 92128 (800)41-RADIO (417-2346) (619)679-2114 (619)679-0545 FAX atc-info@atcsd.com http:/www.atcsd.com

3. New York Times, April 7, 1997, “Devices May Let Police Find Hidden Guns on Street” article

This article, with photos supplied by Millitech Corporation, describes recently unclassified “millimeter wave” cameras (and some other see- thru technologies less well developed.)

These units operate like camcorders, giving the user a real-time thru-clothing, thru- luggage image for detecting weapons and drugs.

Technology like this does not just pop out of nowhere overnight, and it probably has its roots in the 1960’s classified microwave weapon “renaissance” – about the same time as the U.S. embassy staff in Moscow discovered they were being bathed in Soviet microwave signals.

OEM Magazine, February 1997, page 20 “Electronic Dipstick” article

This article describes “micropower impulse radar” or “MIR” radar, developed at Lawrence Livermore Lab in California, and licensed to several large companies for consumer products. Basically, this radar uses the highest radio frequencies and does not require the supporting hardware like rotary antennas which ‘conventional’ radar does.

Uses include vehicle blind-spot sensors, traffic control sensors, heart muscle response monitors, and ** see thru plaster ** stud finders.

** Thru the wall radar has been covertly used for a number of years on weapons testing victims. One common use has been to detect where the victim is standing or walking in their apartment, and ‘follow’ the victim’s position by rapping floor, walls, or ceiling from an adjacent apt. This is designed to let the victim know he/she is under constant surveillance.

4. Defense Electronics, July 1993, page 17

DOD, INTEL AGENCIES LOOK AT RUSSIAN MIND CONTROL CLAIMS

Federal law enforcement officials considered testing a Russian scientist’s acoustic mind control device on cultist David Koresh a few weeks before the fiery conflagration that killed the Branch Davidian leader and 70 of his followers in Waco, Texas, DEFENSE ELECTRONICS has learned.

In a series of closed meetings beginning March 17 in suburban northern Virginia with Dr. Igor Smirnov of the Moscow Medical Academy, FBI officials were briefed on the Russian’s decade- long research on a computerized acoustic device allegedly capable of implanting thoughts in a person’s mind without that person being aware of the source of the thought.

His account of the meetings was confirmed by Psychotechnologies Corp., a Richmond, Virginia based firm that owns the American rights to the Russian technology.

[Not necessarily unclassified, but at least made known to a limited segment of the public]

5. Dan Rather’s CBS Evening News, Dec. 9, 1997

Police helicopters were the topic, and one of the features soon to be added to police heli- copters was “an electromagnetic ray gun which can stop speeding cars dead.”

While this is primitive technology compared with that used to manipulate the minds and nervous systems of e-weapons victims of the 1990’s, it does demonstrate quite clearly that government is putting substantial re- sources into electromagnetic weapons devel- opment.

6. Canadian version, Discovery Channel, “Invention” segment, Thursday December 25, 1997

During part of the show, it was stated that the current development of polygraphs (lie detectors) using massive computer-aided database comparisons was now a reality and these machines were making substantial progress towards near- perfect accuracy.

The final statement in that segment was: It is expected that the next stage in polygraph devel- opment will be REMOTE MICROWAVE detection of bodily functions, which will mean the polygraph can then be used SECRETLY, at a distance.

7. Associated Press: (Dec. 2, 1997)

TOKYO – Tired of reaching for the remote control every time you surf the channels? Help is on the way – at a price. A Japanese company plans to market a device that changes television channels and activates household appliances at the flicker of a brain wave. The price: roughly 600,000 yen ($4,800). The product, called the Mind Control Tool Operating System, or MCTOS, is the result of a collaboration between the Technos Japan Co. and the Himeji Institute of Technology in southwestern Japan.

Say you want to turn on the air conditioner. Simply focus on that icon on the MCTOS computer display menu while wearing a pair of beta-wave trapping goggles. Then, according to Technos spokesman Sadahiro U#ani, say something like “Ei!!” inside your head. Soon your air conditioner will be pumping cool air into the room.

MCTOS is scheduled to go on sale in April, 1998.

8. On Jan. 19 the Washington Post had an article about a device for remotely detecting heartbeats by detecting the electromagnetic pulses emitted by beating hearts.

URL: www.washingtonpost.com… 1998-01/19/017l-011998-idx.html

An excerpt:

“The pumping of the human heart is controlled by electrical signals, which doctors measure in electrocardiograms. The heart’s activity generates an irregular, ultralow-frequency electric field that extends in a circle around the body.

“The field is faint, but it can pass through almost any physical barrier. The LifeGuard can pick up on the strongest part of the field, the heart, through barriers including concrete walls, heavy foliage and rocks. Company officials say the LifeGuard can detect a person in less than five seconds and can pinpoint his or her location with a high degree of accuracy.”

The company is marketing the device for potentially locating people in need of rescue, or detecting where individuals are located inside a building.

— submitted by: Allen L. Barker www.cs.virginia.edu

Here is more info on this type of device:

69. VSE – Life Assesment Detector System DATE 020597 93% (Nasdaq: VSEC) LIFE ASSESMENT DECTECTOR SYSTEM (LADS) Patent Pending The Life Assessment Detector System (LADS), a microwave Doppler movement measuring device, can detect human body surface motion, including heartbeat and respiration, at ranges up.. www.vsecorp.com… 3296 bytes, 08Feb97 —

9. Nature magazine, Vol 391, January 22, 1998, page 316, “Advances in neuroscience may threaten human rights” by Declan Butler

(PARIS – Pasteur Institute – Speech by Chairman of the French national bioethics committee Jean-Pierre Changeaux)

“But neuroscience also poses potential risks, arguing that advances in cerebral imaging make the scope for invasion of privacy immense.

“Although the equipment needed is still highly spec- ialized, it will become commonplace and capable of being used at a distance, he predicted. That will open the way for abuses such as invasion of personal liberty, control of behaviour, and brainwashing.”

“These are far from being science-fiction concerns, said Changeaux, and constitute a serious risk to society.”

Also in that article:

“Denis LeBihan, a researcher at the French Atomic Energy Commission, told the meeting that the use of imaging techniques has reached the stage where we can almost read people’s thoughts.”

NOTE: These scientists are speaking ONLY about the UNCLASSIFIED scientific arena. Classified technology can always be assumed well ahead of unclassified.
ourworld.cs.com…

Some closing thoughts

Closing

Many people think that stopping Gang Stalking should be as simple as going to the police. However targets who have gone to the police have not received the expected support that we should be able to count on from law enforcement. Some targets have been disbelieved. Some who were believed were still told that there was nothing that could be done. Others have been falsely institutionalised, or asked to have mental health evaluations, because they sought help for one of the most frightening experiences of their lives.

These are some of the primary reasons that targets do not go to the police. They have seen what has happened to other targets who sought help.

Others think that the solution is for targets to simply move, that will fix this. The thing is targets do move, just like myself and it does not stop the harassment. They continually follow and stalk targets wherever they go in order to destroy their lives.

Just like McCarthyism and Cointelpro were destructive to the innocents of that time period that were caught up in it’s snear, Gang stalking is equally destructive to the innocent targets caught up in this time period. In some cases it’s happening in secrecy and this is why we seek to bring public awareness to the issue.

Gang Stalking like other forms of harassment can be stopped, but it takes work and a willingness to stand up to this and say no. People just like in every other time period need to come together and say no, this is not right. They need to oppose what’s happening to others.

What we are calling Gang Stalking might seem new in it’s present form, however it’s becoming increasingly clear that this is simply a modern day form of Cointelpro and McCarthyism, and the techniques used are historic. The method used to stop the above travesties were also historic. Just like the human nature that allows these things to happen, it was the human will that was finally able to conquer and stop these things from happening.

Gang Stalking just like all those other events in history can be changed, but it needs awareness and human opposition to make that a reality. Please do not stand idly by and let this happen once again.

“All that is necessary for the triumph of evil is that good men do nothing.” (Edmund Burke)

“Without the players there can be no game. Don’t play the game.” (GmB)

Gang Stalking and history

Gang Stalking in History

The components that have gone into making up gang stalking have been around for many decades if not hundreds of years. You will find many aspects of this harassment have been used quite successfully in other time periods, and controlled states.

What Gang Stalking does is it takes the successful aspects of those programs and it uses them, plus a couple of new ones to harass and torture individuals to the point of a nervous breakdown, institutionalization, suicide, devastation and ruin. The following are just a few of the components of previous programs used by others that have helped to make up Gang Stalking.

Red Squads

http://en.wikipedia.org/wiki/Red_squad

Red Squads are police intelligence units that specialize in infiltrating, harassing, and gathering intelligence on political and social groups. Dating as far back as the Haymarket Riot in 1886, Red Squads became common in larger cities such as Chicago, New York, and Los Angeles during the First Red Scare of the 1920s. They were set up as specialized units of city police departments, as a weapon against labor unions, communists, anarchists, and other dissidents. In New York, former City Police Commissioner Patrick Murphy traced their origin there to an “Italian Squad” formed in 1904 to monitor a group of Italian immigrants under suspicion[1]. However, it is their association with fighting communism which provides the basis for the name “Red Squad.” They became more commonplace in the 1930s, often conceived of as a countermeasure to Communist organizers who were charged with executing a policy of dual unionism – namely, building a revolutionary movement in parallel with membership in above-ground labor organizations. Similar units were established in Canada in this period, although only the Toronto police used the name.

http://www.albionmonitor.com/9711b/policing.html

Throughout the Cold War, these guardians of political compliance spied on and harassed law-abiding activists who veered too far left of the political center. Dedicated civil rights advocates and others fought back and won on local, state, and federal fronts. But their success was often short-lived. New technologies; new laws; and increased interaction among international, federal, military, state, and local law enforcement, intelligence agencies, and private corporations are threatening not only to put Red Squads back in business nationwide, but to increase the scope of their power to pry, to harm, and to imprison.

Although community policing has not been as successful in curbing street crime as its proponents might have hoped, it has been a public relations success and enjoys the support of many well- intentioned liberals. But heirs to the Red Squads have found it an excellent mechanism as well. Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants, and federal agencies could form alliances without causing public outcry. Riding on fears from the trumped-up missing children campaign of the 1980s to the anti-drug hysteria of the 1990s community policing has been the public face of under-the-radar efforts to create an impenetrable web of surveillance and enforcement.

http://findarticles.com/p/articles/mi_m1132/is_n6_v43/ai_11559671

Police departments recruited both professional and civilian informers. The numbers are unknown, but may well have reached five figures. By the late 1960s there were over two thousand professional and amateur spies in Chicago alone. For regular police officers, undercover work was a rapid route to advancement. Some civilians enlisted for patriotic reasons, others were police groupies who hoped that working with the red squad might get them a job with the force. In Philadelphia policemen’s wives became “pin money” spies. The activities of these informers varied. Some took on single assignments; others, like Chicago veteran Sheli Lulkin, who infiltrated eighty-eight separate organizations, made it a career.

All of these police activities–overt and concealed–were clearly designed to destroy the targeted organizations. In some cities, notably Philadelphia, which experienced a virtual reign of police terror under Frank Rizzo in the late 1960s and early 1970s, the harassment blossomed into a full-scale physical attack on all dissent. Elsewhere, the use of violence was a bit more discriminating: it targeted the Black Panthers. And it was successful. Though Donner does not try to assess the extent to which this repression contributed to the decline of the radical left in the late 1960s and early 1970s, the scope of red squad activism, as well as the self-defeating paranoia that it understandably encouraged within the left, could not but have made a massive contribution to the demise of the movement.

Gaslighting

The term Gaslighting refers to the subtle art of trying to drive your enemies crazy. It done through various subtle psychological attacks over time, that wear down the victim and destroy their perception of their environment and things around them.

 http://en.wikipedia.org/wiki/Gaslighting
It is based on a 1944 movie in which a man tries to use subtle methods to drive his wife crazy.
The term was again used to describe some tactics used by the Manson family. Sometimes when they would break into homes they would just move the furniture about and leave everything else undisturbed.
There is also a 1994 book called. Gaslighting how to drive your enemies crazy. It’s written by Victor Santoro.
In the book he gives various methods on how to drive your enemies crazy. Below are just a few of the suggestions that he makes.

Some of the tactics covered include:

Collecting information on your target
Preparing for a gaslighting attack
Creating tension, anxiety and sleeplessness
Messing with your target’s car, telephone and mail
Gaslighting at your target’s workplace and home
Turning neighbors and co-workers against the target
Covering your tracks
Stasi East German Police

This was an agency set up after the end of the second world war in East Germany. After WWII Germany was divided into the East and the West. The Western half being democratic and the Eastern half being a communist state. It was set up for many reasons, but the primary reason seems to have been for keeping an eye on dissidents, and citizens of the state. At it’s peek the Stasi East German secret police had 300,000 paid spies on it’s pay roll. This was about 1 for every 63 German citizens. This figure does not include occasional informants, when they are tallied into the figure the number per citizen increases significantly.

The Stasi were able to spy on a country of 16 million people by using just 300,000 spies and paid informants. The tactics the Stasi used involved.

Bugging and video taping citizens, dissidents and spies.
Following some 24/7.
Creating profiles on citizens.
They even used radio active chemicals and X-ray machines to make dissidents glow in the dark, so they could follow them better. http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2001/01/04/wstas04.xml
Getting their friends, family, spouses and close acquaintances to spy on them. This included husbands on wives, mothers on sons, brothers on sisters, close friends spied and turned each other.
It created a constant environment of mistrust and anxiety, because people never knew who they could trust. They always knew that at any social gathering or event, there would be a Stasi spy.

http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2002/04/07/wmum07.xml&sSheet=/news/2002/04/07/ixworld.html

The Stasi even spied on the future catholic pope. Years before he ever became pope. Their profiling system was so accurate they were able to predict that he would be appointed to a future position two full years before it happened.

According to the report, Ratzinger was so closely followed that the Stasi was able to predict his being named prefect of the Congregation for the Doctrine of the Faith _ the post he held before being named pope _ two years before it happened in 1981.

http://newsfromrussia.com/world/2005/10/03/64339.html

After the fall of the Berlin Wall the American CIA agency were able to obtain the code names of many of the Stasi spies that worked for the former East German Government and recently they appointed the former head of the Stasi Secret police Marcus Wolf to help with homeland security, and they also hired a former head of the KGB, General Yevgeni Primakov as a consultant for homeland security. The United States wanted to have 1 million spies working for them to keep an eye on their citizens.

http://www.prisonplanet.com/articles/december2004/061204wolfhired.htm

The lives of others

In this 2006 movie set in the former East Germany, an innocent playwrite is targeted by the Stasi because an official has an interest in his girlfriend. The Stasi are asked to spy on him and to try to find out any dirt that they can on him. At the start of the movie the playwrite is a supporter of the state, but throughout the movie and after the loss of one of his friends who has been blacklisted by the state, he turns against the state, and writes statistics on the states suicide rates.

The Stasi agent who is asked to spy on this couple grows increasingly more caught up in the lives of this innocent pair, and goes to lenghts to protect them, as he realises the truth behind this covert investigation, into the lives of others.

http://www.imdb.com/title/tt0405094/

McCarthyism

Joe Mccarthy was a United States senator who decided in the 1950 to go on a campaign against communist forces and influences that might be penatrating the U.S.

In his hunt for communist he ruined several people with good character and implicated many others who had nothing to do with communism. During his time in office, many intellectuals and artist actually left the U.S. to go and live in Europe.

For his witch hunt for communist in the States he had full corporation of the media, churches, teachers, unions, etc. Many good democratic leaders lost their jobs and thousands of others during his campaign against communism. There were many wrong things happened during the years of the McCarthy era including:

Charlie Chaplin the famous comedian being deported from the United States.
Many artists were not given permission to travel. Similar to the no fly list of this time period.
Many people were blacklisted and unable to find jobs.
Trials were set up for those suspected and accused of being communists.
Lawyers, Judges, and Juries who sided with the defendants were threatened and harassed. If they refused to hand down guilty verdicts their jobs were threatened.
Communists were arrested, some charged with plotting to overthrow the government by force and violence, all charges were false, but the hysteria at the time kept the hunt in full gear.
The FBI used illegal practices in its pursuit of information on Communists, including burglaries, opening mail and illegal wiretaps. J. Edgar Hover lead the FBI during this time period.

During trials informants and false witness could always be produced against the defendants.

http://members.tripod.com/~HazelWolf/Hazel_Witchhunt.html http://en.wikipedia.org/wiki/McCarthyism

Cointelpro

The American program set up in the 50’s under J. Edgar Hover. This program was set after he could not go as far as he wanted with his witch hunt for communist. It was set up to investigate and disrupt dissident programs. It was also famous for targeting leaders of those programs. One famous leader this program targeted was Martin Luther King. The leader of the civil rights movement. Under the direction of J. Edgar Hover, they did everything in their power to bring him and his movement to the ground. http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIb.htm

Some of the methods that this program employed on activists and dissidents included:

Disruption of their movement via infiltration of snitches and informants.
Rumour and slander campaigns.
Planting of false media stories with collaborating media companies.
Portraying real dissidents as snitches or informants
False evidence and perjured statements by police to make dissidents look like criminals.
24/7 Surveillance and harassment campaigns.
Use of force against dissidents and their property including, but not limited to, break-ins, vandalism, assaults.
Official terrorism on dissidents, including assassinations.
Mail disruption and tampering.
Psychological Warfare on targets of this program.
http://www.icdc.com/~paulwolf/cointelpro/cointel.htm

http://www.dickshovel.com/coin.html

http://en.wikipedia.org/wiki/COINTELPRO

Gang Stalking has many other similarities to how Blacks were treated by the KKK in the American South and how Jews were treated by Hitler’s Brown coats before and during WWII.

Gang Stalking is pretty new in it’s present form, but the methods and techniques used are historic, just like the human nature that allows these things to happen and the human will that is finally able to conquer and stop these things from happeing.

Gang Stalking just like all those other events in history can be changed, but it needs awareness and human opposition to make that a reality. Please do not stand idly by and let this happen once again.

“All that is necessary for the triumph of evil is that good men do nothing.” (Edmund Burke)

Coping with Gang Stalking

Coping

Covert investigations are about power and control. It’s about suppression and censorship. Squashing dissidence. Overnight the target of these investigations will wake up and litterally find themselves enemies of the state, and the agents of the state. Their lives will be disrupted in unspeakable ways, and their livelyhoods. Many targets are broken to the point where they have very limited means of survival. This makes targets prime for suicide, false instituationalization, arrest, instigated car accidents, other accidents, or just assassination meant to look like an accident.

Being harassed in this way is a psychological battle that many targets are not ready for, and have to be ready for, if they are to survive. Survival also becomes more than just a psychological battle, because their lives are interfared with. These people will try to get them removed from their jobs, so they have no means of income or support. They will try to get them ostracisedin their communities, with former friends and family. It will psychologically, and emotionally feel like the world is against you, and because so many people are taking part in this activity, that assessment will not be too far from the truth.

Survival will become a game of skill, craft, and a lot of luck. Don’t discount prayers. Many of the targeted that I have encountered had a profound faith in God and many seem to be very intellegent people.

Live your life to the best of your ability.
Stay in control. It’s your life and not their life.
Try to meditate and pray as you start your day.
Continue with your normal activities as best as possible.
Try not to loose your temper in public. This is what they want. In public stay as calm and serene as possible.

They have observed you, now it’s your time to observe them. They have limited functions, once you tune into what they are doing, you can out smart them.
Do not interact with them to the best of your ability. They crave the attention and interaction with targets. Try not to give it to them.
If you start to fight back and they increase the attacks at first, that’s normal. Keep at it, be persistent. You will wear them down.
Do research on Gas-lighting, Cointelpro, Stasi secret police, psychopaths, cults, mobbing. Read books, watch movies, learn how they work.
Keep a journal of what’s happening.
Rebuild your social circle. The way this works is by putting you into exile. The thing that you want to do is rebuild a social circle. If you live in a small town, try to find maybe someone in another town, or someone who is not taking part in the gang stalking. This works by cutting of your network, the best defence is to try to build or rebuild a network.
Make people aware of what is happening. This works well in silence. However in small towns this works because too many people are taking part. Go online if you have to, start a blog, call people on the phone. Do an awareness campaign. Get the word out.

Gang Stalking Techniques

Techniques

Gang Stalking Techniques

The following techniques are several types that are often used against Targeted Individuals. There are other techniques used, but these are some of the primary ones.

A Psychiatric Reprisal
This was used in Russia to have dissidents listed as mentally ill. This practice is now being used against workers in America and other democratic countries.

“Across the United States, companies have seized upon concerns about workplace violence to quash dissent. Hundreds of large corporations have hired psychiatrists and psychologists as consultants to advise them on how to weed out “threatening” employees. They say they are only responding to a 1970 directive from the U.S. Occupational Safety and Health Administration that they maintain a “safe and secure work environment.” But by drawing the definition of “threatening” as broadly as possible, they are giving themselves a new club to bang over the heads of workers. “

A Violent Person Registry
Some targets might find that they are being targeted because they have been placed on a Violent Person Registry. This means that they will have a flag that comes up anywhere they go listing them as violent or potentially violent. This can happen to anyone, for simple reasons and without your knowledge. This can go on for years. Please read Jane Clift’s Story.

Many countries have similar lists. In Canada and the U.S. this type of listing falls under Occupational Safety and Health.

Air Stalking
This is when helicopters are used to track targets that are on foot, or in cars. They fly over head and follow the targets from one location to the next. Some will monitor the targets shortly after they leave their homes.

Brighting
As targets walk on the street, usually at night, civilian spies/snitches will turn on their high beams. This might be flashed once or twice at targets.
This might be used to let targets know they are being watched, however these signals might also be a way for Informants in cars at night, to communicate with their fellow counterparts.
The foot patrols will then communicate back to the Informant in the car, using a combination of hand signals.

Cell Phone Stalking
Using a targets cellphone to track and monitor them. The microphone and video cameras on cellphones can be used to monitor targets. Even when the phone is off, the microphone can be used to listen into conversation. The camera can be used to view activity in the room. Cellphones can also be used in conjunction with several Internet programs to locate the Targeted Individuals within a few feet.

Crowding/Mobbing
When the target is in public, civilian spies/snitches will usually try to box the target in. Eg. They will surround the target in a square like formation if possible. They will stand too close to the target, or swarm them.

Directed Conversations
These are conversations that complete strangers will have out in public relating to the target and their personal situations. Eg. They will repeat things a target said in their home, or on the phone. They will let drop very personal details into the conversation, that could only be related to the target.

Eg. Civilian Spy #1. It’s a shame Uncle Ed won’t be able to come.

Civilian Spy #2. Yeah since he died golfing on Saturday.

The target will just have learned of a death of a favored uncle, (possibly named Ed.) while out golfing.

Electronic Harassment
Electromagnetic weapons and frequencies will be used on a target on their homes. The purpose of using the EMF (Electromagnetic Frequency) on targets and their belonging are multifaceted. Electronic frequencies can destroy electronic equipment.

Electronic frequencies can be used for monitoring and tracking inside the home, and at work. It can also be used for purposes of sleep disturbance. When those conducting these covert investigations feel that they have psychologically destroyed the target to where they are near breakdown they will start to use these weapons. They will also use these weapons if targets are not going along with their harassment protocol.

Visit

http://www.eharassment.ca

http://www.stopcovertwar.com/dew.html

Emotional Sapping
This is similar to the concept of an energy or psychic vampire. You know negative people who drain your energy when you are around them, or who are really good at transferring their negativity onto you. As a target you are being exposed to dozens of people on a daily basis, many of them who do not wish you well, or want to hurt you even though they don’t know you.

Without realising it you are also being emotionally, mentally, and spiritually harmed on a daily basis. After time this can get to you and weaken your defences. This is when you might notice that you are more susceptible to this form of energy drain. It’s a very real phenomenon and one to be on the look out for. Once you are drained of energy this way, you will notice that it’s easier for these people to access your life and cause you harm in other ways. There are emotional shielding techniques that can be used to help try to prevent this. There are also lot’s of books being written about these types of negative energy draining people.

Entrapment
To lure into dangerous, difficult, or a compromising situations. The Civilian Spies/Snitches will try to lure targets into various situations for the sole purpose of setting them up. Setting up targets could involve getting them arrested, institutionalised, set up on fake sexual harassment charges, drug charges, illegal pornographic materials, etc. Once this happens, it put’s targets at risk for entrapment into becoming civilian spies themselves.

Fake Credibility Reports
Fake Credibility Reports. It’s the opinion of Gang Stalking World, that fake credibility reports are being used to subtly discredit and attack legitimate websites, including the Gang Stalking World website. Under the guise of doing good for the community.

What’s interesting about the fake credibility reports are which sites get targeted and which sites do not.

To find out more, please visit this thread. http://gangstalking.wordpress.com/2009/04/10/credibility-reviews-and-terms

Files
It has been indicated that targets will have files shown to relatives, store keepers and friends. The files are usually not left behind, but they are used to show legitimacy and to further slander targets. These files can be used to engender the corporation of friends and associates of the targets.

The files might have a picture of the target, and information about some alleged crime that they might be under investigation for. The information is usually very convincing and helps to further get targets harassed by those around them.

Gaslighting

  • Doing little things to try to make the target think that they are going crazy.
  • Coming into their homes, moving their furniture around.
  • Changing clothing that they bought and replacing it with similar, but inferior items.
  • Taking small items and then replacing them later on.

    Gassing/Poisoning
    Spraying fumes or scents into a targets home. Tampering with their food to make them become very ill.

    Heat and Vibrations
    Sometimes targets experience vibrations and heat in the home. There can be many sources. I have been advised that informants use many objects. Radar guns, lasers, etc. However one of the most likely causes of the vibrations in the home might be transducers.

    “And perps can purchase transducers of the type used in industrial sonic baths and mechanically fix them with screws to floor joists or wall studs underneath repaired drywall, completely hidden from view of normal inspection. The transducers will make your floors vibrate and probably create heat. They spend a lot of time hiding their stuff in houses or apartments so it won’t be found under simple visual inspection. If somebody really decides to start looking they *will* start finding these things. These tactics are part of the never ending “smoke and mirrors” routine. Apparently the perps get a “charge” out of inducing false perceptions.”

    Illegal Entry

  • To gaslight the target.
  • It’s used to help profile the target.
  • To set up illegal surveillance.
  • It’s a way to find out intimate details about the targets. This can be used later to set up the target by using people in photo albums, or by directed conversations about things in the targets apartment.

    Illegal Surveillance
    This involves setting up audio and some visual surveillance of the target.

  • Bugging the targets phone.
  • Surveillance in the targets residence
  • Listening to cell phone and hard line conversations.
  • Hacking into their computers and learning all about what the target is doing, sites they frequent.
  • This also helps to build a profile of the target, and it’s also used for later psychological attacks against the target.

    Illuminating Targets
    This is something that the East German Statsi secret police did to targets. They would spray the targets clothing with materials that would make them glow, or they would irradiate the targets with X-ray machines so that targets would start to glow in the dark, making it easier to follow them. Some targets have reported extreme visibility at night. It’s hard to believe countries outside of East Germany would use such a practice, but it’s a possiblity that should not be over looked.

    Illuminating Targets

    This is one possibility that targets can examine.

    Intimate Infiltration
    This is where civilian spies/snitches will go out of their way to get into a targets life. They will try to form friendships with targets. They will try to form intimate relationships with targets.

    They will get close to people that are affiliated with targets. Years before the target ever realises they are targets they will try to get into a targets life.

    Eg. If they can’t get into your life, but you have a best friend, their new significant other might just be a civilian spy/snitch. The same goes for siblings and the people that enter their lives.

    Isolation
    For this harassment to be successful, it’s important to be able to isolate the target from friends, family members, co-workers and even spouses. To accomplish this isolation many methods are used included, but not limited to: slander, lies, fake files, sabotage, anything that will get the target into a situation where they have no support system. This is important for them to succeed.

    Laser Microphones
    Laser microphones are microphones with a laser beam. They detect vibrations with a laser and convert it to a digital signal. Lasers are usually bounced off a window, or off any object near to the conversation monitored. Any object which can resonate/vibrate (for example, a picture on a wall) will do so in response to the pressure waves created by noises present in a room. The minute differences in the distance travelled by the light to pick up this resonance is detected interferometrically. Light that is subject to the varying distance is mixed with light that travels a constant distance. The interferometer converts the variations in distance to intensity variations and electronics are used to convert these variations to digital signals that can be interpreted as sound.

    This technology can be used to secretly eavesdrop on people with minimal chance of exposure. However, specialized light sensors may be used to detect the light from the beam. It was designed by Ethal Hussenburn in the 1970s during the Cold War. During the making the technology was advanced by the NSA and CIA making it smaller and compact. The Shelby laser Microphone was then invented (Soruce Wikepedia)

    Mail and Email tampering
    civilian spies/snitches will steal your mail. They will delay the delivery of your mail, and they will also make sure that your mail does not arrive. The other thing they are known for is the tampering of email. They will delay email, delete email, and stop email that you have sent from arriving

    Mimicking
    This is trying to copy things in a targets life.

  • Leaving when they do.
  • Dressing like they dress.
  • Throwing out the garbage
  • Going to the bathroom
  • Doing whatever the target is doing.

    This is all designed to be psychological warfare, so that the target again feels like they are under observation at all times.

    Noise Disturbance
    This will include anything from doors slamming above you and below you. Garbage disposal doors, car doors, loud stereos, stomping, moaning at specific times, loud coughing, pots slamming, water running, cupboard doors being slammed, fridge motor running all night, power tools, etc.

    Profiling
    Targets will be observed and profiled long before they ever become aware that they are targeted for this sort of harassment. Profiles will be created on targets by:

  • Following them.
  • Following people close to them.
  • Breaking into their homes and going through their stuff.
  • Listening to their calls.
  • Hacking into their computers.
  • Gathering information from friends, and family.
  • Seeing where they like to shop and eat.
  • What are their weaknesses?
  • What things do they like and dislike?
  • What are their weaknesses?
  • What things do they like and dislike?
  • What can you bribe them with?
  • What can you blackmail them with?
  • How can you bully them?
  • How can they best be controlled?

    This will all be used to put together a profile of the target and then to get them into situations for their detriment.

    Random Encounters
    This will be people on the street who you randomly and unexpectedly run into. It looks completely natural and it seems to be a random encounter.

    They might ask for your phone number after engaging you in conversation. Ask you out, or just ask you where you are going. Anything from small talk to lengthier conversations.

    All with the purpose of finding out something about you, or even just getting you to do something.

    Ruined Relationships
    When targets are in a relationship, the civilian spies/snitches will try to ruin that relationship. This could be friendships, family or significant others.

    If it’s a romantic relationship, they will find out what your significant other likes and try to get them to cheat, or leave you.

    If it’s a friendship they will tell lies to come between you. The same goes for family. This is done so that targets will have no means of support, once they do realise that something is going wrong in their lives.

    Sensitization
    This is getting targets sensitive to an everyday stimuli. Eg. Colors, patterns or everyday actions. Eg. Red, stripes, pens, whistles, loud coughing, clapping, waves, keys jingling.

    Eg. Joe will be mobbed at work and as part of that daily mobbing his coworkers will loudly cough at him every time they harass him by calling him names like loser, worthless, lame, demented. They will slander him and have others as they are slandering him show disgust by glaring and coughing at him.

    Out in public they will follow him loudly and obnoxiously coughing at him. When he goes to stores they will get others to do the same. After months or years of this, Joe has become sensitive to this stimuli and it can be used to harass him without the names and the glaring looks. The association has been formed because of all the other harassment.

    Eg. A girl is sexually assaulted and a sock is shoved in her mouth , during the assault. To keep her quite or stop her from pressing charges, the assailant, his friends and family will follow her around and throw socks in her path, mention it everywhere she goes and show her their socks every chance they get. She will get the message they are sending. Because of the brutal attack, she and what’s happened after she is now sensitised.

    Sensors
    These are used around the home or the apartment of a target to let others know the location or room that the target is in. These can also be used on auto pilot. Eg. When a target trips a sensor it can turn on a silent alarm or even the sound of running water. This effect can be used when targets are in the bathroom to let them think that their movements are being watched and observed.

    Signals/Symbols
    civilian spies/snitches will also communicate with each other on the street by using Statsi like signals. Below are some examples. SIGNALS FOR OBSERVATION

    1. Watch out! Subject is coming – touch nose with hand or handkerchief
    2. Subject is moving on, going further, or overtaking – stroke hair with hand, or raise hat briefly
    3. Subject standing still – lay one hand against back, or on stomach
    4. Observing Agent wishes to terminate observation because cover threatened – bend and retie shoelaces
    5. Subject returning – both hands against back, or on stomach
    6. Observing Agent wishes to speak with Team Leader or other Observing Agents – take out briefcase or equivalent and examine contents.

    Slander
    They will go behind the targets back and tell lies about them. Often the lies will consist of the target being into something illegal, or is someone dangerous, or just needs to be watched for some vague reason.

    Eg. The they will say the target is a prostitute, drug dealer, crazy, terrorist, gay, racist, pedophile, etc.

    Sleep Deprivation
    Depriving the target of sleep is a really good way of leaving the target stressed out. It’s also a way of leaving them disoriented and functioning at less than 100%. Then the targets can be baited into reacting in public, or getting into a car accident.

    Strange Encounters or Street Theatre
    This is running into people that are acting very unusual, or people that are putting on a show or production, known as street theater.

    Eg. This could be as minor as public rudeness, or people acting out a skit or skits for your benefit. There will usually be someone near by to see how you react to it. This is again looking for weakness or reactions. If you show an adverse reaction they will try to embellish on this and use it against you later on.

    Telephone Redirects
    When you make a telephone call, get the name and ID of the person that you are speaking to. Covert Investigations have redirected phone calls. This means that when you dial a number they will intercept that phone call and pretend to be the service or repair person you were trying to call. Eg. If you call the cable company, gas or phone company be sure you know that it’s actually them that you are speaking to.

    Theft
    Breaking into a targets home and taking small items, usually nothing of value. However there are exceptions to every rule. Perps will usually try to see what they can get away with.

    Tracking
    The targets are tracked by various methods.

  • Targets are tracked on foot by foot soldiers.
  • They are tracked in their cars.
  • Targets can be tracked by using their cell phones, laptops, and other electronic devices. If their cell phone number is know, there are Internet programs that will track a target to within a few feet.
  • GPS tracking on their cars. These are all ways that targets are tracked where they go and their activities monitored.

    Vandalism
    If the target owns property this can be as simple as broken door handles, knobs, to actual slashing of tires. They will also break in and do small damage to items the target owns. Eg. If you buy a new sweater, they might break in and cut holes in it. Holes in undergarments.

    If you go to a store to get a repair done check for damages. This goes for boots, and coats. Eg. Zippers and the heals of long heeled boots.

    Voice2skull
    Also known as V2K. If you are hearing voices you might not be crazy. Eg. You can be in the room with someone else and be hearing voices and they will hear nothing.

    There is a commercial version which can perform this task.

    http://www.usatoday.com/tech/news/techinnovations/2003-05-19-hss_x.htm

    What targets have reported is however more advanced than this and can go directly through walls. What has been reported by targets is technology that can bypass the ears and send sound signals directly to the brain.

    Wrong Number Calls
    Targets will daily get wrong number calls. These can be automated or they can be persons pretending to be wrong number calls. Civilian spies will use this as a means to monitor and psychologically harass targets. They want to know where the target is at all times.