Thehiddenevil\’s Weblog


43.

Virtual Government: CIA Mind Control Operations in America, Alex Constantine

The objective is to isolate the bothersome informant, depict him as incompetent, disloyal, troublesome, mentally unbalanced or ill. The whistle-blower is forced out, frightening workmates and supporters. The assault continues until the target is left discredited, exhausted, in poor health, financially crippled, his career in ruins.

Activists/Dissidents

Corporations in various countries are currently using professional harassment groups on people that oppose them.(329)

Civil rights activists have a history of being targeted by these programs. If your views are not aligned with the corporate/state entity, & you are effectively raising awareness about an issue, you may very likely become the target of this type of terrorism. Anyone who opposes Globalization may be targeted.

War at Home-Covert war against U.S. activists & what we can do about it, Brian Glick

The records show that the vast majority of the targets of domestic covert action have engaged only in peaceful protest. They do no harm to anyone s health or safely. The only danger they pose is to the status quo. Their only weapon is the power of their words & the threat of their good example.

The Justice Department claimed that the original Cointelpro was needed to defend national security & prevent terrorism. (10) However, it ended up subverting democracy & promoting violence & terrorism. If you protest at an event, you could be considered a terrorist under the US Patriot Act. Under the JTTF there is currently a nation-wide effort with local & federal law enforcement to report information regarding demonstrations. Cointelpro is back. But it is much, much worse, now with one in 24 Americans being recruited as informants, an unlimited budget, & a loosening of laws that prevented it in the first place.

The New Cointelpro is now legal. According to ACLU executive director Anthony Romero, who viewed a confidential FBI memorandum, even peaceful protesters are now being labeled as potential “terrorists.”(367) Think about what this means.

Experimentation

Some known behavioral modification projects include BLUEBIRD, MKDELTA & MKULTRA. MKULTRA, with 149 sub-projects, was conducted in universities, hospitals, military institutions, & prisons. Some tests included the effects of stress on human beings, including duress, fatigue, torture, drugs, creation of mutations, & a variety of other tests.

Under MKULTRA about 23,000 people were traumatized, but researchers in this are see this as an extremely conservative number.(23) Since many of the records have been destroyed we will probably never know. Most of these people were unwillingly & unknowingly experimented on in these institutions, & their lives were basically ruined.

Some of these tests were conducted on children.

These people will think nothing of sacrificing innocent members of the population & experimenting on people, then covering up their crimes claiming reasons of national security. After studying the history of some of these agencies & learning the facts, it became clear to me that these acts were carried out by monsters misusing their resources & committing crimes against humanity.

The paper trail for these experiments ended around 1984.(23) But there are currently thousands of citizens being experimented on at this time. Labs are apparently no longer necessary as Directed Energy Weapons can be used at a distance. Targeted people are declined assistance by organizations that have been set up to help victims of torture & mind-control. They are routinely labeled mentally ill to discredit them.

Several mind-control survivors have written books. One MKULTRA survivor named Cathy O Brien wrote a book with Mark Phillips (former CIA operative) called, Access Denied: For Reasons of National Security. It is a well

Advertisements

42.

Why is it used?

The organizers have successfully desensitized communities & convinced them that it is OK to violate the civil rights of certain people. This was probably originally done using sex offenders & other undesirables. This may have started out as a system with positive intentions, however, due to lack of ethical oversight it has become heavily corrupted. This is now basically a parallel justice system & a revenge service that can be used for silent neutralization. There is a list or database that people are added to who are deemed expendable. It appears that there are several ways a person can be added to this list. I ve listed some later in this section.

Virtual Government: CIA Mind Control Operations in America, Alex Constantine

The United States of America has not openly declared war on private citizens. But illicit human experimentation and vicious non-lethal radio frequency assaults have been carried out by agencies within a number of federal institutions for 50 years.

I knew federal law enforcement & the intelligence community had their problems, like most institutions do. I had also heard scattered stories of people being harassed by government agencies but I attributed it to their own fault. I figured they must have been some serious troublemakers in order to provoke it. I thought the occasional media leaks were pretty much all there was to it. I trusted that the watch-dog media kept those agencies in line & were perhaps even a little intrusive (preventing these agencies from doing their jobs). I believed that these agencies would never spend resources to target innocent people, especially a nobody. I thought that these agencies had better things to do than to waste resources targeting innocent citizens. I was wrong. I never realized that those media leaks were just the tip of the iceberg or how big & organized this corruption was.

Then I began to learn about the organized human slavery rings, optimum/heroin trafficking (The Golden Triangle)

MKULTRA, & current mind-control operations.(100, 29, 23) And Operation Northwoods.(389)

I realized there was a whole community of targeted people screaming out to be heard, but stonewalled by the media & human rights organizations. These human rights organizations have received many complaints about Organized Vigilante Stalking, but as of the time of this writing they have not acknowledged this phenomenon. I can only conclude they have been given stand-down orders, no doubt for reasons of national security.

the women who are singled out appear to be somewhat too independent, perhaps too intelligent.. tend to live alone, tend to pursue professional careers. There s a heavy predominance of those types of woman in the TI community. Men are in a smaller proportion & seem to be those who have a sense of self-esteem & pride that seems to [invite] targeting.

-The Investigative Journal interviews Julianne McKinney, April 19th, 2006, Subject: Directed Energy Weapons & Gang Stalking

Revenge

Cause Stalking groups are available as for-hire revenge packages.(7) This revenge package is available to any person who has the connections & capitol to finance it. There are some very sick, sadistic people with influence in government & industry who can use this system if they think you ve done them wrong. This is the equivalent of putting a hit on someone. If this is the reason a person is targeted, he may never know it.

Whistleblowers

If you complained about working conditions or ethics of a corporation, you may be targeted. The U.S. postal service & other federal agencies use professional harassment services to harass people, literally to death.(20) This harassment includes psychological warfare & DEWs. If you do a key word search on yahoo using phrases such as, ” Harassed FBI Whistleblower,” you’ll find websites of former members of federal law enforcement, indicating that they are also targeted by the agencies they once served.

41.

service to Globalization. Individually, some tactics may not be illegal or very potent, but when combined with other tactics in a systematic round-the-clock fashion, day in, & day out, they are a painful & difficult to prove form of torture.

Torture (tôr cher), n., v., 1. the act of inflicting excruciating pain, as punishment or revenge, as a means of getting a confession or information, or for sheer cruelty. 2. a method of inflicting such pain. 3. Often, the pain or suffering caused or undergone. 4. extreme anguish of body or mind; agony 7. to afflict with severe pain of body or mind.

Webster s 1997 edition

34.

Messages-The Communication Skills Book, Matthew McKay, Ph.D., Martha Davis, PhD., Patrick Fanning

It s hard to defend against the anger & disapproval expressed in negative metamessages The attack is often so subtle that you aren t aware of exactly how you ve been hurt The basic function of metamessages is to say something covertly that you re afraid to say directly. Since metamessage attack is covert, there is little chance of overt retaliation.

These subtle whispering sneer attacks, & verbal barbs attacks may work best when done repeatedly, & after a person been loosened up with a more overt type of harassment such as noise campaigns, collisions, crowding, & sensitivity tactics. Within a conversation, certain weighted words can be emphasized. Volume, tone & tempo can be changed so that some words are slightly louder & spoken longer than the others. This can completely change the meaning of a message.

The following is a quotation regarding imbedded questions & suggestions as outlined in the book, Patterns Of The Hypnotic Techniques Of Milton H. Erickson, M.D., by NLP experts Richard Bandler & John Grinder. The example at the bottom titled Indirect Imbedded Command is exactly as it appears on page 173, where the weighted words (suggestions) that are to be emphasized when spoken are bolded. Note: When Erickson speaks of the dominant & nondominant hemisphere, he is referring to the conscious & unconscious mind respectively.

Patterns of Hypnotic Techniques of Milton H. Erickson, M.D. Richard Bandler & John Grinder

“They very often are a presupposition of some other command and serve to distract the dominant hemisphere by having it utilize the internal dialog These imbedded questions are most effective when they are stacked together to maximally distract the dominant hemisphere.

Imbedded commands serve the purpose of making suggestions to the client indirectly and, thereby, making it difficult to resist in any way…

These are most effective when they are also marked analogically by emphasizing the command and by looking intently at the listener, if their eyes are open.”

“Indirect Imbedded Command: “My friends tell me to feel comfortable and to loosen up when we are out on the town.””(4)

Below is an example of how groups use these suggestions to harass people. Bolded words indicate ones that are emphasized.

Situation:

You ve been blitzed with noise campaigns, crowding & collisions on your way to the bus stop. You feel like you ve been through a minefield & have been hit multiple times (you have). Your heart is pumping. You sit down on the bus  begin to relax. A couple sits down across from you & begin a conversation. You overhear bits & pieces of it.

Person 1: His car isn t working.

You: You think, My car is in the shop.

Person 1: They think it s the battery.

You: What a coincidence, my car is getting a new battery, you say to yourself.

Now that they have your attention, the conversation unfolds like this

Person 1: I saw him last week, his car looks bad.

Person 2: That s HORRIBLE What s wrong with it?Person 1: It just keeps

breaking down.

Person 2: I don t want to be in that car in case it should just flip out!

Person 1: That s insane!

Person 2: I hate to see him like that.

Person 1: He s crazy for keeping it. He knows it just keeps breaking down.Person 2: I know

he is. It just broke down so many times

Person 1: Not to be paranoid, but he should just give up on it.Person 2: You re not

being paranoid, but I don’t trust that thing on the highway.

Person 1: Is that crazy or what, is that being insane?

Person 2: he s nuts for keeping it. I told him he s crazy.

Posted in Cointelpro,Control,email,gang-stalking,gangstalking,Gaslighting by thehiddenevil on August 26, 2007

30.

degree, & impede the groups’ progress. These people may also help with misdirecting events, or generally keeping groups disorganized & ineffective, under the illusion that progress is being been made.

These informants/perpetrators will give you correct information, & you may not find out until later that they’re trying to traumatize you as well. You may not be able to make other group members aware of it, as these informants may be well-respected members. It seems like a contradiction. Why would a perpetrator give you valuable information?

While I don’t know the exact answer to this question, here are some possibilities: 1.They know you would have eventually found the information anyway, so this trade-off is worth appearing genuine & gaining your trust, which may be exploited at a later date.

2.Create fear & uncertainty within you, causing you to doubt your own judgment.

3.This may further traumatize a person with feelings of hopelessness when they learn that a very well respected group member is harassing him/her.

If you think that the people who oversee these neutralization programs have not infiltrated these groups, or even deliberately created some as a catch-net in order to disrupt & minimize progress, you are probably mistaken. The people who designed this system were not incompetent & some of these support groups seem to be just another phase of the campaign. If you find yourself on the receiving end of repeated covert or overt criticism by one or more of these prominent victims, you can give yourself a great big pat on the back. This one of many layers in this system of control that you’ll encounter.

Also, some people who may have been genuinely trying to raise awareness, may have been bribed, blackmailed or simply tortured (Directed Energy Weapons) into becoming informants, & therefore, have been compromised. Some of the most outspoken victims & leaders in these groups appear to be deliberately operating within boundaries designed to slow progress. And, as in most social systems, there is envy, fear & jealously. If you choose to participate in one of these support groups, you may want to limit your exposure to certain people. However, although these groups are fraught with perpetrators, not all of them are. So you may still want to attend meetings & events as it will be a good opportunity to connect with other people. You will find many people who are very decent & you may even make somenew friends. Trust your own judgment.

I have been in contact with perpetrators posing as victims on the phone & via email that have hinted that I must not be genuine. It is likely that these fake victims have probably spread lies to targeted individuals indicating that I’m not really targeted since I don’t appear to be suffering or helpless. If you are raising awareness, then discrediting attempts such as these will be standard practice. It appears to be critical that they attempt to isolate you from group members who you may have a positive influence on. Once again, organizations were heavily infiltrated during Cointelpro & jacketing was used extensively.(10)

Electronics

In addition, many targets report their computer has crashed or been broken repeatedly, even after OS reinstalls. It is possible that the E-bomb or a similar energy weapon is being used to destroy this equipment.(309, 310) Your email may be blocked or filtered & your web activity may be monitored with Carnivore, DCS1000, or similar tracking software.(308) If you try to sell things online, participate in online discussions groups, online dating, respond to employment Ads, it is very possible you will be interrupted, trashed, or harassed. This can be done by a combination of paid civilian contractors (operatives/provocateurs) & email filtering. Some people have reported that their inbox is clogged with junk messages even if they have filters on.

In addition, you may receive unsolicited messages with cryptic borderline-subliminal attacks in their subject lines. The words will be garbled but contain letters that convey a message when arranged in the correct order. Or they may contain a sounds like message. Your mind will automatically piece these letters together so they make sense.(1)

This is done on the fly, without you being aware of it.

29.

Noise campaigns All targets of Organized Stalking are quite familiar with noise campaigns. Basically, there will be a steady stream of noise consisting of a rotation of various types of disturbances around your house. This noise may even follow you wherever you go. This includes car doors slamming, people coming/going, people yelling, car alarms, horns, tires screeching, banging, engines revving, cars beeping, constant construction, lawn mowers, snow blowers, etc.(7, 101, 200) Your neighbors will probably be bribed with free home repairs that will result in a very noisy construction process.(7) An ongoing noise campaign appears to be most effective. Like the collisions & cut-offs, these noises are done to startle you & keep you uncomfortable.

For instance, there will be doors slamming for a few moments, then a motorcycle will drive by & rev its engine outside of your house. After that you ll have someone mowing the lawn. Then there will be alarms going off. After that you ll hear a loud crowd of people walk by your house. You may then hear fire or ambulance sirens. Then there are hammering & sawing sounds. Then you ll hear car alarms being turned on/off in succession multiple times from multiple vehicles around your house. After that it will switch back to car alarms & horns. Then drilling, & doors slamming.

Often, activity such as noise will be synchronized with you coming, going or doing some other type of activity.(7) For instance you may hear ambulance, fire engine sirens or beeps as you leave. Noises made as you leave also appear to serve as a form of communication to alert group members in the area to begin pursuit.

Terrorist Stalking in America, David Lawson

Group members will drive by the target s residence honking their horns, squealing their tires & making whatever other noise they can… you might see a work crew working on a certain floor and making a lot of noise. If you look to see what they have done after they have left, you will see that they haven’t done anything.

Chronic exposure to even low-level noise is considered a hazard that has been known to produce adverse physiological & psychological health effects.(314, 316, 317) Prolonged expose to noise can produce high blood pressure, a rise in cholesterol, damage to the circulatory, cardiovascular, gastrointestinal, & musculoskelatal systems.(315, 26)

If you re targeted & pregnant or plan on having a baby, you may want to think twice. Noise has been known to cause hearing loss & growth disturbances in a fetus, & can lead to birth defects.(318, 319) Just as the fabricated cut-offs are likened to getting slapped, these noises are the equivalent of being repeatedly shocked. There is no question that these low-intensity neutralization tactics are acts of extreme violence.

Online

People

Online harassment appears to be another part of the harassment package. If you have a website devoted to Organized Stalking you may have people emailing you to flame you, or claiming that they are victims & asking for support with the intention of discrediting you. You may receive unsolicited email that parallels a current event in your life.

Again, surveillance is used primarily for harassment. Or you may receive covert insults & threats. If you join a support group, you may also receive harassment via threads posted on message boards. Like other mediums of harassment, the topics of these threads may be about events that are unfolding in your personal life, as well as threats or insults covertly directed at you. This will probably happen repeatedly by the same person or people.

They may also employ some Gaslighting, or Jacketing tactics. Jacketing was often used during Cointelpro to make genuine activists look like informants.(10) Some internet groups which help stalking victims are heavily populated with perpetrators posing as victims.(7) Some of these perpetrators seem to be very vocal & popular members of these support groups. It seems that this a damage-control mechanism put in place to corral people, manage them to some

28.

invading my personal space. There was no special equipment that they were using located in that area. I noticed one had a shirt on that said something like, The MOST important part of playing rugby is support.

Anyone who can t wait a few minutes for you to finish & needs to stick their arms in your face is doing it on purpose.

In addition, the exercise they were doing could have been done anywhere else a gym that was almost empty. It was a dead giveaway. Another student arrived & began lingering in an area to my left. He stared at me for a few seconds & started smirking. Once he had my attention he turned his back to me so I could see his shirt which read, CHASE. In smaller letters underneath was the word, Manhattan. These attacks using symbolism are common reports among people who are targeted. They are also consistent with borderline-subliminal attacks used by Satanic cults.(100) The kid with the CHASE shirt left shortly after, & his total stay was about 10 minutes. That episode is an example of noise, crowding, symbolic attacks, & sensitivity tactics. This is standard procedure.

Synchronization

Synchronization seems to be very prevalent with Organized Stalking.(7) Groups will try to synchronize their tactics with things that you do such as entering or leaving your house. You re movements will be synchronized with noise, vehicles coming or going, people coming or going, or other movements. These synchronization tactics are often times done several times, perhaps three or more. For instance, when you arrive, two cars will drive down your street & someone will be banging a hammer. Or you may have two cars leave & one arrive. Three or more seems to be the magic number when it comes to synchronization. You may also hear ambulance or fire truck sirens the moment you enter or leave your house.

If you have a habit of going to the bathroom early in the morning around 2AM & looking out your bathroom window at a specific area, then they will eventually arrange it so that when you do this there is some activity such as a light being switched on or someone leaving or arriving in that area. This is an example of the level of detail that they will resort to when tailoring the harassment protocol to your profile.

Convoys of vehicles

If you’re targeted, you may have foot & vehicular traffic “re-routed” through your street. You’ll have an unnatural amount of vehicles driving by your house (even if you’re on a side or dead-end street) &/or following you while your out. Common practice is for vehicles to drive by screeching their tires, blowing their horns, playing loud music, revving their engines, & yelling as they drive by your house. This can include fire trucks, ambulances, city/utility vehicles, & postal vehicles.(7) Some targets have even mentioned that local police vehicles have participated in the harassment.

Brighting

A classic KKK tactic. Vehicular brighting seems to be strategically used with corners. For instance, you ‘re walking down a quiet street late at night & you have people repeatedly turn onto or off of connecting streets. Their timing is such that they continually turn the corners while you just happen to be at it. This effectively blinds you. This may happen at each & every corner. Or, as you walk down a side street there is one or more cars parked on the side, facing your direction with the lights on. They will also wait for you to approach them & then pull out into the street, thereby brighting you as you walk by.

You may also be followed by convoys of vehicles that have their Hi-beams on during the day.(7) These Brighting tactics are maximized when a vehicle has one headlight grossly misaligned. The misalignment produces a Hi-Beaming effect. Like other Organized Stalking tactics, frequency & duration play an important role here. Spot lights being shined into a target s windows is another tactic.

27.

you make it conscious. If you make some of these unconscious communication behaviors conscious, you will probably have powerful means of persuasion. The study of this language has been called Social Kinesics (the study of body communication).

There are two components to this communication:

1. Movements, gestures, postures

2. Spatial relationships

The study of communication using distance/space is called Proxemics.

For most North Americans the intimate zone is 0-18 & personal space 1 ½ -4 ft.

This type of communication is used to harass a person. For instance, while in stores, restaurants & public places that are not busy, a target will have people crowding around them, invading their personal space. This happens even if there are only two customers in a store. If a person makes a move from one place to another in a store several people may suddenly appear & jump out in front of him from around corners & isles. A common experience reported is the sudden movement of a crowd of people into a checkout line that a target is moving toward.(7) These blitz attacks also happen outside. This can be detected by getting up, moving in one direction, then stopping & watching.

If you’re targeted, you’ll see a wave of people move in the direction that you were headed toward, to swarm you & cut you off. If you wait for a few moments you’ll see that activity will settle back to normal again after they pass. This test can be run indoors & outdoors as well. Sometimes they may blatantly adjust their timing, or linger for a while until you begin to move again, then they’ll continue. This program was tailored to represent a target as someone suffering from schizophrenia when explained to health professionals. This is no surprise, the intelligence community has worked extensively with the psychiatric industry.

Prolonged crowding can have an extremely negative effect on your mental/emotional health.(320-323) The people who designed this harassment program were well aware this. While some cultures may be more immune to crowding than others, even people from parts of the world that have been historically crowded react stressfully to crowding. People who have not been invited into your intimate space but deliberately violate it are committing acts of violence. The people that participate may justify their behavior because they serve a “greater cause” & don’t see their behavior as acts of violence. But the culmination of these tactics amount to no less than soul murder.

People of the Lie: The Hope for Healing Human Evil, Psychiatrist M. Scott Peck

When I say that evil has to do with killing, I do not mean to restrict myself to corporal murder. Evil is also that which kills spirit.

If you are an Organized Stalking target you ll be followed on foot & swarmed anywhere you go out in public.(7, 101)

Even on days/times that there are normally not many people. This happens in stores while making purchases, restaurants, businesses, where you have people constantly cutting you off, invading your space, using sensitivity programs, or other harassment tactics. Sometimes this is blatantly obvious. For instance, your in a fitness center at a time when it is not crowded, but you have multiple people who, instead of taking the shortest path to their destination, continue to go double or triple the distance just so they can brush by you, cut you off, etc. These collisions & crowdings amount to an obstacle course that follows you wherever you go. And this is only a part of the harassment.

Here is one personal example that took place at a YMCA in Boston, which occurred shortly after I realized I was being Gang Stalked. At the time, there were four people, including myself in the weight room. After I was there for a few moments I noticed there was an unusual amount weight banging. It was louder & more repetitive that it normally is.

I ve been exercising & going to health clubs for about 15 years & I immediately recognized that these few people were repeatedly going out of their way to make as much noise as possible. I sat down on a bench & started doing dumbbell presses. Two students walked in, stood on either side of the bench I was sitting at & began to do lateral arm raises,

26.

A lot of this began with early experimentation on military bases where the spouses of military personnel & their children where targeted. It s really just terrible. And of course your economic or your financial state is destroyed. They absolutely make people loose all their jobs; it s impossible for them to ever work again. -Leuren Moret, president, Scientists for Indigenous People, former City of Berkeley Environmental Commissioner CFRO 102.7 FM August 8th 2005, Topic- Electromagnetic Weapons: The Technology of Political Control

Collisions & Cut-offs

The cut-offs I m talking about here are usually not physical. They re fabricated, but like most Gang Stalking tactics they are designed to look like normal cut-offs that we all experience from time to time. They can happen with vehicles, on foot, or a combination. This type of space invasion is designed to startle you & create tension. It can be thought of as a virtual slap. They are used in blind areas such as corners, hallways, restrooms, or intersections where you constantly have people or cars cutting you off, or almost hitting you. The perpetrator is unseen until he jumps out in front of you. This happens in stores, buildings & on the street, with people & vehicles. Generally, anywhere there is a blind corner.

With some artificially induced cut-offs, the perpetrator is seen at a distance. You & the perpetrator(s) are heading toward the same focal point. It may be a corner, a very small walkway, or a path that cannot accommodate both of you.

They will adjust their timing & rhythm to yours so that they always meet you at that point, so that you will have to squeeze through, stop, or go around because of their deliberate adjustment of timing. The idea is to get your attention & make you uncomfortable. If you re a target, their timing will mirror yours so that a collision will occur.

For example:

[You re on foot & approaching a corner of an intersection, which you are about to cross. You see a vehicle approaching the street you need to cross. There is plenty of time & distance to avoid this collision. Anticipating this, you either speed up or slow down. The vehicle mirrors your actions. You start to think that maybe this person is occupied with something else & you begin to cross the street. As you step off the curb, the vehicle speeds up & meets you at the intersection. The vehicle stops ten feet from you & the man inside waves you on. After this you might fee slightly angry because you know the whole event could have been avoided.]

In a normal situation, both parties will naturally adjust their timing & rhythm to avoid this situation. The main objective is to cause an unnecessary inconvenience. Again, these are usually not physical collisions, they re designed to invade your space & make you unconformable. In addition, people have reported staged accidents with their cars & narrowly escaping death.(101, 200)

Frequency, duration, location & proximity. Early in the morning on a day that is not crowded, it is not normal to have people repeatedly cutting you off inside stores with their shopping carts, or jumping in front of you as you enter a checkout line, or out in the street. These collisions amount to an obstacle course that follows you wherever you go.

And this is only a part of the harassment.

Blocking, Swarming & Space invasion

In parking lots, on foot, on the road, in stores & restaurants. These are staged events that may temporarily prevent you from leaving if you re in a parking lot.(7) You will always have people who you have to go around, or say excuse me to, & people stopping short in front of you to tie their shoe or pick up a coin.

Terrorist Stalking in America, David Lawson

Staged events would included blockading a target s vehicle so he cannot get out of a parking lot. Staged events are used to prove the superiority of the group & they (sic) control the target s time.

Body language is more accurate & reliable than verbal communication.(5) A majority of these non-verbal behaviors such as mirroring, echoing, & pointing take place without conscious awareness.(5, 6) We point with our feet, our torso, our arms & hands, usually toward an object we’re interested in. Also, our eyes have a natural tendency to follow hand movement toward an object being pointed at. Most of this non-verbal communication is unconscious, that is, unless

25.

Once I had three separate recruiters from the same company in Burlington, MA ask the same basic questions, on three separate occasions. This was done repeatedly using accusing & mocking tones. For instance, during one conversation I was asked why I didn t have a reference from my former manager. This man asked me basically this same question multiple times. Recognizing that this may have been part of a Mobbing skit, I made it abundantly clear that I did not have a reference from my former place of employment, but that I had other professional references. He then hung up.

Later, this man called me back asking other questions in an accusing tone, & making negative accusations, such as What have you been doing, Haven t you been looking for work, We re a little concerned, Haven t you done anything at all since December? During the phone interviews he asked me if I had a reference from my former manager. This was done repeatedly, more than several times. I told him I didn t. Then he said he wanted to know the name of my former manager, just out of curiosity. I gave him the name, & he told me in a semi-threatening tone that he was going to call anyway. My conversations with the two other recruiters from this office in Burlington, MA were similar. Once more, these questions are asked repeatedly using accusing & mocking tones. These are classic Mobbing games. Some of these people have apparently just accepted the idea that they’re slave-cowards. Fortunately for them, all they need to do is look in the next cubicle for support. If this type of support were to be verbalized, it would go something like this, “You’re a loser, & I’m a loser, & it’s OK. I accept you as a coward, & you do the same for me.

And don’t worry, we’ll be protected in exchange for our obedience.”

Coward (kou’erd), n 1. a person who shows shameful lack of courage or fortitude. -adj. 2. of, pertaining to, or characteristic of a coward.

-Webster’s 1997 Edition

During an interview you may have potential employers demanding credentials that they did not list as a requirement in their AD. During phone interviews you may have employers telling you that you responded to an AD other than the one that you actually responded to. They may also tell you that they did not place the AD, or that they placed a slightly different one. They may also tell you that your updated resume says you re currently working at a place that you never worked at, or a place you worked at a decade ago.

Some harassment is masked in layers of accommodation to help strengthen the illusion that you re not working because you don t choose to. For instance, you may have recruiters who have harassed you in the past leave messages on your answering machine or with relatives/friends, indicating that there are opportunities available to you. It will be made to look as if you re unemployed due to your choice. This is the equivalent of standing in a crowd of people & stealthily poking a person in the back while others aren t looking. The general public may not realize that the Blacklisting mechanism exists because the institutions that use it operate most major news outlets. Reporters & historians are blacklisted for reporting corruption or historical facts that the government-corporate complex does not want the public to be aware of.(28, 346)

Book Review – Into the Buzzsaw: Leading Journalists Expose the Myth of a Free Press by Kristina Borjesson (Editor), Gore Vidal

(Foreword) http://www.mapcruzin.com- Editorial Reviews-Inside Flap

The buzzsaw is what can rip through you when you try to investigate or expose anything this country’s large institutions be they corporate or government want kept under wraps. Indeed, if members of the general public read this book, or even portions of it, they will be appalled.

Reporters who tattle risk losing their jobs and being blacklisted Writing in riveting, often gut-wrenching detail about their personal experiences with the “buzzsaw”–concerted corporate and/or government efforts to kill their controversial stories and their careers-

If you re Blacklisted & you re being harassed, you will probably not be able to prove it. Like all Mobbing & Organized Stalking tactics, it will be heavily concealed. Unless you know someone who owns a business or can get you in someplace, you will probably be unemployed. At best you may be underemployed. If you do find some type of employment, you may be Mobbed out the door after several weeks.

Next Page »