Thehiddenevil\’s Weblog


23.

Surreptitious break-ins, thefts, sabotage & planting drugs, bugs or other items in people s homes & offices were a staple part of Cointelpro.(10) They may also take items from your car & plant them in your home, & vice versa.(7)

Framings

This can be done over the Internet with Trojan horse viruses. Since they have federal connections, they do have the ability to frame a targeted person for crimes out in public as well using informants.(101, 7) Any weakness a person has can be used in one of these setups. A person may not be aware of some of these set-ups, but they may be added to a case file to assist with the smear campaign. They may try to provoke a confrontation when Mobbing you out in public.

Terrorist Stalking in America, David Lawson

Group members also try to entice the target to assault them, but this is never done without having witnesses present. The criminal conviction of the target, following the testimony of numerous concerned citizens can be followed by a civil lawsuit.

Sabotage & Vandalism

This happens at home & in the workplace. Electronic equipment may constantly be failing. This may be accomplished with the e-bomb or a similar device.(309, 310) Projects you ve worked on the previous day may become broken.

Many times this vandalism is usually just below what you d report to the police. For instance, a small but noticeable portion of your masonry has been chipped off, & a crack has appeared in one of your windows. Again, frequency & duration. This may be restricted to minor vandalism, just to let you know that you re being stalked. However largescale property damage is also done to vehicles, such as slashed tires, broken windows, tampering with break lines, destruction of electrical equipment.

Vandalism & pets being tortured may also be in retaliation for you taking action to expose them. In addition you may have dead animals & litter thrown into your yard. Some targets have reported that their pets die suddenly of mysterious illness. For instance, they come home to find a perfectly healthy animal dead. Others have noticed that their pets have been mutilated.(101)

Mail interference

During the old Cointelpro they would blatantly watch homes, follow cars, & open mail.(10) The idea was to get as much info as possible to aid in the harassment & intimidation. Currently some targets also experience tampering with mail, altering, delaying or disappearing, & email being filtered/blocked.(100, 101) These Cause Stalking groups may use children to steal your mail, or they may enlist the aid of the post office.(7)

Pranks

You may receive pranks by people & recordings.(101) The pranks may pertain to an important event that is unfolding in your personal life. Once again, information gleaned from surveillance is used for harassment. The phone has historically been an excellent harassment tool. It is also used as a synchronization tactic. You may also have people knocking on your door for whatever reason.(7)

Blacklisting

Gang Stalking groups will interfere with every personal & business relationship you have.(7) Since they are statesanctioned they can easily keep you unemployed. Job opportunities will be trashed. They get paid to make sure that you don t. Most targeted people are unemployed. Many would be homeless if it weren t for parents, siblings, or friends. If you re targeted & are lucky enough to still be employed, you may be harassed into leaving by your employer & coworkers.(101) You may have a successful interview & are virtually guaranteed the job, but never hear from the prospective employer, & they don t return your calls to tell you what went wrong.

According to an article in The Christian Science Monitor titled Blacklisted by the bank, Blacklisting was originally used as a foreign-policy tool.(391) At some point federal organizations decided to start using it on individuals as well.

22.

to assist federal law enforcement, or the intelligence community with Gang Stalking campaigns. My point is to illustrate the mind-set of some groups of people who have reason to believe a person is a pedophile. The PJ group is run by Xavier Von Erck (real name Phillip John Eide).

Upon visiting a site called Corrupted-Justice http://www.corrupted-justice.com, I discovered that members of Perverted-Justice have endured trauma such as incest or other forms of sexual abuse & are suffering from a variety of mental illnesses. The Corrupted-Justice site obtained this information from member profiles which are publicly available, & located at the Perverted-Justice website. And according to CJ, Eide is on record saying that more than 40% of his followers have endured this type of sexual abuse.

The CJ site also has some very interesting message board chats (publicly available) by PJ members that are worth a look. Apparently the CJ people have documented proof that members of PJ have hacked into the their web server. The CJ people are for the full prosecution of potential sex offenders by using law enforcement equipped with the checks & balances built into the legal system. The CJ group basically says that although the PJ system appears to be beneficial, it is heavily corrupted.

Most PJ busts do not include law enforcement. According to the article in the Toronto Star & the CJ website, the volunteers at PJ instead begin a relentless campaign to expose people they believe are pedophiles by calling friends, neighbors, children, places of employment & ruining personal & professional relationships.(388) PJ is listed as a potential destructive group by the Rick A. Ross Institute For The Study of Destructive Cults, http://www.Rickross.com.

It appears that some PJ members have a psychological need to feel powerful & meet that need by displaying to the public & their targeted person how they can destroy a life. I believe that some of these volunteers are ill & have latent sadistic intentions despite their patriotic motives. Apparently some of them receive a sick type of enjoyment/empowerment by ruining the lives of people. Both sites are worth a look at http://www.perverted-justice.com & http://www.corrupted-justice.com.

Character assassination is standard & group members may call to inform the police that a target is performing something illegal such as drinking & driving.(7) This type of community service is known as Rat Fucking. It is the author s belief that group members will also masquerade as concerned citizens & call local officials to register destructive complaints (lies/setups) about a targeted person. Having a person Rat Fucked in this way can be very damaging, especially when the complaints originate from multiple, seemingly unconnected individuals.

Thefts & Break-ins

This happens in & around the home as well as the workplace if the target is fortunate enough to be employed. Thefts may be reduced to small inexpensive items. But some targets have reported jewelry, passports & other important items stolen. Small things such as pens, shoes, & silverware are taken or tampered with so that you will seem delusional if you report this to the police. The logic is that a thief would never break into your home & leave a computer, stereo or other valuables & just steal a toothbrush, or pour out a portion of your milk.

There is usually no sign of forced entry.(101) This is the case even if there is a Hi-Tech security system in place.

Psychological warfare tactics are sometimes employed such as moving bits of furniture or clothing slightly out of place.(100) Items may be stolen & brought back at a later date, & they may move items & place them in a slightly different spot.(7) This is done to let you know that they ve been in your home. These cults are obsessed with all aspects of a targeted person s life. Personal items may be passed around to group members & are apparently symbolic of the control the group has over their target.(7)

Gaslighting tactics may be employed such as filling your gas tank, or substituting items of clothing with ones one size smaller.(9) Targets have reported clothing being ripped, milk, coffee & other items poured out, & small-scale damage.

20.

Investigations The bogus investigation appears to be the platform used to launch the smear campaign & remove a person s support structure. Bogus investigations using a person s friends, family, & employers appear to be a standard part of the Organized Stalking package. This is done to isolate you. Friends, family members or employers may be given a gag order & told that under no circumstances are they to tell you that an investigation is being conducted.

The people who organize these harassment programs will try to assassinate your character.(7, 200) They will carry a case file on you that they will use for character assassination & to gain community support.(7) When recruiting neighbors they will probably show them this case file & indicate that you are the target of an investigation. This case file will contain a combination of half-truths, setups & outright lies. The case file may contain information about a person or people who have complained about you. These are most likely informants (civilians paid or given favors to help frame you). Or they may simply say that you’re under investigation but they can’t disclose why for reasons of national security. The “reasons of national security” blanket has been used by some federal agencies to help frame people for crimes as well as cover up mind-control & torture.(368, 13)

Their informants may be a single person used to help frame you, such as a tagger. Or they may be multiple people, perhaps related to each other. Again, these stalking groups usually have hundreds of local members. During Cointelpro, there were routine setups, & fabricating of evidence used to destroy a person s character or have them imprisoned.(10) They may string together arbitrary pieces of unrelated incidents from your past & arrange them in such a way that it paints an extremely bad picture of you when gaining support of your neighbors, landlord, family & friends. They can recruit stores & restaurants using the same method, & they may even have informants working in these establishments. Remember, one in twenty-four citizens will be called upon to be an informant.

Their case file of you may indicate that you are a probable rapist, pedophile, drug dealer, prostitute, terrorist, or racist, that they are investigating. Or they may tell these people they can’t say why, for reasons of national security.” They’ll be told that they will be doing their country/community a great favor by cooperating. However, labeling someone a pedophile seems to be quite common.

They will set up a base of operation in your neighborhood to conduct surveillance.(7, 101, 200) This will probably be next to your home or apartment. They will sublet, lease, rent property above, below or to the sides of your living space to do this.(7, 11, 200, 101) Money is no object as they have an unlimited budget. Half-truths, setups, & outright lies WILL be used. If you re an Organized Vigilante Stalking target, the investigation is not a means to an end, it is an end unto itself.

Surveillance

Terrorist Stalking in America, David Lawson

Surveillance (sic) on a residence by using triangulation. They watch it from three different positions. Surveillance is conducted 24 hours a day, 7 days a week. When a target leaves his residence they will alert the group, either by cell phone or business band radio. Other members, who are patrolling the perimeter will race to the location to begin pursuit. They patrol the area they live in 24×7. When they are riding around in their groups they feel invincible. Following and harassing various targets is part of their daily activities when they are on patrol.

If you re targeted, the group will be watching your home from their bases of operation using triangulation.(7)

Neighbors will be told that they’ll be doing their country a great favor by allowing them to occupy space in their home until the investigation is complete. If neighbors don’t cooperate, they may be targeted, or audited by the IRS. During Cointelpro the IRS was used for harassment.(10)

Devices such as radar flashlights & millimeter wave devices, like the ones used at airports may be used. The Life Assessment Detector System (LADS) developed at Georgia Tech was apparently created to rescue people trapped in rubble, avalanches, or other disasters. It has a range of about 135 feet can & can detect heartbeat & respiration. It can also be configured to track a specific person s movement inside a building.(11)

Tactics

18.

Tactics

As previously mentioned, these groups are nothing new. They are a recycled manifestation of an existing phenomenon.

But there are some important considerations regarding the operations of these groups. They are: purpose/goal, strategy & tactics. The goal remains the same, which is the neutralization of opposition & dissent. However, instead of physical intimidation, the creators of this system have apparently adopted a hands-off strategy, presumably to aid with plausible deniability & to keep these groups operating in secrecy. Also, the tactics within this new strategy have changed, & are now hidden with the use of & DEWs & the borderline-subliminal attacks evident in Mobbing/Gang Stalking. The creators of this system have established a virtually traceless protocol for murder.

There is a basic protocol that they begin with which is consistent in NATO nations. It begins with surveillance so that a persons personality traits can be cataloged. Everything including their religion is factored into it. At a later point, they are singled out for preliminary stages of harassment, which includes Gang Stalking, entry into homes & apartments. This Gang Stalking is apparently used to soften up a targeted person for the eventual assault with Directed Energy Weapons (DEWS). The DEW harassment gradually increases to extreme conditions. This pattern has unfolded consistently.

There is a basic protocol that the perpetrators begin with. But the TI contributes to the modification. Targets are constantly monitored & if a target responds emotionally to a particular trigger, that will be built into the protocol. If the target displays a certain sense of guilt or embarrassment about a subject, that will be built into the protocol. It s an ongoing process.

-The Investigative Journal interviews Julianne McKinney, April 19th, 2006, Subject: Directed Energy Weapons & Gang Stalking

Some of the Gang Stalking tactics used in these programs are borderline-subliminal, which is why they are so difficult to detect, explain & defend against. It is my goal to make the unconscious, conscious. This is a multi-dimensional stalking program. Many of these tactics are a type of mind-control. Please keep in mind that most people are unaware that they re targeted.

Subliminal Mind Control, John J. Williams

Therefore, in most cases, if you are being subjected to a secret & involuntary subliminal experience it is a malevolent, sinister & often dangerous attack against you that you have every right to vigorously oppose & thwart as if you are a POW or someone has broken into your home to rob you of what is rightfully yours. In fact they have broken into your mind & are trying to rob you of your free will. Even in cases where there is actually an intended positive outcome

Rather than using a blunt overt attack against a fully functional person, they usually attack from the inside, & conceal their harassment by using existing events that occurs naturally. However, it is probably statistically impossible for some of these staged events to occur as often as they do. They conceal much of their harassment using what appears to be a simple formula applied to these events. The basic formula is as follows:

1. Frequency-Describes how often an event occurs. It also pertains to the number of acts within a single event.

2. Duration-Pertains to the length of a single event. It also pertains to the non-stop nature of the harassment in general.

3. Intensity-The amplification of the acts such as sound, sight, crowding, etc. within an event.

A theoretical example of a Car Door Slamming event:

One neighbor arrives & two others leave. As they re tending to their vehicles there is the repeated opening & shutting front/back doors & trunks, alarms going off, & beeping from alarms being turned on. These disturbances emanate from areas surrounding your house. This may happen simultaneously, or they may be strung together, one right after the other. Even if a single individual is arriving/leaving, standard practice seems to be multiple slams (trunk, back seat, driver s door). The whole event takes about 5 minutes. This may be synchronized with your activity, such as your

14.

made without your knowledge. The purpose of mobbing is to drive the target individual out of the job force for the rest of their life; the bigger goal is to drive them to the ultimate self-destruction: suicide. The information gathered is used to take your life apart and to attempt to make you look crazy. Your children are harassed, they come home with belongings missing and stories of teachers harassing them…

Young people can also be recruited with Displays of Power. (7) For instance, they ll be told by a group member that a fire engine will pass by with their sirens & lights on at a particular place & time. The youngster will be impressed after witnessing this, & after several of these displays he may become indoctrinated. There are SAVE/WAVE crime prevention programs being implemented where children are given money & gifts for reporting the suspicious activities of classmates & sometimes even parents!(151)

According to talk show host Alex Jones, the school boards in North Carolina repeatedly rejected this program, but the mayor was given a 112k grant (bribery?) to implement it. Jones also says that although these programs appear to be a relationship between two private entities (the schools & Pinkerton security), they can be directly linked to the FBI & the BATF.

Most major restaurant, & retail store chains are aware of the process. Employees, clerks &/or managers of these establishments may participate. This participation includes some of the tactics outlined in the Tactics section of this site such as noise campaigns, collision tactics, sensitivity tactics, poor service, etc. Some of the smaller stores are not yet converted, but are always brought into the harassment if a targeted person frequents that store. These stores & restaurants may not take part in the harassment outside of their establishment, meaning, they are not active cult members, & may only participate as needed within the store.

I have spoken with some managers at stores & restaurants regarding the harassment that I experienced in their establishments. Some said they’d never heard of it, & took my information (flyers, business cards). However, som knew what I was talking about. In fact two store managers told me “We always cooperate during investigations” as I presented my material to them. One clerk in a retail store refused to let me post my flyer but told me twice, “You’re not going to stop this.” He then told me that in some countries “people die” for doing what I was doing. This was not a threat, he wanted to be helpful & was warning me.

Another manager at a shopping center in Boston told me that he had heard of Organized Stalking. As I explained to him how it worked, he shook his head in agreement. He seemed to know exactly what I was talking about. I handed him a business card & told him that I used to live in the area. I also told him that I knew his store participated in harassment. As I said this he did not agree or disagree with me, he was silent. He seemed sad.

Neighbors will also be recruited into these harassment campaigns & one of their houses or apartments will be used as a base of operation.(7)

Terrorist Stalking in America, David Lawson

“In order to establish bases of operation, they will enlist the assistance of neighbors. In many areas, they can do this by intimidation. Those who do not cooperate can be targeted If they are dealing with individuals who do not know them, they can also appeal to their sense of patriotism and they can offer drugs, friendship, home repair, free taxi rides and whatever else they have to. In some cases they may even be able to get a key to the residence from a ‘patriotic’ landlord.”

Most people who participate in Cause Stalking don t seem to care what the true agenda of the group is as they are having fun with their friends, while getting some of their human needs fulfilled.(7) This is appealing to young people (& old) because they need to be endowed with a sense of responsibility.

Group members may not be aware of the activities of other groups that make up the harassment campaign, or what other activities their leaders may be engaged in. For instance, members of a senior citizens organization may harass a target while he s at a park with sensitization, collisions/crowding, or other types of street theater; while members of a

13.

witness people breaking down or fainting in front of them, as a result of being systematically Mobbed out in public.

Once more, there is much we don’t know about these groups.

However, we do know that some of them receive some type of training that is apparently designed to put their conscience aside when harassing targets. When you combine certain desensitizing drills with lies, you can get some people to do things that they normally would not do. These people are basically the unwitting equivalent of the Nazi Brownshirts, but they wear plain-cloths & instead of physical harm, they use psychological violence.

Terrorist Stalking in America, David Lawson

Most group members have only a general idea of the ideology of the group but they don t particularly care. They are having fund with their friends and that fun involves stalking and harassing various targets They believe that they are justified in engaging in these actives because of the higher purpose of the group. Most never know the true purpose of the group.

I don t agree with everything David Lawson has to say about Cause Stalking groups. And although he may not have had an understanding of the entire scope of this system, I do agree with some of the information he has provided. Also, there is a correlation between the groups that participate in Gang Stalking mentioned in the book Terrorist Stalking in America, groups recruited into the community crime-watch programs, & groups that targeted people across the country believe are participating in community-based harassment. This suggests that some community-crime watch programs are being misused.

The community volunteers can be further broken down into smaller groups:

-Religious organizations

-Senior citizen groups

-Restaurants, merchants, retail stores

-Neighbors

-Students in high school or college

-City workers

-Children of parents who participate

-Janitors

-Landlords

-Fire Departments

-Ambulances, utility, & postal vehicles

-Taxis

-Police

-Local ethnic or cultural organizations

Some of these people are from organizations that you think would know better. Leuren Moret, a geoscientist & president of an organization called Scientists for Indigenous People, is currently targeted after becoming a whistleblower at Livermore Lab. She discovered that more than 500 people experienced similar Mobbing at the University of California & had their lives & careers destroyed. She wrote a well-documented report titled, Uncovering The Truth About Depleted Uranium where she explains how her child was even targeted & harassed by schoolteachers.

Here she refers to Gang Stalking as Mobbing.

Uncovering the Truth About Depleted Uranium, Leuren Moret

Mobbing is the purposeful and strategic institutional gathering of all information about an individual by using any method legal or illegal. Contact for this purpose is made with neighbors, classmates, former partners, family members, former employers, teachers, church members, good friends and even your family tree everything must be known about the support system around you that makes your life possible. The assessment of strategic resources and future income (finances, mobility, cars, insurance, credit cards, bank safety deposit boxes, post offi ce boxes, wills, health records, birthcertifi cates, transcripts and photographs) is

12.

They are basically training members of the community as organized government informants to spy on &monitor their neighbors.(359) Some of these people may be recruited into VIPS, NWP, or other programs under Citizen Corps. These community-policing volunteer programs are all sponsored by the Department of Homeland Security.(107)

According to the FEMA website & news articles, one in 24 Americans will be engaged in spying on citizens.

But what does monitoring really mean? Well traditionally it has meant harassment of some type. This is organized insanity.

TIPS appears to be a bulked-up version of a community-policing program. Even though the TIPS program was officially rejected by congress, it & similar programs are being used aggressively across the nation.(109) These programs have lots of different names, TIPS, VIPS, Weed And Seed, Cat Eyes, Talon, etc. But who is the threat?

According to some of these documents it means criminals & terrorists. However, the definition of a terrorist in section 802 of the US Patriot Act is frighteningly vague. Basically it defines terrorism as any action that endangers human life or that violates state or federal law. Historically, similar programs have been used on political dissent, activists, & whistleblowers. The East German Stasi recruited citizen informants as a requirement for security & proof of their loyalty to the party. It was later discovered that the regime had even recruited informants to spy on their own family members.(391)

US Planning to Recruit One in 24 Americans as Citizen Spies

Monday, 15 July, 2002 Sunday Morning Herald | SMH.com.au, by Ritt Goldstein

The Terrorism Information and Prevention System, or TIPS, means the US will have a higher percentage of citizen informants than the former East Germany through the infamous Stasi secret police. TIPS volunteers are being recruited primarily from among those whose work provides access to homes, businesses or transport systems. Letter carriers, utility employees, truck drivers and train conductors are among those named as targeted recruits. informant reports will enter databases for future reference and/or action. The information will then be broadly available within the department, related agencies and local police forces. The targeted individual will remain unaware of the existence of the report and of its contents.

There are military exercises taking place across the country using a combination of soldiers, civilians & local police.(361, 363) During some of these exercises they have the military conducting searches & interrogations using civilians volunteers.(362) There is footage available that shows children acting as scouts & riding around on their bicycles to help detect houses where potential gun owners live.(151)

We know that during these drills they have role-playing exercises where the soldiers arrest citizen volunteers with plastic handcuffs & seize their firearms. They have these volunteer actors use phrases such as We want food, I m an American, Please don t take my gun, etc.(151) This is probably done in order to desensitize the soldiers, so they wouldn t feel pity or shame for arresting American citizens, seizing their guns & putting them in camps.

Cause Stalking group members receive training on a variety of activities that they are to perform without question.(7)

At this point we don t know where, or for how long their training is. But it is likely that there are similar role-playing exercises to desensitize them, & that they are given canned responses to anticipated remarks such as, Stop harassing me, You were lied to, “Why are you harassing me, etc. It is possible that they also engage in skits where they