Thehiddenevil\’s Weblog


43.

Virtual Government: CIA Mind Control Operations in America, Alex Constantine

The objective is to isolate the bothersome informant, depict him as incompetent, disloyal, troublesome, mentally unbalanced or ill. The whistle-blower is forced out, frightening workmates and supporters. The assault continues until the target is left discredited, exhausted, in poor health, financially crippled, his career in ruins.

Activists/Dissidents

Corporations in various countries are currently using professional harassment groups on people that oppose them.(329)

Civil rights activists have a history of being targeted by these programs. If your views are not aligned with the corporate/state entity, & you are effectively raising awareness about an issue, you may very likely become the target of this type of terrorism. Anyone who opposes Globalization may be targeted.

War at Home-Covert war against U.S. activists & what we can do about it, Brian Glick

The records show that the vast majority of the targets of domestic covert action have engaged only in peaceful protest. They do no harm to anyone s health or safely. The only danger they pose is to the status quo. Their only weapon is the power of their words & the threat of their good example.

The Justice Department claimed that the original Cointelpro was needed to defend national security & prevent terrorism. (10) However, it ended up subverting democracy & promoting violence & terrorism. If you protest at an event, you could be considered a terrorist under the US Patriot Act. Under the JTTF there is currently a nation-wide effort with local & federal law enforcement to report information regarding demonstrations. Cointelpro is back. But it is much, much worse, now with one in 24 Americans being recruited as informants, an unlimited budget, & a loosening of laws that prevented it in the first place.

The New Cointelpro is now legal. According to ACLU executive director Anthony Romero, who viewed a confidential FBI memorandum, even peaceful protesters are now being labeled as potential “terrorists.”(367) Think about what this means.

Experimentation

Some known behavioral modification projects include BLUEBIRD, MKDELTA & MKULTRA. MKULTRA, with 149 sub-projects, was conducted in universities, hospitals, military institutions, & prisons. Some tests included the effects of stress on human beings, including duress, fatigue, torture, drugs, creation of mutations, & a variety of other tests.

Under MKULTRA about 23,000 people were traumatized, but researchers in this are see this as an extremely conservative number.(23) Since many of the records have been destroyed we will probably never know. Most of these people were unwillingly & unknowingly experimented on in these institutions, & their lives were basically ruined.

Some of these tests were conducted on children.

These people will think nothing of sacrificing innocent members of the population & experimenting on people, then covering up their crimes claiming reasons of national security. After studying the history of some of these agencies & learning the facts, it became clear to me that these acts were carried out by monsters misusing their resources & committing crimes against humanity.

The paper trail for these experiments ended around 1984.(23) But there are currently thousands of citizens being experimented on at this time. Labs are apparently no longer necessary as Directed Energy Weapons can be used at a distance. Targeted people are declined assistance by organizations that have been set up to help victims of torture & mind-control. They are routinely labeled mentally ill to discredit them.

Several mind-control survivors have written books. One MKULTRA survivor named Cathy O Brien wrote a book with Mark Phillips (former CIA operative) called, Access Denied: For Reasons of National Security. It is a well

23.

Surreptitious break-ins, thefts, sabotage & planting drugs, bugs or other items in people s homes & offices were a staple part of Cointelpro.(10) They may also take items from your car & plant them in your home, & vice versa.(7)

Framings

This can be done over the Internet with Trojan horse viruses. Since they have federal connections, they do have the ability to frame a targeted person for crimes out in public as well using informants.(101, 7) Any weakness a person has can be used in one of these setups. A person may not be aware of some of these set-ups, but they may be added to a case file to assist with the smear campaign. They may try to provoke a confrontation when Mobbing you out in public.

Terrorist Stalking in America, David Lawson

Group members also try to entice the target to assault them, but this is never done without having witnesses present. The criminal conviction of the target, following the testimony of numerous concerned citizens can be followed by a civil lawsuit.

Sabotage & Vandalism

This happens at home & in the workplace. Electronic equipment may constantly be failing. This may be accomplished with the e-bomb or a similar device.(309, 310) Projects you ve worked on the previous day may become broken.

Many times this vandalism is usually just below what you d report to the police. For instance, a small but noticeable portion of your masonry has been chipped off, & a crack has appeared in one of your windows. Again, frequency & duration. This may be restricted to minor vandalism, just to let you know that you re being stalked. However largescale property damage is also done to vehicles, such as slashed tires, broken windows, tampering with break lines, destruction of electrical equipment.

Vandalism & pets being tortured may also be in retaliation for you taking action to expose them. In addition you may have dead animals & litter thrown into your yard. Some targets have reported that their pets die suddenly of mysterious illness. For instance, they come home to find a perfectly healthy animal dead. Others have noticed that their pets have been mutilated.(101)

Mail interference

During the old Cointelpro they would blatantly watch homes, follow cars, & open mail.(10) The idea was to get as much info as possible to aid in the harassment & intimidation. Currently some targets also experience tampering with mail, altering, delaying or disappearing, & email being filtered/blocked.(100, 101) These Cause Stalking groups may use children to steal your mail, or they may enlist the aid of the post office.(7)

Pranks

You may receive pranks by people & recordings.(101) The pranks may pertain to an important event that is unfolding in your personal life. Once again, information gleaned from surveillance is used for harassment. The phone has historically been an excellent harassment tool. It is also used as a synchronization tactic. You may also have people knocking on your door for whatever reason.(7)

Blacklisting

Gang Stalking groups will interfere with every personal & business relationship you have.(7) Since they are statesanctioned they can easily keep you unemployed. Job opportunities will be trashed. They get paid to make sure that you don t. Most targeted people are unemployed. Many would be homeless if it weren t for parents, siblings, or friends. If you re targeted & are lucky enough to still be employed, you may be harassed into leaving by your employer & coworkers.(101) You may have a successful interview & are virtually guaranteed the job, but never hear from the prospective employer, & they don t return your calls to tell you what went wrong.

According to an article in The Christian Science Monitor titled Blacklisted by the bank, Blacklisting was originally used as a foreign-policy tool.(391) At some point federal organizations decided to start using it on individuals as well.

22.

to assist federal law enforcement, or the intelligence community with Gang Stalking campaigns. My point is to illustrate the mind-set of some groups of people who have reason to believe a person is a pedophile. The PJ group is run by Xavier Von Erck (real name Phillip John Eide).

Upon visiting a site called Corrupted-Justice http://www.corrupted-justice.com, I discovered that members of Perverted-Justice have endured trauma such as incest or other forms of sexual abuse & are suffering from a variety of mental illnesses. The Corrupted-Justice site obtained this information from member profiles which are publicly available, & located at the Perverted-Justice website. And according to CJ, Eide is on record saying that more than 40% of his followers have endured this type of sexual abuse.

The CJ site also has some very interesting message board chats (publicly available) by PJ members that are worth a look. Apparently the CJ people have documented proof that members of PJ have hacked into the their web server. The CJ people are for the full prosecution of potential sex offenders by using law enforcement equipped with the checks & balances built into the legal system. The CJ group basically says that although the PJ system appears to be beneficial, it is heavily corrupted.

Most PJ busts do not include law enforcement. According to the article in the Toronto Star & the CJ website, the volunteers at PJ instead begin a relentless campaign to expose people they believe are pedophiles by calling friends, neighbors, children, places of employment & ruining personal & professional relationships.(388) PJ is listed as a potential destructive group by the Rick A. Ross Institute For The Study of Destructive Cults, http://www.Rickross.com.

It appears that some PJ members have a psychological need to feel powerful & meet that need by displaying to the public & their targeted person how they can destroy a life. I believe that some of these volunteers are ill & have latent sadistic intentions despite their patriotic motives. Apparently some of them receive a sick type of enjoyment/empowerment by ruining the lives of people. Both sites are worth a look at http://www.perverted-justice.com & http://www.corrupted-justice.com.

Character assassination is standard & group members may call to inform the police that a target is performing something illegal such as drinking & driving.(7) This type of community service is known as Rat Fucking. It is the author s belief that group members will also masquerade as concerned citizens & call local officials to register destructive complaints (lies/setups) about a targeted person. Having a person Rat Fucked in this way can be very damaging, especially when the complaints originate from multiple, seemingly unconnected individuals.

Thefts & Break-ins

This happens in & around the home as well as the workplace if the target is fortunate enough to be employed. Thefts may be reduced to small inexpensive items. But some targets have reported jewelry, passports & other important items stolen. Small things such as pens, shoes, & silverware are taken or tampered with so that you will seem delusional if you report this to the police. The logic is that a thief would never break into your home & leave a computer, stereo or other valuables & just steal a toothbrush, or pour out a portion of your milk.

There is usually no sign of forced entry.(101) This is the case even if there is a Hi-Tech security system in place.

Psychological warfare tactics are sometimes employed such as moving bits of furniture or clothing slightly out of place.(100) Items may be stolen & brought back at a later date, & they may move items & place them in a slightly different spot.(7) This is done to let you know that they ve been in your home. These cults are obsessed with all aspects of a targeted person s life. Personal items may be passed around to group members & are apparently symbolic of the control the group has over their target.(7)

Gaslighting tactics may be employed such as filling your gas tank, or substituting items of clothing with ones one size smaller.(9) Targets have reported clothing being ripped, milk, coffee & other items poured out, & small-scale damage.

21.

SoldierVision A1, a radar flashlight, has a standoff distance of 30 feet & can detect motion behind a wall at 30 feet as well. These flashlights have been steadily researched using military & university testing labs since the 1990s.

Raytheon is working on a Through The Wall (TTW) technology that will allow the device to wirelessly transmit output to a laptop up to 300 feet away.(354) Some of these flashlights display images in 3D format, can detect respiration, & can see through, wood, brick, plasterboard, glass & concrete.(355, 356) Remember, this is a professional harassment service run by former or current military or federal law enforcement. They have the latest everything. If you’re being targeted, you may also be bugged & your phone may be tapped.(7)

The Professional Paranoid-

How to fight back when Investigated, Stalked, Harassed, or Targeted by any Agency, Organization, or Individual, Michael Sweeney

They would think nothing of throwing dozens of people & vehicles into an operations, planting a dozen $80,000 bugs, buying or leasing property nearby, or other equally expensive contingencies.

Smear Campaign

The bogus investigation may be used to launch a smear campaign. Lies & character assassination may be used.(7)

These lies will be very strategically & deliberately spread into your personal & professional life. Informants may be used to help facilitate the insertion of these lies. The usual rumors spread about a target are that he is a pedophile, prostitute, terrorist, racist, anti-government, mentally ill, rapist, drug addict, or drug dealer. Rumors will be spread to neighbors, friends, family, employers, etc.

When gaining support in the campaign they may include pictures or statements made by someone who is accusing you of something. During Cointelpro some investigations were done for the sole purpose of discrediting & smearing targeted people & groups. Although Organized Vigilante Stalking campaigns are much wider in scope than Cointelpro, we now know that these agencies will engage in character assassination. These statements will be from group members or informants that have been paid to help set you up. Personal & professional opportunities may be trashed.(7, 101) At this point you may also be Mobbed out of the workplace & become unemployed. You will never have a chance to refute these lies, as they will be propagated behind your back by multiple people. Some of the people spreading these lies may be acquaintances &/or family members that have been recruited (lied to, intimidated & blackmailed) as informants.

Gaslighting-How To Drive Your Enemies Crazy, Victor Santoro

“The essence of defaming your target with rumors is it that it not get back to him.”

The reason that labeling someone a pedophile is common is because it is probably one of the worst rumors you could launch against someone. There have been multiple magazine & newspaper reports of pedophiles being harassed by neighbors, & vigilante groups to the point where they are driven out of communities & forced out of work.(349, 351-353) Some have been driven out of multiple states.(350) The people who participate in the harassment may be told that the target needs to be driven out of town so that he doesn t get to do what he did in the last town.(7)

We are a citizen s group that helps the police. We are tryiing (sic) to alert people in the area about this person, before he gets to do what did (sic) in the last place he lived.

-Quote from a group member in Terrorist Stalking in America, David Lawson

The organizers realize that labeling someone a pedophile will be most damaging & give them optimum leverage for gaining community support.

An article in the Toronto Star titled Vigilantes versus pedophiles Sunday August 8 2004 outlined how one citizens group called Perverted Justice http://www.perverted-justice.com, would begin a campaign to expose people that hey have concluded are potential (wannabe) pedophiles. I am not indicating that Perverted Justice is being used as a supplement