Thehiddenevil\’s Weblog


43.

Virtual Government: CIA Mind Control Operations in America, Alex Constantine

The objective is to isolate the bothersome informant, depict him as incompetent, disloyal, troublesome, mentally unbalanced or ill. The whistle-blower is forced out, frightening workmates and supporters. The assault continues until the target is left discredited, exhausted, in poor health, financially crippled, his career in ruins.

Activists/Dissidents

Corporations in various countries are currently using professional harassment groups on people that oppose them.(329)

Civil rights activists have a history of being targeted by these programs. If your views are not aligned with the corporate/state entity, & you are effectively raising awareness about an issue, you may very likely become the target of this type of terrorism. Anyone who opposes Globalization may be targeted.

War at Home-Covert war against U.S. activists & what we can do about it, Brian Glick

The records show that the vast majority of the targets of domestic covert action have engaged only in peaceful protest. They do no harm to anyone s health or safely. The only danger they pose is to the status quo. Their only weapon is the power of their words & the threat of their good example.

The Justice Department claimed that the original Cointelpro was needed to defend national security & prevent terrorism. (10) However, it ended up subverting democracy & promoting violence & terrorism. If you protest at an event, you could be considered a terrorist under the US Patriot Act. Under the JTTF there is currently a nation-wide effort with local & federal law enforcement to report information regarding demonstrations. Cointelpro is back. But it is much, much worse, now with one in 24 Americans being recruited as informants, an unlimited budget, & a loosening of laws that prevented it in the first place.

The New Cointelpro is now legal. According to ACLU executive director Anthony Romero, who viewed a confidential FBI memorandum, even peaceful protesters are now being labeled as potential “terrorists.”(367) Think about what this means.

Experimentation

Some known behavioral modification projects include BLUEBIRD, MKDELTA & MKULTRA. MKULTRA, with 149 sub-projects, was conducted in universities, hospitals, military institutions, & prisons. Some tests included the effects of stress on human beings, including duress, fatigue, torture, drugs, creation of mutations, & a variety of other tests.

Under MKULTRA about 23,000 people were traumatized, but researchers in this are see this as an extremely conservative number.(23) Since many of the records have been destroyed we will probably never know. Most of these people were unwillingly & unknowingly experimented on in these institutions, & their lives were basically ruined.

Some of these tests were conducted on children.

These people will think nothing of sacrificing innocent members of the population & experimenting on people, then covering up their crimes claiming reasons of national security. After studying the history of some of these agencies & learning the facts, it became clear to me that these acts were carried out by monsters misusing their resources & committing crimes against humanity.

The paper trail for these experiments ended around 1984.(23) But there are currently thousands of citizens being experimented on at this time. Labs are apparently no longer necessary as Directed Energy Weapons can be used at a distance. Targeted people are declined assistance by organizations that have been set up to help victims of torture & mind-control. They are routinely labeled mentally ill to discredit them.

Several mind-control survivors have written books. One MKULTRA survivor named Cathy O Brien wrote a book with Mark Phillips (former CIA operative) called, Access Denied: For Reasons of National Security. It is a well

42.

Why is it used?

The organizers have successfully desensitized communities & convinced them that it is OK to violate the civil rights of certain people. This was probably originally done using sex offenders & other undesirables. This may have started out as a system with positive intentions, however, due to lack of ethical oversight it has become heavily corrupted. This is now basically a parallel justice system & a revenge service that can be used for silent neutralization. There is a list or database that people are added to who are deemed expendable. It appears that there are several ways a person can be added to this list. I ve listed some later in this section.

Virtual Government: CIA Mind Control Operations in America, Alex Constantine

The United States of America has not openly declared war on private citizens. But illicit human experimentation and vicious non-lethal radio frequency assaults have been carried out by agencies within a number of federal institutions for 50 years.

I knew federal law enforcement & the intelligence community had their problems, like most institutions do. I had also heard scattered stories of people being harassed by government agencies but I attributed it to their own fault. I figured they must have been some serious troublemakers in order to provoke it. I thought the occasional media leaks were pretty much all there was to it. I trusted that the watch-dog media kept those agencies in line & were perhaps even a little intrusive (preventing these agencies from doing their jobs). I believed that these agencies would never spend resources to target innocent people, especially a nobody. I thought that these agencies had better things to do than to waste resources targeting innocent citizens. I was wrong. I never realized that those media leaks were just the tip of the iceberg or how big & organized this corruption was.

Then I began to learn about the organized human slavery rings, optimum/heroin trafficking (The Golden Triangle)

MKULTRA, & current mind-control operations.(100, 29, 23) And Operation Northwoods.(389)

I realized there was a whole community of targeted people screaming out to be heard, but stonewalled by the media & human rights organizations. These human rights organizations have received many complaints about Organized Vigilante Stalking, but as of the time of this writing they have not acknowledged this phenomenon. I can only conclude they have been given stand-down orders, no doubt for reasons of national security.

the women who are singled out appear to be somewhat too independent, perhaps too intelligent.. tend to live alone, tend to pursue professional careers. There s a heavy predominance of those types of woman in the TI community. Men are in a smaller proportion & seem to be those who have a sense of self-esteem & pride that seems to [invite] targeting.

-The Investigative Journal interviews Julianne McKinney, April 19th, 2006, Subject: Directed Energy Weapons & Gang Stalking

Revenge

Cause Stalking groups are available as for-hire revenge packages.(7) This revenge package is available to any person who has the connections & capitol to finance it. There are some very sick, sadistic people with influence in government & industry who can use this system if they think you ve done them wrong. This is the equivalent of putting a hit on someone. If this is the reason a person is targeted, he may never know it.

Whistleblowers

If you complained about working conditions or ethics of a corporation, you may be targeted. The U.S. postal service & other federal agencies use professional harassment services to harass people, literally to death.(20) This harassment includes psychological warfare & DEWs. If you do a key word search on yahoo using phrases such as, ” Harassed FBI Whistleblower,” you’ll find websites of former members of federal law enforcement, indicating that they are also targeted by the agencies they once served.

41.

service to Globalization. Individually, some tactics may not be illegal or very potent, but when combined with other tactics in a systematic round-the-clock fashion, day in, & day out, they are a painful & difficult to prove form of torture.

Torture (tôr cher), n., v., 1. the act of inflicting excruciating pain, as punishment or revenge, as a means of getting a confession or information, or for sheer cruelty. 2. a method of inflicting such pain. 3. Often, the pain or suffering caused or undergone. 4. extreme anguish of body or mind; agony 7. to afflict with severe pain of body or mind.

Webster s 1997 edition

40.

Silent Sound can also be piped through the V2K medium & transmitted over a distance. So this means that subliminal messages can be transmitted over a distance, through walls, directly into a person s skull. In essence, into their subconscious mind. If Silent Sound is used in this manner most people will probably hear a slight ringing in their ear.

“All schematics, however, have been classified by the US Government and we are not allowed to reveal the exact details… we make tapes and CDs for the German Government, even the former Soviet Union countries! All with the permission of the US State Department, of course…

The system was used throughout Operation Desert Storm (Iraq) quite successfully.”

-Edward Tilton, President of Silent Sounds, Inc, S-quad letter dated December 13, 1996

Microwave mind control: Modern torture and control mechanisms eliminating human rights and privacy

Dr. Rauni Leena Kilde, Former Chief Medical Officer of Finland

Report-September 25, 1999

All our emotions, moods, and thoughts have a specific brain frequency which has been catalogued. If these records fall into the wrong hands, our behaviour and attitudes can be manipulated by persons whose ethics and morals are not in our best interest. Both military and intelligence agencies have been infiltrated with such persons.

Some targets have reported being hit with other more exotic types of weapons that cannot be explained with current unclassified technology. These weapons have been known to penetrate all types of shielding. There are people with experience in the engineering field that have spent time & money on building shelters that did not stop these signals.

U.S. TAPS HIGH-TECH ARSENAL/PENTAGON LIKELY TO DEBUT NEW WEAPONS IN IRAQ. (News)

The Cincinnati Post (Cincinnati, OH); 3/20/2003 Byline: Jim Krane Associated Press

“Once you’re engaged and you have a capability that’s almost ready, you’ll try it,” said Clark Murdock, a former Air Force strategic planner now with the Center for Strategic and International Studies. “All kinds of things have been invented, particularly in the (classified) world, that will be used. If you use it and it works and no one knows, why talk about it?”

One former NSA employee, John St. Clair Akwei, is one of a very few targeted people to file a lawsuit (Civil Action 1:92 cv 00449) against the NSA. They have been harassing him using classified directed energy technology for the last twelve years. His information is posted on http://emhdf.com

Jesus Mendosa who appeared on The Power Hour radio show also has a case. Apparently he used radiation detection devices to identify some directed energy attacks against him & his children. He has also been Gang Stalked. I am unaware of the status of these cases. These folks are pioneers because most people don t realize what s happening &/or are too drained to intelligently explain what is going on. However, would it not be reasonable to conclude that organizations with a documented history of experimenting, torturing, & harassing citizens would use these weapons on people? If that is the case, then is it not also reasonable to conclude that at least some of these claims that weapons are being used on citizens are true? And if that is correct, does this not constitute a severe violation of human rights?

Tactics Conclusion:

It is impossible & unnecessary to explain every variation of harassment. In addition, there are some tactics that are much more subtle that you may experience if you re targeted. Now you know why some people are driven to suicide.

These organizers may be more aware of some of your habits than you are. For instance, commonly used routes will be used as avenues for various types of Street Theatre that unfold as you pass through. Also, products such as specific brands of soap, shampoo, deodorant, etc that you use will be discontinued, or sold out in the stores that you frequent.

The neighbors who move in next door to you will have loud motorcycles, or cars.

In addition, these neighbors may be carpenters, mechanics, etc & will always seem to have noisy projects to work on.

Moving out of the community or state will not stop this harassment.(7, 101, 200) This is not only nation-wide but it is happening in all NATO countries.(200) It apparently is one component of a political movement that appears to be in

39.

things; almost no one can believe their reports. Some experts who work for the German Army or Nato know very well about MW weapons, but secrecy keeps them from talking too much about in public. We have names and addresses of many victims and the circumstances of the cases. In some cases, the lifestyles of the criminals are well known to us. Similar to terrorists, many pretend good citizenship (sic) or student lifestyles to cover their crimes. Conventional criminal activities, (i.e. burglary) are undertaken by normal gangsters or former members of the Stasi

LIDA

The Russian LIDA machine (patent 3773049) is an old brain entrainment device used for the drugless sedation of mental patients. This device can be used as a weapon to drain a person of energy. The pulse rate can be adjusted so that it causes fatigue or excitability (sleeplessness). Although the LIDA signal does not travel a great distance, it can be used TTW in an apartment building. This device is about the size of a breadbox & works silently.

The LIDA machine was made in the 1950’s by the Soviets. the LIDA would put rabbits into a stupor at a distance and make cats go into REM The Soviets included a picture with the device that showed an entire auditorium full of people asleep with the LIDA on the podium.

-Dr. Eldon Byrd, U.S. psychotronic researcher

Voice-To-Skull (V2K)

V2K, also called Microwave Hearing was discovered during WWII when soldiers noticed buzzing sounds while standing in front of an energized radar antenna. Dr. Joseph Sharp demonstrated a V2K success in the mid 70s while working for the Walter Reed Army Institute of Research. If you have a tightly focused antenna, this can be transmitted through walls & over a distance. Voice or other sound can be transmitted over a distance, through walls, directly into the skull of a person. This was possible more than 30 years ago. Below is an except taken from the journal of the APA, which describes Dr. Joseph C. Sharp s V2K success.

The American Psychologist

Journal of the American Psychological Association

Volume 30, March 1975, Number 3

Given a thermodynamic interpretation, it would follow that information can be encoded in the energy and “communicated” to the “listener. Communication has in fact been demonstrated. Sharp and Grove (note 2) found that appropriate modulation of microwave energy can result in “wireless” and “receiverless” communication of SPEECH. The capability of communicating directly with a human being by “receiverless radio” has obvious potentialities both within and without the clinic.

Silent Sound Spread Spectrum

Silent Sound (patent 5159703), developed by Dr. Oliver Lowery of Norcross, Georgia, also called Clear Channel, is an improvement over the time-slicing subliminal suggestions. It does not need to compete with other sound to influence a subject because it occupies a separate channel just beyond the human hearing range. Hence the name: Clear Channel.

This channel is beyond human hearing but not human perception. It is not normally in use but it is a direct conduit to the subconscious.

Silent Sound can be used by installing a hidden speaker near person s area of work or in their home. These suggestions can be played constantly & the person would not be consciously aware of them. Apparently this weapon was used on Iraqi soldiers during the first gulf war.(386) Silent Sound can be transmitted through ordinary radio or television carrier frequencies. However, only a speaker is necessary. But Silent Sound cannot only convey suggestions, it can transmit cloned emotions. This is brain entrainment.

Nexus Magazine

Volume 5, Issue 6, October/November 1998

Military Use of Mind Control Weapons, Judy Wall 1998

PSY-OPS WEAPONRY USED IN THE PERSIAN GULF WARSubliminally,

a much more powerful technology was at work: a sophisticated electronic system to ‘speak’ directly to the mind of the listener and artificially implant negative emotional states-feelings of fear, anxiety, despair and hopelessness. This subliminal system doesn’t just tell a person to feel an emotion, it makes them feel it; it implants that emotion in their minds. presentation system carries cloned emotional signatures, the result is overwhelming.

Posted in Cointelpro,mindcontrol,Neuro-linguistic,Neurolinguisticprogramming,NLP,programming by thehiddenevil on August 26, 2007

33.

someone would turn their alarm on/off a few times but they d write it off as an isolated strange incident. Since they have not had your previous experience (sensitization) with that sound & are not aware that it is a small part of a much larger harassment program it would be difficult to explain what those beeps meant. In NLP, the process of copying an emotional state anchored to an existing trigger & transferring it to a new trigger, is called chaining.(2)

Introducing NLP, Joseph O Connor & John Seymour

Anchors can be chained so that one leads to another. Each anchor provides a link on the chain & triggers the next one, just as the electrical impulse flows from nerve to nerve in our body.

Harassment Skits

Harassment skits can be classified as a type of Street Theatre that contain verbal & non-verbal harassment, threats,insults, intimidation, & violence, conveyed overtly, or overtly using themes, symbolism, or other medium. They may be carried out after a target has been sensitized. This harassment can be relayed with metaphors, verbal remarks, & symbolism using clothing or other items. Insults or comments by strangers, designed to evoke a paranoid reaction, as well as dirty looks & negative behavior from previously friendly neighbors is common among targets.(101)

They may be speaking on their cell phone & loudly accent the insult as they walk by & stare at you. Blatant, hostile or smirking stares are also common. Sometimes they may not be one the phone & just overtly insult you as they walk by. As an example, I have people walk by me & say things like fuck you, “fuck-up, fuck-head, your disgusting etc. After being out of work for about a year, I was able to land a job at a retail store in Boston where the Mobbing continued. Because I already knew where it would end up I stayed there for less than a week. One evening as I was leaving, another employee walking out behind me made the remark, Déjà vu now what are you gonna do? When I looked back he was casually leaning up against the wall. No cell phone or other people around at that moment.

Another example took place in a bookstore when I asked the clerk if he could find the book Terrorists Stalking in America. I knew they probably wouldn t have it on the shelves but I wanted to see if they would have it in their Books In Print database. The clerk had some trouble finding the book so as I was giving him other information such as the author s name a man walked by, looked in our direction & said Keep trying caged people, keep trying. The clerk glanced over at him as he walked away then looked down with a perplexed expression. There was nobody else in this area of the store.

But these events are sort of unusual because usually they cover their tracks & mask their insults within phony conversations while on a cell phone or with another person.

Some of these insults are very subtle (implied), but powerful. For instance, if you re at a restaurant you may have acouple sit down at a table next to you, & mention some events that are taking place in your personal life, in order to get your attention. And then make repeated references words such as paranoid, crazy, scared, panic, insane, freak, sad, depressed, etc. This may be done repeatedly while the trigger words are emphasized. The idea is that the words will invoke the emotion. Not only is this possible, but it works best when you don t know it s being done to you.

Some words carry with them a particular weight to potentially trigger an effect on a person s emotional state.(3, 9)

Some of these harassment skits are designed to transfer the emotions of those weighted words to affect a negative emotional state upon a target. In addition these words can be emphasized by changing their tone & volume when they re spoken. This is called metacommunication. Metamessages are suggestions hidden in a statement, perhaps a compliment. The tone, volume, & rhythm of specific words in the sentence are changed so that the actual message is different than what the spoken words were.(5, 4, 328) Obviously this works better on some individuals than others.

Posted in Cointelpro,mindcontrol,Neuro-linguistic,Neurolinguisticprogramming,NLP,programming by thehiddenevil on August 26, 2007

32.

You can think of NLP as a very powerful tool that can be used to produce rapid, profound change.(2) Harassment groups create negative emotional states such as fear & anxiety, & anchor them to common objects in the environment.

There has been some concern in the mental health field over the potential misuse of NLP. Unfortunately, like other tools, such as guns, they can be misused in the wrong hands.(2, 344) Groups use this science in a destructive format.

NLP-The New Technology of Achievement, Steve Andreas & Charles Faulkner

It is a common experience for many people, when first introduced to NLP, to be concerned about the possible uses & misuses of this technology. We recognize the incredible power of the information presented in this book & recommend you exercise caution Here s an example of how groups use anchors:

[One morning your walking out to your car & a man walks in front of you, stares directly at you in a hostile manner while repeatedly clicking his pen the whole time. You feel a little uneasy & say to yourself, Boy, that was weird, what was his problem?

Then two hours later you re leaving a shopping mall on a day that it was not particularly crowded. As you walk out to your car, an old lady approaches you on foot. As she almost collides with you, she locks her eyes onto you with a hostile demeanor, while clicking a pen the whole time.

Then maybe you tell yourself something like this. There couldn t be a relation between those events, probably just a coincidence. But they both stared at me in such a mean way while hammering their pens…

Later in the afternoon, you re on your way home. You re at a stoplight & out of the corner of your eye you see a passenger in the car to your left. You hear a slight noise, & glance over. You see a man glaring at you with a grin on his face. His arm is hanging out the window & he is holding a pen, which he is repeatedly clicking. Now imagine that happening for a month. Then one day a month later you re on a sidewalk with a friend or family member. A man walks by, doesn t look at either one of you, but clicks his pen a couple of times. You feel anxious & afraid.]

You may not even know you ve been sensitized. But if you did recognize it as an attack, what would you tell your friend or family member?

This is what happened: The collisions, blatant hostile staring, & foul grin created the negative emotions & anchored them to the pen, which has now become the trigger. That is an example of a sensitivity program. Now imagine yourself being sensitized to multiple objects & sounds, & each of them creating pain each time you see or hear them.That s the power of NLP! And that is only one, small segment of the entire harassment program. Targets around the country & the world have witnessed this being done with sounds, gestures, cell phones, laptops, pens, cars, watches, clothing, symbols, colors, & other items. This type of attack does require some maintenance & will loose its potency unless it is reinforced. So groups will reinforce these anchors & triggers with occasional blitz attacks from time to time.

Groups will take an object you ve been sensitized to & link it to another object. The idea appears to be to keep expanding the amount of objects you associate fear, anxiety, anger, or shame with (sensitization). For instance, one of your neighbors, has made it abundantly clear that they’re participating in the harassment. Now, you know they’re participating, & they know you know. So they may try to sensitize you to other stimulus, such as a car alarm. Since you ve already associated them with massive pain, they can extend their harassment to a sound by turning their car alarm on/off in rapid succession over a short period of time, multiple times throughout the day. After they ve done this for a couple of days & you ve been sensitized to this sound, they can reduce their use of this specific tactic & just use the occasional maintenance sounds to keep you sensitized.

Now instead of repeatedly turning it on/off for ten times, they only do it two or three times in a row, just to let you know you re being harassed. Even though it s only done a couple times in a row, you know why they re doing it & you may feel anger, fear, anxiety or other negative emotions. You may also feel frustrated at the prospect of trying to explain this covert harassment to another individual. Anyone else observing this might think it s a little strange that

Posted in Cointelpro,mindcontrol,Neuro-linguistic,Neurolinguisticprogramming,NLP,programming by thehiddenevil on August 26, 2007

31.

Techniques used to silence critics, Ted L. Gunderson FBI Senior Special Agent In Charge (Ret)

Threatening Letter-Further, its content appear to contain a subliminal message that are routinely used by Satanic cults & their splinter groups.

These messages will probably contain junk in the body & you may not be able to reply to it as it came from a bogus address. These cryptic attacks are mentioned in a book titled Subliminal Mind Control by John J. Williams. The message will probably pertain to something in your life situation. For instance, if you re going bald & have been looking for treatment, you could receive the following attack.

To: John Doe

Subject: Euro Paulding Tummy

Body: asdfl;jkasdflkkjasdf;lkjasdfljkasdfl;jkasdfl

Or

To: John Doe

Subject:: Hiraless Tupid

Body: kasdflkjasdfl;jasdf;lkjasdfkj

Any weakness you have can be exploited. Remember, this is a professional organized harassment service that was originally developed to neutralize foreign agents.

Sensitivity Programs

Cause Stalking groups usually begin their campaigns with sensitivity programs.(7) The goals of a sensitivity program are:

To get the person s attention & let them know they re being harassed

Anchor damaging emotions to common objects/sounds so a target can then be covertly harassed openly in public

These sensitivity programs are based on a science called Neuro-Linguistic Programming (NLP). The parts of this science that groups use are anchors & triggers.

We re unconsciously creating anchors in our environment all the time with people, music, places, & objects. Initially, the target may not be consciously aware of the harassment, but this is not necessary.(7) One reason people may not realize that they’re targeted or can’t remember exactly when it began, is because these groups may slowly & gradually increase the harassment over time. But groups can let you know you’re being targeted any time they choose by turning up the volume with a blitz attack. Groups use sensitivity programs in an attempt to create phobias.

Introducing NLP, Joseph O Connor & John Seymour

“A stimulus which is linked to & triggers a physiological state is called an anchor in NLP. How are anchors created? First by repetition.

Secondly, & much more important, anchors can be set in a single instance if the emotion is strong & the timing is right. In extreme cases an external stimulus can trigger a very powerful negative state. This is the realm of phobias.”

Self-help gurus use these programs to create positive emotional states & anchor them to a movement, a sound or an object. Then the sound, movement, or object becomes the trigger that will invoke the emotion. Although this sounds complex it is actually pretty simple component of NLP. It is done by creating a peak emotional state, then while in that state you anchor it, that is, do something repeatedly. This effectively anchors the emotional state to whatever was repeatedly done.(2) This process of creating anchors has also been called Emotional Transference.(1)

29.

Noise campaigns All targets of Organized Stalking are quite familiar with noise campaigns. Basically, there will be a steady stream of noise consisting of a rotation of various types of disturbances around your house. This noise may even follow you wherever you go. This includes car doors slamming, people coming/going, people yelling, car alarms, horns, tires screeching, banging, engines revving, cars beeping, constant construction, lawn mowers, snow blowers, etc.(7, 101, 200) Your neighbors will probably be bribed with free home repairs that will result in a very noisy construction process.(7) An ongoing noise campaign appears to be most effective. Like the collisions & cut-offs, these noises are done to startle you & keep you uncomfortable.

For instance, there will be doors slamming for a few moments, then a motorcycle will drive by & rev its engine outside of your house. After that you ll have someone mowing the lawn. Then there will be alarms going off. After that you ll hear a loud crowd of people walk by your house. You may then hear fire or ambulance sirens. Then there are hammering & sawing sounds. Then you ll hear car alarms being turned on/off in succession multiple times from multiple vehicles around your house. After that it will switch back to car alarms & horns. Then drilling, & doors slamming.

Often, activity such as noise will be synchronized with you coming, going or doing some other type of activity.(7) For instance you may hear ambulance, fire engine sirens or beeps as you leave. Noises made as you leave also appear to serve as a form of communication to alert group members in the area to begin pursuit.

Terrorist Stalking in America, David Lawson

Group members will drive by the target s residence honking their horns, squealing their tires & making whatever other noise they can… you might see a work crew working on a certain floor and making a lot of noise. If you look to see what they have done after they have left, you will see that they haven’t done anything.

Chronic exposure to even low-level noise is considered a hazard that has been known to produce adverse physiological & psychological health effects.(314, 316, 317) Prolonged expose to noise can produce high blood pressure, a rise in cholesterol, damage to the circulatory, cardiovascular, gastrointestinal, & musculoskelatal systems.(315, 26)

If you re targeted & pregnant or plan on having a baby, you may want to think twice. Noise has been known to cause hearing loss & growth disturbances in a fetus, & can lead to birth defects.(318, 319) Just as the fabricated cut-offs are likened to getting slapped, these noises are the equivalent of being repeatedly shocked. There is no question that these low-intensity neutralization tactics are acts of extreme violence.

Online

People

Online harassment appears to be another part of the harassment package. If you have a website devoted to Organized Stalking you may have people emailing you to flame you, or claiming that they are victims & asking for support with the intention of discrediting you. You may receive unsolicited email that parallels a current event in your life.

Again, surveillance is used primarily for harassment. Or you may receive covert insults & threats. If you join a support group, you may also receive harassment via threads posted on message boards. Like other mediums of harassment, the topics of these threads may be about events that are unfolding in your personal life, as well as threats or insults covertly directed at you. This will probably happen repeatedly by the same person or people.

They may also employ some Gaslighting, or Jacketing tactics. Jacketing was often used during Cointelpro to make genuine activists look like informants.(10) Some internet groups which help stalking victims are heavily populated with perpetrators posing as victims.(7) Some of these perpetrators seem to be very vocal & popular members of these support groups. It seems that this a damage-control mechanism put in place to corral people, manage them to some

28.

invading my personal space. There was no special equipment that they were using located in that area. I noticed one had a shirt on that said something like, The MOST important part of playing rugby is support.

Anyone who can t wait a few minutes for you to finish & needs to stick their arms in your face is doing it on purpose.

In addition, the exercise they were doing could have been done anywhere else a gym that was almost empty. It was a dead giveaway. Another student arrived & began lingering in an area to my left. He stared at me for a few seconds & started smirking. Once he had my attention he turned his back to me so I could see his shirt which read, CHASE. In smaller letters underneath was the word, Manhattan. These attacks using symbolism are common reports among people who are targeted. They are also consistent with borderline-subliminal attacks used by Satanic cults.(100) The kid with the CHASE shirt left shortly after, & his total stay was about 10 minutes. That episode is an example of noise, crowding, symbolic attacks, & sensitivity tactics. This is standard procedure.

Synchronization

Synchronization seems to be very prevalent with Organized Stalking.(7) Groups will try to synchronize their tactics with things that you do such as entering or leaving your house. You re movements will be synchronized with noise, vehicles coming or going, people coming or going, or other movements. These synchronization tactics are often times done several times, perhaps three or more. For instance, when you arrive, two cars will drive down your street & someone will be banging a hammer. Or you may have two cars leave & one arrive. Three or more seems to be the magic number when it comes to synchronization. You may also hear ambulance or fire truck sirens the moment you enter or leave your house.

If you have a habit of going to the bathroom early in the morning around 2AM & looking out your bathroom window at a specific area, then they will eventually arrange it so that when you do this there is some activity such as a light being switched on or someone leaving or arriving in that area. This is an example of the level of detail that they will resort to when tailoring the harassment protocol to your profile.

Convoys of vehicles

If you’re targeted, you may have foot & vehicular traffic “re-routed” through your street. You’ll have an unnatural amount of vehicles driving by your house (even if you’re on a side or dead-end street) &/or following you while your out. Common practice is for vehicles to drive by screeching their tires, blowing their horns, playing loud music, revving their engines, & yelling as they drive by your house. This can include fire trucks, ambulances, city/utility vehicles, & postal vehicles.(7) Some targets have even mentioned that local police vehicles have participated in the harassment.

Brighting

A classic KKK tactic. Vehicular brighting seems to be strategically used with corners. For instance, you ‘re walking down a quiet street late at night & you have people repeatedly turn onto or off of connecting streets. Their timing is such that they continually turn the corners while you just happen to be at it. This effectively blinds you. This may happen at each & every corner. Or, as you walk down a side street there is one or more cars parked on the side, facing your direction with the lights on. They will also wait for you to approach them & then pull out into the street, thereby brighting you as you walk by.

You may also be followed by convoys of vehicles that have their Hi-beams on during the day.(7) These Brighting tactics are maximized when a vehicle has one headlight grossly misaligned. The misalignment produces a Hi-Beaming effect. Like other Organized Stalking tactics, frequency & duration play an important role here. Spot lights being shined into a target s windows is another tactic.

Next Page »