Thehiddenevil\’s Weblog


Posted in mobbing,Neuro-linguistic,Neurolinguisticprogramming,NLP,Occult,Stalking by thehiddenevil on August 26, 2007

35.

Person 1: Isn t that being dumb?

Person 2: I agree, I think that s just being stupid.Person 1: Whenever

he s down visiting, I bring it up but he gets so uptight Person 2: I know, he goes nuts with that car!

Person 1: I think he plans to take it to Florida, but he s not going to make it!

Person 2: He should start thinking about loosing it

The conversation above is an example of an embedded hypnotic suggestion that can be very effective if used under the right circumstances.(4) It keeps the conscious mind occupied with an erroneous conversation concerning a car breaking down, while the actual message is slipped into the subconscious, potentially affecting the desired emotions. It appears a variation of this message can be conveyed with multiple people blitzing a person with cut-offs while talking on their cell phones, looking directly at the person & emphasizing (metacommunication) weighted words &/or information about person s personal life that was obtained from surveillance. Groups will also use these phony conversations to harass targets in stores, restaurants, public places, elevators, etc. These overheard comments are intended to elicit a negative reaction within you.(101)

NLP-The New Technology of Achievement, Steve Andreas & Charles Faulkner

When we hear something, even from another conversation, we can t help but make images & sounds of it in our head. The professional persuader knows this intuitively. In NLP we know it explicitly. You cannot NOT communicate.

Symbolism appears to be a big part of subliminal attacks.(100) After a target has been sensitized, they can even be harassed, insulted, & threatened with symbolism using articles of clothing, newspapers, & other items. Just as body communication (Social Kinesics) is used to harass a target, so too is symbolic communication. Symbolism can be used with articles of clothing, especially during a wave attack where you are blitzed by a crowd of harassers who smile, laugh, stare at you, & cut you off as they pass by you. Some of the shirts I’ve noticed are “Stop & Die,” “Big Bro,”

“Watch Your Back” as well as Satanic & Wicca symbols. An attention-getting tactic may be used prior to a harassment skit.(7) It can be a cut-off, blatant stare, loud noise, or other sensitivity tactics. Remember how the perpetrators at the YMCA both used an attention-getting tactic? One man gave me a smirking stare & the other two swarmed me.

In essence, they will take an event that is unfolding in your personal life & make references to it using any number of methods. This has also been reported by people who have been temporarily stalked for days at a time during anticorporate rallies.(340) The theme may pertain to something in your personal life. They may play on this theme for a single day, a series of days, or weeks. In addition, they may choose a theme & try to project it into your life. Some survivors of government mind-control & torture have reported themes being used in behavior modification programs, & as entry points for control & future manipulation. Some include: Disney, Alice in Wonderland, Cinderella, Wizard of Oz, etc.(12) For Gang Stalking & Mobbing targets, themes are used in harassment skits.

Mobbing, also referred to by some as bullying, psychological terrorism, and organizational violence is described as a collective form of psychological violence in which many individuals unite to persecute an individual Mobbing is a way of destroying a person without using any physical means Degrading themes are often used to try to prevent people from coming forward.

-http://www.psychologicalharassment.com

Whether the perpetrators actually believe in a theme is inconsequential. The use of themes (sometimes Satanic) injected into occult crimes assist with trauma, & serve to discredit a person if he were to come forward. Apparently the logic of using Satanic & other themes in occult-related crime is that you won t be believed because it’s too farfetched.(17)

The New Satanists, Linda Blood

“In one instance after another, charges of ritual abuse & other crimes linked to Satanism & various forms of malevolent occultisms have been rejected on ground no more substantial than that they are too bizarre to be believed.

34.

Messages-The Communication Skills Book, Matthew McKay, Ph.D., Martha Davis, PhD., Patrick Fanning

It s hard to defend against the anger & disapproval expressed in negative metamessages The attack is often so subtle that you aren t aware of exactly how you ve been hurt The basic function of metamessages is to say something covertly that you re afraid to say directly. Since metamessage attack is covert, there is little chance of overt retaliation.

These subtle whispering sneer attacks, & verbal barbs attacks may work best when done repeatedly, & after a person been loosened up with a more overt type of harassment such as noise campaigns, collisions, crowding, & sensitivity tactics. Within a conversation, certain weighted words can be emphasized. Volume, tone & tempo can be changed so that some words are slightly louder & spoken longer than the others. This can completely change the meaning of a message.

The following is a quotation regarding imbedded questions & suggestions as outlined in the book, Patterns Of The Hypnotic Techniques Of Milton H. Erickson, M.D., by NLP experts Richard Bandler & John Grinder. The example at the bottom titled Indirect Imbedded Command is exactly as it appears on page 173, where the weighted words (suggestions) that are to be emphasized when spoken are bolded. Note: When Erickson speaks of the dominant & nondominant hemisphere, he is referring to the conscious & unconscious mind respectively.

Patterns of Hypnotic Techniques of Milton H. Erickson, M.D. Richard Bandler & John Grinder

“They very often are a presupposition of some other command and serve to distract the dominant hemisphere by having it utilize the internal dialog These imbedded questions are most effective when they are stacked together to maximally distract the dominant hemisphere.

Imbedded commands serve the purpose of making suggestions to the client indirectly and, thereby, making it difficult to resist in any way…

These are most effective when they are also marked analogically by emphasizing the command and by looking intently at the listener, if their eyes are open.”

“Indirect Imbedded Command: “My friends tell me to feel comfortable and to loosen up when we are out on the town.””(4)

Below is an example of how groups use these suggestions to harass people. Bolded words indicate ones that are emphasized.

Situation:

You ve been blitzed with noise campaigns, crowding & collisions on your way to the bus stop. You feel like you ve been through a minefield & have been hit multiple times (you have). Your heart is pumping. You sit down on the bus  begin to relax. A couple sits down across from you & begin a conversation. You overhear bits & pieces of it.

Person 1: His car isn t working.

You: You think, My car is in the shop.

Person 1: They think it s the battery.

You: What a coincidence, my car is getting a new battery, you say to yourself.

Now that they have your attention, the conversation unfolds like this

Person 1: I saw him last week, his car looks bad.

Person 2: That s HORRIBLE What s wrong with it?Person 1: It just keeps

breaking down.

Person 2: I don t want to be in that car in case it should just flip out!

Person 1: That s insane!

Person 2: I hate to see him like that.

Person 1: He s crazy for keeping it. He knows it just keeps breaking down.Person 2: I know

he is. It just broke down so many times

Person 1: Not to be paranoid, but he should just give up on it.Person 2: You re not

being paranoid, but I don’t trust that thing on the highway.

Person 1: Is that crazy or what, is that being insane?

Person 2: he s nuts for keeping it. I told him he s crazy.

23.

Surreptitious break-ins, thefts, sabotage & planting drugs, bugs or other items in people s homes & offices were a staple part of Cointelpro.(10) They may also take items from your car & plant them in your home, & vice versa.(7)

Framings

This can be done over the Internet with Trojan horse viruses. Since they have federal connections, they do have the ability to frame a targeted person for crimes out in public as well using informants.(101, 7) Any weakness a person has can be used in one of these setups. A person may not be aware of some of these set-ups, but they may be added to a case file to assist with the smear campaign. They may try to provoke a confrontation when Mobbing you out in public.

Terrorist Stalking in America, David Lawson

Group members also try to entice the target to assault them, but this is never done without having witnesses present. The criminal conviction of the target, following the testimony of numerous concerned citizens can be followed by a civil lawsuit.

Sabotage & Vandalism

This happens at home & in the workplace. Electronic equipment may constantly be failing. This may be accomplished with the e-bomb or a similar device.(309, 310) Projects you ve worked on the previous day may become broken.

Many times this vandalism is usually just below what you d report to the police. For instance, a small but noticeable portion of your masonry has been chipped off, & a crack has appeared in one of your windows. Again, frequency & duration. This may be restricted to minor vandalism, just to let you know that you re being stalked. However largescale property damage is also done to vehicles, such as slashed tires, broken windows, tampering with break lines, destruction of electrical equipment.

Vandalism & pets being tortured may also be in retaliation for you taking action to expose them. In addition you may have dead animals & litter thrown into your yard. Some targets have reported that their pets die suddenly of mysterious illness. For instance, they come home to find a perfectly healthy animal dead. Others have noticed that their pets have been mutilated.(101)

Mail interference

During the old Cointelpro they would blatantly watch homes, follow cars, & open mail.(10) The idea was to get as much info as possible to aid in the harassment & intimidation. Currently some targets also experience tampering with mail, altering, delaying or disappearing, & email being filtered/blocked.(100, 101) These Cause Stalking groups may use children to steal your mail, or they may enlist the aid of the post office.(7)

Pranks

You may receive pranks by people & recordings.(101) The pranks may pertain to an important event that is unfolding in your personal life. Once again, information gleaned from surveillance is used for harassment. The phone has historically been an excellent harassment tool. It is also used as a synchronization tactic. You may also have people knocking on your door for whatever reason.(7)

Blacklisting

Gang Stalking groups will interfere with every personal & business relationship you have.(7) Since they are statesanctioned they can easily keep you unemployed. Job opportunities will be trashed. They get paid to make sure that you don t. Most targeted people are unemployed. Many would be homeless if it weren t for parents, siblings, or friends. If you re targeted & are lucky enough to still be employed, you may be harassed into leaving by your employer & coworkers.(101) You may have a successful interview & are virtually guaranteed the job, but never hear from the prospective employer, & they don t return your calls to tell you what went wrong.

According to an article in The Christian Science Monitor titled Blacklisted by the bank, Blacklisting was originally used as a foreign-policy tool.(391) At some point federal organizations decided to start using it on individuals as well.

21.

SoldierVision A1, a radar flashlight, has a standoff distance of 30 feet & can detect motion behind a wall at 30 feet as well. These flashlights have been steadily researched using military & university testing labs since the 1990s.

Raytheon is working on a Through The Wall (TTW) technology that will allow the device to wirelessly transmit output to a laptop up to 300 feet away.(354) Some of these flashlights display images in 3D format, can detect respiration, & can see through, wood, brick, plasterboard, glass & concrete.(355, 356) Remember, this is a professional harassment service run by former or current military or federal law enforcement. They have the latest everything. If you’re being targeted, you may also be bugged & your phone may be tapped.(7)

The Professional Paranoid-

How to fight back when Investigated, Stalked, Harassed, or Targeted by any Agency, Organization, or Individual, Michael Sweeney

They would think nothing of throwing dozens of people & vehicles into an operations, planting a dozen $80,000 bugs, buying or leasing property nearby, or other equally expensive contingencies.

Smear Campaign

The bogus investigation may be used to launch a smear campaign. Lies & character assassination may be used.(7)

These lies will be very strategically & deliberately spread into your personal & professional life. Informants may be used to help facilitate the insertion of these lies. The usual rumors spread about a target are that he is a pedophile, prostitute, terrorist, racist, anti-government, mentally ill, rapist, drug addict, or drug dealer. Rumors will be spread to neighbors, friends, family, employers, etc.

When gaining support in the campaign they may include pictures or statements made by someone who is accusing you of something. During Cointelpro some investigations were done for the sole purpose of discrediting & smearing targeted people & groups. Although Organized Vigilante Stalking campaigns are much wider in scope than Cointelpro, we now know that these agencies will engage in character assassination. These statements will be from group members or informants that have been paid to help set you up. Personal & professional opportunities may be trashed.(7, 101) At this point you may also be Mobbed out of the workplace & become unemployed. You will never have a chance to refute these lies, as they will be propagated behind your back by multiple people. Some of the people spreading these lies may be acquaintances &/or family members that have been recruited (lied to, intimidated & blackmailed) as informants.

Gaslighting-How To Drive Your Enemies Crazy, Victor Santoro

“The essence of defaming your target with rumors is it that it not get back to him.”

The reason that labeling someone a pedophile is common is because it is probably one of the worst rumors you could launch against someone. There have been multiple magazine & newspaper reports of pedophiles being harassed by neighbors, & vigilante groups to the point where they are driven out of communities & forced out of work.(349, 351-353) Some have been driven out of multiple states.(350) The people who participate in the harassment may be told that the target needs to be driven out of town so that he doesn t get to do what he did in the last town.(7)

We are a citizen s group that helps the police. We are tryiing (sic) to alert people in the area about this person, before he gets to do what did (sic) in the last place he lived.

-Quote from a group member in Terrorist Stalking in America, David Lawson

The organizers realize that labeling someone a pedophile will be most damaging & give them optimum leverage for gaining community support.

An article in the Toronto Star titled Vigilantes versus pedophiles Sunday August 8 2004 outlined how one citizens group called Perverted Justice http://www.perverted-justice.com, would begin a campaign to expose people that hey have concluded are potential (wannabe) pedophiles. I am not indicating that Perverted Justice is being used as a supplement

20.

Investigations The bogus investigation appears to be the platform used to launch the smear campaign & remove a person s support structure. Bogus investigations using a person s friends, family, & employers appear to be a standard part of the Organized Stalking package. This is done to isolate you. Friends, family members or employers may be given a gag order & told that under no circumstances are they to tell you that an investigation is being conducted.

The people who organize these harassment programs will try to assassinate your character.(7, 200) They will carry a case file on you that they will use for character assassination & to gain community support.(7) When recruiting neighbors they will probably show them this case file & indicate that you are the target of an investigation. This case file will contain a combination of half-truths, setups & outright lies. The case file may contain information about a person or people who have complained about you. These are most likely informants (civilians paid or given favors to help frame you). Or they may simply say that you’re under investigation but they can’t disclose why for reasons of national security. The “reasons of national security” blanket has been used by some federal agencies to help frame people for crimes as well as cover up mind-control & torture.(368, 13)

Their informants may be a single person used to help frame you, such as a tagger. Or they may be multiple people, perhaps related to each other. Again, these stalking groups usually have hundreds of local members. During Cointelpro, there were routine setups, & fabricating of evidence used to destroy a person s character or have them imprisoned.(10) They may string together arbitrary pieces of unrelated incidents from your past & arrange them in such a way that it paints an extremely bad picture of you when gaining support of your neighbors, landlord, family & friends. They can recruit stores & restaurants using the same method, & they may even have informants working in these establishments. Remember, one in twenty-four citizens will be called upon to be an informant.

Their case file of you may indicate that you are a probable rapist, pedophile, drug dealer, prostitute, terrorist, or racist, that they are investigating. Or they may tell these people they can’t say why, for reasons of national security.” They’ll be told that they will be doing their country/community a great favor by cooperating. However, labeling someone a pedophile seems to be quite common.

They will set up a base of operation in your neighborhood to conduct surveillance.(7, 101, 200) This will probably be next to your home or apartment. They will sublet, lease, rent property above, below or to the sides of your living space to do this.(7, 11, 200, 101) Money is no object as they have an unlimited budget. Half-truths, setups, & outright lies WILL be used. If you re an Organized Vigilante Stalking target, the investigation is not a means to an end, it is an end unto itself.

Surveillance

Terrorist Stalking in America, David Lawson

Surveillance (sic) on a residence by using triangulation. They watch it from three different positions. Surveillance is conducted 24 hours a day, 7 days a week. When a target leaves his residence they will alert the group, either by cell phone or business band radio. Other members, who are patrolling the perimeter will race to the location to begin pursuit. They patrol the area they live in 24×7. When they are riding around in their groups they feel invincible. Following and harassing various targets is part of their daily activities when they are on patrol.

If you re targeted, the group will be watching your home from their bases of operation using triangulation.(7)

Neighbors will be told that they’ll be doing their country a great favor by allowing them to occupy space in their home until the investigation is complete. If neighbors don’t cooperate, they may be targeted, or audited by the IRS. During Cointelpro the IRS was used for harassment.(10)

Devices such as radar flashlights & millimeter wave devices, like the ones used at airports may be used. The Life Assessment Detector System (LADS) developed at Georgia Tech was apparently created to rescue people trapped in rubble, avalanches, or other disasters. It has a range of about 135 feet can & can detect heartbeat & respiration. It can also be configured to track a specific person s movement inside a building.(11)

19.

arrival or departure. The event may also be a part of a noise campaign consisting of an alteration of other types of noises, which may last a portion of the day or all day.

Synopsis-

The event lasted for 5 minutes; longer than normal (Duration).

In addition to length of the event being extended, the number of times each act occurred within the event was increased (Frequency).

Ex: Multiple, repeated doors/trunk slamming from cars, even if a single individual is at the vehicle. This event also happens many times throughout the day (Frequency).

Each individual act of door/trunk shutting was amplified by the deliberate slamming of each door to produce a louder than normal noise (Intensity).

In essence, the event was louder, contained more activity (acts), & lasted longer than normal to produced a wellconcealed covert attack. This basic formula is used with many of the tactics outlined below. The frequency & duration formula is also used in Mobbing tactics.(8) In addition to the overuse of an individual tactic, these tactics are combined & used in a round-the-clock fashion, which amplifies their potency. Some of these tactics are categorized as Street Theatre. Street Theatre takes place when perpetrators harass you out in public using information about your personal life which was gleaned by surveillance.

Some of these tactics are deliberately designed to make someone appear as though they’re suffering from a mental disorder. This, coupled with the fact that most targets are so emotionally drained & can’t properly identify or explain what is happening to them makes them fish in a barrel. According to the DOJ, mental tactics designed to cause psychological harm must last for months or years before they constitute torture.(390) Organized Vigilante Stalking fits this description. Countries around the world, including the U.S., have used doctors to help abuse people, often for political reasons.(27) It is also a documented fact that there was collaboration between doctors & the military when experiments were carried out in prisons, hospitals, & universities on unwitting people.

Journey Into Madness-The True Story of Secret CIA Mind Control And Medical Abuse, Gordon Thomas

“What remains for me the most disturbing aspect of my investigation is that even as I write, and later when it is read, there are physicians who continue to participate in torture. Nothing I had researched before could have prepared me for the dark reality of doctors who set out to deliberately destroy minds and bodies they were trained to heal. The realization that physicians are part of a killing machine provokes a special horror.”

The DSM-IV is a diagnostic manual for identifying mental disorders. It is periodically put out by the APA. You don’t need to purchase one of these manuals, as it is also available online at the following sites:

http://www.psychologynet.org/dsm.html & http://www.psychnet-uk.com/.

Here’s what happened: They collaborated with mental health specialists & designed a harassment program around key paranoid delusional symptoms outlined in the DSM-IV manual, so that a target will appear ill when explaining this to a mental health professional, & friends/family. It is one of several layers of protection used to help keep groups operating in secrecy.

Microwave mind control: Modern torture and control mechanisms eliminating human rights and privacy

Dr. Rauni Leena Kilde, Former Chief Medical Officer of Finland

Report-September 25, 1999

The Psychiatric Diagnostic Statistical Manual (DSM) for mental disorders has been a brilliant cover up operation in 18 languages to hide the atrocities of military and intelligence agencies’ actions towards their targets. The manual lists all mind control actions as signs of paranoid schizophrenia. — all medical schools teach their students that the person is paranoid, ESPECIALLY if he believes intelligence agencies are behind it all. Never is the medical profession told that these are routine actions all over the world by intelligence agencies against their targets.

13.

witness people breaking down or fainting in front of them, as a result of being systematically Mobbed out in public.

Once more, there is much we don’t know about these groups.

However, we do know that some of them receive some type of training that is apparently designed to put their conscience aside when harassing targets. When you combine certain desensitizing drills with lies, you can get some people to do things that they normally would not do. These people are basically the unwitting equivalent of the Nazi Brownshirts, but they wear plain-cloths & instead of physical harm, they use psychological violence.

Terrorist Stalking in America, David Lawson

Most group members have only a general idea of the ideology of the group but they don t particularly care. They are having fund with their friends and that fun involves stalking and harassing various targets They believe that they are justified in engaging in these actives because of the higher purpose of the group. Most never know the true purpose of the group.

I don t agree with everything David Lawson has to say about Cause Stalking groups. And although he may not have had an understanding of the entire scope of this system, I do agree with some of the information he has provided. Also, there is a correlation between the groups that participate in Gang Stalking mentioned in the book Terrorist Stalking in America, groups recruited into the community crime-watch programs, & groups that targeted people across the country believe are participating in community-based harassment. This suggests that some community-crime watch programs are being misused.

The community volunteers can be further broken down into smaller groups:

-Religious organizations

-Senior citizen groups

-Restaurants, merchants, retail stores

-Neighbors

-Students in high school or college

-City workers

-Children of parents who participate

-Janitors

-Landlords

-Fire Departments

-Ambulances, utility, & postal vehicles

-Taxis

-Police

-Local ethnic or cultural organizations

Some of these people are from organizations that you think would know better. Leuren Moret, a geoscientist & president of an organization called Scientists for Indigenous People, is currently targeted after becoming a whistleblower at Livermore Lab. She discovered that more than 500 people experienced similar Mobbing at the University of California & had their lives & careers destroyed. She wrote a well-documented report titled, Uncovering The Truth About Depleted Uranium where she explains how her child was even targeted & harassed by schoolteachers.

Here she refers to Gang Stalking as Mobbing.

Uncovering the Truth About Depleted Uranium, Leuren Moret

Mobbing is the purposeful and strategic institutional gathering of all information about an individual by using any method legal or illegal. Contact for this purpose is made with neighbors, classmates, former partners, family members, former employers, teachers, church members, good friends and even your family tree everything must be known about the support system around you that makes your life possible. The assessment of strategic resources and future income (finances, mobility, cars, insurance, credit cards, bank safety deposit boxes, post offi ce boxes, wills, health records, birthcertifi cates, transcripts and photographs) is

12.

They are basically training members of the community as organized government informants to spy on &monitor their neighbors.(359) Some of these people may be recruited into VIPS, NWP, or other programs under Citizen Corps. These community-policing volunteer programs are all sponsored by the Department of Homeland Security.(107)

According to the FEMA website & news articles, one in 24 Americans will be engaged in spying on citizens.

But what does monitoring really mean? Well traditionally it has meant harassment of some type. This is organized insanity.

TIPS appears to be a bulked-up version of a community-policing program. Even though the TIPS program was officially rejected by congress, it & similar programs are being used aggressively across the nation.(109) These programs have lots of different names, TIPS, VIPS, Weed And Seed, Cat Eyes, Talon, etc. But who is the threat?

According to some of these documents it means criminals & terrorists. However, the definition of a terrorist in section 802 of the US Patriot Act is frighteningly vague. Basically it defines terrorism as any action that endangers human life or that violates state or federal law. Historically, similar programs have been used on political dissent, activists, & whistleblowers. The East German Stasi recruited citizen informants as a requirement for security & proof of their loyalty to the party. It was later discovered that the regime had even recruited informants to spy on their own family members.(391)

US Planning to Recruit One in 24 Americans as Citizen Spies

Monday, 15 July, 2002 Sunday Morning Herald | SMH.com.au, by Ritt Goldstein

The Terrorism Information and Prevention System, or TIPS, means the US will have a higher percentage of citizen informants than the former East Germany through the infamous Stasi secret police. TIPS volunteers are being recruited primarily from among those whose work provides access to homes, businesses or transport systems. Letter carriers, utility employees, truck drivers and train conductors are among those named as targeted recruits. informant reports will enter databases for future reference and/or action. The information will then be broadly available within the department, related agencies and local police forces. The targeted individual will remain unaware of the existence of the report and of its contents.

There are military exercises taking place across the country using a combination of soldiers, civilians & local police.(361, 363) During some of these exercises they have the military conducting searches & interrogations using civilians volunteers.(362) There is footage available that shows children acting as scouts & riding around on their bicycles to help detect houses where potential gun owners live.(151)

We know that during these drills they have role-playing exercises where the soldiers arrest citizen volunteers with plastic handcuffs & seize their firearms. They have these volunteer actors use phrases such as We want food, I m an American, Please don t take my gun, etc.(151) This is probably done in order to desensitize the soldiers, so they wouldn t feel pity or shame for arresting American citizens, seizing their guns & putting them in camps.

Cause Stalking group members receive training on a variety of activities that they are to perform without question.(7)

At this point we don t know where, or for how long their training is. But it is likely that there are similar role-playing exercises to desensitize them, & that they are given canned responses to anticipated remarks such as, Stop harassing me, You were lied to, “Why are you harassing me, etc. It is possible that they also engage in skits where they

11.

this person & he would sometimes be given a choice of either going to jail or cooperating. Some of these people literally sold their whole families into these projects & received compensation. Some were elevated to a high status within their community for their participation. When this type of blackmail happens, these people are given a choice of either facing prosecution or working for an agency as an informant.

This can be done with prostitutes, drug dealers, & other first-time offenders. For the agency, this has the added benefit of having an informant working for them with no criminal record. Parents that have been compromised may use their children in community-based harassment.

Contractors/Military

They may be active or reserve armed forces. They may be white-collar civilian contractors that work for federal/state agencies, some appear to have ties to academic institutions.(101, 200) They may also be a private civilian security company contracted by the intelligence community. These are the perpetrators that seem to move in above, below, or next to a target when the harassment begins. These may also be the perpetrators who torture people in their homes from a distance using Directed Energy Weapons. Also, when being followed on a train or plane, it is likely that it will be by this type of perpetrator. These people are probably the ones who keep a watch on a target s residence. This is a part time or full time job for them. They may be operating on lies told about a person. However, they are being paid to carry out harassment.

Community-Policing & other local organizations

Targeted people across North American have reported that they believe that local community-policing organizations are participating in organized stalking. Although I believe this as well, I am not aware of any proof in either testimony from a group member, or in physical form, that confirms this belief.

Someone recommended that a target should join of these organizations for confirmation. This would be very difficult due to the tight system of control setup on targeted individuals, which includes 24/7 surveillance. There is not an organization that a targeted person, or their friend/family member could join without these organizers being aware of it.

However, just because it cannot be proven doesn t mean that it s not happening. Due to the sheer numbers of citizens now participating (many of them seniors & youths), one can conclude that organizers are drawing upon groups which contain large numbers of people. These groups are then recruited into some type of a community-policing program.

The federally sponsored community policing programs are then used by a federal agency or an official acting on their behalf.

For instance, part of the Weed And Seed program calls for a collaborative effort between local, state, & federal agencies, as well as community organizations, social services, private sector businesses & residents, to weed out undesirable individuals.(392, 393)

These citizens are endowed with a sense of responsibility & are confident that a program sponsored by the DOJ must be moral & legitimate. But lacking historical knowledge, they are unaware that they may be playing a small role inside of a larger program of state-sponsored terrorism, against those the Establishment has deemed undesirable.

Middle schools, High Schools & Universities are fertile recruiting grounds for junior policing groups. Some of these policing groups are restricted to school grounds while others are not.(330-334)