Thehiddenevil\’s Weblog


27.

you make it conscious. If you make some of these unconscious communication behaviors conscious, you will probably have powerful means of persuasion. The study of this language has been called Social Kinesics (the study of body communication).

There are two components to this communication:

1. Movements, gestures, postures

2. Spatial relationships

The study of communication using distance/space is called Proxemics.

For most North Americans the intimate zone is 0-18 & personal space 1 ½ -4 ft.

This type of communication is used to harass a person. For instance, while in stores, restaurants & public places that are not busy, a target will have people crowding around them, invading their personal space. This happens even if there are only two customers in a store. If a person makes a move from one place to another in a store several people may suddenly appear & jump out in front of him from around corners & isles. A common experience reported is the sudden movement of a crowd of people into a checkout line that a target is moving toward.(7) These blitz attacks also happen outside. This can be detected by getting up, moving in one direction, then stopping & watching.

If you’re targeted, you’ll see a wave of people move in the direction that you were headed toward, to swarm you & cut you off. If you wait for a few moments you’ll see that activity will settle back to normal again after they pass. This test can be run indoors & outdoors as well. Sometimes they may blatantly adjust their timing, or linger for a while until you begin to move again, then they’ll continue. This program was tailored to represent a target as someone suffering from schizophrenia when explained to health professionals. This is no surprise, the intelligence community has worked extensively with the psychiatric industry.

Prolonged crowding can have an extremely negative effect on your mental/emotional health.(320-323) The people who designed this harassment program were well aware this. While some cultures may be more immune to crowding than others, even people from parts of the world that have been historically crowded react stressfully to crowding. People who have not been invited into your intimate space but deliberately violate it are committing acts of violence. The people that participate may justify their behavior because they serve a “greater cause” & don’t see their behavior as acts of violence. But the culmination of these tactics amount to no less than soul murder.

People of the Lie: The Hope for Healing Human Evil, Psychiatrist M. Scott Peck

When I say that evil has to do with killing, I do not mean to restrict myself to corporal murder. Evil is also that which kills spirit.

If you are an Organized Stalking target you ll be followed on foot & swarmed anywhere you go out in public.(7, 101)

Even on days/times that there are normally not many people. This happens in stores while making purchases, restaurants, businesses, where you have people constantly cutting you off, invading your space, using sensitivity programs, or other harassment tactics. Sometimes this is blatantly obvious. For instance, your in a fitness center at a time when it is not crowded, but you have multiple people who, instead of taking the shortest path to their destination, continue to go double or triple the distance just so they can brush by you, cut you off, etc. These collisions & crowdings amount to an obstacle course that follows you wherever you go. And this is only a part of the harassment.

Here is one personal example that took place at a YMCA in Boston, which occurred shortly after I realized I was being Gang Stalked. At the time, there were four people, including myself in the weight room. After I was there for a few moments I noticed there was an unusual amount weight banging. It was louder & more repetitive that it normally is.

I ve been exercising & going to health clubs for about 15 years & I immediately recognized that these few people were repeatedly going out of their way to make as much noise as possible. I sat down on a bench & started doing dumbbell presses. Two students walked in, stood on either side of the bench I was sitting at & began to do lateral arm raises,

Advertisements

25.

Once I had three separate recruiters from the same company in Burlington, MA ask the same basic questions, on three separate occasions. This was done repeatedly using accusing & mocking tones. For instance, during one conversation I was asked why I didn t have a reference from my former manager. This man asked me basically this same question multiple times. Recognizing that this may have been part of a Mobbing skit, I made it abundantly clear that I did not have a reference from my former place of employment, but that I had other professional references. He then hung up.

Later, this man called me back asking other questions in an accusing tone, & making negative accusations, such as What have you been doing, Haven t you been looking for work, We re a little concerned, Haven t you done anything at all since December? During the phone interviews he asked me if I had a reference from my former manager. This was done repeatedly, more than several times. I told him I didn t. Then he said he wanted to know the name of my former manager, just out of curiosity. I gave him the name, & he told me in a semi-threatening tone that he was going to call anyway. My conversations with the two other recruiters from this office in Burlington, MA were similar. Once more, these questions are asked repeatedly using accusing & mocking tones. These are classic Mobbing games. Some of these people have apparently just accepted the idea that they’re slave-cowards. Fortunately for them, all they need to do is look in the next cubicle for support. If this type of support were to be verbalized, it would go something like this, “You’re a loser, & I’m a loser, & it’s OK. I accept you as a coward, & you do the same for me.

And don’t worry, we’ll be protected in exchange for our obedience.”

Coward (kou’erd), n 1. a person who shows shameful lack of courage or fortitude. -adj. 2. of, pertaining to, or characteristic of a coward.

-Webster’s 1997 Edition

During an interview you may have potential employers demanding credentials that they did not list as a requirement in their AD. During phone interviews you may have employers telling you that you responded to an AD other than the one that you actually responded to. They may also tell you that they did not place the AD, or that they placed a slightly different one. They may also tell you that your updated resume says you re currently working at a place that you never worked at, or a place you worked at a decade ago.

Some harassment is masked in layers of accommodation to help strengthen the illusion that you re not working because you don t choose to. For instance, you may have recruiters who have harassed you in the past leave messages on your answering machine or with relatives/friends, indicating that there are opportunities available to you. It will be made to look as if you re unemployed due to your choice. This is the equivalent of standing in a crowd of people & stealthily poking a person in the back while others aren t looking. The general public may not realize that the Blacklisting mechanism exists because the institutions that use it operate most major news outlets. Reporters & historians are blacklisted for reporting corruption or historical facts that the government-corporate complex does not want the public to be aware of.(28, 346)

Book Review – Into the Buzzsaw: Leading Journalists Expose the Myth of a Free Press by Kristina Borjesson (Editor), Gore Vidal

(Foreword) http://www.mapcruzin.com- Editorial Reviews-Inside Flap

The buzzsaw is what can rip through you when you try to investigate or expose anything this country’s large institutions be they corporate or government want kept under wraps. Indeed, if members of the general public read this book, or even portions of it, they will be appalled.

Reporters who tattle risk losing their jobs and being blacklisted Writing in riveting, often gut-wrenching detail about their personal experiences with the “buzzsaw”–concerted corporate and/or government efforts to kill their controversial stories and their careers-

If you re Blacklisted & you re being harassed, you will probably not be able to prove it. Like all Mobbing & Organized Stalking tactics, it will be heavily concealed. Unless you know someone who owns a business or can get you in someplace, you will probably be unemployed. At best you may be underemployed. If you do find some type of employment, you may be Mobbed out the door after several weeks.

24.

Some tactics used to keep you Blacklisted include interfering with communications, & slander. Also there are lists & software packages used to check these lists for suspected terrorists, threats to national security, etc.(109)

Apparently this is a flourishing business & some organizations are required by law to use it.

The Surveillance-Industrial Complex:

How the American Government Is Conscripting Businesses and Individuals in the Construction of a Surveillance Society

The American Civil Liberties Union http://www.aclu.org, August 2004, Written by Jay Stanley

An entire industry has sprung up to produce software that makes it easier or companies to enforce the government s blacklists and other mandates. An example is Homeland Tracker, produced by a subsidiary of the giant database company Choicepoint to help any business comply with OFAC and USA PATRIOT Act regulations. The manual proudly touts the software s ability to get identity verification, check individual names, scan customer files and build personal accept and deny lists (otherwise known as blacklists).

Federal law enforcement have sent watch lists to corporations containing names of individuals that were not under official investigation or wanted, but that the agency just had an interest in.(390) We already know that some of these agencies are targeting & harassing citizens. Would it not be reasonable to conclude that they are misusing this resource as well?

Big Business Becoming Big Brother

Wired NewsWire 02:00 AM Aug, 09, 2004 EDT, By Kim Zetter

The ACLU released the Surveillance-Industrial Complex report to educate the public about how information collected from them is being used. The report notes that there is no way to determine how many job applicants might have been denied work because their names appeared on the list. “It turns companies into sheriff’s deputies, responsible not just for feeding information to the government, but for actually enforcing the government’s wishes, for example by effectively blacklisting anyone who has been labeled as a suspect under the government’s less-than-rigorous procedures for identifying risks,” the report states.

In addition to slander & keeping you unemployed, they may also use companies or recruiters in harassment campaigns (Mobbing). This is particularly the case with recruiters. It appears that they are often used to try to further traumatize a person using Mobbing tactics during interviews. For instance, they may ask you a series of questions for which you have to answer no to, such as asking you for credentials that you did not list on your resume.

They may ask you if you possess skill-sets which were not listed on the AD they had placed. This is designed to further humiliate you. These things happen to everyone once in a while. But with Mobbing, these things are done repeatedly by multiple people, time after time. There is basically a safe zone that these people can harass you from with little fear of being caught.

One common ploy used by recruiters is that they ll tell you that they don t have your resume in front of them. This tactic may widen the harassment scope by allowing them to ask potentially painful questions that are already answered on your resume. These questions are asked with ACCUSING, or MOCKING tones. They are designed to try to stir up negative emotions associated with a previously painful work environment. They may ask these questions repeatedly using a slightly different syntax such as, What was your last job?” Are you still there?” [When they know you’re not]

“How was the environment?” [If you were Mobbed] “So, you ve been unemployed since?” “So…you ve done nothing at all since?” “Why aren t you working?” [Accusing tone] “Haven t you been looking for work? Recruiters are paid by corporations to provide a service, (people). When you think about it, recruiters are actually employees of corporations, only they work in remote offices. Just as an in-house employee will participate in Mobbing out of fear of termination, or retaliation, these virtual employees are easily co-opted.

Mobbing-Emotional Abuse in the American Workplace, Davenport, Schwartz, Elliot

Mobbing sometimes continues after individuals have left the organization. Although this can rarely be proven, slandering continues… This ongoing mobbing, even after the individuals are no longer connected with the organization, seems to justify the Mobbers previous behavior & upholds the organization s decision. They try to defend themselves by continuing to destroy the victim s reputation… Dianna: the next minute I thought, Howe can all these people just go along with this? Yet I would think, I can t blame these people. I know they have to go along with this for their own survival

23.

Surreptitious break-ins, thefts, sabotage & planting drugs, bugs or other items in people s homes & offices were a staple part of Cointelpro.(10) They may also take items from your car & plant them in your home, & vice versa.(7)

Framings

This can be done over the Internet with Trojan horse viruses. Since they have federal connections, they do have the ability to frame a targeted person for crimes out in public as well using informants.(101, 7) Any weakness a person has can be used in one of these setups. A person may not be aware of some of these set-ups, but they may be added to a case file to assist with the smear campaign. They may try to provoke a confrontation when Mobbing you out in public.

Terrorist Stalking in America, David Lawson

Group members also try to entice the target to assault them, but this is never done without having witnesses present. The criminal conviction of the target, following the testimony of numerous concerned citizens can be followed by a civil lawsuit.

Sabotage & Vandalism

This happens at home & in the workplace. Electronic equipment may constantly be failing. This may be accomplished with the e-bomb or a similar device.(309, 310) Projects you ve worked on the previous day may become broken.

Many times this vandalism is usually just below what you d report to the police. For instance, a small but noticeable portion of your masonry has been chipped off, & a crack has appeared in one of your windows. Again, frequency & duration. This may be restricted to minor vandalism, just to let you know that you re being stalked. However largescale property damage is also done to vehicles, such as slashed tires, broken windows, tampering with break lines, destruction of electrical equipment.

Vandalism & pets being tortured may also be in retaliation for you taking action to expose them. In addition you may have dead animals & litter thrown into your yard. Some targets have reported that their pets die suddenly of mysterious illness. For instance, they come home to find a perfectly healthy animal dead. Others have noticed that their pets have been mutilated.(101)

Mail interference

During the old Cointelpro they would blatantly watch homes, follow cars, & open mail.(10) The idea was to get as much info as possible to aid in the harassment & intimidation. Currently some targets also experience tampering with mail, altering, delaying or disappearing, & email being filtered/blocked.(100, 101) These Cause Stalking groups may use children to steal your mail, or they may enlist the aid of the post office.(7)

Pranks

You may receive pranks by people & recordings.(101) The pranks may pertain to an important event that is unfolding in your personal life. Once again, information gleaned from surveillance is used for harassment. The phone has historically been an excellent harassment tool. It is also used as a synchronization tactic. You may also have people knocking on your door for whatever reason.(7)

Blacklisting

Gang Stalking groups will interfere with every personal & business relationship you have.(7) Since they are statesanctioned they can easily keep you unemployed. Job opportunities will be trashed. They get paid to make sure that you don t. Most targeted people are unemployed. Many would be homeless if it weren t for parents, siblings, or friends. If you re targeted & are lucky enough to still be employed, you may be harassed into leaving by your employer & coworkers.(101) You may have a successful interview & are virtually guaranteed the job, but never hear from the prospective employer, & they don t return your calls to tell you what went wrong.

According to an article in The Christian Science Monitor titled Blacklisted by the bank, Blacklisting was originally used as a foreign-policy tool.(391) At some point federal organizations decided to start using it on individuals as well.

22.

to assist federal law enforcement, or the intelligence community with Gang Stalking campaigns. My point is to illustrate the mind-set of some groups of people who have reason to believe a person is a pedophile. The PJ group is run by Xavier Von Erck (real name Phillip John Eide).

Upon visiting a site called Corrupted-Justice http://www.corrupted-justice.com, I discovered that members of Perverted-Justice have endured trauma such as incest or other forms of sexual abuse & are suffering from a variety of mental illnesses. The Corrupted-Justice site obtained this information from member profiles which are publicly available, & located at the Perverted-Justice website. And according to CJ, Eide is on record saying that more than 40% of his followers have endured this type of sexual abuse.

The CJ site also has some very interesting message board chats (publicly available) by PJ members that are worth a look. Apparently the CJ people have documented proof that members of PJ have hacked into the their web server. The CJ people are for the full prosecution of potential sex offenders by using law enforcement equipped with the checks & balances built into the legal system. The CJ group basically says that although the PJ system appears to be beneficial, it is heavily corrupted.

Most PJ busts do not include law enforcement. According to the article in the Toronto Star & the CJ website, the volunteers at PJ instead begin a relentless campaign to expose people they believe are pedophiles by calling friends, neighbors, children, places of employment & ruining personal & professional relationships.(388) PJ is listed as a potential destructive group by the Rick A. Ross Institute For The Study of Destructive Cults, http://www.Rickross.com.

It appears that some PJ members have a psychological need to feel powerful & meet that need by displaying to the public & their targeted person how they can destroy a life. I believe that some of these volunteers are ill & have latent sadistic intentions despite their patriotic motives. Apparently some of them receive a sick type of enjoyment/empowerment by ruining the lives of people. Both sites are worth a look at http://www.perverted-justice.com & http://www.corrupted-justice.com.

Character assassination is standard & group members may call to inform the police that a target is performing something illegal such as drinking & driving.(7) This type of community service is known as Rat Fucking. It is the author s belief that group members will also masquerade as concerned citizens & call local officials to register destructive complaints (lies/setups) about a targeted person. Having a person Rat Fucked in this way can be very damaging, especially when the complaints originate from multiple, seemingly unconnected individuals.

Thefts & Break-ins

This happens in & around the home as well as the workplace if the target is fortunate enough to be employed. Thefts may be reduced to small inexpensive items. But some targets have reported jewelry, passports & other important items stolen. Small things such as pens, shoes, & silverware are taken or tampered with so that you will seem delusional if you report this to the police. The logic is that a thief would never break into your home & leave a computer, stereo or other valuables & just steal a toothbrush, or pour out a portion of your milk.

There is usually no sign of forced entry.(101) This is the case even if there is a Hi-Tech security system in place.

Psychological warfare tactics are sometimes employed such as moving bits of furniture or clothing slightly out of place.(100) Items may be stolen & brought back at a later date, & they may move items & place them in a slightly different spot.(7) This is done to let you know that they ve been in your home. These cults are obsessed with all aspects of a targeted person s life. Personal items may be passed around to group members & are apparently symbolic of the control the group has over their target.(7)

Gaslighting tactics may be employed such as filling your gas tank, or substituting items of clothing with ones one size smaller.(9) Targets have reported clothing being ripped, milk, coffee & other items poured out, & small-scale damage.

21.

SoldierVision A1, a radar flashlight, has a standoff distance of 30 feet & can detect motion behind a wall at 30 feet as well. These flashlights have been steadily researched using military & university testing labs since the 1990s.

Raytheon is working on a Through The Wall (TTW) technology that will allow the device to wirelessly transmit output to a laptop up to 300 feet away.(354) Some of these flashlights display images in 3D format, can detect respiration, & can see through, wood, brick, plasterboard, glass & concrete.(355, 356) Remember, this is a professional harassment service run by former or current military or federal law enforcement. They have the latest everything. If you’re being targeted, you may also be bugged & your phone may be tapped.(7)

The Professional Paranoid-

How to fight back when Investigated, Stalked, Harassed, or Targeted by any Agency, Organization, or Individual, Michael Sweeney

They would think nothing of throwing dozens of people & vehicles into an operations, planting a dozen $80,000 bugs, buying or leasing property nearby, or other equally expensive contingencies.

Smear Campaign

The bogus investigation may be used to launch a smear campaign. Lies & character assassination may be used.(7)

These lies will be very strategically & deliberately spread into your personal & professional life. Informants may be used to help facilitate the insertion of these lies. The usual rumors spread about a target are that he is a pedophile, prostitute, terrorist, racist, anti-government, mentally ill, rapist, drug addict, or drug dealer. Rumors will be spread to neighbors, friends, family, employers, etc.

When gaining support in the campaign they may include pictures or statements made by someone who is accusing you of something. During Cointelpro some investigations were done for the sole purpose of discrediting & smearing targeted people & groups. Although Organized Vigilante Stalking campaigns are much wider in scope than Cointelpro, we now know that these agencies will engage in character assassination. These statements will be from group members or informants that have been paid to help set you up. Personal & professional opportunities may be trashed.(7, 101) At this point you may also be Mobbed out of the workplace & become unemployed. You will never have a chance to refute these lies, as they will be propagated behind your back by multiple people. Some of the people spreading these lies may be acquaintances &/or family members that have been recruited (lied to, intimidated & blackmailed) as informants.

Gaslighting-How To Drive Your Enemies Crazy, Victor Santoro

“The essence of defaming your target with rumors is it that it not get back to him.”

The reason that labeling someone a pedophile is common is because it is probably one of the worst rumors you could launch against someone. There have been multiple magazine & newspaper reports of pedophiles being harassed by neighbors, & vigilante groups to the point where they are driven out of communities & forced out of work.(349, 351-353) Some have been driven out of multiple states.(350) The people who participate in the harassment may be told that the target needs to be driven out of town so that he doesn t get to do what he did in the last town.(7)

We are a citizen s group that helps the police. We are tryiing (sic) to alert people in the area about this person, before he gets to do what did (sic) in the last place he lived.

-Quote from a group member in Terrorist Stalking in America, David Lawson

The organizers realize that labeling someone a pedophile will be most damaging & give them optimum leverage for gaining community support.

An article in the Toronto Star titled Vigilantes versus pedophiles Sunday August 8 2004 outlined how one citizens group called Perverted Justice http://www.perverted-justice.com, would begin a campaign to expose people that hey have concluded are potential (wannabe) pedophiles. I am not indicating that Perverted Justice is being used as a supplement

20.

Investigations The bogus investigation appears to be the platform used to launch the smear campaign & remove a person s support structure. Bogus investigations using a person s friends, family, & employers appear to be a standard part of the Organized Stalking package. This is done to isolate you. Friends, family members or employers may be given a gag order & told that under no circumstances are they to tell you that an investigation is being conducted.

The people who organize these harassment programs will try to assassinate your character.(7, 200) They will carry a case file on you that they will use for character assassination & to gain community support.(7) When recruiting neighbors they will probably show them this case file & indicate that you are the target of an investigation. This case file will contain a combination of half-truths, setups & outright lies. The case file may contain information about a person or people who have complained about you. These are most likely informants (civilians paid or given favors to help frame you). Or they may simply say that you’re under investigation but they can’t disclose why for reasons of national security. The “reasons of national security” blanket has been used by some federal agencies to help frame people for crimes as well as cover up mind-control & torture.(368, 13)

Their informants may be a single person used to help frame you, such as a tagger. Or they may be multiple people, perhaps related to each other. Again, these stalking groups usually have hundreds of local members. During Cointelpro, there were routine setups, & fabricating of evidence used to destroy a person s character or have them imprisoned.(10) They may string together arbitrary pieces of unrelated incidents from your past & arrange them in such a way that it paints an extremely bad picture of you when gaining support of your neighbors, landlord, family & friends. They can recruit stores & restaurants using the same method, & they may even have informants working in these establishments. Remember, one in twenty-four citizens will be called upon to be an informant.

Their case file of you may indicate that you are a probable rapist, pedophile, drug dealer, prostitute, terrorist, or racist, that they are investigating. Or they may tell these people they can’t say why, for reasons of national security.” They’ll be told that they will be doing their country/community a great favor by cooperating. However, labeling someone a pedophile seems to be quite common.

They will set up a base of operation in your neighborhood to conduct surveillance.(7, 101, 200) This will probably be next to your home or apartment. They will sublet, lease, rent property above, below or to the sides of your living space to do this.(7, 11, 200, 101) Money is no object as they have an unlimited budget. Half-truths, setups, & outright lies WILL be used. If you re an Organized Vigilante Stalking target, the investigation is not a means to an end, it is an end unto itself.

Surveillance

Terrorist Stalking in America, David Lawson

Surveillance (sic) on a residence by using triangulation. They watch it from three different positions. Surveillance is conducted 24 hours a day, 7 days a week. When a target leaves his residence they will alert the group, either by cell phone or business band radio. Other members, who are patrolling the perimeter will race to the location to begin pursuit. They patrol the area they live in 24×7. When they are riding around in their groups they feel invincible. Following and harassing various targets is part of their daily activities when they are on patrol.

If you re targeted, the group will be watching your home from their bases of operation using triangulation.(7)

Neighbors will be told that they’ll be doing their country a great favor by allowing them to occupy space in their home until the investigation is complete. If neighbors don’t cooperate, they may be targeted, or audited by the IRS. During Cointelpro the IRS was used for harassment.(10)

Devices such as radar flashlights & millimeter wave devices, like the ones used at airports may be used. The Life Assessment Detector System (LADS) developed at Georgia Tech was apparently created to rescue people trapped in rubble, avalanches, or other disasters. It has a range of about 135 feet can & can detect heartbeat & respiration. It can also be configured to track a specific person s movement inside a building.(11)

19.

arrival or departure. The event may also be a part of a noise campaign consisting of an alteration of other types of noises, which may last a portion of the day or all day.

Synopsis-

The event lasted for 5 minutes; longer than normal (Duration).

In addition to length of the event being extended, the number of times each act occurred within the event was increased (Frequency).

Ex: Multiple, repeated doors/trunk slamming from cars, even if a single individual is at the vehicle. This event also happens many times throughout the day (Frequency).

Each individual act of door/trunk shutting was amplified by the deliberate slamming of each door to produce a louder than normal noise (Intensity).

In essence, the event was louder, contained more activity (acts), & lasted longer than normal to produced a wellconcealed covert attack. This basic formula is used with many of the tactics outlined below. The frequency & duration formula is also used in Mobbing tactics.(8) In addition to the overuse of an individual tactic, these tactics are combined & used in a round-the-clock fashion, which amplifies their potency. Some of these tactics are categorized as Street Theatre. Street Theatre takes place when perpetrators harass you out in public using information about your personal life which was gleaned by surveillance.

Some of these tactics are deliberately designed to make someone appear as though they’re suffering from a mental disorder. This, coupled with the fact that most targets are so emotionally drained & can’t properly identify or explain what is happening to them makes them fish in a barrel. According to the DOJ, mental tactics designed to cause psychological harm must last for months or years before they constitute torture.(390) Organized Vigilante Stalking fits this description. Countries around the world, including the U.S., have used doctors to help abuse people, often for political reasons.(27) It is also a documented fact that there was collaboration between doctors & the military when experiments were carried out in prisons, hospitals, & universities on unwitting people.

Journey Into Madness-The True Story of Secret CIA Mind Control And Medical Abuse, Gordon Thomas

“What remains for me the most disturbing aspect of my investigation is that even as I write, and later when it is read, there are physicians who continue to participate in torture. Nothing I had researched before could have prepared me for the dark reality of doctors who set out to deliberately destroy minds and bodies they were trained to heal. The realization that physicians are part of a killing machine provokes a special horror.”

The DSM-IV is a diagnostic manual for identifying mental disorders. It is periodically put out by the APA. You don’t need to purchase one of these manuals, as it is also available online at the following sites:

http://www.psychologynet.org/dsm.html & http://www.psychnet-uk.com/.

Here’s what happened: They collaborated with mental health specialists & designed a harassment program around key paranoid delusional symptoms outlined in the DSM-IV manual, so that a target will appear ill when explaining this to a mental health professional, & friends/family. It is one of several layers of protection used to help keep groups operating in secrecy.

Microwave mind control: Modern torture and control mechanisms eliminating human rights and privacy

Dr. Rauni Leena Kilde, Former Chief Medical Officer of Finland

Report-September 25, 1999

The Psychiatric Diagnostic Statistical Manual (DSM) for mental disorders has been a brilliant cover up operation in 18 languages to hide the atrocities of military and intelligence agencies’ actions towards their targets. The manual lists all mind control actions as signs of paranoid schizophrenia. — all medical schools teach their students that the person is paranoid, ESPECIALLY if he believes intelligence agencies are behind it all. Never is the medical profession told that these are routine actions all over the world by intelligence agencies against their targets.