Thehiddenevil\’s Weblog


34.

Messages-The Communication Skills Book, Matthew McKay, Ph.D., Martha Davis, PhD., Patrick Fanning

It s hard to defend against the anger & disapproval expressed in negative metamessages The attack is often so subtle that you aren t aware of exactly how you ve been hurt The basic function of metamessages is to say something covertly that you re afraid to say directly. Since metamessage attack is covert, there is little chance of overt retaliation.

These subtle whispering sneer attacks, & verbal barbs attacks may work best when done repeatedly, & after a person been loosened up with a more overt type of harassment such as noise campaigns, collisions, crowding, & sensitivity tactics. Within a conversation, certain weighted words can be emphasized. Volume, tone & tempo can be changed so that some words are slightly louder & spoken longer than the others. This can completely change the meaning of a message.

The following is a quotation regarding imbedded questions & suggestions as outlined in the book, Patterns Of The Hypnotic Techniques Of Milton H. Erickson, M.D., by NLP experts Richard Bandler & John Grinder. The example at the bottom titled Indirect Imbedded Command is exactly as it appears on page 173, where the weighted words (suggestions) that are to be emphasized when spoken are bolded. Note: When Erickson speaks of the dominant & nondominant hemisphere, he is referring to the conscious & unconscious mind respectively.

Patterns of Hypnotic Techniques of Milton H. Erickson, M.D. Richard Bandler & John Grinder

“They very often are a presupposition of some other command and serve to distract the dominant hemisphere by having it utilize the internal dialog These imbedded questions are most effective when they are stacked together to maximally distract the dominant hemisphere.

Imbedded commands serve the purpose of making suggestions to the client indirectly and, thereby, making it difficult to resist in any way…

These are most effective when they are also marked analogically by emphasizing the command and by looking intently at the listener, if their eyes are open.”

“Indirect Imbedded Command: “My friends tell me to feel comfortable and to loosen up when we are out on the town.””(4)

Below is an example of how groups use these suggestions to harass people. Bolded words indicate ones that are emphasized.

Situation:

You ve been blitzed with noise campaigns, crowding & collisions on your way to the bus stop. You feel like you ve been through a minefield & have been hit multiple times (you have). Your heart is pumping. You sit down on the bus  begin to relax. A couple sits down across from you & begin a conversation. You overhear bits & pieces of it.

Person 1: His car isn t working.

You: You think, My car is in the shop.

Person 1: They think it s the battery.

You: What a coincidence, my car is getting a new battery, you say to yourself.

Now that they have your attention, the conversation unfolds like this

Person 1: I saw him last week, his car looks bad.

Person 2: That s HORRIBLE What s wrong with it?Person 1: It just keeps

breaking down.

Person 2: I don t want to be in that car in case it should just flip out!

Person 1: That s insane!

Person 2: I hate to see him like that.

Person 1: He s crazy for keeping it. He knows it just keeps breaking down.Person 2: I know

he is. It just broke down so many times

Person 1: Not to be paranoid, but he should just give up on it.Person 2: You re not

being paranoid, but I don’t trust that thing on the highway.

Person 1: Is that crazy or what, is that being insane?

Person 2: he s nuts for keeping it. I told him he s crazy.

26.

A lot of this began with early experimentation on military bases where the spouses of military personnel & their children where targeted. It s really just terrible. And of course your economic or your financial state is destroyed. They absolutely make people loose all their jobs; it s impossible for them to ever work again. -Leuren Moret, president, Scientists for Indigenous People, former City of Berkeley Environmental Commissioner CFRO 102.7 FM August 8th 2005, Topic- Electromagnetic Weapons: The Technology of Political Control

Collisions & Cut-offs

The cut-offs I m talking about here are usually not physical. They re fabricated, but like most Gang Stalking tactics they are designed to look like normal cut-offs that we all experience from time to time. They can happen with vehicles, on foot, or a combination. This type of space invasion is designed to startle you & create tension. It can be thought of as a virtual slap. They are used in blind areas such as corners, hallways, restrooms, or intersections where you constantly have people or cars cutting you off, or almost hitting you. The perpetrator is unseen until he jumps out in front of you. This happens in stores, buildings & on the street, with people & vehicles. Generally, anywhere there is a blind corner.

With some artificially induced cut-offs, the perpetrator is seen at a distance. You & the perpetrator(s) are heading toward the same focal point. It may be a corner, a very small walkway, or a path that cannot accommodate both of you.

They will adjust their timing & rhythm to yours so that they always meet you at that point, so that you will have to squeeze through, stop, or go around because of their deliberate adjustment of timing. The idea is to get your attention & make you uncomfortable. If you re a target, their timing will mirror yours so that a collision will occur.

For example:

[You re on foot & approaching a corner of an intersection, which you are about to cross. You see a vehicle approaching the street you need to cross. There is plenty of time & distance to avoid this collision. Anticipating this, you either speed up or slow down. The vehicle mirrors your actions. You start to think that maybe this person is occupied with something else & you begin to cross the street. As you step off the curb, the vehicle speeds up & meets you at the intersection. The vehicle stops ten feet from you & the man inside waves you on. After this you might fee slightly angry because you know the whole event could have been avoided.]

In a normal situation, both parties will naturally adjust their timing & rhythm to avoid this situation. The main objective is to cause an unnecessary inconvenience. Again, these are usually not physical collisions, they re designed to invade your space & make you unconformable. In addition, people have reported staged accidents with their cars & narrowly escaping death.(101, 200)

Frequency, duration, location & proximity. Early in the morning on a day that is not crowded, it is not normal to have people repeatedly cutting you off inside stores with their shopping carts, or jumping in front of you as you enter a checkout line, or out in the street. These collisions amount to an obstacle course that follows you wherever you go.

And this is only a part of the harassment.

Blocking, Swarming & Space invasion

In parking lots, on foot, on the road, in stores & restaurants. These are staged events that may temporarily prevent you from leaving if you re in a parking lot.(7) You will always have people who you have to go around, or say excuse me to, & people stopping short in front of you to tie their shoe or pick up a coin.

Terrorist Stalking in America, David Lawson

Staged events would included blockading a target s vehicle so he cannot get out of a parking lot. Staged events are used to prove the superiority of the group & they (sic) control the target s time.

Body language is more accurate & reliable than verbal communication.(5) A majority of these non-verbal behaviors such as mirroring, echoing, & pointing take place without conscious awareness.(5, 6) We point with our feet, our torso, our arms & hands, usually toward an object we’re interested in. Also, our eyes have a natural tendency to follow hand movement toward an object being pointed at. Most of this non-verbal communication is unconscious, that is, unless

24.

Some tactics used to keep you Blacklisted include interfering with communications, & slander. Also there are lists & software packages used to check these lists for suspected terrorists, threats to national security, etc.(109)

Apparently this is a flourishing business & some organizations are required by law to use it.

The Surveillance-Industrial Complex:

How the American Government Is Conscripting Businesses and Individuals in the Construction of a Surveillance Society

The American Civil Liberties Union http://www.aclu.org, August 2004, Written by Jay Stanley

An entire industry has sprung up to produce software that makes it easier or companies to enforce the government s blacklists and other mandates. An example is Homeland Tracker, produced by a subsidiary of the giant database company Choicepoint to help any business comply with OFAC and USA PATRIOT Act regulations. The manual proudly touts the software s ability to get identity verification, check individual names, scan customer files and build personal accept and deny lists (otherwise known as blacklists).

Federal law enforcement have sent watch lists to corporations containing names of individuals that were not under official investigation or wanted, but that the agency just had an interest in.(390) We already know that some of these agencies are targeting & harassing citizens. Would it not be reasonable to conclude that they are misusing this resource as well?

Big Business Becoming Big Brother

Wired NewsWire 02:00 AM Aug, 09, 2004 EDT, By Kim Zetter

The ACLU released the Surveillance-Industrial Complex report to educate the public about how information collected from them is being used. The report notes that there is no way to determine how many job applicants might have been denied work because their names appeared on the list. “It turns companies into sheriff’s deputies, responsible not just for feeding information to the government, but for actually enforcing the government’s wishes, for example by effectively blacklisting anyone who has been labeled as a suspect under the government’s less-than-rigorous procedures for identifying risks,” the report states.

In addition to slander & keeping you unemployed, they may also use companies or recruiters in harassment campaigns (Mobbing). This is particularly the case with recruiters. It appears that they are often used to try to further traumatize a person using Mobbing tactics during interviews. For instance, they may ask you a series of questions for which you have to answer no to, such as asking you for credentials that you did not list on your resume.

They may ask you if you possess skill-sets which were not listed on the AD they had placed. This is designed to further humiliate you. These things happen to everyone once in a while. But with Mobbing, these things are done repeatedly by multiple people, time after time. There is basically a safe zone that these people can harass you from with little fear of being caught.

One common ploy used by recruiters is that they ll tell you that they don t have your resume in front of them. This tactic may widen the harassment scope by allowing them to ask potentially painful questions that are already answered on your resume. These questions are asked with ACCUSING, or MOCKING tones. They are designed to try to stir up negative emotions associated with a previously painful work environment. They may ask these questions repeatedly using a slightly different syntax such as, What was your last job?” Are you still there?” [When they know you’re not]

“How was the environment?” [If you were Mobbed] “So, you ve been unemployed since?” “So…you ve done nothing at all since?” “Why aren t you working?” [Accusing tone] “Haven t you been looking for work? Recruiters are paid by corporations to provide a service, (people). When you think about it, recruiters are actually employees of corporations, only they work in remote offices. Just as an in-house employee will participate in Mobbing out of fear of termination, or retaliation, these virtual employees are easily co-opted.

Mobbing-Emotional Abuse in the American Workplace, Davenport, Schwartz, Elliot

Mobbing sometimes continues after individuals have left the organization. Although this can rarely be proven, slandering continues… This ongoing mobbing, even after the individuals are no longer connected with the organization, seems to justify the Mobbers previous behavior & upholds the organization s decision. They try to defend themselves by continuing to destroy the victim s reputation… Dianna: the next minute I thought, Howe can all these people just go along with this? Yet I would think, I can t blame these people. I know they have to go along with this for their own survival