Thehiddenevil\’s Weblog


40.

Silent Sound can also be piped through the V2K medium & transmitted over a distance. So this means that subliminal messages can be transmitted over a distance, through walls, directly into a person s skull. In essence, into their subconscious mind. If Silent Sound is used in this manner most people will probably hear a slight ringing in their ear.

“All schematics, however, have been classified by the US Government and we are not allowed to reveal the exact details… we make tapes and CDs for the German Government, even the former Soviet Union countries! All with the permission of the US State Department, of course…

The system was used throughout Operation Desert Storm (Iraq) quite successfully.”

-Edward Tilton, President of Silent Sounds, Inc, S-quad letter dated December 13, 1996

Microwave mind control: Modern torture and control mechanisms eliminating human rights and privacy

Dr. Rauni Leena Kilde, Former Chief Medical Officer of Finland

Report-September 25, 1999

All our emotions, moods, and thoughts have a specific brain frequency which has been catalogued. If these records fall into the wrong hands, our behaviour and attitudes can be manipulated by persons whose ethics and morals are not in our best interest. Both military and intelligence agencies have been infiltrated with such persons.

Some targets have reported being hit with other more exotic types of weapons that cannot be explained with current unclassified technology. These weapons have been known to penetrate all types of shielding. There are people with experience in the engineering field that have spent time & money on building shelters that did not stop these signals.

U.S. TAPS HIGH-TECH ARSENAL/PENTAGON LIKELY TO DEBUT NEW WEAPONS IN IRAQ. (News)

The Cincinnati Post (Cincinnati, OH); 3/20/2003 Byline: Jim Krane Associated Press

“Once you’re engaged and you have a capability that’s almost ready, you’ll try it,” said Clark Murdock, a former Air Force strategic planner now with the Center for Strategic and International Studies. “All kinds of things have been invented, particularly in the (classified) world, that will be used. If you use it and it works and no one knows, why talk about it?”

One former NSA employee, John St. Clair Akwei, is one of a very few targeted people to file a lawsuit (Civil Action 1:92 cv 00449) against the NSA. They have been harassing him using classified directed energy technology for the last twelve years. His information is posted on http://emhdf.com

Jesus Mendosa who appeared on The Power Hour radio show also has a case. Apparently he used radiation detection devices to identify some directed energy attacks against him & his children. He has also been Gang Stalked. I am unaware of the status of these cases. These folks are pioneers because most people don t realize what s happening &/or are too drained to intelligently explain what is going on. However, would it not be reasonable to conclude that organizations with a documented history of experimenting, torturing, & harassing citizens would use these weapons on people? If that is the case, then is it not also reasonable to conclude that at least some of these claims that weapons are being used on citizens are true? And if that is correct, does this not constitute a severe violation of human rights?

Tactics Conclusion:

It is impossible & unnecessary to explain every variation of harassment. In addition, there are some tactics that are much more subtle that you may experience if you re targeted. Now you know why some people are driven to suicide.

These organizers may be more aware of some of your habits than you are. For instance, commonly used routes will be used as avenues for various types of Street Theatre that unfold as you pass through. Also, products such as specific brands of soap, shampoo, deodorant, etc that you use will be discontinued, or sold out in the stores that you frequent.

The neighbors who move in next door to you will have loud motorcycles, or cars.

In addition, these neighbors may be carpenters, mechanics, etc & will always seem to have noisy projects to work on.

Moving out of the community or state will not stop this harassment.(7, 101, 200) This is not only nation-wide but it is happening in all NATO countries.(200) It apparently is one component of a political movement that appears to be in

Advertisements

36.

Symbols, such as ones that represent Wicca or Satanism may be used, as can numbers, letters, or other types of symbols. According to Ted L. Gunderson, who has investigated cults for over 25 years, these subliminal attacks, such leaving articles of clothing out of place & moving furniture around have been historically used by Satanic cults when stalking their targets.

These perpetrators will follow you into restaurants & businesses where they will try to surround you, kick your chair, or harass you any way they can.(7) They ll usually sit near you & mention several topics that directly relate to your personal life. This is done both to harass you & to try to evoke a sense of helplessness in you by not being believed if you were to tell someone about the harassment. This type of harassment is designed to try to evoke a feeling of paranoia.(101)

This harassment is concealed to anyone else in the establishment. Some of the other patrons may recognize that something is not right with that group of people. This is probably because the tone, rhythm & volume of their conversation are not natural; they re rehearsed & artificial. It addition, there are natural gaps between words & sentences that are absent with this type of staged event. It s almost like bad acting. You may even see other patrons looking over at them with an expression of what s wrong with those people?

Gaslighting-How To Drive Your Enemies Crazy, Victor Santoro

whispering sneers-Another way to foster your target s paranoia is to make it clear that people are, indeed, talking about him. Sneering while you whisper will suggest that he s being mocked, causing a very uncomfortable feeling. …If you can get several accomplices to do this… he’ll get the feeling that mockery & ridicule of him are widespread.

Here s an example: Suppose you re selling your house & have listed it in several websites & publications. Your asking price is $400,000. The day after you ve posted your Ad you are sitting on a park bench & the following situation occurs:

[One person walks by &, glances at you with a smirk & says into their cell phone, I spent 400.00 . A few moments later a couple walks by & in a monotonous, loud manner one of them says, yeah but isn t that a bit too high? Then another person walks by shortly after & loudly says into their cell phone, yeah, I just didn t like it, you know how some houses just don t feel right. Then a moment later a person walks by with an Ad on their shirt for a real estate agency. Then when you get home, you receive a call from a real estate agent that you did not contact.]

As always, personal information gathered by surveillance is used primarily for harassment. This has been well documented, not only by countless targets & websites, but also in books such as The War At Home, by Brian Glick, &  Terrorist Stalking in American by David Lawson. Themes can also apparently be projected using collisions & cut-offs.

Children are used in Cause Stalking campaigns.(7) Parents who are group members routinely use them in crowding, cut-offs, or other harassment skits. Once, within a one-week period I had three separate groups of kids that looked like they were about 13- 15 years old walk up to me & ask me for a dollar to take the bus. This happened in three different locations. Then several days later another group of kids (making it 4 total) asked for some money for the bus as well.

These children could have been recruited by their parents, or through displays of power. They may also have been recruited through a junior community-policing or similar program.

Once in August 2005, when I was at St Anthony s feast, on two separate occasions two different girls about 5 years old walked by me with very short skirts. I thought it strange that their parents would dress them that way. This happened within about a 5-minute period. On both occasions, shortly after, a man would walk by & give me a blatant, disgustful stare implying that I was looking at them in a sexual way. If I had stayed longer, there probably would have been a third. Two days later, I was turning onto my street & a girl of about 8 years old walked passed me. After several feet, she looked back & stared at me with a shocking expression, then started running, & looking back at regular intervals.

She ran into her house, which is located on the same street I live on. Other targets have reported similar skits. If I was not aware that I was being systematically harassed, I probably would have written those off as isolated, strange

Posted in mobbing,Neuro-linguistic,Neurolinguisticprogramming,NLP,Occult,Stalking by thehiddenevil on August 26, 2007

35.

Person 1: Isn t that being dumb?

Person 2: I agree, I think that s just being stupid.Person 1: Whenever

he s down visiting, I bring it up but he gets so uptight Person 2: I know, he goes nuts with that car!

Person 1: I think he plans to take it to Florida, but he s not going to make it!

Person 2: He should start thinking about loosing it

The conversation above is an example of an embedded hypnotic suggestion that can be very effective if used under the right circumstances.(4) It keeps the conscious mind occupied with an erroneous conversation concerning a car breaking down, while the actual message is slipped into the subconscious, potentially affecting the desired emotions. It appears a variation of this message can be conveyed with multiple people blitzing a person with cut-offs while talking on their cell phones, looking directly at the person & emphasizing (metacommunication) weighted words &/or information about person s personal life that was obtained from surveillance. Groups will also use these phony conversations to harass targets in stores, restaurants, public places, elevators, etc. These overheard comments are intended to elicit a negative reaction within you.(101)

NLP-The New Technology of Achievement, Steve Andreas & Charles Faulkner

When we hear something, even from another conversation, we can t help but make images & sounds of it in our head. The professional persuader knows this intuitively. In NLP we know it explicitly. You cannot NOT communicate.

Symbolism appears to be a big part of subliminal attacks.(100) After a target has been sensitized, they can even be harassed, insulted, & threatened with symbolism using articles of clothing, newspapers, & other items. Just as body communication (Social Kinesics) is used to harass a target, so too is symbolic communication. Symbolism can be used with articles of clothing, especially during a wave attack where you are blitzed by a crowd of harassers who smile, laugh, stare at you, & cut you off as they pass by you. Some of the shirts I’ve noticed are “Stop & Die,” “Big Bro,”

“Watch Your Back” as well as Satanic & Wicca symbols. An attention-getting tactic may be used prior to a harassment skit.(7) It can be a cut-off, blatant stare, loud noise, or other sensitivity tactics. Remember how the perpetrators at the YMCA both used an attention-getting tactic? One man gave me a smirking stare & the other two swarmed me.

In essence, they will take an event that is unfolding in your personal life & make references to it using any number of methods. This has also been reported by people who have been temporarily stalked for days at a time during anticorporate rallies.(340) The theme may pertain to something in your personal life. They may play on this theme for a single day, a series of days, or weeks. In addition, they may choose a theme & try to project it into your life. Some survivors of government mind-control & torture have reported themes being used in behavior modification programs, & as entry points for control & future manipulation. Some include: Disney, Alice in Wonderland, Cinderella, Wizard of Oz, etc.(12) For Gang Stalking & Mobbing targets, themes are used in harassment skits.

Mobbing, also referred to by some as bullying, psychological terrorism, and organizational violence is described as a collective form of psychological violence in which many individuals unite to persecute an individual Mobbing is a way of destroying a person without using any physical means Degrading themes are often used to try to prevent people from coming forward.

-http://www.psychologicalharassment.com

Whether the perpetrators actually believe in a theme is inconsequential. The use of themes (sometimes Satanic) injected into occult crimes assist with trauma, & serve to discredit a person if he were to come forward. Apparently the logic of using Satanic & other themes in occult-related crime is that you won t be believed because it’s too farfetched.(17)

The New Satanists, Linda Blood

“In one instance after another, charges of ritual abuse & other crimes linked to Satanism & various forms of malevolent occultisms have been rejected on ground no more substantial than that they are too bizarre to be believed.

28.

invading my personal space. There was no special equipment that they were using located in that area. I noticed one had a shirt on that said something like, The MOST important part of playing rugby is support.

Anyone who can t wait a few minutes for you to finish & needs to stick their arms in your face is doing it on purpose.

In addition, the exercise they were doing could have been done anywhere else a gym that was almost empty. It was a dead giveaway. Another student arrived & began lingering in an area to my left. He stared at me for a few seconds & started smirking. Once he had my attention he turned his back to me so I could see his shirt which read, CHASE. In smaller letters underneath was the word, Manhattan. These attacks using symbolism are common reports among people who are targeted. They are also consistent with borderline-subliminal attacks used by Satanic cults.(100) The kid with the CHASE shirt left shortly after, & his total stay was about 10 minutes. That episode is an example of noise, crowding, symbolic attacks, & sensitivity tactics. This is standard procedure.

Synchronization

Synchronization seems to be very prevalent with Organized Stalking.(7) Groups will try to synchronize their tactics with things that you do such as entering or leaving your house. You re movements will be synchronized with noise, vehicles coming or going, people coming or going, or other movements. These synchronization tactics are often times done several times, perhaps three or more. For instance, when you arrive, two cars will drive down your street & someone will be banging a hammer. Or you may have two cars leave & one arrive. Three or more seems to be the magic number when it comes to synchronization. You may also hear ambulance or fire truck sirens the moment you enter or leave your house.

If you have a habit of going to the bathroom early in the morning around 2AM & looking out your bathroom window at a specific area, then they will eventually arrange it so that when you do this there is some activity such as a light being switched on or someone leaving or arriving in that area. This is an example of the level of detail that they will resort to when tailoring the harassment protocol to your profile.

Convoys of vehicles

If you’re targeted, you may have foot & vehicular traffic “re-routed” through your street. You’ll have an unnatural amount of vehicles driving by your house (even if you’re on a side or dead-end street) &/or following you while your out. Common practice is for vehicles to drive by screeching their tires, blowing their horns, playing loud music, revving their engines, & yelling as they drive by your house. This can include fire trucks, ambulances, city/utility vehicles, & postal vehicles.(7) Some targets have even mentioned that local police vehicles have participated in the harassment.

Brighting

A classic KKK tactic. Vehicular brighting seems to be strategically used with corners. For instance, you ‘re walking down a quiet street late at night & you have people repeatedly turn onto or off of connecting streets. Their timing is such that they continually turn the corners while you just happen to be at it. This effectively blinds you. This may happen at each & every corner. Or, as you walk down a side street there is one or more cars parked on the side, facing your direction with the lights on. They will also wait for you to approach them & then pull out into the street, thereby brighting you as you walk by.

You may also be followed by convoys of vehicles that have their Hi-beams on during the day.(7) These Brighting tactics are maximized when a vehicle has one headlight grossly misaligned. The misalignment produces a Hi-Beaming effect. Like other Organized Stalking tactics, frequency & duration play an important role here. Spot lights being shined into a target s windows is another tactic.

23.

Surreptitious break-ins, thefts, sabotage & planting drugs, bugs or other items in people s homes & offices were a staple part of Cointelpro.(10) They may also take items from your car & plant them in your home, & vice versa.(7)

Framings

This can be done over the Internet with Trojan horse viruses. Since they have federal connections, they do have the ability to frame a targeted person for crimes out in public as well using informants.(101, 7) Any weakness a person has can be used in one of these setups. A person may not be aware of some of these set-ups, but they may be added to a case file to assist with the smear campaign. They may try to provoke a confrontation when Mobbing you out in public.

Terrorist Stalking in America, David Lawson

Group members also try to entice the target to assault them, but this is never done without having witnesses present. The criminal conviction of the target, following the testimony of numerous concerned citizens can be followed by a civil lawsuit.

Sabotage & Vandalism

This happens at home & in the workplace. Electronic equipment may constantly be failing. This may be accomplished with the e-bomb or a similar device.(309, 310) Projects you ve worked on the previous day may become broken.

Many times this vandalism is usually just below what you d report to the police. For instance, a small but noticeable portion of your masonry has been chipped off, & a crack has appeared in one of your windows. Again, frequency & duration. This may be restricted to minor vandalism, just to let you know that you re being stalked. However largescale property damage is also done to vehicles, such as slashed tires, broken windows, tampering with break lines, destruction of electrical equipment.

Vandalism & pets being tortured may also be in retaliation for you taking action to expose them. In addition you may have dead animals & litter thrown into your yard. Some targets have reported that their pets die suddenly of mysterious illness. For instance, they come home to find a perfectly healthy animal dead. Others have noticed that their pets have been mutilated.(101)

Mail interference

During the old Cointelpro they would blatantly watch homes, follow cars, & open mail.(10) The idea was to get as much info as possible to aid in the harassment & intimidation. Currently some targets also experience tampering with mail, altering, delaying or disappearing, & email being filtered/blocked.(100, 101) These Cause Stalking groups may use children to steal your mail, or they may enlist the aid of the post office.(7)

Pranks

You may receive pranks by people & recordings.(101) The pranks may pertain to an important event that is unfolding in your personal life. Once again, information gleaned from surveillance is used for harassment. The phone has historically been an excellent harassment tool. It is also used as a synchronization tactic. You may also have people knocking on your door for whatever reason.(7)

Blacklisting

Gang Stalking groups will interfere with every personal & business relationship you have.(7) Since they are statesanctioned they can easily keep you unemployed. Job opportunities will be trashed. They get paid to make sure that you don t. Most targeted people are unemployed. Many would be homeless if it weren t for parents, siblings, or friends. If you re targeted & are lucky enough to still be employed, you may be harassed into leaving by your employer & coworkers.(101) You may have a successful interview & are virtually guaranteed the job, but never hear from the prospective employer, & they don t return your calls to tell you what went wrong.

According to an article in The Christian Science Monitor titled Blacklisted by the bank, Blacklisting was originally used as a foreign-policy tool.(391) At some point federal organizations decided to start using it on individuals as well.

22.

to assist federal law enforcement, or the intelligence community with Gang Stalking campaigns. My point is to illustrate the mind-set of some groups of people who have reason to believe a person is a pedophile. The PJ group is run by Xavier Von Erck (real name Phillip John Eide).

Upon visiting a site called Corrupted-Justice http://www.corrupted-justice.com, I discovered that members of Perverted-Justice have endured trauma such as incest or other forms of sexual abuse & are suffering from a variety of mental illnesses. The Corrupted-Justice site obtained this information from member profiles which are publicly available, & located at the Perverted-Justice website. And according to CJ, Eide is on record saying that more than 40% of his followers have endured this type of sexual abuse.

The CJ site also has some very interesting message board chats (publicly available) by PJ members that are worth a look. Apparently the CJ people have documented proof that members of PJ have hacked into the their web server. The CJ people are for the full prosecution of potential sex offenders by using law enforcement equipped with the checks & balances built into the legal system. The CJ group basically says that although the PJ system appears to be beneficial, it is heavily corrupted.

Most PJ busts do not include law enforcement. According to the article in the Toronto Star & the CJ website, the volunteers at PJ instead begin a relentless campaign to expose people they believe are pedophiles by calling friends, neighbors, children, places of employment & ruining personal & professional relationships.(388) PJ is listed as a potential destructive group by the Rick A. Ross Institute For The Study of Destructive Cults, http://www.Rickross.com.

It appears that some PJ members have a psychological need to feel powerful & meet that need by displaying to the public & their targeted person how they can destroy a life. I believe that some of these volunteers are ill & have latent sadistic intentions despite their patriotic motives. Apparently some of them receive a sick type of enjoyment/empowerment by ruining the lives of people. Both sites are worth a look at http://www.perverted-justice.com & http://www.corrupted-justice.com.

Character assassination is standard & group members may call to inform the police that a target is performing something illegal such as drinking & driving.(7) This type of community service is known as Rat Fucking. It is the author s belief that group members will also masquerade as concerned citizens & call local officials to register destructive complaints (lies/setups) about a targeted person. Having a person Rat Fucked in this way can be very damaging, especially when the complaints originate from multiple, seemingly unconnected individuals.

Thefts & Break-ins

This happens in & around the home as well as the workplace if the target is fortunate enough to be employed. Thefts may be reduced to small inexpensive items. But some targets have reported jewelry, passports & other important items stolen. Small things such as pens, shoes, & silverware are taken or tampered with so that you will seem delusional if you report this to the police. The logic is that a thief would never break into your home & leave a computer, stereo or other valuables & just steal a toothbrush, or pour out a portion of your milk.

There is usually no sign of forced entry.(101) This is the case even if there is a Hi-Tech security system in place.

Psychological warfare tactics are sometimes employed such as moving bits of furniture or clothing slightly out of place.(100) Items may be stolen & brought back at a later date, & they may move items & place them in a slightly different spot.(7) This is done to let you know that they ve been in your home. These cults are obsessed with all aspects of a targeted person s life. Personal items may be passed around to group members & are apparently symbolic of the control the group has over their target.(7)

Gaslighting tactics may be employed such as filling your gas tank, or substituting items of clothing with ones one size smaller.(9) Targets have reported clothing being ripped, milk, coffee & other items poured out, & small-scale damage.

21.

SoldierVision A1, a radar flashlight, has a standoff distance of 30 feet & can detect motion behind a wall at 30 feet as well. These flashlights have been steadily researched using military & university testing labs since the 1990s.

Raytheon is working on a Through The Wall (TTW) technology that will allow the device to wirelessly transmit output to a laptop up to 300 feet away.(354) Some of these flashlights display images in 3D format, can detect respiration, & can see through, wood, brick, plasterboard, glass & concrete.(355, 356) Remember, this is a professional harassment service run by former or current military or federal law enforcement. They have the latest everything. If you’re being targeted, you may also be bugged & your phone may be tapped.(7)

The Professional Paranoid-

How to fight back when Investigated, Stalked, Harassed, or Targeted by any Agency, Organization, or Individual, Michael Sweeney

They would think nothing of throwing dozens of people & vehicles into an operations, planting a dozen $80,000 bugs, buying or leasing property nearby, or other equally expensive contingencies.

Smear Campaign

The bogus investigation may be used to launch a smear campaign. Lies & character assassination may be used.(7)

These lies will be very strategically & deliberately spread into your personal & professional life. Informants may be used to help facilitate the insertion of these lies. The usual rumors spread about a target are that he is a pedophile, prostitute, terrorist, racist, anti-government, mentally ill, rapist, drug addict, or drug dealer. Rumors will be spread to neighbors, friends, family, employers, etc.

When gaining support in the campaign they may include pictures or statements made by someone who is accusing you of something. During Cointelpro some investigations were done for the sole purpose of discrediting & smearing targeted people & groups. Although Organized Vigilante Stalking campaigns are much wider in scope than Cointelpro, we now know that these agencies will engage in character assassination. These statements will be from group members or informants that have been paid to help set you up. Personal & professional opportunities may be trashed.(7, 101) At this point you may also be Mobbed out of the workplace & become unemployed. You will never have a chance to refute these lies, as they will be propagated behind your back by multiple people. Some of the people spreading these lies may be acquaintances &/or family members that have been recruited (lied to, intimidated & blackmailed) as informants.

Gaslighting-How To Drive Your Enemies Crazy, Victor Santoro

“The essence of defaming your target with rumors is it that it not get back to him.”

The reason that labeling someone a pedophile is common is because it is probably one of the worst rumors you could launch against someone. There have been multiple magazine & newspaper reports of pedophiles being harassed by neighbors, & vigilante groups to the point where they are driven out of communities & forced out of work.(349, 351-353) Some have been driven out of multiple states.(350) The people who participate in the harassment may be told that the target needs to be driven out of town so that he doesn t get to do what he did in the last town.(7)

We are a citizen s group that helps the police. We are tryiing (sic) to alert people in the area about this person, before he gets to do what did (sic) in the last place he lived.

-Quote from a group member in Terrorist Stalking in America, David Lawson

The organizers realize that labeling someone a pedophile will be most damaging & give them optimum leverage for gaining community support.

An article in the Toronto Star titled Vigilantes versus pedophiles Sunday August 8 2004 outlined how one citizens group called Perverted Justice http://www.perverted-justice.com, would begin a campaign to expose people that hey have concluded are potential (wannabe) pedophiles. I am not indicating that Perverted Justice is being used as a supplement

20.

Investigations The bogus investigation appears to be the platform used to launch the smear campaign & remove a person s support structure. Bogus investigations using a person s friends, family, & employers appear to be a standard part of the Organized Stalking package. This is done to isolate you. Friends, family members or employers may be given a gag order & told that under no circumstances are they to tell you that an investigation is being conducted.

The people who organize these harassment programs will try to assassinate your character.(7, 200) They will carry a case file on you that they will use for character assassination & to gain community support.(7) When recruiting neighbors they will probably show them this case file & indicate that you are the target of an investigation. This case file will contain a combination of half-truths, setups & outright lies. The case file may contain information about a person or people who have complained about you. These are most likely informants (civilians paid or given favors to help frame you). Or they may simply say that you’re under investigation but they can’t disclose why for reasons of national security. The “reasons of national security” blanket has been used by some federal agencies to help frame people for crimes as well as cover up mind-control & torture.(368, 13)

Their informants may be a single person used to help frame you, such as a tagger. Or they may be multiple people, perhaps related to each other. Again, these stalking groups usually have hundreds of local members. During Cointelpro, there were routine setups, & fabricating of evidence used to destroy a person s character or have them imprisoned.(10) They may string together arbitrary pieces of unrelated incidents from your past & arrange them in such a way that it paints an extremely bad picture of you when gaining support of your neighbors, landlord, family & friends. They can recruit stores & restaurants using the same method, & they may even have informants working in these establishments. Remember, one in twenty-four citizens will be called upon to be an informant.

Their case file of you may indicate that you are a probable rapist, pedophile, drug dealer, prostitute, terrorist, or racist, that they are investigating. Or they may tell these people they can’t say why, for reasons of national security.” They’ll be told that they will be doing their country/community a great favor by cooperating. However, labeling someone a pedophile seems to be quite common.

They will set up a base of operation in your neighborhood to conduct surveillance.(7, 101, 200) This will probably be next to your home or apartment. They will sublet, lease, rent property above, below or to the sides of your living space to do this.(7, 11, 200, 101) Money is no object as they have an unlimited budget. Half-truths, setups, & outright lies WILL be used. If you re an Organized Vigilante Stalking target, the investigation is not a means to an end, it is an end unto itself.

Surveillance

Terrorist Stalking in America, David Lawson

Surveillance (sic) on a residence by using triangulation. They watch it from three different positions. Surveillance is conducted 24 hours a day, 7 days a week. When a target leaves his residence they will alert the group, either by cell phone or business band radio. Other members, who are patrolling the perimeter will race to the location to begin pursuit. They patrol the area they live in 24×7. When they are riding around in their groups they feel invincible. Following and harassing various targets is part of their daily activities when they are on patrol.

If you re targeted, the group will be watching your home from their bases of operation using triangulation.(7)

Neighbors will be told that they’ll be doing their country a great favor by allowing them to occupy space in their home until the investigation is complete. If neighbors don’t cooperate, they may be targeted, or audited by the IRS. During Cointelpro the IRS was used for harassment.(10)

Devices such as radar flashlights & millimeter wave devices, like the ones used at airports may be used. The Life Assessment Detector System (LADS) developed at Georgia Tech was apparently created to rescue people trapped in rubble, avalanches, or other disasters. It has a range of about 135 feet can & can detect heartbeat & respiration. It can also be configured to track a specific person s movement inside a building.(11)

19.

arrival or departure. The event may also be a part of a noise campaign consisting of an alteration of other types of noises, which may last a portion of the day or all day.

Synopsis-

The event lasted for 5 minutes; longer than normal (Duration).

In addition to length of the event being extended, the number of times each act occurred within the event was increased (Frequency).

Ex: Multiple, repeated doors/trunk slamming from cars, even if a single individual is at the vehicle. This event also happens many times throughout the day (Frequency).

Each individual act of door/trunk shutting was amplified by the deliberate slamming of each door to produce a louder than normal noise (Intensity).

In essence, the event was louder, contained more activity (acts), & lasted longer than normal to produced a wellconcealed covert attack. This basic formula is used with many of the tactics outlined below. The frequency & duration formula is also used in Mobbing tactics.(8) In addition to the overuse of an individual tactic, these tactics are combined & used in a round-the-clock fashion, which amplifies their potency. Some of these tactics are categorized as Street Theatre. Street Theatre takes place when perpetrators harass you out in public using information about your personal life which was gleaned by surveillance.

Some of these tactics are deliberately designed to make someone appear as though they’re suffering from a mental disorder. This, coupled with the fact that most targets are so emotionally drained & can’t properly identify or explain what is happening to them makes them fish in a barrel. According to the DOJ, mental tactics designed to cause psychological harm must last for months or years before they constitute torture.(390) Organized Vigilante Stalking fits this description. Countries around the world, including the U.S., have used doctors to help abuse people, often for political reasons.(27) It is also a documented fact that there was collaboration between doctors & the military when experiments were carried out in prisons, hospitals, & universities on unwitting people.

Journey Into Madness-The True Story of Secret CIA Mind Control And Medical Abuse, Gordon Thomas

“What remains for me the most disturbing aspect of my investigation is that even as I write, and later when it is read, there are physicians who continue to participate in torture. Nothing I had researched before could have prepared me for the dark reality of doctors who set out to deliberately destroy minds and bodies they were trained to heal. The realization that physicians are part of a killing machine provokes a special horror.”

The DSM-IV is a diagnostic manual for identifying mental disorders. It is periodically put out by the APA. You don’t need to purchase one of these manuals, as it is also available online at the following sites:

http://www.psychologynet.org/dsm.html & http://www.psychnet-uk.com/.

Here’s what happened: They collaborated with mental health specialists & designed a harassment program around key paranoid delusional symptoms outlined in the DSM-IV manual, so that a target will appear ill when explaining this to a mental health professional, & friends/family. It is one of several layers of protection used to help keep groups operating in secrecy.

Microwave mind control: Modern torture and control mechanisms eliminating human rights and privacy

Dr. Rauni Leena Kilde, Former Chief Medical Officer of Finland

Report-September 25, 1999

The Psychiatric Diagnostic Statistical Manual (DSM) for mental disorders has been a brilliant cover up operation in 18 languages to hide the atrocities of military and intelligence agencies’ actions towards their targets. The manual lists all mind control actions as signs of paranoid schizophrenia. — all medical schools teach their students that the person is paranoid, ESPECIALLY if he believes intelligence agencies are behind it all. Never is the medical profession told that these are routine actions all over the world by intelligence agencies against their targets.

Tactics

18.

Tactics

As previously mentioned, these groups are nothing new. They are a recycled manifestation of an existing phenomenon.

But there are some important considerations regarding the operations of these groups. They are: purpose/goal, strategy & tactics. The goal remains the same, which is the neutralization of opposition & dissent. However, instead of physical intimidation, the creators of this system have apparently adopted a hands-off strategy, presumably to aid with plausible deniability & to keep these groups operating in secrecy. Also, the tactics within this new strategy have changed, & are now hidden with the use of & DEWs & the borderline-subliminal attacks evident in Mobbing/Gang Stalking. The creators of this system have established a virtually traceless protocol for murder.

There is a basic protocol that they begin with which is consistent in NATO nations. It begins with surveillance so that a persons personality traits can be cataloged. Everything including their religion is factored into it. At a later point, they are singled out for preliminary stages of harassment, which includes Gang Stalking, entry into homes & apartments. This Gang Stalking is apparently used to soften up a targeted person for the eventual assault with Directed Energy Weapons (DEWS). The DEW harassment gradually increases to extreme conditions. This pattern has unfolded consistently.

There is a basic protocol that the perpetrators begin with. But the TI contributes to the modification. Targets are constantly monitored & if a target responds emotionally to a particular trigger, that will be built into the protocol. If the target displays a certain sense of guilt or embarrassment about a subject, that will be built into the protocol. It s an ongoing process.

-The Investigative Journal interviews Julianne McKinney, April 19th, 2006, Subject: Directed Energy Weapons & Gang Stalking

Some of the Gang Stalking tactics used in these programs are borderline-subliminal, which is why they are so difficult to detect, explain & defend against. It is my goal to make the unconscious, conscious. This is a multi-dimensional stalking program. Many of these tactics are a type of mind-control. Please keep in mind that most people are unaware that they re targeted.

Subliminal Mind Control, John J. Williams

Therefore, in most cases, if you are being subjected to a secret & involuntary subliminal experience it is a malevolent, sinister & often dangerous attack against you that you have every right to vigorously oppose & thwart as if you are a POW or someone has broken into your home to rob you of what is rightfully yours. In fact they have broken into your mind & are trying to rob you of your free will. Even in cases where there is actually an intended positive outcome

Rather than using a blunt overt attack against a fully functional person, they usually attack from the inside, & conceal their harassment by using existing events that occurs naturally. However, it is probably statistically impossible for some of these staged events to occur as often as they do. They conceal much of their harassment using what appears to be a simple formula applied to these events. The basic formula is as follows:

1. Frequency-Describes how often an event occurs. It also pertains to the number of acts within a single event.

2. Duration-Pertains to the length of a single event. It also pertains to the non-stop nature of the harassment in general.

3. Intensity-The amplification of the acts such as sound, sight, crowding, etc. within an event.

A theoretical example of a Car Door Slamming event:

One neighbor arrives & two others leave. As they re tending to their vehicles there is the repeated opening & shutting front/back doors & trunks, alarms going off, & beeping from alarms being turned on. These disturbances emanate from areas surrounding your house. This may happen simultaneously, or they may be strung together, one right after the other. Even if a single individual is arriving/leaving, standard practice seems to be multiple slams (trunk, back seat, driver s door). The whole event takes about 5 minutes. This may be synchronized with your activity, such as your

Next Page »