Thehiddenevil\’s Weblog


43.

Virtual Government: CIA Mind Control Operations in America, Alex Constantine

The objective is to isolate the bothersome informant, depict him as incompetent, disloyal, troublesome, mentally unbalanced or ill. The whistle-blower is forced out, frightening workmates and supporters. The assault continues until the target is left discredited, exhausted, in poor health, financially crippled, his career in ruins.

Activists/Dissidents

Corporations in various countries are currently using professional harassment groups on people that oppose them.(329)

Civil rights activists have a history of being targeted by these programs. If your views are not aligned with the corporate/state entity, & you are effectively raising awareness about an issue, you may very likely become the target of this type of terrorism. Anyone who opposes Globalization may be targeted.

War at Home-Covert war against U.S. activists & what we can do about it, Brian Glick

The records show that the vast majority of the targets of domestic covert action have engaged only in peaceful protest. They do no harm to anyone s health or safely. The only danger they pose is to the status quo. Their only weapon is the power of their words & the threat of their good example.

The Justice Department claimed that the original Cointelpro was needed to defend national security & prevent terrorism. (10) However, it ended up subverting democracy & promoting violence & terrorism. If you protest at an event, you could be considered a terrorist under the US Patriot Act. Under the JTTF there is currently a nation-wide effort with local & federal law enforcement to report information regarding demonstrations. Cointelpro is back. But it is much, much worse, now with one in 24 Americans being recruited as informants, an unlimited budget, & a loosening of laws that prevented it in the first place.

The New Cointelpro is now legal. According to ACLU executive director Anthony Romero, who viewed a confidential FBI memorandum, even peaceful protesters are now being labeled as potential “terrorists.”(367) Think about what this means.

Experimentation

Some known behavioral modification projects include BLUEBIRD, MKDELTA & MKULTRA. MKULTRA, with 149 sub-projects, was conducted in universities, hospitals, military institutions, & prisons. Some tests included the effects of stress on human beings, including duress, fatigue, torture, drugs, creation of mutations, & a variety of other tests.

Under MKULTRA about 23,000 people were traumatized, but researchers in this are see this as an extremely conservative number.(23) Since many of the records have been destroyed we will probably never know. Most of these people were unwillingly & unknowingly experimented on in these institutions, & their lives were basically ruined.

Some of these tests were conducted on children.

These people will think nothing of sacrificing innocent members of the population & experimenting on people, then covering up their crimes claiming reasons of national security. After studying the history of some of these agencies & learning the facts, it became clear to me that these acts were carried out by monsters misusing their resources & committing crimes against humanity.

The paper trail for these experiments ended around 1984.(23) But there are currently thousands of citizens being experimented on at this time. Labs are apparently no longer necessary as Directed Energy Weapons can be used at a distance. Targeted people are declined assistance by organizations that have been set up to help victims of torture & mind-control. They are routinely labeled mentally ill to discredit them.

Several mind-control survivors have written books. One MKULTRA survivor named Cathy O Brien wrote a book with Mark Phillips (former CIA operative) called, Access Denied: For Reasons of National Security. It is a well

Advertisements

42.

Why is it used?

The organizers have successfully desensitized communities & convinced them that it is OK to violate the civil rights of certain people. This was probably originally done using sex offenders & other undesirables. This may have started out as a system with positive intentions, however, due to lack of ethical oversight it has become heavily corrupted. This is now basically a parallel justice system & a revenge service that can be used for silent neutralization. There is a list or database that people are added to who are deemed expendable. It appears that there are several ways a person can be added to this list. I ve listed some later in this section.

Virtual Government: CIA Mind Control Operations in America, Alex Constantine

The United States of America has not openly declared war on private citizens. But illicit human experimentation and vicious non-lethal radio frequency assaults have been carried out by agencies within a number of federal institutions for 50 years.

I knew federal law enforcement & the intelligence community had their problems, like most institutions do. I had also heard scattered stories of people being harassed by government agencies but I attributed it to their own fault. I figured they must have been some serious troublemakers in order to provoke it. I thought the occasional media leaks were pretty much all there was to it. I trusted that the watch-dog media kept those agencies in line & were perhaps even a little intrusive (preventing these agencies from doing their jobs). I believed that these agencies would never spend resources to target innocent people, especially a nobody. I thought that these agencies had better things to do than to waste resources targeting innocent citizens. I was wrong. I never realized that those media leaks were just the tip of the iceberg or how big & organized this corruption was.

Then I began to learn about the organized human slavery rings, optimum/heroin trafficking (The Golden Triangle)

MKULTRA, & current mind-control operations.(100, 29, 23) And Operation Northwoods.(389)

I realized there was a whole community of targeted people screaming out to be heard, but stonewalled by the media & human rights organizations. These human rights organizations have received many complaints about Organized Vigilante Stalking, but as of the time of this writing they have not acknowledged this phenomenon. I can only conclude they have been given stand-down orders, no doubt for reasons of national security.

the women who are singled out appear to be somewhat too independent, perhaps too intelligent.. tend to live alone, tend to pursue professional careers. There s a heavy predominance of those types of woman in the TI community. Men are in a smaller proportion & seem to be those who have a sense of self-esteem & pride that seems to [invite] targeting.

-The Investigative Journal interviews Julianne McKinney, April 19th, 2006, Subject: Directed Energy Weapons & Gang Stalking

Revenge

Cause Stalking groups are available as for-hire revenge packages.(7) This revenge package is available to any person who has the connections & capitol to finance it. There are some very sick, sadistic people with influence in government & industry who can use this system if they think you ve done them wrong. This is the equivalent of putting a hit on someone. If this is the reason a person is targeted, he may never know it.

Whistleblowers

If you complained about working conditions or ethics of a corporation, you may be targeted. The U.S. postal service & other federal agencies use professional harassment services to harass people, literally to death.(20) This harassment includes psychological warfare & DEWs. If you do a key word search on yahoo using phrases such as, ” Harassed FBI Whistleblower,” you’ll find websites of former members of federal law enforcement, indicating that they are also targeted by the agencies they once served.

38.

Sound beam puts listeners in the spotlight. (Foreign News)

The Independent (London, England); 5/17/2001; Arthur, Charles

Hearing Voices no one else can might not signal an imminent mental health crisis. A scientist at the MIT Media Lab in Boston has perfected a system that can beam sound to a specific point, like a spotlight aiming a beam of light at one point

Some of these Directed Energy Weapons (DEW) are Through-The-Wall (TTW) in nature. These devices or a similar ones are currently being used on citizens in North America & other NATO nations. It is likely that the perpetrators are using radar/Millimeter wave technology similar to the ones used in airports to pinpoint a person s location in a building & assist with aiming other DEWs at people.

Microwave

Microwave DEWs will produce dizziness, burning, headaches, eye problems, damaged nervous system & internal organs, heart attack, & an inability to concentrate. A common microwave oven can be turned into a DEW by modifying the appliance to operate with the door removed. It can then be positioned against a wall to attack someone on the other side. You can also build a weapon for a few hundred dollars that will employ a more focused attack.

Below is a picture from a website (Mikrowellenterror.de ) of a German doctor that has researched Microwave DEWs, & the German equivalent of Organized Vigilante Stalking. It appears that the perpetrator in the picture is using an easily modified microwave oven. Although the words in this picture are in German, you can get the general idea.

Targeting the Human with Directed Energy Weapons

Mikrowellenterror.de

Dr. Reinhard Munzert

6. Sept. 2002

Directed energy weapons are among the high-tech arms of the century. These weapons are also part of crimes (in Europe) that almost nobody knows except the victims and the offenders. The HPM-weapons that the high-tech gang uses supply continuous or pulsed waves over long periods of time – especially in the night – from cars or vans or buildings around the target/person(s). In addition they apply through wall imaging methods. Besides this the criminals use tactics of information warfare: Know all about the victims, let them know nothing about you, (sic) information dominance, disrupt the communication systems of the victims. the victims experience extreme, unbelievable

36.

Symbols, such as ones that represent Wicca or Satanism may be used, as can numbers, letters, or other types of symbols. According to Ted L. Gunderson, who has investigated cults for over 25 years, these subliminal attacks, such leaving articles of clothing out of place & moving furniture around have been historically used by Satanic cults when stalking their targets.

These perpetrators will follow you into restaurants & businesses where they will try to surround you, kick your chair, or harass you any way they can.(7) They ll usually sit near you & mention several topics that directly relate to your personal life. This is done both to harass you & to try to evoke a sense of helplessness in you by not being believed if you were to tell someone about the harassment. This type of harassment is designed to try to evoke a feeling of paranoia.(101)

This harassment is concealed to anyone else in the establishment. Some of the other patrons may recognize that something is not right with that group of people. This is probably because the tone, rhythm & volume of their conversation are not natural; they re rehearsed & artificial. It addition, there are natural gaps between words & sentences that are absent with this type of staged event. It s almost like bad acting. You may even see other patrons looking over at them with an expression of what s wrong with those people?

Gaslighting-How To Drive Your Enemies Crazy, Victor Santoro

whispering sneers-Another way to foster your target s paranoia is to make it clear that people are, indeed, talking about him. Sneering while you whisper will suggest that he s being mocked, causing a very uncomfortable feeling. …If you can get several accomplices to do this… he’ll get the feeling that mockery & ridicule of him are widespread.

Here s an example: Suppose you re selling your house & have listed it in several websites & publications. Your asking price is $400,000. The day after you ve posted your Ad you are sitting on a park bench & the following situation occurs:

[One person walks by &, glances at you with a smirk & says into their cell phone, I spent 400.00 . A few moments later a couple walks by & in a monotonous, loud manner one of them says, yeah but isn t that a bit too high? Then another person walks by shortly after & loudly says into their cell phone, yeah, I just didn t like it, you know how some houses just don t feel right. Then a moment later a person walks by with an Ad on their shirt for a real estate agency. Then when you get home, you receive a call from a real estate agent that you did not contact.]

As always, personal information gathered by surveillance is used primarily for harassment. This has been well documented, not only by countless targets & websites, but also in books such as The War At Home, by Brian Glick, &  Terrorist Stalking in American by David Lawson. Themes can also apparently be projected using collisions & cut-offs.

Children are used in Cause Stalking campaigns.(7) Parents who are group members routinely use them in crowding, cut-offs, or other harassment skits. Once, within a one-week period I had three separate groups of kids that looked like they were about 13- 15 years old walk up to me & ask me for a dollar to take the bus. This happened in three different locations. Then several days later another group of kids (making it 4 total) asked for some money for the bus as well.

These children could have been recruited by their parents, or through displays of power. They may also have been recruited through a junior community-policing or similar program.

Once in August 2005, when I was at St Anthony s feast, on two separate occasions two different girls about 5 years old walked by me with very short skirts. I thought it strange that their parents would dress them that way. This happened within about a 5-minute period. On both occasions, shortly after, a man would walk by & give me a blatant, disgustful stare implying that I was looking at them in a sexual way. If I had stayed longer, there probably would have been a third. Two days later, I was turning onto my street & a girl of about 8 years old walked passed me. After several feet, she looked back & stared at me with a shocking expression, then started running, & looking back at regular intervals.

She ran into her house, which is located on the same street I live on. Other targets have reported similar skits. If I was not aware that I was being systematically harassed, I probably would have written those off as isolated, strange

28.

invading my personal space. There was no special equipment that they were using located in that area. I noticed one had a shirt on that said something like, The MOST important part of playing rugby is support.

Anyone who can t wait a few minutes for you to finish & needs to stick their arms in your face is doing it on purpose.

In addition, the exercise they were doing could have been done anywhere else a gym that was almost empty. It was a dead giveaway. Another student arrived & began lingering in an area to my left. He stared at me for a few seconds & started smirking. Once he had my attention he turned his back to me so I could see his shirt which read, CHASE. In smaller letters underneath was the word, Manhattan. These attacks using symbolism are common reports among people who are targeted. They are also consistent with borderline-subliminal attacks used by Satanic cults.(100) The kid with the CHASE shirt left shortly after, & his total stay was about 10 minutes. That episode is an example of noise, crowding, symbolic attacks, & sensitivity tactics. This is standard procedure.

Synchronization

Synchronization seems to be very prevalent with Organized Stalking.(7) Groups will try to synchronize their tactics with things that you do such as entering or leaving your house. You re movements will be synchronized with noise, vehicles coming or going, people coming or going, or other movements. These synchronization tactics are often times done several times, perhaps three or more. For instance, when you arrive, two cars will drive down your street & someone will be banging a hammer. Or you may have two cars leave & one arrive. Three or more seems to be the magic number when it comes to synchronization. You may also hear ambulance or fire truck sirens the moment you enter or leave your house.

If you have a habit of going to the bathroom early in the morning around 2AM & looking out your bathroom window at a specific area, then they will eventually arrange it so that when you do this there is some activity such as a light being switched on or someone leaving or arriving in that area. This is an example of the level of detail that they will resort to when tailoring the harassment protocol to your profile.

Convoys of vehicles

If you’re targeted, you may have foot & vehicular traffic “re-routed” through your street. You’ll have an unnatural amount of vehicles driving by your house (even if you’re on a side or dead-end street) &/or following you while your out. Common practice is for vehicles to drive by screeching their tires, blowing their horns, playing loud music, revving their engines, & yelling as they drive by your house. This can include fire trucks, ambulances, city/utility vehicles, & postal vehicles.(7) Some targets have even mentioned that local police vehicles have participated in the harassment.

Brighting

A classic KKK tactic. Vehicular brighting seems to be strategically used with corners. For instance, you ‘re walking down a quiet street late at night & you have people repeatedly turn onto or off of connecting streets. Their timing is such that they continually turn the corners while you just happen to be at it. This effectively blinds you. This may happen at each & every corner. Or, as you walk down a side street there is one or more cars parked on the side, facing your direction with the lights on. They will also wait for you to approach them & then pull out into the street, thereby brighting you as you walk by.

You may also be followed by convoys of vehicles that have their Hi-beams on during the day.(7) These Brighting tactics are maximized when a vehicle has one headlight grossly misaligned. The misalignment produces a Hi-Beaming effect. Like other Organized Stalking tactics, frequency & duration play an important role here. Spot lights being shined into a target s windows is another tactic.

27.

you make it conscious. If you make some of these unconscious communication behaviors conscious, you will probably have powerful means of persuasion. The study of this language has been called Social Kinesics (the study of body communication).

There are two components to this communication:

1. Movements, gestures, postures

2. Spatial relationships

The study of communication using distance/space is called Proxemics.

For most North Americans the intimate zone is 0-18 & personal space 1 ½ -4 ft.

This type of communication is used to harass a person. For instance, while in stores, restaurants & public places that are not busy, a target will have people crowding around them, invading their personal space. This happens even if there are only two customers in a store. If a person makes a move from one place to another in a store several people may suddenly appear & jump out in front of him from around corners & isles. A common experience reported is the sudden movement of a crowd of people into a checkout line that a target is moving toward.(7) These blitz attacks also happen outside. This can be detected by getting up, moving in one direction, then stopping & watching.

If you’re targeted, you’ll see a wave of people move in the direction that you were headed toward, to swarm you & cut you off. If you wait for a few moments you’ll see that activity will settle back to normal again after they pass. This test can be run indoors & outdoors as well. Sometimes they may blatantly adjust their timing, or linger for a while until you begin to move again, then they’ll continue. This program was tailored to represent a target as someone suffering from schizophrenia when explained to health professionals. This is no surprise, the intelligence community has worked extensively with the psychiatric industry.

Prolonged crowding can have an extremely negative effect on your mental/emotional health.(320-323) The people who designed this harassment program were well aware this. While some cultures may be more immune to crowding than others, even people from parts of the world that have been historically crowded react stressfully to crowding. People who have not been invited into your intimate space but deliberately violate it are committing acts of violence. The people that participate may justify their behavior because they serve a “greater cause” & don’t see their behavior as acts of violence. But the culmination of these tactics amount to no less than soul murder.

People of the Lie: The Hope for Healing Human Evil, Psychiatrist M. Scott Peck

When I say that evil has to do with killing, I do not mean to restrict myself to corporal murder. Evil is also that which kills spirit.

If you are an Organized Stalking target you ll be followed on foot & swarmed anywhere you go out in public.(7, 101)

Even on days/times that there are normally not many people. This happens in stores while making purchases, restaurants, businesses, where you have people constantly cutting you off, invading your space, using sensitivity programs, or other harassment tactics. Sometimes this is blatantly obvious. For instance, your in a fitness center at a time when it is not crowded, but you have multiple people who, instead of taking the shortest path to their destination, continue to go double or triple the distance just so they can brush by you, cut you off, etc. These collisions & crowdings amount to an obstacle course that follows you wherever you go. And this is only a part of the harassment.

Here is one personal example that took place at a YMCA in Boston, which occurred shortly after I realized I was being Gang Stalked. At the time, there were four people, including myself in the weight room. After I was there for a few moments I noticed there was an unusual amount weight banging. It was louder & more repetitive that it normally is.

I ve been exercising & going to health clubs for about 15 years & I immediately recognized that these few people were repeatedly going out of their way to make as much noise as possible. I sat down on a bench & started doing dumbbell presses. Two students walked in, stood on either side of the bench I was sitting at & began to do lateral arm raises,

24.

Some tactics used to keep you Blacklisted include interfering with communications, & slander. Also there are lists & software packages used to check these lists for suspected terrorists, threats to national security, etc.(109)

Apparently this is a flourishing business & some organizations are required by law to use it.

The Surveillance-Industrial Complex:

How the American Government Is Conscripting Businesses and Individuals in the Construction of a Surveillance Society

The American Civil Liberties Union http://www.aclu.org, August 2004, Written by Jay Stanley

An entire industry has sprung up to produce software that makes it easier or companies to enforce the government s blacklists and other mandates. An example is Homeland Tracker, produced by a subsidiary of the giant database company Choicepoint to help any business comply with OFAC and USA PATRIOT Act regulations. The manual proudly touts the software s ability to get identity verification, check individual names, scan customer files and build personal accept and deny lists (otherwise known as blacklists).

Federal law enforcement have sent watch lists to corporations containing names of individuals that were not under official investigation or wanted, but that the agency just had an interest in.(390) We already know that some of these agencies are targeting & harassing citizens. Would it not be reasonable to conclude that they are misusing this resource as well?

Big Business Becoming Big Brother

Wired NewsWire 02:00 AM Aug, 09, 2004 EDT, By Kim Zetter

The ACLU released the Surveillance-Industrial Complex report to educate the public about how information collected from them is being used. The report notes that there is no way to determine how many job applicants might have been denied work because their names appeared on the list. “It turns companies into sheriff’s deputies, responsible not just for feeding information to the government, but for actually enforcing the government’s wishes, for example by effectively blacklisting anyone who has been labeled as a suspect under the government’s less-than-rigorous procedures for identifying risks,” the report states.

In addition to slander & keeping you unemployed, they may also use companies or recruiters in harassment campaigns (Mobbing). This is particularly the case with recruiters. It appears that they are often used to try to further traumatize a person using Mobbing tactics during interviews. For instance, they may ask you a series of questions for which you have to answer no to, such as asking you for credentials that you did not list on your resume.

They may ask you if you possess skill-sets which were not listed on the AD they had placed. This is designed to further humiliate you. These things happen to everyone once in a while. But with Mobbing, these things are done repeatedly by multiple people, time after time. There is basically a safe zone that these people can harass you from with little fear of being caught.

One common ploy used by recruiters is that they ll tell you that they don t have your resume in front of them. This tactic may widen the harassment scope by allowing them to ask potentially painful questions that are already answered on your resume. These questions are asked with ACCUSING, or MOCKING tones. They are designed to try to stir up negative emotions associated with a previously painful work environment. They may ask these questions repeatedly using a slightly different syntax such as, What was your last job?” Are you still there?” [When they know you’re not]

“How was the environment?” [If you were Mobbed] “So, you ve been unemployed since?” “So…you ve done nothing at all since?” “Why aren t you working?” [Accusing tone] “Haven t you been looking for work? Recruiters are paid by corporations to provide a service, (people). When you think about it, recruiters are actually employees of corporations, only they work in remote offices. Just as an in-house employee will participate in Mobbing out of fear of termination, or retaliation, these virtual employees are easily co-opted.

Mobbing-Emotional Abuse in the American Workplace, Davenport, Schwartz, Elliot

Mobbing sometimes continues after individuals have left the organization. Although this can rarely be proven, slandering continues… This ongoing mobbing, even after the individuals are no longer connected with the organization, seems to justify the Mobbers previous behavior & upholds the organization s decision. They try to defend themselves by continuing to destroy the victim s reputation… Dianna: the next minute I thought, Howe can all these people just go along with this? Yet I would think, I can t blame these people. I know they have to go along with this for their own survival

23.

Surreptitious break-ins, thefts, sabotage & planting drugs, bugs or other items in people s homes & offices were a staple part of Cointelpro.(10) They may also take items from your car & plant them in your home, & vice versa.(7)

Framings

This can be done over the Internet with Trojan horse viruses. Since they have federal connections, they do have the ability to frame a targeted person for crimes out in public as well using informants.(101, 7) Any weakness a person has can be used in one of these setups. A person may not be aware of some of these set-ups, but they may be added to a case file to assist with the smear campaign. They may try to provoke a confrontation when Mobbing you out in public.

Terrorist Stalking in America, David Lawson

Group members also try to entice the target to assault them, but this is never done without having witnesses present. The criminal conviction of the target, following the testimony of numerous concerned citizens can be followed by a civil lawsuit.

Sabotage & Vandalism

This happens at home & in the workplace. Electronic equipment may constantly be failing. This may be accomplished with the e-bomb or a similar device.(309, 310) Projects you ve worked on the previous day may become broken.

Many times this vandalism is usually just below what you d report to the police. For instance, a small but noticeable portion of your masonry has been chipped off, & a crack has appeared in one of your windows. Again, frequency & duration. This may be restricted to minor vandalism, just to let you know that you re being stalked. However largescale property damage is also done to vehicles, such as slashed tires, broken windows, tampering with break lines, destruction of electrical equipment.

Vandalism & pets being tortured may also be in retaliation for you taking action to expose them. In addition you may have dead animals & litter thrown into your yard. Some targets have reported that their pets die suddenly of mysterious illness. For instance, they come home to find a perfectly healthy animal dead. Others have noticed that their pets have been mutilated.(101)

Mail interference

During the old Cointelpro they would blatantly watch homes, follow cars, & open mail.(10) The idea was to get as much info as possible to aid in the harassment & intimidation. Currently some targets also experience tampering with mail, altering, delaying or disappearing, & email being filtered/blocked.(100, 101) These Cause Stalking groups may use children to steal your mail, or they may enlist the aid of the post office.(7)

Pranks

You may receive pranks by people & recordings.(101) The pranks may pertain to an important event that is unfolding in your personal life. Once again, information gleaned from surveillance is used for harassment. The phone has historically been an excellent harassment tool. It is also used as a synchronization tactic. You may also have people knocking on your door for whatever reason.(7)

Blacklisting

Gang Stalking groups will interfere with every personal & business relationship you have.(7) Since they are statesanctioned they can easily keep you unemployed. Job opportunities will be trashed. They get paid to make sure that you don t. Most targeted people are unemployed. Many would be homeless if it weren t for parents, siblings, or friends. If you re targeted & are lucky enough to still be employed, you may be harassed into leaving by your employer & coworkers.(101) You may have a successful interview & are virtually guaranteed the job, but never hear from the prospective employer, & they don t return your calls to tell you what went wrong.

According to an article in The Christian Science Monitor titled Blacklisted by the bank, Blacklisting was originally used as a foreign-policy tool.(391) At some point federal organizations decided to start using it on individuals as well.

22.

to assist federal law enforcement, or the intelligence community with Gang Stalking campaigns. My point is to illustrate the mind-set of some groups of people who have reason to believe a person is a pedophile. The PJ group is run by Xavier Von Erck (real name Phillip John Eide).

Upon visiting a site called Corrupted-Justice http://www.corrupted-justice.com, I discovered that members of Perverted-Justice have endured trauma such as incest or other forms of sexual abuse & are suffering from a variety of mental illnesses. The Corrupted-Justice site obtained this information from member profiles which are publicly available, & located at the Perverted-Justice website. And according to CJ, Eide is on record saying that more than 40% of his followers have endured this type of sexual abuse.

The CJ site also has some very interesting message board chats (publicly available) by PJ members that are worth a look. Apparently the CJ people have documented proof that members of PJ have hacked into the their web server. The CJ people are for the full prosecution of potential sex offenders by using law enforcement equipped with the checks & balances built into the legal system. The CJ group basically says that although the PJ system appears to be beneficial, it is heavily corrupted.

Most PJ busts do not include law enforcement. According to the article in the Toronto Star & the CJ website, the volunteers at PJ instead begin a relentless campaign to expose people they believe are pedophiles by calling friends, neighbors, children, places of employment & ruining personal & professional relationships.(388) PJ is listed as a potential destructive group by the Rick A. Ross Institute For The Study of Destructive Cults, http://www.Rickross.com.

It appears that some PJ members have a psychological need to feel powerful & meet that need by displaying to the public & their targeted person how they can destroy a life. I believe that some of these volunteers are ill & have latent sadistic intentions despite their patriotic motives. Apparently some of them receive a sick type of enjoyment/empowerment by ruining the lives of people. Both sites are worth a look at http://www.perverted-justice.com & http://www.corrupted-justice.com.

Character assassination is standard & group members may call to inform the police that a target is performing something illegal such as drinking & driving.(7) This type of community service is known as Rat Fucking. It is the author s belief that group members will also masquerade as concerned citizens & call local officials to register destructive complaints (lies/setups) about a targeted person. Having a person Rat Fucked in this way can be very damaging, especially when the complaints originate from multiple, seemingly unconnected individuals.

Thefts & Break-ins

This happens in & around the home as well as the workplace if the target is fortunate enough to be employed. Thefts may be reduced to small inexpensive items. But some targets have reported jewelry, passports & other important items stolen. Small things such as pens, shoes, & silverware are taken or tampered with so that you will seem delusional if you report this to the police. The logic is that a thief would never break into your home & leave a computer, stereo or other valuables & just steal a toothbrush, or pour out a portion of your milk.

There is usually no sign of forced entry.(101) This is the case even if there is a Hi-Tech security system in place.

Psychological warfare tactics are sometimes employed such as moving bits of furniture or clothing slightly out of place.(100) Items may be stolen & brought back at a later date, & they may move items & place them in a slightly different spot.(7) This is done to let you know that they ve been in your home. These cults are obsessed with all aspects of a targeted person s life. Personal items may be passed around to group members & are apparently symbolic of the control the group has over their target.(7)

Gaslighting tactics may be employed such as filling your gas tank, or substituting items of clothing with ones one size smaller.(9) Targets have reported clothing being ripped, milk, coffee & other items poured out, & small-scale damage.

21.

SoldierVision A1, a radar flashlight, has a standoff distance of 30 feet & can detect motion behind a wall at 30 feet as well. These flashlights have been steadily researched using military & university testing labs since the 1990s.

Raytheon is working on a Through The Wall (TTW) technology that will allow the device to wirelessly transmit output to a laptop up to 300 feet away.(354) Some of these flashlights display images in 3D format, can detect respiration, & can see through, wood, brick, plasterboard, glass & concrete.(355, 356) Remember, this is a professional harassment service run by former or current military or federal law enforcement. They have the latest everything. If you’re being targeted, you may also be bugged & your phone may be tapped.(7)

The Professional Paranoid-

How to fight back when Investigated, Stalked, Harassed, or Targeted by any Agency, Organization, or Individual, Michael Sweeney

They would think nothing of throwing dozens of people & vehicles into an operations, planting a dozen $80,000 bugs, buying or leasing property nearby, or other equally expensive contingencies.

Smear Campaign

The bogus investigation may be used to launch a smear campaign. Lies & character assassination may be used.(7)

These lies will be very strategically & deliberately spread into your personal & professional life. Informants may be used to help facilitate the insertion of these lies. The usual rumors spread about a target are that he is a pedophile, prostitute, terrorist, racist, anti-government, mentally ill, rapist, drug addict, or drug dealer. Rumors will be spread to neighbors, friends, family, employers, etc.

When gaining support in the campaign they may include pictures or statements made by someone who is accusing you of something. During Cointelpro some investigations were done for the sole purpose of discrediting & smearing targeted people & groups. Although Organized Vigilante Stalking campaigns are much wider in scope than Cointelpro, we now know that these agencies will engage in character assassination. These statements will be from group members or informants that have been paid to help set you up. Personal & professional opportunities may be trashed.(7, 101) At this point you may also be Mobbed out of the workplace & become unemployed. You will never have a chance to refute these lies, as they will be propagated behind your back by multiple people. Some of the people spreading these lies may be acquaintances &/or family members that have been recruited (lied to, intimidated & blackmailed) as informants.

Gaslighting-How To Drive Your Enemies Crazy, Victor Santoro

“The essence of defaming your target with rumors is it that it not get back to him.”

The reason that labeling someone a pedophile is common is because it is probably one of the worst rumors you could launch against someone. There have been multiple magazine & newspaper reports of pedophiles being harassed by neighbors, & vigilante groups to the point where they are driven out of communities & forced out of work.(349, 351-353) Some have been driven out of multiple states.(350) The people who participate in the harassment may be told that the target needs to be driven out of town so that he doesn t get to do what he did in the last town.(7)

We are a citizen s group that helps the police. We are tryiing (sic) to alert people in the area about this person, before he gets to do what did (sic) in the last place he lived.

-Quote from a group member in Terrorist Stalking in America, David Lawson

The organizers realize that labeling someone a pedophile will be most damaging & give them optimum leverage for gaining community support.

An article in the Toronto Star titled Vigilantes versus pedophiles Sunday August 8 2004 outlined how one citizens group called Perverted Justice http://www.perverted-justice.com, would begin a campaign to expose people that hey have concluded are potential (wannabe) pedophiles. I am not indicating that Perverted Justice is being used as a supplement

Next Page »