Thehiddenevil\’s Weblog


Posted in Cointelpro,mindcontrol,Neuro-linguistic,Neurolinguisticprogramming,NLP,programming by thehiddenevil on August 26, 2007

33.

someone would turn their alarm on/off a few times but they d write it off as an isolated strange incident. Since they have not had your previous experience (sensitization) with that sound & are not aware that it is a small part of a much larger harassment program it would be difficult to explain what those beeps meant. In NLP, the process of copying an emotional state anchored to an existing trigger & transferring it to a new trigger, is called chaining.(2)

Introducing NLP, Joseph O Connor & John Seymour

Anchors can be chained so that one leads to another. Each anchor provides a link on the chain & triggers the next one, just as the electrical impulse flows from nerve to nerve in our body.

Harassment Skits

Harassment skits can be classified as a type of Street Theatre that contain verbal & non-verbal harassment, threats,insults, intimidation, & violence, conveyed overtly, or overtly using themes, symbolism, or other medium. They may be carried out after a target has been sensitized. This harassment can be relayed with metaphors, verbal remarks, & symbolism using clothing or other items. Insults or comments by strangers, designed to evoke a paranoid reaction, as well as dirty looks & negative behavior from previously friendly neighbors is common among targets.(101)

They may be speaking on their cell phone & loudly accent the insult as they walk by & stare at you. Blatant, hostile or smirking stares are also common. Sometimes they may not be one the phone & just overtly insult you as they walk by. As an example, I have people walk by me & say things like fuck you, “fuck-up, fuck-head, your disgusting etc. After being out of work for about a year, I was able to land a job at a retail store in Boston where the Mobbing continued. Because I already knew where it would end up I stayed there for less than a week. One evening as I was leaving, another employee walking out behind me made the remark, Déjà vu now what are you gonna do? When I looked back he was casually leaning up against the wall. No cell phone or other people around at that moment.

Another example took place in a bookstore when I asked the clerk if he could find the book Terrorists Stalking in America. I knew they probably wouldn t have it on the shelves but I wanted to see if they would have it in their Books In Print database. The clerk had some trouble finding the book so as I was giving him other information such as the author s name a man walked by, looked in our direction & said Keep trying caged people, keep trying. The clerk glanced over at him as he walked away then looked down with a perplexed expression. There was nobody else in this area of the store.

But these events are sort of unusual because usually they cover their tracks & mask their insults within phony conversations while on a cell phone or with another person.

Some of these insults are very subtle (implied), but powerful. For instance, if you re at a restaurant you may have acouple sit down at a table next to you, & mention some events that are taking place in your personal life, in order to get your attention. And then make repeated references words such as paranoid, crazy, scared, panic, insane, freak, sad, depressed, etc. This may be done repeatedly while the trigger words are emphasized. The idea is that the words will invoke the emotion. Not only is this possible, but it works best when you don t know it s being done to you.

Some words carry with them a particular weight to potentially trigger an effect on a person s emotional state.(3, 9)

Some of these harassment skits are designed to transfer the emotions of those weighted words to affect a negative emotional state upon a target. In addition these words can be emphasized by changing their tone & volume when they re spoken. This is called metacommunication. Metamessages are suggestions hidden in a statement, perhaps a compliment. The tone, volume, & rhythm of specific words in the sentence are changed so that the actual message is different than what the spoken words were.(5, 4, 328) Obviously this works better on some individuals than others.

Posted in Cointelpro,mindcontrol,Neuro-linguistic,Neurolinguisticprogramming,NLP,programming by thehiddenevil on August 26, 2007

32.

You can think of NLP as a very powerful tool that can be used to produce rapid, profound change.(2) Harassment groups create negative emotional states such as fear & anxiety, & anchor them to common objects in the environment.

There has been some concern in the mental health field over the potential misuse of NLP. Unfortunately, like other tools, such as guns, they can be misused in the wrong hands.(2, 344) Groups use this science in a destructive format.

NLP-The New Technology of Achievement, Steve Andreas & Charles Faulkner

It is a common experience for many people, when first introduced to NLP, to be concerned about the possible uses & misuses of this technology. We recognize the incredible power of the information presented in this book & recommend you exercise caution Here s an example of how groups use anchors:

[One morning your walking out to your car & a man walks in front of you, stares directly at you in a hostile manner while repeatedly clicking his pen the whole time. You feel a little uneasy & say to yourself, Boy, that was weird, what was his problem?

Then two hours later you re leaving a shopping mall on a day that it was not particularly crowded. As you walk out to your car, an old lady approaches you on foot. As she almost collides with you, she locks her eyes onto you with a hostile demeanor, while clicking a pen the whole time.

Then maybe you tell yourself something like this. There couldn t be a relation between those events, probably just a coincidence. But they both stared at me in such a mean way while hammering their pens…

Later in the afternoon, you re on your way home. You re at a stoplight & out of the corner of your eye you see a passenger in the car to your left. You hear a slight noise, & glance over. You see a man glaring at you with a grin on his face. His arm is hanging out the window & he is holding a pen, which he is repeatedly clicking. Now imagine that happening for a month. Then one day a month later you re on a sidewalk with a friend or family member. A man walks by, doesn t look at either one of you, but clicks his pen a couple of times. You feel anxious & afraid.]

You may not even know you ve been sensitized. But if you did recognize it as an attack, what would you tell your friend or family member?

This is what happened: The collisions, blatant hostile staring, & foul grin created the negative emotions & anchored them to the pen, which has now become the trigger. That is an example of a sensitivity program. Now imagine yourself being sensitized to multiple objects & sounds, & each of them creating pain each time you see or hear them.That s the power of NLP! And that is only one, small segment of the entire harassment program. Targets around the country & the world have witnessed this being done with sounds, gestures, cell phones, laptops, pens, cars, watches, clothing, symbols, colors, & other items. This type of attack does require some maintenance & will loose its potency unless it is reinforced. So groups will reinforce these anchors & triggers with occasional blitz attacks from time to time.

Groups will take an object you ve been sensitized to & link it to another object. The idea appears to be to keep expanding the amount of objects you associate fear, anxiety, anger, or shame with (sensitization). For instance, one of your neighbors, has made it abundantly clear that they’re participating in the harassment. Now, you know they’re participating, & they know you know. So they may try to sensitize you to other stimulus, such as a car alarm. Since you ve already associated them with massive pain, they can extend their harassment to a sound by turning their car alarm on/off in rapid succession over a short period of time, multiple times throughout the day. After they ve done this for a couple of days & you ve been sensitized to this sound, they can reduce their use of this specific tactic & just use the occasional maintenance sounds to keep you sensitized.

Now instead of repeatedly turning it on/off for ten times, they only do it two or three times in a row, just to let you know you re being harassed. Even though it s only done a couple times in a row, you know why they re doing it & you may feel anger, fear, anxiety or other negative emotions. You may also feel frustrated at the prospect of trying to explain this covert harassment to another individual. Anyone else observing this might think it s a little strange that

Posted in Cointelpro,mindcontrol,Neuro-linguistic,Neurolinguisticprogramming,NLP,programming by thehiddenevil on August 26, 2007

31.

Techniques used to silence critics, Ted L. Gunderson FBI Senior Special Agent In Charge (Ret)

Threatening Letter-Further, its content appear to contain a subliminal message that are routinely used by Satanic cults & their splinter groups.

These messages will probably contain junk in the body & you may not be able to reply to it as it came from a bogus address. These cryptic attacks are mentioned in a book titled Subliminal Mind Control by John J. Williams. The message will probably pertain to something in your life situation. For instance, if you re going bald & have been looking for treatment, you could receive the following attack.

To: John Doe

Subject: Euro Paulding Tummy

Body: asdfl;jkasdflkkjasdf;lkjasdfljkasdfl;jkasdfl

Or

To: John Doe

Subject:: Hiraless Tupid

Body: kasdflkjasdfl;jasdf;lkjasdfkj

Any weakness you have can be exploited. Remember, this is a professional organized harassment service that was originally developed to neutralize foreign agents.

Sensitivity Programs

Cause Stalking groups usually begin their campaigns with sensitivity programs.(7) The goals of a sensitivity program are:

To get the person s attention & let them know they re being harassed

Anchor damaging emotions to common objects/sounds so a target can then be covertly harassed openly in public

These sensitivity programs are based on a science called Neuro-Linguistic Programming (NLP). The parts of this science that groups use are anchors & triggers.

We re unconsciously creating anchors in our environment all the time with people, music, places, & objects. Initially, the target may not be consciously aware of the harassment, but this is not necessary.(7) One reason people may not realize that they’re targeted or can’t remember exactly when it began, is because these groups may slowly & gradually increase the harassment over time. But groups can let you know you’re being targeted any time they choose by turning up the volume with a blitz attack. Groups use sensitivity programs in an attempt to create phobias.

Introducing NLP, Joseph O Connor & John Seymour

“A stimulus which is linked to & triggers a physiological state is called an anchor in NLP. How are anchors created? First by repetition.

Secondly, & much more important, anchors can be set in a single instance if the emotion is strong & the timing is right. In extreme cases an external stimulus can trigger a very powerful negative state. This is the realm of phobias.”

Self-help gurus use these programs to create positive emotional states & anchor them to a movement, a sound or an object. Then the sound, movement, or object becomes the trigger that will invoke the emotion. Although this sounds complex it is actually pretty simple component of NLP. It is done by creating a peak emotional state, then while in that state you anchor it, that is, do something repeatedly. This effectively anchors the emotional state to whatever was repeatedly done.(2) This process of creating anchors has also been called Emotional Transference.(1)

Posted in Cointelpro,Control,email,gang-stalking,gangstalking,Gaslighting by thehiddenevil on August 26, 2007

30.

degree, & impede the groups’ progress. These people may also help with misdirecting events, or generally keeping groups disorganized & ineffective, under the illusion that progress is being been made.

These informants/perpetrators will give you correct information, & you may not find out until later that they’re trying to traumatize you as well. You may not be able to make other group members aware of it, as these informants may be well-respected members. It seems like a contradiction. Why would a perpetrator give you valuable information?

While I don’t know the exact answer to this question, here are some possibilities: 1.They know you would have eventually found the information anyway, so this trade-off is worth appearing genuine & gaining your trust, which may be exploited at a later date.

2.Create fear & uncertainty within you, causing you to doubt your own judgment.

3.This may further traumatize a person with feelings of hopelessness when they learn that a very well respected group member is harassing him/her.

If you think that the people who oversee these neutralization programs have not infiltrated these groups, or even deliberately created some as a catch-net in order to disrupt & minimize progress, you are probably mistaken. The people who designed this system were not incompetent & some of these support groups seem to be just another phase of the campaign. If you find yourself on the receiving end of repeated covert or overt criticism by one or more of these prominent victims, you can give yourself a great big pat on the back. This one of many layers in this system of control that you’ll encounter.

Also, some people who may have been genuinely trying to raise awareness, may have been bribed, blackmailed or simply tortured (Directed Energy Weapons) into becoming informants, & therefore, have been compromised. Some of the most outspoken victims & leaders in these groups appear to be deliberately operating within boundaries designed to slow progress. And, as in most social systems, there is envy, fear & jealously. If you choose to participate in one of these support groups, you may want to limit your exposure to certain people. However, although these groups are fraught with perpetrators, not all of them are. So you may still want to attend meetings & events as it will be a good opportunity to connect with other people. You will find many people who are very decent & you may even make somenew friends. Trust your own judgment.

I have been in contact with perpetrators posing as victims on the phone & via email that have hinted that I must not be genuine. It is likely that these fake victims have probably spread lies to targeted individuals indicating that I’m not really targeted since I don’t appear to be suffering or helpless. If you are raising awareness, then discrediting attempts such as these will be standard practice. It appears to be critical that they attempt to isolate you from group members who you may have a positive influence on. Once again, organizations were heavily infiltrated during Cointelpro & jacketing was used extensively.(10)

Electronics

In addition, many targets report their computer has crashed or been broken repeatedly, even after OS reinstalls. It is possible that the E-bomb or a similar energy weapon is being used to destroy this equipment.(309, 310) Your email may be blocked or filtered & your web activity may be monitored with Carnivore, DCS1000, or similar tracking software.(308) If you try to sell things online, participate in online discussions groups, online dating, respond to employment Ads, it is very possible you will be interrupted, trashed, or harassed. This can be done by a combination of paid civilian contractors (operatives/provocateurs) & email filtering. Some people have reported that their inbox is clogged with junk messages even if they have filters on.

In addition, you may receive unsolicited messages with cryptic borderline-subliminal attacks in their subject lines. The words will be garbled but contain letters that convey a message when arranged in the correct order. Or they may contain a sounds like message. Your mind will automatically piece these letters together so they make sense.(1)

This is done on the fly, without you being aware of it.

29.

Noise campaigns All targets of Organized Stalking are quite familiar with noise campaigns. Basically, there will be a steady stream of noise consisting of a rotation of various types of disturbances around your house. This noise may even follow you wherever you go. This includes car doors slamming, people coming/going, people yelling, car alarms, horns, tires screeching, banging, engines revving, cars beeping, constant construction, lawn mowers, snow blowers, etc.(7, 101, 200) Your neighbors will probably be bribed with free home repairs that will result in a very noisy construction process.(7) An ongoing noise campaign appears to be most effective. Like the collisions & cut-offs, these noises are done to startle you & keep you uncomfortable.

For instance, there will be doors slamming for a few moments, then a motorcycle will drive by & rev its engine outside of your house. After that you ll have someone mowing the lawn. Then there will be alarms going off. After that you ll hear a loud crowd of people walk by your house. You may then hear fire or ambulance sirens. Then there are hammering & sawing sounds. Then you ll hear car alarms being turned on/off in succession multiple times from multiple vehicles around your house. After that it will switch back to car alarms & horns. Then drilling, & doors slamming.

Often, activity such as noise will be synchronized with you coming, going or doing some other type of activity.(7) For instance you may hear ambulance, fire engine sirens or beeps as you leave. Noises made as you leave also appear to serve as a form of communication to alert group members in the area to begin pursuit.

Terrorist Stalking in America, David Lawson

Group members will drive by the target s residence honking their horns, squealing their tires & making whatever other noise they can… you might see a work crew working on a certain floor and making a lot of noise. If you look to see what they have done after they have left, you will see that they haven’t done anything.

Chronic exposure to even low-level noise is considered a hazard that has been known to produce adverse physiological & psychological health effects.(314, 316, 317) Prolonged expose to noise can produce high blood pressure, a rise in cholesterol, damage to the circulatory, cardiovascular, gastrointestinal, & musculoskelatal systems.(315, 26)

If you re targeted & pregnant or plan on having a baby, you may want to think twice. Noise has been known to cause hearing loss & growth disturbances in a fetus, & can lead to birth defects.(318, 319) Just as the fabricated cut-offs are likened to getting slapped, these noises are the equivalent of being repeatedly shocked. There is no question that these low-intensity neutralization tactics are acts of extreme violence.

Online

People

Online harassment appears to be another part of the harassment package. If you have a website devoted to Organized Stalking you may have people emailing you to flame you, or claiming that they are victims & asking for support with the intention of discrediting you. You may receive unsolicited email that parallels a current event in your life.

Again, surveillance is used primarily for harassment. Or you may receive covert insults & threats. If you join a support group, you may also receive harassment via threads posted on message boards. Like other mediums of harassment, the topics of these threads may be about events that are unfolding in your personal life, as well as threats or insults covertly directed at you. This will probably happen repeatedly by the same person or people.

They may also employ some Gaslighting, or Jacketing tactics. Jacketing was often used during Cointelpro to make genuine activists look like informants.(10) Some internet groups which help stalking victims are heavily populated with perpetrators posing as victims.(7) Some of these perpetrators seem to be very vocal & popular members of these support groups. It seems that this a damage-control mechanism put in place to corral people, manage them to some

28.

invading my personal space. There was no special equipment that they were using located in that area. I noticed one had a shirt on that said something like, The MOST important part of playing rugby is support.

Anyone who can t wait a few minutes for you to finish & needs to stick their arms in your face is doing it on purpose.

In addition, the exercise they were doing could have been done anywhere else a gym that was almost empty. It was a dead giveaway. Another student arrived & began lingering in an area to my left. He stared at me for a few seconds & started smirking. Once he had my attention he turned his back to me so I could see his shirt which read, CHASE. In smaller letters underneath was the word, Manhattan. These attacks using symbolism are common reports among people who are targeted. They are also consistent with borderline-subliminal attacks used by Satanic cults.(100) The kid with the CHASE shirt left shortly after, & his total stay was about 10 minutes. That episode is an example of noise, crowding, symbolic attacks, & sensitivity tactics. This is standard procedure.

Synchronization

Synchronization seems to be very prevalent with Organized Stalking.(7) Groups will try to synchronize their tactics with things that you do such as entering or leaving your house. You re movements will be synchronized with noise, vehicles coming or going, people coming or going, or other movements. These synchronization tactics are often times done several times, perhaps three or more. For instance, when you arrive, two cars will drive down your street & someone will be banging a hammer. Or you may have two cars leave & one arrive. Three or more seems to be the magic number when it comes to synchronization. You may also hear ambulance or fire truck sirens the moment you enter or leave your house.

If you have a habit of going to the bathroom early in the morning around 2AM & looking out your bathroom window at a specific area, then they will eventually arrange it so that when you do this there is some activity such as a light being switched on or someone leaving or arriving in that area. This is an example of the level of detail that they will resort to when tailoring the harassment protocol to your profile.

Convoys of vehicles

If you’re targeted, you may have foot & vehicular traffic “re-routed” through your street. You’ll have an unnatural amount of vehicles driving by your house (even if you’re on a side or dead-end street) &/or following you while your out. Common practice is for vehicles to drive by screeching their tires, blowing their horns, playing loud music, revving their engines, & yelling as they drive by your house. This can include fire trucks, ambulances, city/utility vehicles, & postal vehicles.(7) Some targets have even mentioned that local police vehicles have participated in the harassment.

Brighting

A classic KKK tactic. Vehicular brighting seems to be strategically used with corners. For instance, you ‘re walking down a quiet street late at night & you have people repeatedly turn onto or off of connecting streets. Their timing is such that they continually turn the corners while you just happen to be at it. This effectively blinds you. This may happen at each & every corner. Or, as you walk down a side street there is one or more cars parked on the side, facing your direction with the lights on. They will also wait for you to approach them & then pull out into the street, thereby brighting you as you walk by.

You may also be followed by convoys of vehicles that have their Hi-beams on during the day.(7) These Brighting tactics are maximized when a vehicle has one headlight grossly misaligned. The misalignment produces a Hi-Beaming effect. Like other Organized Stalking tactics, frequency & duration play an important role here. Spot lights being shined into a target s windows is another tactic.

27.

you make it conscious. If you make some of these unconscious communication behaviors conscious, you will probably have powerful means of persuasion. The study of this language has been called Social Kinesics (the study of body communication).

There are two components to this communication:

1. Movements, gestures, postures

2. Spatial relationships

The study of communication using distance/space is called Proxemics.

For most North Americans the intimate zone is 0-18 & personal space 1 ½ -4 ft.

This type of communication is used to harass a person. For instance, while in stores, restaurants & public places that are not busy, a target will have people crowding around them, invading their personal space. This happens even if there are only two customers in a store. If a person makes a move from one place to another in a store several people may suddenly appear & jump out in front of him from around corners & isles. A common experience reported is the sudden movement of a crowd of people into a checkout line that a target is moving toward.(7) These blitz attacks also happen outside. This can be detected by getting up, moving in one direction, then stopping & watching.

If you’re targeted, you’ll see a wave of people move in the direction that you were headed toward, to swarm you & cut you off. If you wait for a few moments you’ll see that activity will settle back to normal again after they pass. This test can be run indoors & outdoors as well. Sometimes they may blatantly adjust their timing, or linger for a while until you begin to move again, then they’ll continue. This program was tailored to represent a target as someone suffering from schizophrenia when explained to health professionals. This is no surprise, the intelligence community has worked extensively with the psychiatric industry.

Prolonged crowding can have an extremely negative effect on your mental/emotional health.(320-323) The people who designed this harassment program were well aware this. While some cultures may be more immune to crowding than others, even people from parts of the world that have been historically crowded react stressfully to crowding. People who have not been invited into your intimate space but deliberately violate it are committing acts of violence. The people that participate may justify their behavior because they serve a “greater cause” & don’t see their behavior as acts of violence. But the culmination of these tactics amount to no less than soul murder.

People of the Lie: The Hope for Healing Human Evil, Psychiatrist M. Scott Peck

When I say that evil has to do with killing, I do not mean to restrict myself to corporal murder. Evil is also that which kills spirit.

If you are an Organized Stalking target you ll be followed on foot & swarmed anywhere you go out in public.(7, 101)

Even on days/times that there are normally not many people. This happens in stores while making purchases, restaurants, businesses, where you have people constantly cutting you off, invading your space, using sensitivity programs, or other harassment tactics. Sometimes this is blatantly obvious. For instance, your in a fitness center at a time when it is not crowded, but you have multiple people who, instead of taking the shortest path to their destination, continue to go double or triple the distance just so they can brush by you, cut you off, etc. These collisions & crowdings amount to an obstacle course that follows you wherever you go. And this is only a part of the harassment.

Here is one personal example that took place at a YMCA in Boston, which occurred shortly after I realized I was being Gang Stalked. At the time, there were four people, including myself in the weight room. After I was there for a few moments I noticed there was an unusual amount weight banging. It was louder & more repetitive that it normally is.

I ve been exercising & going to health clubs for about 15 years & I immediately recognized that these few people were repeatedly going out of their way to make as much noise as possible. I sat down on a bench & started doing dumbbell presses. Two students walked in, stood on either side of the bench I was sitting at & began to do lateral arm raises,

26.

A lot of this began with early experimentation on military bases where the spouses of military personnel & their children where targeted. It s really just terrible. And of course your economic or your financial state is destroyed. They absolutely make people loose all their jobs; it s impossible for them to ever work again. -Leuren Moret, president, Scientists for Indigenous People, former City of Berkeley Environmental Commissioner CFRO 102.7 FM August 8th 2005, Topic- Electromagnetic Weapons: The Technology of Political Control

Collisions & Cut-offs

The cut-offs I m talking about here are usually not physical. They re fabricated, but like most Gang Stalking tactics they are designed to look like normal cut-offs that we all experience from time to time. They can happen with vehicles, on foot, or a combination. This type of space invasion is designed to startle you & create tension. It can be thought of as a virtual slap. They are used in blind areas such as corners, hallways, restrooms, or intersections where you constantly have people or cars cutting you off, or almost hitting you. The perpetrator is unseen until he jumps out in front of you. This happens in stores, buildings & on the street, with people & vehicles. Generally, anywhere there is a blind corner.

With some artificially induced cut-offs, the perpetrator is seen at a distance. You & the perpetrator(s) are heading toward the same focal point. It may be a corner, a very small walkway, or a path that cannot accommodate both of you.

They will adjust their timing & rhythm to yours so that they always meet you at that point, so that you will have to squeeze through, stop, or go around because of their deliberate adjustment of timing. The idea is to get your attention & make you uncomfortable. If you re a target, their timing will mirror yours so that a collision will occur.

For example:

[You re on foot & approaching a corner of an intersection, which you are about to cross. You see a vehicle approaching the street you need to cross. There is plenty of time & distance to avoid this collision. Anticipating this, you either speed up or slow down. The vehicle mirrors your actions. You start to think that maybe this person is occupied with something else & you begin to cross the street. As you step off the curb, the vehicle speeds up & meets you at the intersection. The vehicle stops ten feet from you & the man inside waves you on. After this you might fee slightly angry because you know the whole event could have been avoided.]

In a normal situation, both parties will naturally adjust their timing & rhythm to avoid this situation. The main objective is to cause an unnecessary inconvenience. Again, these are usually not physical collisions, they re designed to invade your space & make you unconformable. In addition, people have reported staged accidents with their cars & narrowly escaping death.(101, 200)

Frequency, duration, location & proximity. Early in the morning on a day that is not crowded, it is not normal to have people repeatedly cutting you off inside stores with their shopping carts, or jumping in front of you as you enter a checkout line, or out in the street. These collisions amount to an obstacle course that follows you wherever you go.

And this is only a part of the harassment.

Blocking, Swarming & Space invasion

In parking lots, on foot, on the road, in stores & restaurants. These are staged events that may temporarily prevent you from leaving if you re in a parking lot.(7) You will always have people who you have to go around, or say excuse me to, & people stopping short in front of you to tie their shoe or pick up a coin.

Terrorist Stalking in America, David Lawson

Staged events would included blockading a target s vehicle so he cannot get out of a parking lot. Staged events are used to prove the superiority of the group & they (sic) control the target s time.

Body language is more accurate & reliable than verbal communication.(5) A majority of these non-verbal behaviors such as mirroring, echoing, & pointing take place without conscious awareness.(5, 6) We point with our feet, our torso, our arms & hands, usually toward an object we’re interested in. Also, our eyes have a natural tendency to follow hand movement toward an object being pointed at. Most of this non-verbal communication is unconscious, that is, unless

25.

Once I had three separate recruiters from the same company in Burlington, MA ask the same basic questions, on three separate occasions. This was done repeatedly using accusing & mocking tones. For instance, during one conversation I was asked why I didn t have a reference from my former manager. This man asked me basically this same question multiple times. Recognizing that this may have been part of a Mobbing skit, I made it abundantly clear that I did not have a reference from my former place of employment, but that I had other professional references. He then hung up.

Later, this man called me back asking other questions in an accusing tone, & making negative accusations, such as What have you been doing, Haven t you been looking for work, We re a little concerned, Haven t you done anything at all since December? During the phone interviews he asked me if I had a reference from my former manager. This was done repeatedly, more than several times. I told him I didn t. Then he said he wanted to know the name of my former manager, just out of curiosity. I gave him the name, & he told me in a semi-threatening tone that he was going to call anyway. My conversations with the two other recruiters from this office in Burlington, MA were similar. Once more, these questions are asked repeatedly using accusing & mocking tones. These are classic Mobbing games. Some of these people have apparently just accepted the idea that they’re slave-cowards. Fortunately for them, all they need to do is look in the next cubicle for support. If this type of support were to be verbalized, it would go something like this, “You’re a loser, & I’m a loser, & it’s OK. I accept you as a coward, & you do the same for me.

And don’t worry, we’ll be protected in exchange for our obedience.”

Coward (kou’erd), n 1. a person who shows shameful lack of courage or fortitude. -adj. 2. of, pertaining to, or characteristic of a coward.

-Webster’s 1997 Edition

During an interview you may have potential employers demanding credentials that they did not list as a requirement in their AD. During phone interviews you may have employers telling you that you responded to an AD other than the one that you actually responded to. They may also tell you that they did not place the AD, or that they placed a slightly different one. They may also tell you that your updated resume says you re currently working at a place that you never worked at, or a place you worked at a decade ago.

Some harassment is masked in layers of accommodation to help strengthen the illusion that you re not working because you don t choose to. For instance, you may have recruiters who have harassed you in the past leave messages on your answering machine or with relatives/friends, indicating that there are opportunities available to you. It will be made to look as if you re unemployed due to your choice. This is the equivalent of standing in a crowd of people & stealthily poking a person in the back while others aren t looking. The general public may not realize that the Blacklisting mechanism exists because the institutions that use it operate most major news outlets. Reporters & historians are blacklisted for reporting corruption or historical facts that the government-corporate complex does not want the public to be aware of.(28, 346)

Book Review – Into the Buzzsaw: Leading Journalists Expose the Myth of a Free Press by Kristina Borjesson (Editor), Gore Vidal

(Foreword) http://www.mapcruzin.com- Editorial Reviews-Inside Flap

The buzzsaw is what can rip through you when you try to investigate or expose anything this country’s large institutions be they corporate or government want kept under wraps. Indeed, if members of the general public read this book, or even portions of it, they will be appalled.

Reporters who tattle risk losing their jobs and being blacklisted Writing in riveting, often gut-wrenching detail about their personal experiences with the “buzzsaw”–concerted corporate and/or government efforts to kill their controversial stories and their careers-

If you re Blacklisted & you re being harassed, you will probably not be able to prove it. Like all Mobbing & Organized Stalking tactics, it will be heavily concealed. Unless you know someone who owns a business or can get you in someplace, you will probably be unemployed. At best you may be underemployed. If you do find some type of employment, you may be Mobbed out the door after several weeks.

24.

Some tactics used to keep you Blacklisted include interfering with communications, & slander. Also there are lists & software packages used to check these lists for suspected terrorists, threats to national security, etc.(109)

Apparently this is a flourishing business & some organizations are required by law to use it.

The Surveillance-Industrial Complex:

How the American Government Is Conscripting Businesses and Individuals in the Construction of a Surveillance Society

The American Civil Liberties Union http://www.aclu.org, August 2004, Written by Jay Stanley

An entire industry has sprung up to produce software that makes it easier or companies to enforce the government s blacklists and other mandates. An example is Homeland Tracker, produced by a subsidiary of the giant database company Choicepoint to help any business comply with OFAC and USA PATRIOT Act regulations. The manual proudly touts the software s ability to get identity verification, check individual names, scan customer files and build personal accept and deny lists (otherwise known as blacklists).

Federal law enforcement have sent watch lists to corporations containing names of individuals that were not under official investigation or wanted, but that the agency just had an interest in.(390) We already know that some of these agencies are targeting & harassing citizens. Would it not be reasonable to conclude that they are misusing this resource as well?

Big Business Becoming Big Brother

Wired NewsWire 02:00 AM Aug, 09, 2004 EDT, By Kim Zetter

The ACLU released the Surveillance-Industrial Complex report to educate the public about how information collected from them is being used. The report notes that there is no way to determine how many job applicants might have been denied work because their names appeared on the list. “It turns companies into sheriff’s deputies, responsible not just for feeding information to the government, but for actually enforcing the government’s wishes, for example by effectively blacklisting anyone who has been labeled as a suspect under the government’s less-than-rigorous procedures for identifying risks,” the report states.

In addition to slander & keeping you unemployed, they may also use companies or recruiters in harassment campaigns (Mobbing). This is particularly the case with recruiters. It appears that they are often used to try to further traumatize a person using Mobbing tactics during interviews. For instance, they may ask you a series of questions for which you have to answer no to, such as asking you for credentials that you did not list on your resume.

They may ask you if you possess skill-sets which were not listed on the AD they had placed. This is designed to further humiliate you. These things happen to everyone once in a while. But with Mobbing, these things are done repeatedly by multiple people, time after time. There is basically a safe zone that these people can harass you from with little fear of being caught.

One common ploy used by recruiters is that they ll tell you that they don t have your resume in front of them. This tactic may widen the harassment scope by allowing them to ask potentially painful questions that are already answered on your resume. These questions are asked with ACCUSING, or MOCKING tones. They are designed to try to stir up negative emotions associated with a previously painful work environment. They may ask these questions repeatedly using a slightly different syntax such as, What was your last job?” Are you still there?” [When they know you’re not]

“How was the environment?” [If you were Mobbed] “So, you ve been unemployed since?” “So…you ve done nothing at all since?” “Why aren t you working?” [Accusing tone] “Haven t you been looking for work? Recruiters are paid by corporations to provide a service, (people). When you think about it, recruiters are actually employees of corporations, only they work in remote offices. Just as an in-house employee will participate in Mobbing out of fear of termination, or retaliation, these virtual employees are easily co-opted.

Mobbing-Emotional Abuse in the American Workplace, Davenport, Schwartz, Elliot

Mobbing sometimes continues after individuals have left the organization. Although this can rarely be proven, slandering continues… This ongoing mobbing, even after the individuals are no longer connected with the organization, seems to justify the Mobbers previous behavior & upholds the organization s decision. They try to defend themselves by continuing to destroy the victim s reputation… Dianna: the next minute I thought, Howe can all these people just go along with this? Yet I would think, I can t blame these people. I know they have to go along with this for their own survival

« Previous PageNext Page »