The Zionist Death Grip On The United States Government Greg Reese | Infowars.com April 30th…
Appendix 27: Purpose, Structure, and Methods of Organized Gang Stalking: From “Gang-Stalking and Mind Control – The Destruction of Society Through Community Spying Networks”
Mind Control & Cults
Articles & Interviews
Books and pdfs by Dr. Robert Duncan, ex-CIA neuroscientist
October 7, 2024“PsyWar: Enforcing the New World Order:” Dr. Robert Malone Lecture
September 17, 2024Part VI: Mind Control: History and Applications
August 15, 2024Part VII: Electronic Mind Control and Electronic Weapons
August 13, 2024Part VIII: Cult Connections
August 9, 2024Appendix 7: Human Experimentation in America
February 24, 2024Appendix 32. NSA Mind Control and Psy-ops by Will Filer
December 1, 2023Appendix 42. Psychological Operations Blueprint (by Omnisense)
November 1, 2023The Intra-Body Nano-Network Compilation (Sept. 5, 2023 video)
October 27, 2023Appendix 52: British Mind Control and Transhumanism: Cathi Morgan Interviews
September 18, 2023Cognitive Warfare June-November, 2020 Francois du Cluzel
March 16, 2023Appendix 103: Gangstalking/Cyber Torture in Flow Chart Diagrams
January 28, 2023Appendix 152. Torturedinamerica.org. Excellent website!
July 16, 2022Appendix 220. (Nazi) Vril Maidens (2 articles)
May 13, 2021Quora Q & A On Gangstalking
March 14, 2021Elisa E. (“Our Life Beyond MKULTRA”): 5 Interviews
February 15, 2021The MANY Methods of Mind Manipulation . . . a Worldwide Operation
October 22, 2020Digital Twins, Digital Immortality, and Targeted Individuals
September 19, 2020MKULTRA and Operation Paperclip youtube
January 4, 2019MKULTRA Survivors Speak (youtube and article)
November 18, 2018Anthony C. Sutton: Psychotronic Weapons and Behavior Modification
November 16, 2018Appendix 227: Masonic-Jewish Murder Ritual on Video
June 4, 2018Appendix 234: Maurice Strong and Tavistock (video)
June 4, 2018Truth In Quotes and Images: Freedom Fighters Help Yourselves
January 5, 2018Psychopolitics: Jewish-Communist Brainwashing Techniques (Kenneth Goff)
December 19, 2017Military Amok: Army Deploys Psy-Ops on U.S. Senators
October 2, 2017USAF Squadrons & Satellite Weapons
June 19, 2017How To Stop Electronic Torture!
December 5, 2016“NSA Mind Control and Psyops” by Will Filer
December 5, 2016Las Vegas “shooting”… Just Another Staged, False-Flag Event?
October 31, 2016Total Individual Control Technology (by Omnisense)
February 17, 2016THE SILENT MASSACRE: ELECTRONIC STALKING AND MIND CONTROL
December 2, 2015The Invisible War: 21st Century Targeting (youtube)
November 14, 2015‘The NSA – Citadel Of Evil’ by Steve Smith
October 27, 2015Dr. Stan Monteith, Author
February 25, 2014Dr. Eric Karlstrom on Sandy Hook / Mind Control
February 25, 2014Dr. Eric Karlstrom
February 25, 2014Social Engineering 101: Silent Weapons for Quiet Wars (Against Humanity)
February 25, 2014Organized Gang Stalking Quotes
February 23, 2014Appendix 27: Purpose, Structure, and Methods of Organized Gang Stalking: From “Gang-Stalking and Mind Control – The Destruction of Society Through Community Spying Networks” (A. K. Forwood)
ETK Introduction:
The following information regarding organized gang stalking is taken from http://www.police-surveillance-expert.com/stasi-uk/4583865725, which, in turn, is taken from A.K. Forwood’s book, “Gang-Stalking and Mind Control – The Destruction of Society Through Community Spying Networks” (http://gangstalkingwiki.com/Media/PDF/Books/Citizen/A4_DestructionOfSociety.pdf). A.K. Forwood has been declared as missing since July 2015 due to his work in exposing the new Global Stasi Networks….)
I regard the following as the best, most comprehensive, and most useful information on the topic of gang stalking that I have yet discovered either from books or the internet. I have already posted considerable information on this important topic on this website. Information herein is especially essential because it demonstrates the connections between organized gang stalking, mind control, the CIA’s MKULTRA programs, Satanism, blood-line Illuminati families, the Rockefellers, the planned fascist/communist (Luciferian) NEW WORLD ORDER, and even OPERATION 9/11. This post is added as Appendix 27 to my series; “Is Crestone/Baca the “Vatican City of the New World Order?” An Expose of the New World Religion.” because information herein may indeed explain much of what has been going on in my hometown of Crestone/Baca, Colorado. It certainly explains how an entire community can be turned into a virtual spy zone. And it could explain how and why residents in this particular community have been deliberately driven out and/or may have been “suicided” and/or “disposed of” in ongoing cult/mind control/gang staking activities.
Widespread community stalking in Crestone/Baca, Colorado, could also help explain the following comments overheard by this author and reported in Part XII (“Hypotheses and Conclusions”) of my series, “Is Crestone/Baca the Vatican City of the New World Order?:”
Comment l) Resident of Saguache, Colorado (Peter Horn), in 1994:
“The CIA is very interested in that place (Crestone/Baca).”
Comment o): FBI counter-intelligence expert on NPR radio interview, May, 2013:
“You can’t trust anybody if you live in a “targeted community.”
Comment q): Local Baca resident and medical professional (Marcia Heusted):
“Crestone/Baca has the highest percentage of mental illness I’ve ever seen.
Comment r): Visitor, observer (possible ”Change agent”/ “fifth-columnist”/spy?) in Crestone (Bruce Pollack), 2013:
“Crestone/Baca is an open-range asylum.”
Comment s): Crestone local at grocery store (Helena Wright), 2013:
“All the crazy people around here?! Holy Crap!”
Comment t): Visitor/observer/agent(?) in Crestone, 2013, (Bruce Pollack):
“Most people around here are afraid to come out of their houses.”
2-l) Ruth Pulver, long-time Baca resident from Switzerland, 2014:
“Now Crestone is going to take you down.”
The last two comments, in particular, seem to suggest that: 1) organized gang stalking activities were well-established, widespread, and successful throughout Crestone/Baca by 2013, and 2) the individual who made comment 2-l was well aware of the dynamics and damaging effects of community-based gang stalking. Based on available evidence, my tentative conclusion is that community spy networks are prevalent and active in my home town of Crestone/Baca, Colorado and are being used to drive good people out of this community.
There are four segments to this post: In Part A., I reorganize this information into the sub-headings below in order, hopefully, to make the material more accessible to the reader.
In Part B, I include the same article with the same content as printed in http://www.police-surveillance-expert.com/stasi-uk/4583865725. I encourage everyone concerned to read Forwood’s entire book at: http://gangstalkingwiki.com/Media/PDF/Books/Citizen/A4_DestructionOfSociety.pdf.
Part C, “Organized Gang Stalking: What You Need to Know” (by OSI Organized Gang Stalking Informers), is another good summary of the gang stalking phenomenon.
(OSI Organized Stalking Informershttps://www.facebook.com/OrganizedStalkingInformers/?fref=nf
January 3, 2013 · https://www.facebook.com/OrganizedStalkingInformers/posts/313050825461644)
And Part D, “Covert Community Killing” by Keith Kampschaefer (11:40 am on December 2, 2014), emphasizes the important roles of gnosticism and the occult in community gang stalking activities. The article also highlights President’s Obama’s call for a “Civilian National Security Force” as presage to the present American Gestapo SS Police State. On July 2, 2008, President Barack Obama stated: “We cannot continue to rely only on our military in order to achieve the national security objectives that we’ve set. We’ve got to have a Civilian National Security Force that is just as powerful, just as strong, just as well funded.”
(https://tisurvivor.wordpress.com/2014/12/02/covert-community-killing/)
Part A.
I. What is Organized Gang Stalking?
a. Notification Lists
b. Non-disclosure Agreements
c. Generating False Rumors
d. Turning an Entire Community into a Virtual Spy Zone
II. Mind control (and Murder)
a. Mind-controlled Multiples
b. Witting or Unwitting Perpetrators?
III. Origins
a. Satanic Undertones
IV. Purpose
V. Structure
a. Organizations
b. Top-Level Perpetrators
c. Intermediate-Level Perpetrators (handlers and controllers)
d. Bottom (Street)-Level Perpetrators
VI. Methods
a. Surveillance Technology
b. Fake Police Files
c. Hacking the Target’s Computer
d. Operation 9/11
VII. How Targeted Individuals Can Fight Back
a. Methods for Fighting Back
b. Turning the Tables
Part A.
I. What Is Organized Gang Stalking?
Predatory Gangstalking is a criminal phenomenon referring to a group of loosely affiliated people who, in an organized and systematic manner, relentlessly invade all areas of an individual’s life on a continuing basis, as part of their lifestyle. While each individual gangstalker does his or her small part, what defines Predatory Gangstalking is the collective intent to do harm.” – R.B.Ross
“(Gang stalking) is often disguised as ordinary activity and coincidental events that involve people who have no apparent reason to purposely act in the way they do. The strangers passing in the street, the tenants in the building you live in, the people you deal with at work all day, even your friends and members of your own family, each might begin to act in ways that seem suspicious, strange, often bizarre, and which result in causing you personal frustration, anger, emotional distress, paranoia, or worse.
What I am referring to is not isolated to just a few people among the population. According to the growing number of people coming forward and telling their stories, this is a problem of epidemic proportions….. The activities that this network of individuals engage in are quite varied, but they all result in displacing the freedoms and choices that a person would normally expect to have in our society.
Some people who report being the targets of these activities claim that the lengths that the perpetrators will go to in these acts include continual abusive harassment, psychological and physical torture and sometimes even murder. These strange activities will not be isolated events in a target’s life, but will be ongoing, usually occurring regularly enough that there can be no mistake that they are not just coincidental, but very purposeful. For the person being targeted, these events will usually go on for a long time, usually for many years, and the perpetrators will often increase in their methods and persistence over time.
This odd activity is commonly referred to as ‘gang-stalking’, ‘cause-stalking’, or ‘organized stalking’, and for people who have never heard of it before, it’s somewhat hard to fathom both why and how the groups who stage these events can put so much time and planning into them, and can organize them so well for such apparently irrational purposes, and nobody involved in it ever says anything. The fact is, most or all of those people who engage in these activities have no idea of the extent of the network they are involved in, nor the real reasons why they are doing the things they are directed to do, nor who is ultimately directing them to do them and why. They are usually led into these gang-stalking groups through manipulation and deceit, using their sense of morals (or lack of them) and beliefs to influence their cooperation. Sometimes, they might even be acting without any conscious control or awareness of being involved in anything.
Gang-stalking groups might be formed out of political groups, businesses and business groups, church groups, or community watch groups just as easily as they might be formed by criminal gangs or any other groups of people or individuals that can be
The activities that are undertaken do not always appear to those engaging in them to be as damaging as they actually are, because the gang-stalkers may not be aware of much more than the small parts they or their group play and will be ignorant of the activities of other gang-stalking efforts simultaneously taking place against the target. The many small efforts taken by a number of different people who are unaware of each other’s activities can quickly add up to serious problems for a target. It only takes someone who is in a position to influence each of these participants or groups separately and direct them in what to do to create the sort of damage to a person’s life that these gang-stalking activities result in.
Many staged events might involve only a few people, but may include added levels of sophistication, such as the use of electronic gadgetry for spying on, harassing, and even torturing a target. With the boom in technological innovations that have been made in the last few decades, and the diversity of methods of behavior modification and mind-control that have been and are being explored by certain factions both within and outside of government (particularly the military and intelligence communities), including the development of directed-energy weapons (but not limited to them), the thought that such innovations are being widely tested and used on an unsuspecting public is not at all farfetched. Documents that have been made available through the Freedom of Information Act reveal the reality and extent of these technologies, as well as the fact that they are routinely tested on unsuspecting people.
Gang-stalking groups are formulated around the same concepts and by the same mentalities as the KGB, Stasi, Gestapo, and similar fascist policing groups originated from, and these are exactly the same sources that current mind-control methods and technologies stem from. In fact, there is a direct connection between these older fascist policing groups and gang-stalking groups. They perform the same basic functions, but now they are operating within democratic countries. This connection becomes clearer when you begin to look at the darker history of America and the involvement of the major players in politics and industry in the last century.
In a typical gang-stalking situation, the target will not usually be aware of their assailants right away, and will at first think that the events and activities that begin to take place are just coincidental. But over the days or weeks, they will begin to suspect that something unusual is going on. A target of gang-stalking may first become aware that someone seems to be entering their residence whenever they go out, and they might also begin to suspect that they are being constantly watched by their neighbors, by people on the street, and perhaps even with hidden cameras and microphones in their residence. Further, the targeted person may experience many seemingly coincidental but otherwise odd little events in their day-to-day life that eventually leads them to consider that these events are all contrived and that they involve certain people who work or live around them. They may then begin to wonder if they are being targeted for some particular reason. Whether or not there is any possible reason for being targeted, over time they will find that these events are indeed purposeful, and this will succeed in drawing their attention to the fact that something sinister is definitely afoot. The purpose of these events at this early point is to initiate paranoia and anxiety in the target.
a. Notification Lists
Notification lists were initially used by the police to keep tabs on dangerous offenders such as pedophiles and violent criminals, and to warn people in the community about their presence. In the United Kingdom this list is called the Violent Persons Registry. These lists have since been expanded in scope so that now someone can be put on one even if they are perceived as being potentially dangerous, and it is no longer just the police who can put someone on the list. This expansion of these lists centers around certain health and safety laws, which require employers and employees to report people for showing signs of threatening or violent behavior, or whatever might be deemed inappropriate behavior. A threatening look, raised voice, or politically incorrect comment can be enough to get a person listed. There is little or no oversight provided to assure that those who go on these lists and the situation that got them put on it have been properly assessed, which leaves plenty of room for corruption and abuse of the lists. A person who is placed on one of these lists is usually never informed of the fact, and therefore has no chance of defense. When a person goes on a list, anyone in that person’s community who might come into contact with the person is notified. This can include family and friends, neighbors, co-workers, schools, local businesses, etc. These notifications will follow a person wherever they go, should they decide to move or travel. Even if/when a person is removed from the list, those who have received notifications about them will continue to perceive them as a threat. These lists are used by gang-stalkers as target lists. The lists provide a sense of justification for their activities, and with a little bit of direction, they can cause devastation to a targeted person’s life. When someone gets listed as emotionally unstable or mentally ill, it essentially gives others free reign to torment the person, and any reaction from the person is seen to justify the label that has been put on them. These lists turn the entire community against the person, and yet nothing is ever said openly. In some cases, this silence is due to non-disclosure agreements having been signed by those receiving the notifications.
b. Non-disclosure Agreements
These non-disclosure agreements are supposed to safeguard sensitive information, but the question is, protect it from what? The only thing that they assure is that the targeted person never knows that they are on the list and this is why people are treating them differently.
Non-disclosure agreements are not always necessary to assure people’s silence, however, and merely reminding someone that disclosure can result in criminal charges being laid is enough to keep most people silent, even if they want to speak up. Notification lists have become a means for turning communities into spy networks. Whether those in the community who receive these notifications belong to gang-stalking groups or not, they essentially become the eyes and ears and communications links in a network of surveillance and control. And since the police and government manage the distribution of these lists, those who are given notifications are essentially being given permission to do what they want to the person. People can get listed for being ‘troublemakers’, ‘deviants’, ‘disloyal dissidents’, ‘mentally unstable’, etc., and these labels can be applied broadly enough to distort the facts so that the character of a person is destroyed.
c. Generating False Rumors
It’s a common habit for people to believe rumor and hearsay, and this is often taken advantage of in gang-stalking activities. The manner in which rumors can take on a growing sense of reality between those sharing them makes it very hard, if not impossible, for them to ever believe anything otherwise. Gang-stalkers are encouraged by their handlers to believe anything that bears negatively on the target’s character, and because of this predetermined negative characterization of the target, based on rumors and hearsay instilled by the those directing the gang-stalking group, they’re not likely to have a change of mind even if they come to know the target on any personal level. The power in rumor and hearsay is that the longer and more widely it’s allowed to spread, the more likely it will be believed. Any gang-stalker, should he or she have any doubts about what’s being said about the target, will be up against both their handlers and the group, and this threatens their place within that group. Such a potential threat means both a loss of power as part of the group, and a loss of friendships (as far as these people might ever be considered friends). There is also the threat, of course, that they might themselves become a target of gang-stalking, and it’s almost a certainty that this will be subtly conveyed to each member of the group from time to time to keep them in line.
d. Turning an Entire Community Into a Virtual Spy Zone
The targets of gang-stalkers can be totally unaware of what’s going on around them, but sooner or later, the gang-stalkers will usually make their presence known. This is part of the plan, and it’s meant to build up the target’s normal stress to a level of extreme distress, which over the long term result in feelings of anxiety, hopelessness, isolation, alienation, suspicion, and distrust of others. It also gives the gang-stalking members a chance to flaunt their supposed power over the target, giving them a cheap ego boost that feeds their desire to continue participating in these activities. The handlers of these groups will take advantage of the person’s desire for that little bit of power, and continually draw them into further activities that they might not otherwise involve themselves in.
For the police, this works just as well with seniors and other honest and law-abiding people as it does with drug addicts and hardened criminals. We all desire to be seen as important and useful when our lives are otherwise insignificant and empty. Drawing otherwise good people into these activities begins with painting an image of the target for them that touches on their fears, as was explained earlier. From this point, these people can be asked to perform seemingly innocent and relatively harmless tasks such as keeping an eye on the target and taking notes of his or her comings and goings. As this goes on, the police make the gang-stalking member believe that the information they’re providing or the tasks they’re performing are of great help to them, and this makes the member feel important and useful, and they’re even more willing to assist in whatever way they can. As the police draw these people into performing other little tasks, they continually lead them on by making them feel that they’re making a positive difference in the community, and filling them in on supposed facts about the target that are designed to encourage the person’s continued involvement.
In this way, it’s possible for an entire neighborhood of otherwise good people to become a virtual spy zone, where everyone is surreptitiously keeping close tabs on everyone else and reporting everything to the police or another controlling party that manages them. Participants of gang-stalking groups that live close together in the same neighborhood don’t necessarily know all the other participants in the group, or they might know them slightly but not enough to develop much trust, and these situations can be used by those who control these groups to have them keep tabs on each other while working together to target a person. Certain loose friendships might develop between participants of these groups, depending on the group, but if they do they are usually not very strong or don’t last very long. Groups might undergo frequent turnover in their membership, with people being purposely circulated through a number of different groups in order to not let any strong bonds develop between participants. With most of these groups, the idea is to keep the members slightly distrustful enough of each other so that they won’t begin to discuss their group activities amongst themselves and begin to see that what they’re involved in isn’t really making anything better, and is only causing more madness and misery in their own communities. The underlying motive for these gang-stalking groups isn’t just to monitor the target and inflict continual misery on him or her, but also to monitor and control the gang-stalkers themselves by having them police each other or other groups in the same area.
Some gang-stalkers may not even realize that they’re involved in anything that’s evil, but what they’re involved in is deeply satanic, and those people who are members of gang-stalking groups are essentially serving an evil enterprise that is creeping through the shadows of society and slowly taking it over. These gang-stalking groups exist at the very bottom levels of a hierarchical structure of power and control that rises to the very highest levels of society. Being at the bottom of this hierarchy, their efforts aren’t necessary, but they’re very useful, and even entertaining to their handlers and controllers.
II. Mind Control (and Murder)
Mind-control technologies have been in secret development since at least the late 1940’s when the CIA’s MK-ULTRA program was started. The aim of the 139 or so sub-projects under MK-ULTRA was to investigate and experiment with various forms of behavior modification and mind-control. The people running these projects were willing to pursue any possible means or method to achieve their ends, under the banner of fighting communism. In the early 1970s MK-ULTRA was ordered to shut down when it came to light through congressional hearings that the CIA and their accomplices were involved in some rather cruel and inhumane activities and using completely unwitting members of the American public as guinea pigs to test their cruel and often bazaar technologies on. Not every project under the umbrella of MK-ULTRA was exposed and forced to shut down, however, and those that were still not known about went deeper into the shadowy world of government black projects, continuing under the cover of government secrecy laws that protect them from detection and culpability. When MK-ULTRA was supposed to have officially ended, the research and development actually continued unabated, hidden deep within the darkest shadows of the military/intelligence community. These mind-control projects have continued to be developed and used against an unsuspecting public that is not only ignorant that the technologies being used even exist, but also doubt that they’re even possible. The reality is that these technologies are very real and becoming very advanced, and are now probably quite proliferate among certain government and corporate groups, and are being tested and used far more extensively than we might think.
Although the current state of the art of mind- control technologies isn’t known specifically, a consideration of what is known to exist will show any skeptic that mind-control technology is very real and very advanced. For instance, directed microwave beams that can send voices to your head have been in existence for many decades, as are implants that are used for direct inner-cranial reception of signals sent over ordinary radio frequencies. It might be thought that neither of these technologies would likely be used for the community-based level of activities we’re discussing here, but the chances are that they are, at least in some cases. These two technologies have been used to make people seem crazy in the eyes of others and are misdiagnosed as schizophrenic or psychotic, which effectively subverts a target’s attempts at getting proper help. These two technologies are but the tip of the iceberg, as is making people hear voices. They have been around since at least the 1960s, and the seeming coincidence between their invention and the increasing number of supposed schizophrenics in our society over that same time leaves a person wondering whether there is more to their stories than mental illness. It is also very likely that the older versions of these technologies have been sold off to other parties in league with those who initially developed them as more advanced and more powerful technologies came to replace them. These technologies will slowly trickle down into the public sector, and this can only have a negative effect in the end.
Besides those technologies that can project audible voices into a person’s head, there are newer, more subtle technologies that might be used virtually unnoticed, working beneath the level of normal waking consciousness. These technologies have the ability to influence a person to take a particular action without them even realizing they are being influenced. With the advancements being made in both electronics and brain research, the ability to read and decode extremely weak brainwave patterns from a distance, to record them, and then to beam them back at a person whenever desired in order to affect precise responses from them is very achievable. An electromagnetic signal that affects the proper region of the motor cortex in the person’s brain may be all that’s needed to make them take a particular action. In other cases, it may be desired to affect emotional impulses or even use subliminal mental suggestions to control a person. These subliminal influences aren’t voices that are consciously heard, but are instead received just below conscious awareness, where they’re picked up by the subconscious. They work exactly the same way that subliminal messages are supposed to work for reducing shoplifting in stores or increasing the sales of soft drinks at movie theatres. The technology for producing subliminal encoding within audio and visual recordings has gotten very advanced, and it is easy to incorporate it into mind-control technologies and applications. At one time this might have required that the perpetrators doing the controlling were first able to find the opportunity to surgically implant an electronic device in the person, through which they could deliver the proper electromagnetic signals, but this is no longer necessary for affecting general brainwave states that are common to everyone, such as the emotions. We’re all genetically similar to a certain degree, and will respond to many of the same stimuli in the same biological and physiological way to the same brainwave signals. Subliminal signals can even be beamed at a person from a distance, such as from satellites and microwave towers, and can be relayed through cell phones and computers.
The majority of the population are totally unaware of the reality of mind-control technology and the situation surrounding it, and can’t understand how it can be used because of the seeming doubtful irrationality built up around the subject. These people don’t believe that the level of advancement that mind-control technology has reached is even possible, let alone that it’s being used against the public. Many people are too afraid to even entertain the possibility, and this alone signifies the graveness of this issue. Such doubt and ignorance has been purposely conditioned into the public’s mentality regarding this issue, along with certain other issues that are related to the secret black project activities of the fascist parties who are behind these things. The public has become so doubting of mind-control that it is able to be used on the public without suspicion.
We even see signs of it in the news, with the now- familiar stories of ‘lone nut’ killers, and even though there is occasionally reference to these people being victims of mind-control, nobody takes much notice. There is a regular pattern to these stories that runs parallel to the rise of terrorism and the resulting dwindling of our rights and freedoms Lee Harvey Oswald, Surhan Surhan, Charles Whitman, Charles Manson, David Berkowitz, Mark Chapman, John Hinckley Jr., Timothy McVeigh, Ron Harris and Dylan Klebold were all connected to mind-control programs, and the acts that they each committed ultimately served a larger purpose. Some were used specifically for political assassinations, while others were used to create a rising state of terror among the population. The original goal of the MK- ULTRA programs had been to create the ultimate espionage agent/assassin, referred to as a ‘Manchurian Candidate’, and we see that such mind-controlled assassins were the first ‘lone nuts’ to make the headlines. Other lone nut cases soon began to reach the news as well, and their rampages of terror became increasingly violent as time went on. It seemed as though people were suddenly losing their minds for no explainable reason, and we were just supposed to accept this as a natural human weakness. Each time one of these cases cropped up, the authorities quickly reacted by creating stricter laws that resulted in taking away more of our rights and freedoms and giving them broader levels of intrusion into our private lives. This was the first stage in applying mind-control technologies to the population at large.
Due to the levels of advancement that these technologies are reaching, there is a wide variety of potential applications that might be developed, and this means that any number of different experimental projects might be ongoing, and each one might involve any number of test subjects. And of course, they are intended to be used at the applications level, at which point the number of people they are used on undoubtedly increases further. In the past, these projects have tended to extend over the long-term and have focused on only one individual test subject, and have relied on older methods of programming and control, but as the technologies have advanced, the older methods have been replaced or complimented by newer and better ones that can be applied much more easily, more broadly, and without the subject’s knowledge.
The current state of the art in mind-control technologies can be used on a person without them knowing about it, and this allows them to be applied much more broadly among the public body, so that projects that involve a number of unwitting subjects working in tandem might be the normal procedure being used. The most important advantage of this, from the controller’s point of view, is the broader utility of a coordinated group rather than that of a single individual. Projects might be created that turn ordinary citizens into ‘sleeper soldiers’ who can be triggered to act out specific tasks when required without even knowing that they were being controlled. These tasks might be divided between various people in a community who do not even know of each other or their mutual participation in a covert operation.
Computer automation is incorporated as part of the mind-control technology to great advantage, and it may very well be that many of the staged events that take place as part of gang-stalking are at least partly automated mind-control scenarios. For instance, GPS might be used to signal a computer program that one or more mind-controlled subjects are in the immediate vicinity of a targeted person, and the software program immediately sends signals that covertly direct the controlled parties to act in certain ways towards the targeted individual. When this is done through subliminal signals, the controlled parties will think they are in total control of themselves and will justify their actions to themselves in some way, never suspecting that anything unusual is going on. The subliminal signals may even offer them an excuse for their actions in the process of influencing them. With the aid of computers, each controlled party may have specific programs designed for them that are tailored to their particular attitudes, beliefs, and idiosyncrasies. Thus, for someone who the controllers know has a negative attitude towards someone of a particular race, influencing them to act against such a person has its excuse already made before the act occurs. The controlled party will never question their acting out against such a person beyond their own pre-established mindset.
If it is now possible to control a person remotely and manipulate both their thoughts and actions without their knowledge that anything is out of the ordinary, then it is only a matter of expanding the hardware in order to control more people at once. With the aid of computerized logistics programs, entire populations can be unwittingly controlled and enslaved. Although mind-control technologies are becoming more and more sophisticated and harder and harder to detect, due to the nature of their applications they are not as likely to be used against the targets of gang-stalking as they might be against unwitting parties to gang-stalking activities. Although they might be used against a targeted person to openly frustrate or incapacitate them, this would draw attention to the fact that they exist and are being used. It would be much safer and more useful to use these technologies on people in a surreptitious manner where they are not aware of being controlled. This makes these technologies ideal for gang-stalking activities, particularly street theatre operations. Randomly selected people on the street can be remotely manipulated in small and subtle ways that together culminate in the sort of staged events that targets often experience as street theatre. In the past, these sorts of gang-stalking activities have normally required more or less witting parties who work as an organized group in a consciously planned and orchestrated event, but with electronic mind-control technologies these operations can be carried out using completely unwitting members of the public, and all of it can be computer automated.
Up to now, gang-stalking activities haven’t been known to involve mind-control technologies in the majority of cases, and have relied more on using people to willingly act against a target. This has been far more practical, so that the proliferation of these gang-stalking groups has been much more common than specially trained groups wielding high-tech gadgetry. But with the advancements of the technology and the greater ability to apply it without detection by the mind-controlled subject, it may begin to be applied more broadly, and gang- stalking groups and their activities offer a useful arena for experimentation.The people who are financing and directing many of the gang-stalking groups, the controllers, whoever they might be, depend on remaining out of the picture completely, removing all possible culpability in the crimes and activities being perpetrated. As long as these gang-stalking activities and any mind-control technologies that might be used in them are kept in the shadows, there’s no reason for anyone but the target to suspect that these activities are other than random occurrences, and any mention of the mind-control aspect will just make it all sound too ridiculous for anyone else to believe. If these technologies are at the stage that the available literature indicates is now possible, anyone who is targeted by advanced mind-control technologies might very well be totally unaware of the fact themselves, and would even deny it.
Mind-control technologies may be involved in some gang-stalking activities. In some cases, they might be used on the target. In other cases, they might be used on members of a gang-stalking group. In yet other cases, they might be used on both, where mind-controlled gang-stalkers use the technology to torment the target. Mind-control is a field that offers virtually unlimited possibilities for real-world applications, and whatever might be developed needs to be tested under various scenarios, and preferably on subjects that can be easily and closely monitored, Gang-stalking groups are ideal for this. Most of the people that get caught up in mind-control programs tend to be selected from the lower end of the social spectrum, usually people with no immediate family or close friends who might notice anything unusual. This makes it easier to handle the person, and to dispose of them if necessary. For this reason, it’s likelier that mind-control technologies would be used among the lower end of society before it’s used more broadly.
(ETK note: Based on the research I conducted for Part VI. Mind Control: History and Applications on this website, it is clear that “disposal” here refers to murder! Does this explain the purported “suicides” or relatively young people in Crestone/Baca?)
Not all gang-stalking involves mind-control of the electronic variety, however. Mind-control is as old as the desire to dominate others, and such control has for a long time been affected through both subtle influencing and strong coercion, either psychologically or physically. Certain types of mind-control are so deeply ingrained into society already that we don’t even consider them as any sort of control at all. The most obvious form of this is the media, which has been used to mold our opinions and beliefs ever since Gutenberg invented the first printing press.
The oldest and simplest method of mind-control is the use of direct threats to a target, whether physical or otherwise. This type of mind-control lies behind the power of our governments and their justice systems, which use threats of punishment and incarceration to control the masses.
Another simple method of mind-control, used most effectively by those who have first gained a certain level of authoritative trust from those they want to manipulate into acting against a target or targets, is to blatantly lie or mislead. For instance, a police officer might suggest to someone that a certain neighbor of theirs is a criminal element that they are investigating. This will undoubtedly cause the person to feel concerned enough from what they are told that they will likely be willing to cooperate in whatever way that the police might then ask or suggest – all in the name of freedom and democracy, of course, so that we can feel safe and secure in our homes and within the community.
a. Mind-Controlled Multiples
It’s very possible that artificially induced multiple personalities are also being taken advantage of for the benefit of the controlling parties of these gang- stalking groups. In this situation, the mind- controlled person will have had an alternate personality created in themselves that the original personality isn’t aware of. The alternate personality is brought out through a pre-established trigger, which can be purposely set off in any number of ways. Those gang-stalkers that are ‘multiples’ will usually not even be aware that they are a ‘multiple’, or that they take part in these activities, since when the alternate personality takes over, the original personality recedes into an unconscious state and is totally unaware of the other personality or what takes place while it is in control. These people may have been clinically misdiagnosed as having a stereotyped mental illness, such as schizophrenia, mental psychosis, or manic depression, and any personality switches that are witnessed by those who know the person can therefore be easily misunderstood as mere symptoms of their misdiagnosed problem.
One possible clue as to whether a person might be a multiple is whether they ever went through any extremely traumatic experiences in the past, particularly when they were a young child, or they have very few memories at all of their early years. It’s quite common that a person who went through extreme sexual, physical, or psychological abuse as a young child, reacted by completely dissociatinf themselves from the traumatic experiences in order to cope with the extreme pain and suffering they were being put through. When the trauma is severe enough, a new personality is created as a natural response to fill in for the original one and to absorb the effects of the negative experiences that they’re going through so that the original personality is not affected. None of the alternate personality’s experiences are remembered by the original personality, either. This is all a natural defensive mechanism, but a person who knows about the multiple personalities in another person, or perhaps who even created them, is in a position to take advantage of them.
Certain satanic groups, their memberships having included for many generations many of the oldest, wealthiest, and most powerful families of Europe and America, purposely instill multiple personalities in their children, in order to hide their dark activities. The alternate personality becomes the satanist, taking part in the rituals, ceremonies, incantations, and sacrifices, and loyally following the orders of their superiors. Their original personality, being unconscious to these events, doesn’t remember their satanic activities, and they will appear to be normal, law-abiding citizens in public, just like anybody else.
With most people who have multiple personalities, the alternate personality may eventually recede when the abusive experiences are at least temporarily stopped, but under the right circumstances it can be brought forward again. A person with hidden multiple personalities (an unlimited number of them can conceivably be created) can be taken advantage of without the person ever knowing about it, and this is an ideal situation for ultra-clandestine mind-control.
In order for a controller to access the alternate personality whenever they wish, a post-hypnotic trigger mechanism is induced at the time of the initial split. While the victim is traumatized and still in a dissociated state, they are highly suggestible, similar to a deeply hypnotized subject. At this point, the controller can set up a visual or auditory trigger, such as a key word or phrase that will be used to call forth the alternate personality at any time. Once this is accomplished, the alternate personality is accessible at any time by anyone who knows the trigger, and the personality can be molded at the whim of that person.
b. Witting or Unwitting Perpetrators?
It’s not at all unlikely that many gang-stalking activities are carried out by entirely unwitting parties, people who don’t know that they’re being used and manipulated to inflict calculated acts of psychological harassment or torture on a targeted person. There are two possible methods for orchestrating gang-stalking activities through unwitting parties instead of the traditional gang-stalking groups. The first of these methods incorporates electronic mind-control technologies such as implants and directed energy weapons, while the second method makes use of people with MPD (multiple personality disorder). In the first case, the unwitting gang-stalker is electronically influenced to think and/or act a certain way, whether towards the target directly, or else in a way that indirectly affects the target, while they believe that they are acting by their own free will. In the second case, the unwitting gang-stalker is purposely triggered in some way so that a switch in personalities takes place, and the alternate personality, being the witting party, takes over and acts out against the target. Once he or she has done so, the original personality is switched back again, leaving the person completely unaware of what they have just done. In the first case, hypnosis may also be used, sending triggers that induce a hypnotic state, giving commands telling the person what to do, and then using post-hypnotic suggestion to cause the person to not remember their actions afterwards.
Both of these methods of using people for gang-stalking activities without their knowledge are probably being used extensively and increasingly at this stage of affairs. There has been more and more information coming out over the years about the extensive reality of mind-control technology, satanism, and trauma-based MPD victims (many of whom are unaware that they even have MPD). A historical review of the origins and existence of these phenomena reveal that they stem from the same source and for the same ultimate purpose of complete and total domination and control of a population. This totalitarian ideology is satanic in nature, and this is where it originates. Trauma-based MPD is a very ancient method of creating controlled ‘servants’ and has been heavily employed in satanic groups for millennia.
An example of using mind-control technologies to involve unwitting participants in gang-stalking activities follows. The scenario described is known as ‘street theatre’, where seemingly coincidental events take place in public that are intended to negatively affect a target in some way, such as to frustrate or incapacitate him or her. These street-theatre operations usually involve a number of gang-stalking participants working in tandem, and are carefully preplanned and orchestrated. It’s my own observation that many of the participants in these street theatre events don’t seem to be at all aware that they’re acting at the behest of a controlling party, and their actions seem to be completely unconscious and coincidental rather than consciously purposeful. This has led me to suspect that certain mind-control technologies are being employed at these times against ordinary citizens who are not members of gang-stalking groups, but are being mind-controlled and just happen to be at the right place at the right time.
Imagine that you’re walking down a fairly busy sidewalk on a normal day. As you walk, people seem to be continually cutting you off in your path, either suddenly crossing in front of you and forcing you to stop short, or converging around you and blocking your movement, or stepping out from behind obstacles or from around corners just as you approach, or forcing you to step around them as they suddenly take up a position immediately in front of you, blocking your path. Even as you walk down an otherwise uncrowded sidewalk, the people just ahead of you who are walking in the same direction will shift to the left or right when you attempt to pass them on that side, effectively keeping you behind them. Unless these people are somehow being cued as to when to move as they do, there’s no natural way for them to know the precise moment to do this on purpose.
Having personally experienced these situations regularly and having made careful observations over time, I’ve been able to assure myself that these acts aren’t happening to others as frequently as they happen to me. They are a form of street theatre. I’ve also been able to formulate a possible means that might have been employed for creating these situations around a target using whatever unwitting parties happen to be around the target at the time. This hypothesis is based on documented facts regarding current mind-control technologies.
To a person who is unaware of the extent of mind-control technologies and their capabilities, the very idea that people could be unwittingly used in the following manner might seem ludicrous. But the fact is that subliminal suggestions can be beamed into a person’s head, and both thoughts and physical movements can be influenced through them. The subliminal suggestions enter at a preconscious level of mental processing and are not consciously detectable, but the context of the suggestion rises up as what appears to be that person’s own thoughts. Similarly, affecting physical movements, such as slightly destabilizing a person’s balance so that they suddenly begin moving to the right or left at the appropriate time, can be caused by beaming an electromagnetic signal at that person in order to affect their motor cortex in the proper manner. This can be done via satellites or microwave towers. It is possible that computers, cell phones, and other commonly carried electronic gadgets are also equipped to pick up and amplify beamed signals.
Beamed electromagnetic signals that can affect a person in these ways are not just science fiction. Specific brain activity gives off specific brainwave signatures, and these can be recorded using similar technology to what an fMRI scanner uses. Once recorded, the same brain state can then be recreated by transmitting that recorded electromagnetic signature at a person. For lower-level brain functions, such as motor impulses, emotional states, and even preconscious thought processes, the signatures will be fairly uniform for all people. This is because these lower-level brain functions developed early on in our evolution, and are therefore more or less genetically identical from person to person. Using the latest in laser technology, coupled with the accuracy of GPS technology to pinpoint a target, even a person in a thick crowd of people can be influenced without affecting anyone else that happened to be standing nearby. Because every person also gives off their own unique electromagnetic signature, the ability to locate a specific person out of a multitude can be achieved rather easily. Once located, the person can be locked onto and then affected by beamed signals coming from either satellites or nearby cell phone transmitters. Using the person’s unique signature to verify that the target is within the beam’s trajectory, the appropriate brainwave signature is then transmitted, carrying with it the control frequencies. It’s similar to how different radio stations can broadcast at their own specific frequency that carries the transmitted signals. These signals become the sound we hear from a particular radio station on the AM or FM dial of our radio, and the signal of one station doesn’t affect the signals of other radio stations that broadcast at other frequencies. With mind-control technologies, the carrier wave for the signal (the broadcast frequency) would be a specific individual’s unique signature, and only that person can receive the signals that are transmitted at that frequency because only that person is tuned to it.
Other less advanced forms of mind-control technologies are more broad-based, and target an entire group, such as a crowd of people, or even an entire neighborhood or community. Technology such as HAARP (High Altitude Auroral Research Project) can affect an entire continent of people. These broad-based technologies are used to affect a group or population through their basic emotions, and smaller versions have been frequently used to manipulate crowds at sports events, during religious congregations, and at various types of public seminars and events. They have also been used in factories, at rock concerts, in supermarkets, and in shopping malls. They are very likely being used in television shows and movies as well. These technologies are used to induce specific emotions or influence certain behavior, either by broadcasting frequencies associated with specific emotions, or by broadcasting subliminal verbal suggestions. This technology will influence a group of people to a certain degree, but not to the degree that is required to control individuals within that group without affecting the rest of the group. This makes these sorts of broad-based mind-control technologies not as useful for controlling gang-stalking groups, but are sometimes useful as a weapon against their targets. Frequencies that induce certain emotional responses can be broadcast at the target from a relatively small transmitter device planted around his home or workplace, which will affect the target whenever they are within its range, or the device can broadcast to the people around the target, such as neighbors or co-workers, to influence them to act in ways that will affect the target.
Either of the types of mind-control technologies that I have described, whether a broadcast signal that affects everyone in its range, or a directed beam that only affects a single individual, can be remotely controlled automatically through computers, and databases of signature frequencies can be compiled on the members of an entire population, so that with high speed computer processing capabilities such as used with ECHELON, large numbers of people in a given area can be tracked and controlled simultaneously and automatically, making street-theatre situations possible without having to use organized gang-stalking groups. Instead, with a database containing the frequency signatures of every person in a given population, every person can be controlled individually and simultaneously, and manipulated like puppets. As the current technology expands in its capabilities and the numbers of people who are able to be simultaneously controlled increases through hardware expansion, it will begin to be applied that much more, and gang-stalking groups will become obsolete as policing the population becomes totally electronic and computer automated.
These technologies are real, as are the capabilities I describe. A person can therefore be unwittingly used as a participant in gang-stalking activities. This sort of use of unwitting people as players in these activities will become more common as time goes on and new applications and methodologies are designed and implemented.
The question naturally arises at this point as to why this technology is not just used on the gang-stalking targets directly, and eliminate the need for a gang-stalking group to harass the person. The simple answer is that it sometimes is. However, it seems that the desire of the controlling parties is to establish a fascist society in which they have complete control of the population, and since this is not going to be achieved openly and with people willingly giving up their rights and freedoms, it is necessary to entrap the public within such a system by portraying the rest of society as a threat, and involving them in threatening activities against the rest of the population without them realizing that they are being manipulated against their will and acting against their own morals and beliefs. To do this, it is necessary to change people’s perceptions so that the desired responses from them become completely voluntary and acceptable. The very conditions that are set up turn a perceived evil into a reality, and perpetuate a growing fear. Furthermore, the intimidation factor involved in all this is important to the controller’s desired system, and the gang-stalking activities provide a means to intimidate not just the target, but the participants as well. Gang-stalking groups and the way they operate facilitate these ends in a number of ways. The mind-control technologies are added into the mix out of convenience, since these groups give the controllers a means to test and experiment with them. Since this technology is so secret, however, those who operate it must be trusted parties who follow orders precisely and are properly trained in their use. This takes time and effort, and in many cases, the gang-stalking participants just don’t qualify. But they often qualify for being a guinea pig in mind-control experiments, so these technologies are very likely being incorporated into these groups and their activities to a certain degree. At some point, these groups will be given the ability to use the technology on their targets, but it seems unlikely that the technology will be placed directly into the hands of ordinary citizens anytime soon. At best, they may be given very limited access to it. Only those who are already completely mind-controlled themselves and are therefore completely controllable might be given full access to mind-control technology.
If trauma-based mind-control is also being heavily used to create alternate personalities, then depending on how prevalent this is, we might be dealing with a large number of people who are multiples and unknowingly involved in this sinister web of control. A whole underground society might exist that’s filled with such people without them even being aware of their involvement. The fact that the induced trauma that creates an alternate personality is never remembered by the original personality makes it impossible for a mind-controlled multiple to know that they went through a procedure to split their mind, and that they are being controlled. A person only needs to be alone with the mind manipulators long enough for them to establish an alternate personality and program it with basic control mechanisms, and this might only take a few hours with advanced equipment and techniques. Recruits for this sort of mind-control could easily be picked from hospital wards, prison populations, mental institutions, and military personnel. A person who goes into a hospital for some relatively minor operation might get the wrong doctor, who only needs to be isolated with the patient for a couple of hours while he applies electroshock treatment to induce a split personality before adding hypnotic triggers that can be used to later access the alternate personality. Such a trigger might be an electronic signal that can be beamed or broadcast. This would allow an entire group to be triggered simultaneously with a single trigger, or separately with different triggers. Even without creating an alternate personality, hypnosis can be used on its own to instill post-hypnotic suggestions, but by creating an alternate personality, the controller has deeper and more permanent control, and what they have done is less likely to ever be discovered.
III. Origins
When this epidemic problem first started, those who organize and direct these activities focused on recruiting from already organized groups of people who, because of the nature of their group, could be easily influenced to engage in these activities by making the activities appear as though they were serving their cause (thus the alternate term ‘cause-stalking’). But things have since progressed to the point that now people are being recruited in any manner of ways, both individually as much as from within these otherwise well-meaning groups. They can include anybody at all, from the highest levels of society to the lowest. The same goes for those who are targeted as well, and the excuses for being targeted have become just as various.
The earliest reported cases of targeting by gang-stalking groups were government and corporate whistleblowers, many of whom have suffered the effects of what are called ‘directed-energy weapons’ and mind-control technologies. But these cases are unique to their situation because they have been centered around the activities of those who possess these weapons and technologies (which is what they were often exposing as whistleblowers), and so the weapons and technologies have been available to use on them. These weapons and technologies are not being used on all gang-stalking targets, and they are not in the hands of just anyone, but remain predominantly within military and intelligence circles. By far, the majority of gang-stalking activities are carried out by ordinary people through ordinary means and without high-tech gadgetry beyond what is commonly available to the public. Gang-stalking groups can be organized and directed in their operations to inflict misery on people without the need to employ such advanced technologies. However, their application in this area is not out of the question, and they may be being integrated into these operations.
a) Satanic Undertones
Although little realized and often denied, there is a very well established satanic underground that permeates society worldwide. It originates with the ultra-elite family bloodlines that have ruled Europe and America for centuries, but extends deep into the thick of today’s society. Because induced MPD is very likely a requisite for full participation in the deeper satanic activities, and is used to keep those activities secret even from the participants themselves, it’s very difficult to be sure what percentage of the population has been drawn into this satanic underground without their even knowing it.
In considering this in relation to the issues of gang-stalking and mind-control, it becomes fairly obvious that these two phenomena stem from satanic circles. By that, I mean that they originate from the military and intelligence organs, which is filled with people with very satanic leanings, from the top down. Mind-control technology is satanic in its very conception, and the trail of evidence of government involvement in this field of research and development shows that it is tied to the same generational families that have been heavily involved in satanism for a very long time. Gang-stalking is the reworking of an already established and well-used method of controlling a population by having the people police each other in a very repressive manner, as was used by the Stasi secret police in East Germany, the Gestapo, and the Russian KGB.
Adolph Hitler had been deeply enmeshed in the occult, and the entire Nazi party was centered around satanic beliefs and practices. As was stated earlier, certain elite American families were working hand-in-hand with the Nazis before and during the war, and with their help, thousands of Hitler’s top scientists and engineers were funneled into the USA after the war through Operation Paperclip, to be given new identities and serve in government positions. They brought with them many of their ideas for controlling populations, which included a great deal of knowledge that became the basis for American mind-control programs and citizen policing groups.
The satanic leanings of these Nazis did not die when they were brought to American soil, but were instead allowed to take new root and slowly creep throughout the government, becoming well established, particularly within the military and intelligence organs. Because of the secrecy allowed within these and other government organs, based on the excuse of national security, this was not difficult to accomplish and keep hidden from awareness. Since the time that these Nazis were brought into the American government, those who were closely associated with them in the beginning have continued to operate within the same circles and have continued to establish greater means of control in government while whittling away the people’s rights and freedoms in more and more draconian ways that leave us all at their greater mercy. The original basis of a free democratic society has been usurped and is now merely an illusion that covers the true fascist totalitarian dictatorship that is upon us today. Mind-control and gang-stalking are but two means to this end, providing the ability to turn the thoughts and actions of an involuntary public towards the desires of those who are in the process of establishing their absolute control over the rest of humanity.
IV. Purpose
People’s lives are being tampered with or completely destroyed, and although it seems that the purpose might be for any one of a number of reasons, they all boil down to an encroaching fascist system of government where every individual in the population is to eventually be controlled completely, and where every possibility of escape is impossible.
One of the purposes for setting up gang-stalking groups is to simply have them monitor and report on certain individuals within the community, and to see that they don’t do anything that the controllers of these groups do not want them to do. This monitoring often involves monitoring the gang-stalking group members as much as the targets, although the targets are usually of interest for other reasons as well. They are often targeted because they are vocal about government or corporate corruption, are not submissive to giving up their freedoms under the perceived threat of terrorism, or are otherwise seen as a potential threat to the controllers and the implementation of their fascist plans for our future. Any plausible excuse that will cause a certain group of people to perceive someone as a threat seems to be enough to influence the participants to recruit the group into engaging in gang-stalking activities against that person.
Gang-stalking is a means of policing the community by having it police itself, while at the same time developing the means for manipulating members of the community to think and act in ways that suit the needs of the controllers. Therefore, all segments of society are being brought into these activities by one means or another, in order that all social sectors are covered.
It must also be taken into consideration that the purpose of these gang-stalking activities is not just to unnerve the target and make them look foolish or even crazy in public, or to frustrate or intimidate them, or to punish them for some perceived misdeed. The deeper purpose is to coerce them into conforming, to force them to silently accept what is going on, and to break their will and draw them into taking part in this system of control. By causing many of those around a target to consciously or unconsciously act (through mind-control technologies) in ways that seem natural other than the fact that for the target they’re occurring so often or for no apparent reason, the target will more likely be provoked to lash out in frustration as the situation escalates through increased occurrences. Anyone around the target will be clueless as to what the target is experiencing, and the target will appear to be delusional should he or she mention anything to anybody. The sense of isolation that often results, due to a lack of anywhere to turn for help, is meant to break down the target and force his or her silent submission. With the advancement of mind-control technologies, this can be achieved without the need for witting participants of gang-stalking groups to engage in their activities, and instead, unwitting parties can be used to fulfill certain small actions within a larger orchestration of street theatre, or in other forms of harassment.
V. Structure
It’s becoming very apparent that these groups are organized and directed by both government and corporate interests, but certainly not limited to just these. They have been known to involve church groups, boy scout/girl scout groups, senior citizens, business owners and employees, police, street gangs, drug addicts etc. They can involve members of any and all social sectors, but at the street level where I have personally experienced these events most commonly taking place, the involved parties seem to typically be lower-income earners or criminals, although the police, local business owners, and other members of the community are among those involved as well. The main motivation that I can see for people at the lower end of the social spectrum to participate is either financial reward or privileged consideration by the law, but often they might take part just for the fun and excitement of it, or because they think they are serving a good cause. Many of these people may have become caught up in these activities against their will, and may have initially been targets themselves and had their own lives ruined before being recruited to take part. The reward, no matter how small it might be, can be used as an incentive to coerce a person’s continuing involvement in these gang-stalking activities. It’s just a matter of knowing what a person’s weakness is and taking full advantage of it. However, this isn’t always necessary.
Although these gang-stalking groups are made up of people from any and all levels of society, and these people may not seem to be engaged in anything more than low-level activities for seemingly justifiable reasons, the truth is that they are being organized and directed by the highest levels of government and corporate sectors for deeper reasons than just monitoring or punishing certain individuals.
a) Organizations
Certain organizations have also been erected for the purpose of recruiting people into community spying networks and to direct their activities. One such organization, called InfraGard, has been set up by the FBI with chapters in every state as well as in other countries. It is set up as a government-funded private corporation, so that the information it has on an individual is not publicly available through the Freedom of Information Act. It needs to be remembered that the FBI were responsible for COINTELPRO in the 1960s and 1970s, which was a similar program that had destructive results for many innocent people who were unfairly targeted as ‘subversives’. COINTELPRO went beyond just blacklisting, and involved harassment, sabotage, mail tampering, break-ins, wire-taps, and blackmail, which are all activities being carried on today by gang-stalking groups against their targets. These organizations are very high-tech, capable of providing logistics and training to members, and essentially giving them carte-blanc license to target listed people at the behest of the government. These government sanctioned organizations even provide GPS tracking systems for their members to locate their targets. The target will be surreptitiously planted with a tracking device, either on their person or their vehicle, and can thereafter be pinpointed. It is quite possible that these organizations also provide electronic surveillance equipment to their members.
b) Top-Level Perpetrators
It is not well known that such American giants as the Rockefellers, and a number of other very powerful American families, were responsible for financing Hitler’s efforts at the same time that they were supporting the American efforts during World War II. Nor do most people realize that these families, and the Rockefellers in particular, were heavily pursuing research into behavior modification at the time and personally funded such people as Joseph Mengele in order to take advantage of his research in this field. The Rockefellers in particular have continued to fund research and development in this and related fields, and although they might pour huge amounts of money into genetic research, they have always been leading proponents of population reduction and genetic ‘cleansing’. A deeper look into this area of history would be too lengthy to deal with here, but it needs to be understood that those American giants that we have been led to believe are such benevolent philanthropists with nothing more than the interests of humanity at heart are nothing of the sort. Their efforts have led directly to research into mind-control, which has since resulted in the development of very advanced techniques and technologies for controlling both individuals and whole populations without their knowledge.
…. The evidence shows that this network is ultimately directed and controlled by people who have tremendous power and resources at their disposal, but who purposely remain hidden, and who are able to keep these activities separated far enough from themselves and disguising them well enough to not raise public awareness about what is going on so that something might be done to stop it before it is too late. It may already be too late.
Gang-stalking groups derive their members from many sources, including government, military, business, religious, and criminal sectors of society. Members can be drawn into a gang-stalking group at any age, and there are even people who are born into it, and come from a long line of generational members involved in a secret web of power and control that has existed for centuries. These members are usually from families with heavy military, political, or religious backgrounds, but this is not always the case. Many of these people grow up thinking that their secret activities are a normal aspect of society. These people are often brought into these activities when they are younger than most, being put to use wherever and whenever they can be. They often become involved at a higher level later on in life, either being trained as group handlers, or else used in some other capacity by the controllers.
Those who actually set up gang-stalking groups and direct their day-to-day activities occupy slightly higher levels within the pyramidal structure of power and control. These are the group handlers, and are often police officers, government employees, business operators, church officials, etc. These people are in turn directed by an even higher level within the structure, which is almost exclusively generational bloodline members – those who are born into this satanic web of evil and whose ancestors have served under it for a number of generations. These are the real controllers of these groups, who always keep themselves at a safe distance from the actual groups and their gang-stalking activities.
These bloodline controllers come from families that are much more deeply involved in satanic activities, and will often be active in business, religion, politics, the military, or intelligence. At the very least, these families will have a history of involvement in politics and the military. The children of these families are raised from an early age using advanced methods of trauma-based mind-control – through satanic ritual abuse – to assure they remain subservient to the higher levels of power that they are being brought into. These people will have multiple personalities, which I talked about earlier.
The non-bloodline controllers of these groups may not be involved in any satanic ritual activities of any kind, and probably aren’t, but the bloodlines who control these groups at the highest level certainly are. Many of these gang-stalking groups are set up and controlled by people who are non-bloodline but are heavily involved in satanic activities as well. They are interested in power and control and have learned how to set up their own gang-stalking groups, which they use to punish those that cross them, or to exploit others for various purposes.
Mind-control and satanism go hand in hand, and gang-stalking groups are the perfect conduit for mind-control research and applications. Those bloodline families that are involved in satanism are also connected to the most advanced technologies, including the blackest of black projects of the military and intelligence organs, as well as secret technologies that may have been developed in the private sector. The military have been interested in mind-control technologies since at least the 1920s, and have been developing them ever since. These technologies end up in the hands of satanists because satanism is strong throughout the ranks of the military and intelligence organs. As a new mind-control technology is being developed, it needs to be tested, and this requires guinea pigs to test it on. Sometimes military personnel are used, but often ordinary citizens have become ensnared in these mind-control experiments. The level of sophistication is so good that those who are developing these technologies and targeting the public can create a mind-controlled slave that is totally unaware of being controlled, and without the need to create multiple personalities through trauma. This opens up the possibility to enslave an entire population, which is the ultimate goal, and at the stage that they are at now, they are able to totally take over an individual’s thoughts and actions and orchestrate that person like a puppet on a string whenever they wish. Gang-stalking groups are the ideal conduit for proliferating this sort of technology, and it seems to be making the method of setting up these groups in the traditional way unnecessary, and a person’s participation can be totally involuntary and unwitting, not knowing that they are being controlled and used in a gang-stalking operation.
c) Intermediate-Level Perpetrators (Handlers and Controllers)
Although I focus mainly on the police when I talk about the handlers or controllers of these gang-stalking groups, they are not the only people that are involved in recruiting or managing the members of these groups, and they are not always consciously aware of what they are actually involved in any more than anyone else might be that takes part in these activities. These gang-stalking groups and their activities are directed and handled through a chain of command, and the police are often just following orders and normal police procedures that they have been trained to do. However, there are many within the police forces (and elsewhere) who are corrupt and whose ideologies are completely in line with those who ultimately control and direct the activities of these gang-stalking groups. Following orders without question and engaging in underhanded covert tactics to ‘fight crime’ are standard requisites to being a police officer. Those who sit at the top of the chain of command-and-control know exactly which people working under them are best suited for what might need to be done to facilitate these groups and their activities for the desired ends, and so they will see that those best suited are used where they are needed when they are needed and to the degree that they are needed.
This needs to be kept in mind when you consider how these gang-stalking efforts can be accomplished without exposure of what is going on. It should also be understood that compartmentalization of knowledge is routine procedure within all sectors of the government, which is a very effective method of keeping secrets secret. This same method is also used in the business sector, in particular with those corporate entities that tend to work very closely with the government or who handle sensitive information.
The relationships between the controlled gang-stalkers and their handlers or controllers will usually extend for years or decades, using the person’s ongoing career, drug addiction, criminal involvement, or general fears and insecurities as a coercive tool of control. Where such things as the loss of employment, an addiction, or the threat of facing a lengthy jail sentence cannot be used to coerce a person into involvement in gang-stalking activities, other methods involving blackmail can be used instead, provided the person can be caught in a compromising position.
Although the police are definitely involved in organizing certain gang-stalking groups, they aren’t the only one’s setting up or using these groups. As I said earlier, organizations of all kinds have been drawn into gang-stalking activities. Small businesses, large corporations, churches, schools, community organizations, social groups, and even street gangs have all become involved in this activity. In fact, it appears that this activity has become well entrenched in the social fabric, and in a way that makes it seem to anyone but the target and the perpetrators (but not necessarily even them) that nothing is going on other than coincidental events, and the target is losing their mind. Once the ball started rolling and these groups started expanding and taking their own initiative (with the help of notification lists to mark the ‘enemy’), they became autonomous entities and their activities were self-determined.
d) Bottom (Street)-Level Perpetrators
One particular type of person who is very easily influenced to take part in these gang-stalking activities, and who tends to take part regularly and completely voluntarily, is the more gullible and naïve but well-meaning ‘do-gooder’ who is more or less blind to the increasing corruption that permeates the higher rungs of society. These ‘do-gooders’ are those people who don’t dare to question authority and will easily react to threats and intimidation. Typically, if they are approached by the police and asked to assist in an investigation, they feel honored and even proud to be able to be involved in something that they think is for the good. Since they dare not question authority, they don’t ask too many questions and feel that it’s okay to do whatever they’re asked to do at the request of a police officer. The police know this and will tell them whatever might be necessary to persuade them to take part in these activities. This makes the most patriotic, law-abiding members of society who trust authority without question the easiest to initiate into these evil activities. This is worrisome, because these are the people who most value their freedoms, and they think they are fighting for them by engaging in these activities when really they are helping to destroy them.
There are also certain groups that have been very easy to recruit specifically because they trust those who recruit them and believe that what they are being told about a target is true. These were the first people to be approached and brought into this network of community spies. These include neighborhood watch groups and church groups, which are usually approached by the police and asked to assist in monitoring certain people who are portrayed as a potential threat to the community. The police have established a close relationship with these groups, and use them regularly for gang-stalking operations.
(ETK note: The Milgram experiment of 1961 showed that about 70% of individuals can be persuaded to damage/destroy others by “authority figures.” Wikipedia states: “The Milgram experiment on obedience to authority figures was a series of social psychology experiments conducted by Yale University psychologist Stanley Milgram. They measured the willingness of study participants, men from a diverse range of occupations with varying levels of education, to obey an authority figure who instructed them to perform acts conflicting with their personal conscience; the experiment found, unexpectedly, that a very high proportion of people were prepared to obey, albeit unwillingly, even if apparently causing serious injury and distress (to innocent victims).).
… but at the street level where I have personally experienced these events most commonly taking place, the involved parties seem to typically be lower-income earners or criminals, although the police, local business owners, and other members of the community are among those involved as well. The main motivation that I can see for people at the lower end of the social spectrum to participate is either financial reward or privileged consideration by the law, but often they might take part just for the fun and excitement of it, or because they think they are serving a good cause. Many of these people may have become caught up in these activities against their will, and may have initially been targets themselves and had their own lives ruined before being recruited to take part. The reward, no matter how small it might be, can be used as an incentive to coerce a person’s continuing involvement in these gang-stalking activities.
Part of the psychology behind a person’s willingness to take part in gang-stalking is the apparent emptiness or meaninglessness of their lives. Drug addicts and homeless people are normally easy to induct into gang-stalking operations, but a lonely and vulnerable senior citizen is even easier. Taking advantage of a few of their real or imaginary fears can quickly win these people over and encourage them into taking part in activities they don’t know the real purpose of, but believe to be their duty in fighting ‘crime’ and achieving something desirable for society. What they take part in, however, is a violation to another person’s privacy, freedoms, peace of mind, and well-being. Further, it’s destructive to society as a whole by allowing these fascist activities to spread more and more under the false guise of patriotism or social responsibility.
VI. Methods
Gang-stalking events entail a number of different harassment techniques that are fairly common among these groups, but other more innovative techniques are not out of the question. Community-based gang-stalking will revolve mostly around the neighborhood where a target lives and/or their workplace, but can extend to anywhere at all that the target might go in public. Most gang-stalking events are preplanned and many of them are carried out in a manner that requires an extensive number of well-placed participants coordinating their actions in a manner that creates a negative situation for the target but which seem to anyone else like purely coincidental everyday events. These staged events, when they occur in public, are in some cases referred to as ‘street theatre’ because they occur in public at the street level, but other staged events can center around the target’s home or place of employment. The number of involved parties, the scope of their coordinated efforts, the type of staged events, and the length of time that these events continue reveals a deeply-rooted and very sophisticated enterprise that can only be orchestrated by people with certain means that ordinary citizens just don’t have. This indicates the higher sector of society that those who orchestrate these events come from.
The sorts of activities that might be used against a target include slashed tires, broken windows, break-ins, tampering with property, poisoning pets, random assaults, thefts, spreading of false rumors, persistent noises and disturbances, bugging of residence, excessive police harassment, unexplained loss of employment, over-charging on phone and electrical bills, delayed or missing mail, blatant tailing, excessive staring by strangers, excessive rudeness by strangers, odd comments by strangers regarding things they should not know the list goes on, and the activities can be much worse and much stranger. For example, it is very common for a target’s home to be broken into regularly, where only minor signs are left behind that a break-in occurred, but which are significant enough to be noticed yet not significant enough to warrant calling the police. Nothing will usually be taken, but the target may find things moved around, or they might detect the smell of cigarette smoke, or lights that were turned off will have been turned on. As you can imagine, these sorts of things, if they happen with enough frequency, can lead from confusion to a state of anxiety to full-blown paranoia very quickly. A person who experiences such activity can be made to appear delusional very easily.
a. Surveillance Technology
The police, as well as any corporations or private parties with money to spend, have access to a wealth of surveillance technology, and they may even provide it to gang-stalking groups under their control, in order to achieve their ends. Not only that, but the police will look the other way if one or more of their gang-stalkers must commit a crime in order to assist them (This is now entirely legal for the police to do in Canada and the US). In this way, remote cameras and microphones are regularly planted in a target’s home to learn their routines and habits, and to discover any other pieces of information that could be used to disrupt the person’s life and antagonize him or her, or for any other reason that might be in the interests of the controllers.
The technology being used for audio and video surveillance of targets in their homes and elsewhere is not just the commonly available miniaturized remote cameras and wireless microphones, or even the flexible fiber-optic cameras that can look under doors and around walls. The technology being used on a regular basis by police forces, the military, and intelligence agencies is beyond what most people realize. Electronic through-the-wall surveillance, similar to that used at airport security points, can look through solid objects such as clothing, suitcases, and even wood and concrete walls. Such barriers can be rendered invisible to the device by tuning out a barrier’s corresponding frequency so that the beam of ELF (extremely low frequency) waves is not affected by it and can pass right through.
Another type of camera uses many separate fiber-optic threads that can be as fine as human hair, and which are placed at different points around a room or other location to be monitored. Together, they build a composite three-dimensional image using specially designed software. The threads are almost completely invisible, very flexible, and don’t emit any electromagnetic radiation. They can be inserted through walls and are less noticeable than a pinhole. They can also be run along door and window frames, and even directly over many surfaces without being noticeable. Because these threads simply transmit photons that strike the exposed end, there’s no way to detect them with anti-bugging equipment, which relies on picking up the electromagnetic radiation that’s emitted from electronic components. The threads can be long enough that the electronic components of the camera can be kept safely out of range of any bug detectors. Each thread, due to its extreme thinness, may only capture a very poor image on its own, but a multitude of such threads can capture enough information to compose a good image out of their concurrent signals. The quality of the image increases with the number of threads used, so normally there will be many threads, and they can be hidden virtually anywhere. The cost of this fiber-optic thread is extremely cheap, so the loss of any number of threads and their replacement are of little significance and does not affect the continuation of monitoring.
Often, gang-stalkers will carry a cell phone, even though they have no apparent reason to own one. This will even include welfare recipients or homeless people. If you live in the downtown area of a major city, as I do, you may become familiar enough with these people in your neighborhood and their activities to see that they have no real need for a cell phone, and yet they have them. You might notice that they never seem to use them either, and will use pay phones for their personal calls even though they have a cell phone. Cell phones are so common today that most people don’t seem to notice this oddity, but for anyone who is able to observe these people on a day-to-day basis, it becomes obvious that something isn’t right. Knowing that gang-stalking groups often include these sorts of people, it becomes clear that they’re provided with a cell phone in order to both facilitate their group operations, and to keep in contact with their handlers.
2. Fake Police Files
When participants of gang-stalking groups are briefed on a target, if the police are handling them they will often have a police file with them, which is simply a prop to manipulate a gang-stalking participant or group into action. This file is usually just any old file they might have handy, with a few faked documents bearing the target’s name added in, and if possible a mug shot of the target clipped to the inside of the folder. Using the faked documents in the file, the police will present the target in highly exaggerated or completely fraudulent terms. The more suspicion or hatred they can instill in the gang-stalkers towards a target, the more willing the gang-stalkers will be to undertake whatever tasks might be asked of them. It’s quite possible, for instance, for a target to be characterized as a suspect under investigation regarding sexual assaults against small children. This will fire up anybody’s emotions, and this is the sort of weakness in people that the police will take advantage of. It should be noted that the police will not usually make any claims that might later be revealed to be false, so telling a gang-stalking member that a target is a suspected child molester, rather than a known one, is safe from ever being found out to be a lie. Being a suspect means that you’re involved in an ongoing investigation, but whether or not this is true can’t be verified as long as an investigation is ongoing. Being told that the target is a suspect in an investigation assures that the parties who are told this won’t divulge what they’ve been told, for fear of being charged themselves for interfering in a criminal investigation. This police tactic assures utmost secrecy. If it is later found out that the target was never involved in anything they were purported to be involved in makes their being painted as a suspect seem like nothing more than normal police procedure.
c. Hacking the Target’s Computer
If the target owns a computer, it will probably be covertly accessed on a regular basis, either by the gang-stalkers or by their handlers, in order to gain whatever information on the target that they can compile, and to keep up to date on his or her activities. Computers are virtual ‘black boxes’ as far as knowing what’s really going on inside of them and how they work, and to think that nobody can remotely access one because it’s turned off or not connected to the Internet is foolhardy. At the upper levels of society where gang-stalking activities are ultimately being organized and directed, the possibility of secretly incorporating back doors in both hardware and software design is not unlikely at all. I’ve already mentioned that the intelligence agencies have backdoors built into the more popular computer architectures, and many of the major computer manufacturers (both hardware and software) also entitle themselves to have an administrative account on any computer that is made by them or uses their products. Supposedly, this is only meant to allow them to more easily service their products, but with an administrative account they have full access to your computer, and to the millions of other computers they’ve sold or on which their products are running. It would be very easy for them (or someone else) to gather ‘intelligence’, and compile personal information taken from their customer’s computers for deciding on marketing strategies or whatever else. And the government has its own more invisible access methods as well, as we’ll see.
d. Operation 9/11
An incredible amount of evidence now exists, both physical and circumstantial, that reveals beyond any doubt whatsoever that the events that took place on September 11, 2001 were actually planned and orchestrated by certain parties within the very highest levels of the US government. Due to their ultra-elite status and the power and privileges that
come with it, these people are virtually untouchable, and short of them admitting outright that they are the real terrorists behind the 9/11 disaster, they show no signs of actual empathy for those who suffered that day, and who suffer even now because of the war that their extremely cold-hearted acts has continued to perpetuate. The real
purpose of the 9/11 disaster was to instill a sense of dread throughout the population and use it to promote terrorism as a big enough and close enough and real enough threat that freedom-loving people would willingly take a giant step towards the Orwellian future that these perpetrators have in mind for the near future.
It should be pointed out that at least some of the real perpetrators of these crimes come from the same elite satanic families that were discussed earlier. George W. Bush in particular would make the perfect poster boy for the type of people that I’m talking about. Extremely wealthy, extremely powerful, and extremely cold-hearted. Sometimes they’re extremely dysfunctional as well, due to the psychological damage caused by their long-term involvement in satanic activities. George Jr. appears to have possibly suffered too much mind-control experimentation and satanic ritual abuse during his life. It should also be pointed out that his father was head of the CIA when MK-ULTRA was still in full
swing.
After September 11, 2001, certain laws were quickly passed that gave even greater foreign and domestic spying privileges to the intelligence agencies, and allowed the military to perform domestic operations on their own citizens, essentially treating the population as a potential enemy of the State. A multi-governmental computerized communications monitoring system called ECHELON, PRISM, TEMPORA, NUCLEON are now online full time, scanning all electronic communications world-wide (phone, text messages, email, fax, and GPS transmissions) for specific key words and phrases that might be used by terrorists, or by any other criminal element, or perhaps even by individuals and groups that might be seen as a potential ‘problem’. When anything of significance is detected by the 5 Eyes Networks computers, a more refined screening is done, and closer scrutiny of all communications from the targeted party takes place. If it’s required, manual monitoring is incorporated. Although this system is purportedly being used only in the interests of national defense, in particular to seek out potential terrorists and/or terrorist threats, the very ambiguity of what defines a terrorist or terrorist threat leaves virtually anyone open to being labeled as such and therefore to being a target for spying on. If some gang-stalking groups are being controlled and directed from within the intelligence community, as they undoubtedly are, then the NSA, GCHQ and the other 5 Eyes Intel group monitoring systems are and those who control these groups, and it can be used to locate, monitor, and gather intelligence on targets, which can be useful in gang-stalking activities.
VII. How Targeted Individuals Can Fight Back
A person who suspects that they’re a target of gang-stalking, if they have their wits about them and can remain level-headed, might purposely not show signs of their awareness of these odd events when they arise, or respond to them in any predictable manner, but simply keep alert for any further clues, testing them as well so as not to become delusional about the events going on. In this way, the target may find after a while that whenever the target does certain things in their home, there are definite predictable responses from the neighbors, such as doors constantly slamming, hoots, thumping on walls, car horns blaring, or any other sudden rise in overall noise levels in the building or outside on the street. When the target does make it apparent through their reaction that they know something odd is going on, but doesn’t react as the perpetrators might hope or expect (such as to become frustrated), the pattern of activities surrounding these events often changes because the previous pattern of actions didn’t cause the expected reaction in the target. Over time, a composed target can begin to assess the reality of the situation, deduce the methods being used by their antagonists to target them, and take steps to maintain some control over the situation and perhaps begin to fight back.
By dealing with gang-stalking events in the above manner, the target can effectively demonstrate their own control over the other parties in these events. This will not only confirm the target’s own sanity and understanding of the situation, but will also offer some comfort to know that they have a certain amount of power over the gang-stalking group that is targeting them.
If a targeted person should ever confirm the identities of any of their gang-stalkers, which they often will, they can begin to take counter-action against them. It must be realized that these gang-stalkers are either doing this willingly and therefore don’t deserve much mercy, or they’re being influenced against their will, perhaps through mind-control technologies, and require a certain amount of understanding for being helpless victims themselves. The difference might be easily determinable by their general character – mean and bitter people will tend to be recruited as witting players, while otherwise good-natured people may be potential victims of mind-control technologies or are otherwise controlled by other means, such as blackmail.
If a target becomes aware of the gang-stalking activities directed at them, which they undoubtedly will sooner or later, they’ll normally react in a predictable way. This is the desire of the perpetrators, who seek to cause relentless stress and discomfort to the target, in the hopes of breaking them mentally and emotionally.
The psychology behind gang-stalking activities is to push the target to give in to the activities and accept being a victim to them, so it’s very important that the target doesn’t allow the intended effect to occur, and instead turn the situation more to their own control or advantage. The most important thing is for the target to not react to these activities as they would normally feel compelled to do. In fact, in most situations they should not react at all. Instead, targets should just pretend that they are totally oblivious to these events and continue whatever they were doing just as they were doing it without showing any signs of awareness of what is really going on. The target needs to remember that they are more than likely being watched and even listened to no matter where they might be, particularly within their own home, but potentially anywhere, and their reactions to the gang-stalker’s activities will be closely scrutinized. For instance, scowling or cursing under the breath whenever a neighboring gang-stalker makes sudden loud and disturbing noises throughout an otherwise peaceful evening would reveal a response that the gang-stalkers were seeking. They can be watching and listening to the target very closely for any sort of predictable response, and will focus on doing things that appear to aggravate the target the most. The best thing for a person to do if they think they’re being gang-stalked is to get used to being constantly watched and listened to at every moment early on, and learn to not let it get to them. The only way to overcome these situations is to face them head on. Once that’s done, the person will be able to think more clearly and can begin to develop a plan to fight back.
It should be noted here that all surveillance, both audio and video, will be recorded. This means that everything the target says and does can be scrutinized very closely later on for any minute signs of response to gang-stalking activities, so any telltale mannerisms that a target might reveal will likely be spotted. Even a slightly raised eyebrow or body twitch can give away a target’s attempt to hide the effect that gang-stalking activities might be having on them as they occur. If the gang-stalkers can be completely ignored even after various different tactics have been attempted to frustrate the target, they’ll definitely notice and might even become frustrated themselves. This would be a definite win for the target.
What is the end goal of these activities? Why do these groups target people for no apparent reason? The gang-stalking activities are designed to appear coincidental or to otherwise seem so odd that telling anyone about them will only make the target seem delusional. They are usually designed to cause the target to break down mentally, at which point they might even be converted into a gang-stalking member themselves. The ultimate purpose of gang-stalking is to create a self-policing society of easily controllable citizens, where all rights have essentially been taken away from the individual, and special privileges are earned through acts of loyalty to the fascist government that currently lurks in the shadows of our society. It’s an inexpensive but very effective method that worked well in East Germany with the Stasi, in Stalinist Russia with the KGB, and in Nazi Germany with the Gestapo.
Fighting back might seem impossible when you consider the extent that this problem has crept through society, and the apparent inescapability from these groups and their controllers, given the range of technologies the controlling parties have at their disposal. However, it is possible to subvert some of the gang-stalking activity to some degree. Every target’s situation is different, but there are certain things that are fairly common to all targets, and there are ways to counter them.
a) Methods for Fighting Back
Install hidden video cameras in and around your home, preferably with motion-sensor triggers and the ability to time-stamp the footage. The idea is not so much to compile evidence that can be taken to the police, since the police are likely in the know and won’t respond very favorably to such reports. The video cameras are to be used to begin your own counter-offensive, and to do so, you’ll need to collect information on who your gang-stalkers are, how they act during these events (do they appear unconcerned about being in your home while you are away, or do they seem nervous and in a hurry?), what times of day or night they usually act, what they commonly do during their acts, etc. One note of caution: the gang-stalkers will be able to defeat this security measure with a universal remote control unit, so it’s advisable to cover the remote signal receptor on your VHS machine with tape.
Change your normal routines often, preferably to disrupt the ability for the gang-stalkers to predict your actions. Sacrifices will essentially have to be made, and this may include quitting your job for a while, sleeping at odd hours, taking round-about routes to wherever you are going rather than the usual and more direct routes you normally take, getting a second residence somewhere, etc. Anything that you notice in your actions that might be tipping off the gang-stalkers to predictable patterns on your part should be altered to throw them off as much as possible. By doing this, you’ll not likely rid yourself of them, but you’ll make their job of keeping tabs on you that much harder. These people are not being paid much, if anything, so they might soon tire of putting more and more effort into their acts when there is less and less enjoyment for them in doing them. However, some of them will take any counter-tactics as a challenge and will increase their efforts.
Change the locks on your doors regularly, and don’t leave any spare keys laying around anywhere. This probably won’t stop them from getting into your home for long, but it will slow them down and inconvenience them.
Give false leads to misdirect the efforts of the gang-stalkers, such as telling someone on the phone that you’ll be going to a particular place at a certain time, when in reality you’ll be going somewhere entirely different, or just staying home. This will cause them to prepare to be at the false location, and will scatter their efforts to stalk you.
Carry a camera, and take pictures of anyone and anything that you come across that seems suspicious and might be associated with any gang-stalking activity directed at you. Openly taking photos of anyone around you that seems suspicious might actually cause them to tip you off as to their involvement, since they may become uncomfortable when they realize that you’re fighting back. If you think that someone is entering your home while you’re out because you continually find your possessions have been tampered with, then taking close-up pictures of certain items and their precise positioning for later comparison when you come home will let you know if you are imagining things or not.
Purchase an electromagnetic frequency (EMF) detector, and regularly scan your residence for hidden cameras, microphones, and other electronic technologies that might be being used against you. Be aware that your computer, cell phone, and other electronic equipment in your home or workplace might be doubling as surveillance devices, so they should all be shut off completely and then scanned for any persisting energy fields that could indicate surveillance devices have been inserted in them. It should be noted also that the government has access to frequency ranges that lie outside of the detectable ranges of most EMF detectors, so these devices may be of no use.
b) Turning the Tables
Everybody is a creature of habit. This means that those people who are targeting people through gang-stalking and mind-control techniques and technologies, while being reliant on the target’s habitual responses to stimuli, are also equally prone to responding to things out of habit. To put this another way, they are prone to following patterned actions, and this is just as much a weakness in them as it is in a target or anyone else. The benefit in understanding this is that a target who is aware of the gang-stalking or mind-control that they’re being subjected to can use this to fight back.
Patterns are the key. Habits and routines are patterns, and a gang-stalker or mind-controller is reliant on knowing a target’s habits and routines in order to establish a ground-base of controllable situations in regards to that particular target. Unless a target is being constantly and unceasingly controlled in their very thoughts and actions through some sort of technological means, they have the opportunity to learn about the perpetrator’s own habits and routines and find a way to use them to fight back. To learn the perpetrator’s habits and routines, the target needs to watch for patterns in the perpetrator’s methods of operation.
Once a target has clearly established some of the patterns of their antagonists, they can begin to turn the control around. It probably won’t be enough to liberate the target completely, but it will allow them to learn some things about their assailants and the extent of their abilities, which will give the target the ability to forestall some of the methods being used and throw off their assailants to some extent. This effectively gives the target certain power over their antagonists, and in realizing this, the target has an opportunity to stop playing into their hands, to compose themselves mentally and emotionally, and to begin approaching their situation with the cunning determination to defeat the efforts of their assailants.
In order to do this, a target needs to pay attention to their own patterns, and recognize their assailant’s own patterned responses to them. For instance, if the target realizes that every time that they have their routine morning shower the telephone will ring, causing them to habitually jump out of the shower and answer the phone just to hear a dial tone, then they have discovered a pattern. Once this is realized, they are then in a position to disrupt their assailant’s little game, and to turn it around. There are a number of things that might be done to achieve this. First, the target could choose to simply ignore the telephone at that time and remain in the shower. Second, the target could break his or her usual routine and continually change the time of day that they have their shower, and see if the calls still occur while showering. Third, if the target has the psychological strength to withstand the possible repercussions, they could set up an answering machine that will give a taunting message to their assailants that will hopefully drive them to anger, in the hopes that this will cause them to make a mistake. Other possibilities exist besides these, and every situation is different for every target, so a little consideration of what the assailant’s main objective might be will offer some ideas as to how to disrupt their activities.
In the above scenario, the assailants will be informing the target through their own responses that they are watching or at least listening to the target, and this means that they’re probably using ordinary surveillance equipment: cameras and microphones. In more sophisticated operations, they may be using advanced technologies, such as through-the-wall surveillance. The only other possibility is that they are remote-viewing the target, which requires an individual to spend some time and effort psychically focusing on the target each time this occurs, which is not very likely but still quite possible.
Let’s assume that the controllers are using ordinary surveillance technologies to watch and listen in on the target. In this case, there’s a very likely chance that these technologies can be located and removed. Purchasing an electromagnetic field (EMF) detector will give the target the ability to sweep their home and other locations (including themselves) to find any electronic devices that are transmitting a signal. Any devices that are found should be removed and either destroyed or handed over to a trustworthy third party for safekeeping. A lawyer would be such a person.
Here’s another possible scenario in which the target can turn it around and begin to control the actions of the assailants. Suppose that the target knows that someone is stationed in the suite above their own, and that whoever it is, is involved in monitoring the target at particular times of the day or night. The target can begin to play cat-and-mouse with the monitor, finding pretexts for knocking on the door to the suite, and causing general disruption to the monitor’s activities, at the same time leaving a clear message of their knowledge of the monitor’s presence and activities. Since these people are sometimes interested in getting involved in the life of the target at as personal a level as possible, the target might even tempt the upstairs monitor into a false friendship, just for the sake of getting useful information on them, which can then be used against them and their accomplices. All is fair in love and war, after all, and the target should not feel that it’s wrong to do to these people what they are doing to the target. As long as these fascist assholes are willing to trample our fundamental rights and act out immoral and unethical practices, a person has the necessary right to fight back with equivalent means and force.
An important question that a target needs to ask themselves and find an answer to is whether a particular person who is involved with a gang-stalking group is involved knowingly or unknowingly. Knowing this will help the target to begin to understand the circumstances of their own situation much better, and this will allow them to deal with it in the best manner possible. It wouldn’t be good to begin doing to an assailant what is being done to the target if the assailant isn’t even aware of their participation in a gang-stalking operation and is being unwittingly manipulated themselves through mind-control. So it’s very important to establish the level of conscious participation that a particular assailant is involved in a target’s abuse.
It should also be understood that whoever is behind the mind-control and gang-stalking operations, they usually rely on the efforts of people to do the monitoring of targets and operate the technologies being used against them. They seem to be employing otherwise ordinary people for many of the tasks required in their operations, and ordinary people are not usually very well trained in covert tactics and the use of psychology. In fact, many of the people being used in these operations are probably not very intelligent at all, and are very gullible and easily intimidated, which is how they often get caught up in these activities in the first place. This is to the target’s advantage, since this gullibility and timidity can be played on by the target, causing problems that will make these people slip up. With enough effort, a target might cause continual problems for their gang-stalkers, and force them to work harder, or to even back off.
A target must acquire a very thick skin if they are to begin fighting back. Unless the assailants are using advanced mind-control technologies, such as directed-energy weapons that affect the target’s body and mind, it might be safe to make a game of the situation, and be willing to up the ante to a point where the people directly acting against the target (such as low-level monitors or ‘street-theatre’ participants) become uncomfortable with what they’re doing. The assailants will look for anything that upsets their target, so the target should pretend very realistically and over the long term that certain things that their assailants are instigating are far more (or far less) upsetting to the target than they really are. The target will know that they’re succeeding when these sort of events begin to occur more and more often or more intensely. This will draw some of the perpetrators further out of the shadows and become more daring if they think that they’re actually succeeding (or not succeeding) in upsetting the target. This also gives the target the ability to test their own suspicions about whether they’re really being targeted or not.
Showing no fear seems to agitate the assailants, and challenging low-level lackeys can easily cause them problems, confusing them in their efforts. Of course, it’s not a good idea to challenge them directly, face-to-face, but if for instance the target knows that there are hidden microphones in their home or workplace, they might take the opportunity to send their low-level monitors vocal messages that will agitate them or lead them on and make them want to react, but in so doing they will reveal their involvement. A target who is keenly aware of the signals that people give off when they are thinking one thing and pretending another will be able to discern if their counter-tactics are effective or not when they see them face-to-face, and if they are, the target is in a position to push the envelope further, in whatever way they can come up with to rock the boat harder and harder. As I said, these people are only human, and will react as humans tend to do when they’re provoked to anger.
Doing the unexpected can also throw them off. Suddenly doing things outside of normal habit or routine will upset the assailant’s efforts if they rely on these routines in their methods of targeting a person. For instance, if the target usually leaves for work every morning at the same time, and is gone all day, then it might be worthwhile to see what happens if they come back ten minutes after having left. It’s important to follow instinct and do whatever can be done to shake up the efforts of the gang-stalkers.
Something that has been pointed out by another gang-stalking target is that because these gang-stalkers are hired by people who do not want themselves or these activities to be publicly exposed, the gang-stalkers they hire are in many cases required to sign non-disclosure agreements when they are first recruited, and this means that they will probably avoid discussing the subject of gang-stalking at all. This gives the target an advantage, at least if the target knows who any of their assailants are and can engage them in friendly conversation. If this is possible, then the target can better determine if a particular person is wittingly involved in these activities. By approaching the suspected gang-stalker in a friendly manner and bringing up the subject in some way, the target should be able to gauge whether the suspect might actually be involved or not. A suspected gang-stalker who doesn’t attempt to avoid any discussion of the subject may not be involved, but a suspect who avoids any discussion is very possibly involved and is worried about breaking their contract with their handlers. If this is the case, this person can be counter-targeted by the target through pressure until the person either begins to slip and say things they aren’t supposed to, is pulled out of the ‘game’ by their handlers, or quits under pressure. If nothing else, doing this or anything else to let your gang-stalkers know that you are very aware and remaining level-headed and unflustered about what they are doing may cause them to back off, at least until they can figure out better tactics than they had been using. This, of course, may just draw more intense activities from them in the end, but if you have the strength and intelligence to face it, and continue to fight back, you may eventually learn enough about these people to discover who is responsible for having them target you and expose them and their involvement publicly. They don’t want this at all.
Targets of mind-control techniques and technologies need to understand that although this is a problem of potentially global magnitude, and that anyone at all might be targeted, it’s nonetheless an invisible crime and apart from the targets themselves, most of the population is divided between those who are completely unaware of it going on, and those who do but because they are wittingly involved or are afraid of being targeted themselves they pretend it doesn’t exist. For this reason, it will do little to help the targeted person by telling others about the abuse early on, before substantial evidence can be gathered, if that’s even possible.
It must be understood what could easily happen if these gang-stalking and mind-control crimes were to be known about and accepted as a reality by the public at large without providing any evidence of the fact. If this were the case, anyone who was troubled with their thoughts, who had a problem with their tyrannical neighbor, or whatever other problem they might have, might be tempted to lay the blame on a false cause. This would not help those whose problems are not caused by mind-control techniques and technologies, and by extension, it would only hurt the people further who are really being targeted.
This has been part of the plan. It covers up the real problem and lets it grow and take root while those who are victims of it tend to support the illusion of a society with a growing number of delusional characters who pose an increasing threat to our peace and security, and for this reason more draconian steps are seen to be necessary and
____________________________________________________________________________________________________________________
Part B: A. K. Forwood’s article as printed on Andy Lewis’ website: http://www.police-surveillance-expert.com/stasi-uk/4583865725
There is an increasing amount of nefariously evil activity going on amongst the public body. It is often disguised as ordinary activity and coincidental events that involve people who have no apparent reason to purposely act in the way they do. The strangers passing in the street, the tenants in the building you live in, the people you deal with at work all day, even your friends and members of your own family, each might begin to act in ways that seem suspicious, strange, often bizarre, and which result in causing you personal frustration, anger, emotional distress, paranoia, or worse.
What I am referring to is not isolated to just a few people among the population. According to the growing number of people coming forward and telling their stories, this is a problem of epidemic proportions. People are being targeted by a highly organized but loose-knit network of individuals who are involved in something that even they do not seem to fully comprehend the significance of. People’s lives are being tampered with or completely destroyed, and although it seems that the purpose might be for any one of a number of reasons, they all boil down to an encroaching fascist system of government where every individual in the population is to eventually be controlled completely, and where every possibility of escape is impossible.
The activities that this network of individuals engage in are quite varied, but they all result in displacing the freedoms and choices that a person would normally expect to have in our society.
Some people who report being the targets of these activities claim that the lengths that the perpetrators will go to in these acts include continual abusive harassment, psychological and physical torture and sometimes even murder. These strange activities will not be isolated events in a target’s life, but will be ongoing, usually occurring regularly enough that there can be no mistake that they are not just coincidental, but very purposeful. For the person being targeted, these events will usually go on for a long time, usually for many years, and the perpetrators will often increase in their methods and persistence over time.
This odd activity is commonly referred to as ‘gang-stalking’, ‘cause-stalking’, or ‘organized stalking’, and for people who have never heard of it before, it’s somewhat hard to fathom both why and how the groups who stage these events can put so much time and planning into them, and can organize them so well for such apparently irrational purposes, and nobody involved in it ever says anything. The fact is, most or all of those people who engage in these activities have no idea of the extent of the network they are involved in, nor the real reasons why they are doing the things they are directed to do, nor who is ultimately directing them to do them and why. They are usually led into these gang-stalking groups through manipulation and deceit, using their sense of morals (or lack of them) and beliefs to influence their cooperation. Sometimes, they might even be acting without any conscious control or awareness of being involved in anything.
It’s becoming very apparent that these groups are organized and directed by both government and corporate interests, but certainly not limited to just these. They have been known to involve church groups, boy scout/girl scout groups, senior citizens, business owners and employees, police, street gangs, drug addicts etc. They can involve members of any and all social sectors, but at the street level where I have personally experienced these events most commonly taking place, the involved parties seem to typically be lower-income earners or criminals, although the police, local business owners, and other members of the community are among those involved as well. The main motivation that I can see for people at the lower end of the social spectrum to participate is either financial reward or privileged consideration by the law, but often they might take part just for the fun and excitement of it, or because they think they are serving a good cause. Many of these people may have become caught up in these activities against their will, and may have initially been targets themselves and had their own lives ruined before being recruited to take part. The reward, no matter how small it might be, can be used as an incentive to coerce a person’s continuing involvement in these gang-stalking activities. It’s just a matter of knowing what a person’s weakness is and taking full advantage of it. However, this isn’t always necessary.
These gang-stalking groups can develop in any situation and at any level of society where people are joined together as a group with a common cause or similar beliefs, as well as among those who are not otherwise affiliated with each other in any sort of way prior to engaging in these activities. Gang-stalking groups might be formed out of political groups, businesses and business groups, church groups, or community watch groups just as easily as they might be formed by criminal gangs or any other groups of people or individuals that can be recruited into them.
When this epidemic problem first started, those who organize and direct these activities focused on recruiting from already organized groups of people who, because of the nature of their group, could be easily influenced to engage in these activities by making the activities appear as though they were serving their cause (thus the alternate term ‘cause-stalking’). But things have since progressed to the point that now people are being recruited in any manner of ways, both individually as much as from within these otherwise well-meaning groups. They can include anybody at all, from the highest levels of society to the lowest. The same goes for those who are targeted as well, and the excuses for being targeted have become just as various.
The earliest reported cases of targeting by gang-stalking groups were government and corporate whistleblowers, many of whom have suffered the effects of what are called ‘directed-energy weapons’ and mind-control technologies. But these cases are unique to their situation because they have been centered around the activities of those who possess these weapons and technologies (which is what they were often exposing as whistleblowers), and so the weapons and technologies have been available to use on them. These weapons and technologies are not being used on all gang-stalking targets, and they are not in the hands of just anyone, but remain predominantly within military and intelligence circles. By far, the majority of gang-stalking activities are carried out by ordinary people through ordinary means and without high-tech gadgetry beyond what is commonly available to the public. Gang-stalking groups can be organized and directed in their operations to inflict misery on people without the need to employ such advanced technologies. However, their application in this area is not out of the question, and they may be being integrated into these operations.
One of the purposes for setting up gang-stalking groups is to simply have them monitor and report on certain individuals within the community, and to see that they don’t do anything that the controllers of these groups do not want them to do. This monitoring often involves monitoring the gang-stalking group members as much as the targets, although the targets are usually of interest for other reasons as well. They are often targeted because they are vocal about government or corporate corruption, are not submissive to giving up their freedoms under the perceived threat of terrorism, or are otherwise seen as a potential threat to the controllers and the implementation of their fascist plans for our future. Any plausible excuse that will cause a certain group of people to perceive someone as a threat seems to be enough to influence the participants to recruit the group into engaging in gang-stalking activities against that person.
The activities that are undertaken do not always appear to those engaging in them to be as damaging as they actually are, because the gang-stalkers may not be aware of much more than the small parts they or their group play and will be ignorant of the activities of other gang-stalking efforts simultaneously taking place against the target. The many small efforts taken by a number of different people who are unaware of each other’s activities can quickly add up to serious problems for a target. It only takes someone who is in a position to influence each of these participants or groups separately and direct them in what to do to create the sort of damage to a person’s life that these gang-stalking activities result in.
Although these gang-stalking groups are made up of people from any and all levels of society, and these people may not seem to be engaged in anything more than low-level activities for seemingly justifiable reasons, the truth is that they are being organized and directed by the highest levels of government and corporate sectors for deeper reasons than just monitoring or punishing certain individuals. Gang-stalking is a means of policing the community by having it police itself, while at the same time developing the means for manipulating members of the community to think and act in ways that suit the needs of the controllers. Therefore, all segments of society are being brought into these activities by one means or another, in order that all social sectors are covered.
One particular type of person who is very easily influenced to take part in these gang-stalking activities, and who tends to take part regularly and completely voluntarily, is the more gullible and naïve but well-meaning ‘do-gooder’ who is more or less blind to the increasing corruption that permeates the higher rungs of society. These ‘do-gooders’ are those people who don’t dare to question authority and will easily react to threats and intimidation. Typically, if they are approached by the police and asked to assist in an investigation, they feel honored and even proud to be able to be involved in something that they think is for the good. Since they dare not question authority, they don’t ask too many questions and feel that it’s okay to do whatever they’re asked to do at the request of a police officer. The police know this and will tell them whatever might be necessary to persuade them to take part in these activities. This makes the most patriotic, law-abiding members of society who trust authority without question the easiest to initiate into these evil activities. This is worrisome, because these are the people who most value their freedoms, and they think they are fighting for them by engaging in these activities when really they are helping to destroy them.
There are also certain groups that have been very easy to recruit specifically because they trust those who recruit them and believe that what they are being told about a target is true. These were the first people to be approached and brought into this network of community spies. These include neighborhood watch groups and church groups, which are usually approached by the police and asked to assist in monitoring certain people who are portrayed as a potential threat to the community. The police have established a close relationship with these groups, and use them regularly for gang-stalking operations.
Gang-stalking events entail a number of different harassment techniques that are fairly common among these groups, but other more innovative techniques are not out of the question. Community-based gang-stalking will revolve mostly around the neighborhood where a target lives and/or their workplace, but can extend to anywhere at all that the target might go in public. Most gang-stalking events are preplanned and many of them are carried out in a manner that requires an extensive number of well-placed participants coordinating their actions in a manner that creates a negative situation for the target but which seem to anyone else like purely coincidental everyday events. These staged events, when they occur in public, are in some cases referred to as ‘street theatre’ because they occur in public at the street level, but other staged events can center around the target’s home or place of employment. The number of involved parties, the scope of their coordinated efforts, the type of staged events, and the length of time that these events continue reveals a deeply-rooted and very sophisticated enterprise that can only be orchestrated by people with certain means that ordinary citizens just don’t have. This indicates the higher sector of society that those who orchestrate these events come from.
The evidence shows that this network is ultimately directed and controlled by people who have tremendous power and resources at their disposal, but who purposely remain hidden, and who are able to keep these activities separated far enough from themselves and disguising them well enough to not raise public awareness about what is going on so that something might be done to stop it before it is too late. It may already be too late.
Although I focus mainly on the police when I talk about the handlers or controllers of these gang-stalking groups, they are not the only people that are involved in recruiting or managing the members of these groups, and they are not always consciously aware of what they are actually involved in any more than anyone else might be that takes part in these activities. These gang-stalking groups and their activities are directed and handled through a chain of command, and the police are often just following orders and normal police procedures that they have been trained to do. However, there are many within the police forces (and elsewhere) who are corrupt and whose ideologies are completely in line with those who ultimately control and direct the activities of these gang-stalking groups. Following orders without question and engaging in underhanded covert tactics to ‘fight crime’ are standard requisites to being a police officer. Those who sit at the top of the chain of command-and-control know exactly which people working under them are best suited for what might need to be done to facilitate these groups and their activities for the desired ends, and so they will see that those best suited are used where they are needed when they are needed and to the degree that they are needed.
This needs to be kept in mind when you consider how these gang-stalking efforts can be accomplished without exposure of what is going on. It should also be understood that compartmentalization of knowledge is routine procedure within all sectors of the government, which is a very effective method of keeping secrets secret. This same method is also used in the business sector, in particular with those corporate entities that tend to work very closely with the government or who handle sensitive information.
The sorts of activities that might be used against a target include slashed tires, broken windows, break-ins, tampering with property, poisoning pets, random assaults, thefts, spreading of false rumors, persistent noises and disturbances, bugging of residence, excessive police harassment, unexplained loss of employment, over-charging on phone and electrical bills, delayed or missing mail, blatant tailing, excessive staring by strangers, excessive rudeness by strangers, odd comments by strangers regarding things they should not know the list goes on, and the activities can be much worse and much stranger. For example, it is very common for a target’s home to be broken into regularly, where only minor signs are left behind that a break-in occurred, but which are significant enough to be noticed yet not significant enough to warrant calling the police. Nothing will usually be taken, but the target may find things moved around, or they might detect the smell of cigarette smoke, or lights that were turned off will have been turned on. As you can imagine, these sorts of things, if they happen with enough frequency, can lead from confusion to a state of anxiety to full-blown paranoia very quickly. A person who experiences such activity can be made to appear delusional very easily.
Notification lists were initially used by the police to keep tabs on dangerous offenders such as pedophiles and violent criminals, and to warn people in the community about their presence. In the United Kingdom this list is called the Violent Persons Registry. These lists have since been expanded in scope so that now someone can be put on one even if they are perceived as being potentially dangerous, and it is no longer just the police who can put someone on the list. This expansion of these lists centers around certain health and safety laws, which require employers and employees to report people for showing signs of threatening or violent behavior, or whatever might be deemed inappropriate behavior. A threatening look, raised voice, or politically incorrect comment can be enough to get a person listed. There is little or no oversight provided to assure that those who go on these lists and the situation that got them put on it have been properly assessed, which leaves plenty of room for corruption and abuse of the lists. A person who is placed on one of these lists is usually never informed of the fact, and therefore has no chance of defense. When a person goes on a list, anyone in that person’s community who might come into contact with the person is notified. This can include family and friends, neighbors, co-workers, schools, local businesses, etc. These notifications will follow a person wherever they go, should they decide to move or travel. Even if/when a person is removed from the list, those who have received notifications about them will continue to perceive them as a threat. These lists are used by gang-stalkers as target lists. The lists provide a sense of justification for their activities, and with a little bit of direction, they can cause devastation to a targeted person’s life. When someone gets listed as emotionally unstable or mentally ill, it essentially gives others free reign to torment the person, and any reaction from the person is seen to justify the label that has been put on them. These lists turn the entire community against the person, and yet nothing is ever said openly. In some cases, this silence is due to non-disclosure agreements having been signed by those receiving the notifications.
These non-disclosure agreements are supposed to safeguard sensitive information, but the question is, protect it from what? The only thing that they assure is that the targeted person never knows that they are on the list and this is why people are treating them differently. Non-disclosure agreements are not always necessary to assure people’s silence, however, and merely reminding someone that disclosure can result in criminal charges being laid is enough to keep most people silent, even if they want to speak up. Notification lists have become a means for turning communities into spy networks. Whether those in the community who receive these notifications belong to gang-stalking groups or not, they essentially become the eyes and ears and communications links in a network of surveillance and control. And since the police and government manage the distribution of these lists, those who are given notifications are essentially being given permission to do what they want to the person. People can get listed for being ‘troublemakers’, ‘deviants’, ‘disloyal dissidents’, ‘mentally unstable’, etc., and these labels can be applied broadly enough to distort the facts so that the character of a person is destroyed.
Certain organizations have also been erected for the purpose of recruiting people into community spying networks and to direct their activities. One such organization, called InfraGard, has been set up by the FBI with chapters in every state as well as in other countries. It is set up as a government-funded private corporation, so that the information it has on an individual is not publicly available through the Freedom of Information Act. It needs to be remembered that the FBI were responsible for COINTELPRO in the 1960s and 1970s, which was a similar program that had destructive results for many innocent people who were unfairly targeted as ‘subversives’. COINTELPRO went beyond just blacklisting, and involved harassment, sabotage, mail tampering, break-ins, wire-taps, and blackmail, which are all activities being carried on today by gang-stalking groups against their targets. These organizations are very high-tech, capable of providing logistics and training to members, and essentially giving them carte-blanc license to target listed people at the behest of the government. These government sanctioned organizations even provide GPS tracking systems for their members to locate their targets. The target will be surreptitiously planted with a tracking device, either on their person or their vehicle, and can thereafter be pinpointed. It is quite possible that these organizations also provide electronic surveillance equipment to their members.
Many staged events might involve only a few people, but may include added levels of sophistication, such as the use of electronic gadgetry for spying on, harassing, and even torturing a target. With the boom in technological innovations that have been made in the last few decades, and the diversity of methods of behavior modification and mind-control that have been and are being explored by certain factions both within and outside of government (particularly the military and intelligence communities), including the development of directed-energy weapons (but not limited to them), the thought that such innovations are being widely tested and used on an unsuspecting public is not at all farfetched. Documents that have been made available through the Freedom of Information Act reveal the reality and extent of these technologies, as well as the fact that they are routinely tested on unsuspecting people.
Gang-stalking groups are formulated around the same concepts and by the same mentalities as the KGB, Stasi, Gestapo, and similar fascist policing groups originated from, and these are exactly the same sources that current mind-control methods and technologies stem from. In fact, there is a direct connection between these older fascist policing groups and gang-stalking groups. They perform the same basic functions, but now they are operating within democratic countries. This connection becomes clearer when you begin to look at the darker history of America and the involvement of the major players in politics and industry in the last century.
In a typical gang-stalking situation, the target will not usually be aware of their assailants right away, and will at first think that the events and activities that begin to take place are just coincidental. But over the days or weeks, they will begin to suspect that something unusual is going on. A target of gang-stalking may first become aware that someone seems to be entering their residence whenever they go out, and they might also begin to suspect that they are being constantly watched by their neighbors, by people on the street, and perhaps even with hidden cameras and microphones in their residence. Further, the targeted person may experience many seemingly coincidental but otherwise odd little events in their day-to-day life that eventually leads them to consider that these events are all contrived and that they involve certain people who work or live around them. They may then begin to wonder if they are being targeted for some particular reason. Whether or not there is any possible reason for being targeted, over time they will find that these events are indeed purposeful, and this will succeed in drawing their attention to the fact that something sinister is definitely afoot. The purpose of these events at this early point is to initiate paranoia and anxiety in the target.
A person who suspects that they’re a target of gang-stalking, if they have their wits about them and can remain level-headed, might purposely not show signs of their awareness of these odd events when they arise, or respond to them in any predictable manner, but simply keep alert for any further clues, testing them as well so as not to become delusional about the events going on. In this way, the target may find after a while that whenever the target does certain things in their home, there are definite predictable responses from the neighbors, such as doors constantly slamming, hoots, thumping on walls, car horns blaring, or any other sudden rise in overall noise levels in the building or outside on the street. When the target does make it apparent through their reaction that they know something odd is going on, but doesn’t react as the perpetrators might hope or expect (such as to become frustrated), the pattern of activities surrounding these events often changes because the previous pattern of actions didn’t cause the expected reaction in the target. Over time, a composed target can begin to assess the reality of the situation, deduce the methods being used by their antagonists to target them, and take steps to maintain some control over the situation and perhaps begin to fight back.
By dealing with gang-stalking events in the above manner, the target can effectively demonstrate their own control over the other parties in these events. This will not only confirm the target’s own sanity and understanding of the situation, but will also offer some comfort to know that they have a certain amount of power over the gang-stalking group that is targeting them.
If a targeted person should ever confirm the identities of any of their gang-stalkers, which they often will, they can begin to take counter-action against them. It must be realized that these gang-stalkers are either doing this willingly and therefore don’t deserve much mercy, or they’re being influenced against their will, perhaps through mind-control technologies, and require a certain amount of understanding for being helpless victims themselves. The difference might be easily determinable by their general character – mean and bitter people will tend to be recruited as witting players, while otherwise good-natured people may be potential victims of mind-control technologies or are otherwise controlled by other means, such as blackmail.
The people who are financing and directing many of the gang-stalking groups, the controllers, whoever they might be, depend on remaining out of the picture completely, removing all possible culpability in the crimes and activities being perpetrated. As long as these gang-stalking activities and any mind-control technologies that might be used in them are kept in the shadows, there’s no reason for anyone but the target to suspect that these activities are other than random occurrences, and any mention of the mind-control aspect will just make it all sound too ridiculous for anyone else to believe. If these technologies are at the stage that the available literature indicates is now possible, anyone who is targeted by advanced mind-control technologies might very well be totally unaware of the fact themselves, and would even deny it.
Not all gang-stalking involves mind-control of the electronic variety, however. Mind-control is as old as the desire to dominate others, and such control has for a long time been affected through both subtle influencing and strong coercion, either psychologically or physically. Certain types of mind-control are so deeply ingrained into society already that we don’t even consider them as any sort of control at all. The most obvious form of this is the media, which has been used to mold our opinions and beliefs ever since Gutenberg invented the first printing press.
The oldest and simplest method of mind-control is the use of direct threats to a target, whether physical or otherwise. This type of mind-control lies behind the power of our governments and their justice systems, which use threats of punishment and incarceration to control the masses.
Another simple method of mind-control, used most effectively by those who have first gained a certain level of authoritative trust from those they want to manipulate into acting against a target or targets, is to blatantly lie or mislead. For instance, a police officer might suggest to someone that a certain neighbor of theirs is a criminal element that they are investigating. This will undoubtedly cause the person to feel concerned enough from what they are told that they will likely be willing to cooperate in whatever way that the police might then ask or suggest – all in the name of freedom and democracy, of course, so that we can feel safe and secure in our homes and within the community.
The use of threats and aggressive coercion are ideal for creating gang-stalking members among those who have been caught up in some sort of legal matter, whether criminal or otherwise. A corporate employee whose job is on the line, a drug addict who is always looking for the next fix, or an arrested person facing possible incarceration, are all desperate people, and can be recruited as gang-stalkers very easily and with little fear of exposure. Police use such tactics at every opportunity, and in the last few decades have recruited virtual armies of reliable snitches or ‘police agents’ to do their bidding. The actual number of people who routinely spy for the police is uncertain, but fifty percent of the population is not at all unrealistic.
The relationships between the controlled gang-stalkers and their handlers or controllers will usually extend for years or decades, using the person’s ongoing career, drug addiction, criminal involvement, or general fears and insecurities as a coercive tool of control. Where such things as the loss of employment, an addiction, or the threat of facing a lengthy jail sentence cannot be used to coerce a person into involvement in gang-stalking activities, other methods involving blackmail can be used instead, provided the person can be caught in a compromising position.
The police, as well as any corporations or private parties with money to spend, have access to a wealth of surveillance technology, and they may even provide it to gang-stalking groups under their control, in order to achieve their ends. Not only that, but the police will look the other way if one or more of their gang-stalkers must commit a crime in order to assist them (This is now entirely legal for the police to do in Canada and the US). In this way, remote cameras and microphones are regularly planted in a target’s home to learn their routines and habits, and to discover any other pieces of information that could be used to disrupt the person’s life and antagonize him or her, or for any other reason that might be in the interests of the controllers.
When participants of gang-stalking groups are briefed on a target, if the police are handling them they will often have a police file with them, which is simply a prop to manipulate a gang-stalking participant or group into action. This file is usually just any old file they might have handy, with a few faked documents bearing the target’s name added in, and if possible a mug shot of the target clipped to the inside of the folder. Using the faked documents in the file, the police will present the target in highly exaggerated or completely fraudulent terms. The more suspicion or hatred they can instill in the gang-stalkers towards a target, the more willing the gang-stalkers will be to undertake whatever tasks might be asked of them. It’s quite possible, for instance, for a target to be characterized as a suspect under investigation regarding sexual assaults against small children. This will fire up anybody’s emotions, and this is the sort of weakness in people that the police will take advantage of. It should be noted that the police will not usually make any claims that might later be revealed to be false, so telling a gang-stalking member that a target is a suspected child molester, rather than a known one, is safe from ever being found out to be a lie. Being a suspect means that you’re involved in an ongoing investigation, but whether or not this is true can’t be verified as long as an investigation is ongoing. Being told that the target is a suspect in an investigation assures that the parties who are told this won’t divulge what they’ve been told, for fear of being charged themselves for interfering in a criminal investigation. This police tactic assures utmost secrecy. If it is later found out that the target was never involved in anything they were purported to be involved in makes their being painted as a suspect seem like nothing more than normal police procedure.
Part of the psychology behind a person’s willingness to take part in gang-stalking is the apparent emptiness or meaninglessness of their lives. Drug addicts and homeless people are normally easy to induct into gang-stalking operations, but a lonely and vulnerable senior citizen is even easier. Taking advantage of a few of their real or imaginary fears can quickly win these people over and encourage them into taking part in activities they don’t know the real purpose of, but believe to be their duty in fighting ‘crime’ and achieving something desirable for society. What they take part in, however, is a violation to another person’s privacy, freedoms, peace of mind, and well-being. Further, it’s destructive to society as a whole by allowing these fascist activities to spread more and more under the false guise of patriotism or social responsibility.
The technology being used for audio and video surveillance of targets in their homes and elsewhere is not just the commonly available miniaturized remote cameras and wireless microphones, or even the flexible fiber-optic cameras that can look under doors and around walls. The technology being used on a regular basis by police forces, the military, and intelligence agencies is beyond what most people realize. Electronic through-the-wall surveillance, similar to that used at airport security points, can look through solid objects such as clothing, suitcases, and even wood and concrete walls. Such barriers can be rendered invisible to the device by tuning out a barrier’s corresponding frequency so that the beam of ELF (extremely low frequency) waves is not affected by it and can pass right through.
Another type of camera uses many separate fiber-optic threads that can be as fine as human hair, and which are placed at different points around a room or other location to be monitored. Together, they build a composite three-dimensional image using specially designed software. The threads are almost completely invisible, very flexible, and don’t emit any electromagnetic radiation. They can be inserted through walls and are less noticeable than a pinhole. They can also be run along door and window frames, and even directly over many surfaces without being noticeable. Because these threads simply transmit photons that strike the exposed end, there’s no way to detect them with anti-bugging equipment, which relies on picking up the electromagnetic radiation that’s emitted from electronic components. The threads can be long enough that the electronic components of the camera can be kept safely out of range of any bug detectors. Each thread, due to its extreme thinness, may only capture a very poor image on its own, but a multitude of such threads can capture enough information to compose a good image out of their concurrent signals. The quality of the image increases with the number of threads used, so normally there will be many threads, and they can be hidden virtually anywhere. The cost of this fiber-optic thread is extremely cheap, so the loss of any number of threads and their replacement are of little significance and does not affect the continuation of monitoring.
Often, gang-stalkers will carry a cell phone, even though they have no apparent reason to own one. This will even include welfare recipients or homeless people. If you live in the downtown area of a major city, as I do, you may become familiar enough with these people in your neighborhood and their activities to see that they have no real need for a cell phone, and yet they have them. You might notice that they never seem to use them either, and will use pay phones for their personal calls even though they have a cell phone. Cell phones are so common today that most people don’t seem to notice this oddity, but for anyone who is able to observe these people on a day-to-day basis, it becomes obvious that something isn’t right. Knowing that gang-stalking groups often include these sorts of people, it becomes clear that they’re provided with a cell phone in order to both facilitate their group operations, and to keep in contact with their handlers.
Although the police are definitely involved in organizing certain gang-stalking groups, they aren’t the only one’s setting up or using these groups. As I said earlier, organizations of all kinds have been drawn into gang-stalking activities. Small businesses, large corporations, churches, schools, community organizations, social groups, and even street gangs have all become involved in this activity. In fact, it appears that this activity has become well entrenched in the social fabric, and in a way that makes it seem to anyone but the target and the perpetrators (but not necessarily even them) that nothing is going on other than coincidental events, and the target is losing their mind. Once the ball started rolling and these groups started expanding and taking their own initiative (with the help of notification lists to mark the ‘enemy’), they became autonomous entities and their activities were self-determined.
Some Insights on Stalking and Being Stalked – Computer Spying 101
If the target owns a computer, it will probably be covertly accessed on a regular basis, either by the gang-stalkers or by their handlers, in order to gain whatever information on the target that they can compile, and to keep up to date on his or her activities. Computers are virtual ‘black boxes’ as far as knowing what’s really going on inside of them and how they work, and to think that nobody can remotely access one because it’s turned off or not connected to the Internet is foolhardy. At the upper levels of society where gang-stalking activities are ultimately being organized and directed, the possibility of secretly incorporating back doors in both hardware and software design is not unlikely at all. I’ve already mentioned that the intelligence agencies have backdoors built into the more popular computer architectures, and many of the major computer manufacturers (both hardware and software) also entitle themselves to have an administrative account on any computer that is made by them or uses their products. Supposedly, this is only meant to allow them to more easily service their products, but with an administrative account they have full access to your computer, and to the millions of other computers they’ve sold or on which their products are running. It would be very easy for them (or someone else) to gather ‘intelligence’, and compile personal information taken from their customer’s computers for deciding on marketing strategies or whatever else. And the government has its own more invisible access methods as well, as we’ll see.
After September 11, 2001, certain laws were quickly passed that gave even greater foreign and domestic spying privileges to the intelligence agencies, and allowed the military to perform domestic operations on their own citizens, essentially treating the population as a potential enemy of the State. A multi-governmental computerized communications monitoring system called ECHELON, PRISM, TEMPORA, NUCLEON are now online full time, scanning all electronic communications world-wide (phone, text messages, email, fax, and GPS transmissions) for specific key words and phrases that might be used by terrorists, or by any other criminal element, or perhaps even by individuals and groups that might be seen as a potential ‘problem’. When anything of significance is detected by the 5 Eyes Networks computers, a more refined screening is done, and closer scrutiny of all communications from the targeted party takes place. If it’s required, manual monitoring is incorporated. Although this system is purportedly being used only in the interests of national defense, in particular to seek out potential terrorists and/or terrorist threats, the very ambiguity of what defines a terrorist or terrorist threat leaves virtually anyone open to being labeled as such and therefore to being a target for spying on. If some gang-stalking groups are being controlled and directed from within the intelligence community, as they undoubtedly are, then the NSA, GCHQ and the other 5 Eyes Intel group monitoring systems are and those who control these groups, and it can be used to locate, monitor, and gather intelligence on targets, which can be useful in gang-stalking activities.
More Insights into Gang-Stalking
The targets of gang-stalkers can be totally unaware of what’s going on around them, but sooner or later, the gang-stalkers will usually make their presence known. This is part of the plan, and it’s meant to build up the target’s normal stress to a level of extreme distress, which over the long term result in feelings of anxiety, hopelessness, isolation, alienation, suspicion, and distrust of others. It also gives the gang-stalking members a chance to flaunt their supposed power over the target, giving them a cheap ego boost that feeds their desire to continue participating in these activities. The handlers of these groups will take advantage of the person’s desire for that little bit of power, and continually draw them into further activities that they might not otherwise involve themselves in.
For the police, this works just as well with seniors and other honest and law-abiding people as it does with drug addicts and hardened criminals. We all desire to be seen as important and useful when our lives are otherwise insignificant and empty. Drawing otherwise good people into these activities begins with painting an image of the target for them that touches on their fears, as was explained earlier. From this point, these people can be asked to perform seemingly innocent and relatively harmless tasks such as keeping an eye on the target and taking notes of his or her comings and goings. As this goes on, the police make the gang-stalking member believe that the information they’re providing or the tasks they’re performing are of great help to them, and this makes the member feel important and useful, and they’re even more willing to assist in whatever way they can. As the police draw these people into performing other little tasks, they continually lead them on by making them feel that they’re making a positive difference in the community, and filling them in on supposed facts about the target that are designed to encourage the person’s continued involvement.
In this way, it’s possible for an entire neighborhood of otherwise good people to become a virtual spy zone, where everyone is surreptitiously keeping close tabs on everyone else and reporting everything to the police or another controlling party that manages them. Participants of gang-stalking groups that live close together in the same neighborhood don’t necessarily know all the other participants in the group, or they might know them slightly but not enough to develop much trust, and these situations can be used by those who control these groups to have them keep tabs on each other while working together to target a person. Certain loose friendships might develop between participants of these groups, depending on the group, but if they do they are usually not very strong or don’t last very long. Groups might undergo frequent turnover in their membership, with people being purposely circulated through a number of different groups in order to not let any strong bonds develop between participants. With most of these groups, the idea is to keep the members slightly distrustful enough of each other so that they won’t begin to discuss their group activities amongst themselves and begin to see that what they’re involved in isn’t really making anything better, and is only causing more madness and misery in their own communities. The underlying motive for these gang-stalking groups isn’t just to monitor the target and inflict continual misery on him or her, but also to monitor and control the gang-stalkers themselves by having them police each other or other groups in the same area.
Mind-control technologies may be involved in some gang-stalking activities. In some cases, they might be used on the target. In other cases, they might be used on members of a gang-stalking group. In yet other cases, they might be used on both, where mind-controlled gang-stalkers use the technology to torment the target. Mind-control is a field that offers virtually unlimited possibilities for real-world applications, and whatever might be developed needs to be tested under various scenarios, and preferably on subjects that can be easily and closely monitored, Gang-stalking groups are ideal for this. Most of the people that get caught up in mind-control programs tend to be selected from the lower end of the social spectrum, usually people with no immediate family or close friends who might notice anything unusual. This makes it easier to handle the person, and to dispose of them if necessary. For this reason, it’s likelier that mind-control technologies would be used among the lower end of society before it’s used more broadly.
It’s a common habit for people to believe rumor and hearsay, and this is often taken advantage of in gang-stalking activities. The manner in which rumors can take on a growing sense of reality between those sharing them makes it very hard, if not impossible, for them to ever believe anything otherwise. Gang-stalkers are encouraged by their handlers to believe anything that bears negatively on the target’s character, and because of this predetermined negative characterization of the target, based on rumors and hearsay instilled by the those directing the gang-stalking group, they’re not likely to have a change of mind even if they come to know the target on any personal level. The power in rumor and hearsay is that the longer and more widely it’s allowed to spread, the more likely it will be believed. Any gang-stalker, should he or she have any doubts about what’s being said about the target, will be up against both their handlers and the group, and this threatens their place within that group. Such a potential threat means both a loss of power as part of the group, and a loss of friendships (as far as these people might ever be considered friends). There is also the threat, of course, that they might themselves become a target of gang-stalking, and it’s almost a certainty that this will be subtly conveyed to each member of the group from time to time to keep them in line.
A Deeper Understanding of This Secret Network
Gang-stalking groups derive their members from many sources, including government, military, business, religious, and criminal sectors of society. Members can be drawn into a gang-stalking group at any age, and there are even people who are born into it, and come from a long line of generational members involved in a secret web of power and control that has existed for centuries. These members are usually from families with heavy military, political, or religious backgrounds, but this is not always the case. Many of these people grow up thinking that their secret activities are a normal aspect of society. These people are often brought into these activities when they are younger than most, being put to use wherever and whenever they can be. They often become involved at a higher level later on in life, either being trained as group handlers, or else used in some other capacity by the controllers.
Some gang-stalkers may not even realize that they’re involved in anything that’s evil, but what they’re involved in is deeply satanic, and those people who are members of gang-stalking groups are essentially serving an evil enterprise that is creeping through the shadows of society and slowly taking it over. These gang-stalking groups exist at the very bottom levels of a hierarchical structure of power and control that rises to the very highest levels of society. Being at the bottom of this hierarchy, their efforts aren’t necessary, but they’re very useful, and even entertaining to their handlers and controllers.
Those who actually set up gang-stalking groups and direct their day-to-day activities occupy slightly higher levels within the pyramidal structure of power and control. These are the group handlers, and are often police officers, government employees, business operators, church officials, etc. These people are in turn directed by an even higher level within the structure, which is almost exclusively generational bloodline members – those who are born into this satanic web of evil and whose ancestors have served under it for a number of generations. These are the real controllers of these groups, who always keep themselves at a safe distance from the actual groups and their gang-stalking activities.
These bloodline controllers come from families that are much more deeply involved in satanic activities, and will often be active in business, religion, politics, the military, or intelligence. At the very least, these families will have a history of involvement in politics and the military. The children of these families are raised from an early age using advanced methods of trauma-based mind-control – through satanic ritual abuse – to assure they remain subservient to the higher levels of power that they are being brought into. These people will have multiple personalities, which I talked about earlier.
The non-bloodline controllers of these groups may not be involved in any satanic ritual activities of any kind, and probably aren’t, but the bloodlines who control these groups at the highest level certainly are. Many of these gang-stalking groups are set up and controlled by people who are non-bloodline but are heavily involved in satanic activities as well. They are interested in power and control and have learned how to set up their own gang-stalking groups, which they use to punish those that cross them, or to exploit others for various purposes.
Mind-control and satanism go hand in hand, and gang-stalking groups are the perfect conduit for mind-control research and applications. Those bloodline families that are involved in satanism are also connected to the most advanced technologies, including the blackest of black projects of the military and intelligence organs, as well as secret technologies that may have been developed in the private sector. The military have been interested in mind-control technologies since at least the 1920s, and have been developing them ever since. These technologies end up in the hands of satanists because satanism is strong throughout the ranks of the military and intelligence organs. As a new mind-control technology is being developed, it needs to be tested, and this requires guinea pigs to test it on. Sometimes military personnel are used, but often ordinary citizens have become ensnared in these mind-control experiments. The level of sophistication is so good that those who are developing these technologies and targeting the public can create a mind-controlled slave that is totally unaware of being controlled, and without the need to create multiple personalities through trauma. This opens up the possibility to enslave an entire population, which is the ultimate goal, and at the stage that they are at now, they are able to totally take over an individual’s thoughts and actions and orchestrate that person like a puppet on a string whenever they wish. Gang-stalking groups are the ideal conduit for proliferating this sort of technology, and it seems to be making the method of setting up these groups in the traditional way unnecessary, and a person’s participation can be totally involuntary and unwitting, not knowing that they are being controlled and used in a gang-stalking operation.
Witting or Unwitting?
It’s not at all unlikely that many gang-stalking activities are carried out by entirely unwitting parties, people who don’t know that they’re being used and manipulated to inflict calculated acts of psychological harassment or torture on a targeted person. There are two possible methods for orchestrating gang-stalking activities through unwitting parties instead of the traditional gang-stalking groups. The first of these methods incorporates electronic mind-control technologies such as implants and directed energy weapons, while the second method makes use of people with MPD (multiple personality disorder). In the first case, the unwitting gang-stalker is electronically influenced to think and/or act a certain way, whether towards the target directly, or else in a way that indirectly affects the target, while they believe that they are acting by their own free will. In the second case, the unwitting gang-stalker is purposely triggered in some way so that a switch in personalities takes place, and the alternate personality, being the witting party, takes over and acts out against the target. Once he or she has done so, the original personality is switched back again, leaving the person completely unaware of what they have just done. In the first case, hypnosis may also be used, sending triggers that induce a hypnotic state, giving commands telling the person what to do, and then using post-hypnotic suggestion to cause the person to not remember their actions afterwards.
Both of these methods of using people for gang-stalking activities without their knowledge are probably being used extensively and increasingly at this stage of affairs. There has been more and more information coming out over the years about the extensive reality of mind-control technology, satanism, and trauma-based MPD victims (many of whom are unaware that they even have MPD). A historical review of the origins and existence of these phenomena reveal that they stem from the same source and for the same ultimate purpose of complete and total domination and control of a population. This totalitarian ideology is satanic in nature, and this is where it originates. Trauma-based MPD is a very ancient method of creating controlled ‘servants’ and has been heavily employed in satanic groups for millennia.
An example of using mind-control technologies to involve unwitting participants in gang-stalking activities follows. The scenario described is known as ‘street theatre’, where seemingly coincidental events take place in public that are intended to negatively affect a target in some way, such as to frustrate or incapacitate him or her. These street-theatre operations usually involve a number of gang-stalking participants working in tandem, and are carefully preplanned and orchestrated. It’s my own observation that many of the participants in these street theatre events don’t seem to be at all aware that they’re acting at the behest of a controlling party, and their actions seem to be completely unconscious and coincidental rather than consciously purposeful. This has led me to suspect that certain mind-control technologies are being employed at these times against ordinary citizens who are not members of gang-stalking groups, but are being mind-controlled and just happen to be at the right place at the right time.
Imagine that you’re walking down a fairly busy sidewalk on a normal day. As you walk, people seem to be continually cutting you off in your path, either suddenly crossing in front of you and forcing you to stop short, or converging around you and blocking your movement, or stepping out from behind obstacles or from around corners just as you approach, or forcing you to step around them as they suddenly take up a position immediately in front of you, blocking your path. Even as you walk down an otherwise uncrowded sidewalk, the people just ahead of you who are walking in the same direction will shift to the left or right when you attempt to pass them on that side, effectively keeping you behind them. Unless these people are somehow being cued as to when to move as they do, there’s no natural way for them to know the precise moment to do this on purpose.
Having personally experienced these situations regularly and having made careful observations over time, I’ve been able to assure myself that these acts aren’t happening to others as frequently as they happen to me. They are a form of street theatre. I’ve also been able to formulate a possible means that might have been employed for creating these situations around a target using whatever unwitting parties happen to be around the target at the time. This hypothesis is based on documented facts regarding current mind-control technologies.
To a person who is unaware of the extent of mind-control technologies and their capabilities, the very idea that people could be unwittingly used in the following manner might seem ludicrous. But the fact is that subliminal suggestions can be beamed into a person’s head, and both thoughts and physical movements can be influenced through them. The subliminal suggestions enter at a preconscious level of mental processing and are not consciously detectable, but the context of the suggestion rises up as what appears to be that person’s own thoughts. Similarly, affecting physical movements, such as slightly destabilizing a person’s balance so that they suddenly begin moving to the right or left at the appropriate time, can be caused by beaming an electromagnetic signal at that person in order to affect their motor cortex in the proper manner. This can be done via satellites or microwave towers. It is possible that computers, cell phones, and other commonly carried electronic gadgets are also equipped to pick up and amplify beamed signals.
Beamed electromagnetic signals that can affect a person in these ways are not just science fiction. Specific brain activity gives off specific brainwave signatures, and these can be recorded using similar technology to what an fMRI scanner uses. Once recorded, the same brain state can then be recreated by transmitting that recorded electromagnetic signature at a person. For lower-level brain functions, such as motor impulses, emotional states, and even preconscious thought processes, the signatures will be fairly uniform for all people. This is because these lower-level brain functions developed early on in our evolution, and are therefore more or less genetically identical from person to person. Using the latest in laser technology, coupled with the accuracy of GPS technology to pinpoint a target, even a person in a thick crowd of people can be influenced without affecting anyone else that happened to be standing nearby. Because every person also gives off their own unique electromagnetic signature, the ability to locate a specific person out of a multitude can be achieved rather easily. Once located, the person can be locked onto and then affected by beamed signals coming from either satellites or nearby cell phone transmitters. Using the person’s unique signature to verify that the target is within the beam’s trajectory, the appropriate brainwave signature is then transmitted, carrying with it the control frequencies. It’s similar to how different radio stations can broadcast at their own specific frequency that carries the transmitted signals. These signals become the sound we hear from a particular radio station on the AM or FM dial of our radio, and the signal of one station doesn’t affect the signals of other radio stations that broadcast at other frequencies. With mind-control technologies, the carrier wave for the signal (the broadcast frequency) would be a specific individual’s unique signature, and only that person can receive the signals that are transmitted at that frequency because only that person is tuned to it.
Other less advanced forms of mind-control technologies are more broad-based, and target an entire group, such as a crowd of people, or even an entire neighborhood or community. Technology such as HAARP (High Altitude Auroral Research Project) can affect an entire continent of people. These broad-based technologies are used to affect a group or population through their basic emotions, and smaller versions have been frequently used to manipulate crowds at sports events, during religious congregations, and at various types of public seminars and events. They have also been used in factories, at rock concerts, in supermarkets, and in shopping malls. They are very likely being used in television shows and movies as well. These technologies are used to induce specific emotions or influence certain behavior, either by broadcasting frequencies associated with specific emotions, or by broadcasting subliminal verbal suggestions. This technology will influence a group of people to a certain degree, but not to the degree that is required to control individuals within that group without affecting the rest of the group. This makes these sorts of broad-based mind-control technologies not as useful for controlling gang-stalking groups, but are sometimes useful as a weapon against their targets. Frequencies that induce certain emotional responses can be broadcast at the target from a relatively small transmitter device planted around his home or workplace, which will affect the target whenever they are within its range, or the device can broadcast to the people around the target, such as neighbors or co-workers, to influence them to act in ways that will affect the target.
Either of the types of mind-control technologies that I have described, whether a broadcast signal that affects everyone in its range, or a directed beam that only affects a single individual, can be remotely controlled automatically through computers, and databases of signature frequencies can be compiled on the members of an entire population, so that with high speed computer processing capabilities such as used with ECHELON, large numbers of people in a given area can be tracked and controlled simultaneously and automatically, making street-theatre situations possible without having to use organized gang-stalking groups. Instead, with a database containing the frequency signatures of every person in a given population, every person can be controlled individually and simultaneously, and manipulated like puppets. As the current technology expands in its capabilities and the numbers of people who are able to be simultaneously controlled increases through hardware expansion, it will begin to be applied that much more, and gang-stalking groups will become obsolete as policing the population becomes totally electronic and computer automated.
These technologies are real, as are the capabilities I describe. A person can therefore be unwittingly used as a participant in gang-stalking activities. This sort of use of unwitting people as players in these activities will become more common as time goes on and new applications and methodologies are designed and implemented.
The question naturally arises at this point as to why this technology is not just used on the gang-stalking targets directly, and eliminate the need for a gang-stalking group to harass the person. The simple answer is that it sometimes is. However, it seems that the desire of the controlling parties is to establish a fascist society in which they have complete control of the population, and since this is not going to be achieved openly and with people willingly giving up their rights and freedoms, it is necessary to entrap the public within such a system by portraying the rest of society as a threat, and involving them in threatening activities against the rest of the population without them realizing that they are being manipulated against their will and acting against their own morals and beliefs. To do this, it is necessary to change people’s perceptions so that the desired responses from them become completely voluntary and acceptable. The very conditions that are set up turn a perceived evil into a reality, and perpetuate a growing fear. Furthermore, the intimidation factor involved in all this is important to the controller’s desired system, and the gang-stalking activities provide a means to intimidate not just the target, but the participants as well. Gang-stalking groups and the way they operate facilitate these ends in a number of ways. The mind-control technologies are added into the mix out of convenience, since these groups give the controllers a means to test and experiment with them. Since this technology is so secret, however, those who operate it must be trusted parties who follow orders precisely and are properly trained in their use. This takes time and effort, and in many cases, the gang-stalking participants just don’t qualify. But they often qualify for being a guinea pig in mind-control experiments, so these technologies are very likely being incorporated into these groups and their activities to a certain degree. At some point, these groups will be given the ability to use the technology on their targets, but it seems unlikely that the technology will be placed directly into the hands of ordinary citizens anytime soon. At best, they may be given very limited access to it. Only those who are already completely mind-controlled themselves and are therefore completely controllable might be given full access to mind-control technology.
It must also be taken into consideration that the purpose of these gang-stalking activities is not just to unnerve the target and make them look foolish or even crazy in public, or to frustrate or intimidate them, or to punish them for some perceived misdeed. The deeper purpose is to coerce them into conforming, to force them to silently accept what is going on, and to break their will and draw them into taking part in this system of control. By causing many of those around a target to consciously or unconsciously act (through mind-control technologies) in ways that seem natural other than the fact that for the target they’re occurring so often or for no apparent reason, the target will more likely be provoked to lash out in frustration as the situation escalates through increased occurrences. Anyone around the target will be clueless as to what the target is experiencing, and the target will appear to be delusional should he or she mention anything to anybody. The sense of isolation that often results, due to a lack of anywhere to turn for help, is meant to break down the target and force his or her silent submission. With the advancement of mind-control technologies, this can be achieved without the need for witting participants of gang-stalking groups to engage in their activities, and instead, unwitting parties can be used to fulfill certain small actions within a larger orchestration of street theatre, or in other forms of harassment.
If trauma-based mind-control is also being heavily used to create alternate personalities, then depending on how prevalent this is, we might be dealing with a large number of people who are multiples and unknowingly involved in this sinister web of control. A whole underground society might exist that’s filled with such people without them even being aware of their involvement. The fact that the induced trauma that creates an alternate personality is never remembered by the original personality makes it impossible for a mind-controlled multiple to know that they went through a procedure to split their mind, and that they are being controlled. A person only needs to be alone with the mind manipulators long enough for them to establish an alternate personality and program it with basic control mechanisms, and this might only take a few hours with advanced equipment and techniques. Recruits for this sort of mind-control could easily be picked from hospital wards, prison populations, mental institutions, and military personnel. A person who goes into a hospital for some relatively minor operation might get the wrong doctor, who only needs to be isolated with the patient for a couple of hours while he applies electroshock treatment to induce a split personality before adding hypnotic triggers that can be used to later access the alternate personality. Such a trigger might be an electronic signal that can be beamed or broadcast. This would allow an entire group to be triggered simultaneously with a single trigger, or separately with different triggers. Even without creating an alternate personality, hypnosis can be used on its own to instill post-hypnotic suggestions, but by creating an alternate personality, the controller has deeper and more permanent control, and what they have done is less likely to ever be discovered.
Fighting Back
If a target becomes aware of the gang-stalking activities directed at them, which they undoubtedly will sooner or later, they’ll normally react in a predictable way. This is the desire of the perpetrators, who seek to cause relentless stress and discomfort to the target, in the hopes of breaking them mentally and emotionally.
The psychology behind gang-stalking activities is to push the target to give in to the activities and accept being a victim to them, so it’s very important that the target doesn’t allow the intended effect to occur, and instead turn the situation more to their own control or advantage. The most important thing is for the target to not react to these activities as they would normally feel compelled to do. In fact, in most situations they should not react at all. Instead, targets should just pretend that they are totally oblivious to these events and continue whatever they were doing just as they were doing it without showing any signs of awareness of what is really going on. The target needs to remember that they are more than likely being watched and even listened to no matter where they might be, particularly within their own home, but potentially anywhere, and their reactions to the gang-stalker’s activities will be closely scrutinized. For instance, scowling or cursing under the breath whenever a neighboring gang-stalker makes sudden loud and disturbing noises throughout an otherwise peaceful evening would reveal a response that the gang-stalkers were seeking. They can be watching and listening to the target very closely for any sort of predictable response, and will focus on doing things that appear to aggravate the target the most. The best thing for a person to do if they think they’re being gang-stalked is to get used to being constantly watched and listened to at every moment early on, and learn to not let it get to them. The only way to overcome these situations is to face them head on. Once that’s done, the person will be able to think more clearly and can begin to develop a plan to fight back.
It should be noted here that all surveillance, both audio and video, will be recorded. This means that everything the target says and does can be scrutinized very closely later on for any minute signs of response to gang-stalking activities, so any telltale mannerisms that a target might reveal will likely be spotted. Even a slightly raised eyebrow or body twitch can give away a target’s attempt to hide the effect that gang-stalking activities might be having on them as they occur. If the gang-stalkers can be completely ignored even after various different tactics have been attempted to frustrate the target, they’ll definitely notice and might even become frustrated themselves. This would be a definite win for the target.
What is the end goal of these activities? Why do these groups target people for no apparent reason? The gang-stalking activities are designed to appear coincidental or to otherwise seem so odd that telling anyone about them will only make the target seem delusional. They are usually designed to cause the target to break down mentally, at which point they might even be converted into a gang-stalking member themselves. The ultimate purpose of gang-stalking is to create a self-policing society of easily controllable citizens, where all rights have essentially been taken away from the individual, and special privileges are earned through acts of loyalty to the fascist government that currently lurks in the shadows of our society. It’s an inexpensive but very effective method that worked well in East Germany with the Stasi, in Stalinist Russia with the KGB, and in Nazi Germany with the Gestapo.
Fighting back might seem impossible when you consider the extent that this problem has crept through society, and the apparent inescapability from these groups and their controllers, given the range of technologies the controlling parties have at their disposal. However, it is possible to subvert some of the gang-stalking activity to some degree. Every target’s situation is different, but there are certain things that are fairly common to all targets, and there are ways to counter them.
Some methods for fighting back are:
Install hidden video cameras in and around your home, preferably with motion-sensor triggers and the ability to time-stamp the footage. The idea is not so much to compile evidence that can be taken to the police, since the police are likely in the know and won’t respond very favorably to such reports. The video cameras are to be used to begin your own counter-offensive, and to do so, you’ll need to collect information on who your gang-stalkers are, how they act during these events (do they appear unconcerned about being in your home while you are away, or do they seem nervous and in a hurry?), what times of day or night they usually act, what they commonly do during their acts, etc. One note of caution: the gang-stalkers will be able to defeat this security measure with a universal remote control unit, so it’s advisable to cover the remote signal receptor on your VHS machine with tape.
Change your normal routines often, preferably to disrupt the ability for the gang-stalkers to predict your actions. Sacrifices will essentially have to be made, and this may include quitting your job for a while, sleeping at odd hours, taking round-about routes to wherever you are going rather than the usual and more direct routes you normally take, getting a second residence somewhere, etc. Anything that you notice in your actions that might be tipping off the gang-stalkers to predictable patterns on your part should be altered to throw them off as much as possible. By doing this, you’ll not likely rid yourself of them, but you’ll make their job of keeping tabs on you that much harder. These people are not being paid much, if anything, so they might soon tire of putting more and more effort into their acts when there is less and less enjoyment for them in doing them. However, some of them will take any counter-tactics as a challenge and will increase their efforts.
Change the locks on your doors regularly, and don’t leave any spare keys laying around anywhere. This probably won’t stop them from getting into your home for long, but it will slow them down and inconvenience them.
Give false leads to misdirect the efforts of the gang-stalkers, such as telling someone on the phone that you’ll be going to a particular place at a certain time, when in reality you’ll be going somewhere entirely different, or just staying home. This will cause them to prepare to be at the false location, and will scatter their efforts to stalk you.
Carry a camera, and take pictures of anyone and anything that you come across that seems suspicious and might be associated with any gang-stalking activity directed at you. Openly taking photos of anyone around you that seems suspicious might actually cause them to tip you off as to their involvement, since they may become uncomfortable when they realize that you’re fighting back. If you think that someone is entering your home while you’re out because you continually find your possessions have been tampered with, then taking close-up pictures of certain items and their precise positioning for later comparison when you come home will let you know if you are imagining things or not.
Purchase an electromagnetic frequency (EMF) detector, and regularly scan your residence for hidden cameras, microphones, and other electronic technologies that might be being used against you. Be aware that your computer, cell phone, and other electronic equipment in your home or workplace might be doubling as surveillance devices, so they should all be shut off completely and then scanned for any persisting energy fields that could indicate surveillance devices have been inserted in them. It should be noted also that the government has access to frequency ranges that lie outside of the detectable ranges of most EMF detectors, so these devices may be of no use.
Satanic Undertones
Although little realized and often denied, there is a very well established satanic underground that permeates society worldwide. It originates with the ultra-elite family bloodlines that have ruled Europe and America for centuries, but extends deep into the thick of today’s society. Because induced MPD is very likely a requisite for full participation in the deeper satanic activities, and is used to keep those activities secret even from the participants themselves, it’s very difficult to be sure what percentage of the population has been drawn into this satanic underground without their even knowing it.
In considering this in relation to the issues of gang-stalking and mind-control, it becomes fairly obvious that these two phenomena stem from satanic circles. By that, I mean that they originate from the military and intelligence organs, which is filled with people with very satanic leanings, from the top down. Mind-control technology is satanic in its very conception, and the trail of evidence of government involvement in this field of research and development shows that it is tied to the same generational families that have been heavily involved in satanism for a very long time. Gang-stalking is the reworking of an already established and well-used method of controlling a population by having the people police each other in a very repressive manner, as was used by the Stasi secret police in East Germany, the Gestapo, and the Russian KGB.
Adolph Hitler had been deeply enmeshed in the occult, and the entire Nazi party was centered around satanic beliefs and practices. As was stated earlier, certain elite American families were working hand-in-hand with the Nazis before and during the war, and with their help, thousands of Hitler’s top scientists and engineers were funneled into the USA after the war through Operation Paperclip, to be given new identities and serve in government positions. They brought with them many of their ideas for controlling populations, which included a great deal of knowledge that became the basis for American mind-control programs and citizen policing groups.
The satanic leanings of these Nazis did not die when they were brought to American soil, but were instead allowed to take new root and slowly creep throughout the government, becoming well established, particularly within the military and intelligence organs. Because of the secrecy allowed within these and other government organs, based on the excuse of national security, this was not difficult to accomplish and keep hidden from awareness. Since the time that these Nazis were brought into the American government, those who were closely associated with them in the beginning have continued to operate within the same circles and have continued to establish greater means of control in government while whittling away the people’s rights and freedoms in more and more draconian ways that leave us all at their greater mercy. The original basis of a free democratic society has been usurped and is now merely an illusion that covers the true fascist totalitarian dictatorship that is upon us today. Mind-control and gang-stalking are but two means to this end, providing the ability to turn the thoughts and actions of an involuntary public towards the desires of those who are in the process of establishing their absolute control over the rest of humanity.
Turning the Tables
Everybody is a creature of habit. This means that those people who are targeting people through gang-stalking and mind-control techniques and technologies, while being reliant on the target’s habitual responses to stimuli, are also equally prone to responding to things out of habit. To put this another way, they are prone to following patterned actions, and this is just as much a weakness in them as it is in a target or anyone else. The benefit in understanding this is that a target who is aware of the gang-stalking or mind-control that they’re being subjected to can use this to fight back.
Patterns are the key. Habits and routines are patterns, and a gang-stalker or mind-controller is reliant on knowing a target’s habits and routines in order to establish a ground-base of controllable situations in regards to that particular target. Unless a target is being constantly and unceasingly controlled in their very thoughts and actions through some sort of technological means, they have the opportunity to learn about the perpetrator’s own habits and routines and find a way to use them to fight back. To learn the perpetrator’s habits and routines, the target needs to watch for patterns in the perpetrator’s methods of operation.
Once a target has clearly established some of the patterns of their antagonists, they can begin to turn the control around. It probably won’t be enough to liberate the target completely, but it will allow them to learn some things about their assailants and the extent of their abilities, which will give the target the ability to forestall some of the methods being used and throw off their assailants to some extent. This effectively gives the target certain power over their antagonists, and in realizing this, the target has an opportunity to stop playing into their hands, to compose themselves mentally and emotionally, and to begin approaching their situation with the cunning determination to defeat the efforts of their assailants.
In order to do this, a target needs to pay attention to their own patterns, and recognize their assailant’s own patterned responses to them. For instance, if the target realizes that every time that they have their routine morning shower the telephone will ring, causing them to habitually jump out of the shower and answer the phone just to hear a dial tone, then they have discovered a pattern. Once this is realized, they are then in a position to disrupt their assailant’s little game, and to turn it around. There are a number of things that might be done to achieve this. First, the target could choose to simply ignore the telephone at that time and remain in the shower. Second, the target could break his or her usual routine and continually change the time of day that they have their shower, and see if the calls still occur while showering. Third, if the target has the psychological strength to withstand the possible repercussions, they could set up an answering machine that will give a taunting message to their assailants that will hopefully drive them to anger, in the hopes that this will cause them to make a mistake. Other possibilities exist besides these, and every situation is different for every target, so a little consideration of what the assailant’s main objective might be will offer some ideas as to how to disrupt their activities.
In the above scenario, the assailants will be informing the target through their own responses that they are watching or at least listening to the target, and this means that they’re probably using ordinary surveillance equipment: cameras and microphones. In more sophisticated operations, they may be using advanced technologies, such as through-the-wall surveillance. The only other possibility is that they are remote-viewing the target, which requires an individual to spend some time and effort psychically focusing on the target each time this occurs, which is not very likely but still quite possible.
Let’s assume that the controllers are using ordinary surveillance technologies to watch and listen in on the target. In this case, there’s a very likely chance that these technologies can be located and removed. Purchasing an electromagnetic field (EMF) detector will give the target the ability to sweep their home and other locations (including themselves) to find any electronic devices that are transmitting a signal. Any devices that are found should be removed and either destroyed or handed over to a trustworthy third party for safekeeping. A lawyer would be such a person.
Here’s another possible scenario in which the target can turn it around and begin to control the actions of the assailants. Suppose that the target knows that someone is stationed in the suite above their own, and that whoever it is, is involved in monitoring the target at particular times of the day or night. The target can begin to play cat-and-mouse with the monitor, finding pretexts for knocking on the door to the suite, and causing general disruption to the monitor’s activities, at the same time leaving a clear message of their knowledge of the monitor’s presence and activities. Since these people are sometimes interested in getting involved in the life of the target at as personal a level as possible, the target might even tempt the upstairs monitor into a false friendship, just for the sake of getting useful information on them, which can then be used against them and their accomplices. All is fair in love and war, after all, and the target should not feel that it’s wrong to do to these people what they are doing to the target. As long as these fascist assholes are willing to trample our fundamental rights and act out immoral and unethical practices, a person has the necessary right to fight back with equivalent means and force.
An important question that a target needs to ask themselves and find an answer to is whether a particular person who is involved with a gang-stalking group is involved knowingly or unknowingly. Knowing this will help the target to begin to understand the circumstances of their own situation much better, and this will allow them to deal with it in the best manner possible. It wouldn’t be good to begin doing to an assailant what is being done to the target if the assailant isn’t even aware of their participation in a gang-stalking operation and is being unwittingly manipulated themselves through mind-control. So it’s very important to establish the level of conscious participation that a particular assailant is involved in a target’s abuse.
It should also be understood that whoever is behind the mind-control and gang-stalking operations, they usually rely on the efforts of people to do the monitoring of targets and operate the technologies being used against them. They seem to be employing otherwise ordinary people for many of the tasks required in their operations, and ordinary people are not usually very well trained in covert tactics and the use of psychology. In fact, many of the people being used in these operations are probably not very intelligent at all, and are very gullible and easily intimidated, which is how they often get caught up in these activities in the first place. This is to the target’s advantage, since this gullibility and timidity can be played on by the target, causing problems that will make these people slip up. With enough effort, a target might cause continual problems for their gang-stalkers, and force them to work harder, or to even back off.
A target must acquire a very thick skin if they are to begin fighting back. Unless the assailants are using advanced mind-control technologies, such as directed-energy weapons that affect the target’s body and mind, it might be safe to make a game of the situation, and be willing to up the ante to a point where the people directly acting against the target (such as low-level monitors or ‘street-theatre’ participants) become uncomfortable with what they’re doing. The assailants will look for anything that upsets their target, so the target should pretend very realistically and over the long term that certain things that their assailants are instigating are far more (or far less) upsetting to the target than they really are. The target will know that they’re succeeding when these sort of events begin to occur more and more often or more intensely. This will draw some of the perpetrators further out of the shadows and become more daring if they think that they’re actually succeeding (or not succeeding) in upsetting the target. This also gives the target the ability to test their own suspicions about whether they’re really being targeted or not.
Showing no fear seems to agitate the assailants, and challenging low-level lackeys can easily cause them problems, confusing them in their efforts. Of course, it’s not a good idea to challenge them directly, face-to-face, but if for instance the target knows that there are hidden microphones in their home or workplace, they might take the opportunity to send their low-level monitors vocal messages that will agitate them or lead them on and make them want to react, but in so doing they will reveal their involvement. A target who is keenly aware of the signals that people give off when they are thinking one thing and pretending another will be able to discern if their counter-tactics are effective or not when they see them face-to-face, and if they are, the target is in a position to push the envelope further, in whatever way they can come up with to rock the boat harder and harder. As I said, these people are only human, and will react as humans tend to do when they’re provoked to anger.
Doing the unexpected can also throw them off. Suddenly doing things outside of normal habit or routine will upset the assailant’s efforts if they rely on these routines in their methods of targeting a person. For instance, if the target usually leaves for work every morning at the same time, and is gone all day, then it might be worthwhile to see what happens if they come back ten minutes after having left. It’s important to follow instinct and do whatever can be done to shake up the efforts of the gang-stalkers.
Something that has been pointed out by another gang-stalking target is that because these gang-stalkers are hired by people who do not want themselves or these activities to be publicly exposed, the gang-stalkers they hire are in many cases required to sign non-disclosure agreements when they are first recruited, and this means that they will probably avoid discussing the subject of gang-stalking at all. This gives the target an advantage, at least if the target knows who any of their assailants are and can engage them in friendly conversation. If this is possible, then the target can better determine if a particular person is wittingly involved in these activities. By approaching the suspected gang-stalker in a friendly manner and bringing up the subject in some way, the target should be able to gauge whether the suspect might actually be involved or not. A suspected gang-stalker who doesn’t attempt to avoid any discussion of the subject may not be involved, but a suspect who avoids any discussion is very possibly involved and is worried about breaking their contract with their handlers. If this is the case, this person can be counter-targeted by the target through pressure until the person either begins to slip and say things they aren’t supposed to, is pulled out of the ‘game’ by their handlers, or quits under pressure. If nothing else, doing this or anything else to let your gang-stalkers know that you are very aware and remaining level-headed and unflustered about what they are doing may cause them to back off, at least until they can figure out better tactics than they had been using. This, of course, may just draw more intense activities from them in the end, but if you have the strength and intelligence to face it, and continue to fight back, you may eventually learn enough about these people to discover who is responsible for having them target you and expose them and their involvement publicly. They don’t want this at all.
Targets of mind-control techniques and technologies need to understand that although this is a problem of potentially global magnitude, and that anyone at all might be targeted, it’s nonetheless an invisible crime and apart from the targets themselves, most of the population is divided between those who are completely unaware of it going on, and those who do but because they are wittingly involved or are afraid of being targeted themselves they pretend it doesn’t exist. For this reason, it will do little to help the targeted person by telling others about the abuse early on, before substantial evidence can be gathered, if that’s even possible.
It must be understood what could easily happen if these gang-stalking and mind-control crimes were to be known about and accepted as a reality by the public at large without providing any evidence of the fact. If this were the case, anyone who was troubled with their thoughts, who had a problem with their tyrannical neighbor, or whatever other problem they might have, might be tempted to lay the blame on a false cause. This would not help those whose problems are not caused by mind-control techniques and technologies, and by extension, it would only hurt the people further who are really being targeted.
This has been part of the plan. It covers up the real problem and lets it grow and take root while those who are victims of it tend to support the illusion of a society with a growing number of delusional characters who pose an increasing threat to our peace and security, and for this reason more draconian steps are seen to be necessary and
__________________________________________________________________________________________________________________
Part C. Organized Gang Stalking: What You Need to Know (OSI Organized Gang Stalking Informers)
OSI Organized Stalking Informershttps://www.facebook.com/OrganizedStalkingInformers/?fref=nf
January 3, 2013 · https://www.facebook.com/OrganizedStalkingInformers/posts/313050825461644
ORGANIZED GANG STALKING: WHAT YOU NEED TO KNOW
Organized Gang Stalking, also known as Gang Stalking, Cause Stalking, Organized Vigilante Stalking, Stalking by Proxy, Community-Based Harassment, and Covert War,are essentially harassment and discrediting campaigns waged against a targeted individual Citizens and neighbors are recruited to participate,often from extremist groups and cults, but also from among employees Coordinated psychological warfare attacks, consisting of stalkings, noise campaigns, sensitizing and the spreading of lies and rumors, are executed in an effort to virtually neutralize and destroy the victim using people from all backgrounds and vocations to harass, track 24/7, sometimes organizing lethal vehicle accidents, poisonings, electronic harassment, home invasions/property destruction, corrupt or ignorant doctor diagnosis given to stamp the victim as bogus mentally ill with delusions, paranoid, or schizophrenia, etc. Everything is done covertly. and with a sophisticated real time dispatching system to organize the criminals’ harassments and attacks, often in the hundreds to thousands of criminals participating as a coordinated mob at any given time while the criminals do their normal routines of work, shopping, commuting to and from work, leisure, etc.,using the method of moving foot and vehicular surveillance techniques, and computers,cell phones, verbal and visual cues, and every other conceivable type of communication. Often, the local network of this mob is connected to a national and international network when the target travels the local network will follow the target to the next city or town when the target arrives there, the networking that location will Stalk follow and Harass the target in that city or town Organized Gang Stalking also known as organized stalking, community harassment community stalking is a systemic form of control, which seeks to destroy every aspect of a Targeted Individuals life. Using occupational health and safety laws, warning markers can be added to a targets file. Once a target is flagged, a notification is sent out, and the target is followed around 24/7 by the various communities that they are in. A covert investigation might be opened, and electronic means used by the civilian spies as part of the covert monitoring and surveillance process.
The citizen informants can be parts of these community-oriented programs, but are often just average citizens. Everyone in the targets life is contacted, advised as to why the individual has been listed or flagged. Advised not to discuss the notification and asked to be a part of the ongoing,never ending monitoring (systemic harassment) process. This process is covertly designed to destroy the target over time, leaving them with no form of support. Since most civil workers are aware of this notification system, it means that targets reporting incidents of being followed around by various strangers should not have been unfamiliar to the police, and other agencies that targets reported their harassment to. In most cities this notification is well known, and used by many workers and employers. Yet Targeted Individuals have had to have mental health evaluations for making complaints about this structure, and the harassment that comes with it. Organized Gang Stalking is experienced by the Targeted Individual as psychological attack, that is capable of immobilizing and destroying them over time. The covert methods used to harass, persecute, and falsely defame the targets often leave no evidence to incriminate the civilian spies. It’s similar to workplace mobbing, but takes place outside in the community. It’s called Organized Gang Stalking, because organized groups or community members stalk and monitor the targets 24/7. see Gang Stalking Organized Stalking.
QUESTIONS AND ANSWERS
Does the word “Gang”, as in Gang Stalking, refer to “Street Gangs”? No. The word, “Gang”, refers to multiple people who organize/group together for a common purpose. What is the difference between Stalking, by a single perpetrator, and Organized Gang Stalking? All forms of stalking are physically, emotionally, and psychologically harmful to the victim. With regards to Gang Stalking, the abuse is particularly invasive as the victim is not able to distinguish friend from foe. The majority of the population is aware of cases such as “jilted lover as stalker”, and can readily identify key features of such abuse. The little-known phenomena of Organized Gang Stalking allows the perpetrators anonymity and enables future victimization’s, as stalkers are actually encouraged by the lack of repercussions. Please keep in mind that victims of Organized Gang Stalking have to deal with an abuse engineered to make them appear insane should they complain to authorities. It is no wonder that victims of Organized Gang Stalking are far more likely to commit suicide than victims of individual stalkers.
IS ORGANIZED GANG STALKING ILLEGAL?
Yes! Despite what the leaders or members of Stalking and Harassment groups say or believe, all forms of Stalking and Harassment are illegal.
STALKING DEFINITION
Stalking can be defined as a pattern of repeated and unwanted attention, harassment, contact, or any other course of conduct directed at a specific person that would cause a reasonable person to feel fear. Stalking is against the law in every state. Stalking across state lines or in federal territories is illegal under federal law. A willful course of conduct involving repeated or continuing harassment of another individual that would cause a reasonable person to feel terrorized, frightened, intimidated, threatened, harassed, or molested and that actually causes the victim to feel terrorized, frightened, intimidated, threatened, harassed, or molested. A person who intentionally and repeatedly follows or harasses another person and who makes a credible threat, either expressed or implied, with the intent to place that person in reasonable fear of death or serious bodily harm is guilty of the crime of stalking.
HARASSMENT DEFINITION
Harassment means conduct directed toward a victim that includes, but is not limited to, repeated or continuing unconsented contact that would cause a reasonable individual to suffer emotional distress and that actually causes the victim to suffer emotional distress.
F.B.I. Title 18, U.S.C., Section 241 Conspiracy Against Rights
This statute makes it unlawful for two or more persons to conspire to injure, oppress, threaten, or intimidate any person of any state, territory or district in the free exercise or enjoyment of any right or privilege secured to him/her by the Constitution or the laws of the United States, (or because of his/her having exercised the same). It further makes it unlawful for two or more persons to go in disguise on the highway or on the premises of another with the intent to prevent or hinder his/her free exercise or enjoyment of any rights so secured. Punishment varies from a fine or imprisonment of up to ten years, or both; and if death results, or if such acts include kidnapping or an attempt to kidnap, aggravated sexual abuse or an attempt to commit aggravated sexual abuse, or an attempt to kill, shall be fined under this title or imprisoned for any term of years, or for life, or may be sentenced to death.
THE GOAL OF ORGANIZED GANG STALKING
The expressed goal of Organized Gang Stalking is to silence a victim, drive a victim insane and possibly to the point of suicide, or destroy the victim’s reputation and believability as the person will likely be viewed as mentally ill should they complain or report the abuse. To cause the target to appear mentally unstable is one, and this is achieved through a carefully detailed assault using advanced psychological harassment techniques, and a variety of other tactics that are the usual protocol for gang stalking, such as street theater, mobbing, pervasive petty disrespecting.
Organized Gang Stalking is also used to gather information on individuals as well as force individuals to move or leave an area. Do the Stalkers ever question or check to see if a targeted victim is indeed guilty of a crime? No. There is an “assumption of guilt” among the stalkers. Also, remember that many stalkers are paid for their harassment, so these individuals are not concerned with the innocence or guilt of a victim. Assuming a victim knows the group that is behind their stalking, should they attempt to openly communicate with them? Absolutely Not! For one, the stalkers automatically assume the victim is guilty of an atrocity,and thus “deserves” the treatment. Second, many stalkers actually want the victim to engage them in some fashion. In these instances the interaction will be recorded and used as evidence against the victim, especially in attempts to suggest the victim is mentally unstable. If a charitable and respectable society practices Organized Gang Stalking on the side, should we assume the victims deserve such treatment? Absolutely not! When people take the law into their own hands, any notion of “law” is destroyed altogether. I should emphasize that the majority of Organized Gang Stalking victims are completely innocent of any crimes. Any group that performs Organized Gang Stalking is not positive in nature, nor beneficial to society, despite any charitable works they may perform. Likewise, such societies only remain “respectable” because any and all evidence of “wrong doing” is conveniently destroyed or eliminated.
MOTIVATIONS FOR THE ABUSE
Motivations for Organized Gang Stalking vary. Revenge for a real or imagined offense, true or false accusations of a “horrible crime” of which the victim has gotten away with, silencing a corporate “whistle-blower”, defecting from a cult, a perceived enemy of a group or organization, and “knowing too much” are all examples of possible motivations. Due consideration should be used as the motivations of the stalking and harassment groups are in no way limited to the above.
WHO ARE THE STALKERS?
The stalkers, for the most part, are everyday citizens. Other stalkers are “street thugs” who have been recruited or hired to harass and intimidate. Some Stalkers are actual Private Investigators who have been hired to gather information concerning the victim. Many stalkers are members of volunteer police groups.
WHY PEOPLE PARTICIPATE IN GANG STALKING
Some stalkers are told lies, either positive or negative in nature, in order to gain their participation Some stalkers are paid or receive other benefits Stalkers belonging to an organization may simply be following orders. Some stalkers may use their participation in order to repay a past favor.Racism, Prejudice, Homophobia, or otherwise Hatred of a victim Peer Pressure/ Need to Fit In Former stalkers have stated they participated out of fear of becoming the next target should they go against the group. Entertainment Value/Thrill of Participation in an Illegal activity. Some stalkers mistakenly believe it is their civil duty.
WHO, OR WHAT, IS ULTIMATELY BEHIND GANG STALKING?
Corporations, Government Organizations, Military,Some Police, Corrupt Cops,Societies/Fraternities/Orders, Religious Cults and Destructive “New Age” Groups, “Concerned” Community Groups/Vigilante Groups, Criminal Organizations, Volunteer Police Organizations, etc.
EXAMPLES OF ORGANIZED GANG STALKING HARASSMENT
Slashed Tires, Threatening Phone Calls, Verbal Assaults by Strangers, Property Damage, Death Threats, Following on Foot or by Vehicle, Bizarre Notes and Drawings Left, Loitering, Anonymous False Accusations to Friends, Family, and Neighbors, Character Assassination, Smear Campaigns, “Black-Listing”, Psychological Abuse, etc.
TACTICS AND METHODS USED BY THESE ORGANIZED GANG STALKING AND HARASSMENT GROUPS
The following techniques are several types that are often used against Targeted Individuals. There are other techniques used, but these are some of the primary ones.
ANCHORING
Anchoring is a technique employed by stalkers to implant a false motivation or reason behind the stalking preventing the victim from discovering the truth. In more sinister examples, Anchoring involves the implantation of evidence to persuade the victim some other group or organization is responsible for the abuse. Anchoring http://en.wikipedia.org/wiki/Anchoring. In Organized Gang Stalking, Anchoring is used to make the target have fear with things happening in your daily life that’s considered to be normal. That can be done with frequent demonstrations. The key is the frequency just like other Organized Gang Stalking methods. For example, People show you a pen every where you go, and their attitude is rude or crazy against you. You don’t know them. You just wonder what’s going on. Imagine that happens everyday, for a week, for a month, for a year, then, that makes you have fear with a pen. In this case, a pen is ANCHORED with your state of fear. It can be anything. An open car door or trunk, a pencil, a cell phone, notebook computer, a medical mask, clothes of the same color, anything. Every time I go somewhere during the day, an anchoring threat is made by car or truck with a door(s) or trunk open and no one in it sitting in someone’s driveway along my route. This is a sign to get out!
AIR STALKING
This is when helicopters or planes are used to track targets that are on foot, or in cars. They fly over head and follow the targets from one location to the next. Some will monitor the targets shortly after they leave their homes.
BAITING/ENTRAPMENT
The term Baiting is a stalking tactic used to lure a victim into environments, or situations, which cause further problems to the victim. Often Baiting involves tricking a victim into committing a crime or unknowingly engaging in an illegal activity. To lure into dangerous, difficult, or a compromising situations. Members of these Organized Stalking and Harassment groups will try to lure targets into various situations for the sole purpose of setting them up. Setting up targets could involve getting them arrested, institutionalized, set up on fake sexual harassment charges, drug charges, illegal pornographic materials, etc. Once this happens, it put’s targets at risk for entrapment into becoming members themselves.
BRIGHTING
Brighting is shining or flashing bright head lights on targets As targets walk on the street, usually at night, members of these Organized Gang Stalking will turn on their high beams. This might be flashed once or twice at targets. This might be used to let targets know they are being watched, however these signals might also be a way for Informants in cars at night, to communicate with their fellow counterparts. The foot patrols will then communicate back to the Informant in the car, using a combination of hand signals you will see members of these groups riding around during the day with their headlights or hi beams on. The victim is usually followed and may be “flashed” from either a “tail-gating” vehicle or a passing or on-coming one. “Brighting” also occurs when bright lights are flashed into a victim’s home-windows.
CAR ACCIDENTS
Targeted Individuals complain about being cut off, driven off the road, and near fatal or fatal car accidents. Pedestrian targets complain about cars that consistently cut them off, being hit by cars, and other almost near mishaps.
CROWDING / MOBBING
When the target is in public, members of these Organized Gang Stalking groups will usually try to box the target in. Eg. They will surround the target in a square like formation if possible. They will stand too close to the target, or swarm them. QUOTE “We experienced being mobbed by vehicles from CT NY and NJ at the beginning of our trip. Some of the gangs talkers were couples with their children along! Some smirked at us and showed weapons to us through their windows, though none actually fired upon us”.
COLOR HARASSMENT
Color Harassment is literally the use of color to harass a victim. Usually, monochromatic color schemes are used, though this choice is pretty much up to the stalkers. An example of Color Harassment would be a line of stalkers, in red shirts, circling a victim. Color Harassment is often combined with other stalking tactics.
CONVOY
Convoy is a tactic of stalkers referring to the practice of a group of “tail-gaiting” cars passing repeatedly in front of the home of the victim. Vehicles used may be of the same color, and stalkers may honk the car horn or flash the car headlights as they pass.
CYBER-STALKING
Cyber Stalking or Cyber Harassment is a related group of harassing behavior occurring via internet/online. Cyber Stalking includes, but is not limited to; Computer Hacking, “Trolling”, Spamming (Often including “Porn Deluges”, Verbal Assaults, Character Assassination, and Impersonations of the victim. Online harassment is a plank of the harassment protocol. If you have a website devoted to Organized Stalking you may have people emailing you to flame you, or claiming that they are victims & asking for support with the intention of discrediting you. You may receive unsolicited email that parallels a current event in your life. Again, surveillance is used primarily for harassment. Or you may receive covert insults & threats. If you join a support group, you may also receive harassment via threads posted on message boards. Like other mediums of harassment, the topics of these threads may be about events that are unfolding in your personal life, as well as threats or insults covertly directed at you. This will probably happen repeatedly by the same person or people. They may also employ some Gaslighting, or Jacketing tactics. Jacketing was often used during Cointelpro to make genuine activists look like informants. Some internet groups which help stalking victims are heavily populated with perpetrators posing as victims. Some of these perpetrators seem to be very vocal & popular members of these support groups.
DIRECTED CONVERSATIONS
Directed Conversation is a term referring to a stalking tactic using stranger’s conversation to both intimidate and to convey to the victim that they are under surveillance. During Directed Conversation, two or more stalkers will approach near to the target and engage in “normal” conversation with one another. The conversation is purposefully made at a level so that the victim can adequately hear what is being said. During Directed Conversation, personal information concerning the victim is inserted into the speech and emphasized by the stalkers in a fashion that most non-victims would not be able to discern as harassment. The purpose of Directed Conversation is to harass a victim, as well as make the victim appear mentally unstable should they attempt to complain about such abuse.These are conversations that complete strangers will have out in public relating to the target and their personal situations. Eg. They will repeat things a target said in their home, or on the phone. They will drop very personal details into the conversation, that could only be related to the target. Eg. Member #1. It’s a shame Uncle Ed won’t be able to come.Member #2. Yeah since he died golfing on Saturday. The target will just have learned of a death of a favored uncle, (possibly named Ed.) while out golfing.
ELECTRONIC HARASSMENT
Electronic Harassment is the use of technological devices to spy on or cause harm to targeted victims. For example, exposure to a high magnetic field has been shown to induce hallucinations in humans while exposure to intense microwave radiation induces psychotic episodes and causes brain damage. A frequent form of Electronic Harassment involves beaming a low frequency “hum” or “tone” into a victim’s home or general area. Over time, the exposure causes the victim to lose sleep, become agitated, and suffer the effects of prolonged stress. Such tactics are also being used in cases of hostage situations as well as covert government operations. Electromagnetic weapons and frequencies will be used on a target on their homes. The purpose of using the EMF (Electromagnetic Frequency) on targets ad their belonging are multifaceted. Electronic frequencies can destroy electronic equipment. Electronic frequencies can be used for monitoring and tracking inside the home, and at work. It can also be used for purposes of sleep disturbance. When those conducting these covert investigations feel that they have psychologically destroyed the target to where they are near breakdown they will start to use these weapons. They will also use these weapons if targets are not going along with their harassment protocol. Electronic Harassment http://en.wikipedia.org/wiki/Electronic_haras… Michigan Legislature Acknowledges the Existence of “Harmful Electro-Magnetic Devices” http://www.targetedindividuals.com/subliminal-acoustic-man…/
FAKE CREDIBILITY REPORTS
Fake Credibility Reports. fake credibility reports are being used to subtly discredit and attack legitimate websites regarding Organized Gang Stalking, including the Gang Stalking World website. Under the guise of doing good for the community. www.gangstalkingworld.com
FILES
It has been indicated that targets will have warning markers placed against their files. The information is then shared with relatives, store keepers, friends, and the community at large. The files are usually not left behind, but they are used to prejudice and slander individuals against the target. These files can be used to engender the corporation of friends and associates of the targets. The files might have a picture of the target, and information about some alleged crime, incidents, that the target has been flagged for, or is under investigation for. The information is usually very convincing and helps to further get targets harassed by those around them.
GAS LIGHTING
Gas Lighting is a Psychological technique used my members of these groups The purpose of Gas Lighting is to make a victim question his or her sanity. Doing little things to try to make the target think that they are going crazy. Gas Lighting simply is trying to convince someone that they are crazy or “imagining things” Example if you mention Organized Gang Stalking to someone who knows about it and they tell you your crazy or paranoid they ARE Gas Lighting you. The term Gas-Lighting originates from the 1944 film Gaslight. In the movie, the character of Gregory Anton, played by actor Charles Boyer, attempts to drive the character Pauline, played by actress Ingrid Bergman, insane. The phrase Gas-Lighting has come to mean similar actions and behavior, as used in the film, against a victim. 1944 Gaslight staring Ingrid Bergman
http://en.wikipedia.org/wiki/Gaslight_%281944…
GHOSTING
The term Ghosting refers to the practice of rearranging, or moving, of a victim’s home furniture, lawn decorations, desk decorations at work, etc. The purpose of Ghosting is to make a victim question his or her sanity. Ghosting is also designed to make others question the sanity of the victim, especially if the victim attempts to complain of the abuse.
GESTURES
Hand Gestures such as intentionally touching hand to face or bringing fist or hand to face while around person being targeted Arm Gestures members of these Organized Stalking and Harassment groups repeatedly driving by a person who is being targeted or their home holding their arms out of their vehicle windows usually in an unnatural position.
It is a known fact that these individuals involved in Organized Gang Stalking and Technological Harassment are also involved in Illegal Criminal Racketeering Operations with use of Remote Neural Monitoring, where these criminal individuals are profiting off of individuals involving masturbation, in some cases, these Arm gestures are being done to the victims as a degenerate NLP subliminal sexual symbolic masturbation trigger, we already know that individuals involved in this crime and cults are obsessed with symbols and numbers, individuals who are victims of Organized Gang Stalking Technological Harassment and Human Trafficking and Racketeering, are being daily subjected to these intentional bizarre Harassment Arm gestures, being used as a subliminal persuasion sexual gesture by these degenerate deranged cult members who are if not directly involved in the Human Trafficking Operations, are being used as cheerleaders for those involved in or operating Human Trafficking and Racketeering
Operations by use of Remote Neural Monitoring Satellite technology.
NOTE! Arm Harassment Gestures used by these Organized Criminal groups to Harass targets or victims,does not have anything to do with “abusing” or domestic violence, this is the excuse and pretext, that these criminals are using in attempt to justify Stalking and Harassing other individuals for years at a time!. These bizarre Arm Harassment Gestures are only a small portion and a criminal Harassment tactic, that is used as a part of the large Syndicated Crime of Organized Gang Stalking. It is also important to note that, these individuals are claiming that “it is the police doing the Arm Harassment Gestures” If the Arm Harassment Gestures are being done by police, then it is a corrupt syndicated police officer(s) taking advantage of his position of authority, and using it to Harass other citizens, while giving his fellow officers and department a bad negative image. To our knowledge these Arm Harassment Gestures are not taught at the local Police Academy, we could be wrong, but we are quite certain they are not!
Click here to see a great informative video of an Organized Stalking Technological Harassment Human Trafficking Racketeering victim blowing the whistle on and exposing these crimes!
ILLEGAL SURVEILLANCE
This involves setting up audio and some visual surveillance of the target. Bugging the targets phone. Surveillance in the targets residence Listening to cell phone and hard line conversations. Hacking into their computers and learning all about what the target is doing, sites they frequent. or planting things, This also helps to build a profile of the target, and it’s also used for later psychological attacks against the target, via Parroting and Directed Conversations.
Examples Of Illegal Surveillance
Illegal Criminal Electronic Monitoring
Illegal Criminal Phone And Computer Taps
Illegal Criminal Remote Neural Monitoring
MIMICRY
Mimicry or mirroring is a specialized form of harassment in which the stalkers publicly imitate every movement made by the victim. This is trying to copy things in a targets life. Leaving when they do. Dressing like they dress. Throwing out the garbage. Going to the bathroom Doing whatever the target is doing. This is all designed to be psychological warfare, so that the target again feels like they are under observation at all times.
MOBBING
Mobbing is a term that describes “Group Bullying”. Of itself, Mobbing is not equated with Gang Stalking. However, Mobbing may be a tactic used by the perpetrators of Gang Stalking. Mobbing http://en.wikipedia.org/wiki/Mobbing
NOISE HARASSMENT CAMPAIGN
A Noise Harassment Campaign is an orchestrated effort to produce stress in a victim through prolonged exposure to significant noise levels. A Noise Campaign can range from multiple neighbors routinely playing loud music, individual stalkers with air-horns or fireworks, or organized “repair work” that involves a high level of noise This will include anything from Loud vehicles, Loud mufflers doors slamming above you and below you. Garbage disposal slamming doors, Hammering intentionally slamming car doors loudly, loud stereos, stomping, at specific times, loud coughing, pots slamming, water running, cupboard doors being slammed, fridge motor running all night, power tools, etc.
NUMBER HARASSMENT
Number Harassment is literally the use of numbers to Harass a target and victim, This can include the brainwashed members of these cults driving by a victims home at a certain time, exiting or entering the neighborhood at a certain set time, or performing a Harassment task or skit, at a certain time of the day or night, for the purpose of harassment to the target and victim. The Number Harassment may be done in synchronicity with other members of these cults, For example a member of the cult arrives home at 7:07 in the afternoon and another member of the cult leaves at 7:07 at the same time, The next morning, one of the same members of the cult leaves home at 7:07 followed by another member of the cult. The individuals that belong to these cults are using local police 10 ham radio codes, to harass and to convey harassment related themes to the individual being targeted for years at a time, the only logical explanation that can be drawn as to why these brainwashed cult members are using local police 10 codes to Harass other citizens, is that they have been deluded into thinking that they are somehow police,the idea behind the Number Harassment, is to get the individual being targeted sensitized to certain numbers, so that they can be constantly Harassed by use of these numbers. Most importantly the members of these cults have already been sensitized, conditioned, and brainwashed to these specific numbers, and are constantly looking to their watches and clocks, to see what the time is, in case they have a Harassment skit or order to perform at a specific time of the day or night, that has been passed to them by their criminal leader and organizer via a cell phone text. that’s correct these cult members are actually being given a Harassment task and Street Theater Scripts to perform at a certain time of the day for the purpose of Harassment to another individual, despite the fact that the individual being targeted can easily document this Harassment and Cult behavior using a video camera with a date and time stamp, and sue the individuals for damages of Harassment and Emotional Distress.
SENSITIZATION
Sensitization is a psychological term referring to the forced association between a stimuli and a corresponding reaction. Members of these groups use Sensitization to psychologically abuse a victim. For example, if a stalker constantly harasses a victim while wearing a blue baseball cap, then overtime the victim will begin to believe anyone wearing a blue baseball cap is a stalker and is coming to harass. Sensitization This is getting targets sensitive to an everyday stimuli. Eg. Colors, patterns or everyday actions. Eg. Red, stripes, pens, whistles, loud coughing, clapping, waves, keys jingling. Eg. Joe will be mobbed at work and as part of that daily mobbing his coworkers will loudly cough at him every time they harass him by calling him names like loser, worthless, lame, demented. They will slander him and have others as they are slandering him show disgust by glaring and coughing at him. Out in public they will follow him loudly and obnoxiously coughing at him. When he goes to stores they will get others to do the same. After months or years of this, Joe has become sensitive to this stimuli and it can be used to harass him without the names and the glaring looks. The association has been formed because of all the other harassment. Eg. A girl is sexually assaulted and a sock is shoved in her mouth during the assault. To keep her quite or stop her from pressing charges, the assailant, his friends and family will follow her around and throw socks in her path, mention it everywhere she goes and show her their socks every chance they get. She will get the message they are sending. Because of the brutal attack, she and what’s happened after she is now sensitized. Sensitization undoubtedly creates an extreme level of fear in a victim, in direct fulfillment of the intentions of the stalkers.
Sensitization http://en.wikipedia.org/wiki/Sensitization
STREET THEATER
Street Theater is a term used to describe the odd-actions and behaviors that stalkers sometimes neighbors do in public, in an attempt to rile the victim. Such behavior often borders on the extremely bizarre and is aimed at a blurring of the boundaries between reality and fantasy in the minds of the victims. This is running into people that are acting very unusual, or people that are putting on a show or production, known as street theater. Eg. This could be as minor as public rudeness, or people acting out a harassment skit . There will usually be someone near by to see how you react to it. This is again looking for weakness or reactions. If you show an adverse reaction they will try to embellish on this and use it against you later on. Street Theater is Harassment skits done by strangers and neighbors who have been ‘recruited’ into these Stalking and Harassment groups. Examples of Street Theater: Baiting, Brighting, Color Harassment, Convoys, Directed Conversation, Ghosting, Mimicry, Noise Campaigns, etc.
SYNCHRONIZED HARASSMENT ACTIVITIES
Synchronized activities refers to the synchronized activities done by members of these groups to Harass a target which may include but not limited to neighbors arriving home at the same time or leaving home at the same time, or strangers or neighbors leaving or arriving home at the same time. E.g. One neighbor leaves his or her house at the same time another neighbor arrives home . E.g. 2 A neighbor arrives home and at the exact same time a complete stranger or pedestrian walks by a targets home. This synchronized activity is one of the main techniques used in harassing a target and is repeated. E.g. 3 A target leaves his or her home at the exact same time a neighbor who has been recruited into the harassment leaves their home followed by a airplane or helicopter flying overhead.this synchronized harassment will turn into a pattern and may include the use of numbers such as 2 neighbors arriving home At 3:13 and 2 other neighbors leaves their home at 3:30, the same neighbors arrives back home at 3:43. Synchronized Harassment Activities can be done with almost anything: Neighbors arriving/exiting at the same time aircraft flying overhead as neighbors are leaving or arriving home, Harassment telephone calls made to the targets home just as neighbors who have been recruited into the Harassment are leaving or arriving they key to this is timing and frequency. The main motivation behind Synchronized Harassment Activities is again that if the target complains about this type of Harassment he or she may be perceived as mentally ill.
HOW THESE STALKING AND HARASSMENT GROUPS COMMUNICATE
SIGNALS AND SYMBOLS
Communication happens in a number of ways. When on the street or in cars patrolling, they use baseball or Stasi like signals. These include things like tapping the side of the nose, corner of the eye, brushing back the hair 3 times, the infamous double blink, etc. Members of these Organized Stalking and Harassment groups will also communicate with each other on the street by using signals. Below are some examples.
SIGNALS FOR OBSERVATION
1. Watch out! Subject is coming – touch nose with hand or handkerchief
2. Subject is moving on, going further, or overtaking – stroke hair with hand, or raise hat briefly
3. Subject standing still – lay one hand against back, or on stomach
4. Observing Agent wishes to terminate observation because cover threatened – bend and retie shoelaces
5. Subject returning – both hands against back, or on stomach
6. Observing Agent wishes to speak with Team Leader or other Observing Agents – take out briefcase or equivalent and examine contents.
SLANDER
They will go behind the targets back and tell lies about them. Often the lies will consist of the target being into something illegal, or is someone dangerous, or just needs to be watched for some vague reason. Eg. The they will say the target is a prostitute, drug dealer, crazy, terrorist, racist, pedophile, etc.
SLEEP DEPRIVATION
Noise Harassment Campaigns Depriving the target of sleep is a really good way of leaving the target stressed out. It’s also a way of leaving them disoriented and functioning at less than 100%. Then the targets can be baited into reacting in public, or getting into a car accident.
TELEPHONE REDIRECTS
When you make a telephone call, get the name and ID of the person that you are speaking to. Covert Investigations have redirected phone calls. This means that when you dial a number they will intercept that phone call and pretend to be the service or repair person you were trying to call. Eg. If you call the cable company, gas or phone company be sure you know that it’s actually them that you are speaking to. Also remember that telephone companies and other businesses are often infiltrated by these Organized Gang Stalking and Harassment groups and can be used to harass and cause the targeted individual problems.
WRONG NUMBER CALLS
Targets will daily get wrong number calls. These can be automated or they can be persons pretending to be wrong number calls. Members of these groups will use this as a means to monitor and psychologically harass targets. They want to know where the target is at all times.
(VARIATIONS OF GANG STALKING)
CONSUMER STALKING
Consumer Stalking is harassment and abuse directed at a consumer who has either filed a complaint against a company, filed a lawsuit against a company, or who is made aware of illegal activity occurring within a company. Often companies will fund stalkers simply in an attempt to prevent the victim from filing a lawsuit, via using fear and intimidation tactics. Consumer Stalking can also be used to describe certain illegal activities of debt collectors.
CORPORATE STALKING
The term Corporate Stalking refers to a particularly severe form of Gang-Stalking, where a corporation actually provides funding toward the harassment and abuse of a targeted individual, usually someone who is a “whistle-blower”, a perceived “problem employee”, or else an employee who has witnessed illegal activity occurring within the corporation. The most sinister, and downright evil, tactic used during Corporate Stalking is forcing the victim to see the company psychologist. In most cases, the company psychologist is made aware that the victim is a “dissident” and a threat that needs to be eliminated. A false diagnosis of “general psychosis”, “schizophrenia”, or other mental illness is made, as well as a recommendation of institutionalization.
Corporate Cyber-Stalking
http://www.firstmonday.org/issues/issue7_11/b…
Corrupt Company Psychologist Information http://www.psychologistethics.net/
INTIMATE INFILTRATION
This is where members of these groups will go out of their way to get into a targets life. They will try to form friendships with targets. They will try to form intimate relationships with targets. They will get close to people that are affiliated with targets. Years before the target ever realizes they are targets they will try to get into a targets life. Eg. If they can’t get into your life, but you have a best friend, their new significant other might just be a member of the group. The same goes for siblings and the people that enter their lives.
ISOLATION
For this harassment to be successful, it’s important to be able to isolate the target from friends, family members, co-workers and even spouses if they are not already involved in the harassment. To accomplish this isolation many methods are used included, but not limited to: slander, lies, fake files, sabotage, anything that will get the target into a situation where they have no support system. This is important for them to succeed.
PROFILING
Targets will be observed and profiled long before they ever become aware that they are targeted by this sort of harassment. Profiles will be created on targets by: Following them. Following people close to them. Breaking into their homes and going through their stuff. Listening to their calls. Hacking into their computers. Gathering information from friends, and family. Seeing where they like to shop and eat. What are their weaknesses? What things do they like and dislike? What are their weaknesses? What things do they like and dislike? What can you bribe them with? What can you blackmail them with? How can you bully them? How can they best be controlled? This will all be used to put together a profile of the target and then to get them into situations for their detriment.
RANDOM ENCOUNTERS
This will be people on the street who you randomly and unexpectedly run into. It looks completely natural and it seems to be a random encounter. They might ask for your phone number after engaging you in conversation. Ask you out, or just ask you where you are going. Anything from small talk to lengthier conversations. All with the purpose of finding out something about you, or even just getting you to do something.
RUINED RELATIONSHIPS
When targets are in a relationship, the members of the Organized Gang Stalking group will try to ruin that relationship. This could be friendships, family or significant others. If it’s a romantic relationship, they will find out what your significant other likes and try to get them to cheat, or leave you. If it’s a friendship they will tell lies to come between you. The same goes for family. This is done so that targets will have no means of support, once they do realize that something is going wrong in their lives. When this Mobbing continues out in the community it is called Organized Stalking. Organized Stalking is Mobbing that takes place out in public. Deception using lies about the target appear to be the most common method used to get citizens to participate. Specifically, smear campaigns using bogus investigations. Furthermore, it is likely that they take advantage of existing federally sponsored mechanisms, such as community crime watch or community policing organizations, senior citizens organizations, & religious groups, & use them as unsuspecting instruments in their retaliation campaigns. Many people across the country have reported being harassed by these community groups. Some of these people they’re using think they’re doing a community service. This is a very well funded & organized service/cult that is apparently condoned or even run by the state. The perpetrators of Organized Gang Stalking are serious criminals who do great damage, and the acts done are very serious crimes by any measure. Organized Gang stalking is a highly criminal campaign, one directed at a target individual, and one that aims to destroy an innocent persons life through covert harassments, malicious slander and carefully crafted and executed psychological assaults. Organized Gang Stalking deprives the targeted individual of their basic constitutional rights and destroys their freedom, setting a stage for the destruction of a person, socially, mental and physical, through a ceaseless assault that pervades all areas of a persons life.
ORGANIZED GANG STALKING ON FOOT TACTICS AND METHODS
following the target everywhere they go. Gathering information about the target. Where they shop, work, play, who their friends and family are. Getting close to the target, moving into the community or apartment where they live, across the street. Following the target. Mobbing or crowding the target in public restaurants or stores. Having Directed Conversations about the target, Standing close to the target. Engaging the target in trivial conversations. Intentionally Coughing at the target, Repeatedly clearing throat, Using Gestures around the target Intentional staring, glaring, pointing, or whispering at the target. Jangling keys, jangling change, Getting a target sensitized to sounds, colors, patterns, actions. Eg. Red, white, yellow, stripes, clicking pens, foot tapping. Noise Harassment and mimicking campaigns. Disrupting the targets life, sleep with loud power tools, construction, stereos, doors slamming, etc. Talking in public about private things in the targets life. Mimicking actions of the target. Basically letting the target know that they are in the targets life. Daily interferences, nothing that would be too overt to the untrained eye, but psychologically degrading and damaging to the target over time. Mass strangers doing things in public to annoy targets. These strangers might get text messaged to be at a specific time and place, and perform a specific action. If might seem harmless to these strangers, but it could be causing great psychological trauma for the target. Eg. Blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit an angry response from targets. Etc.
ORGANIZED GANG STALKING VEHICLE TACTICS AND METHODS
Following a target around in vehicles, Tailgating the targets vehicle on the road, Driving or creeping by the targets home, 2 vehicles intentionally passing the other vehicle by or in front of the targets home repeatedly this is a type of Street Theater and psychological sensitization tactic that is intended to make the target appear crazy or mentally unstable if the target complains of this type of Harassment. Driving by the targets home revving engine loudly, Blowing horns by the targets home. Loud repeated door slamming. Loud stereo systems. Harassment by vehicles with loud or squeaky parts such as loud mufflers, squeaky fan belts or loud intentional squeaky brakes. Leaving loud vehicles or motorcycles idling around a targets home used as a form of Harassment. Pulling in on side streets by a targets home and setting or backing up, Pulling up in the targets driveway. Reversing vehicles in front of the targets home. Vehicles or groups that travel in cells the cells may use vehicle Color Harassment. Vehicle Color Harassment using many vehicles ‘cells’ of the same color to Harass and sensitize the target to a certain color, E.g. Sending or flooding the targets neighborhood with many white vehicles, this can be done subtly or all at once. For instance a target may notice 8 white vehicles within 5 minutes driving by his or her home, or may see one white vehicle one right after the other driving by his or her home, this Harassment and sensitization tactic can be done with any color. Vehicles driving by the targets home in Convoys. the Convoys may be of the same color or similar type vehicle. Members of the Stalking and Harassment group lined up in Convoys along a targets route. Positioning long lines of traffic in front of the target. Car accidents that may be staged or setup involving the target. Swarming or surrounding the targets vehicle on the road. Driving at slow speeds in front of the target. Vehicles With vanity plates that may mean something personal to the target that is used to convey messages and Harass the target while on the road. Psychological vehicle tactics such as Shining high beam head lights on the target. Vehicles with one head light on and the other headlight off. Vehicles with one head light that is brighter than the other head light. Vehicles with headlight that can be turned up into a “spotlight” to bright the target.
____________________________________________________________________________________________________________________
Part D. Covert Community Killing
Keith Kampschaefer 11:40 am on December 2, 2014
Are you aware of the killing of hundreds of thousands of people around the world that are dying as a result of psychological harassment and torture received from a covert network of sociopaths?
Are you aware of this?
This network of co-conspirators is connected by a hierarchical system or rank and communicates from the top down to instruct, disseminate, and delegate to the community operative and agents in position their ‘marching orders.’
Although there are copious amounts of information available on the Internet about covert stalking and harassment, it is still a seldom talked about phenomenon and for those in the media who will include it in their programming, it generally falls into the category of fringe topics. The reason is that this phenomena by its very nature requires the element of secrecy and functions as methodically as vermin in the shadows and darkness of daily life.
But in reality, this secret psychological and many time physical assault and torture is more widely known than what the common conversation and news of the day reflects. This is because the large number of people who are aware of this ‘program’ know of it—as being a part of it. Sadly, minions by the millions are brought into this covert network of gang stalkers, trackers, mockers, informants, thieves, saboteurs, and even assassins by smooth-talking community organizers or intimidated into it by brow-beating thugs.
‘Drones’
Some TI’s [targeted individuals] are lucky in that they have at one time or another caught their tormentors red-handed. Some have caught them in the act of sabotage, or have recorded instances of abnormal harassment or surveillance on camera. They have as such provided themselves and others with real evidence of the activity; have assured themselves they are not making things up. – Source: Coherent Madness: Effective Defense Against Covert Warfare
By Mukazo Mukazo Vunda, P15,p3
The tactics that are used to recruit or draft participants vary. Many neighborhood operatives are duped into participation by an appeal to their civic responsibility; being told that they are assisting in removing questionable characters (being victims of slander) from the community. Others who may be less willing to direct their own time and/or resources toward a complete stranger may be brought in by bribery, coercion, blackmail, or peer pressure from friends and family members.
To emphasize one point, the attacks on an individual from family members are extremely traumatic and painful. It may be that many domestic violence incidents are triggered by the final, proverbial last straw as the real victim’s senses are simply overwhelmed by the unceasing onslaught of psychological attacks and—conveniently enough—physical assaults that are just superficial enough to be dismissed as ‘unfortunate.’ For the sake of brevity, the physical assaults, which may include tampering with food, using booby traps, sabotaging vehicles and equipment, or electronic weaponry (DEW), are a complete topic unto themselves to be addressed elsewhere.
But there is something else going on in all of this that is more grave and atrocious. Something so sinister and loathsome it is nearly incomprehensible. And although evidence for what I see happening may be questionable and murky to some and unreasonable to others, I believe with the proper analytical reasoning, ability to understand how evil works, and most important of all, having a love for the truth, you will see something take shape that is very real—even if difficult to grasp.
What I have evidenced for the last four or five years is a connection between certain phrases that refer to current news worthy subjects and events and these phrases or terms being highlighted or quoted in a number of well-known Internet news aggregator sites that practice manually curated headlines.
Some of these terms in news reports that I’ve paid closer attention to in the last few years are:
NEWS REPORT
____________________
‘Green Jobs’
‘Fast and Furious’
‘Stand Your Ground’
‘Pumping’
‘Occupy’
‘Day of Rage’
‘Drones’
‘Knockout'(New)
‘Kill List’
____________________ _______________________
‘Shovel Ready’
‘Don’t Ask, Don’t Tell’
‘Global Warming’
‘Climate Change’
‘Bitter Clinger’
‘Fiscal Cliff’
‘Stimulus’
‘Nudge Squad’ (New)
‘Walking Dead'(New)
_______________________
Now this is where you will need to have an understanding of several of the core attitudes or policies of the occult and the practice of evil. There are two laws or principles that are frequently present in the actions and practices of the occult world and secret societies such as Jesuitism, Freemasonry, Illuminati, Templars, Knights of Columbus, etc. And we can include most of today’s institutions such as government and corporations in this as well.
Hermetic Symbols
The two principles evidenced here are of the Seven Hermetic Principles (Hermeticism) which is a Gnostic religion practiced in the occult (secret) world. These are:
2. The Principle of Correspondence – “As above, so below; as below, so above.”–The Kybalion.1
4. The Principle of Polarity – “Everything is Dual; everything has poles; everything has its pair of opposites; like and unlike are the same; opposites are identical in nature, but different in degree; extremes meet; all truths are but half-truths; all paradoxes may be reconciled.”–The Kybalion.1
To put it plainly, everything has a double meaning or purpose.
So if you can understand the truth to this as having evidenced it yourself in various situations and circumstances in today’s society, consider the possible hidden meaning behind those words and phrases I have included above. But before you do this, let me try to create a larger picture for you to see that might make these words and phrases appear more boldly within the canvas.
This article started off with the question, “Are you aware of the killing of hundreds of thousands of people around the world that are dying as a result of psychological harassment and torture received from a covert network of sociopaths?”
Yes, the picture I am revealing to you is of a huge, secret network of conspirators who have acquired a membership within a world-wide, genocidal death cult or killing club. The number of people involved as well as who is actually participating will be shocking, once this system is exposed.
As I’ve said previously, there is much information on this available for those who are concerned enough to examine it. I’ll include a few resources with links below but here is an interesting quote by R.B.Ross as well as several excerpted paragraphs from a book titled: Coherent Madness: Effective Defense Against Covert Warfare by Mukazo Mukazo Vunda.
“Predatory Gangstalking is a criminal phenomenon referring to a group of loosely affiliated people who, in an organized and systematic manner, relentlessly invade all areas of an individual’s life on a continuing basis, as part of their lifestyle. While each individual gangstalker does his or her small part, what defines Predatory Gangstalking is the collective intent to do harm.” R.B.Ross c 2005
Some TI’s [targeted individuals] are lucky in that they have at one time or another caught their tormentors red-handed. Some have caught them in the act of sabotage, or have recorded instances of abnormal harassment or surveillance on camera. They have as such provided themselves and others with real evidence of the activity; have assured themselves they are not making things up.
So the picture I have attempted to paint for you is one of a vast yet secretive organization that is quietly and covertly killing millions of people around the world. Now…, when you examine the words and phrases above such as “kill list” for example, you might begin to ask the question in your mind, “Does this term actually refer to a very real list of people who have been selected as targets for elimination?”
Or in another example, the term, ‘Fast and Furious.’ Is this coded doublespeak to refer to a government-sponsored gun-running psyop that went bust, however ill-fitting the title and also to a rallying command given to the ‘boots-on-the-ground’ to strike their targets swiftly and ferociously with gang stalking and harassment tactics?
But what about the terms such as ‘green jobs’ and ‘stimulus?’ Do these terms have something to do with the recruitment and ‘compensation’ of the ‘syndicate’ member?
Let me preface the following points on statements by Barack Obama by saying we need to remember that our presidents are merely puppets who take their orders from shadow government forces behind the curtain. Bush, Clinton, and most likely all modern day presidents going back to Kennedy are merely the facade of a corrupted government system that rules the world.
Brownshirt (Nazi Paramilitary)
Do you remember Barack Obama saying in a speech before elected to his first term presidency something about a “national security force?” What he said was this:
“We cannot continue to rely only on our military in order to achieve the national security objectives that we’ve set. We’ve got to have a civilian national security force that’s just as powerful, just as strong, just as well-funded.”
And the following sentence Mr. Obama said:
“We need to use technology to connect people to service.”
It has been my abundant experience in being a ‘target’ that I understand that today’s cellphone technology is the long-awaited tool or weapon needed for a pervasive and intense psychological war on targets. With instant messaging, texting, phoning, photography, and a host of apps specifically designed for Stasi-like civilian police and informant networks, this gadget is the web that connects local, national, and international gang stalkers linked together and functioning proficiently.
With that in mind, Obama’s statement about using technology to connect people (stalkers) to service (the target) is fitting. That last statement (“We need to use technology…”) just about says it all.
Following are several videos that speak to some type of ‘Civilian National Security Force’.
Obama’s Brown-shirts Are Coming – Gestapo – SS – Civilian National Security Force
Youtube video #:youtu.be/0ecDxMQcsLg
“…a civilian national security force that’s just as powerful, just as strong, just as well-funded.”
Just as well-funded by what?
By some type of ‘stimulus’ money offered up in the form of ‘green jobs’ (greenbacks) to purge a socialistic/fascistic government of targeted ‘shovel ready’ (ready for the grave) citizens on a ‘kill list’?
Comments (0)