Skip to content

Appendix 20. What is Predatory COINTELPRO-MKULTRA Gang Stalking? with recommended reading

War On Terror
Articles & Interviews

Gray State (film)

February 19, 2024

Part VIII: Cult Connections

February 9, 2024

Quotes on War

December 11, 2018

CIA Front Companies

December 1, 2018

ETK Introduction

The following excellent summary articles come from the websites- www.fightgangstalking.com, https://gangstalking.wordpress.com/faq/, and http://www.whale.to/c/predatory_gangstalking.html. Information in these articles corroborates, supplements, and extends information that I posted on this site in my January 21, 2015 post entitled Appendix 9. “Gang Stalking:” Organized and Electronic Targeting the “Domestic Enemy.” Notes from Books, utube Presentations, and Blogs.”

This subject is extremely important and is so poorly understood and recognized by the public that I want to make this material available here. I also recommend that those interested in learning more about this subject visit these and other websites because they also include many excellent graphics, youtube films, resources, etc.

The author of the first article below is a former security/intelligence officer who makes the important point that the term “gang stalking” may itself be a disinformation term invented by the intelligence agencies that conduct these covert, criminal, “counter-terrorism” programs in order to “neutralize” and/or destroy the innocent civilians whom they target. The more accurate term for this kind of unconstitutional and criminal activity, according to the author, is “counterintelligence stalking.”

“Cursed is he who strikes his neighbor in secret.” – Deuteronomy 27:24

I. Contents of ‘What is Gang Stalking?’

1. A Brief Explanation of “Gang Stalking”
2. Introduction to the Full Explanation of Gang Stalking
3. Crimes by U.S. Law Enforcement & Intelligence Agencies
4. Oversight of Law Enforcement & Intelligence Agencies
5. Published News Reports ***
6. History: COINTELPRO, MK Ultra, Red Squads, & the Stasi
7. The National & International Scope of Gang Stalking
8. Investigation, Surveillance, & Harassment Tactics
9. Mobbing & Workplace Violence
10. Selection of Targeted Individuals
11. The Organizational Structure of Gang Stalking
12. Social Conformity & Obedience to Authority
13. The U.S. Department of Justice (DOJ) & Gang Stalking
14. Disinformation
15. The Wall of Silence Which Surrounds Gang Stalking
16. Shining a Light on the Cockroaches
Blue Line
1. A Brief Explanation of “Gang Stalking”

Definitions

“Gang Stalking” is, very likely, a disinformation term created by U.S. intelligence agencies. It refers to the intense, long-term, unconstitutional surveillance and harassment of a person who has been designated as a target by someone associated with America’s security industry.

Such operations have nothing to do with criminal gangs. Official domestic counterintelligence operations of this type are – apparently – perpetrated by federal agents and contractors, sometimes with the support of state and local law enforcement personnel. The goal of such operations – in the parlance of counterintelligence agents – is to “subvert” or “neutralize” an individual deemed to be an enemy (or potential enemy) of clients or members of the security state. Arguably, the most accurate term for this form of harassment would be “counterintelligence stalking.”

Published news reports and other evidence cited on this website seem to suggest that much – but not all – of this stalking is done as part of a national program. News reports indicate that such stalking is also sometimes used unofficially for personal and corporate vendettas by current and former employees of law enforcement and intelligence agencies, including private investigators.

Since counterintelligence stalking goes far beyond surveillance – into the realm of psychological terrorism, it is essentially a form of extrajudicial punishment. As such, the harassment is illegal – even when done by the government. It clearly violates the Sixth Amendment of the U.S. Constitution, for example – which guarantees the right to a trial. Such operations also violate similar fundamental rights defined by state constitutions, which people on the right of America’s political spectrum claim to respect. Stalking is also specifically prohibited by the criminal codes of every state in America.

Although the term “gang stalking” is intentionally misleading, it does have one merit: it is accurate in the sense that the perpetrators – law enforcement agencies, intelligence agencies, and private security thugs – do often function in the manner of criminal gangs. Although they sometimes conduct their operations under the color of law, many of their activities have neither constitutional nor moral legitimacy. That is true of all of the likely major perpetrators of organized stalking in the U.S.: the FBI, the Department of Homeland Security, U.S. military counterintelligence agencies, state and local Law Enforcement Intelligence Units (LEIUs), and security contractors. All of those groups – and other federal intelligence agencies, such as the CIA and NSA – have well-documented histories of abusing their powers.

History

Organized stalking methods were used extensively by communist East Germany’s Stasi (state police) as a means of maintaining political control over its citizens. The Stasi referred to the tactics as “Zersetzung” (German for “decomposition” or “corrosion” – a reference to the intended psychological, social, and financial effects upon the victim).

Although they are illegal in the U.S., the same covert tactics are quietly used by America’s local and federal law enforcement and intelligence agencies to suppress dissent, silence whistle-blowers, and get revenge against persons who have angered someone with connections to the public and private agencies involved.

Illegal counterintelligence operations have been perpetrated against Americans by urban police departments in the U.S. since the late 1800s. Traditionally, the groups of mostly-undercover police officers involved are called “red squads,” although the modern official term is “Law Enforcement Intelligence Units (LEIUs).”

The most well-documented example of such operations was the FBI’s infamous Cointelpro (Counter-Intelligence Programs) under the direction of J. Edgar Hoover. Those operations ran from 1956 until 1971 when they were exposed by political activists who broke into an FBI office and obtained secret documents which they handed over to the press.

Cointelpro’s official goal was to “expose, disrupt, misdirect, discredit, or otherwise neutralize” individuals and groups deemed to be subversive.

Tactics

As the U.S. Senate’s investigation of Cointelpro found, tactics used by the FBI included many of the methods associated with gang stalking, such as overt surveillance (stalking for psychological operations purposes). The agency even perpetrated crimes such as blackmail and assassinations.

Organized stalking methods include warrantless electronic surveillance, slander, blacklisting, and a variety of psychological operations. The latter presumably exploit findings from studies such as the notorious MK Ultra experiments conducted on American and Canadian citizens by the CIA, as well as the aforementioned psychological torture tactics refined by the Stasi. In fact, as explained in the overview below, former CIA analyst and expert on the history of U.S. spying, George O’Toole wrote about a connection between the CIA and the aforementioned LEIUs.

An organized stalking victim is systematically isolated and harassed in a manner intended to cause sustained emotional torment while creating the least-possible amount of evidence of stalking that would be visible to others. The process is sometimes referred to as “no-touch torture.” Methods are specifically chosen for their lack of easily-captured objective evidence. Perpetrators use common annoyances such as constant noise by neighbors or rude comments and abusive behavior by strangers, but on a frequent ongoing long-term basis. The cumulative effects of relentless exposure to such tactics can amount to psychological torture for the victim.

Accomplices – such as neighbors, co-workers, and even friends or relatives of the victim in some cases – are recruited to participate (often unwittingly) by counterintelligence personnel using various means, such as by telling them that the target is a potential threat or that the target is the subject of an “investigation.”

A whole set of psychological operations are perpetrated against targeted individuals. These methods, described in detail in the overview below, include such things as threats, slander, vandalism, abusive phone calls, computer hacking, tormenting the victim with noise, and “mobbing” (orchestrated verbal harassment by strangers, neighbors, or co-workers).

Accounts by numerous victims of organized stalking share common specific details – suggesting that the perpetrators are following a well-tested and standardized playbook of methods that have proven to be easily kept off of the radar of potential witnesses and the mainstream news media.

News Reports

Note: The following published news reports are discussed in more detail later in this overview, and accompanied by links to the original sources.

Although Edward Snowden’s revelations about the National Security Agency (NSA) in 2013 and 2014 generated a great deal of public discussion about mass surveillance, U.S. domestic counterintelligence activities receive relatively little attention. This is so despite reports – such as those which follow – from sources across the political spectrum.

Published articles and anecdotal reports have appeared with increasing frequency – especially in the past decade or so – alleging that something comparable to the FBI’s Cointelpro operations is still happening, although it naturally involves more advanced surveillance technology.

One of the first significant works of investigative journalism about U.S. domestic counterintelligence operations in the post-Cointelpro era appeared just 7 months after the U.S. Senate’s “Church Committee” issued its final report about Cointelpro and MK Ultra.

Pulitzer Prize nominee George O’Toole, a novelist and historian who specialized in the history of American espionage, and who had worked for the CIA as an analyst, wrote an article titled “America’s Secret Police Network.” The article, which was published in the December 1976 issue of Penthouse, exposed a secretive quasi-governmental organization called the Association of Law Enforcement Intelligence Units (LEIU).

Although LEIUs – or “Red Squads” – have existed in America since the late 1800s, the private national network of such intelligence units that was quietly formed in the 1950s had remained – and still remains – mostly unknown to the general public. O’Toole described the group this way:

“The organization forms a vast network of intelligence units that exchange dossiers and conduct investigations on a reciprocal basis. Several of the police departments belonging to the group have recently been caught in illegal wiretapping, burglary, and spying on the private lives of ordinary citizens. The LEIU is, in effect, a huge, private domestic-intelligence agency.”

A New York Times article published in April 1979 reviewed a three-and-a-half-year study of the LEIU association by the American Friends Service Committee. The study described the LEIU as “an old-boy network” whose illegal surveillance “of groups and individuals for political purposes is continuing on a vast scale in the nation.” According to the report, the widespread illegal spying posed “a grave threat to the constitutional rights of freedom of expression, due process and privacy.”

A Los Angeles Times article published in September 1979 under the headline “FBI Admits Spreading Lies About Jean Seberg” was the lead story on the paper’s front page. Seberg – a successful film actress and a political activist – had died the month before in Paris from an apparent suicide. As the Los Angeles Times reported, Seberg had been the target of a systematic campaign by the FBI to slander her. She had also apparently been blacklisted and terrorized by the FBI using tactics associated with counterintelligence operations intended to neutralize political dissidents, such as “black bag jobs,” illegal wiretapping, and overt stalking.

During the 1980s and 90s a trend toward militarization began in American police departments. For example, Special Weapons and Tactics (SWAT) teams were being created across the nation. However, relatively little news about U.S. counterintelligence operations emerged. This is not to say that illegal spying was not taking place; it just mostly stayed out of the media. A book published in 2014, L.A. Secret Police, exposed such spying in Los Angeles and explained how it was kept out of the news. Police Chief Daryl Gates apparently used threats and blackmail to scare city council members and the Los Angeles Times away from digging into his activities.

Here is an excerpt from a description of the book:

“L.A. cops ruined lives and reputations, inflicted mindless brutality, committed murder and engaged in massive cover-ups. In Los Angeles, police corruption was much more than unmarked envelopes stuffed with cash. It was a total corruption of power. For decades LAPD engaged in massive illegal spying and lied about it. Its spying targets included politicians, movie stars, professional athletes, news reporters and anyone wielding power or those of interest to Daryl Gates.”

An apparent case of organized stalking by federal agents which did appear in the news during that era was the high-profile case of a cancer research scientist named Arnold Lockshin, who fled with his family to the Soviet Union in 1986 and was granted political asylum. An article in the Gadsen Times – and other newspaper reports – in October 1986 brought national attention to the case. According to Lockshin, he and his family were being intensely harassed by agents because of the socialist political views of Lockshin and his wife. The harassment tactics included many of those associated with organized stalking: slander, spying, break-ins, threats, harassing phone calls, etc.

News reports about domestic spying and subversion in the U.S. and other Western nations became more frequent in the post-9/11 era.

In 2004 the PBS news program NOW and Newsweek magazine both reported that the Pentagon had quietly resumed its practice of domestic spying, and suggested that “something like Cointelpro may again be at hand.” Spying on civilians by the U.S. Army was one of the scandals which led to the famous Church Committee investigations by Congress in the mid-1970s.

In October 2004 the U.K newspaper The Sunday Times published an article about the use of Stasi-type psychological operations to punish whistle-blowers by MI5 – an intelligence agency with close ties to the U.S. intelligence community.

In December 2005 National Book Award winner Gloria Naylor, wrote a semi-autobiographical book in which she described her experiences as a target of organized stalking. The book’s title, 1996, was the year it became apparent to Naylor that she was being stalked. Apparently, her harassment began after she had a minor dispute with a neighbor whose brother worked for the National Security Agency (NSA).

The Globe and Mail, a national newspaper in Canada, reported in May 2006 that the Canadian Security Intelligence Service (CSIS) and the Royal Canadian Mounted Police (RCMP) used organized stalking techniques (referred to as “Diffuse and Disrupt” tactics) against terrorism suspects for whom they lacked sufficient evidence to prosecute.

A cover article in The Washington Post Magazine in January 2007 by a journalist familiar with military policies and weapon systems portrayed self-proclaimed victims of gang stalking as intelligent and credible, and suggested that claims about exotic non-lethal weapons being used by the U.S. government to harass targeted individuals were plausible.

Former CIA division chief Melvin Goodman was quoted in a June 2008 article by Jeremy Scahill in The Nation (America’s oldest continuously-published weekly magazine) on the vast private contractor element of the intelligence-security community:

“My major concern is the lack of accountability, the lack of responsibility. The entire industry is essentially out of control.
It’s outrageous.”

A newspaper article in the Verona-Cedar Grove Times in March 2009 titled “Stalker Claims Unsettle Police” described how a self-proclaimed target of gang stalking had been distributing flyers in his former neighborhood in Verona, New Jersey, warning about organized stalking of targeted individuals. The flyers stated: “Their intention is to murder their target without getting their hands dirty. It’s the perfect hate crime.”

A post on the political blog Daily Kos in October 2010 alleged that intelligence agencies in the U.S., the U.K., and Canada use gang stalking (zersetzung as East Germany’s Stasi called it) against targeted individuals.

A local TV news broadcast in California in January 2011 (on KION – Channel 46 and KCBA – Channel 35) featured a report about gang stalking – referred to as such by the reporters and by Lieutenant Larry Richard of the Santa Cruz Police Department.

In his February 2011 article for the Guardian, “The Dirty History of Corporate Spying,” investigative reporter James Ridgeway described how corporations target people with what is, in effect, a secret private law enforcement system:

“The private detective firms working for corporations can develop information against their own targets and find eager recipients among federal and local law enforcement agencies, some of whose employees end up retiring into private-sector detective work. The corporate spy business thus amounts to a shadow para-law enforcement system that basically can get around any of the safeguards set out in the American legal system; it ought to be subject first to transparency, and then to banning.”

A newspaper article in The Record and a TV report on KCRA Channel 3 in August 2011 reported that the city manager of Stockton, California was stalked by local police after a break-down in contract negotiations. The brazen tactics used by the police included purchasing the house next to that of the city manager and using it as a base for psychological operations of the sort used by counterintelligence personnel.

Florida’s Pulitzer Prize-winning Sun Sentinel reported in December 2012 on the organized stalking of a police officer by other police officers and sheriff’s deputies from multiple jurisdictions. The victim of the stalking had cited an off-duty police officer for reckless driving. The stalking – which included illegally snooping on the victim’s private data and efforts to harass and intimidate her – was apparently done in retaliation.

An article in CounterPunch magazine in January 2013 asserted that the FBI’s infamous Cointelpro operations have re-emerged in full force: “Cointelpro is alive and well.”

A June 2013 article in the Nation said this about activities by private security firms, the FBI, and the Department of Justice:

“One might think that what we are looking at is Cointelpro 2.0 – an outsourced surveillance state – but in fact it’s worse.”

Articles in the Washington Times and Wired magazine about the September 2013 mass shooting at the Washington D.C. Navy Yard included reports of speculation that the incident resulted from the shooter having been systematically tormented by gang stalking, including tactics such as constant noise harassment.

The cover article of Fortean Times magazine in October 2013 (U.S. edition) was about “state-sponsored gangstalking.” The author, a professor from California State University Long Beach, described in detail how a former military service member who stole some equipment from the U.S. military has been relentlessly stalked by undercover operatives and psychologically tortured.

A TV news broadcast in West Virginia on 14 November 2013 (on CBS affiliate WDTV) included a report about “organized stalking” which featured two individuals from Pennsylvania who appeared to be credible and sincere, discussing their constant harassment by perpetrators using gang stalking tactics.

In November 2013, a TV and radio broadcast of Democracy Now! featured an interview with the director of the Center for Corporate Policy in which he discussed the shadowy industry of spies employed by major U.S. corporations to conduct secret – and often illegal – counterintelligence operations against critics of those corporations.

Articles published by CBS, the Daily Mail, RT, Tech Dirt, and Courthouse News Service in December 2013 reported that a U.S. government contractor filed a lawsuit against multiple federal agencies for gang stalking him (the complaint refers to gang stalking as such). The plaintiff claims he was subjected to constant surveillance – including inside his residence and his vehicle – and constant psychological harassment from co-workers and strangers.

An article in The New Yorker in February 2014 gave a detailed account of an organized stalking campaign by a large corporation. Research biologist Tyrone Hayes discovered some disturbing effects from a pesticide made by the agribusiness corporation Syngenta. When he refused to keep quiet about it, the corporation’s goon squad began slandering him to discredit him. They also stalked him, hacked his emails, and threatened him for more than a decade.

A report on the ABC News TV program 20/20 – and an article in the Daily Mail – in May 2014 chronicled the ordeal of a couple in Hubbard, Ohio who were systematically harassed for 7 years in a vengeance campaign orchestrated by the town’s fire chief. Apparently, the fire chief was angry at the couple because of a real estate dispute, so he enlisted the help of other firefighters, police officers, and local residents to perpetrate a campaign of constant vehicle horn honking outside the couple’s home. The harassment – which the couple thoroughly documented on video – resulted in legal claims which were still pending at the time of the news reports.

Disinformation

In addition to the use of covert methods, another factor contributing to the low profile of organized stalking in the media is a disinformation campaign – a common tactic in counterintelligence operations. In the case of organized stalking, the disinformation is mainly intended to mitigate exposure of the program.

Toward that end the Internet has been flooded with websites and forum comments about gang stalking that falsely purport to be from self-proclaimed victims of organized stalking, making irrational claims – references to demons and such. The intended effect is to convey the impression that everyone who claims to be targeted by gang stalking is simply delusional.

An additional disinformation strategy has been the establishment of front groups – most notably, FFCHS (Freedom From Covert Harassment and Surveillance) – ostensibly a gang stalking victims support group, but actually an organization run by counterintelligence operatives.

Scope of Operations

U.S. Department of Justice crime statistics from a 2006 survey indicated that an estimated 445,220 stalking victims reported being stalked by three or more perpetrators.

Such statistics suggest the existence of activities whose scope cannot be explained simply as stalking by criminals – especially given that the otherwise-comprehensive index of crime categories in the DOJ’s website conspicuously makes no mention of this type of stalking.

Another indication of how common organized stalking in the U.S. has become can be seen if you perform a search-engine query of the term “gang stalking.” You will get millions of results. The total silence of the DOJ and FBI on this crime is an obvious clue that it is sanctioned by those agencies.

Organizational Structure

Ted L. Gunderson was a high-level FBI official during the Cointelpro era. After he retired from the agency he asserted that a much more sophisticated version of Cointelpro began to re-emerge in the 1980s. A link to Gunderson’s affidavit on the subject is included in the overview below.

Based on news reports, accounts of self-proclaimed victims, and the DOJ statistics cited above, the apparent scope of current organized stalking operations would require the acquiescence of multiple federal and local government agencies (including the FBI and the Department of Justice, among others). Local and federal law enforcement and intelligence agencies now share crime and national security information via a nationwide network of data “fusion centers” – an element of the extensive post-9/11 homeland security infrastructure.

America’s now-vast industry of intelligence-security contractors, federal intelligence agencies (there are 16 not including the Director of National Intelligence office), and the hundreds of local police department Law Enforcement Intelligence Units (LEIUs) make it difficult to speculate about exactly how domestic counterintelligence operations are currently being administered.

Increasingly-common reports of illegal spying by corporations as well as reports of police officers and federal agents sometimes initiating gang stalking operations for personal vendettas further complicate the analysis.

Numerous job listings by intelligence/security contractor corporations for “surveillance role players” with active security clearances and training in counterintelligence (links and details in the overview below) strongly suggest that federal law enforcement agencies have largely outsourced these operations – which would be consistent with other security programs. A June 10, 2013 article in USA Today noted that about 1.4 million Americans had top-secret security clearances.

Federal and local law enforcement agencies also make extensive use of criminal informants (who are in large supply in America, with its extraordinary per capita incarceration rate). It would be natural for such informants to be used in a counterintelligence program. Indeed, the original Cointelpro was found by the U.S. Senate’s Church Committee investigations to have delegated some activities to organized crime groups. First-hand accounts of self-proclaimed victims of gang stalking support this assumption: by their appearance and behavior, many street-level perpetrators appear to possibly be ex-convicts.

Regardless of the exact nature of organized stalking in the U.S., any national counterintelligence program would require at least passive acquiescence by the U.S. Department of Justice (DOJ) – just like the first version of Cointelpro did. U.S. Attorney General Robert F. Kennedy approved some of the original Cointelpro operations. Because of the critical role of the DOJ in allowing organized stalking to occur, I devote an entire section of this overview to that agency.

Target Selection

Gang stalking apparently targets American citizens deemed to be dissidents or whistle-blowers (and perhaps potential dissidents and whistle-blowers), although others might be targeted for other reasons – such as for experimental or training purposes. For perspective, it should be remembered that for two decades the CIA performed secret illegal experiments on U.S. and Canadian citizens (the infamous MK Ultra program). Those experiments included physical and psychological torture.

A lot of accounts by self-proclaimed targets of gang stalking suggest that people are often subjected to severe long-term harassment simply because they crossed someone connected with the agencies and security firms which perpetrate such operations.

An example of that type of abuse occurred in April 2012, when USA Today reported that one of its reporters and an editor were slandered by a secret disinformation campaign waged by an intelligence contractor firm to discredit them because the newspaper had investigated and reported on that contractor. The company involved conducted propaganda campaigns for the U.S. military. Similarly, in August 2013 it was reported that at least a dozen National Security Agency (NSA) employees had used their surveillance system access to spy on their current and former spouses and partners.

Implications

In addition to being morally reprehensible, gang stalking – just like the original version of the FBI’s Cointelpro operations – is illegal. It violates criminal laws in all fifty states against stalking, as well as grossly violating the U.S. Constitution’s prohibitions against warrantless searches and extra-judicial punishment.

While the vast majority of Americans are never personally targeted by gang stalking, they should still be concerned about the existence of such operations. Even if such activities were constitutionally legitimate (clearly they are not), they would still have an enormous potential for abuse as a personal or political weapon by the practitioners.

Ending this cowardly and illegal practice by law enforcement agencies, intelligence agencies, and their parasitic corporate contractors will require exposing what is happening to the public. Anyone reading this can assist with that exposure by simply sharing this information with others.

2. Introduction to the Full Explanation of Gang Stalking

I urge readers to consider the evidence presented here in its totality; the nature of organized stalking – by design – is such that it is difficult to comprehend and evaluate without considering it in its full context.

With the goal of providing some of that context, the first page of this website (“COINTELPRO News”) includes not only the relatively infrequent mainstream press articles specifically about gang stalking, but also news which is only indirectly related. Published news and analysis of subjects such as government secrecy, police corruption, privacy, surveillance, private investigators, and various government scandals are relevant to organized stalking in ways which I try to make clear.

I hope readers are not put-off by my sometimes harsh views on related political topics. I express my opinions here candidly, and the intensity of my rhetoric is partly a function of having been on the sharp end of gang stalking for years.

As for my analysis of organized stalking, I try to be as measured and cautious as possible while still confronting the reality that the subject requires a certain amount of speculation because of the secrecy and deception which surrounds it.

Given the current state of technologies and government policies concerning surveillance, the average American faces many potential and actual invasions of privacy. For individuals targeted for gang stalking, the situation is infinitely worse. Given all of that, this website is only nominally “anonymous.”

Anyone associated with the professional news media who is interested in additional information about my personal experiences with gang stalking can reach me at the email address I have provided.

Thank you for taking an interest in this material.

For victims of gang stalking, I hope that the information I post here will be helpful.
_______________________________________________________

Definitions

dictionary

Counterintelligence is the assessment and countering of threats posed by enemy subversion, espionage, and sabotage. Counterintelligence operations include covert surveillance (spying on the enemy), sabotage (disruption of the enemy’s activities), and disinformation (efforts to deceive the enemy and – when it serves the objectives of the counterintelligence program – the public).

Wikipedia’s entry on counterintelligence describes the organizational nature this way:

“In most countries the counterintelligence mission is spread over multiple organizations, though one usually predominates. There is usually a domestic counterintelligence service, usually part of a larger organization such as the Federal Bureau of Investigation in the United States.”

COINTELPRO (short for “Counterintelligence Program”) was the name of a secret illegal counterintelligence program run by the FBI from 1956 until it was exposed by civilian activists in 1971 and subsequently investigated by Congress.

The U.S. Senate’s Church Committee investigations in the mid-1970s found that under Cointelpro U.S. law enforcement personnel and their various government and private citizen and criminal accomplices systematically spied on, slandered, terrorized, and committed acts of violence (including murder) against American citizens deemed to be dissidents.

Gang stalking (also known as “organized stalking”) is the covert organized surveillance and harassment of a targeted individual by multiple perpetrators. The goal is to systematically isolate and harass the victim using tactics whose cumulative effects amount to psychological torture.

As far as I know, the term “gang stalking” has not yet found its way into any major print publication dictionaries – which is not surprising for a subject residing in the grey area of counterintelligence. The term is however, much less obscure than it was, say a decade ago. For example, you can find it here in the (non-censored) popular online dictionary of slang terms: the Urban Dictionary.

Organized stalking of a targeted individual employs methods used in counterintelligence operations – such as electronic and human surveillance, slander, disinformation, and a variety of intensive long-term psychological operations (“psyops”) methods.

The Stasi – communist East Germany’s infamous secret police agency – monitored and terrorized citizens with the same tactics. They referred to the process of destroying targeted individuals as “zersetzung” which translates as “decomposition” or “corrosion.”

“Gang stalking” is an unfortunate term as it gives the erroneous impression that the activity is connected with street gangs. “Organized stalking” is a superior description; it avoids that confusion and it accurately conveys the systematic nature of the crime.

Other terms used to describe stalking by multiple perpetrators include “group stalking,” “vigilante stalking,” and “cause stalking.” The latter term refers to the fact that the activity is sometimes associated with political causes.

For example, in his book Stopping a Stalker, Robert L. Snow, a retired police captain from the Indianapolis Police Department, devoted a chapter to organized stalking by multiple perpetrators associated with causes – such as stalking of abortion clinic staff members by extreme anti-abortion activists, and stalking of workers who crossed picket lines by union members.

Arguably, the best term for the counterintelligence operations widely referred to as “gang stalking” would be the term “COINTELPRO Stalking” because that is exactly what it is.
_______________________________________________________

The Prevalence of Stalking by Multiple Perpetrators

U.S. Department of Justice (DOJ) crime statistics from a 2006 survey indicated that an estimated 445,220 stalking victims reported being stalked by 3 or more perpetrators. (Page 12 of the report has the relevant numbers: 13.1 percent of 3,398,630 victims reported such group stalking.)

DOJ Stalking Survey – 2006

Incidentally, that percentage is comparable to what appears in crime surveys in the U.K. – a nation with whom U.S. intelligence agencies have very close ties. A 1998 crime survey of England and Wales found that 12 percent of stalking victims reported being stalked by 3 perpetrators (page 25).

British Crime Survey – 1998

Possibly more relevant to organized stalking is the number of victims stalked by “four or more” perpetrators. In the British survey, that group was approximately 8 percent of all stalking victims (page 25). That would be approximately 1 percent (0.944 percent) of all adults aged 16 to 59.
________________________________________________________

A Curiously Incurious Justice Department

An attorney, Keith Labella, contacted the National Center for Victims of Crime (which is funded by the DOJ) in October 2008 to inquire about the frequency of reports the center receives about organized stalking crimes. He was informed that they receive “thousands of calls per month.”

Notwithstanding the frequency of calls to their helpline, the center offered no guidance or referral to other agencies or organizations. Here is Mr. Labella’s affidavit about his inquiry.

Make of it what you will, but the U.S. Department of Justice never publicly discusses the issue of counterintelligence stalking – not even to dismiss it as nonsense.
________________________________________________________

COINTELPRO Version 2.0

In a society as heavily-policed as America now is – a society whose National Security Agency is tracking everyone’s phone calls and Internet activity for example – it is inconceivable that tens of thousands or more cases of criminal stalking (as documented in the DOJ crime statistics) fail to appear on the radar of law enforcement and intelligence agencies.

Yet there is no mention of such crimes by the federal government anywhere except in those statistics.

The implication is inescapable: federal agencies are acquiescing in what is happening. Assuming the statistics are even roughly accurate, there is no other explanation; organized stalking (the monitoring and “disruption” of the activities of targeted individuals) is being perpetrated as part of a counterintelligence program.

And it is being done illegally – as it violates state laws (in every state) against stalking as well as the U.S. Constitution’s prohibitions against unreasonable searches and punishment without a trial. Stalking is also a violation of federal law (U.S. Code Title 18, Section 2261A).

________________________________________________________

Under the Radar

radar

How is it that the general public would not be aware of the re-emergence of Cointelpro operations?

I address this question in more detail in the section titled “The Wall of Silence Which Surrounds Gang Stalking,” but here are the main factors:

(1) Covert Methods

The most fundamental explanation for the low-profile of gang stalking is that counterintelligence operations – by definition – are performed covertly. The FBI’s original version of Cointelpro remained undetected by the public until stolen secret documents were leaked to the press.

(2) Security Clearances

Law enforcement and intelligence agency personnel involved in counterintelligence activities are bound by secrecy oaths. This is also true of the vast industry of private contractors employed by those agencies. For example, job ads posted by security-intelligence contractors for “surveillance role players” (domestic spies) all require an active security clearance in addition to counterintelligence training.

Similarly, judges who sit on the Foreign Intelligence Surveillance Act (FISA) court which reviews legal issues about secret federal policies are also bound by secrecy oaths. That is also true of members of the House and Senate intelligence committees.

(3) Whistleblower Protection Act Exemptions

Agencies such as the FBI are exempt from the Whistleblower Protection Act. Consequently, an agent who tries to reveal unethical behavior by the agency faces potentially serious legal consequences. Contractors of intelligence agencies are also not protected by the Whistleblower Protection Act.

(4) Legal Restrictions on Witnesses

Almost certainly, when an individual is targeted for subversion (“gang stalking”), the operation is portrayed to witnesses (neighbors, co-workers, etc.) as an “investigation.” In an investigation, law enforcement personnel can order witnesses to keep silent. For example, when the FBI issues an administrative subpoena called a “National Security Letter” the document has a gag order attached which prohibits the recipient from discussing it.

(5) Tactics Which Create Minimal Evidence

Subversion tactics used by the FBI include many tactics from the original version of Cointelpro, and some which were futher refined by East Germany’s Stasi. For the most part, the tactics are all chosen because they are known to be effective forms of “no-touch torture.” The idea is to destroy the victim psychologically and socially and financially by forms of criminal harassment which create minimal objective evidence from the perspective of witnesses and courts.

Victims’ accounts tend to be dismissed since their experiences sound like commonplace occurrences – because that is indeed what they are: strangers who are rude, neighbors who are noisy, businesses which deliver bad service, drivers who cut-off the victim in traffic, pedestrians who bump them as they walk by, etc. These are things which happen to everyone. But for gang stalking victims, these things happen constantly – which becomes a form of real psychological torture, the intensity of which must be experienced to comprehend.

(6) Ignorance

Americans are largely unaware of the history of well-documented relevant programs, such as the FBI’s Cointelpro operations and the CIA’s MK Ultra program – even though both were thoroughly investigated and exposed by Congress in the 1970s. Similarly, although many people have heard of the Stasi (East Germany’s secret police agency), they are not specifically familiar with the Stasi’s use of Zersetzung – which was a set of methods virtually identical to current gang stalking in America.

This is not surprising; nearly three-quarters of Americans do not know what the Cold War was about, and 29 percent cannot even name the vice president. Counterintelligence operations can thrive in an environment of such widespread ignorance.

Of course, even well-educated individuals are unlikely to recognize the connections between a local situation in which they are told that a neighbor or co-worker or business patron is under investigation and historical phenomena like Cointelpro and East Germany’s Stasi.

Still, it can only make things easier for an agency such as the FBI to recruit vigilante citizen volunteers and to conduct illegal operations without detection when they are dealing with a society in which 64 percent of the public cannot name the three branches of their federal government and a fourth of the people do not even know that the earth revolves around the sun.

(7) Cowardice, Laziness, & Incompetence in the Mainstream News Media

Organized stalking goes mostly undiscussed in the mainstream news media. There are some notable exceptions – most frequently in the local and alternative press. I review those in detail throughout this website, but as a rule, major corporate news agencies avoid discussing matters which the intelligence and law enforcement community do not wish to have discussed.

This silence in the press is largely the result of the kinds of self-censorship documented in sources such as Kristina Borjesson’s Into the Buzzsaw, and Noam Chomsky’s Manufacturing Consent.

Laziness in the news media should not be underestimated either. Often when the federal government is engaged in serious deception and crimes, the news media play no role in the disclosure until a whistle-blower drops a set of incriminating official documents about it in their laps – as happened with the Pentagon Papers, Cointelpro, and the NSA’s mass surveillance exposed by Edward Snowden in 2013.

It would be difficult to overstate the significance of the news media’s cowardice as a factor in keeping modern Cointelpro operations off of the public’s radar. For perspective, one has to re-consider the reporting on crimes by U.S. intelligence agencies during the 1970s. A book by historian Kathryn S. Olmsted, Challenging the Secret Government (1996), makes the case that Americans overestimate the boldness of the journalism during that period.

The following review of Olmsted’s book gives a sense of what really happened. With a few notable exceptions – such as reporters Seymour Hersh and Daniel Schorr – the news media generally had a loss of nerve at a critical moment in America’s history. As a result, we missed a golden opportunity to fully expose the deep corruption in the U.S. intelligence community, and implement serious reforms.

Conventional wisdom would have it that, in the wake of Vietnam and Watergate, the nation’s press was emboldened to enter a new phase of investigative zeal. Olmsted, a lecturer in history at U.C.- Davis, provides an absorbing contrarian account of the extent to which, with a few singular exceptions, the press retreated from such zeal, in part intimidated by the discovery of their own potential power. Thus, four months after Nixon’s resignation, when New York Times reporter Seymour Hersh launched a series charging that the CIA, “forbidden by law from operating in the U.S.,” had engaged in massive domestic spying, his reports were greeted with skepticism and tentativeness in follow-ups by fellow journalists. (Hersh’s vindication came from CIA Director William Colby’s Senate testimony, in which he disputed only the characterization of wrongdoing as “massive.”)

Olmsted charts how Hersh’s story, along with a cautious but competitive exploration of FBI abuses by the Washington Post, resulted in two congressional investigations that also had the potential to break the code of deference previously accorded to organizations responsible for national security by both Congress and the press. Particularly compelling is the author’s account of how colleagues excoriated reporter Daniel Schorr when he went to the Village Voice with the confidential results of one of the investigations, after having been silenced by his own employers, CBS. This is a fascinating study of how, just months after Watergate, both press and Congress quietly retreated to the same silk-gloved handling of the CIA and FBI in the name of national security.

(8) Disinformation

Search results on the Internet’s largest search engine, Google, fluctuate wildly for particular words and phrases over time. Only people within Google know the exact policies and algorithms which determine those results, but the search results do provide a rough indication of the online presence of certain topics.

Typically, the list of websites generated by a search is the tip of an iceberg. Ten pages of website links will show the top 100 results, but the screen also displays a much larger number that indicates the number of references to the search term that were detected.

A Google query of the term “gang stalking” in October 2013 yielded over six million results.

As you begin to wade through the search results, you will mostly encounter websites filled with incoherent rubbish. Anyone even superficially familiar with counterintelligence will recognize this tactic; it is called disinformation.

This is another reason organized stalking has been able to remain mostly below the public’s radar. Disinformation is used to muddy the waters surrounding the topic wherever it is discussed online. The intent is to mitigate exposure of the operations.

Because of its central importance to counterintelligence generally – and organized stalking in particular – I explore the subject of disinformation at length in its own section of this overview and elsewhere in this website.

(9) Failure to Connect the Dots

If you view all of the mainstream press reports about domestic spying, counterintelligence activities, and gang stalking from the past decade, it is clear that something is going on. On the other hand, very few people see most of those reports – let alone all of them together and combined with the context provided by the analysis you are now reading.

If you browse through the “Published News Reports on Gang Stalking” section of this overview, you will see that the evidence grows every year that a government-sanctioned program of informants and domestic spying and organized stalking is an element of the current homeland security infrastructure. Unfortunately, very few civilians ever see that evidence all grouped together, and therefore they are very unlikely to realize what is happening.
________________________________________________________

Lowering Requirements for Investigations

In 2008 the U.S. Department of Justice guidelines which govern FBI investigations were changed to create a new category of investigation called “assessments.” These investigations can be initiated with no evidence that any criminal activity has occurred, and the investigations can involve such intrusive measures as physical surveillance, recruitment of criminal informants, interviewing associates of the person being investigated and deploying undercover FBI agents.

The FBI’s internal rules were further relaxed in 2011 so that – without even opening an assessment – agents can begin searching commercial databases for information about the individual being investigated, and search through the subject’s trash.

Expansion of the powers wielded by the “surveillance state” – and the corresponding erosion of citizens’ civil liberties – has been occurring in the U.K. as well. Citizens of the U.S. should be mindful of that fact because a close relationship exists between the intelligence communities of both nations. Among the secret documents revealed by NSA whistle-blower Edward Snowden, for example, were presentation slides about how the NSA assisted its British equivalent, GCHQ, in developing technology that was used to spy on citizens via their webcams.

In the same way that the U.S. government slashed some of Americans’ traditional rights by legislation such as the Patriot Act, in the U.K. the Regulation of Investigatory Powers Act 2000 (RIPA) expanded the surveillance powers of the government in the name of national security. As far as I know, the members of Parliament did not hold much public discussion about how the U.K.’s intelligence agencies might want spy on a couple of million innocent citizens via their webcams.
_______________________________________________________

Exploiting a Government Program as a Private Weapon

The potential for abuse of power by members of private intelligence corporations and government agencies in all of this is enormous.

Here is an example of such abuse which was reported in the news media – partly because it was directed at members of the news media. One of the counterintelligence tactics which the federal government hires intelligence contractors to perform is spreading disinformation. Most Americans would probably be surprised to learn that systematically spreading lies is even a government contractor job which their taxes are funding, but they underestimate – despite President Eisenhower’s famous warning – the extent to which the U.S. government’s defense budget has become a pig trough for shady contractors.

If you criticize a comedian, you will likely become the target of a joke. Similarly, when a reporter and editor at USA Today investigated and reported on the U.S. propaganda industry in 2012, they were anonymously slandered by those same contractors.

This was the opening paragraph of their first report that apparently did not go over well with the businesses they were exposing:

“ As the Pentagon has sought to sell wars in Iraq and Afghanistan to often-hostile populations there, it has spent hundreds of millions of dollars on poorly tracked marketing and propaganda campaigns that military leaders like to call “information operations,” the modern equivalent of psychological warfare.”

As a result of their reporting, this is what happened:

“Fake Twitter and Facebook accounts have been created in their names, along with a Wikipedia entry and dozens of message board postings and blog comments. Websites were registered in their names….”

“…Internet domain registries show the website TomVandenBrook.com was created Jan. 7 — just days after Pentagon reporter Tom Vanden Brook first contacted Pentagon contractors involved in the program. Two weeks after his editor Ray Locker’s byline appeared on a story, someone created a similar site, RayLocker.com, through the same company.”

The article notes that a proxy service was used to hide the identity of the owner of the websites, and a third website was registered to a non-existent address.

Slander is just one of the tactics used in organized stalking by counterintelligence operations. Any or all of the tactics – which are described in detail in a section of this overview – could be used as a weapon by people in the business.

In theory, an organized stalking operation against an individual could be initiated by anyone familiar with the tactics who has associates willing to participate. Perpetrators with financial resources could easily employ private investigators, for example, and others with relevant technical skills to wage a sophisticated operation against someone for revenge or intimidation.

Someone with connections to current or former law enforcement or intelligence agency personnel – or military personnel with a background in intelligence – could mount a very serious campaign against a victim without even (officially) involving government agencies in the initial stages of the investigation and harassment.

In a tactic called “baiting” a surveillance operation can selectively capture evidence of a targeted person responding to harassment. That evidence could then be used to justify the initiation of more formal scrutiny by a government agency.

At whatever point at which it becomes useful or necessary, the perpetrators can – officially or unofficially – turn over to the government counterintelligence personnel whatever they have gathered to have the individual targeted more formally. For example, they could contact a “Terrorism Liaison Officer” (TLO) – a government or civilian operative entrusted with hunting for “suspicious activity.” More on TLOs in section 10 below (“The Organizational Structure of Gang Stalking”).

In essence, organized stalking tactics (and a national counterintelligence program which uses such tacics) could easily be exploited – and probably are – as a weapon against individuals who are disliked for any reason by someone who is either a member of the community of intelligence/security firms, law enforcement agencies, and intelligence agencies. Similarly, being a member of the FBI-corporate alliance called InfraGard (discussed in detail below) could create a perfect opportunity to have someone blacklisted.

Being associated with the national counterintelligence program of organized stalking (“Cointelpro 2.0”) is like having a cousin who is in the Mafia.
________________________________________________________

Allegations of Stalking by Private Organizations

KKK Georgia May 1946

Deception is a major element of counterintelligence programs. Consequently, all discussion of Cointelpro-type stalking has to be viewed skeptically. Allegations that the ongoing criminal harassment of targeted individuals is simply an activity by one or more vigilante groups is a case in point.

It is inconceivable – especially with the modern surveillance state – that the Justice Department and the other federal intelligence agencies are unaware of exactly what is happening. Their silence about the issue means that they acquiesce in it, whatever the specific operational structure might be.

That said, it is also clear that there is a “snitch culture” element to organized stalking – not just a bureaucratic machine. Perpetrators of gang stalking crimes rely upon a degree of informal support from sadists and useful idiots. Also, there is a long history of non-governmental organizations perpetrating very serious crimes against their fellow citizens. In addition, such organizations – for example, the Ku Klux Klan – have historically included members of the political and law enforcement community. So the involvement of private groups in organized stalking cannot be categorically dismissed, even though the core of the activity has to be state-sanctioned.

Gang stalking tactics are sometimes alleged to be used by certain fraternal orders such as Freemasons, and by various religious groups such as Scientologists and Jehovah’s Witnesses – for example, to control or punish current or former members. See for example, this March 15, 2013 article in the Brisbane Times.

I have no first-hand knowledge of the use of organized stalking by religious groups, but it does seem plausible – especially if you agree with America’s second president, John Adams:

“There is a germ of religion in human nature so strong that whenever an order of men can persuade the people by flattery or terror that they have salvation at their disposal, there can be no end to fraud, violence, or usurpation.”

In the case of Scientologists, there is reportedly a policy called “Fair Game,” under which the church allegedly uses aggressive tactics toward individuals and groups it perceives as its enemies. The practices – as described in this 1990 Los Angeles Times article, apparently include some tactics associated with organized stalking: “psychological warfare,” “dirty tricks,” and “harassment.” Reportedly, the Fair Game policy also sometimes involves employing detectives, former police officers, and criminals:

“Teams of private detectives have been dispatched to the far corners of the world to spy on critics and rummage through their personal lives–and trash cans–for information to discredit them.

During one investigation, headed by a former Los Angeles police sergeant, the church paid tens of thousands of dollars to reputed organized crime figures and con men for information linking a leading church opponent to a crime that it turned out he did not commit.”

Instances of “cause stalking” and stalking by religious cults presumably account for only a very small portion of the numerous incidents in the aforementioned crime survey statistics. It is true however, that members of religious cults (and cult-like fraternal organizations) are – by definition – easily manipulated, so they could serve in some cases as “useful idiot” vigilantes for others whose motivations they don’t even comprehend.

That is perhaps true for most of the general public since most people are completely unaware of the existence of any domestic counterintelligence operations – past or present – and would be unlikely to suspect that what they are being told might be disinformation and manipulation as part of a modern American version of the Stasi.

One group which is sometimes mentioned as a source of organized stalking perpetrators – probably as disinformation in most cases – is the ancient fraternal order of Freemasons. Mentioning the organization often brings to mind tin-foil hat conspiracy theories. It should be noted, however, that mainstream news reports also include allegations about the group. Specifically, there are claims that the Freemasons’ network
is exploited to abuse the power of its members.

This June 2013 article in The Independent revealed that a leaked secret report from British law enforcement authorities found that many law firms, wealthy individuals, and large corporations hire private investigators to conduct illegal spying for them. The article mentioned one of the ways sensitive information was obtained:

[The report] found private investigators to be experts at “developing
and cultivating useful relationships” through “socialising with law enforcement personnel.” One particular method identified was to become a member of the Freemasons, which has been repeatedly
linked to corruption in the police and judiciary.
_______________________________________________________

Rise of the Police State

Photog – Brendan Scherer

More than 5.1 million Americans had security clearances in 2013 according to a report by the Office of Management and Budget (OMB). 3.6 million of the clearances were confidential or secret, and 1.5 million clearances were top secret. Almost one-third of those top secret clearances belong to contractors rather than government employees.

Although the budget for U.S. intelligence activities is mostly kept secret, it is clear that the monitoring of American citizens is taken seriously by their government. This is especially clear after revelations in 2013 about the scope of domestic surveillance by the National Security Agency (NSA).

Equally clear is that the U.S. justice system aggressively polices and prosecutes its citizens: the U.S. has one of the very highest per capita incarceration rates in the world.

A common – and accurate – critique of the modern U.S. government is that it has become unbalanced by the massive expansion of power and secrecy in the executive branch.

A related problem is that the now-vast network of federal agencies (whose officials of course are non-elected) operate with minimal accountability. In many cases they effectively create their own laws.

This is true to some extent in all agencies since they issue and enforce regulations, but the potential to be corrupted by power is infinitely greater in law enforcement and intelligence agencies such as the FBI, the CIA, and the NSA – which operate mostly in secrecy.
________________________________________________________

The Threat to American Democracy Posed by the Spying Industry

“In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex.”

– President Dwight D. Eisenhower

Even Eisenhower was corrupted by the kind of power he warned against. As President, he authorized CIA-backed coups in Iran and Guatemala. In Iran, a democratically-elected prime minister was overthrown by the CIA (and its British counterpart MI6), and replaced by a monarchy. The CIA also trained the repressive police force used to maintain the dictatorship. Similarly, in Guatemala, the CIA overthrew a democratically-elected president and installed a military dictatorship. In both cases, the motives were corporate greed and the desire for U.S. government hegemony.

In addition to the extreme violations of the Constitutional and state rights of the particular individuals targeted for organized stalking, the current counterintelligence program poses a threat to democracy itself, since it can be used against anyone who dares to question the legitimacy of the government’s authority.

The FBI’s original COINTELPRO operations were illegal and disturbing abuses of power; the modern version is similarly corrupt, and it is supported by the now-vast network of powerful secretive agencies and contractors armed with much more powerful technology.
________________________________________________________

Spying on Americans: a lucrative business for security contractors

pig trough

The huge (and largely secret) federal budget for intelligence activities and homeland security supports a large industry of private contractors who provide technology and services for surveillance, investigations, security, and varous intelligence functions. About 70 percent of America’s budget for intelligence activities goes to private contractors, according to a 2012 report from the Director of National Intelligence.

The collusion between corporations and the federal government in the area of domestic surveillance is inherently dangerous. This July 2013 article in the Atlantic posed the issue this way:

“Government and corporations are both capable of terrible things. To have them colluding with one another in secret, inexorably arranging things so that there’s disincentive for disagreement among them, is terrifying. The people can fight Big Government. The people can fight Big Finance. The people can fight Big Tech. Could the people fight them if they’re all working together with secret law on their side?

Booz Allen Hamilton is paid handsomely to spy on us for the government, then pours campaign contributions back into that same government, protecting their powerful financial incentive
to have the surveillance state expand, something that is already
a bipartisan cause.”

Political support for a Stasi Big Brother police state in the U.S. is partly rooted in hawkish views about law enforcement and anti-terrorism strategy, but it is mostly rooted in greed. There will always be a long line of contractors seeking to cash-in. They all want to be IG Farben (sort of the gold standard of war pigs).

When Congress voted in July 2013 on whether to rein-in the NSA’s domestic surveillance program which tracks Americans’ phone calls and emails, House members who voted to continue the surveillance received twice as much campaign finance money from the military and intelligence industry as those who voted to dismantle the program.

Americans are not normally permitted to know how much of their money the federal government spends on spying. NSA whistle-blower Edward Snowden changed that.

Among the secret documents he revealed was the 178-page “black budget” for the 2013 fiscal year. That year’s slush-fund contained $52.6 billion. You can buy a lot of traitorous Stasi rodents with that kind of money.

Also be aware that a lot more money is sloshing around in the federal pig trough which might be getting funneled into spying activities. Many U.S. intelligence operations are conducted under the authority of the Pentagon – for example, those of the Defense Intelligence Agency (DIA). Pentagon spending is notoriously difficult to keep track of. Even the U.S. Government Accounting Office says that U.S. Department of Defense spending is “unauditable.”

Defenders of Constitutional liberties are up against a powerful and well-financed industry of parasites. This May 2013 article in The New Yorker describes a “bureaucratic empire” of entities built around the homeland security industry:

“When the Washington Post surveyed that empire, in 2010, it counted more than three thousand government organizations and associated private companies working on counterterrorism, homeland security, and intelligence, in ten thousand locations across the United States.”

Frontline produced a fascinating documentary in April 2013 about the secretive agencies and corporations which make up the modern military and law enforcement industrial complex. The program is called “Top Secret America – 9/11 to the Boston Bombings.”

The whole thing is interesting, but if nothing else, watch the set-up (minutes 3 to 6) and the five minutes or so in the middle (minutes 27 to 32) about journalists uncovering the massive shadowy industry of private intelligence firms.

The Washington Post articles upon which the documentary was based were the product of one of the most thorough investigations of the American police state. More than a dozen journalists spent two years investigating the vast network of agencies and corporations performing secret homeland security operations. This was their conclusion:

“The top-secret world the government created in response to the terrorist attacks of Sept. 11, 2001, has become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work.”

Tom Engelhardt, who teaches at the Graduate School of Journalism at the University of California, Berkeley, described the expansion of the national security complex this way:

“It has essentially merged with a set of crony outfits that now
do a significant part of its work. It has hired private contractors by the tens of thousands, creating corporate spies, corporate analysts, corporate mercenaries, corporate builders, and corporate providers for a structure that is increasingly becoming the profit-center of a state within a state.”
________________________________________________________

Barrett Brown on the Role of Private Intelligence/Security Contractors

As I am updating this (in March 2014), journalist Barrett Brown is in jail facing charges related to his role in exposing information leaked by hackers who obtained internal emails from private intelligence firms, such as Stratfor and HB Gary.

Activities revealed in those leaked emails included things such as plotting to discredit journalist Glenn Greenwald and critics of the Chamber of Commerce by spreading lies about them.

In other words, at least some of these numerous secret firms engage in the kind of actions which the CIA might perform against foreign enemies – but they do so on behalf of corporate interests.

Here is an excellent article by Barrett Brown on this topic published in the Guardian in July 2013.
________________________________________________________

Job Ads for Gang Stalkers?

On August 21, 2013 Drudge Report linked to a brief article posted the day before on InfoWars about a job announcement posted in San Diego. The job – advertised on Craigslist – was for a part-time position with an intelligence/security contractor firm as a “Surveillance Role Player.”

As I explain in detail in the “Organizational Structure” section of this overview, these job listings are numerous. They are mainly found on the websites of defense contractors. You can locate them easily by performing an online search for “surveillance role player job.”

Clearly these jobs are for some type of domestic spying (there are no foreign language requirements, for example). All of the job listings specify that applicants must have active secret clearances and counterintelligence training.

I have so far been unable to locate any mainstream news reports that might shed light on this issue, but multiple indications suggest that these could be jobs for gang stalkers. I re-visit this critical issue in section 11 of this overview (“The Organizational Structure of Gang Stalking”).

Here is an example of one such job listing:
_______________________________________________________

Law Enforcement & Intelligence Agencies’ Support of a Corporate Agenda

Collusion between corporations and the federal law enforcement/intelligence community is not limited to companies in the spying industry. This subject was explored in depth in a May 2013 report from the Center for Media and Democracy, called Dissent or Terror: How the Nation’s Counter-Terrorism Apparatus, in Partnership with Corporate America, Turned on Occupy Wall Street.

That report describes two organizations which facilitate that partnership:

“There are two primary domestic public-private intelligence sharing partnerships at work at the federal level: InfraGard and the Domestic Security Alliance Council (DSAC).

InfraGard is a public-private intelligence sharing partnership managed by the FBI Cyber Division Public/Private Alliance Unit (PPAU). As described by the FBI, Infragard is an “association of businesses, academic institutions, state and local law enforcement agencies and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States.” There are 86 Infragard chapters nationwide. These Infragard chapters serve as representatives of private sector “stakeholders” in many of the nation’s fusion centers.

DSAC is a public-private intelligence sharing partnership between the FBI, U.S. DHS I&A and several of the nation’s leading corporate/financial interests. Some of these corporate/financial interests comprise the DSAC Leadership Board. The DSAC Leadership Board consists of 29 corporations and banks, including several entities that have been the subject of OWS protests/criticism. Corporate/financial interests active in the DSAC Leadership Board include: Bank of America, MasterCard, Citigroup, American Express, Barclays, RBS Citizens, 3M, Archer Daniels Midland, ConocoPhillips, Time Warner and Wal-Mart. Along with DSAC chairmen from the FBI and U.S. DHS I&A, DSAC is co-chaired by a representative of these private sector interests– currently Grant Ashley, vice president of global security for pharmaceutical giant Merck & Co.

Artist’s rendering of an InfraGard member

The March 2008 issue of The Progressive featured an article about this creepy corporate spy club. It seems that InfraGard’s communications with the FBI and the Department of Homeland Security can be kept hidden from the public, as they are covered by the “trade secrets” exemption of the Freedom of Information Act.

Apparently mindful that the public will be naturally suspicious of the organization’s legitimacy, InfraGard’s website explains that members must carefully manage the image presented to the public:

“The interests of InfraGard must be protected whenever presented to non-InfraGard members,” the website states. “During interviews with members of the press, controlling the image of InfraGard being presented can be difficult. Proper preparation for the interview will minimize the risk of embarrassment. . . . The InfraGard leadership and the local FBI representative should review the submitted questions, agree on the predilection of the answers, and identify the appropriate interviewee. . . . Tailor answers to the expected audience. . . . Questions concerning sensitive information should be avoided.”

For those wishing to join this elite secretive alliance between the FBI and the corporate sector – to learn their secret handshake and to gain the power of being able to name an employee as a suspicious person to be targeted by federal goons, you “must be sponsored by an existing InfraGard member, chapter, or partner organization.”

Those who are deemed worthy of membership in the InfraGard partnership are given ID cards and enjoy privileged access to information and direct communication with the FBI.

In a 2009 TV program, Jesse Ventura, the former governor of Minnesota, interviewed Matthew Rothschild, senior editor of the Progressive about InfraGard. Ventura also confronted a member of InfraGard regarding the partnership’s obvious potential for abuse of power. The relevant section begins 25 minutes into this video clip.

Note: if the video becomes unavailable at the above link, and you want to search for it, this is the information: Conspiracy Theory with Jesse Ventura, Episode #4, “Big Brother” – originally broadcast on December 23, 2009.

The existence of programs like InfraGard, along with the FBI’s infiltration of groups like Occupy Wall Street, and the plotting by intelligence firms to wage a disinformation-slander campaign against critics of the Chamber of Commerce (also discussed in this overview), all suggest that activist and hacker Jeremy Hammond is correct in his assessment of the current U.S. law enforcement industry personnel – namely, that they are “the boot boys of the 1 percent, paid to protect the rich and powerful.”
________________________________________________________

Power in the United States: the “Deep State” analysis

Deep State

To understand organized stalking, it is necessary to understand the power structure which sanctions it. Gang stalking is a weapon for people with connections to the government’s intelligence and law enforcement agencies, and their contractors. The fact that counterintelligence subversion could theoretically be used against someone who poses an actual threat to society presumably makes it easy to rationalize the existence of such a program – for example, within the Justice Department. Since such operations are covert, they are subject to no real oversight. Outsourcing most of the work to the now-vast industry of private contractor firms (who in turn, can delegate the operations), creates plausible deniability for those at the top of the food chain.

Mike Lofgren on the deep state

So who are the people with such connections? In the TV interview and essay linked below, Mike Lofgren, a former congressional staff member, offers a sort of unified theory of the current U.S. power structure which attempts to explain the connections between Washington, Wall Street, the Pentagon, Silicon Valley, the intelligence community and law enforcement. This big picture view is helpful to understand U.S. national security and law enforcement policy – of which domestic counterintelligence operations are an element.

Other observers – for example, Peter Dale Scott – have written about the distinction between the formal elected government and the informal “shadow government” or “deep state” which shapes policies, so Lofgren’s views on this subject are not entirely unique, but he does an excellent job of explaining the concept. He also speaks with Washington insider experience, having spent nearly three decades as a congressional staffer, including serving on the powerful House and Senate Budget Committees.

Lofgren refers to “the deep state” as a hybrid of corporate America and the national security state.

“There is another government concealed behind the one that is visible at either end of Pennsylvania Avenue, a hybrid entity of public and private institutions ruling the country according to consistent patterns in season and out, connected to, but only intermittently controlled by, the visible state whose leaders we choose. My analysis of this phenomenon is not an exposé of a secret, conspiratorial cabal; the state within a state is hiding mostly in plain sight.”

Mike Lofgren appeared on Moyers and Company in February 2014 to discuss his views on the deep state. Here is the video.

This webpage features an essay by Lofgren on the same topic.

Here is a webpage of reactions to Lofgren’s portrayal of the deep rot in Washington. They include comments such as this one by Heidi Boghosian, director of the National Lawyers Guild.

“The term Deep State aptly conveys how the private security industry has melded with government. It is soldered by plutocracy, perpetual war, reduction of industrial capacity, US exceptionalism and political malfunction. Lofgren is a credible
and welcome interpreter of how these factors combine to exert control over us.”

For more on the issue of who really calls the shots in the U.S. government, you might want to also consider the very credible observations expressed by NSA whistle-blower Russ Tice in this article and interview from September 2013.

For a quick look at some of the elite members of the U.S. oligarchy, you might want to visit the website LittleSis. Many of the individuals and organizations who make up America’s “shadow government” are listed there – along with explanations of their connections and political influence. The name “Little Sis” is a play on the Orwellian term “Big Brother.”

Noam Chomsky on the deep state

Noam Chomsky, a professor of linguistics and philosophy at MIT, is deservedly one of the most influential analysts of the nature of political power in America. His books, articles, speeches, and debates on the subject are so numerous that it can be difficult to know where to begin for someone who wants to become familiar with his views.

A speech Chomsky gave in Bonn, Germany on June 17, 2013 is a good place to start. In that speech, he explained that the standard view of capitalist democracy taught to American schoolchildren is essentially fictional.

“….Roughly 70% of the population – the lower 70% on the wealth/income scale – they have no influence on policy whatsoever. They’re effectively disenfranchised. As you move up the wealth/income ladder, you get a little bit more influence on policy. When you get to the top, which is maybe a tenth of one percent, people essentially get what they want, i.e. they determine the policy. So the proper term for that is not democracy; it’s plutocracy.”

Chomsky notes that this arrangement is not unique to America:

“Europe, incidentally, is much worse….[The general public has voted against the European Union’s economic model,] yet economic policies have changed little in response to one electoral defeat after another.”

According to Chomsky, America is essentially a one-party state, and the one party is the business party. He argues that this general power structure has been the same since the nation’s founding.

Chomsky’s conclusion:

“The general picture is pretty grim, I think. But there are shafts of light. As always through history, there are two trajectories. One leads towards oppression and destruction. The other leads towards freedom and justice. And as always – to adapt Martin Luther King’s famous phrase – there are ways to bend the arc of the moral universe towards justice and freedom…”

Michael J. Glennon on the deep state

In October 2014, The Boston Globe published an article on the views of Tufts University political scientist Michael J. Glennon regarding the deep state. If you think that things like voting and writing letters to your political representatives might help slow America’s mutation into a police state, you might want to re-evaluate how far things have already deteriorated.

Though it’s a bedrock American principle that citizens can steer their own government by electing new officials, Glennon suggests that in practice, much of our government no longer works that way. In a new book, “National Security and Double Government,” he catalogs the ways that the defense and national security apparatus is effectively self-governing, with virtually no accountability, transparency, or checks and balances of any kind. He uses the term “double government”: There’s the one we elect, and then there’s the one behind it, steering huge swaths of policy almost unchecked.

Asked whether there was any hope of reining in the rogue elements of America’s national security apparatus, Glennon said this:

“The ultimate problem is the pervasive political ignorance on the part of the American people. And indifference to the threat that is emerging from these concealed institutions. That is where the energy for reform has to come from: the American people. Not from government. Government is very much the problem here. The people have to take the bull by the horns.”

George Carlin on the deep state

This 3-minute rant by comedian George Carlin captures some of the core points about the deep state.

________________________________________________________

A Gang Stalking Organization Chart

Victims of organized stalking can only speculate about the exact nature of the shadowy network of perpetrators arrayed against them.

That speculation is made more difficult by the fact that the people who are overtly and covertly watching them and perpetrating various acts of harassment are of different classes of perpetrators with different motivations and have different connections (and often no connection) to the victim.

For example, the street-level perpetrator (“perp” as cops say) is typically someone who appears to be a rough-looking homeless or near-homeless ex-con type.

Their interactions with the target require no technical skills; the perp is just following some simple instruction – for example, to bump into the victim, or to make some specific creepy comment, or to harass the victim at his or her residence by making various noises.

Such participants in the stalking of course would not be told anything about who they are ultimately working for; in some cases perhaps they are simply paid a small sum of cash by a person who approached them on the street to perform a single act of harassment. In other cases, they might be ex-con’s who have been recruited/coerced/paid to function – technically – as “criminal informants.”

At a slightly higher level in the stalker food-chain (among those who interact with the victims) are people who appear more clean-cut and are often carrying a cell phone – presumably to communicate with their handlers.

Some of the intermediate-level participants are apparently recruited because of their relevant technical skills or because their jobs afford them access to facilities and information relevant to the operation – such as phone technicians, security guards, and landlords.

At the level above them are the people who actually orchestrate the operation. Based on my own observations, analysis, speculation, and various material I’ve read (which is included or linked in this website), these people are presumably employed by various intelligence contractors who are ultimately overseen by federal law enforcement and/or intelligence agency personnel.

The active support – or at least approval – of federal law enforcement and intelligence agencies would be necessary for such activities to occur without attracting interference from the massive homeland security infrastructure now in place.

The agencies, corporations, & individuals involved in organized stalking

Historically, counterintelligence crimes against Americans in the U.S. have been perpetrated by three main entities: (1) “red squads” (Law Enforcement Intelligence Units of local police departments), (2) Private Intelligence-security firms such as Pinkerton (now Securitas), and (3) the FBI.

Today, you can probably add the Department of Homeland Security (DHS) to the list. The most authoritative journalism on the subject – such as that of George O’Toole in the late 1970s – also shows connections between LEIUs and the CIA. Technically of course, the CIA is not supposed to be preying on Americans, but anyone who has read about MK Ultra knows that is a purely theoretical boundary.

Similarly, anyone who has not been living in a cave since June 2013 knows that the NSA is deeply involved in unconstitutional domestic spying. And all those agencies – plus others – have access to the nationwide system of data “Fusion Centers,” so there is no way that everyone from local cops (especially those in LEIUs) to the U.S. Attorney General is not in the know about organized stalking.

Other players in the overall process include Terrorism Liaison Officers (TLOs) who help choose some of the targets, corporate partners such as members of InfraGard and DSAC, and Threat Assessment Teams in various civilian organizations.

Lastly, the perps include a type of person famously used by East Germany’s Stasi – the civilian snitch. Stasi agents referred to such a person as an Inoffizielle Mitarbeiter – unofficial collaborator. Although the street-level thugs used in gang stalking harassment are sometimes apparently recruited from the ranks of criminal informants, many are just un-paid civilian minions who will do almost anything to please someone in a position of authority – for example, under the guise of assisting a “neighborhood watch” program or an “investigation.”

Who sanctions all of this? In the case of the FBI’s Cointelpro crimes under J. Edgar Hoover, some of the operations were approved by the Department of Justice (DOJ). Presumably, the DOJ signs-off on everything today also (or at least knowingly acquiesces in it). The same might be true of the U.S. judiciary’s “Star Chamber” – the secret FISA Court.
________________________________________________________

Precedence for Organized Stalking of Dissidents

The conspiratorial criminality involved in organized stalking might seem far-fetched if not for the fact that the U.S. government has been caught doing such things before. Context provided by an awareness of documented crimes – past and present – by government agencies is critical for evaluating the plausibility of claims about ongoing counterintelligence operations in the U.S.

3. Crimes by U.S. Law Enforcement and Intelligence Agencies

“When the president does it, that means it is not illegal.”
– Richard Nixon in a 1977 interview with David Frost
________________________

Attitudes of Government Officials About the Law

Although scandals such as Watergate and Iran-Contra occasionally break into the public’s consciousness, most Americans are unaware of the criminality which routinely occurs at the upper levels of government.

The same government officials who oversee America’s domestic surveillance and law enforcement programs often have a very casual attitude about their own obligation to obey the law.

In a Senate hearing in March 2013 the Director of National Intelligence, James Clapper, was asked “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?” Clapper said they did not.

NSA whistle-blower Edward Snowden’s subsequent revelations proved that Clapper was lying to Congress – which Clapper himself was forced to acknowledge. A typical American citizen would be prosecuted for perjury if he or she lied to Congress; Clapper obviously has no such concerns.

As a practical matter, intelligence agencies and federal law enforcement agencies exist in a mostly secret and politically-protected realm outside of the laws that bind the rest of us. They know they won’t be punished for their crimes.

The political establishment is similarly unconcerned. Since the intelligence and law enforcement community enjoys virtually unconditional support from both major parties, neither party has to worry about negative political consequences for its role in creating domestic surveillance programs which violate the Fourth Amendment.

In April 2013 WikiLeaks published a searchable database of more than 1.7 million U.S. diplomatic and intelligence documents from the mid-1970s which had been declassified. The documents included a revealing transcript of a discussion involving then-Secretary of State Henry Kissinger.

When a Turkish official suggested that the U.S. arrange to supply military hardware to Turkey – in violation of a U.S. Congressional arms embargo – Kissinger joked about the illegality:

Before the Freedom of Information Act, I used to say at meetings, “The illegal we do immediately; the unconstitutional takes a little longer.” [laughter] But since the Freedom of Information Act, I’m afraid to say things like that.

We’ll make a major effort.

For the average American, violating federal laws would be a serious matter; for government officials like Kissinger it is literally a joke.

In an August 2013 National Review article, conservative columnist John Fund quoted an intelligence official who alluded to the pervasiveness of such arrogance and deception:

A veteran intelligence official with decades of experience at various agencies identified to me what he sees as the real problem with the current NSA: “It’s increasingly become a culture of arrogance. They tell Congress what they want to tell them. Mike Rogers and Dianne Feinstein at the Intelligence Committees don’t know what they don’t know about the programs.” He himself was asked to skew the data an intelligence agency submitted to Congress, in an effort to get a bigger piece of the intelligence budget. He refused and was promptly replaced in his job, presumably by someone who would do as told.

Such behavior at the federal level sets the tone for law enforcement agencies lower down the food chain. I address this issue also in the section of this overview about the U.S. Department of Justice (DOJ).

________________________________________________________

The Erosion of Trust in the U.S. Government

Obama

“Turns out I’m really good at killing people.”

Comment by President Obama – from Double Down
– a behind-the-scenes account of the 2012 presidential race by journalists Mark Halperin and John Heilmann

An April 2014 Rasmussen poll found that more than twice as many American voters regard the federal government as a threat to their rights than those who view the federal government as a protector of their rights.

The poll found that 54 percent of voters considered the federal government to be a threat to individual liberties. Only 22 percent viewed the government as a source of protection of individual liberties. The remaining 24 percent were undecided.

Two of the major reasons trust in U.S. government officials has eroded are: (1) the massive expansion of power and secrecy of the federal government – especially the executive branch – has predictably led to abuses of authority, and (2) access to information via the Internet has made it harder to keep such abuses secret.

That’s the good news for targets of organized stalking. The bad news is that – as a practical matter – many people still naïvely assume that anyone who seems to be associated with law enforcement should be absolutely trusted – as seen in this ABC TV show segment.

Organized stalkers (and other criminals) can easily exploit that fact to recruit accomplices by persuading them that they are assisting an investigation or a neighborhood watch surveillance program. This common tendency of blind obedience toward authority figures is such an important element of organized stalking that I address it in detail in its own section of this overview.

Evidence of this sheep-like deference to law enforcement authority figures was on display in January 2014 a jury in the southern California city of Fullerton decided that it was OK with them that their local police department beat to death an unarmed mentally-ill homeless man who posed no risk to anyone. They were not persuaded by the mere fact that the murder had been captured on surveillance camera video.
________________________________________________________

The Prevalence of Government Corruption in the U.S.

A 2013 Gallup poll found that 79 percent of U.S. residents believed that corruption was widespread throughout the government in America.

Govt Corruption Poll

Admittedly, this is a measurement of the perception of corruption, rather than corruption itself, but corruption is inherently difficult to measure, and public perception is an important indicator.

Now imagine the depth of corruption in those corners of America’s government which operate mostly in secret with minimal oversight, such as the intelligence and law enforcement industry.

________________________________________________________

The Frequency of Crimes Perpetrated by U.S. Government Agencies

You don’t have to visit an obscure blog these days to find complaints that America is becoming something of a police state. But America’s government doesn’t just engage in secret invasive surveillance and aggressive policing – it also engages in crimes.

That’s not my opinion – that’s what the federal government itself says. For example, the CIA constantly commits crimes according to the House Permanent Select Committee on Intelligence, IC 21 (April 9, 1996) – as explained in chapter 6 of Into the Buzzsaw.

The Congressional report cited therein by John Kelly (whose book Tainting Evidence: Inside the Scandals at the FBI Crime Lab was nominated for a Pulitzer Prize) states that “several hundred times every day” officers of the Clandestine Service (CS) of the CIA “engage in highly illegal activities.”

Part of the blame for the American public’s ignorance of crimes by federal agencies lies with the mainstream media, which routinely avoids or downplays news that would upset the political establishment. On the other hand, even when good reporting does occur, it often fails to penetrate the public’s consciousness.

On the November 21, 1993 episode of the CBS news show 60 Minutes, a former head of the U.S. Drug Enforcement Agency (DEA) stated that the CIA had colluded with the Venezuelan National Guard to smuggle a ton of pure cocaine into the U.S. That revelation – and other reports of CIA involvement in the illicit drug trade – seems to have minimal impact on the assumption that Americans should trust the nation’s intelligence community.

By the way, if you want to see that moment of the 60 Minutes episode, it is included in this documentary by WhoWhatWhy on counterintelligence. That segment begins at minute 29.

In an August 2013 article, Reuters revealed that – as a matter of official policy – a secretive unit within the U.S. Drug Enforcement Administration (DEA) instructs law enforcement officers in various agencies to lie about the origins of their investigations.

Some cops don’t need to be told to lie. The subject of crimes by police officers is generally under-reported in the mainstream corporate news media – especially on national TV news, but to evaluate the plausibility of widespread acquiescence in gang stalking by local police officers it is helpful to consider criminality by police generally.

This review of crimes by Chicago police officers published by the University of Illinois at Chicago, Department of Political Science is illuminating. Browse through the list of convictions of police officers on pages 24 to 47 of this report. The list is in alphabetical order by the officers’ names, and covers the past half-century. Keep in mind: these were just the crimes that were discovered and prosecuted.

The crimes range from bribery and extortion to torture and murder. Gang stalking would be like jay-walking for the cops on this list.

________________________________________________________

Crimes Perpetrated Under Authority of the FBI

Law enforcement agencies in America make extensive use of criminal informants in their investigations, and in many cases authorize criminals to commit crimes when an agency believes it furthers its goals, as reported for example in this August 2013 article in USA Today.

“The FBI gave its informants permission to break the law at
least 5,658 times in a single year, according to newly-disclosed documents that show just how often the nation’s top law enforcement agency enlists criminals to help it battle crime.”

The FBI report from 2011 which USA Today obtained via the Freedom of Information Act does not reveal the nature of the crimes:

“The report does not spell out what types of crimes its agents authorized, or how serious they were. It also did not include any information about crimes the bureau’s sources were known to have committed without the government’s permission.”

A document released in December 2013 showed that informant crimes authorized by the FBI increased another 5 percent in 2012 to 5,939 crimes.

Sometimes the FBI uses cops to perpetrate crimes too. During the original Cointelpro era, for example, they arranged for police to assassinate two young members of the Black Power movement. On December 4, 1969 in Chicago 14 police officers raided an apartment and killed two members of the Black Panther Party – Fred Hampton and Mark Clark – while they were sleeping.

Noam Chomsky in an interview on Democracy Now! in February 2011 noted that the assassination barely showed up on the radar of the American public:

“…one of the events was a straight Gestapo-style assassination of two black organizers, Fred Hampton and Mark Clark, literally. I mean, the FBI set up the assassination. The Chicago police actually carried it out, broke into the apartment at 4:00 in the morning and murdered them. Fake information that came from the FBI about arms stores and so on. There was almost nothing about it. In fact, the information about this, remarkably, was released at about the same time as Watergate. I mean, as compared with this, Watergate was a tea party. There was nothing, you know?”
________________________________________________________

Illegal Spying by the FBI

Of course, the most well-known and well-documented crimes by the FBI occurred during the COINTELPRO era, and I devote an entire section to that later in this overview. I will just point out here that despite the extreme secrecy in which the agency operates, evidence continues to emerge of ongoing criminality. No doubt these reports represent the tip of an iceberg.

A report released in January 2011 by the non-profit watchdog group Electronic Frontier Foundation (EFF) revealed documents obtained under the Freedom of Information Act (FOIA), which suggested widespread civil rights violations in FBI investigations.

“[The documents show] serious misconduct by FBI agents including lying in declarations to courts, using improper evidence to obtain grand jury subpoenas, and accessing password-protected files without a warrant.”

________________________________________________________

FBI Whistle-Blowers

Most Americans are unaware that the FBI is exempt from the Whistleblower Protection Act. If anything, the agency deserves extra scrutiny because of its history of domestic spying done for political reasons.

An October 2013 article in Reason described the FBI as a “dangerous” domestic spy agency. The author, J.D. Tucille, explains not only how the FBI is able to mostly keep its agents from revealing the agency’s crimes, but also why the abuses tend not to be investigated very aggressively by the press:

“Never hesitant about flexing its muscles to target dissenters and whistleblowers, the FBI….is more dangerous than ever.”

“Exempted from the Whistleblower Protection Act, the FBI freely retaliates against employees who attempt to call out wrongdoing. As a result, it’s rare for FBI employees to speak out. That culture lends itself to a willingness to target whistleblowers in other agencies—and journalists.”

Tucille quoted from the September 2013 report by the ACLU – Unleashed and Unaccountable: the FBI’s Unchecked Abuse of Authority. That report noted examples of the FBI spying on journalists, such as this:

“In 2010 the Inspector General reported the FBI used an illegal ‘exigent letter’ to obtain the telephone records of 7 New York Times and Washington Post reporters.”

A more high-profile case of spying on journalists was reported in May 2013, when it was revealed that the Justice Department secretly obtained two months of telephone records of reporters and editors of the Associated Press.

Famous Watergate reporter Carl Bernstein said on May 14, 2013 on MSNBC that he believed that the intention of the AP records seizure was “to intimidate people who talk to reporters.”

Mike German

Mike German was a decorated FBI agent who specialized in counter-terrorism. He left the agency after 16 years, when he became a whistle-blower. He had discovered that fellow officers were violating wiretapping regulations. When he reported that to his supervisors, his accusations were ignored, and his career was effectively frozen. Apparently, his experience was not unique in an agency which values secrecy more than ethics.

After leaving the FBI, German served as a senior policy counsel at the ACLU. He is now with the Brennan Center for Justice.

Mike German is one of the guests on this Democracy Now! interview together with an individual who was targeted by the FBI for being a political dissident. The individual was subjected to intense investigation for years – despite having no criminal record, apart from trespassing incidents related to political protests.

At 2:06 in the video of this interview journalist Amy Goodman asks Mike German to explain the FBI’s legal authority to perform the “assessments” which, as I mentioned in the introduction above, are essentially investigations that can now be launched against an individual without any evidence that the individual has committed a crime.

This April 2014 interview with Mike German is also worth watching. He suggests that much of the FBI’s threat assessment role should be taken over by Congress, since the agency has a natural tendency to exaggerate the threat of terrorism. German also states that the FBI is now more powerful than at any time since the Cointelpro era.

Ted Gunderson

A high-level FBI official who retired after a full career with the bureau, the late Ted Gunderson, claimed that the FBI’s infamous COINTELPRO operations, which lasted from 1956 to 1971, re-emerged in a more sophisticated form a decade or so later, as what is now commonly referred to as “gang stalking.” Gunderson’s testimony is complicated however, for several reasons, as I explain here in my full discussion of COINTELPRO.
________________________________________________________

War Crimes by Sociopaths in U.S. Intelligence Agencies

Journalist Douglas Valentine has written extensively about the Central Intelligence Agency (CIA), including a book called The Phoenix Program which details the CIA’s Operation Phoenix in the Vietnam war. That program, which is largely unknown to the American public even today, involved torture, assassinations, and the murder of civilians – including women and children – on a large scale.

For anyone who is curious about Operation Phoenix, I recommend this article which Valentine wrote for CounterPunch magazine in May of 2001 in which he explains both the nature of the war crimes committed and how those crimes were whitewashed by the establishment press.

Writing for that same magazine in September 2013, Douglas Valentine made the following observation about the CIA. No doubt this also applies to many agents in other U.S. intelligence and law enforcement agencies as well.

“Despite the popular portrayal of the CIA as patriotic guys and girls risking everything to do a dirty job, the typical CIA officer is a sociopath without the guts to go it alone in the underworld. They gravitate to the CIA because they are protected there by the all-powerful Cult of Death that rules America.”
________________________________________________________

How Far Will U.S. Officials Go in their Criminality?

An instructive example of the extremes to which federal agencies sometimes go is the CIA’s secret MK Ultra program. I describe MK Ultra in some detail in section 6 below, so I will just note here that it involved performing experiments (including psychological and physical torture) on American citizens. No one was punished for his participation in that program – which lasted two decades, and the head of the CIA destroyed most of the records about it when it was discovered.

In September 1970 the leftists in Chile won a plurality of that country’s democratic election, as a result of which, their representative would have soon been confirmed as the next president. Right-wing political leaders in Chile, some major U.S. corporations which did business in the country (including Pepsi Cola and Chase Manhattan Bank), and the CIA were not pleased with this development and communicated that to then-president Richard Nixon and his Secretary of State, Henry Kissinger, and they plotted to arrange for a military coup instead.

An obstacle they faced was that the chief of the Chilean General Staff, General René Schnieder did not believe in interfering with the democratic process. So Nixon and Kissinger had him murdered.

The incident – and other very serious transgressions – did not prevent Kissinger from generally being treated with great respect and adulation by the American news media over the rest of his career. That kind of sycophancy and complacency by mainstream journalists obviously makes it difficult to expose and punish the bad behavior done in secret by the U.S. government.

Operation Northwoods

High-level U.S. officials are sometimes willing to perpetrate very serious crimes against their own citizens when they believe it could further their agendas. A perfect example of this was the proposed “false flag operation” called “Operation Northwoods.”

The following description of the plan is an excerpt from an ABC News article in May 2001 by David Ruppe:

In the early 1960s, America’s top military leaders reportedly drafted plans to kill innocent people and commit acts of terrorism in U.S. cities to create public support for a war against Cuba.

Code named Operation Northwoods, the plans reportedly included the possible assassination of Cuban émigrés, sinking boats of Cuban refugees on the high seas, hijacking planes, blowing up a U.S. ship, and even orchestrating violent terrorism in U.S. cities.

The plans were developed as ways to trick the American public and the international community into supporting a war to oust Cuba’s then new leader, communist Fidel Castro.

America’s top military brass even contemplated causing U.S. military casualties, writing: “We could blow up a U.S. ship in Guantanamo Bay and blame Cuba,” and, “casualty lists in U.S. newspapers would cause a helpful wave of national indignation.”

Details of the plans are described in Body of Secrets (Doubleday), a new book by investigative reporter James Bamford about the history of America’s largest spy agency, the National Security Agency. However, the plans were not connected to the agency, he notes.

The plans had the written approval of all of the Joint Chiefs of Staff and were presented to President Kennedy’s defense secretary, Robert McNamara, in March 1962. But they apparently were rejected by the civilian leadership and have gone undisclosed for nearly 40 years.
________________________________________________________

Lying About Killing

A thorough review of disturbing crimes and conspiracies by the U.S. government is beyond the scope of this website. My goal here is simply to cite a few examples to make the general case that acts and programs involving serious deception and criminality are not aberrations. Here is a final example from a few years ago.

When a U.S. cruise missile struck a village in Yemen in December 2009 killing 41 people – including 14 women and 21 children – the U.S. government and the Yemeni government conspired to lie about the incident, saying that the Yemeni government had launched the attack rather than the U.S., and that the victims were members of an al-Qaeda training camp.

The truth about who launched the attack and the identity of the victims was later revealed by two sources: cables released by Wikileaks and evidence gathered and reported by a young Yemini journalist named Abdulelah Haider Shaye.

After exposing what really happened in the missile strike, Shaye was arrested on apparently trumped-up charges and given a sham trial that was criticized by major human rights organizations such as Amnesty International and sentenced to five years in prison.

In 2011 the president of Yemen announced that he was going to pardon Shaye, but apparently decided against it “because of a phone call from Obama.”

According to Amnesty International, the unexploded cluster bomblet in the photo below was found at the location of the missile strike in Yemen. It would have been one of the 166 bomblets carried by the Tomahawk cruise missile.

Each bomblet explodes “into over 200 sharp steel fragments that can cause injuries up to 150m away. An incendiary material inside the bomblet also spreads fragments of burning zirconium designed to set fire to nearby flammable objects.”

U.S. Cluster Bomb

To review: In an incident which barely registered on the radar of the news media and the American public, U.S. government officials killed a bunch of women and children. Then they lied about it to cover it up. Then, when they got caught, they arranged to have the journalist who exposed all the killing and lying kept in prison for reporting it.

If you think that a government which routinely does that kind of stuff (without any negative career consequences or political consequences or legal consequences for those involved) – and which was previously caught waging an illegal counterintelligence war against its own citizens (COINTELPRO) – could not possibly be acquiescing in an illegal program of organized surveillance and harassment of targeted citizens, then you’re not skeptical – you’re just

4. Oversight of Law Enforcement and Intelligence Agencies

monkees cropped

Lawlessness in the U.S. intelligence community

A May 2015 column by journalist Tom Engelhardt examined some recurring patterns of deception, hubris, violence, and incompetence in the U.S. national security state. This passage – which is relevant to counterintelligence stalking – perfectly describes the security state’s quest: maximum power for itself and a minimum of oversight from the public whose interests it supposedly serves.

“…the American national security state, which has undergone an era of unprecedented expansion, is now remarkably unconstrained by any kind of serious oversight, the rule of law, or limits of almost any sort. It should be clear by now that the urge for ever more latitude and power has become part of its institutional DNA. It has already created a global surveillance system of a kind never before seen or imagined, not even by the totalitarian regimes of the last century. Its end goal is clearly to have access to everyone on the planet, Americans included, and every imaginable form of communication now in use. There was to be a sole exception to this blanket system of surveillance: the official denizens of the national security state itself. No one was to have the capacity to look at them. This helps explain why its top officials were so viscerally outraged by Edward Snowden and his revelations. When someone surveilled them as they did others, they felt violated and deeply offended.”

U.S. law enforcement and intelligence agencies currently operate with essentially the same lack of accountability that existed during the days of COINTELPRO and MK Ultra. Following the Church Committee investigations in the 1970s efforts were made to implement policies to protect Americans from crimes by the federal government. Unfortunately, those protections have been thoroughly undone – especially by policies such as the Patriot Act enacted in the wake of the 9/11 attacks. The FBI – and even the IRS – now assert the right to have warrantless access to the email communication of all Americans, to cite just one example.

Arguably, even the Church Committee reforms aimed at outlawing assassinations of foreign leaders have been undermined. The government now orders drone assassinations in places like Yemen and launches wars without the approval of Congress – such as the “military intervention” against Libya launched in March 2011.

It’s difficult to even assess the extent to which America’s law enforcement and intelligence agencies have returned to being rogue entities, given that they now routinely invoke “national security” as a justification for keeping American citizens from knowing their business. Political cowardice by members of Congress – as well as laziness, group-think, and careerism among many journalists at major news outlets has resulted in a lack of oversight of America’s most secretive government agencies.

Fortunately, there are some exceptions; some journalists do report that the intelligence and law enforcement communities have slipped the leash. A Forbes magazine writer – to cite just one example – has suggested that we probably need another Church Committee investigation. The Forbes article quotes a former senior NSA official, William H. Binney, who said we seem to be headed “toward an Orwellian state.”

A November 2013 article in the New York Times on spying by the NSA quoted Binney on the danger of the intelligence community’s powers being used as a weapon against Americans:

Mr. Binney said that without new leadership, new laws and top-to-bottom reform, the agency will represent a threat of “turnkey totalitarianism” — the capability to turn its awesome power, now directed mainly against other countries, on the American public. “I think it’s already starting to happen,” he said. “That’s what we have to stop.”
________________________________________________________

Congress members’ fear of the intelligence community

Oversight of the U.S. intelligence agencies is the responsibility of the House and Senate intelligence committees. Those committees are unlikely to provide much real oversight though if they are afraid of the people they are supposed to be monitoring. Unfortunately, that is very likely the case.

In March 2014, two members of Congress made comments which strongly implied that such fears exist. Senator Rand Paul (R-Kentucky) said this of his fellow senators:

“I think I perceive fear of an intelligence community drunk with power, unrepentant, and uninclined to relinquish power.”

The next day, House Minority Leader Nancy Pelosi (D-California) said this about disagreeing with the intelligence community:

“You don’t fight it without a price, because they come after you.”

On April 10, 2014, Senator Chuck Grassley (R-Iowa) gave a speech about the Whistleblower Protection Act. According to Grassley, President Obama’s Insider Threat detection program fails to adequately distinguish true insider threats – such as spies and terrorists – from whistle-blowers.

As Senator Grassley explained in his speech, when he and Senator Patrick Leahy (D-Vermont) had a briefing with the FBI the week before, the head of the FBI’s Insider Threat Program did not bring the program’s training materials as the senators had requested so they could review them. About ten minutes into the briefing, after the senators began raising questions about whether the bureau was fairly distinguishing between threats and whistle-blowers, the FBI officials “abruptly walked out.”

Senator Grassley described the FBI’s attitude this way:

“The FBI fiercely resists any efforts at Congressional oversight, especially on whistle-blower matters.”

Victims of organized stalking by corrupt law enforcement and intelligence agencies sometimes try to gain the attention of members of Congress so they might intervene to stop such criminal behavior. I encourage such efforts, but I would caution targeted individuals to be realistic. Senator Leahy is the Chairman of the Senate Judiciary Committee, and the FBI officials simply walked out of his briefing when he and Senator Grassley tried to question them about how they target individuals as potential threats.
________________________________________________________

Lawlessness in the private spying industry

Concerns that the spy industry in the U.S. has slipped the leash have been voiced by many people who know the profession from first-hand experience. Former CIA division chief Melvin Goodman said this of the vast private contractor element of the intelligence community:

“My major concern is the lack of accountability, the lack of responsibility. The entire industry is essentially out of control. It’s outrageous.”

Concerns about the lack of oversight of U.S. intelligence community contractors have also been expressed by the U.S. Government Accountability Office (GAO). A report released by the GAO in February 2014 indicated that over a third of the personnel records for intelligence contractors lacked the documentation needed to validate the number of personnel employed or the reasons core intelligence functions were being assigned to them.

GAO – Civilian Intelligence Community

The lack of oversight for private spooks does not just apply to those working for government agencies as contractors; it also applies to a large shadowy industry of corporate spies who work for intelligence-security firms.

A November 2013 report on corporate spying by Gary Ruskin, director of the Center for Corporate Policy, used the word “lawlessness” to describe the nature of the industry. His report – “Spooky Business” – concluded that the private intelligence and law enforcement industry functions with virtually no oversight.

“[The industry] appears to enjoy near impunity, is a threat to democracy and the rule of law. In essence, corporations are now able to hire a private law enforcement capacity – which is barely constrained by legal and ethical norms….”

Spooky Business

In his February 2011 article for the Guardian, “The Dirty History of Corporate Spying,” investigative reporter James Ridgeway described how corporations target people with what is, in effect, a secret private law enforcement system:

“The private detective firms working for corporations can develop information against their own targets and find eager recipients among federal and local law enforcement agencies, some of whose employees end up retiring into private-sector detective work. The corporate spy business thus amounts to a shadow para-law enforcement system that basically can get around any of the safeguards set out in the American legal system; it ought to be subject first to transparency, and then to banning.”
________________________________________________________

Oversight of the Department of Homeland Security (DHS)

Who will guard the guards

DHS is America’s third-largest government agency, with a massive $39 billion budget and 225,000 employees in 2014. (Americans require a lot of monitoring by Big Brother to make the political class feel safe.)

With all those federal employees and private contractors feeding at that giant pig trough – in an area of government which operates largely in secrecy – oversight is critical. Here is the Washington Post’s description of the April 2014 report about the U.S. Senate’s investigations into the oversight being provided:

“Charles K. Edwards, who served as acting DHS inspector general from 2011 through 2013, routinely shared drinks and dinner with department leaders and gave them inside information about the timing and findings of investigations…”

Here is a comment from the report by Sen. Ron Johnson (R-Wis.), the ranking Republican on the subcommittee on financial and contracting oversight, which conducted the investigation:

“We found that Mr. Edwards was a compromised inspector general…who was not exercising real oversight….Any report generated out of his office would be suspect.”
________________________________________________________

Oversight of the Justice Department

Because of its critical role at the top of the U.S. law enforcement system, I devote an entire section of this overview to the U.S. Department of Justice (DOJ). For now, I will just mention this for perspective:

A January 1993 Washington Post article quoted a government auditor describing the secretive and dysfunctional nature of the DOJ’s internal affairs office this way:

“The system they have in place could not be better for sweeping things under the rug.”
________________________________________________________

Oversight of an inherently corrupt system

Regardless of the integrity of the oversight, if the true nature of the programs themselves is illegitimate, the public’s rights and interests will not be protected. Unfortunately, that is precisely the situation.

Declaring an endless “war on terror” – just like declaring an endless “war on drugs” – guarantees as a practical matter that civil rights will always be a low priority, and that other agendas – such as political control, corporate profits, and career interests associated with enforcement and surveillance will drive government policy.

“Oceania had always been at war with Eastasia.” – from 1984 by George Orwell

In December 2013, NSA whistle-blower Edward Snowden posted an open letter to the people of Brazil regarding U.S. spying. In that letter he explained that the ostensible purpose of America’s massive surveillance system – protecting Americans from terrorism – is essentially a lie:

“These programs were never about terrorism:
they’re about economic spying, social control, and
diplomatic manipulation. They’re about power.”
__________________

5. Published News Reports

newspapers (cropped)

In the absence of leaked official documents, analysis of domestic counterintelligence operations often requires speculation based on information from public sources, such as the news reports listed below. Journalist Dan Froomkin mentioned this strategy of uncovering abuses of power in a blog entry at The Intercept in September 2014:

“Reading copiously is one approach. Even in a flawed press climate, a pretty compelling picture
emerges when you connect the dots.”

For perspective, keep this in mind about the following news items: When a criminal is caught perpetrating a crime, often the transgression is just one of a large number of crimes, most of which went undetected. That also applies to crimes perpetrated by law enforcement and intelligence agencies. What follows are, presumably, just glimpses of activities which mostly stay off of the public’s radar.
________________________________________________________

December 1976

A Penthouse article published in December 1976 exposed a secretive quasi-governmental organization called the Association of Law Enforcement Intelligence Units (LEIU). The reporter was Pulitzer Prize nominee George O’Toole, a novelist and historian who specialized in the history of American espionage and who had worked for the CIA. The article, “America’s Secret Police Network,” revealed the modern system of what are traditionally referred to as “Red Squads” – intelligence units within urban police departments that conduct spying and counterintelligence activities, such as infiltrating and disrupting groups deemed to be subversive. Despite having received government funding and despite the group’s management of a sensitive intelligence database, LEIU is a private organization, and therefore mostly free of any oversight. O’Toole described the group this way:

“The organization forms a vast network of intelligence units that exchange dossiers and conduct investigations on a reciprocal basis. Several of the police departments belonging to the group have recently been caught in illegal wiretapping, burglary, and spying on the private lives of ordinary citizens. The LEIU is, in effect, a huge, private domestic-intelligence agency.”
________________________________________________________

April 1979

A New York Times article reviewed a three-and-a-half-year study of the aforementioned LEIU association by the American Friends Service Committee. The study described the LEIU as “an old-boy network” whose illegal surveillance “of groups and individuals for political purposes is continuing on a vast scale in the nation.” According to the report, the widespread illegal spying posed “a grave threat to the constitutional rights of freedom of expression, due process and privacy.”
________________________________________________________

September 1979

A Los Angeles Times article under the headline “FBI Admits Spreading Lies About Jean Seberg” was the lead story on the paper’s front page. Seberg – a successful film actress and a political activist – had died the month before in Paris from an apparent suicide. As the Los Angeles Times reported, Seberg had been the target of a systematic campaign by the FBI to slander her. She had also apparently been blacklisted and terrorized by the FBI using tactics associated with counterintelligence operations intended to neutralize political dissidents, such as “black bag jobs,” illegal wiretapping, and overt stalking.
________________________________________________________

October 1986

An article in the Gadsen Times – and other news reports – brought national attention to the case of Arnold Lockshin, an American cancer research scientist who fled with his family to the Soviet Union in 1986 and was granted political asylum. According to Lockshin, he and his family were being intensely harassed by federal agents because of their socialist political views. The alleged harassment tactics included many of those associated with other cases of organized stalking: slander, spying, break-ins, threats, harassing phone calls, etc. A book – Silent Terror – by Arnold Lockshin about the organized stalking campaign against his family was published in 1988.
________________________________________________________

August 2000

An article in Newsweek/Daily Beast was among the first mainstream U.S. news reports about a trend of intense systematic harassment in the workplace. The process, known as “mobbing,” involves multiple perpetrators engaging in the coordinated psychological abuse of an individual employee. Although the article does not link the reports of such organized harassment to a larger phenomenon, that form of abuse is a common element of victim accounts in organized stalking cases.
________________________________________________________

March 2004

An episode of the PBS News show NOW addressed the possible re-emergence of the FBI’s Cointelpro operations. NOW is an Emmy-winning weekly TV newsmagazine on PBS. Tom Brokaw described NOW as “fearless about challenging conventional wisdom.” The Austin American-Statesman called NOW “one of the last bastions of serious journalism on TV.”

While the video of the program is not posted on the PBS website, there is a synopsis of the show under the title “COINTELPRO Again?”

Here is the relevant passage:

“Some fear that something like COINTELPRO may again be at hand. There are undercover agents infiltrating peaceful protests in America. Pretending to be political activists, local law enforcement officials are monitoring the activities of advocacy and protest groups based on what one judge calls those organizations’ “political philosophies and conduct protected under the First Amendment.” The tactic has come about as a result of the relaxation of guidelines first put into place after the COINTELPRO scandal investigation.”
________________________________________________________

June 2004

An article in Newsweek noted that the Pentagon was quietly re-entering the business of domestic spying. One of the scandals (along with Watergate, COINTELPRO, and other crimes) which led to the U.S. Senate’s Church Committee investigations during the 1970s was the spying on Americans by U.S. Army intelligence agents. In the years following the 9/11 attacks, as this article noted, the military sneaked
back into that role:

“Without any public hearing or debate, NEWSWEEK has learned, Defense officials recently slipped a provision into a bill before Congress that could vastly expand the Pentagon’s ability to gather intelligence inside the United States, including recruiting citizens as informants.”
________________________________________________________

October 2004

An article in The Sunday Times, a major newspaper in the U.K., reported that the intelligence agency MI5 uses gang stalking tactics to punish whistle-blowers. In the article the tactics are referred to as “Zersetzung” – as the process was called by the Stasi (the state police of communist East Germany).

Note: Most of this article is behind a subscription pay wall at the link posted here; however, you can see the full text of the article in my October 10, 2004 post on the “Cointelpro News (2013)” page of this website.

________________________________________________________

December 2005

A semi-autobiographical book by Gloria Naylor – winner of the National Book Award for her novel The Women of Brewster Place – was published in 2005. In the book, Naylor described her experiences as a target of organized stalking. The book’s title, 1996, was the year Naylor realized that she was being stalked. (Presumably, it is also a reference to Orwell’s 1984.) Apparently, her harassment began after she had a dispute with a neighbor whose brother worked for the National Security Agency (NSA).

Some of Naylor’s comments in an interview on National Public Radio, January 23, 2006:

“I think I just ran into the wrong people at the wrong time, and like the book shows, what starts from a very innocent dispute with a neighbor cascades and cascades and cascades into a whole production.”

“…these cars began to surveil me. People began to follow me around, and it did, it was very disrupting to think that your privacy was being violated, and for no reason that I could come up with.”

On the possible skepticism some people might have of her account:

“…what I can say to them is this: it’s the same thing that happens when a child is abused by a trusted adult. Now, that child will go to some parents and tell them these things. They will be believed by some of the parents. Some of the parents will never believe that Uncle George could be doing these things to their little girl.”
________________________________________________________

May 2006

An article in The Globe and Mail, a Canadian national newspaper, reported that the Canadian Security Intelligence Service (CSIS) and the Royal Canadian Mounted Police (RCMP) used gang stalking techniques (referred to as “Diffuse and Disrupt” tactics) against suspects for whom they lacked sufficient evidence to prosecute. A criminal defense attorney stated that many of her clients complained of harassment by authorities, although they were never arrested.

“Both CSIS and the RCMP are now under scrutiny in judicial inquiries and civil courts, with a series of men jailed overseas accusing the agencies of making end runs around the justice system.”

A CSIS official told a Canadian Senate committee: “if prosecution is not viable, there are other techniques.”
________________________________________________________

November 2006

A New York Times article reported that the federal government agreed to pay a $2 million settlement to an Oregon man who was wrongly accused of terrorism. As the Christian Science Monitor reported in November 2010, the harassment of the man by federal law enforcement agents included performing black bag operations on his residence, exactly like those described by victims of organized stalking:

“Federal authorities planted listening devices in his office, throughout his house – including in his bedroom – and tapped his phones. He and his family were kept under surveillance. Agents conducted “sneak and peak” searches, entering the home when the family was away.”
________________________________________________________

January 2007

A cover article in The Washington Post Magazine by a journalist familiar with military policies and weapon systems portrayed self-proclaimed victims of “gang stalking” as intelligent and credible, and suggested that claims about exotic non-lethal weapons being used by the U.S. government to harass targeted individuals were plausible.

“If Harlan Girard is crazy, he doesn’t act the part….Girard appears intelligent and coherent.”

“…given the history of America’s clandestine research, it’s reasonable to assume that if the defense establishment could develop mind-control or long-distance ray weapons, it almost certainly would. And, once developed, the possibility that they might be tested on innocent civilians could not be categorically dismissed.”

The Washington Post reporter, Sharon Weinberger, described her efforts to obtain information about the defense deparrment technology known to be associated with some of the experiences described by self-proclaimed victims of organized stalking:

“Rich Garcia, a spokesman for the research laboratory’s directed energy directorate, declined to discuss that patent or current or related research in the field, citing the lab’s policy not to comment on its microwave work.”

“…Research appeared to continue at least through 2002. Where this work has gone since is unclear — the research laboratory, citing classification, refused to discuss it or release other materials.”

Regarding the numerous comments generated by her article, for example, Weinberger again noted the apparently rational nature of many of the self-proclaimed victims of gang stalking:

“….for anyone who thinks that all TIs are mentally ill people in need of forced medication, I suggest you check out some of the extremely sane tactics they employ. For example, their organized response to the article would make some political campaigns jealous. As one mind control blog advises:

We must write the Washington Post in high numbers to show that this story merits a follow up. We must get our side of the story out, before the perps start inundating them with letters that we are crazy. Please take part in this to give the accurate side of what is really happening and remember to forward any supporting evidence.”
________________________________________________________

June 2008

An article in the Nation quoted former CIA division chief Melvin Goodman on his views of the vast private contractor element of the intelligence-security community:

“My major concern is the lack of accountability, the lack of responsibility. The entire industry is essentially out of control.
It’s outrageous.”
________________________________________________________

March 2009

A newspaper article in the Verona-Cedar Grove Times titled “Stalker Claims Unsettle Police” described how a self-proclaimed target of gang stalking “has been handing out fliers claiming a large, organized group of stalkers is targeting residents and business owners with the objective of destroying their lives.”

The flyers stated: “Their intention is to murder their target without getting their hands dirty. It’s the perfect hate crime.”
________________________________________________________

October 2010

A post on the political blog Daily Kos alleged that intelligence agencies in the U.S., the U.K., and Canada use “Zersetzung” – as East Germany’s Stasi referred to gang stalking – against targeted individuals. Although the article did not provide sourced details, it might have helped raised awareness of this form of state-sponsored criminal harassment since Daily Kos receives several hundred thousand visits per day.
________________________________________________________

November 2010

A classified U.S. diplomatic cable published by WikiLeaks documented a discussion between a U.S. State Department official and the director of the Canadian Security Intelligence Service (CSIS) in which the CSIS director said the agency was “vigorously harassing” members of Hezbollah – an apparent reference to organized stalking (which the Canadian intelligence community sometimes calls “diffuse and disrupt” tactics).
________________________________________________________

January 2011

A local TV news broadcast in California (on KION – Channel 46 and KCBA – Channel 35) featured a report about “gang stalking” – referred to as such by the reporters and by Lieutenant Larry Richard of the Santa Cruz Police Department.
________________________________________________________

February 2011

An article for the Guardian titled “The Dirty History of Corporate Spying,” by investigative reporter James Ridgeway, described how corporations target people with what is, in effect, a secret private law enforcement system:

“The private detective firms working for corporations can develop information against their own targets and find eager recipients among federal and local law enforcement agencies, some of whose employees end up retiring into private-sector detective work. The corporate spy business thus amounts to a shadow para-law enforcement system that basically can get around any of the safeguards set out in the American legal system; it ought to be subject first to transparency, and then to banning.”
________________________________________________________

August 2011

A newspaper article in The Record and a TV report on KCRA Channel 3 described an organized stalking case in which the city manager of Stockton, California was stalked by local police after a break-down in contract negotiations. The brazen tactics used by the police included purchasing the house next to the city manager’s home and using it as a base for psychological operations. Stockton’s mayor was quoted in the Record as saying that the city manager had been “targeted for harassment at home.” KCRA 3 News reported that the police department would not return its calls about the matter.
________________________________________________________

December 2012

An article in the Sun Sentinel, a Pulitzer Prize-winning newspaper in Florida, reported the organized stalking of Donna Jane Watts, a Florida Highway Patrol trooper, by other police officers and sheriff’s deputies from multiple jurisdictions. The victim of the stalking had cited an off-duty police officer for reckless driving (he was later fired). The stalking – which included illegally snooping on the victim’s private data and efforts to harass and intimidate her – was apparently done in retaliation. Ms. Watts filed a lawsuit seeking compensation for the illegal harassment. Incidentally, the Sun Sentinel later won a Pulitzer Prize for public service journalism for its series of articles on deaths and injuries caused by reckless driving by Florida police officers.

“Trooper Donna ‘Jane’ Watts’ 69-page lawsuit, filed in federal court Friday, seeks more than $1 million in damages. She is suing more than 100 police officers and agencies, and the Department of Highway Safety and Motor Vehicles. The suit alleges 88 law enforcement officers from 25 jurisdictions illegally accessed her personal information more than 200 times, violating her privacy.”

“…officers looked up information such as her home address, picture, Social Security number, date of birth, and detailed vehicle description in a database available to police officers, according to her lawsuit.”

“Watts said after the incident she received random calls on her home and cell phones, some threatening.”

A few days later, a very similar complaint was filed by another apparent victim of group stalking by law enforcement officers in Florida. Toni Foudy, a former sheriff’s deputy alleged that she and her husband were the targets of illegal surveillance and harassment. The two cases were reported on a local TV news broadcast in Palm Beach (WPTV), and were also reported by Treasure Coast Newspapers.

Here are some excerpts from the newspaper article:

A former deputy who worked for the Indian River and St. Lucie County sheriff’s offices says her former colleagues looked into driver’s license information for herself and her husband hundreds of times over a six-year period, according to a $1 million federal lawsuit filed Monday.

…The Foudy lawsuit names about 100 members of the two sheriff’s offices as accessing the driver’s license information for the former deputy and her husband.

…Foudy joined the St. Lucie County Sheriff’s Office in 2005 but left after a year on the force during an internal affairs investigation into her patrol car becoming disabled, the lawsuit states. Foudy resigned because she believed she was being targeted by people at the agency, according to the lawsuit.

Foudy and her husband said they began receiving harassing emails in 2006. Years later, the emails were traced to a computer terminal at the St. Lucie County Jail, the lawsuit states. Several times a week, the couple said, patrol cars would drive by their home and blare their sirens. This prompted them to move twice, according to the lawsuit.

Here is a copy of the claim that was filed: Foudy’s Complaint

As the complaint notes (page 36), Foudy’s relatives also became targets of the illegal surveillance. Unauthorized queries about them in two databases were allegedly made nearly 200 times over a six-year period.
________________________________________________________

January 2013

An article in CounterPunch asserted that the FBI’s infamous COINTELPRO operations had re-emerged in full force: “COINTELPRO is alive and well.”
________________________________________________________

June 2013

An article in the Nation titled “The Strange Case of Barrett Brown,” by Northwestern University professor Peter Ludlow, stated – in reference to actions by private security firms, the FBI, and the Department of Justice: “One might think that what we are looking at is COINTELPRO 2.0 – an outsourced surveillance state – but in fact it’s worse.”
________________________________________________________

September 2013

An article in the Washington Times and an article in Wired both discussed the speculation that a mass shooting at the Washington D.C. Navy Yard resulted from the shooter being “gang stalked” in
an MK Ultra-type operation using electronic weapons and noise harassment.
________________________________________________________

September 2013

The cover article of Fortean Times in September 2013 (U.K. edition) was about “state-sponsored gangstalking.” The author – Robert Guffey, a faculty member of the English department at California State University Long Beach – gave a detailed account of a gang stalking case which involved the U.S. military.

A marine had gone AWOL after stealing some sensitive military property – including night vision goggles and a laptop containing classfied information. Apparently the Naval Criminal Investigative Service (NCIS) initiated an organized stalking campaign against the suspect and his associates as well as an investigation. Various psychological operations tactics were used, such as overt stalking, in addition to some far more exotic methods. Possibly the operations were intended to serve as both a form of extra-judicial punishment and as experimentation.
________________________________________________________

November 2013

A local TV news broadcast in West Virginia (on WDTV – local CBS News affiliate Channel 5) featured a report about “organized stalking.” The broadcast featured testimony by two individuals from Pennsylvania who appeared to be credible and sincere, discussing their constant harassment by perpetrators using gang stalking tactics.
________________________________________________________

November 2013

A TV and radio broadcast of Democracy Now! featured an interview with Gary Ruskin, director of the Center for Corporate Policy, in which he discussed the shadowy industry of spies employed by major U.S. corporations to conduct secret – and often illegal – counterintelligence operations against critics of those corporations.

Journalist Amy Goodman:

“According to the report, these corporations employ former CIA, National Security Agency and FBI agents to engage in private surveillance work, which is often illegal in nature but rarely — if ever — prosecuted.”
________________________________________________________

December 2013

Articles published by CBS, the Daily Mail, RT, Tech Dirt, and Courthouse News Service reported that a U.S. government contractor, Jeffrey Kantor, filed a lawsuit against multiple federal agencies for orchestrating what the complaint describes as “group stalking attacks (aka gang-stalking) against him.” Kantor claimed that his stalking began after he made a Google search for information about how to build a radio-controlled airplane. While typing his query, Google’s auto-complete function finished his “How to build a radio-controlled…” query with the word “bomb.” The individual was then subjected to constant surveillance – including inside his residence and his vehicle – and constant psychological harassment from co-workers and strangers. In addition to his claim against the U.S. government, Mr. Kantor sued the federal contractors for which he worked, because of the orchestrated harassment (“mobbing”) he was forced to endure at his workplace.
________________________________________________________

January 2014

The Winnipeg Free Press reported that in July of 2013 a 56-year-old man named Gerald Chudy stabbed a man in Manitoba, Canada, in retaliation for what Chudy said was years of “gang stalking.” The reporter did not elaborate in the article on the term “gang stalking,” and he did not reply to my email to him about the issue. The article does not mention the name of the man Chudy accused of being a stalker. Apparently, the man’s injuries were not serious.
________________________________________________________

February 2014

An article in The New Yorker gave a detailed account of a stalking campaign by a large corporation. Research biologist Tyrone Hayes discovered some disturbing effects from a pesticide made by the agribusiness corporation Syngenta. When he refused to keep quiet about it, the corporation’s goon squad began slandering him to discredit him. They also stalked him, hacked his emails, and threatened him for more than a decade. This was not a case of “gang stalking,” (government-run counterintelligence subversion), but it is an example of the increasingly common thuggish tactics of a rogue industry of corporate spooks in America that mostly operates with impunity.
________________________________________________________

May 2014

A report on the ABC News TV program 20/20 – and an article in the Daily Mail – chronicled the ordeal of a couple in Hubbard, Ohio who were systematically harassed for 7 years in a vengeance campaign orchestrated by the town’s fire chief. Apparently, the fire chief was angry at the couple because of a real estate dispute, so he enlisted the help of other firefighters, police officers, and local residents to perpetrate a campaign of constant vehicle horn honking outside the couple’s home. The harassment – which the couple thoroughly documented on video – resulted in legal claims which were still pending at the time of the news reports.
________________________________________________________

July 2014

A local TV news report on WTNH News 8 in Connecticut and a local TV news report on an NBC News affiliate, and an article in the Connecticut newspaper, The Courant, reported that hundreds of “suspicious flyers” about “gang stalking” were being distributed in Guilford, CT. The flyers made reference to this website (Fight Gang Stalking), and alleged that organized counterintelligence stalking was being perpetrated in Guilford. A statement by the Guilford Police Department about the matter was also posted in The Day newspaper. A copy of one of the flyers was posted on this page of The Courant’s website.
________________________________________________________

November 2014

NBC News reported – along with numerous other media outlets – that 31-year-old lawyer, Myron May, shot three people at Florida State University, after informing a number of people – in writing – prior to the incident, that “government ‘stalkers’ were harassing him.” Two of the persons he shot sustained minor injuries; the third was left paralyzed from the waist down. Prior to the shooting, the self-proclaimed “targeted individual,” Myron May, left a voice message for an acquaintance in which he said “I do not want to die in vain.” He also made other phone calls – and sent emails and text messages – about what was being done to him. In addition, May sent ten packages of information to various people to “expose” what was happening. The FBI intercepted the ten packages in the mail.
________________________________________________________

November 2014

An article published by the Daily Mail described a legal case filed the month before in the U.K. by a businessman who claimed that over the previous 11 years he was intensely spied upon and harassed – as punishment and intimidation – by the British intelligence agency MI5 for refusing to assist that agency with its operations targeting his friend, whom the Daily Mail described as “a notorious gangster.”

“[The plaintiff] has reportedly claimed MI5 spies have planted secret microphones in his house and have trained birds to tap on his windows in an attempt to frighten him. Businessman Philip Kerr is seeking to win a High Court injunction against the intelligence agents, who he says have targeted him because he refused to co-operate with the security service. The 53-year-old says he has been subjected to a ‘campaign of harassment’ over the past 11 years, claiming agents have filled his houses in Wirral, Merseyside, and Thailand with hidden cameras and microphones.

…he also says in legal papers that spies have interfered with his phone, TV and radio…

The article noted that Kerr had, in addition to retaining legal counsel, sought advice from former MI5 intelligence officer and whistle-blower Annie Machon, a high-profile whistle-blower. (She appears, for example, as the first speaker in this video, which also features famous whistle-blowers from U.S. intelligence agencies, such as Ray McGovern and Thomas Drake.)

‘Annie confirmed to me that the things I am being subjected to are exactly the kinds of things MI5 do to get into your head. It is psychological warfare,’ he said.

…Kerr’s barrister Anthony Barraclough, said…‘This has taken his life away and had a major effect on his health.’

…MI5 said it would neither confirm nor deny the allegations in the High Court Claim.”

The same case was reported with updated information in April 2015 in the Daily Mirror – another British national daily tabloid newspaper. Some excerpts:

“A judge this month refused to strike out the claim at the request of MI5, which said it would neither confirm nor deny the allegations.”

“Senior Master Barbara Fontaine instead stayed – or suspended – the proceedings and told Mr. Kerr to take his complaint to the Investigatory Powers Tribunal (IPT), a closed court which investigates complaints of unlawful covert techniques by public authorities.”

“[Kerr] says that this course of conduct, which includes stalking and surveillance, has been carried out overtly, rather than covertly, by MI5 in order to persuade or force him by intimidation to work with the Security Service.”

Blue Line

6. Historical Origins of Gang Stalking: COINTELPRO, MK Ultra, Red Squads, & the Stasi

History

American high school and college students would be well-served by a deeper study of government conspiracies such as the Teapot Dome scandal, Operation Mockingbird, Operation Northwoods, the Pentagon Papers, Watergate, and Iran-Contra. No one can participate intelligently in America’s republic without such an historical background.

The strategies and tactics used in organized stalking have their roots in earlier programs and agencies in America and elsewhere. Among the subjects of particular relevance to contemporary counterintelligence crimes in the U.S. are the following:

COINTELPRO was a secret program of FBI counterintelligence operations against American citizens orchestrated under the leadership of FBI Director J. Edgar Hoover.

Project MK Ultra was a secret program run by the CIA from the early 1950s until the early 1970s, in which mind control and interrogation experiments were performed on U.S. and Canadian citizens.

“Red Squads” – now called “Law Enforcement Intelligence Units” (LEIUs), are elements of local police departments. They spy on criminals, but they also conduct counterintelligence activities – including infiltrating and disrupting organizations deemed to be subversive, such as labor groups and civil rights groups. Red Squads have been used – especially by urban police departments – since the late 1800s. Historically, Red Squads have taken very seriously the protection of business interests and the disruption of political movements. They have been rather more casual in their attitudes about complying with the law and principles of morality.

The Stasi – communist East Germany’s secret police agency – enforced the political control over East Germany’s citizens through a combination of surveillance and psychological terrorism. Core elements of that system of spying and psychological torture, called zersetzung, are used in gang stalking in the U.S. today.

Anyone who doubts that the U.S. government could be sanctioning a widespread conspiracy involving illegal surveillance and harassment of targeted citizens should read the basic facts about these programs. You don’t even need to explore obscure sources of information; simply read the established mainstream accounts of the undisputed facts.

Blue Line
COINTELPRO

J. Edgar Hoover, FBI Director from 1924 to 1972

COINTELPRO was a secret illegal program in which U.S. law enforcement personnel and their various government and private citizen accomplices systematically spied on, slandered, terrorized, and committed acts of violence (including murder) against American citizens. The program ended after being exposed in 1971 by civilian activists who obtained information about it and leaked it to the news media.

It would be difficult to overstate the relevance of the COINTELPRO operations to modern gang stalking in the U.S. By all available evidence, current organized stalking crimes in the U.S. are not similar to COINTELPRO; they are a continuation of COINTELPRO.

Significantly, COINTELPRO was not exposed by insider whistle-blowers; the FBI agents and their civilian minions dutifully perpetrated their assigned crimes until the operations were derailed by civilian outsiders.

Exposure of the program required those civilians to break into an FBI office and steal documents about the program and give them to the news media.

Also bear in mind: J. Edgar Hoover’s name is still on the FBI headquarters building.

As noted in the introduction above, a January 21, 2013 article in CounterPunch magazine asserted that COINTELPRO is now secretly being used again on a wide scale. In that article, “The Return of COINTELPRO?” Tom McNamara describes the original program – and its re-emergence – as follows:

For 15 years (1956-1971) the Federal Bureau of Investigation (FBI) ran a broad and highly coordinated domestic intelligence / counterintelligence program known as COINTELPRO (COunter INTELligence PROgrams). What was originally deemed as a justifiable effort to protect the US during the Cold War from Soviet and Communist threats and infiltration, soon devolved into a program for suppressing domestic dissent and spying on American citizens. Approximately 20,000 people were investigated by the FBI based only on their political views and beliefs. Most were never suspected of having committed any crime.

The reasoning behind the program, as detailed in a 1976 Senate report, was that the FBI had “the duty to do whatever is necessary to combat perceived threats to the existing social and political order.” The fact that the “perceived threats” were usually American citizens engaging in constitutionally protected behaviour was apparently overlooked. The stated goal of COINTELPRO was to “expose, disrupt, misdirect, discredit, or otherwise neutralize” any individual or group deemed to be subversive or a threat to the established power structure.

The FBI’s techniques were often extreme, with the agency being complicit in the murder and assassination of political dissidents, or having people sent away to prison for life. Some of the more “moderate” actions that were used were blackmail, spreading false rumors, intimidation and harassment. It has been argued that the US is unique in that it is the only Western industrialized democracy to have engaged in such a wide spread and well organized domestic surveillance program. It finally came to an end in 1971 when it was threatened with public exposure.

Or did it?

In a stunning revelation from the Partnership for Civil Justice Fund (PCJF), it appears that COINTELPRO is alive and well. Through a Freedom of Information Act (FOIA) request, PCJF was able to obtain documents showing how the FBI was treating the Occupy Wall Street (OWS) movement, from its inception, as a potential criminal and domestic terrorist threat.

In a stunning revelation from the Partnership for Civil Justice Fund (PCJF), it appears that COINTELPRO is alive and well. Through a Freedom of Information Act (FOIA) request, PCJF was able to obtain documents showing how the FBI was treating the Occupy Wall Street (OWS) movement, from its inception, as a potential criminal and domestic terrorist threat.
________________________________________________________

Retired FBI official from the COINTELPRO era on “gang stalking”

Among the most interesting testimony about the current version of COINTELPRO (“gang stalking”) came from a man who was familiar with the original COINTELPRO operations – because he participated in them as an FBI official. The late Ted L. Gunderson served as the head of the FBI field offices in Los Angeles, Dallas, and Memphis. After retiring from the FBI in 1979, he became a private investigator. His investigations included working for the defense in the famous murder case involving former U.S. Army physician, Dr. Jeffrey MacDonald.

In a series of public appearances (and in an affidavit linked below) Gunderson stated that “rogue” military intelligence and law enforcement units of the federal government oversee a nationwide network of community-based gang stalkers who monitor, harass, and intimidate thousands of American citizens who have been extrajudicially targeted as dissidents or undesirables. Gunderson also claimed that his efforts to expose gang stalking resulted in him becoming a victim himself, as efforts were made to silence him.

Here is an audio clip from a presentation Gunderson gave in which he described how organized stalking tactics – such as electronic surveillance and “gas lighting” – were used against him.

According to Gunderson, gang stalking had been operational since the early 1980s (i.e., it began only a few years after the U.S. Senate thought they had pulled the plug on COINTELPRO following the Church Committee investigations). Gunderson said that the scope, intensity, and sophistication of gang stalking increased since its inception, as it exploited new surveillance and communication technologies.

Analysis of Ted Gunderson’s claims about gang stalking is complicated for several reasons. On one hand, as a former high-level FBI official who worked in the agency during the era of COINTELPRO, he had professional expertise and first-hand experience with that agency’s counterintelligence operations. On the other hand, his public statements about gang stalking – in his affidavit which you can view below, as well as in his public discussions of the matter, which can be found on YouTube, include references to various fringe topics, such as Satanism, child sex rings, and such.

Those claims – along with the fact that he is no longer around to clarify or defend them – raise several questions that might never be answered. Gunderson never provided any documentation or other evidence to support what he said. One possible explanation for the more bizarre things he discussed is that he could have simply been nuts. That explanation, however, begs a serious question for anyone who is skeptical that COINTELPRO and MK Ultra have essentially continued as what is now called “gang stalking.” How is it that a high-level official in the FBI managed to work for the bureau for three decades – during which he handled high-profile cases and received glowing performance evaluations (which you can view here) – without anyone inside or outside the FBI noticing that he was crazy?

The most plausible explanation for Gunderson’s bizarre claims is that he was continuing to work for the FBI – at least informally – after he officially retired, and he was spreading disinformation. That explanation is consistent with Gunderson’s FBI career – in which he participated in the original COINTELPRO, and in which he was never perceived by anyone as crazy. A common disinformation tactic used in counterintelligence operations is to discredit a person or idea by associating the person or idea with craziness, and that is very likely what he was doing.

Note this: if one insists upon interpreting Gunderson’s public statements as being delusions rather than disinformation, that analysis would seem to imply that the FBI is even more of a rogue agency than its harshest critics allege, since it would mean that the bureau is run by lunatics.

Gunderson’s affidavit

________________________________________________________

FBI’s Gang Stalking Campaign Against Actress Jean Seberg

For a sense of the evil nature of gang stalking, take a look at one of the most high-profile well-documented cases of it perpetrated by the FBI in the days of the original COINTELPRO operations.

My November 23, 2013 post on the “COINTELPRO News (2013)” page of this website is on a documentary about the well-known film actress, Jean Seberg, who was systematically terrorized by the FBI for her support of the civil rights movement.

This was a case with explicitly incriminating “smoking gun” FBI memos and mainstream news reports documenting what the feds did to their victim. (Those documents are included in my post.)

FBI agents blacklisted Seberg, slandered her by planting false stories about her in the news media, monitored her with covert surveillance (wiretaps), and terrorized her with overt surveillance (stalking) and black bag jobs (break-ins).

Emotional distress from the FBI’s operations against Ms. Seberg – while she was pregnant – apparently caused her to give birth prematurely (her baby died), and ultimately led her to commit suicide. Ms. Seberg was just one of many victims targeted by the FBI’s secret police program.
________________________________________________________

The Break-in

A fascinating but under-reported aspect of COINTELPRO is the break-in which led to the program’s exposure.

In his March 8, 2006 Los Angeles Times article on the subject, Allan M. Jalon described the event:

THIRTY-FIVE YEARS ago today, a group of anonymous activists broke into the small, two-man office of the Federal Bureau of Investigation in Media, Pa., and stole more than 1,000 FBI documents that revealed years of systematic wiretapping, infiltration and media manipulation designed to suppress dissent.

The Citizens’ Commission to Investigate the FBI, as the group called itself, forced its way in at night with a crowbar while much of the country was watching the Muhammad Ali-Joe Frazier fight. When agents arrived for work the next morning, they found the file cabinets virtually emptied.

Within a few weeks, the documents began to show up — mailed anonymously in manila envelopes with no return address — in the newsrooms of major American newspapers. When the Washington Post received copies, Atty. Gen. John N. Mitchell asked Executive Editor Ben Bradlee not to publish them because disclosure, he said, could “endanger the lives” of people involved in investigations on behalf of the United States.

Nevertheless, the Post broke the first story on March 24, 1971, after receiving an envelope with 14 FBI documents detailing how the bureau had enlisted a local police chief, letter carriers and a switchboard operator at Swarthmore College to spy on campus and black activist groups in the Philadelphia area.

More documents went to other reporters — Tom Wicker received copies at his New York Times office; so did reporters at the Los Angeles Times — and to politicians including Sen. George McGovern of South Dakota and Rep. Parren J. Mitchell of Maryland.

To this day, no individual has claimed responsibility for the break-in. The FBI, after building up a six-year, 33,000-page file on the case, couldn’t solve it. But it remains one of the most lastingly consequential (although underemphasized) watersheds of political awareness in recent American history…

Updates:

An article in the January 7, 2014 New York Times revealed the identities of the activists who exposed COINTELPRO by breaking into that FBI office to obtain the secret documents.

A documentary film about the break-in, 1971, was released in 2015.

1971 Poster
________________________________________________________

The Official Reports

Since the FBI committed so many crimes against Americans during the COINTELPRO era, there are thousands of pages of documents in the U.S. Senate’s Church Committee reports. Most Congressional reports are boring – but not these. Among the most interesting documents (and the most relevant to gang stalking) are the three which you can view or download below.

Just browsing through the contents pages gives a sense of the scope of the FBI’s crimes. Here are some of the topic headings:

Use of illegal or improper means, Mail opening, Political abuse, Ignoring the law, Efforts to discredit, Media manipulation, Distorting data to influence government policy and public perception, Congress declines to confront the issue, “Infiltration,” Investigations, Wiretaps, Bugging, FBI political intelligence for the White House, Exaggeration of communist influence, “Black Bag”jobs, Misuse of the IRS by the FBI and CIA, Targeting of ideological groups, NSA monitoring, Warrantless electronic surveillance, Domestic intelligence network, Violent and illegal activities of informants, Targeting law-abiding citizens, Targeting critics and political figures, Attorneys general failure to limit and control FBI intelligence activities, Efforts to promote enmity and factionalism within groups or between groups, Encouraging violence between groups, Efforts to prevent speaking/teaching/writing and publishing, Propaganda, Fictitious organizations, Disseminating derogatory information to family, friends, and associates, Contacts with employers, Interference with the judicial process, Blurred distinction between counterintelligence and investigation.

These reports are filled with interesting stuff. For example, Volume 6 of the hearings contains, among other items, a letter about “black bag jobs” (referred to as such). Book 2 of the final reports refers to an apparent attempt to blackmail Martin Luther King, Jr. and encourage him to commit suicide (pages 220-221).

Final Report – Book 2

Final Report – Book 3

Hearings – Volume 6

This U.S. Senate webpage has all the Church Committee reports:

http://www.intelligence.senate.gov/churchcommittee.html
________________________________________________________

A few of the high-profile individuals deemed “subversives” by the FBI and targeted under the original COINTELPRO operations: Martin Luther King, Jr., John Lennon, and Jean Seberg.

Martin_Luther_King_Jr.

john-lennon
Jean Seberg photo

**************************************************

Accounts of Organized Stalking from the COINTELPRO Era

Robert Guffey – author of the October 2013 Fortean Times magazine cover article on “state-sponsored gangstalking” – posted a reference to the following material on his blog, Cryptoscatology on January 26, 2014. These are unpublished notes written by the late John A. Keel (1930—2009), a journalist whom Guffey describes as “without a doubt the preeminent investigator of the paranormal in the 20th century.”

Guffey says this of the origins of gang stalking:

“Of course, at this point one can’t be certain of the phenomenon’s true origins; however, it appears that such organized harassment was indeed operative at least as far back as the 1960s and ‘70s when John A. Keel was at the peak of his investigative prowess.”

These accounts of organized stalking – apparently perpetrated by U.S. government agents – are from the same period as the FBI’s COINTELPRO activities, which of course took place during the Cold War. Consequently, it does not seem far-fetched that federal agents might have investigated and intimidated individuals who were closely monitoring unusual aircraft activity (UFOs).

Here are the notes. Since they were apparently not intended for publication, and since they are posted in a somewhat confusing format regarding sequence, I recommend that you disregard the entry numbers and part numbers and section numbers, and just read through them in this order:

Webpage #1
Webpage #2
Webpage #3

Blue Line
MK Ultra

CIA Insignia

The CIA’s official mission statement refers to spying on America’s “adversaries” – which generally refers to foreign adversaries. On the other hand, the mission statement also proclaims that the CIA “upholds the highest standards of conduct” – even though the agency has a well-documented history of involvement with things like torture, assassinations, drug trafficking, and orchestrating coups against democratically-elected governments.

Despite its mission statement, the long list of moral and legal transgressions by the CIA includes spying on Americans based on their political beliefs (in the past and recently), and – in the case of Project MK Ultra – performing secret unethical experiments on Americans.

As described in the section which follows this one, the CIA reportedly also has a role in the training of local Law Enforcement Intelligence Units (LEIUs).

Whatever your assessment of the possible nature and scope of illegal counterintelligence activities currently taking place in the U.S., it is worth considering the implications of the CIA’s history of performing secret mind-control experiments on American (and Canadian) citizens.

In Project MK Ultra, which ran from the early 1950s until the early 1970s, the CIA secretly conducted mind-control and interrogation experiments. Many of the experiments were performed without the consent of the subjects, and in some cases without the subjects even being aware that they were being used for experimentation.

Methods that were tested included sensory deprivation, isolation, hypnosis, verbal and sexual abuse, electrical shocks, and the administration of drugs and substances which caused confusion, brain damage, blistering, and paralysis.

That might explain why there are no MK Ultra tribute floats in America’s parades.
________________________________

“In all, the agency conducted 149 separate mind-control experiments, and as many as 25 involved unwitting subjects. First-hand testimony, fragmentary government documents and court records show that at least one participant died, others went mad, and still others suffered psychological damage after participating in the project, known as MK Ultra.”

– New York Times, March 10, 1999
________________________________

The above summary of MK Ultra from The Times should be viewed as
a conservative estimate of the scope of the program. The clue is the phrase “fragmentary government documents.” This is a vague reference to the fact that CIA Director Richard Helms – by his own admission – ordered the destruction of the program’s records in 1973.

Another reason to suspect that The Times’ account of MK Ultra might
be understating the CIA’s crimes is that the newspaper has a history of sometimes functioning as a conveyor belt for that agency’s lies.

Experiments were performed at dozens of colleges and universities, hospitals, prisons, and pharmaceutical companies in the U.S. and Canada. Front organizations were used by the CIA to operate the program through those institutions, although in some cases the top officials at the institutions knew about the CIA’s involvement.

Keep that in mind when you evaluate the plausibility that a widespread program of organized stalking could exist without being compromised by various officials at private and public institutions and organizations.

In the mid-1970s the program was exposed by the U.S. Senate’s Church Committee investigations. Those investigations (which also examined Cointelpro) were a response to a series of revelations about crimes by the U.S. government, including the attempted assassinations of foreign leaders, the U.S. Army’s spying on civilians, Cointelpro, and the Watergate scandal.

This passage from Andrew Goliszek’s book In the Name of Science (2003) gives a sense of what was involved in MK Ultra. These are descriptions of some of the of the experiments performed by Dr. Ewen Cameron, a psychiatrist paid by the CIA to study brainwashing:

In 1957, a young girl was led to a small room at Montreal’s Allan Memorial Institiute, her arms and legs strapped to a bed and electrodes from a Page-Russell electroconvulsive therapy machine attached to her head. When the signal was given, a switch was thrown, causing her frail body to stiffen then convulse uncontrollably from electroshock forty times more intense than was considered safe. Over the next few weeks, she was awakened three times a day and subjected to these multiple shocking sessions known as “depatterning.”

Another patient, this one an older man, was kept in a drug-induced state for several months while being forced to listen to an audiotaped message twelve to sixteeen hours per day. The purpose of this experiment, as well as the electroshock treatment, was to see how long it would take before repeated messages, physical shock, drugs, or a combination of all three would destroy a person’s personality…
________________________________________________________

Collateral Damage from MK Ultra – The Unabomber

A series of bombings perpetrated from 1978 to 1995 killed three people and injured 23 others. The bomber, a mathematician named Theodore Kaczynski, was referred to as “the Unabomber” by the FBI before they discovered his identity.

Kaczynski had been one of the subjects of the CIA’s mind-control experiments while he was a student at Harvard University. An article in the June 2000 issue of the Atlantic suggested that the experiments could possibly have been a factor in Kaczynski’s later acts of violence.

Some excerpts from the article:

“As Sally Johnson, the forensic psychiatrist, reported, Kaczynski clearly began to experience emotional distress…”

“When, soon after, Kaczynski began to worry about the possibility of mind control, he was not giving vent to paranoid delusions…..The university and the psychiatric establishment had been willing accomplices in an experiment that had treated human beings as unwitting guinea pigs, and had treated them brutally.”

“Kaczynski felt that justice demanded that he take revenge on society.”
________________________________________________________

Books about MK Ultra

One of the best books on MK Ultra is The Search for the “Manchurian Candidate” by John D. Marks, a former Foreign Service Officer with the U.S. State Department. Seymour Hersh – the famous investigative journalist who exposed the My Lai Massacre and Nixon’s secret bombing of Cambodia during the Vietnam war – said this of Marks’ book:

“A wonderful piece of investigative reporting. The best account we’ll
ever get of one of the seamiest episodes of American intelligence.”

Here are some examples of the book’s accounts of the CIA’s experiments:

“The frequent screams of patients that echoed through the hospital did not deter Cameron or most of his associates in their attempts to ‘depattern’ their subjects completely.”

“Sometimes, as in the case of Lauren G., patients would try to escape when the sedatives wore thin, and the staff would have
to chase after them.”

Another widely-praised book on MK Ultra is Operation Mind Control by Walter Bowart (1978). An updated and expanded “researcher’s edition” published in 1994 can be viewed and downloaded for free as a pdf document here.

Here is the Congressional report on Project MK Ultra.
________________________________________________________

In October 2014, it was reported that ABC is planning to produce a TV mini-series about MK Ultra.

Blue Line

Calls for a new Church Committee

Frank Church & Pres. Carter (1977)

President Carter and Senator Frank Church (1977)

If there are reasons to think that the FBI, CIA, and NSA stopped secretly perpetrating crimes against Americans at some point after the U.S. Senate’s Church Committee investigations in the 1970s, I am unaware of them. Although the investigations succeeded in shining a light on the extreme abuses of power by U.S. intelligence and law enforcement agencies, the reforms which followed were nowhere close to being serious enough to rein in the rogue tendencies of those agencies.

Arguably, the situation today is much worse than it was in the era of J. Edgar Hoover. Surveillance technologies are now vastly more sophisticated, and there has been an enormous expansion of both the size and power of the public and private sectors of the spying industry. Oversight of domestic covert operations is minimal.

Because of such concerns – and scandals such as the NSA’s secret mass surveillance programs – many individuals, publications, and organizations have called for another Church Committee-type investigation. Here is a partial list of those calling for new hearings or alleging that a new version of COINTELPRO is happening:

Forbes September 20, 2012

http://www.forbes.com/sites/jodywestby/2012/09/20/the-sheep-stop-here-another-church-committee-or-full-review-of-privacy-laws-needed/

CounterPunch January 21, 2013

The Return of COINTELPRO?

Electronic Frontier Foundation (EFF) June 7, 2013

https://www.eff.org/deeplinks/2013/06/response-nsa-we-need-new-church-commission-and-we-need-it-now

New Republic June 11, 2013

http://www.newrepublic.com/article/113433/nsa-scandal-requires-new-church-committee

Daniel Ellsberg July 1, 2013

http://www.thedailybeast.com/articles/2013/07/01/daniel-ellsberg-issues-call-for-a-new-church-committee-to-probe-nsa.html

The Atlantic August 2013

http://www.theatlantic.com/politics/archive/2013/08/lawbreaking-at-the-nsa-bring-on-a-new-church-committee/278750/

truthout February 25, 2014

http://www.truth-out.org/opinion/item/22103-is-it-time-for-a-new-church-committee

The Nation March 12, 2014

http://www.thenation.com/article/178813/why-we-need-new-church-committee-fix-our-broken-intelligence-system

Members of the original Church Committee March 17, 2014

https://www.eff.org/deeplinks/2014/03/ex-church-committee-staffers-call-congress-create-modern-day-church-committee

U.S. Senator Rand Paul (R-Kentucky) March 19, 2014

Rand Paul Calls for New “Church Committee” to Rein in Surveillance (VIDEO)

Michael German (former FBI agent) December 11, 2014

http://www.brennancenter.org/analysis/us-needs-new-church-committee

Blue Line
Red Squads – a.k.a. Law Enforcement Intelligence Units (LEIUs)

Philly LEIU patch

A “Red Squad” is a police intelligence unit. Since the late 1800s they have been used by urban police departments in the U.S. for spying and counterintelligence activities, such as infiltrating and disrupting groups deemed to be subversive.

The Haymarket Riot

The most famous example of Red Squad-type activity was in Chicago in 1886 when police officers and private security agents working for the Pinkerton Detective Agency used spying and violence to suppress a labor rights movement. That culminated in a violent riot at a labor rally in the Haymarket Square. When it was over, 7 policemen and at least 4 workers were dead. As many as 70 people were injured (approximately 60 of them police officers). After a trial – which was widely viewed as unfair – 8 labor activists were convicted for their alleged role in the violence. Of the 8 laborers, 4 were executed by hanging, 1 committed suicide, and 3 received prison sentences. The riot and the violence which preceded it – police had killed two laborers the day before – gave rise to the annual celebration of International Workers’ Day or May Day. The incident also led to the creation of the first official Red Squad.

Harper’s Magazine – May 1886

The two images below were published in Harper’s shortly after the riot.

HACAT_V46

The Haymarket Riot – Harper’s Weekly, May 15, 1886

Police officers killed for being paid thugs?

Historical information about the Haymarket affair is insufficient to make any assessment of how many – if any – of the seven police officers killed in the Haymarket Riot, or how many of the approximately 60 police officers injured, were corrupt goons terrorizing laborers on behalf of the Chicago political establishment. There is no way to say, in other words, to what extent the officers who were injured and killed might have been what gang stalking victims in the U.S. today refer to as “perps” (perpetrators of counterintelligence crimes).

Click image to enlarge

Perps

Police officers killed in the Haymarket Riot

Harper’s Magazine – May 2015

Now, 129 years after its first reporting on Red Squads, Harper’s is still covering the issue. A May 2015 article, “Beyond the Broken Window,” is about current spying by local police departments, and it also reviews the historical origins of the phenomenon:

“The Haymarket Square bombing of 1886…led to the creation of the first Red Squad, in Chicago, where police used the incident to round up suspected radicals and individuals identified with the labor movement.”

The article explains how other cities – the piece focuses on Los Angeles in particular – have also been infested with Red Squads, and that efforts to eradicate these secret police gangs have been unsuccessful:

“Police spying in Los Angeles goes back to the city’s Red Squads in the early twentieth century, when powerful trade organizations, seeking to thwart unionization efforts among the city’s working class, championed a broadly repressive agenda of police surveillance, wiretapping, and infiltration of orga­nized labor by undercover agents. Dur­ing the First World War, police in Los Angeles expanded their focus to in­clude ideological subversion, hunting for radicals and “disloyal” people and groups. By the end of the Sixties, the successor to the LAPD’s Red Squad, the Public Disorder Intelligence Divi­sion, had gathered some 2 million se­cret files over the course of fifty years on all manner of legitimate dissenters, from the Wobblies to antipoverty groups to antiwar protesters. In 1970, the P.D.I.D. spied on students and pro­fessors at UCLA who were suspected of “conspiratorial activities,” and agents provocateurs infiltrated student demonstrations. The target list in­cluded political organizations as well as church and social-welfare groups and charities, categorizing suspect in­dividuals as “controversial,” “agitator,” “anti-establishment,” “anti-police,” or “engaged in protest.” Dossiers were maintained on city-council members and the mayor.

In 1976, after these programs came to light, the city’s Board of Police Commissioners, a civilian panel that supervises the LAPD, ordered the de­partment to destroy its surveillance records, but in 1983 a grand jury found that officers had retained boxes of files and that the P.D.I.D. was still keeping tabs on more than 200 orga­nizations, including the Coalition Against Police Abuse and Citizens Commission on Police Repression. These two groups were part of a civil suit the next year that resulted in a $1.8 million settlement from the city, which forced the LAPD to enter into a consent decree that curtailed some of the worst surveillance practices. After the grand-jury revelations, the P.D.I.D. was finally disbanded, but was immediately reconstituted as the Anti-Terrorist Division…”

“Protectors of Privilege”

Well-researched studies of Red Squads – most notably, Protectors of Privilege (1990) by civil rights lawyer Frank Donner – show that federal, state, and local governments, and the business community, have often used red squads as political enforcers and corporate mercenaries. In many cases the targets are labor unions, leftists, and other dissidents.

Here, for example, is Donner’s description (on page 12) of the role of law enforcement personnel and private intelligence contractors in Chicago during the 1880s:

“The reliance by the Chicago business community on repressive police tactics to deal with labor unrest was unconcealed. Indeed, the Chicago police were as much the minions of the business community as hired Pinkertons.”

A Los Angeles Times review of Donner’s book explains why police officers would want to participate in Red Squads:

“The cops love these free-wheeling, elite units. They were ostensibly created to combat terrorism, but have been used mostly to infiltrate and suppress liberal and radical political organizations and civil rights groups. They lift their members out of the routine of police work into something of a James Bond life….

….The elite Red squads work on their own, usually reporting directly to the chief, operating outside normal department procedures.”

Ostensibly, the role of Red Squads has been to keep the public safe from criminal and terrorist organizations, although historically red squads have often been more involved in dishing out terror than preventing it.

Although many individuals targeted by organized stalking in the U.S. today are apparently unaware of the history of Red Squads, some activists in the past were very much aware of the legacy of such law enforcement units and the ongoing threat to civil liberties and democracy they presented (and still present).

A commemorative statue of a policeman was erected in Haymarket Square in 1889. On the 41st anniversary of the Haymarket affair – in 1927 – a streetcar driver apparently crashed into the monument intentionally. The statue was restored and eventually re-located. In 1969 the statue was destroyed by a bomb. In 1970, after it was re-built, it was blown up again. Apparently, not everyone is a fan of cops who serve as corporate thugs. The current version of the statue resides at the Chicago Police Department headquarters.

Association of Law Enforcement Intelligence Units

LEIU Paper Weight

“Law Enforcement Intelligence Unit” (LEIU) is the modern term for “Red Squad.”

Origin of the Association of LEIUs

In 1956, the same year the FBI initiated its COINTELPRO program, 26 Red Squads gathered in San Francisco and formed an organization for sharing confidential intelligence about crime. They adopted the name Law Enforcement Intelligence Unit. In 2008, the organization changed its name to the “Association of Law Enforcement Intelligence Units” but they retained the original acronym, LEIU.

In addition to maintaining a system of sharing criminal intelligence, LEIU provides training and technical assistance to its members.

Here is LEIU’s official website.

The Connection between LEIUs and Organized Stalking

Organized stalking is a set of counterintelligence tactics rather than a specific program. News articles, books, anecdotal accounts, and government reports cited throughout the Fight Gang Stalking website suggest that the tactics are used by local, state, and federal law enforcement agencies, and by U.S. intelligence agencies, as well as by private security-intelligence firms. Many of those reports about organized stalking also make clear that the operations are sometimes initiated for corporate or political agendas, and for purely personal vendettas.

Regardless of exactly how the majority of organized stalking operations are perpetrated, it is inconceivable that members of Law Enforcement Intelligence Units (LEIUs) would not be aware of those operations – if not participating in them or even orchestrating them.

A major red flag is the fact that the LEIU association is a quasi-governmental entity. Although the group received federal funding to create a networked database of criminal intelligence to share among its members, it is a private, tax-exempt organization, and therefore mostly independent of any real oversight.

“America’s Secret Police Network”

The LEIU maintains a very low profile outside the law enforcement community; few people in the general public are even aware of its existence. Civil liberties groups familiar with the LEIU have expressed serious concerns about the lack of any external accountability for its activities, such as its handling of sensitive intelligence.

Media reports about the LEIU began to emerge in the 1970s. Pulitzer Prize nominee George O’Toole, a novelist and historian who specialized in the history of American espionage and who had worked for the CIA, wrote an article about the LEIU. “America’s Secret Police Network” was published in the December 1976 issue of Penthouse. The article – a copy of which is posted at the end of this section – is a remarkable piece of journalism.

Over the 5 or 6 years preceding the publication of the article Americans had become aware of a whole set of major conspiracies perpetrated by their government, including Cointelpro, the Pentagon Papers, Watergate, MK Ultra, and the CIA’s domestic spying program Operation CHAOS. Yet the existence of the LEIU and the nature of its activities remained – and still remains – mostly below the radar of the press and the American public.

Here – in O’Toole’s words – is a description of the LEIU network. For anyone familiar with reports of organized stalking in the U.S., this ought to ring a few bells:

“The organization forms a vast network of intelligence units that exchange dossiers and conduct investigations on a reciprocal basis. Several of the police departments belonging to the group have recently been caught in illegal wiretapping, burglary, and spying on the private lives of ordinary citizens. The LEIU is, in effect, a huge, private domestic-intelligence agency.”

Extreme Secrecy

O’Toole’s article emphasized the extreme secrecy of the LEIU. He noted that in many cases, even other police officers were often unaware of the nature of the intelligence units:

“In Baltimore many veteran officers were completely unaware of the existence of the Inspectional Services Division….In fact, the Baltimore cops were themselves targets of ISD spying when they went out on strike in 1974; undercover officers from the unit photographed policemen as they walked picket lines outside their station houses….”

“….In Chicago, too, the Red Squad’s activities were shrouded from the rest of the police department. Recruits selected to serve in the unit bypassed training in the police academy so that former classmates couldn’t identify them later.”

Reportedly, when LEIUs are in danger of having their crimes exposed by state investigations and grand juries, they apparently make sure that attorneys, reporters, and witnesses are controlled and intimidated – including even their own members:

In Chicago a state’s attorney investigating the police received a report that his own phone had been tapped. A Baltimore newspaper reporter critical of the police was the target of surveillance and other harassment; on three occasions when he returned to his car parked in the police department’s parking lot, he found that the tire lugs had been loosened….

….In Chicago many officers who were called in the grand jury investigation of the Red Squad received the same anonymous telephone message: “We know you have seen the state’s attorney. If you want to stay healthy, you’d better not talk before the grand jury.”

O’Toole also reported that LEIUs burned their files to avoid having them seen by investigators.

Use of Civilian Spies

One of the elements of LEIU operations which is consistent with contemporary accounts of organized stalking – and with accounts of operations conducted by communist East Germany’s Stasi – is the use of civilian spies.

From the perspective of police intelligence units, the most useful civilians are those who share the police officers’ contempt for the United States Constitution:

A Chicago grandmother who was paid twenty-five dollars per month by the Red Squad to infiltrate church and community groups told reporters from the Chicago Daily News, “I am a police spy, and I am proud of it. I do police-spy work because, as far as I’m concerned, God and Country come first….You guys are so busy worrying about constitutional rights, along with the Communists, that they are going to take us over.”

Illegal Electronic Surveillance

Another practice of LEIUs reported by George O’Toole which is a common element of most or all organized stalking accounts is the use of illegal electronic surveillance:

“The most common type of criminality among LEIU intelligence squads is illegal wiretapping, which is almost always done with some degree of cooperation from the local telephone company. A former Baltimore vice-squad officer told the Maryland Senate investigating committee that the intelligence squad routinely installed illegal telephone taps with the aid of an ex-cop who worked for the Chesapeake and Potomac Telephone Company.”

In another incident mentioned in the article, Chicago police intelligence officers used blackmail to coerce employees of Illinois Bell to cooperate in illegal wiretapping.

Corporations “Surrendering Information About Their Clients”

Telephone company cooperation in illegal wiretapping is just one example of a long history of complicity of American corporations in government programs involving spying and lying. Famed Watergate journalist Carl Bernstein reported, for example, that CBS News was essentially a puppet of the CIA during the 1950s and ‘60s. That kind
of unethical collusion continues today: the NSA documents leaked in 2013 by Edward Snowden revealed that U.S. tech companies cooperated with the NSA’s data collection scheme called PRISM.

Apparently, LEIUs have long exploited American corporations’ willingness to violate the rights of their customers:

“A police textbook on [LEIU spying] advises intelligence officers to cultivate contacts in utility companies, airlines, banks, newspapers, bonding companies, private detective agencies, and credit bureaus. The Federal Privacy Protection Study Commission recently heard testimony from such companies as American Express and Sheraton Hotels, in which they admitted that they routinely surrendered information about their clients and guests to law-enforcement officers on a simple oral request, without requiring a court order.”

LEIU as a Weapon for Personal Vendettas

The nature of the LEIU was – and still is – a perfect design for the abuse of power: a secretive private organization with government funding, police powers and secret files on citizens across the country. The group has essentially no civilian oversight because it is exempt from the Freedom of Information Act.

LEIU is a perfect weapon to use against an individual who crosses anyone with connections to it. Here is O’Toole’s description of how a dossier can be opened on a targeted individual:

“Any LEIU member can open a file on an individual simply by filling out a form and obtaining the approval of the local LEIU regional chairman.”

Some of the organizational structure and procedures have no doubt changed in the past few decades, although the group is still shrouded in secrecy, so it is difficult to know exactly how it might differ now – apart from its use of digital databases and more technologically advanced spy gear. The group’s fundamental nature is still ideal for perpetrating acts of extra-judicial punishment by goon squads of corrupt police officers:

“In setting up the LEIU, the cops have created the skeleton of a national police force that is also, in essence, a vigilante organization.”

Connections between the LEIU, FBI, U.S. Military, & CIA

LEIU Paper Weight

FBI Logo

Army Intelligence InsigniaCIA Insignia

…………………………………………………………………………………………………………….

Agencies at all levels of government often have tribal attitudes toward other agencies. Each branch of the military, for example, tends to pursue its own agenda to a certain extent while simultaneously working to support a common goal of national security. The federal intelligence community also has well-known rivalries between agencies, each of which desires to see its relative prestige and influence maximized.

Those turf battles exist in the law enforcement community as well of course; sometimes there are tensions between the FBI and local police for example. In fact, O’Toole explains in his article that one of the motivations for establishing the LEIU association was to enable national intelligence sharing among police in a system which was independent from the FBI.

On the other hand, all of America’s law enforcement and intelligence agencies now have access to enormous amounts of information – for example, through the national network of data fusion centers. It would be impossible for the feds to be unaware of widespread use of organized stalking by local police – and vice versa.

Their silence on the issue implies that the feds approve of what is happening. The material in the Published News Reports section of this overview indicates that federal agencies use the same tactics against targeted individuals themselves – just as they were caught doing in the Cointelpro era.

In the absence of more whistle-blower revelations, it is impossible to know precisely how the various local, federal and private elements of America’s Stasi might be colluding with each other to perpetrate counterintelligence operations, but there have been some glimpses. The Electronic Frontier Foundation (EFF) pointed out that the secret NSA documents released by Edward Snowden showed a close relationship between the NSA and the FBI:

“A series of slides demonstrated that the FBI essentially serves as an attack dog for the NSA, doing the NSA’s domestic dirty work.”

LEIU’s Connection to U.S. Army Intelligence

Many accounts of organized stalking include reports of sophisticated electronic surveillance, black bag operations, and exotic weapons. O’Toole’s reporting offers an insight into how such tactics and equipment are acquired by police department intelligence units:

“U.S. Army Intelligence, which in the recent past has shown a disturbing propensity for spying on Americans, is more than a little chummy with the local cops in many cities. The Army trained several Baltimore intelligence-squad officers in techniques of electronic eavesdropping and surreptitious entry at its Fort Holabird spy school in Maryland. In return, the Baltimore cops passed along many of their intelligence reports to the army. In Chicago the Red Squad was in daily contact with the army’s 113th Military Intelligence Group during the late 1960s and early 1970s, passing along intelligence reports and receiving a variety of technical assistance.”

The CIA’s Involvement in Domestic Spying

The Central Intelligence Agency (CIA) has also been caught performing domestic spying. The previously-mentioned Operation CHAOS was shut-down in 1973, after the exposure of other conspiracies such as Cointelpro and the Watergate break-in. The true nature of CHAOS – a massive illegal program of spying on Americans based on their political views – was not known until December 1974 however, when it was exposed in a New York Times article by Seymour Hersh.

Incidentally, the Watergate break-in also had a CIA connection – the exact nature of which is still not clear according to some reports. What is not disputed though is that a key figure in the break-in, Howard Hunt, was a former career CIA officer, and one of the burglars, Eugenio R. Martinez was still on the CIA’s payroll at the time of the break-in. Another accomplice, Alfred C. Baldwin III, was an ex-FBI agent.

At a minimum, the Watergate break-in showed that in America, corrupt politicians (and corrupt corporate executives) can draw upon a deep supply of corrupt ex-spies and corrupt ex-law enforcement agents to perform illegal special assignments as mercenaries.

The ACLU’s Allegations of the CIA’s Domestic Spying

O’Toole was not alone in his suspicions about the CIA’s participation in spying on Americans, and such concerns are arguably even more justified today. The following are excerpts from a page within the website of the ACLU (American Civil Liberties Union) which provides an overview of the agencies and programs which the ACLU suggests are involved in “illegal domestic spying.”

Because of the excessive secrecy surrounding CIA operations, little is known about its domestic activities. In its 1947 charter, the CIA was prohibited from spying against Americans….

….But the law didn’t stop the CIA from spying on Americans. During the 1960s, in clear violation of its statutory mission to co-ordinate foreign intelligence operations only, the CIA ventured into the domestic spying business through “Operation Chaos,” in which it spied on as many as 7,000 Americans involved in the peace movement.

Unfortunately, the exposure of intelligence failings before the 9/11 attacks caused policy makers to promote “information sharing” among intelligence and law enforcement agencies as a cure-all, creating the likelihood that the CIA would increasingly operate domestically. Today we know that the CIA is a participant in FBI Joint Terrorism Task Forces, which engage in both foreign and domestic terrorism investigations. And the USA Patriot Act eased restrictions on the sharing of information the FBI collects in grand jury investigations and law enforcement wiretaps with the CIA. An ACLU lawsuit revealed that the CIA has also used National Security Letters to demand Americans’ personal financial records without prior court approval….

….The history of the CIA’s abuse of power and the continuing lack of public accountability over CIA operations make such revelations concerning to civil liberties advocates. The CIA’s involvement in the NYPD intelligence activities targeting innocent Muslim communities in the Northeast reveal the CIA is once again treating Americans as suspected enemies.

The CIA’s Connection to the LEIU

George O’Toole had serious concerns about the potential for federal agencies such as the CIA to exploit the LEIU – in addition to the threats posed by the LEIU itself because of its lawless spying.

His article noted that the CIA had very close ties to the police department in Fairfax County, Virginia, where the CIA headquarters is located. The Fairfax Police Department is a member of the LEIU.

“Ties between the CIA and the Fairfax County police are, to say the least, close. The agency has given the Fairfax cops training in electronic surveillance, surreptitious entry, lockpicking, safecracking, and explosives. It has provided equipment and personnel to assist the police department in several of its investigations.”

O’Toole’s article even includes details of a felony break-in perpetrated in February 1971 by several Fairfax County police officers and CIA agents. The break-in was led by the chief of the police department himself. Such collusion among various agencies and corporations to perpetrate crimes against American citizens is a deep corruption of democracy, as the author notes:

“[The LEIU is part of] a powerful dossier subculture in America,
a vast old-boy network that ties together intelligence agencies, police departments, credit bureaus, private detective agencies, bonding companies, and the many other collectors and compilers of personal information about private citizens. It is an aggregation of police power beyond the direct control of the democratic process.”

Here is O’Toole’s entire article: America’s Secret Police Network

For a much more recent example of the connections between the CIA and the LEIU, you can see from the LEIU’s own website that their training seminars include presentations by people such as Bob Dougherty, a former CIA Operations Officer.

The San Francisco Chronicle’s Reporting on the LEIU

On November 25, 1978 the San Francisco Chronicle published an article called “Leaks to the Mob: U.S. Police Network’s Big Problem.” The article – and several others on the same incident – documented the kind of problem which critics of the LEIU have warned about: the misuse of intelligence.

Whenever an agency of a government gathers intelligence on its citizens, the potential for abuse is enormous – as was proven by the FBI’s Cointelpro, the CIA’s Operation CHAOS, and other programs. The potential for abuse of power when the agency is privately-run is even greater.

As the Chronicle reported, the FBI found that an intelligence specialist with the Las Vegas Police Department was passing information from the LEIU database to mobsters. The FBI issued a memo urging “that all FBI agents be discreet in future dealings with [the LEIU].”

Leaks to the Mob

The New York Times’ Reporting on the LEIU

In April 1979 the New York Times published an article which reviewed a three-and-a-half-year study of the LEIU by the American Friends Service Committee. The study described the LEIU as “an old-boy network.”

Most of the article posted at the above link is behind a subscription paywall. Here are a few quotes which give a sense of the report’s conclusions:

“[The report] maintains that police surveillance of groups and individuals for political purposes is continuing on a vast scale in the nation.”

“[The report found that illegal surveillance was happening and that it posed] a grave threat to the constitutional rights of freedom of expression, due process and privacy.”

Protest Against the LEIU – Seattle, June 2003

On June 2, 2003 about 400 protestors gathered in Seattle outside the Red Lion Inn where the LEIU was holding a training seminar titled “Criminal Intelligence and the War on Terrorism.” The seminar was co-hosted by the FBI and other police agencies.

A dozen activists were arrested, and police used pepper spray and rubber bullets to disperse the crowd. Demonstrators were protesting the domestic spying policies of the Patriot Act and the Seattle Police Department’s membership in the LEIU.

Here is a video of the protest:

As quoted in the news report of the incident in the Seattle Post-Intelligencer, one of the protesters said that the LEIU association “acts basically as a secret political police in the United States.”

Blue Line
The Stasi

Stasi Insignia

Insignia of East Germany’s “Ministry for State Security”

Counterintelligence methods used by communist East Germany’s secret police agency – the Stasi – are among the elements of organized stalking operations in the U.S. today.

The Stasi referred to its psychological terrorism against individual dissidents as “Zersetzung” – which translates as “decomposition” or “corrosion.” As used by the Stasi, the term meant “to undermine or subvert.” Zersetzung is the noun; zersetzen is the verb.

Methods used by the Stasi – overt and covert surveillance, slander, and psychological operations (“psyops”) tactics – were essentially identical to those currently used in counterintelligence operations in America.

Arguably, the Stasi’s use of Zersetzung is much more relevant to modern gang stalking in the U.S. than is the FBI’s program of Cointelpro operations. In the decades since Cointelpro, a far more comprehensive and sophisticated domestic surveillance system has been developed in the U.S. than what existed during the era of J. Edgar Hoover. The nature of America’s spying network has moved much further toward that of a police state.

Although the Stasi’s technology for “signals intelligence” (interception of electronic communications) was primitive compared to that now used by the National Security Agency (NSA) to monitor Americans, the Stasi was famous for exploiting “human intelligence” to control East Germany’s citizens. A January 2008 article in Wired magazine described it this way:

“As the enforcement arm of the German Democratic Republic’s Communist Party, the Stasi at its height in 1989 employed 91,000 people to watch a country of 16.4 million. A sprawling bureaucracy almost three times the size of Hitler’s Gestapo was spying on a population a quarter that of Nazi Germany.

Unlike the prison camps of the Gestapo or the summary executions of the Soviet Union’s KGB, the Stasi strove for subtlety. “They offered incentives, made it clear people should cooperate, recruited informal helpers to infiltrate the entire society,” says Konrad Jarausch, a historian at the University of North Carolina at Chapel Hill. “They beat people up less often, sure, but they psychologically trampled people. Which is worse depends on what you prefer.”

That finesse helped the Stasi quell dissent, but it also fostered a pervasive and justified paranoia.”

_____________________

The interrogation center where the psychological
torture methods of Zersetzung were refined

These are the isolation cells in the Hohenschoenhausen
Prison in Berlin – which is now a museum.

Click on image to enlarge.

Stasi Prison

_____________________

The following excerpt from a Wikipedia entry on the Stasi provides a good description of its strategy and tactics – which were virtually identical to “gang stalking.”

By the 1970s, the Stasi had decided that methods of overt persecution which had been employed up to that time, such as arrest and torture, were too crude and obvious. It was realised that psychological harassment was far less likely to be recognised for what it was, so its victims, and their supporters, were less likely to be provoked into active resistance, given that they would often not be aware of the source of their problems, or even its exact nature. Zersetzung was designed to side-track and “switch off” perceived enemies so that they would lose the will to continue any “inappropriate” activities.

Tactics employed under Zersetzung generally involved the disruption of the victim’s private or family life. This often included psychological attacks such as breaking into homes and messing with the contents – moving furniture, altering the timing of an alarm, removing pictures from walls or replacing one variety of tea with another. Other practices included property damage, sabotage of cars, purposely incorrect medical treatment, smear campaigns including sending falsified compromising photos or documents to the victim’s family, denunciation, provocation, psychological warfare, psychological subversion, wiretapping, bugging, mysterious phone calls or unnecessary deliveries, even including sending a vibrator to a target’s wife. Usually victims had no idea the Stasi were responsible. Many thought they were losing their minds, and mental breakdowns and suicide could result.

One great advantage of the harassment perpetrated under Zersetzung was that its subtle nature meant that it was able to be denied. That was important given that the GDR was trying to improve its international standing during the 1970s and 80s.

Zersetzung techniques have since been adopted by other security agencies, particularly the Russian Federal Security Service (FSB).

For more information on the psychological torture methods used by the Stasi – many of which are being used today in the U.S. – you can visit this website.

________________________________________________________

The use of energy weapons by the Stasi

Nuclear-Symbol

Counterintelligence tactics used by the Stasi were remarkably similar to the tactics now being reported by victims of ongoing Cointelpro harassment in the U.S. Even the most exotic form of torture associated with organized stalking – the use of energy weapons – is an issue which appears in news reports about East Germany’s secret police.

An article published by BBC News in May 1999 describes the allegations about the Stasi’s possible use of energy weapons against dissidents:

When three of former East Germany’s best-known dissidents died within a few months of each other, of similar rare forms of leukaemia, suspicions were aroused among their friends that this was more than just a coincidence.

The writer Juergen Fuchs was convinced before his death this month that he had been deliberately exposed to high levels of radiation by the East German secret police, the Stasi, which could have caused his terminal cancer….

In 1989, when the Berlin Wall came down, members of East German citizens’ committees occupied prisons across the country.

Some of them were surprised to find powerful X-ray equipment there – not, as you might expect, in the medical centres, but in the rooms where prisoners had their photographs taken….

Thomas Auerbach works as a scientific researcher for the main authority investigating the Stasi. He saw X-ray equipment himself when he was taking part in a sit-in in an East German prison.

He has seen the documents which show that a variety of experiments were being carried out involving the potential uses of radiation as a means of poison and sabotage.

He believes that instead of X-rays, it was highly likely that radioactive isotopes were used to try to induce cancer in prisoners.

________________________________________________________

Books and Films about the Stasi

Zersetzung der Selle (“Decomposition of the Soul”)

Subtitle: Psychologie und Psychiatrie im Dienste der Stasi (“psychology and psychiatry in the service of the Stasi”)

This book about the Stasi’s methods of psychological torture was published in 1995. The authors, Klaus Behnke and Jürgen Fuchs, studied psychology in East Germany before being expelled in 1977. Unfortunately, as of this writing, the book has not been translated into English.

Zersetzung was the term used by the Stasi to describe the psychological operations (psyops) element of their counterintelligence subversion. The objective was to emotionally and socially destroy individuals who were perceived as dissidents, and to do so in a manner which would not be obvious to others.

Unfortunately, there does not seem to be an English language translation of this book. Similarly, the 2002 documentary based on this book does not seem to be available with English subtitles.

Zersetzung der Seele (Cover)

_________________________

Das Leben der Anderen (“The Lives of Others”)

This film about the Stasi won the Academy Award for Best Foreign Language Film (2006).

Here is a New York Times review of the movie.

The-lives-of-others-movie-poster

________________________________________________________

A man who was a target of the Stasi describes the infamous agency

In this 15-minute TED speech given in Berlin in June 2014, Hubertus Knabe, a German historian who was a victim of the Stasi (he was under surveillance for smuggling banned books), describes the infamous secret police agency, and its system of Zersetzung.

Here is the description which accompanies the video:

Tour the deep dark world of the East German state security agency known as Stasi. Uniquely powerful at spying on its citizens, until the fall of the Berlin Wall in 1989 the Stasi masterminded a system of surveillance and psychological pressure that kept the country under control for decades. Hubertus Knabe studies the Stasi — and was spied on by them. He shares stunning details from the fall of a surveillance state, and shows how easy it was for neighbor to turn on neighbor.

“Hubertus Knabe: The dark secrets of a surveillance state”

Here is a transcript of the speech posted at the TED website.

The TED website showed that as of September 2014, this video had already been viewed over 700,000 times.

________________________________________________________

Chief of the Stasi

From 1957 until the fall of the Berlin Wall in 1989, the head of East Germany’s secret police was Erich Mielke. He was essentially the communist version of FBI Director J. Edgar Hoover. Mielke presided over a network of 85,000 full-time domestic spies and 170,000 civilian informants.

Erich Mielke

Erich Mielke

When a film company, LOOKS Filmproduktionen, began producing a documentary on Mielke, it submitted a Freedom of Information Act (FOIA) request to the CIA for its records on the notorious Stasi leader, but the CIA denied the request.

In July 2014 Courthouse News reported that the film company filed a lawsuit to force the CIA to release its records on Mielke.

Blue Line

7. The National and International Scope of
. Gang Stalking

world map 01

Well-documented historical and contemporary reporting – including some of the examples cited in the Published News Reports section of this overview – suggest that organized stalking is used by various foreign intelligence services and law enforcement agencies. In the following section, for example, is a credible first-hand journalist’s account of organized stalking tactics being used by Russian intelligence agents. No one disputes that such tactics were widely used by East Germany’s Stasi.

Two mainstream news articles I posted in the Cointelpro News page of this website (October 10, 2004 and May 31, 2006) are about gang stalking tactics used by intelligence and law enforcement agencies in Northern Ireland and Canada. As I explain in the Gang Stalking Documents page of this website, a classified U.S. diplomatic cable published by WikiLeaks in 2010 also contained an apparent reference to the use of such tactics in Canada.

Incidentally, the U.S. Senate Church Committee investigations found that the government of Canada was also complicit in the infamous CIA program, MK Ultra.

Anectdotal evidence of the use of organized stalking by other Western governments also includes accounts such as this self-published book about gang stalking allegedly perpetrated on behalf of the Dutch royal family.

From my perspective, another indication of the international scope of gang stalking is the Internet traffic and emails to this website from countries all over the world.

Based on my personal experience and numerous accounts by self-proclaimed victims, organized stalking occurs across the U.S., so moving from one area to another is not likely to help. Similarly, international cooperation among law enforcement and intelligence agencies means that moving from the U.S. to Canada is probably not going to be helpful.

A quick note on that point: anyone in America who is considering moving to another country to escape illegal stalking by the U.S. government’s Stasi goons should probably avoid the four nations with the closest ties to the U.S. intelligence community: Canada, the U.K, Australia, and New Zealand. Lynnae Williams, a former CIA clandestine service trainee and former Defense Intelligence Agency analyst, is a self-proclaimed target of organized stalking by the FBI. She ultimately moved to Spain to find refuge.

Unfortunately for the criminals, traitors, and greedy contractors who run the U.S. intelligence community, Ms. Williams revealed that those agencies use sock puppets to monitor social media and to spread false information on the Internet – a claim which has also been confirmed by other sources. Hacked emails from intelligence contractors, for example, revealed elaborate disinformation schemes using sock puppets, and a smoking-gun NSA document leaked by Edward Snowden proved that the NSA collaborates with its British counterpart GCHQ to systematically spread lies the same way.

8. Investigation, Surveillance, and Harassment Tactics

Africa Day 23 – Leaving Serengeti

________________________________________________________

Investigation

Apparently, gang stalking begins with a deep investigation of the targeted individual.

An investigation serves multiple purposes in counterintelligence:

(1) Information gathered about the target can later be used to tailor the surveillance and harassment (subversion) strategies. In some cases, an investigation could also reveal that the target is unsuitable for gang stalking because he or she has connections and resources which would enable the target to fight back.

(2) In the unlikely event that acts of harassment get exposed, formal documentation that an “investigation” was being performed could possibly be cited to explain some of the suspicious activity (for example, overt stalking could be easily explained as “covert surveillance” that happened to be noticed by the target).

(3) Law enforcement and intelligence personnel – public and private – at various levels are sometimes under pressure to show that they are being productive, so there could well be a de facto quota for conducting investigations of “suspicious” persons.

(4) Acts of subversion can be seamlessly incorporated into what is ostensibly an investigation. As noted above, overt stalking is a prime example. Stalking was one of the tactics used by the FBI in their subversion campaign against the actress Jean Seberg during their Cointelpro operations, for example. (After years of such harassment she committed suicide.) Another tactic – also used during Cointelpro against various targeted individuals – was slander. An investigation provides a legally bullet-proof opportunity to slander the victim. If an investigator quietly begins questioning persons associated with a targeted individual (co-workers, friends, etc.), and tells them that he is conducting an investigation, it could easily destroy the target’s reputation and relationships.

Obtaining information from the targeted individual and from persons who know the targeted individual is a process undercover investigators and spies call “elicitation.” This pdf document from the FBI explains the strategies and tactics of elicitation: FBI Elicitation Tactics

________________________________________________________

Surveillance

“Surveillance equals power. The more you know about
someone, the more you can control and manipulate them
in all sorts of ways. That is one reason a Surveillance
State is so menacing to basic political liberties.”
– Glenn Greenwald

As with investigations, the surveillance element of organized stalking involves the same tactics used around the world by many private investigators, intelligence agents, and law enforcement personnel: black bag jobs, electronic surveillance (phone wiretaps, hacking of personal computers, listening devices, spy cameras, GPS-monitoring of vehicle location, etc.), combined with direct visual surveillance (“human intelligence”) by various accomplices.

Most personnel involved in managing and performing organized stalking are paid for their services – whether they work directly for an agency such as the FBI, or for private intelligence-security contractor firms, or as criminal “informants.” Others though, are recruited to assist as volunteers. For example, when the FBI’s illegal Cointelpro operations were exposed, internal documents showed that the agency had enlisted a local police chief, letter carriers, and a switchboard operator at Swarthmore College to spy on campus and black activist groups in the Philadelphia area.

________________________________________________________

Harassment (a.k.a. “Subversion”) Tactics

In counterintelligence, to “subvert” or “neutralize” an enemy is to make it impossible for that enemy to go about his business. Gang stalkers seek to keep their victim in a constant state of agitation and hyper-vigilance so that he or she will find it almost impossible to function.

This serves multiple purposes. For one thing, it makes it hard for the individual to pose a threat to the client of the gang stalkers – whether that is a corporation or a government.

Note that – as discussed in detail elsewhere in this website – the distinction between corporations and the government is often meaningless in America, given the vast industry of private intelligence contractors with secret clearances, the use of the FBI and other agencies to serve corporate interests, and the lucrative revolving-door nature of employment between the public and private spheres in law enforcement and intelligence. This is another obvious purpose of gang stalking: income for the perpetrators.

Another function of gang stalking is to exact revenge against the victim. Stalking is a form of extra-judical punishment for anyone who crosses someone with connections to the vast homeland security infrastructure.

Constant surveillance of targeted individuals (described above) is also an element of subversion. Anyone who knows that he or she is under constant surveillance will not only be inhibited from acting against the interests of the client of the gang stalkers, he or she will also find it difficult to fight back against the harassment or evade the surveillance itself because many efforts at counter-measures will be observed by the stalkers. In addition, anyone who is aware that he or she is constantly being watched by illegal spying will suffer the emotional trauma caused by having virtually no privacy.

“Harassment” is an appropriate description of many of the individual acts perpetrated against gang stalking victims since they are intended to annoy, anger, and frustrate the targeted individual – rather than, say, physically injure him or her. On the other hand, “harassment” does not begin to convey the severity of the cumulative psychological effects of organized stalking.

Slander, verbal abuse, noise, threats by strangers, constant surveillance, and other tactics, performed daily over a period of years will cause psychological torture, social isolation, and financial destruction.

According to some anonymous sources, the overall process is sometimes called “slow kill.” Regardless of whether that term is actually used by perperators of gang stalking, it is an appropriate description.

Historical origins of psychological torture methods

Some of the psychological operations tactics described below have ancient roots. For example, the use of noise to torment enemies dates back to the warfare of early civilizations – including the siege of Jericho in the Old Testament. Apparently, noise is still used in U.S. military psychological operations, although details about such tactics are mostly classified.

As noted above, it is clear that many of the tactics used in organized stalking were also used by East Germany’s Stasi (state police), who referred to the overall process as “zersetzung der seele” (decomposition of the soul).

Some of the core principles of organized stalking harassment are also used in military interrogations – such as those conducted on terrorist suspects at Guantánamo. Several of these concepts were documented by the sociologist Albert D. Biderman, in a 1957 journal article about coercive interrogation methods used by the Chinese to obtain confessions from American prisoners during the Korean War.

Among the methods documented by Biderman were isolation (depriving the victim of social support), “monopolization of perception” (fixing the victim’s attention upon his or her immediate predicament), sleep deprivation, threats, “demonstration of omnipotence” (to suggest the futility of resistance), and degradation (including “demeaning punishments, insults and taunts, and denial of privacy).

A copy of Biderman’s Chart of Coercion is on page 48 of this report.

Tactics chosen for their lack of evidence

For the most part, organized stalking tactics are chosen for their lack of directly observable and legally persuasive evidence. The idea is to completely destroy someone without leaving fingerprints.

Intelligence-gathering and policing are often done in ways that make it inherently difficult to prove misconduct. Gang stalking employs a refined set of practices specifically chosen for the lack of legally incriminating evidence, and for the likelihood that victims’ accounts will be perceived as simply paranoid impressions of routine events when described to others.

Victims’ accounts tend to be dismissed since their experiences sound like commonplace occurrences – because that is indeed what they are: strangers who are rude, noisy neighbors, bad service, being cut-off in traffic, etc. These are things which happen to everyone. But for gang stalking victims, these things happen constantly – which becomes a form of real psychological torture, which must be experienced to comprehend.

Below are the primary tactics associated with counterintelligence subversion. Keep in mind that, by all accounts, a gang stalking campaign starts employing these tactics long before the victim has any clue that he or she is being systematically targeted. Many of the early instances of harassment are only understood by the victim later when the whole process becomes clear. By that point, often the harassment and slandering might have been going on for years.

Slander

LA Times article on Seberg

As mentioned above, an investigation – or even the pretense of an investigation – is a perfect opportunity to slander a target. If someone who even appears to be an investigator or undercover cop begins quietly asking neighbors, employers, relatives, and co-workers about a targeted individual, it will almost certainly begin to corrode that person’s reputation, even if no explicit allegations are made.

Sometimes slander in a counterintelligence operation can be much more aggressive. A textbook example is the FBI’s successful campaign to destroy the career and life of film actress Jean Seberg during their Cointelpro operations. That case is noteworthy both because it involved a high-profile target – Seberg was a successful actress in the prime of her career – and also because internal FBI memos and news reports explicitly revealed that they were deliberately spreading lies about her.

Tactics used in the spying-and-lying industry are unfamiliar to the general public. Many people will assume that anyone posing as an “investigator” is legitimate. If you doubt that, watch this video clip of an ABC program which features a demonstration of how easily citizens can be recruited to assist in crimes against strangers.

Blacklisting

A tactic closely related to slander is blacklisting. For centuries blacklists have been used to identify and discriminate against individuals (and organizations) deemed to be undesirable. In U.S. history the most famous example was the blacklisting of leftists in the entertainment industry during the 1940s and 1950s.

The tactic is perfectly suited to counterintelligence subversion because it undermines the targeted individual in a way that will likely force the victim to be preoccupied with economic survival rather than political activism or whistle-blowing.

Mobbing

Newsweek magazine published an article in August 2000 titled “They Call it Mobbing.” The article (which you can see in the “Gang Stalking News” section of this website) describes a process of intense systematic harassment of a targeted employee by multiple co-workers and managers at his or her workplace. The abuse involves slandering and isolating an employee and verbal abuse. Apparently, this is a common element of gang stalking campaigns against targeted individuals. Since the tactic is apparently widespread – and since it is apparently connected in some cases to workplace violence – I have devoted the entire next section to it in this overview.

Black Bag Jobs

A common element among victims’ accounts of organized stalking is the experience of having their residences broken into. In the counterintelligence business, the slang term for this is a “black bag job.”

A “black bag job” is a clandestine entry into the residence, office, storage facility, or vehicle of a targeted individual or organization. The term is a reference to a small black bag filled with burglary tools. One of the most famous historical examples of a black bag operation was the Watergate break-in. Common goals of such operations include obtaining information and planting surveillance devices. They can also be used to steal or plant evidence, and to perpetrate acts of vandalism for psychological operations purposes.

Illegal black bag operations were conducted by the FBI during its original Cointelpro operations. For example, volume 6 of the U.S. Senate’s Church Committee investigations contains a letter about black bag jobs (referred to as such) which explicitly states that the FBI knew that the operations were clearly illegal.

Are such operations still illegal? That depends upon whether you subscribe to the subversive notion that the U.S. Constitution means what it says. In theory, the Fourth Amendment protects Americans from “unreasonable searches and seizures” conducted without a warrant based “upon probable cause.” As a practical matter though, individual rights in America have been massively eroded since the 9/11 terrorist attacks by such policies as the “USA Patriot Act.”

Under the Patriot Act, there has been an expansion of the use by law enforcement agencies of a Constitutionally-dubious tactic commonly referred to as a “sneak and peek” warrant. Officially called a “Delayed-Notice Search Warrant,” it allows police to covertly enter private residences, perform searches, and seize property without notifying the residents.

Here are a few discussions of this police state tactic:

An explanation of sneak and peek warrants by the ACLU (March 2002)

A criticism of the legal legitimacy of sneak and peek warrants by Donald E. Wilkes, Jr., Professor of Law, University of Georgia School of Law. (September 2002)

An article about a wrongly-accused man from Oregon who won a
$2 million settlement against the U.S. government because of his harassment by federal agents – which included black bag jobs. (November 2010)

“Federal authorities planted listening devices in his office, throughout his house – including in his bedroom – and tapped his phones. He and his family were kept under surveillance. Agents conducted “sneak and peak” searches, entering the home when the family was away.”

A more recent review of sneak and peek warrants, which notes that requests for such warrants are granted almost automatically. A study in 2010 found that judges denied such requests in less than one percent of all cases. (June 2014)

Gas-Lighting

Another example of a classic psyops tactic often reported by gang stalking victims is “gas-lighting” – in which perpetrators enter the victim’s residence and re-locate certain objects to make victims doubt their own memory and create confusion – or to send a message that the victim’s life has been invaded and is now under intense surveillance. Such activities usually stop short of theft – which could lead to police reports. If items are stolen, they are typically limited to items that would be inexpensive and therefore unlikely objects of theft – so reports of the incident will seem implausible and evidence of mental instability.

In this short video clip, Luke Harding, a journalist with the Guardian, describes his personal experience with gas-lighting tactics being used against him by Russian intelligence agents while he was living in Moscow. I first saw this video on the “Gang Stalking is Murder” website.

Harding naturally found the experience unsettling, but keep in mind that he had the total support of his wife and his employer. Most victims of gang stalking are more isolated and if they attempt to describe the experience to others, are met with skepticism. The most likely reaction is to assume that the victim simply forgot where he placed something, or whether he left the window open, etc.

Abusive Phone Calls

As with adolescent pranks, phone calls to the victim’s residence are an easy way to harass the victim. Messages can range from insults to threats, although they are subtle, not explicit, in case the calls are being recorded.

Computer Hacking

Accounts of computer hacking seem to be nearly universal among victims of organized stalking.

U.S. government agents and private security contractors use the tactic both to gather information and to perpetrate psychological operations, such as threats and harassment.

This tactic was apparently used against Larry Klayman, a public interest lawyer and conservative political activist, after he filed a lawsuit against the National Security Agency (NSA) to challenge that agency’s program of mass surveillance. According to Klayman, after he filed his lawsuit, his email account was hacked. Someone began sending emails from his account to other people he knew – a move which Klayman interpreted as being an effort by U.S. intelligence agents to intimidate him by letting him know he was being closely watched.

in December 2013 a federal judge ruled in favor of Klayman in his lawsuit against the NSA, finding that the agency’s collection of Americans’ phone records was apparently a violation of the U.S. Constitution’s Fourth Amendment. Ultimately though, an appellate court reversed that decision.

Framing

As with most of these gang stalking tactics, you can use your imagination regarding the countless ways someone can be framed. Planting evidence can be done either to further a slander campaign, or to actually set up the victim for arrest and prosecution. Additionally, planting evidence can be intentionally done in ways that the victim himself will easily find the evidence – just to send the threatening message that target is vulnerable to this type of attack.

For a recent high-profile example of a “stitch-up” by intelligence agencies, consider the case of WikiLeaks founder Julian Assange. WikiLeaks’ exposure of U.S. diplomatic cables in 2010 did not go over well with U.S. officials. The cables included some inconvenient information – such as corroboration of evidence that the U.S. had launched a missile strike in Yemen the year before that killed dozens of civilians – and that the U.S. conspired with Yemen’s government to conceal the fact that the U.S. was behind the attack.

To gain leverage for extraditing Assange from the U.K., he was made the target of apparently trumped-up charges in Sweden. Apologists and useful idiots for the governments of the U.S., U.K., and Sweden were publicly treating the charges against Assange as plausible and legitimate, but people familiar with how spy agencies operate immediately recognized the game that was being played.

A high-profile example of U.S. counterintelligence agents framing someone for political reasons was described in this June 2013 article in the New York Review of Books:

“A well-known example of COINTELPRO was the FBI’s planting in 1964 of false documents about William Albertson, a long-time Communist Party official, that persuaded the Communist Party that Albertson was an FBI informant. Amid major publicity, Albertson was expelled from the party, lost all his friends, and was fired from his job. Until his death in an automobile accident in 1972, he tried to prove that he was not a snitch, but the case was not resolved until 1989, when the FBI agreed to pay Albertson’s widow $170,000 to settle her lawsuit against the government.”

Threats

Other such threats are apparently common in gang stalking cases. They can take any form imaginable, but will inevitably be anonymous and difficult to prove. At one point, the gang stalking crew in my neighborhood began dropping life insurance pamphlets on the walkway inside my courtyard.

Blackmail

Another trick in the J. Edgar Hoover playbook is blackmail. A famous example was its use by the feds against Martin Luther King, Jr. Pages 220-221 of this U.S. Senate report show that the FBI apparently attempted to blackmail King, and encourage him to commit suicide.
Final Report – Book 2

Vandalism

Since gang stalking victims are normally under virtually constant surveillance, and since they are rarely in a position to afford counter-surveillance measures to capture evidence of the harassment being done, it’s easy to commit minor acts of vandalism against their premises and belongings. This can be dumping trash on the lawn, scratching the paint of their car, or whatever. Victims should not assume that perpetrators are above doing physical harm to their pets either; I know this both from personal experience and from accounts by a few individuals I have reasons to regard as very credible.

Baiting

Baiting is any effort to evoke a response by the victim which can be used to discredit or legally ensnare him. In a sense, all gang stalking tactics are forms of baiting because their cumulative effect will eventually drive the victim to respond in ways that will create additional trouble.

Mimicking

Victims of gang stalking sometimes report that perpetrators mimic
their words and actions as a form of zersetzung (psychological degradation). This was reported for example in the Washington Post Magazine’s 2007 cover article on gang stalking. Novelist Gloria Naylor – a self-proclaimed victim of organized stalking – related that she had been harassed that way:

“On an airplane, fellow passengers mimicked her every movement — like mimes on a street.”

Street Theater

A general category of harassment, “street theater” can include some of the tactics described above and below, and simply refers to any sort of staged encounter with one or more perpetrators in public. Typically, both the comments and actions of the perpetrators are carefully scripted to resonate with the victim, but appear benign if captured on video or seen by witnesses.

Blocking/Cutting-Off/Invasion of Personal Space

One example of gang stalking “street theater” is to cut-off the victim – when he or she is walking, driving, or riding a bicycle. A related tactic is to crowd the victim by rudely invading his or her space or brushing against the person. Since this occasionally happens to everyone in the normal course of events, accounts by the victim will likely sound paranoid when described to others. Also, anyone nearby will be unlikely to notice – let alone understand that the action was deliberate.

This tactic was described – among other places – in some information posted in the late 1990s by a small group based in Canada called Spy & Counterspy – whose website indicated that they wanted to reveal tactics used by corrupt and repressive law enforcement agencies. This was part of the group’s self-description:

“We are located just across the border in Canada (nine miles outside the reach of the FBI, BATF, DEA, and other goon squads).”

The group – which claimed to have sources in the intelligence and law enforcement industry – reported that the FBI uses a tactic called “managed aggression” when they are trying to apply pressure to the subject of a surveillance operation.

This is their description of this psychological operations tactic:

Here is an example of how an FBI surveillance team will deliberately provoke you.

When you’re walking through a mall or a downtown shopping district, the surveillance team will intentionally interfere with your route. A pavement artist will “absent-mindedly” cross your path, forcing you to change course to avoid walking into him. A group of agents will “inadvertently” obstruct your path – they’ll be standing together chatting, forcing you to walk around them. Other pavement artists will “accidentally” create near-misses as you walk along. Some of these “pedestrians” will create situations with a potential for a head-on collision, forcing you to dodge them.

As the psychological pressure continues to build, agents may “innocently” bump into you, jostle you, or step on your heel from behind. A group of pavement artists will cue up ahead of you, creating a line-up that delays you as you try to make a purchase, order fast food, buy tickets, and so on.

Activity like this can quickly create frustration, even anger, in you. But because the incidents occur in public locations, it’s difficult to prove who’s behind them. You never see any agent more than once. You don’t know where the next provocation is going to come from. You’re beginning to get upset, irritated, unstable. You’re more likely to make mistakes in judgment. And that’s exactly what the surveillance team wants.

As the authors also mentioned, the tactic’s effectiveness is much greater when it is unexpected:

This is a wicked mind-game. It can be very effective if you’re not anticipating it.

Targets of gang stalking should expect this tactic and have a clear idea in mind of how they will respond. Here is a good response to this tactic – or for that matter, any type of street harassment by a “pavement artist.”

Put your cell phone to your ear as if you are on a phone call (if you don’t have a cell phone immediately accessible, just put your hand to your ear as if you were holding a cell phone – it doesn’t need to be convincing), look directly at the perp’s face and smile and say – very loudly:

“They sent a brown-noser! Can you hear me? Sorry, I have a bad cell phone connection – I’ll try to talk loudly. I said: They sent a brown-noser! Yeah, just some retard who will do anything he’s told. He doesn’t even know who he’s working for. Just some brown-noser! I said: he’s just some brown-noser!”

Keep smiling and looking at the perp and wink at him. Message delivered. 🙂

Sensitization

As described in some of the sections below, perpetrators of organized stalking sometimes make use of various cutting-edge technologies, but psychological torture does not require electronic hardware. Nor does it even require unconventional psychology.

A basic concept in Neuro-Linguistic Programming (NLP) is that a particular stimulus – such as a sound or gesture – can become associated or “anchored” in the thoughts and reactions of an individual through repetition. Gang stalkers exploit this phenomenon by repeatedly performing a particular action – such as generating a particular sound as part of a noise harassment campaign.

Since the victim is made aware that the sound is an element of the harassment, his or her mind will naturally begin responding to that sound as a “trigger” for a negative emotional reaction. It’s a way to keep the victim constantly agitated because he or she will have the negative response whenever stalkers generate the sound – or even when the sound occurs in the normal course of events.

Synchronization

Similar to sensitization, “synchronizing” is when gang stalking perp’s always perform a particular action at the same moment as a particular action by the victim. For example, whenever the victim leaves his residence, a stalker in the area will cough or honk a horn or slam a door. It is a way of reminding the targeted individual that he or she is under constant surveillance.

Noise Harassment

One of the major weapons in the arsenal of gang stalkers is noise.

The tactic is ancient; it has been used in siege warfare for centuries. If you want to see a good dramatic portrayal of it, watch the final episode of Season 2 of Game of Thrones, in which a horn was sounded constantly to break-down a character (Theon) in the castle Winterfell, which was under siege.

It was widely reported that loud music was used by the U.S. military in its invasion of Panama in 1989 to harass General Manuel Noriega and flush him from the Vatican Embassy where he was holed-up. Accounts differ about exactly how and why the tactic was used in that instance, but no one questions the potential effectiveness of noise to create distress.

As with many of the tactics described here, the cumulative effects are difficult to fully appreciate if you haven’t personally been on the sharp end of them. Among other things, the tactic can be used to cause sleep deprivation, which in turn can create additional problems, both physical and psychological.

If gang stalkers have access to a residence adjacent to that of the victim (especially, for example, in an apartment building or condominium complex), they can easily generate noises that will be heard only by the target.

As is typical of psychological operations tactics used by FBI minions, harassment by noise is virtually impossible to prove. You could record the noise, but you could not prove where and when you made the recording – let alone where the sound came from or who was generating it. Moreover, even if you could prove all of that, it would be difficult or impossible to legally establish that the perpetrator was conspiring with anyone else to deliberately harass you.

High-Technology Noise Harassment: Hypersonic Sound

Hyper Sonic Sound Device

Hypersonic Sound Device

In an organized stalking operation, harassment by noise can be much more sophisticated than simply banging on the wall or playing loud music. Sound projection technology developed in 1990s can generate noise which can only be heard by the person being targeted.

This technology – called “hypersonic sound” – involves using a processor to convert a sound into a complex ultrasonic signal (that is, beyond the range of human hearing). Unlike sound from a conventional audio speaker, the sound travels in a column rather than spreading out, so its direction can be precisely controlled. You will only hear it if your ears are inline with the sound column – or if the signals is bounced off a hard surface.

If a victim of organized stalking tells others about sounds that he or she hears – but which no one else hears – it is a safe bet that the individual will be viewed as crazy. That makes this a perfect weapon for torturing someone psychologically because it can destroy the victim’s credibility along with his or her sanity.

In addition, the skeptical responses to the victim’s attempts to describe such harassment will almost certainly cause the victim to become intensely angry – which will further errode the victim’s mental health.

If you are a victim of this type of harassment, you might want to direct your friends and relatives to these two sources:

This document from a corporation that markets the technology has a clear explanation of how it works: Hypersonic Sound

At 20 minutes into this TV program which aired in 2009 is an interview with an engineer describing and demonstrating how such devices work. If the link becomes unavailable at some point, you can search for this program on which it aired: Jesse Ventura’s Conspiracy Theory, season #1, episode #4 (“Big Brother”). Roll your eyes at the source if you want, but everything about it is credible, and additional reading – as you will easily find out – only confirms it.

As explained in the “Tactics For Fighting Back” page of this website, noise-reducing headphones can provide some relief from noise harassment; however, the best response to such harassment (and to gang stalking generally) is a low-tech offensive strategy: blanket your neighborhood with flyers (either by mail or hand-delivery or both) and send emails to all local officials, news outlets, churches, schools, Congress members, etc. calling attention to this form of domestic terrorism (gang stalking).

Very High-Technology Noise Harassment: the “Voice of God Weapon”

Voice of God

The hypersonic technology described above should not be confused with an even more exotic psychological operations weapon that is sometimes called “Voice of God” or “Message from God.” Both technologies can cause a targeted individual to hear things which will be inaudible to others, but the Voice of God uses microwaves – which at certain frequencies can produce an auditory effect that sounds as if it is coming from within the person’s head.

Note: this technology is also often referred to as “V2K” – a shorthand version of the term “Voice to Skull.”

An excerpt from a Washington Post article published on January 14, 2007:

An academic paper written for the Air Force in the mid-1990s mentions the idea of a weapon that would use sound waves to send words into a person’s head. “The signal can be a ‘message from God’ that can warn the enemy of impending doom, or encourage the enemy to surrender,” the author concluded.

In 2002, the Air Force Research Laboratory patented precisely such a technology: using microwaves to send words into someone’s head. That work is frequently cited on mind-control Web sites. Rich Garcia, a spokesman for the research laboratory’s directed energy directorate, declined to discuss that patent or current or related research in the field, citing the lab’s policy not to comment on its microwave work.

In response to a Freedom of Information Act request filed for this article, the Air Force released unclassified documents surrounding that 2002 patent — records that note that the patent was based on human experimentation in October 1994 at the Air Force lab, where scientists were able to transmit phrases into the heads of human subjects, albeit with marginal intelligibility. Research appeared to continue at least through 2002. Where this work has gone since is unclear — the research laboratory, citing classification, refused to discuss it or release other materials.

Wired magazine also published articles on the “Voice of God” technology – in December 2007 and February 2008.

Other High-Tech Gadgetry: Invisibility (Seriously)

Invisible Man

Other exotic technologies are also used by the sociopaths in America’s rogue alphabet agencies (and their parasitic intelligence-security contractor firms). An interesting example was described in the well-researched cover article by Robert Guffey about “state-sponsored gang stalking” published in the October 2013 issue of Fortean Times.

In 1987 an American electronics engineer, Richard Schowengerdt, began experimenting with “electro-optical-camouflage.” In 1994 he patented this “cloaking” technology – also called “invisibility technology.” The Fortean Times article “Strange Tales of Homeland Security” describes how that technology was apparently used in a gang stalking operation by the U.S. government to psychologically torture a criminal suspect by enabling stalkers to lurk in the victim’s residence unseen.

Strange Tales of Homeland Security by Robert Guffey

The facts of that case suggest that the perpetrators were federal agents testing the technology – and presumably indulging their psychopathic tendencies.

Here is Robert Guffey’s interview with Schowengerdt – in which the inventor mentions the potential use of his technology for psychological warfare.

Of course, there is no reason to think that such technology is being widely used. I include the information here mainly because (a) it was apparently used in gang stalking by the U.S. government as documented in a well-researched published article, and (b) it gives you an idea of the level of technology available for surveillance and psychological warfare in state-sponsored gang stalking.

For anyone specifically interested in invisibility technology, here is another article – published in December 2013 – about a similar technology being developed in China.

Other High-Tech Gadgetry: Seeing Through Walls

Seeing Through Walls

A photo from February 10, 2010 Stars and Stripes

Caption for the above photo: “A soldier shows how a new scanner can see motion of an individual behind a wall. The device is set to be fielded in Afghanistan this year.”

Internal documents from the Cointelpro era proved that the FBI secretly used illegal “black bag jobs” (breaking into the residences of targeted individuals) to perform surveillance and to perpetrate psychological warfare – such as the tactic of “gas-lighting” described earlier.

Although the tactic is just as illegal now as it was then (invasive spying without a search warrant), it is apparently used routinely in gang stalking, based on virtually all victim accounts.

Consequently, it would be very easy to deploy miniature spy cameras (which are now very advanced and small and inexpensive) in the victim’s residence. So the use of technology which can see through walls is probably unnecessary in most cases, but the technology does exist.

A June 2005 article in Popular Mechanics by Frank Vizard stated that “through-the-wall” technology “has been aggressively researched by military and university labs since the mid-1990s.” The article is on page 30.

Click here to view a pdf file of the magazine:

Popular Mechanics June 2005

This August 2012 article in Popular Science describes a form of this technology which uses Wi-Fi radio signals – which are now available in most U.S. homes. Reportedly, Wi-Fi radar can “determine a person’s location, speed, and direction – even through a one-foot-thick brick wall.”

Such technology could be perfect for gang stalking because, as the article notes, the device cannot be detected, since it does not emit any radio waves.

Other High-Tech Gadgetry: Directed-Energy Weapons (DEWs)

DARPA Laser Gun

DARPA Laser Gun – from Business Insider, September 14, 2012

As I noted in the section about East Germany’s secret police, the Stasi used counterintelligence tactics remarkably similar to the tactics reported by victims of ongoing Cointelpro harassment in the U.S. Even the most exotic form of torture associated with organized stalking – the use of energy weapons – is an issue which appears in news reports about East Germany’s secret police. An article published by BBC News in May 1999, for example, describes allegations about the Stasi’s possible use of energy weapons against dissidents.

Claims about energy weapons being used against targeted individuals in the U.S. are difficult to prove – as one would expect, but there are a number of reasons the subject deserves serious consideration.

From a July 2005 Associated Press article:

“For years, the U.S. military has explored a new kind of firepower that is instantaneous, precise and virtually inexhaustible: beams of electromagnetic energy. “Directed-energy” pulses can be throttled up or down depending on the situation, much like the phasers on “Star Trek” could be set to kill or merely stun….

The hallmark of all directed-energy weapons is that the target — whether a human or a mechanical object — has no chance to avoid the shot because it moves at the speed of light. At some frequencies, it can penetrate walls.”

A Directed-Energy Weapon (DEW) emits energy at a target without using a projectile, and can produce a variety of lethal or non-lethal effects. Such weapons have existed for decades, and are used by militaries and law enforcement agencies around the world. DEWs use various forms of energy, such as laser beams, electromagnetic radiation, and particle beams, as well as sound.

Weapons of this type are often referred to as “non-lethal weapons” to distinguish them from weapons such as knives, batons, firearms, artillery, and such; however, the intensity of some energy weapons can produce lethal effects.

Naturally, much of the information about these weapons is classified. One example of the publicly-available documents on the subject is the previously-mentioned declassified Pentagon report about electronic weapons (dated 1998) called “Bioeffects of Selected Non-Lethal Weapons” – which was obtained via a Freedom of Information Act request.

Here is the Defense Department’s website about non-lethal weapons.

Occasional references to the subject do appear in the news. An example is this May 17, 2013 article in the Marine Corps Times about the Joint Non-Lethal Weapons Directorate at Quantico, Virginia. The article explains that the directorate performs “research into everything from electroshock weapons to the Active Denial System, a directed energy weapon that causes painful sensations to targeted individuals without burning the skin.”

This September 2012 article in Business Insider – “America’s Scariest Weapons” – gives an idea of some of the electronics weapons being developed by the U.S. government, such as a “heat ray.”

If you are interested in an example of how someone could construct a homemade short-range electromagnetic weapon (for research purposes or for self-defense or whatever), this might be a good place to start.

You will need to be pretty resourceful working in your garage to keep pace with the feds though. In September 2013 it was reported that the U.S. Defense Department granted a $49 million contract to General Dynamics for developing directed energy weapons.

That is some of the non-disputed information about DEWs. The role of such weapons in U.S. domestic counterintelligence operations is in the realm of speculation and anecdotal evidence.

Many descriptions exist on the Internet which purport to be accounts by gang stalking victims claiming to have been attacked with such weapons. Accounts include descriptions of burning sensations, headaches, nausea, sudden fatigue, a fluttering sensation in the chest, etc.

My observations about DEWs and organized stalking:

(1) The extensive use of disinformation by gang stalkers raises problems when assessing the plausibility of claims about the use of DEWs against targeted individuals. To the extent that the use of DEWs is perceived by non-victims of gang stalking as being implausible, discussion of their use (whether accurate or not) could undermine efforts to expose gang stalking generally. Secondly, even if DEWs are rarely used, it could further the counterintelligence objectives to discuss them on the Internet, if only to raise the anxiety of victims, who might begin wondering whether their headaches, high-blood pressure, and other problems are being induced by DEWs.

(2) It is inherently difficult to distinguish between some of the effects of DEWs and the effects of psychological harassment (“psyops”) tactics. Stress induced by psychological torment can manifest in some of the same ways – accelerated heart rates and headaches, for example.

However…

(3) The use of DEWs against gang stalking victims is technologically plausible. No one disputes the existence of such devices, and they’re consistent with the tactics of gang stalking. For example, harassment by noises generated from adjacent residences is a common gang stalking tactic, so it isn’t much of a stretch to imagine the use of energy weapons in the same situation, as the energy would easily pass through most walls.

(4) Such a tactic would be a logical choice for use in organized stalking, since it would be difficult or impossible to prove that such attacks were happening.

(5) Reportedly, the intensity and lethality of such weapons varies greatly, but even the most extreme applications would be consistent with the malevolent campaigns against gang stalking victims. Anyone willing to terrorize someone relentlessly with psychological torment – even knowing that it could lead to suicide or heart attack (or lethal violence by the victim against others in response), would presumably not have moral reservations about using DEWs.

(6) My own personal contacts with self-proclaimed targeted individuals include three cases in which persons whom I believe (for multiple reasons) to be highly credible reported having apparently been attacked by some form of non-lethal weapons.

Counter-measures

Since the role of DEWs in organized stalking is surrounded by at least as much disinformation as any other area of the subject, it is difficult to know how widespread the use of such weapons could be – let alone how to defend against them. The technical issues involved in possible counter-measures are beyond my ken, but for what it is worth, a credible source – Wired – states in this May 2012 article that a Faraday cage blocks all electromagnetic radiation.

Other High-Tech Gadgetry: Brain Implants

This final “tactic” is in a separate category from all of those above because its use as a weapon of organized stalking is apparently fictional. I include it here because the subject appears in numerous online references to gang stalking – although most or all such websites are clearly pieces of deliberate disinformation.

Creating numerous websites which are purportedly authored by people who believe themselves to be controlled by chips implanted in their brains is an easy way to discredit reports of the more mundane – but still evil and illegal – tactics of America’s counterintelligence goon squads. Such disinformation strategies are extremely effective when most of the public is ignorant of basic counterintelligence methods.

The technology of implanted electronic devices to manipulate brain functions is very real. The neuroscience research was pioneered by Jose M.R. Delgado, a professor of physiology at Yale University.

As disinformation, the subject has traction both because brain implant technology has existed for decades and because the U.S. intelligence community has a well-documented history of secret unethical mind-control experiments on humans (MK Ultra).

Anyone wishing to learn about electronic brain implants should probably begin with this October 2005 article from Scientific American: “The Forgotten Era of Brain Chips.”

Scientific American (Oct. 2005)

Even Higher-Tech Gadgetry: Smart Dust

Smart Dust

I mention this only to give a sense of the kind of threats on the horizon – for everyone, not just for those unlucky enough to already be victims of America’s Stasi.

All the mental giants who advocate that U.S. intelligence agencies and their contractors – and the Pentagon and its contractors – should be granted unlimited power and secrecy and money should pause to consider the types of technologies that those people will be playing with in the future.

Here is a technology that is potentially a more sophisticated version of brain chip implants, and which at a minimum will enable Big Brother (and his network of friends) to perform all sorts of monitoring.

“Smart Dust” is a system of tiny wireless electromechanical systems which can function as sensors and perform certain tasks using radio-frequency identification.

A July 2013 article in MIT Technology Review: “How Smart Dust Could Spy on Your Brain”

________________________________________________________

A final note on the efficacy of gang stalking tactics

At the end of his aforementioned book Stopping a Stalker, retired police captain Robert L. Snow describes the psychological aftermath
of stalking.

Keep in mind: Snow is describing the impact of being stalked by a single individual with limited resources – not the long-term effects of being stalked by numerous perpetrators with seemingly unlimited resources, conspiring with each other across a criminal network which has the support of the government and uses refined psychological operations (“psyops”) tactics combined with high-tech surveillance.

“During my 30 years as a police officer I have dealt with thousands of crime victims, and have felt a deep compassion for the majority of these people, who have been robbed, raped, shot, swindled, beaten, and burglarized. Yet, by the time I saw these victims, the crime was over and the healing process had already begun.

With stalking victims, however, the crime wasn’t over with, but continued on and on. Victims of stalking say the experience is like a prolonged rape, a never-ending and terrifying loss of control over one’s life. Stalking is one of the most psychologically crippling things that can happen to a person. Being stalked takes away a person’s freedom, a person’s security, and often a person’s will to live.”

9. Mobbing and Workplace Violence

r-CRIME-SCENE-TAPE-large570

“Workplace Harassment” versus “Mobbing”

“Mobbing” is intense systematic harassment of an employee by multiple co-workers and managers. Presumably only a fraction of workplace harassment cases involve the kind of coordinated and severe emotional abuse that could be categorized as mobbing.

Mobbing is sometimes – but probably not always – an element of organized stalking. I would guess that only a fraction of cases of mobbing are part of the even more extreme phenomenon of organized stalking, which includes invasive illegal surveillance and sophisticated psychological operations tactics.

Depending on the circumstances, workplace mobbing – even when not accompanied by stalking outside the workplace – can involve serious psychological abuse. In some cases, the bullying leads to a violent response by the victim, as apparently happened in the cases described below.

The objective of mobbing is to emotionally torture a targeted employee – either to force him or her to quit, or for vengeance, or both.

________________________________________________________

News Reports on Mobbing

Articles occasionally appear in the mainstream press about mobbing. This August 2000 article from Newsweek/Daily Beast is an early example of reporting on what was already becoming an international trend.

________________________________________________________

Corporate Psychopaths

The 2012 presentation in the video clip below is a fascinating 14-minute explanation of the dynamics of intense workplace bullying by psychopaths in the corporate world. The presenter, Clive Boddy, is an expert on the phenomenon. Boddy is a professor of Leadership and Organizational Behavior at Middlesex University in England.

________________________________________________________

Connections Between Mobbing and Organized Stalking

Although apparently accurate, the above video is exclusively about abusive behavior within an organization, such as a corporation. An abusive boss can make the workplace a hellish place for subordinates, but if the psychopathic boss also has connections to public law enforcement and private security personnel, the potential for abuse extends far beyond the range of common workplace harassment.

Opportunities for psychopaths in corporations to abuse the legal system and to abuse modern security technology in order to target individuals for personal reasons have greatly increased recently.

As explained elsewhere in this website, the U.S. law enforcement and intelligence community has worked to expand its powers and information sources by establishing closer ties with corporations – for example, through partnerships such as InfraGard and DSAC. Among the consequences is that it is theoretically now easier for at least some corporate managers to use procedures such as “threat assessment teams” to toss an employee into the legal meat-grinder – for example, by declaring him or her to be an apparent “insider threat.” This is especially true if the manager has established a personal relationship with local or federal law enforcement contact persons.

As described in the section of this webpage about the U.S. Department of Justice, America’s “post-constitutional” law enforcement paradigm’s emphasis on things such as surveillance, secrecy, watch-lists, “predictive policing,” and the aggressive investigation and prosecution of whistle-blowers all create an environment ripe for abuse by managers with personal vendettas.

Another problem for any individual who crosses someone with connections to America’s law enforcement and intelligence community is that the entire industry is long on enforcers and short on legitimate targets. Organized stalking – illegal counterintelligence subversion – dates back to at least the FBI’s Cointelpro era of the 1950s and ‘60s, but the size and power of America’s “homeland security” infrastructure was radically expanded after the September 2001 terrorist attacks, and now includes numerous government agencies and private contractors whose place at the federal budget pig trough needs to be justified. Any dissident, whistle-blower, or even marginally-suspicious individual who wanders into the cross-hairs of the police state these days is likely to be portrayed as a grave threat to national security by the bureaucrats and thugs who populate the security industry.

Compounding the threat to employees who are potential “targeted individuals” is the trend discussed previously in this website of corporations hiring private spies – many of whom are current or former government law enforcement and intelligence agents who often have contacts with their government counterparts. Here again is the best report I have seen on the topic: Spooky Business

America’s diminishing economic opportunities for middle and lower class workers could also be increasing the supply of people willing to serve as pawns and snitches in group harassment activities – whether orchestrated privately or by law enforcement agencies. It seems likely that financially desperate subordinates are more easily manipulated.

Advances in surveillance technology pose another threat to individuals targeted by corporations. Employers now often snoop on employees’ email communications, Internet activity, and Facebook pages for example. Also, any corporation willing to hire private investigators can easily spy on employees’ personal lives in various ways.

Finally, to whatever extent workplace mobbing leads to violence – as discussed below – there are potentially self-fulfilling and self-reinforcing dynamics at work. A violent outburst by the employee being harassed can be cited as confirmation that he was correctly singled out for investigation and surveillance, and the violent incident can also be cited – locally and nationally – as evidence for the need to increase the use of aggressive security measures.

________________________________________________________

A Federal Lawsuit about Mobbing and Gang Stalking

In December 2013 a federal contractor, Jeffrey Kantor, filed a lawsuit in Virginia against multiple U.S. agencies for secretly and illegally subjecting him to invasive surveillance, overt stalking, and intentional systematic infliction of severe emotional abuse – including by means of carefully orchestrated verbal abuse by his co-workers.

Kantor’s case appears to be a clear example of mobbing as part of a state-sanctioned organized stalking campaign against a targeted individual – in fact, the complaint filed refers to “gang stalking” as such. I posted a complete account of the case here.

Regardless of the ultimate outcome of Jeffrey Kantor’s legal claim, it is significant that a widely-reported lawsuit was filed against members of the U.S. intelligence community alleging precisely the same illegal counterintelligence psychological operations tactics reported by virtually all self-proclaimed victims of organized stalking.

________________________________________________________

News Reports on the Connection between Mobbing and Workplace Violence

Mainstream news reports and commentary on workplace violence – such as mass shootings – tends to follow a predictable template. The primary questions addressed are whether such incidents can be reduced by the following measures: (1) more restrictive gun control laws, (2) better mental health care policies, (3) more rigorous security protocols – such as background checks and metal detectors, and (4) a reduction in the amount of violence in popular culture, such as movies and video games.

When mass-shootings occur in schools and involve minors, the role of bullying as a causal factor is sometimes discussed, but for the most part, in cases of workplace violence, the subject is conspicuously absent from reporting and analysis. News agencies rarely give serious consideration to whether intense bullying by the shooter’s managers and co-workers contributed to the violence.

Even in cases of violence in schools, news media attention to the role of bullying is small relative to its importance. A 2011 survey of high school students found that teenagers who are the victims of bullying are up to 31 times more likely to bring weapons to school.

Such statistics give an idea of how deeply corrupt U.S. intelligence and law enforcement agencies must be to acquiesce in organized harassment of targeted individuals; those agencies have to be aware of the high potential for violence it creates.

That failure to discuss what is arguably the most obvious possible causal factor in workplace shootings is partly attributable to intellectually-lazy journalism, but it also involves ideological priorities. People wishing to see stricter firearms regulations enacted, for example, are inclined to view mass-shootings as opportunities for public discussion of those policies. Similarly, those whose agendas include increased surveillance and security systems will seek to use these incidents to bolster their case for a more muscular police state.

Another reason for ignoring the role of bullying in workplace violence incidents is presumably that the organizations involved – companies, schools, and government agencies where such incidents occur – have every incentive to downplay their own negligent tolerance of the bullying.

Reporting on workplace violence is probably self-censored to some extent, because the news agencies involved do not wish to raise the unpleasant issue of whether the victims of such shootings might have brought the violence upon themselves by their abusive behavior.

An exception to the lack of good reporting on this subject was published by the Huffington Post in August 2011. Anthropologist Janice Harper dared to ask the most important question about a mass shooting which had occurred a year earlier in Manchester, Connecticut. Omar Thornton, a delivery truck driver, fatally shot eight of his co-workers and then killed himself.

“Was Thornton bullied in the workplace, mobbed by management and co-workers to the point of mass murder? Given the savagery of his final acts, does it really matter if he was harassed, discriminated against, bullied or mobbed?

It does if it can prevent future acts of workplace vengeance. Last year, when Lt. Governor M. Jodi Rell asked, “In the wake of this tragedy, we are all left asking the same questions: How could someone do this? Why did they do this?” his question was treated almost as if it were rhetorical. Any serious effort to answer it was blasted away with a flippant hate-filled remark as if trying to understand what drives workers to kill somehow excuses the killing and trivializes the trauma the survivors will forever suffer.”

As Harper noted, the shooter, Omar Thornton, reportedly did not have a history of violence or mental illness.

Any intelligent person should be curious about why an otherwise non-violent individual would suddenly lash-out at others with lethal force. It turns out that Thornton had apparently been the target of intense harassment by his co-workers. There does not seem to be any reported evidence that the shooter was the target of organized stalking, but the case – like other similar cases – has implications for the issue of gang stalking. Among those implications is that cases of intense harassment of an individual by multiple perpetrators often fail to generate any serious inquiry – even when the process culminates in extreme violence.

________________________________________________________

Academic Reports on the Connection between Mobbing and Workplace Violence

Peer-reviewed studies by Dr. Kenneth Westhues, Professor Emeritus of Sociology, University of Waterloo, Canada, have found a link between mobbing (group bullying) and mass shootings in recent years in North America in workplaces and educational institutions.

As noted by Keith Labella at Gang Stalking is Murder, the link between mobbing and workplace violence “eluded authorities, university officials, and, obviously, the mainstream media.” Westhues estimates that at least a third of all rampage shootings can be attributed to mobbing.

“In nearly every mass shooting, Westhues found that a programmatic system of workplace or academic bullying had systematically isolated, scapegoated and humiliated the victim and virtually groomed the shooter for the role of monster. The role of psychiatry, police, and administrative bureaucracy as “threat assessment teams” and “safety prevention” was not only an utter failure, but, moreover, prompted the very acts of mass violence they sought to prevent.”

The following passage is from Professor Westhues’s report Mobbing and the Virginia Tech Massacre (November 2007).

“On April 16, 2007, Seung-Hui Cho, a fourth-year student in the English Department at Virginia Polytechnic Institute and State University, murdered 32 professors and students and injured a further 25, then took his own life….

Cho appears to have been the target of an uncommon but distinct and devastating social process called workplace mobbing. It is the impassioned ganging up of managers and/or peers against a targeted worker, the object being the target’s absolute humiliation and elimination from respectable company.”

________________________________________________________

An example of a case which deserves a closer look

To cite one example (of many), a workplace shooting in Long Beach, California invites suspicion about the possible involvement of mobbing. Even if there are other explanations, this particular case is interesting for several reasons.

Incidentally, at the time of this shooting, I lived close to downtown Long Beach, and I witnessed some of the police and ambulance activity associated with the event. I became curious about the relative silence about it in the media.

On February 16, 2012, on the seventh floor of the Glenn M. Anderson Federal Building in downtown Long Beach, Ezequiel Garcia, an agent of Immigration and Customs Enforcement (ICE), shot his boss, Kevin Kozak, six times. Reportedly (see the article linked below for details), Mr. Garcia’s attack on his boss was in response to the fact that Mr. Kozak (who was the second-in-command of ICE’s Los Angeles region) had turned-down Garcia’s request for a transfer within the department.

Apparently, Garcia shot Kozak “following a discussion about Garcia’s job performance.” Another agent, Perry Woo, then rushed into the room and fatally shot Garcia. Kozak survived.

This workplace violence incident involved two government officers being shot – one fatally – in a federal building in the downtown area of a major city, yet barely registered as a blip on the media’s radar. Furthermore, both ICE and the FBI – which investigated the case – declined to provide any details about what happened.

After spending a year investigating the incident, the FBI determined that the fatal shooting of Garcia was justified. By the way, the FBI always finds that its shootings are justified. As the CBS article below notes, The FBI’s spokeswoman, Laura Eimiller, would only say that the details about what led to the incident “would be kept confidential because no criminal charges are planned.”

Apart from several paragraphs in the middle of the article linked below, most of the media did not seem to be curious about the incident – or about the silence of the government agencies involved. Apparently the matter did pique the interest of a few people other than myself though; the article cites concerns about the secrecy surrounding the event expressed by representatives of the Citizens for Responsibility and Ethics in Washington (CREW) and the Open Government Project at the Electronic Privacy Information Center (EPIC).

Maybe the ICE agent, Mr. Garcia, was just having a bad day. Perhaps someone cut him off in traffic on his way to work that morning and he was a bit wound-up about it, so he shot his boss six times during his job performance review.

On the other hand, maybe he snapped after a period of systematic harassment, and the feds did not want that made public. At a minimum, the case illustrates the secrecy which often surrounds the activities of America’s law enforcement agencies.

This is an article about the incident from CBS Los Angeles Local News.

________________________________________________________

Mass shooting at the Washington Navy Yard – September 2013

Washington Navy Yard

This website would not be complete without mentioning this incident; news coverage of the shooting – and the public commentary about it – included speculation about the possibility that the shooter had been the target of a “gang stalking” /MK Ultra-type operation.

Here is what has been reported:

A shooting rampage at the Washington D.C. Navy Yard on September 16, 2013 left a dozen people killed (13 including the shooter), and 8 others wounded. Naturally, the shooting received extensive national news coverage.

The shooter, Aaron Alexis, had claimed to have been stalked by multiple perpetrators, and had reported that he was the victim of electronic harassment and noise harassment tactics of the sort often described by other individuals targeted in counterintelligence operations.

Alexis even carved “My ELF Weapon” into the receiver of his shotgun, as seen in this photo. ELF is a common abbreviation for “extremely low frequency.”

navy yard shooting

The incident involved other red flags for many observers. For example, while some people suggested the voices Alexis reported hearing were symptomatic of schizophrenia, others noted that schizophrenia typically begins in early adulthood, roughly between the ages of 15 and 25. Alexis, who was an information technology employee with a security clearance at a defense-related computer company, was 34 years old. Also, persons afflicted with schizophrenia are not typically violent; if anything, they are more likely to be a danger to themselves.

It should also be noted that Alexis never reported that he believed that the voices he heard were coming from some supernatural source – which would have been more suggestive of mental illness. His accounts were much more consistent with the kind of sonic projection device demonstrated here by an engineer who designs them. At 20 minutes and 8 seconds into this TV program which aired in 2009 is an interview with an engineer describing and demonstrating how such devices work. If the link becomes unavailable at some point, you can search for this program on which it aired: Jesse Ventura’s Conspiracy Theory, season #1, episode #4 (“Big Brother”). Roll your eyes at the source if you want, but everything about it is credible, and additional reading – as you will easily find out – only confirms it.

No manifesto was left by the shooter citing any political or religious agenda that might have motivated him to shoot twenty people at his workplace. His words and actions are more plausibly explained by his claim that he was in fact being systematically harassed, and he eventually snapped.

Other facts about the incident also drew suspicion. For example, the FBI bypassed the ATF (the Bureau of Alcohol, Tobacco, Firearms and Explosives) and performed their own trace of the shotgun used – even though the ATF is the federal agency in charge of tracing guns used in crimes. An Associated Press article included this quote:

“I have never seen an instance where ATF had not been relied upon to trace the gun,” said Mike Bouchard, a former ATF assistant director for field operations. “I have never heard of a situation like that.”

Since the investigation of the shooting is being handled by the FBI – which is notoriously secretive and has a history of perpetrating organized stalking crimes against Americans (Cointelpro) – it is difficult to guess how much critical information about the case is being kept secret from the public.

It has not been reported, for example, whether some of the shooting victims had been intensely harassing (“mobbing”) the shooter – as was done to the plaintiff in the federal gang stalking case filed in December 2013.

Multiple news sources – such as the New York Times – made note of the curious timeline of events surrounding the shooting. The shooter’s employer and the Newport Rhode Island Police Department and the navy were all aware that Alexis had reported being harassed by “voices” and noises, yet no one suspended his security clearance or otherwise intervened.

Similarly – and this has never been explained as far as I know – a tactical response team of the Capitol Police was reportedly in the area at the time, but was ordered to stand down (not participate in the police response).

Here are some excerpts from a BBC News report on September 18 which described the non-response:

Multiple sources in the Capitol Police department have told the BBC that its highly trained and heavily armed four-man Containment and Emergency Response Team (Cert) was near the Navy Yard when the initial report of an active shooter came in about 8:20 local time.

According to a Capitol Police source, an officer with the Metropolitan Police Department (MPD), Washington DC’s main municipal force, told the Capitol Cert officers they were the only police on the site equipped with long guns and requested their help stopping the gunman.

When the Capitol Police team radioed their superiors, they were told by a watch commander to leave the scene, the BBC was told.

The gunman, Aaron Alexis, was reported killed after 9:00.

A few days later, a Congressman confirmed that the local SWAT unit had been inexplicably ordered not to respond. Rep. Michael McCaul (R-Texas) told CNN’s Jake Tapper that he personally spoke with a SWAT team member who confirmed that they were told to stand down (not respond) to the mass shooting at the Washington Navy Yard.

A week after the shooting, The Washington Times (in their Communities section) published an article exploring the gang stalking (electronic harassment) speculation surrounding the shooting.

A few days later, Wired magazine posted an article which also examined the gang stalking aspects of the navy yard shooting. Here are some excerpts:

Some conspiracists suggest that Alexis was a “targeted individual,” or “TI,” the term-of-art used by anguished people who believe they’re being “gang stalked” by shadowy enemies, often in the government. The elements of Alexis’ police report — covert microwave weapons, conspiracies and sleep disturbances — are common elements in gang stalking accounts. (Of course, they’re also common elements in schizophrenia.)….

The microwave weaponry theory would be just as absurd as some of the other conspiracies if the Pentagon hadn’t been researching the possibility of using similar voice-projection technology in the past as a nonlethal weapon.

According to one report on the project, such a weapon would create a condition similar to schizophrenia. “Application of the microwave hearing technology could facilitate a private message transmission. It may be useful to provide a disruptive condition to a person not aware of the technology. Not only might it be disruptive to the sense of hearing, it could be psychologically devastating if one suddenly heard ‘voices within one’s head.’”

The year before, Wired featured an article specifically about the so-called “Voice of God” device.

Nine days after the shooting, CNN reported that the assistant director in charge of the FBI’s Washington field office, Valerie Parlave, was asked whether Aaron Alexis had “talked to or e-mailed anyone ahead of the attack” and she responded “No.”

A month later however, The New York Post reported that the shooter had sent three emails to the group called Freedom From Covert Harassment & Surveillance (FFCHS) – which is ostensibly a gang stalking victims support group – although, as explained in the web page about the organization in this website, is clearly a disinformation front group.

So the fed’s – who apparently monitor everyone’s phone calls, emails, and Internet activity – failed to intervene in any way despite the shooter’s emails (and despite other obvious warning flags mentioned above) in a case involving an employee with a security clearance who was working at military facilities and reporting that he was being harassed and hearing voices.

As The Post noted, this added to the list of questions about the official account of the whole incident:

“[The emails] also suggest that the bloody rampage was plotted as a revenge attack against the US Navy — contrary to FBI statements that the former sailor did not appear to have had a specific target.”

On November 20, 2013, The Washington Times reported that U.S. Rep. Darrell E. Issa (R-Calif.), chairman of the Oversight and Government Reform Committee is seeking information from the Office of Personnel Management (OPM) about the security clearance possessed by Aaron Alexis:

“But Mr. Issa says OPM is refusing to turn over those documents and allowing them to be viewed only behind closed doors.”

In January 2014, Politico reported that a local NBC news journalist in Washington D.C., Scott MacFarlane, received an email which the U.S. Navy sent to him by accident.

The internal email – from the Navy’s FOIA (Freedom of Information Act) office – outlined the strategy which they planned to use to limit the amount of information released to MacFarlane, who had filed a FOIA request for internal Navy memos sent on the day of the shooting.

MacFarlane tweeted about the incident with this message:

“EPIC FAILURE- U.S. Navy accidentally sends reporter its strategy memo for dodging his FOIA request”

He included this screenshot of the email.

Click on image to enlarge

Dodging FOIA Request

The most charitable analysis would be that this was simply routine “cover your ass” protocol for a government entity seeking to avoid embarrassing revelations about its incompetent management of security at a naval facility.

On 31 January 2014, the Associated Press reported that Aaron Alexis’s medical records revealed that the Veterans Affairs doctors who examined him weeks before the shooting determined that he did not appear to have any mental health issues.

“Speech and thoughts clear and focused…” was the description of the attending doctor.

The AP obtained Alexis’s medical records via a Freedom of Information Act request. Normally, the government does not disclose medical records, but the Veterans Affairs Department made an exception because of the public interest in the mass shooting.

As the New York Times reported (in the article cited previously), about six weeks before the shooting, Alexis was staying at a hotel and complained about being harassed by noise – a common psychological operations tactic. The harassment apparently was leaving him sleep-deprived, and he reported his insomnia to his VA doctors, as his records showed.

“An attending doctor provided additional details, saying Alexis suffered from fatigue after sleeping only two or three hours every night over the past three weeks.”

Alexis’s medical record – like the other facts of the case – are consistent with his account of having been intensely harassed.

What does not make sense is the official explanation – namely, that out of the blue, someone who appeared to be normal – and even was given a security clearance – suddenly went on a murderous rampage for no reason whatsoever.

U.S. Navy’s FOIA office nominated for “Golden Padlock Award”

In June 2014, Investigative Reporters and Editors (IRE) named the U.S. Navy’s FOIA office as one of the three winners of the 2014 Golden Padlock Award – which celebrates “the most secretive government agency or individual in the U.S.”

The nomination was made “for blocking access to records” about the Navy Yard shooting. As the IRE noted at that time, “…to this day, the Navy has still not responded to [NBC News reporter Scott MacFarlane’s numerous FOIA requests].”

FOIA request regarding Aaron Alexis’s interactions with FFCHS

Among the various FOIA requests filed regarding the navy yard shooting was a request filed in December 2013 seeking the FBI files “referencing the Freedom from Covert Harassment and Surveillance (FFCHS) organization in regards to the well publicized shooting investigation…”

As noted above, some of the reporting on the shooting noted that Alexis had sent three emails to FFCHS prior to the shooting.

The FBI rejected the request later that month, claiming that the information was exempt from disclosure requirements on the grounds that it was part of an investigative file. In January 2014, the person requesting the information filed an appeal, noting that the president of FFCHS, Derrick Robinson, had already revealed information about the matter by publishing an FFCHS newsletter in which he stated that he had been interviewed by two FBI agents concerning the case.

In September 2014, the Justice Department finally sent a letter denying the appeal. Language in the DOJ’s denial letter was of the boilerplate variety. The agency asserted that the information sought was exempt from disclosure requirements of FOIA because it fell under the category of “records or information compiled for law enforcement purposes the release of which could reasonably be expected to interfere with enforcement proceedings.”

The U.S. government’s position is that the mass shooting at the navy yard was simply a random act of insanity by a disturbed individual – as opposed to being the result of intense systematic harassment of the shooter, as the shooter himself clearly suggested. Since the shooter, Aaron Alexis, is dead, presumably the only potential “enforcement proceedings” would be civil litigation related to security issues, such as Alexis’s security clearance, and the management of security at the naval base.

At least one such lawsuit has been filed by the family of one of the shooting victims.

Several critical pieces of information will remain in the dark – at least for now. One is the FBI’s investigation – if any – regarding Alexis’s claims that he was the target of psyops harassment. A closely related question is whether Alexis was, in any sense, a “targeted individual.” Obviously, if he had been the subject of any kind of investigation and monitoring, that would have huge implications regarding his security clearance.

The DOJ’s denial letter only addresses that issue with a standard blanket statement that applies to all FOIA inquiries:

“To the extent that your request seeks access to records that would either confirm or deny an individual’s placement on any government watch list, the FBI properly refused to confirm or deny the existence of any records responsive to your request because the existence of such records is protected from disclosure pursuant to 5 U.S.C. § 552(b)(7)(E). FOIA Exemption 7(E) concerns records or information compiled for law enforcement purposes the release of which would disclose techniques and procedures for law enforcement investigations or prosecutions. This response should not be taken as an indication that records do or do not exist. Rather, this is the standard response made by the FBI.”

The other critical piece of information which remains a secret is the FBI’s investigation of Alexis’s communications with FFCHS. Some news reports about the shooting noted that Alexis had sent three emails to FFCHS prior to the shooting.

Just to review: FFCHS is ostensibly a gang stalking victims support group, although – as explained in the web page about the organization in this website – it is clearly a disinformation front group. It would be very interesting to read the description of FFCHS that appears in the FBI’s investigative files. No doubt, the DOJ would argue that such information also falls under one or more of the above FOIA exemptions. The only way to contest the claim would be to file a lawsuit.

Muckrock, which tracked the FOIA request, now lists its status as rejected.

Here is the DOJ’s denial letter: DOJ Denial of Appeal

Whatever led to the mass shooting at the Washington Navy Yard in September 2013, one thing is clear: the U.S. Navy and the FBI do not want the public to know about it.

________________________________________________________

Theodore Kaczynski (“The Unabomber”)

Theodore Kaczynski

A series of bombings was perpetrated from 1978 to 1995 which killed three people and injured 23 others. The bomber, a mathematician named Theodore Kaczynski, was referred to as “the Unabomber” by the FBI before they discovered his identity.

Kaczynski wrote a manifesto which explained that his motive for the bombings was to expose the threat to freedom posed by modern technology.

The court rejected Kaczynski’s request to represent himself at his trial, and made a plea agreement to avoid having Kaczynski possibly use his trial as a public platform to express his views. In return for a promise to not seek the death penalty, Kaczynski pleaded guilty, and was sentenced to life in prison.

Those facts are commonly known; what is less widely-known is that Kaczynski was one of the subjects of the CIA’s secret mind-control experiments program called MK Ultra while he was a student at Harvard University.

An article by Alston Chase in the June 2000 issue of the Atlantic explored the question of whether Kaczynski’s violence was the result of his psychological torture. Kacyzinski was recruited to participate in a series of psychology experiments, and he was deceived about their true nature, which was to examine the effects of extreme emotional stress – possibly to help the CIA develop interrogation techniques.

The article implies that the experiment could possibly have been a factor in Kaczynski’s later acts of violence. Some excerpts from the article:

“There is no evidence of immediate mental degradation in the project’s aftermath. Emotional turmoil is another matter. As Sally Johnson, the forensic psychiatrist, reported, Kaczynski clearly began to experience emotional distress then, and began to develop his anti-technology views.”

“It is clear, also, that Murray’s experiment deeply affected at least some of its subjects. From interviews conducted after the project ended, it is apparent that certain students had found the experience searing.”

“When, soon after, Kaczynski began to worry about the possibility of mind control, he was not giving vent to paranoid delusions. In view of Murray’s experiment, he was not only rational but right. The university and the psychiatric establishment had been willing accomplices in an experiment that had treated human beings as unwitting guinea pigs, and had treated them brutally.”

“Kaczynski felt that justice demanded that he take revenge on society.”

The injuries and deaths of the 26 victims of Kaczynski’s bombs were quite possibly “collateral damage” from a secret and unethical U.S. government program.

Blue Line

10. Selection of Targeted Individuals

target 01

“To a hammer everything looks like a nail. To an intelligence
agent, informant, or law enforcement officer, everything
unconventional or unorthodox looks like at least a pre-
embryonic terrorist danger.”

– Bruce Fein, U.S. Deputy Attorney General,
Reagan administration

In 2009 Bruce Fein advised Congress that the national intelligence-gathering system of regional data fusion centers should be abandoned. He compared the system to those operated by the Soviet Union’s KGB and East Germany’s Stasi.

________________________________________________________

Threat assessments by bureaucrats

Incompetence in the U.S. law enforcement and intelligence community creates threats to Americans in two ways. Real threats – such as the 9/11 terrorist attack and the Boston Marathon bombing – often go unrecognized. Meanwhile, people who pose no threat whatsoever are often destroyed – such as the actress Jean Seberg, whose “crime” was supporting the civil rights movement, for which she was stalked and terrorized by the FBI, ultimately leading to her suicide.

One obvious problem currently is that in America we now have a vast industry of government and corporate entities in the domestic spying business, but relatively few actual threats. Predictably, people feeding at the giant homeland security pig trough are eager to create the impression that their jobs and budgets are justified, which makes witch-hunts almost inevitable.

Adding to the problem created by such careerist motivations is the fact that people who pursue careers in the intelligence and law enforcement industry often have, as Bruce Fein observed, a distorted perception of the danger posed by people who are less conformist and less subservient to authority figures than they are.

Writing in Mother Jones in February 2014, Jon Schwarz made this point about the kind of people who make up much of the security infrastructure:

“Throughout history, the security state in every country has attracted employees who were already a bit squirrelly, and then encouraged their squirreliness to blossom in the dark….

….What these kinds of people share in common is that the pattern-recognition software in their head is badly calibrated and oversensitive. If they weren’t spies or intelligence “experts,” they’d spend their days proving Paul Is Dead or discovering the face of Jesus in tortillas.”

________________________________________________________

Blacklisting by threat assessment bureaucrats in the U.K.

Based upon the reported facts, I would not refer to the following case as “gang stalking” in the full sense of the term. The incident did not involve the intense and sophisticated psychological operations tactics commonly associated with organized stalking by corrupt law enforcement and intelligence agencies and their contractors. This case was however a well-documented example of social and professional isolation of a targeted individual who was blacklisted by government bureaucrats.

Articles published by the Guardian and BBC News in June 2009 reported that Jane Clift, a resident of the Borough of Slough in England had won a libel case against her borough’s council in which she claimed to have been falsely labelled as potentially violent after she complained about someone vandalizing a flower bed in a town park in 2005. The high court (trial court) awarded Ms. Clift £12,000 in libel damages.

Ms. Clift had written an angry letter to the council after becoming frustrated during a phone conversation with the council’s “anti-social behavior coordinator.” The council then placed Ms. Clift on its “violent persons register” and then emailed people in the community about the fact that she had been placed on the list.

An October 2010 article in the Daily Mail described her blacklisting ordeal as follows:

“Her details were circulated to an extraordinary range of public and private bodies, including doctors, dentists, opticians, libraries, contraceptive clinics, schools and nurseries. Their staff were advised not to see her alone.

The 43-year-old former care worker was forced to withdraw an application to become a foster parent and, eventually, to leave the town where she had lived for ten years.”

________________________________________________________

U.S. government’s terrorist watch list

I would confidently bet that the vast majority of Americans targeted by organized stalking would be unlikely to suspect that their personal circumstances might be connected – even remotely – to the subject of terrorism. Still, it is highly plausible that in many cases such a connection exists within the vast homeland security bureaucracy.

The U.S. government’s Terrorist Screening Database is shrouded in secrecy. The fact that names are routinely added and removed from the watch-list – which is officially known as the “Terrorist Screening Database” – combined with the secrecy which surrounds the list, make it difficult to know how many people it includes, but apparently the list has grown rapidly. An article in the New York Times in December 2013 reported that at least 700,000 people were on the watch-list, but an Associated Press report in July 2014 stated that official numbers revealed in a lawsuit showed that “more than 1.5 million [names were] added in the last five years.”

Some excerpts from the New York Times article:

“…the government refuses to confirm or deny whether someone is on the list, officially called the Terrorist Screening Database, or divulge the criteria used to make the decisions…”

“The Terrorist Screening Center, which administers the main terrorist watch list, declined to discuss its procedures, or to release current data about the number of people on various
watch lists, and how many of them are American citizens.”

A report released by the ACLU in March 2014 (pdf file linked below) about the terrorist watch list included a number of references which would resonate with anyone familiar with gang stalking. The report described a system which “blacklists” people “including American citizens” – “based on secret standards and evidence, without a meaningful process to challenge error and clear their names.”

This is how the ACLU describes their understanding of how people get placed on the feds’ watchlists: “We don’t know.”

The ACLU explained that the U.S. government “has refused to disclose the standards by which it places individuals on other watchlists, such as the No Fly list.”

Among the “devastating consequences” of the secret watchlist system cited in the report is the following:

“being placed on a U.S. government watchlist can….ruin employment prospects, and isolate an individual from friends
and associates.”

Here is the ACLU’s recommendation:

“Ultimately, Congress and the Obama administration must rein in what the Ninth Circuit Court of Appeals has called ‘a vast, multi-agency, counterterrorism bureaucracy that tracks hundreds of thousands of individuals’ – a bureaucracy that remains secret and unaccountable to the public or the individuals it targets for blacklisting.”

ACLU – U.S. Govt Watchlisting

________________________________________________________

Multiple secret watch-lists

As with many elements of America’s complex security state, watch-lists exist in multiple jurisdictions and agencies and databases, and are maintained by both public and private organizations. In addition to the federal terrorist screening database and no-fly list, there is the secretive quasi-governmental database maintained by the Law Enforcement Intelligence Unit (LEIU) association, which is described in the “Red Squads” section of this overview. States also maintain files on their residents – such as Louisiana’s database of “comprehensive person profiles.”

One of Big Brother’s interesting lists was the subject of a July 2008 article in Salon. This is apparently the list that will be used by the feds to round up potential trouble-makers in the event that martial law is declared:

Dating back to the 1980s and known to government insiders as “Main Core,” the database reportedly collects and stores — without warrants or court orders — the names and detailed data of Americans considered to be threats to national security….

….Main Core in its current incarnation apparently contains a vast amount of personal data on Americans, including NSA intercepts of bank and credit card transactions and the results of surveillance efforts by the FBI, the CIA and other agencies. One former intelligence official described Main Core as “an emergency internal security database system” designed for use by the military in the event of a national catastrophe, a suspension of the Constitution or the imposition of martial law.

An article in Radar magazine in May, citing three unnamed former government officials, reported that “8 million Americans are now listed in Main Core as potentially suspect” and, in the event of a national emergency, “could be subject to everything from heightened surveillance and tracking to direct questioning and even detention.”

Here is the above-referenced May 2008 Radar article about the Main Core database: The Last Roundup

________________________________________________________

Getting your name removed from a watch-list

Blacklist

Avoiding the cliché “Kafkaesque” is nearly impossible when describing U.S. government watch-lists – or when describing organized stalking for that matter. The protagonist in Kafka’s novel “The Trial” was arrested by agents from an unidentified agency and tried without being told the nature of the charges against him.

Most of the policies governing how people are placed on federal watch-lists are secrets, and the government has an official policy of refusing to confirm or deny whether someone is on the government’s various lists.

The case of Rahinah Ibrahim is instructive. Dr. Ibrahim was placed on the federal no-fly list by mistake when an FBI agent mistakenly checked the wrong box on a form. She struggled for 9 years – including a 7-year legal battle – before a federal judge finally ruled (in February 2014) that her name should be removed from the government’s various watch-lists.

Ibrahim had to litigate most of her case without knowing the information in the U.S. government’s case against her. Even the judge’s findings in Ibrahim v. DHS are heavily redacted.

________________________________________________________

Quotas for reporting suspicious persons

A report by an ABC local news affiliate in Denver in July 2006 revealed that some federal air marshals said they have quotas for identifying a certain number of passengers as suspicious.

Air marshals interviewed for the article said that if they wish to receive positive performance evaluations, raises, bonuses, and special assignments, they must regularly file Surveillance Detection Reports (SDRs) – at least one per month according to some sources – about passengers who supposedly behaved in a suspicious manner. Individuals identified in such reports can end up in an international database watch list.

While it is unlikely that law enforcement and intelligence officials would publicly acknowledge the pressure on employees to name persons as being suspicious, it is easy to imagine how career pressures upon and within various agencies could create a sort of “witch hunt” culture to rationalize the budgets and jobs in the homeland security bureaucracy.

________________________________________________________

Black-listing by brown-nosers

In a September 2004 article in the Sociological Forum, David Cunningham and Barb Browning at Brandeis University analyzed the selection of individuals targeted by the FBI’s original COINTELPRO operations. The article begins with this quote from Frank Donner’s The Age of Surveillance:

“The selection of a target embodies a judgment of deviance from the dominant political culture.”

In essence, the authors found that FBI agents responded to organizational pressure from the upper echelon of the FBI by rationalizing the targeting of individuals for surveillance and subversion – even when those individuals were not engaged in subversive political activities. They did so by pointing to characteristics of the targets which the agents knew their senior officials regarded as culturally objectionable:

“…field agents drew upon particular culturally resonant signals of deviance to demonize and subsequently act against SDS members even in the absence of threatening political activity.”

Agents were trying to curry favor with a small group at the top of the agency – the directorate – who “made the final decisions about all counterintelligence actions.”

________________________________________________________

Targeting suspected potential future “terrorists”

According to some published mainstream news reports, individuals are sometimes targeted for gang stalking because they are suspected of involvement – or potential future involvement – in terrorism or crime, but are not implicated by any legal evidence. For example, see the May 31, 2006 article in the Canadian national newspaper, The Globe and Mail, regarding such tactics being illegally used in Canada.

Not surprisingly, people in the U.S. “homeland security” industry – whose money and power is tied to the perceived risk of terrorism – take a very expansive view of what constitutes a suspicious person.

In the case of federal contractor Jeffrey Kantor an innocent Google search apparently led to him being targeted for gang stalking by federal agents.

A 2011 Air Force training manual for teaching personnel how to identify individuals who should be reported to the Office of Special Investigations (OSI) – the Air Force intelligence agency – included the following examples (on page 43) of “extremist ideologies and movements”

“The colonists who sought to free themselves from British rule”

“Environmental activists who take action to fight against the exploitation of the environment and/or animals”

On page 45 of that manual is some helpful advice for recognizing the rhetoric of hate groups:

“Many extremists will talk of individual liberties, states’ rights, and how to make the world a better place”

If you happen to meet an American who believes in America’s independence from Great Britain, or opposes cruelty to animals, or believes in individual liberties, or – God forbid – wants “to make the world a better place,” be sure to report him or her to a U.S. law enforcement agency or intelligence agency immediately so he or she can be put on a secret government watch list.

________________________________________________________

Targeting to discredit & retaliate against whistle-blowers

Other mainstream news reports indicate that gang stalking is also used by intelligence agencies to punish or intimidate whistle-blowers – for example, as reported in the October 10, 2004 article in the Sunday Times, a major newspaper in the U.K., about the use of gang stalking by the intelligence agency MI5.

U.S. intelligence agencies are often accused of retaliating against whistle-blowers also. This 2007 report by the ACLU describes several cases in detail.

“…employees in national security agencies blow the whistle at their peril. They find no protection in the vast patchwork of laws designed to protect whistleblowers. Whistle-blowers often find themselves sidelined, without a security clearance, without a job, discredited, the victim of a smear campaign, investigated, labeled crazy, a bad team player, a liar, isolated.”

________________________________________________________

Targeting individuals for experimental or training purposes

Some unlucky individuals might be targeted essentially for counterintelligence psyops research or training purposes (even if they are ostensibly chosen for some more “legitimate” security reasons).

If you doubt that is plausible, read about the CIA’s MK Ultra experiments, in which many American (and Canadian) citizens were used as human guinea pigs.

________________________________________________________

Targeting individuals for extra-judicial punishment & experimentation

A well-researched article in the October 2013 issue of Fortean Times documented a case of state-sponsored gang stalking – described as such – in which a former U.S. military member was apparently targeted both for the purposes of extra-judicial punishment and to test psychological operations technology.

________________________________________________________

Targeting individuals by mistake

bad_aim

Sometimes individuals are targeted by America’s spy industry purely because of a bureaucrat’s incompetence. A perfect example of this was reported in September 2011 by the journalist John Cook. Here is his report of how a CIA analyst arranged to have a man kidnapped and tortured, although he was completely innocent. In some jobs, mistakes of that sort would be viewed unfavorably. Apparently, at the CIA they
are a bit more forgiving; the analyst was promoted.

Her name is Alfreda Frances Bikowsky and, according to independent reporters Ray Nowosielski and John Duffy, she is a CIA analyst who is partially responsible for intelligence lapses that led to 9/11……..

Bikowsky was also, according to Nowosielski and Duffy, instrumentally involved in one of the CIA’s most notorious fuck-ups—the kidnapping, drugging, sodomizing, and torture of Khalid El-Masri in 2003 (El-Masri turned out to be the wrong guy, and had nothing to do with terrorism). As the Associated Press’ Adam Goldman and Matt Apuzzo reported earlier this year, an analyst they described only by her middle name—”Frances”—pressed for El-Masri to be abducted even though some in the agency weren’t convinced he was the terrorist that Frances suspected he was. Instead of being punished or fired for the error, “Frances” was eventually promoted to running the Global Jihad Unit by then-CIA director Michael Hayden. According to Goldman and Apuzzo’s story, “Hayden told colleagues that he gave Frances a pass because he didn’t want to deter initiative within the counterterrorism ranks.”

________________________________________________________

Exploiting watch-lists for personal vendettas and corporate agendas

As you read accounts – whether published or informal – of organized stalking cases from the Cointelpro era in the U.S., from the Stasi era in East Germany, and of current gang stalking in the U.S., Canada, and the U.K., one of the most common factors seems to be the exploitation of such tactics for personal vengeance.

In recent years, there have been media reports of something called “swatting” – in which an anonymous person – either for revenge or for amusement – calls 911 and makes a false report of an emergency happening at the address of a neighbor or enemy (or in some cases a celebrity) so police will respond to the residence.

It is not difficult to imagine how a more sophisticated and sinister version of that tactic could be used by someone with connections to America’s now-massive and secretive homeland security infrastructure, by reporting someone as “suspicious.”

As it is now structured, the U.S. law enforcement and intelligence industry provides a perfect environment for abuse of power. The claim that America faces a constant indefinite threat of terrorism has created political cover for seemingly unlimited money and secrecy and power for the agencies and private firms involved.

Increasingly sophisticated surveillance and “non-lethal” weapons technology makes the potential for abuse even greater still.

In theory, organized stalking (counterintelligence subversion) could be used against someone by an individual or a corporation in one of several ways.

One possibility is that a person who has either a personal or professional connection to the law enforcement or intelligence industry could have someone named as a “suspicious person” – for example, by submitting his or her name to a Terrorism Liaison Officer (TLO). This might be easily done by a member of InfraGard (the corporate-FBI alliance) or someone with a friend or relative in an agency such as the FBI.

As explained elsewhere in this website, we know from hacked emails of intelligence-security firms and other sources that corporations hire current and former spooks and law enforcement agents to do their bidding, and that such work includes counterintelligence operations (disinformation, infiltration, etc.). It is certainly possible that such work also includes subversion (gang stalking).

One prominent case of gang stalking that apparently involved exploiting U.S. counterintelligence subversion for a personal vendetta is that of Gloria Naylor. A National Book Award-winning novelist, Ms. Naylor also wrote a semi-autobiographical book, 1996, about her experiences as a targeted individual of gang stalking.

An excerpt from Booklist’s review of 1996:

“In 1996 novelist Naylor moved to secluded St. Helena Island. A minor fracas with a crotchety neighbor, whose brother worked for the National Security Agency, set into motion a series of events that made Naylor the object of close scrutiny by the government.”

Another example – there are many, including my own experience – of organized stalking being used by corrupt members of local and federal law enforcement and intelligence agencies (and their friends) can be found at a blog called “Systematic Police Harassment – Pinellas County Florida.”

That website is an account by a divorce attorney in Florida of his gang stalking – which was apparently initiated in retaliation for angering a senior official of a local county sheriff’s office.

Similar cases – which were well-documented in published mainstream news media articles – include an incident in Stockton, California in 2011 in which the city manager was stalked by local police after a break-down in contract negotiations, and an incident in Florida in 2012 in which a police officer was stalked by other police officers after citing an off-duty cop for reckless driving.

________________________________________________________

Threat Assessment Teams & Personal Vendettas

Individuals become targets of surveillance states in a variety of ways. In the U.S., one of the mechanisms which could potentially lead to someone being targeted is a Threat Assessment Team – a concept promoted by the FBI.

A Threat Assessment Team (TAT) is a small group of designated staff members in an organization (public or private) which attempts to assess whether certain individuals in the organization pose a threat.

A description of TATs on the FBI website describes these groups as follows:

Like-minded, concerned professionals gathered together in person or via a teleconference can use the power of synergy to find dynamic solutions in a short time. Using TATs changes the dynamics in employee- or student-related threat situations from What do I do? to What do we do? These meetings allow the participants to share ideas, experiences, fears, and concerns in a problem-solving environment. TATs serve five primary functions.

Information gathering: What does the team know about the threatener and the targets?
Interviewing: What can TAT personnel learn from anyone personally or professionally connected to the perpetrator and victims?
Evaluation: What does all of this information mean in terms of threats of violence to people and the organization?
Decision making: What should the team do now and in the immediate future? Who will take the lead role in managing the subject’s behaviors or actions (e.g., human resources, law enforcement, security, campus police, EAP, mental health clinicians)?
Follow-up: If the emotional temperature has cooled around this situation, how will the TAT continue to monitor the people and behaviors involved so that it does not reescalate?

Note that the FBI prefers that the group judging an individual’s potential for future crimes be “like-minded.” Naturally, you should avoid any diversity of viewpoints on the panel which is going to decide whether to label someone as suspicious. You don’t want to mess-up a good witch-hunt.

Tellingly, the FBI’s webpage makes no mention of the issue of workplace harassment and bullying. As noted previously in the section on “mobbing,” Dr. Kenneth Westhues, a sociologist, found that violent incidents in the workplace and in schools in North America are often a response to the individual being intensely harassed.

Workplace mobbing is a commonly-reported element of organized stalking (for example, in the claim filed against the U.S. government by Jeffrey Kantor in December 2013). Organized stalking – by all accounts – involves the tactics associated with counterintelligence subversion. The FBI is the primary agency in the U.S. responsible for domestic counterintelligence. Draw your own conclusions about the FBI’s silence on the issue.

Clearly, there is a potential for abuse of power by these Threat Assessment Teams. Although that is also an issue on which the FBI’s chooses to remain silent, a federal judge has found that the practice has already been abused.

A 2011 article about Threat Assessment Teams in USA Today included the following passages regarding the abuse of power by such groups at universities:

Critics say administrators may try to use threat assessment teams for their own purposes. In a case involving a student dismissed from Valdosta State University, a federal judge ruled that the former president improperly called for an investigation into the student’s mental health, employment and grades mostly because the student opposed plans to build a campus parking garage.

Students’ rights groups say administrators are infringing on students’ free-speech rights. ‘Putting innocent outbursts into a campus database is a chilling way to police discourse on campus,’ says Adam Kissel, vice president of the Foundation for Individual Rights in Education. “In the name of security, behavioral intervention teams are encouraged to go far beyond what they need to do.”

________________________________________________________

Official rationale for counterintelligence subversion

Merely invoking the magic phrase “national security” seems to provide sufficient legal and political justification these days for almost any secret policy of the intelligence community. Even in the rare cases when the U.S. government’s “Star Chamber” – the secret FISA Court – rules that a policy is out of bounds, Americans are not permitted to know what the feds were trying to get away with.

As practiced, organized stalking is essentially an extra-judicial punishment, and it grossly violates multiple state and federal laws. However, the policy is presumably justified – at least unofficially – within the FBI and DOJ as being a legitimate counterintelligence policy needed to subvert individuals who would otherwise pose a threat.

As explained later in this overview (in the section on the U.S. Department of Justice), probably the closest thing to an official public statement of the philosophy behind targeting certain individuals was expressed in the policy statement of the now-defunct “Weed and Seed” program. That program’s description suggested a law enforcement strategy of identifying and removing undesirable citizens from neighborhoods through a “community-based” law enforcement approach.

________________________________________________________

Who gets to declare someone a suspicious person?

Consider just one part of the massive “homeland security” infrastructure – electronic surveillance by the NSA. In September 2013 it emerged that at least a dozen NSA employees had been illegally spying on their spouses and partners. This was a small glimpse of the potential abuses of power in the modern U.S. spy industry.

Note: The revelation of those incidents might be what propagandists and intelligence agencies sometimes refer to as a “limited hangout.” In other words, the abuses of power were real, but their revelation might well have been intended to distract from much more serious widespread transgressions – as explained here.

“The story overshadowed the more alarming story that 3,000 privacy violations had occurred over a one-year period.”

NSA whistle-blower Edward Snowden explained that access to the U.S. police state’s weapons is not limited to high-level officials:

“Any analyst at any time can target anyone. Any selector, anywhere… I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your accountant, to a federal judge, to even the President…”

________________________________________________________

The desire for a feeling of power: snitches in communist East Germany

Understanding the social dynamics of America’s current “homeland security” domestic spying programs does not require re-inventing the wheel. A great deal can be learned from the well-documented historical predecessor which most closely resembled it: East Germany’s Stasi.

In addition to thousands of professional spies, the Stasi (state police) had over 100,000 citizen informants. An informant for the Stasi was referred to as an IM (Inoffizielle Mitarbeiter) – an unofficial collaborator. All sectors of East German society had IMs who supplied information about their fellow citizens to the communist government.

One of the striking things that researchers found when examining the records of the Stasi in recent years is that although some of these informants were coerced into spying, most did not need to be pressured into it.

A November 2009 article in Der Spiegel examined the nature of this rodent-like element of society – which no doubt exists today in America.

“Friends informed voluntarily on friends and spouses even tattled on each other.”

Here is the description by the head of the department which now manages the Stasi files:

“More often than not, the Stasi did not need to apply pressure at all,” he says. “In fact, many often felt snubbed if their information was deemed to be of no interest.” The real motivation behind these acts of betrayal was much more humdrum than one might think. “People informed for personal gain, out of loyalty to the East German regime, or simply because they wanted to feel like they had some power.”

As the article notes, often the origin of the targeting of individuals was simply a trivial incident or a misunderstanding. In one case a man was turned-in for having a West German brand of pudding in his kitchen. The Stasi had him fired, and his family became destitute.

________________________________________________________

Additional thoughts on how individuals are targeted

For more of my analysis of how individuals are chosen as targets for gang stalking, see my May 28, 2013 entry in the “Gang Stalking News” section of this website, in which I explain my inferences from the fact that certain types of people are not chosen as gang stalking targets.

11. The Organizational Structure of Gang Stalking
.

cockroaches 01 copy

“The system of espionage thus established, the country will swarm with informers, spies, delators [accusers], and all that odious reptiles tribe that bred in the sunshine of despotic power; that suck the blood of the unfortunate and creep into the bosom of sleeping innocence.”

– Congressman John Allen, during the debates about the Alien and Sedition Acts of 1798.

_________________________

In the shadowy world of gang stalking, it is difficult for the targeted individual to know the exact nature of the organizational structure of his or her enemies. From the victim’s perspective – especially when the person first realizes that he or she is being systematically harassed, it is virtually impossible to know exactly who the enemies are and how they are conspiring with each other.

For many victims, their situation remains opaque because of the vast disinformation campaign they encounter when they attempt to ascertain what is happening via Internet research.

As I described in the introduction to this overview however, the basic nature of the crime – namely, that it is a government counter-intelligence program – is an unavoidable conclusion since the apparent scope of the activity would make it impossible for it to be undetected by America’s now-massive homeland security surveillance and information-sharing infrastructure.

Gang stalking’s organizational structure apparently involves a mixture of personnel. At the top are government officials and agents in federal law enforcement and intelligence agencies, who would need to at least passively acquiesce in the program, if not orchestrate it. Several levels of delegates below them would be needed to manage and perform various operations.

The FBI’s original version of Cointelpro also made use of local government and civilian minions. A Los Angeles Times account of one of the Cointelpro operations explained that “the bureau had enlisted a local police chief, letter carriers and a switchboard operator at Swathmore College to spy on campus and black activist groups in the Philadelphia area.”

________________________________________________________

Agents and criminals

Police and thieves in the street, oh yeah

Fighting the nation with their guns and ammunition

from the song “Police and Thieves” by Junior Murvin (1976)
also covered by The Clash (1977)

In a sense, everyone who participates in organized stalking – and officials who knowingly permit it – are criminals, insofar as stalking is a violation of federal law and of state laws in every state – as well as being a violation of several provisions of the U.S. Constitution.

For many people, the notion that law enforcement and intelligence agencies would be perpetrating crimes seems counter-intuitive. Remember though, U.S. intelligence agencies such as the CIA, routinely engage in criminal activity according to the government itself – as explained in an earlier section of this overview (“Crimes by U.S. Law Enforcement & Intelligence Agencies”). Also, law enforcement and intelligence agencies such as the FBI often authorize crimes by criminal informants.

Why would law enforcement and intelligence agencies incorporate outsiders such as criminal informants, private contractors, and citizens into their counterintelligence operations?

One reason is that outsourcing can create plausible deniability. If a government agency (or a corporation) contracts with a private firm – and then that firm employs criminal informants, former cops, and former agents to perform the dirty work – the crimes can be several steps removed from officials. Another reason is that structural complexity itself can be desirable if one is trying to conduct activities in a way that will be difficult for outsiders to understand.

________________________________________________________

“A Wilderness of Mirrors”

Room Full of Mirrors

Another reason the U.S. intelligence and law enforcement community might countenance a system of counterintelligence which has overlapping public and private elements – might be to exploit a counterintelligence concept called “a wilderness of mirrors.”

The description –attributed to James J. Angleton, the CIA’s Chief of the Counterintelligence from 1954 until 1974 – comes from T.S. Eliot’s poem “Gerontion.”

In essence, the idea is to make it difficult to ascertain the structure and dynamics and agendas which are at work. Having a complex and opaque system of counterintelligence (CI) operations serves the interests of the perpetrators – as does further obfuscating the nature of the system by spreading disinformation – as explained in detail later in this overview.

Of course, another factor could simply be greed. As with the U.S. military-industrial complex, parasitic intelligence-security contractors all want a place at the pig trough whenever a government program creates opportunities. Also, the domestic spying industry provides a lucrative revolving-door career path for employees of law enforcement and intelligence agencies.

Opportunities for expansion of personal power could be just as significant a factor. For example, as government-corporate alliances such as InfraGard and DSAC are formed, participants in organized stalking can exploit the system for their own personal vendettas.

This is true in police agencies as well. A prime example was the previously-described incident in 2011 in which the city manager in Stockton, California was stalked by local police to punish him for not granting them a sufficiently generous contract.

Some CI operations are handled directly by the FBI and other intelligence agencies. Other CI activities are performed for the government by private intelligence-security firms under government contract. CI work is also done by such firms on behalf of large corporations. In some cases – for example, the infiltration and subversion of the Occupy Wall Street Movement – CI activities were performed by the FBI and by private firms.

Presumably, one major difference between the structure of the original Cointelpro operations and modern gang stalking is the huge number of private intelligence/security firm contractors with secret clearances now employed by “homeland security” programs and corporations.

________________________________________________________

The DOJ, FBI, & DHS

Cerberus

America has a vast, complex, interconnected workforce associated with law enforcement, intelligence, and national security operations. It includes everything from local volunteer neighborhood watch programs to the Pentagon. Components of that infrastructure include federal, state, and local government agencies, private contractors, criminal informants, hybrid quasi-governmental associations such as the previously-discussed Law Enforcement Intelligence Units (LEIUs), corporate-government intelligence-sharing partnerships such as InfraGard and DSAC, and volunteer organizations. The U.S. intelligence community alone consists of 16 agencies (17 counting the Office of the Director of National Intelligence – which oversees the other 16).

Adding to the complexity are overlapping jurisdictions, bureaucracy, “revolving-door” employment patterns, and coordination between different groups. Some examples of that coordination – both formal and informal – would be disturbing to many Americans. For example, there have been reports of connections between the CIA and local Law Enforcement Intelligence Units, as was described in the section of this overview about “red squads.”

The scale and complexity of America’s security industry – combined with its inherent secrecy – makes it difficult to speculate about the exact way counterintelligence operations are perpetrated. Whatever particular operational structure supports Cointelpro-type stalking in the U.S., it would unavoidably involve the approval and coordination of at least these three federal intelligence agencies: the U.S. Department of Justice (DOJ), the Federal Bureau of Investigations (FBI), and the Department of Homeland Security (DHS).

The three agencies work with each other on the collection and sharing of information – as in the case of this biometric-based database of criminal suspects.

The DOJ is the U.S. executive department responsible for law enforcement. As such, it would need to provide legal authorization for programs such as COINTELPRO.

“An internal affairs office at the Justice Department has found that, over the last decade, hundreds of federal prosecutors and other Justice employees violated rules, laws, or ethical standards governing their work.

The violations include instances in which attorneys who have a duty to uphold justice have, according to the internal affairs office, misled courts, withheld evidence that could have helped defendants, abused prosecutorial and investigative power, and violated constitutional rights.”

– Project on Government Oversight report, March 2014

The FBI is both a federal criminal investigative agency and the nation’s primary counterintelligence agency. It was the FBI which secretly orchestrated the original version of Cointelpro under FBI Director J. Edgar Hoover.

“Never hesitant about flexing its muscles to target dissenters and whistleblowers, the FBI….is more dangerous than ever.”

– J.D. Tuccille, Journalist, Reason, September 2013

The DHS – which was created in response to the September 11, 2001 terrorist attacks – is the department with primary responsibility for counter-terrorism programs, such as maintenance of the national network of data fusion centers used to share security information across all levels of government.

“Homeland Security is an illegal and unconstitutional force directed at the American people.”

– Paul Craig Roberts, former Assistant Secretary of the Treasury, CounterPunch, July 2014

________________________________________________________

The Central Intelligence Agency (CIA)

octopus

Whatever your assessment of the possible nature and scope of illegal counterintelligence activities currently taking place in the U.S., it is impossible – given the agency’s history – to rule-out the possibility that current or former CIA agents are involved – directly or indirectly, formally or informally – in at least some cases of domestic psychological operations.

As with organized stalking generally, motivations might vary from counterintelligence subversion, to experimentation, to personal vengeance for individuals and corporations with connections.

I noted the following in the section on MK Ultra. Sorry for the redundancy, but it bears repeating.

The CIA’s official mission statement refers to spying on America’s “adversaries” – which generally refers to foreign adversaries. On the other hand, the mission statement also proclaims that the CIA “upholds the highest standards of conduct,” and yet the agency has a well-documented history of involvement with things like torture, assassinations, drug trafficking, orchestrating coups against democratically-elected governments, kidnapping families for dictators, arranging the capture of Nelson Mandela, spying on Americans based on their political beliefs (in the past and recently), and – in the case of Project MK Ultra – performing secret unethical mind-control experiments on Americans.

The agency’s crimes associated with MK Ultra will never be fully known, because CIA Director Richard Helms – by his own admission – ordered the destruction of the program’s records in 1973. Those kinds of practices continue today. The CIA is known to have destroyed videos of their agents’ use of torture in interrogations, and to have spied on the U.S. Senate while it was investigating the CIA’s use of torture.

As explained in the section on Red Squads, the CIA reportedly also has a role in the training of local Law Enforcement Intelligence Units (LEIUs). Accounts by self-proclaimed victims of organized stalking often include relatively sophisticated methods. The tactics and technology are consistent with the operational capabilities of the CIA, and consistent with the agency’s reputation for operating outside of legal and ethical boundaries.

Also worth considering is the fact that the CIA supports regimes which torture their citizens. In his book CIA Diary (1975), former CIA case officer Philip Agee wrote about the agency’s support of the brutal fascist military dictatorships in Latin America:

“Repression in Brazil even includes cases of the torture of children, before their parents’ eyes, in order to force the parents to give information.”

It does not strain the imagination to think that such an agency might have its slimy tentacles connected – in various plausibly deniable ways – to the organized stalking of targeted individuals.

________________________________________________________

The National Security Agency (NSA)

Tower of Sauron

“The ultimate goal of the NSA is total population control.”

– NSA Whistle-blower William Binney

William Binney, a 36-year veteran of the NSA (he was a mathematician and code-breaker), has described that spy agency as having a “totalitarian mentality.” He has also said this about the NSA’s crimes against Americans: “I call people who are covering up NSA crimes traitors.”

As with the CIA, one can only speculate about the NSA’s possible involvement with organized stalking, but there are reasons to suspect that the agency is not entirely innocent. Although the NSA – unlike the CIA – specializes in signals intelligence rather than operations, revelations in 2013 by NSA whistle-blower Edward Snowden showed that the NSA is aggressively involved in spying on its own citizens – and lying about it.

NSA Director Keith Alexander lied about the mass surveillance of Americans by the NSA – twice. He denied that the data was being collected, then after it was revealed, he claimed that the program had uncovered 54 terrorist plots. When challenged by Senate Judiciary Committee Chairman, Patrick Leahy, he admitted that the number was an exaggeration. Later the President’s Review Board reported that the actual number of terrorist threats detected was zero.

Domestic spying is not new for the agency either. The U.S. Senate’s Church Committee investigations in the 1970s said this in its conclusions about the NSA’s activities:

“…the deliberate targeting of American citizens and the associated incidental interception of their communications demonstrates the need for a legislative charter that will define, limit, and control the signals intelligence activities of the National Security Agency.” (Church Committee Final Report – Book 3, page 764)

Another reason to think that some members of the NSA acquiesce in organized stalking is more specific. A semi-autobiographical book by Gloria Naylor – winner of the National Book Award for her novel The Women of Brewster Place – was published in 2005. In the book, Naylor described her experiences as a target of organized stalking. The book’s title, 1996, was the year Naylor realized that she was being stalked. (Presumably, it is also a reference to Orwell’s 1984.) Apparently, her harassment began after she had a dispute with a neighbor whose brother worked for the National Security Agency (NSA).

Here are some of Naylor’s comments in an interview on National Public Radio, January 23, 2006:

“I think I just ran into the wrong people at the wrong time, and like the book shows, what starts from a very innocent dispute with a neighbor cascades and cascades and cascades into a whole production.”

“…these cars began to surveil me. People began to follow me around, and it did, it was very disrupting to think that your privacy was being violated, and for no reason that I could come up with.”

Another reason to suspect that some members of the NSA must acquiesce in organized stalking – and this would apply to the other numerous intelligence agencies as well – is that it would be impossible for them to be unaware of the various electronic communications associated with it. This website you are reading, for example, receives several hundred visits every day. Gang stalking must be something of an open secret among much of the intelligence community.

Finally, another reason to suspect that NSA officials likely approve of gang stalking is that such operations are consistent with what is now known about the agency’s culture. When William Binney – the technical chief of the NSA who became a whistle-blower – testified before Germany’s parliament in July 2014, he said that the NSA seeks “total information control” over American citizens and has a “totalitarian mentality.”

________________________________________________________

Intelligence-Security Contractors (“Surveillance Role Players”)

spy

I am unaware of any publicly available information about the exact origin or nature of the jobs for “Surveillance Role Players” which are listed on numerous defense/security contractor websites. Possibly the position was created as part of the massive increase in the “national security” infrastructure following the 9/11 attacks.

It is very possible that Surveillance Role Players (SRPs) fill a variety of roles. For example, one of those roles might be to simulate the role of terrorists and others in various security drills.

Another role might or might not be to perpetrate the counterintelligence stalking of targeted individuals. In the absence of reporting on either the nature of SRPs or the nature of counterintelligence stalking, it is at least worth considering that the two phenomena might be connected.

Certainly the collusion of corporations and federal agencies in the area of domestic intelligence activities is not new. The U.S. government has been colluding with big corporations to spy on Americans since the dawn of the Cold War, as this article in Wired notes, although the practice has greatly expanded.

“The government is increasingly using corporations to do its surveillance work, allowing it to get around restrictions that protect the privacy and civil liberties of Americans, according to
a report released….by the American Civil Liberties Union…”

Cointelpro Version 2.0 (gang stalking) apparently makes use of the large supply of Americans who possess security clearances – over 5.1 million people as of 2013– almost a third of whom work for private firms. Nearly one-third of the Americans with top secret clearances are private contractors rather than government employees.

Numerous online job listings by defense/intelligence contractors for SRPs seek applicants with active secret clearances and training in counterintelligence. Each listing indicates that the unspecified work involves human intelligence operations (as distinguished from signals intelligence) within the U.S. Some of the ads note that an element of the job is to “coordinate with local law enforcement.”

In at least some cases, the client for the Surveillance Role Player contractors is the Department of Defense. Often though, the job announcements do not indicate which U.S. government department or agency is the client. It seems likely that some of the contracts would be with the Department of Homeland Security.

I posted one of these ads in the introduction of this overview. Here is another example:

Click image to enlarge.

Stalker Ad 2

These ads could be evidence that federal law enforcement and intelligence agencies support outsourced organized stalking operations. Absent leaks by whistle-blowers, one can only speculate about that. Clearly though, SRPs would have the tactical skills, technological assets, funding, and law enforcement connections needed to perpetrate nationwide stalking operations involving counterintelligence methods.

SRPs would also have a powerful incentive to maintain secrecy about such operations. Members of the intelligence community – including contractors – are exempt from the Whistleblower Protection Act. So even if an intelligence-security contractor firm were to mistakenly hire someone who has moral integrity, that employee would still be reluctant to expose misconduct. Revealing secret practices – even practices which are legally dubious – would involve a high risk of serious legal trouble.

Another aspect of the SRP job which makes it a plausible explanation for how organized stalking is perpetrated is the fact that the position is relatively low on the food chain. If organized stalking is widespread – as anecdotal and media reports seem to suggest – the street-level work is certainly not being performed (in most cases) by FBI agents. Victims of organized stalking seem to be rather ordinary individuals who are not connected to criminal or terrorist organizations. In many cases, targets seem to have no idea how they came to be targeted. Some of them – perhaps most – might have simply crossed someone with connections to the law enforcement industry.

Such targeted persons do not have the resources and skills that would require serious “tradecraft” on the part of the perpetrators. Any brown-noser who can follow orders and keep a secret could perform this level of dirty work. Surveillance Role Players would seem to fit the bill.

Training the lowest-level perps

Most of the employment announcements I have seen for SRPs state that one element of the job is training others. That too is consistent with observable activities associated with organized stalking. Acts of harassment done for psychological operations purposes are often perpetrated by someone having only a single momentary interaction with the target. For example, someone unknown to the victim makes some particular comment or performs some act of rudeness, or simply glares at the victim. Such persons are probably ignorant of why the victim is supposedly even being targeted.

Perhaps SRPs orchestrate and delegate those minor acts of “no-touch torture” which collectively make up what the Stasi referred to as “zersetzung” – the process of systematically degrading the target’s morale.

Many Surveillance Role Player job ads – such as the one below – indicate that the work is part-time. That would make sense for this type of work for several reasons. For one thing, a part-time job would be easier to conceal from the public. Also, it is possible that harassing people full-time might be a bit demoralizing for all but the most purely sadistic CI agents. Some cops frequently behave as bullies, but few people could spend all 40 hours of their work week perpetrating acts of harassment.

Of course, an additional practical reason for restricting employees to part-time status is that it greatly reduces the obligation to provide benefits for them.

Note also that the job ad below states that one element of the work is to “coordinate with local law enforcement.” If SRPs are stalking people, they would inevitably need to sometimes coordinate their activities with police. Quite possibly, Law Enforcement Intelligence Units (LEIUs) could be involved in some ways. As explained in detail in the section of this website about “red squads,” LEIUs have a long history in the U.S. of functioning as political enforcement agencies.

If any readers of this website have any insights about the precise nature of these jobs (which seem never to be discussed in the mainstream news media), I welcome them. Obviously, it’s pure speculation from my perspective that they are possibly connected with organized stalking, but such a connection would neatly answer these three questions:

“What do surveillance role players do?”

“Who perpetrates organized stalking?”

“How do the stalkers maintain the secrecy of their operations?”

SRP job announcements do not indicate which U.S. government department or agency is the client. The most likely entity would be the Department of Homeland Security.

Gang stalking crosses multiple boundaries: geographical, jurisdictional, legal, and moral. My guess is that the participants are primarily motivated by the financial benefits, but also by the notion that they are part of a secret group which is essentially above the law, and which imposes what they see as a moral punishment on dissidents. They are America’s more cowardly and more secretive version of the Taliban.

The professional caliber of Surveillance Role Players

Players in this game are not exactly members of the premier league in the intelligence business. First, spying (espionage) is traditionally regarded within the intelligence community as a more prestigious occupation than counterintelligence work.

Secondly, for obvious reasons, domestic counterintelligence operations are less challenging than foreign counterintelligence operations. Even those who argue that counterintelligence work deserves to be taken more seriously, such as Roy Godson, acknowledge that distinction.

Some ads for SRPs list a college degree among the qualifications, but many – such as the one below – require only a high school diploma. This means that former enlisted military personnel with counterintelligence (CI) training can easily make some good money relative to their education level as SRPs – possibly by harassing and spying on their fellow citizens. That would be tempting for a certain type of person during any period, but especially in today’s relatively weak job market.

Finally, counterintelligence subversion which targets amateurs (non-intelligence professionals) who have very limited assets is by definition the easiest work of all. Unlike covert operations – which must be conducted without being detected by the targets – organized stalking involves overt harassment, so the level of “tradecraft” required is relatively primitive.

Being a gang stalking perp is several rungs down the ladder from being the protagonist in a John le Carré novel.

Another job announcement for a Surveillance Role Player – highlighting added:

Click on image to enlarge.

SRP Job Ad – BAE

Goldilocks’ porridge temperature IQ

Sometimes it is better from an employer’s perspective to hire people who do not think too deeply about the business in which they are involved.

One of the mistakes made by the National Security Agency (NSA) that led to the scandalous revelations of its Big Brother spying programs in 2013 was that the agency permitted one of its contractor firms – Booz Allen Hamilton Inc. – to hire an employee who was exceptionally intelligent.

Edward Snowden was smart enough to not only understand the information technology aspect of the spy agency, but also to perceive how morally corrupt and unconstitutional the surveillance system was, and how to expose the whole slimy business to the public.

Corporations who employ Surveillance Role Players quite possibly seek to hire people smart enough to carry out orders, but not smart enough to consider the philosophical implications associated with a Stasi-type system of political enforcement.

This phenomenon is definitely at work in the law enforcement industry. One example is a federal lawsuit by a police department applicant in Connecticut. A man was denied the opportunity to apply for a job with the New London Police Department on the grounds that he was too intelligent. As a matter of policy, the police department only interviewed candidates who were just slightly above average in intelligence “on the theory that those who scored too high could get bored with police work and leave soon after undergoing costly training.”

In August 2000, a federal appeals court ruled that the policy was legitimate.

The moral character of security contractors

Admittedly, the possible participation of SRPs in counterintelligence stalking is purely speculative for now. On the other hand, there are well-documented cases of lawlessness and minimal oversight among military, security, and intelligence contractors, so one does not have to wonder about the plausibility of such involvement.

A perfect example of contractors with secret clearances performing dirty work for the federal government was a June 2014 report by Pulitzer Prize-winning New York Times journalist James Risen. The article documented how the mercenary soldier corporation formerly known as Blackwater operated with legal impunity in Iraq.

Several weeks before an infamous incident in which Blackwater personnel killed 17 civilians in Baghdad in 2007, the U.S. State Department had begun investigating the corporation’s misconduct and lack of oversight. However, American Embassy officials pulled the plug on that investigation and ordered the investigators to immediately leave the country. That move followed a rather interesting exchange between a Blackwater official and an investigator:

… the inquiry was abandoned after Blackwater’s top manager there issued a threat: “that he could kill” the government’s chief investigator and “no one could or would do anything about it as we were in Iraq,” according to department reports.

The death threat – which was made by a former member of SEAL Team 6 – was witnessed by another investigator. Despite having the statements of the investigators – as well as a long list of other examples of serious misconduct by Blackwater employees, the State Department never even interviewed either of the investigators during its inquiry.

The attitude among Blackwater employees – whose corporation had a contract worth over $1 billion to protect American diplomats – was described by the lead investigator as follows:

“Blackwater contractors saw themselves as above the law,” he said, adding that the “hands off” management resulted in a situation in which “the contractors, instead of Department officials, are in command and in control.”

Although most of us can only speculate about a connection between Surveillance Role Players and Cointelpro stalking, Americans should at least be curious why their government is constantly hiring people with counterintelligence training and secret clearances for unspecified activities within the U.S.

Journalists especially ought to investigate this mystery – if only out of professional curiosity.

________________________________________________________

U.S. Military Counterintelligence Agents

Military CI Agent

Where do intelligence-security contractor firms find the aforementioned “surveillance role players?” Since the qualifications include counterintelligence training and secret clearances, the most obvious source of personnel would be former military counterintelligence agents. In fact, the job announcements – such as the one shown above – specifically state that applicants with military experience are “highly desired.” For someone who is a former military CI agent, domestic spying offers an opportunity for easy money and power.

The Military Counterintelligence Agencies

Each branch of the military has a component responsible for counterintelligence:

U.S. Army Counterintelligence
Office of Special Investigations (Air Force)
Naval Criminal Investigative Service (Navy & Marine Corps)

US Army Intelligence Insignia

US Air Force OSI Insignia

US Navy – NCIS Insignia

Agents in each of the branches are federal law enforcement officers. They conduct the operations and investigations in their respective branches aimed at disrupting such crimes as espionage and sabotage, and they also handle other criminal matters.

This is the badge carried by Army Counterintelligence Special Agents:

ci_badge

Cashing In

CI stands for counterintelligence; it also stands for “cashing in.”

Imagine for a moment that you are a military intelligence agent who is either close to leaving the military or has recently left the military (or you are transitioning from full-time active duty status to that of a part-time active reservist). Now imagine you are told that you can work either full-time or part-time for an intelligence-security contractor and make good money for relatively easy work. (Harassing and spying on civilians in your own country is presumably a bit easier than working on counterintelligence operations in say, Afghanistan.)

Imagine further that you are the kind of person likely to be working in military counterintelligence to begin with – someone who can follow orders and keep a secret (and lie), and who does not question the morality of his or her work.

Keep in mind that the job proposal – working as a “surveillance role player” – offers the allure of participating in a secret program that operates outside the law – sort of a low-rent spy club.

The opportunity would be especially appealing to anyone whose marketable job skills are limited. A CI agent’s job training emphasizes things such as lying convincingly. That kind of skill set is not always in
big demand outside of fields such as used-car sales and politics.

Further imagine that – just like J. Edgar Hoover and his thugs – you subscribe to the kind of reactionary authoritarian political outlook that enables you to rationalize perpetrating various unconstitutional actions against your fellow citizens. Morally, you can live with what you do because you have an authority figure – your boss at the security-intelligence firm (and more generally, the military-intelligence industrial establishment) sanctioning your activities. In short, you’re a minion of a larger program run by people smarter and more powerful than you, and as such you are not inclined to question the morality of it all. (It would be “above your pay grade” to think independently about such matters.)

You can see why a job as a “surveillance role player” might be very attractive to such a person. If the individual is fundamentally a bully as well, he or she will have found the promised land.

Domestic spying on American civilians by the U.S. military

Not only do U.S. military CI agents sometimes cash-in on their experience by working as intelligence-security contractors after they leave the military, some of them do some spying on American civilians while they are still on active duty.

Most Americans probably assume that the targets of spying by the U.S. military are exclusively foreign enemies. That is not always the case. For example, one of the scandals which led to the U.S. Senate’s famous Church Committee investigations during the 1970s involved U.S. Army intelligence agents getting caught spying on anti-war protesters.

About a decade ago, news reports began to emerge about efforts by
the Defense Department to quietly loosen restrictions on its ability to conduct domestic spying. In June 2004, Newsweek reported the following:

“Without any public hearing or debate, NEWSWEEK has learned, Defense officials recently slipped a provision into a bill before Congress that could vastly expand the Pentagon’s ability to gather intelligence inside the United States, including recruiting citizens as informants.”

Allegations of political spying by military contractors have also been in the news in recent years. This lawsuit in Washington State for example, accused two civilian employees of the U.S. Army of spying on anti-war protesters. The case was dismissed in June 2014, but the plaintiffs are appealing the decision.

Larry Hildes, the lead attorney for the plaintiffs, had some interesting comments about the case, as reported in this write-up.

Hildes and [co-counsel] Hendricks say there are dossiers and PowerPoint presentations on some of the demonstrators that made the rounds at domestic terrorism conferences.

Some of the depositions of Army personnel, Hildes says, “are amazing.” One colonel, he says, said “of course we monitor the peace movement because they’re anti-military and might demonstrate against us.” Another, Hildes says, “was like something out of Dr. Strangelove. ‘There are no limits in intelligence-sharing to defend the homeland.’ He said that three times!”

Hildes says another Army official bragged about their effectiveness in disrupting the lives of PMR demonstrators to her bosses in the Pentagon—and that there was a PMR task force at McGuire Air Force Base in New Jersey. “There’s no way they weren’t duplicating this model other places,” he says.

If Judge Leighton’s current ruling stands, Hildes says, “the Army can take any peace group, where any member of it has ever engaged in civil disobedience, which is probably most peace groups in the country, and spy on them as much as they want, gather personal information as much as they want, label them as terrorists as much as they want, and everything is okay. Nothing’s out of bounds. The ground where the First Amendment and Fourth Amendment coexist to protect dissent, if this ruling stands, will be gone.”

Here is a deposition from the case which is an interesting read. It appears that just being an anti-war activist was enough to get someone designated as a surveillance target – which also involved having security personnel gather information about the activist’s friends and relatives.

John Towery Deposition

Gang stalking by active duty military intelligence agents

The cover article of the September 2013 issue (U.K. edition) of the magazine Fortean Times was called “Strange Tales of Homeland Security.” As the blurb on the cover made clear, the piece was about “State-Sponsored Gangstalking.” The author – Robert Guffey, a faculty member of the English department at California State University Long Beach – gave a detailed account of a gang stalking case which involved the U.S. military.

A marine had gone AWOL after stealing some sensitive military property – including night vision goggles and a laptop containing classfied information. Apparently the Naval Criminal Investigative Service (NCIS) initiated an organized stalking campaign against the suspect and his associates as well as an investigation. Various psychological operations tactics were used, such as overt stalking, in addition to some far more exotic methods.

So there is at least one credible published report of intense gang stalking being used by a U.S. military counterintelligence agency against an American citizen. Possibly the operations were intended to serve as both a form of extra-judicial punishment and as experimentation.

Click here to download a copy of the article as a Word document. (The article is behind a subscription pay-wall at the Fortean Times website.)

Strange Tales of Homeland Security by Robert Guffey

________________

Connections between U.S. military intelligence agencies and Law Enforcement Intelligence Units (LEIUs)

Most accounts of organized stalking include reports of sophisticated electronic surveillance, black bag operations, and exotic weapons. As noted in the previous section on LEIUs, former CIA analyst and expert on the history of spying in America, George O’Toole, offered an insight into how such tactics and equipment are acquired by police department intelligence units. Writing in 1979, O’Toole said this:

“U.S. Army Intelligence, which in the recent past has shown a disturbing propensity for spying on Americans, is more than a little chummy with the local cops in many cities. The Army trained several Baltimore intelligence-squad officers in techniques of electronic eavesdropping and surreptitious entry at its Fort Holabird spy school in Maryland. In return, the Baltimore cops passed along many of their intelligence reports to the army. In Chicago the Red Squad was in daily contact with the army’s 113th Military Intelligence Group during the late 1960s and early 1970s, passing along intelligence reports and receiving a variety of technical assistance.”

U.S. military intelligence agency databases about American civilians

In March 2014 the Washington Examiner reported that the Naval Criminal Investigative Service (NCIS) maintains a huge database which tracks civilian law enforcement records – including even minor offenses such as parking tickets. At the time of the report, the database already contained over 500 million entries.

The article quotes Eugene Fidell, who teaches military law at Yale Law School, describing the military’s current policy as “domestic spying.”

“Clearly, it cannot be right that any part of the Navy is collecting traffic citation information,” Fidell said. “This sounds like something from a third-world country, where you have powerful military intelligence watching everybody.”

________________________________________________________

Criminal “Informants” (Street-Level Perps)

rat

My comments on this subject are mostly speculative, but are based on first-hand experience as a target of illegal harassment by members of America’s security industry.

___________________

Criminal “informants” are the pawns on the counterintelligence chessboard. In a legitimate counterintelligence operation, an informant might have useful information and contacts – and therefore, be comparable to a more valuable chess piece, but in “gang stalking,” the perpetrators are expendable. Very likely, ex-convicts – over whom authorities have leverage – are used for some of the acts of overt stalking of counterintelligence targets. Potential pawns of this sort are never in short supply in America – a nation with one of the world’s highest per capita rates of incarceration.

Quite possibly, “informants” are the “students” referred to in the previously-discussed job descriptions for Surveillance Role Players (SRPs). The SRPs probably delegate much of the street-level harassment to rodents even lower on the food chain than themselves. This creates a perfect system of plausible deniability; the perpetrators seen by the target are unknown to the target, and the identities of the SRPs are unknown to the informants. Very likely, the security agent simply gives some cash to the perpetrator for executing some one-time act of harassment – such as making a comment which would be meaningless to anyone except the target, such as a reference to something learned by illegal surveillance. In other cases, the perpetrator might cut-off or bump the target in pedestrian traffic as a form of psychological warfare. Again, the contacts would be meaningless to outside observers, and virtually impossible to prove. Also – and this is critical: The street-level perpetrators have minimal credibility because of their backgrounds, so they pose little threat of exposing the operations.

Finally, this type of perpetrator is basically expendable from the perspective of the security agency (public or private) which uses him or her. If the “student” gets injured or killed, or captured, no one in a position of power will really care. If you want to get an idea of how America’s law enforcement industry views its informants, you should read this September 2012 New Yorker article about what local and federal police agencies did to 23-year-old Rachel Hoffman.

The fate of “informants” and other non-professionals recruited to participate in counterintelligence stalking cases – as distinguished from criminal investigation cases – is not easily ascertained because of the secrecy which surrounds such activity. Some of the published news reports cited on this website contain evidence that U.S. intelligence agencies might have orchestrated harassment campaigns in which informant perpetrators – and possibly others – were seriously injured or killed when the victims lashed out in response to the harassment. (For examples, see the news reports about the Washington Navy Yard shooting in 2013 cited in this webpage’s section on “Mobbing and Workplace Violence,” as well as the January 2014 stabbing in Manitoba, Canada, and the November 2014 shooting at Florida State University, cited in this webpage’s section about “Published News Reports.”)

___________________

Helpful Tips

Based on my own observations, and credible accounts shared with me by other self-proclaimed victims of government stalking, many low-level perpetrators are apparently rotated by the agents and contractors coordinating the harassment, so the target is not confronting the same individuals repeatedly. Even though a victim might be harassed daily, many of the stalkers only have a single instance of direct contact with the victim.

One of the implications of the apparently extensive use of multiple anonymous perpetrators for organized stalking is this: the corrupt members of public and private security organizations who orchestrate this form of crime apparently recognize the danger of using perpetrators who can be identified by the victim. Consequently, if you are a victim of this cowardly psychological terrorism, you should pay very close attention when perpetrators are used who are not anonymous. If someone whose identity is known to you has clearly been recruited to harass you (for example, if acts and comments by a neighbor, co-worker, landlord, local merchant, etc. are clearly intended to harass you), you should exploit that fact by making it very clear to that person – in a way that does not constitute an illegal threat – that you know he or she is perpetrating crimes against you. Even if that particular individual’s participation in the harassment discontinues, you should “stay in touch” with the person, and make clear (subtly) that you remember exactly what he or she did for the Stasi. An easy – and legal – way to do this is by anonymously mailing a flyer about this website to the person. You could even hand a copy of the flyer to him or her, and just mention that you saw it and thought it was interesting. Don’t elaborate or discuss it. You won’t need to.

That will create problems for both the pawns and their puppet-masters, neither of whom will be comfortable with spreading information about what they are doing.

________________________________________________________

Terrorism Liaison Officers (TLOs)

TLO

Since 2008, America’s “national security” personnel include “Terrorism Liaison Officers.” As explained on this website of a regional information-sharing network, TLOs are designated police officers, firefighters, paramedics, utility workers, and others trained to report “suspicious activity” to a national government database – the network of data fusion centers.

As the Denver Post reported, the “suspicious activity” could be simply taking photos or expressing “extremist beliefs.” One of the concerns about this policy was expressed by the director of the Electronic Privacy Information Center, John Verdi:

“The problem is, you’re drafting individuals whose job isn’t law enforcement to spy on ordinary Americans and report their activities to the government.”

Be discrete if you are ever taking notes. Apparently, that is also one of the forms of “suspicious activity.”

Whether some TLOs might also be directly involved – officially or unofficially – in counterintelligence harassment, is impossible to say. It is not hard to imagine such involvement though for the kind of person who would volunteer to be the designated reporter of “suspicious” citizens to Big Brother.

________________________________________________________

Police Officers

cop (cropped)

Participation of local police officers in extra-judicial enforcement activities has a long and well-documented history in the U.S. As previously discussed, counterintelligence units within urban police departments – called “Red Squads” – date back to the 1800s.

Historically, many of the spying and subversion operations of Red Squads targets political dissidents rather than organized crime groups. Such activities by local police departments continues today – although the police squads are now more commonly referred to as “Law Enforcement Intelligence Units (LEIUs).”

Not surprisingly, large cities such as Los Angeles and New York have the most extensive intelligence operations, although even small police departments are increasingly involved in the “national security” infrastructure because of federal grants from the Department of Homeland Security (DHS).

Money from the DHS creates a massive pig trough – excuse the pun – for local law enforcement agencies, and has greatly contributed to the militarization of police departments. DHS funding enables towns such as Keene, New Hampshire – population 23,000 – to purchase armored personnel carriers, for example.

Having police departments arm themselves with military weapons is disturbing, but the far more dangerous trend is the expansion of spying on citizens by local police, which is being encouraged at the federal level.

Local police departments participate in organized stalking of targeted individuals. In some cases they perpetrate stalking operations purely for local personal agendas – instead of as part of an unconstitutional, but ostensibly security-related program. The clearest example of this was the previously-mentioned 2011 case in Stockton, California, which was covered in local TV and newspaper reports. Cops stalked the city manager to punish him for not granting them a sufficiently generous compensation package.

That the local police officers resorted to creepy psychological operations tactics is significant; it did not happen randomly. The cops in Stockton were apparently familiar with psyops tactics, and they were used to getting away with such behavior.

Here is the TV news report about gang stalking by the Stockton police:

Sometimes the role of local police in gang stalking operations is to simply look the other way while others (federal agents or their private intelligence contractors) perpetrate their crimes. This was apparently the case when the feds were terrorizing Jacob Appelbaum and his girlfriend in June 2011.

Appelbaum is a prominent activist associated with WikiLeaks and with Tor (the anonymous web-browsing network). Not surprisingly, the U.S. intelligence community is not fond of him since he is in the business of exposing their crimes. After a botched home invasion of the residence of Appelbaum’s girlfriend by federal agents in Seattle (while she was at home), Appelbaum tried to file a police report about the crime. The cops initially refused to even take a report about the incident, let alone investigate it. After several attempts, Appelbaum was able to force them to take a report, but only after the ACLU got involved on his behalf.

Although I cannot prove it, I personally experienced several unmistakable instances of local uniformed police officers in California overtly stalking me. This occurred in multiple jurisdictions. I often receive reports of similar crimes by police from readers of this website. I can imagine that the ACLU must receive similar reports, although they refuse to publicly discuss the issue. It should be remembered that the ACLU – although extremely helpful on a range of civil rights issues – played no role in the exposure of the first version of Cointelpro.

Anyone who might be skeptical about the willingness of cops to perpetrate crimes against their fellow citizens as part of counterintelligence operations should read about the assassinations of black political organizers Fred Hampton and Mark Clark in 1969. As part of the FBI’s Cointelpro activities, 14 Chicago police officers raided the apartment in which the two men were sleeping, and shot them to death.

Furthermore, anyone who is skeptical that widespread gang stalking could occur without America’s vigilant news media calling attention to it – and the public becoming outraged – should also consider that those assassinations were barely noticed by the public.

For a complete explanation of counterintelligence crimes perpetrated by police officers, see the section earlier in this overview about Red squads (Law Enforcement Intelligence Units).

________________________________________________________

Firefighters (cropped)

As noted above, firefighters sometimes participate in intelligence sharing as Terrorism Liaison Officers. Some accounts by victims of organized harassment (including one linked below which was reported on the ABC News TV program 20/20) suggest that firefighters also sometimes participate in the systematic harassment of targeted individuals.

In the case of police officers, I have first-hand knowledge that some participate in organized stalking. Moreover, you don’t need to take my word for it since I have included several published news reports on this website which make the same point. In the case of firefighters, the extent of their involvement is less clear, but several facts make it plausible that they sometimes function as gang stalking perps.

For one thing, a pilot program to have firefighters gather and share security intelligence was launched by the U.S. Department of Homeland Security (DHS) in 2006. Apparently, a complete national framework for “suspicious activity reporting” by first-responders has not been fully worked out, but some fire department officials have taken a great interest in the program.

If you have a traditional (non-police state) view of America, you might have difficulty wrapping your mind around the notion that firefighters, paramedics, and utility workers are spying upon – let alone stalking and harassing – their fellow Americans. For an example of the thinking behind using first-responders as spies – and an overview of the main elements of the national intelligence-gathering infrastructure – you can read the following document.

Below is a Naval Postgraduate School master’s thesis written in 2012 by Joshua M. Dennis, a Chicago Fire Department chief. In his thesis, Mr. Dennis seeks to clarify the role of the U.S. Fire Service in the intelligence community.

Incidentally, the Naval Postgraduate School is apparently something of a firefighter spy academy. If you perform a Google search for similar theses, you can find several.

Fire Service Intelligence

Hat-tip to the blog Cryptoscatology for highlighting that document.

An example of the kind of suspicious things for which firefighters are supposed to be looking is given in the May 2010 issue of Homeland Security Affairs:

“Unusual documents for the occupancy type: especially maps, books, blueprints, literature…of critical infrastructures.”

So if firefighters visit your apartment building some day – for a periodic safety inspection, or in response to a false fire alarm – don’t be surprised if you notice them taking a keen interest in your reading material as they pass through.

Fire departments also participate – presumably both as providers and users of information – in the nation’s system of data fusion centers. A May 2014 article in the New York Times describes those fusion centers as follows:

The nation’s 78 fusion centers — which have received hundreds of millions of dollars from the Department of Homeland Security and other federal agencies, as well as money from state governments — are run by state and local authorities…..Many centers….can involve dozens of officials from police and fire departments, federal agencies and private companies….[emphasis added]

Another indication of the law enforcement and surveillance role of fire departments in the new Big Brother version of America is that some fire departments apparently have subpoena powers. We know this because, for example, the Fire Department of New York used its subpoena powers to spy on the cell phone records of a whistle-blower in what appears to have been an effort at retaliation.

ABC News TV Report: Corrupt Firefighters Harassing Ohio Couple

This news report broadcast in May 2014 gives a clear example of firefighters participating in organized stalking. As in the previously-mentioned incident involving gang stalking by local police in Stockton, California in 2011, this Ohio case was done for personal vengeance.

In Hubbard, Ohio a couple was systematically tormented for 7 years in a harassment campaign orchestrated by the town’s fire chief. Apparently, he was angry at the couple because of a real estate dispute. He enlisted other firefighters, police officers, and local residents to terrorize the couple by having people drive by the victims’ home at all hours honking their horns.

The harassment – which the couple thoroughly documented on video – resulted in legal claims which were still pending at the time of the news reports. The couple’s website includes the official reports and overwhelmingly-convincing video evidence of their systematic harassment by corrupt firefighters and corrupt police officers.

This 2-minute video perfectly illustrates the relentless harassment:

Public image versus reality

A large gap often exists between the public’s perception and reality regarding first-responders (firefighters, police officers, and paramedics). Those professions contain their share of good people – and even heroes, but there is a significant bad element that tends to be underestimated.

When you consider reports such as the one above, and not-infrequent reports of corruption, nepotism, racism, brutality, and an often “tribal” culture among first-responders, you realize: allegations that such people perpetrate organized harassment – both the professional and vigilante varieties – are not at all far-fetched.

________________________________________________________

InfraGard & DSAC Members

excellent

As mentioned in the introduction of this overview, two corporate associations – InfraGard and DSAC – have partnerships with the FBI and Homeland Security to share intelligence. Apparently, certain trusted individuals in the participating corporations are granted special membership status by the FBI – complete with ID cards – and have privileged access to information and direct communication with the FBI.

As a practical matter, this very likely means that if one of these elite members of the business community decides to have someone targeted for an “investigation” they could simply tell the FBI that they have concerns that the individual represents what counterintelligence agents call “an insider threat” – meaning that an employee is suspected of being likely to steal proprietary information or that he or she is a “disgruntled employee” or has “extremist beliefs” and poses a safety or national security risk.

For a detailed explanation of this unholy alliance, I recommend reading this May 2013 report from the Center for Media and Democracy, which reported that certain corporations apparently exploited this partnership to use the FBI as a weapon against their political adversary, the Occupy Wall Street Movement.

In a 2009 TV program, Jesse Ventura, the former governor of Minnesota, interviewed Matthew Rothschild, senior editor of the Progressive about InfraGard. Ventura also confronted a member of InfraGard regarding the partnership’s obvious potential for abuse of power. The relevant section begins 25 minutes into this video clip.

If you suspect that your boss – or former boss – might have arranged to have you blacklisted, you should definitely watch this.

If the video becomes unavailable at the above link, and you want to search for it, this is the information: Conspiracy Theory with Jesse Ventura, Episode #4, “Big Brother” – originally broadcast on December 23, 2009.

________________________________________________________

Threat Assessment Teams

Witch Trial

An early example of a Threat Assessment Team: peasants
at a witch trial in “Monty Python and the Holy Grail”

As mentioned in the section above on selection of targeted individuals, a Threat Assessment Team (TAT) is a small group of designated staff members in an organization (public or private) which attempts to assess whether certain individuals in the organization pose a threat.

As the page about TATs in the FBI’s website makes clear, these groups are expected to work with law enforcement agencies to share their suspicions that an individual is likely to commit a crime in the future.

If the members of the TAT are also members of InfraGard or DSAC – or if they have an informal connection to a law enforcement or security agency, it would presumably not be unlikely that the suspicious individual would find his or her way onto a watch list of some sort.

Of course, it’s purely speculative how such a process might play out regarding organized stalking, but the U.S. law enforcement business is now so secretive that speculation is often the only option to try to understand it.

________________________________________________________

Citizen Spies

DHS Poster

Department of Homeland Security Poster

Snitch Programs

Clearly the government also makes extensive use of citizen informants. An obvious example of this was the Department of Homeland Security’s public awareness campaign introduced in 2010 encouraging citizens to report anything suspicious: “If you see something, say something”

State and local governments have followed the feds’ lead (and used the feds’ money) to promote a “snitch” culture – such as this Florida program to encourage residents to spy on their neighbors.

Naturally, such programs could have a corrosive effect on the inclination of Americans trust each other. That general level of trust ought to be a concern for everyone, since it has declined in recent decades. An Associated Press poll published in November 2013 found that the segment of America’s population which believes that “most people can be trusted” had fallen from half (in 1972) to one-third.

Public awareness programs designed to encourage people to become snitches are bad enough, but even more disturbing are secret programs in which citizens are paid to function as part-time spies to gather information on their fellow Americans.

Such programs date back to at least the Cointelpro era. Chicago Daily News Columnist Mike Royko reported on one political activist targeted in Chicago in 1970 who obtained information (perhaps through a Freedom of Information Act request) from the FBI about her record. She discovered that she had been spied upon by the “Welcome Wagon” lady who had met her when she moved into a new neighborhood. (Welcome Wagon is a company which promotes local businesses. From the late 1920s until the late 1990s, they sent “hostesses” to visit new homeowners and give them gift baskets with samples and coupons.)

Incidentally, Mike Royko – whose quote appears at the top of the homepage of Fight Gang Stalking – was also a target of government spying. He was apparently being followed by Chicago’s Law Enforcement Intelligence Unit (LEIU). Apparently, the FBI did not approve of Royko’s columns, which sometimes criticized the agency. Eventually, the FBI had an 86-page file on Mike Royko, who died in 1997 at age 64.

A Brigade of Snitches: The American Protective League

Most Americans are unaware of the U.S. government’s history of using its citizens to spy on each other. A prime example of this phenomenon was the American Protective League:

During World War I some 250,000 volunteers joined the units that made up the American Protective League (APL). This private organization, which had nearly 100,000 members in 600 cities by 1917, worked with the Justice Department’s Bureau of Investigation to identify war saboteurs and alien spies.

Wearing badges that looked official, the volunteers soon expanded their mission. They conducted surveillance, and harassed, intimidated and “arrested” people whose loyalty was questioned, perhaps because they refused to buy Liberty Bonds. The APL staged raids on factories, union halls, and private homes, and detained more than 40,000 people, including draft dodgers, for the War Department.

Boy Scout Merit Badges for Snitching

Nazi Boy Scout

Volunteer members of the American Protective League (see above) were issued U.S. government ID cards. Another group of volunteer snitches who were issued government ID cards was described in a June 2013 blog entry on The New York Review of Books website:

“In the 1960s in Rochester, New York, the local police department launched Operation SAFE (Scout Awareness for Emergency). It involved twenty thousand boy scouts living in the vicinity of Rochester. They got identification cards marked with their thumb prints. On the cards were the telephone numbers of the local police and the FBI. The scouts participating in the program were given a list of suspicious activities that they were to report.”

Letter from an Anonymous Snitch

Just as the Stasi received intelligence from volunteer snitches in communist East Germany, so did the FBI during J. Edgar Hoover’s reign (and no doubt still do today). Here is an example of that kind of tip. The following letter is included in the FBI file obtained through a Freedom of Information request about Bella Abzug, a progressive activist who was a member of the House of Representatives during the mid-1970s.

The anonymous letter is from a college classmate of Abzug who identifies himself or herself as “Pro-F.B.I.” Apparently, he or she deemed Ms. Abzug to be insufficiently fascistic, and therefore someone on whom the agency should definitely spy.

Click on image to enlarge

Snitch Letter

Hat tip to Matt Stoller, who highlighted this document in his blog in March 2014.

Motivations for becoming a snitch

Based on my own observations and on speculation about what would be a logical (and in some cases necessary) use of resources for a counterintelligence operation, it seems that some of the people who participate – at least in small ways – in the stalking are civilians who are presumably told they are assisting in an investigation or a “neighborhood watch” type program.

No doubt such neighbors of the targeted individual would not think of themselves as “vigilantes” even though they are in fact participating in an illegal conspiracy designed to inflict extra-judicial punishment.

The motivations of a particular stalker are probably often unrelated to the reason the targeted individual was blacklisted in the first place. While the victim may have been targeted simply because he or she crossed someone with connections and money, the perpetrators – including the victim’s neighbors, associates, relatives, etc. – can simply be told various lies about the victim. Those lies can be tailored to fit the particular person or groups of persons being recruited to participate in the harassment.

New snitch programs

In September 2014, the Justice Department announced a new plan to root out all the potential terrorists in America by implementing a program of “community-led interventions.” If that sounds like it might lead to Stasi-type witch hunts, don’t worry; Attorney General Eric Holder assures us that this “innovative and aggressive” program will be guided by “democratic values.”

________________________________________________________

The Whole Stasi Gang

entire goon squad

The full list of groups who either passively acquiesce or actively participate in “gang stalking” – for money or as volunteers – probably looks something like this:

1) Federal law enforcement & intelligence agencies
. (DOJ, FBI, DHS, CIA, NSA, etc.)

2) Intelligence-security contractors
. (including “Surveillance Role Players”)

3) Military counterintelligence agents

4) Criminal informants

5) InfraGard & DSAC members & Threat Assessment Team members

6) Terrorism Liaison Officers

7) Police officers
. (Law Enforcement Intelligence Units & patrol officers)

8) Firefighters

9) Private investigators

10) Neighbors, landlords, merchants, co-workers, and even relatives of the victim. In some cases, these persons are apparently recruited under the pretense that they are participating in an “investigation” or a neighborhood watch program.

11) Others informally recruited to assist – such as friends, relatives, and business associates of persons in one of the other categories

A person in category 10 or 11 is what East Germany’s Stasi agents referred to as an Inoffizielle Mitarbeiter – an unofficial collaborator.

___________________

Gang stalking perpetrators are an assortment of corrupt politicians, corrupt corporate executives, corrupt federal agents, corrupt cops, snitches, brown-nosers, bullies, liars, parasitic security contractors, sociopaths, psychopaths, traitors, and useful idiots. This is exactly what you would expect in a program refined by a communist secret police agency.

___________________

“It’s very common for the victims to understand a system
better than the people who are holding the stick.”

– Noam Chomsky, Imperial Ambitions

___________________

Blue Line

12. Social Conformity & Obedience to Authority
Nazi Soldiers

Nazi soldiers invading Poland

“Blind belief in authority is the greatest enemy of truth.”
– Albert Einstein

People like to believe that the evil and stupid obedience displayed by people such as Hitler’s followers is far-removed from their own nature and culture. History and science suggest that is not the case.

Anyone wishing to understand gang stalking – or even to assess the plausibility of such a conspiracy – should briefly review the interesting (but disturbing) historical and scientific evidence on conformity and obedience.

History is filled with shocking manifestations of group-think – such as
the Salem, Massachusetts witch trials. Examples of blind deference to authority include attrocities such as the “Rape of Nanking” in the 1930s, in which Japanese soldiers, sanctioned by their leaders, raped, tortured, and murdered thousand of Chinese civilians. Many infants were killed in front of their mothers in that massacre; sometimes the soldiers gouged-out the children’s eyes before killing them.

Literature is similarly filled with helpful examples of the evil and idiocy associated with group-think and obedience. William Golding’s Lord of the Flies is one iconic example.

Be this guy

The story behind this photograph

Psychology experiments show that it would be easy to recruit people to participate – as paid thugs or as vigilantes – in the organized harassment of targeted individuals. The social dynamics would be effective in a small workplace run by a psychopath manager, or on a large scale in an agency such as the FBI.

In fact, that was the conclusion of a previously-mentioned article in the September 2004 issue of the Sociological Forum. The authors found that agents in the original version of the FBI’s Cointelpro operations targeted individuals for surveillance and harassment even when those individuals were not engaged in subversive activities. The targeting was done to please the authority figures higher up in the agency’s food chain.

Two famous sets of experiments are of particular relevance here:

(1) Conformity experiments by social psychologist Solomon Asch

In Asch’s experiments, students were asked to participate – along with others – in what was ostensibly a “vision test.” Actually, the other participants were accomplices of the experimenter, and the study sought to find how the unsuspecting students would be influenced by the behavior of the others.

When asked to assess the relative lengths of lines displayed on cards, unsuspecting students were frequently influenced by the responses of the accomplices around them. In other words, people often changed their beliefs about what they had seen when the group expressed an opinion at variance with their own. In a control group, with no pressure to conform, few of the subjects gave incorrect answers. A majority (75 percent) of the subjects gave an incorrect answer to at least one question when surrounded by others expressing the wrong answer.

Asch Experiments

__________________

(2) Obedience to authority figures experiments by psychologist Stanley Milgram

In Milgram’s experiments, participants were led to believe that they were administering small electrical shocks to a person being tested, and that the voltage was being incrementally increased with each delivery of the shock. The experiment (and other similar subsequent experiments by others) found that most people (61 to 66 percent) will administer a fatal electrical shock to an innocent person purely out of deference to authority.

“The disappearance of a sense of responsibility
is the most far-reaching consequence of submission
to authority.” – Stanley Milgram

Anyone skeptical – despite such findings – about how easy it is to manipulate average citizens to do very bad things to people they don’t know should watch this video clip from an ABC TV program on the subject. The video features a private investigator-type person (not unlike the people who manage Cointelpro stalking operations presumably) portraying himself as a law enforcement officer, and easily persuading people to participate in serious crimes against strangers.

The fascist element of the U.S. intelligence community, law enforcement community, and military-industrial complex

As a former member of the U.S. military who also worked as a security contractor, I can say with some authority that many of the people in those professions have both integrity and intelligence.

Unfortunately though, such career fields – and I’m sure this applies to intelligence and law enforcement agencies such as the FBI and CIA as well – have more than their share of the type of folks described here by journalist Chris Hedges. Having spent a couple of decades as a war correspondent, he understands the mentality and character of authoritarian careerists.

Hedges’ observations apply not only to military officers, but also to the related professions of law enforcement and domestic spying as well.

“Most institutions have a propensity to promote mediocrities, those whose primary strengths are knowing where power lies, being subservient and obsequious to the centers of power and never letting morality get in the way of one’s career. The military is the worst in this respect. In the military, whether at the Paris Island boot camp or West Point, you are trained not to think but to obey. What amazes me about the military is how stupid and bovine its senior officers are. Those with brains and the willingness to use them seem to be pushed out long before they can rise to the senior-officer ranks. The many Army generals I met over the years not only lacked the most rudimentary creativity and independence of thought but nearly always saw the press, as well as an informed public, as impinging on their love of order, regimentation, unwavering obedience to authority and single-minded use of force to solve complex problems.”

Here is the full article at truthdig.

Authoritarian Personality Type

The Authoritarians (Cropped)

Participants in the original Cointelpro and its current form – gang stalking – have what psychologists sometimes refer to as an “authoritarian personality.”

Robert Altemeyer, an associate professor of psychology at the University of Manitoba, has studied this subject extensively. An October 2004 article in Reason describes his findings about the authoritarian type personality:

“….authoritarians are cognitively rigid, aggressive, and intolerant. They are characterized by steadfast conformity to group norms, submission to higher status individuals, and aggression toward out-groups and unconventional group members.”

The article notes that Altemeyer’s views were confirmed by research at the University of California at Berkeley, where they found that such people – who are typically very conservative politically – have common psychological factors described by the article’s author as follows:

“fear and aggression, dogmatism and intolerance of ambiguity, uncertainty avoidance, need for cognitive closure, and terror management that causes conservatives to shun and even punish outsiders and those who threaten the status of their cherished world views.”

Dr. Altemeyer wrote a book on this subject called The Authoritarians (2006). In his book, he makes clear that his references to “right-wing” authoritarian followers is a psychological – not ideological – category. Citizens in communist East Germany who served as informants for the Stasi (state police) were “authoritarians” just like far-right kooks in America today who participate in organized stalking. Because they are subservient to authority figures, such people are easily manipulated by those in power.

Professor Altemeyer generously made his book available to the public as a free pdf document: The Authoritarians

Authoritarian Tribalism Versus Respect for Legitimate Authority

A fundamental distinction deserves to be made here explicitly. The perspective of “authoritarian” perpetrators of organized stalking has nothing to do with respect for legitimate authority. Corrupt members of U.S. intelligence agencies, law enforcement agencies, and their security contractor associates are not motivated by concerns about public safety or national security – let alone respect for the law. They mostly value the paychecks they receive for “work” that involves minimal effort or risk. To the extent that they have any loyalty, it is not to their country, but to their fellow corrupt pigs. It probably is true that a fair number of the perpetrators do have right-wing political views which could be vaguely characterized as “authoritarian,” but it would be giving them too much intellectual credit to ascribe their bullying to some philosophical vision – even a fascistic un-American one. Perpetrators of COINTELPRO/MK Ultra-type harassment are just criminals with badges; they’re drunk with power and they serve their own interests.

__________________________

Personality & Character Traits of Counterintelligence Stalkers

Authoritarian personality-type folks are exactly whom you would expect to find in the ranks of a counterintelligence agency (and its contractor firms). Based partly on inference and partly on first-hand observation, here are some of their key traits:

Subservience

As Stanley Milgram’s experiment found, people who can be induced by authority figures to commit acts of unwarranted cruelty are as common as manure at a cattle ranch. People who seek employment in a counterintelligence agency such as the FBI or DHS (or one of their security contractor firms) are especially likely to fit this profile. The previously-mentioned Sociological Forum article regarding the original Cointelpro program seemed to confirm this.

Cowardice

A person would not necessarily have to be a coward to participate in the kind of harassment associated with the current version of Cointelpro (“gang stalking”); however, he or she would also not need to be courageous. A cowardly sociopath would be a perfect fit. The “work” is neither physically dangerous nor legally risky. Author Douglas Valentine perfectly described the type of person often drawn to U.S. intelligence agencies – namely, someone who is excited by the prospect of engaging in lawless behavior without the legal jeopardy that usually entails: “a sociopath without the guts to go it alone in the underworld.”

Counterintelligence agents such as “Surveillance Role Players” who perpetrate gang stalking are bullies, but they like to play close to mommy’s apron where it’s safe.

Stupidity

Having worked for years in the corporate security industry (often with current and former law enforcement officers), I can tell you that a lot of people in such professions have the imagination, sense of humor, deep thinking capacity, and empathy of a cinder block. Having such a personality is not a sin of course, but it has consequences. People who are unable or unwilling to question what they are told by higher ranking authority figures are dangerous when serving in a corrupt power structure. The difference between constitutionally legitimate law enforcement and being a thug is too subtle for some people to grasp.

Sadism

“The connection between stupidity and cruelty is a close one.”

— Christopher Hitchens

I don’t have much to add to Hitchens’ observation. The tactics of organized stalking are intended as psychological torture, and the perpetrators are often just as stupid as you would expect such people to be.

Dishonesty

Deception can be an ethically legitimate element of a counterintelligence operation (or an undercover law enforcement operation); however, counterintelligence programs in the U.S. – in the past (Cointelpro), and currently (“gang stalking”), are frequently both immoral and illegal. The FBI’s campaign to destroy the actress Jean Seberg by slandering her (for supporting the black civil rights movement) was a case in point. A rogue agency’s classified internal memo that purports to sanction something that clearly violates the U.S. Constitution – and morality – does not make the activity legal. Lying as part of such an operation is just corruption. People who engage in such deception and get paid for it are just criminals.

Laziness

Counterintelligence stalking does not require technically complex operations. America’s current version of Cointelpro mainly involves harassing individuals who lack the kind of resources and connections that would make them challenging or dangerous targets. Also, there are essentially no objective goals for security contractors who perform this kind of work; the firms which engage in this sleazy business are not expected to produce anything tangible. They receive their cash flow from the national security budget pig trough regardless of whether they do anything productive. Boondoggles are common in the military-industrial complex of course, but most contractors have to at least produce something, such as a tank or an airplane. Intelligence-security contractors sometimes only have to pretend that they are monitoring and countering actual threats.

Greed & Lust for Power

This is the core of organized stalking. Probably only the stupidest perpetrators of gang stalking are under any illusion that they are doing anything useful and legitimate; they’re just thugs for a government which opinion polls show is regarded as corrupt by most Americans. “Surveillance Role Players” and their bosses have security clearances, so perhaps some of them convince themselves that they are special, but they are not an elite group; in 2013, over 5.1 million Americans had security clearances. Gang stalking perps are among the many parasites feeding at the massive “homeland security” pig trough.

“Except for an extraordinary diligence in looking out
for his personal advancement, he had no motives at all.”

– Hannah Arendt on Adolf Eichmann (one of
the major organizers of the Holocaust)

In summary, the kind of people who participate in gang stalking are generally subservient, easily influenced by peer pressure, cowardly, stupid, sadistic, dishonest, lazy, and greedy. Apart from those traits though, they are probably fine people.

Blue Line

13. The U.S. Department of Justice (DOJ)
. and Gang Stalking

DOJ Fish

The moral character of the DOJ

A fish rots from the head – whether it’s the Vatican covering up decades of child sex abuse by priests or the U.S. Justice Department sanctioning secret operations which violate the U.S. Constitution. The DOJ – one of America’s 17 intelligence agencies – administers the Federal Bureau of Investigations (FBI) – which the American Civil Liberties Union (ACLU) says “has a long history of abusing its national security surveillance powers.” Whatever the exact organizational structure of the current illegal counterintelligence surveillance and harassment operations that are sometimes called “gang stalking,” such operations would not be happening without the knowledge and approval of the DOJ.

In recent years, the DOJ has been justly criticized for its aggressive prosecution and intimidation of whistle-blowers and journalists who expose abuses of power by U.S. intelligence agencies. In 2012, for example, the Justice Department secretly seized two months of telephone records of reporters and editors of the Associated Press. James Goodale, a First Amendment lawyer who played a key role in the publication of the Pentagon Papers by The New York Times, made the case that the DOJ was essentially treating reporters as criminals.

As the ACLU points out though, such behavior is consistent with a long-established history. When Robert F. Kennedy was the U.S. Attorney General (i.e., head of the DOJ) in the 1960s, he authorized some of the original COINTELPRO operations, such as wiretaps on the home of Martin Luther King, Jr.

Corruption at the U.S. Department of Justice is a bipartisan phenomenon. In 1971, when civilian activists leaked secret FBI documents to the Washington Post which revealed crimes committed against Americans by the FBI during the COINTELPRO operations, U.S. Attorney General John Mitchell (who later served prison time for his role in the Watergate scandal) tried unsuccessfully to persuade the Post’s executive editor Ben Bradlee not to disclose the documents.

Assessing the plausibility of the claim that the DOJ countenances a modern version of COINTELPRO (“gang stalking”) requires looking at various examples of the moral character of the agency. Eric Holder, U.S. Attorney General from 2009 to 2015, is a good example of the kind of people who work at the DOJ, and – more generally – the kind of people who often infest the highest echelons of America’s power structures. The approval of unconstitutional secret counterintelligence operations would not be out of character for someone like Holder. When he was President Clinton’s Deputy Attorney General (1997 to 2001), he approved the pardon of Marc Rich – a wealthy investor who was indicted on 63 counts of tax evasion and other charges and fled to Switzerland to avoid prosecution. By all serious accounts, the only reason Clinton granted the pardon was that Rich’s wife was a big donor to the Democratic Party. Even the opinion writers for The Washington Post – an establishment newspaper which is generally sympathetic to the Democrats – said the pardon should have precluded Holder from becoming President Obama’s Attorney General. Richard Cohen wrote of the pardon:

“It suggests that Holder, whatever his other qualifications, could not say no to power. The Rich pardon request had power written all over it — the patronage of important Democratic fundraisers, for instance.”

________________________________________________________

Sweeping the Dirt Under the Rug

Even the Justice Department’s own internal affairs office – the Office of Professional Responsibility (OPR) – reports that hundreds of federal prosecutors and other DOJ employees violated laws, rules, and ethical principles over the decade from 2002 through 2013.

More than 400 of the instances they cited involved serious transgressions: recklessness or intentional misconduct. These included things such as failure to provide exculpatory evidence information to defendants, violation of Constitutional rights, and abuse of investigative authority.

In its review of the DOJ’s findings, the Project on Government Oversight (POGO) made clear that the Justice Department also conceals some of its bad behavior from the public.

“As a general practice, the Justice Department does not make public the names of attorneys who acted improperly or the defendants whose cases were affected. The result: the Department, its lawyers, and the internal watchdog office itself are insulated from meaningful public scrutiny and accountability.”

The report from POGO also quoted from a January 1993 Washington Post article, in which a government auditor described the secretive and dysfunctional nature of the DOJ’s internal affairs office this way:

“The system they have in place could not be
better for sweeping things under the rug.”

________________________________________________________

Federal Judges Report Frequent Lying by DOJ Prosecutors

Most Americans give little thought to their nation’s Department of Justice, except perhaps for high-profile cases with partisan political implications. Evidence of the DOJ’s lack of integrity does not usually show up on the public’s radar.

Federal judges however, often see examples of the moral rot at the DOJ, and have warned for decades that frequent misconduct by prosecutors undermines Constitutional protections of individuals’ rights. A September 2010 article in USA Today reported on the effectiveness of a law enacted by Congress in 1997 intended to curb illegal conduct by prosecutors, such as lying and deliberately concealing evidence:

“…USA TODAY documented 201 criminal cases in the years that followed in which judges determined that Justice Department prosecutors — the nation’s most elite and powerful law enforcement officials — themselves violated laws or ethics rules.

In case after case during that time, judges blasted prosecutors for “flagrant” or “outrageous” misconduct. They caught some prosecutors hiding evidence, found others lying to judges and juries, and said others had broken plea bargains.”

Why would federal prosecutors engage in misconduct? Part of the explanation is that when they get caught, they are unlikely to be fired – as noted in another article by USA Today, which also found that “the Justice Department consistently conceals its own investigations of misconduct from the public.”

________________________________________________________

Lying by the FBI

Since the DOJ oversees the FBI, it is not surprising that the latter also takes a very elastic view of its obligation to abide by the U.S. Constitution. One way they do this is to assert, when caught lying, that the deception is being done in the name of “national security.”

When various American Islamic organizations and individuals filed a FOIA (Freedom of Information Act) request in 2006 to determine if the FBI had engaged in illegal surveillance of them, the FBI concealed the existence of much of the material requested. In a lawsuit which followed, the 9th Circuit Court of Appeals found that the FBI lied to the plaintiffs and to the court about the existence of the documents sought.

When confronted with their deception, the FBI argued, in effect, that the agency should not be required to tell the truth in court if they feel that doing so could compromise national security interests. The court rejected that claim.

Anyone wondering about the plausibility of claims that federal law enforcement agencies acquiesce in gang stalking should consider the fact that such agencies sometimes explicitly assert that they are above the law.

________________________________________________________

DOJ’s Complicity in Spying and Lying by Private Intelligence Firms

Members of the Anonymous movement hacked into the emails of the cybersecurity firm HB Gary Federal In February 2011 after an executive at that firm boasted in the Financial Times that his company had infiltrated Anonymous and started to expose them.

One of the reports contained in the emails was a plan for HB Gary to work with several other security firms to destroy the whistle-blower organization WikiLeaks. News reports had indicated that Wikileaks was planning to publish documents showing possible corruption and fraud at Bank of America, so the bank funded a “counterespionage” campaign against Wikileaks, which included hiring the large intelligence contractor firm Booz Allen, whose staff includes many former top officials from the intelligence community and the defense department.

One of the proposals was to create and plant fake documents to discredit Wikileaks. The plans also included hacking into Wikileaks’ computer systems. Another proposal was to “attack” and “disrupt” the career of journalist Glenn Greenwald to pressure him into abandoning his public support of Wikileaks.

Bank of America had hired the law firm Hunton & Williams – among the most well-connected law firms in the nation’s capital – to coordinate the bank’s war against Wikileaks at the recommendation of the DOJ.

Glenn Greenwald explained the serious implications of this network of government and corporate players in the private espionage business in a February 2011 article for Salon.com:

“What is set forth in these proposals for Bank of America quite possibly constitutes serious crimes. Manufacturing and submitting fake documents with the intent they be published likely constitutes forgery and fraud. Threatening the careers of journalists and activists in order to force them to be silent is possibly extortion and, depending on the specific means to be used, constitutes other crimes as well. Attacking WikiLeaks’ computer infrastructure in an attempt to compromise their sources undoubtedly violates numerous cyber laws.

Yet these firms had no compunction about proposing such measures to Bank of America and Hunton & Williams, and even writing them down. What accounts for that brazen disregard of risk? In this world, law does not exist as a constraint. It’s impossible to imagine the DOJ ever, ever prosecuting a huge entity like Bank of America for doing something like waging war against WikiLeaks and its supporters. These massive corporations and the firms that serve them have no fear of law or government because they control each.”

As Greenwald notes, a clear example of the extent to which the DOJ serves corporate interests rather than the interests of justice and the American public is the department’s very different reactions to the cyber attacks on corporations versus an attack on Wikileaks:

“After Anonymous imposed some very minimal cyber disruptions on Paypal, Master Card and Amazon, the DOJ flamboyantly vowed to arrest the culprits, and several individuals were just arrested as part of those attacks. But weeks earlier, a far more damaging and serious cyber-attack was launched at WikiLeaks, knocking them offline. Those attacks were sophisticated and dangerous. Whoever did that was quite likely part of either a government agency or a large private entity acting at its behest. Yet the DOJ has never announced any investigation into those attacks or vowed to apprehend the culprits, and it’s impossible to imagine that ever happening.

Why? Because crimes carried out that serve the Government’s agenda and target its opponents are permitted and even encouraged; cyber-attacks are “crimes” only when undertaken by those whom the Government dislikes, but are perfectly permissible when the Government itself or those with a sympathetic agenda unleash them.”

A November 2013 news report from Democracy Now! also asserted that private intelligence-security contractor firms are pretty much free to perpetrate crimes on behalf of their corporate clients without fear of legal punishment. A report by Gary Ruskin, director of the Center for Corporate Policy, a project of Essential Information, was the main subject of the segment.

“…these corporations employ former CIA, National Security Agency and FBI agents to engage in private surveillance work, which is often illegal in nature but rarely — if ever — prosecuted.”

– Journalist Amy Goodman

The report explained that major U.S. corporations use spies to conduct surveillance (sometimes illegally) of non-profit organizations engaged in advocacy for causes such as anti-war policy, consumer rights, environmentalism, animal rights, and arms control.

Corporations engaging in this kind of espionage reportedly include Wal-Mart, Monsanto, Bank of America, Dow Chemical, Kraft, Coca-Cola, Chevron, Burger King, McDonald’s, Shell, BP, and others – as well as the U.S. Chamber of Commerce.

________________________________________________________

America’s Post-Constitutional Law Enforcement Paradigm

constitution on fire

A confluence of developments over the past couple of decades has led to a more militarized and secretive form of law enforcement in America. A counterintelligence subversion strategy of organized stalking is among the most extreme manifestations of the new paradigm.

The government’s natural tendency to expand its size and power has been accelerated by the politics, profits, and career opportunities associated with the “War on Drugs” and the “War on Terrorism.” At the same time, advances in technology have made possible highly invasive surveillance tools which create a constant temptation for abuse by people in the intelligence, law enforcement, and security industries.

Another development has been an erosion of traditional jurisdictional boundaries in law enforcement. By design, numerous federal and local law enforcement and intelligence agencies now work more closely with each other, and with the private contractors who provide much of the infrastructure, such as defense industry firms and private security firms.

U.S. law enforcement agencies rely heavily upon criminal informants – despite the obvious conflicts of interest that involves. Budgets and audits cited in the New York Times for example, showed that the FBI was using more than 15,000 secret informants in 2008, and the DEA (Drug Enforcement Adminstration) had about 4,000 criminal informants on its payroll in 2005.

By my own observations, and by anecdotal reports of others, gang stalking apparently makes extensive use of criminal informants. But those snitches are not being used by the FBI just to spy and inform; they are perpetrating acts of criminal harassment for the purposes of counterintelligence subversion.

Rather than working to ensure the protection of Americans’ rights in this new Big Brother surveillance environment, the U.S. Department of Justice has done everything possible to enable the executive branch to increase its secrecy and power at the expense of Americans’ civil liberties.

A variety of Orwellian legal weapons have emerged – always based on claims of national security. “Suspicious Activity Reports” are now filed by “Terrorism Liaison Officers” and sent to a network of regional “Data Fusion Centers” and reviewed by agents at the “Homeland Security Department.”

Old-fashioned concepts in the Bill of Rights – like obtaining search warrants from judges – have been tossed aside. Now the FBI can just issue a “National Security Letter.” Instead of launching an investigation based on probable cause, the FBI can now just target an individual for surveillance and investigation by calling it an “assessment.”

Concerning other elements of the now-massive U.S. spy network, the public can only speculate. For example, no one has yet said publicly what is being done by the numerous “surveillance role players” (discussed elsewhere in this website) with secret clearances and counterintelligence training who are employed by intelligence-security contractors.

If anyone challenges the Constitutional legitimacy of any of these suspicious policies (or if members of the government question other secret policies whose existence is unknown to the public), the matter is referred to the U.S. government’s “Star Chamber” – the secret FISA Court, which in nearly all cases simply rubber-stamps the policy to maintain the façade of legitimacy.

________________________________________________________

“Suspicious Activity Reports” and “Data Fusion Centers”

Minority Report

In the science fiction film Minority Report (2002) a special
police unit arrests murderers before they commit their crimes

In theory, America’s justice system is based on ideals such as protecting rights and punishing people who have been convicted in fair trials. Sometimes those principles are operative. Often however, the U.S. justice system is driven by political agendas, careerism, greed, laziness, prejudice, bureaucracy, technological opportunism, corporate interests, the arrogance of people in power and – as in the case of organized stalking – criminal behavior by the very people associated with the system.

In some quarters, the notion that criminal suspects should be given a trial is seen as quaint. One example of this new attitude is “predictive policing” – also called “proactive policing” – in which law enforcement agencies aggressively gather and analyze data to try to anticipate threats before they emerge.

Among the manifestations of that law enforcement philosophy is the “Suspicious Activity Reporting” (SAR) system and data “Fusion Centers.”

Apologists for this form of policing characterize the strategy as just a modernized approach to the assessment of information and allocation of resources, but there is also a creepy Orwellian aspect to it, and it seems very unlikely that it does not play some role in the subversion by overt stalking of those secretly declared as “suspicious.”

Suspicious Activity Reports (SARs) are initiated from a variety of sources: law enforcement agencies, private sector partnerships (such as InfraGard and DSAC), and tips from citizens (the “If you see something, say something” program).

SARs – and other intelligence – are managed by a network of 78 data fusion centers across the nation, where the information is shared by local and federal law enforcement and intelligence agencies.

Among the disturbing and un-American aspects of SARs is that they can be used to initiate investigations – as a way around the old-fashioned Constitutional requirement of reasonable suspicion or probable cause.

The May 2015 issue of Harper’s Magazine featured an article, “Beyond the Broken Window,” about spying on Americans by the Los Angeles Police Department. The article explores modern Orwellian police state programs, including Suspicious Activity Reports:

Under [Police Chief] Bratton’s watch, Los Angeles became the first city to implement the Nationwide Suspicious Activity Re­porting Initiative, a federal-local part­nership program led by Homeland Se­curity and the FBI. Suspicious Activity Reports, or SARs, have since been adopted by cities across the country and are now the primary means for docu­menting citizen behavior that might be construed as “preoperational planning related to terrorism or other criminal activity.” This vague standard means that behavior that is both protected by the First Amendment and entirely be­nign can be labeled as suspicious.

Lack of Oversight and Accountability for Fusion Centers

This Big Brother system of Fusion Centers and Suspicious Activity Reports takes place in a shadowy structure which has been the subject of much criticism by civil rights advocates. In its description of the multi-agency bureaucracy responsible for oversight of the system, the Electronic Frontier Foundation (EFF) had this to say:

“If this all sounds confusing, that’s because it is: the entire intelligence community is a plethora of duplicative agencies with overlapping areas of responsibility.”

Anyone familiar with the ethics and tactics historically associated with the U.S. intelligence business knows that deception of the public, undetected criminality, and creative abuses of power are often merely viewed as examples of professional competence. In that context, it is reasonable to suspect that a policy framework which inherently dodges accountability did not arise by accident. The folks at EFF hint at this also:

“Because they are collaborative, legal authority over fusion centers is blurred, perhaps purposefully.”

Contempt for the opinions and rights of American citizens is pervasive in the law enforcement and intelligence community. Arguably the tone is set by the Department of Justice, but other agencies – federal, state, and local – are just as bad. The Department of Homeland Security, for example, resists efforts by Congress to conduct oversight of the data fusion centers. Senator Tom Coburn (R-Oklahoma) had this to say about issue:

“DHS has resisted oversight of these centers. The Department opted not to inform Congress or the public of serious problems plaguing its fusion center and broader intelligence efforts. When this Subcommittee requested documents that would help it identify these issues, the Department initially resisted turning them over, arguing that they were protected by privilege, too sensitive to share, were protected by confidentiality agreements, or did not exist at all. The American people deserve better.”

Compromising Freedoms for Zero Benefits

While many people would consider the system of Suspicious Activity Reporting and Data Fusion Centers to be a creepy Orwellian program, some might still defend it on the grounds that it is identifying terrorist threats – except that it isn’t.

This October 2012 Senate report found that the system was not yielding any information about terrorism (page 2):

“Despite reviewing 13 months’ worth of reporting originating from fusion centers from April 1, 2009 to April 30, 2010, the Subcommittee investigation could identify no reporting which uncovered a terrorist threat, nor could it identify a contribution such fusion center reporting made to disrupt an active terrorist plot.”

________________________________________________________

A Quick History of the U.S. Intelligence & Law Enforcement Community

Although it is officially part of the executive branch of the federal government, America’s supremely powerful and secretive intelligence community has been described – without exaggeration – as the “fourth branch” of government. It’s the branch that is not mentioned anywhere in the U.S. Constitution, and it’s the branch that has the least respect for the rules established in that document.

Arguably, its genesis occurred in 1908 when the DOJ created the Federal Bureau of Investigation (FBI). In essence, the executive branch of the U.S. government decided to expand its own powers, despite well-founded concerns expressed by members of Congress, such as this statement by New York Congressman George Waldo:

“The only question here before the House is whether we believe in a central secret-service bureau, such as there is in Russia today….I believe that it would be a great blow to freedom and to free institutions if there should arise in this country any such…bureau…”

Tony G. Poveda, in The FBI: A Comprehensive Reference Guide (1999), described the fears which Congress members had when the FBI was first proposed (page 168):

“Members of Congress expressed concern that a Justice Department investigative force might become a secret political police that could be used to spy on citizens, including members
of Congress, and that it could ultimately subvert the democratic principles of government.”

Despite such opposition, one month after Congress adjourned, the
DOJ created its own permanent detective force, which in 1935 was given the name Federal Bureau of Investigation. Pulitzer Prize-winning journalist Chris Hedges described the essential nature of the agency (at 19:56) in this speech titled “Wages of Rebellion:”

“Let’s not forget why the FBI was formed. The FBI was basically
a goon squad that was formed to break radical movements.”

The next major development in the growth of the now-massive U.S. intelligence community occurred in 1947, when the National Security Act established the Central Intelligence Agency (CIA). Five years later, the National Security Agency (NSA) was formed. Primary security concerns at that time, of course, revolved around the Cold War with the Soviet Union.

A decade or so later, a similar expansion of the law enforcement intelligence community began. In 1956, two things happened which are related to America’s current “gang stalking” (i.e., counterintelligence stalking) phenomenon.

One of those developments was that police department intelligence
units – “red squads” – formed a national association called LEIU (the Association of Law Enforcement Intelligence Units). The other development that year was that the FBI began its secret counter-intelligence program (COINTELPRO). Counterintelligence crimes perpetrated against Americans by red squads and the FBI over the next 15 years or so primarily targeted supporters of communism, supporters of the civil rights movement, and critics of the Vietnam War.

In theory, COINTELPRO ended in the 1970s after it was exposed by activists and investigated by Congress. Many critics of the FBI allege that the unconstitutional practices of the agency never ceased – or were only briefly suspended.

Just a few years earlier, the first signs of the militarization of local police departments also began. In the 1960s, the first police SWAT (Special Weapons and Tactics) teams emerged. A parallel development was the expansion of the size and power of the executive branch of the federal government. These two trends became closely connected in 1971 when President Nixon declared the beginning of the perpetual “War on Drugs.”

Although the corrupting influence on police departments and the erosion of Americans’ civil rights associated with the drug war have relevance to modern Cointelpro stalking, the subject is generally beyond the scope of this website. Suffice to say, the constant examples of extreme abuses of power by America’s law enforcement industry associated with the drug war tend to lend support to claims that other civil rights abuses could be taking place without objection from the Justice Department. Currently, America is a country in which possession of two dollars’ worth of marijuana can result in police officers shooting you to death inside your own home.

Although the drug war rages on, the Cold War, of course, has ended. Fortunately for those who are happy about America’s trajectory toward a quasi-police state government, the September 11, 2001 terrorist attacks launched a new war to justify unlimited power and money and secrecy for the intelligence and law enforcement industry – the perpetual global “war on terrorism.”

________________________________________________________

The Counter-Terrorism Charade

In reality, the threat from terrorism is wildly exaggerated by those whose careers benefit from scaring the public about the issue. This New York Times column notes that we should be twice as concerned about bee and wasp stings.

“More Americans die of falling televisions and other appliances than from terrorism. Twice as many Americans die of bee or wasp stings annually. And 15 times as many die by falling off ladders.”

For agencies such as the DOJ and the FBI however, the war on terrorism has been an opportunity for a massive power grab at the expense of Americans’ freedoms – and an opportunity for big profits for defense/security contractors. To rationalize the extraordinary secrecy and power wielded by the FBI, the agency needs to create the illusion that it is protecting Americans from constant peril.

Toward that end, the FBI has essentially been creating its own terrorists to compensate for the shortage of actual terrorists. That the agency concocts and funds fake terrorism plots to entrap hapless stooges in sting operations has become an open secret, as documented, among other places, in a widely-reported July 2014 report by Human Rights Watch.

For its part, the Justice Department is happy to play along with this charade. This is the point for anyone concerned about allegations of ongoing counterintelligence stalking operations: the DOJ is one of the U.S. intelligence agencies, and as such, it is not about to make trouble for any of the other intelligence agencies, such as the FBI.

Another example of this is the DOJ’s relationship with the CIA. When that agency apparently tortured people in the process of its interrogations, and destroyed evidence of the torture, and then lied to Congress about what happened, the DOJ closed its inquiry into the matter in 2012 without bringing any charges. Then, while the U.S. Senate Intelligence Committee was investigating the torture, the CIA apparently spied on the senate committee. In July 2014, the DOJ announced that it would not be conducting a criminal investigation of that spying either.

________________________________________________________

State Databases

To supplement their access to federal systems for monitoring citizens – such as the data fusion centers – states also create their own watch-lists and databases. Since agencies at the federal level set the tone for state and local elements of the police state, some of these state level programs are also of an Orwellian nature.

Louisiana’s system for monitoring its residents is a case in point. In April 2014 it was reported that the state was building a database which will contain a “Comprehensive Person Profile” on each resident.

In this 3-minute video clip, you can watch a state legislator explain the virtues of this program – which include predicting who is likely to become “a risk to the state” so that the state can preemptively “intervene in that person’s life.”

Note a couple of aspects of this program which are typical of the surveillance trend. One is that the system was originally designed to detect fraud, but now through a sort of “mission creep” phenomenon, it is being expanded to track data for a range of purposes.

The other common factor is that a corporate parasite is cashing in. Technology for the database was developed by the software company SAS, which profits from the destruction of Americans’ privacy.

________________________________________________________

Future Attribute Screening Technology (FAST)

FAST System

A blurred image of the FAST system displayed on a computer monitor

Some defenders of “predictive policing” have claimed that civil rights concerns about the philosophy are unwarranted because it mostly involves directing resources to areas with higher statistical probability of crimes – rather than attempting to predict behavior of particular individuals.

The development and implementation of technologies such as Future Attribute Screening Technology (FAST) tends to undermine such assurances.

FAST is a program created by the Homeland Security department for the purpose of detecting malicious intent by screening individuals through electronic monitoring of such things as pulse rate, skin temperature, breathing, and facial expression.

I am not suggesting that FAST has a connection to organized stalking – or even that such systems would necessarily be inappropriate in certain high-security facilities. I merely cite it as an example of the general direction of law enforcement and the fact that opportunities to use such surveillance technologies will be aggressively exploited – especially given the profit motive for contractors to lobby the U.S. government to purchase such systems.

________________________________________________________

FBI’s Face Recognition Database

In April 2014 the Electronic Frontier Foundation (EFF) reported that information they obtained via a Freedom of Information Act (FOIA) request showed that the FBI expects to have 52 million photographs in its face recognition database by 2015.

The Next Generation Identification (NGI) database will incorporate the FBI’s existing fingerprint database – which contains over a 100 million records – and other forms of biometric data such as iris scans and facial dimensions. This database will be shared with other federal, state, and local agencies, and will be capable of performing tens of thousands of searches per day.

EFF points out that this database will include both criminals and non-criminals – for example, people whose employers require them to have a “mug shot” photo taken as a condition of employment. In theory, this could mean that innocent people might sometimes be investigated if their photo has facial characteristics similar to those of a criminal suspect.

____________________

This June 2015 article about facial recognition technology by The Intercept explains that Americans’ privacy is threatened not just by careerist authoritarians in the government, but also by greedy lobbyists for technology firms.

________________________________________________________

The DOJ’s views on the government’s right to track you via GPS

GPS IIF

Most Americans who only casually follow civil rights issues probably assume that the U.S. Department of Justice exists to promote justice – after all, it’s right there in its name and everything.

The DOJ does some of that, but it takes more seriously its role as a protector of the interests of those in power. Part of that role is slapping-down annoying attempts by the American public to find out what its officials are doing.

For example, if you want to challenge the U.S. government’s use of GPS tracking to monitor your location, the DOJ will apparently be fighting you on the basis of arguments outlined in some DOJ memos. As an American, you might be curious about what is in those memos. Too bad. The DOJ decided that those memos are a secret, and in March 2014 a federal court agreed to let the DOJ keep it that way.

________________________________________________________

The DOJ’s views on the government’s right to detain you forever

Prison

In April 2014, the DOJ successfully persuaded the U.S. Supreme Court to dismiss a lawsuit – Hedges v. Obama – challenging the constitutionality of a provision in the National Defense Authorization Act (NDAA). The section that was at issue – 1021(b)(2) – essentially authorizes the federal government to indefinitely detain someone if that person is suspected of having supported hostilities against the U.S. or its allies.

Because the U.S. “war on terror” is indefinite, so is the potential period of detention for anyone – including a U.S. citizen – who is detained under the law. Such a person can now be legally deprived of the right to an attorney and the right to a trial for as long as the “war on terror” lasts.

In May 2012 a U.S. District Court judge ruled that this was not kosher, but the DOJ challenged the ruling and it was overturned by an appellate court. When the case was then taken to the U.S. Supreme Court, the DOJ asked that the case be dismissed. The court obliged.

Pulitzer Prize-winning journalist Chris Hedges – the lead plaintiff in the case – published a column denouncing the Supreme Court’s refusal to hear the case. He cited the response by Carl Mayer, one of the plaintiffs’ attorneys in the case:

“…the Supreme Court has turned its back on precedent dating back to the Civil War era that holds that the military cannot police the streets of America”

That the U.S. military now has jurisdiction over civilians is no small concern. As a practical matter, the executive branch has few limits anymore on what it can do simply by invoking the magical phrase “national security.”

As always, Hedges did an excellent job of providing the larger political context of such developments:

“….if we do not rapidly build militant mass movements to overthrow corporate tyranny, including breaking the back of the two-party duopoly that is the mask of corporate power, we will lose our liberty.”

“….The fusion of corporate and state power means that government is broken. It is little more than a protection racket for Wall Street. And it is our job to wrest government back. This will come only through the building of mass movements.”

________________________________________________________

The DOJ’s views on the government’s right to assassinate you

Drone Strike

In September 2011 an American citizen – Anwar al-Awlaki – was assassinated by a U.S. drone strike. Although dozens of Americans are executed each year, traditionally they are given trials first, and are only killed after having been convicted.

Many people questioned the legality of the assassination and inquired about the legal reasoning of the U.S. Department of Justice. However, the DOJ declined to share its secret legal justification for the policy of targeted killings. The DOJ’s position, in essence, was that the federal government not only has the legal right to kill American citizens without first giving them a trial, it also does not have to explain to the public why it believes such legal authority exists.

In April 2014, a federal appellate court ruled that the DOJ must release its classified memo on the policy. A redacted version of the 2010 memo was released in June 2014.

________________________________________________________

Fake Secret Laws Created by Federal Agencies

In a previous section of this webpage – regarding the selection of targeted individuals – I mentioned the ordeal of Rahinah Ibrahim, a woman whose name had been placed on the federal no-fly list by mistake. Ms. Ibrahim had to spend 9 years battling to have her name removed from that watch-list before a federal judge finally ruled in her favor in February 2014. During that process, Ibrahim had to litigate without knowing the information in the U.S. government’s case against her.

In his excellent analysis of that case, Peter Van Buren, a former U.S. State Department Foreign Service Officer, explained how “the DOJ employed an arsenal of dodges and post-9/11 tricks to impede her lawsuit.”

One of the DOJ’s legal weapons used against Ms. Ibrahim was invoking the “state secrets doctrine.” As Van Buren explains, that is not a U.S. law created by Congress:

….it is instead a kind of assumed privilege and the courts accept it as such. Based on it, the president can refuse to produce evidence in a court case on the grounds that its public disclosure might harm national security. The government has, in the past,successfully employed this “privilege” to withhold information and dead-end legal challenges. Once “state secrets” is in play, there is literally nothing left to talk about in court.

Another similar weapon used by the DOJ against Ibrahim and others involves the use of secret classifications which have been created by federal agencies – rather than by Congress:

A related DOJ dodge was also brought to bear in an attempt to derail Ibrahim’s case: the use of made-up classification categories that dispatch even routine information into the black world of national security. Much of the information concerning her placement on the no-fly list, for instance, was labeled Security Sensitive Information (SSI) and so was unavailable to her. SSI is among hundreds of post-9/11 security categories created via memo by various federal agencies. These categories, too, have no true legal basis. Congress never passed a law establishing anything called SSI, nor is there any law prohibiting the disclosure of SSI information.

________________________________________________________

The DOJ’s Index of Crimes

As mentioned in the introduction to this overview, claims about the widespread existence of gang stalking are supported by the DOJ’s own crime survey statistics which showed that in 2006 an estimated 445,220 individuals reported being stalked by three or more perpetrators. (Page 12 of the report has the relevant numbers: 13.1 percent of 3,398,630 victims reported such group stalking.)

DOJ Stalking Survey 2006

Claims about gang stalking are also supported by the fact that the National Center for Victims of Crime – which is funded by the DOJ – apparently receives “thousands of calls per month” about such crimes. Yet organized stalking is conspicuously absent from the DOJ’s Index of Crimes.

As previously mentioned, Robert L. Snow, a retired police captain from the Indianapolis P.D., wrote a book called Stopping a Stalker, in which he devoted a chapter to the subject of organized stalking by multiple perpetrators associated with causes (“cause stalking”) – such as stalking by extreme anti-abortion activists.

However, the entire subject of organized stalking (or “group stalking,” “vigilante stalking,” etc.) does not appear in the DOJ’s website – even though the site includes a comprehensive index of types of crimes and legal issues, including some that are relatively obscure.

________________________________________________________

The DOJ’s “Weed and Seed” Program

The most interesting section of the DOJ website’s crime index – in relation to the government’s apparent acquiescence in gang stalking – is a reference to a program called “Weed and Seed.” The program name was still in the index the last time I checked, but the information for that section – which was part of something called the “Community Capacity Development Office” (CCDO) no longer existed. Elsewhere in the website was a statement explaining that the CCDO was closed due to lack of funding:

“As of June 5, 2011, the Community Capacity Development Office (CCDO) closed due to a lack of federal funding for the office. For Fiscal Year 2012 Weed and Seed grants, the Bureau of Justice Assistance will manage these grants until the end of the grant award period.”

I copied the Weed and Seed program’s description (shown below) while
it was still on the DOJ’s website in February 2012. It describes a community policing strategy. If you read it without the context of first-hand experience or an awareness of the historical background, it might seem innocuous. If you are familiar with the FBI’s Cointelpro operations (past and present), and the Stasi’s system of targeting individuals to be “weeded out” of society, it takes on a much darker character.

Operation Weed and Seed

A strategy within the U.S. Department of Justice’s Office of Justice Programs that incorporates community-based initiatives. It is an innovative and comprehensive multi-agency approach to law enforcement, crime prevention, and community revitalization.

The Weed and Seed Strategy

Operation Weed and Seed is foremost a strategy–rather than a grant program– which aims to prevent, control, and reduce violent crime, drug abuse, and gang activity in targeted high-crime neighborhoods across the country. Weed and Seed sites range in size from several neighborhood blocks to 15 square miles.

The strategy involves a two-pronged approach: law enforcement agencies and prosecutors cooperate in “weeding out” criminals who participate in violent crime and drug abuse, attempting to prevent their return to the targeted area; and “seeding” brings human services to the area, encompassing prevention, intervention, treatment, and neighborhood revitalization.

A community-orientated policing component bridges weeding and seeding strategies. Officers obtain helpful information from area residents for weeding efforts while they aid residents in obtaining information about community revitalization and seeding resources.

Note that this law enforcement model can be exploited not just by government agencies, but also by private groups and individuals for their own agendas. I would suggest that is exactly what is happening. Private organizations and individuals who have the relevant skill sets, connections to law enforcement and intelligence agencies, and assets to hire private investigators, can either create illicit “neighborhood watch” programs to monitor and harass their targets, or they can exploit existing programs by feeding information (whether true or false) about their targets to law enforcement personnel to have the victims become subjects of investigation and surveillance.

The “Weed and Seed” program is the most explicit official statement of the institutional philosophy behind gang stalking – namely, that the victims are deserving of persecution because they are potential criminals, socially marginal dissidents, drug-users, whistle-blowers, trouble-makers, etc. Essentially, the targeted individuals are the “weeds” that need to be removed (or at least isolated and suppressed).

Blue Line

14. Disinformation

truth

“All governments are run by liars.”
– I.F. Stone

The role of disinformation in counterintelligence stalking

According to the U.S. Office of the National Counterintelligence Executive, disinformation is defined as follows:

Carefully contrived misinformation prepared by an intelligence or CI service for the purpose of misleading, deluding, disrupting, or undermining confidence in individuals, organizations, or governments.

In a national program of counterintelligence subversion such as America’s version of the communist Stasi network, some public exposure is inevitable. Disinformation is used to mitigate the effects of that exposure.

Often the effectiveness of disinformation derives from the fact that most people – unlike, say, con artists, intelligence agents, and detectives – don’t usually even consider that the information they’re encountering might be a batch of deliberate lies. Partly because of most Americans’ ignorance of history and politics, lying to them about security issues is about as challenging as performing a magic trick for a toddler.

________________________________________________________

Operation Mockingbird

Sadly, most Americans are unaware of the history of disinformation campaigns by the U.S. government. One of the most well-documented programs in which the U.S. intelligence community systematically lied to the American public occurred in the 1950s. Here is a portion of a Wikipedia entry about it. The facts of the program are not in dispute.

Operation Mockingbird was a secret Central Intelligence Agency campaign to influence media beginning in the 1950s. Organized by Cord Meyer and Allen W. Dulles in the 1950s, it was later led by Frank Wisner after Dulles became head of CIA. The organization recruited leading American journalists into a network to help present the CIA’s views, and funded some student and cultural organizations, and magazines as fronts. As it developed, it also worked to influence foreign media and political campaigns, in addition to activities by other operating units of the CIA.

By the early 1950s, Wisner ‘owned’ respected members of The New York Times, Newsweek, CBS and other communications vehicles.

The usual methodology was placing reports developed from intelligence provided by the CIA to witting or unwitting reporters. Those reports would then be repeated or cited by the preceding reporters which in turn would then be cited throughout the media wire services. These networks were run by people with well-known liberal but pro-American big business and anti-Soviet views such as William Paley (CBS), Henry Luce (Time and Life Magazine), Arthur Hays Sulzberger (New York Times), Alfred Friendly (managing editor of the Washington Post), Jerry O’Leary(Washington Star), Hal Hendrix (Miami News), Barry Bingham, Sr. (Louisville Courier-Journal), James Copley (Copley News Services) and Joseph Harrison (Christian Science Monitor).

The Office of Policy Coordination (OPC) was funded by siphoning of funds intended for the Marshall Plan. Some of this money was used to bribe journalists and publishers.

According to Alex Constantine (Mockingbird: The Subversion Of The Free Press By The CIA), in the 1950s, “some 3,000 salaried and contract CIA employees were eventually engaged in propaganda efforts”. Wisner was able to constrain newspapers from reporting about certain events, including the CIA plots to overthrow the governments of Iran.

Carl Bernstein’s reporting on Operation Mockingbird

For additional information about Operation Mockingbird, you should read this excellent article on the subject by Pulitzer Prize-winning journalist, Carl Bernstein.

Here is an excerpt from that article about how the New York Times essentially served as a propaganda tool for the CIA:

The Agency’s relationship with the Times was by far its most valuable among newspapers, according to CIA officials. From 1950 to 1966, about ten CIA employees were provided Times cover under arrangements approved by the newspaper’s late publisher, Arthur Hays Sulzberger. The cover arrangements were part of a general Times policy—set by Sulzberger—to provide assistance to the CIA whenever possible.

Sulzberger was especially close to Allen Dulles. “At that level of contact it was the mighty talking to the mighty,” said a high‑level CIA official who was present at some of the discussions. “There was an agreement in principle that, yes indeed, we would help each other. The question of cover came up on several occasions. It was agreed that the actual arrangements would be handled by subordinates…. The mighty didn’t want to know the specifics; they wanted plausible deniability.

________________________________________________________

News Media Whores in the Operation Mockingbird Era

Probably few readers of this website need to have their cynicism about the corporate news media – past and present – reinforced, but this document is worth a look anyway.

One of the most prominent reporters on American politics in the 1960s was Theodore H. White, a Pulitzer prize-winning journalist whose book The Making of the President sold four million copies. Scott Porch at Politico profiled him in April 2015, and Jon Schwarz at The Intercept posted this summary of the essential point. In his published writings, White lavished praise upon members of the political class and the press. Privately, however, he admitted that they were all liars. Here is one of the excerpts from a previously-unreleased letter White sent to a close friend in 1960:

“…it is all fraudulent, all of it, everywhere, up and down, East and West. The movies, radio and state and books and TV — all of them are fraudulent; and the foundations and universities and scholars, they are all fraudulent too; and the executives and the financiers … and the Commissars and the Krushchevs and the Mao Tze-tungs, they are fraudulent equally; it is all a great game; and there are two dangers in this great game: first, the fraudulent people come to believe their own lies, they come to have faith in their fraud; and second, underneath it all, because people are fundamentally good, they come to realize that we live in lies and the people get angrier and angrier and they may explode.”

One of the reasons that the U.S. surveillance state – the FBI, NSA, CIA, DHS, and their army of private contractors and useful-idiot minions – keeps a close eye on Americans is to keep a lid on such anger.

________________________________________________________

Today’s News Media Whores

Operation Mockingbird was an example of systematic disinformation.
An equally serious threat to the American public is the informal disinformation that comes from biased news reporting. Distortion and deception occur routinely in the mainstream press on intelligence issues because of ideological bias and careerist motivations.

Defending the political establishment when it is lying about intelligence matters serves the political agenda of right-wing reporters, and it creates opportunities for such reporters to get access to senior officials for interviews. One example of someone who carries water for the government – rather than serving as a professionally skeptical journalist – is National Public Radio (NPR) reporter Dina Temple-Raston.

An August 2014 article by Glenn Greenwald helpfully deconstructed a piece of dishonest reporting by Temple-Raston about NSA whistle-blower Edward Snowden. In the wake of Snowden’s revelations that the NSA was spying on Americans in violation of the Fourth Amendment, various apologists for the U.S. intelligence community asserted that the revelations had damaged U.S. national security. It was claimed that surveillance methods were revealed in a way that enabled terrorists to more effectively conduct their business undetected.

The claim was rubbish, but to the extent that people believed it, it served the political interests of those who support Big Brother-type domestic spying on Americans by their government. With the apparent goal of giving the claim plausibility, NPR broadcast a report on August 1, 2014 that a data firm called Recorded Future had produced “tangible evidence” which proved the government’s accusations.

While the report itself was not convincing – for reasons outlined in Greenwald’s article, NPR also failed to disclose that Recorded Future receives significant funding from the CIA. Instead, the corporation was portrayed as an independent source. That kind of lying is common, and it creates an environment in which intelligence agencies can get away with serious abuses of power.

To fully appreciate the feud between real journalists like Greenwald and government propagandists like Temple-Raston, you should watch the first 7 minutes of this video clip, in which those two reporters debate whether it is appropriate for the U.S. government to execute Americans without due process:

________________________________________________________

Current U.S. Government Policies on Lying

Pinocchio

The values associated with Operation Mockingbird are alive and well in America’s federal government today – with its penchant for secrecy and for spying on Americans – and its casual attitude about the Constitution and honesty.

An article by journalist Glenn Greenwald in January 2010 in Salon.com called attention to the shockingly Orwellian view of news and propaganda in both the George W. Bush and Barack Obama administrations. In particular, Greenwald focused on a member of the Obama administration.

Cass Sunstein – a close confidant of President Obama – who served as Administrator of the Office of Information and Regulatory Affairs from September 2009 to 2012 – has an interesting view on lying by the federal government: he favors it.

“In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government. This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.

….Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.” He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government). This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”

Glenn Greenwald’s article about Cass Sunstein
Cass Sunstein’s Harvard Law School paper

Cass Sunstein

Samantha Power, President Barack Obama, and Cass Sunstein in a New York Times photo – May 2010. Samantha Power, a member of Obama’s National Security Council, is Sunstein’s wife.

________________________________________________________

Conspiracy Theories

Not surprisingly, Sunstein seems to be uncomfortable when confronted with his record of explicitly condoning government deception. He has not, however, disavowed his views. In fact, he has written articles purporting to reveal what he sees as a threat posed by “paranoid” conspiracy theories.

As far as I know, Sunstein has never discussed whether it might contribute to the public’s “paranoid” distrust of government officials to have the head of the Office of Information write a paper advocating that the government should sometimes lie to the citizens.

That someone with Sunstein’s high profile would have no reservations about (a) publicly advocating systematic lying to the public by the U.S. government, and (b) ridiculing people who do not blindly trust government officials, speaks volumes about the arrogance and moral corruption of America’s political class.

One of the main counterintelligence disinformation strategies to keep organized stalking from being closely investigated by the mainstream press is to simply dismiss it as a “conspiracy theory.” For many people, simply invoking that term will short-circuit any critical thinking about an allegation. They are encouraged in that view by mainstream media institutions which routinely embrace intellectual conformity masquerading as skepticism.

An April 1977 article in Reason by economist and historian Murray N. Rothbard offers a clear explanation of the political establishment’s relentless dismissal of analyses which take into account the self-interests of those in power.

“It is no wonder that usually these realistic analyses are spelled out by various “extremists” who are outside the Establishment consensus. For it is vital to the continued rule of the State apparatus that it have legitimacy and even sanctity in the eyes of the public, and it is vital to that sanctity that our politicians and bureaucrats be deemed to be disembodied spirits solely devoted to the “public good.” Once let the cat out of the bag that these spirits are all too often grounded in the solid earth of advancing a set of economic interests through use of the State, and the basic mystique of government begins to collapse.”

Another person with well-informed insights on the issue of conspiracy theories is Russ Baker – an investigative journalist whose articles have been published in The New Yorker, Vanity Fair, the Nation, The New York Times, the Washington Post, The Village Voice, Esquire and other major publications.

In this article, Baker deconstructs a piece of rubbish featured in The New York Times which advocates, essentially, that you should always believe what the government says.

In contrast to the Times reporter’s apparent view that virtually all conspiracies are fictional and attributable to psychological explanations, Baker makes this observation about the potential for conspiratorial government crimes in America:

“Her assumption is that, in a country perennially employing tens of thousands of top-secret covert operatives, homicide-trained assassins and “special forces” enthusiasts, no one has any reason to suspect that any event involving some kind of death or mayhem was ever engineered on an organized basis.”

________________________________________________________

Blatant Lying by Senior U.S. Intelligence Officials

When Cointelpro stalkers slander targeted individuals and tell other lies that enable them to perpetrate counterintelligence subversion against Americans, they are following the same ethical standards set by those at the very top of their industry. Again, the fish rots from the head down.

The long history of lying associated with the U.S. intelligence and law enforcement agencies is too extensive to chronicle here, but you can get a sense of the culture by considering just a few of the recent scandals.

In 2013 and 2014, three of the most senior intelligence officials were caught lying, and none of them suffered any consequences. An article in Reason in August 2014 reviewed some of the biggest lies.

CIA Director John Brennan denied that his agency was spying on the U.S. Senate while it was investigating the agency’s use of torture, and then the agency’s inspector general revealed that the spying did in fact happen. In response, President Barack Obama harshly criticized the CIA Director of course, saying “I have full confidence in John Brennan.”

Director of National Intelligence James Clapper not only lied, he did so under oath while testifying in a Senate hearing about the mass surveillance of Americans by the NSA. Subsequent revelations by the whistle-blower Edward Snowden showed that the mass surveillance which Clapper denied was happening was in fact taking place. Although Clapper was not prosecuted for committing perjury, he did have to read about the harsh criticism later expressed by President Obama in an interview on CNN. Obama said that Clapper “should have been more careful about how he responded.”

NSA Director Keith Alexander lied about the mass surveillance of Americans by the NSA twice. He denied that the data was being collected, then after it was revealed, he claimed that the program had uncovered 54 terrorist plots. When challenged by Senate Judiciary Committee Chairman, Patrick Leahy, he admitted that the number was an exaggeration. Later the President’s Review Board reported that the actual number of terrorist threats revealed was zero. Naturally, Alexander was immediately fired. Just kidding – actually he kept his job until March 2014 and then retired to take a job in the financial industry which paid $600,000 per month.

________________________________________________________

“Parallel Construction”

To appreciate the extent of the moral corruption and casual attitude toward the U.S. Constitution – and toward honesty – within America’s law enforcement and intelligence community, it is important to note that the government’s enforcers do not merely lie on occasion; they lie as a matter of official policy.

A clear example of this was reported by Reuters in August 2013. A secretive unit within the U.S. Drug Enforcement Administration (DEA) called the Special Operations Division (SOD) gathers information – for example, through foreign and domestic wiretaps – and forwards that information to various agencies. The SOD also helps coordinate multi-agency investigations.

So far, so good (apart from the strategic idiocy and civil rights violations inherent in drug prohibition). However, documents obtained by Reuters showed that agents who receive those tips from the SOD are instructed to lie about the origins of their investigations by keeping the SOD’s involvement a secret from defense lawyers, prosecutors, and judges.

That policy – called “parallel construction” – involves “re-creating” the investigation record to make it appear that the initial step in the investigation was something other than a tip from the SOD.

For example, an agent might be told to stop and search a particular vehicle based on a tip. If that search results in an arrest, the agent will then lie – in accordance with official policy – and say that the search was the result of a routine traffic stop.

Presumably “parallel construction” exploits a moral version of a parallel universe – one in which lying is ethically sound. We can only speculate about the legal theory upon which the concept is based because, as Reuters reported: “ A spokesman with the Department of Justice, which oversees the DEA, declined to comment.”

________________________________________________________

Slandering Critics of Corporations

U.S. government agencies and corporations sometimes use intelligence-security contractors to do their dirty work, such as spying on and slandering critics. A prime example of this was reported in a June 18, 2013 article published in The Nation titled “The Strange Case of Barrett Brown.”

Intelligence contractors planned an operation to discredit a group critical of the Chamber of Commerce, and to discredit others, such as reporter Glenn Greenwald:

Its main objective was to discredit critics of the Chamber of Commerce, like Chamber Watch, using such tactics as creating a “false document, perhaps highlighting periodical financial information,” giving it to a progressive group opposing the Chamber, and then subsequently exposing the document as a fake to “prove that US Chamber Watch cannot be trusted with information and/or tell the truth.” In addition, the group proposed creating a “fake insider persona” to infiltrate Chamber Watch. They would “create two fake insider personas, using one as leverage to discredit the other while confirming the legitimacy of the second.” The leaked e-mails showed that similar disinformation campaigns were being planned against WikiLeaks and Glenn Greenwald.

If operations such as that one were not proven by the documents obtained by hackers, many people would dismiss allegations of such activities as tin-foil hat conspiracy theories.

Another example (among many) happened in 2012. When a reporter and editor at USA Today investigated one of the Pentagon contractors being paid to spread propaganda, that contractor began a secret smear campaign against them.

“Fake Twitter and Facebook accounts were created in their names, along with a Wikipedia entry and dozens of message board postings and blog comments. Websites were registered in their names…”

A proxy service was used to hide the identity of the owner of the websites, and another website was registered to a non-existent address. Here is an article about it.

________________________________________________________

The four major disinformation tactics used by America’s Stasi

Four main tactics are used by the U.S. intelligence-law enforcement industry to conceal its counterintelligence operations against U.S. citizens. Each tactic is a variation on the same general strategy – namely, to discredit organized stalking targets by casting doubts on their sanity and intelligence.

1) Government Front Groups

One tactic is to create faux support groups for gang stalking victims. Freedom From Covert Harassment and Surveillance (FFCHS) and Organized Stalking Informers (OSI), to which I dedicate a page of this website, are the main examples.

These groups serve two purposes. First, they exist so that victims will turn to them – rather than forming their own legitimate advocacy groups to lobby Congress and the media to investigate gang stalking.

Secondly, everything about the groups is designed to convey the impression that people claiming to be gang stalking victims should not be taken seriously. For example, the written materials associated with those two groups – such as their websites and petitions – appear very badly written and poorly edited. The websites and documents contain almost no specific information about the perpetrators of organized stalking, and very rarely refer to the published mainstream news reports about gang stalking and counterintelligence activities.

Another type of front group deception used in counterintelligence operations occurs when agents persuade a legitimate organization to let itself be used to stage activities which are actually orchestrated by a counterintelligence agency.

An example of that apparently occurred in 2013, when a U.K-based film company called Firecracker Films was apparently used as a front under the pretense that it was considering the production of a documentary about gang stalking.

Representatives of the company began to solicit the participation of targeted individuals of organized stalking in what was apparently a fake project by asking the individuals to consent to video chat interviews about their experiences – ostensibly for the purposes of gathering material for determining whether to go ahead with the production of the documentary.

In reality – presumably – the videos would be used to gather information about the victims’ perceptions of being illegally stalked by the feds.

Online searches of Internet forums about organized stalking revealed that agents purporting to be representatives of Firecracker Films had used the same ploy previously. They had posted messages encouraging individuals to contact them. In both instances the “project” was quietly abandoned or postponed.

You can read more about my account of the incident – including the email I sent to everyone at Firecracker Films in my November 17, 2013 post on the Cointelpro News (2013) page of this website.

2) Disinformation Websites

A second tactic is the creation of numerous websites about gang stalking that are filled with badly-written stupid assertions and extraneous information. Again, the objective is to discredit all self-proclaimed organized stalking victims by making it appear that they are paranoid idiots.

On the “Recommended Websites” page of Fight Gang Stalking, I posted links to legitimate sites about organized stalking, and also links to some of the dozens of websites designed to spread disinformation.

Anyone who browses through some of the countless disinformation websites will begin to recognize common themes. For example, many of the sites emphasize mind-control – although they often do so without reference to MK Ultra – since (a) no one disputes the facts about that CIA program, and (b) the U.S. intelligence community would prefer to avoid contributing to the public’s awareness of it.

Images on gang stalking disinformation websites are generally chosen to suggest insanity – either subtly or obviously. Whenever you see an image such as this one, you have almost certainly stumbled upon a disinformation site:

Mind Control

Typical image from a disinformation website

Another common aspect of these websites reflects an interesting personality trait of people in the counterintelligence (CI) business. CI perps – calling them “agents” would be giving them too much credit – seem to fancy themselves as some kind of evil James Bond movie villains. The phenomenon is similar to the embrace of military hardware and tactics by police officers who imagine themselves to be special warfare unit soldiers.

Even lowly web page designers and sock puppets (discussed below) in the counterintelligence business seem to embrace the cultural flavor one sees on the insignia patches of military units. Cyber personas posting comments online adopt names like “Lucifer” or “Nemesis.” Images on their websites reflect what journalist Douglas Valentine calls the “Cult of Death.” CI perps seem to have the same personality type that Valentine attributes to CIA agents – namely, that of a cowardly sociopath:

“…a sociopath without the guts to go it alone in the underworld. They gravitate to the CIA because they are protected there by the all-powerful Cult of Death.”

You can even see this on display at the aforementioned website of the U.S. Office of the National Counterintelligence Executive. Here, for example, is one of their official posters celebrating the value of thought policing:

CI Poster

Official U.S. Counterintelligence Poster

By the way, if you are really impressed by this kind of thing, you can download the poster-size version of the above image from the U.S. government here.

In the spirit of that obsession with x-rays and brain images, I offer the following:

CI Agent

U.S. Government Counterintelligence Employee

__________________

3) Cyber Personas (also called “Sock Puppets”)

A third form of disinformation is the use of cyber personas to monitor and discredit legitimate websites and social media entities which discuss gang stalking.

The U.S. Office of the National Counterintelligence Executive defines a cyber persona as follows:

An identity used in cyberspace to obtain information or influence others, while dissociating the actor’s true identity or affiliation.

Anyone who reads the comments posted online whenever the subject of gang stalking is raised, will note that reports of gang stalking almost invariably attract sarcastic – but ultimately unconvincing – statements by forum trolls, registering their skepticism.

One expects that sort of verbal warfare on Internet forums about politics, but you have to wonder why the relatively obscure topic of gang stalking attracts such a dedicated army of detractors. As Hamlet’s mother observed, sometimes people “protest too much.”

As this article posted on LiveLeak notes, a former CIA clandestine service trainee and DIA analyst revealed that the FBI and CIA use trolls to monitor social media and interact with users to discredit information disseminated on the web.

Lynnae Williams reports that she became a gang stalking target when she left the CIA. According to her blogs and Twitter messages, Ms. Williams has been stalked and intensely harassed by the FBI – to the point that she eventually felt compelled to leave the U.S.

This is her original blog: http://ciacorrupt.blogspot.com/

Most mainstream news media corporations dutifully avoid investigating and discussing the U.S. government’s use of cyber personas to spread disinformation.

Fortunately, some news sources are not on the federal government’s leash.

The Guardian newspaper – which published the famous revelations about NSA surveillance leaked by Edward Snowden – reported in July 2013 on the sneaky (and possibly illegal) proposals by a consortium of private intelligence contracting firms, such as Stratfor, to spread lies on the Internet on behalf of their corporate clients, using personas:

“[The intelligence firms were] involved in another scheme to deploy sophisticated software-based fake people across social networks in order to infiltrate and mislead.”

As I write this, hacker-activist Jeremy Hammond is serving a ten year prison sentence for his role in exposing how this shadowy industry of professional liars and spies operates on behalf of large U.S. corporations.

Journalist Barrett Brown is in jail in Texas facing charges which could potentially lead to a life sentence for his role in exposing the information yielded by the hacked emails.

Brown founded a group called Project PM to sort through the numerous emails that had been revealed. Here is a fascinating web page by that group which summarizes the disinformation schemes organized by the intelligence-security contractors.

The proof: secret documents leaked by Edward Snowden

Articles by Glenn Greenwald published by NBC News and The Intercept in February 2014 revealed leaked documents from NSA whistle-blower Edward Snowden which show some of the online disinformation tactics being used by the intelligence agency GCHQ (the U.K.’s equivalent of the NSA).

One of the main tactics described in the secret documents is spreading false information online to destroy the reputations of targeted individuals and groups. Another main tactic was to use social science principles to manipulate online discussions and activism.

No one familiar with organized stalking in the U.S. is unaware that western intelligence agencies systematically spread lies on the Internet – in discussion forums, for example. Now there is proof.

Among the tactics revealed by the documents is the use of false flag operations (referred to as such in the documents) in which the spy agency posts material online and makes it appear that it was posted by a targeted individual or group. GCHQ also creates fake blog posts which purport to be those of victims of the people and groups being targeted.

Other tactics include leaking confidential information and emailing colleagues, neighbors and friends of the target.

Greenwald poses this question for citizens and policy-makers on this issue:

“Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?”

Another fundamental point made by Greenwald – and this applies equally to organized stalking – is that these tactics are not about national security. These are weapons being used in many cases to destroy people who are suspected of crimes but have never been charged or convicted, and people who are engaged in political activism of which the government disapproves.

4) Faux Articles Planted in the News Media

Finally, the fourth disinformation tactic is to plant articles in the news media which create the impression that gang stalking exists only in the minds of delusional individuals.

The prime example of this – arguably a textbook case of the art of disinformation – is a lengthy New York Times article on gang stalking called “Sharing Their Demons on the Web” (November 13, 2008).

Because of its relevance to material in the “Gang Stalking Documents” section of this website, the following information also appears there. Please forgive the redundancy.

FBI whistle-blower Ted Gunderson (former head of the Los Angeles FBI office) was a key figure in exposing gang stalking, yet he goes unmentioned in the Times piece. That should be a giant red warning flag to any reader armed with that information who isn’t retarded.

Even if the “reporter” had determined that Gunderson’s claims arose from the fact that he simply became delusional for some reason after a long high-profile law enforcement career, you would think that finding would be worth mentioning. Not a word.

That lengthy article also failed to include any interviews with the licensed private investigators who have written on the subject of gang stalking, such as David Lawson and John B. Lopes.

Instead, the only “experts” interviewed for the article were four mental health professionals (psychiatrists and psychologists) who discussed mental illness and delusions. The one other person interviewed was someone who supposedly claimed to be a victim of gang stalking, Derrick Robinson, who is identified as a janitor in Cincinnati, and president of FFCHS – the aforementioned support group for gang stalking victims.

Most readers of the Times article would not be familiar with FFCHS, and would have no way of knowing – or even suspecting – that it’s a disinformation front group – as I detail in the FFCHS section of this website.

Note that the mental health experts quoted were not asked about their knowledge of crimes (such as stalking) – let alone their views on the plausibility of the existence of a modern version of the FBI’s Cointelpro. In fact, remarkably, the article makes no mention of Cointelpro whatsoever.

Also note that the one supposedly self-proclaimed gang stalking victim, Mr. Robinson, is a janitor – and he is the head of the victims support group. The intended takeaway is that the most capable member of the community of self-proclaimed victims of organized stalking – the one with the wherewithal to become head of their national organization – is a janitor.

The reader is left to infer that the rest of the self-proclaimed gang stalking victim community must really be losers if he’s their brightest bulb. It simply would not have served the objective of the “reporter” to discuss gang stalking victims who were professionals, such as the aforementioned FBI special agent, Mr. Gunderson, or the attorney, Mr. Labella.

Just to be sure readers got the message though, a psychiatrist quoted in the article mentioned that “These people lead quietly desperate lives.” (Read “losers.”)

A final point about the article: none of the websites cited are legitimate, credible websites, such as those I have listed in the “Recommended Websites” section of this blog. If the Times readers had been directed to any of the sites which I recommend, they would have encountered discussions of gang stalking very much at odds with what they were reading in the Times. The websites mentioned in the article – such as Gang Stalking World (as distinguished from Gangstalkingworld.wordpress.com) are badly-edited and filled with extraneous garbage. Most likely, they are also examples of deliberate disinformation.

You can read the Times article at the link below if you want to see a textbook case of disinformation planted by the government in the mainstream news media – the sort of thing people like Noam Chomsky get marginalized for warning people about. (Incidentally, for more on the way government apologists in the media tend to dismiss people like Chomsky who deviate from political orthodoxies, see my March 23, 2013 entry in the “Police State Amerika News” section of this website.)

If, despite the historical background of Cointelpro, and despite all the other information provided in this website, you conclude that this article is simply an example of journalistic incompetence at the nation’s “Paper of Record,” then I have a bridge to sell you.

Incidentally, by a remarkable coincidence, an article that was virtually identical to the Times piece was published by ABC News one month later (although it makes no reference to the Times piece that preceded it). By remarkable coincidence, the “reporter” at ABC interviewed the same psychiatrist who was interviewed by the Times, Ken Duckworth. Also by remarkable coincidence, the “reporters” in both cases were third-tier shills no one has heard of – rather than, say, Pulitzer Prize-winning investigative journalists.

Also by coincidence, the ABC article – like the Times article – failed to include any reference to the important high-profile credible whistle-blower key witness who supports the claims of gang stalking victims, Ted Gunderson. The ABC News article which involved such an extraordinary number of coincidences also failed to even mention Cointelpro or MK Ultra – or any other actual relevant non-disputed government conspiracies, and focused exclusively on discussions of delusional thinking. If you want to read this ground-breaking, hard-hitting piece of brave investigative journalism by the intrepid Lauren Cox, here is the link.

There is a down-side for gang stalkers to all these efforts at disinformation: they constitute evidence of a conspiracy when viewed in the context of other information – such as I have provided in this website.

A final observation about the two articles cited above:

It’s interesting that those two rare examples of mainstream news media articles about organized stalking both appeared (about the same time) years ago, and then the subject has been off the radar since then.

Since that time, the number of online accounts of gang stalking – such as this website – have only increased, and the number of published articles in the alternative media alleging a re-emergence of Cointelpro (such as those cited in section 4 of this overview) have increased. Yet the New York Times and ABC have not re-visited the issue.

That makes perfect sense as a disinformation strategy. Anyone searching for mainstream news reports on gang stalking will see that – apparently – a couple of major news outlets looked into the phenomenon years ago and found it was all rubbish. Case closed. Further articles – even if they were similarly dismissive – might call attention to the topic in an unhelpful way

15. The Wall of Silence Which Surrounds Gang Stalking

Laurel & Hardy – Shhh
___________

“The first rule of fight club is you do not talk about fight club.”
– from the 1999 film Fight Club

Sometimes people violate the rule and do mention fight club.

A local TV news broadcast in California in January 2011 featured a report about gang stalking in which the reporters used the term and so did Lieutenant Larry Richard of the Santa Cruz Police Department.

Even in that instance, Lt. Richard (a) did not say that the stalking was perpetrated by the government, and (b) he seemed to walk-back his comment in a subsequent letter about the TV broadcast obtained by a Freedom of Information request.

Even such qualified reports are the exception to the rule. Despite its seriousness, gang stalking is rarely discussed publicly by the mainstream news media – let alone by law enforcement officials. (I have listed the most notable exceptions that I am aware of above in the “Published News Reports” section of this web page.)
___________________________________________________________________________-

The Silence of the F.B.I. and the D.O.J.

What mainly accounts for the FBI’s success in keeping its modern counterintelligence operations off of the American public’s radar is the secrecy with which the program is administered and the use of tactics chosen specifically for their lack of incriminating evidence.

Official records from the U.S. Senate’s Church Committee cited previously on this webpage show that many of the same tactics were unquestionably used by the FBI during the first version of Cointelpro. Those operations also remained unknown to the general public until some civilan activists broke into an FBI office and stole the secret documents which proved it.

Based upon reports by gang stalking victims, U.S. intelligence and law enforcement agencies have greatly raised the technological sophistication for domestic counterintelligence – just as was alleged by the late Ted Gunderson, the former FBI official, when he discussed gang stalking. In addition, revelations in 2013 by NSA whistle-blower Edward Snowden proved that the scope of Big Brother’s surveillance is now vast.

“Gang stalking” is also more sophisticated than Cointelpro in the realm
of law: a legal architecture has been developed which enables counterintelligence operations to be conducted under a paper charade of legal legitimacy within the Department of Justice, despite violating the U.S. Constitution.

By labeling extra-judicial punishment as “surveillance” and “investigation,” and by referring to stalkers as “informants,” and by citing a “national security” need to keep their operations shrouded in secrecy, the FBI and DOJ can pretty much do whatever they want.

In fact, the Orwellian nature of the legal fictions is even deeper. As explained previously, “investigations” have been replaced in many cases with “assessments” which have lower standards of suspicion. “National Security Letters” based upon “Suspicious Activity Reports” have replaced court-sanctioned subpoenas. As a practical matter, organized stalking can be initiated with no concerns about the Fourth Amendment or the state and federal laws against stalking.

One of the ways silence is maintained – as mentioned previously – is by the FBI’s exemption from the Whistleblower Protection Act. Anyone wishing to expose misconduct at the FBI could face severe legal repercussions.

Nothing comparable to Edward Snowden’s revelations about the NSA’s domestic spying has yet occurred with the FBI. Ted Gunderson did not speak out about gang stalking until after he was retired, and he did not reveal any smoking-gun documents to prove his allegations. Also, Gunderson claimed that his discussion of organized stalking resulted in him being targeted himself – which would tend to discourage other potential whistle-blowers.

People familiar with corruption in the U.S. government have deep suspicions about the kinds of crimes being perpetrated by agencies such as the FBI and the CIA. Writing on that subject in January 2014, former State Department Foreign Service Officer Peter Van Buren put it this way:

“…count on one thing: we undoubtedly don’t yet know the worst or most illegal aspects of this era of “intelligence.” After all, while Snowden “liberated” up to 1.7 million National Security Agency documents (many of them not yet looked at, analyzed, or written about), there have been no similar twenty-first-century break-ins at the FBI, the CIA, or other parts of the American intelligence community (or for that matter at the Pentagon and the Department of Homeland Security). Massive and shocking as the NSA revelations have been, the curtain has only been pulled back on a corner of the new Washington world that we, the people, continue to fund, even if we aren’t considered important enough to know anything about it.” [emphasis added]

________________________________________________________

The Silence of Intelligence-Security Contractors

Just as law enforcement and intelligence agency personnel involved in counterintelligence activities are bound by secrecy oaths, so is the vast industry of private contractors employed by those agencies. For example, job ads posted by security-intelligence contractors for “surveillance role players” (domestic spies) all require an active security clearance in addition to counterintelligence training.

In most cases, the potential legal risk is not a factor anyway; the type of people who seek work as domestic spies like the idea of being informants for Big Brother and they presumably like the income it generates for them.

________________________________________________________

The Silence of Witnesses

Witnesses to U.S. government criminality often become the targets of very aggressive efforts to intimidate them to remain silent – and to make an example of them so others will remain silent. This 4-minute trailer of a 2013 documentary film gives a good sense of the dangers faced by whistle-blowers, which include blacklisting, surveillance, and legal warfare.

Promotional video for Silenced: The War on Whistleblowers

FBI agents can legally order witnesses to keep their mouths shut regarding anything the feds choose to portray as an investigation.

For example, a National Security Letter (NSL) is an administrative subpoena used by the FBI, and it has a gag order attached which prohibits the recipient from ever saying anything about having been served with the letter. The U.S. government has issued hundreds of thousands of such letters, and they have been upheld in court.

Anyone wondering why landlords, neighbors, co-workers, and others recruited to participate in organized stalking never say anything should consider the possibility that they do not want to end up in prison.

________________________________________________________

The Silence of U.S. Political Leaders

Jefferson Censored

In your high school civics classes, you probably learned about the three equal branches of the federal government. Presumably, they still teach that. In reality, the U.S. is now dominated by a massively powerful executive branch.

Officially, the White House is at the top of that branch, but the nation’s chief executive must share power as a practical matter with the shadowy U.S. intelligence community and its cronies.

On the one hand, the president can appoint – and fire – the heads of the intelligence agencies; on the other hand, the intelligence agencies can tap the president’s phones and create files on the president’s sex life and shady business dealings which can be used as leverage.

In theory, the U.S. Congress has oversight authority over the intelligence community. Again though, you need to distinguish between what it says in your high school textbook and what takes place in the real world.

During the 1970s Americans learned about the illegal counterintelligence operations (COINTELPRO) being perpetrated by the FBI – and the secret experiments, torture, and assassinations being perpetrated by the CIA (MK Ultra and other programs).

As mentioned previously, the official source of information about those scandalous programs was the U.S. Senate’s Church Committee – named after its chairman, Senator Frank Church (D-Idaho). One of the important facts about that chapter in U.S. history is this: by their own admission, the members of Congress had no clue what had been going on before Cointelpro was exposed by civilian activists.

Another important fact for perspective about Congressional oversight is this: the head of the Church Committee himself, Frank Church, was being spied upon by the NSA and never knew about it. Declassified documents released in September 2013 showed that the NSA was monitoring his overseas phone calls and cables.

Although they were familiar with espionage, America’s founders certainly could never have envisioned the vast network of rogue U.S. intelligence agencies and corporate intelligence-security contractors who now spy on Americans using advanced technology.

If the founders could have forseen the development of such a monstrous threat to democracy and privacy, they certainly would never have prescribed the current system of oversight.

The House of Representatives and the Senate each has a Select Committee on Intelligence. Between the two committees, there are essentially just three dozen people who are supposed to provide oversight of the U.S. intelligence community.

Even worse, those three dozen or so people are bound by secrecy oaths which legally prevent them from revealing their knowledge of any unconstitutional and immoral behavior that is being perpetrated by the nation’s intelligence agencies. Committee members can be prosecuted even for revealing information to other members of Congress.

Congress members’ fear of the intelligence community

As I mentioned in the Oversight section of this page, it is very possible that members of Congress actually fear the intelligence community, and avoid trying to control it for that reason.

In March 2014, two members of Congress made comments which strongly implied that such fears exist. Senator Rand Paul (R-Kentucky) said this of his fellow senators:

“I think I perceive fear of an intelligence community drunk with
power, unrepentant, and uninclined to relinquish power.”

The next day, House Minority Leader Nancy Pelosi (D-California) said this about disagreeing with the intelligence community:

“You don’t fight it without a price, because they come after you.”

Presidents’ fear of the intelligence community

More than a few people have been suspicious of President Barack Obama’s apparent subservient relationship to the U.S. intelligence community. Despite campaigning for the presidency as a progressive reformer, as president he embraced secrecy, drone strikes, mass surveillance, the attack on Libya, and aggressive prosecutions of whistle-blowers. Of course, it is very possible that Obama was never sincere about his views in the first place. Opportunistic dishonest sociopaths are common in politics. On the other hand, there might be a darker explanation.

One person willing to publicly comment about that is Ray McGovern, a retired CIA analyst-turned-activist. In June 2013, McGovern explained in a radio interview that he believes that President Obama fears the CIA:

“I’ve come to the conclusion that he’s afraid. Number one, he’s afraid of what happened to Martin Luther King Jr…..

….Now does he have any reason to fear the CIA? Well he sure as heck does. For those of your listeners who have not read James Douglass’s JFK and the Unspeakable, you need to read that, because it’s coming up on 50 years. The mystery has not been solved in the mainstream press. After reading James Douglass, who took advantage of all the previous studies, plus all the more recent information released by Congress, I’m convinced that John Kennedy was assassinated largely by Allan Dulles whom he cashiered as the head of the CIA after the Bay of Pigs, and a coterie of joint chiefs of staff, FBI, even some Secret Service folks who thought that JFK was being soft on Communism by back channel communications with Krushchev, that he was playing games with Fidel Castro…to repair the relationship, and worst of all he was giving Southeast Asia to the Communists. Now is there evidence for this? There sure as heck is. John Kennedy signed two executive orders just a month or so before he was killed. One of them said we’re pulling out 1000 troops out of South Vietnam by the end of the year, the year being 1963. The other said we’re going to pull out the bulk of the troops by 1965, we’re finished in Vietnam. That’s a matter of record.”

Local politicians’ fear of the law enforcement community

In their book L.A. Secret Police (2014), Mike Rothmiller and Ivan G. Goldman describe how the Los Angeles Police Department (LAPD) operated a lawless spy network for decades without having its crimes exposed. The LAPD used threats and blackmail to intimidate city council members – and the staff of the Los Angeles Times.

Here is an excerpt from the book’s description on Amazon regarding the nature of LAPD during the reign of police chief Daryl Gates (1978 to 1992):

“L.A. cops ruined lives and reputations, inflicted mindless brutality, committed murder and engaged in massive cover-ups. In Los Angeles, police corruption was much more than unmarked envelopes stuffed with cash. It was a total corruption of power. For decades LAPD engaged in massive illegal spying and lied about it. Its spying targets included politicians, movie stars, professional athletes, news reporters and anyone wielding power or those of interest to Daryl Gates.”

The reluctance of people in power to criticize others in power

A general rule among most people who occupy influential positions is to avoid criticism of others who are similarly situated. This is done for selfish career reasons. Most people who are in a position to expose corruption and incompetence rarely do so because they fear being perceived as a threat to others in power.

In a May 2014 article on the Intercept, journalist Glenn Greenwald called attention to a quote originally published in the New Yorker. The remark was made by Lawrence “Larry” Summers, who served as – among other roles – the president of Harvard University and the Secretary of the Treasury. He was speaking to Elizabeth Warren, a former Harvard law professor and current U.S. Senator.

“Larry Summers took Warren out to dinner in Washington and, she recalls, told her that she had a choice to make. She could be an insider or an outsider, but if she was going to be an insider she needed to understand one unbreakable rule about insiders: “They don’t criticize other insiders.”

________________________________________________________

The Silence of the Judicial Branch

Justice Gagged

Just like the members of the Congressional intelligence committees, judges on the Foreign Intelligence Surveillance Act (FISA) Court are bound by secrecy oaths which prevent them from revealing anything about the scandalous crimes by members of the spying industry.

A good example of how that plays out in America’s Star Chamber occurred in April 2013. In a rare instance of the secret FISA court not simply rubber-stamping whatever the feds wanted to do, the court ruled that the domestic spying activities at issue involved an unacceptable abuse of the Constitution.

However, the Obama administration decided that Americans should not be allowed to know what the Feds were trying to get away with – because publicly disclosing the nature of the unconstitutional B.S. they were engaged in would allegedly jeopardize Americans’ national security.

The last I heard, the fed’s were still trying to keep the whole thing under wraps (whatever it was).

________________________________________________________

The silence of the ACLU (American Civil Liberties Union)

Cowardly Lion

Picture yourself as an ACLU attorney. You have a job and a family and a safe comfortable life. Do you really want to go to war with some shadowy rogue intelligence agency Stasi bastards who could target you for extra-judicial punishment? Probably not.

It is one thing to be a legal advocate for a position which annoys people in middle America; it is another thing altogether to throw rocks at a hornets’ nest by exposing the modern version of Cointelpro.

As an organization, the ACLU is also inclined to err on the side of caution to avoid risking its reputation. They do not wish to be associated with anything that has not already been conclusively proven by smoking-gun official documents published in the mainstream news media.

That is especially true for something like gang stalking, since the tactics render the subject inherently susceptible to being dismissed as a tin-foil hat conspiracy theory.

Keith Forsyth, one of the activists who broke into the FBI office in 1971 and stole the secret documents that exposed the first verion of Cointelpro, said this regarding the need for the break-in:

“When you talked to people outside the movement about what the FBI was doing, nobody wanted to believe it.”

Remember: the ACLU did not expose the first version of Cointelpro, and they have shown no interest in exposing its current version. By all indications, the ACLU’s national office plans to wait until it is safe before they wade in.

Notably, the ACLU has never made any public statements that are dismissive of the numerous claims of organized stalking. Apparently it is simpler for them to just avoid the topic completely. If you write to staff members at the ACLU to inquire about their views on reports of gang stalking, you will find that they do not respond with skepticism; they just don’t respond at all.

As I mention in the “Tactics” page of this website, anyone wishing to gain the attention of the ACLU on the subject of organized stalking should probably meet face-to-face with members of a local ACLU chapter rather than trying to contact the organization’s national office.

________________________________________________________

The Silence of the American News Media

The Silence of the Lambs

Organized stalking goes mostly undiscussed in the mainstream news media. I review the notable exceptions in detail elsewhere in this website, but as a rule, major corporate news agencies avoid discussing matters which the intelligence and law enforcement community do not wish to have discussed.

This silence in the press is largely the result of the kinds of self-censorship documented in sources such as Kristina Borjesson’s Into the Buzzsaw, and Noam Chomsky’s Manufacturing Consent.

Primarily, the media’s silence on gang stalking can be attributed to laziness, incompetence, and cowardice.

Edward R. Murrow

As a general rule, major news agencies ignore conspiracies in the absence of incriminating smoking-gun type official documents. Also, they prefer to have such documents conveniently dropped in their laps by whistle-blowers – as happened with the Pentagon Papers, Cointelpro, and the NSA’s domestic spying.

Pulitzer Prize-winning investigative journalist Seymour Hersh – who revealed the My Lai Massacre in the Vietnam War and the abuse of Iraqi prisoners at Abu Ghraib during the Iraq War – discussed the issue of documents when he was interviewed by the Guardian in September 2013. He said this of Edward Snowden’s revelations about the NSA:

“Editors love documents. Chicken-shit editors who wouldn’t touch stories like that, they love documents, so he changed the whole ball game.”

Intimidation of the press by the federal government adds to the problem.

To discourage reporting on issues it would rather not see publicly discussed, the U.S. government has aimed two weapons of intimidation at the American news media in recent years: surveillance of communication and prosecution of whistle-blowers.

In May 2013 it was revealed that two months of phone records of the Associated Press were secretly obtained by the Department of Justice, seeking the identities of confidential informants. Famed Watergate reporter Carl Bernstein said he believed the seizure of records was intended “to intimidate people who talk to reporters.”

Such efforts by the feds seem to have had their intended effect.

Following the AP phone records incident, journalists reported that trusted sources were becoming noticably more reluctant to provide information. AP President Gary Pruitt said that sources now “fear that they will be monitored by the government.”

A survey published in November 2013 by PEN American Center – an association of American writers dedicated to protecting free expression – found that many published writers in the U.S. reported that they self-censor on subjects such as military affairs, mass incarceration, drug policies, the Occupy Wall Street movement, and criticism of the U.S. government.

The survey found that 40 percent of the writers polled had either curtailed their social media activities or seriously considered doing so. In addition, 33 percent reported deliberately avoiding certain topics – or at least seriously considered avoiding certain topics – in phone or email conversations.

The survey also revealed that 28 percent had refrained – or seriously considered refraining – “from conducting Internet searches or visiting websites on topics that may be considered controversial or suspicious.”

Doing its best to chill criticism of the federal government, the Obama administration prosecuted more whistle-blowers than all former presidents combined. The Committee to Protect Journalists published an article on this disturbing trend in October 2013 by a former editor of the Washington Post. Some excerpts:

“Six government employees, plus two contractors including Edward Snowden, have been subjects of felony criminal prosecutions since 2009 under the 1917 Espionage Act, accused of leaking classified information to the press — compared with a total of three such prosecutions in all previous U.S. administrations. Still more criminal investigations into leaks are under way.”

“Exposing “waste, fraud and abuse” is considered to be whistle-blowing. But exposing questionable government policies and actions, even if they could be illegal or unconstitutional, is often considered to be leaking that must be stopped and punished. This greatly reduces the potential for the press to help hold the government accountable to citizens.”

In February 2014, Reporters Without Borders ranked America as the 46th best country for journalist freedoms – in between Romania and Haiti.

For a sense of why many reporters are afraid to investigate criminality by the U.S. intelligence and law enforcement community, I recommend watching this 3-minute video clip in which the Pulitzer prize winning Washington Post journalist Dana Priest describes the backlash she experienced – which included death threats – when she exposed the CIA’s use of secret prisons to torture terrorism suspects.

________________________________________________________

The “Someone would have talked” Fallacy

Telling a secret

Investigative journalist Russ Baker disputes the common response to allegations of criminal conspiracies by covert operatives in the U.S. government – namely, that such claims are not plausible because “someone would have talked.”

“…whistleblowers are quickly discredited, suppressed, or worse. From time to time people even come out of the national security establishment to testify to such wrongdoing, but they almost always pay a heavy price –which of course discourages others from bearing witness.”

Among the examples cited by Baker is the case of John Kiriakou, a former CIA official and whistle-blower who revealed that the CIA tortured prisoners as part of its official policy. Kiriakou lost his job and was sentenced to 30 months in prison.

“Almost nobody talks. And for good reason. Just ask John Kiriakou.”

Daniel Ellsberg, the whistle-blower who famously revealed the Pentagon Papers, makes exactly the same point:

“Since wrong-doing virtually always requires both secrecy and lies, and further secrets and lies to protect the secrets and lies,
the wrongful operation-especially in a regime that approaches democracy–is commonly highly vulnerable to a breach of secrecy by any one of the many who share the secret. Yet typically in the national security field (and to a striking degree even in corporate and private associations without a formal apparatus of secrecy) even the “weakest links” do not break. No one tells.”

________________________________________________________

Failure to Connect the Dots

Connecting Dots

Another factor which helps explain the relatively low-profile of organized stalking in the news media is a failure to recognize a common thread between various related news reports. The most important of these articles and broadcasts are listed in the “Published News Reports” section of this webpage.

In 2004 the PBS News show NOW featured an episode about signs of a possible re-emergence of Cointelpro “as a result of the relaxation of guidelines first put into place after the Cointelpro scandal investigation.”

Later that year, Newsweek reported that the Pentagon was quietly re-entering the business of domestic spying – “including recruiting citizens as informants.”

In 2007 the Washington Post Magazine featured a cover article about gang stalking which portrayed several of the self-proclaimed victims of the crimes as credible, and claims about the types of electronic weapons allegedly being used as plausible.

Several local news reports have documented police officers engaging in organized stalking for personal vendettas. In 2011 police in Stockton, California stalked the city manager after a break-down in contract negotiations. In 2012 a police officer was stalked by numerous fellow officers – from multiple jurisdictions – after issuing a citation to an off-duty police officer for reckless driving.

Both cases suggested that the police were familiar with gang stalking tactics and were unconcerned about any legal consequences.

To their credit, during 2013 at least two magazines – the Nation and CounterPunch – reported on counterintelligence operations (including psychological operations tactics) by the FBI and by private intelligence-security contractors against critics of corporations and asserted that Cointelpro has re-emerged.

Sources such as Democracy Now! have reported the emergence of a shadowy industry of spies employed by major U.S. corporations to conduct secret – and often illegal – counterintelligence operations. Such reports make clear that there is almost no oversight or legal accountability for these private spooks – most of whom are former or present agents of law enforcement and intelligence agencies.

Over the past decade numerous individuals have reported being harassed and spied upon by perpetrators whose tactics were largely identical to those used by the FBI and other intelligence agencies such as East Germany’s Stasi. Local newspaper and TV news reports about gang stalking claims have also emerged from across the country in recent years.

Viewed as separate isolated incidents and news reports, such developments are mostly not recognized as examples of a common phenomenon.

The more you delve into the subject of organized stalking, the more you realize that the scope of the crime and its extreme impact upon the victims warrants a very close look by America’s journalists.
__________________________________________________________________

Refusal to confront truths about deep corruption

stop!

Another obstacle to exposing criminality by government and corporate officials is an unwillingness by many people to face the reality that the institutions we count on to protect us are often seriously corrupt.

Journalist Russ Baker touched on this phenomenon when looking back at the 1991 book October Surprise by Gary Sick, the National Security Council liaison to President Carter.

As documented in the book, during the 1980 presidential campaign Ronald Reagan’s campaign chief William Casey made a secret promise to give military aid to Hezbollah in return for assurance that the 52 American hostages then being held by Iran would not be released until after the election – thus making President Carter appear weak.

As Baker notes, Casey’s deal was essentially an act of treason. Gary Sick explained in his book why this very serious scandal was basically ignored by the press and by the Washington political establishment:

We in Washington are accustomed to the petty scandals of Washington politics. However, there is another category of offenses, described by the French poet Andre Chenier as “les crimes puissants qui font trembler les lois,” crimes so great that they make the laws themselves tremble.

We know what to do with someone caught misappropriating funds. But, when we are confronted with evidence of a systematic attempt to undermine the very political system itself, we recoil in a general failure of imagination and nerve….

….Most mere observers are, therefore, very much disposed toward misbelief and are, therefore, willing to disregard evidence that is directly presented to them—and even to construct alternative explanations for events that seem just too distasteful to want to believe. This all-too-human propensity provides just the margin of safety that is needed by those who would dare to under­ take what would otherwise be regarded as just too immensely a risky undertaking to attempt.
______________

Hitler’s Sheep

A final thought on how cowardice and dishonesty keeps U.S. government-sanctioned crimes against Americans hidden from the public…

Holocaust survivor Primo Levi explained how it worked in Nazi Germany. No doubt something similar – although on a much smaller scale – applies today in America when people are enlisted to assist in various ways with “investigations” – or whatever the operations are publicly called. Anyone who encounters a corrupt federal, state, or local agent who waves a badge (and perhaps a National Security Letter) while requesting some Constitutionally-suspect assistance – and silence about the assistance – should consider the following:

“In Hitler’s Germany a particular code was widespread—those who knew did not talk; those who did not know did not ask questions; those who did ask questions received no answers. Shutting his mouth, his eyes, and his ears, the typical German citizen built for himself the illusion of not knowing, hence of not being an accomplice to the things taking place in front of his very door.”

– Primo Levi, The New Republic, October 23,

16. Shining a Light on the Cockroaches

be-a-light

Gang stalking is conducted in secret because, like its predecessors Cointelpro and MK Ultra, it is illegal and unconstitutional. Stalking – described as such, or as “criminal harassment” or “criminal menace” – is a crime under the laws of every state in America.

In 1990 California became the first state to criminalize stalking. Within three years, all states had done so. Stalking is illegal because the vast majority of Americans deem it morally reprehensible and an assault on the basic rights and freedoms of the victims.

Gang stalkers know that most people – if they understood the crimes gang stalkers perpetrate – would regard them as the human equivalent of cockroaches, so the stalkers skulk around and ply their trade in the shadows.

They don’t have to worry about being caught and prosecuted however, because (a) their tactics are inherently difficult to prove legally, and (b) their crimes are supported directly and indirectly by people with power and money and government connections.

Even if you assume that some individuals targeted for gang stalking are in some way deserving of persecution, you should note that gang stalking is very different from “shaming.” The historical practice of shaming individuals had the imprimatur of the society. If gang stalkers had such a sanction, they would not have to conduct their activities in secret.

Instead, gang stalking is largely a game played by people who are wealthy and/or well-connected to the police state infrastructure. For their personal vendettas and agendas, they exclusively wield gang stalking as a weapon that is unavailable to most people.

Exposing what is happening is the challenge for victims of gang stalking – and for anyone who believes that America should be a constitutional free nation instead of a quasi-police state run by plutocrats and neo-fascist members of law enforcement and intelligence agencies.

The balance of power is completely tipped in favor of the perpetrators of organized stalking. Also, cowardice and careerism by politicians and members of the mainstream press make it unlikely that much help will spontaneously emerge from those quarters.

On the other hand, civilian activists managed to derail the FBI’s Cointelpro operations, so there is precedent for eventual victory by the good guys. Mind you, those activists had to break into an FBI office to get the documents which exposed the crimes, so a certain amount of courage is required.

A final point: the Internet is a game-changer; it has the potential to expose gang stalking and ultimately lead to the program’s demise. As I note in my essay “Gang Stalking and America’s Police State Government” on another page in this website, the digital public square is already filled with information and rhetoric which the government would prefer to censor but cannot, posted by Americans fed-up with the secrecy and abuses of power in the upper echelons of government and corporations.

Please do whatever you can to help expose the rot.

__________________________________________________________

If you can help expose illegal spying and harassment of Americans by intelligence agencies, law enforcement agencies, and private security contractors, please do so. America needs more patriots like Daniel Ellsberg, Edward Snowden, Jeremy Hammond, Barrett Brown, Russell Tice, William Binney, Ray McGovern, Thomas Drake, Frank Serpico, Thomas Tamm, Hugh Thompson, Jr., William C. Davidon, John Raines, Bonnie Raines, Keith Forsyth, Judi Feingold, and Bob Williamson.

Anti Nazi image
__________________________________________________________

Recommended Reading

Aaronson, T., 2013, The Terror Factory, Inside the FBI’s Manufactured War on Terrorism, lg Publishing, 280 pp.

Altemeyer, B., 2006, The Authoritarians, paperback and CD.

Balko, R., 2013, Rise of the Warrior Cop: The Militarization of America’s Police Forces, PublicAffairs, 400 pp.

Behnke, K., and Fuchs, J., 1995, Zersetzung der Selle, “Decomposition of the Soul:” Psychology and Psychiatry in the Service of the Stasi

Borjesson, K., Ed., 2002, Into the Buzzsaw, Leading Journalists Expose the Myth of a Free Press, Prometheus Books, 462 pp.

Bowart, W., 1978, Operation Mind Control, The CIA’s Plot Against America, Dell Publishing, 317 pp.

Chomsky, N., 2002, Understanding Power, The Indispensable Chomsky, The New Press, 416 pp.

Donner, F., 1990, Protectors of Privilege; Red Squads and Police Represstion in Urban America, University of California Press, 496 pp.

Douglass, J.A., 2008, JFK and the Unspeakable; Why He Died and Why It Matters, Touchstone, 560 pp.

Guck, B., 1989, War at Home; Covert Action Against U.S. Activists and What We Can Do About It, South End Press Pamphlet Series, 90 pp.

Harris, S., 2010, The Watchers, The Rise of America’s Surveillance State, Penguin Books, 432 pp.

Hayes, C., 2012, Twilight of the Elites, America After Meritocracy, Broadway Books, 304 pp.

Herman, E.S., and Chomsky, N., 1988, Manufacturing Consent; The Political Economy of the Mass Media, Pantheon, 480 pp.

Lockshin, A., and Lockshin, L., 1988, Silent Terror, One Family’s History of Political Persecution in the United States, Novosti Press Agency.

Marks, John, 1979, The Search For the Manchurian Candidate, The CIA and Mind Control; the Secret History of the Behavioral Sciences, W.W. Norton & Company, 288 pp.

Naylor, G., 2005, 1996, Third World Press, 175 pp.

O’Toole, G., 1978, The Private Sector, Rent-a-cops, private spies and the police-industrial complex, W.W. Norton & Co., 250 pp.

Orwell, G., 1945, Animal Farm, Rupa, (2013), 124 pp.

____, 1948, 1984, Signet Classics, 328 pp.

Priest, D., and Arkin, 2011, W. M., Top Secret America; The Rise of the New American Security State, Back Bay Books, 368 pp.

Redden, J., 2000, Snitch Culture; How Citizens are Turned Into the Eyes and Ears of the State, Feral House, 320 pp.

Rothmiller, M., and Goldman, I.G., 1992, L.A. Secret Police In the LAPD Elite Spy Network, 226 pp.

Scahill, J., 2007, Blackwater; The Rise of the World’s Most Powerful Mercenary Army, Nation Books, 560 pp.

Shorrock, T., 2008, Spies For Hire; The Secret World of Intelligence Outsourcing, Simon & Shuster, 464 pp.

Turse, N., 2013; Kill Anything That Moves: The Real American War in Vietnam, Picador, 416 pp.

Whitehead, J.A., 2013, A Government of Wolves, The Emerging American Police State, SelectBooks, 288 pp.

Important youtube videos

Targeted Individuals (TIs) #31 https://www.youtube.com/watch?v=si1bHa45u18

Targeted Individuals (TI’s) #32 tube.com/watch?v=PJqMcafwFJ8

www.FightGangStalking.com
____________________________________________________________________

II. What is Gang Stalking? (from https://gangstalking.wordpress.com/faq/)

A Simple Definition

Under Occupational Health and Safety laws, individuals are being flagged and placed on community notification lists. This is happening without the targets knowledge. In many countries these community notifications are being used by companies and others to target innocent individuals such as whistle-blowers, the outspoken, etc. In conjunction with these notifications, companies and others are in some cases using a practice that was used in the former soviet union called the psychiatric reprisal. This is used as a means of retaliation, blacklisting, silencing, or controlling members of society. Once on the notification system, warnings about the targets are sent out to every individual the target comes in contact with, thus poisoning their associations, and socially annexing the targeted individual.

Full Definition

Gang Stalking is a systemic form of control, which seeks to destroy every aspect of a Targeted Individuals life. Once a target is flagged a notification is sent out to the community at large, and the target is followed around 24/7 by the various communities that they are in.

The community notifications will go out to various places. Apartment rentals, future employers, stores and communities where the target visits, will be notified. Doctors offices, fire departments, police, etc. A covert investigation might also be opened, and electronic, means used by the civilian spies/snitches as part of the overt and covert monitoring and surveillance process.

Individuals can be flagged designating them as having a history of aggressive or inappropriate behavior. This notification system will follow the target if they move, change jobs, visit other areas. It let’s the community believe that the target is a person who needs to be watched or monitored.

Community health and safety

http://www.wcb.pe.ca/photos/original/wcb_wpviolence.pdf

“In the service sector this may require identifying to employees persons who have a history of aggressive or inappropriate behavior in the store, bar, mall or taxi.

The identity of the person and the nature of the risk must be given to staff likely to come into contact with that person. While workers have the right to know the risks, it is important to remember that this information cannot be indiscriminately distributed.

A woman named Jane Clift in the U.K. went through a very similar type of flagging system. A warning marker was placed against her name designating her as potentially violent.

Violent Persons Registry

http://gangstalkingworld.com/Media/2007/09/2009/10/defamation-and-anti-social-behaviour/

She sensed that, everywhere she went, there was “whispering, collaboration, people scurrying about”. “Everywhere I went – hospitals, GPs, libraries – anywhere at all, even if I phoned the fire service, as soon as my name went on to that system, it flagged up ‘violent person marker, only to be seen in twos, medium risk’.”

http://gangstalkingworld.com/Media/2009/10/defamation-and-anti-social-behaviour/

http://www.24dash.com/news/Local_Government/2009-06-24-Good-citizen-wins-12-000-damages-from-council-who-labelled-her-potentially-violent

Jane Clift was targeted this way and spent four year clearing her name.

Individuals are being flagged without their knowledge. In many countries these community notifications might fall under community safety and health laws. It seems that employers, educational facilities, and community centers are in some cases flagging innocent individuals as a means of retaliation, silencing, or controlling members of society.

Retaliation

http://www.harassment101.com/Article5.html

Maria Buffa, a former salaried employee in the personnel department at Ford World Headquarters in Dearborn, Michigan, said she, too, was sent to a psychiatrist after she filed a sexual harassment complaint in February 1999 against a woman co-worker. “You think, maybe I am the problem, else why would they be sending me to a psychiatrist,” she said. The psychiatrist Ford selected, Dr. Edward Dorsey of Midwest Health Center, made a report that said the only psychiatric symptom Buffa displayed was anxiety. Dorsey’s report said that the referral came from Ford’s medical department and was at least in part due to her complaints of sexual harassment. He also noted that the Ford doctor who referred Buffa cited a couple of “incidents”: She was seen yelling at someone, and she had shown up at a fitness center “wearing less than the usual amount of clothing for that physical activity.”

In April 1999, Buffa’s boss fired her “for the good of the company,” she recalled being told.

Psychiatric Reprisal

The individual is then placed under overt and covert forms of surveillance. Everywhere the Targeted Individual goes, their name is flagged. In a big city this could mean that thousands upon thousands of people are getting a notification about the target. The person is followed around 24/7. Foot patrols and vehicle patrols are used to follow the Individual around, as part of the monitoring process. During these patrols a one handed sign language is used to assist the citizen informants with communicating to each other. They will use this to silently communicate to any business the target enters, or other areas.

http://gangstalkingworld.com/Media/2010/02/informant-signals

Gang Stalking is experienced by the Targeted Individual as psychological attack, that is capable of immobilizing and destroying them over time. The covert methods used to harass, persecute, and falsely defame the targets often leave no evidence to incriminate the civilian spies.

It’s similar to workplace mobbing, but takes place outside in the community. It called Gang Stalking, because groups of organized community members stalk and monitor the targets 24/7.

Many Targeted Individuals are flagged, harassed and placed under surveillance in this way for months or even years before they realize that they are being targeted by an organized protocol of harassment.

What happens during this monitoring and surveillance is very similar to what happened to many innocent individuals in the former East Germany or Activists and Dissidents in Russia. Many innocent people in the former East Germany would be targeted by the state, and then their friends, family, and the community at large would be used to monitor, prosecute, and harass them. The same persecutions and harassment’s are now happening in democratic countries.

Once a person is flagged or has a warning marker placed on their file, the community becomes hypervigilant, and within this structure there is a targeted and illegal protocol of harassment that happens. Electronic means are used to monitor, harass and torture the target. When the target tries to describe what is happening to them, it sounds as if they have had a mental breakdown. The reality is electronic means are being used to make it appear as if the target has had a breakdown.

Electronic Harassment

http://www.targetedindividuals.com/Forum/showthread.php?tid=153

This System is the “MOSQUITO” that is used in the UK to break up groups of unruly people. Creates A Protective Shield Of High Pressure Complex Ultrasonic Shock Waves.

The Mosquito device is being considered for banning by the European Union, cause it infringes on the human rights of children.

Produces a power field of ultrasonic shock wave energy. The frequency range is adjustable from 7kHz to 25kHz, with the PCC30 putting out 140db of sound (135db for the PPF40) measured at 30cm. Intended for mounting to vehicles for potential crowd control applications. Also excellent for keeping out pests from gardens, etc. Hearing protection recommended when in use.

Many of these devices are easy to access, and almost impossible for an unaware target to describe in a credible manner, without sounding as if they have had a mental breakdown.

Unauthorized intruders are exposed to a feeling of intense paranoia, discomfort, disorientation, nausea and other undesirable effects. Government research is currently investigating the weapons potential and may soon classify these devices!

http://www.amazing1.com/ultra.htm

In Russia similar means were used by the state to declare activist, dissidents or anyone they thought to be an enemy of the state as mentally unfit and many were institutionalized using this form of systemic control.

The closest thing to Gang Stalking that democratic countries have seen before this is McCarthyism, Cointelpro, and RED SQUAD programs. Red Squad programs were used for monitoring, and harassment of various groups. They have been in place for over a hundred years, and they also employed Informants.

Civilian Spies, who can also be termed “Covert Human Intelligence Sources” come from every level and sector of society. Remember anyone the Targeted Individual comes into contact with gets a warning about the target.

Just like with Cointelpro investigations, everyone in the targets life is contacted, advised as to why the individual has been flagged, advised not to discuss the notification and asked to be a part of the ongoing, never ending monitoring (systemic psychological harassment and manipulation of the target) process. This process is covertly designed to control the targets, keep them in line, or destroy the target over time, leaving them with no form of support.

These actions are specifically designed to mimic a psychological operation. This psychological harassment of the target is designed to destroy them over years, making them look crazy and leave them with no form of support. The individuals around the target carry out actions and tasks as they are instructed, without realizing that the structure is psychologically designed to break the target down.

Worldwide programs of control and conformity have been used with equal success and lethality. What we are seeing now is a co-ordinated and organized effort of control and conformity. Many countries around the world are currently using a model of policing called: Community Oriented Policing. It’s described as a systemic approach to policing. It focuses on instilling a sense of community within a geographically located neighborhood. Communities come together and discuss what values they would like to have in their community, community development, and it’s also a time to discuss any problems that might be happening in a specific area. If a problem is identified an investigation might be opened. These local programs in many countries have been forming partnerships with other government run programs at, provincial, state and federal levels. A process called Deconfliction allows them to share information. Reports of Gang Stalking are not only coming in from democratic countries, but they are coming in from many other countries as well.

http://news.cnet.com/8301-13578_3-20000550-38.html

http://www.eff.org/files/filenode/social_network/20100303__crim_socialnetworking.pdf

The modern day systemic form of control could only be funded at governmental levels, just like it has in other societies where these similar types of harassment programs have been implemented. It’s all part of a system of control and conformity that has been in place for many years. A system of control with many local groups and appendages taking part. Many targets report that their information is passed and shared between country boarders, and that the surveillance continues even when they travel.

What are the goals of Gang Stalking?

The official goal is listed as a notification for the community, to alert them of individuals who have been flagged, or have had a warning marker placed on their file. It’s officially used as a means of investigating or monitoring individuals who have displayed inappropriate, or violent behaviours. The real goal in some cases however seems to be to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalization, or forced suicide. Other goals of this harassment is to destroy the targets reputation and credibility. Make the target look crazy or unstable.

Other goals involve sensitizing the target to everyday stimuli’s as a form of control, which is used to control targets when they get out of line. Once the target is sensitized, the Citizen Informants have an easier time identifying the Targeted Individual in public. The targets sensitivity is most likely added to their file as a warning marker and sign to watch for future reactions to.

The structure of this type of notification makes the targets vulnerable. Once a community goes into monitoring mode, they unofficially work towards driving the target from the community. This can be done by making the target destitute. Secondary goals include making the target homeless, jobless, giving them a breakdown, and the primary goals seems to be to drive the target to forced suicide. This is the same thing that was done to targets of the Stasi and Cointelpro investigations. It’s a useful way of eliminating perceived enemies of the state.

What are other Names for Gang Stalking?

There are many names for this form of systemic control and harassment. Under the Gang Stalking label you will also find such terms as Community Mobbing, Community Stalking, Stalking by Proxy, Organized Stalking, Cause Stalking, Multi-Stalking, but it’s all part of the same community notification harassment protocol. What many people do not realize is that Gang Stalking is just one appendage of this systemic form of control. There are other forms of control used to repress, and keep individuals in line. Other forms or appendages include, but are not limited to: Mobbing, Cointelpro, The Buzzsaw, Covert War, Electronic Harassment, etc. These are the just some of the names being given to a very old game, that is once again being played by governments on their unsuspecting citizens.

How are targets chosen?

Officially targets can be flagged and investigated for suspected, or reported behaviours. Unofficially the Targets can be chosen because of many other reasons. They can be chosen for political views. They can be chosen for whistle-blowing. They can be chosen because they belong to a dissident movement. They can be chosen because they asserted their rights at work, or filed a complaint. They can be chosen because they made the wrong enemy. Were considered to be too outspoken, unwittingly investigated something that the state did not want investigated, signed a petition, wrote a letter. They were deemed as suspicious by a civilian spy/snitch and their names were handed over.

It’s becoming apparent that targets might be chosen for this systemic form of control, if they are not already in some way a part of this controlled system. Eg. Many Targeted Individuals seem to be unaware of this community notification, flagging and monitoring system. Some targets also seem to be unaware that large chunks of our society are now being used as Citizen Informants.

Who gets targeted?

Targeting can happen to anyone in society. In the past primary targets of programs such as Cointelpro have been minorities. Targeting however can happen to anyone. Individuals are often targeted for being outspoken, whistle blowers, dissidents, people who go up against wealthy corporations, woman’s groups, (single) women, minorities, extremists, conspiracy theorists, anti-war proponents, individuals identified or targeted as problems at these community meetings, and other innocent individuals. The majority of the targets are often not aware that they are being targeted in this way. When a target moves, changes jobs, the harassment still continues, because they are still flagged, and a notification is still going out to everyone they come in contact with. Every time the target moves, the same information, lies, and slander will be spread out into the new community and the systemic monitoring and harassment will continue. Traits of those targeted

http://gangstalkingworld.com/Forum/YaBB.pl?num=1205738832/0

Who takes part?

People from all walks of life are a part of this system, because once a target is flagged, their information is distributed to a wide range of people, organizations, and communities. People from all races, ages, genders. Every sector of society that you can think of is a part of this. Civilian Spies/Snitches include, but are not limited to: General laborers, the wealthy, bikers, drug dealers, drug users, street people, punks, hip hop culture, KKK, black activists, church groups, youth groups, Fire Fighters, police officers, lawyers, health care workers, store keepers, maids, janitors, cable installers, phone repair persons, mail carriers, locksmiths, electricians, etc. There really is no minimum or maximum age range. An article came out recently in the UK, saying they were recruiting children as young as eight years old to be Covert Human Intelligence Sources.

http://www.telegraph.co.uk/news/uknews/2689996/Children-aged-eight-enlisted-as-c%20ouncil-snoopers.html

Public individuals that the Targeted Individual comes in contact with are given this warning. These community notifications started with good intentions. Workers and the community at large do have a right to be notified if they are going to encounter persons who have violent, inappropriate histories. Citizens want to be able to protect themselves and their communities, however what is happening is that this program is also being used to falsely target innocent people.

Many do not understand or care that the end consequence of this flagging, this harassment protocol is to destroy a person. Many people in today’s society are scared, they are willing to give up personal freedoms, for a false sense of security, and if that means taking away the rights of another individual to accomplish this, they have no problem doing this.

Why people participate in Gang Stalking?

There are many reasons that someone takes part in this.

1. Some do it for the sense of power that it gives them. They feel in control. Many wholeheartedly believe that this let’s them know who is bad and who they need to protect themselves and their communities from.

2. Others do this as a way to make friends and keep friends. It’s something social and fun for them to do. They love that special feeling of monitoring and protecting their community. Many in society use the one handed sign language to communicate and it’s very effective in breaking down race, gender, age, social barriers. Many believe that it also let’s them know who is on their side, vs who could be the potential target.

3. Others are forced or blackmailed by the State or the police into taking part. I have seen a few people pressured into taking part.

4. They are told that they are part of homeland or national security. They are told that they are being used to help keep and eye on dangerous or emotionally disturbed individuals. They see themselves as heroic spies for the state.

5. Others are just local thugs or Informants who are already being used for other activities, and their energies are just diverted over into these community health and safety programs. Eg. Some may be given the choice of monitoring a Targeted Individual for the community or the police vs going to jail.

6. Others are told outright lies and slander about the target to get them to go along with ruining the targets life. Eg. Many caring families are told that the individuals has displayed mental health issues, or other socially unacceptable behaviours and might be a danger to themselves or the community at large, and that the notification is necessary for keeping the community safe. They are asked not to disclose this.

7. Many are however just average citizens who in the course of going about their day to day jobs, are being used to keep an eye out, and if a flagged target does come into their vicinity, they are asked to watch, monitor and observe the target. It’s the way the society is.

What are some techniques used against targets?

A few of the most common techniques are listed below.

a) Classical conditioning.

Getting a Targeted Individual sensitized to an everyday stimuli. The targeted individual over a period of months, or even years is negatively sensitized to an everyday stimuli, which is then used to harass them. It’s used out in public to let them know they are constantly being harassed and monitored. Some examples of everyday stimulus that might be used include: sounds, colors, patterns, actions. Eg. Red, white, yellow, strips, pens clicking, key jangling, loud coughing, loud whistling, loud smacking of clapping of hands together, cell phones, laptops, etc.

b) 24/7 Surveillance This will involve flagging and following the target everywhere they go. Learning about the target. Where they shop, work, play, who their friends and family are. Getting close to the target, moving into the community or apartment where they live, across the street. Monitoring the targets phone, house, and computer activity. Surveillance Policy.

http://www.newport.gov.uk/stellent/groups/public/documents/policies_and_procedures/n_039963.pdf

c) Isolation of said target.

This is done via reports. The flagging is meant to warn the community, but they act as little more than slander campaigns. They present a one sided assessment of the targets behavior and activity. The target is never allowed to tell their side of the story or to clear their name. This one sided assessment can include false reports, lies, and legitimate incidents where the target was set up. Eg. People in the targets community are told that the target is crazy, dangerous, a thief, into drugs, a prostitute, pedophile, in trouble for something, needs to be watched. This very flagging in and of itself is capable of creating paranoia, and false interpretation of everyday incidents.

Files will even be produced on the target.

It’s been shown that community notifications of any kind can and do create a sense of paranoia within a community.

Community Notification

http://www.johnhoward.ab.ca/pub/pdf/C20.pdf

Some people might argue that they would feel more secure if they were aware of the identities of dangerous offenders in their neighborhoods, but widespread community notification actually serves to heighten fear of victimization. In a large metropolitan area, hundreds of thousands of people are notified of a dangerous offender’s release, while only hundreds will come into contact with him in the community. This blanket notification propagates the belief that there are more “predators” in the community than ever before, and fearful attitudes among members of the public are reinforced. A vicious cycle results: widespread notification leads to an increase in the community’s fear of crime which, in turn, leads to more calls for notification. We would also argue that the use of inflammatory language such as “predator” by politicians and officials also works to heighten fear and increase calls for more punitive action.

d) Noise and mimicking campaigns.

Disrupting the targets life, sleep with loud power tools, construction, stereos, doors slamming, etc. Talking in public about private things in the targets life. Mimicking actions of the target. Basically letting the target know that they are in the targets life. Daily interferences, nothing that would be too overt to the untrained eye, but psychologically degrading and damaging to the target over time.

e) Everyday life breaks and street theatre.

Flat tires, sleep deprivation, drugging food, putting dirt on targets property. Mass strangers doing things in public to annoy targets. These strangers might get text messaged to be at a specific time and place, and perform a specific action.

f) Electronic Harassment.

Electronic means can be used to create the illusion that the target is having a mental breakdown, when in fact they are being targeted and harassed by a community that is trying to get them to move, because they believe that the person is a danger, or an undesirable. This flagging system allows the community to treat the target as less than, someone they are allowed to harass, and victimize. It gives them a license to do unspeakable things to innocent targets, and their families.

Hightech Harassment

This is not just another revenge book. This is the ultimate revenge book-high tech recipes for madness concocted by the author in collaboration with the experts. Scott French interviewed engineers, bank tellers, phone operators, computer technicians, radio and TV managers, and asked them point black, “How would you get even with somebody?” What he came up with is a collection of electronics, chemicals, and common sense designed to push anybody over the edge. Discover how to induce insanity with lasers, shockers, breakers, and blowers; clear beaches with “silent sound”; zap computer disks from a distance, bypas computer passwords, blast boomboxes and bother banks. In short learn to harass the forces of science and technology and excercise your God-given right to get even with anybody, anytime.

These actions might seem harmless to these Citizen Informants, but in reality the actions could be causing great psychological trauma for the target. Eg. Blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit a response from targets. Etc. It’s like the death of a thousand paper cuts. One or two minor incidents will not cause any harm to the target, but over time the target is slowly worn down.

http://www.telegraph.co.uk/news/uknews/4612951/Man-jailed-for-whistling-Addams-Family-theme-tune-at-neighbours.html

Where does the support or funding for this come from?

Though the systemic harassment that Targeted Individuals refer to as Gang Stalking is immoral and unethical in nature, programs such as this in democratic countries, and none democratic countries have always been funded by the Government. They are the only ones with enough money, coordination, and power to keep such a system in place. These Co-ordinated efforts then join hands with others for this systemic form of control and harassment.

Ruling the community

http://www.albionmonitor.com/9711b/policing.html

“Ruling the community with an iron fist. “Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants and federal agencies could form alliances without causing public outcry.” Covert Action Quarterly, summer 1997.”

ACLU Blog

http://www.gangstalkingworld.com/blog.aclu.org/2009/04/30/mass-con-fusion/#more-5320

“You mean to tell me that it is legal for corporations from the private sector to team up with local law enforcement officials in efforts to spy on innocent members of our society? You also mean to tell me that the synthesis of law enforcement authority and the drive of for-profit companies operate under little to no guidelines or restrictions and it is unclear to whom they are responsible to?”

What can you do to help?

1. If you know someone who is being targeted in this way please don’t go along with it. Don’t assume that the person is guilty or a bad person. Many innocent people are currently being targeted, and people are being told lies. This form of harassment is systemic and it’s about state control and conformity. The express goal of this harassment is to destroy the individual over time.

2. If you are aware of someone being harassed in this way, subtly direct them to websites that deal with Gang Stalking, or sites for Targeted Individuals. Knowledge is power.

3. You can subtly suggest that your local newspapers or community papers print articles about Targeted Individuals or even an write an objective piece about Gang Stalking.

4. If you are a law maker, you can petition for changing the laws. Ensure targets who are flagged in this way have proper notification letting them know that they are flagged. Convicted criminals have this right, why not targets? Many of whom are innocent members of the public.
Petition for better oversight of these programs. As it stands Communities are getting away with serious human rights abuses, and complaints are not being heard. Authority figures such as the police in many cases are not taking the reports seriously due to the type of warning markers attached to a targets file.

5. If you are a lawyer our community needs lawyers who are skilled in helping targets access Freedom Of Information files. Lawyers who can help targets get their files reviewed, or corrected. Lawyers who can work with the existing privacy laws to limit who and where the targets information is disseminated to. We need human rights lawyers who can address the complaints of abuses that are happening to people listed or flagged in this manner. Illegal surveillance, illegal access of mail and electronic communications, and torture via electronic monitoring.

6. Mental health professionals can recognize that there is illegal harassment happening to individuals who are flagged, listed or have warning markers placed against their names. Community notifications can and do create paranoia within communities. This notification makes targets prime for harassment, and community mobbing.
They can objectively investigate the complaints, and become familiar with the Electronic means of monitoring and harassment that are being used. Laws are just starting to catch up to the technology. Eg. Europe is considering a ban on the mosquito device, because it infringes on the human rights of children.

7. You can subtly offer your support to someone who is being unfairly treated, in very small little ways.

8. You can bring up the subject of Gang Stalking or Targeted Individuals.

How do participants communicate?

Communication happens in a number of ways. When on the street or in cars patrolling, they use a one handed sign language. Citizen Informants also seem to get ques via cellphone and some via earphones.

http://gangstalkingworld.com/Media/2010/02/informant-signals/

Their one handed sign language include things like tapping the side of the nose, corner of the eye, brushing back the hair 3 times, the infamous double blink, etc.

Here is a list of signals that the former East German Secret Police the Stasi used. These signals below are not gang stalking signals, they were used in the former East Germany. http://www.nthposition.com/stasiland.php

SIGNALS FOR OBSERVATION

1. Watch out! Subject is coming – touch nose with hand or handkerchief

2. Subject is moving on, going further, or overtaking – stroke hair with hand, or raise hat briefly

3. Subject standing still – lay one hand against back, or on stomach

4. Observing Agent wishes to terminate observation because cover threatened – bend and retie shoelaces

5. Subject returning – both hands against back, or on stomach

6. Observing Agent wishes to speak with Team Leader or other Observing Agents – take out briefcase or equivalent and examine contents.

Books:

1. GmB Bailey, “Bridging The Gap.”

2. Gloria Naylor. “1996″

3. Kristina Borjesson “Into the Buzzsaw”

4. Jim Redden “Snitch Culture”

5. Noa Davenport “Mobbing: Emotional Abuse in the American WorkPlace”

6. Ward Churchill, Jim Vander Wall “Cointelpro Papers”

7. Anna Funder “Stasiland”

8. Protectors of Privilege: Red Squads and Police Repression in Urban America

9. Victor Santoro “GASLIGHTING How To Drive Your Enemies Crazy “

10. Anthony Brina “Suburban Spies”

11. Stephen Knight “The Brotherhood”

12. Alex Constantine “The Covert War Against Rock”

13. Frank Donner “The Age of surveillance”

14. Niki F. Raapana “2020”

15. Dr. Andrew M. Lobaczewski. Political Ponerology: The science on the Nature of Evil.

16. Community Oriented Policing. A Systemic approach.

Movies:

1. The lives of others. http://www.imdb.com/title/tt0405094/ (A movie about covert investigations in the former East Germany)

2. The Matrix. (Sci-fi Movie.) Neo a target wakes up and realizes not only is he being watched without knowing why, but that the world is a lie, that has been created to pull the truth over people’s eyes.

Source: Gangstalkingworld
Share this:

38 Comments »

At this stage it’s assumed that the target’s friends or family are contacted via mail or some other method, given the notification, and then they probably have some kind of confidentially agreement that they have to adhere to. Remember the news stories about the people given gag orders. One guy almost had a breakdown cause he could not tell his girlfriend about something and was forced to lie.

Now do these letters come with the one handed sign language? I don’t have that info at this stage, but at some point, just like snitches in East Germany they are taught the one handed sign language. Then they become part of this system.

They use this secret code the same way any cult does, or secret society does and for those on the outside they are harassed, or the informants choose not to work with those who are not a part of the system. I also suspect, but at this stage can not prove that this is probably what triggers much of the bullying in schools, and the mobbing in the workplace. Targeting those not taking part in this system.

After spending over 10 years mobbed, and Gang Stalked, I can truly say that this is the most evil thing that I have ever seen.

I also believe that this is the beginning of the end time structure. Right now what happens to targets is their lives are systemically destroyed. People don’t want to work with them etc. The end time structure is not just a mark of a person, it’s also a system were you can not buy, trade, sell without it. This system conditions people to comply, and to harass those who are not complying with this system.

Thousands of people are being eliminated from communities, usually the outspoken, and others, those not falling in line. Can you imagine how many innocent people are in jails, institutions, homeless, committed suicide, or killed people do to this? Will there ever be an apology? Will they review the files of those in mental wards who claimed that they were being followed around?

People want the elites to take responsibility for their actions, but what about taking responsibility for their actions? No it’s far easier to say that an authority figure made me do it and that’s it.

I can’t right the wrongs of the past, but I would ask that those in the know, do something, ask for a review of this system, because it is not right. What is happening is just so wrong, and how it’s being used is just evil.

Comment by gangstalking | April 29, 2010 | Reply

Maybe not a gag order, but a none disclosure agreement.

http://www.gangstalkingworld.com/Structure.html

[quote]None disclosure agreement or a confidential disclosure agreements will be signed by many in these programs to ensure that the information is protected.[/quote]

There is probably a copy of one of these letters somewhere, so if anyone has a link, feel free to post.

Under Occupation Health and Safety.

Comment by gangstalking | April 29, 2010 | Reply

I was wondering if you know of any non profits that offer help support employment education training to conter the ill effects etc…. that being a TI causes for them for help if not would you be interested in starting one. Being a TI I have come to realize how important it is to provide for my family in the ineditable death I will experience in protecting the available resource to them in the event the end up like me and hindered from gainful employment. But I also would like to include monies to go to to help others that have been subjected to this any suggestions would be greatly appreciated I have found your site to be most insightful and helpful I wish more where spending the time and enrgy towards help and solution than the problems

Comment by Brigitte August | May 20, 2010 | Reply

This is a GENUINE stalking and surveillance experience.

I’d like to say something about my experience with gang stalking.
i’ve been surveilled for 3 years now.
initially, it was a covert situation, I had no idea any of this took place,
the reason was simple – I was targeted and flagged as a pedophile.
My condition was not simple at the time, I was bored and unemployed + I had a record at the mental health institute for anxiety and depression, I took prescription pills in order to reduce anxiety and stress, even though they are full of crap and I simply found out I had nothing but pressure and mood swings from being a little bit lonely and unoccupied.
we moved residence to another street, my mom adviced me I would take a daily walk in order to relieve stress at the park which was located next to a kindergarten, I took my guitar and went there.
When I got there I wasn’t tailed yet, I was just an ordinary person trying to live his life and get out of the bum, I sat on a bench, and played my guitar for about 15 minutes, when a parent came up to pick her child, she stared at me – and then told her daughter – “look how nice he plays the guitar honey!” – she looked closer, and she thought I was eccentric, I admit, I was going through rough times.. the last thing I wanted is to get involved in a conversation with anyone, so I smiled at her, and went back to playing my guitar.
and so I spent two months going there, when occasionaly parents would show up and start a conversation with me, such as: “Hello!” – “hello..” – “Nice guitar, what style do you play?” etc..
“are you from around?” – “do you have a job?”
showing a lot of interest in me and my behavior, sounds fishy, aint it?
occasionaly the kindergartner would watch my step, luckily for them and unfortunately for me they had a security-guard located right outside of the facility, one day he started a conversation with me, and we became “friends” ( again, this wasn’t a choice, I felt lonely and I needed someone to talk to, if I had other friends, I would probably choose them, don’t you think? )
anyhow, this guy kept trying to convince me into doing some indecent stuff, which by law is strictly prohibited, but then again, it was a strategy, an attempt to expose my transgression.
during my trip to ukraine, I had a terrible experience with people there for no reason, *All people* with no exception.
people started staring at me, it wasn’t casual as you may think, as if something was taking place without my awareness which has everything to do with me.
I flew back to israel ( homeland ) and immediately became angry and stressed out, I took a walk to the park in order to tell my new “friend” what I went through, well, I forgot what he said..
anyhow moving on.. that guy was a scum, one of the times I approached some woman with a baby stroller, you should have seen the facial expression he made, it was like he wanted to murder me,
I approached him, and he was holding a plastic knuckle duster, I asked him “what’s that?”
he said “that? oh that’s nothing..” and tossed it at the floor..
( he made a fist , and his face showed a lot of anger towards me, he probably forgot he’s undercover for a few moments there )
a few days later, some parent drove by to pick up her kid, she seemed familiar, maybe she was one of the teachers I had in elemntary school ( I’m 21 ) so I asked her if she was,
I was amazed by the rudeness of her comment :
“you probably looked me up at the phonebook” with a smile smeared on her face.
this was it, now I know why all this stuff happened to me..
I became suspicious that day, became more aware of whats going on, I went back to my residence and observed outside the window, as soon as I approached the window, I was amazed to see the security guy hiding behind a tree, “patrolling” in the area, its wasnt usual, I called him up, observed him across the street and yelled at him from the window “you wont get away with this, I promise you, there’s nothing more wrong and injustified than doing what you did”
conclusion: you can’t trust no one.

they made so much efforts in an attempt to expose me, even though there was nothing to expose,
moving further, that same day an overt surveillance took place , surrounding me, juveniles riding the bicycle and staring at me, people driving by and making random stops as I walk by, a complete act of whats called “street theater” took place, pedestrians with bags in their hand – at first I thought this can’t be happening, and why did they have bags in their hands, I have no idea even now , but as the surveillance progressed, over the years, they have assimilated themselves with accordance to my environment, having pedestrians as informants, families, women\men, elders, children, teenagers, women with baby strollers walking and bumping into me, vehicles surrounding me, not in a straight forward approach, but by patrolling around my vehicle, making stops, having commercial vehicles with black windshields just across my residence, using semi-trailers, placing garbage objects at the back of the vehicles trunk, using one rear-highbeam ( brake lights ) on while the other one is turned off ( that is almost constantly – when I asked a couple of people owning these types of vehicle why is there only one tail-light on, they said “it must be broken” from that point on, I knew that I cannot consider trusting anyone, not even my parents. – could this be real? scary as it may be , but this is the truth.
this act was on the news, as I turned on my tv by mistake and watched the news broadcast, as soon as I flipped to the news channel the broadcaster
immediately changed subject and dropped a sarcastic remark about a situation which by “coincidence” ( yet again another coincidence.. ) sounded like mine.
it is me against the world, but I can’t fight this situation alone, god is by my side beezrat hashem.

any advice\information will be more than welcomed
elior

Comment by tomer | July 24, 2010 | Reply

instred in people with direct contact with people involved with v2k government mind controls coconsperters look up phone # of the people living at 6**5 17 av north st. petersburg florida 33710

Comment by foffv2k | September 3, 2010 | Reply

[…] https://gangstalking.wordpress.com/faq/ […]

Pingback by nsrvc | November 29, 2011 | Reply

Okay. The gig is up.

http://bestgeekeverpr.blogspot.com/2011/01/diary-of-truancy-inspector.html

http://bestgeekeverpr.blogspot.com/2011/02/diary-of-truancy-inspector-2.html

But for real, most people would tell you this is crazy. Wouldn’t some of the people who are used to target other people aver find themselves target and snitch back on the whole deal? Like, how can you ever tell if people are just combing their heir because they want to and when they are combing their hair because of some espionage sign language type deal? Are drug dealers and users really the type to form part of a conspiracy to cut in line ahead of you in Burger King until you finally kill yourself over it?

This are the questions most “sane” people would ask, while combing their hair and opening a briefcase and not holding the elevator for you.

Comment by Batzarro | August 7, 2012 | Reply

Remember such systems are not uncommon, East Germany and other societies are based on them, and no people don’t say anything, but they do go along with it. The people do what they are told, and very few ever question it.

If you watch this video, and then become cognizant that innocent, but naive people are being told to do similar things, drop a pill in this persons drink, cut in front of them, etc, then you will finally get it.

Comment by gangstalking | August 26, 2012 | Reply

back when i was a pirate i was being gangstalked by a group of squirrels. They stole my acorn car!! They were driving me NUTS!!!

Comment by j.h. | August 7, 2012 | Reply

j.h. and you are the reasons they put warnings on those labels. get a life. this is serious. if you want to act like you are ten years old, go somewhere else.

Comment by Ernie | August 9, 2012 | Reply

Cool, and the moment I figure out which J.H. you mean, I think likely John Hughes? Then my life is complete, and I can finally go and get a life, off I go, thanks, now my world makes sense.

Comment by gangstalking | August 26, 2012 | Reply

your a ten year old.

Comment by J.H. | November 4, 2012 | Reply

i am 42

Comment by ernie | November 6, 2012

If anyone has any information about someone being blacklisted or blackballed because of the illuminati, freemasons or dragon secret societies, let me know. thank you

Comment by Ernie | August 9, 2012 | Reply

What there are, are these Threat Assessment Files, and people can request these files be opened on other individuals, when you get into management positions, or world ruler positions, local councils you can have these types of files opened. The Jane Clift case is earmark for what we are dealing with.

Comment by gangstalking | August 26, 2012 | Reply

I am being blacklisted and im a wrong target.i need help to stop this. please contact me

Comment by anon | January 14, 2013 | Reply

*Ties shoes, rubs nose, and makes a joke about your wife*
…what’s gang stalking?

Comment by AW | August 13, 2012 | Reply

I seriously worry for your mental health.

Comment by a.gangstalker | September 24, 2012 | Reply

Worrying about a strangers mental health, it’s nice that you managed to find the time. Happy Indigo Ribbon Month.

Comment by gangstalking | November 3, 2012 | Reply

I was a victim of a cult. gang stalking even with some law enforcement is very real. and with big brother, spy drones witnessed even above our cities, there is no question where this is going. it needs to be stopped I hope. Only Ron Paul wanted to do anything about it. I cannot vote since he is not a candidate.

Comment by Ernie | November 3, 2012 | Reply

could you please be more vague?

Comment by J.H. | November 6, 2012 | Reply

I was a victim of a cults gang stalking. It’s very real within law enforcement. With the government using spy drones over our cities there is no question where this (problem) is going. It needs to stop and i hope it does. Ron Paul was the only politician willing to do anything about it. I can vote but not for Ron Paul as he is not a candidate at present.

Comment by J.H. | November 6, 2012 | Reply

You are right on J.H.!

Comment by Ernie Mink | January 8, 2013 | Reply

i can no longer directly access your FAQ page(which is the most relevant) by typing in the URL

Comment by justanotherday777 | February 28, 2013 | Reply

FAQ

FAQ
What is Gang Stalking?

A Simple Definition

Under Occupational Health and Safety laws, individuals are being flagged and placed on community notification lists. This is happening without the targets knowledge. In many countries these community notifications are being used by companies and others to target innocent individuals such as whistle-blowers, the outspoken, etc. In conjunction with these notifications, companies and others are in some cases using a practice that was used in the former soviet union called the psychiatric reprisal. This is used as a means of retaliation, blacklisting, silencing, or controlling members of society. Once on the notification system, warnings about the targets are sent out to every individual the target comes in contact with, thus poisoning their associations, and socially annexing the targeted individual.

Full Definition

Gang Stalking is a systemic form of control, which seeks to destroy every aspect of a Targeted Individuals life. Once a target is flagged a notification is sent out to the community at large, and the target is followed around 24/7 by the various communities that they are in.

The community notifications will go out to various places. Apartment rentals, future employers, stores and communities where the target visits, will be notified. Doctors offices, fire departments, police, etc. A covert investigation might also be opened, and electronic, means used by the civilian spies/snitches as part of the overt and covert monitoring and surveillance process.

Individuals can be flagged designating them as having a history of aggressive or inappropriate behavior. This notification system will follow the target if they move, change jobs, visit other areas. It let’s the community believe that the target is a person who needs to be watched or monitored.

Community health and safety

http://www.wcb.pe.ca/photos/original/wcb_wpviolence.pdf

“In the service sector this may require identifying to employees persons who have a history of aggressive or inappropriate behavior in the store, bar, mall or taxi.

The identity of the person and the nature of the risk must be given to staff likely to come into contact with that person. While workers have the right to know the risks, it is important to remember that this information cannot be indiscriminately distributed.

A woman named Jane Clift in the U.K. went through a very similar type of flagging system. A warning marker was placed against her name designating her as potentially violent.

Violent Persons Registry

http://gangstalkingworld.com/Media/2007/09/2009/10/defamation-and-anti-social-behaviour/

She sensed that, everywhere she went, there was “whispering, collaboration, people scurrying about”. “Everywhere I went – hospitals, GPs, libraries – anywhere at all, even if I phoned the fire service, as soon as my name went on to that system, it flagged up ‘violent person marker, only to be seen in twos, medium risk’.”

http://gangstalkingworld.com/Media/2009/10/defamation-and-anti-social-behaviour/

http://www.24dash.com/news/Local_Government/2009-06-24-Good-citizen-wins-12-000-damages-from-council-who-labelled-her-potentially-violent

Jane Clift was targeted this way and spent four year clearing her name.

Individuals are being flagged without their knowledge. In many countries these community notifications might fall under community safety and health laws. It seems that employers, educational facilities, and community centers are in some cases flagging innocent individuals as a means of retaliation, silencing, or controlling members of society.

Retaliation

http://www.harassment101.com/Article5.html

Maria Buffa, a former salaried employee in the personnel department at Ford World Headquarters in Dearborn, Michigan, said she, too, was sent to a psychiatrist after she filed a sexual harassment complaint in February 1999 against a woman co-worker. “You think, maybe I am the problem, else why would they be sending me to a psychiatrist,” she said. The psychiatrist Ford selected, Dr. Edward Dorsey of Midwest Health Center, made a report that said the only psychiatric symptom Buffa displayed was anxiety. Dorsey’s report said that the referral came from Ford’s medical department and was at least in part due to her complaints of sexual harassment. He also noted that the Ford doctor who referred Buffa cited a couple of “incidents”: She was seen yelling at someone, and she had shown up at a fitness center “wearing less than the usual amount of clothing for that physical activity.”

In April 1999, Buffa’s boss fired her “for the good of the company,” she recalled being told.

Psychiatric Reprisal

The individual is then placed under overt and covert forms of surveillance. Everywhere the Targeted Individual goes, their name is flagged. In a big city this could mean that thousands upon thousands of people are getting a notification about the target. The person is followed around 24/7. Foot patrols and vehicle patrols are used to follow the Individual around, as part of the monitoring process. During these patrols a one handed sign language is used to assist the citizen informants with communicating to each other. They will use this to silently communicate to any business the target enters, or other areas.

http://gangstalkingworld.com/Media/2010/02/informant-signals

Gang Stalking is experienced by the Targeted Individual as psychological attack, that is capable of immobilizing and destroying them over time. The covert methods used to harass, persecute, and falsely defame the targets often leave no evidence to incriminate the civilian spies.

It’s similar to workplace mobbing, but takes place outside in the community. It called Gang Stalking, because groups of organized community members stalk and monitor the targets 24/7.

Many Targeted Individuals are flagged, harassed and placed under surveillance in this way for months or even years before they realize that they are being targeted by an organized protocol of harassment.

What happens during this monitoring and surveillance is very similar to what happened to many innocent individuals in the former East Germany or Activists and Dissidents in Russia. Many innocent people in the former East Germany would be targeted by the state, and then their friends, family, and the community at large would be used to monitor, prosecute, and harass them. The same persecutions and harassment’s are now happening in democratic countries.

Once a person is flagged or has a warning marker placed on their file, the community becomes hypervigilant, and within this structure there is a targeted and illegal protocol of harassment that happens. Electronic means are used to monitor, harass and torture the target. When the target tries to describe what is happening to them, it sounds as if they have had a mental breakdown. The reality is electronic means are being used to make it appear as if the target has had a breakdown.

Electronic Harassment

http://www.targetedindividuals.com/Forum/showthread.php?tid=153

This System is the “MOSQUITO” that is used in the UK to break up groups of unruly people. Creates A Protective Shield Of High Pressure Complex Ultrasonic Shock Waves.

The Mosquito device is being considered for banning by the European Union, cause it infringes on the human rights of children.

Produces a power field of ultrasonic shock wave energy. The frequency range is adjustable from 7kHz to 25kHz, with the PCC30 putting out 140db of sound (135db for the PPF40) measured at 30cm. Intended for mounting to vehicles for potential crowd control applications. Also excellent for keeping out pests from gardens, etc. Hearing protection recommended when in use.

Many of these devices are easy to access, and almost impossible for an unaware target to describe in a credible manner, without sounding as if they have had a mental breakdown.

Unauthorized intruders are exposed to a feeling of intense paranoia, discomfort, disorientation, nausea and other undesirable effects. Government research is currently investigating the weapons potential and may soon classify these devices!

http://www.amazing1.com/ultra.htm

In Russia similar means were used by the state to declare activist, dissidents or anyone they thought to be an enemy of the state as mentally unfit and many were institutionalized using this form of systemic control.

The closest thing to Gang Stalking that democratic countries have seen before this is McCarthyism, Cointelpro, and RED SQUAD programs. Red Squad programs were used for monitoring, and harassment of various groups. They have been in place for over a hundred years, and they also employed Informants.

Civilian Spies, who can also be termed “Covert Human Intelligence Sources” come from every level and sector of society. Remember anyone the Targeted Individual comes into contact with gets a warning about the target.

Just like with Cointelpro investigations, everyone in the targets life is contacted, advised as to why the individual has been flagged, advised not to discuss the notification and asked to be a part of the ongoing, never ending monitoring (systemic psychological harassment and manipulation of the target) process. This process is covertly designed to control the targets, keep them in line, or destroy the target over time, leaving them with no form of support.

These actions are specifically designed to mimic a psychological operation. This psychological harassment of the target is designed to destroy them over years, making them look crazy and leave them with no form of support. The individuals around the target carry out actions and tasks as they are instructed, without realizing that the structure is psychologically designed to break the target down.

Worldwide programs of control and conformity have been used with equal success and lethality. What we are seeing now is a co-ordinated and organized effort of control and conformity. Many countries around the world are currently using a model of policing called: Community Oriented Policing. It’s described as a systemic approach to policing. It focuses on instilling a sense of community within a geographically located neighborhood. Communities come together and discuss what values they would like to have in their community, community development, and it’s also a time to discuss any problems that might be happening in a specific area. If a problem is identified an investigation might be opened. These local programs in many countries have been forming partnerships with other government run programs at, provincial, state and federal levels. A process called Deconfliction allows them to share information. Reports of Gang Stalking are not only coming in from democratic countries, but they are coming in from many other countries as well.

http://news.cnet.com/8301-13578_3-20000550-38.html

http://www.eff.org/files/filenode/social_network/20100303__crim_socialnetworking.pdf

The modern day systemic form of control could only be funded at governmental levels, just like it has in other societies where these similar types of harassment programs have been implemented. It’s all part of a system of control and conformity that has been in place for many years. A system of control with many local groups and appendages taking part. Many targets report that their information is passed and shared between country boarders, and that the surveillance continues even when they travel.

What are the goals of Gang Stalking?

The official goal is listed as a notification for the community, to alert them of individuals who have been flagged, or have had a warning marker placed on their file. It’s officially used as a means of investigating or monitoring individuals who have displayed inappropriate, or violent behaviours. The real goal in some cases however seems to be to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalization, or forced suicide. Other goals of this harassment is to destroy the targets reputation and credibility. Make the target look crazy or unstable.

Other goals involve sensitizing the target to everyday stimuli’s as a form of control, which is used to control targets when they get out of line. Once the target is sensitized, the Citizen Informants have an easier time identifying the Targeted Individual in public. The targets sensitivity is most likely added to their file as a warning marker and sign to watch for future reactions to.

The structure of this type of notification makes the targets vulnerable. Once a community goes into monitoring mode, they unofficially work towards driving the target from the community. This can be done by making the target destitute. Secondary goals include making the target homeless, jobless, giving them a breakdown, and the primary goals seems to be to drive the target to forced suicide. This is the same thing that was done to targets of the Stasi and Cointelpro investigations. It’s a useful way of eliminating perceived enemies of the state.

What are other Names for Gang Stalking?

There are many names for this form of systemic control and harassment. Under the Gang Stalking label you will also find such terms as Community Mobbing, Community Stalking, Stalking by Proxy, Organized Stalking, Cause Stalking, Multi-Stalking, but it’s all part of the same community notification harassment protocol. What many people do not realize is that Gang Stalking is just one appendage of this systemic form of control. There are other forms of control used to repress, and keep individuals in line. Other forms or appendages include, but are not limited to: Mobbing, Cointelpro, The Buzzsaw, Covert War, Electronic Harassment, etc. These are the just some of the names being given to a very old game, that is once again being played by governments on their unsuspecting citizens.

How are targets chosen?

Officially targets can be flagged and investigated for suspected, or reported behaviours. Unofficially the Targets can be chosen because of many other reasons. They can be chosen for political views. They can be chosen for whistle-blowing. They can be chosen because they belong to a dissident movement. They can be chosen because they asserted their rights at work, or filed a complaint. They can be chosen because they made the wrong enemy. Were considered to be too outspoken, unwittingly investigated something that the state did not want investigated, signed a petition, wrote a letter. They were deemed as suspicious by a civilian spy/snitch and their names were handed over.

It’s becoming apparent that targets might be chosen for this systemic form of control, if they are not already in some way a part of this controlled system. Eg. Many Targeted Individuals seem to be unaware of this community notification, flagging and monitoring system. Some targets also seem to be unaware that large chunks of our society are now being used as Citizen Informants.

Who gets targeted?

Targeting can happen to anyone in society. In the past primary targets of programs such as Cointelpro have been minorities. Targeting however can happen to anyone. Individuals are often targeted for being outspoken, whistle blowers, dissidents, people who go up against wealthy corporations, woman’s groups, (single) women, minorities, extremists, conspiracy theorists, anti-war proponents, individuals identified or targeted as problems at these community meetings, and other innocent individuals. The majority of the targets are often not aware that they are being targeted in this way. When a target moves, changes jobs, the harassment still continues, because they are still flagged, and a notification is still going out to everyone they come in contact with. Every time the target moves, the same information, lies, and slander will be spread out into the new community and the systemic monitoring and harassment will continue. Traits of those targeted

http://gangstalkingworld.com/Forum/YaBB.pl?num=1205738832/0

Who takes part?

People from all walks of life are a part of this system, because once a target is flagged, their information is distributed to a wide range of people, organizations, and communities. People from all races, ages, genders. Every sector of society that you can think of is a part of this. Civilian Spies/Snitches include, but are not limited to: General laborers, the wealthy, bikers, drug dealers, drug users, street people, punks, hip hop culture, KKK, black activists, church groups, youth groups, Fire Fighters, police officers, lawyers, health care workers, store keepers, maids, janitors, cable installers, phone repair persons, mail carriers, locksmiths, electricians, etc. There really is no minimum or maximum age range. An article came out recently in the UK, saying they were recruiting children as young as eight years old to be Covert Human Intelligence Sources.

http://www.telegraph.co.uk/news/uknews/2689996/Children-aged-eight-enlisted-as-c%20ouncil-snoopers.html

Public individuals that the Targeted Individual comes in contact with are given this warning. These community notifications started with good intentions. Workers and the community at large do have a right to be notified if they are going to encounter persons who have violent, inappropriate histories. Citizens want to be able to protect themselves and their communities, however what is happening is that this program is also being used to falsely target innocent people.

Many do not understand or care that the end consequence of this flagging, this harassment protocol is to destroy a person. Many people in today’s society are scared, they are willing to give up personal freedoms, for a false sense of security, and if that means taking away the rights of another individual to accomplish this, they have no problem doing this.

Why people participate in Gang Stalking?

There are many reasons that someone takes part in this.

1. Some do it for the sense of power that it gives them. They feel in control. Many wholeheartedly believe that this let’s them know who is bad and who they need to protect themselves and their communities from.

2. Others do this as a way to make friends and keep friends. It’s something social and fun for them to do. They love that special feeling of monitoring and protecting their community. Many in society use the one handed sign language to communicate and it’s very effective in breaking down race, gender, age, social barriers. Many believe that it also let’s them know who is on their side, vs who could be the potential target.

3. Others are forced or blackmailed by the State or the police into taking part. I have seen a few people pressured into taking part.

4. They are told that they are part of homeland or national security. They are told that they are being used to help keep and eye on dangerous or emotionally disturbed individuals. They see themselves as heroic spies for the state.

5. Others are just local thugs or Informants who are already being used for other activities, and their energies are just diverted over into these community health and safety programs. Eg. Some may be given the choice of monitoring a Targeted Individual for the community or the police vs going to jail.

6. Others are told outright lies and slander about the target to get them to go along with ruining the targets life. Eg. Many caring families are told that the individuals has displayed mental health issues, or other socially unacceptable behaviours and might be a danger to themselves or the community at large, and that the notification is necessary for keeping the community safe. They are asked not to disclose this.

7. Many are however just average citizens who in the course of going about their day to day jobs, are being used to keep an eye out, and if a flagged target does come into their vicinity, they are asked to watch, monitor and observe the target. It’s the way the society is.

What are some techniques used against targets?

A few of the most common techniques are listed below.

a) Classical conditioning.

Getting a Targeted Individual sensitized to an everyday stimuli. The targeted individual over a period of months, or even years is negatively sensitized to an everyday stimuli, which is then used to harass them. It’s used out in public to let them know they are constantly being harassed and monitored. Some examples of everyday stimulus that might be used include: sounds, colors, patterns, actions. Eg. Red, white, yellow, strips, pens clicking, key jangling, loud coughing, loud whistling, loud smacking of clapping of hands together, cell phones, laptops, etc.

b) 24/7 Surveillance This will involve flagging and following the target everywhere they go. Learning about the target. Where they shop, work, play, who their friends and family are. Getting close to the target, moving into the community or apartment where they live, across the street. Monitoring the targets phone, house, and computer activity. Surveillance Policy.

http://www.newport.gov.uk/stellent/groups/public/documents/policies_and_procedures/n_039963.pdf

c) Isolation of said target.

This is done via reports. The flagging is meant to warn the community, but they act as little more than slander campaigns. They present a one sided assessment of the targets behavior and activity. The target is never allowed to tell their side of the story or to clear their name. This one sided assessment can include false reports, lies, and legitimate incidents where the target was set up. Eg. People in the targets community are told that the target is crazy, dangerous, a thief, into drugs, a prostitute, pedophile, in trouble for something, needs to be watched. This very flagging in and of itself is capable of creating paranoia, and false interpretation of everyday incidents.

Files will even be produced on the target.

It’s been shown that community notifications of any kind can and do create a sense of paranoia within a community.

Community Notification

http://www.johnhoward.ab.ca/pub/pdf/C20.pdf

Some people might argue that they would feel more secure if they were aware of the identities of dangerous offenders in their neighborhoods, but widespread community notification actually serves to heighten fear of victimization. In a large metropolitan area, hundreds of thousands of people are notified of a dangerous offender’s release, while only hundreds will come into contact with him in the community. This blanket notification propagates the belief that there are more “predators” in the community than ever before, and fearful attitudes among members of the public are reinforced. A vicious cycle results: widespread notification leads to an increase in the community’s fear of crime which, in turn, leads to more calls for notification. We would also argue that the use of inflammatory language such as “predator” by politicians and officials also works to heighten fear and increase calls for more punitive action.

d) Noise and mimicking campaigns.

Disrupting the targets life, sleep with loud power tools, construction, stereos, doors slamming, etc. Talking in public about private things in the targets life. Mimicking actions of the target. Basically letting the target know that they are in the targets life. Daily interferences, nothing that would be too overt to the untrained eye, but psychologically degrading and damaging to the target over time.

e) Everyday life breaks and street theatre.

Flat tires, sleep deprivation, drugging food, putting dirt on targets property. Mass strangers doing things in public to annoy targets. These strangers might get text messaged to be at a specific time and place, and perform a specific action.

f) Electronic Harassment.

Electronic means can be used to create the illusion that the target is having a mental breakdown, when in fact they are being targeted and harassed by a community that is trying to get them to move, because they believe that the person is a danger, or an undesirable. This flagging system allows the community to treat the target as less than, someone they are allowed to harass, and victimize. It gives them a license to do unspeakable things to innocent targets, and their families.

Hightech Harassment

This is not just another revenge book. This is the ultimate revenge book-high tech recipes for madness concocted by the author in collaboration with the experts. Scott French interviewed engineers, bank tellers, phone operators, computer technicians, radio and TV managers, and asked them point black, “How would you get even with somebody?” What he came up with is a collection of electronics, chemicals, and common sense designed to push anybody over the edge. Discover how to induce insanity with lasers, shockers, breakers, and blowers; clear beaches with “silent sound”; zap computer disks from a distance, bypas computer passwords, blast boomboxes and bother banks. In short learn to harass the forces of science and technology and excercise your God-given right to get even with anybody, anytime.

These actions might seem harmless to these Citizen Informants, but in reality the actions could be causing great psychological trauma for the target. Eg. Blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit a response from targets. Etc. It’s like the death of a thousand paper cuts. One or two minor incidents will not cause any harm to the target, but over time the target is slowly worn down.

http://www.telegraph.co.uk/news/uknews/4612951/Man-jailed-for-whistling-Addams-Family-theme-tune-at-neighbours.html

Where does the support or funding for this come from?

Though the systemic harassment that Targeted Individuals refer to as Gang Stalking is immoral and unethical in nature, programs such as this in democratic countries, and none democratic countries have always been funded by the Government. They are the only ones with enough money, coordination, and power to keep such a system in place. These Co-ordinated efforts then join hands with others for this systemic form of control and harassment.

Ruling the community

http://www.albionmonitor.com/9711b/policing.html

“Ruling the community with an iron fist. “Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants and federal agencies could form alliances without causing public outcry.” Covert Action Quarterly, summer 1997.”

ACLU Blog

http://www.gangstalkingworld.com/blog.aclu.org/2009/04/30/mass-con-fusion/#more-5320

“You mean to tell me that it is legal for corporations from the private sector to team up with local law enforcement officials in efforts to spy on innocent members of our society? You also mean to tell me that the synthesis of law enforcement authority and the drive of for-profit companies operate under little to no guidelines or restrictions and it is unclear to whom they are responsible to?”

What can you do to help?

1. If you know someone who is being targeted in this way please don’t go along with it. Don’t assume that the person is guilty or a bad person. Many innocent people are currently being targeted, and people are being told lies. This form of harassment is systemic and it’s about state control and conformity. The express goal of this harassment is to destroy the individual over time.

2. If you are aware of someone being harassed in this way, subtly direct them to websites that deal with Gang Stalking, or sites for Targeted Individuals. Knowledge is power.

3. You can subtly suggest that your local newspapers or community papers print articles about Targeted Individuals or even an write an objective piece about Gang Stalking.

4. If you are a law maker, you can petition for changing the laws. Ensure targets who are flagged in this way have proper notification letting them know that they are flagged. Convicted criminals have this right, why not targets? Many of whom are innocent members of the public.
Petition for better oversight of these programs. As it stands Communities are getting away with serious human rights abuses, and complaints are not being heard. Authority figures such as the police in many cases are not taking the reports seriously due to the type of warning markers attached to a targets file.

5. If you are a lawyer our community needs lawyers who are skilled in helping targets access Freedom Of Information files. Lawyers who can help targets get their files reviewed, or corrected. Lawyers who can work with the existing privacy laws to limit who and where the targets information is disseminated to. We need human rights lawyers who can address the complaints of abuses that are happening to people listed or flagged in this manner. Illegal surveillance, illegal access of mail and electronic communications, and torture via electronic monitoring.

6. Mental health professionals can recognize that there is illegal harassment happening to individuals who are flagged, listed or have warning markers placed against their names. Community notifications can and do create paranoia within communities. This notification makes targets prime for harassment, and community mobbing.
They can objectively investigate the complaints, and become familiar with the Electronic means of monitoring and harassment that are being used. Laws are just starting to catch up to the technology. Eg. Europe is considering a ban on the mosquito device, because it infringes on the human rights of children.

7. You can subtly offer your support to someone who is being unfairly treated, in very small little ways.

8. You can bring up the subject of Gang Stalking or Targeted Individuals.

How do participants communicate?

Communication happens in a number of ways. When on the street or in cars patrolling, they use a one handed sign language. Citizen Informants also seem to get ques via cellphone and some via earphones.

http://gangstalkingworld.com/Media/2010/02/informant-signals/

Their one handed sign language include things like tapping the side of the nose, corner of the eye, brushing back the hair 3 times, the infamous double blink, etc.

Here is a list of signals that the former East German Secret Police the Stasi used. These signals below are not gang stalking signals, they were used in the former East Germany. http://www.nthposition.com/stasiland.php

SIGNALS FOR OBSERVATION

1. Watch out! Subject is coming – touch nose with hand or handkerchief

2. Subject is moving on, going further, or overtaking – stroke hair with hand, or raise hat briefly

3. Subject standing still – lay one hand against back, or on stomach

4. Observing Agent wishes to terminate observation because cover threatened – bend and retie shoelaces

5. Subject returning – both hands against back, or on stomach

6. Observing Agent wishes to speak with Team Leader or other Observing Agents – take out briefcase or equivalent and examine contents.

Books:

1. GmB Bailey, “Bridging The Gap.”

2. Gloria Naylor. “1996″

3. Kristina Borjesson “Into the Buzzsaw”

4. Jim Redden “Snitch Culture”

5. Noa Davenport “Mobbing: Emotional Abuse in the American WorkPlace”

6. Ward Churchill, Jim Vander Wall “Cointelpro Papers”

7. Anna Funder “Stasiland”

8. Protectors of Privilege: Red Squads and Police Repression in Urban America

9. Victor Santoro “GASLIGHTING How To Drive Your Enemies Crazy “

10. Anthony Brina “Suburban Spies”

11. Stephen Knight “The Brotherhood”

12. Alex Constantine “The Covert War Against Rock”

13. Frank Donner “The Age of surveillance”

14. Niki F. Raapana “2020″

15. Dr. Andrew M. Lobaczewski. Political Ponerology: The science on the Nature of Evil.

16. Community Oriented Policing. A Systemic approach.

Movies:

1. The lives of others. http://www.imdb.com/title/tt0405094/ (A movie about covert investigations in the former East Germany)

2. The Matrix. (Sci-fi Movie.) Neo a target wakes up and realizes not only is he being watched without knowing why, but that the world is a lie, that has been created to pull the truth over people’s eyes.

Comment by gangstalking | April 8, 2013 | Reply

[…] More info at https://gangstalking.wordpress.com/faq/ […]

Pingback by justanotherday777 | February 28, 2013 | Reply

I used to think I was TI, before I started to read about synchronicities, parapsychology, and other stuff which indicated the existence of extremely sophisticated mind control throughout history that the controlled persons would not even ordinarily notice.

I also think a lot of you people put a bit too much faith in your five senses. Hallucinations can be as convincing as it gets. A lot of your experiences could be explained by hallucinations, paranoia, and synchronicity. The rest could be explained by sophisticated mind control. I don’t believe anyone is really “involved”. I think people are being manipulated like puppets to give the illusion of involvement or human conspiracy.

Does that sound far-fetched to you? I can quarantee you it’s not as far fetched as thinking hundreds of ordinary people are consciously involved in a purposeless conspiracy against another ordinary person, including his parents and friends. And that there are thousands of such cases all over the world, and have been at least since the 19th century. That’s what would be far-fetched. Your own theory is so far-fetched that people will believe in God and other nonsense but they won’t believe what you believe.

That’s partly why your crusade is futile as long as you keep employing the tactics you do. No one will believe your story, because it’s unbelievable AND about things they are familiar with. If you want to make something unbelievable seem believable, you have to talk about things that are outside everyday reality. People know everyday reality. They know your everyday interpretation is nonsense because you are trying to talk about something they know from personal experience and that something is completely unambiguous to them.

People are being mind controlled and they haven’t got a clue what you are talking about because they’re all victims, you’re just the person who is supposed to notice something is a bit off about all this.

I don’t think the entity that does this controlling is super interested in what you believe so much as it may be toying with you or testing you, so you might want to try reading my blog post at my blog and acquiring a competing viewpoint. See which one makes more sense, your or mine. (My handle links to my blog.)

Comment by mctps | March 2, 2013 | Reply

I like your post it’s bright and intellegent, what’s so conspiracy ridden about an out of control informant system, corrupt cops, local monitoring units that have no standards what so ever, and threat assessment teams that do enable such monitoring? The research is there, you are bright enough to figure it out. Would you call the Jane Clift case a conspiracy, being followed, her details shared, and having to move, cause every place she went her details were coming up, medium risk, only to be seen in pairs?

Comment by gangstalking | April 8, 2013 | Reply

After reading your detailed and lengthy side of the issue, let me pose some comments. You do not need to respond. I already have the answers to these questions. These are for your benefit and others: Look around you, and I mean look REALLY hard, past the media hype, the government lies, and you will see the FACTS of what these criminals do, and what they are capable of. They follow the conspiracy of evil, and they don’t even hide it most of the time. It is never ridiculous to believe in God being the creator and our Savior, whom is love and truth. It is more ludicrous to believe we all came from monkeys and amoeba since they all exist apart from us as humans to begin with. That alone disproves evolution easily. My other comment is have you ever been inside or involved in a secret society or cult? You either have and side with them, which is where the misinformation can come in to posts like this you write, or you simply have no idea about any of it, and thus need to really see what is going on here. These people are much more than victims. They are human beings with lives and feelings who have been severely used, harassed and had their minds and lives practically altered and destroyed. And this is why the deprogramming techniques and tons of Christian faith and love are the only things that will ever truly free them I can tell you that as a matter of fact. Psychology has caused a lot of problems, which is why many kill themselves on those pharma drugs!!! So please do not come in here and act like you know what you are talking about, because believe me, you clearly do not. Your words were not only insensitive, but unwarranted and uneducated. And you have not been through half of what these people have, or you would not have written this post. The facts are these people have been victims of cult stalking and mind control harassment, some even murdered, so please be more careful what you say. In fact I think it is best you just do not post here anymore, because you will not be respected at all. We are here to help, not to make ignorant and insensitive judgments. There is PLENTY of evidence besides the people themselves supporting all of this does happen to them. I personally think the moderator should not allow these comments at all because they do not serve the purpose here, and they have no bearing on what is going on here with all of the people involved and the victims they hurt and harass.

Comment by Ernie | April 8, 2013 | Reply

Dear site creator:

Hello, I am a targeted individual. I am harassed everywhere I go. I have lost all of my friends because of being gangstalked. They labeled me as some sort of sexual predator. Even my own family is in on it and believes the lies. You don’t know how devastating that is. Can you please contact me at the e-mail address provided. I have no one to turn to…

Thank you.

Comment by Steven | August 12, 2013 | Reply

Please read the articles on informants, lawsuits, Freedom of information, and Threat Assessment Team files. Lawsuits for conspiracy and indictment, might not have been the worst situation.

Comment by gangstalking | August 13, 2013 | Reply

Almost 4 years. just shoot me u cowards. i curse ur bloodline to paranoia n misery. fuck ur life!

Comment by kevin smith | November 28, 2013 | Reply

Steven, What you are saying is not uncommon, and I want you to know you are not alone. Sexual character assassination and defamation of character is what they do more than you realize. They take away your dignity and make it almost impossible to have any kind of normal life. Believe me, I know exactly what you are talking about.

Comment by erniemink | December 11, 2013 | Reply

Thank you, these situations are interesting, if that makes sense.

Comment by gangstalking | December 11, 2013 | Reply

I would say interesting is not the world, for that makes it sound positive. The subject is far from positive. The more this gets exposed the more it will be harder to bring it all out. The people involved are well aware of those that want to bring expose to them, trust me on that.

Comment by erniemink | December 11, 2013 | Reply

How can on gather evidence if he/she is gangstalked and if people are spreading rumours and slandering the person. I think I am being gangstalked by an mnc bank and theres are some people who are spreading lies about me.

Comment by A D | March 1, 2014 | Reply

Fill out a reporting form, that is what a lot of people are doing, then following it up. Spiritual Based Reporting Forms, just open them up remotely. To begin, just say outloud, HelP Me Yes, Help Me Yes, I want to file a report.

Comment by gangstalking | March 13, 2014 | Reply

[…] website, “Gang Stalking World,” describes people’s “adventures with gang stalking,” with the bloggers adding, “I really […]

Pingback by MK ULTRA PROJECT /// VİDEO : ‘Gang-Stalking’ And Electronic Mind Control Community Spreads Online | Stratejik İstihbarat | May 21, 2014 | Reply
__________________________________________________________________________

PREDATORY GANGSTALKING from http://www.whale.to/c/predatory_gangstalking.html

“Predatory Gangstalking is a criminal phenomenon referring to a group of loosely affiliated people who, in an organized and systematic manner, relentlessly invade all areas of an individual’s life on a continuing basis, as part of their lifestyle. While each individual gangstalker does his or her small part, what defines Predatory Gangstalking is the collective intent to do harm.” R.B.Ross c 2005

Tactics of Predatory Gangstalking include highly coordinated surveillance (hidden cameras, conversation bugging in private aswell as public), harassment, and psychological, psychosocial, financial, and sometimes physical assaults on an individual by a large group of people who are often strangers to the targeted individual.

A Predatory Gangstalking group is a well-run organization comprised of
members who are unidentified as gangstalkers to the outside world. Until a group of gangstalkers turn their face towards someone selected to be one of their targets, members of society do not realize there is such an invisible group. The practitioners of predatory gangstalking are people who, for the most part, go about their business of daily life appearing like everyone else, except for their activities involved with Predatory Gangstalking. Predatory gangstalking activities take priority over everything else in the lives of Predatory Gangstalkers. Predatory gangstalking is actually a lifestyle for those who participate in it.

Predatory Gangstalking is also called “terror stalking”, “gangstalking”, “flash mobbing”, “cause stalking,” “hate stalking,” “multi-stalking, “happy slapping,” “workplace bullying, and “covert war.”

. “Flash mobbing” is an event occurring when a targeted individual is spotted in society. Their photo and location is immediately and simultaneously sent out by cell phone text messages and Internet email to all gangstalkers within a certain radius. All gangstalkers then suddenly descend upon the target as a mob.

. “Cause stalking” refers to gangstalking by single-issue radicals.
They stalk a targeted person related to that specific agenda. “Cause stalking” has been reported to have been carried out by radical Christians who believe in “dominion theology.”

Dominion Theology is a religious interpretation of the Bible which these
groups believe requires them to “take dominion over the earth” which they believe is the precursor to the return of Jesus to earth. “Cause stalkers” in general believe that they are bringing about social change through gangstalking activities. “Cause stalking” can be carried out by White Supremacist as a form of “Hate Stalking (Scientology groups are another eg.).” This type of predatory gangstalking is primarily for the purpose of intimidation and often is a precursor to or an adjunct to violence.

. “Happy slapping” refers to group harassment of one youth by other youths carried live over cell phones equipped to handle video to peers youths. The young gangstalkers slap around the targeted youth while laughing at him or her while several other youths broadcast the incident live to as many peers as possible.

. “Ritual Gangstalking” is reportedly performed by cults and secret organizations such as Satanists, secret orders of free masons, some voodoo /obeah practitioners and Scientologists as a means of control or for punishment. “Ritual abuse” is incorporated into “ritual gangstalking” patterns in this case.

N.B. Obeah is considered one of the darkest forms of black magic known. Blood sacrifice is always used and the intent is to harm, even to death, another person.

. “Workplace bullying” involves gangstalking activities tailored to the workplace
which are carried out by a group of employees against another individual employee.

* “Cybergangstalking” is a situation where an individual is identified to be a target through Internet participation and their personal identity is determined. Cybergangstalkers pierce the electronic veil and are able to enter into the real life of a person, creating all forms of harassment, theft, psychological operations including slander and libel, and able to commit crimes against the targeted individual.

* “Vigilante Stalking, Terror Stalking” is the same as Predatory
Stalking.

For the purpose of this informational writing, all activities will be referred to as “predatory gangstalking” because the tactics and characteristics of the gangstalking are the same. And often a targeted person will become the victim of more than one type of gangstalking.

“Predatory Gangstalking” is a criminal phenomenon referring to a group of loosely affiliated people who, in an organized and systematic manner, relentlessly invade an individual’s life on a continuous basis, to an extreme degree, as part of their lifestyle. While each individual gangstalker does his or her small part, what defines Predatory Gangstalking is the collective intent to do harm.” R.B. Ross

Predatory Gangstalking is reported by historians to have been originally developed by social scientists and psychologists in communist and fascist’s countries as a means of control of individuals within those societies. The tactics and techniques of Predatory Gangstalking were developed through animal and then human experimentation. The methodology of Predatory Gangstalking is precise and well-orchestrated. It is reported that the technical mechanics for Predatory Gangstalking werefirst sold on the Black Market by the ruling party leaders of East Germany when the USSR political systems crumbled. These protocols were subsequently exported to other countries and implemented there against unsuspecting citizens. Predatory
Gangstalking has been reportedly against citizens worldwide. Thus far, it has continued unchecked. One of the reasons for the unchallenged proliferation of this form of organized crime is that it characteristically takes place in such a way that it is invisible to the untrained eye. It is understandably, therefore, considered to be the ‘perfect crime’, as it remains unchallenged and extremely difficult to prove.

The countries with the greatest number of reports are the US, Canada, Germany, and England. In the US, the states with the greatest number of reported predatory gangstalkings are California, Texas, and New York. The predominant proportion of individuals targeted by gangstalkers are non-Caucasians. It is difficult to find other predominant similar characteristics in targets. The reasons that an individual is selected for targeting are unknown. It can only be speculated to include reasons such as easy accessibility to the target, random selection for training for new Predatory Gangstalkers, minority group member relative to hate-based groups, making an example of someone, revenge, retaliation, and social control.

Who are the practitioners of Predatory Gangstalking? They include career criminals, participants in the drug trade, extreme ideologists such as radical Christians, members of hate groups such as White Supremacists, members of motorcycle and street gangs, and homeless people. They are also often people with a background in the military, including disabled Vets. Higher levels in the Predatory Gangstalking organizations include people in military and law enforcement or with same experience, secret service/defence employees, government officials, Banking firms, and so on. It has been reported that top level government security and intelligence agencies use gangstalking tactics in covert operations. What is most baffling about Predatory Gangstalking is that many of the practitioners of this social pathology appear to be regular mainstream people with no prior criminal record, predominantly in the socio-economic middle class. It is presumed they participate for the money or rewards they receive in the form of barter or for a social-conscience feelgood factor.

The world of Predatory Gangstalking increases as new recruits are initiated into the Predatory Gangstalking process. Therefore, a target may see collusion and participation from neighbors and co- workers who were once on good terms with the target. The circle of predatory gangstalkers widens with time. However, most of the time, the gangstalkers are complete strangers to the target. In most of the encounters the target has with gangstalkers, the target does not recognize the perpetrators but the gangstalkers readily recognize the target. Further, these predatory strangers possess detailed knowledge about the targeted individual. Most often, Predatory Gangstalking is being engaged in by parties unknown, for reasons unknown, to the target. People have died after a lifetime of protracted Predatory Gangstalking without having any explanations as to who was doing this or why this happened to them.

Sometimes, the leaders in these large affiliated groups of gangstalkers have specialized military expertise in the areas of military intelligence, military electronics and equipment, and in military strategic and tactical training. Those without formal military training have often engaged in paramilitary activities or have technical skills commonly found in successful career criminals. Others who join a Predatory Gangstalking group without such a background are given on-the-job training, in addition to other gangstalking skills. It can be said with certainty that there are specific protocols and tactics and most gangstalkers appear to be proficient in a similar set of skills.

Predatory Gangstalkers each have their own individual skill that they contribute towards their common goal in the group. One person in a group knows how to pick locks; another knows how to hack into computers, while someone else provides the GPS and electronic equipment. Many Predatory Gangstalking members know how to tamper with a vehicle. Some predatory gangstalkers are practiced “look outs” while others are group leaders. Predatory gangstalking groups have their rank and file as in any other organization. Orders come from the top, just as in any other organization. However, it is unknown whether the top of the organizations are local, regional, national, or international.

Predatory Gangstalkers use state-of-the-art technology coupled with law-enforcement- style surveillance tactics. Typically, the individual gangstalkers are strangers to the target. (“Happy slapping” and “workplace bullying” are the most common exceptions) Participants in predatory gangstalking are well-trained. The tactics and techniques they use are similar all around the world in the numerous countries where this has been reported. Each group of predatory gangstalkers is a covert army unto themselves. They have incorporated specialized techniques originally used by spies during the cold war. They carry out their field work with military style precision. Then, they go about their daily lives, just like any other member of society, in most cases. Their gangstalking skills are highly sophisticated, and their commitment to Predatory Gangstalking exceeds zealousness. It appears to both an observer and a target that nothing required of them in terms of time or availability is too much trouble for them. As stated previously, but worth
repeating, predatory gangstalking activities take priority in the lives of those who practice Predatory Gangstalking. Predatory Gangstalkers are a functioning subculture of society that move invisibly through society as such. This is by design, making it even more dangerous to society.

The goals of Predatory Gangstalking of an individual are numerous. Predatory
Gangstalking is intended to deprive someone of their freedoms and rights. It destroys a person’s privacy and control of their own environments. It is intended to create distress, disrupt all relationships, deplete person’s resources, destroy one’s physical and mental health, and inflict great overall long term suffering. They interfere with a target’s sleep thereby producing chronic sleep deprivation, as a strategic tactic. They employ a variety of interactions with the targeted individual which are likely to produce accidents and various forms of illness. One of the main weapons they use for their own protection and to enable their success in gangstalking is to manipulate the target’s life in such a way as to cause them to lose their credibility with others. This is usually the first objective reached. After that, gangstalking the target involves only minor risk. Notably, people who become involved generally stop caring about the abuse by either turning a blind eye or actively joining in. While others, though concerned for the target, become too frightened to speak out or come to believe the propoganda that the target is mentally ill and needs ‘this‘ help.

Predatory Gangstalking also involves provoking “accidents” and consequences of harm to the target. Predatory Gangstalkers will surrounding a target’s moving vehicle and attempting to force them off of the road when they are stressed and exhausted.

Worse, these tactics will be employed after tampering with a targeted individual’s vehicle. Predatory Gangstalking is very serious business. Predatory Gangstalking is, at the least, psychological violence, and at most, it is a protracted sadistic sociopathic domination and calculated destruction of an innocent human being for reasons of pleasure, power, and social control by a group predatory stranger.

It is rightfully assumed that money is involved in Predatory Gangstalking
because of the amount of resources required to execute such extensive efforts. The gangstalkers develop capabilities directly proportionate to the amount money that funds them. In following the money trail speculatively, one looks to the possibility that drug money is involved. Some people reason that the government may be involved because of the amount of resources that are available to the practitioners of Predatory Gangstalking. Other individual situations seem to indicate that corporations, insurance companies, and even wealthy individuals with revenge motives fund a Predatory Gangstalking.

In addition to cash payment for participation in Predatory Gangstalking, other forms of barter are used. These include drugs, *, alcohol, reciprocal favors, release from debts, jobs, contracts,”deals” for legal problems, and other forms of compensation. Some gangstalkers are given free housing in exchange for performing Predatory Gangstalking activities against a nearby target. However, it is clear from observing Predatory Gangstalkers in action that many engage in it for pleasure. One high ranking leader in Predatory Gangstalking stated that it was like an addiction. He described how the build up and culmination of a gangstalking assault was intoxicating, but that there was a let-down feeling afterwards that compelled him to do it again, and the cycle continued.

It is also true that some people participate in Predatory Gangstalking because they are deceived into participating. Friends, neighbors and associates of a selected target are given false information and finally come to believe the targeted individual has committed a heinous crime for which they deserve what is portrayed them to be rehabilitative social intervention. Sometimes people reluctantly participate in indirect ways, such as making their homes available at times for part of the operation, for fear of consequences if they did not. Others involved in Predatory Gangstalking, including the homeless, do so for money or drugs. Disabled Vets are known to participate in Predatory Gangstalking activities for alleged government or defense contractor’s projects. Predatory Gangstalkers have successfully elicited the participation of neighbors by appealing to their sense of service to the community or government, often representing themselves as affiliates
of the government or law enforcement. Lastly, those who are in the underworld or secret organizations practice Predatory Gangstalking as part of their membership duties.

The craft and practice of Predatory Gangstalking appears to be standardized around the world. Many similarities parallel incidents reported by targets internationally. It appears that there is a standard protocol involving a series of tactics, progressive phases, and nature of assaults. It appears that an individual has been selected to become a target and the groundwork has been established for their assaults long before the individual can be aware that something criminal is occurring in their lives and to their person. Predatory Gangstalkers achieve this strategically. By the time the targeted individual becomes aware that something very threatening and disturbing is happening to them, they have already been thoroughly investigated by their enemies, stigmatized, discredited, and compromised. All wells have been already poisoned, so to speak, and all avenues of help and escape have been blocked.

Predatory Gangstalkers first establish “information dominance” over a targeted individual. This achievement alone enables them to attain excessive power over the targeted individual. It is believed that this is accomplished by means of eavesdropping devices in the target’s environment, global positioning technology (GPS) secreted on their vehicles, obtaining illegal access to all of a targeted individual’s personal records such banks accounts, emails, medical records, and credit card purchases. They are often able to achieve 100% surveillance of a targeted individual and almost 100% access to a targeted individual’s entire lifetime of available information from any computer, paper, photographic, or personal source. They use all of the information obtained to ambush and sabotage a targeted individual. Predatory Gangstalkers ultimately become capable of entering a target’s house, place of employment, and vehicle at-will and often. All forms of communications in the targeted individual’s life is interfered with by the gangstalkers. They will intercept email, tamper with voicemail, and obstruct the delivery of postal mail. The net result is that all communication in a targeted individual’s life
will become unreliable and incomplete, both incoming and outgoing. The Predatory Gangstalkers are then capable of greater insidious manipulation and control.

Predatory Gangstalkers constantly update information about a target. Updates are promptly shared with all of the participants in that predatory gangstalking group. They take frequent photographs of the targeted individual, and maintain photos of the target’s house, vehicle, place of employment, family, friends, and even the target’s pets. They promptly disseminate this information through email and cell phones to other gangstalkers. This is the means by which a targeted individual is continually recognized by Predatory Gangstalkers everywhere they go. The Predatory Gangstalkers sadistically prefer to maintain a file of photos taken at points in time when the victimization reaches peaks, such as when a target is reaping consequences brought about by the gangstalkers, such as upon a targeted individual’s firing, eviction, or when the person emotionally breaks down, or when they appear disheveled from insomnia or is fearful.

Psychological profiling is yet another tactic performed on a targeted individual for the purpose of finding weaknesses. They exploit all information obtained, including fears, triggers, value-conflicts, skeletons in the closet, areas of shame, addictions, vices, and all things they hold dear. They often successfully “interview” a target under various guises. They use the information obtained to maximize the Predatory Gangstalkers’ ability to destroy the targeted individual.

Practitioners of Predatory Gangstalking have their own coded language, both
verbal and visual. Each targeted individual is referred to by an assigned code word. Hand signals are an important tool of their universal protocol. Some hand signals resemble the mannerisms used in baseball and other sports. Other signals are those found in law enforcement and the military. They use hand signals to identify the area of a target’s body designated to be the target of a pending physical attack. This is often the eyes and the heart. They also use hand signals to coordinate the unauthorized entry into a target’s home or vehicle. They also use hand signals during roving vehicle caravans and while on foot, for the purpose of coordinating attacks and pointing out the location of a target. Vehicle alarm panic buttons and horns are other commonly used tools of communication and coordination. In residential areas, outside lights have an established set of messages. They also use “dead drops” like spies have done historically to secretly pass along information to one another. Public bathrooms are commonly utilized as locations for the transfer of information and equipment. Mobile pick-up and delivery systems are in place for this purpose as well. They have a set of questions and responses to confirm the identity of a predatory gangstalker to another which are also coded. In the USA they refer to money by the last names of the president whose face is on the bill. Someone may say “I have references. (translation: money). I know 5 of the Franklin’s.” Their coded language is universal to them.

Predatory Gangstalkers will begin an intense and extensive discrediting campaign against a selected target well before the target could even suspect he or she has an enemy. This critical tactic sets the stage for neighbors and associates to become alienated from the target. One of the Predatory Gangstalkers’ goals is to eliminate all forms of support and assistance for the target. Towards this objective, the police are given anonymous “concerned citizen” tips designed to lead the police to believe the target is mentally unstable or a problem in the community in advance of any actual direct gangstalking of the targeted individual. This sets the stage for having the targeted individual prejudged so they will be disbelieved and dismissed when the gangstalking begins and they seek help. The discrediting campaign includes accusing the target of being an “undesirable” for any number of reasons, including fabricated reports of having committed crimes that are the most repulsive to members of society. Practitioners of Predatory Gangstalking even go so far as to represent themselves as undercover law enforcement or government agents. It has been reported that they will even show false documents for substantiation, but they will never leave them behind.

Financial devastation is another goal of Predatory Gangstalking. Towards this goal, they make attempts to destroy one’s gainful employment, pose as offering services to intervene in the problem to further take your money, and will steal funds and personal property on an on-going basis. Repeated unauthorized entries into a target’s residence, vehicles, computer, and workplace are hallmark tactics of this crime and is nearly impossible to stop. Predatory Gangstalkers can pick locks, bypass security alarms, and enter any location posing as utility crews, law enforcement, or delivery men. Practitioners of Predatory Gangstalking will apply for and obtain legitimate jobs in a target’s home or business in order to have access to the target and their life, relationships, and assets just to do harm.

Predatory Gangstalking employs a tactic of syncronicity. This tactic involves the precise timing of interactions with the targeted individual. For example, the target can go out to get the morning newspaper and encounter gangstalking activities that suddenly appear and which are precisely synchronized. Throughout the targeted individual’s day, these synchronized encounters repeatedly occur. Activities such as leaving one’s driveway,
taking out the trash, going to a store, or even walking the dog, are activities which result in an encounter with one or more Predatory Gangstalkers. Even when a target strategically does not follow any set routine, these synchronized occurrences continue.

This makes the gangstalkers appear to be all- knowing and almost omnipresent in the mind of a new targeted individual. This is intimidating, demoralizing, and even terrorizing to targets. It is often unavoidable.

In the case of primary targeted individuals of gangstalking (the rare individuals who are the priority target of global gangstalking) the primary objective is to induce as much fear as possible and over time as the numbers of individuals that become involved or are made aware of a target, the abuse can increase substantially, so that there is no aspect of the targets life that is private or sacred. Rarely, if ever, does a targeted individual engage in an activity of daily living without the unwanted participation of Predatory Gangstalkers. The timing and coordination of these activities are remarkably precise. The targeted individual becomes aware that all of their activities include the presence of Predatory Gangstalkers. These gangstalkers demand to be noticed by their target, and if they are not, they will take an action to be noticed. This could include honking their horn strategically, making a comment, creating a scenario to get the attention of the targeted individual. Once noticed, they will return to non-contact, knowing that by that point, the targeted individual will henceforth anxiously watch for them.

Most times, however, these practitioners of gangstalking maintain the appearance of “business as usual.” They rarely make direct contact, with some exception. However, these strangers often boldly smirk and openly laugh at the targeted individual at some close point in the encounter. This is the universal exception to the “no direct contact” protocol. Other times, when verbal or physical contact is made, these encounters are conducted in such a way as to appear to have been “happenstance.”

Since most of the practitioners of Predatory Gangstalking rotate in and out of the life of a target, the same patterns of gangstalking will occur, but it will involve different people all the time. Therefore, many different stranger and many different vehicles will walk, drive, or bike past the target and interact in some manner, at various times and locations. All of the predatory gangstalkers will be strangers to the targeted individual and they
will continue to make their presence, but not their purpose, known. This is one element of Predatory Gangstalking that is disbelieved by others. These “others” include law enforcement, the medical profession, and family. Those who are unaware of activities of subcultures such as criminals, secret organizations, clubs, extremist groups, radical political groups, hate groups, organized crime groups, and other antisocial groups, the scope of attack by Predatory Gangstalkers is unfathomable. Never the less, the extent of this massive assault on one individual is as extensive as described here and even more so.

Let it be said that we really do live in amazing times. The world itself has seen much change and turmoil even in the last century, and with the increase of technology, the desire in those who choose to live out of balance with life and try to live in dominance and control of the masses have opted for this horrendous path of ‘stolen power’. This may sound quite vague, and it is, only because the other face of ganstalking or rather the precise reason for its use deals with a more incredible phenomena than hasn’t been touched up yet. In the first instance, we mustn’t be so naïve as to assume that our governments and all those that have been granted the power and authority to run our world are acting from a selfless perspective. They simply are not. The secrets of the universe, God and true power have always been the Holy Grail of man, and the desperate desire to achieve and own them by some.

To this effect the studies and research that has been conducted since time immemorial have been immense, with the one of the holiest of holiest being the understanding of the human mind, soul and will and how these can be controlled and used far more readily than man has been able to achieve so far. And it is for these reasons that extensive and more covert experimentation has been undertaken on people targeted for this work. These people are the targetted individuals of gangstalking.

Our minds are complex structures, our memories (long and short term), our thought processes, our fears and so on. If it is true that we do indeed manifest what we think as countless experts have us believe and that spiritually we are indeed one soul fragmented but unequivocally connected in a unified field, then it stands to reason that if one or a few souls and minds can be controlled then this will lead to the occupation of ALL. This of course sounds like insane rantings but assuredly this is the reality humanity faces today. There is a dark agenda to control all minds by controlling the energetic fields of existence, our physical bodies, dna, etheric fields, mental and emotional fields and so on.

Next, imagine for a moment if a ‘Lucifer’ were also created from one of the targeted individuals, more than just the social pariah they started as, what if society is lead to believe that they are actually a satanic entity or individual. In doing so, a common enemy is created with which to blame all eventual chaos upon. This is another portion of the agenda.

It is in the end the stuff of nightmares and what has been called dark prophecy or conspiracy theory is actually ancient agenda in it’s final stages of being played out.

On a personal level, participating in any form of gangstalking is not only insane but utterly immoral, and spiritually and ciminally corrupt. If you care, choose never to participate, inform the target (carefully/secretly), make a united stand with friends and neighbours not participate and log all the evidence you can – takedown all information you can. Be smart, technology and the capability of those that have orchestrated these world terrors are immense.

But most of all remember that the ‘fear matrix’ within the collective consciousness of humanity is an overall target. If people are afraid they can be controlled. Stand firm in a belief of your divinity and eternal being (whether you believe in a God or not) you are still part Omnipotent Grace experiencing on earth.

Peace be with us all.

This Post Has 0 Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Back To Top