Social Understandings

Tuesday, June 07, 2016

60-llw-Py-Michael Brown, Fergurson, Mo., Wake Forest University, Winston-Salem, NC, CRB Library;The EPA’s Silent, Guilty Role in the Flint Water Crisis


5/31/16

The following DVD on You Tube summerizes all of blogs and who Gwydolyn Gwyn and son who pulled weapon on me are-they were started in the projects through making deals with white male authority; where they try and intimidate a person to join their gang or white male authority will put in jail=illegal;\


Gang Stalking - Targeted Individuals - Psychological Harassment




Definitions

Aldous Huxley on propaganda or brainwashing:There will be, in the next generation or so, a pharmacological method of making people love their servitude, and producing dictatorship without tears, so to speak, producing a kind of painless concentration camp for entire societies, so that people will in fact have their liberties taken away from them, but will rather enjoy it, because they will be distracted from any desire to rebel by propaganda or brainwashing, or brainwashing enhanced by pharmacological methods. And this seems to be the final revolution.

RELATED READ:
·       Gang Stalking Redefined

Agent Provocateur is a person assigned to provoke unrest, violence, debate or argument by or within a group while acting as a member of the group but covertly representing the interests of another. In general, agents provacateur seek to secretly disrupt a group’s activities from within the group. Agents provocatuer are employed to disrupt or discredit a group by performing acts for which the group will be falsely accused, by leading the group into activities that they would not otherwise pursue or by creating discord between group members. Provacateurs may encourage illegal acts, recomend belligerant tactics a group might otherwise reject, spread false rumors intended to provoke hasty action by a group, spread malicious rumors within a group about a group member or employ other tactics intended to provoke improper action by a group or to divert a group from its chosen purpose. An agent provocateur might attempt to implicate as an accomplice an innocent target who the agent unwittingly involves in a crime or criminal conspiracy (sourcewatch.org).

BATFU.S. Bureau of Alcohol, Tobacco, and Firearms

Black Listing A list of individuals or organizations designated for special discrimination or boycott; also to put a person or organization on such a list. Blacklists have been used for centuries as a means to identify and discriminate against undesirable individuals or organizations. A blacklist might consist, for example, of a list of names developed by a company that refuses to hire individuals who have been identified as union organizers; a country that seeks to boycott trade with other countries for political reasons; a Labor Union that identifies firms with which it will not work; or a government that wishes to specify who will not be allowed entry into the country (legal-dictionary.thefreedictionary.com).

Bullying is generally seen as aggressive intentional behavior to control someone physically, mentally, or emotionally. Not all bullying is aggressive sometimes it’s punitive. Bullying occurs in every city, community and school. Bullying has no barriers it affects all races and gender (Bullying Information).

C-SPAN – cable channel dedicated to broadcasting both houses of Congress and other U.S. governmental functions.

CALEA - A 1994 law (“Communications Assistance to Law Enforcement Act”) to force a massive reworking of the U.S. telephone infra- structure so that the government can intrinsically wiretap it. Also called the FBI Digital Telephony Act. It is a domestic extension of ECHELON.

Cause stalking is an alternate term for what some multi stalking targets call “organized stalking” or “gang stalking.”. It is specialized groups of people who think they are supporting some cause, but are more interested in harassing targets designated by their leaders. Lies told by the leaders add fuel to the fire (raven1).

CISPES – Committee in Solidarity with the People of El Salvador

COINTELPRO or Counter Intelligence Program was a series of covert, and often illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrating, discrediting, and disrupting domestic political organizations. COINTELPRO tactics included discrediting targets through psychological warfare, planting false reports in the media, smearing through forged letters, harassment, wrongful imprisonment, extralegal violence and assassination. Covert operations under COINTELPRO took place between 1956 and 1971, however the FBI has used covert operations against domestic political groups since its inception. The FBI’s stated motivation at the time was “protecting national security, preventing violence, and maintaining the existing social and political order” (Wikipedia).

Coercive Persuasion or Thought Reform is best understood as a coordinated system of graduated coercive influence and behavior controls designed to deceptively and surreptitiously manipulate and influence individuals, usually in a group setting, in order for the originators of the program to profit in some way, normally financially or politically. Using rewards and punishments, efforts are made to establish considerable control over a person’s social environment, time, and sources of social support. Social isolation is promoted (Organized Stalking by Groups – FAQ).

Conspiracy a secret agreement between two or more people to perform an unlawful act (The Economist: A Powerful Elite IS Secretly Running Things…but You’re Still Crazy).

Councils (llluminati) - The Illuminati has frequent meetings. Some of these meetings are organized to appear “acephalous” and “accidental” in their meetings, when in reality they are structured and planned. One group, MJ-12 has gone by the following names: the Group, the Special Study Group, the Wise Men, the Operations Coordinating Board (OCB), 5412 Committee, 303 Committee, 40 Committee, PI-40 Committee, and Policy Planning Group (PCG). Some of the formal policy and ritual groups have names that all Illuminati members who have gotten high enough to learn, will recognize: The Council of 3, Council of 5, Council of 7, Council of 9, The Grand Druid Council, The Committee of 300, and the Committee of 500 (known as Fortune 500). Many of the meetings are conclaves without formal names. The Grand Druid Council is not something fictional, but an actual body of people who formally meet and whose membership, we have been trying to keep track of. The groups which make decisions to control this planet are networked together. Each decision has its own origin and route that it takes. (The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave)

Crime Against Humanity means murder, extermination, enslavement, deportation, imprisonment, torture, sexual violence, persecution or any other inhumane act or omission that is committed against any civilian population or any identifiable group and that, at the time and in the place of its commission, constitutes a crime against humanity according to customary international law or conventional international law or by virtue of its being criminal according to the general principles of law recognized by the community of nations, whether or not it constitutes a contravention of the law in force at the time and in the place of its commission. “genocide” means an act or omission committed with intent to destroy, in whole or in part, an identifiable group of persons, as such, that, at the time and in the place of its commission, constitutes genocide according to customary international law or conventional international law or by virtue of its being criminal according to the general principles of law recognized by the community of nations, whether or not it constitutes a contravention of the law in force at the time and in the place of its commission (Crimes Against Humanity and War Crimes Act).

Criminal Harassment The crime of stalking is defined legally as criminal harassment. The following section of the Criminal Code of Canada pertains to criminal harassment: Section 264. (1) No person shall, without lawful authority and knowing that another person is harassed or recklessly as to whether the other person is harassed, engage in conduct referred to in subsection (2) that causes that other person reasonably, in all the circumstances, to fear for their safety or the safety of anyone known to them. Prohibited conduct: (2) The conduct mentioned in subsection (1) consists of (a) repeatedly following from place to place the other person or anyone known to them; (b) repeatedly communicating with, either directly or indirectly, the other person or anyone known to them; (c) besetting or watching the dwelling-house, or place where the other person, or anyone known to them, resides, works, carries on business or happens to be; or (d) engaging in threatening conduct directed at the other person or any member of their family (The Criminal Code of Canada and Sexual Harassment).

Crowd manipulation is the intentional use of techniques based on the principles of crowd psychology to engage, control, or influence the desires of a crowd in order to direct its behavior toward a specific action. This practice is common to politics and business and can facilitate the approval or disapproval or indifference to a person, policy, or product. The ethical use of crowd manipulation is debatable and depends on such factors as the intention of and the means used by the manipulator, as well as the ends achieved. Crowd manipulation differs from propaganda although they may reinforce one another to produce a desired result. If propaganda is “the consistent, enduring effort to create or shape events to influence the relations of the public to an enterprise, idea or group”, crowd manipulation is the relatively brief call to action once the seeds of propaganda (i.e. more specifically “pre-propaganda”) are sown and the public is organized into a crowd. Crowd manipulation also differs from crowd control, which serves a security function. Local authorities use crowd-control methods to contain and defuse crowds and to prevent and respond to unruly and unlawful acts such as rioting and looting (Wikipedia).

Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass. The definition of ”harassment” must meet the criterion that a reasonable person, in possession of the same information, would regard it as sufficient to cause another reasonable person distress (Wiki: Cyberstalking).

DEA – U.S. Drug Enforcement Administration DIA – U.S. Pentagon Defense Intelligence Agency DIA – U.S. Drug Interdiction Agency (older)

Decoy(ing) is usually a person, device or event meant as a distraction, to conceal what an individual or a group might be looking for. Decoys have been used for centuries most notably in game hunting, but also in wartime and in the committing or resolving of crimes (Wikipedia).

DICTIONARY – Keyword searching with exclusion logic software.

Direct Energy Weapon (DEW) emits energy in an aimed direction without the means of a projectile. It transfers energy to a target for a desired effect. Intended effects may be non-lethal or lethal. Some such weapons are real, or are under active research and development (Wikipedia: Directed-energy weapon).

Dielectric heating, also known as electronic heating, RF heating, high-frequency heating and diathermy, is the process in which a high-frequency alternating electric field, or radio wave or microwave electromagnetic radiation heats a dielectric material. At higher frequencies, this heating is caused by molecular dipole rotation within the dielectric. At lower frequencies in conductive fluids, other mechanisms such as ion-drag are more important in generating thermal energy. RF dielectric heating at intermediate frequencies, due to its greater penetration over microwave heating, shows greater promise than microwave systems as a method of very rapidly heating and uniformly preparing certain food items, and also killing parasites and pests in certain harvested crops (Wikipedia).

Disability as a condition which limits a person’s ability to function in major life activities – including communication, walking, and self-care (such as feeding and dressing oneself) – and which is likely to continue indefinitely, resulting in the need for supportive services (What is the Legal Definition of a Disability?).

Dehumanization is to make somebody less human by taking away his or her individuality, the creative and interesting aspects of his or her personality, or his or her compassion and sensitivity towards others.[citation needed] Dehumanization may be directed by an organization (such as a state) or may be the composite of individual sentiments and actions, as with some types of de facto racism. State-organized dehumanization has been directed against perceived racial or ethnic groups, nationalities (or “foreigners” in general), religious groups, genders, minorities of various sexual orientations (e.g., homosexuals), disabled people as a class, economic (e.g., the homeless) and social classes, and many other groups (Wikipedia).

Disinformation is false or inaccurate information that is spread deliberately with intentions of turning genuine information useless. For this reason, it is synonymous with and sometimes called black propaganda. It is an act of deception and false statements to convince someone of untruth. Disinformation should not be confused with misinformation, information that is unintentionally false. Unlike traditional propaganda techniques designed to engage emotional support, disinformation is designed to manipulate the audience at the rational level by either discrediting conflicting information or supporting false conclusions (Wikipedia).

ECHELON is NSA’s world-wide surveillance network and associated software.

Electronic Harassment is a term referring to the use of electronic devices to harass, torture, and/or physically harm a person, not to be confused with cyberstalking. In Michigan, Public act 257 of 2003 makes it a felony for a person to “manufacture, deliver, possess, transport, place, use, or release” a “harmful electronic or electromagnetic device” for “an unlawful purpose”; also made into a felony is the act of causing “an individual to falsely believe that the individual has been exposed to a harmful electronic or electromagnetic device.” In Maine, Public law 264, H.P. 868 – L.D. 1271 criminalizes the knowing, intentional, and/or reckless use of an electronic weapon on another person, defining an electronic weapon as a portable device or weapon emitting an electrical current, impulse, beam, or wave with disabling effects on a human being (Publicsignal).

Electromagnetic radiation can be classified into ionizing radiation and non-ionizing radiation, based on whether it is capable of ionizing atoms and breaking chemical bonds. Ultraviolet and higher frequencies, such as X-rays or gamma rays are ionizing. These pose their own special hazards: see radiation and radiation poisoning. Non-ionizing radiation, discussed here, is associated with two major potential hazards: electrical and biological. Additionally, induced electric current caused by radiation can generate sparks and create a fire or explosive hazard (Wikipedia: Electromagnetic radiation and health).

Electromagnetic shielding is the process of reducing the electromagnetic field in a space by blocking the field with barriers made of conductive and/or magnetic materials. Shielding is typically applied (1) to enclosures to isolate electrical devices from the ‘outside world’ and (2) to cables to isolate wires from the environment through which the cable runs. Electromagnetic shielding that blocks radio frequency electromagnetic radiation is also known as RF shielding. The shielding can reduce the coupling of radio waves, electromagnetic fields and electrostatic fields, though not static or low-frequency magnetic fields[citation needed] (a conductive enclosure used to block electrostatic fields is also known as a Faraday cage). The amount of reduction depends very much upon the material used, its thickness, the size of the shielded volume and the frequency of the fields of interest and the size, shape and orientation of apertures in a shield to an incident electromagnetic field (Wikipedia).

Electrosensitivity Electromagnetic hypersensitivity, called also electro sensitivity or electro hypersensitivity is a disorder in which a person presents symptoms of a sickness caused or aggravated by magnetic fields or waves. These symptoms are recognized by the WHO and by numerous scientific studies (ref. Bioinitiative Report). Here is the WHO’S definition: “For some time, numerous individuals complained of diverse health problems attributed to exposure to electromagnetic fields. While certain individuals report mild symptoms and are able to avoid these fields, others are so gravely affected that it becomes necessary to stop working and to modify their lifestyle totally. This sensitivity is presumed to be from electromagnetic fields and is generally called electromagnetic sensitivity (EMS)” (aseq-ehaq.ca).

FBIU.S. Federal Bureau of Investigation

Flash mob A flash mob (or flashmob) is a term coined in 2003 to denote a group of people who assemble suddenly in a public place, perform an unusual and sometimes seemingly pointless act for a brief time, then disperse, often for the purposes of entertainment and/or satire. Flash mobs are organized via telecommunications, social media, or viral emails. The term is generally not applied to events and performances organized for the purposes of politics (such as protests), commercial advertisement, publicity stunts, that involve public relation firms, or paid professionals (Wikipedia).

GAK - Government Access [to cryptographic] Keys. Any cryptography product with GAK has been compromised so the government can read it.

Harassment covers a wide range of offensive behaviour. It is commonly understood as behaviour intended to disturb or upset. In the legal sense, it is behaviour which is found threatening or disturbing. Sexual harassment refers to persistent and unwanted sexual advances, typically in the workplace, where the consequences of refusing are potentially very disadvantageous to the victim. In 1984, the Canadian Human Rights Act prohibited sexual harassment in workplaces under federal jurisdiction (Wikipedia).

Hate Crime The Criminal Code of Canada says a hate crime is committed to intimidate, harm or terrify not only a person, but an entire group of people to which the victim belongs. The victims are targeted for who they are, not because of anything they have done. Hate crimes involve intimidation, harassment, physical force or threat of physical force against a person, a family or a property. Sections 318 and 319 of the Criminal Code of Canada address hate crimes. (What is a hate crime?).

Human rights concerns the private rights and power of people. This typically has broad meaning, covering all human rights protected under the law outside of the criminal law context. Civil rights primarily gravitates around issues such as discrimination, accommodation, suffrage (voting), and to a lesser extent, property rights. Human rights are primarily protected under the federal and provincial Human Rights Acts in private context, and under the Canadian Charter of Rights and Freedoms where the state is a party to the matter. Controversial human rights issues in Canada have included patient rights, freedom of speech, freedom of religion, parents’ rights, children’s rights, abortion rights vs rights of the unborn, minority rights, majority rights, rights of the disabled, aboriginal rights, tenant rights and economic, social and political rights (Human rights in Canada).

Gagged Person (GP) is whispered lies and slander, by a Perp, about a TI. If the GP believes the lies, they become infuriated at the TI — and are recruited into piling on, and targeting (perping) them. GPs are threatened, either subtly or aggressively — when they are gagged by the Perp, even though they usually have no legal authority to do so. After this the GP will not advise the TI — of either the slander they have been told, or the identity of the cowardly Perp who whispered it. The GP’s fear is based on the possibility that the slander may be justifiable and true — or even worse — if it is false, they fear that similar slander may be unleashed against them, unless they cooperate with the unjust targeting of the TI (exposegangstalking.com).

Gaslighting is a form of psychological abuse in which false information is presented to the victim with the intent of making them doubt their own memory and perception. It may simply be the denial by an abuser that previous abusive incidents ever occurred, or it could be the staging of bizarre events by the abuser with the intention of disorienting the victim. Gaslighting had a colloquial origin explained below, but the term has also been used in clinical and research literature (Wikipedia).

Gang Stalking Under Occupational Health and Safety laws, individuals are being flagged and placed on community notification lists. This is happening without the targets knowledge. In many countries these community notifications are being used by companies and others to target innocent individuals such as whistle-blowers, the outspoken, etc. In conjunction with these notifications, companies and others are in some cases using a practice that was used in the former soviet union called the psychiatric reprisal. This is used as a means of retaliation, blacklisting, silencing, or controlling members of society. Once on the notification system, warnings about the targets are sent out to every individual the target comes in contact with, thus poisoning their associations, and socially annexing the targeted individual (targetedindividuals.com).

Gang-Stalker is a person who participates, in a group that stalks, follows, mobs, bullies, harasses, and slanders TI’s on a 24×7 basis. Block Watch programs are notorious participants, as are organized motorcycle gangs (OMG’s), churches, or any other group that can be infiltrated and manipulated. The orchestrating umbrella above the gangs of stalkers has access to the most sophisticated law enforcement surveillance and communication resources. The scheme is government sponsored, their funding is endless, and the protocol is secretive (Definitions gang stalking related).

Handler in the intelligence services (and MKULTRA survivor group) is the direct supervisor of an intelligence “asset”. Someone who has been programmed to do the will of a controlling agency, such as a mind control target, is a “asset” to the controlling agency. Current day organized stalking and electronic harassment targets are not usually acquainted with their handlers, however, we can be certain at any given time that each of us has one. The term handler is heard and read much more frequently among MKULTRA survivors. The handlers know the appropriate hypnotic words, tones, or other signals to invoke the “asset’s” hypnotic programming (raven1).

HAARP or Highfrequency Active Auroral Research Project The vast majority of unscientific theories, research or reason, so if you want to focus on HAARP (High Frequency Active Auroral Research Program) which is a military and a scientific program of research on the ionosphere driven by the Air Force, United States Navy, DARPA (Defense Advanced Research Projects Agency) and the University of Alaska. Its main objective is the study is to improve the radio telecommunications and monitoring systems such as missile detection. HAARP by definition can not change the climate: the energy transmitted to the ionosphere is not absorbed by the troposphere and the stratosphere, the two layers of our atmosphere where weather phenomena occur. All electromagnetic interaction occurs near the area, about 70 miles up. At this point the influence of the sun’s rays are immensely more powerful than any made by electromagnetic emission antennae on Earth, therefore, if the ionospheric turbulence caused by the Sun is not able to create weather havoc on our planet, much HAARP can cause less (What is HAARP and why has not caused earthquakes).

Illuminati - The Illuminati are 13 elite bloodlines which have maneuvered themselves into control over this planet. They lead double lives, one for society and a hidden one which is based on a gnostic luciferian philosophy which consists of lots of blood rituals. (The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave)

Informened Consent The signing of consent forms for other kinds of medical procedures, such as surgery, or for cancer treatments such as radiation or chemotherapy. However, informed consent for a clinical trial involves much more than just reading and signing a piece of paper. Rather, it involves two essential parts: a document and a process. The informed consent document provides a summary of the clinical trial (including its purpose, the treatment procedures and schedule, potential risks and benefits, alternatives to participation, etc.) and explains your rights as a participant. It is designed to begin the informed consent process, which consists of conversations between you and the research team. If you then decide to enter the trial, you give your official consent by signing the document. You can keep a copy and use it as an information resource throughout the course of the trial. The informed consent process provides you with ongoing explanations that will help you make educated decisions about whether to begin or continue participating in a trial. Researchers and health professionals know that a written document alone may not ensure that you fully understand what participation means. Therefore, before you make your decision, the research team will discuss with you the trial’s purpose, procedures, risks and potential benefits, and your rights as a participant. If you decide to participate, the team will continue to update you on any new information that may affect your situation. Before, during, and even after the trial, you will have the opportunity to ask questions and raise concerns. Thus, informed consent is an ongoing, interactive process, rather than a one-time information session (cancer.gov).

Key Recovery - See GAK.

Lawful interception (LI) is the legally sanctioned official access to private communications, such as telephone calls or e-mail messages. In general, LI is a security process in which a network operator or service provider gives law enforcement officials access to the communications of private individuals or organizations. Countries around the world are drafting and enacting laws to regulate lawful interception procedures; standardization groups are creating LI technology specifications (lawful interception).

Mind Control The most insidious threat to our basic freedoms, such as freedom of mind and freedom of speech, is a little-known phenomenon known as mind control. As used by FACTNet, “mind control” refers to all coercive psychological systems, such as brainwashing, thought reform, and coercive persuasion. Mind control is the shaping of a person’s attitudes, beliefs, and personality without the person’s knowledge or consent. Mind control employs deceptive and surreptitious manipulation, usually in a group setting, for the financial or political profit of the manipulator. Mind control works by gradually exerting increasing control over individuals through a variety techniques, such as excessive repetition of routine activities, intense humiliation, or sleep deprivation (FACTNet).

MISO The U.S. Special Operations Command, which, by law, is the executive agency for psychological operations, or “PSYOPs,” decided that a name change was in order: Operations aimed at influencing the emotions of people outside the United States would now be known as “Military Information Support Operations.” When the name change was first proposed, it took a millisecond for the thousands of active psychological operations officers and noncommissioned officers to deride the new acronym. “MISO” (Psychological Operations Get a New Name).

MK-ULTRA or Project MKULTRA was the code name for a covert, illegal CIA human research program, run by the Office of Scientific Intelligence. This official U.S. government program began in the early 1950s, continuing at least through the late 1960s, and it used U.S. and Canadian citizens as its test subjects. The published evidence indicates that Project MKULTRA involved the use of many methodologies to manipulate individual mental states and alter brain functions, including the surreptitious administration of drugs and other chemicals, sensory deprivation, isolation, and verbal and sexual abuse (Wikipedia).

Mobbing can be understood as the stressor to beat all stressors. It is an impassioned, collective campaign by co-workers to exclude, punish, and humiliate a targeted worker. Initiated most often by a person in a position of power or influence, mobbing is a desperate urge to crush and eliminate the target. The urge travels through the workplace like a virus, infecting one person after another. The target comes to be viewed as absolutely abhorrent, with no redeeming qualities, outside the circle of acceptance and respectability, deserving only of contempt. As the campaign proceeds, a steadily larger range of hostile ploys and communications comes to be seen as legitimate (Introduction To Workplace Mobbing).

Monarch Programming - This was a specific Project carried out by secret elements of the U.S. government and intelligence groups. There were, according to someone a few years ago who had access to the computer(s) which contains all the names of active monitored human slaves, 40,000 actively monitored Monarch slaves. However, this book uses the term generically to include all victims who have suffered this type of trauma-based mind-control. In the same way, that a brand name like “Hyster” is used to describe all lifts–when we use the term we use it in its broadest sense. This is the only way it can be used and technically correct, because as of this date, the authors have not seen who is on the active Monarch Program list of slaves. (The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave)

The Nazi Pig Theorem (NPT) Anyone who nonconsensually violates your brain/mind/mentation using Mengele-like methods is a Nazi pig. You do not care what a Nazi pig thinks. You do not care a Nazi pig’s opinions. You do not respond to a Nazi pig ridiculing you, threatening you, trying to distract you, or otherwise trying to manipulate you. You work to get a Nazi pig hanged (Mental Firewalls).

New World Order or NWO The phrase New World Order is a probable mistranslation of novus ordo seclorum (which literally means “new secular order” in Latin), part of the seal of the United States. The actual phrase “New World Order” was used by George Herbert Walker Bush in the context of post-Cold-War politics (sourcewatch.org). Also: The New World Order is the global design for a One-World-Government One-World-Dictator and its constituents. Insiders call themselves the “network” and “the neighborhood.” (The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave)

Neuro-monitoring or Intra-Operative Neurophysiological Monitoring (IONM) Intraoperative neurophysiological monitoring (IONM) or intraoperative neuromonitoring is the use of electrophysiological methods such as electroencephalography (EEG), electromyography (EMG), and evoked potentials to monitor the functional integrity of certain neural structures (e.g., parts of the brain, spinal cord and peripheral nerves) during surgery. The purpose of IONM is to reduce the risk to the patient of iatrogenic damage to the nervous system, and/or to provide functional guidance to the surgeon and anesthesiologist (Wikipedia).

Noise Campaign is an orchestrated effort to produce stress in a victim through prolonged exposure to significant noise levels. A Noise Campaign can range from multiple neighbors routinely playing loud music, individual stalkers with air-horns or fireworks, or organized “repair work” that involves a high level of noise (myspace.com).

Nonpersonis a citizen or a member of a group who lacks, loses, or is forcibly denied social or legal status, especially basic human rights, or who effectively ceases to have a record of their existence within a society (damnatio memoriae), from a point of view of traceability, documentation, or existence. The term also refers to people whose death is unverifiable and about which inquiries result in a “blank wall” of “nobody knows” (Wikipedia).

ORATORY – Speech recognition. Think of it as speech-to-text software. Subject to DICTIONARY searches.

Organized Stalking is the preferred term for that portion of the full crime of organized stalking and electronic harassment where people who live in the community will mercilessly harass a designated target, based on LIES, such as the target is a drug dealer, the target has a long criminal record, or the favourite lie, the target is a pedophile (raven1).

Perps are perpetrators of the organized stalking and electronic harassment crimes (raven1).

Perpetrator a person who does something harmful or dishonest, especially a person who commits a crime (Law-Glossary).

PGP – Free and unbreakable encryption, available world-wide.

Propaganda is a form of communication that is aimed at influencing the attitude of a community toward some cause or position. As opposed to impartially providing information, propaganda, in its most basic sense, presents information primarily to influence an audience. Propaganda often presents facts selectively (thus possibly lying by omission) to encourage a particular synthesis, or uses loaded messages to produce an emotional rather than rational response to the information presented. The desired result is a change of the attitude toward the subject in the target audience to further a political agenda. Propaganda can be used as a form of political warfare. Common media for transmitting propaganda messages include news reports, government reports, historical revision, junk science, books, leaflets, movies, radio, television, and posters (Wikipedia).

Psychotronic weapons remain, at least for a layman uninformed of secret military research, in the sphere of science fiction, since so far none of the published scientific experiments was presented in the way which would allow for its replication. That it is feasible to manipulate human behavior with the use of subliminal, either sound or visual, messages is now generally known. This is why in most of the countries the use of such technologies, without consent of the user, is banned. Devices using light for the stimulation of the brain show another way how the light flashing in certain frequencies could be used for the manipulation of human psychic life. As for the sound, a report on the device transmitting a beam of sound waves, which can hear only persons at whom the beam of sound waves is targeted, appeared last year in the world newspapers (bibliotecapleyades.net).

PSYWAR or PSYOP Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PSYOP), have been known by many other names or terms, including Psy Ops, Political Warfare, “Hearts and Minds,” and Propaganda.[1] Various techniques are used, by any set of groups, and aimed to influence a target audience’s value systems, belief systems, emotions, motives, reasoning, or behavior. It is used to induce confessions or reinforce attitudes and behaviors favorable to the originator’s objectives, and are sometimes combined with black operations or false flag tactics. Target audiences can be governments, organizations, groups, and individuals (Wikipedia: Psychological warfare).

Satanic Ritual Abuse (SRA) -This is used to represent all categories of ritual abuse which would be inspired by the desire to rob, kill, or destroy something worthwhile in a person, especially their freedom of thought. Many groups carrying out SRA do not mention Satan by that name. They may make Pacts to Baphomet, and call upon Rex Mundi, or Belair, or Lucifer, or the Father of Light, God, or Kali or even “Jesus” or “Jesus Christ”. SRA is not a value judgment by the authors against some group, the victims themselves on some level know that he or she is being abused. (The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave)

Sensitization is an example of non-associative learning in which the progressive amplification of a response follows repeated administrations of a stimulus. An everyday example of this mechanism is the repeated tonic stimulation of peripheral nerves that will occur if a person rubs his arm continuously. After a while, this stimulation will create a warm sensation that will eventually turn painful. The pain is the result of the progressively amplified synaptic response of the peripheral nerves warning the person that the stimulation is harmful. Sensitization is thought to underlie both adaptive as well as maladaptive learning processes in the organism (Wikipedia).

SIGINT – Signals Intelligence = NSA = electronic snooping

Skin effect is the tendency of an alternating electric current (AC) to distribute itself within a conductor with the current density being largest near the surface of the conductor, decreasing at greater depths. In other words, the electric current flows mainly at the “skin” of the conductor, at an average depth called the skin depth. The skin effect causes the effective resistance of the conductor to increase at higher frequencies where the skin depth is smaller, thus reducing the effective cross-section of the conductor. The skin effect is due to opposing eddy currents induced by the changing magnetic field resulting from the alternating current. At 60 Hz in copper, the skin depth is about 8.5 mm. At high frequencies the skin depth may be much smaller. Increased AC resistance due to the skin effect can be mitigated by using specially woven litz wire. Because the interior of a large conductor carries so little of the current, tubular conductors such as pipe can be used to save weight and cost (Wikipedia).

Sleep Deprivation The forced deprivation of someone’s necessary amount of sleep has been used in the interrogation of terrorist suspects to make them more amenable to providing information or confessions. There is some debate about whether sleep deprivation is a form of torture or one of a number of “stress and duress” techniques, and thus whether it is a legal and ethically acceptable in interrogation. According to the United Nations, sleep deprivation is a form of torture. The effects of sleep deprivation range from irritability, confusion and a decreased ability to concentrate, to loss of consciousness resulting from the failure of red blood cells to transport oxygen to the brain (Sleep Deprivation).

Stalking is a term commonly used to refer to unwanted, obsessive attention by individuals (and sometimes groups of people) to others. Stalking behaviors are related to harassment and intimidation. The word “stalking” is used, with some differing meanings, in psychology and psychiatry and also in some legal jurisdictions as a term for a criminal offense. It may also be used to refer to criminal offences or civil wrongs that include conduct which some people consider to be stalking, such as those described in law as “harassment” or similar terms (Wikipedia).

Street Theater when spoken of in an organized stalking context refers to carefully scripted harassment by neighbours and strangers especially, but can include harassment by family, friends and co-workers. These acts are designed to keep a target at a high stress level, and are crafted so that outside observers are likely to wave the skits off as “life’s normal breaks”. The cumulative effect of such acts can be crushing to sensitive targets. Noise, crowding in person or on the highway, stealing items from shopping cart when in the checkout line, and kids sent to hang out in front of, stare, make noise, and even throw tennis balls against the target’s house are simple examples. What differentiates street theater from “the breaks” is that street theater goes on every day, often by different mind control operatives, far too often to be random or “natural”. Cover is provided by the tendency of people to refuse to acknowledge the frequency of these acts and consider the complainer just being “a crank” (raven1).

Switching - This is when one part (fragment) of the mind takes over from another, or in simple terms, this is when one alter personality (or alter fragment) takes the body from the alter which is holding the body. Switching can occur via the Programmers’ codes for calling up alters, or by external or internal stimuli that trigger an alter to come out. Switching will usually cause at least a flicker of the eyes, and for outside observers, who know the different personalities, they will observe another personality take the body. (The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave)

System - This term is used in several ways. It is frequently used to refer to a victim of total mind control because the victim consists of alters, programming, implant(s), internal computers, and numerous dissociative states which function together as a system. The word is also used in this book to refer to the body’s functional physiological units, such as the respiratory system. The word is also infrequently used to denote the established social-economic-political system controlling the world, also known insiders as the Network. Other standard meaning may also occasionally be used for the word. (The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave)

Targeted Individuals a department of defence term, are people who locals deem unfit for society, in one way or another. Some are whistle-blowers; some are dissidents, like anti-war demonstrators; some have a beef with one corporation or another; some just have different political or religious ideologies then the norm; some are targeted for reasons of lust and greed, and some are targets of convenience. They are targeted by means of gang-stalking, b & e’s, harassment, poisonings (biological and/or chemical), remote electronic harassment (messing with radios and tv’s, etc., remotely), vandalism, character assassinations, staged accidents, etc. Harassment is on-going, in and outside the home (About Gang-Stalking, Cause Stalking, And Targeted Individuals).

TI or Targeted Individual is an individual who has been placed into a maze of psychological and often physical warfare tactics which is orchestrated by the U.S. military, C.I.A. and federal law enforcement. From community harassment known as “Organized Stalking” and various other invasion of privacy tactics and violations of basic constitutional rights to invisible, silent physical torture through the use of highly targeted overexposure to electromagnetic radiation (Targeted Individuals – And The C.I.A.).

Targeted killing is the targeting and killing, by a government or its agents, of a civilian or “unlawful combatant” taking a direct part in hostilities in the context of an armed conflict who is not in that government’s custody and cannot be reasonably apprehended.[1] The target is a person taking part in an armed conflict or terrorism, whether by bearing arms or otherwise, who has thereby lost the immunity from being targeted that they would otherwise have under the Geneva Conventions.[1] Targeted killing has been used by governments around the world, and has become a frequent tactic of the United States and Israel in their fight against terrorism (Wikipedia).

Torture means any act or omission by which severe pain or suffering, whether physical or mental, is intentionally inflicted on a person (a) for a purpose including (i) obtaining from the person or from a third person information or a statement, (ii) punishing the person for an act that the person or a third person has committed or is suspected of having committed, and (iii) intimidating or coercing the person or a third person, or (b) for any reason based on discrimination of any kind, but does not include any act or omission arising only from, inherent in or incidental to lawful sanctions (Criminal Code).

UKUSA - pronounced ‘you-koo-za’ – a secret wartime treaty that says member nations can spy on each others population without warrants or limits, and that this can be shared with the spied-on country’s SIGINT agency

Ultra-secret agencies: NSA – U.S. National Security Agency; GCHQ – British Government Communications Headquarters; CSE – Canada’s Communications Security Establishment; DSD – Australian Defense Signals Directorate; GCSB – New Zealand’s Government Communications Security Bureau

Walter Bowart on DSM-IV: ”…Look at the DSM-IV [Psychiatric Diagnostic Manual. It] is strongly influenced by the insurance companies and people having no experience in the richness of the human mind and spirit. That’s one of the things that the MK-Ultra victims taught me. Over and over I heard the phrase, “They didn’t mess with my mind; they messed with my soul.” I’ve begun to think in spiritual terms of what has gone on here. This is a horrible thing. [It is] just like the Inquisition, but more sophisticated and less visible. There’s no blood on the streets, but that makes it even more insidious. And of course the technology is now available to everyone…” (Walter Bowart interview)

Vengeance/Terrorist Stalkers do not seek a personal relationship with their targets. Rather, vengeance/terrorist stalkers attempt to elicit a particular response or a change of behavior from their victims. When vengeance is their prime motive, stalkers seek only to punish their victims for some wrong they perceive the victim has visited upon them. In other words, they use stalking as a means to “get even” with their enemies (Organized Stalking by Groups – FAQ).

Victimization or victimisation is the process of being victimised. According to Wiktionary, to victimise is to (1) make someone a victim or sacrifice (2) punish someone unjustly, or (3) swindle or defraud someone (Wikipedia).

Voice to Skull devices or V2K is a nonlethal weapon which includes (1) a neuro-electromagnetic device which uses microwave transmission of sound into the skull of persons or animals by way of pulse-modulated microwave radiation; and (2) a silent sound device which can transmit sound into the skull of person or animals. NOTE: The sound modulation may be voice or audio subliminal messages. One application of V2K is use as an electronic scarecrow to frighten birds in the vicinity of airports (fas.org).

Workplace Bullying is repeated, health-harming mistreatment of one or more persons (the targets) by one or more perpetrators that takes one or more of the following forms: Verbal abuse; Offensive conduct/behaviors (including nonverbal) which are threatening, humiliating, or intimidating; Work interference:sabotage which prevents work from getting done (Definition of Workplace Bullying).



defining a crime and finding solutions

·       Home

·       About

Gang Stalking / Organised Psychological Harassment poisoning, spying, and destroying lives

Presented here is, from my own point of view, the most accurate description of ‘what is going on with this ‘gang stalking thing ‘. No one seems to understand how these strange harassments happen, and no one is able to believe any reasons as to why they happen.In the text below, presented to Gang Stalking World, as an annonymous post, we can see how an enterprise has eveloved, one that is criminal, and has brought organised crime and the common critizenry together. Deceit, fabrication, threat, and technology seem to have made such a union possible. Adding that such a union aims to destroy innocent people’s lives, if not bring them to their deaths.What is most disturbing in the text below, is the salient argument standing out in the first paragraphs, that states that gang stalking is primarily about poisoning, drugging, and attempting to chemically inducing psychotic-like symptoms in the targets of this crime, and contaminate their physical health.Evidence, to support such, through individual accounts are not necessarily mounting, but from my own personal experience with this terror/gang stalking phenomena, as well as from what I have gathered by researching this, the more equipped and modern these groups are, the more money that has been thrown at them, the more they are apt to use highly covert fumigations, poisonings, and daily incrimental druggings, in their effort to cause undue suffering and pain for someone they have been hired to target.

I have edited the piece of writing below, hopefully highlighting points of importance.

“If you have not been or are not being poisoned and/or drugged, you are not being “gangstalked” . “Gangstalking” is described on some websites as a bunch of people “just” following you around doing strange skits. That would just be annoying compared to what it really is. Although it might be possible that victims are not aware of where their “symptoms” are coming from. I thought I was physically ill at first, but then began to see a relationship between my “illnesses” and what can only be described as felony assaults……………..”

annonymous post from



Full post here:

” “Gangstalking” is a “catchphrase” name….

……describing what has become a part of traditional and new organized crime that is networking through the United States and some other countries.

Organized crime groups

……and “criminal elements” from all walks of life use or hire for pay, criminal organized stalking crews to assault “targets” to cover up financial or other crimes.

These criminals “contract” with the covert organized assault crews:

·       to silence any potential witness or “trouble maker”, whether real or imagined, that could possibly effect their lives.

·       “contract” / “assault squad” to discredit and silence …………using their criminal “gas-lighting” methods.

These “organized criminal crews“ assault

·       [victim’s] family, friends, neighbors and many people in community.

There is always a reason someone is targeted and most will know why and who started it, but apparently:

·       some victims never know what happened to them, why it is happening or who “triggered” the overwhelming assault.

This is probably because the “trigger event” was irrelevant and meant nothing to the victim, but was perceived as possibly damaging by the criminal(s) involved.

The victim

·       could have “upset” somebody

·       and now that person simply wants revenge.

I would see that as a waste of time, thought and money, but I guess some people could be “just that way”. I’ve seen estimates of the number of victims of this type of crime, but nothing I consider credible.

One victim is too many

I wouldn’t even try to guess how many career criminals participate in this. It can’t be many as compared to general populations.

A VERY LUCRETIVE ENTERPRISE

This is a very lucrative criminal enterprise for many of the perp[etrator]s.

·       People considered important to the success of a “hit” are offered large “bribes” to become a perp and start “working” the victim.

ADVANCED COMMUNICATIONS

Advanced communications such as the internet, cellphones and voice over internet protocol:

·       have accelerated the growth and networking of these organized criminal groups.

Their day to day stalking activities depend on these same technologies plus:

·       gps and other hi-tech devices…..

·       electronic spy

·       harassment equipment.

Law enforcement agencies are aware of these criminal groups and are gathering information on them.

I have not read about a “targeted individual” that would have believed this could happen to anyone, had they not become a victim themselves.

These criminal stalking groups go to extreme lengths to cover every aspect of their “covert” operations. They try to have a plausible explanation for everything.

The crimes they commit are well planned and easy to do but easily deniable.

WELL PLANNED

·       A victim might see many work projects in the area, small or large, constant maintenance all around the neighborhood involving new workers you have never seen before. Endless traffic of all descriptions.

·       Mobbing activities near your home, on the highway, in stores and on the street. These are mostly perp[etrator]s or all perps in some cases. They will always have a ready made reason to be where they are before they are dispatched.

PIOSONING AND DRUGGING

If you have not been or are not being poisoned and/or drugged, you are not being “gangstalked”.

Gangstalking” is described on some websites as a bunch of people “just” following you around doing strange skits. That would just be annoying compared to what it really is.

Although it might be possible that victims are not aware of where their “symptoms” are coming from. I thought I was physically ill at first, but then began to see a relationship between my “illnesses” and what can only be described as felony assaults.

The mental and physical effects described by most targets are achieved by:

covert poisoning

·       using more or less common neruo-interrupters (organic phosphate pesticides),

·       psychotomimetic agents (drugs)

·       and irritants.

Some of these chemicals are mixed when needed with additives to make them behave in desired ways.

Some are intended to absorb through the skin and others are intended to out-gas. They are not all used in all the described ways.

Some, what I will call irritants, are sprayed on the target and act locally on the skin or spread out slowly with various affects.

One perp[etrator]s will divert your attention while another one sprays from a “breath spray” size can on bare skin behind or where you won’t notice. They always make a noise like clearing their throat so you won’t hear the sound. I caught them doing this too.

Some drugs are mixed with dispersant’s to make them out-gas. These are squirted at or near an isolated target using covert methods. In remote places where possible, constant “Area gassing” is done from neighboring houses.

The perp[etrator]s spent a couple days at my neighbors installing the devices they use to disperse their chemicals. I’m sure they are well hidden but I know I can find them.

These house devices have been refilled on a regular basis since they were installed.

Passing cars/trucks with an electric squirting device are being used, each squirting an out-gassing mixture as they pass by.

These were almost constant for several years and are still coming. On the road perps will squirt “out gassing” mixtures from the backs or fronts of their cars/trucks at your car/truck. When they can get away with it perps even do this while walking past in order to gas the target.

The chemicals will out-gas quickly or slowly depending on their intended use.

The most dangerous assault is the direct assault from a car/truck that has an electrically powered high pressure squirting device behind the grill. These usually squirt pesticide that is intended to stay put and absorb through the skin.

This attack can penetrate thick clothing and is usually done in a parking lot or anywhere they can get close to you in a car.

Be aware of cars pausing near you or “aiming” at you in parking lots. Individual perps on foot will work their way behind you and squirt your lower back using various covert “rigs”. This is what I first caught one of them doing.

The chemicals can be administered by “flipped” coworkers, neighbors, friends, family, local strangers and old or new professional (paid) perps.

Neuro-interrupters have a cumulative effect

·       With successive poisonings there is a gradual decrease in cognitive functioning whidh is what is intended by the perps. I read an account of one victim who had been poisoned to the point that he could no longer speak.

A perp[etrator]s will always wait close by to observe the condition of the victim after assaults.

The protection against this is waterproof or impermeable clothing or any barrier that will block what is essentially a “high-tech squirt gun” If the victim fails to protect themselves, they will go down as a result of these assaults.

Some psyhcotomimetic agents

·       usually LSD or similar will be applied to surfaces the victim will ordinarily touch, door handles, cabinet drawers, any place in their home, car and places at work.

·       Daily vitamins, coffee, shampoo or anything used or consumed on a daily basis is a potential contamination target, especially single use items.

·       In the home milk is often contaminated with OP pesticide.

It is obvious if put in any clear liquid because the liquid becomes cloudy. Gloves and clothing might be turned inside out and “treated”. Time to change your cloths, don’t forget to shower.

The perps will start slowly, only contaminating a single item or items they have control over so no evidence will remain in case law enforcement investigates. After they believe they have compromised the victims credibility they will become more active and aggressive with contamination and all other aspects of the “organized assault”.

The following as well as this entire scam may take place over the course of many years.

COMMUNITY INFILTRATION AND INFLUENCE

·       Co-workers, neighbors, friends, family, law enforcement and the general public are told planned, consistent lies about the victim/target.

·       This will start with law enforcement long before the actual assaults begin.

They do this to “set up” the target, hoping law enforcement will believe their lies and ignore the victim when they first report this crime.

Perp[etrator]s may show a bogus “investigation” file or flash fake badges in the community as part of the scam.

HIRED LOCAL LAWYERS PRIVATE INVESTIGATORS

·       Perps might hire local lawyers and private investigators in a ruse to “legitimize” the scam.

·       Later the perps will report crimes or trip alarms in the area so the police will have to drive by the target’s house.

This is to make the target believe the police are part of the stalking. They will also pull fake fire alarms for the same purpose.

Ongoing double assault

·       While “working” this chemical attack, the perps perform “street theater” around the target.

They hope the poisoned/drugged target will panic, then report and try to describe these bizarre “skits” to law enforcement.

The goal is to :

·       create poison and drug induced psychotic episodes, paranoia, and actions that could (the perps will say) appear to be schizophrenic (only if you are not educated about schizophrenia would you believe this).

The perps often launch large drug assaults against a target in public. If the target is effected enough they will report or encourage a bystander to report the target to law enforcement, saying the target is schizophrenic, crazy or psychotic.

Some of the perp[etrator]s are bold enough to say the cops do what they have them do, indicating the perps are making “fools” of and are smarter than law enforcement and the targets. Many in law enforcement are aware of perp stalker tactics now and they would like nothing better than to bust this criminal enterprise or anyone in it.

People in Community Tricked or coned

·       Some people in the community are tricked or coned into participating. They are told clever lies about the target

·       They may even be deluded into thinking they are doing acommunity service“.

If they knew the truth of what they were involving themselves with they would not cooperate willingly.

·       Others accept money or other forms of compensation.

·       Many who know or are close to the target are forced to take part in this criminal scam, it’s essentially “the offer they can’t refuse“.

·       Some are set up for various crimes and blackmailed, or blackmailed for any existing secrets they want to keep from co-workers, family, friends or the community at large.

Those close to the target that resist are threatened and poisoned using these same methods until they obey.

·       After they are “flipped” they are “coached” by these criminals in their “methods” of assault and supplied withcovert equipmentto topically spray or squirt these chemicals on or around the target or in their food or drink.

·       This will be done at every opportunity at the target’s home (at night to wake you up) or away, on foot or in the car.

TECHNOLOGY/WATCHING/PRIVACY INVASION

CONFUSING THE VICTIM

Anywhere the target is or goes the perps will work together, using surveillance, advanced communications, stealth and simple diversionary tactics to draw the target into position for an assault that will not be detected by the general public.

·       The perps have their own websites andshills” to spread mis-information and dis-information on the internet.

·       Some pose as support for victims trying to disrupt the actions of those who are really trying to help victims. There are perps posing as victims.

These perps post intentionally “crazy sounding” accounts describing bogus “satellite attacks oradvanced electronic weapons” and the ever popular “mind control” which they stretch way beyond anyone’s imagination.

They want to frighten and confuse real victims with a mix of real and bogus information that they hope will be believed and repeated by victims.

These “posers” also try to befriend real targets to gain information to launch yet another attack.

They also will tell targets things like “get out and live your life”. What they really mean is “come out where we can get a clear shot at you”.

I read one victims account that said they knew the man that started their stalking and that the man had a reward poster with the victim’s picture in a target on his office wall. I think the vic said the offer was $25,000. If you’re a target, that will make you think, won’t it. Some credible sounding things about this I read on the internet are gone now, disappeared. I like to think I just can’t find them, even though that probably isn’t the case.

CYBERSTALKING

Cyberstalking, everybody knows what that is or can look it up. Just like all the things these guys do it’s pretty much “business as usual”.

·       They take the information they have gathered about the target and present it in a way that is supposed to make the victim wonderHow did that stranger know that“?

It’s the same “directed conversation” stuff they do to targets at stores and on the street.

Well, the internet is a big place and you don’t have to go where people get their “jollies” jerking you around. As a matter of fact you don’t have to go there at all except maybe to do a little business now and then. And you don’t have to share your thoughts or business on the phone or out loud. You don’t have to provide them with information to use against you.

When you have to speak around perps, use only the words you need. If you don’t talk unless needed the perps will just have to wonder what you are thinking.

REALITY OF POISONING CLOAKED WITH MISINFORMATION

Common symptoms (use search engine) of the afore described poisons are attributed to the bogussecret weapons“. “Electromagnetic weapons” of sorts are real but I have been unable to verify or find credible information on any existing “electromagnetic weapons” as they are described in this strange “internet chasm”.

·       Also some of the symptoms described could be attributed to simple harassment electronics and some of the “itching” or “burning” powders that the perps sprinkle in target’s beds.

·       They will contaminate your bed with various drugs in an attempt to make you “freak out” while trying to sleep.

GUARDING AGAINST ILLEGAL ENTRY

·       Keep the perp[etrator]s out of your home.

·       The perps might be able to open any lock that uses a key.

·       That leaves some type of combination only lock.

·       If you can afford one or more, install them and learn how to change the combination.

·       Disable all other entry lock key slots with water soluble wood glue, it can be removed later. Secure all windows.

·       At least know if they were inside.

VIDEO CAMERAS

·Video cameras anywhere, outside or inside are a good thing to slow the perps down or keep them away if done correctly.

·Your own well hidden cameras or listening equipment inside might keep them out.

POWDERED PROMOTION OF ASTHMA

The perps also use powders that will cause an asthma-like attack.

Don’t panic, an inhaler will stop it or it will go away soon after you have gotten away from the source.

SIMPLE ELECTRONIC/PROMOTING EAR RINGING

·       The perps will use amplified high frequency (above human hearing, kind of like a high powered electronic dog whistle) transducers (speakers) to make your ears ring.

·       These can be purchased but it’s fairly easy to build a big one with adjustable volume/range.

I have seen this “ear ringing” as well as “body vibrations” associated with the non-existent “satellite weapon” attack. The “satellite to earthbound human attack” is still science fiction at this writing. And perps can purchase transducers of the type used in industrial sonic baths and mechanically fix them with screws to floor joists or wall studs underneath repaired drywall, completely hidden from view of normal inspection. The transducers will make your floors vibrate and probably create heat. They spend a lot of time hiding their stuff in houses or apartments so it won’t be found under simple visual inspection. If somebody really decides to start looking they *will* start finding these things. These tactics are part of the never ending “smoke and mirrors” routine. Apparently the perps get a “charge” out of inducing false perceptions.

MISINFORMATION SUMMARY

This “con-artist information attack” is intended to further psychologically terrify the victims hoping they will react as if “crazy“. After all, that is what it’s all about.

·       If the victim fails to protect themselves they have already been poisoned and drugged to what the perps hope is an “excited” state of reduced cognitive ability.

·       At this point in time the victim is usually attacked by the criminal’s very real covert weapon.

This is most often done at night because it can be effective at waking you up and keeping you awake. It might also be hard to hide or get away with in the daytime because of sound, size, location, etc.

This weapon was originally developed as a crowd control device by a company called Scientific Applications & Research Associates Inc. of Huntington Beach. It is an acoustic/sonic weapon that will make internal organs resonate.

These effects have been described by victims of these assaults.

The weapon I have seen in video demonstration is based on a combustion chamber that releases multiple ignited fuel charges through a wave guide to produce directional “very low frequency” (below human hearing) waves. These waves at the time were hard to control over distance as a beam but as used it probably doesn’t matter that much. This would most likely be used on a detached house. There are electrical versions of these weapons that use transducers that could be used from shorter ranges such as adjacent apartments in an apartment building. The electrical versions I read about required a very large amount power, were large and only managed a short pluse before needing recharging. These weapons could be greatly improved by now as far as size and power are concerned. The fuel combustion type I saw could be carried by one man. These weapons have undergone some military testing and are not really a secret, but I haven’t been able to find current up to date information (for an old 1997 story, search – U.S.News Wonder Weapons by Douglas Pasternak).

TELECOMMUNICATIONS/BUGS

·       Almost all victims are aware their phone and computer are “tapped” or will be.

Information is gathered from every possible source in order to “custom tailor” the many various assaults and “street theater” to the individual.

·       This surveillance information is used and intended to give the target the impression of an “all knowing”, “Orwellian” or “big brother” type of situation.

·       Some are not aware that using a “hard wire tap” (cutting the wire and inserting a computer interface) that the perps can use computer software to digitally edit your call on the fly.

·       They try to illicit angry responses from victims through constant harassing phone calls or even harassing in public.

·       They digitally record these and clean them up for later use.

Then when you call someone, usually a service that records calls like a telephone company or maybe even 911, they will :

·       cut you off after a completed sentence and seamlessly insert an out of context angry, ranting remark you justifiably made at another place and time.

The more “crazy” it sounds the better.

I can just imagine how they laugh after one of these edits.

They can also use :

·       this method to create false recorded conversations to turn people you know or others against you.

Imagine they record a public conversation at a store checkout counter and someone asks about a person you know.

·       You say only good things about this person.

·       Later in another conversation they ask you about Osama Bin Laden and you say everything but good things. The perps simply switch a few sentences around and clean it up some.

·       They have what they want and it is much easier than altering a photograph using “photoshop” and almost impossible to detect.

TINY CAMERAS COLLECT VICTIMS EVERY MOVE

Let’s talk about “covert” (as if anything is not covert) cameras in or around your home.

I have gathered information that indicates that live video of targets in their homes or while being stalked might be “entertainment” content for an internet website or sites run by the perps.

What would really be bizarre is if some people were paying to view this stuff. It is at least viewed constantly by your local perp. You might even be appearing in “The Best of (insert your perp given TI name here)” video of the week. Your pictures and “perp created profile” are possibly on a website for all “perp-ville” to view. Manufactured fictitious information disseminated to all who have the perp web address or it could be passed out in “hard copy”.

Audio bugging?

You bet, they’ll do it if they can and they can.

And just a note here,

·       hiring somebody to do a “bug scan” is useless.

·       It’s a highly specialized field that takes an experienced expert and any of them worth anything will tell you it has to be done completely covertly because good bugs can just be turned off while a scan is in progress.

I’m sure the perps “just might” know the guy is coming because they already have *you* under surveillance.

If you used your phone for contact that is a fore gone conclusion.

If the bug is in an adjacent apartment, of course they will just turn it off.

And if it is a hardwired bug there won’t be a signal to pick up anyway.

If the perps can’t get inside to “bug” your home they might use laser to window, a parabolic or shotgun mic.

You won’t catch them doing any of those, it’s not impossible to catch them, just highly improbable.

One thing about this scam is that they need to hear your business to work the scam “by the book”.

They can’t do any “directed conversations” anywhere without this information and it’s harder to set up “mobbing” and coordinate “moving surveillance” when they have to guess where you are going.

Outside anybody can pick up voice easily from a safe distance using a parabolic or shotgun mic.

The conclusion is it’s ok to look every now and then for covert cameras or bugs yourself after a little schooling on the subject, but don’t expect to find anything because you probably won’t.

And don’t worry about it, just go about your business. You can figure out If perps are repeating things you said over the phone or something you said out loud in your house or apartment. Where did you say what they repeated? You have control over what you say and where you say it.

CALL REDIRECTION LANDLINES CELL

Don’t forget about call re-direction on landlines and cell phones.

·       Know who you are talking to.

·       Do you think you called and talked to someone in law enforcement?

·       Maybe you did, maybe you didn’t.

·       Redirecting calls you try to make to law enforcement is something the perps do.

·       They will pretend to be a law enforcement officer and tell you there is nothing that they can do to help.

·       And they will make suggestive remarks about your sanity or reputation. They may refer you to another bogus “officer” to “work” you again.

·       Always get the name and badge number of officers you speak with over the phone.

·       Always identify/verify anyone you speak with over the phone.

·       If you suspect your phone is tapped/intercepted/redirected, and if you are being “gangstalked” it will be, don’t use it.

·       You can use a random pay phone if you have to.

All victims should report this as soon as they can do so in a reasonable manner. It will never be stopped if nobody ever reports it.

REPORTING THIS CRIME

When you report this crime:

1.     ALWAYS go in person with well planned information you have compiled including a journal, video, audio, perp names and anything else you can get.

2.     If you have been “gangstalked” for a long period of time and you don’t have any “evidence” of any kind, just what have you been doing all this time?

3.     Be organized and complete but brief.

4.     Don’t elaborate on unimportant every day details you cain’t prove anyway. Don’t go into “gaslighting” details, all the particulars are not important.

5.     You don’t have to file a complaint against anyone, you are only providing information about a crime.

6.     Don’t tell anyone you are going to do this.

7.     If the perps know, there may be a “parade” of them lining up to give you the “treatment” all the way there and even into the law enforcement building.

8.     Be prepared to do this at any time and when you think the time is right deviate from your normal routine and do it.

You can even make practice runs to check logistics, such as where to park, where to go when inside the building, are there surveillance cameras (big plus) in the parking lot or building. Any test run will also test the Perps reaction. Going by there a few times to learn the area roads won’t be noticed by anyone but the perps.

SOUND DIFFUSSION, BUGS AND TAPS

·       While at home you can leave the radio or other sounds going all the time to disrupt the perps probable recording activities on some levels. It’s very hard to separate the multiple sounds and I’m not sure that it would end up good enough for their purpose.

The perps don’t have to get into your home to install a “hook switch” or “infinity device“.

·       It’s a type of phone tap that after the phone is answered manually or by a machine, the switch on the microphone of the “tapped” phone is “hooked” and remains on after hanging up.

·       It becomes an effective listening device that can easily pick up conversations in an average size room.

·       This device can be installed anywhere on the phone line between your phone and the local central office. It would usually be fairly close to your home or in your apartment building.

·       It can be called and activated for listening from any phone anywhere in the world.

For some, I guess obvious reason, the perps like using these. They can be defeated after a call by unplugging the receiver, the phone or installing an off switch on the phone microphone.

Secure phones that turn off the microphone automatically are available but are expensive considering what little is involved.

·       The perps can also sign you up for gps tracking too, they only need a moment with your cellphone to enter a code and you will be just like “one of their children”, tracked everywhere you go with the phone on.

They will use your email or their own to verify the gps account.

If you haven’t already, don’t leave your cell phone anywhere unattended.

If they get your number, which is easy, they will monitor and can redirect/edit your cell phone calls using what is known as a portable base station.

Scanners are used too but are less effective and only for listening anyway. They have or can get all the latest electronics that can be had by anyone.

Always use an ssh2 encrypted stateside vpn service for internet.

Don’t use a server offshore that skirts the law, if a perp does something illegal you want them to be caught.

If you can find a vpn anywhere that is or is said to be a government “honey pot” for cybercrooks, that is definitely the one you want to use.

These perps will work to shut down servers using their bot-nets, if only temporarily. And be aware that even after a clean reload/install of your OS they will try to get the latest trojan, key logger or virus to you in an email attachment from a formerly trusted source. Sadly it might be that cute e-card from a family member or friend. If they have the run of your home it only takes a minute to load “spy” software using a CD or USB memory drive. If you can’t keep them out of you home, back up your data, reload the OS and lock the drives down so they won’t boot on start up. Keep your OS “locked down” or “hardened” against all known attack methods too.

THE REAL BOTTOM LINE….

…..on any communication service is as long as it runs through a wire/cable/fiber that is accessible to the perps, they can get on it. If they’ve “got your number” common cell phones are not much better as far as interception/manipulation is concerned.

This article is older but is still interesting.

Tapping Computer Data Is Easy


CRIMINAL LINEAGE/ORGANISATION

These organized criminal groups have an appointed leader(s) that control(s) everything they do.

·       They operate much like a computer bot-net receiving orders, tracking the target and dispatching a stream of perps.

Take appropriate measures to protect yourself from their assaults and stay safe. Be aware of your surroundings and…

·       don’t respond to “baiting” tactics.

What I’ve described is just part of what these criminals do………..

·       ……and if you are not a victim you are probably saying to yourself, “I just can’t believe a large group of criminals are getting away with crimes like that”.

The reason they are getting away with it is because:

·       this large group of criminals literally “hijack” the community

·       using the methods described above.

It took stalking of well known celebrities and a death before anyone started taking effective action against stalking.

Many people know this is very real and I know it is being investigated.

·       There are many laws that can easily be applied to these crimes but no specific laws. A task force is usually appointed to tackle tough crimes, that may be what is needed to address this.

You have permission to repost or print any part or all of this information.

·       from annonymouspost: Error! Hyperlink reference not valid.

·Displayed in the above are some points that may bring to light how gang stalking operates.

·The use of high tech communications and surveillance equipment, by tech savvy criminals make highly planned gang stalking initiatives do what they do.

·       They are covert, and pervasive.

·       They have mastered a sell, and can hire lawyers and others to do their PR and disseminate hate, via slander.

·       Recruiting uses all avenues, from con and threat, to presentations of fabricated characters profiling.

·       The use of technology to manipulate photograhy, and recorded sound support the fabricated character profiles.

Though, keeping on the noted highlights from the above text, we can see that gang stalking/covert harassment is not only about ostracizing, isolating, and gaslighting someone into the hallways of behavior services and psyche wards.

It may be no question as to whether or not these protracted criminal initiative, gang stalking, use poisons, chemical gasses and psychotomimetic agents (clik), chemical weapons that act on the human mind.

Gang stalking’s covert harassments that included:

·       creating mishaps and complications,

·       skits on the street that direct conversation towards the victim, using the victims personal information (street theater)

·       baiting the victim to react emotionally or violently in planned and staged situations.


These, all together, can very well tax a person, as well as emotionally and mentally cripple, to extent, one who has been isolated through a widespread, covertly done, slandering campaign. Thus said, evidence points to an underlaying chemical element to these street level harassment tactics, by covertly chemically undermining of the victims psychological well being.

From this author’s own experience:

·       chemicals, certainly, and perhaps poisons, are distributed in covert ways, and incrementally, usually avoiding outright drugging/poisoning effects, and having a more subtle effect that is generalised through day and night.

From the author of this blog’s personal account of being gang stalked, what stands out the most are:

·       fumigations

·       chemically laced items of consumption

·       pervasive strong unnaturally smelling scents and odors(clothing, food, drink, bedding, rooms)

It seems only logically, from this, that gang stalking is not necessarily exclusively about using isolation, gaslighting, and orchestrated mishaps to cause someone to ‘lose it’, and become mentally unstable. It is about contaminating a persons life with poisons, chemicals, in conjuction with the street level, workplace harassment.

From my point of view, and my case, these criminals undermine a victim’s psychology through ‘felony assaults:

·       chemical substaces and drugs, covertly admisistered in an ongoing fashion.

Personally, the perpetrators have maed it impossible for me to have a non taste corrupted cup of coffee, and perhaps poisoning me with tactics that I have long thought were simply taste and odor harassments.

The entire enterprise is scary, even horrific, in that common people are recruited into such efforts to basically kill someone, by inducing suicide through a slow and incredibly torturous method that include isolation, psychological and moral violence, as well as dugging and poisoning.

To have such activity as covert poisonings/druggings taking place in on going fashions, and involving victims who claim to be targets of gang stalking / terror stalking /multi stalking, points directly towards some sick element in contemporary life.

The media pays no attention, and the United States, as a nation, and its government as well, point to human rights abuses around the world, yet there is an insidious crime called gang stalking, using slander and psychological terror to wreck lives and drive victims to their death, right here in North America.

Do these criminal enterprises have so much power that they have the federal level investigators at a loss as to how they can tackle it? Has the War on Terror, caused such a diversion of attention and energies for domestic law enforcement and the fed, so much that since 2001, this pernicious covert criminal activity, aimed at innocent people, could grow into a ‘lucrative enterprise‘, and skirt the authorities. Are there seemingly law abiding folk, the wealthy or well connected, that use gang stalking to eliminate enemies, targets of hate, or people they see as being a threat?


 

0 Comments:

Post a Comment

<< Home