Lindaland
  Global Unity
  vigilante stalking, harassment, mind control

Post New Topic  Post A Reply
profile | register | preferences | faq | search

UBBFriend: Email This Page to Someone! next newest topic | next oldest topic
Author Topic:   vigilante stalking, harassment, mind control
salome
unregistered
posted June 23, 2006 05:19 PM           Edit/Delete Message   Reply w/Quote
http://www.raven1.net/

relevant information.

be informed.

IP: Logged

salome
unregistered
posted June 23, 2006 05:22 PM           Edit/Delete Message   Reply w/Quote
what this site is about ~

Daily, unexplainable harassment. Break-ins at home, work, and car. Thefts and sabotage just below a cost where police will act. Vicious, well organized rumour campaigns. Destruction of reputation, career, and relationships. Unusual medical symptoms for which doctors find no cause. Well organized, very cleverly engineered 24/7 harassment by vigilante-style stalking gangs, activities of which are ignored and denied by all levels of government. These vigilante gangs are NETWORKED and moving to a different city does NOT stop the harassment.

Electronically induced sleep deprivation and PAIN.

This web site is about one type of the ongoing (and vigorously denied) government ignored or backed crimes. This crime can be called "gang stalking" or "vigilante gang stalking" and is sometimes accompanied by invasive, through-the-wall, zero trace evidence "electronic harassment."

These crimes probably grew out of historical operations such as MKULTRA, and COINTELPRO. The code names were dropped, but there is no evidence the activity ever stopped. The crime documented here is a literal covert war on citizens. This covert war operates like a cross between citizen vigilante style "criminal rehabilitation groups" and "contract revenge services" for the rich and powerful.

IP: Logged

salome
unregistered
posted June 23, 2006 06:12 PM           Edit/Delete Message   Reply w/Quote
from the site ~

Cover is being provided by official denial and ridicule, and psychiatrists assist, often claiming they are unaware of even the well-known MKULTRA atrocities. Once designated as a target, CONTROL is exercised over these facets of the harassment target's life:

* who your friends are, and in many cases whether you will have any friends at all

* how your relations with family will go

* how your relationships with business associates go

* what sort of jobs you will be allowed to hold, regardless of your qualifications, and for how long, and what the quality of your work will be

* how your health will fare, and in many cases if you will even be allowed good health

* whether or not you will be able to enjoy any of life's pleasures

* whether or not you will have any privacy at all

* how well you will be treated in stores and other places of public service

* how well your possessions will work and how long they will work without breakdowns

* how much sleep you will be allowed

* how long you, your children, and your pets will have between occurrences of bodily pain, fatigue, sleep deprivation

If you feel that citizens deserve to control the above areas of their own lives, and that the covert citizen vigilantes should be exposed and brought to justice, please stay a while and read the materials on this site.

Vigilante gang stalking with electronic harassment is ONE TILE in a much larger mosaic of government crimes...

IP: Logged

salome
unregistered
posted June 23, 2006 07:27 PM           Edit/Delete Message   Reply w/Quote
more corruption ~

http://www.raven1.net/othcrime.htm#CONCCAMPS

IP: Logged

Rainbow~
unregistered
posted June 23, 2006 10:03 PM           Edit/Delete Message   Reply w/Quote
Salome....

Thank you for posting these sites....

I haven't got the chance to read them yet...but I will.....

....and I think I'll not be shocked by any of it because I'm already aware of a lot of it....

TRANCE Formation of AMERICA a book written by Cathy O'Brien and Mark Phillips....

....REALLY OPENED MY EYES!!!

I'll be back to you, after I've read some of this stuff...

Thanks again...

IP: Logged

salome
unregistered
posted June 24, 2006 01:37 PM           Edit/Delete Message   Reply w/Quote
hi Rainbow ~

i found this site a number of years ago after learning of Cathy O'Brien from Gregory. I posted at the forums he had on their site after he re-designed and hosted it for them. His discussion on these matters at Conscious Evolution was so eye-opening for me.

i found some other forums on these subjects from this raven1 site also...they are heart-rending. the forum, message board that had so much good information about this was finally closed down. not surprising, i think they expected it...and i think it started up elsewhere, i shall look for it again soon.

i agree with some of the comments you've made about Gregory's death. i don't think it was as it appears. i think his activism in this area was a factor in what happened to him. if you'll recall, he also was having financial problems that were just flukes...so he overcame them, he was a consummate programmer, and even then, his efforts were sabotaged.

i think his final episode with his 'heart attack' was either the last effort in suppressing his voice, or he did what Linda Goodman hinted at what immortals do...

i choose the latter to believe...Gregory was brilliant and too smart to let this happen to him.

love and light to you Gregory, wherever you are...your shining heart lights the way for those who walk the path of love.

IP: Logged

salome
unregistered
posted June 24, 2006 02:50 PM           Edit/Delete Message   Reply w/Quote
One of the most perplexing aspects of multiple stalker harassment is the ease with which it can be disguised so as to appear no crime has been committed. It is extremely difficult to EXPLAIN this to people who have never been targetted by a stalking group. Here below are two very convincing examples provided by multi stalking target Deborah Spilko which we can all use when we are forced to justify our claims. THANK YOU, Deborah! Keep on passing us such excellent verbal ammunition!
--------------------------------------------------------------------------------

In multiple-party harassment, the offending actions of any one individual can became more and more subtle and difficult to name as specific incidents. Every one specific action is part of a coordinated whole.

The African-American high school student who goes to a racist all-white school might experience it this way: four students position themselves at points in the student's classroom route, each one uttering a syllable. One says, FUH, second says KING, next one says NI, next one says GRRR. Put together, these syllables say something very hurtful and destructive to that student.

In multiple-party harassment, the four may switch syllables, or they may have 40 white students taking turns each day saying these syllables over a two-week period. There is little that a principal or other investigator can do to discipline these students unless he is able to break the conspiracy, which may not happen. What is more likely is that it is the targeted student who will experience being disciplined - it is the targeted student who will lose control at some point, and unfortunately, that is the point that disciplinary action can be taken.

Let's say after three months of FU-KING-NI-GRRR he can't take it any longer and shoves the second guy. The principal asks him, "What is it that he said that upset you so?" The student tells him. The principal says, "Wait - You're telling me you shoved him because he called you King???" The student tells him "No, no, there is more to it than that." The principal tells the student he has anger issues, is imagining things, and the student, who has endured three months of multiple-party racial slurs with no recourse, is then given detention or other disciplinary action on top of it for not being able to handle his anger.

So the injustice here is that a victim of racial hatred then becomes a victim of the inability to understand why this multi-party harassment was able to make him lose control.

Here is another example. Imagine a female college student who has been raped by a really popular male student. The male student wore a purple shirt on the night of their "date." When the victim files charges, a lot of students express their support for the popular male by wearing purple shirts. They position themselves wherever she goes, by wearing the purple shirt. As a victim of a psychological trauma, the symbolism is not lost on her, and each time a purple-shirted student blocks her way or sits in front of her or follow her into the restroom she is reminded of her humiliation and violation. If it continues, she will either drop out or psychologically collapse. This is the power that the symbol has over her.

http://www.raven1.net/hidemulti.htm

IP: Logged

salome
unregistered
posted June 24, 2006 04:36 PM           Edit/Delete Message   Reply w/Quote
Gang stalking involves the use of multiple individuals to stalk, harass and taunt a victim, as well as to vandalize personal property. This can take place for many years, particularly since law enforcement and legislation have yet to catch up with the reality of organized stalking by groups.

Techniques of psychological warfare are used against the target in a methodical and well orchestrated attack that often leaves the target a victim of ridicule among his friends and family because this occurrence is so hard to believe. However, the number of targets are increasing to the point that they can network with one another and find out that the same tactics are used everywhere. These tactics are intended to weaken the target to the point of physical and psychological collapse.

The reasons why a person is initially targeted can vary. Sometimes the person may be a political activist. Others may have been in the wrong place at the wrong time. Corporations apparently have even been known to hire these stalking groups to silence people who were once in their employ. These stalking gangs may be lied to about the target, thinking that perhaps the person is a deviant who needs to be driven out of town. The reasons are only limited to the imagination. In some cases, according to David Lawson, author of Terrorist Stalking in America, the person has done nothing wrong but is simply used as a practice target or as an example to others in the group to show what can happen to them if they anger the group in some way. This serves to keep the members of these stalking groups tied to the group through intense fear of becoming a target. It is such a terrifying prospect because the gang members are intimately aware that the lives of the targets are utterly destroyed. (See FAQ for more information).

Many people ask, "Why would anyone engage in this kind of activity?". In order to answer that question, it's important to realize that the person who has decided to target an individual is not the person (or persons in this case) doing the stalking. This is known as "stalking by proxy". Those who have called "the hit" (so-to-speak) may be doing it for any number of reasons, including revenge, jealousy, or a desire to keep someone silent. It may be that physically harming a person is considered too extreme or too risky by the perpetrators. In fact, this kind of psychological attack can be a far more effective way to harm someone. It can completely destroy a person's life while leaving little or no evidence to incriminate the perpetrators.

Additionally, there are the reasons that the stalkers themselves engage in the activity, which have little or nothing to do with why the person may have been targeted in the first place. It is conceivable that the participants in the harassment don't even know why the person has been targeted, nor would most of these individuals have any personal stake in harassing the victim. But certain things are clear - this is an both an addictive behavior as well as a form of entertainment for the stalkers. From the expressions on the faces of some of the perpetrators who come face-to-face with their targets, there is a vicious kind of pleasure that they derive from bullying their victim. Clearly they like the feeling of being "in control".

Like our society's current obsession with "reality TV", this activity must inevitably gain popularity as the ultimate experience of "reality" entertainment. Such is the nature of the bottomless pit within the stalkers that thirsts, evermore, for greater and greater thrills. To the perpetrators, their targets are merely their prey, in a game that never ends. But make no mistake, whatever the reasoning behind it, this is a vicious and calculated hate crime.

--------------------------------------------------------------------------------
DESCRIPTION OF ACTIVITIES


The types of activities which take place are often subtle, and sometimes cannot be distinguished from normal everyday things that go wrong, but they typically occur much more frequently than they would normally. David Lawson points out in his book, Terrorist Stalking in America, that the victim is intentionally "sensitized" to the presence of the stalkers, so he or she will know that the occurences are orchestrated. This causes intense psychological strain due to the isolation and ridicule that results when the target tries to share these experiences with others. It is a psychological reign of terror intended to make a victim look crazy and intended to keep him or her in a constant state of anxiety and stress as to "what will happen next" (also known as "hyper-vigilance").

There was a 1944 movie called "Gaslight" about a husband trying to drive his wife crazy, from which the term "gaslighting" was derived. According to Slang City, "to gaslight someone is to drive them crazy by intentionally confusing them. It comes from the 1944 movie Gaslight, in which sweet heiress Ingrid Bergman marries creepy Charles Boyer, who hopes to get her inheritance by driving her insane. He convinces her she's seeing and hearing things that don't exist, including the gaslights (what they had before light bulbs) going on and off when he isn't home." The subtle techniques used to make the wife doubt her own sanity are similar to the techniques used by gang stalkers to unnerve a target. To see a summary by Eleanor White on the topic, click here.

For example, the perpetrators (who appear to frequently have access to their targets' homes) may sometimes come into the house while the target is out and move things around a little bit, or spread some dirt on the floor or on furniture, or move an item from the house to the car. But usually they won't cause enough damage to involve the Police. This shows that this activity is a psychological game of cat and mouse, and has little to do with any overt kind of damage that may be caused, such as burning someone's house down or stealing valuables.

In some cases, the target doesn't know s/he is being targeted. It just looks as though the world is full of very rude people, and everything s/he owns breaks constantly ("bad luck"). According to Lawson, the perpetrators don't need the target to know s/he is targeted in order to fill the need within themselves that they are in control.

See Terrorist Stalking in America for more information.

http://www.gangstalking.ca/advice.htm

IP: Logged

salome
unregistered
posted July 08, 2006 12:19 PM           Edit/Delete Message   Reply w/Quote
1996 was written by Gloria Naylor, who is a writer for theater, film and television and the author of novels which include The Women of Brewster Place (1983 National Book Award Winner), Mama Day and Bailey's Cafe. She also edited the anthology, Children of the Night: The Best Short Stories by Black Writers 1967 to the Present. Her novels now mark their twelfth language translation.
She has been distinguished with numerous honors including Senior Fellow, The Society for the Humanities, Cornell University; The President's Medal, Brooklyn College; and visiting professor, University of Kent, Canterbury, England.

Ms. Naylor has won Guggenheim and National Endowment for the Arts fellowships for her novels; for her screen writing, and she has been awarded the New York Foundation for the Arts Fellowship. In April of 1994, Bailey's Cafe enjoyed a successful run during its world premier at the Hartford Stage Company.

Tragically, like other victims of what I call "vigilante stalking and electronic harassment", Gloria's successful career encountered severe destructive, criminal interference, starting in 1996. Gloria uses the name "mind control" for this interference, often used by many targets.
One powerful goal of "VS/EH", as I abbreviate it, is indeed the control of the target's mind. Mind control is certainly not the full story, but if a reader does a search on the phrase "mind control", they will locate a great deal of information by and about the targets of vigilante stalking and electronic harassment.

The first thing some people considering reading 1996 may wonder is "What the heck IS vigilante stalking and electronic harassment? Or mind control? I've never heard of those things."

For more detailed information, rather than try to provide that here, I recommend some web sites which have been specifically set up to tell the story to people who are totally unaware. The wording of these sites has been pruned back so an unaware visitor is going to find matter of fact, plain language information, without being blasted by full technical details. These "VS/EH lite" sites have already been successful in persuading two groups which are the very hardest to persuade - targets' family members, and professionals - that they really do need to take our claims seriously:
http://www.c-a-t-c-h.ca
http://www.gangstalking.ca
http://www.multistalkervictims.org
http://www.eharassment.ca
http://www.Stop-Predatory-Gangstalking.net
http://wwww.StopHiTechVigilanteAssaults.org


[Site information as of January 17, 2006. Those sites link to others.]

For this review, let me summarize vigilante stalking and electronic harassment as a now tightly networked covert entity, organized and protected by high level public officials, which uses many 'operatives' to destroy a selected target's privacy, peace, quality of life, and ability to use their talents to earn a living. Stalking by many different operatives, intrusions into the target's home, car and workplace (while the target is away), and use of electronic technology to silently attack the target's mind and body through walls combine to turn a target's life into an inescapable nightmare.

Furthermore, the harassment is very carefully designed to make the target appear to be mentally ill if they complain to public officials or the medical establishment. This is done by using events which are a normal part of living, in rotation so no one event happens often enough that a casual observer will notice. The harassment events are repeated endlessly and exaggerated, just enough so that the target will notice.

You see, the target sees ALL of these "skits", while casual observers will only see the harassment occasionally. And of course, the casual observer does not experience, say, electronic sleep deprivation every single night for months, years, or decades.

The casual observer is also not a target of lies told to neighbours, co-workers, friends, and even family by these very well organized criminals. The lies often paint the target as some sort of criminal, hence, my use of the term vigilante.

This, reader, is why, if you have not been a target, you probably don't know about this current day nightmare known as vigilante stalking and electronic harassment. By the way, it is common for this VS/EH to continue for LIFE. It does not cease if you move, and that includes moving to other nations.

The book 1996, is Gloria Naylor's RESPONSE to a decade of targeting by multiple stalkers and through wall electronic technology. The book is a skilled writer's contribution to the fight to expose and stop these crimes. Gloria tells the story of 1996 - the year in which her nightmare started. Some of her material took place later, but a one year snapshot of a target's experience is sufficient to show what we endure. Following years just grind on with more of the same type of harassment, even though the exact harassment modes are rotated from some sort of "master menu", apparently to make it difficult for the target to convince others the harassment is real.

Gloria Naylor was faced with the problem of how to present her story, given that the cover up by public officials, and their almost seamless denial, make it impossible for targets to know very much about the operations. Gloria settled on a unique way to tell her story, and the end result is a very readable book. Here is how she describes 1996 in her own words:

"1996 is not a novel, nor is it non-fiction. It is a conflation [blend] of the two genres."
In other words, Gloria's own story is fact, and she uses her powers of observation and intellect to create very believable fictional characters, in the service of the U.S. National Security Agency, to show how these operations might well be organized and carried out.
As a target since 1980 myself, I found all of Gloria's suppositions about the covert operations quite plausible.

At this point, reader, you may be shaking your head and denying that public officials of the United States Government would ever be so corrupt as to carry out such extensive and expensive harassment programs. Without going in to detail here, I urge you to learn something about two examples of exactly such extensive and expensive government crime which took place from the 1950s to the 1970s: The CIA's MKULTRA programs, and the FBI's COINTELPRO operations. If you take a close look, you will find the false media spin on MKULTRA, that it involved a few unwitting adults getting LSD in their drinks, doesn't even scratch the surface. (The real MKULTRA rivalled the Nazi medical experiments in terms of atrocity.)

MKULTRA-era programs included the development of electronic anti-mind and anti-body weapons of just the sort which Gloria Naylor describes. I'm now a retired engineer and have been a ham radio operator for half a century, and I assure you, reader, that most of what Gloria Naylor describes can be done using technologies which are now available, are not secret, and can be had by anyone with an upper middle class income. And the technology which isn't yet in the public domain has been publicly hinted at by U.S. Government agencies which oversee scientific research.

Gloria's book itself should provide targets of vigilante stalking and electronic harassment with a not too long (126 pages of story, the rest being appendices) and easy reading story which can be used to explain to reluctant family members, friends, (and hopefully even medical and public officials) what we targets are going through. The fact that Gloria is an accomplished author certainly won't hurt!

In 1996, Gloria had reached the stage in her profession where she could just afford "a summer place" on one of the Sea Islands along the coast of South Carolina. This is a great stage in anyone's life. I wondered, as I read the book, what Gloria may have done to "deserve" her submission to the covert harassment establishment, which is the typical covert harassment establishment characteristic of dictatorships. I can't help thinking that her gifts as a writer, being black and being a woman might have been enough to trigger jealousy. Many of the targets who keep in touch simply don't know why our names were submitted to the torturers.

She relates a "problem neighbour" who had cats who wandered into Gloria's yard and made messes in her garden. Could this have started it all? As a 26-year veteran target, I can't be sure - this problem neighbour could have been a designated perpetrator, recruited before Gloria moved there to enjoy the warm season of 1996. VS/EH perpetrators do that - frequently, they have already been recruited and are ready to start their particular harassment assignment the day we move to a new location.

On the fiction side of 1996, you will see how her problem neighbour has ties to the U.S. National Security Agency. Quite plausible. Although the CIA and FBI were the historical agencies using VS/EH tactics, there is no principle of physics or politics that says the NSA couldn't be the source of her torment.

Also on the fiction side, Gloria postulates that, as her harassment unfolds, people involved in her harassment are given several different versions of the "awful truth" about her. This is borne out by small bits and pieces of information our on line membership of several hundred targets are able to glean once in a great while. We are accused of things like we are criminals, drug users, drug dealers, prostitutes, or child sex abusers. This readily allows the supervisors to recruit ordinary citizens to make life Hell for the target.

One book which provides a rare look behind the scenes at the community level harassment "corps" is private investigator David Lawson's 2001 book titled "Terrorist Stalking in America". Local "do good" organizations make excellent harasser recruiting agencies, and Gloria speculates that one such group was a factor in her first year as a target.

When an author acquires a summer place, and intends to continue writing, the peace and quiet of a rural spot are highly valued. Can you guess, reader, what one of the first (and most consistent) forms of harassment a target might likely notice at the beginning?

Gloria describes her local street perps very well. Here is a sample paragraph:

"They are young and old, Jew and gentile, black and white, and brown and yellow. ... Some are in it for a cause, others for the money. They walk when they're told to walk, sit where they're told to sit, and follow when they're told to follow. Above all, they drive when they're told to drive. ... Most don't notice the lone black woman walking down [the street], and for the few who do, it doesn't register. Most don't question what all this means, and for the few who have the courage to ask, they're told, in so many words, to mind their business and just do what they've signed up to do. They're part of a puzzle that's overseen by greater minds than theirs. And there is always someone to replace them if they're unhappy. Of those few who have the courage to ask, most stay."
As a veteran target, I can tell you that we do indeed see quite a few "just following orders" perpetrators. However, as with other characters on the fictional side of 1996, we do also see quite a few very sick harassers who clearly enjoy their "work."
During the year 1996, Gloria was forced to cut her potentially long (due to her summer place being in South Carolina and with direct exposure to the Gulf Stream) summer short, due to the harassment. In my 26 years as a target, I have noticed that many things, such as sleep (when allowed at all), or a good meal, or a satisfying walk in the woods or piece of creative work are often "cut short" by some sort of pronounced upsurge in harassment. A pattern that happens over and over, endlessly, as one harassment crew is rotated in to our location, and another goes on to another target. One of our members, Patricia Mougey of Toledo Ohio, lives in a close-spaced neighbourhood of detached housing, and being retired, she sees and hears a great deal of what the perpetrators do, and even some of their interaction with each other. In her 40+ years of this harassment, she has seen clearly that harassment crews definitely rotate. And each crew has trainees.

Back in her brownstone home in New York City, Gloria encountered a new, very common horror, something the United States Army calls "voice to skull". The Army's acronym, from their on line thesaurus, is "V2K" for this technology. Voice to skull has been unclassifed and available to anyone who could hire a microwave engineer to assemble a voice to skull transmitter since 1974. It is simply an enhancement to the phenomenon discovered in World War II in which radar technicians who stood in line with moderately powerful radar dishes heard the train of microwave pulses as a buzz in their heads. No implants are required for "V2K" to work.

Gloria then encountered a further technology which IS secret at the moment, the ability to read minds through walls, electronically. When we think things silently to ourselves, as words, even though our vocal muscles don't form audible words, there are enough tiny electric currents sent to the vocal cords that these can be picked up by electronic equipment. One practical use for this "mind reading" technology was announced in 2004 as being a research project by NASA for use in detecting "terrorists" at airports.

The proposed equipment was an array of pickups which each air passenger would momentarily stand under, providing the equipment with a short sampling of the magnetic fields given off by the brain's electric currents. Computers would then convert those magnetic signals into signs of criminal intent. Further conversion into words has been discussed seriously, but at this moment, we don't have a documented unclassified piece of equipment we can point to as being able to do that.

But after all, conversion of a collection of waveforms into words is exactly what "you talk - it types" software does every day.

Following the mainstream news stories about this equipment, the media suddenly fell silent and have remained silent. Some of us who are targets have had thought reading demonstrated on us. The way this is done is by setting up a harassment event which could only have been anticipated if the perpetrators had actually read our thoughts.

One quick example of a demonstration I experienced was when I ordered 16 topographic maps of various locations in New England. As I pondered which ones to order, I thought about some of the quadrangles, but rejected them. My written order was absolutely perfect - the 16 I had chosen were numbered and named correctly.

When the order arrived, three of the 16 maps were not the ones I had ordered. But ALL of the three were chosen from the few I had thought about then rejected. ALL three. These maps were not adjacent to each other in the indexes, so this was not a simple order picking error. Interpret that as you choose; that plus other demonstrations, plus the NASA mind reading announcements in the media, have me convinced.

Gloria shared a very interesting twist of the non-fiction side of her story during this telephone conference with our membership. Logically, some targets of electronic harassment, given that transmitting voice through walls into the skull of a target does mimic mental illness, will opt to see a psychiatrist. Gloria did this, and predictably, was placed on anti-psychotic medication. After waiting for the medication to work, which it did not (as in all targets' medication trials), the psychiatrist actually revealed to Gloria that he knew about this harassment crime syndrome, yet did not tell her.

His excuse was that he needed to see if the medication would stop the voice to skull, so he would have a dependable way to see if Gloria was either truly mentally ill, or a target. I tend to suspect that there are other doctors who also know quite well about this modern day "extra-judicial corrections system" but don't let on about it, causing our members untold grief, not to mention expense! I won't speculate here about their motives.

In this review, I haven't said much about the actual text written by Gloria Naylor. I guess that's because to me, the significance of this book is not it's excellent literary value, but that it is published at all! Since 2001 we have only had David Lawson's Terrorist Stalking in America as "artillery support" for our fight, now we have what I consider a second "big gun" on the firing line!

GOD BLESS AND KEEP YOU WELL AND STRONG, GLORIA NAYLOR! (Ditto, Third World Press!)

IP: Logged

salome
unregistered
posted July 08, 2006 12:30 PM           Edit/Delete Message   Reply w/Quote
Mind Control Message Board

IP: Logged

DayDreamer
unregistered
posted July 08, 2006 12:36 PM           Edit/Delete Message   Reply w/Quote
Ive read through some of this...

And . I'd like to think I have the will to overcome any attempts at mind control...but really the best thing any of us small people have right now...

GOD BLESS AND KEEP YOU WELL AND STRONG

IP: Logged

lotusheartone
unregistered
posted July 08, 2006 12:41 PM           Edit/Delete Message   Reply w/Quote
Be Strong in the LOve and LIght of GOD. ...

IP: Logged

salome
unregistered
posted July 08, 2006 01:19 PM           Edit/Delete Message   Reply w/Quote

thanks for reading through this.

IP: Logged

salome
unregistered
posted July 08, 2006 05:41 PM           Edit/Delete Message   Reply w/Quote
Timmy McVeigh Was Telling the Truth!
It's Not Your Father's Mind Control Technology
by Kathy Kasten

--------------------------------------------------------------------------------
** Kathy Kasten is a researcher and targetted individual living in Los Angeles, on the staff at the University of California, Los Angeles. Four years as Staff Liaison to the Human Subject Protection Committee/Institution Review Board developed an awareness of worldwide need for human subject protection policies.
--------------------------------------------------------------------------------

When those of us who have been researching and investigating rumors of microchip implants for the last 10 years heard that Timothy McVeigh was claiming to have been implanted by the U.S. Army, we could only nod our heads.(1) The mainstream could barely contain their laughter at McVeigh's allegations of being implanted by the military. They pretended he was another "lone gunman."

However, many researchers knew that it was not above our government to use unwitting American citizens in "field testing." There had been reports from private citizens since the 1940s of the implantation of humans.(2) The only thing we could add to McVeigh's statement was that before the microchips were implanted by the military in soldiers it was suspected that there were many years of covert testing in an unwitting human subjects. In recent years, government documentation has been released showing past and present atrocities committed by the U.S. government and its contracted private corporations funded by public monies. These documents show a pattern of utilizing unwitting citizens in covert "field testing."

The possible proof that McVeigh was speaking the truth is suggested in public documents. A document which proves that the military is quite familiar with microchip implantation in human subjects is pointedly referred to in the U.S. Air Force's 2025 Research Paper(3), quoted as follows:

"Chapter 4-1: "IIC

The IIC is a constellation of integration or "smart" satellites that receives all-source information. Within the IIC, resident intelligent software will run decision support tools, correlate and fuse data into useful information, identify inconsistencies and information gaps, and task collectors to seek data to fill information gaps.

Implanted Microscopic Chip

The implanted microscopic brain chip110 performs two functions. First, it links the individual to the IIC, creating a seamless interface between the user and the information resources (in-time collection data and archival databases). In essence, the chip relays the processed information from the IIC to the user. Second, the chip creates a computer-generated mental visualization based upon the user's request. The visualization encompasses the individual and allows the user to place himself into the selected battlespace."

Do not be fooled by its forward-looking statement. That statement would not be made if the technology were not already in place. Remember the above statements as we put the pieces together to show control of individual via electronic harassment. The following statement from the same source more directly relates to McVeigh and other soldiers whom I have heard from during my investigations:

"Ethical and Public Relations Issues. Implanting "things" in people raises ethical and public relations issues. While these concerns may be founded on today's thinking, in 2025 they may not be as alarming. We already are evolving toward technology implanting. For example, the military currently requires its members to receive mandatory injections of biological organisms (i.e., the flu shot). In the civilian world, people receive mechanical hearts and other organs. Society has come to accept most of these implants as a fact of life. By 2025 it is possible medical technology will have nerve chips that allow amputees to control artificial limbs or eye chips that allow the blind to see. The civilian populace will likely accept an implanted microscopic chips that allow military members to defend vital national interests. Further, the US military will continue to be a volunteer force that will freely accept the chip because it is a tool to control technology and not as a tool to control the human."

I hardly know what to make of that last sentence. After all the reassurance that microchip implantation is good for you, why make statements about controlling humans? Could the authors be anticipating that some readers might think the microchip would be utilized for human mind control; i.e. readers who are knowledgeable enough to know that the brain cortex needs to be accessed/controlled in order to control the physical part of the human? There is no way to separate physical control from mind control. Such powerful technology that can control humans invites misuse; pushing the envelope to see what will work. (Perhaps, creating the perfect crime using a "patsy"?)

For those still doubting that this type of mind control technology (which utilizes a radio frequency called microwave) is just science fiction, an announcement was made on a mainstream public radio station that the Los Angeles Police Department, just before New Year's - in December, 1999, had purchased equipment from a company called WesCam. From the WesCam website we read the following:

"In use by most of the biggest names in broadcasting in the U.S. and abroad, the PRO-300 has become the industry standard in long range, microwave receive systems for reliable, continuous, high quality reception of video and audio transmissions. The antenna is typically installed on a tower or rooftop at a location selected for best continuous line-of-sight coverage to the potential transmitting sites (terrestrial and / or airborne). The equipment rack containing the microwave receiver and controller can be located up to 1,500 feet away, and the control location can be situated just about anywhere to which video, audio and data links can be established.

Related TouchStar options now available include integrated searchable maps (dependant on location), networked Master Controllers, on screen Real Time Video window, remote access modems enabling a remote diagnostics capability, integrated single or multiple ground camera control, and remote switcher control."

These advertising statements mean that there is now a link between satellites, ground control and covert accessing of humans. As alluded to by the U.S.A.F. 2025 report, the American public is being utilized in "field testing" with the clear prospect of collecting data on the targeted individual. What is more important is that the Los Angeles Police Department, along with other major cities' police departments, has been declared an arm of the Department of Justice.

I have personal knowledge of this fact. How that happened had nothing to do with the war on drugs. Briefly, it was alleged that I was jaywalking. I was not carrying any identification on my person. Therefore, I was detained by the University of California-Los Angeles Campus Police and taken to their campus headquarters. After being kept in a holding cell, I was photographed and fingerprinted. When asked where this material was going to be filed, I was told that it would be sent to the Department of Justice. And, yes, there is now a law on the books that individuals must carry identification at all times. Originally, this law applied only to drivers of vehicles. Apparently, the law is being stretch to cover pedestrians walking on the sidewalks. Unbelievable? If someone had told me such an incident was possible, I would have not believed it.

We have President Ronald Reagan to thank for the fact that local police departments are now arms of the federal government. This includes university campus officers. Just to make sure that Reagan's executive order was clear to everybody in law enforcement, the U.S. Code was "updated" recently. (U.S. Code Annotated Title 10, Sect. 124.)

To help local law enforcement stay abreast of the activities of the American public, just in case citizens were doing drugs or something else that might be illegal, monies were allocated to allow those units to carry out the U.S. Code for the Department of Justice. The following is from the WesCam website(4), which describes a tracking unit mounted on a helicopter, used no doubt to watch everybody and anybody without a search warrant, wiretap, or any messy legal stuff:

"The SKYPOD V airborne microwave system is the next generation of long range airborne video microwave transmission and relay systems from WesCam, providing reliable, continuous, high quality video and audio signals in real time to fixed or mobile ground receive sites. The system includes an externally mounted antenna pod integrated with its own microwave transmitter, receiver, channel filter and up to three separate antennas: an autotracking directional high gain antenna (using GPS and aircraft heading sensors for tracking control), an omnidirectional antenna and a downlooking antenna. This configuration provides maximum operational flexibility while still maintaining optimum signal quality for superior image transmission. Antenna selection is performed remotely from the operator position inside the aircraft. Each antenna can be configured for simplex or duplex operation, allowing the system to also be operated as an airborne microwave repeater."

The announcement declaring that the Los Angeles Police Department would be watching Los Angelenos using WesCam technology was mentioned only once on a major public radio station in Los Angeles, presumably to meet the U.S. Code that requires local officials to make a public announcement before using the public in "field testing." Section 1805 of Title 50 of the U.S. Code (5) reads as follows:

"(f) Testing of electronic equipment; discovering unauthorized electronic surveillance; training of intelligence personnel. Notwithstanding any other provision of this subchapter, officers, employees, or agents of the United States are authorized in the normal course of their official duties to conduct electronic surveillance not targeted against the communications of any particular person or persons, under procedures approved by the Attorney General, solely to - (1) test the capability of electronic equipment, if - (A) it is not reasonable to obtain the consent of the persons incidentally subjected to the surveillance; (B) the test is limited in extent and duration to that necessary to determine the capability of the equipment; (C) the contents of any communication acquired are retained and used only for the purpose of determining the capability of the equipment, are disclosed only to test personnel, and are destroyed before or immediately upon completion of the test; and: (D) Provided, That the test may exceed ninety days only with the prior approval of the Attorney General; (2) determine the existence and capability of electronic surveillance equipment being used by persons not authorized to conduct electronic surveillance, if - (A) it is not reasonable to obtain the consent of persons incidentally subjected to the surveillance; (B) such electronic surveillance is limited in extent and duration to that necessary to determine the existence and capability of such equipment; and (C) any information acquired by such surveillance is used only to enforce chapter 119 of title 18, or section 605 of title 47, or to protect information from unauthorized surveillance; or (3) train intelligence personnel in the use of electronic surveillance equipment, if - (A) it is not reasonable to - (i) obtain the consent of the persons incidentally subjected to the surveillance; (ii) train persons in the course of surveillances otherwise authorized by this subchapter; or (iii) train persons in the use of such equipment without engaging in electronic surveillance; (B) such electronic surveillance is limited in extent and duration to that necessary to train the personnel in the use of the equipment; and (C) no contents of any communication acquired are retained or disseminated for any purpose, but are destroyed as soon as reasonably possible."

Notice the statement "if consent cannot be obtained," and the statement that electronic technology will be used only for the purposes of "testing." If it is just a test, why is there a problem with obtaining consent? How about the statement that nothing will be done with the information gathered from "testing"? Are you reassured by these paragraphs in the U.S. Code? I understand this: There is a group of people claiming they are/have been under electronic surveillance/harassment. Are these people classified as guinea pigs for government field testing, or perhaps even as terrorists? If individuals are classified as "terrorists" (whether they truly or not), this means that they can be targeted in any way shape or form, because they are enemies of the state. Therefore, is it okay to do whatever - torture, harass, etc. using microwave technology - in the name of "field testing"? Is the American public so fearful of possible crimes that they would give up all their privacy?

WesCam is microwave technology that can "access," listen in on conversations, using RF/microwave radiating through walls at a distance. The dome-like shell surrounding the equipment is shown on their website. The device is mounted on the roofs of vans, the roofs of police stations, and on the undercarriage of helicopters. Be sure to watch for this equipment coming to a neighborhood near you. A fellow researcher sent me a list of 20 outlets for the WesCam in the Los Angeles area. That means your next door neighbor can, and probably some of them will, own this equipment.

Along with WesCam, there is a company called Millivision that sells "infrared" equipment which it claims can "see" through walls. The Millivision website(6) states the following:

"Millimeter wave technology offers the opportunity for developing a new generation of security and safety products. Millimeter waves can pass through walls, clothing, and packaging to detect hidden people and objects. Not limited to metal, millimeter-wave-based systems allow the detection of ceramic weapons, plastic explosives, drugs, and other contraband. Millivision is developing a line of passive millimeter wave security products that are: Non-invasive: Passive systems use only the natural radiation present in the scene. Safe: Using no man-made radiation ensures complete safety for subjects, operators, and bystanders. Difficult to countermeasure: Inanimate objects emit different radiation signatures than living beings, making attempts to disguise contraband ineffective. Effective: Advanced imaging software overcomes resolution and visualization limitations.

Millivision's line of passive millimeter wave security products currently in development are: Surveillance camera - overt or covert monitoring and contraband detection in interior or exterior spaces; Gateway scanner - contraband and concealed weapons detection for secure portals; Handheld scanner - portable contraband and concealed weapons detection."

Feel safer now that Millivision devices are on the scene? Wondering whether that passing van is scanning your house? Do you think this will not happen because you think you have nothing to hide? Think again.

The Los Angeles Airport claims it owns one of theses devices. Checking individuals to see if they are . . . what, carrying guns after going through the metal detector? After news of this device was published in the Los Angeles Times, people were concerned that the device was being used to see through women's clothes - just for the fun of it. As a matter of fact, a recent TV news program discovered that airport security personnel do single out Los Angeles African American women traveling alone for questioning in a special room at the Los Angeles Airport. There was concern that this was the room were the Millivision device was located. The suspicion was confirmed by Los Angeles Airport Security with the promise it will never happen again.

Just recently, in the mainstream press, there was public outrage over a satellite system called "Echelon." The sinister nature of this satellite has produced a group called "Echelon Watch" run by the ACLU.(7) This satellite system has generated hearings in Western governments by legislators who want to know Echelon's capabilities, as well as how to stop it from spying without regard to national boundaries or nationality of targeted individuals. But long before there was Echelon there was the National Reconnaissance Organization's (NRO) Rhyolite satellite system.(8) This was part of a group of satellite technologies referred to as ferrets, designed for electronic surveillance. All of the world powers have had satellite spy systems since the early 1960s.

In February of 1997, the New York Times published an article by William Broad called "Private Ventures Hope for Profits on Spy Satellites," ("Privacy is seen as Issue; Images Can Show Warships or Hot Tubs, Halting a Long Government Monopoly"). The article informed readers that a new policy allowed them to request satellite images and pay for them with a credit card. It was claimed by federal officials that "the risks and benefits were carefully weighed before the 1994 decision and that economic gains will offset military or diplomatic losses." A vibrant economy, they say, is "one of the most important elements of national security." Does the preceding statement anticipate the trading of satellite technology with the Chinese? With the claim that so-called "leaks" of this technology "bring about a new age of peacefulness"? Or, the more realistic stance that this technology will allow accessing any individual anywhere on Earth.

Because of the interest in espionage from space, ultra long distance high altitude accessing optics were developed and installed in satellites. The most recent public access satellite company is IKONOS(9). The one-meter resolution black-and-white image of Washington, D.C., collected by Space Imaging's IKONOS satellite, has unprecedented clarity and detail for commercial space imagery. As the IKONOS web site sales pitch goes: "The potential uses for IKONOS imagery are vast and we have just begun to scratch the surface," said Copple. "The value of this new source of information will create a demand like we've never seen before for imagery of the Earth." So, if you have the money, this company will spy for you. This technology can search for the target, capture their images and relay the image to a ground base in real time. Please be aware that this is merely the latest technology that has been allowed to go public.

Let's recap: The technology has been around since the early 60s which transmits and receives imagery from space; human implantable transmitters/receivers have been in development since the 50s; and experimental "field testing" using its tax-paying citizens has been a regular activity of the U.S. Government - and the British and Russian governments. How do we directly link the above technology to a targeted individual (TI) on the ground, esp. since so far no "smoking gun" document has been found? And, how is it possible to manipulate the TI physically and access the human mind to implant ideas/commands? Let's start with a brief history of telemetry and monitoring of humans. The following quotes by Dean C. Jutter are from Engineering in Medicine and Biology, dated March 1983(10):

"In 1903 Einthoven transmitted electrocardiogram voltage over Leiden Telephone System wires about a mile to a string galvanometer. In 1921 Winters transmitted heart sounds over a marine radio link as a demonstration for ships without a physician. External transmitters of various signals evolved as electronic methods evolved to produce smaller transmitters. Later, several groups inserted small coils and electrodes into the skulls of animals so alternating currents could be induced for a primitive form of telestimulation.

Stuart Mackay was in biotelemetry from the very beginning and gives us a glimpse of the early developments and evolution of the field. Dr. Mackay's message is replete with examples and applications to an impressively wide variety of animal species. Miniature and micropower are two cornerstones of modern biotelemetry design and construction. Improvements in these areas have closely paralleled the evolution of semiconductor and microcircuit technologies. He has been involved with reliable, stable integrated sensors and biotelemeters on microcircuit designs and implementations in recent years. The works is truly state-of-the-art.

Eli Fromm has provided an example of a "poor man's" hybrid biotelemeter to illustrate that some rather sophisticated circuit operations can be done on a low budget and without extensive microcircuit capabilities. His comments focus on a design for a two channel, FM-FM formatted implanted biotelemeter for multiple channel monitoring using resistance type transducers. Biomedical telemetry like many other things began as a "laboratory curiosity" but has evolved to a useful, reliable tool for data gathering. It has become an important, often complex, part of physiologic monitoring, but it also can be exciting and a lot of fun."

The scientists who worked on this study, I am sure thought their research would be utilized for the highest and most ethical purposes. Jutter's paper was published in 1983; however, it probably took 5 years to reach publication. The following paragraph from this previously cited paper provides a clue as to how many years this technology had been in development/research:

"The transmission of signals from within a subject was a technique that evolved slowly. On July 2, 1952 William Shockley and Bell Labs sent me [Dr. Jutter] four experimental point-contact transistors, which were difficult to power in a small package. (Junction transistors were only available for military use.) Thus, another approach was developed to provide for the totally passive transmission of information. Figure 2 is taken from Markevitch's 1954 undergraduate research report. The tuned circuit could be placed in the mouth and its frequency monitored from outside the face by the grid-dip meter. Thus the circuits tested by Markevitch showed that signals could be transmitted through the tissues of the body from quite small coils placed within the body."

The closing paragraphs of the journal article discuss implants:

"Implantable transducers. With this type of package, the biomaterial must meet two basic requirements. First, it must protect the device from the influx of body fluids; second, it should provide minimal interference with the transduction of the desired signal. In packaging most biomedical transducers, an insulating conformal layer is deposited onto the device - in particular, over electrically conductive and potentially corrosive areas. The material (usually an adhesive rubber or resin) provides a thin, but tough, film capable of guarding against environmental effects. Also, foreign material or bacteria may remain on objects if the parts are not adequately cleaned beforehand.

A minimal weight is required for any implantable package. The pressure (amplitude, duration, etc), produced by the implant on the surrounding tissue may alter the blood circulation at the implant site, possibly affecting tissue reaction. One reason titanium is used commonly as an implantable metal is because it possesses a low specific gravity and an excellent strength-to-weight ratio compared to other metals such as tantalum, tungsten, and stainless steel. Blunt corners and sharp edges should be eliminated because they irritate tissues locally. A streamlined contour is desirable. Implant location and implant technique also influences the local reaction at the site."

The article also provides a chart with "Biomedical frequency allocation in the United States for Research and Patient Monitoring." The following citation from this 1981 report by the US electronic research provides details of the types of implants that were available for study in 1981(11):

"Microelectronics has made possible immensely complicated feed-back and logic controls, so consequently the current difficulties lie primarily in the detecting and sensing aspect of the system. . . . . There are reports in the literature regarding the development of other prosthetic devices such as pain suppressors, urological controllers, blood sugar measurement for diabetic control, auditory prosthesis and intracranial pressure measurement. This is not a complete list of devices currently being developed, but merely an indication of the wide variety of prostheses that will be available in the future. . . . . Telemetry systems with multiple sensor inputs, but with a single radiofrequency transmitter link are also available. The sophisticated microelectronics currently available makes the electrical amplification and signal condition relatively easy."

The above citations provide documentation that the specific knowledge and technology for accessing various physical systems in humans has been available for many years. What about accessing a human mind to manipulate it? Dr. Jose Delgado was the first publicly recognized scientist to implant an animal and manipulate it from a distance. Based on Dr. Delgado's work, other research scientists came later. For example, the following is from a paper discussing manipulation of human emotions by researchers in 1978 at the University of California-Los Angeles (12) possibly utilizing, in addition to patients, volunteers from the Reed Brain Institute's Sleep Lab:

"Electrical stimulation of the human brain may evoke reports by patients of a wide variety of simple and complex sensations, emotions, and cognitions. These mental phenomena have been primarily considered in relation to the localization of function within the human brain. Penfield, in his pioneering studies describing the mental phenomena evoked by stimulation of the human temporal lobe, interpreted these evoked phenomena in a manner analogous to those evoked by specific sensory cortex stimulation. Penfield found, and others have confirmed, that the most common categories of mental phenomena evoked by temporal by stimulation include complex hallucinations. When discussing the hallucinations, which he considered to be memories, Penfield labeled the temporal cortex "memory records" (Penfield and Jasper, 1954, p. 145). When considering the deja vu other misinterpretations of present sensations, Penfield (1958) referred to this cortex as "perceptual" in analogy to "visual" or "motor" cortex, because stimulation there evoked "psychical responses" corresponding to the visual sensations or movements evoked by stimulation of the specific cortices."

The closing paragraphs of the above article suggest that, if required, emotional phenomena can be stimulated by directly accessing the temporal lobe electronically. As this paper states:

"Most of the mental phenomena reported by our patients during temporal lobe stimulation could be categorized as a hallucinated image or scene, an emotion, usually fear or anxiety, a visceral sensation, usually epigastrice, or an informed sensory sensation (visual, auditory, or somesthetic).

Of 3495 stimulations of the medial temporal lobe of 36 psychomotor epileptics, 266 were accompanied by reports of mental phenomena, including hallucinations of complete scenes, deja vu, anxiety, visceral sensations, amnesia, and uniformed sensory experiences. Olfactory and frankly aggressive responses were not observed. Our findings suggest that, in contrast to the primary visual or somatosensory areas, where the evoked mental phenomena are highly predictable and are closely related to the anatomical site, the mental phenomena evoked by medial temporal lobe stimulation are idiosyncratic and variable, and are related to the personality of the patient stimulated."

In light of the research cited above, it is possible to explain remotely controlled hallucinations or synthetic scenarios referred to as virtual realities. But, how can a targeted individual hear "voices" from external sources? Over the years, even though it appears the research went "black" in the early 1980s, information has come forward, usually in academic journals. One of the breakthrough papers, authored in 1962 (13) by Allan H. Frey, entitled "Human Auditory System Response to Modulated Electromagnetic Energy," is the link. This was the breakthrough. It must have been like watching movies for the first time. People made of light moving across a wall. . . Only this time, people in a laboratory could "hear" without a radio/transmitter. What they heard at first was only clicks and buzzes. The operator controlled the clicks and buzzes. Dr. Frey had figured out how microwave signals created sound in the head of a target.

In 1975, Dr. Don R. Justesen published a paper in the American Psychologist called "Microwaves and Behavior."(14) This is the only journal article mentioning an experiment by Dr. Joseph C. Sharp. Dr. Sharp does not seem to have published the results of his experiment anywhere. Or, maybe, he requested not to. Following is the quote from Justesen's paper regarding the experiment:

"Sharp and Grove (note 2) found that appropriate modulation of microwave energy can result in "wireless" and "receiverless" communication of speech. They recorded by voice on tape each of the single-syllable words for digits between 1 and 10. The electrical sine-wave analogs of each word were then processed so that each time a sine wave crossed zero reference in the negative direction, a brief pulse of microwave energy was triggered. By radiating themselves with these "voice modulated" microwaves, Sharp and Grove were readily able to hear, identify, and distinguish among the 9 words. The sounds heard were not unlike those emitted by persons with artificial larynxes."

The research results discussed in Sharp's paper prove that the human being has had the capacity for many years to receive audible signals without being implanted. It should be apparent that humanity has had both the technology and the will to manipulate each other remotely. Information about the possibility of mind control has surfaced with regularity every few years. Yet, there is no public outcry en masse of the incredible invasion of privacy, and emotional and physical manipulation of everybody on the planet. In the next installment we will look at the possible reasons why there is no angry public demanding an end to this technology.
http://www.raven1.net/kkarticl.htm

IP: Logged

salome
unregistered
posted July 08, 2006 05:44 PM           Edit/Delete Message   Reply w/Quote
PREDATORY GANGSTALKING

"Predatory Gangstalking is a criminal phenomenon referring to a group of loosely affiliated people who, in an organized and systematic manner, relentlessly invade all areas of an individual’s life on a continuing basis, as part of their lifestyle. While each individual gangstalker does his or her small part, what defines Predatory Gangstalking is the collective intent to do harm." R.B.Ross c 2005
Tactics of Predatory Gangstalking include highly coordinated surveillance, harassment, and psychological, psychosocial, financial, and sometimes physical assaults on an individual by a large group of people who are often strangers to the targeted individual.
A Predatory Gangstalking group is a well-run organization comprised of members who are unidentified as gangstalkers to the outside world. Until a group of gangstalkers turn their face towards someone selected to be one of their targets, members of society do not realize there is such an invisible group. The practitioners of predatory gangstalking are people who, for the most part, go about their business of daily life appearing like everyone else, except for their activities involved with Predatory Gangstalking. Predatory gangstalking activities
take priority over everything else in the lives of Predatory Gangstalkers. Predatory gangstalking is actually a lifestyle for those who participate in it.
Predatory Gangstalking is also called “terror stalking”, “gangstalking”, “flash mobbing”, “cause stalking,” “hate stalking,” “multi-stalking, “happy slapping,” “workplace bullying, and "covert war."
• “Flash mobbing” is an event occurring when a targeted individual is spotted in society. Their photo and location is immediately and simultaneously sent out by cell phone text messages and Internet email to all gangstalkers within a certain
radius. All gangstalkers then suddenly descend upon the target as a mob.
• “Cause stalking” refers to gangstalking by single-issue radicals. They stalk a target related to that specific agenda. “Cause stalking” has been reported to have been carried out by radical Christians who believe in “dominion theology.”
Dominion Theology is a religious interpretation of the Bible which these groups believe requires them to “take dominion over the earth” which they believe is the precursor to the return of Jesus to earth. “Cause stalkers” in general believe that they are bringing about social change through gangstalking activities.
“Cause stalking” can be carried out by White Supremacist as a form of “Hate Stalking.” This type of predatory gangstalking is primarily for the purpose of intimidation and often is a precursor to or an adjunct to violence.
• “Happy slapping” refers to group harassment of one youth by other youths carried live over cell phones equipped to handle video to peers youths. The young gangstalkers slap around the targeted youth while laughing at him or her while several other youths broadcast the incident live to as many peers as possible.
• “Ritual Gangstalking” is reportedly performed by cults and secret organizations such as Satanists and Scientologists as a means of control or for punishment. “Ritual abuse” is incorporated into “ritual gangstalking” patterns in this case.
• "Workplace bullying” involves gangstalking activities tailored to the workplace
which are carried out by a group of employees against another individual employee.
* "Cybergangstalking" is a situation where an individual is identified to be a target through Internet participation and their personal identity is determined. Cybergangstalkers pierce the electronic veil and are able to enter into the real life of a person, creating all forms of harassment, theft, psychological operations including slander and libel, and able to commit crimes against the targeted individual.
* "Vigilante Stalking, Terror Stalking" is the same as Predatory Stalking.
For the purpose of this informational writing, all activities will be referred to as “predatory gangstalking” because the tactics and characteristics of the gangstalking are the same.
“Predatory Gangstalking” is a criminal phenomenon referring to a group of loosely affiliated people who, in an organized and systematic manner, relentlessly invade an individual’s life on a continuous basis, to an extreme degree, as part of their lifestyle. While each individual gangstalker does his or her small part, what defines Predatory Gangstalking is the collective intent to
do harm." R.B. Ross
Predatory Gangstalking is reported by historians to have been originally developed by social scientists and psychologists in communist and fascist’s countries as a means of control of individuals within those societies. The tactics and techniques of Predatory Gangstalking were developed through animal and then human experimentation. The methodology of Predatory Gangstalking is precise and well-orchestrated. It is reported that the technical mechanics for Predatory Gangstalking were first sold on the Black Market by the ruling party leaders of East Germany when the USSR political systems crumbled. These
protocols were subsequently exported to other countries and implemented there against unsuspecting citizens. Predatory Gangstalking has been reportedly against citizens worldwide. Thus far, it has continued unchecked. One of the reasons for the unchallenged proliferation of this form of organized crime is that it characteristically takes place in such a way that it is invisible to the untrained eye.
The countries with the greatest number of reports are the US, Canada, Germany, and England. In the US, the states with the greatest number of reported predatory gangstalkings are California, Texas, and New York. The predominant proportion of individuals targeted by gangstalkers are non-Caucasians. It is difficult to find other predominant similar characteristics in targets. The reasons that an individual is selected for targeting are unknown. It can only be speculated to include reasons such as easy accessibility to the target, random selection for training for new Predatory Gangstalkers, minority group member relative to hate-based groups, making an example of someone, revenge, retaliation, and social control.
Who are the practitioners of Predatory Gangstalking? They include career criminals, participants in the drug trade, extreme ideologists such as radical Christians, members of hate groups such as White Supremacists, members of motorcycle and street gangs, and homeless people. They are also often people with a background in the military, including disabled Vets. Higher levels in the Predatory Gangstalking organizations include people with military and law enforcement experience. It has been reported that top level government security and intelligence agencies use gangstalking tactics in covert operations. What
is most baffling about Predatory Gangstalking is that many of the practitioners of this social pathology appear to be regular mainstream people with no prior criminal record, predominantly in the socio-economic middle class. It is presumed they participate for the money or rewards they receive in the form of barter.


The world of Predatory Gangstalking increases as new recruits are initiated into the Predatory Gangstalking process. Therefore, a target may see collusion and participation from neighbors and co- workers who were once on good terms with
the target. The circle of predatory gangstalkers widens with time. However, most of the time, the gangstalkers are complete strangers to the target. In most of the encounters the target has with gangstalkers, the target does not recognize the
perpetrators but the gangstalkers readily recognize the target. Further, these predatory strangers possess detailed knowledge about the targeted individual. Most often, Predatory Gangstalking is being engaged in by parties unknown, for
reasons unknown, to the target. People have died after a lifetime of protracted Predatory Gangstalking without having any explanations as to who was doing this or why this happened to them.
Sometimes, the leaders in these large affiliated groups of gangstalkers have specialized military expertise in the areas of military intelligence, military electronics and equipment, and in military strategic and tactical training. Those without formal military training have often engaged in paramilitary activities or have technical skills commonly found in successful career criminals. Others who join a Predatory Gangstalking group without such a background are given on-the-job training, in addition to other gangstalking skills. It can be said with certainty that there are specific protocols and tactics and most gangstalkers appear to be proficient in a similar set of skills.
Predatory Gangstalkers each have their own individual skill that they contribute towards their common goal in the group. One person in a group knows how to pick locks; another knows how to hack into computers, while someone else provides the GPS and electronic equipment. Many Predatory Gangstalking members know how to tamper with a vehicle. Some predatory gangstalkers are practiced “look outs” while others are group leaders. Predatory gangstalking groups have their rank and file as in any other organization. Orders come from the top, just as in any other organization. However, it is unknown whether the top of the organizations are local, regional, national, or international.
Predatory Gangstalkers use state-of-the-art technology coupled with law-enforcement- style surveillance tactics. Typically, the individual gangstalkers are strangers to the target. (“Happy slapping” and “workplace bullying” are the most common exceptions) Participants in predatory gangstalking are well-trained. The tactics and techniques they use are similar all around the world in the numerous countries where this has been reported. Each group of predatory gangstalkers is a covert army unto themselves. They have incorporated specialized techniques originally used by spies during the cold war. They carry out their field work with military style precision. Then, they go about their daily lives, just like any other member of society, in most cases. Their gangstalking skills are highly sophisticated, and their commitment to Predatory Gangstalking exceeds zealousness. It appears to both an observer and a target that nothing required of them in terms of time or availability is too much trouble for them. As stated previously, but worth repeating, predatory gangstalking activities take priority in the lives of those who practice Predatory Gangstalking. Predatory Gangstalkers are a functioning subculture of society that move invisibly through society as such. This is by design, making it even more dangerous to society.


The goals of Predatory Gangstalking of an individual are numerous. Predatory Gangstalking is intended to deprive someone of their freedoms and rights. It destroys a person’s privacy and control of their own environments. It is intended to create distress, disrupt all relationships, deplete person’s resources, destroy one’s physical and mental health, and inflict great overall long term suffering. They interfere with a target’s sleep thereby producing chronic sleep deprivation, as a strategic tactic. They employ a variety of interactions with the targeted individual which are likely to produce accidents and various
forms of illness.One of the main weapons they use for their own protection and to enable their success in gangstalking is to manipulate the target's life in such a way as to cause them to lose their credibility with others. This isusually the first objective reached. After that, gangstalking the target involves only minor risk.
Predatory Gangstalking also involves provoking "accidents" and consequences of harm to the target. Predatory Gangstalkers will surrounding a target’s moving vehicle and attempting to force them off of the road when they are stressed and exhausted. Worse, these tactics will be employed after tampering with a targeted individual’s vehicle. Predatory Gangstalking is very serious business. Predatory Gangstalking is, at the least, psychological violence, and at most, it is aprotracted sadistic sociopathic domination and calculated destruction of an innocent human being for reasons of pleasure, power, and social control by a group predatory stranger.
It is rightfully assumed that money is involved in Predatory Gangstalking because of the amount of resources required to execute such extensive efforts. The gangstalkers develop capabilities directly proportionate to the amount money that funds them. In following the money trail speculatively, one looks to the possibility that drug money is involved. Some people reason that the government may be involved because of the amount of resources that are available to the practitioners of Predatory Gangstalking. Other individual situations seem to indicate that corporations, insurance companies, and even wealthy individuals with revenge motives fund a Predatory Gangstalking.
In addition to cash payment for participation in Predatory Gangstalking, other forms of barter are used. These include drugs, sex, alcohol, reciprocal favors, release from debts, jobs, contracts,"deals" for legal problems, and other forms of
compensation. Some gangstalkers are given free housing in exchange for performing Predatory Gangstalking activities against a nearby target. However, it is clear from observing Predatory Gangstalkers in action that many engage in it for pleasure. One high ranking leader in Predatory Gangstalking stated that it was like an addiction. He described how the build up and culmination of a gangstalking assault was intoxicating, but that there was a let-down feeling afterwards that compelled him to do it again, and the cycle continued.


It is also true that some people participate in Predatory Gangstalking because they are deceived into participating. Friends, neighbors and associates of a selected target are given false information and finally come to believe the targeted individual has committed a heinous crime for which they deserve what is portrayed them to be rehabilitative social intervention. Sometimes people reluctantly participate in indirect ways, such as making their homes available at times for part of the operation, for fear of consequences if they did not. Others involved in Predatory Gangstalking, including the homeless, do so for money or drugs. Disabled Vets are known to participate in Predatory Gangstalking activities for alleged government or defense contractor’s projects. Predatory Gangstalkers have successfully elicited the participation of neighbors by appealing to their sense of service to the community or government, often representing themselves as affiliates of the government or law enforcement. Lastly, those who are in the underworld or secret organizations practice Predatory Gangstalking as part of their membership duties.
The craft and practice of Predatory Gangstalking appears to be standardized around the world. Many similarities parallel incidents reported by targets internationally. It appears that there is a standard protocol involving a series of tactics, progressive phases, and nature of assaults. It appears that an individual has been selected to become a target and the groundwork has been established for their assaults long before the individual can be aware that something criminal is occurring in their lives and to their person. Predatory Gangstalkers achieve this strategically. By the time the targeted individual becomes aware that something very threatening and disturbing is happening to them, they have already been thoroughly investigated by their enemies, stigmatized, discredited, and compromised. All wells have been already poisoned, so to speak, and all avenues of help and escape have been blocked.
Predatory Gangstalkers first establish “information dominance” over a targeted individual. This achievement alone enables them to attain excessive power over the targeted individual. It is believed that this is accomplished by means of eavesdropping devices in the target’s environment, global positioning technology (GPS) secreted on their vehicles, obtaining illegal access to all of a targeted individual’s personal records such banks accounts, emails, medical records, and credit card purchases. They are often able to achieve 100% surveillance of a targeted individual and almost 100% access to a targeted individual’s entire
lifetime of available information from any computer, paper, photographic, or personal source. They use all of the information obtained to ambush and sabotage a targeted individual. Predatory Gangstalkers ultimately become capable of entering a target’s house, place of employment, and vehicle at-will and often. All forms of communications in the targeted individual’s life
is interfered with by the gangstalkers. They will intercept email, tamper with voicemail, and obstruct the delivery of postal mail. The net result is that all communication in a targeted individual’s life will become unreliable and incomplete, both incoming and outgoing. The Predatory Gangstalkers are then capable of greater insidious manipulation and control.


Predatory Gangstalkers constantly update information about a target. Updates are promptly shared with all of the participants in that predatory gangstalking group. They take frequent photographs of the targeted individual, and maintain photos of the target’s house, vehicle, place of employment, family, friends, and even the target’s pets. They promptly disseminate this information through email and cell phones to other gangstalkers. This is the means by which a targeted individual is continually recognized by Predatory Gangstalkers everywhere they go. The Predatory Gangstalkers sadistically prefer to maintain a file of photos taken at points in time when the victimization reaches peaks, such as when a target is reaping consequences brought about by the gangstalkers, such as upon a targeted individual’s firing, eviction, or when the person emotionally breaks down, or when they appear disheveled from insomnia or is fearful.
Psychological profiling is yet another tactic performed on a targeted individual for the purpose of finding weaknesses. They exploit all information obtained, including fears, triggers, value-conflicts, skeletons in the closet, areas of shame, addictions, vices, and all things they hold dear. They often successfully “interview” a target under various guises. They use the information obtained to maximize the Predatory Gangstalkers’ ability to destroy the targeted individual.
Practitioners of Predatory Gangstalking have their own coded language, both verbal and visual. Each targeted individual is referred to by an assigned code word. Hand signals are an important tool of their universal protocol. Some hand signals resemble the mannerisms used in baseball and other sports. Other signals are those found in law enforcement and the military. They use hand signals to identify the area of a target’s body designated to be the target of a pending physical attack. This is often the eyes and the heart. They also use hand signals to coordinate the unauthorized entry into a target’s home or vehicle.
They also use hand signals during roving vehicle caravans and while on foot, for the purpose of coordinating attacks and pointing out the location of a target. Vehicle alarm panic buttons and horns are other commonly used tools of communication and coordination. In residential areas, outside lights have an established set of messages. They also use “dead drops” like spies have done historically to secretly pass along information to one another. Public bathrooms are commonly utilized as locations for the transfer of information and equipment. Mobile pick-up and delivery systems are in place for this purpose as
well. They have a set of questions and responses to confirm the identity of a predatory gangstalker to another which are also coded. They refer to money by the last names of the president whose face is on the bill. Someone may say “I have references. (translation: money). I know 5 of the Franklin’s.” Their coded language is universal to them.
Predatory Gangstalkers will begin an intense and extensive discrediting campaign against a selected target well before the target could even suspect he or she has an enemy. This critical tactic sets the stage for neighbors and associates to become alienated from the target. One of the Predatory Gangstalkers’ goals is to eliminate all forms of support and assistance for the
target. Towards this objective, the police are given anonymous “concerned citizen” tips designed to lead the police to believe the target is mentally unstable or a problem in the community in advance of any actual direct gangstalking of the targeted individual. This sets the stage for having the targeted individual prejudged so they will be disbelieved and dismissed when the gangstalking begins and they seek help. The discrediting campaign includes accusing the target of being an "undesirable" for any number of reasons, including fabricated reports of having committed crimes that are the most repulsive to members of
society. Practitioners of Predatory Gangstalking even go so far as to represent themselves as undercover law enforcement or government agents. It has been reported that they will even show false documents for substantiation, but they will never leave them behind.
Financial devastation is another goal of Predatory Gangstalking. Towards this goal, they make attempts to destroy one's gainful employment, pose as offering services to intervene in the problem to further take your money, and will steal funds and personal property on an on-going basis.
Repeated unauthorized entries into a target's residence, vehicles, computer, and workplace are hallmark tactics of this crime and is nearly impossible to stop. Predatory Gangstalkers can pick locks, bypass security alarms, and enter any location posing as utility crews, law enforcement, or delivery men. Practitioners of Predatory Gangstalking will apply for and obtain legitimate jobs in a target's home or business in order to have access to the target and their life, relationships, and assets just to do harm.


Predatory Gangstalking employs a tactic of syncronicity. This tactic involves the precise timing of interactions with the targeted individual. For example, the target can go out to get the morning newspaper and encounter gangstalking activities that suddenly appear and which are precisely synchronized. Throughout the targeted individual’s day, these synchronized encounters repeatedly occur. Activities such as leaving one’s driveway, taking out the trash, going to a store, or even walking the dog, are activities which result in an encounter with one or more Predatory Gangstalkers. Even when a target strategically does not follow any set routine, these synchronized occurrences continue. This makes the gangstalkers appear to be all-knowing and almost omnipresent in the mind of a new targeted individual. This is intimidating, demoralizing, and even terrorizing to targets. It is often unavoidable.
Rarely, if ever, does a targeted individual engage in an activity of daily living without the unwanted participation of Predatory Gangstalkers. The timing and coordination of these activities are remarkably precise. The targeted individual becomes aware that all of their activities include the presence of Predatory Gangstalkers. These gangstalkers demand to be noticed by their target, and if they are not, they will take an action to be noticed. This could include honking their horn strategically, making a comment, creating a scenario to get the attention of the targeted individual. Once noticed, they will return to non-contact,
knowing that by that point, the targeted individual will henceforth anxiously watch for them.
Most times, however, these practitioners of gangstalking maintain the appearance of “business as usual.” They rarely make direct contact, with some exception. However, these strangers often boldly smirk and openly laugh at the targeted individual at some close point in the encounter. This is the universal exception to the “no direct contact” protocol. Other times, when verbal or physical contact is made, these encounters are conducted in such a way as to appear to have been “happenstance.”
Since most of the practitioners of Predatory Gangstalking rotate in and out of the life of a target, the same patterns of gangstalking will occur, but it will involve different people all the time. Therefore, many different stranger and many different vehicles will walk, drive, or bike past the target and interact in some manner, at various times and locations. All of the predatory gangstalkers will be strangers to the targeted individual and they will continue to make their presence, but not their purpose, known. This is one element of Predatory Gangstalking that is disbelieved by others. These "others" include law enforcement, the medical profession, and family. Those who are unaware of activities of subcultures such as criminals, secret organizations, clubs, extremist groups, radical political groups, hate groups, organized crime groups, and other antisocial
groups, the scope of attack by Predatory Gangstalkers is unfathomable. Never the less, the extent of this massive assault on one individual is as extensive as described here.

http://www.stop-predatory-gangstalking.net/

IP: Logged

salome
unregistered
posted July 12, 2006 01:02 PM           Edit/Delete Message   Reply w/Quote
Part 2

Synchronicity can also take the form of surrounding a target’s moving vehicle and pacing that car in perfect formation. They can lock the target’s vehicle into the midst of a gangstalking caravan on a freeway in such a way as to “pace” the vehicle and prevent its departure from the road, or they can attempt to forced the targeted individual’s vehicle off of the road. Further, gangstalkers can use any number of vehicles at one time to “wagon train” a target in their vehicle or parade around at any location. Most often you will see the drivers of each of the Predatory Gangstalking vehicles holding a cell phone to their left ear and looking straight ahead as if at military “attention”, while caravaning in perfect syncronicity. You also see flags, symbolic decals, and even very similar vehicles specific to location. One area's gangstalkers may predominantly drive black pick up trucks and in another location predominantly drive German cars.

Synchronicity also takes the form of what is called “shadowing and mirroring.” In mirroring, someone will synchronize activities of a target in their home, such as going out for mail, getting the newspaper, getting in their car, walking the dog, hanging curtains, planting flowers, etc. All activities
have a mirror image in direct eyesight of the target. Shadowing and mirroring are tactics occurring when a target goes shopping. In this situation, the gangstalkers will follow a target into a store. They will move along the same isles behind the target, even if it is a large store and no one else is in there. They will appear to be unaware of the target, but will shadow them and mirror everything they do. For example, if a target looks at an item, predatory
gangstalkers will also look at that item next to the target. If a target reads a label, the shadowers also read the label of the same product. If the target gets a soft drink from a vending machine, the shadowers will do the same. They will follow them into a church, restaurant, bank, gas station, and even doctor’s office. They are subtle and are prepared to deny any awareness of the target if confronted.

Rarely is contact made in shadowing and mirroring, but if it is, the gangstalker-shadowers discuss subjects and facts which pertain central to the target’s life, and in invasive detail. They discuss things with the target in passing that no stranger could know or which could conceivable by occurring in another’s life. For example, a Predatory Gangstalker following a targeted individual into a store may shadow and mirror during shopping. While behind them in the check out line, the Predatory Gangstalker may comment about the new name of their dog, identifying the same breed and name the target just decided on. They could claim having a rare allergy that the target’s mother just suffered from, or they could say they are buying a lottery ticket and then recite a series of numbers that would be the target’s telephone number, numerical birth dates, last digits of their credit card number, of all of their passwords/passcodes.

Predatory Gangstalkers use sabotage as a common tool of their trade. They may pose as displeased customers at a target’s place of employment and make many complaints. The Predatory Gangstalkers never appear to be affiliated with one another and so the complaints appear to be independent as well as
confirming of the others. They may make a series of anonymous vague allegations to local law enforcement about a target that appear to be independent from each other. They may do the same thing at a target’s school, church, or social organization. They undermine every relationship and every source of support the target has. They work towards the goal of bringing the target to a condition in life where he or she is without relationships, without employment, without money, without a place to live. Because of the very covert nature of Predatory Gangstalking in society, the target cannot defend themselves.

Pet-killings are very common in Predatory Gangstalking. Gangstalkers endeavor to destroy everything the targeted individual holds dear. They will make efforts to seduce a spouse and get a recovering alcoholic to take a drink. They will cancel a critical airline reservation a target made. They will delay
critical packages and will redirect incoming and outgoing important telephone calls. They will kill prized plants and disconnect underground drainage pipes right before a rain. Making a target's life problematic, fraught with crisis, and miserable are objectives they strive for without ceasing.

Another standard operating procedure of gangstalkers is the implementation of a noise campaign. Gangstalkers bombard the target with constant loud noise of all varieties. This may take the form of large trucks pull up behind a parked target’s car or person and blowing loud air horns at close range. Skateboarders appear and clack boards repeatedly. People appear with loud leaf blowers and run them at full throttle around target for long periods of time. Neighbors begin to use loud power tools at all hours and for extended periods of time. Children spontaneously appear around the target screaming and yelling. These are children of practitioners of Predatory Gangstalking. (Predatory Gangstalkers can be multi generational.) If a targeted individual lives in attached housing, noise campaigns of banging on the walls, ceiling and floor becomes a constant occurrence. Horns will be honked at them while walking through parking lots to vehicles passing in front their homes. Organized parades of gangstalkers will
encircle or pass the target and sneezing or coughing loudly in their face or space as they go by, or loudly jangle coins. Predatory Gangstalkers will throw firecrackers at the target while he or she is driving, and even when walking down the street. Motorcycles never seen before will appear often and simply rev the engines around the targeted individual. This noise campaign can include noise harassment through the use of ultrasonic or infrasonic equipment, and all sound found in the ranges in between. This can produce ear pain, nausea, vertigo, and other physical conditions. In all cases, the noise is excessive, abnormal, continuous, and disturbs a target’s concentration, peace of mind, and even sleep. Medical studies recently published have linked this type of noise campaigns to heart attacks in adults. At the least, the targeted individual is chronically agitated by this common Predatory Gangstalking tactic.

Spitting campaigns are another phase of Predatory Gangstalking affecting many targeted individuals. Individuals or small groups of Predatory Gangstalkers will pass the targeted individually and spit towards their feet. They spit at their vehicle at one of the front tires, at their property, at their place of business, or other regularly frequented locations. The frequency of the spitting campaign, as with all aspects of targeting, is carried out often and performed every day without exception, even Christmas.

Predatory Gangstalking includes a tactic called “brighting.” This is an orchestrated event of directing lights at the targeted individual and/or their property from all sources. Lighting will be installed in participating neighbors’ homes and then directed most commonly to the front door or bedroom of the
target. Street projects will suddenly appear around the target’s house or business at nightand will often produce intrusive lights turned towards the target. Cars will parade by the targeted individual’s house and make a point to slow down and shine bright vehicle lights into the house, if logistically possible. In order to facilitate the brighting, trees will be cut down, electricity and outlets will be installed, cars will be positioned, bogus construction work will be initiated, or existing lights will be repositioned.

Other campaigns which are well known include trash/dirt campaigns. Here, specific trash is thrown on a target’s property, placed in their vehicle, and planted in their workplace areas. The same type of trash is used repeatedly, such as an old pizza box with one pizza crust in it, or a certain cigarette pack
with one used cigarette left and a similar match box, a specific candy bar wrapper with a wad of chewing gum inside. This would be suddenly found everywhere, including inside a targeted individual’s car and even in a new hotel room a target just was assigned after registering. It’s a form of “signature
trash.” Some targeted individual’s repeatedly find their toilets used by parties unknown for evacuation and not flushed, often people who are living alone. If taken on face value and relayed to another in the target’s life, this would not be believed. The uninitiated would only see someone becoming extremely upset by the presence of a candy wrapper on the ground, for example.

“Mobbing” or "Flash mobbing" is another common aspect of Predatory Gangstalking. This is an experience where a large group of Predatory Gangstalkers suddenly appear at the location of the target. They invade the target’s space and interfere with the target’s intended activities. For example, they could create traffic congestion for them on any street or in any parking lot. A group of predatory gangstalkers could accompany a target in any public activity, crowding them, quietly insulting them, following them, and interfering with whatever they are intending to do, such as shop in a store, and because of the level of their skills, they could do all this while appearing to be normally going about their business. Mobbing is accomplished easily through cell phones, text messaging, email, and voicemail. The location of a targeted individual is simultaneously and sequentially broadcast to all of the
gangstalkers in the response area. Predatory Gangstalkers then zealously respond to the information and descend upon the target, whose appearance and location is already known to them, and they act like a mob in relation to the target. Just as quickly as the mob appears, the mob disperses, related to the
movement of the target. “Mobbing” is often an element of “Street Theater.”

“Street theater” is terminology associated with Predatory Gangstalking. It refers to staged scenarios orchestrated around the targeted individual which are designed for psychological distress and implemented to interfere with the target’s daily affairs. A key characteristic of street theater is that it begins when the target arrives and concludes whenever the target leaves. The gangstalkers do not have genuine business where they are found around a targeted individual, but they improvise to appear to be legitimately present. However, again, they arrive with the target and depart also when the target departs. This is called street theater because all of the participants with the exception of the targeted individual is there playing out a role and script. All are strangers to the target.

One example is the situation where the target, correctly perceiving their phone calls are monitored, may start to go to a remote pay phone to place calls. The target will go there, and suddenly, several strangers, dressed in any form of garments from suits to overalls, will appear. They may be in pairs, having loud discussions, which likely will include information about the target. They may simulate anything from a fight about to begin to people becoming amorous in pairs all around the target who is trying to make a phone call from a payphone in a remote location. The gangastalker will be near the target, even if the rest of the parking lot is entirely empty. As soon as the target leaves the location, the
Predatory Gangstalkers will promptly terminate all activities, return to their vehicles, and leave with or right behind the target.

Another example is when a targeted individual goes to their usual store to buy a specific loaf of bread, something they stated out loud they were leaving to do. When the target arrives at the store, several gangstalkers will rush past them, even bumping into them deliberately and rudely, and will take all the remaining loafs of that bread off of the shelf. When the target makes another selection and proceeds to check out, the gangstalkers will rush to position themselves in front of them and behind them. The gangstalkers ahead of the target in line may engage in extreme delaying at the cash register. The ones behind the target will make quiet comments pertaining to the target’s personal life. They will often
extend themselves into the personal space boundaries of the target,sandwiching them in. They may repeatedly “accidentally” bump their carts into the target, and then roughly say “Watch where you’re going” while everyone in line agrees with whatever is going on, focusing on the target as though they
are doing something irritating or wrong. The gangstalkers will likely follow the target out of the door, appearing to be simply engaged in business as usual. However, they may all walk by the target’s car individually and nonchalantly pour the remaining contents of their soft drinks in front of the target’s car,
one after the other. This type of staged scenarios may take place 6 or more times each day, every day, depending on the how often target goes out on any given day. Predatory Gangstalkers have honed their craft so well that they can go about their activities with a facade of normalcy and appear to have no relationship to the targeted individual.

Often, incidences encountered in Street Theater are highly unusual and even strange and bizarre. This is by design. Following such an encounter, a frightened and/or confused targeted individual is likely to relay the event to someone. In doing so, they will appear to be unstable, and even delusional or
paranoid. This is the intended outcome of the street theater events. This tactic has been taken direct from the basic protocols of all modern day fascist and communist government’s secret police organizations. It is just as effective today as it has been historically. People can believe this was done by a secret fascist police organization but they cannot believe this would be done under any other circumstances.

“Street theater” does not only happen outside in the mainstream public areas. Often, street theater is brought right to the target’s house or place of employment. Any form of scenario can be acted out here. For example, at one’s home, teenagers can repeatedly come up to the door ringing the bell of every sort of contrived reason. Often, the target is being filmed from a far. Unusual trucks may parade back and forth, stopping in front of the target’s house appearing to be checking a map. Vehicles could enter their driveway and back up as though they are changing direction in driving along the road, but there may be 8 or 10 such vehicles doing this in a half an hour or less on an otherwise private road. Gangstalkers individually or in pairs could walk past the target’s house within a brief time period on an otherwise empty street. Each would appear unrelated to the others and each perhaps would stop to take a
lingering look at one area of the property, such as something on the lawn that actually has nothing of note there. People may even stop and point, while others may take a photo and move on. It is all contrived, but the target does not know that early in the gangstalking, or sometimes ever if they do not have the fortune to find this information.

Further, all the above described street theater events could occur suddenly and simultaneously. The target is drawn to look outside and sees a circus of activity in a usually desolate view from their window. Street theater is designed to be distressing to the target and not be able to be accurately reported to anyone else in a manner that appears true. (Imagine a distressed target saying “people are making U turns in my driveway, and staring at something on my lawn when they walk by, and strange trucks are stopping in front of my house and reading maps.”) No one would understand that it was in fact a contrived theatrical production done to effect the target and involved 15 gangstalkers in vehicles, 20 gangstalkers on foot and 6 gangstalkers at the door, all within in a 15 minute time frame in an otherwise dormant area.

Sometimes, just as suddenly and widespread as a specific campaign begins, it can end. It is believed that when a campaign loses it’s effectiveness against a target, it ceases. Months of a spitting or noise campaign can suddenly end on one day. They will stop a campaign promptly if someone other than the targeted individual begins to investigate the situation or support the target. Videotaping predatory gangstalkers in action is reported to sometimes bring about the end of a particular campaign. However, a different one will soon replace it that will exploit any means the targeted individual is using to defend or protect themselves, including trying to prove the existence and activities of these predatory gangstalkers.

Predatory gangstalkers use the reaction of the targeted individual to the predatory gangstalkers against them. Every tactic that brings misery, distress, and loss is enhanced and accelerated, while those tactics that do not have significant impact are stopped. Predatory Gangstalking is an ever-improving protocol.

Predatory gangstalkers use hi tech electronics in their activities against a targeted individual. They are known to use bugging devices, redirectors of telephone calls, GPS monitoring of vehicles, computer hacking, and many other electronic tactics. Other technology at their disposal includes jammers to jam cell phones and block recording devices, diverters to divert phone calls to and from target’s phone, denial of service interrupters that prevent Internet communication of email or web researching, false busy signal generators, and mechanical disablers. In recent years, “dischargers” that ruin all batteries instantly, including cell phone batteries, have been added to their arsenal. All of these electronics can be found for sale on the Internet or purchased on the black market. Predatory gangstalkers organize and upgrade all of their tactics, equipment, and resources against a target continually over time. Therefore, ultimately, the gangstalkers have a level of organized personnel and technology that parallels law enforcement, or in some cases, even a military operation.

Unfortunately, predatory gangstalking is often a precursor to more serious crimes, some of which utilize military grade directed energy weapons to relentlessly physically torture a person over many years. This is the second wave of predatory gangstalking. In this case, the predatory gangstalkers
presence recedes into the background in a targeted individual’s life. Replaced in the forefront is technology, such as microwave, ultrasound, pulsed energy projectiles, and other modern day weapons that do not leave any trace behind after discharge. This phase is referred to as “hi tech assaults” or “electronic harassment.”These weapons target the central and peripheral nervous system, the eyes, and internal organs. They produce severe pain without evidence of injury, vision deterioration, and functional debilitation. They can be installed in surrounding vehicles, nearby structures, in remote locations, or in the target's home. By the time technological assaults are implemented, the targeted individual has no remaining credibility, support, or personal resources with which to obtain any help. Electronic harassment is a form of
torture
as defined under all treaties. Never the less, it may continue for years and even until the target dies.

It is noteworthy that gangstalkers will stalk another groups’ target if the targets attempts to escape their harassers by fleeing or relocation. This indicates an arranged cooperation and a loose affiliation among Predatory Gangstalking groups. This does not give targeted individuals much hope when in the midst of their situation.

Who becomes a targeted individual? Targeted individuals have only speculation in their pursuit of determining why they were selected for Predatory Gangstalking. Speculation includes the idea that some people are selected in order to be a training project for new cells of gangstalkers coming into an area. Others have won court settlements which they believe then resulted in the onset of Predatory Gangstalking. Some people are whistle-blowers and have caused problems for wrongdoers with power, such as drug higher-ups, or corporations, or powerful and wealthy people and conclude this is the basis. Some people believe they were selected for being activists against a government or political power. Others believe their relatives, bosses, or neighbors set them up. Yet others believe they are this is a characteristic- based hate crime. Other believe that Homeowners’ Associations target individuals with the help of HOA attorneys. For whatever the reason, it is usually true that once an individual is targeted for predatory gangstalking, they rarely are released from this devastating, strangling, encirclement of evil.

Who can withstand such an encompassing assault on one’s life? When stress, isolation, and desperation build up in a targeted individual, he or she will inevitably experience health problems. Many targeted individuals develop health problems due to stress, which most often include insomnia, hypervigilance, heart rate problems, declining immune systems, digestive disorders (irritable bowel syndrome, colitis, and ulcers), debilitating anxiety, depression, and acute traumatic stress disorder. Many targets are incorrectly diagnosed with mental health disorders as the direct result of describing to law enforcement, their families, or their doctors, the details of actual gangstalking incidences which are not believed by the hearer. Some targets are found unexpectedly deceased due to heart attacks. It has been reported that targets even committed suicide during the course of protracted PredatoryGangstalking.

In conclusion, Predatory Gangstalking is an overwhelming and devastating assault on one’s life in and of one’s self. An individual who becomes a target of Predatory Gangstalking finds himself or herself in the midst of a sudden and seemingly irrational social nightmare. The elements of Predatory Gangstalking
bring about a downward spiral in a person’s life. The combined effects of Predatory Gangstalking often result in premature death. The tragedy is found in the fact that the actual cause of the multitude of problems in a target’s life and the source of what brings about their premature death, which is Predatory Gangstalking, is not recognized by anyone other than the targeted individual. Therefore, the targeted individual lives and dies without validation or assistance. Further, the Predatory Gangstalkers have no accountablility and reap no earthly consequences for their lifestyle of torment of another human being for the majority of that person's life.

Until society becomes aware that such predatory groups exist, and that gangstalkers perpetrate organized psychosocial and physical assaults upon individuals around the world, this type of sociopathic domination of an individual by predatory strangers will continue unabated.

Until Predatory Gangstalking is identified as terrorism and organized crime, and until it is prosecuted as such, Predatory Gangstalking will continue to proliferate and extend further into society. There is no reasons to believe that the lifestyle of Predatory Gangstalking will do anything but increase in
participation and sophistication.

Without intervention from outside sources, those who are targets of Predatory Gangstalking will continue to be subjected to an existence of social isolation, mental torment, chronic debilitation, assaults, vandalism and theft of property, character assassination, deprivation of all human
rights, legal helplessness, and premature death.

Therefore, targets of Predatory Gangstalking look to the media and to the Internet to remove the blinders of disbelief that protects the practitioners of this merciless crime.It is the hope of all innocent citizens who are suffering this criminally-imposed hardship of terror, torture, and invisible imprisonment that public awareness will set them free.

http://www.stop-predatory-gangstalking.net/index2.html


http://www.linda-goodman.com/ubb/Forum2/HTML/002134.html

IP: Logged

salome
unregistered
posted August 22, 2006 01:41 PM           Edit/Delete Message   Reply w/Quote
In a nutshell: It's just Psychological Terrorism! Sometimes a bogus investigation is being done which isolates the Targeted Individual from friends and family, who are told by "investigators" to initiate no contact with the Targeted Individual unless told to do so by the so-called investigators. A charge of "giving aid and comfort to a criminal" will be lodged against those who do not comply! The constant crowding of the Targeted Individual's space through non-random foot traffic and non-random vehicular traffic will eventually take a toll on some individuals. Add to that terroristic break-ins of home and car so that the Targeted Individual never feels safe! Add to that the continual noise campaign so the Target almost never sleeps! Stress, isolation, sleep deprivation, these things are done to the individual every day, creating constant, ongoing stress. The goal being to cause mental and/or physical breakdown of the Targeted Individual or death by suicide, disease, or accident. The so-called investigators are never brought to justice, for they have truly committed the
perfect murder!

--------------------------------------------

Are you a target of multiple stalkers?

Are you being followed, harassed, or threatened? Is your phone tapped?

If so... YOU may be a Target of... Covert War!

Yes, this could happen to you!
Think what your life would be like if you were the target of an endless illicit investigation! An investigation that would continue for years! Your phone wiretapped, your residence bugged, your mail intercepted, and yes, even your car would be bugged and tracked by satellite!

Under constant surveillance, followed by teams of agents every time you leave home! Even when authorities find no criminal activity, all information gathered is used to follow and harass you at every opportunity in a perpetual Covert War!

And finally, agents extort cooperation from friends and family, threatening to jail them they refuse to participate in their scheme to trash your life!

Do you really believe this could never happen in America?

The alarming fact is:

Thousands of law-abiding citizens are being subjected to this type of abuse every day!

And…Yes, It is Legal!

The very same investigative powers originally granted to authorities to facilitate the gathering of evidence in criminal cases are now being used to harass law-abiding citizens!

Persons usually targeted for this kind of scrutiny are:

Political activists, protesters, feminists, gays, lesbians, people with tolerant attitudes, people who are a little odd or eccentric, and anyone who questions authority, signs a petition, or sends letters to the editor of a newspaper.

Actually, anyone exercising their constitutional rights is considered subversive by authorities, who can then find any excuse to open a never-ending, bogus investigation!

And who is watching the authorities?

The really bad news is:

Currently, there is no recourse for anyone who is the target of this kind of harassment!
Court orders are signed off with very little scrutiny, resulting in flagrant violations of privacy!

All too often, the real reason for the “investigation” has nothing to do with criminal activity and everything to do with the targeted individual’s political activities.

There is nothing in place to stop these abuses! No congressional oversight committee, no government commission where a citizen can go to file a complaint, no way to even find out who is conducting this horrendous scheme of harassment or even why it is being done.

This lack of accountability has led to blatant abuse of investigative powers at all levels! What this means is: Authorities conducting these “investigations” are currently above the law!

You are a Target of Covert War if:

You check your e-mail or snail mail to find:
Your time-sensitive mail is consistently late. You continually miss organizational
meetings, entertainment events, and political rallies because all of your mail, both snail mail and e-mail arrives after the event occurs. This is especially true if thpiece of mail is from any organization working for political change or government
accountability. E-mail appears to be "filtered", that is, someone is taking time to read it before sending it on to you.

When inspecting your clothing you notice:
Shirts have "L-shaped" tears with no rough handling involved. Underwear has been torn or shredded. Shoes or boots have been "sliced" with something sharp.
Newly purchased clothing has disappeared and neighbors appear wearing the same apparel.

You return to your vehicle after shopping to find:
The contents have been rearranged, or the door is open after you left it locked, or
the radio volume is turned on high when you never listen to loud radio, or the lights
are on. Someone has parked too close to you, forcing you to enter the car from the
passenger side. You notice new dents in the vehicle which appear to be caused by someone striking the vehicle with a fist or blunt object.

When leaving any business establishment you notice:
You are never able to back up out of a parking space without almost having a
collision with another car. When walking to and from, there is always someone
on collision course with you. A person casually exits the business or adjacent
business and stands looking out into the parking lot as though waiting for a ride.
This person is usually the trigger for the near collision you experience when
backing out of your parking space. More about this later.

When driving on the interstate you notice:
You are surrounded by a team of four to six vehicles, traveling in a box shaped formation, with your vehicle in the middle of the box. These vehicles are directed by a team leader in a command vehicle. The command vehicle will usually be a truck, SUV, or Crown Victoria. Quite often you will see a long antenna on the command vehicle, but with the growing use of cell phones, this may not be the case. The purpose of the team is to keep you in the box, so that you will be in sight at all times. They may also attempt to impede your progress by driving in front of you at speeds below the legal limit. Occasionally, they will tailgate. Teams will swap places at intervals to avoid detection.

When starting a new job, you notice:
The first month you get along with the employees, become part of the team, the
boss seems delighted to have you on board, expresses surprise at how quickly you learn your new skills. You are continuing to excel when the boss and a few employees begin to behave strangely. Their attitude and demeanor change, they seem bent on ignoring you. When returning from break, your desk is re-arranged, your phone is broken, some of your customer notes have been removed. Within the next few weeks, altercations with employees occur for no apparent reason. Employees congregate around your desk and talk loudly, but only when you are on the phone with a customer. Your computer files are altered and become useless. Complaints to the boss are useless. You quit.

When returning home from work, you notice:
Characters resembling gang members are loitering around their parked cars in front of your house, the house across the street, or the house next door. The mirrors on your parked vehicle have been moved or vandalized. Cast letter logos designating
the make and model of the vehicle have been broken off or removed. The contents of your home are out of place. Paperwork is out of place or missing. The lock on the door becomes sticky or hard to operate.

When tending your yard you notice:
Trees or shrubs have been pruned (mutilated) without your permission. This is often done by city workers with the excuse of "keeping the tree limbs away from the power lines." Further inspection often reveals other trees in the neighborhood were also close to the power lines and were NOT pruned. Sometimes the pruning is done by the guy mowing the lawn with the excuse,
"I don't know why my guy pruned your tree, it was a mis-communication. Sorry, I won't charge you anything for mowing your grass today." Close inspection will usually uncover the real reason for the mutilation. The limb/tree/shrub was blocking the line of sight from the perp observation point to your front door, garage door, or other pathway you frequently access. The perps also have been known to pour weed killer on a lawn or plant poison ivy in the yard.

When contracting for repairs:
The repair persons show up late or not at all, making it necessary to reschedule on another day or find another person to do the job. Suddenly the charges are escalated 30-50% more than the original quote. The repair people make unnecessary noise and do mischief such as turning water in the yard on or off, pulling up the ground wire on the tv cable, and other things that are not related to the job being done or are clearly not in the vicinity of the work site. The job done
is sloppy, occasionally making it necessary to "touch up" or even redo some of the work.

When sitting outdoors at your house or a friends house you notice:
The neighbor next door, or across the street, or in the house behind you decides to run the lawn mower, leaf blower or chain saw. When you walk into the house for
more iced tea, the activity may stop, but as soon as you step out the door, the activity will start again. Cars with questionable looking characters suddenly appear to parade slowly by, stereos booming loud enough to vibrate your nose hairs. Another neighbor may decide to burn the trash, but only if the wind is wafting the smoke in your direction. These activities occur with astounding predictability.

At other times you notice:
Abrupt and unnecessary rudeness coming from strangers, friends, or employees of business establishments. You are never alone on a country road or anywhere low
traffic is the norm. And you are "swarmed" in retail establishments: You stop at
any kind of business not currently occupied by anyone other than employees and suddenly, within 5 minutes, at least 6 cars appear and the establishment is "swarming" or "mobbing" with perps eagerly looking for an opportunity to invade your space. Space invasion happens every time you use a public rest room, go shopping, or use a public phone. At other times you notice bad food or bad service in a good restaurant. When venturing to an establishment for the first time, you are treated with courtesy, on subsequent visits, employees look at you fearfully and refuse to talk to you as though someone has told lies about you.

When attempting to sleep you notice:
The phone rings at odd hours of the night, you answer, they hang up. You are awakened in the wee hours of the morning by a loud banging on the door or ringing of the door bell. You answer, only to find no one is there. Creaks and pops occur in the house at odd hours to wake you up. Inspection of the premises in the daylight you find golf balls, tennis balls, and baseballs lying in the yard. You wake up at exactly the same time to the minute, every night, as though someone flipped a switch.

If you experience the above on a daily basis, you are probably a Target of Covert War.

In a nutshell: It's just Psychological Terrorism! Sometimes a bogus investigation is being done which isolates the Targeted Individual from friends and family, who are told by "investigators" to initiate no contact with the Targeted Individual unless told to do so by the so-called investigators. A charge of "giving aid and comfort to a criminal" will be lodged against those who do not comply! The constant crowding of the Targeted Individual's space through non-random foot traffic and non-random vehicular traffic will eventually take a toll on some individuals. Add to that terroristic break-ins of home and car so that the Targeted Individual never feels safe! Add to that the continual noise campaign so the Target almost never sleeps! Stress, isolation, sleep deprivation, these things are done to the individual every day, creating constant, ongoing stress. The goal being to cause mental and/or physical breakdown of the Targeted Individual or death by suicide, disease, or accident. The so called investigators are never brought to justice, for they have truly committed the perfect murder!

http://www.stopcovertwar.com/target.html

IP: Logged

naiad
unregistered
posted October 13, 2006 01:52 PM           Edit/Delete Message   Reply w/Quote
no arguments here....hardly any comments even.

IP: Logged

naiad
unregistered
posted February 13, 2007 03:23 AM           Edit/Delete Message   Reply w/Quote

IP: Logged

venusdeindia
unregistered
posted December 19, 2007 04:00 AM           Edit/Delete Message   Reply w/Quote
bump

IP: Logged

Dervish
Knowflake

Posts: 625
From:
Registered: May 2009

posted December 20, 2007 05:20 AM     Click Here to See the Profile for Dervish     Edit/Delete Message   Reply w/Quote
I found it odd that it didn't include cyberbullying & stalking, which is pretty common. Though one who led such a cyber "gang stalking" got a taste of her own medicine:
http://www.cnn.com/2007/LIVING/wayoflife/12/07/suicide.shunning.ap/index.html

quote:
Megan became friends with the Drews' young daughter and the girls remained close for years, according to a report provided by prosecutors. But the girls had a falling-out in 2006.

A teenage employee of Drew's named Ashley said she created the "Josh" account on MySpace after a brainstorming session with Drew and her daughter, according to a prosecutor's report. Drew said the girls approached her with the idea, and she told them only to send polite messages to Megan.

Ashley sent Megan many of the messages from "Josh," and Lori Drew was aware of them, prosecutors said.

On October 16, 2006, there was a heated online exchange between Megan and Ashley, who was posing as Josh. A few other MySpace users joined in, calling Megan names. It ended when "Josh" said the world would be better off without Megan


And now...

quote:
Waterford Crystal Drive is one of those suburban streets that seem so new as to have no history at all. But the suicide of a teenage girl -- and allegations she had been tormented by a neighbor over the Internet -- have brought a reaction that is old, almost tribal, in its nature

quote:
Last December, after neighbors learned of the Internet hoax, someone threw a brick through a window in the Drew home. A few weeks ago, someone made a prank call to police reporting that there had been a shooting inside the Drews' house, prompting squad cars to arrive with sirens flashing.

Someone recently obtained the password to change the Drews' outgoing cell phone recording, and replaced it with a disturbing message. Police would not detail the content.

Clients have fled from Drew's home-based advertising business, so she had to close it. Neighbors have not seen Drew outside her home in weeks.

Death threats and ugly insults have been hurled at Drew over the Internet, where she has been portrayed as a monster who should go to prison, lose custody of her children, or worse. Her name and address have been posted online, and a Web site with satellite images of the home said the Drews should "rot in hell."


IP: Logged

pidaua
Knowflake

Posts: 67
From: Back in AZ with Bear the Leo
Registered: Apr 2009

posted December 20, 2007 06:14 AM     Click Here to See the Profile for pidaua     Edit/Delete Message   Reply w/Quote
Thanks for bringing that point up Dervish. I think it deserves more attention that it has gotten online.

How disgusting for an adult woman to play with a teenagers heart (and life) in that manner. It's a sad world we live in when people feel they can get away with something like that. I feel so deeply for the deceased girls family.

IP: Logged

All times are Eastern Standard Time

next newest topic | next oldest topic

Administrative Options: Close Topic | Archive/Move | Delete Topic
Post New Topic  Post A Reply
Hop to:

Contact Us | Linda-Goodman.com

Copyright © 2011

Powered by Infopop www.infopop.com © 2000
Ultimate Bulletin Board 5.46a