![]() | ||||||
WE ARE ALL TARGETED! Organized stalking methods were used extensively by communist East Germany’s Stasi or state police as a way of retaining political control over citizens. Although they're illegal here in the U.S., identical covert tactics are quietly used by America’s local and federal law enforcement and intelligence organizations to suppress dissent, silence whistle-blowers, and get revenge against persons who have angered someone within these public and private agencies. Unlawful counterintelligence operations have been perpetrated in opposition to Americans by authorities in the U.S. since the late 1800s. Historically, these groups of mostly undercover police officers had been known as red squads, although the modern official term is Law Enforcement Intelligence Units. The most well documented example of such operations was the FBI’s infamous COINTELPRO or Counter Intelligence Programs under the direction of J. Edgar Hoover. Those operations ran from 1956 until 1971 when they were uncovered by political activists who broke into an FBI office and obtained secret documents which they handed over to the press. COINTELPRO’s official goal was to 'disrupt, expose, misdirect, discredit, or in other case neutralize' individuals and organizations deemed to be subversive. As the U.S. Senate’s investigation of COINTELPRO found, tactics used by the FBI included most of the methods associated with gang stalking, which include overt surveillance or stalking for psychological operations purposes. This agency even perpetrated crimes such as blackmail and assassinations. Organized stalking methods encompass warrantless electronic surveillance, slander, blacklisting, and a variety of psychological tactics. The latter presumably exploits the findings from studies such as the notorious MK-Ultra experiments conducted on American citizens by the CIA, as well as the psychological torture tactics refined by the Stasi. An organized stalking victim is systematically isolated and harassed in a manner intended to cause sustained emotional torment whilst creating the least possible amount of evidence of stalking that would be visible to others. The procedures are sometimes referred to as no touch torture. Methods are specifically chosen for their lack proof and plausible deniability. Perpetrators use common annoyances such as constant noise by neighbors or rude comments and abusive behavior by strangers, but on a frequent ongoing long term basis. The cumulative effects of relentless exposure to such tactics can amount to psychological torture for the victim. Accomplices such as neighbors, co-workers, and even friends or relatives of the victim in some cases are recruited to often participate unwittingly by counterintelligence personnel using various means, such as by telling them that the target is a potential threat or that the target is the subject of an investigation. A whole set of psychological operations are perpetrated against targeted individuals. These methods consist of such things as threats, slander, vandalism, abusive phone calls, computer hacking, tormenting the victim with noise, and mobbing or the orchestrated verbal harassment by strangers, neighbors, and/or co-workers. [Since harassment by noise is one of the major tactics used by gang stalkers, you might want to purchase a pair of noise cancelling headphones which one might add are very expensive and unattainable for most victims ranging in price from $80-$200. An inexpensive alternative would be shooters muffs which in most cases reduce loud noise down to 25 decibels and are very cheap at approximately $11 a pair.] Accounts by numerous victims of organized stalking share some common specific details suggesting that the perpetrators are following a well tested and standardized playbook of methods that have proven to be easily kept off of the radar of potential witnesses and the mainstream news media. Methods such as V2k or Voice to Skull, is a type of psycho-electronic mind control which consists of the covert, around the clock harassment of innocent citizens living in their homes and communities. Voice to skull is the transmission of voice, or any other audible or subliminal sound, directly into the hearing sense of the mind control victim. This is sometimes done around the clock and can be one of the severest forms of torture. Voice to skull technology is sometimes referred to as synthetic telepathy. Current day voice to skull cannot be stopped by any known electromagnetic shielding, a fact which demonstrates how advanced classified mind control technology has become. Read Common TI Symptoms.pdf Here Increasingly common are the reports of illegal spying by corporations as well as reports of police officers and federal agents sometimes initiating gang stalking operations for personal vendettas. Federal and local law enforcement agencies also make use of criminal informants who are in great supply here in America, with its remarkably extensive incarceration rate. It would be natural for such informants to be used in a counterintelligence program. First-hand accounts of self-proclaimed victims of gang stalking support this assumption, by their appearance and behavior, many street level perpetrators appear to possibly be ex-cons. Read Glossary of Terms Every Targeted Individual Should Know.pdf Here Gang stalking reputedly targets American citizens deemed to be dissidents or whistle-blowers and perhaps others might be focused on for other reasons such as for experimental or training purposes. For perspective, it has to be remembered that for two decades the CIA performed secret unlawful experiments on U.S. citizens in the infamous MK-Ultra program. You see the CIA ran secret mind control experiments on US citizens from the 1950's until 1973. Essentially, the CIA used drugs, electronics, hypnosis, sensory deprivation, verbal and sexual abuse, and torture to conduct experimental behavioral engineering experiments on subjects. The program subcontracted hundreds of these projects to over 80 different institutions, together with universities, hospitals, prisons, and pharmaceutical companies. Most of this was uncovered in 1977, when the Freedom of Information Act exposed 20,000 previously classified documents causing a series of Senate hearings. Due to the fact CIA Director Richard Helms had most of the more damning MK-Ultra files destroyed in 1973, much of what actually occurred all through these experiments remains unknown and, of course, not a single person was brought to justice. Read the MK-Ultra Documents.pdf Here Read the MK-ULTRA, (JOINT HEARING).pdf Here While the vast majority of Americans by no means are personally targeted by gang stalking, V2K or programs like Mk-Ultra, they should still be concerned. In the late 1940s, as the Cold War was just getting underway, the CIA launched a top secret project called Operation Mockingbird. Their intention was to buy influence and control most of the major media outlets. Additionally, they planned to put journalists and reporters directly on the CIA payroll, which is ongoing to this day. They also planned to enlist American news organizations and journalists to basically become spies and propagandists. Some of this was funded through the siphoning of funds intended for other programs. Their list of entrenched agents eventually included journalists from ABC, NBC, CBS, Time, Newsweek, Associated Press, United Press International (UPI), Reuters, Hearst Newspapers, Scripps-Howard, Copley News Service, and so on. By the 1950s, the CIA had infiltrated the nation’s businesses, media, and universities with tens of thousands of on-call operatives. Unfortunately, our media is still lured in by corporations and governments to disseminate propaganda and disinformation! Presently there are no real laws against the use of, or abuse of, citizens using subliminal programming ither. Many believe that subliminal messages can influence our behaviour and there is evidence that these techniques have been used since their inception. In these modern times we all find ourselves as targeted individuals which became apparent during the global lockdown, with the forced wearing of masks, and forced social distancing. The hostile takeover of society by pharmaceutical companies and/or the medical technocracy. The self-proclaimed elite’s program of total control via surveillance, facial recognition, and the harvesting and selling of our DNA. Also note that while testing companies stress that DNA data is de-identified to protect privacy, data shared with researchers can be re-identified in most cases. Requests may also come from the federal authorities, including the State Department, U.S. Military and your local law enforcement agencies. These days the price of Patriotism is that you the citizen are now considered a terrorist or a dissident unless you just roll-over and let the take over happen. Like in all arenas of opposition and warfare, the side which is at a disadvantage should be more aggressive. We need to exploit asymmetrical warfare principles, as much as possible, by employing tactics which are unpredictable, creative, cheap, simple and bold. The worst thing we could do would be to adopt a cautious, defensive posture. However we must avoid doing things which could lead us to serious legal trouble. Technical counter measures can critically disrupt some forms of surveillance and harassment utilized by these organizations. By all means, if you have enough money to buy counter surveillance and security equipment such as audio recorders, cameras, alarm systems, locks, safes, firearms, bug detectors, you should definitely do so. If you can, secure all your windows from the inside with bolt locks, and test them from the outside to ensure integrity. If you have multiple entrance doors, secure all but one of them from the inside with bolt locks before departing, so as to restrict access to a single door. Then install a simple, self-contained alarm system on this entrance door. You should in no way assume that your electronic communications have not been compromised ither. For information that needs to be completely secure, you will need to rely upon non-electronic means or face to face communique in remote unpredictable locations, hand written notes or an old manual ink typewriter to record information... Alternatively, you can sometimes at least make electronic spying difficult for stalkers by using certain technical counter measures, such as encryption. A simple way to encrypted e-mail is to use the free email service called Protonmail. You can set up a free account in a couple of minutes at this link protonmail.com. Also, the Onion Router or Tor www.torproject.org is a network that enables a user to stay anonymous on the internet and cast off of any possible surveillance, user identification, or location tracking while using the internet enabling anonymous communication for the user. Regularly utilized by news corespondents, and spies operating in regions with oppressive governments... In case you should use electronic avenues, here is a listing of anonymous search engines that do not record your IP address: ![]()
![]() ![]()
![]() We realize that technology has made it impossible for anyone to have privacy. However there are devices and programs that can help you get privacy, but they also can be used to invade it. Our view is that non-electronic avenues of research and communication be used whenever possible while living under oppressive governments and/or police states... |