Electronic Harassment
The use of radio frequency, sonic, laser and other types of devices to remotely inflict a variety of effects on the mind and/or body.
Many today are unknowingly suffering the effects of electronic harassment.
The use of radio frequency, sonic, laser and other types of devices to remotely inflict a variety of effects on the mind and/or body.
Many today are unknowingly suffering the effects of electronic harassment.
Targeted individual (TI):
Targeted Individual is a person who has been singled out by a criminal syndicate called "Organized Gang Stalking." The targeted individual is under 24 hour surveillance and is stalked by large groups of various criminals. The new technologies have brought about the possibility of this crime.
All of the wireless devices can be hacked and tracked. The criminals carry non lethal weapons in their cars and use them against the Targeted Individual. The weapons are both easy to buy or easy to make. They use lasers, dazzlers, hand held microwave, x ray devices, plasma beams, and other directed energy weapons.
The stalkers are working full time to discredit the victims of this crime and to insinuate they are mentally ill to silence the victims. There are now so many victims that the crime is no longer being denied. Even the Department of Justice has verified the fact that group stalking is on a significant rise with a government survey.
In a 2009 DOJ study verified there were a total 3,398,630 reported victims of stalking. Out of the total number of stalking victims 13.1 % documented that they had at least 3 or more stalkers. A quick average of the figures (441,821 victims had 3 or more stalkers) (200,000 victims had more stalkers than they could count)
Targeted Individual is a person who has been singled out by a criminal syndicate called "Organized Gang Stalking." The targeted individual is under 24 hour surveillance and is stalked by large groups of various criminals. The new technologies have brought about the possibility of this crime.
All of the wireless devices can be hacked and tracked. The criminals carry non lethal weapons in their cars and use them against the Targeted Individual. The weapons are both easy to buy or easy to make. They use lasers, dazzlers, hand held microwave, x ray devices, plasma beams, and other directed energy weapons.
The stalkers are working full time to discredit the victims of this crime and to insinuate they are mentally ill to silence the victims. There are now so many victims that the crime is no longer being denied. Even the Department of Justice has verified the fact that group stalking is on a significant rise with a government survey.
In a 2009 DOJ study verified there were a total 3,398,630 reported victims of stalking. Out of the total number of stalking victims 13.1 % documented that they had at least 3 or more stalkers. A quick average of the figures (441,821 victims had 3 or more stalkers) (200,000 victims had more stalkers than they could count)
Electronic harassment:
Electronic harassment is the purported use of electromagnetic waves to harass a victim. Psychologists have identified evidence of auditory hallucinations, delusional disorders or other mental illnesses.
Electronic harassment is the purported use of electromagnetic waves to harass a victim. Psychologists have identified evidence of auditory hallucinations, delusional disorders or other mental illnesses.
Electronic harassment methods:
There are various methods & tactics that can be deployed to harass individuals by government intelligency / Security and police agencies as well as non government organizations such as private security and intelligence companies.
There are various methods & tactics that can be deployed to harass individuals by government intelligency / Security and police agencies as well as non government organizations such as private security and intelligence companies.
Psychological profiling:
Targets will be generally observed and profiled long before they ever
become aware that they are being targeted. Profiles will be created on targets by:
Targets will be generally observed and profiled long before they ever
become aware that they are being targeted. Profiles will be created on targets by:
- Following them
- Following people close to them
- Listening to their calls
- Hacking into their computers
- Monitoring their mobile phones (texts, calls friends list, GPS)
- Gathering information from friends, family
- Observing what they eat and where they shop
- Medical Records
- Studying their weaknesses
- What do they like and dislike
- Determining whether they can be bribed
- What they could be blackmailed with
- How could they be bullied
Here we try to classify all kind of symptoms that targeted individuals experience on one page.
We refer to “symptoms” as both “effects” and “control mechanisms”. They have both functions at once.
We refer to “symptoms” as both “effects” and “control mechanisms”. They have both functions at once.
Mind Control:
Control and manipulation of thoughts, feelings and ultimately behavior.
Control and manipulation of thoughts, feelings and ultimately behavior.
- Control of thoughts and thought patterns; feelings and their expression; behavior control.
- Dark NLP and gang stalking (street theater) that anchor feelings to certain words, and sometimes colors, certain types of people or objects… Creating the illusion of ”guilt”.
- Hypnotic ”trigger words” that results in specific sensations, feelings or behaviors.
- Monitoring attention both where to look but also what to think about and in what terms.
- Real time mind reading before it becomes aware; erasing thoughts and memories; short time memory problems.
- Induced memories and ”synthetic” associations (that are believed to be made by a computer that is aware of the context).
- Induced dreams or manipulation of dreams.
Social Control:
Isolation of individuals through social and societal systems of control.
Isolation of individuals through social and societal systems of control.
- Fabrication of false evidence that justifies ”Crime prevention” (fabrication of evidence of crime and rumor spreading); In almost every case, Targeted Individuals are accused of a sex crime with no chance to defend oneself.
- Sudden unemployment.
- Loss of friends, because of rumors or direct control.
- The perpetrators take over the friendship and social life of the TI. They are always rude, and manipulative and not real friends.
- Creating ”symptoms” of Mental Illness (voices in the subconscious, V2K; trying to describe what is happening for others) putting the individual in psychiatric care.
- Creating ”symptoms” of Substance Abuse (tampering food with drugs, poisons or medications; blurred vision; red eyes; disorientation; head aches; memory loss; difficulty talking or making sense) destroying the targeted individuals reputation;
- Creating ”symptoms” of Insulin related diseases (pain in the spinal cord, back of the head, terrible head aches, high blood sugar levels, enormous fatigue) creating early retirement or poverty because of inability to work.
- Creating “symptoms” or dementia because of apparent difficulty, sometimes, to express one’s feelings and thoughts; memory problems when the “attacks” are enormous.
Surveillance:
- Thought surveillance. TI:s thoughts are read in real time.
- Looking though Targeted Individuals eyes and seeing what the targeted individual sees. Knowing where the targeted individual directs attention.
- GPS surveillance. The Targeted Individual is tracked down at any time, in real time.
- Remote Neural Monitoring: Some targeted individuals claim that a person’s brain can function as a fingerprint and that can be picked up by satellites. That enables both surveillance of the individual and thoughts.
- Gang stalkers often let the Targeted Individual know that he / she is under surveillance and can’t escape. They can come up and insult the TI, or say something that is only known by the Targeted Individual, as an indication of ”remote (real time) mind reading”.
- Financial surveillance. It looks like every penny a Targeted Individual has is counted and only a certain amount is allowed for the Targeted Individual to gain.
Torture: Physical, Mental & Psychological
Physical pain due to ICT- Implants or non-lethal weapons.
Physical pain due to ICT- Implants or non-lethal weapons.
- Direct pain in the body around the clock and that only gets worse and worse due to ICT- Implants or other kind of devices, often labeled by Targeted Individuals as non-lethal weapons, Directed Energy Weapons (DEWs), Electromagnetic Frequency (EMF) or simply radiation.
- Pain in the spinal cord.
- Pain in the back of the head.
- Pain in the “amygdala” or the limbic system.
- Pain in the forehead.
- “Cooked” brain.
- Electroshock in the brain.
- Pain in the chest.
- Tooth ache.
- “Heart attacks”
- Pain in vital organs: liver, stomach, heart, lungs, eyes.
- Iching eyes – leading to tears and red eyes.
- Food is poisoned.
- Electronic sexual “rapes” during sleep or while awake, probably with ICT- implants.
Hypnotical trigger words:
- Can mimick any of the above symptoms: radiation, pain, bad tastes, head aches, and so on or trigger unbearable fatigue.
- The trigger words come in whole sequences, like they were taking out of a dictionary with all synonyms and all words that sound alike.
- While some trigger words have effects on the mind and body, others have emotional effects only (sensibilisation of the Targeted individual to certain words, that trigger negative emotions, like disgust, fear, anger).
- The trigger words are sometimes reinforced through dark NLP and gang stalking.
- Trigger words are in the beginning very difficult to discover because they are coupled with the TIs routines. The brain can’t differentiate always between what it is made to believe and what really happens.
- Once discovered, they are “released”; becoming aware of the “truth” wins over the lie that the mind has been told. When they are discovered, new trigger words will be programmed into the subconscious.
Mental pain:
- Loud synthetic telepathy. The attackers talk with some of the victims 24/7. They use interrogation techniques that are only used in the CIA or secret service. That is labeled also V2K (voice to skull, or loud synthetic telepathy). A learning computer with a synthetic voice that can be modulated in any voice, can take over partially or full time, after the initial stages. This keeps the victim awaken and always tired.
- Silent synthetic telepathy. The victim doesn’t hear the attackers but there is thought manipulation, directing their attention.
Psychological pain:
- Bullying at work, friends and family suddenly lost leading to Isolation. Bullying in general.
- Because of what appears, as social problems with other people, the Targeted Individual moves to a place where the “attackers” and the “manipulators” can spread around any kind of rumor for people in the neighborhood and can take control in another way.
- Gang stalking (rude people in crowds that appear and insult the individual, using both verbal and non-verbal communication). Having 20 people, or more, strategically placed to for example look with a hateful look at the Targeted Individual. They are all strangers, they are all rude. They appear every time the TI is outside, and it can take many different expressions. Sometimes it looks like they have some kind of scheme and the harassment follows a pattern, and when it achieves a certain stage, they reset themselves and it startes all over again.
- Street Theater: A group of people playes a whole show for the individual, and it appears to follow a predetermined plot.
- Following the Targeted Individual’s thinking. The thought surveillance is perceived as humiliating.
- The home is entered and the perpetrators don’t steal things, but can destroy them or they can leave objects that don’t belong there. They often seem to enter with a key, because the doors are not forced.
- Thefts in town, at airports: money of belongings.
- Destroyed means of transportation: car or bike.
Total lack of support:
- When the Targeted Individual meets health professionals they are not interested in what the TI tells them. Symptoms are treated in the “old fashioned” way. Many times TIs are forced to take the wrong medication and to agree to sometimes stigmatizing labels in order to receive their pension.
- In certain countries, the TI, can be forced into psychiatry, where total loss of human rights occurs.
- Blacklisting often leads to inability for the TI to find work, or has to accept a job way under their specialization. At the new job, the TI is constantly under harassment and is bullied.
- The police participates in the harassment and is totally insensitive to what the TI goes through.
- The media ignores the TI-cause.
Min control: People on TV are harassing me.
"What You think about becomes reality"
Mind control creates cognitive dissonance.
Other symptoms:
- Strange coincidences happen all the time, several times a day.
- The TI can in his thoughts intercept what it’s going to be on TV in a while, depending on subject of interest. Some TIs are sure that the people on TV are copying them or harassing them.
- “What you think about becomes reality”
- Expectations turn out exactly to the opposite leading to cognitive dissonance.
Air stalking:
This is when helicopters are used to track Targets that are on foot or in cars. They fly over head and follow the Targets from one location to the other. The system is so highly sophisticated that these helicopters and planes might be following targets within minutes of leaving their homes. Targeted Individuals have also observed and reported that flight paths have been directed over their houses during either the day and night which may include air traffic flying significantly lower than what is usual. This can last for months and even years and one can imagine the stress and anxiety a Targeted Individual may experience when continuous low flying aircraft over a TI's house at night for several months.
This is when helicopters are used to track Targets that are on foot or in cars. They fly over head and follow the Targets from one location to the other. The system is so highly sophisticated that these helicopters and planes might be following targets within minutes of leaving their homes. Targeted Individuals have also observed and reported that flight paths have been directed over their houses during either the day and night which may include air traffic flying significantly lower than what is usual. This can last for months and even years and one can imagine the stress and anxiety a Targeted Individual may experience when continuous low flying aircraft over a TI's house at night for several months.
Brighting:
As Targets walk along a street usually at night, civilian informants/snitches will turn on their high beams, maybe flashing them a few times at the target. This is done to let the Target know they are being watched.
As Targets walk along a street usually at night, civilian informants/snitches will turn on their high beams, maybe flashing them a few times at the target. This is done to let the Target know they are being watched.
Mobile phone stalking:
A Targets mobile phone can be used to track and monitor their location. The microphone and camera/video camera can be activated to listen to the target and even watch what they are doing via the video camera. Even when the phone is switched off the microphone can be activated and used to listen in to conversations. It can also be used to locate where the Target is to within a few feet using GPS technology. Anything that the mobile is used for and information that it contains can be accessed. As this following video clip shows, a Target can be relentlessly harassed via their mobile phone.
A Targets mobile phone can be used to track and monitor their location. The microphone and camera/video camera can be activated to listen to the target and even watch what they are doing via the video camera. Even when the phone is switched off the microphone can be activated and used to listen in to conversations. It can also be used to locate where the Target is to within a few feet using GPS technology. Anything that the mobile is used for and information that it contains can be accessed. As this following video clip shows, a Target can be relentlessly harassed via their mobile phone.
Car accidents:
Targeted Individuals have been subjected to being cut off, driven off the road, near fatal car accidents and actual fatal crashes. Wheel nuts have also been known to have been removed and other alterations to their vehicles.
Targeted Individuals have been subjected to being cut off, driven off the road, near fatal car accidents and actual fatal crashes. Wheel nuts have also been known to have been removed and other alterations to their vehicles.
Crowd mobbing:
When the Target is in public, civilian spies/snitches will usually try to box the Target in. For e.g. they will surround the Target in a square like formation if possible. They will stand too close and swarm them.
When the Target is in public, civilian spies/snitches will usually try to box the Target in. For e.g. they will surround the Target in a square like formation if possible. They will stand too close and swarm them.
Directed conversations:
These are conversations that complete strangers will have in public that the Targeted Individual can hear that relate to the Target and their personal situation. The strangers will repeat things that were said in the Targets home, or on their phone. They will drop very personal details into the conversation that could only be related to the Target.
These are conversations that complete strangers will have in public that the Targeted Individual can hear that relate to the Target and their personal situation. The strangers will repeat things that were said in the Targets home, or on their phone. They will drop very personal details into the conversation that could only be related to the Target.
Emotional sapping:
This occurs through people in a Targets life who are capable of depleting the Target of their energy by continuously insulting , degrading and making negative comments about them. Targets have also reported encounters with more than a frequent amount of strangers who will make negative comments about them and attempt to deplete them of their energy.
This occurs through people in a Targets life who are capable of depleting the Target of their energy by continuously insulting , degrading and making negative comments about them. Targets have also reported encounters with more than a frequent amount of strangers who will make negative comments about them and attempt to deplete them of their energy.
Entrapment:
Civilian citizen informants/snitches will attempt to lure the Target into difficult and compromising situations for the sole purpose of setting them up. This could involve all manner of various situations such as sexual entrapment, harassment, drugs etc. Once this happens it puts the Target at risk for into becoming an informant themselves or facing prosecution.
Civilian citizen informants/snitches will attempt to lure the Target into difficult and compromising situations for the sole purpose of setting them up. This could involve all manner of various situations such as sexual entrapment, harassment, drugs etc. Once this happens it puts the Target at risk for into becoming an informant themselves or facing prosecution.
Fake credibility reports:
It has been indicated that Targets will have warning markers placed against their files. This information is then shared with relatives, co-workers, friends and the community at large. In the case of Jane Clift her information was shared at every location she went. The information was used to prejudice and slander her within the community where she lived for over 10 years. The files might have a description of the Target and information about some alleged crime, incidents that the Target has been flagged for, or is under investigation. The information is usually very convincing and helps to further the Targets harassment by members of the various communities that they encounter.
It has been indicated that Targets will have warning markers placed against their files. This information is then shared with relatives, co-workers, friends and the community at large. In the case of Jane Clift her information was shared at every location she went. The information was used to prejudice and slander her within the community where she lived for over 10 years. The files might have a description of the Target and information about some alleged crime, incidents that the Target has been flagged for, or is under investigation. The information is usually very convincing and helps to further the Targets harassment by members of the various communities that they encounter.
Gas lighting:
Doing little things to make the Target think they are going crazy. Citizen informants will enter the Targets home and move their furniture around, change clothing that they bought with similar items and taking items and replacing them later on. To gaslight a Target illegal surveillance may be set up to find out intimate details about the Target.
Also illegal audio and visual equipment may also be installed to monitor the Target.
Doing little things to make the Target think they are going crazy. Citizen informants will enter the Targets home and move their furniture around, change clothing that they bought with similar items and taking items and replacing them later on. To gaslight a Target illegal surveillance may be set up to find out intimate details about the Target.
Also illegal audio and visual equipment may also be installed to monitor the Target.
Intimate infiltration:
This is where citizen informants will go out of their way to get into the Targets life. They will try to form friendships with the Target and also attempt to form intimate relationships. They will also attempt to get close to the people that are in the Targets life and attempt to influence them to be negative towards the Target by influencing their opinions etc. If they are unable to get close to the Target the civilian informants will concentrate solely on their close friends and associates.
This is where citizen informants will go out of their way to get into the Targets life. They will try to form friendships with the Target and also attempt to form intimate relationships. They will also attempt to get close to the people that are in the Targets life and attempt to influence them to be negative towards the Target by influencing their opinions etc. If they are unable to get close to the Target the civilian informants will concentrate solely on their close friends and associates.
Isolation:
For this form of harassment to be successful it is important to be able to isolate the target from friends, family members, co-workers and even spouses. To accomplish this isolation many methods are used including, but not limited to: slander. lies, fake files, sabotage and anything that would get the Target into a situation where they have no support systems.
For this form of harassment to be successful it is important to be able to isolate the target from friends, family members, co-workers and even spouses. To accomplish this isolation many methods are used including, but not limited to: slander. lies, fake files, sabotage and anything that would get the Target into a situation where they have no support systems.
Mail & Email tampering:
As part of what happens under illegal surveillance citizen informants will delay the delivery of mail or make sure its not delivered at all. They will also do the same with email and messaging which is called man in the middle attacks.
As part of what happens under illegal surveillance citizen informants will delay the delivery of mail or make sure its not delivered at all. They will also do the same with email and messaging which is called man in the middle attacks.
Mimicking:
This is when civilian informants/snitches etc will mimick what a Target is doing . i.e. leaving when they do, dressing as the Target does, and so forth. This is all designed to be psychological warfare so that the Target is under the impression that they are under observation at all times.
This is when civilian informants/snitches etc will mimick what a Target is doing . i.e. leaving when they do, dressing as the Target does, and so forth. This is all designed to be psychological warfare so that the Target is under the impression that they are under observation at all times.
Mind reading:
Targets have expressed concerns that mind reading from civilian informants and even accomplished psychics are being used to interpret their thoughts. The history of psychic warfare goes back over 500 years in UK history and the first person to ever sign their name as 007 was John Dee in 1565. John Dee was the Queen of England's senior psychic/occultist and it is well chronicled that he set up vast psychic spy networks across Europe in the 1500's. Ever since spiritualism gained popularity over 140 years ago, government intelligence agencies have used psychics in villages, towns and cities across the country to assist in procuring intelligence. However this is still deemed an intelligence agency secret in most quarters of society and its a secret the intelligence agencies wish to keep.
Targets have expressed concerns that mind reading from civilian informants and even accomplished psychics are being used to interpret their thoughts. The history of psychic warfare goes back over 500 years in UK history and the first person to ever sign their name as 007 was John Dee in 1565. John Dee was the Queen of England's senior psychic/occultist and it is well chronicled that he set up vast psychic spy networks across Europe in the 1500's. Ever since spiritualism gained popularity over 140 years ago, government intelligence agencies have used psychics in villages, towns and cities across the country to assist in procuring intelligence. However this is still deemed an intelligence agency secret in most quarters of society and its a secret the intelligence agencies wish to keep.
Psychic direct conversation:
Targeted Individuals have also experienced directed conversations using the thoughts that they have. For e.g. the Targets home, vehicle and workplace are fitted with audio equipment and the surveillance team can hear a majority of the Targets conversations. These conversations can then be relayed back to the Target ( See Direct Conversations) by citizen informants/snitches/snoopers etc within proximity to the Target so they can hear them. This is obviously a psychological ploy to create certain emotional disturbances within the Target as they become aware that their conversations at home/vehicle/work place are being monitored. With psychic feedback via directed conversation, the Target who is aware that their conversations are being listened in to via audio/video equipment, starts to keep important information about their activities and their future plans/events/meetings etc to themselves.
This is where psychics will read the Targets thoughts and the information gleaned from them is relayed back to the Target via directed conversations. This can be unnerving for the Target at first as they realize that their thoughts are being read and are then relayed back to them time and again through directed conversations via citizen informants/snitches/co-workers etc. It is important to remain aware that the goal of covert warfare is to break down the Target, physically, mentally, emotionally and spiritually and psychic directed conversations are just another tool of the organization to accomplish this. It is important that if the Targeted Individual experiences continuous use of this method of psychological attack, the best form of defense is to continue as normal as their is really no defense, only a way of 'being' which encompasses living in the now, in the present moment and being spontaneous.
All you need to know about mind reading from a book first printed in 1907.
Targeted Individuals have also experienced directed conversations using the thoughts that they have. For e.g. the Targets home, vehicle and workplace are fitted with audio equipment and the surveillance team can hear a majority of the Targets conversations. These conversations can then be relayed back to the Target ( See Direct Conversations) by citizen informants/snitches/snoopers etc within proximity to the Target so they can hear them. This is obviously a psychological ploy to create certain emotional disturbances within the Target as they become aware that their conversations at home/vehicle/work place are being monitored. With psychic feedback via directed conversation, the Target who is aware that their conversations are being listened in to via audio/video equipment, starts to keep important information about their activities and their future plans/events/meetings etc to themselves.
This is where psychics will read the Targets thoughts and the information gleaned from them is relayed back to the Target via directed conversations. This can be unnerving for the Target at first as they realize that their thoughts are being read and are then relayed back to them time and again through directed conversations via citizen informants/snitches/co-workers etc. It is important to remain aware that the goal of covert warfare is to break down the Target, physically, mentally, emotionally and spiritually and psychic directed conversations are just another tool of the organization to accomplish this. It is important that if the Targeted Individual experiences continuous use of this method of psychological attack, the best form of defense is to continue as normal as their is really no defense, only a way of 'being' which encompasses living in the now, in the present moment and being spontaneous.
All you need to know about mind reading from a book first printed in 1907.
Psychological manipulation:
Noise disturbance:
This will include anything from doors slamming, loud stereos, car stereos, regular beeping of horns as cars drive past by civilian informants to many other noise related events. It can also be used at night to keep Targets awake.
This will include anything from doors slamming, loud stereos, car stereos, regular beeping of horns as cars drive past by civilian informants to many other noise related events. It can also be used at night to keep Targets awake.
Illegal entry:
This when audio/visual equipment can be inserted into the Targets accommodation. This is either accomplished by stealth or a fake burglary as a cover.
This when audio/visual equipment can be inserted into the Targets accommodation. This is either accomplished by stealth or a fake burglary as a cover.
Random encounter:
This will be people on the street who you randomly and unexpectedly run into. It looks completely natural and it seems to be a random encounter/co-incidence. They might ask for your phone number, ask you out, to meet up or engage you in conversation. The purpose of these encounters can vary from finding something out about you to getting you to carry out a per-ordained task.
This will be people on the street who you randomly and unexpectedly run into. It looks completely natural and it seems to be a random encounter/co-incidence. They might ask for your phone number, ask you out, to meet up or engage you in conversation. The purpose of these encounters can vary from finding something out about you to getting you to carry out a per-ordained task.
Ruined relationship:
When targets are in a relationship, the civilian spies/snitches will try to sabotage that relationship. This could be friendships , family or significant other. If its a romantic relationship, the targets partner will be profiled and weaknesses searched for , all with the aim of destroying the relationship. If its a friendship, they will use slander, lies and defamation to become between you. The same goes for family. This is done to remove all the Targets support system. By the time the Target realizes what has occurred, it is generally to late as the support system has been dismantled, and they are left isolated.
When targets are in a relationship, the civilian spies/snitches will try to sabotage that relationship. This could be friendships , family or significant other. If its a romantic relationship, the targets partner will be profiled and weaknesses searched for , all with the aim of destroying the relationship. If its a friendship, they will use slander, lies and defamation to become between you. The same goes for family. This is done to remove all the Targets support system. By the time the Target realizes what has occurred, it is generally to late as the support system has been dismantled, and they are left isolated.
Slander:
The notifications can and often do often contain inaccurate or unsubstantiated information about the Target. Information that is often presented as fact. The information will be presented to those in the targets environment without the targets knowledge. Often the lies will consist of the target being under investigation, being into something illegal, is someone who is dangerous or just needs to be watched for some vague reason, i.e. information will be circulated that the target is a drug dealer, a crazy person, terrorist, racist etc.......
The notifications can and often do often contain inaccurate or unsubstantiated information about the Target. Information that is often presented as fact. The information will be presented to those in the targets environment without the targets knowledge. Often the lies will consist of the target being under investigation, being into something illegal, is someone who is dangerous or just needs to be watched for some vague reason, i.e. information will be circulated that the target is a drug dealer, a crazy person, terrorist, racist etc.......
Sleep deprivation:
Depriving the target of sleep is one of the most vital ingredients in the citizen informants strategy of breaking down a target. Without much sleep proper cognitive function is difficult and when a target is engaged with the techniques listed in this section, they will become much more stressed out, which in turn causes a negative cycle of stress, anxiety and an inability to relax and therefore more susceptible to the gang stalkers tactics.
Depriving the target of sleep is one of the most vital ingredients in the citizen informants strategy of breaking down a target. Without much sleep proper cognitive function is difficult and when a target is engaged with the techniques listed in this section, they will become much more stressed out, which in turn causes a negative cycle of stress, anxiety and an inability to relax and therefore more susceptible to the gang stalkers tactics.
Street threat:
This can be as random as a dozen citizen informants acting unusual around the Target Individual to them lining the street every 10 meter's to where the Target is walking along.
This can be as random as a dozen citizen informants acting unusual around the Target Individual to them lining the street every 10 meter's to where the Target is walking along.
Telephone redirected:
When a target makes a telephone call when they are under covert surveillance and harassment Targets have reported having their calls re-directed. The calls will be intercepted and the other person will pretend/act to be the person/business that you have called. This method can and is used to create varying degrees of disruption. It has also been used extensively to destroy targets who have had their own businesses.
When a target makes a telephone call when they are under covert surveillance and harassment Targets have reported having their calls re-directed. The calls will be intercepted and the other person will pretend/act to be the person/business that you have called. This method can and is used to create varying degrees of disruption. It has also been used extensively to destroy targets who have had their own businesses.
Tracking:
The targets are tracked by a variety of ways, either on foot, by vehicles; from tracking devices attached to their cars, using their mobile phones, sat navigation and laptops. Satellites are also being used more extensively for this purpose.
The targets are tracked by a variety of ways, either on foot, by vehicles; from tracking devices attached to their cars, using their mobile phones, sat navigation and laptops. Satellites are also being used more extensively for this purpose.
Wrong number calls:
Targets will often get wrong number calls. Informants will use this method to systematically psychologically harass and monitor the targets. Also targets details will be passed to personal injury firms where the target will receive regular calls and texts asking them about their recent accidents etc.
Targets will often get wrong number calls. Informants will use this method to systematically psychologically harass and monitor the targets. Also targets details will be passed to personal injury firms where the target will receive regular calls and texts asking them about their recent accidents etc.
Harassment & tracking via Facebook & social media:
Over a dozen of our members have reported over the last few years that their Facebook accounts have been accessed by intelligence and surveillance agencies using a backdoor script written into Facebook. They have reported that messages that they have sent haven't been received by their friends; they have received messages purportedly from friends though when checked the friend(s) haven't sent them and the messages contained specific psychological methodology to misdirect/harass/separate and isolate the member activists. The conclusion we have come is to is that the surveillance software is able to duplicate multiple friends accounts without their knowledge and therefore can be used by a surveillance operator to continuously misdirect/harass and intimidate individuals by pretending to be their real friends on Facebook. The methodology is the same that a Police/intelligence agency would use to infiltrate the support network of friends and family of a Targeted Individual in an attempt to intimidate, bully, manipulate, harass, frighten and eventually isolate a target.
Over a dozen of our members have reported over the last few years that their Facebook accounts have been accessed by intelligence and surveillance agencies using a backdoor script written into Facebook. They have reported that messages that they have sent haven't been received by their friends; they have received messages purportedly from friends though when checked the friend(s) haven't sent them and the messages contained specific psychological methodology to misdirect/harass/separate and isolate the member activists. The conclusion we have come is to is that the surveillance software is able to duplicate multiple friends accounts without their knowledge and therefore can be used by a surveillance operator to continuously misdirect/harass and intimidate individuals by pretending to be their real friends on Facebook. The methodology is the same that a Police/intelligence agency would use to infiltrate the support network of friends and family of a Targeted Individual in an attempt to intimidate, bully, manipulate, harass, frighten and eventually isolate a target.
Chemical & Biological attacks: