Text
Volume II – Part I
Introduction to the Hidden Evil
Now that we understand who runs who runs this planet, it will be easier to see how such a secret policy can exist. It also becomes evident why money is no barrier. The reason of course is that they make the money.
The Hidden Evil, is also called Gang Stalking, Cause Stalking, Public Mobbing, an Electronic Concentration Camp, Covert War, Mental Rape, and a variety of other names.(*)
It involves two major components. First, the use of Non-lethal Weapons (NLW), which includes Directed Energy Weapons (DEW). Second, heavily networked groups of plain-clothed citizens who encircle targeted people in public. This network appears to involve volunteers who are part of a state-sponsored Neighborhood Watch program, as well as individuals and groups of informants with no official connection to the state. As I’ll demonstrate, mainstream news has indicated that one in twenty-four citizens will be recruited as informants. Some publications contend that the goal is the recruitment of one-third of the population.
Organizations from the federal level downward participate in the harassment, which includes local stores and restaurants. This program is not in the process of being created, it is already here. It is thoroughly embedded in most major communities. It is happening in all NATO countries. The program has been operational in some form since at least the early 80s, when families of people with direct or indirect connections to federal agencies were targeted.
Some people spent a significant about of time designing this program. Influential people have ensured its survival. It is also almost invisible and traceless. Some of the organizations I’ve found to be likely responsible for the Hidden Evil, contain people that are considered to be our world leaders. On the surface, they appear to be humanitarians.
The pretext for the existence of this program is presumably to identify and track potential threats to national security and to rid communities of undesirables. As I’ll demonstrate, citizen informants have been used to stalk and harass people in other countries for the same reasons. Microwave weapons have also been used on dissidents. U.S., German, and Russian intelligence agencies have all used these tactics. The Hidden Evil appears to be a culmination of them, which from what I have learned, has been fine-tuned with the help of Establishment Think Tanks.
Julianne McKinney is a former army intelligence officer and director of the Electronic Surveillance Project Association of National Security Alumni, which was an organization composed of former intelligence officers dedicated to exposing excesses by the U.S. Intelligence services. Her preliminary report, Microwave Harassment and Mind-Control Experimentation published in 1991, is a well-documented outline of these activities.
According to her interview on the Republic Broadcasting Network (RBN), these activities have increased significantly since the report was published. She kept this organization operational for four years using her personal funds. She has about 40 years experience with this subject and has talked with and interviewed hundreds of targeted individuals. I’ll be referencing her report and her interview on the RBN throughout this book.
Dr. Reinhard Munzert, scientist, psychologist, and university lecturer has authored three books and over 100 articles. He began investigating this phenomenon with the aid of his students after learning he was targeted. His article, Targeting the Human with Directed Energy Weapons, which was the number one listing on Google for two years, will be referenced, as well as his interview on RBN.
I’ll also be referencing the work of Leuren Moret, particularly her interview on Vancouver Co-op Radio CFRO 102.7 FM, on August 8th 2005. She is the former Environmental Commissioner of Berkeley California and the president of Scientists for Indigenous People. She has worked at two US nuclear weapons laboratories as a geoscientist and has contributed to a UN sub-commission investigating depleted uranium. She, Julianne and Dr. Munzert have been on the receiving end of this harassment.
In her article, Uncovering the Truth About Depleted Uranium, Moret speaks of her personal Gang Stalking experience, which she refers to it as Mobbing. She writes, “‘Mobbing’ is the purposeful and strategic institutional gathering of all information about an individual by using any method – legal or illegal. Contact for this purpose is made with neighbors, classmates, former partners, family members, former employers, teachers, church members, good friends and even your family tree…”
She continues, “Everything must be known about the support system around you that makes your life possible.” This includes, “[the] assessment of strategic resources and future income (finances, mobility, cars, insurance, credit cards, bank safety deposit boxes, post office boxes, wills, health records, birth certificates, transcripts and photographs) is made without your knowledge. The purpose of mobbing is to drive the target individual out of the job force for the rest of their life; the bigger goal is to drive them to the ultimate self-destruction: suicide. The information gathered… is used to take your life apart… and to attempt to make you look crazy.” She adds, “Your children are harassed, they come home with belongings missing and stories of teachers harassing them.”
The psychological aspect of the group harassment which takes place in public is identical to Mobbing; it has the same group dynamics. For that reason I’ll make references to Mobbing throughout this book. The Mobbing phenomenon has been well documented and studied in other countries for years. However, it is only now beginning to receive attention in North America.
Mobbing, also known as “psychological terror” involves the systematic harassment of an individual by a group of individuals in the workplace, and according to the authors of the book Mobbing, also in public. In the workplace, the group is often rallied by an authority such as Human Resources. It includes rumors, setups, and skits intended to humiliate the target and make them appear incompetent.
The documented mainstream exposure that Mobbing has received will help us understand how thousands of people in some major cities can be recruited to systematically attack individuals. The Mobbing I’m referring to is committed by multiple people using subtle but repeated harassment, which takes place in the workplace and is difficult to prove. It is used to kick a person out of the workplace or even workforce while leaving little trace. The logic is that it is less of a liability for the organization if you “voluntarily” leave than if they fire you. In addition, some organizations with sadistic intentions enjoy it as a form of sport harassment as well.
Although it would appear that the Hidden Evil is a new phenomenon, it is not. Tyrannical regimes throughout history have used local groups to neutralize dissent. Group Stalking is simply another manifestation of this pattern. In order to understand how an entire country could be complicit in the persecution of perceived undesirables, a study of German and Russian dictatorships is essential.
Therefore, evidence will be presented which describes how similar programs of persecution were used during these dictatorships, and how the U.S. and other NATO countries are heading in that direction.
Finally, we’ll draw upon the Milgram experiments, which will illustrate how most ordinary people will repeatedly torture innocent people under the direction of an authority figure.
Persecute
“To harass or punish in a manner designed to injure, grieve, or afflict; specifically: to cause to suffer…”
-Merriam-Webster’s Dictionary
Persecution
“Persecution is the systematic mistreatment of an individual/group by another group. The most common forms are religious persecution, ethnic persecution, and political persecution.”
-Wikipedia Encyclopedia
Footnotes
* These names are taken from a combination of web sites listed in the sources.
Tactics (Part 1)
It has been said that when you’re first targeted, they hit you hard in multiple directions.
Presumably, this is done so you’ll collapse after experiencing recurrent emotional violence, which is compounded after you’ve realized that all normal support structures and avenues of grievance have been removed. There appears to be multiple levels of intensity of this program that people can receive. The two main parts of the program are group stalking and Non-lethal Weapons (NLW). Both are violent attacks. And some are apparently hit hard with both.
People tend to associate the word harassment with acts of temporary aggravation or pestering. Therefore, it may not by the proper word to describe the never-ending acts of covert violence inflicted upon targeted people, which amounts to torture and murder. Some of the tactics used in these programs are borderline-subliminal, which is why they are so difficult to detect, explain, and defend against.
It is my goal to make the unconscious, conscious. Many of these tactics are a type of mind-control.
Most of these tactics have been used in former Cointelpro operations by the United States, Russia, and Germany against their civilian population.
The Hidden Evil’s genesis is obviously derived from known tactics such as bogus investigations, surveillance, smear campaigns, the use of noise, thefts, break-ins, character assassination, staged accidents, framings, sabotage and vandalism, mail interference, blacklisting, citizen informant squads for overt surveillance (Gang Stalking), poisoning and drugging, incarceration into prisons and mental institutions, and electromagnetic weaponry.
It is a historical fact that the U.S. has officially targeted its civilian population on multiple occasions. Programs such as MKULTRA and Cointelpro can’t be denied.
“The methods reportedly employed in these harassment campaigns,” explained McKinney, “bear a striking resemblance to those attributed to the CIA and FBI during Operations MKULTRA, MHCHAOS, and COINTELPRO.”
In Germany these methods were contained in two programs, Zersetzung and Directive Perceptions.
They were basically German versions of Cointelpro. Zersetzung was developed to destroy a targeted person’s inner-self. During an interview on the Republic Broadcasting Network, Dr. Munzert, a German target, drew a parallel between the current program, and what occurred in East Germany.
He explains,
“In Germany this is called Zersetzung and this means the dissolution or disintegration of the targeted person.”
BBC in 2004 for her non-fiction book, Stasiland. In it, she wrote,
“The German word Zersetzung is harsh, and has no direct English equivalent.” She described, “Zersetzung, as a concept, involves the annihilation of the inner-self.”
It calls for,
“[The] targeted spreading of rumours about particular persons with the aid of anonymous [means]… making compromising situations for them by creating confusion over the facts… [and] the engendering of hysterical and depressive behaviors in the target person.”
“Directive Perceptions,” she continued, was another program designed to “develop apathy (in the [targeted] subject)… to achieve a situation in which his conflicts, whether of a social, personal, career, health or political kind are irreversible… to give rise to fears in him… to develop/create disappointments… to restrict his talents or capabilities… to reduce his capacity to act and… to harness dissentions and contradictions around him…”
These directives were used by the Ministry for State Security (MfS) against threats to state security. In other words, they were massively used on the population to maintain a dictatorship.
These programs were designed to secretly destroy a target’s personal and professional life, ruin them financially, and prevent them from reaching their potential, with the intention to produce irreversible depressive and panic-stricken behaviors. What the Hidden Evil appears to be, is a combination of various Cointelpro operations used by oppressive regimes on their civilian population. It has been refined and deployed globally.
As I’ll demonstrate, it is likely an indication of the creation of a worldwide dictatorship.
Hidden in Plain View
Many of us have experience with books where the goal is to find the hidden picture contained in the landscape.
Or the artwork, where if you look intently, you will eventually see a three-dimensional picture superimposed on a flat background. At first, most of us had some trouble detecting these hidden pictures, but with practice we usually see them. Once the detection mechanism is developed, these hidden objects become clearly visible with little effort. So too with the Hidden Evil.
Once you know what to look for, these borderline-subliminal attacks are quite detectable.(*)
So, rather than using a blunt overt attack against a fully functional person, they usually attack covertly, and conceal their harassment by using existing events that occurs naturally. There is usually cover for the harassment as well. However, it is probably a statistical rarity for some of these staged events to occur as often as they do. They conceal much of their harassment using what appears to be a simple formula.
From what I’ve learned, the basic formula is as follows:
-
Frequency: Describes how often an event occurs. It also pertains to the number of acts within a single event.
-
Duration: Pertains to the length of a single event. It also pertains to the non-stop nature of the harassment in general.
-
Intensity: The amplification of acts such as sound, sight, crowding, etc. within an event.
A hypothetical example of a car door-slamming event would include this:
One neighbor arrives and two others leave.
As they’re tending to their vehicles there is the repeated opening and shutting doors and trunks, alarms going off, and beeping from alarms being turned on. These disturbances emanate from areas surrounding your house. This may happen simultaneously, or they may be strung together, one right after the other. Synopsis
The event lasted for 5 minutes; longer than normal (Duration). In addition to length of the event being extended, the number of times each act occurred within the event was increased (Frequency).
Ex: Multiple, repeated doors/trunk slamming from cars, even if a single individual is at the vehicle. This event also happens many times throughout the day (Frequency). Each individual act of door/trunk shutting is amplified by deliberate slamming to produce a louder than normal noise (Intensity).
The event was louder, contained more activity (acts), and lasted longer than normal to produce a covert attack. Even if a single individual is arriving/leaving, standard practice seems to be multiple slams (trunk, back door, driver’s door).
This may be synchronized with your activity, such as your arrival or departure. The event may also be a part of a Noise Campaign consisting of an alteration of other types of noise. This basic formula is used with many of the tactics outlined in this chapter. The frequency and duration formula is also used in Mobbing.
In addition to the overuse of an individual tactic, these tactics are combined and used in a round-the-clock fashion, which amplifies their overall potency.
Basic Protocol
There is a basic protocol that they begin with which is consistent in all NATO nations.
It begins with the surveillance of targets, monitoring of their private lives, and entry into their homes (break-ins). This is done so their personality traits can be cataloged.
“There is a basic protocol that the perpetrators begin with,” states McKinney, “but the TI [Targeted Individual] contributes to the modification.”
After they are singled out for preliminary stages of harassment, Gang Stalking ensues, which McKinney describes as part of a “softening-up process.”
After a period of overt surveillance (Gang Stalking), NLW are introduced. The NLW harassment gradually increases to extreme conditions. This pattern has unfolded consistently in all NATO countries.
Dr. Munzert speaks of basically the same pattern, which he describes as a “double-folded strategy.”
“It is usually the same procedure,” he announced, “but with individual variations.”
One part includes the victims being “attacked with microwave weapons,” and “the other part of the strategy” he says, is to portray the targeted people as “mad [insane].”
He explained the effectiveness of this approach as “unbeatable,” and reveals that this is essentially what the Stasi did to their targets. Part of this protocol appears to include elements of Neuro-linguistic Programming (NLP), which is a type of mind-control used by behaviorists to affect change. NLP will be covered in more detail shortly.
Some of the tactics below have been called Street Theatre, Harassment Skits, or Staged Events. They are planned harassment skits, such as blocking, or swarming. They also include informants who surround targets and have conversations intended to be overheard, which contain information about the target’s personal life.
Presumably, citizen informants are told that this is necessary to let targeted people know they’re being watched. This may happen in any public place. This is not a complete list of tactics but it includes some of the more common ones reported.
Some of these tactics will sound insane because they’re deliberately designed to make someone appear as though they’re suffering from a mental disorder. They were definitely created by experts in the behavioral sciences. In addition, people may be emotionally drained, and unable to properly identify or explain what’s happening to them.
According to the DOJ, mental tactics designed to cause psychological harm must last for months or years before they constitute torture. The Hidden Evil fits this description.
So keep in mind, these are Psychological Warfare tactics which are intended to drive people crazy.
Mental Health System
The mental health system is apparently being used worldwide to discredit targeted people who complain.
According to the book, Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas, countries around the world, including the U.S., have used doctors to help abuse and discredit people, often for political reasons. It is also a documented fact that there was collaboration between doctors and the military when experiments were carried out in prisons, hospitals, and universities on unwitting people in North America.
McKinney states that medical doctors, as well as psychiatrist and psychologists appear to be providing cover for this program.
This is similar to what was done in Russia, where enemies of the dictatorship would be thrown into mental institutions and drugged beyond recovery.
“The APA’s refusal to acknowledge the impact of terrorization upon the human psyche, even given the publicity stemming from the Church Committee’s findings in 1975, raises serious questions about the validity of psychiatry as a profession in this country,” declared McKinney, “not to mention, the APA’s ethical intent, in the long term.”
The DSM is a diagnostic manual for identifying mental disorders.
The first edition of the DSM was released in 1952 at a time when the APA was under the control of Dr. Ewen Cameron, who would commit brutal government-sponsored torture under the MKULTRA program. Dr. Rauni Leena Kilde, former Chief Medical Officer of Finland, wrote an article entitled, Microwave Mind Control: Modern Torture and Control Mechanisms Eliminating Human Rights and Privacy.
In it she described,
“The Psychiatric Diagnostic Statistical Manual (DSM) for mental disorders,” as a “brilliant cover up operation in 18 languages to hide the atrocities of military and intelligence agencies’ actions towards their targets.”
Dr. Kilde says the manual,
“lists all mind control actions as signs of paranoid schizophrenia,” and that “all medical schools teach their students that the person is paranoid, ESPECIALLY if he believes intelligence agencies are behind it all.”
Finally she proclaims,
“Never is the medical profession told that these are routine actions all over the world by intelligence agencies against their targets.”
Dr. Munzert said that doctors,
“first think of paranoia and schizophrenia” if someone complains of this program.
He cautions that because of this, “victims” could end up in a “lunatic asylum.”
Annie Earle, a Licensed Clinical Social Worker, and Board Certified Diplomat in her area of expertise, has over 25 years of psychotherapy experience as an independent practitioner. When referring to the DSM during an interview on the Republic Broadcasting Network, she stated,
“It’s called the Diagnostic Statistical Manual… [and all] psychotherapists, regardless of specialty are required to give their patients a diagnosis from this manual, and in order to get the diagnosis you have to fulfill certain criteria that is clearly spelled out in the DSM.”
Earle noticed a pattern unfolding when some of the people who came to her who did not fit the standard criteria.
“The patients that started coming to me really did not fit any of the standard classifications,” she explained.
“For example, they might be having what some people consider a psychotic or schizophrenic breakdown in that they might report what seem to be hallucinations, but they did not have any of the other criteria that goes along with schizophrenia. There are many criteria that one is required to… [detect] in making the diagnosis of schizophrenia, and these people did not meet all that criteria.”
Apparently Earle became targeted herself while studying this program.
Interestingly, the April/May 1996 issue of Nexus Magazine contained an article entitled, How The NSA Harasses Thousands Of Law Abiding Americans Daily By The Usage Of Remote Neural Monitoring (RNM) written by former NSA worker John St. Clair Akwei.
It read,
“NSA DOMINT [Domestic Intelligence] has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.”
The DSM appears to have been created with a loophole which allows government-sponsored harassment programs to exist.
This was evidently done so that people will appear ill when explaining this to a mental health professional. Adding to this confusion, the program itself is designed to mimic mental illness when explained to those “not-in-the-know.”
Mental health professionals may also participate in this program, wittingly or unwittingly by labeling targets as mentally ill. It is one of several layers of protection used to help keep this program operating in secrecy.
It’s easy to see how some mental health professionals might “jump to conclusions.”
Surveillance
Surveillance is apparently part of an ongoing bogus investigation that never ends.
The investigation may be done for reasons of “national security.” Similarly, German and Russian security forces would often target the civilian population for the same reason. After a person is singled out, dwellings surrounding the target will be sublet and used as bases of operation and training.
If the target lives in a house, the base will usually be the closest building to the house. If the target lives in an apartment, then the base will be in one or more of the surrounding apartments. There will be unusual patterns of occupancy with lots of people coming and going into these bases. Vehicles and license plates used by the occupants of the bases may be periodically changed.
According to McKinney and Moret, the people who move into these bases have been linked to the DOJ, CIA, and other federal agencies, as well as Universities, and government defense contractors.
“In order to target someone it requires that that person be put under surveillance,” proclaimed McKinney, “so that their personality traits, their capacity to inter-relate with people, their capacity for corruption or non-corruption (that seems to be a critical point), and even their religion factors into it.”
The information obtained by surveillance is used for no ethical reason,
“other than to establish a harassment protocol, which will follow that targeted individual for the rest of his or her life,” said McKinney.
Moret said that neighbors, friends and family are then co-opted into the harassment.
This surveillance is apparently done using very sophisticated equipment which can locate targeted people through walls. This equipment seems to be used in combination with Directed Energy Weapons and other “Non-lethals.”
According to McKinney, miniature microphones and cameras may be planted in your home, or through-the-wall infrared devices may be used to monitor your movement. The Life Assessment Detector System (LADS) developed at Georgia Tech was apparently created to rescue people trapped in rubble, avalanches, or other disasters.
It has a range of about 135 feet can and can detect heartbeat and respiration. It can also be configured to track a specific person’s movement inside a building.
Soldier
Vision A1, a radar flashlight, has a standoff distance of 30 feet and can detect motion behind a wall at 30 feet as well.
These flashlights have been steadily researched using military and university testing labs since the 1990s. Some of these flashlights display images in 3D format, can detect respiration, and can see through, wood, brick, plasterboard, glass and concrete.
More than likely, the surveillance technology which is now being used on targets worldwide is much more advanced and not publicly available.
Character Assassination
Targets usually experience character assassination which is done to destroy their personal and professional life.
Half-truths and lies are often strategically spread into their lives, and may be the basis for a bogus investigation. The rumors circulated about people are apparently not petty, but shocking and repulsive. They are CIA or Stasi-type life-damaging lies. Some of the people spreading these lies may be acquaintances and/or family members that have been recruited (lied to, intimidated and blackmailed) into becoming informants.
More on the recruitment of family and friends will be covered in the Informants and Motivational Factors chapters.
U.S. Federal law enforcement has used these tactics to destroy people they either wanted to recruit as informants or those they knew they couldn’t recruit and just wanted to destroy.
According to former CIA psychologist James Keehner,
“It was planned destructiveness. First, you’d check to see if you could destroy a man’s marriage. If you could, then that would be enough to put a lot of stress on that individual, to break him down. Then you might start a rumor campaign against him. Harass him constantly.”
Constant harassment, planned destructiveness, character assassination, destroying relationships, all done in concert with the goal of breaking someone down are a standard part of this program.
Reportedly, the usual rumors spread about a person are that they are a pedophile, prostitute, terrorist, racist, anti-government, mentally ill, drug addict, drug dealer, or a threat to “national security.” They are often spread to neighbors, friends, family, employers, etc. A major effort is spent to separate a person from their friends and families.
Apparently these rumor campaigns aid in recruitment.
Dr. Rauni Kilde wrote,
“Deception is the name of the game, so recruits are told untrue sinister stories of their victims to keep them motivated.”
According to CNN, the Stasi used the exact same tactics. They stated,
“The agency was authorized to conduct secret smear campaigns against anyone it judged to be a threat…”
The Russian KGB too, with its massive network of informants, would slander their internal targets.
These rumors may be propagated by multiple people (informants) behind a target’s back. Apparently, not letting a targeted person become aware of these rumors is essential to their effectiveness.
Victor Santoro noted in his book, Gaslighting: How to Drive Your Enemies Crazy, that,
“The essence of defaming your target with rumors is it that it not get back to him.”
Some targeted people believe that rumors are being spread that they are pedophiles.
The organizers realize that labeling someone a pedophile will be highly damaging and produce optimum leverage for gaining community support. It is probably one of the worst rumors you could launch against someone. The Stasi would destroy the character of their targets by labeling them as pedophiles as well.
There have been multiple magazine and newspaper reports of pedophiles being harassed by neighbors, and vigilante groups to the point where they are driven out of communities and forced out of work. Some have been driven out of multiple states.
An article in the Toronto Star entitled, Vigilantes Versus Pedophiles on August 8, 2004 outlined how one citizen’s group called, Perverted-Justice, would start campaigns to expose people that they have concluded were potential pedophiles. This illustrates the mind-set of some groups of people who have reason to believe a person is a pedophile.
The PJ group is run by Xavier Von Erck (real name Phillip John Eide), at www.perverted-justice.com.
Upon visiting a site called Corrupted-Justice at www.corrupted-justice.com, I discovered that multiple members of Perverted Justice have endured trauma such as incest or other forms of sexual abuse and are suffering from a variety of mental disorders. The Corrupted-Justice site obtained this information from member profiles which are publicly available, and located at the Perverted-Justice website.
And according to CJ, Eide is on record saying that more than 40% of his followers have endured this type of sexual abuse.
The CJ site also has some very interesting message board chats (publicly available) by PJ members that are worth a look. Apparently the CJ people have documented proof that members of PJ have hacked into their web server. The CJ people are for the full prosecution of potential sex offenders by using law enforcement equipped with the checks and balances built into the legal system.
The CJ group basically says that although the PJ system appears to be beneficial, it is heavily corrupted.
Most PJ “busts” do not include law enforcement. According to the article in the Toronto Star and the CJ website, the volunteers at PJ instead begin a relentless campaign to expose people they believe are pedophiles by calling friends, neighbors, children, places of employment and ruining personal and professional relationships.
This is similar to what targeted people experience, as indicated by the behavior of their friends, family and co-workers. But they’re never told about it. PJ is listed as a potential destructive cult by the Rick A. Ross Institute for the Study of Destructive Cults, www.Rickross.com.
It appears that some PJ members have a psychological need to feel powerful and meet that need by displaying to the public and their targets how they can destroy a life. I believe that some of these volunteers are ill and have latent sadistic intentions, despite their patriotic motives. Apparently some of them receive a sick type of enjoyment/empowerment by ruining the lives of people, as evident by their chats.
Character assassination is standard. My research leads me to conclude that it is not beyond these people to masquerade as “concerned citizens” and call local officials to register destructive complaints about a targeted person. I’m fairly certain they do this.
This type of “community service” can be very damaging, especially when the complaints originate from multiple, seemingly unconnected sources.
Sensitivity Programs (NLP)
Some of the sensitivity tactics used by these groups are borderline-subliminal attacks designed to artificially create phobias.
They are apparently based on Neuro-Linguistic Programming (NLP). You can think of NLP as a very powerful tool that can be used to produce rapid, profound change. The parts of NLP that groups use are anchors and triggers.
The goal of a these sensitivity programs appears to be to condition people with damaging emotions which are linked to triggers such as objects, colors, movements, and sounds. Once this is done, a target can be covertly injured openly in public. This may happen with or without the target’s conscious awareness.
As I’ll demonstrate, this is brutally violent.
“There is a basic protocol that the perpetrators begin with, but the TI contributes to the modification,” explained McKinney.
She described that a “pavalonian conditioning” program, is used to get targeted people to “respond emotionally to a particular trigger.”
These negative emotions are then “built into the protocol.”
“It’s an ongoing process,” declared McKinney. Moret agrees saying, “They will stalk the target for a while… to condition them,” and make them “confused and frightened.”
Self-help gurus use these programs to create positive emotional states and anchor them to a movement, a sound or an object.
Then the sound, movement, or object becomes the trigger that will invoke the emotion. Although this sounds complex it is pretty simple in practice. It is done by creating a peak emotional state, and then while in that state, you anchor it, that is, do something repeatedly.
This effectively anchors the emotional state to whatever was repeatedly done.
“A stimulus which is linked to and triggers a physiological state is called an anchor in NLP,” stated O’Connor and Seymour in their book, Introducing NLP.
They ask,
“How are anchors created?”
“First by repetition… Secondly, and much more important, anchors can be set in a single instance if the emotion is strong and the timing is right.”
This process of creating anchors has also been called Emotional Transference.
We’re unconsciously creating anchors in our environment all the time with people, music, places, and objects. These stalking groups are obviously led by people knowledgeable in the behavioral sciences. The groups are used to create negative emotional states in targeted people, such as fear and anxiety, and anchor them to common objects.
This is the deliberate creation of a phobia!
O’Connor and Seymour declare,
“An external stimulus can trigger a very powerful negative state.”
“This is the realm of phobias,” they warn.
This is nothing less than using violence to create an injury and then deliberately irritating it.
“Targets are constantly monitored and if a target responds emotionally to a particular trigger, that will be built into the protocol,” says McKinney.
Organizations known to have studied NLP include military intelligence agencies, CIA, FBI, and other state bureaus of investigation.
According to an article called, Non-Lethality, which appeared in June 1993 issue of Lobster Magazine, in the early 1980s, Dr. John Alexander taught NLP to “selected general officers and Senior Executive Service members” as a “set of techniques to modify behavior patterns.”
Some of the references used in this article were taken from Dr. Alexander’s book, The Warrior’s Edge, which was co-authored by Janet Morris, who, according to the article, was a student of the Silva course in advanced mind-control. In the Structure chapter, I’ll provide evidence that Dr. Alexander and Janet Morris have contributed to the creation of this program on behalf of the Think Tanks, as part of a political agenda.
In their book, Dr. Alexander and Janet Morris wrote,
“In 1983, the NLP training group, along with John Alexander, was engaged to teach these skills to several members of Congress, including Al Gore and Tom Downey, under the auspices of Congressmen Clearing House on the Future, a bipartisan activity established to provide information to congressmen when they request it.”
He continued,
“One organization that played a major role in the dissemination of NLP skills was the U.S. Army Intelligence and Security Command (INSCOM)… Unlike the rest of the U.S. Army, INSCOM does not differentiate between wartime and peacetime roles.”
According to his Bio, available at www.platinumstudios.com, Dr. Alexander has worked at,
“the highest levels of government,” such as “the White House Staff, National Security Council, Members of Congress, Director of Central Intelligence, and senior defense officials.”
Morris’ Bio, available at www.m2tech.us, is similar. Some of the organizations she’s worked with include: the White House Office of Science and Technology Policy, Office of the Secretary of Defense, the Marine Corps Warfighting Lab, etc.
“Anchoring,” stated Morris and Alexander, “is based on the neurophysiological assumption that patterns of behavior can be installed, then reactivated whenever a similar situation is encountered or created… Knowing this, you can intentionally install anchors to return your target to specific emotional states. The first step is [to] create the desired emotional state in the individual.”
There has been some concern in the mental health field over the potential misuse of NLP.
Unfortunately, like other tools, such as guns, they can be misused in the wrong hands. Andreas and Faulkner warned of the “possible uses and misuses of this technology,” in their book, NLP: The New Technology of Achievement.
They wrote,
“We recognize the incredible power,” of NLP and “recommend you exercise caution…”
The deliberate infliction of emotional pain is an act of violence. The use of NLP in this manner is similar to a physical attack such as a punch or kick, only it leaves no visible injury.
Here’s an example of how groups use NLP to make you aware that you’re being stalked:
One morning you’re walking out to your car and a man walks in front of you, stares directly at you in a hostile manner while repeatedly clicking his pen the whole time. You feel a little uneasy and say to yourself, “Boy that was weird, what was his problem?”
Then two hours later you’re leaving a shopping mall on a day that it was not particularly crowded. As you walk out to your car, an old lady approaches you on foot. As she almost collides with you, she locks her eyes onto you with a hostile demeanor, while clicking a pen the whole time. Then maybe you tell yourself something like this. “There couldn’t be a relation between those events, probably just a coincidence. But they both stared at me in such a mean way while hammering their pens…”
Later in the afternoon, you’re on your way home. You’re at a stoplight and out of the corner of your eye you see a passenger in the car to your left. You hear a slight noise, and glance over. You see a man glaring at you with a grin on his face. His arm is hanging out the window and he is holding a pen, which he is repeatedly clicking. Now imagine that happening for a month. Then a few days later you’re on a sidewalk with a friend or family member. A man walks by, doesn’t look at either one of you, but clicks his pen a couple of times. You feel anxious and afraid.
You may not even know you’ve been sensitized.
One reason people may not realize that they’re targeted or can’t remember exactly when it began, is because these groups may slowly and gradually increase the harassment over time. But if you did recognize it as an attack, what would you tell your friend or family member?
This is what happened:
The collisions, blatant hostile staring, and foul grin created the negative emotions and anchored them to the pen, which has now become the trigger.
That is an example of a sensitivity program. Now imagine yourself being sensitized to multiple objects and sounds, and each of them creating pain each time you see or hear them.
Targets around the world have witnessed this being done with sounds, gestures, cell phones, laptops, pens, cars, watches, clothing, symbols, colors, and other items. This type of attack does require some maintenance and will loose its potency unless it is reinforced. So groups will reinforce these anchors and triggers with an occasional blitz attack from time to time.
The example above is a simple tactic which groups can use to let you know that you’re being harassed in public. But there are many other attacks which NLP can be used for. For instance, you have recently experienced an extremely traumatizing event (which may have been facilitated by a faction of this network), such as an accident, death of a family member or pet, or some type of a brutal assault.
Those who have you under surveillance know that there is a color, object, or sound that you’ve linked (anchored) massive pain to. Then shortly afterward, you are stalked by multiple people who carry that object, wear that color, or utter that phrase. This brings to the surface all the emotional pain you suffered during that experience.
Imagine this happening again and again, every time you go outside. Now think what it would be like if your family and friends started to participate.
Groups will take an object you’ve been sensitized to and link it to another object. The idea appears to be to keep expanding the amount of objects you associate fear, anxiety, anger, or shame with. For instance, one of your neighbors has made it clear that they’re participating in the harassment. Now, you know they’re participating, and they know you know.
So they may try to sensitize you to another stimulus such as a car alarm.
Because you’ve already associated them with massive pain, they can extend their harassment to a sound by turning their car alarm on/off in rapid succession over a short period of time, multiple times throughout the day. After they’ve done this for a couple of days and you’ve been sensitized to this sound, they can reduce their use of this specific tactic and just use the occasional maintenance sounds to inflict pain.
Now instead of repeatedly turning it on/off ten times, they only do it two or three times in a row, just to let you know you’re being attacked. Even though it’s only done a couple times in a row, you know why they’re doing it and you may feel anger, fear, anxiety or other negative emotions. You may also feel frustrated at the prospect of trying to explain this harassment to another individual.
Anyone else observing this might think it’s a little strange that someone would turn their alarm on/off a few times but they’d probably write it off as an isolated strange incident. But because they have not had your experience with that sound, and are not aware that it is a small part of a much larger harassment program, it would be difficult to explain that those beeps were attacks.
In NLP, the process of copying an emotional state from an existing trigger to a new trigger is called chaining.
O’Connor and Seymour state,
“Anchors can be chained so that one leads to another. Each anchor provides a link on the chain and triggers the next one, just as the electrical impulse flows from nerve to nerve in our body.”
After a person has been sensitized to a color or object, the article can become a unification symbol for the group, much like a uniform.
For instance, after a person has been sensitized to the color red, she is surrounded by people wearing red cloths in public. Furthermore, this is an adaptable uniform because it can be changed in less than five minutes. If a person who realizes that they’re being Gang Stalked has been sensitized to red, then the organizers of these groups can simply have them blitzed by a horde of citizens wearing the color blue.
The harassment has now been chained to this color. Most likely, these uniforms also help promote group cohesiveness, and may foster feelings of empowerment among stalkers.
Space Invasion (Crowding)
Space invasion includes blocking, cut-offs, and swarming or what some TIs refer to as, crowding.
Targets may be encircled by people wearing colors or holding objects that they’ve been sensitized to. Prolonged crowding can have an extremely negative effect on your mental/emotional health. The people who designed this harassment program were obviously well aware of this.
While some cultures may be more immune to crowding than others, even people from parts of the world that have been historically crowded react stressfully to crowding. People who have not been invited into your personal space but deliberately violate it are attacking you.
Body language is more accurate and reliable than verbal communication. Most of this non-verbal communication is unconscious. The study of this language has been called Social Kinesics (the study of body communication). There are two components to this communication: One contains movements, gestures, postures, the other is spatial relationships. The study of communication using distance/space is called Proxemics.
For most North Americans the intimate zone is 0-18 inches and personal space is 1 -4 feet. This type of communication is used to harass a person. For instance, while in stores, restaurants and public places that are not busy, a target will have people invading their personal space. This happens even if there are only two customers in a store.
If a targeted person makes a move from one place to another, several people may suddenly appear and jump out in front of him from around corners and isles.
The deliberate space invasion use by these people is designed to look like normal cut-offs and collisions that we all experience from time to time. It can happen with vehicles, on foot, or a combination.
This type of space invasion is obviously intended to startle people and make them tense. It can be thought of as a virtual slap. They are used in blind areas such as corners, hallways, restrooms, or intersections where targets have people or cars cutting them off, or almost hitting them in a calculated manner.
This happens in stores, buildings and on the street, with people and vehicles.
With some artificially induced cut-offs, the perpetrator is seen at a distance. The target and the perpetrator(s) are heading toward the same focal point which is used to maximize crowding. The point may be a corner, a very small walkway, a thin passageway, or an obstruction on the sidewalk such as a telephone pole or a tree.
The informants adjust their timing so that they meet the target at the exact point where there is the least amount of space for all parties to pass, thus maximizing the invasion of the target’s space.
Apparently the idea is to get the target’s attention and make them uncomfortable. When standing in a checkout-line, targets may routinely have group members standing a foot or closer behind them. And rather than wait for a target to leave, they may crowd them as they reach to the side or in front of the target to put their items on the counter.
If a target is outdoors in a populated area, he or she may see a wave of people move in the direction that they’re headed in order to swarm them.
If a target moves, then stops and waits for a few moments, they may see that the activity will settle back to normal again after the horde passes. This test can be run indoors and outdoors as well. Sometimes the horde may blatantly adjust their timing, or linger for a while until the target begins to move again, then they’ll continue.
These crowding and blocking tactics amount to an obstacle course that follows people wherever they go.(**)
They will also block targets, both on foot and with vehicles. For instance, as a target leaves a parking lot, a vehicle or person will be in the way, usually for a few moments. These things happen to everyone, once in a while, but for targets, it happens consistently, regardless of the time of day or how busy the area is.
This space invasion happens on days/times that there are normally not many people. It happens in stores while making purchases, restaurants, businesses, where targets have people frequently cutting them off, invading their space, using sensitivity programs, or other harassment tactics. If there is one customer in the store, they will probably be invading the target’s space.
For instance, a TI is indoors when it is not crowded, but witnesses multiple people who, instead of taking the shortest path to their destination, go double or triple the distance just so they can brush by them or cut them off.
Here is one personal example which took place at a YMCA in Boston, shortly after I realized I was being Gang Stalked. At the time, there were four people, including myself in the weight room. After I was there for a few moments I noticed there was an unusual amount weight banging. It was louder and more repetitive that it normally is.
I’ve been exercising and going to health clubs for about 15 years and I immediately recognized that these few people were repeatedly going out of their way to make as much noise as possible. I sat down on a bench and started doing dumbbell presses. Two students walked in, stood on either side of the bench I was sitting on and began to do lateral arm raises, blatantly invading my personal space.
There was no special equipment that they were using in that area. I noticed one had a shirt on that said something like,
“The MOST important part of playing rugby is support.”
Anyone who can’t wait a few minutes for you to finish and needs to stick their arms in your face is probably doing it on purpose.
In addition, the exercise they were doing could have been done anywhere else a gym that was almost empty. It was a dead giveaway. Another student arrived and began lingering in an area to my left. He stared at me for a few seconds and started smirking.
Once he had my attention he turned his back to me so I could see his shirt which read, “CHASE.” In smaller letters underneath was the word, “Manhattan.” These attacks using symbolism are common reports among people who are targeted. The kid with the CHASE shirt left shortly after, and his total stay was about ten minutes.
That episode is an example of noise, crowding, and symbolic attacks.
Noise Campaigns
All targets of the Hidden Evil are familiar with noise campaigns.
Basically, targets report experiencing a steady stream of noise consisting of a rotation of various types of disturbances around their homes. This includes door slamming, yelling, car alarms, horns, tires screeching, loud music, engines revving, and frequent construction projects which include an assortment of noise from heavy machinery and tools.
Not surprisingly, in his books Future War and Winning the War, Dr. Alexander described using noise as a weapon.
In Future War he wrote,
“Audible sound, in frequencies from 20 to 20,000 hertz, can be applied to influence behavior, as most people are sensitive to very loud noises.”(***)
For instance, if you’re targeted, there will be doors slamming for a few moments, several minutes of silence will ensue, then a motorcycle will drive by and rev its engine outside of your house.
After that you’ll have someone mowing the lawn. Then there will be alarms going off. After that you’ll hear a loud crowd of people walk by your house. Then you may then hear fire or ambulance sirens. Then there will be hammering and sawing sounds from the ongoing construction projects. Then you’ll hear car alarms being turned on/off in succession multiple times from multiple vehicles around your house.
There will generally not be a solid five minutes of uninterrupted peace.
Moret spoke of the use of “noise campaigns” which included the frequent use of garbage disposals in surrounding apartments, vehicles with “blaring horns” and the sirens of fire trucks.
She also spoke of habitual door slamming, proclaiming,
“they’ll slam doors all day and all night long.” “Door slamming,” agreed McKinney, “is also a popular pastime, particularly in apartment settings.”
Those targeted may experience a “chain reaction” of door slamming by apartments or houses surrounding theirs.
Other types of disturbances include frequent noise from lawn mowers, snow blowers, vehicles with loud exhaust systems, and ambulance sirens, etc. Noisy construction projects will usually be ongoing.
“Blaring horns, sirens, [and] garbage disposal[s]” which are “run concurrently in apartment settings, for excessively prolonged periods of time,” are common reports wrote McKinney.
She also noted that targets experience frequent,
“amplified transmissions” of “general racket” which is “used on a recurrent basis under circumstances intended to persuade the individual that he or she is under surveillance.”
She added,
“In all of these cases, the individuals’ neighbors apparently pretend to be oblivious and/or indifferent to these sudden, continuous explosions of noise.”
They’re oblivious to the noise because they’re complicit in the program.
Also, the people above a targeted individual may loudly pace as they mimic his or her movements from above. For instance, if you’re targeted, as you walk into your bathroom, you hear loud stomping from above which follows you into the bathroom.
McKinney affirmed,
“A number of individuals report that occupants of upstairs and downstairs apartments appear to follow them from room to room, tapping on the floor or engaging in other activities which appear intended to advertise an ongoing surveillance.”
They’ll “pace in their apartment,” added Moret, and seemingly to the target underneath them,
“it sounds like they’re being tracked… from the apartment above.”
If you’re targeted, helicopters and small propeller planes may frequently pass over your home.
Some of these aircrafts may be low enough to vibrate the room you’re in. According to Cheryl Welsh’s March, 2003 article entitled, List of Mind Control Symptoms, the use of helicopters is a common tactic reported by targets. Apparently these overhead assaults are used for sleep disruption and to undermine the morale of targeted people.
Welsh is one of only six Non-lethal Weapons experts in the world recognized by the United Nations. This noise may follow you to destinations you frequently visit. Foot and vehicular traffic may be re-routed through your street, causing an unnatural amount of vehicles driving by your house (even if you’re on a side or dead-end street).
There also appears to be a fleet of vehicles equipped with loud mufflers that groups use specifically for creating noise in the targeted area.
Often, noise will be synchronized with some type of activity. For instance, a target hears an ambulance, fire sirens, alarms, or beeps as they leave. Or as they leave, a small aircraft passes overhead, then as they approach their car, they hear alarms or doors slamming.
Noises made as they leave also appear to serve as a form of communication to alert group members in the area to begin pursuit. In addition to the standard noise package, whatever noise would naturally occur in the area you live will also be increased in frequency. For instance, if a target lives in a rural area then noisy chainsaws will be quite regular.
And in the winter there may be frequent loud snowmobiles that pass near the area.
In this manner, noise is used as a weapon to inflict pain. Chronic exposure to even low-level noise is considered a health hazard that has been known to produce adverse physiological & psychological health effects. Prolonged exposure to noise can produce high blood pressure, a rise in cholesterol, damage to the circulatory, cardiovascular, gastrointestinal, & musculoskeletal systems.
If you’re targeted & pregnant or plan on having a baby, you may want to think twice. Noise has been known to cause hearing loss & growth disturbances in a fetus, & can lead to birth defects.
Prolonged stress in general has been known to cause miscarriages, and some who have been stalked and harassed over a period of time have attributed their miscarriages to ongoing harassment. Just as the fabricated cut-offs are likened to getting slapped, these noises are the equivalent of being repeatedly shocked.
The creators of this program are obviously aware that these noise campaigns are acts of violence.
Synchronization
Groups will try to synchronize their tactics with things that targets do such as entering or leaving their homes.
The target’s movements will be synchronized with vehicles or people coming or going, or other movements. These synchronization tactics are often done several times, perhaps three or more. For instance, when the target arrives, two cars will drive down their street, while their next-door neighbor leaves.
If a target has a habit of going to the bathroom at 2 AM and looking out his bathroom window at a specific area, then they will eventually arrange it so that there is some activity such as a light being switched on or someone leaving or arriving in that area.
This is an example of the level of detail that they will resort to when tailoring a harassment protocol to the profile of a target.
Synchronization is also used with sensitivity tactics and noise. For instance, if you’re targeted, you’ll hear ambulance or fire truck sirens the moment you enter or leave your house. Or car alarms, hammering or some other type of noise will occur as you look out the window. As you leave your home, you may notice people walking by, wearing a color or holding an object that you’ve been sensitized to.
If you pull into a parking lot, there will usually be cars arriving or leaving. Synchronization is also used with blocking/crowding. For instance, as you approach a store’s entrance, people will be either walking in or leaving.
They will often be wearing a color or holding an object that you have been sensitized to.
A variation of this is echoing and mirroring. Like other forms of non-verbal communication, echoing and mirroring are very powerful, (but usually unconscious) ways of interrelating. This form of information exchange has been outlined in the book, Secrets of Sexual Body Language: Understanding Non-Verbal Communication, by Martin Lloyed-Elliot.
Most of us speak this language without even knowing it to attract others.
However, this form of communication has evidently been incorporated into this program as a tool to annoy targets. With echoing for instance, if a target is in a restaurant, or on public transportation, and they drink then an informant next to them will drink. If they pull out a cell phone, then the informant will produce a cell pone or similar device.
When the target puts it away, so do they. In essence, they will mimic the movements of a target.
With mirroring for example, targets may frequently have a person or group of people walking parallel to them, in the same direction on the other side of a street, or any public area. Also, there may be someone directly in front of the target, and approaching the same intersection that they’re approaching.
The informants adjust their timing so they approach at the same time, and cross the street just as the target does, at which point crowding may occur. The informant(s) may also be wearing red, holding cell a phone or another device, which the target has been sensitized to.
Dr. Alexander and Janet Morris also spoke of the use of mirroring to influence people, in their book, The Warrior’s Edge.
Harassment Skits (Street Theatre)
Commonly used routes are used as avenues for various types of Street Theatre that unfold as targets pass through.
Street Theatre is used during group stalking and contains verbal and non-verbal harassment, threats, insults, intimidation, and violence, conveyed overtly, or covertly using themes, symbolism, or other medium. They may be carried out after a target has been sensitized using NLP. This harassment can be relayed with metaphors, verbal remarks, and symbolism using clothing or other items.
Targets may be stalked by a network of people who frequently stomp their feet, clear their throat or cough (even in the middle of summer) to indicate that they’re part of the program.
Stalkers may be speaking on their cell phone and loudly accent the insult as they walk by and stare at targeted people. Blatant, hostile or smirking stares are also common. Sometimes they may not be on the phone and may just overtly insult you as they walk by.
As an example, I have people walk by me and say things like fuck you, fuck-up, fuck-head, you’re disgusting, etc. I’ve also witnessed them spit in my direction as I walk by them and have seen this spitting tactic used by teenagers who would spit on the lawn while I was on the front porch as they passed by my former residence.
Some words carry with them a particular weight to potentially trigger an effect on a person’s emotional state.
For instance, if you’re at a restaurant you may have a couple sit down at a table next to you, and mention some events that are taking place in your personal life, in order to get your attention. After that they may make repeated references words such as paranoid, crazy, scared, panic, insane, freak, sad, depressed, etc. The idea is that the words will invoke the emotion.
Not only is this possible, but it works best when you don’t know it’s being done to you.
This tactic appears to be a variation of a pacing technique used in hypnosis. It involves first linking something to the subject’s ongoing experience (or personal life) and then using certain words intended to evoke a particular response.
Morris and Alexander refer to these words as “verbal anchors” and state,
“Verbal anchors can also be effective tools… Words such as freeze or duck transmit complete messages… Verbal anchors can elicit both positive and negative states.”
In addition these words can be emphasized by changing their tone and volume when they’re spoken, so that some words are slightly louder and spoken longer than the others.
This can completely change the meaning of a message. This is called metacommunication.
Metamessages are suggestions hidden in a statement, perhaps a compliment. The tone, volume, and rhythm of specific words in the sentence are changed so that the actual message is different than what the spoken words are.
“It’s hard to defend against the anger and disapproval expressed in negative metamessages,” stated McKay, Davis, and Fanning, in their book, Messages: The Communication Skills Book.
“The attack is often so subtle that you aren’t aware of exactly how you’ve been hurt…” The basic function of metamessages,” they say, “is to say something covertly that you’re afraid to say directly. Since metamessage attack is covert, there is little chance of overt retaliation.”
These metamessages are quite similar to indirect imbedded messages used in hypnosis.
In the book, Patterns of Hypnotic Techniques of Milton H. Erickson, M.D., Richard Bandler and John Grinder provide examples of a master hypnotist named Erickson.
Describing this type of covert communication, they write,
“Imbedded commands serve the purpose of making suggestions to the client indirectly and, thereby, making it difficult to resist in any way… These are most effective when they are also marked analogically by emphasizing the command and by looking intently at the listener, if their eyes are open.”
It appears a variation of this message can be conveyed with multiple people blitzing a person with cut-offs while talking on their cell phones, looking directly at the person and emphasizing (metacommunication) weighted words and/or information about the person’s personal life that was obtained from surveillance.
Groups will also use these phony conversations to harass targets in stores, restaurants, public places, elevators, etc. McKinney wrote of recurrent negative comments by strangers that are apparently intended to evoke feelings of “paranoia.” She also wrote in her report that the stalkers operate in large groups over a long period of time – seemingly with the support of the government.
Bandler and Grinder describe a positive use of this tactic when quoting Erickson addressing an anxious patient, with,
“My friends tell me to feel comfortable and to loosen up when we are out on the town.”
Note that the italicized words are emphasized when spoken. This tactic can be used even if the intended subject is not being addressed directly, hence the name “Indirect Imbedded Command.”
Again, something about the target’s personal life or real-time ongoing experience is mentioned near him so he will identify himself as the subject, then weighted words conveying insults are used.
These covert public mocking tactics using trigger words which are intended to evoke negative emotions, are based on NLP/hypnosis, and seem to be the result of an in-depth study of hypnosis by the CIA which occurred during the MKULTRA period.
“When we hear something, even from another conversation, we can’t help but make images and sounds of it in our head,” announce Adreas and Faulkner. “The professional persuader knows this intuitively. In NLP we know it explicitly.”
They affirm,
“You cannot NOT communicate.”
The use of NLP/hypnosis by these citizen stalkers as directed by their handlers is obviously intended to drive people insane.
Victor Santoro explains how these tactics can be used in a destructive format, as a way to “foster your target’s paranoia” and “suggest that he’s being mocked…”
He explains,
“If you can get several accomplices to do this… he’ll get the feeling that mockery and ridicule of him are widespread.”
Santoro’s book seems to have some accurate information pertaining to this program, which makes me wonder if at some point he was employed as an intelligence agent.
At any rate, the Hidden Evil was obviously designed by experts in the behavioral sciences.
After a target has been sensitized, they can even be harassed, insulted, and threatened with symbolism using articles of clothing, newspapers, and other items. Just as body communication (Social Kinesics) is used to harass a target, so too is symbolic communication. Symbolism can be used with articles of clothing, especially during a wave attack where a target is blitzed by a crowd of informants who smile, laugh, stare at them, and cut them off as they pass.
Some of the messages I’ve noticed on apparel include: Stop and Die, Big Bro, Watch Your Back, as well as Satanic, Freemasonry, and Wicca symbols.
An attention-getting tactic may be used. It can be a cut-off, blatant stare, loud noise, or other sensitivity tactics. Remember how the perpetrators at the YMCA both used an attention-getting tactic? One man gave me a smirking stare and the other two swarmed me.
In essence, they will take an event that is unfolding in a target’s personal life and make references to it using any number of methods. Interestingly, an article in the San Francisco Bay Guardian, on October 22, 2004, entitled, The New COINTELPRO, stated similar that tactics were being used on protesters at anti-corporate rallies.
The theme may pertain to something in your personal life. They may play on this theme for a single day, a series of days, or weeks. In addition, they may choose a theme and try to project it into your life.
Personally, I doubt that most of the citizens who are used to flash these messages are aware of their meaning.
Footnotes
* This Idea was taken from Gary Allen’s book, None Dare Call It Conspiracy.
** Words such as “crowding” and “space invasion” have not been specifically mentioned in the material which I’ve found relating to the East German and Russian citizens watch networks. So this seems to be a new tactic, which is now used worldwide by this global stalking group. Although, the book, Stasiland, by Anna Funder, does hint that at least one target regularly experienced this type of crowding attack.
*** He also wrote of the use of stink bombs to induce gagging or vomiting, and infesting the dwellings of targeted individuals with insects.
Setups and Confrontations
Informants have apparently been used to frame targets for crimes or to participate in staged events which foster character assassination. A person may not be aware of some of these setups. Some staged events may include people provoking targets into confrontations. McKinney wrote about “Recurrent confrontations by unusually hostile strangers.” “Seemingly homeless people who are well-dressed and very clean will get into confrontations with targets… and create big public scenes,” warned Moret.
McKinney described an episode involving a male target who spoke with a woman who had often paced in the apartment above. After he spoke with her about this pacing, which occurred even during her absence, she “immediately complained to the building manager that he was stalking her,” wrote McKinney. “She conveniently forgot to inform the building manager that she had assiduously ‘courted’ this individual for several months, without success; and that she had been stealing his newspapers on a regular basis.”
Presumably, these setups and staged confrontations are done to get targeted people into the penal or mental health system. At the very least they can aid with recruitment. Also, photos, or video footage taken of an enraged target after they have been antagonized (setup), may also assist with a smear campaign when leveraging support of the community to facilitate the removal of the target. Multiple complaints filed independently which entail the same report may also achieve this.
Reportedly, local police participate in stalking and have framed people for crimes. Referring to one target’s repeated encounters with a police officer, McKinney wrote, “One of his recent acts was to ‘frame’ her with a drug possession charge. After pulling her off the road (a frequent pastime) and subjecting her to an illegal search (done, twice, so far), he conveniently managed to find a glassine packet of cocaine eight feet away, in front of his squat car.”
Similarly, during the former Cointelpro, there were routine setups, and fabricating of evidence used to destroy a person’s character or have them imprisoned. But this obviously hasn’t stopped. According to the December 7th 2003 issue of the Sunday Herald, the FBI is on record using multiple informants to frame innocent people for crimes by having informants commit perjury. This can be done legally in the interest of “national security.” The article sited a 141-page report by the House Committee on Government Reform, which stated that the FBI rigged evidence, and used informants to provide “false testimony,” so that innocent people would be imprisoned. Oddly enough, some of these informants were murderers!
“Well over 20 murders were committed by FBI informants,” the report revealed, and to protect them federal law enforcement “actively worked to prevent homicide cases [from] being resolved.” The committee also concluded that “officials in FBI Director J Edgar Hoover’s office were well aware that federal informants were committing murders.” The article continued quoting Judge Nancy Gertner saying, “It is hard to conceive of accusations that shake the legal system closer to its foundation that would do more to challenge this nation’s most basic assumptions of honesty, fairness, and trust in the administration of justice.” She added, “All in the name of ‘national security.'”
In his book, The Franklin Cover-up, former Senator John Decamp wrote, “In case after notorious case entirely unrelated to Franklin, Justice Department [DOJ] personnel appear as liars, perverts, frame-up artists, and even – assassins.” Apparently Senator DeCamp experienced significant turbulence while investigating a child sex ring which included prominent individuals in Washington D.C. According to DeCamp, the elite used the FBI to orchestrate the cover-up.
Stores and Restaurants
Store and restaurant staff work in tandem with citizen informants to harass targets. Wait-staff in restaurants will be rude or give targets bad service. Or they may appear to be friendly as they stick their elbows in a targeted person’s face, repeatedly kick their chair, or crowd them while taking an order or delivering food. They will also mess-up orders, and appear clumsy or incompetent by accidentally dropping food or silverware on targeted people.
If you’re targeted and make a trip to the bathroom, you will be cutoff by wait-staff who appear from around corners or through doors. Plain-clothed citizens will be assisting them in the harassment as they crowd you while you walk to and from your table. They’ll also follow you into the bathroom where they will crowd you or appear to be talking to someone on their cell phone while parroting information about your personal life.
In restaurants, these citizens will be seated around the target, wearing a color that he or she has been sensitized to. They may very well have conversations which contain specific information about the target’s personal life. This is obviously a very empowering trip for some of them. This seems to be done, both to harass targets and to try to evoke a sense of helplessness in them by not being believed if they were to tell someone about the harassment.
Similar to restaurant staff, store clerks work with citizen informants in their store to crowd, block and cut targets off. They may engage in conversations with citizen informants at the checkout line or in the isles as a target walks by, which are obviously intended to be overheard, and contain information about a target’s personal life. A variation of these tactics were used in East Germany, where the Stasi would co-opt a business owner to utter some words in the presence of a targeted customer, in order to let him know that they had been expecting him.
Stores and restaurants also participate in noise campaigns by banging merchandise on shelves as they put it away, throwing boxes on the floor as targets pass by, door slamming, slamming items on counters, and other types of commotion. If there are low ceilings, there may be banging directly above the target which will also follow them around the store. The Noise Campaigns and Street Theatre are apparently intended to create a cloaked hostile environment to persuade the target to leave, and let them know they’re being watched.
Also, specific products that a target shops for may be sold out in the stores that they frequent. Apparently they are removed from the shelves prior to the target’s arrival. In addition, if targets purchase products from vendors over the phone or online they will frequently encounter representatives who don’t return calls, appear vague, or incompetent. Generally, targets will receive poor service. These things happen to all of us, but for targets it is recurrent.
Friends and Family
If you’re targeted, friends and family may be recruited to break you down. They may participate in harassment skits intended to make you look incompetent, inconsistent, hypocritical, and to mock and demoralize you. The methods used to recruit friends and family will be covered in the Informants section.
New friends, may be used in an attempt to do the same. “A number of individuals in touch with us report a range of experiences with new ‘friends,'” wrote McKinney. These ‘friends’ pose as confidants and abruptly end these ‘friendships’ under deliberately degrading and humiliating circumstances. She added, “When taken in the context of the ongoing surveillances and harassment, these exercises appear intended to heighten emotional trauma, perhaps to provoke an uncontrolled response and/or to enforce isolation.”
If you’re targeted and live with someone who has been co-opted, perhaps a friend or family member, they will probably be forced to carry out some of these harassment tactics. At home they may frequently slam doors, cabinets, draws, and make other types of noises. They may frequently crowd or block you. Areas that you commonly occupy, or spaces normally used, will be littered with objects (blocking), that you have been sensitized to.
Frequently used pathways will also be blocked. Traps may be set, such as items frequently falling out of freezers or cabinets as you open them. Phone conversations which occur while you’re present will be loud and contain information about your personal life. Out in public, these friends or family members may be forced by their handlers to guide you through and participate in Street Theatre, where they will interact with other citizen informants to harass you. These skits will be intended to make you feel foolish, incompetent, or inconsistent.
Thefts and Break-ins
When break-ins occur there is usually no sign of forced entry, and they occur when the target is sleeping or elsewhere. This is the case even if there is a Hi-Tech security system in place. “In virtually all such cases [investigated], the burglars leave evidence of their visits, such as by relocating objects, or by committing petty and not-so-petty acts of vandalism,” wrote McKinney.
This happens at the home as well as the workplace if the target is fortunate enough to be employed. Targets have reported clothing being ripped, milk, coffee and other items poured out, and small-scale damage. Items may be stolen and brought back at a later date, and they may move items and place them in a slightly different spot. These are essentially Gaslighting tactics.
Victor Santoro claims that these subtle memory games can be used to drive people insane. Small things such as pens, shoes, and silverware are taken or tampered with so people will seem delusional if they file a police report. “Burglarizing your home is very, very common,” stated Moret, and “a lot of times they’ll leave evidence of their visits, just little small changes in the target’s home which is noticeable.” Executive Order No. 12333 states that these break-ins can be done legally.
Interestingly enough, surreptitious break-ins, thefts, and sabotage were a staple part of the old Cointelpro. Other tactics Santoro advocates include filling a target’s gas tank, or substituting items of his clothing with ones a size smaller. If you’re unaware that you’re targeted, as most people are, then these small changes may be attributed to a lapse in your memory. If these tactics are used in combination with others, then as Santoro illustrates, you may think you’re going insane.
Gunderson also spoke of Gaslighting tactics, which he described as “psychological warfare.” In his personal experience with what is presumably state-sponsored harassment, he has noticed bits of furniture and other items being moved around during surreptitious break-ins. He states they are, “so arrogant that they almost always leave subliminal messages of their… entry.” The logic is that a thief would never break into your home and leave a computer or stereo and just steal a toothbrush, or pour out a portion of your milk.
In his book, Subliminal Mind Control, John J. Williams wrote, “If you are being subjected to a secret and involuntary subliminal experience it is a malevolent, sinister and often dangerous attack against you that you have every right to vigorously oppose and thwart as if you are a POW or someone has broken into your home to rob you of what is rightfully yours.” He warns, “In fact they have broken into your mind, and are trying to rob you of your free will. Even in cases where there is actually an intended positive outcome.”
Sabotage, Vandalism and Staged Events
Targets may regularly experience acts of vandalism. Electronic equipment may frequently be failing. People have reported having electrical systems in their cars, brand new appliances, TVs, radios, PCs, and other electronic equipment suddenly die, or act strangely.
Targets may experience frequent computer trouble such as failing hardware. Ongoing computer problems which do not follow any logical pattern may also occur. Some of this can be attributed to the E-bomb which can destroy electrical equipment while not damaging humans.
Many times this vandalism is usually just below what you’d report to the police. For instance, a small but noticeable portion of your masonry has been chipped off, and a crack has appeared in one of your windows. This may be restricted to minor vandalism, just to let you know that you’re under surveillance. However large-scale property damage is also done to homes and vehicles, such as slashed tires, broken windows, tampering with break lines, and destruction of electrical equipment.
Some targets have reported that their pets die suddenly of mysterious illness. For instance, they come home to find a perfectly healthy pet dead. Vandalism and pets being tortured may also be in retaliation for a target taking action to expose them.
“Automobiles are one of the biggest targets,” said Moret, adding “they slash tires, they smash the windows, drain the oil out of the cars, fool with the electronic components and batteries.” She continued, “A lot of people have complained about breaks suddenly failing, clutches failing.” McKinney agreed writing, “Vehicles invite peculiarly ferocious attacks in these harassment campaigns-slashed tires, smashed windows, oil drainage, oil contamination, destruction of electronic components and batteries… grounded fuel gages” and “suddenly failed brakes and clutches,” occur. Recurrent auto thefts have also been reported.
McKinney explained that some of those she was in contact with had experienced staged accidents. One involved the breaks failing on a tractor which resulted in the death of the driver. And another episode included a person barely escaping being run off the road by an off-duty bus. “Two others,” added McKinney “narrowly avoided what appeared to be deliberately attempted collisions by drivers who quickly sped away from the scene.”
Another episode involved a targeted person who avoided three attempts in four days at being run off the road. Still another survived being run off the road twice within week, which resulted in a totaling of her two vehicles. “They also conduct staged accidents where people may be forced into accidents in their cars,” echoed Moret.
So, according to this information, multiple seemingly independent vehicles can be used to facilitate an accident which can appear to have been caused by a targeted person. Add to this, multiple independent witnesses (informants) and you have a recipe for murder or a framing. In fact, “accidental” deaths have reportedly occurred. Once more, the Stasi would do similar things. “Car brake-leads have been cut, accidents and deaths reverse-engineered,” noted Funder.
Traveling
When targets drive, they may be surrounded by vehicles driven by citizen informants who frequently cut them off and tailgate them. Targets will experience more tailgating and cut-offs than what would naturally occur. Vehicles will frequently pull out past stops signs as the TI approaches an intersection. This is apparently done to startle them.
While traveling on the highway there will be a rotation of vehicles that surround targets. These vehicles may be marked with an identifying feature, or a color that they’ve been sensitized to. This seems to function as both an NLP tactic to trigger negative emotions which have been anchored to the feature, as well as a method to unite the group and promote group cohesiveness. In other words, it is similar to a uniform, or a squad car.
There will also be a rotation of people tailgating targets. These vehicles may cut them off after they’ve been tailing them for a while. Apparently this is done to imply that they weren’t going fast enough. When done in a recurrent manner by multiple vehicles, this antagonizing behavior may also serve to encourage the target to accelerate, which may result in them getting pulled over. This may be especially effective if they’re not aware that they’re targeted.
City and state vehicles which may stalk targets in public, include: off-duty metro buses, school buses, local restaurant delivery vehicles, city and construction vehicles, fire trucks and ambulances, police cars, postal and UPS vehicles, taxis, and 18 wheelers. Helicopters and small planes have also reportedly been used to stalk people. As will be revealed in the Informants section, many of these are vehicles belonging to organizations which have been selected for recruitment into the citizen informant programs.
Convoys of vehicles which are all spaced the same distance and traveling at the same speed will participate in stalking. Within this convoy, there may be several vehicles exhibiting traits that a target has been sensitized to with NLP. These traits are thereby symbolic of a uniform. For instance, most or all of them will be a shade of red. Or most of them will have their lights on, even during the daytime. Or they may have the same bumper stickers. During the evening targets may experience frequent Brighting while driving or walking.
Brighting
Vehicular Brighting is an attack. It seems to be strategically used with corners. For instance, if you’re targeted and you’re walking down a quiet street late at night, you’ll see vehicles repeatedly turn onto or off of connecting streets. Their timing is such that they continually turn the corners while you are at it. This effectively blinds you. This happens frequently at corners. Or, as you walk down a side street, there is one or more cars parked on the side, facing your direction with the lights on. They will also wait for you to approach them and then pull out into the street, thereby Brighting you as you walk by.
These Brighting tactics are maximized when a vehicle has one headlight grossly misaligned. The misalignment produces a Hi-Beaming effect. Like other tactics, frequency and duration play an important role here. Lights being shined into a target’s windows have also been reported. “Among the most common non-lethal weapons are bright lights,” wrote Dr. Alexander, in his book, Winning the War. He says, “The intent is to reduce risks of injury… by temporarily hindering the eyesight of the targeted personnel.” He also wrote of the use of bright lights on targeted people in his book, Future War.
Blacklisting
Job opportunities will be trashed. Most targeted people are unemployed. Many would be in the street if it weren’t for parents, siblings, or friends. Targets who are employed are usually Mobbed. “Progressive financial impoverishment, [is] brought on by termination of the individual’s employment, and compounded by expenses associated with the harassment,” wrote McKinney.
During her investigation she concluded, “The majority of those now in contact with the Project – educated, white-collar professionals – have lost their jobs. Termination of employment in many of these cases involved prefatory harassment by the employer and co-workers [Mobbing], which coincided with the other overt forms of harassment…”
According to an article in The Christian Science Monitor entitled, Blacklisted by the Bank, Blacklisting was originally used as a foreign-policy tool. At some point federal organizations obviously decided to start using it on individuals as well. Slander may play an important role in Blacklisting. Also there are Blacklists and software packages used to check these lists for suspected “terrorists,” “threats to national security,” etc. Apparently this is a flourishing business and some organizations are required by law to use it.
An August 2004 article entitled, The Surveillance-Industrial Complex, by the ACLU, stated “An entire industry has sprung up to produce software that makes it easier for companies to enforce the government’s blacklists and other mandates. An example is ‘Homeland Tracker,’ produced by a subsidiary of the giant database company Choicepoint to ‘help any business comply with OFAC and USA PATRIOT Act regulations.'” The article notes that the software has a feature called “accept and deny lists… otherwise known as blacklists.”
Federal law enforcement has sent these watch lists to corporations. They contained the names of individuals that were not under official investigation or wanted, but that the agency just had an interest in. We already know that some of these agencies are targeting and harassing citizens. Unbeknownst to many, these agencies are apparently deliberately destroying careers on a massive scale. Wired NewsWire spoke of these Blacklists on August 9, 2004, in an article entitled, Big Business Becoming Big Brother. The article concluded, “There is no way to determine how many job applicants might have been denied work because their names appeared on the list.”
A form of Blacklisting has also been used on Russian dissidents by the state. In his book, The Persecutor, Sergei Kourdakov, a member of the plain-clothed People’s Brigade declared, once a person was targeted, they were “treated like a leper and could only get the worst jobs.”(*) To accomplish this Blacklisting, the USSR used something called a workbook. The workbook was used to advance or destroy careers. If you were cooperative with the state, your career could be very successful. If not, you would live in poverty.
In East Germany dissidents were Blacklisted as well, and their careers were destroyed. After the wall came down they were allowed to inspect their files, and learned why they were unable to get jobs or enter into universities. Dr. Munzert, speaks of the similarity between what is now happening and what the occurred in Germany; he says the goal is “to bring their finances down,” by making them “loose their job.” Your “financial state is destroyed,” added Moret.
If you’ve previously been Mobbed out of employment and are Blacklisted, the Mobbing may continue during interviews. Presumably, this is used to further traumatize you. For instance, if you’re targeted, they may ask you a series of questions for which you have to answer “no” to, such as asking you for credentials that you did not list on your resume. They may ask you if you possess skill-sets which were not listed on the AD they had placed. These Mobbing tactics are apparently designed to humiliate you. These things happen to everyone… once in a while. There is basically a “safe zone” that these people can harass you from with little fear of being caught.
Interview questions may be asked with accusing, or mocking tones. Questions may also be asked using certain key words, regarding the environment you just left, which only you and your former co-workers (who Mobbed you) would know. These questions are obviously designed to trigger negative emotions which have been linked to a previously painful work environment, where you experienced Mobbing. They may ask these questions over and over using a slightly different syntax.
If you’re targeted, during an interview you may have potential employers demanding credentials that they did not list as a requirement in their AD. During phone interviews you may have employers telling you that you responded to an AD other than the one that you actually responded to. They may also tell you that they did not place the AD, or that they placed a slightly different one. You may be told that your updated resume says you’re currently working at a place that you never worked at, or a place you worked at a decade ago.
The harassment is masked in layers of accommodation to help strengthen the illusion that you’re not working because you don’t choose to. For instance, you may have recruiters who have harassed you in the past leave messages on your answering machine or with relatives/friends, indicating that there are opportunities available to you. It will be made to look as if you’re unemployed due to your choice. The general public may not realize that Blacklisting exists because the institutions that use it operate most major news outlets. Reporters and historians are also Blacklisted for reporting corruption or historical facts that the government-corporate complex does not want the public to be aware of.
Publishers Weekly, gives an editorial review on Amazon.com of a book entitled, Into the Buzzsaw, authored by Kristina Borjesson, in which they state, “The buzzsaw is what can rip through you when you try to investigate or expose anything this country’s large institutions be they corporate or government want kept under wraps.” This “buzzsaw” is what others have called the Invisible Government. The review continues, “Reporters who tattle risk losing their jobs and being blacklisted… [by] concerted corporate and/or government efforts to kill their controversial stories and their careers.”
Communications Interference
Targets experience tampering or lost mail. The target’s “mail is intercepted,” said Moret. There’s theft and tampering.” During the former version of Cointelpro, they would blatantly watch homes, follow cars, and open mail. The idea was to get as much info as possible to aid in the harassment and intimidation of their targets.
The Stasi too, “inspected all mail in secret rooms above post office,” described Funder, “and intercepted, daily, tens of thousands of phone calls.” Dr. Munzert noted that one objective of those running this program is to “disrupt the communication systems of the victims.” McKinney and Moret state that targets usually receive lots of harassing telephone calls. These pranks may be linked to an event unfolding in the target’s personal life. The phone has historically been an excellent harassment tool.
Online
Targets may also be stalked online. Search engine results may be filtered (blocked) and replaced with information in a target’s personal life. Websites that a target visits may be spoofed and contain information which is apparently intended to let the target know they’re being stalked in the internet as well. This appears to be simply an online version of the public stalking. If you have a website devoted to exposing this program, you may have people emailing you to flame you, or claiming that they are victims and asking for support while making references to subjects unfolding in your personal life. This tactic may be used to foster a sense of hopelessness and isolation, (i.e., you’re the only one).
If you’re targeted, you may receive “unsolicited” email that parallels a current event in your life. Or you may receive covert insults and threats. If you join a support group, you may also receive harassment via threads posted on message boards. Like other mediums of harassment, the topics of these threads may be about events that are unfolding in your personal life, as well as threats or insults covertly directed at you.
Your email may be blocked or filtered and your web activity may be monitored. Carnivore, DCS1000, or similar tracking software can accomplish some of this.(**) If you try to sell things online, participate in online discussions groups, or respond to employment Ads, you will probably be interrupted, trashed, or harassed.
Some people have reported that their inbox is clogged with junk messages even if they have filters on. These unsolicited emails may contain cryptic borderline-subliminal attacks. The words will be garbled but contain letters that convey a message when arranged in the correct order. Or they may contain a sounds like message. Your mind will automatically piece these letters together so they make sense. This is done on the fly, without you being aware of it.
These messages may contain junk in the body and the TI may not be able to reply to it because it came from a bogus address. These cryptic attacks are mentioned in the book, Subliminal Mind Control, by John J. Williams. If you’re targeted, the message will probably pertain to something in your life situation. Any weakness you have can be exploited.
For instance, if you’re going bald and have been looking for treatment, you could receive the following attack:
To: John Doe
Subject: Euro Paulding Tummy
Body: asdfl;jkasdflkkjasdf;lkjasdfljkasdfl;jkasdfl
TI TV
The harassment of some targeted people is apparently broadcasted around the country via closed circuit TV.
In the workplace this can easily be done by surveillance systems, which many businesses now have in place. A report based on a survey conducted on over 500 companies appeared in the May 19, 2005 issue of Business Wire in an articled entitled, Statistics Show Rise in Surveillance of Workers. It stated, “More than half of the companies surveyed use video monitoring to counter theft, violence and sabotage,” and that the number of businesses conducting surveillance is increasing.
McKinney has witnessed surveillance films of people being Gang Stalked in the office. She declared that it might be used for the purpose of “creating a sense of unity, [and] for identifying TIs who are to be harassed on the street.” In addition to facilitating group cohesiveness and identifying targeted people, McKinney noted that it seems to be a “major source of entertainment” for the individuals participating in this harassment. Similarly, more overt degenerates have been known to record their actions so they can “re-live” the experience.
“Covert workplace surveillance is big business,” stated the Denver Rocky Mountain News, on April 30, 2001. “Secret monitoring of employees has grown dramatically,” echoed Knight Ridder in their August 6, 1997 article entitled, The Boss is Watching as Workplace Surveillance Grows. According to these publications, the equipment is installed after hours and includes miniature cameras hidden in thermostats, light switches, and on walls and ceilings that are located in changing areas, locker rooms, break rooms, and even bathrooms. Apparently there have been some lawsuits concerning this.
Non-lethal Weapons (NLW)
My goal here is not to cover this topic in detail but to provide evidence that these weapons exist and are being used on the civilian population.(***) They are also known as, Directed Energy Weapons (DEW), Psychotronic Weapons, Less-lethal Weapons, and Electromagnetic Weapons. Most targets of The Hidden Evil are hit with these weapons. They are reportedly located in bases of operation which surround TIs. Some may be satellite or tower-based. People also receive DEW attacks while traveling, such as on airplanes or in vehicles. Apparently briefcase-sized portable weapons are used.
Some of these Non-lethals are Through-The-Wall (TTW) in nature. Some states, such as Massachusetts, have passed a law banning the illegal use of directed energy weapons. However, the law states that federal and local law enforcement can use these weapons. These weapons or similar ones are currently being used on a massive scale against citizens of North America and other NATO nations. Dr Munzert refers to “Directed energy weapons” as the “high-tech arms of the century,” and adds that they are “part of crimes (in Europe) that almost nobody knows [about] except the victims and the offenders.”
On the topic of Directed Energy Weapons, Moret stated, “this technology was outsourced to the FBI, and that was for the purpose of putting it in all the police departments in the United States, where it now is.” “Congress back in the early 90s, late 80s, took the position that anyone complaining about these systems were imagining things,” declared McKinney. “By 1992,” however, “they were off the drawing board and in fact being fielded and conveyed to law enforcement agencies.” Although the surface intention for the creation of these weapons is to save lives, the evidence suggests they are being deliberately misused on a global scale as a traceless form of slow torture.
Some types of attacks that targets have reported can be explained with conventional technology. For instance, some types of unclassified DEWs can cause nausea, fatigue, headaches, liquefy bowels and a variety of other symptoms. This is not science fiction. This technology currently exists. Some of it is over thirty years old and has been tested on civilians for decades. Although some of the technology being used on targeted individuals is probably much more advanced than the weapons outlined below, I listed them because their existence is undisputed.
In an article entitled, Wonder Weapons, the U.S. News and World Report stated, on July 7, 1997 that, “So-called acoustic or sonic weapons… can vibrate the insides of humans to stun them, nauseate them, or even ‘liquefy their bowels and reduce them to quivering diarrheic messes,’ according to a Pentagon briefing.” Under the title, Surrender or We’ll Slime You, the February 1995 issue of Wired Digital Magazine, described that, “Enemy soldiers might be confused by holographic projections,” and “disoriented by low-frequency acoustic beams that provoke vomiting and diarrhea.” The article stated that although these “weapons may seem like they’ve sprung from the pages of Marvel Comics,” that “research into these and other non-lethal technologies has been underway for decades.”
Moret contends that some of these weapons are both land and space based. And McKinney spoke of the use of the electrical grid throughout the country, the use of microwave towers, and devices affixed to poles that are connected to power lines. She adds, “These weapons systems are used by neighbors surrounding persons who have been singled out as targets of opportunity.” Despite some mainstream reports portraying this technology as “emerging,” it has been used on the civilian population for decades.
Microwave
Microwave DEWs will produce dizziness, burning, headaches, eye problems, damaged nervous system and internal organs, heart attacks, strokes, aneurysms, cancer, and an inability to concentrate. “Their capabilities, generally, are to inflict pain in a highly focused fashion, and to alter mental states,” proclaimed McKinney. “In amplified forms… these frequencies have the capacity to kill.”
A common microwave oven can be turned into a DEW by modifying the appliance to operate with the door removed. It can then be positioned against a wall to attack someone on the other side. You can also build a weapon for a few hundred dollars that will employ a more focused attack.
“The worst thing” says Dr. Munzert, are “the microwaves because they enter the body… and hit the heart, and the brain, and testes.” He asserts that victims are attacked with these weapons, “night and day,” and says that those carrying out this secret policy are “merciless as you cannot imagine.” Moret stated that these weapons “cause deteriorating health, digestive problems, tremendous pain… sleep depravation and disruption.” “Sleep disruption/deprivation,” agreed McKinney, “is achieved by overt and electronic harassment.”
Similarly, the Stasi allegedly used Directed Energy Weapons on their enemies. Dr. Munzert explained, “We have information that this Secret Service (in German you call it Stasi) used microwave weapons to dissolute… political opponents.” Funder stated, “The Stasi File Authority began to investigate the possible use of radiation against dissidents. What it uncovered shocked a people used to bad news.” According to Funder, although the File Authority claimed they found no one had been killed with these weapons, they did find that “it was used with reckless disregard for people’s health.” Unfortunately, it seems that the File Authority was probably wrong.
An article entitled, Dissidents Say Stasi Gave Them Cancer, appeared in the BBC on May 25, 1999. It stated, “When three of former East Germany’s best-known dissidents died within a few months of each other, of similar rare forms of leukemia, suspicions were aroused among their friends that this was more than just a coincidence.”
Speaking of the current epidemic, Dr. Munzert mentioned that a personal friend of his was tortured to death and given cancer. In her book, The People’s State, Mary Fulbrook, declared, “The Stasi not only initiated well-attested murders… of a number of individuals but also attempted more subtle methods of causing long-term ill-health and death from less easily identifiable causes, such as cancers caused by exposure to sustained high levels of radiation.”
LIDA
The Russian LIDA machine (patent 3773049) is an old brain entrainment device used for the drugless sedation of mental patients. This device can be used as a weapon to drain a person of energy. The pulse rate can be adjusted so that it causes fatigue or excitability (sleeplessness). Although the LIDA signal does not travel a great distance, it can be used TTW in an apartment building. This device is about the size of a breadbox and works silently.
“The LIDA machine was made in the 1950’s by the Soviets… [and] would put rabbits into a stupor at a distance and make cats go into REM… The Soviets included a picture with the device that showed an entire auditorium full of people asleep with the LIDA on the podium.”
-Dr. Eldon Byrd, U.S. psychotronic researcher
Voice-To-Skull (V2K)
V2K, also called Microwave Hearing was discovered during WWII when soldiers noticed buzzing sounds while standing in front of an energized radar antenna. Dr. Joseph Sharp demonstrated a V2K success in the mid 70s while working for the Walter Reed Army Institute of Research. If you have a tightly focused antenna, this can be transmitted through walls and over a distance. Voice or other sound can be transmitted over a distance, through walls, directly into the skull of a person. This was possible more than 30 years ago.
The March 1975 issue of The American Psychologist, which is the Journal of the American Psychological Association, declared that ‘wireless’ and ‘receiverless’ communications of SPEECH,” had been achieved by Dr. Sharp. “Communication has in fact been demonstrated,” they proclaimed. “The capability of communicating directly with a human being by “receiverless radio” has obvious potentialities both within and without the clinic.”
McKinney wrote, “The Walter Reed Army Institute of Research (WRAIR) has participated in this research since Project Pandora. In 1973, WRAIR discovered that externally induced auditory input could be achieved by means of pulsed microwave audiograms, or analogs of spoken words’ sounds. The effect on the receiving end is the (schizophrenic) sensation of ‘hearing voices’ which are not part of the recipients’ own thought processes.”
V2K is used to taunt and mock targeted people. Targets of The Hidden Evil have reported hearing doors slamming, voices, degradation of a religion, screaming, etc. Some have experienced mock executions with gunshots. Regarding this being a common tactic, McKinney stated, “the inducement of auditory input [V2K],” is typical. “A lot of victims” report “Microwave Hearing” which is a “scientific fact,” announced Dr. Munzert. He describes these V2K attacks as a type of torture.
Alex Constantine was aware of these weapons and their intended use when he wrote in his book Virtual Government, “The intelligence agencies are capable of transmitting voices [V2K] and images directly to the cranium’s sensory pathways. Anyone who falls into disfavor with this elite can be condemned to interminable physical and psychological torture. The victim is often murdered without a trace.”
Silent Sound
Silent Sound (patent 5159703), developed by Dr. Oliver Lowery of Norcross, Georgia, also called Clear Channel, is an improvement over the time-slicing subliminal suggestions. It does not need to compete with other sound to influence a subject because it occupies a separate channel just beyond the human hearing range. Hence the name, “Clear Channel.” This channel is beyond human hearing but not human perception. It is not normally in use but it is a direct conduit to the subconscious.
Silent Sound can be used by installing a hidden speaker near person’s area of work or in their home. These suggestions can be played constantly and the person would not be consciously aware of them. Apparently this weapon was used on Iraqi soldiers during the first gulf war. Silent Sound can be transmitted through ordinary radio or television carrier frequencies. Only a speaker is necessary. But Silent Sound cannot only convey suggestions – it can transmit cloned emotions!
An articled by Judy Wall entitled, Psy-Ops Weaponry Used In The Persian Gulf War, which appeared in the October/November 1998 issue of Nexus Magazine, stated, “Subliminally, a much more powerful technology was at work: a sophisticated electronic system to ‘speak’ directly to the mind of the listener… and artificially implant negative emotional states – feelings of fear, anxiety, despair and hopelessness.” Shockingly, the article continued, “This subliminal system doesn’t just tell a person to feel an emotion, it makes them feel it; it implants that emotion in their minds” by the transmission of “cloned emotional signatures, the result is overwhelming.”
Silent Sound can also be piped through the V2K medium and transmitted over a distance, according to retired engineer and Targeted Individual Eleanor White. So this means that subliminal messages can be transmitted over a distance, through walls, directly into a person’s skull. In essence, into their subconscious mind. “All schematics, however, have been classified by the US Government and we are not allowed to reveal the exact details,” stated Edward Tilton, the President of Silent Sounds, Inc. He announced, “The system was used throughout Operation Desert Storm (Iraq) quite successfully.”
DEW harassment may be synchronized with other types of harassment. For instance, if you’re targeted, just as your computer crashes or the power goes out, you get V2K. Or as you hold a letter from the IRS, you receive a shock to your hand. This is apparently done for the purpose of mocking you. As if to convey the message, “ha ha, it’s from us.” Some targets have reported being hit with other more exotic types of weapons that cannot be explained with current unclassified technology. These weapons have been known to penetrate all types of shielding.
The Cincinnati Post ran an article entitled, U.S. Taps High-tech Arsenal/Pentagon Likely to Debut New Weapons in Iraq, on March 30, 2003, which included an interview with Clark Murdock, a former Air Force Strategic Planner, who works for a Think Tank called the Center for Strategic and International Studies (CSIS). Murdock declared, “Once you’re engaged and you have a capability that’s almost ready, you’ll try it.” He continued, “All kinds of things have been invented, particularly in the (classified) world that will be used. If you use it and it works and no one knows, why talk about it?”
When I consider who runs this planet, what they’ve done, and what their obvious intentions are, it becomes clear to me that they intend to use these weapons to defuse threats to their control. For instance, if someone is a particular nuisance to the elite, they can arrange for them to experience frequent confusion. Unless this individual knew that they were targeted, they’d be completely unaware that this trouble was the result of an attack. On the other end of the spectrum, if the situation calls for the immediate neutralization of someone, they can be given cancer, a heart attack, or stroke. This type of murder is completely silent and invisible. Dr. Munzert refers to it as “the perfect crime.”
Support Groups
My observation is that some of these support groups have been infiltrated (or created) by perpetrators posing as victims, used for discrediting, disinformation and disorganizing – the triple D. If you think that the people who oversee this worldwide program have not infiltrated these groups, or even deliberately created some as catch-nets in order to disrupt and minimize progress, you are probably mistaken.
The people who designed this system are highly intelligent and some of these support groups seem to be just another phase of the program. The East German Stasi would create political groups and foster an informant’s rise to respectability. This influential informant would then impede the progress of the group and misdirect its members at events. The logic here appears to be that if these groups must exist, they would rather control them.
Some of these perpetrators seem to be very vocal and popular members of these support groups. It seems that this a damage-control mechanism put in place to corral people, manage them to some degree, and impede the groups’ progress. These people may also help with misdirecting events, or generally keeping groups disorganized and ineffective, under the illusion that progress is being been made.
Guided by their handlers, multiple prominent informants may work in unison to jacket or otherwise discredit targets, who the organizers of this program believe are a hazard to its exposure. Jacketing was often used during the old Cointelpro, and involves the use of informants within an organization who portray effective targets as informants. We can only conclude that in the last twenty years they have perfected this tactic. If you are raising awareness, then discrediting attempts will be standard practice. It appears to be critical that they isolate you from group members who you may have a positive influence on.
Similar to the East German informants, they may be installed and built up to degrees of respectability by providing useful information to the group and engaging in other activities which genuinely damage this program. Although this may seem like a contradiction, this is the chess equivalent of sacrificing a bishop to take a queen. They know some targets would have eventually found the information anyway, so this trade-off is worth appearing genuine and gaining trust, which may be exploited at a later date.
It may also create fear and uncertainty within some targets, causing them to doubt their own judgment. Finally, this may further traumatize a target with feelings of hopelessness when they learn that a very well respected group member is harassing him/her. It’s plain to me that these people exist to expose a portion of the truth, but to help destroy those who seek to expose all of it.
In my opinion, in order for a decent person to be harassing victims, especially when he or she has an idea what they’re going through, they would have to have been blackmailed or tortured into becoming informants. If you choose to participate in one of these support groups, you may want to limit your exposure to certain people.
However, although these groups have their share of perpetrators, not all of them are.
So, if you’re targeted you may still want to attend meetings and events as it will be a good opportunity to connect with other people.
Summary
When used in combination on a recurrent basis, these tactics are a painful and difficult to prove form of torture.
Targeted people are battered from state to state and brought to financial ruin. Those who speak out may end up in mental institutions. Some are framed for crimes, or setup in a manner to aid with recruitment. Their homes are vandalized, pets tortured and killed. The mental, emotional and physical torture that targeted people experience will usually not stop until death.
The creators of this system have established a virtually traceless protocol for murder.
Footnotes
* Sergie Kourdakov defected to Canada and eventually ended up in Los Angeles, California. In addition to writing his book, he spoke in churches, on television, gave newspaper interviews, and spoke before government officials describing the practices of the Soviet secret police. He reported to his friends that he had received death threats. His plans to speak to the Russian youths by way of radio broadcasts were cut short by his sudden death on January 1, 1973, which was first ruled a suicide, then an accident.
** There may be a more advanced type of technology, which is not available to the public, that they’re using to accomplish this online harassment. More on this will be covered in a future book or article.
*** A more detailed description of this unclassified technology can be found at Eleanor White’s website, www.raven1.net.
An Ancient Phenomenon
The use of citizen informant networks dates at least as far back as the Roman Empire.
Delatores (informants) were recruited from all classes of society, including knights, freedmen, slaves, wealthy families, philosophers, literary men, court officials, lawyers, etc. Similar to the TIPS program, it was an “all hands on deck” approach to empire security. Setups were routine, and informants sometimes received a portion of the land of those who they helped destroy.
More recently the fascist dictatorship of Portugal used the International and State Defense Police (PIDE) as the main instrument of political oppression. It consisted of secret police and a vast network of Bufos (plain-clothed citizen informants), who were apparently on every block. Money and a need for recognition (a pat on the back) motivated them. Second only to the Stasi in its thoroughness, the PIDE neutralized all opposition to the dictatorship.
Other countries have used massive citizen informant networks to destroy perceived opposition to dictatorial rule as well. In Czechoslovakia they served the Czechoslovak State Security (StB), and in Poland they worked for the Ministry of Public Security (MBP). The citizen informants of the State Protection Authority (AVH) ensured the survival of the Hungarian dictatorship. Targets were harassed, threatened, confined to mental institutions, tortured, blackmailed, and framed. Even their friends and family were co-opted to persecute them.
Probably the best recent example of citizens Gang Stalking people on behalf of the state is East Germany. In Germany the plain-clothed citizen informants were called IMs (inofizielle mitarbeiter), or “unofficial collaborators.” Unofficial means that they unofficially worked for the Ministry of State Security (MfS), also called the Stasi. For her book, Stasiland, Funder interviewed former IMs, targets, Stasi Psychologists, and professors who trained IM recruiters in Spezialdisziplin (the art of recruiting informants). “The IMs,” wrote Funder, “were ‘inofizielle mitarbeiter’ or unofficial collaborators [plain-clothed citizen informants].”
Funder continued, “In the GDR, there was one Stasi officer or informant for every sixty-three people. If part-time informers are included, some estimates have the ratio as high as one informer for every 6.5 citizens.” In his book, Stasi: The East German Secret Police, John O. Koehler agreed that when you add in the estimated part-time IMs, “the result is nothing short of monstrous: one informer per 6.5 citizens.”
In Russia, the People’s Brigades were told, “We have growing problems in our country with enemies of the state. They operate internally, intending to undermine the authority of our government.” Sergei Kourdakov tells how he was used to harass enemies of the state in his book, The Persecutor.(*) These specialized groups were referred to as the Voluntary People’s Brigade. They were given a “License to harass,” and charged with the “Maintenance of Civil Order.”
When they sprung up all over Russia they were directed by plain clothed police on orders from Moscow. The citizens were told that they were part of a “special-action squad” and would be given tasks that the regular police couldn’t or didn’t have time to handle. They wore regular street cloths, and were convinced that they were ordinary citizens aroused into taking action against undesirables. Their leaders informed them that some of the people they’d be harassing were worse than murderers.
So in Russia and Germany, these informant groups were basically told that they were their country’s first line of defense against threats to national security and criminals. But where are they getting the hordes of citizens who surround targets in public today? Well, they probably do pick people off the streets and use door-to-door recruitment. But due to the shear number of individuals now involved and the pervasiveness of this program, there must be a blanket recruitment process.
A Familiar Pattern
Targeted people have reported that everyone from homeless people to white-collar workers are participating in Gang Stalking. This also includes neighbors, friends, co-workers and even family of targeted people. Federal, state and local governments are reportedly complicit, such as local police, fire departments, EMT personnel, city workers, utility companies, taxi drivers, security guards, and stores and restaurants. According to Dr. Kilde, other participants include, ‘”Down and out’ people, jobless, freed prisoners, mental outpatients, students and orphans.” These people “are trained by this organization to harass, [and] follow… innocent people, who for whatever reason have been put on the organization’s hit list.”
The April/May 1996 issue of Nexus Magazine revealed that “Tens of thousands of persons in each [Metropolitan] area,” are now “working as spotters and neighborhood/business place spies (sometimes unwittingly).” There is a legal loophole that allows people to operate on behalf of the government, without knowing it. Executive Order 12333 states that organizations used by U.S. intelligence do not need to know that they serve U.S. intelligence objectives. These spotters, it continued, are charged with, “following and checking on subjects who have been identified for covert control by NSA personnel.” This helps to explain the Mobbing and Gang Stalking accounts of targets both in the workplace and in public.
In order to sell the community on this program, its creators probably equipped it with convincing propaganda, which is delivered by professionals. Although there has been no official admission that the following federal resources function as recruitment programs for public harassment, they are similar to ones used in German and Russian dictatorships.
The Terrorism Information and Prevention System (TIPS), appears to be a bulked-up version of a community-policing program. Even though TIPS was officially rejected by congress, the American Civil Liberty Union contends that it and similar programs are being used aggressively across the nation. Other programs must have sprung up around the planet because the reported tactics of Gang Stalking in other countries are similar.
But who is the threat? According to some of these documents at www.citizencorps.gov, the targets are criminals and terrorists. However, the definition of a terrorist in section 802 of the US Patriot Act is frighteningly vague. Basically it defines terrorism as any action that endangers human life or that violates state or federal law.
An article entitled, US Planning to Recruit One in 24 Americans as Citizen Spies, which appeared in the Sunday Morning Herald on July 15, 2002, provided us with another clue. It stated, “The Terrorism Information and Prevention System, or TIPS, means the US will have a higher percentage of citizen informants than the former East Germany through the infamous Stasi secret police.”
The articled revealed that the system is poised to recruit those whose work provides access to homes, businesses, and public transportation systems. Postal workers, utility employees, truck drivers, train conductors and others are to be recruited. On “state and local” levels these informants are to be directed by FEMA. This provides a motive for the reports of people being stalked by 18-wheelers, busses, city, postal, and utility vehicles.
It continued, “Informant reports will enter databases for future reference and/or action… [which] will then be broadly available within the department, related agencies and local police forces. The targeted individual will remain unaware of the existence of the report and of its contents.” This also helps to explain why inquiries by targeted individuals regarding the harassment have been met with denial by friends, relatives, neighbors, law enforcement, and colleagues.
In August, 2004, the ACLU, published a report entitled, The Surveillance-Industrial Complex, in which it contended that there is currently a vigorous citizen informant recruitment process. It stated, “Only under the most oppressive governments have informants ever become a widespread, central feature of life.” Recognizing a familiar pattern, they charged, “The East German Stasi… recruited from among the citizenry… as many as one in every 50 citizens, to spy and report on their fellow citizens.” They warn that a “massive” recruitment effort is underway.
The New American stated in their October 7, 2002, article called, TIPping off Big Brother, that the current effort to build a colossal network of informants is being done to, “enlist American citizens in surveillance activities that the state is either legally or physically unable to do.” They say, a society, “where neighbors, co-workers, and passersby are all enlisted in a vast network of civilian informants – resembles conditions that existed in Stalin’s reign of terror, and in all modern totalitarian states.”
Continuing, they add, “Realizing that a cowed and brainwashed populace can carry out surveillance better than a million trained agents, Communist tyrants from East Germany to Cuba created revolutionary circles, youth groups, and other organizations specifically to enable the Party faithful in every walk of life to police everybody else.”
On July 15, 2002, the Washington Times ran an article entitled, Planned Volunteer-Informant Corps Elicits ‘1984’ Fears, which stated, “1 million informants” would be “initially” participating in a citizen informant program. And that the program would involve a combined effort between the DOJ, local police forces, as well as state and local agencies (businesses). “At local and state levels, the program will be coordinated by the Federal Emergency Management Agency,” they described.
“Critics,” they added, “say that having Americans act as “domestic informants” is reminiscent of the infamous Stasi” which targeted “dissidents and ordinary East German citizens…” This evidence helps to explain how stores and restaurants are participating in the harassment. In addition, it appears that these informant squads are coordinated by local and federal law enforcement.
According to www.citizencorps.gov, the directive of the informant program is to “harness the power of the American people by relying on their individual skills and interests to prepare local communities to effectively prevent and respond to the threats of terrorism, crime, or any kind of disaster.” This may explain the reports of targeted people who allege that local, state and federal workers are using skills within their profession as part of the harassment.
For instance, city vehicles, postal vehicles, fire trucks, school buses, and taxis are reportedly stalking people. Construction projects encircle a targeted person’s home and also spring up at frequently visited places. Utility companies interrupt service. Local businesses provide poor service, appear incompetent or clumsy and work with civilian informants to harass targeted people in their stores.
In East Germany the IMs included doctors, lawyers, journalists, sports-figures, writers, actors, high officials in religious organizations, pastors, waiters, hotel personnel, and other workers. “Schools, universities, and hospitals were infiltrated from top to bottom,” wrote Koehler. In other words, what Koehler is describing is that the controlling faction of the organization was recruited into a policy set by the Ministry for State Security (MfS), which was then filtered down to its workers.
Interestingly, when I asked a manager at a retail establishment in Medford, MA if he had heard of Gang Stalking, he told me to “contact corporate headquarters.” In all likelihood these programs originate from the organization’s Corporate Headquarters that have adopted it as part of a federal or state policy. The pattern that is unfolding is that all major departments of the community are involved.
Other questionable programs include VIPS, Weed and Seed, Cat Eyes, and Talon. Part of the Weed And Seed program calls for a combined effort between local, state, and federal agencies, as well as community organizations, social services, private sector businesses and residents, to “weed out” undesirable individuals.
In a May 14, 2003 article entitled, Building a Nation of Snoops, the Boston Globe stated, “Watching America with Pride, not Prejudice,” is ” the Orwellian motto of the New Jersey-based Community Anti-Terrorism Training Institute, or CAT Eyes.” CAT Eyes is, “an antiterrorist citizen informant program being adopted by local police departments,” spanning from the east to west coast.
The Globe described how this informant program was poised to recruit 100 million citizens! The program will, “dwarf the citizen informer programs of the most repressive totalitarian states, making them appear amateurish by comparison,” they wrote. “Even communist East Germany,” they proclaimed, “was not as ambitious about citizen surveillance as CAT Eyes.” According to the Globe, the goal is to recruit one out of every three citizens.
Catherine Epstein at the Department of History at Amherst College, contends that East Germany had the highest agent/informer to population rate in history. So if the U.S. has implemented this or a similar program, it has set a historical record. Former FBI Special Agent Ted L. Gunderson indicates that eventually about one in ten people will unofficially work for the state as an informant. In Germany the recruiters were given quotas to ensure a minimal amount of expansion. Due to the shear number of people now participating, I suspect quotas are being used.
They’ve recruited the youth
Children are now participating in the Gang Stalking of targeted people. Infants too, are dressed in colors that targets have been sensitized to. They are used as a billboard for symbolism, as they’re paraded around by their parents who encircle targets in public. As demonstrated, after a target has been alerted that they’re being watched, this color essentially acts as a uniform and a weapon. Later as the infants can walk and communicate they’re used in other types of Staged Events (Street Theatre). Even at young ages, these children are able to understand how to perform these skits.
This program appears to be multigenerational, for both targeted people and the stalkers. Reportedly, entire families are now participating in patrols (Gang Stalking). Similarly, according to the book, The File, by Timothy Ash, sometimes entire families were recruited as IMs in East Germany. At this point we don’t know exactly what these adults are told to encourage their children to participate. But by their behavior, we can logically conclude that the same factors which motivated them are used to get them to recruit their children.
Reason indicates that after a parent has been recruited, a message similar to, “there are bad people in the community and mommy and daddy need your help,” is conveyed to the child. The child then receives some type of training and is used for patrols (Gang Stalking). Family participation also seems to serve as a type of bonding, summed up by the adoption of attitudes such as, let’s work together to keep the community safe, we’re the good guys, etc. Consider that in East Germany, an astounding 6% of the IMs were children.
Due to the number of youths participating, there must be a broad recruitment program designed specifically for them as well. These programs are probably offered in high school and junior high school. In 2000 and 2001, University Wire, ran articles such as, Boston U. Adopts Crime Watch Program, and Police Enlist Ohio State U. Students in War on Crime. The Atlanta Journal and Constitution published articles in 2001 entitled, School Police Enlist Aid of Students in New Crime Watch, and Student-led Crime Watch on Duty at High School. Students Keep the Peace appeared in the October 2000 issue of the Sarasota Herald Tribune. Some of these policing groups are restricted to school grounds while others are not. Similarly, children were also recruited as IMs in East Germany while at school.
But the organization which appears to the central point of recruitment for youths, is the Youth Crime Watch (YCW), which is international in scope, with headquarters on five continents. It is partnered with the Citizen Corps’ National Neighborhood Watch program, and works with adults to patrol the streets. Schools are used as recruitment grounds for students from grammar school up to the university level. Participants include all core components of the local government, such as law enforcement, school staff, businesses and restaurants, as well as adult citizens watch groups. After a period of training, they conduct youth patrols under the supervision of a nearby police officer or plain-clothed adult. Like their parent organization, they’re fighting crime and terrorism. They have at least hundreds of thousands of members.
In addition to being used to carry out some of the standard tactics, the use of children may also be intended to disgust TIs.(**) This appears to be a triple attack. First, the act of someone using a child seems to be intended to cause revulsion. Secondly, the understanding that a TI would probably not be believed for even implying that a parent would involve their child in something like this, appears to be intended to amplify the revulsion. After all, nobody would ever, under any circumstances, use their children like this. And thirdly, the act itself. Most of these parents seem to exhibit no disgrace, which leads me to conclude that they believe it’s a necessary honor.
If children are being used in this program, and if there is a faction of it which frames people for crimes, then is it possible that this faction would use children to frame targeted people? All that the parents and child would need to be told is that their country needs them to do something very important as a matter of national security. If they’re sufficiently naive, they’ll probably consider it an honor. Children of criminals, or those vulnerable to blackmail or bribery, can also be recruited to accomplish this.
A nation of Gang Stalkers
USAonWatch LogoMost of the citizen informant programs previously mentioned are now organized under a National Neighborhood Watch program, known as, USAonWatch.(***) “USAonWatch is the face of the National Neighborhood Watch Program,” declared the Citizen Corps website. “The program,” it announced, “is managed nationally by the National Sheriffs’ Association [NSA] in partnership with the Bureau of Justice Assistance, Office of Justice Programs, [and] US Department of Justice.” So far, this information suggests that the program is coordinated locally by the FBI and police.
The National Neighborhood Watch Program has existed since the late 1960s. This helps to explain reports of people being Gang Stalked by citizen patrol groups since the early 1980s. “For more than 30 years,” proclaimed the National Sheriffs’ Association, “The National Neighborhood Watch Program, an initiative of NSA, has been one of the most effective ways for citizens to become involved with law enforcement for the protection of our neighborhoods.”
Neighborhood Watch is now partnered with Citizen Corps. And Citizen Corps is run by the Federal Emergency Management Agency (FEMA) under the Department of Homeland Security (DHS). Its website states, “Citizen Corps is coordinated nationally by the Department of Homeland Security,” and “works closely with other federal entities, state and local governments.” So in essence, USAonWatch is a Department of Homeland Security program. This means FEMA, DHS, the FBI, and local police are working directly with the state and local governments to coordinate these operations.
So if USAonWatch is the current public front, then that would mean that a portion of the Gang Stalking which targets speak of is done during these citizen patrols. It would also signify that this network, with full complicity of all levels of government, is trained and directed by local police, working with FEMA and the FBI. Again, we find another parallel to the Russian and East German dictatorships. The National Sheriffs’ Association exclaimed, “The Neighborhood Watch is Homeland Security at the most local level!” It was created to “empower citizens to become directly involved with Neighborhood Watch for the purpose of homeland security.” Its targets, according to the NSA, are criminals and domestic terrorists.
What else would the East German IMs do besides inform? Markus Wolf, a former East German executive Stasi officer, and author of the book, Man Without a Face, indicates that targeted people were Gang Stalked by “informers who literally encircled their everyday movements.” According to Wolf, the residences of some targeted people were “put under siege,” and every family member, and every visitor, was kept under close observation. Even some East German state officials were, “surrounded by unofficial informers for the Stasi,” proclaimed Mary Fulbrook, in her book, The People’s State.
The book, Stasiland, reveals a similar citizen patrol scenario, where targeted people would be stalked by a network of IMs on a daily basis. This was done using a rotation of IMs. “In the morning when I went to work, there’d be someone close behind me,” reported one target. “[And] if I went in to Alexanderplatz to do some shopping a man would come with me…” People would be followed by IMs from their doorsteps, into public transportation systems and then back home again. “They changed the personnel,” she continued, “but there was always someone there. They wanted us to feel it.” Despite what these IMs were told about threats to national security, this blatant Gang Stalking was done for intimidation.
In 1974 the former Deputy Director of the CIA, Ray S. Cline, drafted a report published by the Center for Strategic and International Studies (CSIS), at Georgetown University called, Understanding the Solzhenitsyn Affair: Dissent and its Control in the USSR. It stated, “The Committee for State Security” [KGB]… functions as a secret political police force, which through nets of agents and informants, reaches literally into every crevice of society.” The word, “literally” is noteworthy, because when it is used, they mean it. Just as with East Germany, you can bet that this means every major area of society was filled with informants. This would include workplaces, grammar schools, universities, businesses, restaurants, apartment buildings, etc. Literally, everywhere!
The report continued, “By watching every critical echelon in society, the informant networks also serve to insure that the administrative or daily controls are in fact working.” The Soviet Union was run by a small group of wealthy elite. They used their private security force, the KGB, to ensure their control. Although the surface claim for the existence of the networks was for state security, it was in reality used to terrorize the population into submission. “These informants,” it sustained “serve the fundamental purpose… of inhibiting people from speaking freely to one another; from speaking out; from sharing and germinating thoughts.”
Shockingly, according to an independent media report, there was an attempt to integrate Markus Wolf and KGB General Yevgeni of Russia, into federal law enforcement. An article entitled, Ex-KGB and STASI Chiefs to Work Under Chertoff, appeared in the Foreign Press Foundation on December 16, 2004. It explained how the U.S. would pay former Stasi officer Markus Wolf, and KGB General Yevgeni Primakov to help co-op citizens into participating in state-sponsored harassment.
The article was based on a U.S. Department of State Daily Press Briefing, that occurred on June 9, 1997, which stated, “We’re talking about Markus Wolfe (sic), the former head of Stasi, right?… He actively aided and abetted and fostered international and state-supported terrorism when he was an East German government official…”
So, when they sprung up in Germany, they were called “IMs” who unofficially worked for the “Ministry of State Security” to “protect the state” against dangerous elements. They were called the “People’s Brigade” in Russia, and their duty was the “Maintenance of Civil Order.” The current citizen squads are apparently fighting terrorism and crime. I’m not aware of the official names of groups which conduct these patrols in other countries; no doubt the participating countries have assigned them noble titles.
According to this information, those who have been recruited into the current citizen informant program include people who have access to homes, businesses, and public transportation systems. Others include postal workers, utility employees, truck drivers, train conductors, local police forces, as well as local and state agencies. And, if these youth crime-watch programs are being used for Gang Stalking – children. This helps to explain the reports of targeted people who attest that a variety of local and state vehicles are being used to stalk them. Restaurants and retail stores are also involved. Employees, clerks and/or managers of these establishments participate. If mainstream publications are alerting us to a “massive” recruitment process, then what they’re doing behind the scenes is probably much more intense.
All of these volunteer Neighborhood Watch programs are sponsored by the Department of Homeland Security (DHS). Interestingly, in East Germany, the adults and children who Gang Stalked targets operated on behalf of the Ministry for State Security (MfS). In Russia, citizen informants worked for the Komitet Gosudarstvennoy Bezopasnosti (Committee for State Security), also known as the KGB. In Czechoslovakia it was the Czechoslovak State Security (StB), etc.
Because these harassment programs involve a combined, coordinated effort between federal, state and local governments, logic would suggest that the chief of police, mayor of the city, and governor of the state must be aware of it. The program involves the use of too many resources for them not to be. It can’t operate without their knowledge. As previously described, the TIPS or USAonWatch programs would have accomplished this.
East Germany had a variety of different types of informants, which served different functions. So, in all probability, in addition to bulk recruitment programs such as TIPS, and Neighborhood Watch, there are individuals and groups of informants which are also recruited. In my estimation, these units and individuals work alongside the public front organization to harass people in public. If this is true, then this would further compartmentalize these operations, possibly to the point where all of these factions are unaware of the existence of one and other.
Consider the FBI’s known use of criminals as informants, which was described in the Tactics section. Also note an article which appeared in The Chicago Sun-Times on May 31, 1998, entitled, Family of Spies on Run, which described an, “unknown number” of entire families who are citizen informants. “They are ordinary citizens who, for reasons ranging from petty revenge to pure patriotism, agree to work with the bureau,” stated the Times. The article revealed that these families work with the FBI, DEA, CIA, RCMP, as well as local law enforcement. Most of these agencies are now part of DHS. “Because this is the lifestyle they have known almost since their birth, the… children rarely complain,” they wrote.
Secrecy
To my knowledge, at this time, no one has openly admitted to being part of this program. Targeted people have been stonewalled when confronting their tormentors in public. The citizen squads are obviously told that under no circumstances are they to admit they’re part of an organized program to remove troublesome individuals from the community.
In Russia, the state emphasized the need for total secrecy when recruiting people into the Citizen’s Brigade. According to Kourdakov, during their lectures they were told that, “Under no condition was the public to know what was going on.” The reason was that, “some people could misunderstand what we’re doing and why we have to do it,” and “don’t appreciate the danger that these people represent to our society.” When citizen informants in East Germany were recruited, they agreed to a, “code of secrecy,” and some had to sign a waver, which stated that they would not mention anything about their connection to the MfS.
By their behavior it is apparent that participants in the current program are told that targeted people can’t be reasoned with, but must leave on their own accord, by way of a collaborative community effort. In all likelihood, stigma is probably used to justify the harassment. This includes labeling people threats to “national security,” or criminals who have escaped justice.
These tactics have been used in other countries to justify persecution of political dissent. As part of their training, it is also possible that they engage in skits where they witness people breaking down or fainting in front of them, as a result of being systematically Mobbed out in public. Some of the training is apparently designed to put their conscience aside when harassing targets.
As we’ll learn in the next chapter, when you combine these desensitizing drills with lies, you can get most people to do just about anything.
“As long as people believe in absurdities they will continue to commit atrocities.”
-Voltaire
Filtering
Another reason participants are told to deny their involvement in this program is obviously because their handlers know that because they operate on huge lies, they could not rationally justify the cause. It is critical that participants receive no outside information that can penetrate this barrier. Precautionary measures must have been taken to filter information that would undermine the group objectives.
It has been said that those who do not learn from history are condemned to repeat it. The people who created this program are obviously aware that it is absolutely essential that no parallel be made between similar historical events and what is taking place now. If this program originated from a Think Tank, you can bet that they have accounted for this, and it has been integrated into the training curriculum.
Therefore, certain phrases, such as “New World Order,” “Dictatorship,” “Cult,” “Nazi Germany,” “Hitler,” “Cointelpro,” MKULTRA,” “Experimentation,” “Gang Stalking,” “Harassment,” etc, are probably covered with mental mindguards to disengage critical thought.
Similarly, according to cult expert Steven Hassan’s book, Releasing the Bonds: Empowering People to Think for Themselves, these mental blocking techniques are given to members of mind-control cults to reject information that undermines the cult. It basically means that when they’re confronted with a particular phrase or question, they should think or say a certain phrase to reject it. This is used to stop critical thought and funnel external input into a mental recycle bin. It works remarkably well.
In his book, Vital Lies, Simple Truths, Dr. Daniel Goleman stated, “A mindguard is an attention bodyguard, standing vigilant to protect the group not from physical assault, but from an attack by information.” “‘A mindguard,’ says Janis [author of Victims of Groupthink], protects the group ‘from thoughts [information] that might damage their confidence in the soundness of the policies to which they are committed.'” More on the Group Mind will be covered in the next chapter.
The Nazis and their educated followers were essentially a political cult. The cult was fed massive lies which were reinforced by the careful filtering of information and propaganda conveyed by mainstream outlets. Literally, a whole country was under this spell. This is happening now. “Hitler and his troop of amateur magicians and hypnotists in the 1930’s and 1940’s were able to reconstruct a technologically advanced nation such as Germany into a vast theatre of illusion,” stated Professor Marrs. “They were also able to induce educated and intellectual [people] into becoming… oppressors of their fellow men…”
Some may disagree, but arguably, this international group is a political/corporate cult. Various cult experts themselves don’t seem to agree on any set definition. But in my view this group is a cult. More evidence will be provided in the Structure, Purpose, and Motivational Factors chapters to illustrate that this group is an essential part of a massive political movement.
Communication
There is communication between the surveillance faction and the citizen informant squads and local businesses in the area. Obviously, the managers of local stores are contacted by a representative of this program, possibly by cell phone, pager, or walk-in, and told to prepare for the arrival of the targeted person. A picture or video of the targeted person may be shown to the participating staff.
The targeted individual may also be identified as he or she walks into the store. Consider that the IMs in East Germany communicated using non-verbal cues, so this is also a possibility. When the TI arrives, those who have been co-opted follow through with the tactics they’ve learned from their training. They also work in unison with plain-clothed citizens to harass the targeted customer. Advanced electronic methods of communication, which are not commercially available, may be used by the coordinating faction to direct specific citizen informants.
More than likely the current recruitment of informants is done using a beneficial appearing program, equipped with convincing propaganda, which is delivered by trusted authority figures. The recruitment programs offered to the public probably don’t refer to this activity as “harassment,” or “Gang Stalking.”
In all likelihood it is cloaked in a beneficial sounding name. The behavior exhibited by these citizens indicates that they are absolutely convinced that this policy is legitimate and necessary. If it originates from a government Think Tank, you can expect no less than an intellectual and emotional masterpiece that is very cleverly delivered. This program was very well thought out.
Friends and Family
Friends and family of targeted people are sometimes used to harass them. As shocking as this sounds, identical tactics were used during Cointelpro. According to the book, War at Home, by attorney Brian Glick, FBI records reveal frequent maneuvers to generate tension (harassment) on targeted people by recruiting their “parents, children, spouses, landlords, employers, college administrators, church superiors,” and others, into investigations. The word “frequent” leads me to conclude that, just as in East Germany, this was standard practice.
This helps to explain the current participation of friends, and family of targeted people. Moret added, “What we’ve studied and reported and identified is that neighbors are contacted and co-opted, [and] members of the target’s family are co-opted…” Similarly, according to Wolf, the residences of targeted people were “put under siege,” by the Stasi, and every family member, and every visitor, was kept under observation.
The recruitment of friends and family of targets may not just serve to harass, confuse, and isolate, but also as a discrediting strategy. After all, a person’s friends and family would never systematically harass them, so someone complaining of such an ordeal must be mentally ill. This may be compounded if a handler forces a targeted person’s family to have the target institutionalized. Remember, one in ten citizens will be recruited as informants anyway, so co-opting ten or fifty friends/relatives of a targeted person is not difficult.
How can a good friend or relative be recruited into a harassment campaign? Simple. They can be lied to, intimidated, or blackmailed into becoming informants during a bogus investigation. Then they can be given a gag order and threatened with jail time if they mention anything about it. Both the Stasi and FBI have done this. According to attorney Glick, blackmail and threats, using statements such as, “We know what you have been doing, but if you cooperate it will be all right,” were often used as leverage for the recruitment of a relative or associate during Cointelpro.
Family members or associates who targets have a shaky relationship with can be bribed if they are greedy or in financial ruin. Naive ones or youngsters can be lied to by appealing to their sense of patriotism. This would be especially effective if delivered by a trusted community authority figure, such as a local official. When gaining cooperation in this way, these friends/family members may be fed some truth, and then some damaging lies can be thrown in.
After the friends and family of a targeted person have been recruited, they can be directed by their handlers to perform carefully scripted harassment skits, which include some mentioned in the Tactics chapter. This harassment by proxy is optimized by the use of sophisticated electronic surveillance equipment.
Summary
Multiple citizen informant programs are now operational, with the goal of recruiting a significant portion of the population. We’ve seen the political Left and Right justifiably compare these informant programs to ones that emerged in Germany and Russia. These programs are supervised by the Department of Homeland Security. They are similar in operation and purpose to those used in Russian and German dictatorships, which were created by the Committee for State Security and Ministry for State Security, respectively.
Those mentioned to be recruited, reflects (to some degree), those reportedly Gang Stalking targets. A massive network of citizens (probably millions worldwide), stalk and harass targeted people in public. They include a wide strata of individuals ranging from seniors to children, and often the friends and family of targeted people. Local governments are fully complicit in the harassment.
The federal government can also recruit groups or individuals as informants, which are not connected to any official organization, such as a Neighborhood Watch network. Without even being aware of the existence of the other network, these entities too can be used to harass people in public.
Footnotes
* Although the portion of the People’s Brigade which Kourdakov wrote about didn’t exhibit the exact traits as the current global stalking group (due to the frequent use of overt physical violence), his account does illustrate the emphasis on secrecy with state-run harassment programs. Furthermore, the Soviet Union did (and still does) possess a huge network of plain-clothed citizen informants, which is used to stalk (shadow) enemies of the state. See the report entitled, Understanding the Solzhenitsyn Affair: Dissent and its Control in the USSR, edited by the former Deputy Director of the CIA, Ray S. Cline. The report was based on a conference held by the Center for Strategic and International Studies (CSIS), at Georgetown University.
** On multiple occasions I have noticed children being used in skits which were obviously intended to convey sexual innuendos.
*** Picture taken from www.usaonwatch.org.
Reportedly, the ground crews that participate in patrols (Gang Stalking) are connected to academic institutions, the Department of Energy (DOE), the Department of Justice (DOJ), and other federal or state agencies. If this is the case, then this program is similar to the harassment campaigns in Germany which were run by the Stasi.
They operated a vast network of citizen informants. Some of these informants were directed by the Stasi to conduct patrols, where they would systematically Gang Stalk enemies of the state.
Anna Funder described the Stasi as,
“the internal army by which the government kept control.”
John O. Koehler, who served as a correspondent for the Associated Press for 28 years, says they were,
“a criminal organization founded and operated by a monopolistic party… that trampled on basic human rights and on the dignity of the individual.”
The Stasi existed to protect the state from the people. More specifically, it existed to keep those in charge of the dictatorship in control.
Fulbrook wrote, “a key task of the Stasi was to ensure that the potential bases for collective action in opposition to… the state… did not develop,” and that, “individual ‘trouble-makers’ or ‘ringleaders’ [were] rapidly isolated and disciplined.” To accomplish this, they used their own version of Cointelpro (Zersetzung), which had the full support of all major components of the state, including a network of citizens which would stalk and harass people. The Stasi and the IMs were essentially the private armies of the individuals who controlled the country.
Apparently these harassment campaigns can legally be done. Attorney Brian Glick wrote, “Much of what was done outside the law under Cointelpro has since been legalized by Executive Order NO. 12333,” which allows “counterintelligence activities” by the FBI, CIA, the military, or anyone acting on their behalf. “Specialized equipment,” and expert technical assistance may be used “to support local law enforcement.” All are free to mount electronic “surveillance” and conduct “break-ins” without a warrant. This means that any federal or local law enforcement agency or government contractor can conduct these “investigations.” These legal “break-ins” account for the Gaslighting tactics that targets experience.
It would be necessary for “the FCC as a minimum and the Department of Energy as a minimum to have some oversight and control over what is going on,” stated McKinney. “[Each] government obviously is complicit,” she declared, “because otherwise these… operations would not be allowed to exist.” McKinney’s findings suggest that the FBI, CIA, and DOE are probably involved in these harassment campaigns.
Moret added, “the military is… very directly and heavily involved in it. But it’s not just the military,” she says, “it’s the CIA, FBI” and other “law enforcement” agencies. “This globally infiltrated organization,” declared Dr. Kilde, “has “octopus type” activities in all major intelligence services in the world,” and has “recruited people from all important government institutions, state and local administrations.”
The April/May 1996 issue of Nexus Magazine provided us with another clue with the publication of an article entitled, How the NSA Harasses Thousands of Law Abiding Americans Daily by the Usage Of Remote Neural Monitoring (RNM). The article stated, “The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist surveillance network in place.”
The Big Lie
The elite have a tendency to fragment organizations within their hierarchy in order to keep people ignorant as to how their organization is a small component within a larger operation. This is how an organization with seemingly positive objectives can be used for destructive means. Therefore, the Hidden Evil is probably highly compartmentalized and the various factions within it are almost certainly unaware of the existence of one and other. For instance, the citizens who operate within the public front are probably not aware of the use of Directed Energy Weapons, murders, or framings. Neither are they likely to be aware of the real agenda.
An analysis of the tactics and strategies used indicates that there must be at least several factions to this highly organized program. There is a recruitment and training unit, which provides training to individuals, businesses, and groups within communities. This faction more than likely appears professional and is equipped with supporting propaganda delivered by trusted authority figures, who claim that the program is a matter of “national security.” The individuals in this unit are probably operating on lies themselves, because in order to sell such a program, you first need to convince the sellers.
There is a logistics faction which coordinates public harassment such as the arrangement of people, and vehicles, as well as informing federal, state and local entities of a targeted person’s pending arrival at their enterprise. There is an intelligence faction, which puts people under surveillance. The surveillance is apparently justified by a bogus investigation. Some of these factions may be merged into a single team. For instance, the logistics faction is obviously in direct contact with the surveillance faction, and they may even be the same team. I refer to the combination of these factions as, the public front, because in all likelihood, it appears beneficial and innocent. The Citizen Corps National Neighborhood Watch program, figures prominently.
According to the Citizen Corps’ Guide for Local Officials, each community has a Citizen Corps Council composed of representatives from law enforcement, fire and EMT services, faith-based groups, community-based groups, elderly and minority populations, transportation systems, utility companies, businesses, educational institutions, environmental groups, the media, and “[any] groups that represent a large cross-section of the community.” Basically they recruit people from all of these major groups within the community.
The guide explains, “At the state level, all Governors have appointed a state coordinator for Citizen Corps to facilitate this locally driven initiative.” Notice the operative word, “all.” Elected officials such as mayors and council members are also cooperating. “The state coordinator,” it continues, “will work closely with the local governments, other state organizations, the Department of Homeland Security, (DHS), the Department of Justice (DOJ), the Department of Health and Human Services (HHS), and other federal agencies to implement a successful Citizen Corps program for the state.”
This means that your high ranking elected officials, as well as federal and local law enforcement are fully aware of this program, and are donating significant resources to it. The Citizen Corps’ Neighborhood Watch program is essentially, according to the NSA, the front line for homeland security.
So, if this program is in fact the public front that is used for mass recruitment, then it would explain many things, such as:
-
The colossal network of volunteers (informants) conducing citizen patrols (Gang Stalking), which is directed by FEMA and the DHS, working with local police.
-
The near-perfect coordination of non-stop harassment, which unfolds as targets travel around town, including any public place, store, or restaurant.
-
The tremendous state resources that are used which obviously require much time, effort, and financial backing.
-
The stalking of people by vehicles representing entities such as, the U.S. postal service, UPS and FedEx, police cars, fire trucks, ambulances, local business, utility companies, city vehicles, taxis, and public transportation vehicles. And in some cases, aircraft such as small propeller planes and helicopters.
-
The persecution of targeted people inside essentially any local, state, or federal establishment, by employees who work with citizens on patrol to harass them.
-
The “all hands on deck” philosophy of the entire state engaging in well-orchestrated harassment.
-
The participation of a wide-range of citizens, such as seniors groups, school children, religious and ethnic organizations, etc., which are presumably drawn from various groups within the community.
-
Because training originates from the same source, it would explain the identical tactics used nationally – even globally.
-
The cover-up by local and federal law enforcement, as well as agencies which exist to help people being tortured or persecuted.
-
Because it is a DHS initiative, it would explain why no organization has stopped it.
What the Public Doesn’t See
Citizen Corps seems to fit the observable operational blueprint previously noted. It appears to be a likely candidate for the public front. But there are definitely other factions, which are probably unknown to the majority of the participating public. Similar to the public front, some of these factions may be combined into a single unit. These factions are also obviously directed by federal and local law enforcement.
They include, a faction for co-opting specific individuals in a targeted person’s life (friends and family), which appears to involve lies and intimidation. There is a faction which attacks people with Directed Energy Weapons. There is a faction that conducts break-ins, vicious rumor campaigns, staged accidents, framings, and blacklisting.
The program is “very hierarchical” Moret describes. She says there is a lower faction consisting of criminals who are “already compromised” due to their participation in illegal activities. These criminals participate in order to gain recognition with local officials and other figureheads. According to Dr. Kilde, this recruitment also includes the use of the mafia and terrorists when necessary. Interestingly enough, it’s a matter of public record that the FBI works with known criminals, including those in the mafia who are confirmed murderers, to assist with framing innocent people for crimes. Apparently this is done for reasons of “national security.” It’s also a matter of public record that the U.S. Government has funded, trained, and even protected terrorist networks such as Al-Qaeda.
Secret Police
“Secret police (sometimes political police) are a police organization which operates in secrecy for the purpose of maintaining national security against internal threats to the state. Secret police forces are typically associated with totalitarian regimes. As their activities are not transparent to the public, their primary purpose is to maintain the political power of the state… A state with a significant level of secret police activity is sometimes known as a police state.”
-Wikipedia Encyclopedia
To recruit regular citizens to perform nefarious acts such staged accidents and framings, these officers can scan for certain qualities in an informant database consisting of literally millions of people, in order to select the mentally ill, criminals, or those who can be blackmailed. Then, these informants, who have no official ties to the government, can be co-opted into a staged event for reasons of national security.
In this manner, these factions may feed a steady supply of innocent people to the public front, in order to promote group cohesiveness – thus ensuring the survival of the program. These factions represent the true underlying psychopathic nature of the program. Based on my research, the public front is simply a mask used to recruit the public into a very cleverly disguised program of torture and murder – The Hidden Evil.
Ted L. Gunderson, a retired FBI Senior Special Agent insists there are two types of investigative operations in the U.S. intelligence agencies, overt and covert. He says, “The overt operations involve investigators who respond to various federal violations of the law such as bank robbery, kidnapping, extortion, etc…” But the “covert operation” says Gunderson “involves those who never identify themselves and are involved in harassing and targeting citizens…”
So, if Citizen Corps is the current major operational vehicle for this program, then FEMA, federal and local law enforcement (with full support of the entire community), are directing these persecution campaigns on the local level. And this unseen unit, which operates beyond the public front, is responsible for conducting, framings, murders, staged accidents, torturing people with Directed Energy Weapons, blacklisting, and mocking people with V2K – all done under the banner of national security.
Who created the Hidden Evil? The creators of this program have enough global influence to initiate policy in all NATO nations. They also have the authority to issue worldwide stand-down orders on organizations like the Red Cross, ACLU, Amnesty International, etc. And they have the money to finance it.
Who benefits from this program? When investigating a matter, if the evidence you’ve been able to gather indicates a specific pattern which is not easily produced, then it is reasonable to conclude that any entity which can produce the pattern, and has done so in the past, is suspect. Furthermore, it is also reasonable to conclude that if the same entity has the motive, the means, and the opportunity, then it is suspect.
Hypothesis A
In his book America’s Secret Establishment, Professor Antony C. Sutton describes a hypothesis as “a theory… which has to be supported by evidence.” He continues, “Now in scientific methodology a hypothesis can be proven. It cannot be disproven (sic). It is up to the reader to decide whether the evidence presented later supports… the hypothesis.” Sutton states that no reader can decide until they’ve absorbed all of the evidence presented.
Think Tanks created the Hidden Evil. This includes, but is not limited to, The Bilderbergers, The Trilateral Commission, the Council on Foreign Relations, and their interlocks, funded by the Tax-exempt Complex.(*) These organizations are heavily interlocked with Wall Street and the Federal Reserve. Policy set by these unelected rulers becomes law with regularity. The Hidden Evil was not a willful creation of the public that voted it into existence, it was done by secrecy. Essentially, it is the creation of what congress, federal law enforcement, and researchers have called, the Invisible Government, or the Shadow Government.
The following three individuals have worked with government Think Tanks, and have evidently contributed to the fine-tuning of this program. They include Dr. John Alexander, Janet Morris and Chris Morris.(**) The Morris’ and Dr. Alexander have worked with Think Tanks such as the Council on Foreign Relations, the Center for Strategic and International Studies (CSIS), and the U.S. Global Strategy Council (USGSC) researching Non-lethal Weapons technologies. They have also instructed government officials on the use of Neuro-Linguistic Programming (NLP). Here is a brief biography of each, which was taken from their websites.
Mr. Chris Morris
Mr. Morris has worked with organizations such as Raytheon, Alliant Techsystems, Olin Ordnance, Primex, ARDEC, Delfin Systems, the Millburn Corporation, the Human Potential Foundation, Lawrence Livermore National Lab, Argonne National Lab, Penn State Advanced Research Lab, Westinghouse Electronic Systems, BDM International, the United Kingdom Ministry of Defense, USGSC, CSIS and others.
Prior to forming M2 Technologies with his wife Janet, Mr. Morris was “Research Director at the U.S. Global Strategy Council [USGSC],” which he describes as a “Washington-based think tank” founded by Ray S. Cline, the former Deputy Director of the CIA. According to Mr. Morris, this Think Tank was composed of “a select panel of senior government and industry experts who met regularly to formulate and guide the Council’s non-lethality agenda.” He briefed “executive branch, DoD, and Congressional officials on non-lethal concepts, technologies and strategy.”
Mr. Morris states that he has received “multiple grants to study non-lethal technology issues for the MHW Foundation and the Winston Foundation.” He adds that he has “participated in defense technology roundtables of the Heritage Foundation.”
Ms. Janet Morris
Ms. Morris is President and CEO of M2 Technologies, Inc. (M2), which specializes in “non-lethal weapons (NLW), novel technology applications, tactics and technology.” She has taught or provided course material to the U.S. Air Force’s Air Command and Staff College, National Defense University’s (IRMC) School of Information Warfare and Strategy, and Penn State University Applied Research Laboratory’s Non-Lethal Institute.
She has provided and presented seminars and briefings to the Defense Science Board, the Congressional Research Service, Senate Armed Services Committee Staff, and the Center for Naval Analysis. Like her husband, Ms. Morris worked at the USGSC as Research Director of Non-lethals, where she provided “strategic planning support to U.S. Government agencies, departments, and Congressional offices.”
According to McKinney, in their publication entitled, Nonlethality: Development of a National Policy and Employing Nonlethal Means in a New Strategic Era, the USGSC outlined the foreign and domestic use of Non-lethals, and made numerous references to the domestic use of this technology against elusive “enemies” of the U.S. Government.
“The term, ‘non-lethal,’ used to describe this technology is misleading,” says McKinney. “The energy emitted from all of these [Microwave] weapons can kill when appropriately amplified. At lower levels of amplification, they can cause extreme forms of physical discomfort and debilitation.”
The Morris’ have provided interviews and opinion pieces for The Smithsonian, Newsweek, The Wall Street Journal, BBC, ABC, Discovery Channel, The Learning Channel, and other media. According to the New York Times Magazine, both have worked on a task force for the Council on Foreign Relations.
Col. John B. Alexander, PhD
His biography reads: “Dr. John Alexander has been a leading advocate for the development of non-lethal weapons…” He “organized and chaired the first five major conferences on non-lethal warfare, and served as a US delegate to four NATO studies on the topic.” Dr. Alexander has worked with the “highest levels of government,” including the White House, NSC, CIA, and other senior defense officials.
He has written articles for Harvard International Review, The Boston Globe, The Futurist, The Washington Post, and other media. He has appeared on Fox News, Larry King, CNN, Dateline and international television. Currently he works as president of LEADS, Inc., and serves as an adviser to the Commander of U.S. Special Operations Command.
He was “instrumental in influencing the report that is credited with causing the Department of Defense to create a formal Non-Lethal Weapons Policy.” According to Dr. Alexander, the creation of this policy resulted from his non-lethals study for the Council on Foreign Relations.
An article entitled, The Quest for the Nonkiller App, which appeared in the July 25 issue of The New York Times Magazine, stated that Raytheon had developed the Active Denial System (ADS) which causes “palpable pain” and “can operate beyond small-arms range, enabling an operator to deter a foe long before a potentially fatal clash occurs.” According to the article, Stephen Goose, Director of the Arms Division of Human Rights Watch, “paints an Orwellian picture in which repressive regimes obtain nonlethal weapons to keep restive populations in check without resorting to the sort of bloodshed that can earn a country unwanted attention.” That is exactly what is happening now.
The article continued, “Janet Morris of M2 Technologies would like to see, ‘calmative agents’ – weaponized versions of Valium and other drugs – deployed in battle.” The Council on Foreign Relations has issued reports and recommended an increase in research finances, it said, and added, both “[Janet and Chris Morris] have worked as members of the Council on Foreign Relations’ task force.”
Summary
Experts in Neuro-linguistic Programming (NLP), and Non-lethals have worked with elite Think Tanks that have been known to control most governments. These Think Tanks are advocating the creation of a single world government with them in complete control.
The Non-lethals which they have sponsored are reportedly used on people worldwide. NLP is allegedly used as a weapon during citizens’ watch patrols (Gang Stalking).
Footnotes
* Although there are probably entities coordinating these Think Tanks, they exist at the upper echelon of this control structure and are a recognizable element of it.
** These are not the only individuals who helped create this. But they are an identifiable link between the government Think Tanks, the non-lethal technology, and NLP, which are used in this program.
New weapons for a New World Order
Dr. Alexander and the Morris’ have made multiple references to the term, “New World Order” in their publications. It is unclear whether they are aware of what this New World Order will be: the history of some of the organizations which they have served, or their true objectives.
USA Today ran an article entitled, Top Military Advisor Signs on for Video Games, on July 3, 2003, which stated that Dr. Alexander has “inked a contract… with Platinum Studios.” “We’re talking about everything from electromagnetic pulse weapons that could cripple a country by wiping out all its electronics, to controlling insects with pheromones to make whole cities uninhabitable” says Platinum Studios Chairman Scott Mitchell Rosenberg.” It continued, quoting Dr. Alexander who stated, “This stuff is real… the genetic and biological capabilities that exist right now, the cutting-edge weapons, technologies and threats – these are real scenarios that we could literally face today, and it’s mind-blowing.”
Market Wire ran an article in March, 2004, entitled, Colonel John B. Alexander, Ph.D. Secured as ShockRounds (TM) Advisor. “Colonel Alexander” it explained, “is recognized and acknowledged as the world’s leading authority on non-lethal weapons and is credited with developing the modern concept of non-lethal defense,” and “continues to consult to the US government and provide guidance in military situations globally… on non-lethal weapons.”
In an article entitled, Mind Games, by The Washington Post on January 14, 2007, Dr. Alexander stated, “Maybe I can fix you, or electronically neuter you, so it’s safe to release you into society… It’s only a matter of time before technology allows that scenario to come true…” The program is already here and it is nothing less than an electronic concentration camp.
Dr. Alexander authored an article called, New Weapons for a New World Order, which appeared in the March 7, 1993 issue of The Boston Globe. He wrote “[The] United States must be able to protect national interests and values, even in ambiguous circumstances.” And that more options will be required in the future to deal with “threats to national security.” Remember, the Morris’ and Dr. Alexander have suggested the domestic use for these weapons. What this means in plain English is that opponents of big corporations, or anyone against any element of the New World Order are the enemies.
Former FBI Agent Dan Smoot wrote, “Through many interlocking organizations, the Council on Foreign Relations ‘educates’ the public – and brings pressures upon congress – to support CFR policies. All organizations, in this incredible propaganda web, work in their own way toward the objective,” which Smoot contends is a one-world socialist dictatorship. Allen warned that under the control of the Tax-exempt Foundations which are “all extensively interlocked with the C.F.R.” an array of scientists such as, “geographers, psychologists and behavioral scientists to natural scientists, biologists, biochemists and agronomists are making plans to control people.”
In February 1995, Wired Magazine explained, “Janet Reno and Deputy Secretary of Defense John Deutch last April signed a ‘memo of understanding’ under which the Pentagon will share ‘dual-use’ nonlethal technology with domestic law enforcement agencies… Alexander and members of the Council of Foreign Relations, an independent advisory group, met with then-Defense Undersecretary John Deutch on the pacifying potential of non-lethals.” “The entire concept of national security has changed,” stated Dr. Alexander. The article described Dr. Alexander as “‘the intellectual leader in the field’ according to Robert Kupperman, a senior advisor at the Center for Strategic and International Studies [CSIS], a Washington, DC, think tank.”
It continued, “Traditional US military doctrine – using overwhelming force to ‘break things and kill people’ – has its limits in the New World Order…” “[Janet] Morris, a research director of a DC think tank allied the US Global Strategy Council, and her husband, Chris, a fellow writer and national security expert, were also intrigued by the nonlethal possibilities of some of the futuristic technologies being researched at the government labs.” Finally, it stated, “In Nonlethality: A Global Strategy, she [Janet Morris] trumpeted the concept as a ‘revolutionary strategic doctrine’ that would allow the US to seize the moral high ground in coping with the demands of a New World Order.”
In an article entitled, Optional Lethality, from Harvard International Review, Dr. Alexander stated, “Finally, there is a small but vocal group of conspiracy theorists that view non-lethal weapons as tools for illegally controlling the civilian populace. This argument fails the test of logic.” He sites one example in which a riot control agent is used to disperse a crowd, and the how the media “equates that application to the use of lethal gas in the Nazi death camps.” He explained, “It is the people who use technologies for evil purposes…”
I completely agree with his last sentence. But I wonder if Dr. Alexander realizes that the interests he serves, such as the CFR, have been linked to at least one attempt to overthrow the U.S. Government by force, as well as the funding of Nazis and Communists. Additionally, the torture and persecution of innocent people was made legal by legislation during German and Russian dictatorships. This is standard procedure.
On February 23, 1954, Senator William Jenner warned during a speech, “Today the path to total dictatorship in the United States can be laid by strictly legal means, unseen and unheard by the Congress, the President, or the people… Outwardly we have a Constitutional government. We have operating within our government and political system, another body representing another form of government…”
Hypothesis B
The Hidden Evil is being used by the financial elite to covertly destroy anyone they choose as part of a political movement toward a worldwide tyrannical dictatorship.
The evidence suggests that the primary purpose for the existence of this program is the same as those which existed in Russia and Germany. The evidence also indicates that people are targeted in order to be covertly murdered, so they may be recruited, influenced to commit acts of violence such as “going postal,” or driven to suicide. This is accomplished using not only the informant squads, but also an assortment of tactics outlined in the Tactics section. Due to heavy compartmentalization, these informant squads and others who participate in this program are, in all likelihood, not aware of its true purpose or of its other factions.
“[A] number of virtually identical complaints have also been received from England, Canada and Australia,” wrote McKinney. “It would appear that these activities are also ongoing on the European Continent, and the former Soviet Union.” She explained, “Connections between this global pattern of activity and the objectives of the so-called New World Order remain to be determined.” From the information I’ve come across, there is no doubt that this program is part of the New World Order political movement.
This program is being used to silently neutralize (neuter), all people that the Establishment believes will be troublesome to their rule. This usually includes freethinking, incorruptible, nonconformists. This movement toward a one-world government (dictatorship) has been called the New World Order, Global Union, and by those who know what it will be like, The 4th Reich. Professor Marrs advised, “The awful truth is that the entire democratic system – euphemistically called The New World Order – now being set up and organized… is to be a dictatorship of the worst kind.” By now you already know why the mainstream media has not informed you of this impending tyranny.
As revealed by congressional investigations, the Tax-exempt Foundations have been known to promote socialism and one-world government. “The major foundation complex,” says Wormser, has operated as an “integral arm of the government.” He concludes that “If a revolution has indeed been accomplished in the United States, we can look here for its… impetus.” They have been known to fund the social sciences (behavior modification and manipulation). At least one has funded mind-control experiments, which appear to have contributed to the creation of the Hidden Evil.
There is nothing new here. This is the same pattern repeating itself. In order to establish control of a country (or planet) you must create a threat. When these harassment programs started out in other countries such as Russia or Germany, they began with a positive intent. They always mask these state-run programs by targeting undesirables and terrorists – only! But because their true purpose is to destroy opposition, they always expand.
Then they move on to groups of people that do not approve of their corruption. They demonize these non-criminal groups and individuals by linking them with a previously accepted undesirable group. Those in control of state encourage the harassment of people. They get the children involved, as an “all hands” approach to “help out the community.” Remember that in the past, on the local dispensing end, these programs had the complete approval of leaders of the communities. In other words, these programs were approved and carried out by the good guys.
The evidence so far suggests that the United States and other NATO countries are, functionally, covert socialist states with a democratic/republic frontage. The evidence also suggests that this “front” will be replaced by an overt tyrannical socialist dictatorship. Although we’ve been led to believe that Communism and Fascism are opposites, both are on the same end of the spectrum, which is a socialist totalitarian rule. Socialism may sound beneficial on the surface to some, as it promotes an even distribution of wealth, so that everybody gets a fare share.
However, in practice it is much different. It consists of a military/police state, heavy surveillance, and concentration camps. Germany and Russia are prime historical examples. Allen explained, “Here in the reality of socialism you have a tiny oligarchial clique at the top, usually numbering no more than three percent of the total population, controlling the total wealth, total production and the very lives of the other ninety-seven percent.”
“The dignity, liberty, and rights of the human being are protected by the criminal laws of the socialist state. The socialist society is guided by the respect for human dignity, even… the violator of the law, that is the steadfast mandate for the activity of the state and of justice.”
-Article 4 of the Constitution of former East Germany
“Totalitarianism under any label spells loss of freedom,” wrote Sutton and Wood. Senator Barry Goldwater charged, “In their pursuit of a new world order they are prepared to deal without prejudice with a communist state, a socialist state, a democratic state, monarchy, oligarchy – it’s all the same to them.” “If you have total government,” wrote Allen “it makes little difference whether you call it Communism, Fascism, Socialism, Caesarism, or Pharoahism… [because it’s] all pretty much the same from the standpoint of the people who must live and suffer under it.”
Now it becomes clear why the elite monopolists fund both Communism and Fascism. They are a consolidation tool used by the elite to install dictatorships. “The key to modern history,” wrote Professor Sutton, “is in these facts: that elitists have close working relations with both Marxists and Nazis.”
Allen agreed, writing, “If one understands that socialism is not a share-the-wealth program, but is in reality a method to consolidate and control the wealth, then the seeming paradox of super-rich men promoting socialism becomes no paradox at all. Instead it becomes the logical, even the perfect tool of the power-seeking megalomaniacs.” He reveals, “Socialism, is not a movement of the downtrodden masses, but of the economic elite.”
So according to these researchers the elite use socialism as a consolidation and control mechanism. Allen describes Socialism as “a movement created, manipulated and used by power-seeking billionaires in order to gain control over the world.” He points out that this is accomplished, “first by establishing socialist governments in the various nations” and then combining them all under the “United Nations.” Socialism, in practice, is tyranny. It is control by the wealthy individuals who control the state. It is always oppressive, because they must use terror of some kind to create restrictive laws which ensure their control.
Senator Goldwater sited an example of how the Communist Revolution “was not an attempt to destroy the state but rather to seize control of the political state,” and to “replace the individuals exercising… power.” What these researchers are saying is that there has been a concerted covert effort by the financial elite to overthrow the U.S. and other NATO governments and replace them with puppet governments. The evidence suggests that for the most part, it has already been done.
The Revolution is Over
This was not a takeover where the flag was captured and destroyed, but a covert takeover from within. The evidence for this was presented in Volume I. As long as they can vote every four years to decide which elite-controlled puppet will be installed in the White House, most people seem to be content. This was a covert revolution, done by controlling the money supply, legislation, and infiltration, rather than overt bloodshed.
“The most important thing of all is to remember that the political coup de grace is over – the virtual domination of the White House,” stated Sutton and Wood. Evidently they found it necessary to leave the flag, the stature of liberty and the White House intact to keep people convinced they’re still in America.
Sutton and Wood describe it as a, “socialist revolution by stealth, rather than by blood in the streets, but revolution just the same.” A “Totalitarian Takeover of the U.S. Executive Branch” has already happened they explain. “A straightforward and reasonable conclusion is that there has apparently been a covert fascist (national socialist) takeover of the United States government. By fascist we mean a corporate socialist state…” Wormser agreed, writing, “All that can be hoped for is a counterrevolution.”
“Revolution is always recorded as a spontaneous event by the politically or economically deprived against an autocratic state,” wrote Professor Sutton. He adds, “Never in Western textbooks will you find the evidence that revolutions need finance and the source of the finance in many cases traces back to Wall Street.” If people knew that their country had been stolen they would be outraged. It is essential that they believe they’re free and informed, as the elite cannot control the whole population physically.
One critical element for the creation and maintenance of a dictatorship is the implementation of a massive network of citizen informants. Both Germany and Russia had them. The “IMs were to play an important role in the Stasi’s policy of ‘subversion,'” wrote Catherine Epstein in her publication, The Stasi: New Research on the East German Ministry of State Security. “They had made possible the regime’s assault on privacy, honesty, and truth.” “In its use of such a large network of secret informants,” she commented, “the MfS was surely imitating Soviet practice.”
The CSIS report explained that the control mechanisms in Russia, which included the targeting of the civilian population, was only made possible by the “informant network which… [was] the basis of KGB power.” Referring to this report, McKinney added, “The KGB’s success depended on the extensive use of informant networks and agents provocateurs…” She continued, “Participants in the conference agreed that the KGB’s obvious intent was to divide and isolate the populace, to spread fear, and to silence dissenters.”
In her book, The People’s State, Mary Fulbrook described the former East German regime as a “participatory dictatorship” in the sense that a “very small ruling elite, with a linked apparatus of repression and injustice was supported and sustained by a very much larger number of people.” She explained, “All key decision-making was concentrated at the top of the political pyramid.” “The undoubtedly dictatorial political system was ‘carried’ by the active participation of many of its subjects,” she added.
She continued, “The sinister Stasi, with its long shadow of unofficial informers (IMs), was everywhere, and observed and reported on everything… Anyone found to have transgressed permissible limits, in whatever way, could be subjected to brutal measures of repression… [and were] subjected to sometimes unintelligible distortions and miseries in both professional and private lives.” On June 16, 2003, in an article entitled, Informant Nation, The New American stated, “Every unfortunate society saddled with a police state has… [used] citizen informants who play the most important role in enforcing conformity to the ruling elite’s will.”
Semantic deception is often used to disguise the true subversive intentions of those on the higher levels of the pyramid who operate the groups. Therefore, names such as “Peace Keeping Squads,” “Citizens Brigades,” “People’s Police,” “Crime Prevention Networks,” and “Neighborhood Watch” may be used. The primary purpose for these groups and the accompanying DEW harassment is to terrorize any opposition to the financial elite’s rule. The Hidden Evil is one foundational element for what will eventually become an overt dictatorship.
“Whoever can conquer the street will one day conquer the state, for every form of power politics and any dictatorship-run state has its roots in the street.”
-Dr. Joseph Goebbels, Nazi Propaganda Minister
McKinney explained the reason for the existence of the current Gang Stalking program as “capturing a percentage of the population in order to install a dictatorship.” Once more, this is essentially what happened in Russia and Germany by the same financial interests that now control North American and other NATO nations. She explained, “There is always a percentage of the population, roughly 20% or so, who will buckle… and eagerly join the effort at destroying the remainder of the population.”
“I’d like to go back to the underlying purpose for all of this,” commented Moret, referring to this worldwide secret policy. “I’d like to read a couple of quotes. One of them is, ‘We should crush in its birth the aristocracy of the moneyed corporations who already bid defiance to our government.’ Those are the words of Thomas Jefferson.”
“And another quote,” she continued, “‘I see in the near future a crisis approaching that unnerves me and causes me to tremble for the safety of my country. Corporations have been enthroned, an era of corruption will follow, and the moneyed power of the country will endeavor to prolong its reign, by working upon the prejudices of the people, until the wealth is aggregated in a few hands and the republic is destroyed.’ Abraham Lincoln said that in 1862, and that is exactly what’s happening.”
McKinney warned, “I think that once full control is established over a major percentage of the population, and enough of the population is silent and unwilling to stick their necks out, that we inevitably would be heading toward a holocaust.” In a chapter entitled “Revolution is nearly accomplished,” Wormser stated, “This new revolution… has become an attempt to institute the paternal state in which individual liberty is to be subordinated and forgotten…” He warned, “The system will inevitably call [for] …. the suppression of liberty and freedom,” and that it “cannot exist without force and oppression.”
The financial elite are fully aware that this secret policy is being used to hound and torture innocent people. This terror is critical to keep people under control who might be a threat to their rule, or people they just don’t like. Allen warned, “In order to solidify their power in the United States they will need to do here the same thing they have done in other countries. They will establish and maintain their dictatorship through stark terror.” He adds, “The terror does not end with the complete take-over of the Republic. Rather, then terror just begins.”
Dan Smoot advised that the interlocking Think Tanks and Tax-Exempt Complex want “America to become part of a worldwide socialist dictatorship.” As demonstrated, congressmen, presidents, federal law enforcement, whistleblowers and researchers, have all warned us of this. “If you want a national monopoly, you must control a national socialist government,” wrote Allen. “If you want a worldwide monopoly, you must control a word socialist government.” He concludes, “That is what the game is all about.”
According to McKinney, there has been a progressive worldwide spread of this program over the years. Referring to targeted people, she stated, “I would say that the persons who have realized what’s going on are just a drop in the bucket.” Dr. Munzert recognized the consistency of reports in North America and Germany. He attested, “In many other countries,” such as “England, France, Italy, Spain, The Netherlands, Switzerland, [and] Austria, there are also victims. It looks like they are all over Europe, and maybe all over the world.” “I think the number of unknown cases could be much larger,” he adds, because most people “cannot figure out what [is]… really happening.”
“When I was running the Electronic Surveillance Project I was in extensive correspondence with people overseas,” declared McKinney. “The patterns were the same, the nature of the Gang Stalking and the harassment were the same.” She says, “These are global operations,” and described that the “patterns, the protocols, are virtually identical on a global scale.” “It’s very hierarchical,” agreed Moret, “it’s international; it’s carried out in all of the NATO countries.” She explained that this program is being, “widely used in the civilian sector in all of the NATO countries on targeted individuals who are thought to stand in the way of corporatism, capitalism, and fascism.”
Earl’s non-profit organization, An Ethical Light, has seen an increase in these activities as well. She states, “There is evidence that this is escalating, that there are more and more victims all the time.” She says that her organization is hearing an increase in reports of “Gang Stalking,” and “Street Theatre.” “I’ve seen a tremendous expansion of these activities since the early 1990s,” said McKinney, “and it has moved forward in [a] consistent fashion and become ever-more sophisticated and ever-more wide-spread.”
Dr. Kilde warned, “They are ALREADY in every apartment block!” [Emphasis in original] This type of expansion is almost exactly like what occurred in Germany, where IMs were recruited from businesses, restaurants, prisons, factories, schools, sporting centers, hospitals, and workplaces. This was not accomplished by placing a couple of IMs inside these organizations. It was done by recruiting top management into a state-run program.
The squad leaders of these Neighborhood Watch groups, are referred to as, Block Captains. The official website for the city of Portland, Oregon, states that these individuals report directly to the police, fire, and other departments of the local government. It describes Block Captains as, “neighborhood leaders working to make their communities safe… By becoming a Block Captain, you can build and strengthen partnerships with neighbors, crime prevention, neighborhood associations, and the police bureau.” “Most Block Captains,” it adds, “work with their neighbors to organize a Neighborhood Watch, Business Watch, Apartment Watch, and a community foot patrol.”
Funder emphasized, “There was someone reporting to the Stasi on their fellows and friends in every school, every factory, every apartment block…” Koehler agreed, writing, “Without exception, one tenant in every apartment building was designated as a watchdog [IM] reporting to an area representative of the Volkspolizei [people’s police].”
These DHS-sponsored Neighborhood Watch groups are expanding rapidly. The Department of Justice proclaimed, “Law enforcement, in partnership with neighbors across the nation, have come together to meet the challenge and double the number of Neighborhood Watch groups… If you are not involved in Neighborhood Watch, [we]… urge you to join.” “As groups continue to grow,” described the Citizen Corps program initiative, “the roles of citizens have become more multifaceted and tailored to local needs.”
“The Neighborhood Watch Program,” explained the Citizen Corps Guide for Local Officials “has been reinvigorated to increase the number of groups involved in crime prevention and homeland security.” USAonWatch, the Citizen Corps focal point for all Neighborhood Watch groups, has on the top of its homepage, under the title, Register Your Watch Group, the words, “Recruit and Organize as many neighbors as possible.”
Regarding the same pattern unfolding in Europe, Dr. Munzert attests, “It’s strange, before we were attacked most of the victims were quite ordinary people who thought their human rights were certain.” But after they discovered they were targeted and contacted law enforcement and government agencies, they were denied assistance. They assumed it was because these agencies were not aware of this program, but later found out they were. Dr. Munzert says they found this “absolutely strange” and couldn’t understand why this was the case. He describes, “The same stories are heard about victims in other parts of Europe and in America.”
What are these citizen informant squads? They’re a portion of the population that it was necessary for the financial elite to recruit in order to generate a silent socialist revolution. These people are literally the instruments of their own oppression. Speaking of the elite’s repeated use of citizens as leverage for a revolution, Allen describes them as “pawns, shills, puppets, and dupes for an oligarchy of elitist conspirators working about to turn America’s limited government into an unlimited government with total control over our lives and property.”
The program itself is part of a movement toward a socialist, one-world government. Resisting this “New World Order” will require the same “dedication and effort to win that it took to destroy Hitler,” declared Allen. The elite have declared war on anyone who gets in their way during this movement. This includes people that their servants on the local level have identified as troublesome or resisters.
“The lie can be maintained only for such time as the State can shield the people from the political, economic and/or military consequences of the lie. It thus becomes vitally important for the State to use all of its powers to repress dissent, for the truth is the mortal enemy of the lie, and thus by extension, the truth becomes the greatest enemy of the state.”
-Dr. Joseph Goebbels (Nazi Propaganda Minister)
Summary
The evidence presented so far (contained in Volume I and this chapter), suggests that the Invisible Government, consisting of an interlock of Think Tanks, foundations, Wall Street, and the Federal Reserve have taken over the true government that we learned about in our history books. As a matter public record, the promoters of Non-lethal Weapons, which have worked with these Think Tanks, have peddled the domestic use of these weapons against threats to national security, as part of the New World Order.
The information further implies that they are implementing a dictatorial model which was used in Germany and Russia, complete with a vast network of citizen informants. These groups participate in patrols (Gang Stalking), and other types of harassment on behalf of the state, which is ultimately controlled by people of wealth.
This chapter will focus on the motivational factors for citizens on the street level only. The driving force for the upper level controlling faction of this movement will be explored in the chapter on psychopathy.
Intimidation and Blackmail
From what I’ve noticed, some of those who participate in this program do not do so of their own free will.
They have obviously been forced. Sometimes, with their body language, they’ll tell you, “I know, I’m sorry, it’s not me, I have to do it,” etc. Some of these people were previously targeted and know what will happen if they don’t participate. Or, they willfully served and later found out what they were serving.
So, some do it out of fear. As demonstrated, both U.S. intelligence and the Stasi have recruited informants by intimidation. According to the Stasi’s own figures, over 7% of the IMs were recruited by intimidation. Fulbrook states that this doesn’t’ take into account those who cooperated due to the implied retaliation for refusing to do so.
Only in the last ten years or so has information become widely available on this topic. Imagine that you’re face with this horrible situation. Your life is falling apart. You know that something is happening, but don’t know what it is. There is no name for it. You wonder if you’re not going insane. You don’t tell anyone out of fear of sounding paranoid. And if you do, you’re not believed. There is nowhere to turn for information.
Then, by some means of communication, you’re given a chance of serving it as a way of having it reduced or stopped. It’s clear to me that this has been the experience of some of those now participating in this program. They were repeatedly assaulted by something they couldn’t understand or explain, they were given an opportunity, and they took it.
In my opinion, this has nothing to do with lack of strength, morals, ethics, or intelligence. Some may have been attacked and recruited because they possessed those exact traits. So some of these people are victims themselves, regardless of where they are on the hierarchy of this program.
Voluntary Servitude
The rest of this section focuses on those who willingly choose to participate. In order for a well-meaning person to willingly participate in this program, they would have to be deceived. As previously mentioned, lies told by authorities play an important role in the recruitment process. But there are other forces at work such as group dynamics and human needs. There are some traits I’ve noticed which would predispose a person to this type of influence. First, a lack of understanding of authentic history. Secondly, a belief that they are well informed (naivety). Thirdly, (and probably most importantly) minimal pursuit of genuine personal development.
Psychologists, social workers, and personal growth instructors have concluded that there is a set of human needs that we all strive to fulfill. While experts may disagree on the number of needs, and the words used to describe them, they do agree that there is a core set of them. They help explain why people join groups in general, ranging from a local street gang to a yacht club. The words used to describe these needs are simply pointers to a feeling that people are looking to experience.
These needs transcend culture, age, and race. All human beings have these needs. So it’s not a matter of whether they are met; they will be met, it is only a matter of how. I’ve included some of the basic human needs below. Words are sometimes a limitation, especially when explaining human needs.
For that reason, I’ve combined several words to describe the same need.
They are:
-
Security/Certainty/Comfort/Safety/Confinement/Structure
-
Uncertainty/Excitement/Adventure/Freedom/Variety
-
Significance/Independence/Importance//Power
-
Acceptance/Connection/Closeness/Belonging/Support
-
Growth/Competence/Expansion
-
Contribution/Service
Even though all of these needs must be met, there is a hierarchy of importance that each person chooses (usually unconsciously).
A package which offers these needs will be appealing to most people. Citizen informants are obviously offered these needs in a compelling package. The Think Tanks which allegedly created this program are definitely skilled at exploiting these needs and manipulating large groups of people. They know exactly how to motivate people.
Therefore, you can bet that their well-written propaganda material is filled with power words such as:
-
Community
-
Partnership
-
Contribution
-
Participation
-
Service
-
Responsibility
-
Independence
-
Growth
-
Leadership
-
Empowerment
There are the surface reasons we do the things we do, and there are the real reasons.
The surface reason is a means to an end. The end reason is a state of being. I doubt if most of the people who participate in this program are aware of their true personal motives. In his book, Vital Lies, Simple Truths, Dr. Daniel Goleman wrote, “As one sociobiologist puts it, ‘it is not difficult to be biologically selfish and still appear to be sincere if one is sufficiently ignorant of one’s own motives.'”
In my experience, the primary motivating factors for citizen informants in Russia and Germany were personal empowerment and contribution. But probably more so, personal empowerment. For the most part, informants in Germany weren’t paid, or were paid very little. Some were given gifts. But they believed that by participating they were special, they were somebody. They liked meeting with their handlers and being listened to. They did it for the deep human satisfaction of having, “one up” on the people they were watching. Despite their surface claims of patriotism, they were motivated by a selfish desire for personal empowerment. In essence, they received an empowerment package. It seems to me that the current situation is no different.
“USAonWatch through Neighborhood Watch empowers citizens in our communities with the opportunity to volunteer to work toward the safety of our homeland.”
-George W. Bush
Sergei Kourdakov, a member of a Russian Citizens Brigade, stated that becoming a member was one of his proudest moments. He recalled how nice it was to be part of something he could believe in. Regarding the propaganda lectures which his group would regularly receive, he noted that the leaders “weren’t sitting back, waiting for our enemy to destroy us from within.” We were people “who admired action and we listened with admiration as we heard of the massive efforts being mounted.” He exclaimed, “And to think that we were part of it!”
Referring to the East German IMs, Fulbrook wrote, “Many informants were committed and loyal citizens… who were genuinely convinced that it was important to keep a watchful eye out for what they held to be subversive activities of dangerous ‘enemies of the state.'” However, she adds, “[In] the majority of cases, the informant was persuaded into cooperating through a combination of feeling important, being attracted by small advantages, social rewards, material inducements or by a sense of adventure and stimulation to break an otherwise routine existence.”
Speaking of adventure, it’s clear to me that some of these people are having fun while stalking and harassing. It took me a while to categorize the facial expression that some of these people exhibit when I encounter them. Eventually I concluded that it was one of obsession – they’re obsessed! Not necessarily with me, but with the act itself. In the book Mobbing, Dr. Carroll Brodsky, a psychiatrist, is quoted as saying, “Whether it occurs among nations or among individuals at the highest or lowest socioeconomic and political levels, harassment seems to be a social instinct… [and] human beings fall easily into harassment behavior even when there seems no rational objective.”
These citizens seem confident that a program sponsored by their Federal Government and endorsed by leaders in their local government must be moral. But lacking historical knowledge, they are unaware that they are playing a role in malicious process. When these groups sprung up in Germany and Russia, they were not created by a rogue element within the government they were created by the government, and run by local and federal law enforcement. All major components of the community were complicit. This means that trusted, and respected members of the community (who may have been operating on lies themselves), endorsed it. In other words, it was sold by the “good guys,” who told these people they’d be protecting their country from the “bad guys.”
From what I have noticed, most participants seem to require this type of structure, even though it is limiting, destructive and an obstruction to their development. This primitive, decaying thought pattern (herd mentality, group think), apparently left over from pre-historic times, has nothing to do with following orders from a superior, respect, participating in constructive group efforts, or working together for a goal. In reality, it is a subtle surrender of the individual’s identity, and conformity to the Group Mind.
This type of surrender is very subtle and is usually unconscious. After it occurs, two things happen. First, each individual’s thinking capacity is reduced to that of an adolescent. This has been called regression. Secondly, the limited product of the relinquishment merges itself into the group, which, itself functions as one entity called, the Group Mind. This Group Mind is ultimately limited and almost always insane.
“A hallmark of the person as group member, Freud saw, was the replacement of his self by a group self,” stated Dr. Goleman. “The group archetype… is the ‘primal horde’ a band of primitive ‘sons’ ruled by a strong ‘father.’ The particular schemas that constitute the group mind, in this view, would be those dictated by the father, a charismatic, strong leader.” He continued, “The members of such a group, said Freud, relinquish their intellect to the chief… In the group mind ‘the individual gives up his… ideal [his will] and substitutes for it the group ideal as embodied in the leader.'”
Dr. PeckIn his book, People of the Lie, psychiatrist Dr. M. Scott Peck (pictured right) described groups as having a quality of “psychological immaturity.” He wrote, “Individuals not only routinely regress in times of stress, they also regress in group settings… One aspect of this regression is the phenomenon of dependency on the leader. It is quite remarkable,” he exclaimed. “It does not happen by a rational process of conscious election; it just happens naturally – spontaneously and unconsciously.” Although most of the surrendered people are not aware of it, they have exchanged their self for what they perceive to be a more empowering Group Mind.
“Each individual possesses a conscience which to a greater or lesser degree serves to restrain the unimpeded flow of impulses destructive to others. But when he merges his person into an organizational structure, a new creature replaces autonomous man… mindful only of the sanctions of authority.”
-Dr. Stanley Milgram, 1974
Dr. Goleman observed, “Madness, said Nietzsche, is the exception in individuals, but the rule in groups. Freud agreed. In Group Psychology and the Analysis of the Ego, Freud wrote, ‘A group is impulsive, changeable and irritable.’… Freud saw people in groups as regressing to an infantile state as consequence of membership.” He continued, “By ‘group’ Freud meant something that bordered on a mob.” “Like individual evil, group evil is common,” wrote Dr. Peck. “In fact,” he warned, “it is more common – so common, indeed, it may be the norm.”
After the individuals surrender themselves to the group, the entire herd merges into a single being. Dr. Peck explains, “This is because a group is an organism. It tends to function as a single entity. A group of individuals behave as a unit because of what is called group cohesiveness. There are profound forces at work within a group to keep its individual members together and in line.” Although this type of surrender is an obstruction to personal growth, most of these people consider it a compelling trade for temporary artificial empowerment.(**)
empower
1. To invest with power
2. To equip or supply with an ability; [to] enable
-www.thefreedictionary.com
This “group cohesiveness” that holds groups together is described by Dr. Goleman as “mental homogeneity” which is made up of shared beliefs he calls “schemas.” Quoting Freud, Dr. Goleman wrote, “What separates a ‘group’ from a random crowd is shared schemas,” which he describes as “a common interest in an object [or person], a similar bias in some situation…” “The more in common a group shares… the higher the degree of ‘mental homogeneity’ and therefore, ‘the more striking are the manifestations of group mind.'”
So, if a group has been created for a specific purpose, and group cohesiveness is maintained by working toward a common goal, would the group create circumstances to foster its own cohesiveness in order to survive? The answer is yes. According to Dr. Peck, the most effective way of fostering group cohesiveness is to create an enemy. This helps to explain why dictators have usually created internal or external threats, as an excuse to form groups which would persecute their enemies. Again, this is always done legally, by the law enforcement of that time period. The effectiveness of this tactic is amplified when used within a Specialized Group, which was created to neutralize “enemies” in the first place.
Dr. Peck writes, “A practically universal form of group narcissism is what might be called ‘enemy creation.'” He says, “Those who do not belong to the group (or club or clique) are despised as being inferior or evil or both.” “If a group does not already have an enemy,” he explains, “it will most likely create one in short order.”
Enemy Creation
“It is almost common knowledge,” maintains Dr. Peck “that the best way to cement group cohesiveness is to ferment the group’s hatred of an external enemy. Deficiencies within the group can be easily and painlessly overlooked by focusing attention on the deficiencies of… [others].” Dr. Goleman illustrates, “A group may implicitly demand of its members that they sacrifice the truth to preserve an illusion. Thus the stranger stands as a potential threat to the members of a group, even though he may threaten them only with the truth. For if that truth is of the sort that undermines shared illusions, then to speak it is to betray the group.”
“The evidence for the collective defenses and shared illusions at work in groups… is nowhere better stated than in Irving Janis’s research on ‘groupthink'” wrote Dr. Goleman. “The first victim of groupthink is critical thought… Facts that challenge the initial choice are brushed aside… Loyalty to the group requires that members not raise embarrassing questions, attack weak arguments, or counter softheaded thinking with hard facts. Only comfortable shared schemas [beliefs] are allowed full expression.”
In her book, Betrayal Trauma, Dr. Jennifer J. Freyd wrote, “Indeed, becoming socialized to a culture may be partly dependent on one’s falling into a kind of appropriate ‘trance’ in which one assimilates the norms and expectations of the members of the group…” She continues, “Such a state occurs in both small and large social organizations, in families and in nations, and the behavior may seem disturbing when viewed by an outsider… as when ‘normal’ German citizens engaged in heinous acts under Hitler…”
We already understand why people join groups, and now we have an understanding of what happens after they do. But why do people, even if receiving an empowerment package surrender their self in exchange for being led (or misled)? Dr. Peck provides us with another answer, stating, “Most people would rather be followers. More than anything else, it is probably a matter of laziness.” So, according to these professionals, this unconscious process works this way: Because I’m a lazy coward, I’ll give you my mind, and you give me some temporary empowerment. As primitive and simple-minded as this underlying motivational factor may be, it seems to apply in most cases.
“USAonWatch empowers citizens to become active in homeland security efforts through participation in Neighborhood Watch groups.”
-Citizen Corps program description
Birds of a Feather
People who operate on a particular frequency have a tendency to become aligned with acts and structures that emanate from that frequency. For instance, some of the largest historical atrocities that have taken place were not carried out by individuals, but groups, large groups. You can think of it as a negative energy field that continues to grow and use human beings as instruments to express itself. It almost always disguises itself as something good such as, “a great cause,” and usually uses deception to enlist supporters.
The people who participated in those atrocities did not find their way into that structure and commit those acts by accident. Those people were attracted to that energy field because they operated on a frequency similar to it. The frequency of energy that I’m talking about here is not a high one; it is in fact primitive, but also popular. Some may call this destructive energy field, “evil.” But I think “insanity” or “unconsciousness” are also accurate descriptions.
“Persons who have a weakened sense of self feel more secure in a group in which they find support,” stated the book, Mobbing. “They often ‘vulture,’ lacking the courage to listen to their conscience. They find their identity by associating with someone believed stronger, respected, idolized.” Dr. Westhues, professor of Sociology at the University of Waterloo, and author of the book, Eliminating Professors stated, “The only relevant reality at that point, far beyond any personality characteristics of the Mobbee… is the pack, the herd, a number of individuals having surrendered their selves to something bigger.”
McKinney described the Gang Stalking participants as “covert wannabees” carrying out what they think are covert activities, which are “perverted in the ultimate objective.” And referring to the white-collar people who participate, Moret declared, “You would think it would not be so easy to co-opt them.” My understanding is that most of these people seem to have a fragile internal support system, but rather than strengthening it by going through a process that is uncommon and somewhat frightening, they seek security outside of themselves. They thrive on recognition and acceptance, and will eagerly conform in order to meet these needs.
Obviously keeping an eye on people is a very big and empowering part of their lives. But if this vehicle were to be removed, they’d have a choice. One option is that they could go through a process of growth, which results in the development of power that is truly theirs and is with them under any circumstances. This approach is not taught in the mainstream. In fact, it is denounced! So the more common method is for them to quickly find one of the many readily available vehicles (groups), which will safely and easily offer them the temporary power they need.
I have not detected a category as far as age, occupation, religion, education, race, social standing, or financial status that these people can be placed in. But I have learned this: They’re the norm! And despite their status, their minds are generally small and closed. I have no reservations about saying that the financial elite are using the small-minded, mentally ill, and deceived people to persecute the ones who are waking up or are already awake.
So, on the surface it would appear that their involvement is a result of carefully calculated decisions made by fully functional and informed adults, who participate out of patriotism and service to the greater good. However – upon further investigation, we find their involvement is born of a cowardly and selfish scapegoat mentality.
Dr. Peck referred to groups which are created for a specific purpose as Specialized Groups, and noted there is “subtle but definite scapegoating involved.” He continues, “For the reality is that it is not only possible but easy and even natural for a large group to commit evil without emotional involvement…” “It happened in Nazi Germany. I am afraid it will happen again,” he warned. It is happening again. The concentration camps are electronic; the physical intimidation has been replaced by more refined non-physical violence.
Some who willingly participate in this program may disagree with the analogy of Nazi Germany. They may say, “Oh, you’re full of it, we’re not torturing anyone.” My reply would be that such a person is naive, in denial, or just lying. It’s exactly the same evil, but more subtle. No visible torture chambers, but torture just the same. In fact it stems from the same financial interests that funded the Nazis – literally funded a holocaust… then lied about it. Anyone who has an open mind with no hidden agenda that has read my previous supporting evidence, probably knows that the people who created this are monsters.
Evil in Disguise
There is another category of people who willingly participate. They suffer from an acute type of insanity that could be described as evil or psychopathic. These people do it because they simply enjoy watching others suffer. They’re not criminals. They pay their taxes on time, they pay their bills, and they go to church. They’re members of your local community center. They’re soccer moms and little league baseball dads. They’re well groomed. They appear to be model citizens.
“They live down the street – on any street,” says Dr. Peck. “They may be rich or poor, educated or uneducated. There is little that is dramatic about them. They are not designated criminals. More often than not they will be ‘solid citizens’ – Sunday school teachers, policemen, or bankers, and active in the PTA.” He adds, “They dress well, go to work on time, pay their taxes, and outwardly seem to live lives that are above reproach.” Dr. Peck reveals that these people can’t be categorized by any existing “psychiatric pigeonholes,” not because, “the evil are healthy,” but “simply because we have not yet developed a definition for their disease.”
He asks, “How can this be?” “How can they be evil and not designated as criminals? The key lies in the word ‘designated.’ They are criminals in that they commit ‘crimes’ against life and liveliness.” “But” he says, “except in rare instances… their ‘crimes’ are so subtle and covert that they cannot clearly be designated as crimes.” It’s usually not the size or illegality of their acts, but the consistency with which they commit them. He adds, “While usually subtle, their destructiveness is remarkably consistent.” This pattern of consistent destruction, which Dr. Peck describes, seems to fit the people and organizations mentioned in Volume I perfectly.
Appearance is extremely important to these people. This is for concealment. They’re petrified of someone finding out what they are. “Utterly dedicated to preserving their self-image of perfection, they are unceasingly engaged in the effort to maintain the appearance of moral purity,” wrote Dr. Peck. “They worry about this a great deal. They are acutely sensitive to social norms and what others might think of them.”
So according to Dr. Peck, it’s as if evil people have something like a checklist of tasks, that they think “good” people do, and they go through the motions of performing these deeds so they can outwardly appear decent. They go through these motions not to be good, but to pretend that they are. “The words ‘image,’ ‘appearance’ and outwardly,'” states Dr. Peck, “are crucial to understanding the morality of the evil. While they seem to lack any motivation to be good, they intensely desire to appear good. Their ‘goodness’ is all on a level of pretense [fakeness]… It is, in effect, a lie.”
Interestingly, one task that these fake good people usually engage in, as part of their cover, is destroying evil. “Strangely enough,” stated Dr. Peck, “evil people are often destructive because they are attempting to destroy evil.” “Instead of destroying others,” however, “they should be destroying the sickness within themselves.” He observed that they are often “busily engaged in hating and destroying… usually in the name of righteousness.” Therefore, the Hidden Evil, with its Neighborhood Watch groups and silent electromagnetic torture, is the perfect expression for their sickness. The liars – the fakes – can harm while appearing to help. They can hide within it, because the program itself – is a lie.
Ordinary Evil
In my estimation, most of the citizens now participating in Gang Stalking are not evil. But you don’t need to be evil to participate in evil. “Even civilians will commit evil with remarkable ease under obedience,” remarked Dr. Peck. “As David Myers described in his excellent article A Psychology of Evil (The Other Side [April 1982], p. 29): ‘The clearest example is Stanley Milgram’s obedience experiments. Faced with an imposing, close-at-hand commander, sixty-five percent of his adult subjects… would deliver what appeared to be traumatizing electric shocks to a screaming innocent victim in an adjacent room. These were regular people – a mix of blue-collar, white-collar and professional men.'”
Dr. Stanley Milgram’s obedience experiments, were originally conducted at Yale University during the 60s, and then conducted in other parts of the world. The tests were done to see how many ordinary people would commit acts of violence against an innocent person. The tests consisted of a teacher and a learner scenario. The teachers were told that they would be administering a test to a student or learner, and if the student answered a question wrong, they were to shock him. In reality, the learner was an actor, and the real subject of the experiment was the teacher. The true nature of the experiment was to see how much pain an ordinary person would inflict on an innocent victim with a heart condition, under the direction of an authority figure.
Dr. MilgramIn the December 1973 issue of Harpers Magazine, under an article entitled, The Perils of Obedience, Dr. Milgram (pictured left) wrote, “The point of the experiment is to see how far a person will proceed in a concrete and measurable situation in which he is ordered to inflict increasing pain on a protesting victim.” The only way for the subject to disobey and halt the experiment was for them to make a clear brake with authority.
Before the experiments Dr. Milgram asked a variety of people including, psychiatrists and faculty in the behavioral sciences, what the outcome would be. They answered that only a “pathological fringe of about one in a thousand would administer the highest shock on the board.” “These predictions,” stated Dr. Milgram “were unequivocally wrong.” 65% of the adult test subjects administered the full 450 volts to the victim.
One colleague dismissed the experiments, claiming that once “ordinary people” outside of the Yale campus were selected, the numbers would decrease. So, the experiments were conducted by other scientists in places such as Princeton, Munich, Rome, South Africa, and Australia. The level of obedience increased to has high as 85%.
Dr. Milgram warns, “The most fundamental lesson of our study,” is that “ordinary people, simply doing their jobs, and without any particular hostility on their part, can become agents in a terrible destructive process.” But, even if they’re aware of the destructive process they’ll still participate under the right circumstances. He adds, “Even when the destructive effects of their work become patently clear, and they are asked to carry out actions incompatible with fundamental standards of morality, relatively few people have the resources needed to resist authority.”
What else did they discover? Well, fortunately many protested before administering the shocks, but unfortunately even though they were “totally convinced of the wrongness of their actions,” they “could not bring themselves to make an open break with authority,” wrote Dr. Milgram. These psychiatrists also found that most people didn’t like inflicting pain on innocent people, but did enjoy the satisfaction of pleasing the authority figure. Contrast this to citizen informants looking for a pat on the back by local authorities for their service. If this type of motivation sounds small-minded, remember, it’s what motivated adults in other countries to do the same. They were, “proud of doing a good job, [and] obeying the experimenter under difficult circumstances,” proclaimed Dr. Milgram.
Who was this authority figure? Well, in the experiments he was portrayed as a doctor with a stern voice, telling the subjects that they must continue. Milgram noted that “he had almost none of the tools used in ordinary command structures.” In other words, this authority figure did not portray himself as a military officer, an FBI or NSA agent, or a local official. “For example,” says Milgram “the experimenter did not threaten the subjects with punishment,” such as “loss of income, community ostracism, or jail,” but despite these limitations, “he still managed to command a dismaying degree of obedience.”
Variations of the experiment were carried out and levels of obedience increased when the responsibility was diffused. The act of administering the shock was spread to multiple people. “Predictably,” says Milgram “they excused their behavior by saying that the responsibility belonged to the man who actually pulled the switch.” The person who pulls the switch is simply following orders.
He continues, “This may illustrate a dangerously typical arrangement in a complex society: it is easy to ignore responsibility when one is only an intermediate link in a chain of actions.” Similarly, although many of these citizen informants may not pull the switch, they’re an essential part in a relay that results in torture and murder. Dr. Milgram adds, “Perhaps this is the most common characteristic of socially organized evil in modern society.”
Yale Alumni Magazine produced an article on Dr. Milgram’s findings. Written by Dr. Phillip Zimbardo, it appeared in the January/February 2007 issue and was entitled, When Good People Do Evil. Dr. Zimbardo asked, “Obviously, you would have dissented, then disobeyed and just walked out. You would never sell out your morality,” he asked, “Right?”
“Milgram,” continued Zimbardo, “once described his shock experiment to a group of 40 psychiatrists and asked them to estimate the percentage of American citizens who would go to each of the 30 levels in the experiment. On average, they predicted that less than 1 percent would go all the way to the end, that only sadists would engage in such sadistic behavior… They could not have been more wrong… The vast majority of people shocked the victim over and over again despite his increasingly desperate pleas to stop.”
Frighteningly, when the experiments were altered, “Milgram was able to demonstrate that compliance rates could soar to over 90 percent,” proclaimed Dr. Zimbardo. “In one study, most college students administered shocks to whimpering puppies when required to do so by a professor.” He added, “His classic study has been replicated and extended by many other researchers in many countries.” When a more pronounce authority figure is used, compliance increases. It also increases when the act of inflicting pain is fragmented among many people. And the greater the distance, the easier it is to inflict pain.
Dr. Zimbardo wrote of another study where a group of twenty high school students joined a history teacher’s authoritarian political movement, and within a week had expelled their fellows from class and recruited almost 200 others from around the school. The article continued, “Motives and needs that ordinarily serve us well can lead us astray when they are aroused, amplified, or manipulated by situational forces that we fail to recognize… This is why evil is so pervasive.”
“Nothing is more terrible than to see ignorance in action.”
-Goethe
These experiments clearly show a significant flaw in the logic of the masses which allows persecution, genocide, and holocausts to occur. In fact, Dr. Milgram originally conducted the experiments to see how an entire country could go along with persecution and mass murder in Nazi Germany. This is not a problem with the “evil elite” who want to control us, but a problem with humanity. This is a problem with society.
In a March/April 2002 article entitled, The Man Who Shocked The World, Psychology Today Magazine described Dr. Milgram as, “the man who uncovered some disturbing truths about human nature,” by conducting “one of the most significant – and controversial – psychological studies of the 20th century.”
These studies, they stated “demonstrated with jarring clarity that ordinary individuals could be induced to act destructively,” and “need not be innately evil or aberrant to act in ways that are reprehensible and inhumane.” The article concluded, “Milgram’s obedience experiments teach us that in a concrete situation with powerful social constraints, our moral sense can easily be trampled.”
Milgram’s researched led him to conclude that there is a protocol used by leaders of countries that artificially creates an environment of situational power, which will foster the participation of the public in carrying out acts of evil. It is basically a protocol for mass persecution. Speaking of this, Dr. Zimbardo noted, “Milgram crafted his research paradigm to find out what strategies can seduce ordinary citizens to engage in apparently harmful behavior. Many of these methods have parallels to compliance strategies used by ‘influence professionals’ in real-world settings, such as salespeople, cult and military recruiters…”
In other words, these methods are a type of mass mind-control. Once more, in the past, the masses did not detect that they were being negatively influenced to commit these acts, just as they’re not aware of it now. As Professor Marrs described, one key aspect of a dictatorship, is that the target population may be unaware of its existence. The protocol includes:
(A) “Prearranging some form of contractual obligation, verbal or written, to control the individual’s behavior in pseudo-legal fashion.” In Germany they signed wavers when recruited into the Ministry for State Security, in Russia they were sworn to secrecy. Obviously the current informants go through a similar process.
(B) “Giving participants meaningful roles to play… that carry with them previously learned positive values…” In East Germany the IMs were recruited for “state security.” In Russia they were “Citizen’s Brigades,” maintaining civil order.
((C) Using semantic deception to alter “the frame so that the real picture is disguised” from “hurting victims” to “helping.” Clearly the current participants are told that they’re helping their communities and country, not helping to murder innocent people. Again, similar propaganda was used in Germany and Russia.
(D) “Creating opportunities for the diffusion of responsibility or abdication of responsibility for negative outcomes…” There are two considerations. First, the fragmenting of responsibility increases group complicity and removes accountability, which results in people going above and beyond what they’d normally do as individuals. In this situation, no one is directly responsible for the murder of a person. Secondly, when an authority figure takes responsibility for the acts by making them OK, accepted, or legal, then complicity increases.
(E) Possibly the most important part of this protocol is the offering of the “big lie,” which Dr. Zimbardo says is used to “justify the use of any means to achieve the seemingly desirable, essential goal.”(***) “In social psychology experiments, this is known as the ‘cover story,'” says Dr. Zimbardo. This lie, he declares, “is a cover-up for the procedures that follow, which do not make sense on their own.” He describes the real world equivalent as “an ideology,” such as a nation relying on “threats to national security,” before suppressing political opposition.
“An evil exists that threatens every man, woman, and child of this great nation. We must take steps to ensure our domestic security and protect our homeland.”
-Adolph Hitler
An article in the July/August 2004 issue of the American Scientist entitled, Milgram’s Progress, stated, “In a television interview in 1979, Milgram said that he eventually came to the conclusion that, “If a system of death camps were set up in the United States of the sort we had seen in Nazi Germany, one would be able to find sufficient personnel [to operate]… those camps in any medium-sized American town.”
But we’ve come a long way since the 60s, we don’t think like that anymore, right? Besides, those types of things happen in other countries… Unfortunately this is false. People have not changed in thousands of years. Technology has – not people. Again, the same financial interests that funded those dictatorships are allegedly responsible for the current situation.
In fact, years later ABC News re-created these obedience experiments in its own study and in January 2007 published their findings in an article entitled, The Science of Evil. They wrote, “Primetime wanted to know if ordinary people today would still follow orders, even if they believed their actions were causing someone else pain. Would as many follow the seemingly dangerous and painful orders as in the original experiment?” They found that obedience held at 65%, and in some cases increased to a surprising 73%. Like the original studies, theirs subjects were composed of an ethnically diverse group with an unusually high level of education.
Referring to specialized groups, Dr. Peck wrote, that the “group will remain inevitably potentially conscienceless and evil until such time as each and every individual holds himself or herself directly responsible for the behavior of the whole group… We [the general mass] have not yet begun to arrive at that point.”
“With numbing regularity good people were seen to knuckle under the demands of authority and perform actions that were callous and severe… A substantial proportion of people do what they are told to do, irrespective of the content of the act and without limitations of conscience, so long as they perceive that the command comes from a legitimate authority.”
-Dr. Stanley Milgram, 1965
Parasitic Behavior
There is another motivational factor worth mentioning. Possibly, the greatest factor. During these covert group attacks, there is an energy transfer that these individuals, whether they know it or not, are looking for. The systematic vulturing during Mobbing and Gang Stalking campaigns is an intended robbery of a person’s life-energy. This is no different than sticking a needle in someone’s arm and stealing their blood. Eastern philosophy refers to these people as Sappers.
A Sapper is a person who is too sick, weak, or underdeveloped to create their own life-energy. So they continually find themselves in circumstances where they steal or sap energy from a being that has already assimilated it into a usable form. This is similar to an infant eating pre-processed food. Society is full of them. They are completely unconscious of this tendency. I also refer to them as Psychic Fleas.
Summary
When we examine the underlying factors which motivated citizen informant groups in the past, we find that feelings of personal empowerment, and a sense of adventure, figured largely.
Present-day citizen informants, in all likelihood, are motivated by these factors. While having their personal human needs fulfilled, they may not recognize that they’re part of a destructive process. Most ordinary people will commit evil regularly under the right conditions.
People with weak support structures feel more secure in a group. The group offers protection in exchange for conformity and obedience. Groups created for a specific purpose engage in scapegoating, which includes the creation of enemies to foster its existence. The group functions as a single entity with the psychological capacity of an adolescent.
There exists an actual recipe for gaining mass complicity in persecution, where this entity can be used.
Footnotes
* All photographs used on this page have been taken from www.lifeinlegacy.com and www.wikipedia.com.
** It’s almost as if they’re enabling the disabled in order to disable the enabled.
*** Coincidently, one alternate name I contemplated for the Hidden Evil was, “The Big Lie
Who’s Targeted?
As I’ve already demonstrated, the people controlling the United States and other developed countries are not good people.
Once you understand how these controlling elite operate, it’s easy to see why they are deliberately targeting innocent people. On September 12, 2006, the Associated Press published, Official Touts Nonlethal Weapons for Use, where they announced, “Air Force official says nonlethal weapons should be used on people in crowd-control situations.”
They continued, “Nonlethal weapons such as high-power microwave devices should be used on American citizens… the Air Force secretary said Tuesday… Domestic use would make it easier to avoid questions in the international community over any possible safety concerns, said Secretary Michael Wynne.” Wynne stated, “If we’re not willing to use it here against our fellow citizens, then we should not be willing to use it in a wartime situation.”
In the June/July 1987 issue of Peace Magazine, under an article entitled, Zapping the Movement, Congressman James Scheur is quoted as saying,
“We are developing devices and products capable of controlling violent individuals, and entire mobs without injury… We can tranquilize, impede, immobilize, harass, shock, upset, chill, temporarily blind, deafen, or just plain scare the wits out of anyone the police have a proper need to control and restrain.”(*)
The military and a member of congress have now openly declared that these weapons should be used on civilians.
The Sun Journal ran an article on September 28, 1992, entitled, Woman Fears Government Zapping, where they described a 72 year-old woman that had been harassed in multiple states and countries, allegedly by the FBI and CIA. She visited various doctors in Richmond, VA, who told her that nothing was wrong. The harassment continued when she visited doctors in England, Sweden, Finland, and Canada.
“Electronic government weapons are zapping burns in her face… and emit rays that stab her back and make her brain feel swollen,” they wrote. “She says she gets zapped in her home, her car and even in church on Sunday mornings… She does not know why she is a target.” They continued, “[She] says she is sure the powers that are tormenting her are evil… [and doesn’t] know why they are after her.” “Our government now is controlled,” she said, and added, “I think the CIA, the FBI and the military are evil.”
If you’re targeted, no one will tell you so. Some people conclude they were harassed for years before they realized what was happening. Multiple people within a family can be targeted, which indicates a pattern suggesting that these harassment campaigns are intergenerational. Many people don’t know why they’re targeted or exactly when it began. “No TI should look for a reason why this is going on,” warned McKinney. “It’s a serious, serious mistake.”
As a result of surveillance, the people overseeing these harassment squads know this is nothing about monitoring a threat to national security, and everything to do with the deliberate misuse of resources for no good reason. When you see the words, “threat to national security,” think “threat to corporate control.” McKinney’s analysis leads her to conclude that most of those targeted are not and never have been a threat. Moret describes this program as an “absolutely terrible secret policy,” and warns, “Americans need to understand that they are the primary targets of this war on terror.”
This is the elite’s way of removing people from society that they dislike or see as a nuisance. Once you research this, and find out what they’ve done, how they’ve repeatedly lied, and what their intentions are, then this accusation doesn’t seem outlandish, but makes perfect sense. McKinney hinted that the reasons of national security blanket might be the justification for these harassment campaigns, and spoke of the “absence of clear definitions” of terms such as “national security” and “national security risk.” Similarly, in East Germany and Russia, people were labeled threats to state security, enemies of the state, and enemies of the people to justify persecution.
“In addition to criminal and terrorist organizations,” wrote Dr. Alexander, “other groups may emerge that have the ability to threaten national and regional security.” He lists some of these groups as fundamental religious groups, groups looking for homelands, starving masses, those who are economically deprived, and those who believe they are socially oppressed. “These threats are both internal and external,” he says.
In his book, The Franklin Cover-up, Senator DeCamp wrote, “The government’s legitimate concern with national security has been turned into a banner under which government officials and judges and agencies and politicians can, and do get away with almost anything and everything.”(**)
I knew law enforcement and the intelligence community had their problems, like most institutions do. I had also heard scattered stories of people being harassed by government agencies but I attributed it to their own fault. I figured they must have been some serious troublemakers in order to provoke it. I thought the occasional media leaks were pretty much all there was to it. I trusted that the “watch-dog” media kept those agencies in line and were perhaps even a little intrusive (preventing these agencies from doing their jobs).
I believed that they would never spend resources to target innocent people, especially a nobody. I thought that they had better things to do than to waste resources targeting innocent citizens. I was wrong. I never realized that those media leaks were just the tip of the iceberg or how big and organized this corruption was.
There is evidently a list that people are added to. Once someone is added to this list, they are open to all manner of experimentation with surveillance and Directed Energy Weapons. Once someone is labeled a threat to national security – anything goes. There are no laws preventing this. No mainstream organization to this date has made a genuine effort to expose this program. It appears that there are multiple ways a person can be added to this list.
Whistleblowers
Government whistleblowers or whistleblowers of a corporation that is closely associated with the government may be targeted. Some people are convinced that they were targeted because they exposed corporate or government corruption. Leuren Moret, for instance, was targeted after exposing hazards relating to depleted uranium at the Lawrence Livermore National Laboratory.
Constantine described, “The whistle-blower is forced out, frightening workmates and supporters… The assault continues” he says, “until the target is left discredited, exhausted, in poor health, financially crippled, his career in ruins.” He explained that the objective is to portray them as “incompetent, disloyal, troublesome, mentally unbalanced or ill.”
Protestors
Civil rights activists have a history of being targeted by similar programs. “The records show that the vast majority of the targets of domestic covert action have engaged only in peaceful protest,” declared Glick in War At Home. “They do no harm to anyone’s health or safely. The only danger they pose is to the status quo. Their only weapon is the power of their words and the threat of their good example.”
On March 10, 1986, The Guardian stated in an article called, Peace Women Fear Electronic Zapping at Base, that about 40 people experienced headaches, dizziness, an inability to concentrate, and memory loss after protesting outside a U.S. military base in England. “Doctors are compiling a report on the condition of a number of Greenham Common peace women who have had symptoms which are consistent with the known neurophysiological effects of electromagnetic waves, or low level radiation,” stated the Guardian.
The article continued, “Dr. Stephen Farrow, Chairman of the Medical Campaign against Nuclear Weapons said yesterday: ‘We are now compiling evidence about the claims made by the women.’ Dr. Farrow, who is senior lecturer in epidemiology at the University College of Wales Medical College, said that academic research into similar claims was being conducted in Canada.”
An article in the Associated Press on April 15, 1995, entitled, Government Wants Me Dead, reported that a lawyer named Linda Thompson filed a complaint at the Marion County Prosecutors Office stating that the government was trying to kill her with radio frequency weapons. The article went on to explain how Thompson claimed that six of her friends had already been killed this way.
According to a December 4, 2003 article in The Village Voice, entitled, J. Edgar Hoover Back at the ‘New’ FBI, even peaceful protesters are now being labeled as potential “terrorists.” One need only look at the objectives of the Think Tanks which clearly state that they intend to abolish the constitution and merge America into a single world government. Therefore, anyone who publicly opposes the New World Order, or any of its related agendas such as the WTO, NAFTA, CAFTA, FTAA, the Federal Reserve, etc., may be targeted. Anyone involved in the 9/11-truth movement is a potential target.
Independent investigative journalist Greg Szymanski, who has written for the American Free Press, and has appeared on the Republic Broadcasting Network and the Genesis Communications Network, interviewed a man that has been targeted due to uncovering some information regarding 9/11. Apparently this man has been stalked by helicopters, hit with microwave weapons, and has been on the receiving end of death threats and multiple attempted murders, including staged accidents.
The Seattle Times ran an article in April of 2000, called, Crowd-Control Cookery, which described, when “unruly demonstrators disrupting World Trade Organization talks clashed with police,” they “had at their disposal a new… arsenal designed to sting, stun, entrap, immobilize, sicken, knock the wind out of – but not kill – the assailants, suspects, agitators or enemies they are used against.” They continued, “They’re referred to collectively as non-lethal weapons, and police and military units are increasingly using them as they try to limit the use of deadly force… Many of the nation’s major urban police forces already use some of these weapons…”
This program may be particularly useful for subduing people who are too high profile, or for whatever reason can’t be outright murdered. Say, for instance, if someone is quite troublesome to the elite, they can be given cancer, and psychologically tortured to impede their progress. Or in the words of Dr. Alexander, the program can be used to “neuter” them. Parents and children of targeted individuals are also being targeted for apparent purposes of intimidation. All done under the banner of “national security.”
The Cleveland Plain Dealer ran an article on in June 1991, entitled, Psychiatrist Testifies at Mom’s Hearing. Apparently a woman in Ohio killed one of her daughters to spare her from further trauma, after they had been targeted for two years with torture, consisting of burns and sexual degradation by V2K. Prior to this she wrote a multitude of letters to the pentagon, government officials, and talk show hosts describing her plight.
Her doctor told the Dealer, “she has a number of delusions… [about] being repeatedly attacked and tortured by government agencies.” He continued, “[her] unwillingness to understand her illness kept her from weighing the possibilities of her defense.” Her attacks reportedly continued while she was imprisoned.
McKinney wrote of one protester who received a call stating that, “if she valued the lives of her children,” then she would drop her public opposition to a company’s installation of high power lines. “Since receiving that threat,” declared McKinney, “the individual’s 11-year old daughter has been reduced to extremes of pain, resulting in her recurrent hospitalization for treatment of illnesses which cannot be diagnosed. It is now also apparent to this individual that her three-year-old son is on the receiving end of externally-induced auditory input [V2K].”
Similarly, the Stasi would target families. Fulbrook described, “The children and relatives of dissidents might be subjected to harassment and personal disadvantage.” She added, “People could emerge with their health, self-confidence and future working lives damaged beyond recovery.”
Experimentation
Part of the Hidden Evil seems to be testing the latest in surveillance and Directed Energy Weapons. MKULTRA, a known mind-control project, with 149 sub-projects, was conducted in universities, hospitals, military institutions, and prisons. According to author Jim Keith, under MKULTRA about 23,000 people were traumatized, but researchers in this are see this as an extremely conservative number. Since many of the records have been destroyed we will probably never know. Likewise, the Stasi burnt out many paper-shredding machines destroying their victim file evidence.
The paper trail for these experiments ended around 1984. But evidence reveals that it never stopped. “It would appear that the CIA’s and FBI’s Operations MKULTRA, MHCHAOS and COINTELPRO,” were “merely driven underground,” stated McKinney. Labs are no longer necessary as Directed Energy Weapons can be used at a distance, and plain-clothed citizen brigades are complicit in public harassment.
Recruitment
It appears that some people are targeted with the intent to recruit them as informants after they’ve been broken. Both the East German Stasi and the CIA would use constant harassment campaigns on people they wanted to recruit as informants, or people knew they couldn’t recruit and wanted to destroy.
Political Movement
Although whistleblowers, activists and others have been targeted, the scope of this worldwide program is too big for it to be limited to a parallel justice system. As previously illustrated, there is probably a political agenda attached to the Hidden Evil. According to both McKinney and Moret, it has moved beyond experimentation and is being widely used on the civilian population in all NATO countries. Dr. Kilde adds, “Today ANYONE can become a target, even those who invented the system.” [Emphasis in original]
The controlling-elite are not individually picking targeted individuals, so there must be people on the local level, charged with the task of identifying people to target. McKinney has found that Corporate America is another medium for detecting TIs. This is not surprising because many of them run surveillance operations for government agencies.
McKinney declared that in the past 15 years, she has “had occasion to observe many, many, many instances of individuals in the corporate environment being singled out and targeted.” It seems there are people in communities and businesses who identify people to be put under surveillance. This is very similar to what unfolded in East Germany, where workplaces, schools, and hospitals were complicit in surveillance operations and filled with informants.
What are the qualities that local agents are to look for when profiling targets? We may never know for sure. But Annie Earle’s non-profit organization, An Ethical Light, has done some research on those alleging to be targeted. She acknowledged, “There does seem to be a certain profile among the victims we have studied.” She describes them as “generally very highly intelligent people…” She says that the people her organization deals with “represent a wide range [of] every type of profession you can imagine.”
The women who are singled out tend to be independent, intelligent, and confident professionals. “There’s a heavy predominance of those types of woman in the TI community,” affirmed McKinney. Men are in a smaller proportion, and tend to be non-conformists. They usually have a “sense of self-esteem and pride that seems to invite targeting,” she says. Remember, the MfS was a criminal federal police force that deliberately singled out people exactly like this on a massive scale.
Others that have been targeted include:
-
Those who have had a bad breakup with an ex-spouse who has influence
-
Criminals (Targeting known offenders may strengthen the illusion that the program is legitimate)
-
Those who have reported a crime where the perpetrator was a member of an organized crime ring
-
Landowners targeted by government or industry for land seizures
-
Gays, minorities
-
Inventors awaiting a large payoff
-
Mentally disabled
-
Those who have had arguments with neighbors who have connections
-
Those awaiting a large insurance claim
-
Convenient targets of opportunity
-
Those with special talents or abilities
-
Group members who act in unacceptable ways
-
Independent freethinkers who are not part of the herd
-
Those who are perceived as vulnerable or weak
-
Those opposing any element the New World Order
The pattern that is unfolding indicates that many targets are people who tend to be emotionally developed, self-confident, independent, free thinkers, artistic, people who don’t need the approval of others, and those not prone to corruption.
They’re people who don’t need to be part of a group to feel secure – generally people who are not part of the herd. The financial elite throughout history have consistently hated and feared these individuals. There’s one other type of person that the financial elite hate – truth tellers. They absolutely hate them.
This is apparently why whistleblowers are targeted.
Those on the local level, who are given the authority to identify people to be targeted, are evidently a reflection of their military-industrial handlers. The profile of those who are likely responsible for the Hidden Evil, has been established as: greedy, deceitful, psychopathic, and cowardly. Therefore, envy, jealousy, and fear may also play a significant role in the selection of targeted people. On a smaller but similar scale, Mobbing targets are selected for these exact reasons.
The book Mobbing states,
“Envy, jealousy, aspirations, and being challenged are reasons individuals mob.”
They charge,
“[people] might resent someone for performing better, for looking better, for being more liked. They fear others’ competence.”
Eugenics
For some reason, there are considerably more women targeted than men. Why would women be targeted at a much higher percentage than men? This is another question we may never have the answer for. So this is partially speculation. But one possible answer is that the elite have sponsored eugenics projects worldwide for decades. Removing fertile females from a target population is apparently a standard eugenics procedure. Families such as DuPont, Harriman, and Rockefeller have funded projects for population control.
“It was John D. Rockefeller III who was appointed by Richard Nixon as chairman of the newly created Commission on Population Growth and the American Future,” stated Allen. He quotes Rockefeller as saying, “Rather than think of population control as a negative thing, we should see that it can be enriching.” Allen contends, “Curbing population growth is just part of the Rockefeller war on the American family.”
Author Marrs wrote, “The Harrimans… along with the Rockefellers funded more than $11 million to create a eugenics research laboratory at Cold Spring Harbor, New York, as well as eugenics studies at Harvard, Columbia, and Cornell.” And according to author Jim Keith, eugenics programs in Nazi Germany were organized and funded by the Rockefeller Foundation.
The Hidden Evil is probably not employed strictly as a means of population control due to its delayed results and the amount of resources it consumes. However, because it is life-destroying in nature, the financial elite may see the targeting of women as an accent to their existing eugenics programs. Apparently, these eugenics projects are ongoing. Author Marrs declared, “Eugenics work, under more politically correct names, continues right up today.” Keith agreed, writing, “In 1905, in the United States, the Rockefellers and Carnegies constructed the Eugenics Records Office at Cold Springs Harbor, New York, where genetic research… is still being done.”
They’re Monsters
The last reason may be very difficult for some people to accept because it is simple and sadistic. It is this: They are picking people out of communities and violently murdering them because that’s the type of people they are. This mind-set is probably completely alien to most people. Because most of us don’t entertain these thoughts, it’s difficult to imagine how another person could. But, insanity is the reason. Evil is the reason. This will be easier to understand when we explore the Satanic and psychopathic factors in future chapters.
Summary
Genuinely decent people are being systematically targeted by this cabal which, through propaganda and deception, has extended its influence all the way down into the neighborhood level.
If you’re a protestor, whistleblower, or they just don’t like you, you can be labeled a “threat to national security.” Once that occurs, you may have to watch as your children are slowly tortured and murdered with this technology. You will also be Gang Stalked by citizens’ watch groups composed of men, woman, and children.
The military, a member of congress, and the alleged creators of these weapons have publicly said that they will be used on civilians.
Footnotes
* When Congressman Scheur uses the word “we” I tend to believe he’s referring to himself and other members of congress, or himself and the military/police, or both.
** Shockingly, during his investigation of an elite-sponsored pedophile ring with ties to Washington D.C., DeCamp discovered that the children were told that their participation was in aid of “national security.”
McKinney stated that the objective is to,
“force the individual to commit an act of violence, whether suicide or murder, under conditions which can be plausibly denied by the government.”
The antagonistic public Mobbing of a target is apparently intended to provoke an outburst, so they may end up incarcerated or institutionalized.
Moret’s analysis is similar.
She says,
“The purpose is to completely isolate and remove all social support, economic support, and if possible, to drive these targets to suicide.”
“Isolation of the individual from members of his/her immediate family… [is] virtually assured,” proclaimed McKinney, “when highly focused forms of electronic harassment commence.”
Other objectives appear to be to separate a person from friends and family, keep them unemployed, induce homelessness, and reduce the quality of life so much that they suffer a nervous breakdown, end up medicated, or hospitalized.
McKinney added that other “long-term objectives” of these harassment campaigns, appears to be to,
“induce a sense of perverted ‘loyalty’ toward the very agencies engaged in the individual’s harassment…”
Moving to a completely new location will not stop this.
All normal escape mechanisms have been removed in all of the NATO countries. Reportedly, even when hospitalized, targets are still harassed. Referring to the futility of moving to another location, McKinney said “Your protocol follows you wherever you go so it’s a waste of time.” “All of these harassment techniques are recurrent, they’re non-sequential, and they are overlapping,” proclaimed Moret. “And basically it’s forever, they never leave you alone again. You’re even followed out of the country, [so] it happens in other countries.”
Interestingly, if someone under investigation killed himself, most within the sphere of the person’s life would probably think this happened because they had something to hide, not because they were repeatedly injured. Therefore, bogus investigations may also provide a cover for an induced suicide by creating the appearance of a “guilty conscience.” “Suicides might also qualify as ‘staged accidents,’ particularly where ‘plausibly deniable’ government involvement has been surfaced,” wrote McKinney.
Symptoms
Because the group harassment for Mobbing and The Hidden Evil are the same, so are the symptoms. Some of the following symptoms have been taken from the book, Mobbing.
They include:
-
Nervous breakdowns
-
Severe depression
-
Severe panic attacks
-
Heart attacks
-
Other severe illnesses
-
Suicide
-
Violence directed at third parties
-
Going postal
-
Uncontrolled acting out
-
Feeling suicidal and/or homicidal
-
Persistent anxiety
-
Fatalistic outlook on life
-
Frequent or longer sick leave or disability at work
-
Isolation
According to Moret, Munzert, and McKinney, other reported symptoms and situations are:
-
Forced onto medication for anxiety/depression
-
Imprisonment
-
Forced into mental hospitals
-
Homelessness
-
Framings
-
Staged accidents
-
Death
When I worked in Boston for about five hears, each morning I’d pass by homeless people on the corner asking for money.
Usually I’d be thinking to myself,
“Now there’s a perfectly healthy, able person. Why don’t they just get a job? I mean they’re not lazy because they’re up at 7:00AM every day, standing on this corner asking for money, why not be doing something constructive while earning money?”
It had never occurred to me that some of them were probably Blacklisted and repeatedly Mobbed out of the workforce. I never knew such a mechanism existed. Most targets would be homeless if it weren’t for friends or relatives.
So when you see someone holding a sign that reads,
“Will work for food,” know that they may be targeted by The Hidden Evil.
It may be difficult for a person to conclude that they’ve been targeted, and these groups may gradually turn up the intensity of their harassment over a period of time.
This is the equivalent putting someone in a pot of water, and slowly heating it until the water is boiling, i.e. they need medication for anxiety or depression. “Many, many, many thousands, no doubt, are involved [targeted],” declared McKinney. “But I would say the bulk of those are running to their doctors and taking totally unnecessary prescription drugs to cure ailments that in fact don’t exist.”
Earle noted that targeted people “are experiencing extreme traumatic stress.” The targets she said, “are subjected to a level of stress that the average American cannot even imagine. They are constantly bombarded with auditory information, with crises that have been created.” Dr. Munzert declared, “The victims experience extreme, unbelievable things; almost no one can believe their reports.” Once more, the covert psychological torture that targets experience is identical to what East German targets received.
Former Stasi Chief Markus Wolf announced that the “psychological effects” of the Stasi’s harassment campaigns, “were probably more damaging, ultimately, than any physical torture would have been.” The Bulletin of the Atomic Scientists stated on July 1, 1999, that, “For many, the discovery that their best friends or their own family members were betraying them to the Stasi was worse, in its own way, than torture in an internment camp.”
So far we’ve focused on illnesses that arise out of psychological harassment. But in addition to this, targets often experience physical symptoms resulting from Non-lethal attacks. McKinney described that many targets experience, “Rapidly deteriorating health, generally of a digestive nature,” with “severe gastrointestinal disturbances.”
One common DEW symptom is thermal heating which leaves a hot spot on the skull.
“The objective of using microwaves,” says McKinney, “would be to inflict extremes of pain, [and] to cause thermal heating.” “Usually the victims experience pain… [in the] brain, heart, [and] stomach,” says Dr. Munzert.
“It’s a little bit like being heated in the interior of the body.”
“And on the skin” he adds, “victims experience [what feels like] hundreds or thousands of stings or pins.”
If the energy is intense,
“the inner organs begin to vibrate,” he says. Dr. Munzert also states that these attacks are masked because these symptoms and illnesses occur naturally.
This masking effect is compounded by the fact that most people are not aware that these weapons exist or of their capabilities. Some other DEW symptoms include:
Some other DEW symptoms include:
-
Memory loss
-
Dizziness
-
Headaches
-
Extreme fatigue
-
Sleep deprivation and disruption
-
Jolts and jerks to muscles (the equivalent of being shocked)
-
Abdominal pain/nausea
-
Mental confusion/inability to concentrate
-
Stings
-
Burning sensations
-
Heart attacks
-
Strokes
-
Aneurysms
-
Cancer
If you see a mental health professional as a result of this covert violence, you may be misdiagnosed with a mental disorder.
People with mental disorders are stereotypically seen as incompetent and violent, according to a report entitled, Stigma of Mental Illness Still Exists, by the Center for the Advancement of Health. This will probably follow you for the rest of your life.
“Frankly I strongly recommend that you keep your faculties together and avoid going to see physiatrists and psychologists, because the pattern that is evolving is that they are highly complicit in these operations,” advised McKinney. Dr. Munzert agreed, indicating that care must be taken when explaining this to doctors, in order to avoid ending up in the “lunatic asylum.” Reportedly, the harassment even continues inside hospitals and prisons.
According to The Wheeler Clinic’s article, Stigma and Mental Illness, if you have been diagnosed with a mental disorder, you may have to answer to this on job/school applications, or for insurance. The article stated, “Stigma keeps people from getting good jobs and advancing in the workplace. Some employers are reluctant to hire people who have mental illnesses. Thanks to the American with Disabilities Act, such discrimination is illegal.”
“But” they add, “it still happens! Stigma results in prejudice and discrimination. Many individuals try to prevent people who have mental illnesses from living in their neighborhood.” While it may be illegal for them to discriminate against you, good luck proving it. You may also be denied certain licenses as a result. You can always lie, but they may find out and you may be fined or expelled.
If you’re an employed TI, you will probably be Mobbed. You should know that EAPs work for the company and operate on the premise that if there is a problem, it’s with you. If you complain about Mobbing or a similar phenomenon, they may recommend that you seek help from a mental health professional. As concerned as they may seem, they may suggest this so that you can be discredited later if necessary. According to Bruce Ennis, an ACLU attorney who represents people denied of jobs due to mental illness stigma, it’s better to be an ex-convict in the job market than someone with a record of mental illness. It’s like a prison sentence that follows you wherever you go.
Results of the Hidden Evil
Although at this point we have no way of knowing how many people this affects, McKinney estimates that at least many thousands are probably targeted.
“There are persons I have seen being targeted… [who are] completely unaware of what’s happening,” she says. “So those who are complaining of this are… as I’ve said, just the tip of the iceberg. I would say this is probably very, very widespread.”
Eleanor White, who has been targeted for over twenty years, and has documented this program on her website, www.raven1.net, sees this number as conservative. Based on a survey she conducted in 2005, she estimates that the numbers are probably in the millions. Consider that at one point in East Germany, 6 million people came under scrutiny by the MfS, out of a population of about 17 million. That’s over one-third of the population. And mainstream media has told us that the U.S. is poised to recruit double the informants of East Germany.
At this point it is difficult to estimate the amount of misdiagnoses, suicides, miscarriages, deaths by cancer, and murders that this program has caused. But in addition to the known cases previously mentioned, I’ve included some below that occurred under curios circumstances. Over the last ten years there has been an increase in the amount of people “going postal” out in public and in the workplace. It is likely that the Hidden Evil has played a role in this increase. People that have been Mobbed have been known to go postal and kill themselves.
It would be very difficult to legally prove in a court of law that Mobbing and The Hidden Evil contributed to the events below, especially since there are currently no laws preventing this type of harassment. But, we now know that some agencies have carried out mind-control programs and systematic harassment in the past.
The stories that the victims describe are similar and the tactics are consistent with ones employed in covert harassment campaigns, such as complaints of recurrent harassment by multiple people, sabotage, setups, etc. The symptoms such as depression, accidents (other illnesses), and extended sick leave are also present. The symptoms victims experience result in nervous breakdown, violence directed at third parties, suicide, murder, and murder/suicide.
Beginning in 80s there was a wave of postal killings, giving rise to the term, “going postal.” There have been about 24 separate incidents of postal violence since then including murder, suicide, and murder/suicide. Carefully read the evidence in this section. If you examine these events you may see a pattern in these seemingly senseless acts of violence. An identifiable pattern in these cases includes the use of EAPs, nervous breakdowns, followed by sick leave for psychological problems, and eventually suicide and murder.
It may not be a coincidence that these postal offices are fraught with horror stories of people murdering their family and coworkers. According to author Alex Constantine, former members of the intelligence community are often granted positions as postmasters. These offices are said to have been used as labs for behavioral modification, and psychological harassment on unwitting people. They have their own intelligence network within these offices, which target and harass people. This harassment sometimes continues no matter where they move to, or what environment they work in.
An article entitled $5.5 Million Awarded in Sexual Harassment Case, that appeared in the November 6, 1996 issue of Employment Practices Solutions, stated “A jury awarded $5.5 million to the family of a woman who was driven to suicide… by her bosses and underlings at the Postal Service. They accused her co-workers of intentionally botching jobs or missing deadlines to sabotage her career.” Apparently in an attempt to explain the covert violence she was experiencing, one of her actions included, “leaving a suicide note blaming the Postal Service.”
Frequent harassment committed by multiple people, including superiors, coworkers, and subordinates, directed at one person, which results in suicide is Mobbing. Because the existence of The Hidden Evil and Mobbing are not yet widely admitted, this article was mislabeled. There is no existing category that targets of this violence fall into, other than being decent people. Fortunately her family was able to focus on an existing law and win the case. Did she experience public harassment too?
The Guardian ran an article on January 9, 2001 entitled, Suicide of Black Worker Caused by Bullying. It stated that “Mr. Lee left a suicide note addressed to his mother, Unnell, which said: ‘Tell them it was nice playing with me and they won.'” This man’s father wrote an open letter to 1,500 postal workers in Birmingham seeking more evidence about the harassment. “But instead of help, he received threats,” stated the Guardian.
It continued, “Two other workers who claim they were bullied by colleagues are on long term sick leave,” and one woman suffered a “nervous breakdown.” Suicides, nervous breakdowns, and extended sick leave due to repeated harassment by multiple colleagues, all signify Mobbing. This also illustrates the group mind of staying loyal, and covering the system that keeps them employed, no matter how sinister.
Mobbing targets sometimes go on sick leave and are unable to ever return to the workforce. An environment of fear and danger is deliberately created, where nobody knows who the next victim will be. To get an idea of what this environment is like, picture a sinking ship where nobody knows if there will be enough room for them on the lifeboat. The people who oversee these operations are well aware that when people are put in an environment of lingering death, the herd mentality will be activated, and cause a struggle for survival. This brings out the worst in most people. This environment is deliberately created for their sick amusement and control.
According to an article labeled, Report Links Violence, Local Postal Management, which appeared in the December 22, 1998 edition of the Milwaukee Journal Sentinel, the post office may have been responsible for some of these murders. The article then went on to describe how programs specialist at the post office were attributing the killings to “random acts of violence,” and that they were conducting their own version of an 800-page report which would not link the post office to the killings.
In 1999 a postal inspector named Calvin Comfort was assigned to investigate some of these postal killings. While doing so, he suffered a nervous breakdown and had to take a year off. After returning to work he killed himself in the parking lot outside the building. It’s clear to me that this was a message. He essentially told us that they did it.
Covering this story, the Milwaukee Journal Sentinel ran an article on April 2, 1999, entitled, Postal Inspector Kills Self Near Work. The article stated, “A Milwaukee postal inspector who investigated the fatal 1997 shooting spree at the downtown post office took his own life outside the same building… Comfort’s investigation into the shootings seems to have been at least partly responsible for a nervous breakdown he suffered…”
They continued, “Comfort was seen by a therapist available to employees through their employee assistance program [EAP]. A separate report, to which Comfort contributed, deals specifically with the events leading to the shooting and is still unreleased. Inspector Rudy Green, is quoted in the medical examiner’s report as saying Comfort “has been under a lot of stress since… he was the lead investigator in a homicide that occurred at the Milwaukee main post office.” Under a lot of stress? I’m convinced he was violently attacked and murdered to prevent him from uncovering some incriminating evidence. Was he also targeted by the Hidden Evil? In my opinion, yes.
USA Today published an article on January 31, 2006, entitled, Ex-Postal Worker Commits Suicide After 5 Die in Shooting. It stated, “A former postal worker who had been put on medical leave for psychological problems shot five people to death at a huge mail-processing center and then killed herself in what was believed to be the nation’s deadliest workplace shooting ever carried out by a woman.”
The article continued, “The attack Monday night was also the biggest bloodbath at a U.S. postal installation since a massacre 20 years ago helped give rise to the term ‘going postal.'” Adding evidence to the charge that these people already know who they’re going to kill in advance, it ended with, “chances are she might have known her victims.” Of course she did, they were harassing her.
Why would she go back to the post office to carry out these attacks after being on sick leave for two years? It’s apparent to me that she took revenge where she believed her torment originated. My contention is that her psychological problems were the result of mental injury, and that when she left, she was never allowed to heal due to public harassment. They literally kept beating her until she broke.
But the real sick part is that those who have these individuals under surveillance during these harassment campaigns know exactly what they’re planning – and allow it to happen. They cause it. “Psychological harassment and intimidation are carried out by hired specialists,” wrote author Constantine. The “U.S. Postal Service and other federal agencies draw on their services.”
The book Mobbing states, “Some may feel revengeful and direct their rage at the Mobbers. Seeking revenge for their misery, they may ‘go postal.'” Regarding the lack of media coverage they conclude, “There is rarely a report that identifies the deeper background of these tragedies.” McKinney arrived at a similar conclusion, and described a refusal of the mass media to address this topic.
These are just examples, and this phenomenon occurs in many institutions. If there was an actual unbiased investigation of suicides and murders caused by this program, the post office may not necessarily lead other institutions. The U.S. postal service has conducted its own $4 million dollar study to disprove the myth that postal workers are more prone to violence than other workers. One of their goals was to hopefully remove the phrase, “going postal” from the language of mayhem. Apparently their study concluded favorably that postal workers are no more likely to “go postal” than other types of workers.
Summary
The objectives of the program are apparently to destroy a person from the inside out, cause them a nervous breakdown, facilitate their hospitalization or imprisonment, and force them to commit murder or suicide. These objectives may be accomplished by the removal of economic and social support structures, combined with repeated public and electronic attacks. Those on the receiving end of public harassment may experience trauma as a result of repeated injury.
Electronic harassment may additionally cause a variety of problems, up to and including heart attacks, strokes, cancer, and aneurysms. Targets may be misdiagnosed, labeled mentally ill, or be persuaded to take medication for an illness that does not originate from within.