Friday, March 31, 2017

Counter Intelligence Against Political Dissidents

For some previous articles on this topic, see here. Also, see this post for some counter-intelligence techniques. To learn about the technology they use, see here and here. See here for how to discredit someone with Hi-Technology.
=============================================================================

FBI Director J. Edgar Hoover issued directives on COINTELPRO, ordering FBI agents to “expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate” the activities of these movements and especially their leaders. Under Hoover, the agent in charge of COINTELPRO was William C. Sullivan.

Their tactics against the very people whose tax contributions pay their salary included anonymous phone calls, IRS audits, and the creation of documents that would divide their target’s families.

Targeted Individuals are harassed for months or years before they realize that they are being targeted by an organized Life-Torture Program.

Many innocent people are targeted for these harassment programs.  Their friends, family, and the community at large, through massive media control, are used to monitor, prosecute, and harass them. In the former Jewish controlled USSR these programs accused innocent people of being an  “enemy of the state,” or “mentally unfit,” and many were institutionalized or murdered using this form of governmental systematic control.

According to attorney Brian Glick in his book War at Home, the FBI used four main methods during COINTELPRO:

(1) Infiltration: Agents and informers did not merely spy on selected targets. Their main purpose was to discredit and disrupt. Their very presence served to undermine trust and scare off potential supporters of the target through lies and false accusations. The FBI and police exploited this fear to smear genuinely good people as agents, accusing their victims of doing what the FBI itself was doing;

(2) Psychological warfare: The FBI and police used myriad “dirty tricks” to undermine people who they opposed. They planted false media stories and published bogus leaflets and other publications in the name of targeted groups. They forged correspondence, sent anonymous letters, and made anonymous telephone calls. They spread misinformation about meetings and events, set up pseudo movement groups run by government agents, and manipulated or strong-armed parents, employers, landlords, school officials and others to cause trouble for activists. They used bad-jacketing to create suspicion about targets, sometimes with lethal consequences;  They sent people to marry into and befriend the families of their perceived enemies, also usually with lethal consequences.

(3) Harassment via the legal system: The FBI and police abused the legal system to harass regular people and make them appear to be criminals. Officers of the law gave perjured testimony and presented fabricated evidence as a pretext for false arrests and wrongful imprisonment. They discriminatorily enforced tax laws and other government regulations and used conspicuous surveillance, “investigative” interviews, and grand jury subpoenas in an effort to intimidate activists and silence their supporters;

(4) Illegal force: The FBI conspired with local police departments to threaten dissidents; to conduct illegal break-ins in order to search dissident homes; and to commit vandalism, assaults, beatings and assassinations. The object was to frighten or eliminate dissidents and disrupt their movements.

The Final Report of the Select Frank Church Committee blasted with the behavior of the intelligence community in its domestic operations (including COINTELPRO) in no uncertain terms:

“The Committee finds that the domestic activities of the intelligence community at times violated specific statutory prohibitions and infringed the constitutional rights of American citizens. The legal questions involved in intelligence programs were often not considered. On other occasions, they were intentionally disregarded in the belief that because the programs served the “national security” the law did not apply. While intelligence officers on occasion failed to disclose to their superiors programs which were illegal or of questionable legality, the Committee finds that the most serious breaches of duty were those of senior officials, who were responsible for controlling intelligence activities and generally failed to assure compliance with the law. Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that – the Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence.”

In counter-intelligence organized-stalking programs, civilian spies are recruited from every segment of society, and everyone in the “targets” life is made a part of this ongoing, continuous, and systematic form of control and harassment, with such actions that are specifically designed to control the target and to “keep them in line,” like a Pavlovian Dog.

Despite the fact that these actions are designed to mentally, physically, emotionally, spiritually, financially, socially, and psychologically destroy the target over years, to make them appear to be crazy, and leave them with no form of support, whatsoever, in actual practice something very different happens.

I’ve observed that these malicious operatives end up becoming mentally, physically, emotionally, spiritually, financially, socially, and psychologically destroyed themselves over the years,  while their targets, such as myself, manage to adapt their lives in very creative ways.  Those who end up appearing to be crazy, and with no form of support, whatsoever, are the ones doing the torturing.

For the state, this appears to be a way to keep their targets in line, control them, or ultimately destroy them.  Instead, we’ll be seeing the state itself destroyed along with every person who depends on it for cash and status even while they work to destroy the very source of that cash and status, the productive tax-payers whose dependence on their pirate system diminishes as a result of the harassment.

This systematic form of control is funded at every level of government, every agency is involved in it.  All of them. Targets can be chosen for many reasons, but mainly they are targeted for political reasons.  People who don’t cooperate with the rape and pillage of our nation will find themselves labeled as:

(1) whistle-blowers;
(2) political dissident;
(3) one who asserts rights at work;
(4) one who has personally displeased members of the elites in our society;
(5) one who is too outspoken;
(6) one who is an investigator ;
(7) a signer of a petition;
(8) a writer of letters;
(9) one who is reported as  “suspicious” by a civilian spy/snitch; or
(10) one who is a religious/ethnic/racial minority, which means being Catholic, which to the  Pirate State makes us an enemy.

The goal of the state-sanctioned intelligence agency organized-stalking and domestic torture program is to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalized, or forced suicide. Other goals of this harassment are to destroy the target's reputation and credibility, and to make the target look “crazy” or unstable.

The process often involves sensitizing the target to every day negative and even horrific “stimuli” as a form of control, which is used to control targets when they “get out of line.”  Targets of this relentless and merciless harassment become vulnerable and destitute, and often become homeless, jobless, have a breakdown, are driven to suicide, similar to targets of the banned COINTELPRO. The government eliminates perceived “enemies of the state” in this manner.

Every time the target moves, the same defamation, lies, libel, and slander will be spread, and the systematic harassment will continue. Online defamation, libel, and slander on the internet has made this continuation of counterintelligence organized-stalking a great deal easier.

People from all segments of society can be recruited to be the “eyes and ears” of the state, such as laborers, drug dealers, drug users, street people, prostitutes, punks, church groups, youth groups, your best friend, your lawyer, local policeman, doctor, emergency services, a neighbor, family, social workers, politicians, judges, dentists, vet, supermarket cashier, postman, religious leader, care worker, landlord, anyone.

Most of these recruited civilian spies/snitches do not understand or even care that the end consequence of this harassment protocol is to eventually destroy the targeted person, and function as “useful idiots” of the state-sanctioned COPS gang-stalking program.

It has been reported that people and family members participate in this organized stalking because it:

(1) gives them a sense of power;
(2) is a way to make friends;
(3) is something social and fun;
(4) breaks down race/gender/age/social barriers;
(5) is forced or blackmailed upon them by the State or police to take part;
(6) is told to them that they are part of “homeland or national security” to help keep an eye on “dangerous” or “emotionally disturbed” individuals where they are “heroic spies for the state;”
(7) is used on local thugs or informants who are already being used for other activities where their energies are diverted into these gangstalking community spy programs;
(8) is either a choice of spying for the State or police, or else go to jail;
(9) involves outright lies and slander about the target to get them to go along with ruining the targets life;
(10) includes average citizens recruited by the state the same way citizens were recruited in the former East Germany and other countries.

Some techniques used against targets in this organized stalking program include:

(1) classic conditioning where a target is sensitized to everyday stimuli over a period of months and years to harass them in public to let them know they are constantly being harassed and monitored;

(2) 24/7 Surveillance following the target everywhere they go, learning about the target and where they shop, work, play, who their friends and family are, getting close to the target, moving into the community or apartment where they live, across the street, monitoring the targets phone, house, and computer activity; I’ve known them to marry family members.

(3) isolating the target via defamation, libel, and slander campaigns, (eg, people in the target’s community are told that the target is a thief, into drugs, a prostitute, pedophile, crazy, in trouble for something, needs to be watched, false files will even be produced on the target, shown to neighbors, family, store keepers);

(4) constant or intermittent noise and mimicking campaigns disrupting the target's life and sleep with loud power tools, construction, stereos, doors slamming, etc;

(5) talking in public about private things in the target’s life;

(6) mimicking actions of the target and basically letting the target know that they are in the target’s life;

(7) daily interferences, not too overt to the untrained eye, but psychologically degrading and damaging to the target over time;

(8) everyday life breaks and street theater such as flat tires, sleep deprivation, drugging food, putting dirt on targets property;

(9) mass strangers doing things in public to annoy targets such as getting called/text messages to be at a specific time and place to perform a specific action;

(10) blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit a response from the target;

(11) “baiting” tactics where a surveillance operation can selectively capture evidence of a targeted person responding to harassment, and then that evidence could then be used to justify the initiation of more formal scrutiny by a government agency.

The Gang-Stalking Program, as all other state sanctioned/approved gang-stalking programs, have always been funded by the Government. They are the only ones with enough money, coordination, and power to keep such a system in place. These coordinated efforts then join hands with others for this systemic form of control and harassment.

Such operations have nothing to do with the target’s criminality – they are led and perpetrated by federal agents and intelligence/security contractors, often with the support of state and local law enforcement personnel.

Unofficial operations of this type are often private investigators and vigilantes – including many former agents and police officers, sometimes on behalf of corporate clients and others with connections to the public and private elements of America’s security industry.

The goal of such operations is “disruption” of the life of an individual deemed to be an enemy (or potential enemy) of clients or members of the security state. Arguably, the most accurate term for this form of harassment would be “counterintelligence stalking.” I would call it simply “Torture."

Agents of communist East Germany’s Stasi (state police) referred to this process as Zersetzung (German for “decomposition” or “corrosion” – a reference to the severe psychological, social, and financial effects upon the victim). Victims have described the process as “no-touch torture” – a phrase which also captures the nature of the crime: cowardly, unethical (and often illegal), but difficult to prove legally, because it generates minimal forensic evidence.

Tactics include online and personal slander, libel, defamation, blacklisting, “mobbing” (intense, organized harassment in public), “black bag jobs” (residential break-ins), abusive phone calls, computer hacking, framing, threats, blackmail, vandalism, “street theater” (staged physical and verbal interactions with the minions of the people who orchestrate the stalking), harassment by noises, and other forms of bullying.

Such stalking is sanctioned (and in some cases, orchestrated) by federal agencies; however such stalking is also sometimes used unofficially for personal and corporate vendettas by current and former corrupt employees of law enforcement and intelligence agencies, private investigators, and their clients.

As was stated above, organized stalking methods were used extensively by communist East Germany’s Stasi (state police) as a means of maintaining political control over its citizens. Although this is supposedly illegal in the US, the same covert tactics are quietly used by America’s local and federal law enforcement, and intelligence agencies, to suppress political and domestic dissent, silence whistle-blowers, and get revenge against persons who have angered someone with connections to the public and private agencies involved.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.