Showing posts with label Zersetzung. Show all posts
Showing posts with label Zersetzung. Show all posts

Sunday, December 18, 2016

Some Tips For People Being Stalked And Harassed By Intelligence Agencies

Besides the videos below: See classified technology ---- learn intelligence tactics ---learn how they discredit someone with hi-technology. All of these are Zersetzung tactics from the Stasi in East Germany, make sure to look at Zersetzung under the "learn intelligence tactics" link above. Also, see here to learn about Gaslighting and how it is utilized by intelligence agencies. See here for Gaslighting Part 2, what intelligence and informant stalkers participate in. See here for more about anchoring techniques used by stalking agents. See here to learn the psychology of torture and abuse. See here for more about torture and trauma bonding. See here for a free downloadable book about Stasi and Counter Intelligence tactics. 

See here for how the FBI memo labels patriots, truth-seekers as potential 'terrorists.' See here for the 72 types of Americans that are considered “potential terrorists” in official government documents. 

Once they find you, they have you under surveillance all of the time, it is called Remote Neural Monitoring. Once you see the connections between organized crime and drugs, banks, the media, corporate conglomerates, intelligence agencies and the police, you'll see what is really happening in our countries.

Organized Stalking Survival--Part 1


Organized Stalking Survival--Part 2


Organized Stalking Survival--Part 3


Organized Stalking Survival-Part 3.5


Organized Stalking Survival-Part 4


Organized Stalking Survival--Part5/final

Sunday, November 20, 2016

The East German Stasi Secret Police and Zersetzung

For previous articles about the East German Stasi and Zersetzung please see here and here. See here for more about the technology they use when they find you, and here for the techniques they use.


East German Opposition and Activism




The Stasi (Ministerium für Staatssicherheit) was the East German secret police, and that country had the highest proportion of informants and secret police in history: 1 in 60 people were involved by 1989.

The Stasi and Zersetzung

After the East German popular uprising of June 1953 (suppressed by Soviet troops) the government gave the Stasi the task of systematic surveillance and prevention of unrest in the population. Initially, this took the form of brutal physical repression: imprisonment and physical abuse (including torture) by police and secret police.

But this changed during the 1970s when the GDR became more interested in gaining a positive international image, and the repression of activists became more subtle. The Stasi redefined the military term Zersetzung (attrition or corrosion) to name their harassment tactics: the aim was to disrupt the working of groups and the lives of individuals to such a degree that their activism became ineffective, or more preferably, ceased altogether.

The aim of the Zersetzung was to ‘switch off’ the group by rendering it ineffective, with an interim goal of hindering any positive media or public exposure. The usual ways to switch groups off were to: create conflict between members – particularly useful subjects for sowing discord were those of a philosophical or political nature, money,and personal (sexual) relations; hinder and sabotage activities by one or more infiltrators, who would agree to do tasks, but not get round to doing them, lose materials and equipment, repeatedly request changes and further edits of materials to slow down production, attempt to divert the group into more harmless activities etc; isolate the groups from other activists, eg by spreading rumors regarding unacceptable behavior and political views etc.

The choice of tactics was based on psychological profiling and intelligence about the group members, particularly: who plays what role, who fulfills what kind of task; what are relationships within the group like, who hangs out with whom.

Informants (IM: Inoffizielle Mitarbeiter) were the usual way to gain information on a group and were also used to implement the plans to incapacitate a group and sabotage its activities. In activist circles, the informants were almost never Stasi or police officers but were usually existing members of the groups who had been pressured, persuaded, bribed or blackmailed into helping the Stasi; or a suitable outsider who would try to infiltrate and become trusted by the group.

How did the Stasi persuade people to become informants?

1.) Appeals to patriotism
2.) Bribery, or Cash or material reward
3.) Blackmail
4.) Offers of immunity from threatened prosecution
5.) Making the mission sound like an exciting adventure

As in the case of groups, the Zersetzung of individuals had the aim of ‘switching off’ that person’s efficacy by undermining their confidence and their belief in the value of their activities. The Stasi did not usually care whether an individual was switched off through disillusionment, fear, burn-out or mental illness: all outcomes were acceptable, and people’s mental health and social standing during or after an operation were of no interest to the officers involved.

The Zersetzung of individuals was usually carried out by systematically undermining the target’s quality of life (both socially and in the workplace,) with the intention of simply destroying the target’s confidence. The tactics used took various forms, such as spreading slanderous rumors, causing trouble at work etc.

The first stage of Zersetzung was an evaluation of all state held data and information, eg medical records, school reports, police records, intelligence reports, searches of target’s residence. At this point they were looking for any weak points (social, emotional or physical) that could be used as a way to put pressure on the target, eg extra-marital affairs, criminal records, alcoholism, drug use, differences between the target and their group (eg age, class, clothing styles) that could be used to socially isolate them.

After this, a Zersetzung strategy was drawn up: What was the specific aim? What tactics should be used to exploit the target’s personal situation and character traits? What was the timescale?

The next stage was often to supplement covert surveillance with overt observation in order to communicate to the target that they were of interest to the Stasi and to create a sense of insecurity and paranoia. Tactics included stalking and following with sensitizing tactics, friends or strangers dropping hints or repeating information to you about something you might have done in your house the day before to let you know you are under surveillance, gaslighting, prank phone calls and strange noises on telephone lines.

The final stages entailed psychological and physical harassment: moving things around at one's home, break-ins  with nothing being stolen, break-ins with nothing but leaving food or milk out on the counter, (one morning the alarm clock goes off at 5am instead of 7am, and the socks are in the wrong drawer, there’s no coffee left…); damage to bikes and vehicles (eg slashing tires); the spreading of rumours as mentioned above; ordering goods in subject’s name etc.

Families were often used as leverage against activists at this stage – either with bribery, material gain or career advancement, or using methods of blackmail (family members were sometimes subject to oppression as a way of putting indirect pressure on the activist), or persuasion (“your daughter will land in deep trouble if she remains involved in that group, can’t you make her see sense? It’s her career at stake…”). Physical harassment often included repeated threats, physical attacks on the street, or abuse and assault could be incited by the rumors that had been spread (eg bullying at work, avoidance by neighbors).

How effective was the Stasi?

The militarily organized Stasi simply couldn’t understand how many activist groups functioned without leaders and hierarchies. They often mistook informal hierarchies (caused for example by differences in empowerment levels or dominant behavior patterns) to be real hierarchies – they would target political activists who they thought were leaders or knew information that they didn't want others to know about, and didn’t realise that even if some of these individuals were ‘switched off’, the rest of the group could still manage to function and wouldn’t necessarily fall apart.

The dedication of individuals and groups was also often underestimated – even if an informant successfully sabotaged an individual or a group’s activities, they rarely were completely disheartened, but would try all the harder to achieve their goals.

The tactics of Zersetzung had a significant control function ... if you were engaged in (or merely suspected of) activities that the Stasi didn’t like then repression was a way to punish you.

The human cost of Zersetzung is hard to quantify – many GDR activists are still suffering from burnout, trauma, and chronic mental health issues as a result of being targeted: on a personal level, the Stasi could be frighteningly effective.

2) Gathering and using intelligence

Informants weren’t just used to sabotage group activities and implement Zersetzung plans, but also to gain intelligence on individuals and groups (around 160km worth of Stasi archives survived the end of the GDR). Most intelligence was used to evaluate relationships and activities (which then led to an extension of intelligence gathering to previously untargeted individuals and groups,) and as a basis for planning Zersetzung operations. Obviously, plans for actions and activities were also reported, but these were acted upon only in rare and serious cases – if intelligence were used to disrupt the activities in any obvious way then suspicion would be drawn to the informant.

Intelligence from surveillance and the use of informants was rarely used to actually gain evidence for a prosecution – the Stasi desperately needed the huge amount of information it was processing in order to justify its own existence (along with the salaries and expenses of its officers and staff). If anything, this made the Stasi more dangerous to activists – the Stasi’s dependency on gathering intelligence and mounting operations made the surveillance, Zersetzung, and sabotage more likely to happen, along with the associated human cost.

Informants were regularly found out – mostly because of poor preparation and chance (eg groups who came across evidence that an informant was passing information to the Stasi). But it is significant that most informants were only discovered after 1989 when the Stasi files were opened.

Dealing with Zersetzung

Many people succumbed to pressure from the Stasi and other security forces, often because of mental health difficulties (brought about by the pressure) or through a process that was commonly called ‘inner migration’: giving up political and social beliefs, following the path of least resistance and ceasing oppositional activity.

On the other hand, resistance to Zersetzung was remarkably commonplace, and activists found ways to remain both healthy and active. When East German activists talk today about how they managed to continue their activism, the same points come up again and again, these are summarized below.

Support from friends and other activists was essential – a circle of close friends who shared an understanding of the political and policing situation was probably the most effective way to counter the Stasi.

With such friends, activists could talk openly about fears, suspicions, and needs – they could work out ways to deal with the pressure. They spent time with these friends doing non-activism related activities which helped to build trust in the group. This helped them to know that if things got bad for them, they could both trust their friends and be trusted by them; they would be there if help and support were in need. As a group, they would make plans for possible situations – for example, who would take care of the children in case of arrest or even imprisonment, or who could provide a ‘safe house’ if somebody was being shadowed and needed a break.

On a wider level, the solidarity between groups was an important factor in their survival and freedom to remain active: those groups that had strong relationships with others around the country were generally subject to less repression. In later years, particularly in East Berlin, even when repression happened, widespread solidarity actions and concerted efforts to gain publicity led to quick results (arrested or imprisoned individuals released, the work of the group allowed to resume etc). On the other hand, those groups that weren’t so well networked (usually those in small towns and rural areas where they might be the only active group) were easy pickings for the Stasi – at times whole regions of the country were ‘cleansed’ of grassroots activism.

Groups openly discussed the possibility of surveillance and intervention. The groups would aim to work out what oppression measures they might be subject to (currently and in future,) and think of ways they could deal with them. The hard bit was not to get lost in paranoia (particularly since there was a good chance that the group already had an informant present,) nor to be naïve or ignorant about the possibilities, but to find a middle ground of sensible measures that would, if needed, help, while not bogging the group down in extensive security measures that would just hinder the work of the group.

Part of working out the level of threat from the Stasi, and how to deal with it, was to consider the way the group worked, and how open the group was to newcomers. It is tempting to think that preparing and carrying out actions in the utmost secrecy would be the best defence against an opponent like the Stasi, but of the groups we know about which worked covertly in the GDR, all were subject to brutal Zersetzung measures, while those that worked openly were often subject ‘only’ to surveillance and sabotage by informants, but could nevertheless carry on their activities to a greater or lesser extent.

When open groups were subject to extraordinary repression levels, they were in a good position to mobilize support from other groups and interests. (It’s difficult to draw conclusions though – generally only those from open groups are willing to speak of their experiences, and any covert group that might have survived would be, by definition, hard to find out about.) Working openly also did not preclude the need to work secretly at times, particularly when planning an action or dealing with sensitive issues, and steps would be taken to avoid surveillance.

If a group identified an individual as a possible informant they might have decided not to take any obvious initial action. The immediate reaction would be to assess whether there might be any merit in the suspicions rather than to spread any rumors. The usual way of dealing with the situation would be for a few trusted individuals to discreetly research the suspect. Backgrounds would be checked (are there any family members? Do they exist? Has anyone else from the group spoken to them? What about friendships outside the group? Did the suspect actually work where they said they did? Are they familiar with the town they say they grew up in? etc) This worked well enough for informants who had been provided with a cover story and infiltrated into the group by the Stasi, but couldn’t provide clear results if the informant was a ‘real’ person who had been turned.

By making notes of behavior patterns and movements of a suspect, the group might think they were finding evidence of Stasi involvement. One certain way was to discover reports or connections to handling officers, this would be a clear sign.

Conclusion

It is easy to get lost in analyzing the techniques the Stasi used, and the more you look into it, the more frightening it gets. But it’s worth mentioning that, in our assessment, the grassroots opposition movements made the biggest contribution to the revolution that started in East Germany in autumn 1989 – despite the horrifying levels of repression and surveillance that they had faced for decades. Quite simply, the Stasi failed to predict the events of that year, and once things had started their Zersetzung tactics became ineffective.

Wednesday, September 7, 2016

Gaslighting - What Intelligence and Informant Stalkers Participate In

For previous posts on the topic of Gaslighting see here and here. For more about the Stasi methodologies that are used named Zersetzung, see here, here and here.

Wednesday, May 11, 2016

A Perfect Example of a Counterintelligence Website

Special introductory note: The website that I talk about below has been taken down. After I started drawing attention to it as a Zionist counter-intelligence website. Here is a Wayback Machine link to see what it looks like.
--------------------------------------------------------------------------------------------------------------------------

This website www.radicalpress.com is a perfect example of what a COINTELPRO website is. It is also in Canada. These websites are connected to the intelligence agencies and the ADL. Most of them are located in the 5 eyes countries



As I wrote here, the RCMP and the FBI work with the intelligence agencies and the ADL. See here for the corruption of the RCMP and how it is working with organized crime. See here for more about Homeland Security and the alternative media. See here for more about Homeland Security, organized stalking, and militant Zionism. See here for more about the origins of Homeland Security. 


See here for how the 
FBI Memo Labels Patriots, Truth-Seekers as Potential 'Terrorists.' See here for the 72 Types of Americans that are considered “potential terrorists” in official government documents.  See here for the tactics they use and here for the technology that they use once they find you. Specifically this post

It is important that you learn the tactics of slander and Zersetzung, which were tactics developed by the East German Stasi. See this post about how one of the favorite techniques of the Stasi was to label someone a pedophile. 

See here for articles about how you can use a computer program to control someone else’s face. They also have the technology to record someone's voice, (they only need a few seconds,) and put it into a complete video. You can see what is said here and here about what is happening.

Intelligence agencies, under the new Homeland Security laws that passed September 11, 2001 --- are isolating political dissidents and stalking, harassing and slandering them. They are using technology that can read the targeted individual's thoughts, influence their behavior and injure them. You can see these videos about how they are using divide and conquer techniques and selective editing of media that they are recording. See here for how they can discredit someone with Hi-technology.




Sunday, February 14, 2016

Zersetzung Part 3 - The New Homeland Security

I have written previously about the Stasi and Homeland Security. Along with reading this article about Zersetzung, I highly recommend reading the first and second article in this series.

Also, download this free Stasi tactics bookIt is interesting to note that the idea for the Stasi came from the Bolsheviks and the Cheka

It absolutely must be mentioned that Jews played a leading role in the development of Bolshevism and the Cheka. (To learn more about this, see herehereherehere and here.) They have also played a major role in the development of the new Homeland Security laws. Also, see this post about classified technology that allows them to stalk, harass and torture you remotely. 

========================================================================

Zersetzung Part 3

Informants have apparently been used to frame targets for crimes or to participate in staged events which foster character assassination. A person may not be aware of some of these set-ups.  First, see this article about front groups and how they are established near a target to help with slander, character assassination, organized stalking and intelligence gathering. Then, see these articles about slander and covert torture techniques using classified technology.

Some staged events may include people provoking targets into confrontations.  Recurrent confrontations by family members, friends or unusually hostile strangers, can be common. Seemingly homeless people who are well-dressed and very clean will get into confrontations with targets... and create big public scenes.

As an example, let's say a woman target spoke with a man who had often made stomping and banging noises in the apartment above her. After she spoke with him about this, which occurred even during his absence, he immediately complains to the building manager that she was stalking him. He conveniently forgets to inform the building manager that he had assiduously 'courted' this individual for several months, without success; and that he had been following her around on a regular basis, bumping into her at different locations in a seemingly random way, but, way to often to be random.

Presumably, these setups and staged confrontations are done to get targeted people into the penal or mental health system. At the very least they can aid with recruitment. See here and here about recruiting. Also, photos, or video footage taken of an enraged target after they have been antagonized and set-up, may also assist with a smear campaign when leveraging support of the community to facilitate the removal of the target. Multiple complaints filed independently which entail the same report may also achieve this.

Local police participate in stalking and have framed people for crimes. See here for more.

Similarly, during the former Cointelpro, there were routine set-ups, and fabricating of evidence used to destroy a person's character or have them imprisoned. But this obviously hasn't stopped. According to the December 7th 2003 issue of the Sunday Herald, the FBI is on record using multiple informants to frame innocent people for crimes by having informants commit perjury. This can be done legally in the interest of "national security." The article sited a 141-page report by the House Committee on Government Reform, which stated that the FBI rigged evidence, and used informants to provide "false testimony," so that innocent people would be imprisoned. Oddly enough, some of these informants were murderers!

"Well over 20 murders were committed by FBI informants," the report revealed, and to protect them federal law enforcement "actively worked to prevent homicide cases [from] being resolved." The committee also concluded that "officials in FBI Director J Edgar Hoover's office were well aware that federal informants were committing murders." The article continued quoting Judge Nancy Gertner saying, "It is hard to conceive of accusations that shake the legal system closer to its foundation that would do more to challenge this nation's most basic assumptions of honesty, fairness, and trust in the administration of justice." She added, "All in the name of 'national security.'"

In his book, The Franklin Cover-up, former Senator John Decamp wrote, "In case after notorious case entirely unrelated to Franklin, Justice Department [DOJ] personnel appear as liars, perverts, frame-up artists, and even - assassins." Apparently Senator DeCamp experienced significant turbulence while investigating a child sex ring which included prominent individuals in Washington D.C. According to DeCamp, the elite used the FBI to orchestrate the cover-up.

 Friends and Family

If you're targeted, friends and family may be recruited to break you down. They may participate in harassment skits intended to make you look incompetent, inconsistent, hypocritical, and to mock and demoralize you.

New friends, may be used in an attempt to do the same.  These 'friends' pose as confidants and abruptly end these 'friendships' under deliberately degrading and humiliating circumstances. When taken in the context of the ongoing surveillances and harassment, these exercises appear intended to heighten emotional trauma, perhaps to provoke an uncontrolled response and/or to enforce isolation.

If you're targeted and live with someone who has been co-opted, perhaps a friend or family member, they will probably be forced to carry out some of these harassment tactics. At home they may frequently repeat your thoughts back to you and talk about something similar to what you are doing to let you know that you are under surveillance, make noise and just be generally annoying.

Traps may be set, such as items frequently falling out of freezers or cabinets as you open them. Phone conversations which occur while you're present will be loud and contain information about your personal life. Out in public, these friends or family members may be forced by their handlers to guide you through and participate in Street Theatre, where they will interact with other citizen informants to harass you. These skits will be intended to make you feel foolish, incompetent, or inconsistent.


Thefts and Break-ins

When break-ins occur there is usually no sign of forced entry, and they occur when the target is sleeping or elsewhere. This is the case even if there is a Hi-Tech security system in place. In virtually all such cases investigated, the burglars leave evidence of their visits, such as by relocating objects, or by committing petty and not-so-petty acts of vandalism. You have to understand that the people that are engaged in doing this have access to technology that surpasses anything that most people know of.

This happens at the home as well as the workplace if the target is fortunate enough to be employed. Targets have reported clothing being ripped, milk, coffee and other items poured out, and small-scale damage. Items may be stolen and brought back at a later date, and they may move items and place them in a slightly different spot. These are essentially Gaslighting tactics.

Victor Santoro claims that these subtle memory games can be used to drive people insane. Small things such as pens, shoes, and silverware are taken or tampered with so people will seem delusional if they file a police report. Burglarizing your home is very, very common, a lot of times they'll leave evidence of their visits, just little small changes in the target's home which is noticeable. Executive Order No. 12333 states that these break-ins can be done legally.

Interestingly enough, surreptitious break-ins, thefts, and sabotage were a staple part of the old Cointelpro. Other tactics Santoro advocates include filling a target's gas tank, or substituting items of his clothing with ones a size smaller. If you're unaware that you're targeted, as most people are, then these small changes may be attributed to a lapse in your memory. If these tactics are used in combination with others, then as Santoro illustrates, you may think you're going insane.

Gunderson also spoke of Gaslighting tactics, which he described as "psychological warfare." In his personal experience with what is presumably state-sponsored harassment, he has noticed bits of furniture and other items being moved around during surreptitious break-ins. He states they are, "so arrogant that they almost always leave subliminal messages of their... entry." The logic is that a thief would never break into your home and leave a computer or stereo and just steal a toothbrush, or pour out a portion of your milk.

In his book, Subliminal Mind Control, John J. Williams wrote, "If you are being subjected to a secret and involuntary subliminal experience it is a malevolent, sinister and often dangerous attack against you that you have every right to vigorously oppose and thwart as if you are a POW or someone has broken into your home to rob you of what is rightfully yours." He warns, "In fact they have broken into your mind, and are trying to rob you of your free will. Even in cases where there is actually an intended positive outcome."

Sabotage, Vandalism and Staged Events


Targets may regularly experience acts of vandalism. Electronic equipment may frequently be failing. People have reported having electrical systems in their cars, brand new appliances, TVs, radios, PCs, and other electronic equipment suddenly die, or act strangely.

Targets may experience frequent computer trouble such as failing hardware. Ongoing computer problems which do not follow any logical pattern may also occur. Some of this can be attributed to the E-bomb which can destroy electrical equipment while not damaging humans.

Many times this vandalism is usually just below what you'd report to the police. For instance, a small but noticeable portion of your masonry has been chipped off, and a crack has appeared in one of your windows. This may be restricted to minor vandalism, just to let you know that you're under surveillance. However large-scale property damage is also done to homes and vehicles, such as slashed tires, broken windows, tampering with break lines, and destruction of electrical equipment.

Some targets have report that their pets die or are being tortured as a retaliation for a target taking action to expose them. See herehere, here, here and here for more information regarding electronic warfare.

Automobiles are one of the biggest targets, they slash tires, they smash the windows, drain the oil out of the cars, fool with the electronic components and batteries.

Vehicles invite peculiarly ferocious attacks in these harassment campaigns-slashed tires, smashed windows, oil drainage, oil contamination, destruction of electronic components and batteries... grounded fuel gages and suddenly failed brakes and clutches occur. Recurrent break-ins and auto thefts have also been reported. Some targets will also experience staged accidents and insurance scams.

Multiple seemingly independent vehicles can be used to facilitate an accident which can appear to have been caused by a targeted person. Add to this, multiple independent witnesses (informants) and you have a recipe for murder or a framing. In fact, "accidental" deaths have reportedly occurred. Once more, the Stasi would do similar things. "Car brake-leads have been cut, accidents and deaths reverse-engineered," noted Funder.

Traveling

When targets drive, they may be surrounded by vehicles driven by citizen informants who frequently cut them off and tailgate them. Targets will experience more tailgating and cut-offs than what would naturally occur. Vehicles will frequently pull out past stops signs as the TI approaches an intersection. This is apparently done to startle them.

While traveling on the highway there will be a rotation of vehicles that surround targets. These vehicles may be marked with an identifying feature, or a color that they've been sensitized to. This seems to function as both an NLP tactic to trigger negative emotions which have been anchored to the feature, as well as a method to unite the group and promote group cohesiveness. In other words, it is similar to a uniform, or a squad car.

There will also be a rotation of people tailgating targets. These vehicles may cut them off after they've been tailing them for a while. Apparently this is done to imply that they weren't going fast enough. When done in a recurrent manner by multiple vehicles, this antagonizing behavior may also serve to encourage the target to accelerate, which may result in them getting pulled over. This may be especially effective if they're not aware that they're targeted.

City and state vehicles which may stalk targets in public, include: off-duty metro buses, school buses, local restaurant delivery vehicles, city and construction vehicles, fire trucks and ambulances, police cars, postal and UPS vehicles, taxis, and 18 wheelers. Helicopters and small planes have also reportedly been used to stalk people. As will be revealed in the Informants section, many of these are vehicles belonging to organizations which have been selected for recruitment into the citizen informant programs.

Convoys of vehicles which are all spaced the same distance and traveling at the same speed will participate in stalking. Within this convoy, there may be several vehicles exhibiting traits that a target has been sensitized to with NLP. These traits are thereby symbolic of a uniform. For instance, most or all of them will be a shade of red. Or most of them will have their lights on, even during the daytime. Or they may have the same bumper stickers. During the evening targets may experience frequent Brighting while driving or walking.

 Brighting

Vehicular Brighting is an attack. It seems to be strategically used with corners. For instance, if you're targeted and you're walking down a quiet street late at night, you'll see vehicles repeatedly turn onto or off of connecting streets. Their timing is such that they continually turn the corners while you are at it. This effectively blinds you. This happens frequently at corners. Or, as you walk down a side street, there is one or more cars parked on the side, facing your direction with the lights on. They will also wait for you to approach them and then pull out into the street, thereby Brighting you as you walk by.

These Brighting tactics are maximized when a vehicle has one headlight grossly misaligned. The misalignment produces a Hi-Beaming effect. Like other tactics, frequency and duration play an important role here. Lights being shined into a target's windows have also been reported. "Among the most common non-lethal weapons are bright lights," wrote Dr. Alexander, in his book, Winning the War. He says, "The intent is to reduce risks of injury... by temporarily hindering the eyesight of the targeted personnel." He also wrote of the use of bright lights on targeted people in his book, Future War.

 Blacklisting

Job opportunities will be trashed. Most targeted people are unemployed. Many would be in the street if it weren't for parents, siblings, or friends. Targets who are employed are usually mobbed. "Progressive financial impoverishment, [is] brought on by termination of the individual's employment, and compounded by expenses associated with the harassment.

During her investigation she concluded, "The majority of those now in contact with the Project - educated, white-collar professionals - have lost their jobs. Termination of employment in many of these cases involved prefatory harassment by the employer and co-workers [Mobbing], which coincided with the other overt forms of harassment..."

According to an article in The Christian Science Monitor entitled, Blacklisted by the Bank, Blacklisting was originally used as a foreign-policy tool. At some point federal organizations obviously decided to start using it on individuals as well. Slander may play an important role in Blacklisting. Also there are Blacklists and software packages used to check these lists for suspected "terrorists," "threats to national security," etc. Apparently this is a flourishing business and some organizations are required by law to use it.

An August 2004 article entitled, The Surveillance-Industrial Complex, by the ACLU, stated "An entire industry has sprung up to produce software that makes it easier for companies to enforce the government's blacklists and other mandates. An example is 'Homeland Tracker,' produced by a subsidiary of the giant database company Choicepoint to 'help any business comply with OFAC and USA PATRIOT Act regulations.'" The article notes that the software has a feature called "accept and deny lists... otherwise known as blacklists."

Federal law enforcement has sent these watch lists to corporations. They contained the names of individuals that were not under official investigation or wanted, but that the agency just had an interest in. We already know that some of these agencies are targeting and harassing citizens. Unbeknownst to many, these agencies are apparently deliberately destroying careers on a massive scale. Wired NewsWire spoke of these Blacklists on August 9, 2004, in an article entitled, Big Business Becoming Big Brother. The article concluded, "There is no way to determine how many job applicants might have been denied work because their names appeared on the list."

A form of Blacklisting has also been used on Russian dissidents by the state. In his book, The Persecutor, Sergei Kourdakov, a member of the plain-clothed People's Brigade declared, once a person was targeted, they were "treated like a leper and could only get the worst jobs."(*) To accomplish this Blacklisting, the USSR used something called a workbook. The workbook was used to advance or destroy careers. If you were cooperative with the state, your career could be very successful. If not, you would live in poverty.

In East Germany dissidents were Blacklisted as well, and their careers were destroyed. After the wall came down they were allowed to inspect their files, and learned why they were unable to get jobs or enter into universities. Dr. Munzert, speaks of the similarity between what is now happening and what the occurred in Germany; he says the goal is "to bring their finances down," by making them "loose their job."

If you've previously been mobbed out of employment and are blacklisted, the mobbing may continue during interviews. Presumably, this is used to further traumatize you.

Interview questions may be asked with accusing, or mocking tones. Questions may also be asked using certain key words, regarding the environment you just left, which only you and your former co-workers (who Mobbed you) would know. These questions are obviously designed to trigger negative emotions which have been linked to a previously painful work environment, where you experienced mobbing. They may ask these questions over and over using a slightly different syntax.

If you're targeted, during an interview you may have potential employers demanding credentials that they did not list as a requirement in their AD. During phone interviews you may have employers telling you that you responded to an AD other than the one that you actually responded to. They may also tell you that they did not place the AD, or that they placed a slightly different one. You may be told that your updated resume says you're currently working at a place that you never worked at, or a place you worked at a decade ago.

The harassment is masked in layers of accommodation to help strengthen the illusion that you're not working because you don't choose to. For instance, you may have recruiters who have harassed you in the past leave messages on your answering machine or with relatives/friends, indicating that there are opportunities available to you. It will be made to look as if you're unemployed due to your choice. The general public may not realize that Blacklisting exists because the institutions that use it operate most major news outlets. Reporters and historians are also Blacklisted for reporting corruption or historical facts that the Zionist complex does not want the public to be aware of.

Publishers Weekly, gives an editorial review on Amazon.com of a book entitled, Into the Buzzsaw, authored by Kristina Borjesson, in which they state, "The buzzsaw is what can rip through you when you try to investigate or expose anything this country's large institutions be they corporate or government want kept under wraps." This "buzzsaw" is what others have called the Invisible Government. The review continues, "Reporters who tattle risk losing their jobs and being blacklisted... [by] concerted corporate and/or government efforts to kill their controversial stories and their careers."

 Communications Interference


Targets experience tampering or lost mail. During the former version of Cointelpro, they would blatantly watch homes, follow cars, and open mail. The idea was to get as much info as possible to aid in the harassment and intimidation of their targets.

The Stasi too, "inspected all mail in secret rooms above post office," described Funder, "and intercepted, daily, tens of thousands of phone calls." Dr. Munzert noted that one objective of those running this program is to "disrupt the communication systems of the victims." Targets usually receive lots of wrong phone number calls or harassing telephone calls. These pranks may be linked to an event unfolding in the target's personal life. The phone has historically been an excellent harassment tool.

Online


Targets may also be stalked online. Search engine results may be filtered (blocked) and replaced with information in a target's personal life. Websites that a target visits may be spoofed and contain information which is apparently intended to let the target know they're being stalked in the internet as well. This appears to be simply an online version of the public stalking. If you have a website devoted to exposing this program, you may have people constantly harassing you, emailing you to flame you, or claiming that they are victims and asking for support while making references to subjects unfolding in your personal life. This tactic may be used to foster a sense of hopelessness and isolation.

If you're targeted, you may receive "unsolicited" email that parallels a current event in your life. Or you may receive covert insults and threats. If you join a support group, you may also receive harassment via threads posted on message boards. Like other mediums of harassment, the topics of these threads may be about events that are unfolding in your personal life, as well as threats or insults covertly directed at you.

Your email may be blocked or filtered and your web activity may be monitored. Carnivore, DCS1000, or similar tracking software can accomplish some of this.(**) If you try to sell things online, participate in online discussions groups, or respond to employment Ads, you will probably be interrupted, trashed, or harassed.

Some people have reported that their inbox is clogged with junk messages even if they have filters on. These unsolicited emails may contain cryptic borderline-subliminal attacks. The words will be garbled but contain letters that convey a message when arranged in the correct order. Or they may contain a sounds like message. Your mind will automatically piece these letters together so they make sense. This is done on the fly, without you being aware of it.

These messages may contain junk in the body and the TI may not be able to reply to it because it came from a bogus address. These cryptic attacks are mentioned in the book, Subliminal Mind Control, by John J. Williams. If you're targeted, the message will probably pertain to something in your life situation. Any weakness you have can be exploited.

For instance, if you're going bald and have been looking for treatment, you could receive the following attack:

To: John Doe
Subject: Euro Balding Tummy
Body: asdfl;jkasdflkkjasdf;lkjasdfljkasdfl;jkasdfl


The harassment of some targeted people is more than likely broadcasted around the country via closed circuit TV to the politically powerful and those with connections in intelligence and organized crime.

In the workplace this can easily be done by surveillance systems, which many businesses now have in place. A report based on a survey conducted on over 500 companies appeared in the May 19, 2005 issue of Business Wire in an articled entitled, Statistics Show Rise in Surveillance of Workers. It stated, "More than half of the companies surveyed use video monitoring to counter theft, violence and sabotage," and that the number of businesses conducting surveillance is increasing.

This might be used for the purpose of "creating a sense of unity, [and] for identifying TIs who are to be harassed on the street." In addition to facilitating group cohesiveness and identifying targeted people, McKinney noted that it seems to be a "major source of entertainment" for the individuals participating in this harassment. Similarly, more overt degenerates have been known to record their actions so they can "re-live" the experience.

"Covert workplace surveillance is big business," stated the Denver Rocky Mountain News, on April 30, 2001. "Secret monitoring of employees has grown dramatically," echoed Knight Ridder in their August 6, 1997 article entitled, The Boss is Watching as Workplace Surveillance Grows. According to these publications, the equipment is installed after hours and includes miniature cameras hidden in thermostats, light switches, and on walls and ceilings that are located in changing areas, locker rooms, break rooms, and even bathrooms. Apparently, there have been some lawsuits concerning this.


Electronic Warfare


My goal here is to provide evidence that these weapons exist and are being used on the civilian population. They are also known as, Directed Energy Weapons (DEW), Psychotronic Weapons, Less-lethal Weapons, and Electromagnetic Weapons. Most targets are hit with these weapons. See herehere, herehereherehereherehere and here for more information.

These weapons or similar ones are currently being used on a massive scale against citizens of North America and other NATO nations. Dr Munzert refers to "Directed energy weapons" as the "high-tech arms of the century," and adds that they are "part of crimes (in Europe) that almost nobody knows [about] except the victims and the offenders." Although the surface intention for the creation of these weapons is to save lives, the evidence suggests they are being deliberately misused on a global scale as a traceless form of slow torture.


Monday, January 25, 2016

Zersetzung - The Origins of Modern Day Homeland Security and the Police State Part 2

I have written previously about the Stasi and Homeland Security. Along with reading this article about Zersetzung, I highly recommend reading the first article in this series: Zersetzung - The Origins of Modern Day Homeland Security and the Police State  Also, download this free Stasi tactics book.
It is interesting to note that the idea for the Stasi came from the Bolsheviks and the Cheka. It absolutely must be mentioned that Jews played a leading role in the development of Bolshevism and the Cheka. (To learn more about this, see herehereherehere and here.) They have also played a major role in the development of the new Homeland Security laws. Also, see this post about classified technology that allows them to stalk, harass and torture you remotely. 



Zersetzung Tactics 

It has been said that when you're first targeted, they hit you hard in multiple directions.

Presumably, this is done so you'll collapse after experiencing recurrent emotional violence, which is compounded after you've realized that all normal support structures and avenues of grievance have been removed. There appears to be multiple levels of intensity of this program that people can receive. The two main parts of the program are group stalking and Non-lethal Weapons (NLW). Both are violent attacks. And some are apparently hit hard with both.

People tend to associate the word harassment with acts of temporary aggravation or pestering. Therefore, it may not by the proper word to describe the never-ending acts of covert violence inflicted upon targeted people, which amounts to torture and murder. Some of the tactics used in these programs are borderline-subliminal, which is why they are so difficult to detect, explain, and defend against.

It is my goal to make the unconscious, conscious. Many of these tactics are a type of mind-control.

Most of these tactics have been used in former Cointelpro operations by the United States, Russia, and Germany against their civilian population.

The genesis of this program is obviously derived from known tactics such as bogus investigations, surveillance, smear campaigns, the use of noise, thefts, break-ins, character assassination, staged accidents, framing, sabotage and vandalism, mail interference, blacklisting, citizen informant squads for overt surveillance (Gang Stalking), poisoning and drugging, incarceration into prisons and mental institutions, and electromagnetic weaponry.

It is a historical fact that the U.S. has officially targeted its civilian population on multiple occasions. Programs such as MKULTRA and Cointelpro can't be denied.

The methods reportedly employed in these harassment campaigns, bear a striking resemblance to those attributed to the CIA and FBI during Operations MKULTRA, and COINTELPRO."

In Germany these methods were contained in two programs, Zersetzung and Directive Perceptions.

They were basically German versions of Cointelpro. Zersetzung was developed to destroy a targeted person's inner-self. Dr. Munzert, a German target, drew a parallel between the current program, and what occurred in East Germany.

He explains: "In Germany this is called Zersetzung and this means the dissolution or disintegration of the targeted person."

Anna Funder, for her non-fiction book, Stasiland. In it, she wrote, "The German word Zersetzung is harsh, and has no direct English equivalent." She described, "Zersetzung, as a concept, involves the annihilation of the inner-self."

It calls for, "the spreading of rumors about particular persons with the aid of anonymous [means]... making compromising situations for them by creating confusion over the facts... [and] the engendering of hysterical and depressive behaviors in the target person."

"Directive Perceptions," she continued, was another program designed to "develop apathy (in the [targeted] subject)... to achieve a situation in which his conflicts, whether of a social, personal, career, health or political kind are irreversible... to give rise to fears in him... to develop/create disappointments... to restrict his talents or capabilities... to reduce his capacity to act and... to harness dissensions and contradictions around him..."

These directives were used by the Ministry for State Security (MfS) against threats to state security. In other words, they were massively used on the population to maintain a dictatorship.

These programs were designed to secretly destroy a target's personal and professional life, ruin them financially, and prevent them from reaching their potential, with the intention to produce irreversible depressive and panic-stricken behaviors.

"Hidden in Plain View," many of us have experience with books where the goal is to find the hidden picture contained in the landscape.

Or the artwork, where if you look intently, you will eventually see a three-dimensional picture superimposed on a flat background. At first, most of us had some trouble detecting these hidden pictures, but with practice we usually see them. Once the detection mechanism is developed, these hidden objects become clearly visible with little effort. So too with Zersetzung and Cointelpro.

Once you know what to look for, these borderline-subliminal attacks are quite detectable.

So, rather than using a blunt overt attack against a fully functional person, they usually attack covertly, and conceal their harassment by using existing events that occurs naturally. There is usually cover for the harassment as well. However, it is probably a statistical rarity for some of these staged events to occur as often as they do. They conceal much of their harassment using what appears to be a simple formula.

Basic Protocol

There is a basic protocol that they begin with in all the NATO countries:

It begins with the surveillance of targets, monitoring of their private lives, and entry into their homes (break-ins). This is done so their personality traits can be cataloged.

There is a basic protocol that the perpetrators begin with, but the targeted individual contributes to the modification. They modify it based on the data that is collected on the targeted individual.  They monitor the targeted individual's behavior, their reactions to certain stimuli and what bothers them, they look for weaknesses and the activities that make them angry or depressed.

After they are singled out for preliminary stages of harassment, Gang Stalking ensues, which is a part of a "softening-up process."

After a period of overt surveillance and organized group stalking,  the Directed-energy weapons and Electronic warfare harassment gradually increases to extreme conditions. This pattern has unfolded consistently in all NATO countries.

Dr. Munzert speaks of basically the same pattern, which he describes as a "double-folded strategy."

"It is usually the same procedure," he announced, "but with individual variations." One part includes the victims being "attacked with microwave weapons," and "the other part of the strategy" he says, is to portray the targeted people as "mad [insane]."

He explained the effectiveness of this approach as "unbeatable," and reveals that this is essentially what the Stasi did to their targets. Part of this protocol appears to include elements of Neuro-linguistic Programming (NLP), which is a type of mind-control used by behaviorists to affect change. (NLP first originated inside the CIA with Richard Bandler and John Grinder.)

Some of the tactics below have been called Street Theatre, Harassment Skits, or Staged Events. They are planned harassment skits, such as blocking, or swarming. They also include informants who surround targets and have conversations intended to be overheard, which contain information about the target's personal life.

Presumably, citizen informants are told that this is necessary to let targeted people know they're being watched. This may happen in any public place. This is not a complete list of tactics but it includes some of the more common ones reported.

Some of these tactics will sound insane because they're deliberately designed to make someone appear as though they're suffering from a mental disorder. They were definitely created by experts in the behavioral sciences. In addition, people may be emotionally drained, and unable to properly identify or explain what's happening to them.

According to the DOJ, mental tactics designed to cause psychological harm must last for months or years before they constitute torture. The Hidden Evil fits this description.

So keep in mind, these are Psychological Warfare tactics which are intended to drive people crazy.


Mental Health System


The mental health system is apparently being used worldwide to discredit targeted people who complain.

According to the book, Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas, countries around the world, including the U.S., have used doctors to help abuse and discredit people, often for political reasons. It is also a documented fact that there was collaboration between doctors and the military when experiments were carried out in prisons, hospitals, and universities on unwitting people in North America.

Some medical doctors, as well as psychiatrist and psychologists appear to be providing cover for this program. This is similar to what was done in Russia, where enemies of the dictatorship would be thrown into mental institutions and drugged beyond recovery.

The APA's refusal to acknowledge the impact of terrorization upon the human psyche, even given the publicity stemming from the Church Committee's findings in 1975, raises serious questions about the validity of psychiatry as a profession in this country, not to mention, the APA's ethical intent, in the long term.

The DSM is a diagnostic manual for identifying mental disorders.

The first edition of the DSM was released in 1952 at a time when the APA was under the control of Dr. Ewen Cameron, who would commit brutal government-sponsored torture under the MKULTRA program.

The Psychiatric Diagnostic Statistical Manual (DSM) for mental disorders, is a brilliant cover up operation in 18 languages to hide the atrocities of military and intelligence agencies' actions towards their targets. The manual lists all mind control actions as signs of "paranoid schizophrenia," and that all medical schools teach their students that the person is paranoid, "ESPECIALLY if he believes intelligence agencies are behind it all."

Never is the medical profession told that these are routine actions all over the world by intelligence agencies against their targets.

Dr. Munzert said that doctors, "first think of paranoia and schizophrenia" if someone complains of this program. He cautions that because of this, "victims" could end up in a "lunatic asylum."

Annie Earle, a Licensed Clinical Social Worker, and Board Certified Diplomat in her area of expertise, has over 25 years of psychotherapy experience as an independent practitioner. When referring to the DSM during an interview, she stated, "It's called the Diagnostic Statistical Manual... [and all] psychotherapists, regardless of specialty are required to give their patients a diagnosis from this manual, and in order to get the diagnosis you have to fulfill certain criteria that is clearly spelled out in the DSM."

Earle noticed a pattern unfolding when some of the people who came to her who did not fit the standard criteria. "The patients that started coming to me really did not fit any of the standard classifications," she explained.

"For example, they might be having what some people consider a psychotic or schizophrenic breakdown in that they might report what seem to be hallucinations, but they did not have any of the other criteria that goes along with schizophrenia. There are many criteria that one is required to... [detect] in making the diagnosis of schizophrenia, and these people did not meet all that criteria."
Apparently Earle became targeted herself while studying this program.

Interestingly, the April/May 1996 issue of Nexus Magazine contained an article entitled, How The NSA Harasses Thousands Of Law Abiding Americans Daily By The Usage Of Remote Neural Monitoring (RNM) written by former NSA worker John St. Clair Akwei.

It read, "NSA DOMINT [Domestic Intelligence] has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health." The DSM appears to have been created with a loophole which allows government-sponsored harassment programs to exist.

This was evidently done so that people will appear ill when explaining this to a mental health professional. Adding to this confusion, the program itself is designed to mimic mental illness when explained to those "not-in-the-know."

Mental health professionals may also participate in this program, wittingly or unwittingly by labeling targets as mentally ill. It is one of several layers of protection used to help keep this program operating in secrecy.

It's easy to see how some mental health professionals might "jump to conclusions."


Surveillance

Surveillance is apparently part of an ongoing bogus investigation that never ends.

The investigation may be done for reasons of "national security." Similarly, German and Russian security forces would often target the civilian population for the same reason. After a person is singled out, dwellings surrounding the target will be sublet and used by spies and intelligence agents.

If the target lives in a house, the spies will usually be the closest building to the house. If the target lives in an apartment, then the spies will be in one or more of the surrounding apartments. There will be unusual patterns of occupancy with lots of people coming and going into these vacancies. Vehicles and license plates used by the occupants of the bases may be periodically changed.

The spies who move into these vacanies have been linked to the DOJ, CIA, and other federal agencies, as well as Universities, and government defense contractors.

In order to target someone it requires that that person be put under surveillance, so that their personality traits, their capacity to inter-relate with people, their capacity for corruption or non-corruption (that seems to be a critical point), and even their religion factors into it.

The information obtained by surveillance is used for no ethical reason, other than to establish a harassment protocol, which will follow that targeted individual for the rest of his or her life. Neighbors, friends and family are then co-opted into the harassment.

This surveillance is done using very sophisticated spy satellite equipment. This equipment is used in combination with Directed Energy Weapons and other Electronic Warfare. See here and here for more.

Character Assassination


Targets usually experience character assassination which is done to destroy their personal and professional life.

Half-truths and lies are often strategically spread into their lives, and may be the basis for a bogus investigation. The rumors circulated about people are apparently not petty, but shocking and repulsive. They are CIA or Stasi-type life-damaging lies. Some of the people spreading these lies may be acquaintances and/or family members that have been recruited (lied to, intimidated and blackmailed) into becoming informants.

U.S. Federal law enforcement has used these tactics to destroy people they either wanted to recruit as informants or those they knew they couldn't recruit and just wanted to destroy.

According to former CIA psychologist James Keehner, "It was planned destructiveness. First, you'd check to see if you could destroy a man's marriage. If you could, then that would be enough to put a lot of stress on that individual, to break him down. Then you might start a rumor campaign against him. Harass him constantly."

Constant harassment, planned destructiveness, character assassination, destroying relationships, all done in concert with the goal of breaking someone down are a standard part of this program.

Reportedly, the usual rumors spread about a person are that they are a pedophile, prostitute, terrorist, racist, anti-government, mentally ill, drug addict, drug dealer, or a threat to "national security." They are often spread to neighbors, friends, family, employers, etc. A major effort is spent to separate a person from their friends and families. See here and here for more about this.

Apparently these rumor campaigns aid in recruitment.

Deception is the name of the game, so recruits are told untrue sinister stories of their victims to keep them motivated.

According to CNN, the Stasi used the exact same tactics. They stated, "The agency was authorized to conduct secret smear campaigns against anyone it judged to be a threat..." The Russian KGB too, with its massive network of informants, would slander their internal targets.

These rumors may be propagated by multiple people (informants) behind a target's back. Apparently, not letting a targeted person become aware of these rumors is essential to their effectiveness.

Victor Santoro noted in his book, Gaslighting: How to Drive Your Enemies Crazy, that,
"The essence of defaming your target with rumors is it that it not get back to him." Many targeted people have rumors being spread about them that they are pedophiles.

The organizers realize that labeling someone a pedophile will be highly damaging and produce optimum leverage for gaining community support. It is probably one of the worst rumors you could launch against someone. The Stasi would destroy the character of their targets by labeling them as pedophiles as well.

There have been multiple magazine and newspaper reports of pedophiles being harassed by neighbors, and vigilante groups to the point where they are driven out of communities and forced out of work. Some have been driven out of multiple states.

An article in the Toronto Star entitled, Vigilantes Versus Pedophiles on August 8, 2004 outlined how one citizen's group called, Perverted-Justice, would start campaigns to expose people that they have concluded were potential pedophiles. This illustrates the mind-set of some groups of people who have reason to believe a person is a pedophile.

The Perverted Justice group is run by Xavier Von Erck (real name Phillip John Eide), at www.perverted-justice.com.

Upon visiting a site called Corrupted-Justice at www.corrupted-justice.com, I discovered that multiple members of Perverted Justice have endured trauma such as incest or other forms of sexual abuse and are suffering from a variety of mental disorders. The Corrupted-Justice site obtained this information from member profiles which are publicly available, and located at the Perverted-Justice website.

And according to Corrupted Justice, Eide is on record saying that more than 40% of his followers have endured this type of sexual abuse.

The Corrupted Justice site also has some very interesting message board chats (publicly available) by Perverted Justice members that are worth a look. Apparently the Corrupted Justice people have documented proof that members of Perverted Justice have hacked into their web server. The Corrupted Justice people are for the full prosecution of potential sex offenders by using law enforcement equipped with the checks and balances built into the legal system.

The Corrupted Justice group basically says that although the Perverted Justice system appears to be beneficial, it is heavily corrupted. In fact, it would not surprise if there is some sort of connection between Perverted Justice and the Intelligence industry.

Most Perverted Justice "busts" do not include law enforcement. According to the article in the Toronto Star and the Corrupted Justice website, the volunteers at Perverted Justice instead begin a relentless campaign to expose people they believe are pedophiles by calling friends, neighbors, children, places of employment and ruining personal and professional relationships.

This is similar to what targeted people experience, as indicated by the behavior of their friends, family and co-workers. But they're never told about it. Perverted Justicde is listed as a potential destructive cult by the Rick A. Ross Institute for the Study of Destructive Cults, www.Rickross.com.

It appears that some Perverted Justice members have a psychological need to feel powerful and meet that need by displaying to the public and their targets how they can destroy a life. I believe that some of these volunteers are ill and have latent sadistic intentions, despite their patriotic motives. Apparently some of them receive a sick type of enjoyment/empowerment by ruining the lives of people, as evident by their chats.

Character assassination is standard. My research leads me to conclude that it is not beyond these people to masquerade as "concerned citizens" and call local officials to register destructive complaints about a targeted person. I'm fairly certain they do this.

This type of "community service" can be very damaging, especially when the complaints originate from multiple, seemingly unconnected sources.


Sensitivity Programs (NLP)


Some of the sensitivity tactics used by these groups are borderline-subliminal attacks designed to artificially create phobias.

They are apparently based on Neuro-Linguistic Programming (NLP). You can think of NLP as a very powerful tool that can be used to produce rapid, profound change. The parts of NLP that groups use are anchors and triggers.

The goal of a these sensitivity programs appears to be to condition people with damaging emotions which are linked to triggers such as objects, colors, movements, and sounds. Once this is done, a target can be covertly injured openly in public. This may happen with or without the target's conscious awareness.

As I'll demonstrate, this is brutally violent. There is a basic protocol that the perpetrators begin with, but the TI contributes to the modification." A "pavalonian conditioning" program, is used to get targeted people to "respond emotionally to a particular trigger."

These negative emotions are then "built into the protocol."

It's an ongoing process. They will stalk the target for a while... to condition them, and make them "confused and frightened." Self-help gurus use these programs to create positive emotional states and anchor them to a movement, a sound or an object.

Then the sound, movement, or object becomes the trigger that will invoke the emotion. Although this sounds complex it is pretty simple in practice. It is done by creating a peak emotional state, and then while in that state, you anchor it, that is, do something repeatedly.

This effectively anchors the emotional state to whatever was repeatedly done. "A stimulus which is linked to and triggers a physiological state is called an anchor in NLP," stated O'Connor and Seymour in their book, Introducing NLP.

They ask, "How are anchors created?"

"First by repetition... Secondly, and much more important, anchors can be set in a single instance if the emotion is strong and the timing is right." This process of creating anchors has also been called Emotional Transference.

We're unconsciously creating anchors in our environment all the time with people, music, places, and objects. These stalking groups are obviously led by people knowledgeable in the behavioral sciences. The groups are used to create negative emotional states in targeted people, such as fear and anxiety, and anchor them to common objects.

This is the deliberate creation of a phobia!

O'Connor and Seymour declare, "An external stimulus can trigger a very powerful negative state."

"This is the realm of phobias," they warn. This is nothing less than using violence to create an injury and then deliberately irritating it. Targets are constantly monitored and if a target responds emotionally to a particular trigger, that will be built into the protocol. Organizations known to have studied NLP include military intelligence agencies, CIA, FBI, and other state bureaus of investigation.

According to an article called, Non-Lethality, which appeared in June 1993 issue of Lobster Magazine, in the early 1980s, Dr. John Alexander taught NLP to "selected general officers and Senior Executive Service members" as a "set of techniques to modify behavior patterns."

Some of the references used in this article were taken from Dr. Alexander's book, The Warrior's Edge, which was co-authored by Janet Morris, who, according to the article, was a student of the Silva course in advanced mind-control. In the Structure chapter, I'll provide evidence that Dr. Alexander and Janet Morris have contributed to the creation of this program on behalf of the Think Tanks, as part of a political agenda.

In their book, Dr. Alexander and Janet Morris wrote, "In 1983, the NLP training group, along with John Alexander, was engaged to teach these skills to several members of Congress, including Al Gore and Tom Downey, under the auspices of Congressmen Clearing House on the Future, a bipartisan activity established to provide information to congressmen when they request it."

He continued, "One organization that played a major role in the dissemination of NLP skills was the U.S. Army Intelligence and Security Command (INSCOM)... Unlike the rest of the U.S. Army, INSCOM does not differentiate between wartime and peacetime roles."

According to his Bio, available at www.platinumstudios.com, Dr. Alexander has worked at,
"the highest levels of government," such as "the White House Staff, National Security Council, Members of Congress, Director of Central Intelligence, and senior defense officials."

Morris' Bio, available at www.m2tech.us, is similar. Some of the organizations she's worked with include: the White House Office of Science and Technology Policy, Office of the Secretary of Defense, the Marine Corps Warfighting Lab, etc.

"Anchoring," stated Morris and Alexander, "is based on the neurophysiological assumption that patterns of behavior can be installed, then reactivated whenever a similar situation is encountered or created... Knowing this, you can intentionally install anchors to return your target to specific emotional states. The first step is [to] create the desired emotional state in the individual."
There has been some concern in the mental health field over the potential misuse of NLP.

Unfortunately, like other tools, such as guns, they can be misused in the wrong hands. Andreas and Faulkner warned of the "possible uses and misuses of this technology," in their book, NLP: The New Technology of Achievement.

They wrote, "We recognize the incredible power," of NLP and "recommend you exercise caution..."
The deliberate infliction of emotional pain is an act of violence. The use of NLP in this manner is similar to a physical attack such as a punch or kick, only it leaves no visible injury.

Here's an example of how groups use NLP to make you aware that you're being stalked: One morning you're walking out to your car and a man walks in front of you, stares directly at you in a hostile manner while repeatedly clicking his pen the whole time. You feel a little uneasy and say to yourself, "Boy that was weird, what was his problem?"

Then two hours later you're leaving a shopping mall on a day that it was not particularly crowded. As you walk out to your car, an old lady approaches you on foot. As she almost collides with you, she locks her eyes onto you with a hostile demeanor, while clicking a pen the whole time. Then maybe you tell yourself something like this. "There couldn't be a relation between those events, probably just a coincidence. But they both stared at me in such a mean way while hammering their pens..."

Later in the afternoon, you're on your way home. You're at a stoplight and out of the corner of your eye you see a passenger in the car to your left. You hear a slight noise, and glance over. You see a man glaring at you with a grin on his face. His arm is hanging out the window and he is holding a pen, which he is repeatedly clicking. Now imagine that happening for a month. Then a few days later you're on a sidewalk with a friend or family member. A man walks by, doesn't look at either one of you, but clicks his pen a couple of times. You feel anxious and afraid. You may not even know you've been sensitized.

One reason people may not realize that they're targeted or can't remember exactly when it began, is because these groups may slowly and gradually increase the harassment over time. But if you did recognize it as an attack, what would you tell your friend or family member?

This is what happened: The collisions, blatant hostile staring, and foul grin created the negative emotions and anchored them to the pen, which has now become the trigger. That is an example of a sensitivity program. Now imagine yourself being sensitized to multiple objects and sounds, and each of them creating pain each time you see or hear them.

Targets around the world have witnessed this being done with sounds, gestures, cell phones, laptops, pens, cars, watches, clothing, symbols, colors, and other items. This type of attack does require some maintenance and will loose its potency unless it is reinforced. So groups will reinforce these anchors and triggers with an occasional blitz attack from time to time.

The example above is a simple tactic which groups can use to let you know that you're being harassed in public. But there are many other attacks which NLP can be used for. For instance, you have recently experienced an extremely traumatizing event (which may have been facilitated by a faction of this network), such as an accident, death of a family member or pet, or some type of a brutal assault.

Those who have you under surveillance know that there is a color, object, or sound that you've linked (anchored) massive pain to. Then shortly afterward, you are stalked by multiple people who carry that object, wear that color, or utter that phrase. This brings to the surface all the emotional pain you suffered during that experience.

Imagine this happening again and again, every time you go outside. Now think what it would be like if your family and friends started to participate.

Groups will take an object you've been sensitized to and link it to another object. The idea appears to be to keep expanding the amount of objects you associate fear, anxiety, anger, or shame with. For instance, one of your neighbors has made it clear that they're participating in the harassment. Now, you know they're participating, and they know you know.

So they may try to sensitize you to another stimulus such as a car alarm.

Because you've already associated them with massive pain, they can extend their harassment to a sound by turning their car alarm on/off in rapid succession over a short period of time, multiple times throughout the day. After they've done this for a couple of days and you've been sensitized to this sound, they can reduce their use of this specific tactic and just use the occasional maintenance sounds to inflict pain.

Now instead of repeatedly turning it on/off ten times, they only do it two or three times in a row, just to let you know you're being attacked. Even though it's only done a couple times in a row, you know why they're doing it and you may feel anger, fear, anxiety or other negative emotions. You may also feel frustrated at the prospect of trying to explain this harassment to another individual.

Anyone else observing this might think it's a little strange that someone would turn their alarm on/off a few times but they'd probably write it off as an isolated strange incident. But because they have not had your experience with that sound, and are not aware that it is a small part of a much larger harassment program, it would be difficult to explain that those beeps were attacks.

In NLP, the process of copying an emotional state from an existing trigger to a new trigger is called chaining.

O'Connor and Seymour state, "Anchors can be chained so that one leads to another. Each anchor provides a link on the chain and triggers the next one, just as the electrical impulse flows from nerve to nerve in our body."

After a person has been sensitized to a color or object, the article can become a unification symbol for the group, much like a uniform. For instance, after a person has been sensitized to the color red, she is surrounded by people wearing red cloths in public. Furthermore, this is an adaptable uniform because it can be changed in less than five minutes. If a person who realizes that they're being Gang Stalked has been sensitized to red, then the organizers of these groups can simply have them blitzed by a horde of citizens wearing the color blue.

The harassment has now been chained to this color. Most likely, these uniforms also help promote group cohesiveness, and may foster feelings of empowerment among stalkers.

Another techique intelligence agencies do is to use electromagnetic weapons (radar, satellite,) and nanotechnology to put something in your brain right before it happens to you. They will do this constantly. People have to realize that there are foor soldiers and agents watching you with satellites. They also have access to your brain, your EEG, ears, eyes, your vitals, blood pressure and heartrate etc. They tell the foot soldiers what they are planning to anchor, and they put it in your brain before the foot soldiers do it so you focus specifically on what they are doing. This makes the anchoring process even more effective.


Space Invasion (Crowding)


Space invasion includes blocking, cut-offs, and swarming or what some TIs refer to as, crowding.

Targets may be encircled by people wearing colors or holding objects that they've been sensitized to. Prolonged crowding can have an extremely negative effect on your mental/emotional health. The people who designed this harassment program were obviously well aware of this.

While some cultures may be more immune to crowding than others, even people from parts of the world that have been historically crowded react stressfully to crowding. People who have not been invited into your personal space but deliberately violate it are attacking you.

Body language is more accurate and reliable than verbal communication. Most of this non-verbal communication is unconscious. The study of this language has been called Social Kinesics (the study of body communication). There are two components to this communication: One contains movements, gestures, postures, the other is spatial relationships. The study of communication using distance/space is called Proxemics.

For most North Americans the intimate zone is 0-18 inches and personal space is 1 -4 feet. This type of communication is used to harass a person. For instance, while in stores, restaurants and public places that are not busy, a target will have people invading their personal space. This happens even if there are only two customers in a store.

If a targeted person makes a move from one place to another, several people may suddenly appear and jump out in front of him from around corners and isles.

The deliberate space invasion use by these people is designed to look like normal cut-offs and collisions that we all experience from time to time. It can happen with vehicles, on foot, or a combination.

This type of space invasion is obviously intended to startle people and make them tense. It can be thought of as a virtual slap. They are used in blind areas such as corners, hallways, restrooms, or intersections where targets have people or cars cutting them off, or almost hitting them in a calculated manner.

This happens in stores, buildings and on the street, with people and vehicles.

With some artificially induced cut-offs, the perpetrator is seen at a distance. The target and the perpetrator(s) are heading toward the same focal point which is used to maximize crowding. The point may be a corner, a very small walkway, a thin passageway, or an obstruction on the sidewalk such as a telephone pole or a tree.

The informants adjust their timing so that they meet the target at the exact point where there is the least amount of space for all parties to pass, thus maximizing the invasion of the target's space.

Apparently the idea is to get the target's attention and make them uncomfortable. When standing in a checkout-line, targets may routinely have group members standing a foot or closer behind them. And rather than wait for a target to leave, they may crowd them as they reach to the side or in front of the target to put their items on the counter.

If a target is outdoors in a populated area, he or she may see a wave of people move in the direction that they're headed in order to swarm them.

If a target moves, then stops and waits for a few moments, they may see that the activity will settle back to normal again after the horde passes. This test can be run indoors and outdoors as well. Sometimes the horde may blatantly adjust their timing, or linger for a while until the target begins to move again, then they'll continue.

These crowding and blocking tactics amount to an obstacle course that follows people wherever they go. They will also block targets, both on foot and with vehicles. For instance, as a target leaves a parking lot, a vehicle or person will be in the way, usually for a few moments. These things happen to everyone, once in a while, but for targets, it happens consistently, regardless of the time of day or how busy the area is.

This space invasion happens on days/times that there are normally not many people. It happens in stores while making purchases, restaurants, businesses, where targets have people frequently cutting them off, invading their space, using sensitivity programs, or other harassment tactics. If there is one customer in the store, they will probably be invading the target's space.

For instance, a TI is indoors when it is not crowded, but witnesses multiple people who, instead of taking the shortest path to their destination, go double or triple the distance just so they can brush by them or cut them off.


Noise Campaigns


All targets of Zersetzung are familiar with noise campaigns.

Basically, targets report experiencing a steady stream of noise consisting of a rotation of various types of disturbances around their homes. This includes door slamming, yelling, car alarms, horns, tires screeching, loud music, engines revving, and frequent construction projects which include an assortment of noise from heavy machinery and tools.

Not surprisingly, in his books Future War and Winning the War, Dr. Alexander described using noise as a weapon. In Future War he wrote, "Audible sound, in frequencies from 20 to 20,000 hertz, can be applied to influence behavior, as most people are sensitive to very loud noises."(***)

For instance, if you're targeted, there will be doors slamming for a few moments, several minutes of silence will ensue, then a motorcycle will drive by and rev its engine outside of your house.

After that you'll have someone mowing the lawn. Then there will be alarms going off. After that you'll hear a loud crowd of people walk by your house. Then you may then hear fire or ambulance sirens. Then there will be hammering and sawing sounds from the ongoing construction projects. Then you'll hear car alarms being turned on/off in succession multiple times from multiple vehicles around your house.

There will generally not be a solid five minutes of uninterrupted peace.

"Noise campaigns" can include anything from the frequent and constant vehicles with "blaring horns" and sirens of fire trucks, police cars or ambulances, or people yelling out something similar to what you were recently thinking, talking or doing. (This also happens when you go on the internet to popular websites, (mainstream or alternative,) Facebook accounts, YouTube channel owners or Twitter account owners, An agent watches you constantly, they watch your internet habits and contact people at the internet destinations that you frequent the most, the agents tell them you are regular visitor to the website (they slander or spread a rumor about you,) and gets people to participate in stalking you. They may even offer to pay them to do it.

Targets experience frequent harassment which is used on a recurrent basis under circumstances intended to persuade the individual that he or she is under surveillance. (Much of this is mimicry and copying.) The people above a targeted individual may loudly pace as they mimic his or her movements from above. For instance, if you're targeted, as you walk into your bathroom, you hear loud stomping from above which follows you into the bathroom.

A number of individuals report that occupants of upstairs and downstairs apartments appear to follow them from room to room, tapping on the floor or engaging in other activities which appear intended to advertise an ongoing surveillance. They'll "pace in their apartment," and seemingly to the target underneath them, "it sounds like they're being tracked... from the apartment above."

If you're targeted, helicopters and small propeller planes may frequently pass over your home also.
Some of these aircrafts may be low enough to vibrate the room you're in. According to Cheryl Welsh, the use of helicopters is a common tactic reported by targets. Apparently these overhead assaults are used for sleep disruption and to undermine the morale of targeted people.

Welsh is one of only six Non-lethal Weapons experts in the world recognized by the United Nations. This noise may follow you to destinations you frequently visit. Foot and vehicular traffic may be re-routed through your street, causing an unnatural amount of vehicles driving by your house (even if you're on a side or dead-end street).

Noises made as they leave also appear to serve as a form of communication to alert group members in the area to begin pursuit. In addition to the standard noise package, whatever noise would naturally occur in the area you live will also be increased in frequency. For instance, if a target lives in a rural area then noisy chainsaws will be quite regular.

And in the winter there may be frequent loud snowmobiles that pass near the area.

In this manner, noise is used as a weapon to inflict pain. Chronic exposure to even low-level noise is considered a health hazard that has been known to produce adverse physiological & psychological health effects. Prolonged exposure to noise can produce high blood pressure, a rise in cholesterol, damage to the circulatory, cardiovascular, gastrointestinal, & musculoskeletal systems.

If you're targeted & pregnant or plan on having a baby, you may want to think twice. Noise has been known to cause hearing loss & growth disturbances in a fetus, & can lead to birth defects.

Prolonged stress in general has been known to cause miscarriages, and some who have been stalked and harassed over a period of time have attributed their miscarriages to ongoing harassment. Just as the fabricated cut-offs are likened to getting slapped, these noises are the equivalent of being repeatedly shocked.

The creators of this program are obviously aware that these noise campaigns are acts of violence.

Synchronization

Groups will try to synchronize their tactics with things that targets do such as entering or leaving their homes.

The target's movements will be synchronized with vehicles or people coming or going, or other movements. These synchronization tactics are often done several times, perhaps three or more.

If a target has a habit of going to the bathroom at 2 AM and looking out his bathroom window at a specific area, then they will eventually arrange it so that there is some sort of activity going on at that time.

This is an example of the level of detail that they will resort to when tailoring a harassment protocol to the profile of a target.

Synchronization is also used with sensitivity tactics and noise. For instance, if you're targeted, you'll hear ambulance or fire truck sirens the moment you enter or leave your house. Or car alarms, hammering or some other type of noise will occur as you look out the window. As you leave your home, you may notice people walking by, wearing a color or holding an object that you've been sensitized to.

If you pull into a parking lot, there will usually be cars arriving or leaving. Synchronization is also used with blocking/crowding. For instance, as you approach a store's entrance, people will be either walking in or leaving.

They will often be wearing a color or holding an object that you have been sensitized to.

A variation of this is echoing and mirroring. Like other forms of non-verbal communication, echoing and mirroring are very powerful, (but usually unconscious) ways of interrelating. This form of information exchange has been outlined in the book, Secrets of Sexual Body Language: Understanding Non-Verbal Communication, by Martin Lloyed-Elliot.

Most of us speak this language without even knowing it to attract others. However, this form of communication has evidently been incorporated into this program as a tool to annoy targets. With echoing for instance, if a target is in a restaurant, or on public transportation, and they drink then an informant next to them will drink. If they pull out a cell phone, then the informant will produce a cell pone or similar device.

When the target puts it away, so do they. In essence, they will mimic the movements of a target.

With mirroring for example, targets may frequently have a person or group of people walking parallel to them, in the same direction on the other side of a street, or any public area. Also, there may be someone directly in front of the target, and approaching the same intersection that they're approaching.

The informants adjust their timing so they approach at the same time, and cross the street just as the target does, at which point crowding may occur. The informant(s) may also be wearing red, holding cell a phone or another device, which the target has been sensitized to.

Dr. Alexander and Janet Morris also spoke of the use of mirroring to influence people, in their book, The Warrior's Edge.

 Harassment Skits (Street Theatre)

Commonly used routes are used as avenues for various types of Street Theatre that unfold as targets pass through.

Street Theatre is used during group stalking and contains verbal and non-verbal harassment, threats, insults, intimidation, and violence, conveyed overtly, or covertly using themes, symbolism, or other medium. They may be carried out after a target has been sensitized using NLP. This harassment can be relayed with metaphors, verbal remarks, and symbolism using clothing or other items.

Stalkers may be speaking on their cell phone and loudly accent the insult as they walk by and stare at targeted people. Blatant, hostile or smirking stares are also common. Sometimes they may not be on the phone and may just overtly insult you as they walk by.

As an example, I have people walk by me and say things like fuck you, fuck-up, fuck-head, you're disgusting, etc. I've also witnessed them spit in my direction as I walk by them and have seen this spitting tactic used by teenagers who would spit on the lawn while I was on the front porch as they passed by my former residence.

Some words carry with them a particular weight to potentially trigger an effect on a person's emotional state.

For instance, if you're at a restaurant you may have a couple sit down at a table next to you, and mention some events that are taking place in your personal life, in order to get your attention. After that they may make repeated references words such as paranoid, crazy, scared, panic, insane, freak, sad, depressed, etc. The idea is that the words will invoke the emotion.

Not only is this possible, but it works best when you don't know it's being done to you.

This tactic appears to be a variation of a pacing technique used in hypnosis. It involves first linking something to the subject's ongoing experience (or personal life) and then using certain words intended to evoke a particular response.

Morris and Alexander refer to these words as "verbal anchors" and state, "Verbal anchors can also be effective tools... Words such as freeze or duck transmit complete messages... Verbal anchors can elicit both positive and negative states."

In addition these words can be emphasized by changing their tone and volume when they're spoken, so that some words are slightly louder and spoken longer than the others.

This can completely change the meaning of a message. This is called metacommunication.

Metamessages are suggestions hidden in a statement, perhaps a compliment. The tone, volume, and rhythm of specific words in the sentence are changed so that the actual message is different than what the spoken words are. "It's hard to defend against the anger and disapproval expressed in negative metamessages," stated McKay, Davis, and Fanning, in their book, Messages: The Communication Skills Book. "The attack is often so subtle that you aren't aware of exactly how you've been hurt..." The basic function of metamessages," they say, "is to say something covertly that you're afraid to say directly.

Since metamessage attack is covert, there is little chance of overt retaliation." These metamessages are quite similar to indirect imbedded messages used in hypnosis.

In the book, Patterns of Hypnotic Techniques of Milton H. Erickson, M.D., Richard Bandler and John Grinder provide examples of a master hypnotist named Erickson.

Describing this type of covert communication, they write, "Imbedded commands serve the purpose of making suggestions to the client indirectly and, thereby, making it difficult to resist in any way... These are most effective when they are also marked analogically by emphasizing the command and by looking intently at the listener, if their eyes are open."

It appears a variation of this message can be conveyed with multiple people blitzing a person with cut-offs while talking on their cell phones, looking directly at the person and emphasizing (metacommunication) weighted words and/or information about the person's personal life that was obtained from surveillance.

Groups will also use these phony conversations to harass targets in stores, restaurants, public places, elevators, etc. Recurrent negative comments by strangers that are apparently intended to evoke feelings of "paranoia" are common. The stalkers operate in large groups over a long period of time - seemingly with the support or approval of the government.

Bandler and Grinder describe a positive use of this tactic when quoting Erickson addressing an anxious patient, with, "My friends tell me to feel comfortable and to loosen up when we are out on the town."

Note that the italicized words are emphasized when spoken. This tactic can be used even if the intended subject is not being addressed directly, hence the name "Indirect Imbedded Command."

Again, something about the target's personal life or real-time ongoing experience is mentioned near him so he will identify himself as the subject, then weighted words conveying insults are used.

These covert public mocking tactics using trigger words which are intended to evoke negative emotions, are based on NLP/hypnosis, and seem to be the result of an in-depth study of hypnosis by the CIA which occurred during the MKULTRA period.

"When we hear something, even from another conversation, we can't help but make images and sounds of it in our head," announce Adreas and Faulkner. "The professional persuader knows this intuitively. In NLP we know it explicitly."

They affirm, "You cannot NOT communicate."

The use of NLP/hypnosis by these citizen stalkers as directed by their handlers is obviously intended to drive people insane. Victor Santoro explains how these tactics can be used in a destructive format, as a way to "foster your target's paranoia" and "suggest that he's being mocked..."

He explains, "If you can get several accomplices to do this... he'll get the feeling that mockery and ridicule of him are widespread." Santoro's book seems to have some accurate information pertaining to this program, which makes me wonder if at some point he was employed as an intelligence agent.

At any rate, these techniques were obviously designed by experts in the behavioral sciences.

After a target has been sensitized, they can even be harassed, insulted, and threatened with symbolism using articles of clothing, newspapers, and other items. Just as body communication (Social Kinesics) is used to harass a target, so too is symbolic communication. Symbolism can be used with articles of clothing, especially during a wave attack where a target is blitzed by a crowd of informants who smile, laugh, stare at them, and cut them off as they pass.

Some of the messages may include: Stop and Die, Big Bro, Watch Your Back, as well as Satanic, Freemasonry symbols.

An attention-getting tactic may be used. It can be a cut-off, blatant stare, loud noise, or other sensitivity tactics.

In essence, they will take an event that is unfolding in a target's personal life and make references to it using any number of methods. Interestingly, an article in the San Francisco Bay Guardian, on October 22, 2004, entitled, The New COINTELPRO, stated similar that tactics were being used on protesters at anti-corporate rallies.

The theme may pertain to something in your personal life. They may play on this theme for a single day, a series of days, or weeks. In addition, they may choose a theme and try to project it into your life. Personally, I doubt that most of the citizens who are used to flash these messages are aware of their meaning.