Exposing Intelligence Agency Human Rights Abuses, Government and Corporate Corruption Along with the Problems of Zionism. The Foundation of Freedom is Freedom of Thought and Freedom of Speech
Tuesday, January 26, 2016
The Right To Tell The Government To Go To Hell
by John W. Whitehead
“If liberty means anything at all, it means the right to tell people what they do not want to hear.”― George Orwell (See here for more excellent George Orwell quotes, see here for a lecture on 1984.)
Free speech is not for the faint of heart.
Nor is it for those who are easily offended, readily intimidated or who need everything wrapped in a neat and tidy bow. Free speech is often messy, foul-mouthed, obscene, intolerant, undignified, insensitive, cantankerous, bawdy and volatile.
While free speech can also be tender, tolerant, soft-spoken, sensitive and sweet, it is free speech’s hot-blooded alter ego—the wretched, brutal, beastly Mr. Hyde to its restrained, dignified and civil Dr. Jekyll—that tests the limits of our so-called egalitarian commitment to its broad-minded principles.
Unfortunately, our appreciation for a robust freedom of speech has worn thin over the years.
Many Americans have become fearfully polite, careful to avoid offense, and largely unwilling to be labeled intolerant, hateful, closed-minded or any of the other toxic labels that carry a badge of shame today. We’ve come to prize civility over freedom. Most of all, too many Americans, held hostage by their screen devices and the talking heads on television, have lost the ability to think critically.
Societies that cherish free speech relish open debates and controversy and, in turn, produce a robust citizenry who will stand against authoritarian government. Indeed, oppressive regimes of the past have understood the value of closed-mouthed, closed-minded citizens and the power inherent in controlling speech and, thus, controlling how a people view their society and government.
We in the United States have a government with a ravenous appetite for power and a seeming desire to turn the two-way dialogue that is our constitutional republic into a one-way dictatorship. Emboldened by phrases such as “hate crimes,” “bullying,” “extremism” and “microaggressions,” the government is whittling away at free speech, confining it to carefully constructed “free speech zones,” criminalizing it when it skates too close to challenging the status quo, shaming it when it butts up against politically correct ideals, and muzzling it when it appears dangerous.
Free speech is no longer free.
Nor is free speech still considered an inalienable right or an essential liberty, even by those government entities entrusted with protecting it.
We’ve entered into an egotistical, insulated, narcissistic era in which free speech has become regulated speech: to be celebrated when it reflects the values of the majority and tolerated otherwise, unless it moves so far beyond our political, religious and socio-economic comfort zones as to be rendered dangerous and unacceptable.
Consider some of the kinds of speech being targeted for censorship or outright elimination.
Offensive, politically incorrect and “unsafe” speech: Disguised as tolerance, civility and love, political correctness has resulted in the chilling of free speech and the demonizing of viewpoints that run counter to the cultural elite. Consequently, college campuses have become hotbeds of student-led censorship, trigger warnings, microaggressions, and “red light” speech policies targeting anything that might cause someone to feel uncomfortable, unsafe or offended.
Bullying, intimidating speech: Warning that “school bullies become tomorrow’s hate crimes defendants,” the Justice Department has led the way in urging schools to curtail bullying, going so far as to classify “teasing” as a form of “bullying,” and “rude” or “hurtful” “text messages” as “cyberbullying.”
Hateful speech: Hate speech—speech that attacks a person or group on the basis of attributes such as gender, ethnic origin, religion, race, disability, or sexual orientation—is the primary candidate for online censorship. Corporate internet giants Google, Twitter and Facebook are in the process of determining what kinds of speech will be permitted online and what will be deleted.
Dangerous, anti-government speech: As part of its newly unveiled war on “extremism,” the Obama administration is partnering with the tech industry to establish a task force to counter online “propaganda” by terrorists hoping to recruit support or plan attacks. In this way, anyone who criticizes the government online is considered an extremist and will have their content reported to government agencies for further investigation or deleted.
The upshot of all of this editing, parsing, banning and silencing is the emergence of a new language, what George Orwell referred to as Newspeak, which places the power to control language in the hands of the totalitarian state. Under such a system, language becomes a weapon to change the way people think by changing the words they use. The end result is control.
In totalitarian regimes—a.k.a. police states—where conformity and compliance are enforced at the end of a loaded gun, the government dictates what words can and cannot be used. In countries where the police state hides behind a benevolent mask and disguises itself as tolerance, the citizens censor themselves, policing their words and thoughts to conform to the dictates of the mass mind lest they find themselves ostracized or placed under surveillance.
Even when the motives behind this rigidly calibrated reorientation of societal language appear well-intentioned—discouraging racism, condemning violence, denouncing discrimination and hatred—inevitably, the end result is the same: intolerance, indoctrination and infantilism.
Thus, while on paper, we are technically still free to speak, in reality, we are only as free to speak as a government official or corporate censor may allow.
The U.S. Supreme Court has long been the referee in the tug-of-war over the nation’s tolerance for free speech and other expressive activities protected by the First Amendment. Yet as I point out in my book Battlefield America: The War on the American People, the Supreme Court’s role as arbiter of justice in these disputes is undergoing a sea change. Except in cases where it has no vested interest, the Court has begun to advocate for the government’s outsized interests, ruling in favor of the government in matters of war, national security, commerce and speech. When asked to choose between the rule of law and government supremacy, this Court tends to side with the government.
In the 225 years since the First Amendment to the U.S. Constitution was adopted, the rights detailed in that amendment—which assures the American people of the right to speak freely, worship freely, peaceably assemble, petition the government for a redress of grievances, and have a free press—have certainly taken a beating, but none more so than the right to free speech.
Nowhere in the First Amendment does it permit the government to limit speech in order to avoid causing offense, hurting someone’s feelings, safeguarding government secrets, protecting government officials, insulating judges from undue influence, discouraging bullying, penalizing hateful ideas and actions, eliminating terrorism, combatting prejudice and intolerance, and the like.
Unfortunately, in the war being waged between free speech purists who believe that free speech is an inalienable right and those who believe that free speech should be regulated, the censors are winning. Free speech zones, bubble zones, trespass zones, anti-bullying legislation, zero tolerance policies, hate crime laws and a host of other legalistic maladies dreamed up by politicians and prosecutors have conspired to corrode our core freedoms.
If we no longer have the right to tell a Census Worker to get off our property, if we no longer have the right to tell a police officer to get a search warrant before they dare to walk through our door, if we no longer have the right to stand in front of the Supreme Court wearing a protest sign or approach an elected representative to share our views, if we no longer have the right to voice our opinions in public—no matter how misogynistic, hateful, prejudiced, intolerant, misguided or politically incorrect they might be—then we do not have free speech.
What we have instead is regulated, controlled speech, and that’s a whole other ballgame.
Just as surveillance has been shown to “stifle and smother dissent, keeping a populace cowed by fear,” government censorship gives rise to self-censorship, breeds compliance, makes independent thought all but impossible, and ultimately foments a seething discontent that has no outlet but violence.
The First Amendment is a steam valve. It allows people to speak their minds, air their grievances and contribute to a larger dialogue that hopefully results in a more just world. When there is no steam valve—when there is no one to hear what the people have to say—frustration builds, anger grows and people become more volatile and desperate to force a conversation.
The problem as I see it is that we’ve lost faith in the average citizen to do the right thing. We’ve allowed ourselves to be persuaded that we need someone else to think and speak for us. The result is a society in which we’ve stopped debating among ourselves, stopped thinking for ourselves, and stopped believing that we can fix our own problems and resolve our own differences.
In short, we have reduced ourselves to a largely silent, passive populace, content to watch and not do. In this way, we have become our worst enemy. As U.S. Supreme Court Justice Louis Brandeis once warned, a silent, inert citizenry is the greatest menace to freedom.
Brandeis provided a well-reasoned argument against government censorship in his concurring opinion in Whitney v. California (1927). It’s not a lengthy read, but here it is boiled down to ten basic truths:
1. The purpose of government is to make men free to develop their faculties, i.e., THINK.
2. The freedom to think as you will and to speak as you think are essential to the discovery and spread of political truth.
3. Without free speech and assembly, discussion would be futile
4. The greatest menace to freedom is a silent people.
5. Public discussion is a political duty, and should be a fundamental principle of the American government.
6. Order cannot be secured through censorship.
7. Fear breeds repression; repression breeds hate; and hate menaces stable government.
8. The power of reason as applied through public discussion is always superior to silence coerced by law.
9. Free speech and assembly were guaranteed in order to guard against the occasional tyrannies of governing majorities.
10. To justify suppression of free speech, there must be reasonable ground (a clear and present danger) to believe that the danger apprehended is imminent, and that the evil to be prevented is a serious one.
Perhaps the most important point that Brandeis made is that freedom requires courage. “Those who won our independence by revolution were not cowards,” he wrote. “They did not fear political change. They did not exalt order at the cost of liberty.” Rather, they were “courageous, self-reliant men, with confidence in the power of free and fearless reasoning applied through the processes of popular government.”
In other words, the founders did not fear the power of speech. Rather, they embraced it, knowing all too well that a nation without a hearty tolerance for free speech, no matter how provocative, insensitive or dangerous, will be easy prey for a police state where only government speech is allowed.
What the police state wants is a nation of sheep that will docilely march in lockstep with its dictates. What early Americans envisioned was a nation of individualists who knew exactly when to tell the government to go to hell.
Monday, January 25, 2016
Zersetzung - The Origins of Modern Day Homeland Security and the Police State Part 2
I have written previously about the Stasi and Homeland Security. Along with reading this article about Zersetzung, I highly recommend reading the first article in this series: Zersetzung - The Origins of Modern Day Homeland Security and the Police State Also, download this free Stasi tactics book.
It is interesting to note that the idea for the Stasi came from the Bolsheviks and the Cheka. It absolutely must be mentioned that Jews played a leading role in the development of Bolshevism and the Cheka. (To learn more about this, see here, here, here, here and here.) They have also played a major role in the development of the new Homeland Security laws. Also, see this post about classified technology that allows them to stalk, harass and torture you remotely.
It has been said that when you're first targeted, they hit you hard in multiple directions.
Presumably, this is done so you'll collapse after experiencing recurrent emotional violence, which is compounded after you've realized that all normal support structures and avenues of grievance have been removed. There appears to be multiple levels of intensity of this program that people can receive. The two main parts of the program are group stalking and Non-lethal Weapons (NLW). Both are violent attacks. And some are apparently hit hard with both.
People tend to associate the word harassment with acts of temporary aggravation or pestering. Therefore, it may not by the proper word to describe the never-ending acts of covert violence inflicted upon targeted people, which amounts to torture and murder. Some of the tactics used in these programs are borderline-subliminal, which is why they are so difficult to detect, explain, and defend against.
It is my goal to make the unconscious, conscious. Many of these tactics are a type of mind-control.
Most of these tactics have been used in former Cointelpro operations by the United States, Russia, and Germany against their civilian population.
The genesis of this program is obviously derived from known tactics such as bogus investigations, surveillance, smear campaigns, the use of noise, thefts, break-ins, character assassination, staged accidents, framing, sabotage and vandalism, mail interference, blacklisting, citizen informant squads for overt surveillance (Gang Stalking), poisoning and drugging, incarceration into prisons and mental institutions, and electromagnetic weaponry.
It is a historical fact that the U.S. has officially targeted its civilian population on multiple occasions. Programs such as MKULTRA and Cointelpro can't be denied.
The methods reportedly employed in these harassment campaigns, bear a striking resemblance to those attributed to the CIA and FBI during Operations MKULTRA, and COINTELPRO."
In Germany these methods were contained in two programs, Zersetzung and Directive Perceptions.
They were basically German versions of Cointelpro. Zersetzung was developed to destroy a targeted person's inner-self. Dr. Munzert, a German target, drew a parallel between the current program, and what occurred in East Germany.
He explains: "In Germany this is called Zersetzung and this means the dissolution or disintegration of the targeted person."
Anna Funder, for her non-fiction book, Stasiland. In it, she wrote, "The German word Zersetzung is harsh, and has no direct English equivalent." She described, "Zersetzung, as a concept, involves the annihilation of the inner-self."
It calls for, "the spreading of rumors about particular persons with the aid of anonymous [means]... making compromising situations for them by creating confusion over the facts... [and] the engendering of hysterical and depressive behaviors in the target person."
"Directive Perceptions," she continued, was another program designed to "develop apathy (in the [targeted] subject)... to achieve a situation in which his conflicts, whether of a social, personal, career, health or political kind are irreversible... to give rise to fears in him... to develop/create disappointments... to restrict his talents or capabilities... to reduce his capacity to act and... to harness dissensions and contradictions around him..."
These directives were used by the Ministry for State Security (MfS) against threats to state security. In other words, they were massively used on the population to maintain a dictatorship.
These programs were designed to secretly destroy a target's personal and professional life, ruin them financially, and prevent them from reaching their potential, with the intention to produce irreversible depressive and panic-stricken behaviors.
"Hidden in Plain View," many of us have experience with books where the goal is to find the hidden picture contained in the landscape.
Or the artwork, where if you look intently, you will eventually see a three-dimensional picture superimposed on a flat background. At first, most of us had some trouble detecting these hidden pictures, but with practice we usually see them. Once the detection mechanism is developed, these hidden objects become clearly visible with little effort. So too with Zersetzung and Cointelpro.
Once you know what to look for, these borderline-subliminal attacks are quite detectable.
So, rather than using a blunt overt attack against a fully functional person, they usually attack covertly, and conceal their harassment by using existing events that occurs naturally. There is usually cover for the harassment as well. However, it is probably a statistical rarity for some of these staged events to occur as often as they do. They conceal much of their harassment using what appears to be a simple formula.
There is a basic protocol that they begin with in all the NATO countries:
It begins with the surveillance of targets, monitoring of their private lives, and entry into their homes (break-ins). This is done so their personality traits can be cataloged.
There is a basic protocol that the perpetrators begin with, but the targeted individual contributes to the modification. They modify it based on the data that is collected on the targeted individual. They monitor the targeted individual's behavior, their reactions to certain stimuli and what bothers them, they look for weaknesses and the activities that make them angry or depressed.
After they are singled out for preliminary stages of harassment, Gang Stalking ensues, which is a part of a "softening-up process."
After a period of overt surveillance and organized group stalking, the Directed-energy weapons and Electronic warfare harassment gradually increases to extreme conditions. This pattern has unfolded consistently in all NATO countries.
Dr. Munzert speaks of basically the same pattern, which he describes as a "double-folded strategy."
"It is usually the same procedure," he announced, "but with individual variations." One part includes the victims being "attacked with microwave weapons," and "the other part of the strategy" he says, is to portray the targeted people as "mad [insane]."
He explained the effectiveness of this approach as "unbeatable," and reveals that this is essentially what the Stasi did to their targets. Part of this protocol appears to include elements of Neuro-linguistic Programming (NLP), which is a type of mind-control used by behaviorists to affect change. (NLP first originated inside the CIA with Richard Bandler and John Grinder.)
Some of the tactics below have been called Street Theatre, Harassment Skits, or Staged Events. They are planned harassment skits, such as blocking, or swarming. They also include informants who surround targets and have conversations intended to be overheard, which contain information about the target's personal life.
Presumably, citizen informants are told that this is necessary to let targeted people know they're being watched. This may happen in any public place. This is not a complete list of tactics but it includes some of the more common ones reported.
Some of these tactics will sound insane because they're deliberately designed to make someone appear as though they're suffering from a mental disorder. They were definitely created by experts in the behavioral sciences. In addition, people may be emotionally drained, and unable to properly identify or explain what's happening to them.
According to the DOJ, mental tactics designed to cause psychological harm must last for months or years before they constitute torture. The Hidden Evil fits this description.
So keep in mind, these are Psychological Warfare tactics which are intended to drive people crazy.
The mental health system is apparently being used worldwide to discredit targeted people who complain.
According to the book, Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas, countries around the world, including the U.S., have used doctors to help abuse and discredit people, often for political reasons. It is also a documented fact that there was collaboration between doctors and the military when experiments were carried out in prisons, hospitals, and universities on unwitting people in North America.
Some medical doctors, as well as psychiatrist and psychologists appear to be providing cover for this program. This is similar to what was done in Russia, where enemies of the dictatorship would be thrown into mental institutions and drugged beyond recovery.
The APA's refusal to acknowledge the impact of terrorization upon the human psyche, even given the publicity stemming from the Church Committee's findings in 1975, raises serious questions about the validity of psychiatry as a profession in this country, not to mention, the APA's ethical intent, in the long term.
The DSM is a diagnostic manual for identifying mental disorders.
The first edition of the DSM was released in 1952 at a time when the APA was under the control of Dr. Ewen Cameron, who would commit brutal government-sponsored torture under the MKULTRA program.
The Psychiatric Diagnostic Statistical Manual (DSM) for mental disorders, is a brilliant cover up operation in 18 languages to hide the atrocities of military and intelligence agencies' actions towards their targets. The manual lists all mind control actions as signs of "paranoid schizophrenia," and that all medical schools teach their students that the person is paranoid, "ESPECIALLY if he believes intelligence agencies are behind it all."
Never is the medical profession told that these are routine actions all over the world by intelligence agencies against their targets.
Dr. Munzert said that doctors, "first think of paranoia and schizophrenia" if someone complains of this program. He cautions that because of this, "victims" could end up in a "lunatic asylum."
Annie Earle, a Licensed Clinical Social Worker, and Board Certified Diplomat in her area of expertise, has over 25 years of psychotherapy experience as an independent practitioner. When referring to the DSM during an interview, she stated, "It's called the Diagnostic Statistical Manual... [and all] psychotherapists, regardless of specialty are required to give their patients a diagnosis from this manual, and in order to get the diagnosis you have to fulfill certain criteria that is clearly spelled out in the DSM."
Earle noticed a pattern unfolding when some of the people who came to her who did not fit the standard criteria. "The patients that started coming to me really did not fit any of the standard classifications," she explained.
"For example, they might be having what some people consider a psychotic or schizophrenic breakdown in that they might report what seem to be hallucinations, but they did not have any of the other criteria that goes along with schizophrenia. There are many criteria that one is required to... [detect] in making the diagnosis of schizophrenia, and these people did not meet all that criteria."
Apparently Earle became targeted herself while studying this program.
Interestingly, the April/May 1996 issue of Nexus Magazine contained an article entitled, How The NSA Harasses Thousands Of Law Abiding Americans Daily By The Usage Of Remote Neural Monitoring (RNM) written by former NSA worker John St. Clair Akwei.
It read, "NSA DOMINT [Domestic Intelligence] has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health." The DSM appears to have been created with a loophole which allows government-sponsored harassment programs to exist.
This was evidently done so that people will appear ill when explaining this to a mental health professional. Adding to this confusion, the program itself is designed to mimic mental illness when explained to those "not-in-the-know."
Mental health professionals may also participate in this program, wittingly or unwittingly by labeling targets as mentally ill. It is one of several layers of protection used to help keep this program operating in secrecy.
It's easy to see how some mental health professionals might "jump to conclusions."
Surveillance is apparently part of an ongoing bogus investigation that never ends.
The investigation may be done for reasons of "national security." Similarly, German and Russian security forces would often target the civilian population for the same reason. After a person is singled out, dwellings surrounding the target will be sublet and used by spies and intelligence agents.
If the target lives in a house, the spies will usually be the closest building to the house. If the target lives in an apartment, then the spies will be in one or more of the surrounding apartments. There will be unusual patterns of occupancy with lots of people coming and going into these vacancies. Vehicles and license plates used by the occupants of the bases may be periodically changed.
The spies who move into these vacanies have been linked to the DOJ, CIA, and other federal agencies, as well as Universities, and government defense contractors.
In order to target someone it requires that that person be put under surveillance, so that their personality traits, their capacity to inter-relate with people, their capacity for corruption or non-corruption (that seems to be a critical point), and even their religion factors into it.
The information obtained by surveillance is used for no ethical reason, other than to establish a harassment protocol, which will follow that targeted individual for the rest of his or her life. Neighbors, friends and family are then co-opted into the harassment.
This surveillance is done using very sophisticated spy satellite equipment. This equipment is used in combination with Directed Energy Weapons and other Electronic Warfare. See here and here for more.
Targets usually experience character assassination which is done to destroy their personal and professional life.
Half-truths and lies are often strategically spread into their lives, and may be the basis for a bogus investigation. The rumors circulated about people are apparently not petty, but shocking and repulsive. They are CIA or Stasi-type life-damaging lies. Some of the people spreading these lies may be acquaintances and/or family members that have been recruited (lied to, intimidated and blackmailed) into becoming informants.
U.S. Federal law enforcement has used these tactics to destroy people they either wanted to recruit as informants or those they knew they couldn't recruit and just wanted to destroy.
According to former CIA psychologist James Keehner, "It was planned destructiveness. First, you'd check to see if you could destroy a man's marriage. If you could, then that would be enough to put a lot of stress on that individual, to break him down. Then you might start a rumor campaign against him. Harass him constantly."
Constant harassment, planned destructiveness, character assassination, destroying relationships, all done in concert with the goal of breaking someone down are a standard part of this program.
Reportedly, the usual rumors spread about a person are that they are a pedophile, prostitute, terrorist, racist, anti-government, mentally ill, drug addict, drug dealer, or a threat to "national security." They are often spread to neighbors, friends, family, employers, etc. A major effort is spent to separate a person from their friends and families. See here and here for more about this.
Apparently these rumor campaigns aid in recruitment.
Deception is the name of the game, so recruits are told untrue sinister stories of their victims to keep them motivated.
According to CNN, the Stasi used the exact same tactics. They stated, "The agency was authorized to conduct secret smear campaigns against anyone it judged to be a threat..." The Russian KGB too, with its massive network of informants, would slander their internal targets.
These rumors may be propagated by multiple people (informants) behind a target's back. Apparently, not letting a targeted person become aware of these rumors is essential to their effectiveness.
Victor Santoro noted in his book, Gaslighting: How to Drive Your Enemies Crazy, that,
"The essence of defaming your target with rumors is it that it not get back to him." Many targeted people have rumors being spread about them that they are pedophiles.
The organizers realize that labeling someone a pedophile will be highly damaging and produce optimum leverage for gaining community support. It is probably one of the worst rumors you could launch against someone. The Stasi would destroy the character of their targets by labeling them as pedophiles as well.
There have been multiple magazine and newspaper reports of pedophiles being harassed by neighbors, and vigilante groups to the point where they are driven out of communities and forced out of work. Some have been driven out of multiple states.
An article in the Toronto Star entitled, Vigilantes Versus Pedophiles on August 8, 2004 outlined how one citizen's group called, Perverted-Justice, would start campaigns to expose people that they have concluded were potential pedophiles. This illustrates the mind-set of some groups of people who have reason to believe a person is a pedophile.
The Perverted Justice group is run by Xavier Von Erck (real name Phillip John Eide), at www.perverted-justice.com.
Upon visiting a site called Corrupted-Justice at www.corrupted-justice.com, I discovered that multiple members of Perverted Justice have endured trauma such as incest or other forms of sexual abuse and are suffering from a variety of mental disorders. The Corrupted-Justice site obtained this information from member profiles which are publicly available, and located at the Perverted-Justice website.
And according to Corrupted Justice, Eide is on record saying that more than 40% of his followers have endured this type of sexual abuse.
The Corrupted Justice site also has some very interesting message board chats (publicly available) by Perverted Justice members that are worth a look. Apparently the Corrupted Justice people have documented proof that members of Perverted Justice have hacked into their web server. The Corrupted Justice people are for the full prosecution of potential sex offenders by using law enforcement equipped with the checks and balances built into the legal system.
The Corrupted Justice group basically says that although the Perverted Justice system appears to be beneficial, it is heavily corrupted. In fact, it would not surprise if there is some sort of connection between Perverted Justice and the Intelligence industry.
Most Perverted Justice "busts" do not include law enforcement. According to the article in the Toronto Star and the Corrupted Justice website, the volunteers at Perverted Justice instead begin a relentless campaign to expose people they believe are pedophiles by calling friends, neighbors, children, places of employment and ruining personal and professional relationships.
This is similar to what targeted people experience, as indicated by the behavior of their friends, family and co-workers. But they're never told about it. Perverted Justicde is listed as a potential destructive cult by the Rick A. Ross Institute for the Study of Destructive Cults, www.Rickross.com.
It appears that some Perverted Justice members have a psychological need to feel powerful and meet that need by displaying to the public and their targets how they can destroy a life. I believe that some of these volunteers are ill and have latent sadistic intentions, despite their patriotic motives. Apparently some of them receive a sick type of enjoyment/empowerment by ruining the lives of people, as evident by their chats.
Character assassination is standard. My research leads me to conclude that it is not beyond these people to masquerade as "concerned citizens" and call local officials to register destructive complaints about a targeted person. I'm fairly certain they do this.
This type of "community service" can be very damaging, especially when the complaints originate from multiple, seemingly unconnected sources.
Some of the sensitivity tactics used by these groups are borderline-subliminal attacks designed to artificially create phobias.
They are apparently based on Neuro-Linguistic Programming (NLP). You can think of NLP as a very powerful tool that can be used to produce rapid, profound change. The parts of NLP that groups use are anchors and triggers.
The goal of a these sensitivity programs appears to be to condition people with damaging emotions which are linked to triggers such as objects, colors, movements, and sounds. Once this is done, a target can be covertly injured openly in public. This may happen with or without the target's conscious awareness.
As I'll demonstrate, this is brutally violent. There is a basic protocol that the perpetrators begin with, but the TI contributes to the modification." A "pavalonian conditioning" program, is used to get targeted people to "respond emotionally to a particular trigger."
These negative emotions are then "built into the protocol."
It's an ongoing process. They will stalk the target for a while... to condition them, and make them "confused and frightened." Self-help gurus use these programs to create positive emotional states and anchor them to a movement, a sound or an object.
Then the sound, movement, or object becomes the trigger that will invoke the emotion. Although this sounds complex it is pretty simple in practice. It is done by creating a peak emotional state, and then while in that state, you anchor it, that is, do something repeatedly.
This effectively anchors the emotional state to whatever was repeatedly done. "A stimulus which is linked to and triggers a physiological state is called an anchor in NLP," stated O'Connor and Seymour in their book, Introducing NLP.
They ask, "How are anchors created?"
"First by repetition... Secondly, and much more important, anchors can be set in a single instance if the emotion is strong and the timing is right." This process of creating anchors has also been called Emotional Transference.
We're unconsciously creating anchors in our environment all the time with people, music, places, and objects. These stalking groups are obviously led by people knowledgeable in the behavioral sciences. The groups are used to create negative emotional states in targeted people, such as fear and anxiety, and anchor them to common objects.
This is the deliberate creation of a phobia!
O'Connor and Seymour declare, "An external stimulus can trigger a very powerful negative state."
"This is the realm of phobias," they warn. This is nothing less than using violence to create an injury and then deliberately irritating it. Targets are constantly monitored and if a target responds emotionally to a particular trigger, that will be built into the protocol. Organizations known to have studied NLP include military intelligence agencies, CIA, FBI, and other state bureaus of investigation.
According to an article called, Non-Lethality, which appeared in June 1993 issue of Lobster Magazine, in the early 1980s, Dr. John Alexander taught NLP to "selected general officers and Senior Executive Service members" as a "set of techniques to modify behavior patterns."
Some of the references used in this article were taken from Dr. Alexander's book, The Warrior's Edge, which was co-authored by Janet Morris, who, according to the article, was a student of the Silva course in advanced mind-control. In the Structure chapter, I'll provide evidence that Dr. Alexander and Janet Morris have contributed to the creation of this program on behalf of the Think Tanks, as part of a political agenda.
In their book, Dr. Alexander and Janet Morris wrote, "In 1983, the NLP training group, along with John Alexander, was engaged to teach these skills to several members of Congress, including Al Gore and Tom Downey, under the auspices of Congressmen Clearing House on the Future, a bipartisan activity established to provide information to congressmen when they request it."
He continued, "One organization that played a major role in the dissemination of NLP skills was the U.S. Army Intelligence and Security Command (INSCOM)... Unlike the rest of the U.S. Army, INSCOM does not differentiate between wartime and peacetime roles."
According to his Bio, available at www.platinumstudios.com, Dr. Alexander has worked at,
"the highest levels of government," such as "the White House Staff, National Security Council, Members of Congress, Director of Central Intelligence, and senior defense officials."
Morris' Bio, available at www.m2tech.us, is similar. Some of the organizations she's worked with include: the White House Office of Science and Technology Policy, Office of the Secretary of Defense, the Marine Corps Warfighting Lab, etc.
"Anchoring," stated Morris and Alexander, "is based on the neurophysiological assumption that patterns of behavior can be installed, then reactivated whenever a similar situation is encountered or created... Knowing this, you can intentionally install anchors to return your target to specific emotional states. The first step is [to] create the desired emotional state in the individual."
There has been some concern in the mental health field over the potential misuse of NLP.
Unfortunately, like other tools, such as guns, they can be misused in the wrong hands. Andreas and Faulkner warned of the "possible uses and misuses of this technology," in their book, NLP: The New Technology of Achievement.
They wrote, "We recognize the incredible power," of NLP and "recommend you exercise caution..."
The deliberate infliction of emotional pain is an act of violence. The use of NLP in this manner is similar to a physical attack such as a punch or kick, only it leaves no visible injury.
Here's an example of how groups use NLP to make you aware that you're being stalked: One morning you're walking out to your car and a man walks in front of you, stares directly at you in a hostile manner while repeatedly clicking his pen the whole time. You feel a little uneasy and say to yourself, "Boy that was weird, what was his problem?"
Then two hours later you're leaving a shopping mall on a day that it was not particularly crowded. As you walk out to your car, an old lady approaches you on foot. As she almost collides with you, she locks her eyes onto you with a hostile demeanor, while clicking a pen the whole time. Then maybe you tell yourself something like this. "There couldn't be a relation between those events, probably just a coincidence. But they both stared at me in such a mean way while hammering their pens..."
Later in the afternoon, you're on your way home. You're at a stoplight and out of the corner of your eye you see a passenger in the car to your left. You hear a slight noise, and glance over. You see a man glaring at you with a grin on his face. His arm is hanging out the window and he is holding a pen, which he is repeatedly clicking. Now imagine that happening for a month. Then a few days later you're on a sidewalk with a friend or family member. A man walks by, doesn't look at either one of you, but clicks his pen a couple of times. You feel anxious and afraid. You may not even know you've been sensitized.
One reason people may not realize that they're targeted or can't remember exactly when it began, is because these groups may slowly and gradually increase the harassment over time. But if you did recognize it as an attack, what would you tell your friend or family member?
This is what happened: The collisions, blatant hostile staring, and foul grin created the negative emotions and anchored them to the pen, which has now become the trigger. That is an example of a sensitivity program. Now imagine yourself being sensitized to multiple objects and sounds, and each of them creating pain each time you see or hear them.
Targets around the world have witnessed this being done with sounds, gestures, cell phones, laptops, pens, cars, watches, clothing, symbols, colors, and other items. This type of attack does require some maintenance and will loose its potency unless it is reinforced. So groups will reinforce these anchors and triggers with an occasional blitz attack from time to time.
The example above is a simple tactic which groups can use to let you know that you're being harassed in public. But there are many other attacks which NLP can be used for. For instance, you have recently experienced an extremely traumatizing event (which may have been facilitated by a faction of this network), such as an accident, death of a family member or pet, or some type of a brutal assault.
Those who have you under surveillance know that there is a color, object, or sound that you've linked (anchored) massive pain to. Then shortly afterward, you are stalked by multiple people who carry that object, wear that color, or utter that phrase. This brings to the surface all the emotional pain you suffered during that experience.
Imagine this happening again and again, every time you go outside. Now think what it would be like if your family and friends started to participate.
Groups will take an object you've been sensitized to and link it to another object. The idea appears to be to keep expanding the amount of objects you associate fear, anxiety, anger, or shame with. For instance, one of your neighbors has made it clear that they're participating in the harassment. Now, you know they're participating, and they know you know.
So they may try to sensitize you to another stimulus such as a car alarm.
Because you've already associated them with massive pain, they can extend their harassment to a sound by turning their car alarm on/off in rapid succession over a short period of time, multiple times throughout the day. After they've done this for a couple of days and you've been sensitized to this sound, they can reduce their use of this specific tactic and just use the occasional maintenance sounds to inflict pain.
Now instead of repeatedly turning it on/off ten times, they only do it two or three times in a row, just to let you know you're being attacked. Even though it's only done a couple times in a row, you know why they're doing it and you may feel anger, fear, anxiety or other negative emotions. You may also feel frustrated at the prospect of trying to explain this harassment to another individual.
Anyone else observing this might think it's a little strange that someone would turn their alarm on/off a few times but they'd probably write it off as an isolated strange incident. But because they have not had your experience with that sound, and are not aware that it is a small part of a much larger harassment program, it would be difficult to explain that those beeps were attacks.
In NLP, the process of copying an emotional state from an existing trigger to a new trigger is called chaining.
O'Connor and Seymour state, "Anchors can be chained so that one leads to another. Each anchor provides a link on the chain and triggers the next one, just as the electrical impulse flows from nerve to nerve in our body."
After a person has been sensitized to a color or object, the article can become a unification symbol for the group, much like a uniform. For instance, after a person has been sensitized to the color red, she is surrounded by people wearing red cloths in public. Furthermore, this is an adaptable uniform because it can be changed in less than five minutes. If a person who realizes that they're being Gang Stalked has been sensitized to red, then the organizers of these groups can simply have them blitzed by a horde of citizens wearing the color blue.
The harassment has now been chained to this color. Most likely, these uniforms also help promote group cohesiveness, and may foster feelings of empowerment among stalkers.
Another techique intelligence agencies do is to use electromagnetic weapons (radar, satellite,) and nanotechnology to put something in your brain right before it happens to you. They will do this constantly. People have to realize that there are foor soldiers and agents watching you with satellites. They also have access to your brain, your EEG, ears, eyes, your vitals, blood pressure and heartrate etc. They tell the foot soldiers what they are planning to anchor, and they put it in your brain before the foot soldiers do it so you focus specifically on what they are doing. This makes the anchoring process even more effective.
Space invasion includes blocking, cut-offs, and swarming or what some TIs refer to as, crowding.
Targets may be encircled by people wearing colors or holding objects that they've been sensitized to. Prolonged crowding can have an extremely negative effect on your mental/emotional health. The people who designed this harassment program were obviously well aware of this.
While some cultures may be more immune to crowding than others, even people from parts of the world that have been historically crowded react stressfully to crowding. People who have not been invited into your personal space but deliberately violate it are attacking you.
Body language is more accurate and reliable than verbal communication. Most of this non-verbal communication is unconscious. The study of this language has been called Social Kinesics (the study of body communication). There are two components to this communication: One contains movements, gestures, postures, the other is spatial relationships. The study of communication using distance/space is called Proxemics.
For most North Americans the intimate zone is 0-18 inches and personal space is 1 -4 feet. This type of communication is used to harass a person. For instance, while in stores, restaurants and public places that are not busy, a target will have people invading their personal space. This happens even if there are only two customers in a store.
If a targeted person makes a move from one place to another, several people may suddenly appear and jump out in front of him from around corners and isles.
The deliberate space invasion use by these people is designed to look like normal cut-offs and collisions that we all experience from time to time. It can happen with vehicles, on foot, or a combination.
This type of space invasion is obviously intended to startle people and make them tense. It can be thought of as a virtual slap. They are used in blind areas such as corners, hallways, restrooms, or intersections where targets have people or cars cutting them off, or almost hitting them in a calculated manner.
This happens in stores, buildings and on the street, with people and vehicles.
With some artificially induced cut-offs, the perpetrator is seen at a distance. The target and the perpetrator(s) are heading toward the same focal point which is used to maximize crowding. The point may be a corner, a very small walkway, a thin passageway, or an obstruction on the sidewalk such as a telephone pole or a tree.
The informants adjust their timing so that they meet the target at the exact point where there is the least amount of space for all parties to pass, thus maximizing the invasion of the target's space.
Apparently the idea is to get the target's attention and make them uncomfortable. When standing in a checkout-line, targets may routinely have group members standing a foot or closer behind them. And rather than wait for a target to leave, they may crowd them as they reach to the side or in front of the target to put their items on the counter.
If a target is outdoors in a populated area, he or she may see a wave of people move in the direction that they're headed in order to swarm them.
If a target moves, then stops and waits for a few moments, they may see that the activity will settle back to normal again after the horde passes. This test can be run indoors and outdoors as well. Sometimes the horde may blatantly adjust their timing, or linger for a while until the target begins to move again, then they'll continue.
These crowding and blocking tactics amount to an obstacle course that follows people wherever they go. They will also block targets, both on foot and with vehicles. For instance, as a target leaves a parking lot, a vehicle or person will be in the way, usually for a few moments. These things happen to everyone, once in a while, but for targets, it happens consistently, regardless of the time of day or how busy the area is.
This space invasion happens on days/times that there are normally not many people. It happens in stores while making purchases, restaurants, businesses, where targets have people frequently cutting them off, invading their space, using sensitivity programs, or other harassment tactics. If there is one customer in the store, they will probably be invading the target's space.
For instance, a TI is indoors when it is not crowded, but witnesses multiple people who, instead of taking the shortest path to their destination, go double or triple the distance just so they can brush by them or cut them off.
All targets of Zersetzung are familiar with noise campaigns.
Basically, targets report experiencing a steady stream of noise consisting of a rotation of various types of disturbances around their homes. This includes door slamming, yelling, car alarms, horns, tires screeching, loud music, engines revving, and frequent construction projects which include an assortment of noise from heavy machinery and tools.
Not surprisingly, in his books Future War and Winning the War, Dr. Alexander described using noise as a weapon. In Future War he wrote, "Audible sound, in frequencies from 20 to 20,000 hertz, can be applied to influence behavior, as most people are sensitive to very loud noises."(***)
For instance, if you're targeted, there will be doors slamming for a few moments, several minutes of silence will ensue, then a motorcycle will drive by and rev its engine outside of your house.
After that you'll have someone mowing the lawn. Then there will be alarms going off. After that you'll hear a loud crowd of people walk by your house. Then you may then hear fire or ambulance sirens. Then there will be hammering and sawing sounds from the ongoing construction projects. Then you'll hear car alarms being turned on/off in succession multiple times from multiple vehicles around your house.
There will generally not be a solid five minutes of uninterrupted peace.
"Noise campaigns" can include anything from the frequent and constant vehicles with "blaring horns" and sirens of fire trucks, police cars or ambulances, or people yelling out something similar to what you were recently thinking, talking or doing. (This also happens when you go on the internet to popular websites, (mainstream or alternative,) Facebook accounts, YouTube channel owners or Twitter account owners, An agent watches you constantly, they watch your internet habits and contact people at the internet destinations that you frequent the most, the agents tell them you are regular visitor to the website (they slander or spread a rumor about you,) and gets people to participate in stalking you. They may even offer to pay them to do it.
Targets experience frequent harassment which is used on a recurrent basis under circumstances intended to persuade the individual that he or she is under surveillance. (Much of this is mimicry and copying.) The people above a targeted individual may loudly pace as they mimic his or her movements from above. For instance, if you're targeted, as you walk into your bathroom, you hear loud stomping from above which follows you into the bathroom.
A number of individuals report that occupants of upstairs and downstairs apartments appear to follow them from room to room, tapping on the floor or engaging in other activities which appear intended to advertise an ongoing surveillance. They'll "pace in their apartment," and seemingly to the target underneath them, "it sounds like they're being tracked... from the apartment above."
If you're targeted, helicopters and small propeller planes may frequently pass over your home also.
Some of these aircrafts may be low enough to vibrate the room you're in. According to Cheryl Welsh, the use of helicopters is a common tactic reported by targets. Apparently these overhead assaults are used for sleep disruption and to undermine the morale of targeted people.
Welsh is one of only six Non-lethal Weapons experts in the world recognized by the United Nations. This noise may follow you to destinations you frequently visit. Foot and vehicular traffic may be re-routed through your street, causing an unnatural amount of vehicles driving by your house (even if you're on a side or dead-end street).
Noises made as they leave also appear to serve as a form of communication to alert group members in the area to begin pursuit. In addition to the standard noise package, whatever noise would naturally occur in the area you live will also be increased in frequency. For instance, if a target lives in a rural area then noisy chainsaws will be quite regular.
And in the winter there may be frequent loud snowmobiles that pass near the area.
In this manner, noise is used as a weapon to inflict pain. Chronic exposure to even low-level noise is considered a health hazard that has been known to produce adverse physiological & psychological health effects. Prolonged exposure to noise can produce high blood pressure, a rise in cholesterol, damage to the circulatory, cardiovascular, gastrointestinal, & musculoskeletal systems.
If you're targeted & pregnant or plan on having a baby, you may want to think twice. Noise has been known to cause hearing loss & growth disturbances in a fetus, & can lead to birth defects.
Prolonged stress in general has been known to cause miscarriages, and some who have been stalked and harassed over a period of time have attributed their miscarriages to ongoing harassment. Just as the fabricated cut-offs are likened to getting slapped, these noises are the equivalent of being repeatedly shocked.
The creators of this program are obviously aware that these noise campaigns are acts of violence.
Groups will try to synchronize their tactics with things that targets do such as entering or leaving their homes.
The target's movements will be synchronized with vehicles or people coming or going, or other movements. These synchronization tactics are often done several times, perhaps three or more.
If a target has a habit of going to the bathroom at 2 AM and looking out his bathroom window at a specific area, then they will eventually arrange it so that there is some sort of activity going on at that time.
This is an example of the level of detail that they will resort to when tailoring a harassment protocol to the profile of a target.
Synchronization is also used with sensitivity tactics and noise. For instance, if you're targeted, you'll hear ambulance or fire truck sirens the moment you enter or leave your house. Or car alarms, hammering or some other type of noise will occur as you look out the window. As you leave your home, you may notice people walking by, wearing a color or holding an object that you've been sensitized to.
If you pull into a parking lot, there will usually be cars arriving or leaving. Synchronization is also used with blocking/crowding. For instance, as you approach a store's entrance, people will be either walking in or leaving.
They will often be wearing a color or holding an object that you have been sensitized to.
A variation of this is echoing and mirroring. Like other forms of non-verbal communication, echoing and mirroring are very powerful, (but usually unconscious) ways of interrelating. This form of information exchange has been outlined in the book, Secrets of Sexual Body Language: Understanding Non-Verbal Communication, by Martin Lloyed-Elliot.
Most of us speak this language without even knowing it to attract others. However, this form of communication has evidently been incorporated into this program as a tool to annoy targets. With echoing for instance, if a target is in a restaurant, or on public transportation, and they drink then an informant next to them will drink. If they pull out a cell phone, then the informant will produce a cell pone or similar device.
When the target puts it away, so do they. In essence, they will mimic the movements of a target.
With mirroring for example, targets may frequently have a person or group of people walking parallel to them, in the same direction on the other side of a street, or any public area. Also, there may be someone directly in front of the target, and approaching the same intersection that they're approaching.
The informants adjust their timing so they approach at the same time, and cross the street just as the target does, at which point crowding may occur. The informant(s) may also be wearing red, holding cell a phone or another device, which the target has been sensitized to.
Dr. Alexander and Janet Morris also spoke of the use of mirroring to influence people, in their book, The Warrior's Edge.
Commonly used routes are used as avenues for various types of Street Theatre that unfold as targets pass through.
Street Theatre is used during group stalking and contains verbal and non-verbal harassment, threats, insults, intimidation, and violence, conveyed overtly, or covertly using themes, symbolism, or other medium. They may be carried out after a target has been sensitized using NLP. This harassment can be relayed with metaphors, verbal remarks, and symbolism using clothing or other items.
Stalkers may be speaking on their cell phone and loudly accent the insult as they walk by and stare at targeted people. Blatant, hostile or smirking stares are also common. Sometimes they may not be on the phone and may just overtly insult you as they walk by.
As an example, I have people walk by me and say things like fuck you, fuck-up, fuck-head, you're disgusting, etc. I've also witnessed them spit in my direction as I walk by them and have seen this spitting tactic used by teenagers who would spit on the lawn while I was on the front porch as they passed by my former residence.
Some words carry with them a particular weight to potentially trigger an effect on a person's emotional state.
For instance, if you're at a restaurant you may have a couple sit down at a table next to you, and mention some events that are taking place in your personal life, in order to get your attention. After that they may make repeated references words such as paranoid, crazy, scared, panic, insane, freak, sad, depressed, etc. The idea is that the words will invoke the emotion.
Not only is this possible, but it works best when you don't know it's being done to you.
This tactic appears to be a variation of a pacing technique used in hypnosis. It involves first linking something to the subject's ongoing experience (or personal life) and then using certain words intended to evoke a particular response.
Morris and Alexander refer to these words as "verbal anchors" and state, "Verbal anchors can also be effective tools... Words such as freeze or duck transmit complete messages... Verbal anchors can elicit both positive and negative states."
In addition these words can be emphasized by changing their tone and volume when they're spoken, so that some words are slightly louder and spoken longer than the others.
This can completely change the meaning of a message. This is called metacommunication.
Metamessages are suggestions hidden in a statement, perhaps a compliment. The tone, volume, and rhythm of specific words in the sentence are changed so that the actual message is different than what the spoken words are. "It's hard to defend against the anger and disapproval expressed in negative metamessages," stated McKay, Davis, and Fanning, in their book, Messages: The Communication Skills Book. "The attack is often so subtle that you aren't aware of exactly how you've been hurt..." The basic function of metamessages," they say, "is to say something covertly that you're afraid to say directly.
Since metamessage attack is covert, there is little chance of overt retaliation." These metamessages are quite similar to indirect imbedded messages used in hypnosis.
In the book, Patterns of Hypnotic Techniques of Milton H. Erickson, M.D., Richard Bandler and John Grinder provide examples of a master hypnotist named Erickson.
Describing this type of covert communication, they write, "Imbedded commands serve the purpose of making suggestions to the client indirectly and, thereby, making it difficult to resist in any way... These are most effective when they are also marked analogically by emphasizing the command and by looking intently at the listener, if their eyes are open."
It appears a variation of this message can be conveyed with multiple people blitzing a person with cut-offs while talking on their cell phones, looking directly at the person and emphasizing (metacommunication) weighted words and/or information about the person's personal life that was obtained from surveillance.
Groups will also use these phony conversations to harass targets in stores, restaurants, public places, elevators, etc. Recurrent negative comments by strangers that are apparently intended to evoke feelings of "paranoia" are common. The stalkers operate in large groups over a long period of time - seemingly with the support or approval of the government.
Bandler and Grinder describe a positive use of this tactic when quoting Erickson addressing an anxious patient, with, "My friends tell me to feel comfortable and to loosen up when we are out on the town."
Note that the italicized words are emphasized when spoken. This tactic can be used even if the intended subject is not being addressed directly, hence the name "Indirect Imbedded Command."
Again, something about the target's personal life or real-time ongoing experience is mentioned near him so he will identify himself as the subject, then weighted words conveying insults are used.
These covert public mocking tactics using trigger words which are intended to evoke negative emotions, are based on NLP/hypnosis, and seem to be the result of an in-depth study of hypnosis by the CIA which occurred during the MKULTRA period.
"When we hear something, even from another conversation, we can't help but make images and sounds of it in our head," announce Adreas and Faulkner. "The professional persuader knows this intuitively. In NLP we know it explicitly."
They affirm, "You cannot NOT communicate."
The use of NLP/hypnosis by these citizen stalkers as directed by their handlers is obviously intended to drive people insane. Victor Santoro explains how these tactics can be used in a destructive format, as a way to "foster your target's paranoia" and "suggest that he's being mocked..."
He explains, "If you can get several accomplices to do this... he'll get the feeling that mockery and ridicule of him are widespread." Santoro's book seems to have some accurate information pertaining to this program, which makes me wonder if at some point he was employed as an intelligence agent.
At any rate, these techniques were obviously designed by experts in the behavioral sciences.
After a target has been sensitized, they can even be harassed, insulted, and threatened with symbolism using articles of clothing, newspapers, and other items. Just as body communication (Social Kinesics) is used to harass a target, so too is symbolic communication. Symbolism can be used with articles of clothing, especially during a wave attack where a target is blitzed by a crowd of informants who smile, laugh, stare at them, and cut them off as they pass.
Some of the messages may include: Stop and Die, Big Bro, Watch Your Back, as well as Satanic, Freemasonry symbols.
An attention-getting tactic may be used. It can be a cut-off, blatant stare, loud noise, or other sensitivity tactics.
In essence, they will take an event that is unfolding in a target's personal life and make references to it using any number of methods. Interestingly, an article in the San Francisco Bay Guardian, on October 22, 2004, entitled, The New COINTELPRO, stated similar that tactics were being used on protesters at anti-corporate rallies.
The theme may pertain to something in your personal life. They may play on this theme for a single day, a series of days, or weeks. In addition, they may choose a theme and try to project it into your life. Personally, I doubt that most of the citizens who are used to flash these messages are aware of their meaning.
It is interesting to note that the idea for the Stasi came from the Bolsheviks and the Cheka. It absolutely must be mentioned that Jews played a leading role in the development of Bolshevism and the Cheka. (To learn more about this, see here, here, here, here and here.) They have also played a major role in the development of the new Homeland Security laws. Also, see this post about classified technology that allows them to stalk, harass and torture you remotely.
Zersetzung Tactics
Presumably, this is done so you'll collapse after experiencing recurrent emotional violence, which is compounded after you've realized that all normal support structures and avenues of grievance have been removed. There appears to be multiple levels of intensity of this program that people can receive. The two main parts of the program are group stalking and Non-lethal Weapons (NLW). Both are violent attacks. And some are apparently hit hard with both.
People tend to associate the word harassment with acts of temporary aggravation or pestering. Therefore, it may not by the proper word to describe the never-ending acts of covert violence inflicted upon targeted people, which amounts to torture and murder. Some of the tactics used in these programs are borderline-subliminal, which is why they are so difficult to detect, explain, and defend against.
It is my goal to make the unconscious, conscious. Many of these tactics are a type of mind-control.
Most of these tactics have been used in former Cointelpro operations by the United States, Russia, and Germany against their civilian population.
The genesis of this program is obviously derived from known tactics such as bogus investigations, surveillance, smear campaigns, the use of noise, thefts, break-ins, character assassination, staged accidents, framing, sabotage and vandalism, mail interference, blacklisting, citizen informant squads for overt surveillance (Gang Stalking), poisoning and drugging, incarceration into prisons and mental institutions, and electromagnetic weaponry.
It is a historical fact that the U.S. has officially targeted its civilian population on multiple occasions. Programs such as MKULTRA and Cointelpro can't be denied.
The methods reportedly employed in these harassment campaigns, bear a striking resemblance to those attributed to the CIA and FBI during Operations MKULTRA, and COINTELPRO."
In Germany these methods were contained in two programs, Zersetzung and Directive Perceptions.
They were basically German versions of Cointelpro. Zersetzung was developed to destroy a targeted person's inner-self. Dr. Munzert, a German target, drew a parallel between the current program, and what occurred in East Germany.
He explains: "In Germany this is called Zersetzung and this means the dissolution or disintegration of the targeted person."
Anna Funder, for her non-fiction book, Stasiland. In it, she wrote, "The German word Zersetzung is harsh, and has no direct English equivalent." She described, "Zersetzung, as a concept, involves the annihilation of the inner-self."
It calls for, "the spreading of rumors about particular persons with the aid of anonymous [means]... making compromising situations for them by creating confusion over the facts... [and] the engendering of hysterical and depressive behaviors in the target person."
"Directive Perceptions," she continued, was another program designed to "develop apathy (in the [targeted] subject)... to achieve a situation in which his conflicts, whether of a social, personal, career, health or political kind are irreversible... to give rise to fears in him... to develop/create disappointments... to restrict his talents or capabilities... to reduce his capacity to act and... to harness dissensions and contradictions around him..."
These directives were used by the Ministry for State Security (MfS) against threats to state security. In other words, they were massively used on the population to maintain a dictatorship.
These programs were designed to secretly destroy a target's personal and professional life, ruin them financially, and prevent them from reaching their potential, with the intention to produce irreversible depressive and panic-stricken behaviors.
"Hidden in Plain View," many of us have experience with books where the goal is to find the hidden picture contained in the landscape.
Or the artwork, where if you look intently, you will eventually see a three-dimensional picture superimposed on a flat background. At first, most of us had some trouble detecting these hidden pictures, but with practice we usually see them. Once the detection mechanism is developed, these hidden objects become clearly visible with little effort. So too with Zersetzung and Cointelpro.
Once you know what to look for, these borderline-subliminal attacks are quite detectable.
So, rather than using a blunt overt attack against a fully functional person, they usually attack covertly, and conceal their harassment by using existing events that occurs naturally. There is usually cover for the harassment as well. However, it is probably a statistical rarity for some of these staged events to occur as often as they do. They conceal much of their harassment using what appears to be a simple formula.
Basic Protocol
It begins with the surveillance of targets, monitoring of their private lives, and entry into their homes (break-ins). This is done so their personality traits can be cataloged.
There is a basic protocol that the perpetrators begin with, but the targeted individual contributes to the modification. They modify it based on the data that is collected on the targeted individual. They monitor the targeted individual's behavior, their reactions to certain stimuli and what bothers them, they look for weaknesses and the activities that make them angry or depressed.
After they are singled out for preliminary stages of harassment, Gang Stalking ensues, which is a part of a "softening-up process."
After a period of overt surveillance and organized group stalking, the Directed-energy weapons and Electronic warfare harassment gradually increases to extreme conditions. This pattern has unfolded consistently in all NATO countries.
Dr. Munzert speaks of basically the same pattern, which he describes as a "double-folded strategy."
"It is usually the same procedure," he announced, "but with individual variations." One part includes the victims being "attacked with microwave weapons," and "the other part of the strategy" he says, is to portray the targeted people as "mad [insane]."
He explained the effectiveness of this approach as "unbeatable," and reveals that this is essentially what the Stasi did to their targets. Part of this protocol appears to include elements of Neuro-linguistic Programming (NLP), which is a type of mind-control used by behaviorists to affect change. (NLP first originated inside the CIA with Richard Bandler and John Grinder.)
Some of the tactics below have been called Street Theatre, Harassment Skits, or Staged Events. They are planned harassment skits, such as blocking, or swarming. They also include informants who surround targets and have conversations intended to be overheard, which contain information about the target's personal life.
Presumably, citizen informants are told that this is necessary to let targeted people know they're being watched. This may happen in any public place. This is not a complete list of tactics but it includes some of the more common ones reported.
Some of these tactics will sound insane because they're deliberately designed to make someone appear as though they're suffering from a mental disorder. They were definitely created by experts in the behavioral sciences. In addition, people may be emotionally drained, and unable to properly identify or explain what's happening to them.
According to the DOJ, mental tactics designed to cause psychological harm must last for months or years before they constitute torture. The Hidden Evil fits this description.
So keep in mind, these are Psychological Warfare tactics which are intended to drive people crazy.
Mental Health System
The mental health system is apparently being used worldwide to discredit targeted people who complain.
According to the book, Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas, countries around the world, including the U.S., have used doctors to help abuse and discredit people, often for political reasons. It is also a documented fact that there was collaboration between doctors and the military when experiments were carried out in prisons, hospitals, and universities on unwitting people in North America.
Some medical doctors, as well as psychiatrist and psychologists appear to be providing cover for this program. This is similar to what was done in Russia, where enemies of the dictatorship would be thrown into mental institutions and drugged beyond recovery.
The APA's refusal to acknowledge the impact of terrorization upon the human psyche, even given the publicity stemming from the Church Committee's findings in 1975, raises serious questions about the validity of psychiatry as a profession in this country, not to mention, the APA's ethical intent, in the long term.
The DSM is a diagnostic manual for identifying mental disorders.
The first edition of the DSM was released in 1952 at a time when the APA was under the control of Dr. Ewen Cameron, who would commit brutal government-sponsored torture under the MKULTRA program.
The Psychiatric Diagnostic Statistical Manual (DSM) for mental disorders, is a brilliant cover up operation in 18 languages to hide the atrocities of military and intelligence agencies' actions towards their targets. The manual lists all mind control actions as signs of "paranoid schizophrenia," and that all medical schools teach their students that the person is paranoid, "ESPECIALLY if he believes intelligence agencies are behind it all."
Never is the medical profession told that these are routine actions all over the world by intelligence agencies against their targets.
Dr. Munzert said that doctors, "first think of paranoia and schizophrenia" if someone complains of this program. He cautions that because of this, "victims" could end up in a "lunatic asylum."
Annie Earle, a Licensed Clinical Social Worker, and Board Certified Diplomat in her area of expertise, has over 25 years of psychotherapy experience as an independent practitioner. When referring to the DSM during an interview, she stated, "It's called the Diagnostic Statistical Manual... [and all] psychotherapists, regardless of specialty are required to give their patients a diagnosis from this manual, and in order to get the diagnosis you have to fulfill certain criteria that is clearly spelled out in the DSM."
Earle noticed a pattern unfolding when some of the people who came to her who did not fit the standard criteria. "The patients that started coming to me really did not fit any of the standard classifications," she explained.
"For example, they might be having what some people consider a psychotic or schizophrenic breakdown in that they might report what seem to be hallucinations, but they did not have any of the other criteria that goes along with schizophrenia. There are many criteria that one is required to... [detect] in making the diagnosis of schizophrenia, and these people did not meet all that criteria."
Apparently Earle became targeted herself while studying this program.
Interestingly, the April/May 1996 issue of Nexus Magazine contained an article entitled, How The NSA Harasses Thousands Of Law Abiding Americans Daily By The Usage Of Remote Neural Monitoring (RNM) written by former NSA worker John St. Clair Akwei.
It read, "NSA DOMINT [Domestic Intelligence] has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health." The DSM appears to have been created with a loophole which allows government-sponsored harassment programs to exist.
This was evidently done so that people will appear ill when explaining this to a mental health professional. Adding to this confusion, the program itself is designed to mimic mental illness when explained to those "not-in-the-know."
Mental health professionals may also participate in this program, wittingly or unwittingly by labeling targets as mentally ill. It is one of several layers of protection used to help keep this program operating in secrecy.
It's easy to see how some mental health professionals might "jump to conclusions."
Surveillance
The investigation may be done for reasons of "national security." Similarly, German and Russian security forces would often target the civilian population for the same reason. After a person is singled out, dwellings surrounding the target will be sublet and used by spies and intelligence agents.
If the target lives in a house, the spies will usually be the closest building to the house. If the target lives in an apartment, then the spies will be in one or more of the surrounding apartments. There will be unusual patterns of occupancy with lots of people coming and going into these vacancies. Vehicles and license plates used by the occupants of the bases may be periodically changed.
The spies who move into these vacanies have been linked to the DOJ, CIA, and other federal agencies, as well as Universities, and government defense contractors.
In order to target someone it requires that that person be put under surveillance, so that their personality traits, their capacity to inter-relate with people, their capacity for corruption or non-corruption (that seems to be a critical point), and even their religion factors into it.
The information obtained by surveillance is used for no ethical reason, other than to establish a harassment protocol, which will follow that targeted individual for the rest of his or her life. Neighbors, friends and family are then co-opted into the harassment.
This surveillance is done using very sophisticated spy satellite equipment. This equipment is used in combination with Directed Energy Weapons and other Electronic Warfare. See here and here for more.
Character Assassination
Targets usually experience character assassination which is done to destroy their personal and professional life.
Half-truths and lies are often strategically spread into their lives, and may be the basis for a bogus investigation. The rumors circulated about people are apparently not petty, but shocking and repulsive. They are CIA or Stasi-type life-damaging lies. Some of the people spreading these lies may be acquaintances and/or family members that have been recruited (lied to, intimidated and blackmailed) into becoming informants.
U.S. Federal law enforcement has used these tactics to destroy people they either wanted to recruit as informants or those they knew they couldn't recruit and just wanted to destroy.
According to former CIA psychologist James Keehner, "It was planned destructiveness. First, you'd check to see if you could destroy a man's marriage. If you could, then that would be enough to put a lot of stress on that individual, to break him down. Then you might start a rumor campaign against him. Harass him constantly."
Constant harassment, planned destructiveness, character assassination, destroying relationships, all done in concert with the goal of breaking someone down are a standard part of this program.
Reportedly, the usual rumors spread about a person are that they are a pedophile, prostitute, terrorist, racist, anti-government, mentally ill, drug addict, drug dealer, or a threat to "national security." They are often spread to neighbors, friends, family, employers, etc. A major effort is spent to separate a person from their friends and families. See here and here for more about this.
Apparently these rumor campaigns aid in recruitment.
Deception is the name of the game, so recruits are told untrue sinister stories of their victims to keep them motivated.
According to CNN, the Stasi used the exact same tactics. They stated, "The agency was authorized to conduct secret smear campaigns against anyone it judged to be a threat..." The Russian KGB too, with its massive network of informants, would slander their internal targets.
These rumors may be propagated by multiple people (informants) behind a target's back. Apparently, not letting a targeted person become aware of these rumors is essential to their effectiveness.
Victor Santoro noted in his book, Gaslighting: How to Drive Your Enemies Crazy, that,
"The essence of defaming your target with rumors is it that it not get back to him." Many targeted people have rumors being spread about them that they are pedophiles.
The organizers realize that labeling someone a pedophile will be highly damaging and produce optimum leverage for gaining community support. It is probably one of the worst rumors you could launch against someone. The Stasi would destroy the character of their targets by labeling them as pedophiles as well.
There have been multiple magazine and newspaper reports of pedophiles being harassed by neighbors, and vigilante groups to the point where they are driven out of communities and forced out of work. Some have been driven out of multiple states.
An article in the Toronto Star entitled, Vigilantes Versus Pedophiles on August 8, 2004 outlined how one citizen's group called, Perverted-Justice, would start campaigns to expose people that they have concluded were potential pedophiles. This illustrates the mind-set of some groups of people who have reason to believe a person is a pedophile.
The Perverted Justice group is run by Xavier Von Erck (real name Phillip John Eide), at www.perverted-justice.com.
Upon visiting a site called Corrupted-Justice at www.corrupted-justice.com, I discovered that multiple members of Perverted Justice have endured trauma such as incest or other forms of sexual abuse and are suffering from a variety of mental disorders. The Corrupted-Justice site obtained this information from member profiles which are publicly available, and located at the Perverted-Justice website.
And according to Corrupted Justice, Eide is on record saying that more than 40% of his followers have endured this type of sexual abuse.
The Corrupted Justice site also has some very interesting message board chats (publicly available) by Perverted Justice members that are worth a look. Apparently the Corrupted Justice people have documented proof that members of Perverted Justice have hacked into their web server. The Corrupted Justice people are for the full prosecution of potential sex offenders by using law enforcement equipped with the checks and balances built into the legal system.
The Corrupted Justice group basically says that although the Perverted Justice system appears to be beneficial, it is heavily corrupted. In fact, it would not surprise if there is some sort of connection between Perverted Justice and the Intelligence industry.
Most Perverted Justice "busts" do not include law enforcement. According to the article in the Toronto Star and the Corrupted Justice website, the volunteers at Perverted Justice instead begin a relentless campaign to expose people they believe are pedophiles by calling friends, neighbors, children, places of employment and ruining personal and professional relationships.
This is similar to what targeted people experience, as indicated by the behavior of their friends, family and co-workers. But they're never told about it. Perverted Justicde is listed as a potential destructive cult by the Rick A. Ross Institute for the Study of Destructive Cults, www.Rickross.com.
It appears that some Perverted Justice members have a psychological need to feel powerful and meet that need by displaying to the public and their targets how they can destroy a life. I believe that some of these volunteers are ill and have latent sadistic intentions, despite their patriotic motives. Apparently some of them receive a sick type of enjoyment/empowerment by ruining the lives of people, as evident by their chats.
Character assassination is standard. My research leads me to conclude that it is not beyond these people to masquerade as "concerned citizens" and call local officials to register destructive complaints about a targeted person. I'm fairly certain they do this.
This type of "community service" can be very damaging, especially when the complaints originate from multiple, seemingly unconnected sources.
Sensitivity Programs (NLP)
Some of the sensitivity tactics used by these groups are borderline-subliminal attacks designed to artificially create phobias.
They are apparently based on Neuro-Linguistic Programming (NLP). You can think of NLP as a very powerful tool that can be used to produce rapid, profound change. The parts of NLP that groups use are anchors and triggers.
The goal of a these sensitivity programs appears to be to condition people with damaging emotions which are linked to triggers such as objects, colors, movements, and sounds. Once this is done, a target can be covertly injured openly in public. This may happen with or without the target's conscious awareness.
As I'll demonstrate, this is brutally violent. There is a basic protocol that the perpetrators begin with, but the TI contributes to the modification." A "pavalonian conditioning" program, is used to get targeted people to "respond emotionally to a particular trigger."
These negative emotions are then "built into the protocol."
It's an ongoing process. They will stalk the target for a while... to condition them, and make them "confused and frightened." Self-help gurus use these programs to create positive emotional states and anchor them to a movement, a sound or an object.
Then the sound, movement, or object becomes the trigger that will invoke the emotion. Although this sounds complex it is pretty simple in practice. It is done by creating a peak emotional state, and then while in that state, you anchor it, that is, do something repeatedly.
This effectively anchors the emotional state to whatever was repeatedly done. "A stimulus which is linked to and triggers a physiological state is called an anchor in NLP," stated O'Connor and Seymour in their book, Introducing NLP.
They ask, "How are anchors created?"
"First by repetition... Secondly, and much more important, anchors can be set in a single instance if the emotion is strong and the timing is right." This process of creating anchors has also been called Emotional Transference.
We're unconsciously creating anchors in our environment all the time with people, music, places, and objects. These stalking groups are obviously led by people knowledgeable in the behavioral sciences. The groups are used to create negative emotional states in targeted people, such as fear and anxiety, and anchor them to common objects.
This is the deliberate creation of a phobia!
O'Connor and Seymour declare, "An external stimulus can trigger a very powerful negative state."
"This is the realm of phobias," they warn. This is nothing less than using violence to create an injury and then deliberately irritating it. Targets are constantly monitored and if a target responds emotionally to a particular trigger, that will be built into the protocol. Organizations known to have studied NLP include military intelligence agencies, CIA, FBI, and other state bureaus of investigation.
According to an article called, Non-Lethality, which appeared in June 1993 issue of Lobster Magazine, in the early 1980s, Dr. John Alexander taught NLP to "selected general officers and Senior Executive Service members" as a "set of techniques to modify behavior patterns."
Some of the references used in this article were taken from Dr. Alexander's book, The Warrior's Edge, which was co-authored by Janet Morris, who, according to the article, was a student of the Silva course in advanced mind-control. In the Structure chapter, I'll provide evidence that Dr. Alexander and Janet Morris have contributed to the creation of this program on behalf of the Think Tanks, as part of a political agenda.
In their book, Dr. Alexander and Janet Morris wrote, "In 1983, the NLP training group, along with John Alexander, was engaged to teach these skills to several members of Congress, including Al Gore and Tom Downey, under the auspices of Congressmen Clearing House on the Future, a bipartisan activity established to provide information to congressmen when they request it."
He continued, "One organization that played a major role in the dissemination of NLP skills was the U.S. Army Intelligence and Security Command (INSCOM)... Unlike the rest of the U.S. Army, INSCOM does not differentiate between wartime and peacetime roles."
According to his Bio, available at www.platinumstudios.com, Dr. Alexander has worked at,
"the highest levels of government," such as "the White House Staff, National Security Council, Members of Congress, Director of Central Intelligence, and senior defense officials."
Morris' Bio, available at www.m2tech.us, is similar. Some of the organizations she's worked with include: the White House Office of Science and Technology Policy, Office of the Secretary of Defense, the Marine Corps Warfighting Lab, etc.
"Anchoring," stated Morris and Alexander, "is based on the neurophysiological assumption that patterns of behavior can be installed, then reactivated whenever a similar situation is encountered or created... Knowing this, you can intentionally install anchors to return your target to specific emotional states. The first step is [to] create the desired emotional state in the individual."
There has been some concern in the mental health field over the potential misuse of NLP.
Unfortunately, like other tools, such as guns, they can be misused in the wrong hands. Andreas and Faulkner warned of the "possible uses and misuses of this technology," in their book, NLP: The New Technology of Achievement.
They wrote, "We recognize the incredible power," of NLP and "recommend you exercise caution..."
The deliberate infliction of emotional pain is an act of violence. The use of NLP in this manner is similar to a physical attack such as a punch or kick, only it leaves no visible injury.
Here's an example of how groups use NLP to make you aware that you're being stalked: One morning you're walking out to your car and a man walks in front of you, stares directly at you in a hostile manner while repeatedly clicking his pen the whole time. You feel a little uneasy and say to yourself, "Boy that was weird, what was his problem?"
Then two hours later you're leaving a shopping mall on a day that it was not particularly crowded. As you walk out to your car, an old lady approaches you on foot. As she almost collides with you, she locks her eyes onto you with a hostile demeanor, while clicking a pen the whole time. Then maybe you tell yourself something like this. "There couldn't be a relation between those events, probably just a coincidence. But they both stared at me in such a mean way while hammering their pens..."
Later in the afternoon, you're on your way home. You're at a stoplight and out of the corner of your eye you see a passenger in the car to your left. You hear a slight noise, and glance over. You see a man glaring at you with a grin on his face. His arm is hanging out the window and he is holding a pen, which he is repeatedly clicking. Now imagine that happening for a month. Then a few days later you're on a sidewalk with a friend or family member. A man walks by, doesn't look at either one of you, but clicks his pen a couple of times. You feel anxious and afraid. You may not even know you've been sensitized.
One reason people may not realize that they're targeted or can't remember exactly when it began, is because these groups may slowly and gradually increase the harassment over time. But if you did recognize it as an attack, what would you tell your friend or family member?
This is what happened: The collisions, blatant hostile staring, and foul grin created the negative emotions and anchored them to the pen, which has now become the trigger. That is an example of a sensitivity program. Now imagine yourself being sensitized to multiple objects and sounds, and each of them creating pain each time you see or hear them.
Targets around the world have witnessed this being done with sounds, gestures, cell phones, laptops, pens, cars, watches, clothing, symbols, colors, and other items. This type of attack does require some maintenance and will loose its potency unless it is reinforced. So groups will reinforce these anchors and triggers with an occasional blitz attack from time to time.
The example above is a simple tactic which groups can use to let you know that you're being harassed in public. But there are many other attacks which NLP can be used for. For instance, you have recently experienced an extremely traumatizing event (which may have been facilitated by a faction of this network), such as an accident, death of a family member or pet, or some type of a brutal assault.
Those who have you under surveillance know that there is a color, object, or sound that you've linked (anchored) massive pain to. Then shortly afterward, you are stalked by multiple people who carry that object, wear that color, or utter that phrase. This brings to the surface all the emotional pain you suffered during that experience.
Imagine this happening again and again, every time you go outside. Now think what it would be like if your family and friends started to participate.
Groups will take an object you've been sensitized to and link it to another object. The idea appears to be to keep expanding the amount of objects you associate fear, anxiety, anger, or shame with. For instance, one of your neighbors has made it clear that they're participating in the harassment. Now, you know they're participating, and they know you know.
So they may try to sensitize you to another stimulus such as a car alarm.
Because you've already associated them with massive pain, they can extend their harassment to a sound by turning their car alarm on/off in rapid succession over a short period of time, multiple times throughout the day. After they've done this for a couple of days and you've been sensitized to this sound, they can reduce their use of this specific tactic and just use the occasional maintenance sounds to inflict pain.
Now instead of repeatedly turning it on/off ten times, they only do it two or three times in a row, just to let you know you're being attacked. Even though it's only done a couple times in a row, you know why they're doing it and you may feel anger, fear, anxiety or other negative emotions. You may also feel frustrated at the prospect of trying to explain this harassment to another individual.
Anyone else observing this might think it's a little strange that someone would turn their alarm on/off a few times but they'd probably write it off as an isolated strange incident. But because they have not had your experience with that sound, and are not aware that it is a small part of a much larger harassment program, it would be difficult to explain that those beeps were attacks.
In NLP, the process of copying an emotional state from an existing trigger to a new trigger is called chaining.
O'Connor and Seymour state, "Anchors can be chained so that one leads to another. Each anchor provides a link on the chain and triggers the next one, just as the electrical impulse flows from nerve to nerve in our body."
After a person has been sensitized to a color or object, the article can become a unification symbol for the group, much like a uniform. For instance, after a person has been sensitized to the color red, she is surrounded by people wearing red cloths in public. Furthermore, this is an adaptable uniform because it can be changed in less than five minutes. If a person who realizes that they're being Gang Stalked has been sensitized to red, then the organizers of these groups can simply have them blitzed by a horde of citizens wearing the color blue.
The harassment has now been chained to this color. Most likely, these uniforms also help promote group cohesiveness, and may foster feelings of empowerment among stalkers.
Another techique intelligence agencies do is to use electromagnetic weapons (radar, satellite,) and nanotechnology to put something in your brain right before it happens to you. They will do this constantly. People have to realize that there are foor soldiers and agents watching you with satellites. They also have access to your brain, your EEG, ears, eyes, your vitals, blood pressure and heartrate etc. They tell the foot soldiers what they are planning to anchor, and they put it in your brain before the foot soldiers do it so you focus specifically on what they are doing. This makes the anchoring process even more effective.
Space Invasion (Crowding)
Space invasion includes blocking, cut-offs, and swarming or what some TIs refer to as, crowding.
Targets may be encircled by people wearing colors or holding objects that they've been sensitized to. Prolonged crowding can have an extremely negative effect on your mental/emotional health. The people who designed this harassment program were obviously well aware of this.
While some cultures may be more immune to crowding than others, even people from parts of the world that have been historically crowded react stressfully to crowding. People who have not been invited into your personal space but deliberately violate it are attacking you.
Body language is more accurate and reliable than verbal communication. Most of this non-verbal communication is unconscious. The study of this language has been called Social Kinesics (the study of body communication). There are two components to this communication: One contains movements, gestures, postures, the other is spatial relationships. The study of communication using distance/space is called Proxemics.
For most North Americans the intimate zone is 0-18 inches and personal space is 1 -4 feet. This type of communication is used to harass a person. For instance, while in stores, restaurants and public places that are not busy, a target will have people invading their personal space. This happens even if there are only two customers in a store.
If a targeted person makes a move from one place to another, several people may suddenly appear and jump out in front of him from around corners and isles.
The deliberate space invasion use by these people is designed to look like normal cut-offs and collisions that we all experience from time to time. It can happen with vehicles, on foot, or a combination.
This type of space invasion is obviously intended to startle people and make them tense. It can be thought of as a virtual slap. They are used in blind areas such as corners, hallways, restrooms, or intersections where targets have people or cars cutting them off, or almost hitting them in a calculated manner.
This happens in stores, buildings and on the street, with people and vehicles.
With some artificially induced cut-offs, the perpetrator is seen at a distance. The target and the perpetrator(s) are heading toward the same focal point which is used to maximize crowding. The point may be a corner, a very small walkway, a thin passageway, or an obstruction on the sidewalk such as a telephone pole or a tree.
The informants adjust their timing so that they meet the target at the exact point where there is the least amount of space for all parties to pass, thus maximizing the invasion of the target's space.
Apparently the idea is to get the target's attention and make them uncomfortable. When standing in a checkout-line, targets may routinely have group members standing a foot or closer behind them. And rather than wait for a target to leave, they may crowd them as they reach to the side or in front of the target to put their items on the counter.
If a target is outdoors in a populated area, he or she may see a wave of people move in the direction that they're headed in order to swarm them.
If a target moves, then stops and waits for a few moments, they may see that the activity will settle back to normal again after the horde passes. This test can be run indoors and outdoors as well. Sometimes the horde may blatantly adjust their timing, or linger for a while until the target begins to move again, then they'll continue.
These crowding and blocking tactics amount to an obstacle course that follows people wherever they go. They will also block targets, both on foot and with vehicles. For instance, as a target leaves a parking lot, a vehicle or person will be in the way, usually for a few moments. These things happen to everyone, once in a while, but for targets, it happens consistently, regardless of the time of day or how busy the area is.
This space invasion happens on days/times that there are normally not many people. It happens in stores while making purchases, restaurants, businesses, where targets have people frequently cutting them off, invading their space, using sensitivity programs, or other harassment tactics. If there is one customer in the store, they will probably be invading the target's space.
For instance, a TI is indoors when it is not crowded, but witnesses multiple people who, instead of taking the shortest path to their destination, go double or triple the distance just so they can brush by them or cut them off.
Noise Campaigns
All targets of Zersetzung are familiar with noise campaigns.
Basically, targets report experiencing a steady stream of noise consisting of a rotation of various types of disturbances around their homes. This includes door slamming, yelling, car alarms, horns, tires screeching, loud music, engines revving, and frequent construction projects which include an assortment of noise from heavy machinery and tools.
Not surprisingly, in his books Future War and Winning the War, Dr. Alexander described using noise as a weapon. In Future War he wrote, "Audible sound, in frequencies from 20 to 20,000 hertz, can be applied to influence behavior, as most people are sensitive to very loud noises."(***)
For instance, if you're targeted, there will be doors slamming for a few moments, several minutes of silence will ensue, then a motorcycle will drive by and rev its engine outside of your house.
After that you'll have someone mowing the lawn. Then there will be alarms going off. After that you'll hear a loud crowd of people walk by your house. Then you may then hear fire or ambulance sirens. Then there will be hammering and sawing sounds from the ongoing construction projects. Then you'll hear car alarms being turned on/off in succession multiple times from multiple vehicles around your house.
There will generally not be a solid five minutes of uninterrupted peace.
"Noise campaigns" can include anything from the frequent and constant vehicles with "blaring horns" and sirens of fire trucks, police cars or ambulances, or people yelling out something similar to what you were recently thinking, talking or doing. (This also happens when you go on the internet to popular websites, (mainstream or alternative,) Facebook accounts, YouTube channel owners or Twitter account owners, An agent watches you constantly, they watch your internet habits and contact people at the internet destinations that you frequent the most, the agents tell them you are regular visitor to the website (they slander or spread a rumor about you,) and gets people to participate in stalking you. They may even offer to pay them to do it.
Targets experience frequent harassment which is used on a recurrent basis under circumstances intended to persuade the individual that he or she is under surveillance. (Much of this is mimicry and copying.) The people above a targeted individual may loudly pace as they mimic his or her movements from above. For instance, if you're targeted, as you walk into your bathroom, you hear loud stomping from above which follows you into the bathroom.
A number of individuals report that occupants of upstairs and downstairs apartments appear to follow them from room to room, tapping on the floor or engaging in other activities which appear intended to advertise an ongoing surveillance. They'll "pace in their apartment," and seemingly to the target underneath them, "it sounds like they're being tracked... from the apartment above."
If you're targeted, helicopters and small propeller planes may frequently pass over your home also.
Some of these aircrafts may be low enough to vibrate the room you're in. According to Cheryl Welsh, the use of helicopters is a common tactic reported by targets. Apparently these overhead assaults are used for sleep disruption and to undermine the morale of targeted people.
Welsh is one of only six Non-lethal Weapons experts in the world recognized by the United Nations. This noise may follow you to destinations you frequently visit. Foot and vehicular traffic may be re-routed through your street, causing an unnatural amount of vehicles driving by your house (even if you're on a side or dead-end street).
Noises made as they leave also appear to serve as a form of communication to alert group members in the area to begin pursuit. In addition to the standard noise package, whatever noise would naturally occur in the area you live will also be increased in frequency. For instance, if a target lives in a rural area then noisy chainsaws will be quite regular.
And in the winter there may be frequent loud snowmobiles that pass near the area.
In this manner, noise is used as a weapon to inflict pain. Chronic exposure to even low-level noise is considered a health hazard that has been known to produce adverse physiological & psychological health effects. Prolonged exposure to noise can produce high blood pressure, a rise in cholesterol, damage to the circulatory, cardiovascular, gastrointestinal, & musculoskeletal systems.
If you're targeted & pregnant or plan on having a baby, you may want to think twice. Noise has been known to cause hearing loss & growth disturbances in a fetus, & can lead to birth defects.
Prolonged stress in general has been known to cause miscarriages, and some who have been stalked and harassed over a period of time have attributed their miscarriages to ongoing harassment. Just as the fabricated cut-offs are likened to getting slapped, these noises are the equivalent of being repeatedly shocked.
The creators of this program are obviously aware that these noise campaigns are acts of violence.
Synchronization
Groups will try to synchronize their tactics with things that targets do such as entering or leaving their homes.
The target's movements will be synchronized with vehicles or people coming or going, or other movements. These synchronization tactics are often done several times, perhaps three or more.
If a target has a habit of going to the bathroom at 2 AM and looking out his bathroom window at a specific area, then they will eventually arrange it so that there is some sort of activity going on at that time.
This is an example of the level of detail that they will resort to when tailoring a harassment protocol to the profile of a target.
Synchronization is also used with sensitivity tactics and noise. For instance, if you're targeted, you'll hear ambulance or fire truck sirens the moment you enter or leave your house. Or car alarms, hammering or some other type of noise will occur as you look out the window. As you leave your home, you may notice people walking by, wearing a color or holding an object that you've been sensitized to.
If you pull into a parking lot, there will usually be cars arriving or leaving. Synchronization is also used with blocking/crowding. For instance, as you approach a store's entrance, people will be either walking in or leaving.
They will often be wearing a color or holding an object that you have been sensitized to.
A variation of this is echoing and mirroring. Like other forms of non-verbal communication, echoing and mirroring are very powerful, (but usually unconscious) ways of interrelating. This form of information exchange has been outlined in the book, Secrets of Sexual Body Language: Understanding Non-Verbal Communication, by Martin Lloyed-Elliot.
Most of us speak this language without even knowing it to attract others. However, this form of communication has evidently been incorporated into this program as a tool to annoy targets. With echoing for instance, if a target is in a restaurant, or on public transportation, and they drink then an informant next to them will drink. If they pull out a cell phone, then the informant will produce a cell pone or similar device.
When the target puts it away, so do they. In essence, they will mimic the movements of a target.
With mirroring for example, targets may frequently have a person or group of people walking parallel to them, in the same direction on the other side of a street, or any public area. Also, there may be someone directly in front of the target, and approaching the same intersection that they're approaching.
The informants adjust their timing so they approach at the same time, and cross the street just as the target does, at which point crowding may occur. The informant(s) may also be wearing red, holding cell a phone or another device, which the target has been sensitized to.
Dr. Alexander and Janet Morris also spoke of the use of mirroring to influence people, in their book, The Warrior's Edge.
Harassment Skits (Street Theatre)
Commonly used routes are used as avenues for various types of Street Theatre that unfold as targets pass through.
Street Theatre is used during group stalking and contains verbal and non-verbal harassment, threats, insults, intimidation, and violence, conveyed overtly, or covertly using themes, symbolism, or other medium. They may be carried out after a target has been sensitized using NLP. This harassment can be relayed with metaphors, verbal remarks, and symbolism using clothing or other items.
Stalkers may be speaking on their cell phone and loudly accent the insult as they walk by and stare at targeted people. Blatant, hostile or smirking stares are also common. Sometimes they may not be on the phone and may just overtly insult you as they walk by.
As an example, I have people walk by me and say things like fuck you, fuck-up, fuck-head, you're disgusting, etc. I've also witnessed them spit in my direction as I walk by them and have seen this spitting tactic used by teenagers who would spit on the lawn while I was on the front porch as they passed by my former residence.
Some words carry with them a particular weight to potentially trigger an effect on a person's emotional state.
For instance, if you're at a restaurant you may have a couple sit down at a table next to you, and mention some events that are taking place in your personal life, in order to get your attention. After that they may make repeated references words such as paranoid, crazy, scared, panic, insane, freak, sad, depressed, etc. The idea is that the words will invoke the emotion.
Not only is this possible, but it works best when you don't know it's being done to you.
This tactic appears to be a variation of a pacing technique used in hypnosis. It involves first linking something to the subject's ongoing experience (or personal life) and then using certain words intended to evoke a particular response.
Morris and Alexander refer to these words as "verbal anchors" and state, "Verbal anchors can also be effective tools... Words such as freeze or duck transmit complete messages... Verbal anchors can elicit both positive and negative states."
In addition these words can be emphasized by changing their tone and volume when they're spoken, so that some words are slightly louder and spoken longer than the others.
This can completely change the meaning of a message. This is called metacommunication.
Metamessages are suggestions hidden in a statement, perhaps a compliment. The tone, volume, and rhythm of specific words in the sentence are changed so that the actual message is different than what the spoken words are. "It's hard to defend against the anger and disapproval expressed in negative metamessages," stated McKay, Davis, and Fanning, in their book, Messages: The Communication Skills Book. "The attack is often so subtle that you aren't aware of exactly how you've been hurt..." The basic function of metamessages," they say, "is to say something covertly that you're afraid to say directly.
Since metamessage attack is covert, there is little chance of overt retaliation." These metamessages are quite similar to indirect imbedded messages used in hypnosis.
In the book, Patterns of Hypnotic Techniques of Milton H. Erickson, M.D., Richard Bandler and John Grinder provide examples of a master hypnotist named Erickson.
Describing this type of covert communication, they write, "Imbedded commands serve the purpose of making suggestions to the client indirectly and, thereby, making it difficult to resist in any way... These are most effective when they are also marked analogically by emphasizing the command and by looking intently at the listener, if their eyes are open."
It appears a variation of this message can be conveyed with multiple people blitzing a person with cut-offs while talking on their cell phones, looking directly at the person and emphasizing (metacommunication) weighted words and/or information about the person's personal life that was obtained from surveillance.
Groups will also use these phony conversations to harass targets in stores, restaurants, public places, elevators, etc. Recurrent negative comments by strangers that are apparently intended to evoke feelings of "paranoia" are common. The stalkers operate in large groups over a long period of time - seemingly with the support or approval of the government.
Bandler and Grinder describe a positive use of this tactic when quoting Erickson addressing an anxious patient, with, "My friends tell me to feel comfortable and to loosen up when we are out on the town."
Note that the italicized words are emphasized when spoken. This tactic can be used even if the intended subject is not being addressed directly, hence the name "Indirect Imbedded Command."
Again, something about the target's personal life or real-time ongoing experience is mentioned near him so he will identify himself as the subject, then weighted words conveying insults are used.
These covert public mocking tactics using trigger words which are intended to evoke negative emotions, are based on NLP/hypnosis, and seem to be the result of an in-depth study of hypnosis by the CIA which occurred during the MKULTRA period.
"When we hear something, even from another conversation, we can't help but make images and sounds of it in our head," announce Adreas and Faulkner. "The professional persuader knows this intuitively. In NLP we know it explicitly."
They affirm, "You cannot NOT communicate."
The use of NLP/hypnosis by these citizen stalkers as directed by their handlers is obviously intended to drive people insane. Victor Santoro explains how these tactics can be used in a destructive format, as a way to "foster your target's paranoia" and "suggest that he's being mocked..."
He explains, "If you can get several accomplices to do this... he'll get the feeling that mockery and ridicule of him are widespread." Santoro's book seems to have some accurate information pertaining to this program, which makes me wonder if at some point he was employed as an intelligence agent.
At any rate, these techniques were obviously designed by experts in the behavioral sciences.
After a target has been sensitized, they can even be harassed, insulted, and threatened with symbolism using articles of clothing, newspapers, and other items. Just as body communication (Social Kinesics) is used to harass a target, so too is symbolic communication. Symbolism can be used with articles of clothing, especially during a wave attack where a target is blitzed by a crowd of informants who smile, laugh, stare at them, and cut them off as they pass.
Some of the messages may include: Stop and Die, Big Bro, Watch Your Back, as well as Satanic, Freemasonry symbols.
An attention-getting tactic may be used. It can be a cut-off, blatant stare, loud noise, or other sensitivity tactics.
In essence, they will take an event that is unfolding in a target's personal life and make references to it using any number of methods. Interestingly, an article in the San Francisco Bay Guardian, on October 22, 2004, entitled, The New COINTELPRO, stated similar that tactics were being used on protesters at anti-corporate rallies.
The theme may pertain to something in your personal life. They may play on this theme for a single day, a series of days, or weeks. In addition, they may choose a theme and try to project it into your life. Personally, I doubt that most of the citizens who are used to flash these messages are aware of their meaning.
Sunday, January 24, 2016
Zersetzung - The Origins of Modern Day Homeland Security and the Police State
I have written previously about the Stasi and Homeland Security. It is interesting to note that the idea for the Stasi came from the Bolsheviks and the Cheka. It absolutely must be mentioned that Jews played a leading role in the development of Bolshevism and the Cheka. (To learn more about this, see here, here, here, here and here.) They have also played a major role in the development of the new Homeland Security laws. Also, see this post about classified technology that allows them to stalk, harass and torture you remotely. Now, along with reading the main article about Zersetzung below, I highly recommend reading the following articles when you have the time:
1. An Interesting Video About Smearing Political Enemies
2. Homeland Security - Organized Stalking and Militant Zionism
3. Homeland Security and the Alternative Media Agenda
4. The Stasi Octopus
5. Stasi Influence on Canada & United States - The Informant Society
6. Download FREE STASI Tactics book
7. Stasi Take Down
8. Front Groups and Intelligence Agents
9. How to Discredit Someone - Slander and Stalking
10. Mind Control and Mind Reading Technology - Is Edward Snowden a Fake?
11. Mind Control: the NSA and CIA
14. RCMP Targets Muslim Extremists, But Gives Zionist Terrorists Free Pass
15. RCMP + CSEC + CSIS = Stasi
Zersetzung (German; variously translated as decomposition, corrosion, undermining, biodegradation or dissolution) was a psychological technique of the East German secret police, the Stasi used to silence political opponents. The "measures of Zersetzung", defined in the framework of a directive on police procedures in 1976, were used in the context of so-called "operational procedures" (in German Operative Vorgänge or OV). They replaced the overt terror of the Ulbricht era.
The practice of repression in Zersetzung comprised extensive and secret methods of control and psychological manipulation, including personal relationships of the target, for which the Stasi relied on its network of informal collaborators, (in German inoffizielle Mitarbeiter or IM), the State's power over institutions, and on operational psychology. Using targeted psychological attacks the Stasi tried to deprive a dissident of any chance of a "hostile action".
The use of Zersetzung is well documented, thanks to numerous Stasi files published after East Germany's Wende. Several thousands, or up to 10,000 individuals are estimated to have become victims: 5,000 of whom sustained irreversible damage. Pensions for restitution have been created for the victims.
"...a method of operation by the Ministry for State Security for an efficacious struggle against subversive activities, particularly in the treatment of operations. With Zersetzung one can influence hostile and negative individuals across different operational political activities, especially the hostile and negative aspects of their dispositions and beliefs, so these are abandoned and changed little by little, and, if applicable, the contradictions and differences between the hostile and negative forces would be laid open, exploited, and reinforced.
The goal of Zersetzung is the fragmentation, paralysis, disorganization, and isolation of the hostile and negative forces, in order to preventatively impede the hostile and negative activities, to largely restrict, or to totally avert them, and if applicable to prepare the ground for a political and ideological reestablishment.
Zersetzung is equally an immediate constitutive element of "operational procedures" and other preventive activities to impede hostile gatherings. The principal forces to execute Zersetzung are the inofficial collaborators. Zersetzung presupposes information and significant proof of hostile activities planned, prepared, and accomplished as well as anchor points corresponding to measures of Zersetzung.
Zersetzung must be produced on the basis of a root cause analysis of the facts and the exact definition of a concrete goal. Zersetzung must be executed in a uniform and supervised manner; its results must be documented.
The political explosive force of Zersetzung heightens demands regarding the maintenance of secrecy."
Methodology
Although its techniques had been established effectively by the late 1950s, Zersetzung was not defined in terms of a scientific method until the mid-1970s, and only then began to be carried out in a systematic manner in the 1970s and 1980s. It is difficult to determine how many people were targeted, since the sources have been deliberately and considerably redacted; it is known, however, that tactics varied in scope, and that a number of different departments implemented them.
Overall there was a ratio of four or five authorized Zersetzung operators for each targeted group, and three for each individual. Some sources indicate that around 5,000 people were “persistently victimized” by Zersetzung. At the College of Legal Studies, the number of dissertations submitted on the subject of Zersetzung was in double figures. It also had a comprehensive 50-page Zersetzung teaching manual, which included numerous examples of its practice.
The Stasi considered the "measures of Zersetzung" rather in part as an instrument that was used when judiciary procedures were not convenient, or for political reasons such as the international image of the GDR. In certain cases, the Stasi attempted meanwhile to knowingly inculpate an individual, as for example in the case of Wolf Biermann: The Stasi set him up with minors, hoping that he would allow himself to be seduced, and that they could then pursue criminal charges. The crimes that they researched for such accusations were non-political, as for example drug possession, trafficking in customs or currencies, theft, financial fraud, and rape.
a systematic degradation of reputation, image, and prestige in a database on one part true, verifiable and degrading, and on the other part false, plausible, irrefutable, and always degrading; a systematic organization of social and professional failures for demolishing the self-confidence of the individual; [...] stimulation of doubts with respect to perspectives on the future; stimulation of mistrust or mutual suspicion among groups [...]; putting in place spatial and temporal obstacles rendering impossible or at least, difficult the reciprocal relations of a group [...], for example by [...] assigning distant workplaces. —Directive No. 1/76 of January 1976 for the development of "operational procedures".
Beginning with intelligence obtained by espionage, the Stasi established "sociograms" and "psychograms" which it applied for the psychological forms of Zersetzung. They exploited personal traits, such as homosexuality, as well as supposed character weaknesses of the targeted individual — for example a professional failure, negligence of parental duties, pornographic interests, divorce, alcoholism, dependence on medications, criminal tendencies, passion for a collection or a game, or contacts with circles of the extreme right — or even the veil of shame from the rumors poured out upon one's circle of acquaintances. From the point of view of the Stasi, the measures were the most fruitful when they were applied in connection with a personality; all "schematism" had to be avoided.
…the Stasi often used a method which was really diabolic. It was called Zersetzung, and it's described in another guideline. The word is difficult to translate because it means originally "biodegradation." But actually, it's a quite accurate description. The goal was to destroy secretly the self-confidence of people, for example by damaging their reputation, by organizing failures in their work, and by destroying their personal relationships. Considering this, East Germany was a very modern dictatorship. The Stasi didn't try to arrest every dissident. It preferred to paralyze them, and it could do so because it had access to so much personal information and to so many institutions.
—Hubertus Knabe, German historian
Moreover, methods of Zersetzung included espionage, overt, hidden, and feigned; opening letters and listening to telephone calls; encroachments on private property; manipulation of vehicles; and even poisoning food and using false medications. Certain collaborators of the Stasi tacitly took into account the suicide of victims of Zersetzung.
It has not been definitely established that the Stasi used x-rays to provoke long-term health problems in its opponents. That said, Rudolf Bahro, Gerulf Pannach, and Jürgen Fuchs, three important dissidents who had been imprisoned at the same time, died of cancer within an interval of two years. A study by the Federal Commissioner for the Records of the State Security Service of the former GDR (Bundesbeauftragte für die Unterlagen des Staatssicherheitsdienstes der ehemaligen Deutschen Demokratischen Republik or BStU) has meanwhile rejected on the basis of extant documents such a fraudulent use of x-rays, and only mentions isolated and unintentional cases of the harmful use of sources of radiation, for example... to mark documents.
In the name of the target, the Stasi made little announcements, ordered products, and made emergency calls, to terrorize him/her. To threaten or intimidate or cause psychoses the Stasi assured itself of access to the target's living quarters and left visible traces of its presence, by adding, removing, and modifying objects.
1. An Interesting Video About Smearing Political Enemies
2. Homeland Security - Organized Stalking and Militant Zionism
3. Homeland Security and the Alternative Media Agenda
4. The Stasi Octopus
5. Stasi Influence on Canada & United States - The Informant Society
6. Download FREE STASI Tactics book
7. Stasi Take Down
8. Front Groups and Intelligence Agents
9. How to Discredit Someone - Slander and Stalking
10. Mind Control and Mind Reading Technology - Is Edward Snowden a Fake?
11. Mind Control: the NSA and CIA
14. RCMP Targets Muslim Extremists, But Gives Zionist Terrorists Free Pass
15. RCMP + CSEC + CSIS = Stasi
Zersetzung (German; variously translated as decomposition, corrosion, undermining, biodegradation or dissolution) was a psychological technique of the East German secret police, the Stasi used to silence political opponents. The "measures of Zersetzung", defined in the framework of a directive on police procedures in 1976, were used in the context of so-called "operational procedures" (in German Operative Vorgänge or OV). They replaced the overt terror of the Ulbricht era.
The practice of repression in Zersetzung comprised extensive and secret methods of control and psychological manipulation, including personal relationships of the target, for which the Stasi relied on its network of informal collaborators, (in German inoffizielle Mitarbeiter or IM), the State's power over institutions, and on operational psychology. Using targeted psychological attacks the Stasi tried to deprive a dissident of any chance of a "hostile action".
The use of Zersetzung is well documented, thanks to numerous Stasi files published after East Germany's Wende. Several thousands, or up to 10,000 individuals are estimated to have become victims: 5,000 of whom sustained irreversible damage. Pensions for restitution have been created for the victims.
Definition
The Stasi, or Ministry for State Security (German: Ministerium für Staatssicherheit, MfS) by its full name, defined Zersetzung in its 1985 dictionary of political operatives as
"...a method of operation by the Ministry for State Security for an efficacious struggle against subversive activities, particularly in the treatment of operations. With Zersetzung one can influence hostile and negative individuals across different operational political activities, especially the hostile and negative aspects of their dispositions and beliefs, so these are abandoned and changed little by little, and, if applicable, the contradictions and differences between the hostile and negative forces would be laid open, exploited, and reinforced.
The goal of Zersetzung is the fragmentation, paralysis, disorganization, and isolation of the hostile and negative forces, in order to preventatively impede the hostile and negative activities, to largely restrict, or to totally avert them, and if applicable to prepare the ground for a political and ideological reestablishment.
Zersetzung is equally an immediate constitutive element of "operational procedures" and other preventive activities to impede hostile gatherings. The principal forces to execute Zersetzung are the inofficial collaborators. Zersetzung presupposes information and significant proof of hostile activities planned, prepared, and accomplished as well as anchor points corresponding to measures of Zersetzung.
Zersetzung must be produced on the basis of a root cause analysis of the facts and the exact definition of a concrete goal. Zersetzung must be executed in a uniform and supervised manner; its results must be documented.
The political explosive force of Zersetzung heightens demands regarding the maintenance of secrecy."
Political Context
During its first decade of existence the German Democratic Republic (GDR) subdued political opposition primarily through the penal code, by accusing them of incitement to war or of calls of boycott. To counteract the international isolation of the GDR due to the construction of the Berlin wall in 1963, judicial terror was abandoned. Since the debut of the Erich Honecker era in 1971 in particular, the Stasi intensified its efforts to punish dissident behaviors without using the penal code.
Important motives were the GDR's desire for international recognition and rapprochement with West Germany at the end of the 1960s. In fact, the GDR was committed to adhere to the U.N. Charter and the Helsinki accords as well as the Basic Treaty, 1972 signed with the Federal Republic of Germany, to respect human rights, or at least it announced its intention as such. The regime of the Socialist Unity Party of Germany thus decided to reduce the number of political prisoners, which was compensated for by practicing repression without imprisonment or court judgments.
Methodology
The Stasi used Zersetzung essentially as a means of psychological oppression and persecution. Findings of operational psychology, were formulated into method at the Stasi's College of Law (Juristische Hochschule der Staatssicherheit, or JHS), and applied to political opponents in an effort to undermine their self-confidence and self-esteem. Operations were designed to intimidate and destabilize them by subjecting them to repeated disappointment, and to socially alienate them by interfering with and disrupting their relationships with others as in social undermining.
The aim was to induce personal crises in victims, leaving them too unnerved and psychologically distressed to have the time and energy for anti-government activism. The Stasi intentionally concealed their role as mastermind of the operations. Author Jürgen Fuchs was a victim of Zersetzung and wrote about his experience, describing the Stasi's actions as “psychosocial crime”, and “an assault on the human soul”.
Although its techniques had been established effectively by the late 1950s, Zersetzung was not defined in terms of a scientific method until the mid-1970s, and only then began to be carried out in a systematic manner in the 1970s and 1980s. It is difficult to determine how many people were targeted, since the sources have been deliberately and considerably redacted; it is known, however, that tactics varied in scope, and that a number of different departments implemented them.
Overall there was a ratio of four or five authorized Zersetzung operators for each targeted group, and three for each individual. Some sources indicate that around 5,000 people were “persistently victimized” by Zersetzung. At the College of Legal Studies, the number of dissertations submitted on the subject of Zersetzung was in double figures. It also had a comprehensive 50-page Zersetzung teaching manual, which included numerous examples of its practice.
Against Individuals
The Stasi applied Zersetzung before, during, after, or instead of incarcerating the targeted individual. The "operational procedures" did not have as an aim, in general, to gather evidence for charges against the target, or to be able to begin criminal prosecutions.The Stasi considered the "measures of Zersetzung" rather in part as an instrument that was used when judiciary procedures were not convenient, or for political reasons such as the international image of the GDR. In certain cases, the Stasi attempted meanwhile to knowingly inculpate an individual, as for example in the case of Wolf Biermann: The Stasi set him up with minors, hoping that he would allow himself to be seduced, and that they could then pursue criminal charges. The crimes that they researched for such accusations were non-political, as for example drug possession, trafficking in customs or currencies, theft, financial fraud, and rape.
The proven forms of Zersetzung are described in the directive 1/76:
a systematic degradation of reputation, image, and prestige in a database on one part true, verifiable and degrading, and on the other part false, plausible, irrefutable, and always degrading; a systematic organization of social and professional failures for demolishing the self-confidence of the individual; [...] stimulation of doubts with respect to perspectives on the future; stimulation of mistrust or mutual suspicion among groups [...]; putting in place spatial and temporal obstacles rendering impossible or at least, difficult the reciprocal relations of a group [...], for example by [...] assigning distant workplaces. —Directive No. 1/76 of January 1976 for the development of "operational procedures".
Beginning with intelligence obtained by espionage, the Stasi established "sociograms" and "psychograms" which it applied for the psychological forms of Zersetzung. They exploited personal traits, such as homosexuality, as well as supposed character weaknesses of the targeted individual — for example a professional failure, negligence of parental duties, pornographic interests, divorce, alcoholism, dependence on medications, criminal tendencies, passion for a collection or a game, or contacts with circles of the extreme right — or even the veil of shame from the rumors poured out upon one's circle of acquaintances. From the point of view of the Stasi, the measures were the most fruitful when they were applied in connection with a personality; all "schematism" had to be avoided.
…the Stasi often used a method which was really diabolic. It was called Zersetzung, and it's described in another guideline. The word is difficult to translate because it means originally "biodegradation." But actually, it's a quite accurate description. The goal was to destroy secretly the self-confidence of people, for example by damaging their reputation, by organizing failures in their work, and by destroying their personal relationships. Considering this, East Germany was a very modern dictatorship. The Stasi didn't try to arrest every dissident. It preferred to paralyze them, and it could do so because it had access to so much personal information and to so many institutions.
—Hubertus Knabe, German historian
Moreover, methods of Zersetzung included espionage, overt, hidden, and feigned; opening letters and listening to telephone calls; encroachments on private property; manipulation of vehicles; and even poisoning food and using false medications. Certain collaborators of the Stasi tacitly took into account the suicide of victims of Zersetzung.
It has not been definitely established that the Stasi used x-rays to provoke long-term health problems in its opponents. That said, Rudolf Bahro, Gerulf Pannach, and Jürgen Fuchs, three important dissidents who had been imprisoned at the same time, died of cancer within an interval of two years. A study by the Federal Commissioner for the Records of the State Security Service of the former GDR (Bundesbeauftragte für die Unterlagen des Staatssicherheitsdienstes der ehemaligen Deutschen Demokratischen Republik or BStU) has meanwhile rejected on the basis of extant documents such a fraudulent use of x-rays, and only mentions isolated and unintentional cases of the harmful use of sources of radiation, for example... to mark documents.
In the name of the target, the Stasi made little announcements, ordered products, and made emergency calls, to terrorize him/her. To threaten or intimidate or cause psychoses the Stasi assured itself of access to the target's living quarters and left visible traces of its presence, by adding, removing, and modifying objects.
Against Groups and Social Relations
The Stasi manipulated relations of friendship, love, marriage, and family by anonymous letters, telegrams and telephone calls as well as compromising photos, often altered. In this manner, parents and children were supposed to systematically become strangers to one another. To provoke conflicts and extramarital relations, the Stasi put in place targeted seductions by Romeo agents.
For the Zersetzung of groups, it infiltrated them with unofficial collaborators, sometimes minors. The work of opposition groups was hindered by permanent counter-propositions and discord on the part of unofficial collaborators when making decisions.
To sow mistrust within the group, the Stasi made belief that certain members were unofficial collaborators; moreover by spreading rumors and manipulated photos, the Stasi feigned indiscretions with unofficial collaborators or placed members of targeted groups in administrative posts to make belief that this was a reward for the activity of an unofficial collaborator. They even aroused suspicions regarding certain members of the group by assigning privileges, such as housing or a personal car. Moreover the imprisonment of only certain members of the group gave birth to suspicions
Target Groups for Measures
The Stasi used Zersetzung tactics on individuals and groups. There was no particular homogeneous target group, as opposition in the GDR came from a number of different sources. Tactical plans were thus separately adapted to each perceived threat. The Stasi nevertheless defined several main target groups:
- associations of people making collective visa applications for travel abroad
- artists and/or groups critical of the government
- religious opposition groups
- youth subculture groups
- groups supporting the above (human rights and peace organizations, those assisting illegal departure from the GDR, and expatriate and defector movements)
The Stasi also occasionally used Zersetzung on non-political organizations regarded as undesirable, such as the Watchtower Society. Prominent individuals targeted by Zersetzung operations included Jürgen Fuchs, Gerulf Pannach, Rudolf Bahro, Robert Havemann, Rainer Eppelmann, Reiner Kunze, husband and wife Gerd und Ulrike Poppe, and Wolfgang Templin.
Implementing Institutions
Almost all Stasi departments were involved in Zersetzung operations, although first and foremost the lead of the Stasi's directorate XX (Hauptabteilung XX) in Berlin, and its divisional offices in regional and municipal government. The function of the head and Abteilung XXs was to maintain surveillance of religious communities; cultural and media establishments; alternative political parties; the GDR's many political establishment-affiliated mass social organizations; sport; and education and health services - effectively covering all aspects of civic life.
The Stasi made use of the means available to them within, and as a circumstance of, the GDR's closed social system. An established, politically-motivated collaborative network (politisch-operatives Zusammenwirken, or POZW) provided them with extensive opportunities for interference in such situations as the sanctioning of professionals and students, expulsion from associations and sports clubs, and occasional arrests by the Volkspolizei (the GDR's quasi-military national police).
Refusal of permits for travel to socialist states, or denial of entry at Czechoslovakian and Polish border crossings where no visa requirement existed, were also arranged. The various collaborators (Partnern des operativen Zusammenwirkens) included branches of regional government, university and professional management, housing administrative bodies, the Sparkasse public savings bank, and in some cases head physicians. The Stasi's Linie III (Observation), Abteilung 26 (Telephone and room surveillance) and M (Postal communications) departments provided essential background information for the designing of Zersetzung techniques, with Abteilung 32 procuring the required technology.
The Stasi collaborated with the secret services of other Eastern Bloc countries to implement Zersetzung. One such example was the Polish secret services co-operating against branches of the Jehovah's Witnesses organisation in the early 1960s, which would come to be known as "innere Zersetzung" (internal subversion).
Social and Juridicial Process
Once aware of his own status as a target, GDR opponent Wolfgang Templin tried, with some success, to bring details of the Stasi's Zersetzung activities to the attention of western journalists. In 1977 Der Spiegel published a five-part article series, “Du sollst zerbrechen!” ("You're going to crack!"), by the exiled Jürgen Fuchs, in which he describes the Stasi's “operational psychology”.
The Stasi tried to discredit Fuchs and the contents of similar articles, publishing in turn, claims that he had a paranoid view of its function, and intending that Der Spiegel and other media would assume he was suffering from a persecution complex. This, however, was refuted by the official Stasi documents examined after Die Wende (the political power shift in the GDR in 1989-90).
Because the scale and nature of Zersetzung were unknown both to the general population of the GDR and to people abroad, revelations of the Stasi's malicious tactics were met with some degree of disbelief by those affected. Many still nowadays express incomprehension at how the Stasi's collaborators could have participated in such inhuman actions.
Since Zersetzung as a whole, even after 1990, was not deemed to be illegal because of the principle of nulla poena sine lege (no penalty without law), actions against involvement in either its planning or implementation were not enforceable by the courts. Because this specific legal definition of Zersetzung as a crime didn't exist, only individual instances of its tactics could be reported. Acts which even according to GDR law were offences (such as the violation of Briefgeheimnis, the secrecy of correspondence) needed to have been reported to the GDR authorities soon after having been committed in order not to be subject to a statute of limitations clause. Many of the victims experienced the additional complication that the Stasi was not identifiable as the originator in cases of personal injury and misadventure. Official documents in which Zersetzung methods were recorded often had no validity in court, and the Stasi had many files detailing its actual implementation destroyed.
Unless they had been detained for at least 180 days, survivors of Zersetzung operations, in accordance with §17a of a 1990 rehabilitation act (the Strafrechtlichen Rehabilitierungsgesetzes, or StrRehaG), are not eligible for financial compensation. Cases of provable, systematically affected targeting by the Stasi, and resulting in employment-related losses and/or health damage, can be pursued under a law covering settlement of torts (Unrechtsbereinigungsgesetz, or 2. SED-UnBerG) as claims either for occupational rehabilitation or rehabilitation under administrative law. These overturn certain administrative provisions of GDR institutions and affirm their unconstitutionality.
This is a condition for the social equalisation payments specified in the Bundesversorgungsgesetz (the war victims relief act of 1950). Equalisation payments of pension damages and for loss of earnings can also be applied for in cases where victimisation continued for at least three years, and where claimants can prove need. The above examples of seeking justice have, however, been hindered by various difficulties victims have experienced, both in providing proof of the Stasi's encroachment into the areas of health, personal assets, education and employment, and in receiving official acknowledgement that the Stasi was responsible for personal damages (including psychic injury) as a direct result of Zersetzung operations.
Friday, January 22, 2016
Documentary - RESONANCE BEINGS OF FREQUENCY
We are beings of resonance and frequency. Knowing this helps you understand the technology that I have previously written about on this blog. See here, here, here, here, here, here, here and here for posts about this information. Two points to mention, you will notice in the documentary the influence that magnetic fields have on animals and human beings. This is very important and is what I was mentioning here. Next, you will see in this documentary the importance of the Schumann Resonance. This is information that everyone should know, and unfortunately, most people don't know this. Now, watch the documentary!
Thursday, January 21, 2016
And They Said Hitler Was a Struggling Artist...
But no. Not Benjamin Netanyahu. We are supposed to take him and his Wile E Coyote drawing seriously.
They like to speculate about the motivations of anyone who begins to talk "seriously" about politics. It doesn't matter which end of the spectrum you are on or today, the politicians of today are nothing but stage performers and clowns ...and --- that is what the people in power would like them to stay as. They are nothing but puppets.
Those who begin to challenge the people in power will be seen as trouble makers. Anyone who actually cares about justice and the very foundation of our government's constitution ... which is enshrining our natural human rights --- and then vocally asserts this reminder ... will become a political dissident.
It is not that government or authority is unnecessary, it just means that the laws that are passed must not violate the natural laws and rights of man. Essentially, when your government begins to separate your property from your person, and says that you have no right to either, you have a problem. You cannot separate human rights from property rights. You cannot have law or justice this way. You will inevitably fall into a contradictory mess.
Though some of our "supposed rulers" in the government would like to believe otherwise, our government was not set up to grant our rights and freedoms to us, only to enshrine them. Even the Canadian Bill of Rights and the Charter of Rights and Freedoms acknowledge this. The Bill of Rights acknowledges that these rights were in the land of Canada before the establishment of Canada as a country because it is a part of Common Law. Common Law is part of English Law going back to the Magna Carta.
When your government no longer cares about your property rights or your rights as a human being, (Bill C-51 and Homeland Security are great examples,) the contract begins to crumble. When people in your government step beyond the contractual limits, the citizens have to begin to question what their governments are still good for. (Essentially, both the Bill of Rights and the Charter of Rights and Freedoms acknowledge that our rights are foundational and fundamental.)
If This Was a Contract With a Company,
I Would Break the Contract.
I Would Break the Contract.
This is a contract between me as a customer with a company who was supposed to uphold their side of the bargain. If they no longer care about the absolute most important part our constitution, they are showing by their actions that they no longer believe they are servants of the people. They now believe that they are our masters.
Ye Shall Know Them by Their Fruits
Today's Pharisees are the corrupt dirtballs that run the banks, slave trade, the drug trade and the intelligence agencies. They are fast becoming a breakaway society that thinks they can do whatever they want. Even torture the citizens of their own country. Worst of all, they use our tax dollars for research and development of classified technology that gives them a massive edge over the population.
What Should We Do?
One thing for sure....don't do nothing. Do something, do anything before it's all gone. Wake up and assert your rights. Give a shit about your country. Most of all...get MAD.
Stop say that's "just the way things are." That is what they want you to think. They want you to be a nice obedient, quiet slave. They want you to compromise. They would rather that you forget about the hard-fought-for history of human rights.
Stop Sitting on the Fence of Indifference....
Stop say that's "just the way things are." That is what they want you to think. They want you to be a nice obedient, quiet slave. They want you to compromise. They would rather that you forget about the hard-fought-for history of human rights.
DON'T.
Subscribe to:
Posts (Atom)