I have written previously about the Stasi and Homeland Security. Along with reading this article about Zersetzung, I highly recommend reading the
first and
second article in this series.
Also,
download this free Stasi tactics book.
It is interesting to note that the idea for the Stasi came from the Bolsheviks and the Cheka.
It absolutely must be mentioned that Jews played a leading role in the development of Bolshevism and the Cheka. (To learn more about this, see here, here, here, here and here.) They have also played a major role in the development of the new Homeland Security laws. Also, see this post about classified technology that allows them to stalk, harass and torture you remotely.
========================================================================
Zersetzung Part 3
Informants have apparently been used to frame targets for crimes or to participate in staged events which foster character assassination. A person may not be aware of some of these set-ups. First, see
this article about front groups and how they are established near a target to help with slander, character assassination, organized stalking and intelligence gathering. Then,
see these articles about slander and
covert torture techniques using classified technology.
Some staged events may include people provoking targets into confrontations. Recurrent confrontations by family members, friends or unusually hostile strangers, can be common. Seemingly homeless people who are well-dressed and very clean will get into confrontations with targets... and create big public scenes.
As an example, let's say a woman target spoke with a man who had often made stomping and banging noises in the apartment above her. After she spoke with him about this, which occurred even during his absence, he immediately complains to the building manager that she was stalking him. He conveniently forgets to inform the building manager that he had assiduously 'courted' this individual for several months, without success; and that he had been following her around on a regular basis, bumping into her at different locations in a seemingly random way, but, way to often to be random.
Presumably, these setups and staged confrontations are done to get targeted people into the penal or mental health system. At the very least they can aid with recruitment. See
here and
here about recruiting. Also,
photos, or video footage taken of an enraged target after they have been antagonized and set-up, may also assist with a smear campaign when leveraging support of the community to facilitate the removal of the target. Multiple complaints filed independently which entail the same report may also achieve this.
Local police participate in stalking and have framed people for crimes. See
here for more.
Similarly, during the
former Cointelpro, there were routine set-ups, and fabricating of evidence used to destroy a person's character or have them imprisoned. But this obviously hasn't stopped. According to the December 7th 2003 issue of the Sunday Herald, the FBI is on record using multiple informants to frame innocent people for crimes by having informants commit perjury. This can be done legally in the interest of "national security." The article sited a 141-page report by the House Committee on Government Reform, which stated that the FBI rigged evidence, and used informants to provide "false testimony," so that innocent people would be imprisoned. Oddly enough, some of these informants were murderers!
"Well over 20 murders were committed by FBI informants," the report revealed, and to protect them federal law enforcement "actively worked to prevent homicide cases [from] being resolved." The committee also concluded that "officials in FBI Director J Edgar Hoover's office were well aware that federal informants were committing murders." The article continued quoting Judge Nancy Gertner saying, "It is hard to conceive of accusations that shake the legal system closer to its foundation that would do more to challenge this nation's most basic assumptions of honesty, fairness, and trust in the administration of justice." She added, "All in the name of 'national security.'"
In his book,
The Franklin Cover-up, former Senator John Decamp wrote, "In case after notorious case entirely unrelated to Franklin, Justice Department [DOJ] personnel appear as liars, perverts, frame-up artists, and even - assassins." Apparently Senator DeCamp experienced significant turbulence while investigating a child sex ring which included prominent individuals in Washington D.C. According to DeCamp, the elite used the FBI to orchestrate the cover-up.
Friends and Family
If you're targeted, friends and family may be recruited to break you down. They may participate in harassment skits intended to make you look incompetent, inconsistent, hypocritical, and to mock and demoralize you.
New friends, may be used in an attempt to do the same. These 'friends' pose as confidants and abruptly end these 'friendships' under deliberately degrading and humiliating circumstances. When taken in the context of the ongoing surveillances and harassment, these exercises appear intended to heighten emotional trauma, perhaps to provoke an uncontrolled response and/or to enforce isolation.
If you're targeted and live with someone who has been co-opted, perhaps a friend or family member, they will probably be forced to carry out some of these harassment tactics.
At home they may frequently repeat your thoughts back to you and talk about something similar to what you are doing to let you know that you are under surveillance, make noise and just be generally annoying.
Traps may be set, such as items frequently falling out of freezers or cabinets as you open them. Phone conversations which occur while you're present will be loud and contain information about your personal life. Out in public, these friends or family members may be forced by their handlers to guide you through and participate in Street Theatre, where they will interact with other citizen informants to harass you. These skits will be intended to make you feel foolish, incompetent, or inconsistent.
Thefts and Break-ins
When break-ins occur there is usually no sign of forced entry, and they occur when the target is sleeping or elsewhere. This is the case even if there is a Hi-Tech security system in place. In virtually all such cases investigated, the burglars leave evidence of their visits, such as by relocating objects, or by committing petty and not-so-petty acts of vandalism. You have to understand that the people that are engaged in doing this have access to technology that surpasses anything that most people know of.
This happens at the home as well as the workplace if the target is fortunate enough to be employed. Targets have reported clothing being ripped, milk, coffee and other items poured out, and small-scale damage. Items may be stolen and brought back at a later date, and they may move items and place them in a slightly different spot. These are essentially Gaslighting tactics.
Victor Santoro claims that these subtle memory games can be used to drive people insane. Small things such as pens, shoes, and silverware are taken or tampered with so people will seem delusional if they file a police report. Burglarizing your home is very, very common, a lot of times they'll leave evidence of their visits, just little small changes in the target's home which is noticeable. Executive Order No. 12333 states that these break-ins can be done legally.
Interestingly enough, surreptitious break-ins, thefts, and sabotage were a staple part of the old Cointelpro. Other tactics Santoro advocates include filling a target's gas tank, or substituting items of his clothing with ones a size smaller. If you're unaware that you're targeted, as most people are, then these small changes may be attributed to a lapse in your memory. If these tactics are used in combination with others, then as Santoro illustrates, you may think you're going insane.
Gunderson also spoke of Gaslighting tactics, which he described as "psychological warfare." In his personal experience with what is presumably state-sponsored harassment, he has noticed bits of furniture and other items being moved around during surreptitious break-ins. He states they are, "so arrogant that they almost always leave subliminal messages of their... entry." The logic is that a thief would never break into your home and leave a computer or stereo and just steal a toothbrush, or pour out a portion of your milk.
In his book, Subliminal Mind Control, John J. Williams wrote, "If you are being subjected to a secret and involuntary subliminal experience it is a malevolent, sinister and often dangerous attack against you that you have every right to vigorously oppose and thwart as if you are a POW or someone has broken into your home to rob you of what is rightfully yours." He warns, "In fact they have broken into your mind, and are trying to rob you of your free will. Even in cases where there is actually an intended positive outcome."
Sabotage, Vandalism and Staged Events
Targets may regularly experience acts of vandalism. Electronic equipment may frequently be failing. People have reported having electrical systems in their cars, brand new appliances, TVs, radios, PCs, and other electronic equipment suddenly die, or act strangely.
Targets may experience frequent computer trouble such as failing hardware. Ongoing computer problems which do not follow any logical pattern may also occur. Some of this can be attributed to the E-bomb which can destroy electrical equipment while not damaging humans.
Many times this vandalism is usually just below what you'd report to the police. For instance, a small but noticeable portion of your masonry has been chipped off, and a crack has appeared in one of your windows. This may be restricted to minor vandalism, just to let you know that you're under surveillance. However large-scale property damage is also done to homes and vehicles, such as slashed tires, broken windows, tampering with break lines, and destruction of electrical equipment.
Some targets have report that their pets die or are being tortured as a retaliation for a target taking action to expose them. See
here,
here,
here,
here and
here for more information regarding electronic warfare.
Automobiles are one of the biggest targets, they slash tires, they smash the windows, drain the oil out of the cars, fool with the electronic components and batteries.
Vehicles invite peculiarly ferocious attacks in these harassment campaigns-slashed tires, smashed windows, oil drainage, oil contamination, destruction of electronic components and batteries... grounded fuel gages and suddenly failed brakes and clutches occur. Recurrent break-ins and auto thefts have also been reported. Some targets will also experience staged accidents and insurance scams.
Multiple seemingly independent vehicles can be used to facilitate an accident which can appear to have been caused by a targeted person. Add to this, multiple independent witnesses (informants) and you have a recipe for murder or a framing. In fact, "accidental" deaths have reportedly occurred. Once more, the Stasi would do similar things. "Car brake-leads have been cut, accidents and deaths reverse-engineered," noted Funder.
Traveling
When targets drive, they may be surrounded by vehicles driven by citizen informants who frequently cut them off and tailgate them. Targets will experience more tailgating and cut-offs than what would naturally occur. Vehicles will frequently pull out past stops signs as the TI approaches an intersection. This is apparently done to startle them.
While traveling on the highway there will be a rotation of vehicles that surround targets. These vehicles may be marked with an identifying feature, or a color that they've been sensitized to. This seems to function as both an NLP tactic to trigger negative emotions which have been anchored to the feature, as well as a method to unite the group and promote group cohesiveness. In other words, it is similar to a uniform, or a squad car.
There will also be a rotation of people tailgating targets. These vehicles may cut them off after they've been tailing them for a while. Apparently this is done to imply that they weren't going fast enough. When done in a recurrent manner by multiple vehicles, this antagonizing behavior may also serve to encourage the target to accelerate, which may result in them getting pulled over. This may be especially effective if they're not aware that they're targeted.
City and state vehicles which may stalk targets in public, include: off-duty metro buses, school buses, local restaurant delivery vehicles, city and construction vehicles, fire trucks and ambulances, police cars, postal and UPS vehicles, taxis, and 18 wheelers. Helicopters and small planes have also reportedly been used to stalk people. As will be revealed in the Informants section, many of these are vehicles belonging to organizations which have been selected for recruitment into the citizen informant programs.
Convoys of vehicles which are all spaced the same distance and traveling at the same speed will participate in stalking. Within this convoy, there may be several vehicles exhibiting traits that a target has been sensitized to with NLP. These traits are thereby symbolic of a uniform. For instance, most or all of them will be a shade of red. Or most of them will have their lights on, even during the daytime. Or they may have the same bumper stickers. During the evening targets may experience frequent Brighting while driving or walking.
Brighting
Vehicular Brighting is an attack. It seems to be strategically used with corners. For instance, if you're targeted and you're walking down a quiet street late at night, you'll see vehicles repeatedly turn onto or off of connecting streets. Their timing is such that they continually turn the corners while you are at it. This effectively blinds you. This happens frequently at corners. Or, as you walk down a side street, there is one or more cars parked on the side, facing your direction with the lights on. They will also wait for you to approach them and then pull out into the street, thereby Brighting you as you walk by.
These Brighting tactics are maximized when a vehicle has one headlight grossly misaligned. The misalignment produces a Hi-Beaming effect. Like other tactics, frequency and duration play an important role here. Lights being shined into a target's windows have also been reported. "Among the most common non-lethal weapons are bright lights," wrote Dr. Alexander, in his book, Winning the War. He says, "The intent is to reduce risks of injury... by temporarily hindering the eyesight of the targeted personnel." He also wrote of the use of bright lights on targeted people in his book, Future War.
Blacklisting
Job opportunities will be trashed. Most targeted people are unemployed. Many would be in the street if it weren't for parents, siblings, or friends. Targets who are employed are usually mobbed. "Progressive financial impoverishment, [is] brought on by termination of the individual's employment, and compounded by expenses associated with the harassment.
During her investigation she concluded, "The majority of those now in contact with the Project - educated, white-collar professionals - have lost their jobs. Termination of employment in many of these cases involved prefatory harassment by the employer and co-workers [Mobbing], which coincided with the other overt forms of harassment..."
According to an article in The Christian Science Monitor entitled, Blacklisted by the Bank, Blacklisting was originally used as a foreign-policy tool. At some point federal organizations obviously decided to start using it on individuals as well. Slander may play an important role in Blacklisting. Also there are Blacklists and software packages used to check these lists for suspected "terrorists," "threats to national security," etc. Apparently this is a flourishing business and some organizations are required by law to use it.
An August 2004 article entitled, The Surveillance-Industrial Complex, by the ACLU, stated "An entire industry has sprung up to produce software that makes it easier for companies to enforce the government's blacklists and other mandates. An example is 'Homeland Tracker,' produced by a subsidiary of the giant database company Choicepoint to 'help any business comply with OFAC and USA PATRIOT Act regulations.'" The article notes that the software has a feature called "accept and deny lists... otherwise known as blacklists."
Federal law enforcement has sent these watch lists to corporations. They contained the names of individuals that were not under official investigation or wanted, but that the agency just had an interest in. We already know that some of these agencies are targeting and harassing citizens. Unbeknownst to many, these agencies are apparently deliberately destroying careers on a massive scale. Wired NewsWire spoke of these Blacklists on August 9, 2004, in an article entitled, Big Business Becoming Big Brother. The article concluded, "There is no way to determine how many job applicants might have been denied work because their names appeared on the list."
A form of Blacklisting has also been used on Russian dissidents by the state. In his book, The Persecutor, Sergei Kourdakov, a member of the plain-clothed People's Brigade declared, once a person was targeted, they were "treated like a leper and could only get the worst jobs."(*) To accomplish this Blacklisting, the USSR used something called a workbook. The workbook was used to advance or destroy careers. If you were cooperative with the state, your career could be very successful. If not, you would live in poverty.
In East Germany dissidents were Blacklisted as well, and their careers were destroyed. After the wall came down they were allowed to inspect their files, and learned why they were unable to get jobs or enter into universities. Dr. Munzert, speaks of the similarity between what is now happening and what the occurred in Germany; he says the goal is "to bring their finances down," by making them "loose their job."
If you've previously been mobbed out of employment and are blacklisted, the mobbing may continue during interviews. Presumably, this is used to further traumatize you.
Interview questions may be asked with accusing, or mocking tones. Questions may also be asked using certain key words, regarding the environment you just left, which only you and your former co-workers (who Mobbed you) would know. These questions are obviously designed to trigger negative emotions which have been linked to a previously painful work environment, where you experienced mobbing. They may ask these questions over and over using a slightly different syntax.
If you're targeted, during an interview you may have potential employers demanding credentials that they did not list as a requirement in their AD. During phone interviews you may have employers telling you that you responded to an AD other than the one that you actually responded to. They may also tell you that they did not place the AD, or that they placed a slightly different one. You may be told that your updated resume says you're currently working at a place that you never worked at, or a place you worked at a decade ago.
The harassment is masked in layers of accommodation to help strengthen the illusion that you're not working because you don't choose to. For instance, you may have recruiters who have harassed you in the past leave messages on your answering machine or with relatives/friends, indicating that there are opportunities available to you. It will be made to look as if you're unemployed due to your choice. The general public may not realize that Blacklisting exists because the institutions that use it operate most major news outlets. Reporters and historians are also Blacklisted for reporting corruption or historical facts that the Zionist complex does not want the public to be aware of.
Publishers Weekly, gives an editorial review on Amazon.com of a book entitled, Into the Buzzsaw, authored by Kristina Borjesson, in which they state, "The buzzsaw is what can rip through you when you try to investigate or expose anything this country's large institutions be they corporate or government want kept under wraps." This "buzzsaw" is what others have called the Invisible Government. The review continues, "Reporters who tattle risk losing their jobs and being blacklisted... [by] concerted corporate and/or government efforts to kill their controversial stories and their careers."
Communications Interference
Targets experience tampering or lost mail. During the former version of Cointelpro, they would blatantly watch homes, follow cars, and open mail. The idea was to get as much info as possible to aid in the harassment and intimidation of their targets.
The Stasi too, "inspected all mail in secret rooms above post office," described Funder, "and intercepted, daily, tens of thousands of phone calls." Dr. Munzert noted that one objective of those running this program is to "disrupt the communication systems of the victims." Targets usually receive lots of wrong phone number calls or harassing telephone calls. These pranks may be linked to an event unfolding in the target's personal life. The phone has historically been an excellent harassment tool.
Online
Targets may also be stalked online. Search engine results may be filtered (blocked) and replaced with information in a target's personal life. Websites that a target visits may be spoofed and contain information which is apparently intended to let the target know they're being stalked in the internet as well. This appears to be simply an online version of the public stalking. If you have a website devoted to exposing this program, you may have people constantly harassing you, emailing you to flame you, or claiming that they are victims and asking for support while making references to subjects unfolding in your personal life. This tactic may be used to foster a sense of hopelessness and isolation.
If you're targeted, you may receive "unsolicited" email that parallels a current event in your life. Or you may receive covert insults and threats. If you join a support group, you may also receive harassment via threads posted on message boards. Like other mediums of harassment, the topics of these threads may be about events that are unfolding in your personal life, as well as threats or insults covertly directed at you.
Your email may be blocked or filtered and your web activity may be monitored. Carnivore, DCS1000, or similar tracking software can accomplish some of this.(**) If you try to sell things online, participate in online discussions groups, or respond to employment Ads, you will probably be interrupted, trashed, or harassed.
Some people have reported that their inbox is clogged with junk messages even if they have filters on. These unsolicited emails may contain cryptic borderline-subliminal attacks. The words will be garbled but contain letters that convey a message when arranged in the correct order. Or they may contain a sounds like message. Your mind will automatically piece these letters together so they make sense. This is done on the fly, without you being aware of it.
These messages may contain junk in the body and the TI may not be able to reply to it because it came from a bogus address. These cryptic attacks are mentioned in the book, Subliminal Mind Control, by John J. Williams. If you're targeted, the message will probably pertain to something in your life situation. Any weakness you have can be exploited.
For instance, if you're going bald and have been looking for treatment, you could receive the following attack:
To: John Doe
Subject: Euro Balding Tummy
Body: asdfl;jkasdflkkjasdf;lkjasdfljkasdfl;jkasdfl
The harassment of some
targeted people is more than likely broadcasted around the country via closed circuit TV to the politically powerful and those with connections in intelligence and organized crime.
In the workplace this can easily be done by surveillance systems, which many businesses now have in place. A report based on a survey conducted on over 500 companies appeared in the May 19, 2005 issue of Business Wire in an articled entitled, Statistics Show Rise in Surveillance of Workers. It stated, "More than half of the companies surveyed use video monitoring to counter theft, violence and sabotage," and that the number of businesses conducting surveillance is increasing.
This might be used for the purpose of "creating a sense of unity, [and] for identifying TIs who are to be harassed on the street." In addition to facilitating group cohesiveness and identifying targeted people, McKinney noted that it seems to be a "major source of entertainment" for the individuals participating in this harassment. Similarly, more overt degenerates have been known to record their actions so they can "re-live" the experience.
"Covert workplace surveillance is big business," stated the Denver Rocky Mountain News, on April 30, 2001. "Secret monitoring of employees has grown dramatically," echoed Knight Ridder in their August 6, 1997 article entitled, The Boss is Watching as Workplace Surveillance Grows. According to these publications, the equipment is installed after hours and includes miniature cameras hidden in thermostats, light switches, and on walls and ceilings that are located in changing areas, locker rooms, break rooms, and even bathrooms. Apparently, there have been some lawsuits concerning this.
Electronic Warfare
My goal here is to provide evidence that these weapons exist and are being used on the civilian population. They are also known as, Directed Energy Weapons (DEW), Psychotronic Weapons, Less-lethal Weapons, and Electromagnetic Weapons. Most targets are hit with these weapons. See
here,
here,
here,
here,
here,
here,
here,
here and
here for more information.
These weapons or similar ones are currently being used on a massive scale against citizens of North America and other NATO nations. Dr Munzert refers to "Directed energy weapons" as the "high-tech arms of the century," and adds that they are "part of crimes (in Europe) that almost nobody knows [about] except the victims and the offenders." Although the surface intention for the creation of these weapons is to save lives, the evidence suggests they are being deliberately misused on a global scale as a traceless form of slow torture.