See where Espionage started in its fullest in the last century:
Espionage | International Encyclopedia of the First World War (WW1)
Faithful
Rv:3: 7 ¶ And to the angel of the church of Philadelphia write: These things saith the Holy One and the true one, he that hath the key of David, he that openeth and no man shutteth, shutteth and no man openeth: 8 I know thy works. Behold, I have given before thee a door opened, which no man can shut: because thou hast a little strength and hast kept my word and hast not denied my name. 9 Behold, I will bring of the synagogue of Satan, who say they are Jews and are not, but do lie. Behold, I will make them to come and adore before thy feet. And they shall know that I have loved thee. 10 Because thou hast kept the word of my patience, I will also keep thee from the hour of temptation, which shall come upon the whole world to try them that dwell upon the earth. 11 Behold, I come quickly: hold fast that which thou hast, that no man take thy crown. 12 He that shall overcome, I will make him a pillar in the temple of my God: and he shall go out no more. And I will write upon him the name of my God and the name of the city of my God, the new Jerusalem, which cometh down out of heaven from my God, and my new name. 13 He that hath an ear, let him hear what the Spirit saith to the churches. (DRV)
The Justice of God: Look up, your redemption is at hand: The Apocalypse - The Book of the Revelation - The Testimony of the Lord Jesus Christ
The Justice of God: Apostate Vatican II versus Apostolic Catholicity - Vatican II is Apostate
Look up, your redemption is at hand: The Apocalypse - The Book of the Revelation - The Testimony of the Lord Jesus Christ
1 … Scripture reference – Rev.: 10:1; Ezek.: 43:2
2 … Scripture reference – Rev.: 14:8!; Isaiah: 13:21, 22!
3 … Scripture reference – Rev.: 14:8; 17:2; Jer.: 51:7!; Rev.: 18:9, 15
4 … Scripture reference – Jer.: 51:45!; 2 Cor.: 6:17!; Eph.: 5:7!; 1 Tim.: 5:22
5 … Scripture reference – Jer.: 51:9
6 … Scripture reference – Jer.: 50:29!; 2 Thess.: 1:6
7 … Scripture reference – Isaiah: 47:8
8 … Scripture reference –
9 … Scripture reference – Rev.: 18:3; 17:2; 18:18
10 … Scripture reference – Rev.: 18:15, 16, 17
11 … Scripture reference – Ezek.: 27;32!
12 … Scripture reference –
13 … Scripture reference –
14 … Scripture reference –
15 … Scripture reference – Rev.: 18:3, 10
16 … Scripture reference – Rev.: 17:4
17 … Scripture reference – Ezek.: 27:29, 30!; Rev.: 18:10
18 … Scripture reference – Ezek.: 27:29, 30!; Rev.: 18:9
19 … Scripture reference – Ezek.: 27:29, 30!, 32, 33!
20 … Scripture reference – Rev.: 12:12
21 … Scripture reference – Jer.: 51:63, 64
22 … Scripture reference – Ezek.:26:13!; Jer.: 25:10!
23 … Scripture reference – Jer.: 25:10!
24 … Scripture reference – Rev.: 16:6!
The Fall of Babylon
Rv:18:
1 ¶ And after these things, I saw another angel come down from heaven, having great power: and the earth was enlightened with his glory. … Scripture reference – Rev.: 10:1; Ezek.: 43:2
2 And he cried out with a strong voice, saying: Babylon the great is fallen, is fallen: and is become the habitation of devils and the hold of every unclean spirit and the hold of every unclean and hateful bird: … Scripture reference – Rev.: 14:8!; Isaiah: 13:21, 22!
3 Because all nations have drunk of the wine of the wrath of her fornication: and the kings of the earth have committed fornication with her; And the merchants of the earth have been made rich by the power of her delicacies. … Scripture reference – Rev.: 14:8; 17:2; Jer.: 51:7!; Rev.: 18:9, 15
Her Sins and Punishment
4 And I heard another voice from heaven, saying: Go out from her, my people; that you be not partakers of her sins and that you receive not of her plagues. … Scripture reference – Jer.: 51:45!; 2 Cor.: 6:17!; Eph.: 5:7!; 1 Tim.: 5:22
5 For her sins have reached unto heaven: and the Lord hath remembered her iniquities. … Scripture reference – Jer.: 51:9
6 Render to her as she also hath rendered to you: and double unto her double, according to her works. In the cup wherein she hath mingled, mingle ye double unto her. … Scripture reference – Jer.: 50:29!; 2 Thess.: 1:6
7 As much as she hath glorified herself and lived in delicacies, so much torment and sorrow give ye to her. Because she saith in her heart: I sit a queen and am no widow: and sorrow I shall not see. … Scripture reference – Isaiah: 47:8
8 Therefore, shall her plagues come in one day, death and mourning and famine. And she shall be burnt with the fire: because God is strong, who shall judge her.
Dirge of the Kings
9 ¶ [1] And the kings of the earth, who have committed fornication and lived in delicacies with her, shall weep and bewail themselves over her, when they shall see the smoke of her burning: … Scripture reference – Rev.: 18:3; 17:2; 18:18
10 Standing afar off for fear of her torments, saying: Alas! alas! that great city, Babylon, that mighty city: for in one hour is thy judgment come. … Scripture reference – Rev.: 18:15, 16, 17
Dirge of the Merchants
11 And the merchants of the earth shall weep and mourn over her: for no man shall buy their merchandise any more. … Scripture reference – Ezek.: 27;32!
12 Merchandise of gold and silver and precious stones: and of pearls and fine linen and purple and silk and scarlet: and all thyine wood: and all manner of vessels of ivory: and all manner of vessels of precious stone and of brass and of iron and of marble:
13 And cinnamon and odours and ointment and frankincense and wine and oil and fine flour and wheat and beasts [2] and sheep and horses and chariots: and slaves and souls of men.
14 And the fruits of the desire of thy soul are departed from thee: and all fat and goodly things are perished from thee. And they shall find them no more at all.
15 The merchants of these things, who were made rich, shall stand afar off from her, for fear of her torments, weeping and mourning, … Scripture reference – Rev.: 18:3, 10
16 And saying: Alas! alas! that great city, which was clothed with fine linen and purple and scarlet and was gilt with gold and precious stones and pearls. … Scripture reference – Rev.: 17:4
17 For in one hour are so great riches come to nought.
Dirge of the Mariners
And every shipmaster and all that sail into the lake, and mariners, and as many as work in the sea, stood afar off, … Scripture reference – Ezek.: 27:29, 30!; Rev.: 18:10
18 And cried, seeing the place of her burning, saying: What city is like to this great city? … Scripture reference – Ezek.: 27:29, 30!; Rev.: 18:9
19 And they cast dust upon their heads and cried, weeping and mourning, saying: Alas! alas! that great city, wherein all were made rich, that had ships at sea, by reason of her prices. For, in one hour she is made desolate. … Scripture reference – Ezek.: 27:29, 30!, 32, 33!
20 Rejoice over her, thou heaven and ye holy apostles and prophets. For God hath judged your judgment on her. … Scripture reference – Rev.: 12:12
The Angel’s Promise
21 And a mighty angel took up a stone, as it were a great millstone, and cast it into the sea, saying: With such violence as this, shall Babylon, that great city, be thrown down and shall be found no more at all. … Scripture reference – Jer.: 51:63, 64
22 And the voice of harpers and of musicians and of them that play on the pipe and on the trumpet shall no more be heard at all in thee: and no craftsman [3] of any art whatsoever shall be found any more at all in thee: and the sound of the mill shall be heard no more at all in thee: … Scripture reference – Ezek.:26:13!; Jer.: 25:10!
23 And the light of the lamp shall shine no more at all in thee: and the voice of the bridegroom and the bride shall be heard no more at all in thee. For thy merchants were the great men of the earth: for all nations have been deceived by thy enchantments. … Scripture reference – Jer.: 25:10!
24 And in her was found the blood of prophets and of saints and of all that were slain upon the earth. … Scripture reference – Rev.: 16:6!
(DRV)
[1] -Ver. 9-19. This passage is not an account of a vision but rather a direct prophecy, after. the manner of the prophecies of Isaias and Ezechiel concerning Tyre. Tyre furnishes a type of the vengeance of God upon satanic pride and luxury.
[2] -Ver.13. Beasts [of burden]: the Greek has “cattle.”
[3] –Ver. 22 The city had boasted previously of her craftsmen, skilled in every craft.
God and His Messiah Jesus Christ our Lord - our right and duty to witness to Him: It is unGodly and Unlawful. What is Gang Stalking? | Fight Gang Stalking
Espionage | International Encyclopedia of the First World War (WW1)
Faithful
Rv:3: 7 ¶ And to the angel of the church of Philadelphia write: These things saith the Holy One and the true one, he that hath the key of David, he that openeth and no man shutteth, shutteth and no man openeth: 8 I know thy works. Behold, I have given before thee a door opened, which no man can shut: because thou hast a little strength and hast kept my word and hast not denied my name. 9 Behold, I will bring of the synagogue of Satan, who say they are Jews and are not, but do lie. Behold, I will make them to come and adore before thy feet. And they shall know that I have loved thee. 10 Because thou hast kept the word of my patience, I will also keep thee from the hour of temptation, which shall come upon the whole world to try them that dwell upon the earth. 11 Behold, I come quickly: hold fast that which thou hast, that no man take thy crown. 12 He that shall overcome, I will make him a pillar in the temple of my God: and he shall go out no more. And I will write upon him the name of my God and the name of the city of my God, the new Jerusalem, which cometh down out of heaven from my God, and my new name. 13 He that hath an ear, let him hear what the Spirit saith to the churches. (DRV)
The Justice of God: Look up, your redemption is at hand: The Apocalypse - The Book of the Revelation - The Testimony of the Lord Jesus Christ
The Justice of God: Apostate Vatican II versus Apostolic Catholicity - Vatican II is Apostate
Look up, your redemption is at hand: The Apocalypse - The Book of the Revelation - The Testimony of the Lord Jesus Christ
1 … Scripture reference – Rev.: 10:1; Ezek.: 43:2
2 … Scripture reference – Rev.: 14:8!; Isaiah: 13:21, 22!
3 … Scripture reference – Rev.: 14:8; 17:2; Jer.: 51:7!; Rev.: 18:9, 15
4 … Scripture reference – Jer.: 51:45!; 2 Cor.: 6:17!; Eph.: 5:7!; 1 Tim.: 5:22
5 … Scripture reference – Jer.: 51:9
6 … Scripture reference – Jer.: 50:29!; 2 Thess.: 1:6
7 … Scripture reference – Isaiah: 47:8
8 … Scripture reference –
9 … Scripture reference – Rev.: 18:3; 17:2; 18:18
10 … Scripture reference – Rev.: 18:15, 16, 17
11 … Scripture reference – Ezek.: 27;32!
12 … Scripture reference –
13 … Scripture reference –
14 … Scripture reference –
15 … Scripture reference – Rev.: 18:3, 10
16 … Scripture reference – Rev.: 17:4
17 … Scripture reference – Ezek.: 27:29, 30!; Rev.: 18:10
18 … Scripture reference – Ezek.: 27:29, 30!; Rev.: 18:9
19 … Scripture reference – Ezek.: 27:29, 30!, 32, 33!
20 … Scripture reference – Rev.: 12:12
21 … Scripture reference – Jer.: 51:63, 64
22 … Scripture reference – Ezek.:26:13!; Jer.: 25:10!
23 … Scripture reference – Jer.: 25:10!
24 … Scripture reference – Rev.: 16:6!
The Fall of Babylon
Rv:18:
1 ¶ And after these things, I saw another angel come down from heaven, having great power: and the earth was enlightened with his glory. … Scripture reference – Rev.: 10:1; Ezek.: 43:2
2 And he cried out with a strong voice, saying: Babylon the great is fallen, is fallen: and is become the habitation of devils and the hold of every unclean spirit and the hold of every unclean and hateful bird: … Scripture reference – Rev.: 14:8!; Isaiah: 13:21, 22!
3 Because all nations have drunk of the wine of the wrath of her fornication: and the kings of the earth have committed fornication with her; And the merchants of the earth have been made rich by the power of her delicacies. … Scripture reference – Rev.: 14:8; 17:2; Jer.: 51:7!; Rev.: 18:9, 15
Her Sins and Punishment
4 And I heard another voice from heaven, saying: Go out from her, my people; that you be not partakers of her sins and that you receive not of her plagues. … Scripture reference – Jer.: 51:45!; 2 Cor.: 6:17!; Eph.: 5:7!; 1 Tim.: 5:22
5 For her sins have reached unto heaven: and the Lord hath remembered her iniquities. … Scripture reference – Jer.: 51:9
6 Render to her as she also hath rendered to you: and double unto her double, according to her works. In the cup wherein she hath mingled, mingle ye double unto her. … Scripture reference – Jer.: 50:29!; 2 Thess.: 1:6
7 As much as she hath glorified herself and lived in delicacies, so much torment and sorrow give ye to her. Because she saith in her heart: I sit a queen and am no widow: and sorrow I shall not see. … Scripture reference – Isaiah: 47:8
8 Therefore, shall her plagues come in one day, death and mourning and famine. And she shall be burnt with the fire: because God is strong, who shall judge her.
Dirge of the Kings
9 ¶ [1] And the kings of the earth, who have committed fornication and lived in delicacies with her, shall weep and bewail themselves over her, when they shall see the smoke of her burning: … Scripture reference – Rev.: 18:3; 17:2; 18:18
10 Standing afar off for fear of her torments, saying: Alas! alas! that great city, Babylon, that mighty city: for in one hour is thy judgment come. … Scripture reference – Rev.: 18:15, 16, 17
Dirge of the Merchants
11 And the merchants of the earth shall weep and mourn over her: for no man shall buy their merchandise any more. … Scripture reference – Ezek.: 27;32!
12 Merchandise of gold and silver and precious stones: and of pearls and fine linen and purple and silk and scarlet: and all thyine wood: and all manner of vessels of ivory: and all manner of vessels of precious stone and of brass and of iron and of marble:
13 And cinnamon and odours and ointment and frankincense and wine and oil and fine flour and wheat and beasts [2] and sheep and horses and chariots: and slaves and souls of men.
14 And the fruits of the desire of thy soul are departed from thee: and all fat and goodly things are perished from thee. And they shall find them no more at all.
15 The merchants of these things, who were made rich, shall stand afar off from her, for fear of her torments, weeping and mourning, … Scripture reference – Rev.: 18:3, 10
16 And saying: Alas! alas! that great city, which was clothed with fine linen and purple and scarlet and was gilt with gold and precious stones and pearls. … Scripture reference – Rev.: 17:4
17 For in one hour are so great riches come to nought.
Dirge of the Mariners
And every shipmaster and all that sail into the lake, and mariners, and as many as work in the sea, stood afar off, … Scripture reference – Ezek.: 27:29, 30!; Rev.: 18:10
18 And cried, seeing the place of her burning, saying: What city is like to this great city? … Scripture reference – Ezek.: 27:29, 30!; Rev.: 18:9
19 And they cast dust upon their heads and cried, weeping and mourning, saying: Alas! alas! that great city, wherein all were made rich, that had ships at sea, by reason of her prices. For, in one hour she is made desolate. … Scripture reference – Ezek.: 27:29, 30!, 32, 33!
20 Rejoice over her, thou heaven and ye holy apostles and prophets. For God hath judged your judgment on her. … Scripture reference – Rev.: 12:12
The Angel’s Promise
21 And a mighty angel took up a stone, as it were a great millstone, and cast it into the sea, saying: With such violence as this, shall Babylon, that great city, be thrown down and shall be found no more at all. … Scripture reference – Jer.: 51:63, 64
22 And the voice of harpers and of musicians and of them that play on the pipe and on the trumpet shall no more be heard at all in thee: and no craftsman [3] of any art whatsoever shall be found any more at all in thee: and the sound of the mill shall be heard no more at all in thee: … Scripture reference – Ezek.:26:13!; Jer.: 25:10!
23 And the light of the lamp shall shine no more at all in thee: and the voice of the bridegroom and the bride shall be heard no more at all in thee. For thy merchants were the great men of the earth: for all nations have been deceived by thy enchantments. … Scripture reference – Jer.: 25:10!
24 And in her was found the blood of prophets and of saints and of all that were slain upon the earth. … Scripture reference – Rev.: 16:6!
(DRV)
[1] -Ver. 9-19. This passage is not an account of a vision but rather a direct prophecy, after. the manner of the prophecies of Isaias and Ezechiel concerning Tyre. Tyre furnishes a type of the vengeance of God upon satanic pride and luxury.
[2] -Ver.13. Beasts [of burden]: the Greek has “cattle.”
[3] –Ver. 22 The city had boasted previously of her craftsmen, skilled in every craft.
4 And I heard another voice from heaven, saying: Go out from her, my people; that you be not partakers of her sins and that you receive not of her plagues. … Scripture reference – Jer.: 51:45!; 2 Cor.: 6:17!; Eph.: 5:7!; 1 Tim.: 5:22
5 For her sins have reached unto heaven: and the Lord hath remembered her iniquities. … Scripture reference – Jer.: 51:9
6 Render to her as she also hath rendered to you: and double unto her double, according to her works. In the cup wherein she hath mingled, mingle ye double unto her. … Scripture reference – Jer.: 50:29!; 2 Thess.: 1:6
13 And cinnamon and odours and ointment and frankincense and wine and oil and fine flour and wheat and beasts [2] and sheep and horses and chariots: and slaves and souls of men.
These are the sins that those who do not follow God's command to totally come out of all connection to Babylon incur upon their souls with no repentance ever offered them by God. No matter what happens they are at that point damned forever.
Satanism and pedophilia
Murder of the innocent, including abortion and genocide
Sorcery, including all worship of false gods and goddesses, which are actually devils and demons, and all practice of magic.
All pillage and thefts of lands and possessions and belongings of others.
Apocalypse 9:21 Neither did they penance [metanoia, i.e. repent] from their murders nor from their sorceries [pharmekeia] nor from their fornication nor from their thefts.
This is a weight of unimaginable burden that drags the damned down into hell forever.
Second Epistle of St.Paul to the church at Thessalonica
2:11 Therefore God shall send them the operation of error, to believe lying:
Ver. 11. God shall send. . .That is God shall suffer them to be deceived by lying wonders, and false miracles, in punishment of their not entertaining the love of truth.
Ver. 11. 'God sends.' God will allow their willful rejection of truth to have its natural results of spiritual blindness, impenitence and damnation. A misleading influence, or, “a delusion.” The operation of error - the Greek reads: "energian planes" or literally the energy of delusion, which is exactly and actually the fallen spirits of the devils and demons conjured by pagan religion, especially by idolatry. NOW, currently, the Assisi delusion of the Apostates, Ratzinger and Wojtyla and many others present with them, is a very real and prime example. To give oneself over to this is to invite utter and complete damnation of oneself by God.
What is Gang Stalking?
___________________________________________________________
Contents
1. A Brief Explanation of Gang Stalking
2. Introduction to the Full Explanation of Gang Stalking3. Crimes by U.S. Law Enforcement & Intelligence Agencies4. Current Oversight of Law Enforcement & Intelligence Agencies5. Published News Reports on Gang Stalking6. Historical Predecessors: Cointelpro, MK Ultra, Red Squads, & Stasi
7. The National & International Scope of Gang Stalking8. Investigation, Surveillance, & Harassment Tactics9. Mobbing & Workplace Violence10. Selection of Targeted Individuals11. The Organizational Structure of Gang Stalking12. Social Conformity & Obedience to Authority
13. The U.S. Department of Justice (DOJ) & Gang Stalking14. Disinformation15. The Wall of Silence Which Surrounds Gang Stalking16. Shining a Light on the Cockroaches
2. Introduction to the Full Explanation of Gang Stalking3. Crimes by U.S. Law Enforcement & Intelligence Agencies4. Current Oversight of Law Enforcement & Intelligence Agencies5. Published News Reports on Gang Stalking6. Historical Predecessors: Cointelpro, MK Ultra, Red Squads, & Stasi
7. The National & International Scope of Gang Stalking8. Investigation, Surveillance, & Harassment Tactics9. Mobbing & Workplace Violence10. Selection of Targeted Individuals11. The Organizational Structure of Gang Stalking12. Social Conformity & Obedience to Authority
13. The U.S. Department of Justice (DOJ) & Gang Stalking14. Disinformation15. The Wall of Silence Which Surrounds Gang Stalking16. Shining a Light on the Cockroaches
___________________________________________________________
Definition
Gang stalking – also known as “organized stalking” – is a slang term for a set of tactics used in counterintelligence operations involving the covert surveillance and harassment of a targeted individual. The goal of such operations – in the parlance of counterintelligence personnel – is to “subvert” or “neutralize” an individual deemed by a government agency (or its informants) to be an enemy.
Strategy and Tactics
Organized stalking methods were used extensively by communist East Germany’s Stasi (state police) as a means of maintaining political control over its citizens. The Stasi referred to the tactics as “zersetzen” (German for “corrode” or “decompose” – a reference to the intended psychological, social, and financial effects upon the victim).
The use of tactics such as electronic surveillance, slander, blacklisting, and psychological operations (“psyops”) methods for counterintelligence purposes – for example, to punish or suppress dissenters and whistle-blowers – has a well-documented history in the U.S. and other nations. For example, in addition to their use by the Stasi, some of the same tactics were used against American citizens during the infamous Cointelpro operations by the FBI, and the Project MK Ultra experiments by the CIA.
In gang stalking, the victim is systematically isolated and harassed in a manner intended to cause sustained psychological torture while creating the least-possible amount of evidence of stalking that would be visible to others. Accomplices – such as neighbors, co-workers, and even friends or relatives of the victim in some cases – are recruited to participate (often unwittingly) by counterintelligence personnel using various means, such as by telling them that the target is a potential threat or that the target is the subject of an “investigation.”
A whole set of psychological operations tactics is used against targeted individuals. These methods, described in detail in the overview below, include such things as threats, verbal harassment, slander, vandalism, abusive phone calls, computer hacking, tormenting the victim with noise, and “mobbing” (orchestrated verbal harassment by strangers, neighbors, or co-workers).
Harassment tactics used in organized stalking (“Cointelpro Version 2.0″) are specifically chosen for their lack of easily-captured objective evidence. Perpetrators use common annoyances such as constant noise by neighbors or rude comments and behavior by strangers, but on a frequent ongoing long-term basis. The cumulative effects of relentless exposure to such tactics can amount to psychological torture for the victim.
Accounts by numerous victims share common specific details – suggesting that the perpetrators of gang stalking are following a well-tested and standardized playbook. Using inconspicuous and difficult-to-prove tactics – sometimes referred to as “no-touch torture” helps keep organized stalking off the radar of potential witnesses and the mainstream news media.
Disinformation
Another factor contributing to the low profile of organized stalking in the media is a disinformation campaign – a common tactic in counterintelligence operations. In the case of organized stalking, the disinformation is mainly intended to mitigate exposure of the program.
Toward that end the Internet has been flooded with websites and forum comments about gang stalking that falsely purport to be from self-proclaimed victims of organized stalking, making irrational claims – references to demons and such. The intended effect is to convey the impression that everyone who claims to be targeted by gang stalking is simply delusional.
An additional disinformation strategy has been the establishment of front groups – most notably, FFCHS (Freedom From Covert Harassment and Surveillance) – ostensibly a gang stalking victims support group, but actually an organization run by counterintelligence operatives.
News Reports About Gang Stalking
Mainstream news media reports about (post-Cointelpro and post-Stasi) gang stalking – in America and abroad – did not begin to appear until the past decade or so. Such reporting is still uncommon, but the frequency of reports by reputable sources has increased dramatically in recent years.
A Newsweek/Daily Beast article in August 2000 described a trend of systematic intense harassment of individuals in their workplaces as part of a phenomenon known as “mobbing” – which is commonly reported by victims as an element of organized stalking.
In the years following the 9/11 terrorist attacks, mainstream news media reports about domestic spying in the U.S. began to appear. In2004, the PBS news program NOW and Newsweek magazine reported that the Pentagon had quietly resumed its practice of domestic surveillance. (Spying on civilians by the U.S. Army had been one of the scandals which led to the famous Church Committee investigations by Congress in the mid-1970s.)
The U.K. newspaper The Sunday Times published an article in October 2004 about the use of gang stalking tactics (“zersetzen”) by the intelligence agency MI5 to punish whistle-blowers.
In May 2006 The Globe and Mail, a Canadian national newspaper, reported that the Canadian Security Intelligence Service (CSIS) and the Royal Canadian Mounted Police (RCMP) used gang stalking techniques (referred to as “Diffuse and Disrupt” tactics) against terrorism suspects for whom they lacked sufficient evidence to legally prosecute.
The July–September 2006 edition of Revue Internationale de Criminologie et de Police technique et scientifique featured a peer-reviewed academic article by Belgian criminologist Nicolas Desurmont which described how a secret policy of criminal stalking sanctioned by law enforcement authorities is used as an extrajudicial counterintelligence weapon to psychologically terrorize targeted individuals. Desurmont has since published additional papers on the subject, and presented his findings at international conferences on criminology.
A newspaper article in the Verona-Cedar Grove Times in March 2009titled “Stalker Claims Unsettle Police” described how a self-proclaimed target of gang stalking had been distributing flyers in his former neighborhood in Verona, New Jersey, warning about organized stalking of targeted individuals. The flyers stated: “Their intention is to murder their target without getting their hands dirty. It’s the perfect hate crime.”
In October 2010, the progressive political blog, Daily Kos posted a claim that zersetzen tactics are being used by intelligence agencies in the U.S., the U.K., and Canada.
Two news reports in 2011 described gang stalking operations in California. In January of that year, local TV news broadcasts on KION (Channel 46) and KCBA (Channel 35) featured a report about gang stalking – referred to as such by the reporters and by Lieutenant Larry Richard of the Santa Cruz Police Department. In August, San Joaquin Valley newspaper The Record and KCRA (Channel 3) local TV news reported that the city manager of Stockton, California had been systematcially stalked by local police after a break-down in contract negotiations between the city and the police union.
An article in the Sun Sentinel, a Pulitzer Prize-winning newspaper in Florida, appeared in December 2012 about the organized stalking of a police officer by other officers and sheriff’s deputies from multiple jurisdictions. The victim of the stalking had cited an off-duty police officer for reckless driving. The stalking – which included illegally snooping on the victim’s private data and efforts to harass and intimidate her – was apparently done in retaliation.
The brazen use of gang stalking tactics for personal vendettas by law enforcement personnel in the Stockton, California and Florida cases seem to suggest that the officers involved were familiar with the effectiveness of the methods and were also used to getting away with such behavior.
At least two articles in 2013 alleged that the FBI’s infamous Cointelpro operations have re-emerged in full force. In January, an article inCounterPunch magazine asserted that “Cointelpro is alive and well.” In June, an article in the Nation (America’s oldest continuously-published weekly magazine) examined the case of journalist Barrett Brown. He currently faces a potential jail sentence of 105 years in connection with his efforts to expose the activities of private security/intelligence firms. The article’s author wrote: “One might think that what we are looking at is Cointelpro 2.0 – an outsourced surveillance state – but in fact it’s worse.”
The cover article of the October 2013 issue of the magazine Fortean Times was about “State-Sponsored Gangstalking” in the U.S. The author – a professor at California State University Long Beach – explored the case of a former U.S. military service member who stole some equipment and information from the U.S. military, and was then targeted for long-term intense harassment using psychological operations tactics and electronic weapons.
A local TV news report in November 2013 on WDTV Channel 5 (a CBS affiliate in West Virginia) presented a report on “organized stalking.” The broadcast featured testimony from two individuals from Pennsylvania who appeared to be credible and sincere, discussing their constant harassment by perpetrators using gang stalking tactics.
In December 2013 CBS, the Daily Mail, and other sources reported that a U.S. government contractor had filed a federal lawsuit against multiple federal agencies for gang stalking him (the complaint referred to gang stalking as such).
Scope of Operations
According to crime survey statistics (linked below) from the U.S. Department of Justice (DOJ) obtained by a Freedom of Information Act request, in 2006 there were an estimated 446,790 stalking incidents involving three or more perpetrators stalking a single individual. Of those incidents, it was estimated – based on victims’ reports – that at least 40 percent involved apparent coordination of the stalking among the multiple perpetrators.
Such statistics suggest the existence of activities whose scope cannot be explained simply as stalking by criminals – especially given that the otherwise-comprehensive index of crime categories in the DOJ’s website conspicuously makes no mention of this type of stalking.
An Internet search-engine query of the term “gang stalking” – as of October 2013 – yields well over six million results. Many of those references are obvious examples of deliberate disinformation (as mentioned above, and explored in detail in the overview below).
Organizational Structure of Counterintelligence Operations
The FBI ran a secret illegal counterintelligence program (“Cointelpro”) in the U.S. from 1956 until it was exposed by civilian activists in 1971. The program mainly targeted political dissidents. Apparently, a more sophisticated and larger scale counterintelligence program is now in effect.
Assuming that Cointelpro operations were in fact suspended after the U.S. Senate’s Church Committee investigations into the scandal in the 1970s, evidence suggests that they resumed a short time later. Ted L. Gunderson, a former high-level FBI official who became a whistle-blower, asserted that a much more sophisticated version of Cointelpro began to re-emerge in the 1980s. A link to Gunderson’s affidavit on the subject is provided in the overview below.
Based on news reports, accounts of self-proclaimed victims, and the DOJ statistics cited above, the apparent sophistication and scope of current organized stalking operations would require the acquiescence of multiple federal and local government agencies (including the FBI and the Department of Justice, among others). Federal law enforcement agencies, America’s 16 intelligence agencies, and local police departments now share crime and national security information via a nationwide network of “data fusion centers” – part of the extensive post-9/11 homeland security infrastructure.
Numerous job listings by intelligence/security contractor corporations for “surveillance role players” with active security clearances and training in counterintelligence (links and details in the overview below) strongly suggest that federal law enforcement agencies have largely outsourced these operations – which would be consistent with other security programs. A June 10, 2013 article in USA Today noted that about 1.4 million Americans have top-secret security clearances.
Federal and local law enforcement agencies – as well as intelligence agencies – also make extensive use of criminal informants (who are in large supply in America, with its extraordinary per capita incarceration rate). It would be natural for such informants to be used in a counterintelligence program. Indeed, the original Cointelpro was found by the U.S. Senate’s Church Committee investigations to have delegated some activities to organized crime groups. First-hand accounts of self-proclaimed victims of gang stalking support this assumption: by their appearance and behavior, many street-level perpetrators seem to be ex-convicts.
A national counterintelligence program would require acquiescence by the DOJ – just like the first Cointelpro did. U.S. Attorney General Robert F. Kennedy approved some of the Cointelpro operations.
Target Selection
Gang stalking apparently targets American citizens deemed to be dissidents or whistle-blowers (and perhaps potential dissidents and whistle-blowers), although others might be targeted for other reasons – such as for experimental or training purposes. For perspective, it should be remembered that for two decades the CIA performed secret illegal experiments on U.S. and Canadian citizens (the infamous MK Ultra program). Those experiments included physical and psychological torture.
It is entirely possible that some people targeted by America’s counterintelligence program are chosen simply because they crossed someone (or a corporation) connected with the program who is exploiting the counterintelligence system as a personal or corporate weapon. The intelligence industry no doubt has its share of the sort of opportunists who would abuse the enormous secret powers available to them.
An example of this occurred in April 2012, when USA Today reported that one of their reporters and an editor were slandered by a secret disinformation campaign waged by an intelligence contractor firm to discredit them because the newspaper had investigated and reported on that contractor (a company which conducted propaganda campaigns for the U.S. military). Similarly, in August 2013 it was reported that at least a dozen National Security Agency (NSA) employees had used their surveillance system access to spy on their current and former spouses and partners.
Implications
In addition to being morally reprehensible, gang stalking – just like the original version of the FBI’s Cointelpro operations – is illegal. It violates criminal laws in all fifty states against stalking, as well as grossly violating the U.S. Constitution’s prohibitions against unreasonable searches and punishment without a trial.
While the vast majority of Americans are never personally targeted by gang stalking, they should still be concerned about the existence of such programs. Even if secret extra-judicial punishment were constitutionally legitimate (clearly it is not), it would still have an enormous potential for abuse as a personal or political weapon by its practitioners.
Ending this abhorrent practice by law enforcement agencies, intelligence agencies, and their parasitic corporate contractors will require exposing what is happening to the public. For anyone reading this, if you can assist with that exposure – even by simply sharing this information with relatives and friends – please do so.
All of the above information is explained in greater detail – with links to supporting material – in the overview which follows.
__________________________________________________________
2. Introduction to the Full Explanation of Gang Stalking
I urge readers to consider the evidence presented here in its totality; the nature of organized stalking – by design – is such that it is difficult to comprehend and evaluate without considering it in its full context.
With the goal of providing some of that context, the first page of this website (“Gang Stalking News”) includes not only the relatively infrequent mainstream press articles specifically about gang stalking, but also news which is only indirectly related. Published news and analysis of subjects such as government secrecy, police corruption, privacy, surveillance, private investigators, and various government scandals are relevant to organized stalking in ways which I try to make clear.
I hope readers are not put-off by my sometimes harsh views on related political topics. I express my opinions here candidly, and the intensity of my rhetoric is partly a function of having been on the sharp end of gang stalking for years.
As for my analysis of organized stalking, I try to be as measured and cautious as possible while still confronting the reality that the subject requires a certain amount of speculation because of the secrecy and deception which surrounds it.
Given the current state of technologies and government policies concerning surveillance, the average American faces many potential and actual invasions of privacy. For individuals targeted for gang stalking, the situation is infinitely worse. Given all of that, this website is only nominally “anonymous.”
Anyone associated with the professional news media who is interested in additional information about my personal experiences with gang stalking can reach me at the email address I have provided.
Thank you for taking an interest in this material.
For victims of gang stalking, I hope that the information I post here will be helpful.
Definitions
Counterintelligence is the assessment and countering of threats posed by enemy subversion, espionage, and sabotage. Counterintelligence efforts include tactics such as covert surveillance (spying on the enemy), sabotage (disruption of the enemy’s activities), and disinformation (efforts to deceive the enemy and – when it serves the objectives of the counterintelligence program – the public).
Wikipedia’s entry on counterintelligence describes the organizational nature this way:
“In most countries the counterintelligence mission is spread over multiple organizations, though one usually predominates. There is usually a domestic counterintelligence service, usually part of a larger organization such as the Federal Bureau of Investigation in the United States.”
Cointelpro (short for “Counterintelligence Program”) was the name of a secret illegal counterintelligence program run by the FBI from 1956 until it was exposed by civilian activists in 1971 and subsequently investigated by Congress.
The U.S. Senate’s Church Committee investigations in the mid-1970s found that under Cointelpro U.S. law enforcement personnel and their various government and private citizen and criminal accomplices systematically spied on, slandered, terrorized, and committed acts of violence (including murder) against American citizens deemed to be dissidents.
Gang stalking (also known as “organized stalking”) is the covert organized surveillance and harassment of a targeted individual by multiple perpetrators. The goal is to systematically isolate and harass the victim using tactics whose cumulative effects amount to psychological torture.
As far as I know, the term “gang stalking” has not yet found its way into any major print publication dictionaries – which is not surprising for a subject residing in the grey area of counterintelligence. The term is however, much less obscure than it was, say a decade ago. For example, you can find it here in the (non-censored) popular online dictionary of slang terms: the Urban Dictionary.
Organized stalking of a targeted individual employs methods used in counterintelligence operations – such as electronic and human surveillance, slander, disinformation, and a variety of intensive long-term psychological operations (“psyops”) methods.
The Stasi (the infamous state police agency that monitored and terrorized citizens in communist East Germany by infiltrating the society with spies) referred to these tactics – aimed at breaking-down targeted individuals as “zersetzen” which translates roughly as “to decompose or to corrode.”
Although less common than “gang stalking,” the term “organized stalking” is probably a better description since it more accurately conveys the systematic nature of what is being done; also it does not create the erroneous impression that the activity is related to street gangs.
Other terms used to describe stalking by multiple perpetrators include“group stalking,” “vigilante stalking,” and “cause stalking.” The latter term refers to the fact that the activity is sometimes associated with political causes.
For example, in his book Stopping a Stalker, Robert L. Snow, a retired police captain from the Indianapolis Police Department, devoted a chapter to organized stalking by multiple perpetrators associated with causes – such as stalking of abortion clinic staff members by extreme anti-abortion activists, and stalking of workers who crossed picket lines by union members.
The Number of Stalking Incidents in the U.S.
According to U.S. Department of Justice crime survey statisticsobtained via a Freedom of Information Act request, in 2006 there were an estimated 446,790 stalking incidents involving three or more perpetrators stalking a single individual. Of those incidents, it was estimated – based on victim reports – that at least 40 percent apparently involved coordination of the stalking among the multiple perpetrators.
An attorney, Keith Labella, contacted the National Center for Victims of Crime (which is funded by the DOJ) in October 2008 to inquire about the frequency of reports the center receives about organized stalking crimes. He was informed that they receive “thousands of calls per month.”
Notwithstanding the frequency of calls to their helpline, the center offered no guidance or referral to other agencies or organizations. Here is Mr. Labella’s affidavit about his inquiry.
Cointelpro Version 2.0
In a society as heavily-policed as America now is – a society whose National Security Agency is tracking everyone’s phone calls and Internet activity for example – it is inconceivable that tens of thousands or more cases of criminal stalking (as documented in the DOJ crime statistics) fail to appear on the radar of law enforcement and intelligence agencies.
Yet there is no mention of such crimes by the federal government anywhere except in those statistics (which had to be obtained via a Freedom of Information Act request).
The implication is inescapable: federal agencies are acquiescing in what is happening. Assuming the statistics are even roughly accurate, there is no other explanation; organized stalking (the monitoring and “disruption” of the activities of targeted individuals) is being perpetrated as part of a counterintelligence program.
And it is being done illegally – as it violates state laws (in every state) against stalking as well as the U.S. Constitution’s prohibitions against unreasonable searches and punishment without a trial. Stalking is also a violation of federal law (U.S. Code Title 18, Section 2261A).
Under the Radar
How is it that the general public would not be aware of this phenomenon?
There are five main reasons:
(1) Covert Methods
The primary explanation for the low-profile of gang stalking is that counterintelligence operations are performed covertly. I describe the tactics in detail later in this overview, but the main point is obvious: just like the FBI’s original (and equally illegal) version of Cointelpro, law enforcement and intelligence agencies are not going to advertise what they are doing.
(2) Psychological Explanations
Tactics developed by the Stasi in East Germany and currently used by the FBI in America are diabolical – there is no other word – in that reports of the harassment will be naturally dismissed by most people as examples of paranoia.
Victims’ accounts tend to be dismissed since their experiences sound like commonplace occurrences – because that is indeed what they are: strangers who are rude, neighbors who are noisy, businesses which deliver bad service, drivers who cut-off the victim in traffic, pedestrians who bump them as they walk by, etc. These are things which happen to everyone. But for gang stalking victims, these things happen constantly – which becomes a form of real psychological torture, the intensity of which must be experienced to comprehend.
Using such tactics produces three desirable results from the perspective of the perpetrators: (a) the victim’s reports will not be taken seriously; (b) the victim will become angry about not being believed; and (c) the victim’s credibility will be undermined.
(3) Ignorance
Americans are largely unaware of the history of well-documented relevant programs, such as the FBI’s Cointelpro operations and the CIA’s MK Ultra program – even though both were thoroughly investigated and exposed by Congress in the 1970s. Similarly, although many people have heard of the Stasi (East Germany’s secret police agency), they are not specifically familiar with the Stasi’s use of zersetzung – which was a set of methods virtually identical to current gang stalking in America.
This is not surprising; nearly three-quarters of Americans do not know what the Cold War was about, and 29 percent cannot even name the vice president. Counterintelligence operations can thrive in an environment of such widespread ignorance.
Of course, even well-educated individuals would be unlikely to recognize the connections between a local situation in which they are told a neighbor or co-worker or business patron is under investigation and the relatively-obscure historical predecessors of gang stalking.
(4) Cowardice, Laziness, & Incompetence in the Mainstream News Media
Organized stalking goes mostly undiscussed in the mainstream news media. There are some notable exceptions – most frequently in the local and alternative press. I review those in detail throughout this website, but as a rule, major corporate news agencies avoid discussing matters which the intelligence and law enforcement community do not wish to have discussed.
This silence in the press is largely the result of the kinds of self-censorship documented in sources such as Kristina Borjesson’s Into the Buzzsaw, and Noam Chomsky’s Manufacturing Consent.
(5) Disinformation
Search results on the Internet’s largest search engine, Google, fluctuate wildly for particular words and phrases over time. Only people within Google know the exact policies and algorithms which determine those results, but the search results do provide a rough indication of the online presence of certain topics.
Typically, the list of websites generated by a search is the tip of an iceberg. Ten pages of website links will show the top 100 results, but the screen also displays a much larger number that indicates the number of references to the search term that were detected.
A Google query of the term “gang stalking” in October 2013 yielded over six million results.
As you begin to wade through the search results, you will mostly encounter websites filled with incoherent rubbish. Anyone even superficially familiar with counterintelligence will recognize this tactic; it is called disinformation.
This is another reason organized stalking has been able to remain mostly below the public’s radar. Disinformation is used to muddy the waters surrounding the topic wherever it is discussed online. The intent is to mitigate exposure of the operations.
Because of its central importance to counterintelligence generally – and organized stalking in particular – I explore the subject of disinformation at length in its own section of this overview and elsewhere in this website.
Allegations of Organized Stalking by Private Organizations
Gang stalking tactics are sometimes alleged to be used by certain fraternal orders such as Freemasons, and by various religious groups such as Scientologists and Jehovah’s Witnesses – for example, to control or punish current or former members. See for example, theMarch 15, 2013 article about that in the “Gang Stalking News” section of this website.
I have no first-hand knowledge of the use of organized stalking by religious groups, but it does seem plausible – especially if you agree with America’s second president, John Adams:
“There is a germ of religion in human nature so strong that whenever an order of men can persuade the people by flattery or terror that they have salvation at their disposal, there can be no end to fraud, violence, or usurpation.”
In the case of Scientologists, there is reportedly a policy called “Fair Game” under which the church allegedly uses aggressive tactics toward individuals and groups it perceives as its enemies. The practices – as described in this 1990 Los Angeles Times article, apparently include some tactics associated with organized stalking: “psychological warfare,” “dirty tricks,” and “harassment.” Reportedly, the Fair Game policy also sometimes involves employing detectives, former police officers, and criminals:
“Teams of private detectives have been dispatched to the far corners of the world to spy on critics and rummage through their personal lives–and trash cans–for information to discredit them.
During one investigation, headed by a former Los Angeles police sergeant, the church paid tens of thousands of dollars to reputed organized crime figures and con men for information linking a leading church opponent to a crime that it turned out he did not commit.”
Instances of “cause stalking” and stalking by religious cults presumably account for only a very small portion of the numerous incidents in the aforementioned crime survey statistics. It is true however, that members of religious cults (and cult-like fraternal organizations) are – by definition – easily manipulated, so they could serve in some cases as “useful idiot” vigilantes for others whose motivations they don’t even comprehend.
That is perhaps true for most of the general public since most people are completely unaware of the existence of any domestic counterintelligence operations and would be unlikely to suspect that what they are being told might be disinformation and manipulation as part of a modern American version of the Stasi.
Lowering Requirements for Investigations
In 2008 the U.S. Department of Justice guidelines which govern FBI investigations were changed to create a new category of investigation called “assessments.” These investigations can be initiated with no evidence that any criminal activity has occurred, and the investigations can involve such intrusive measures as physical surveillance, recruitment of criminal informants, interviewing associates of the person being investigated and deploying undercover FBI agents.
Exploiting a Government Program as a Private Weapon
The potential for abuse of power by members of private intelligence corporations and government agencies in all of this is enormous.
Here is an example of such abuse which was reported in the news media – partly because it was directed at members of the news media. One of the counterintelligence tactics which the federal government hires intelligence contractors to perform is spreading disinformation. Most Americans would probably be surprised to learn that systematically spreading lies is even a government contractor job which their taxes are funding, but they underestimate – despite President Eisenhower’s famous warning – the extent to which the U.S. government’s defense budget has become a pig trough for shady contractors.
If you criticize a comedian, you will likely become the target of a joke. Similarly, when a reporter and editor at USA Today investigated and reported on the U.S. propaganda industry in 2012, they were anonymously slandered by those same contractors.
This was the opening paragraph of their first report that apparently did not go over well with the businesses they were exposing:
“ As the Pentagon has sought to sell wars in Iraq and Afghanistan to often-hostile populations there, it has spent hundreds of millions of dollars on poorly tracked marketing and propaganda campaigns that military leaders like to call “information operations,” the modern equivalent of psychological warfare.”
As a result of their reporting, this is what happened:
“Fake Twitter and Facebook accounts have been created in their names, along with a Wikipedia entry and dozens of message board postings and blog comments. Websites were registered in their names….”
“…Internet domain registries show the website TomVandenBrook.com was created Jan. 7 — just days after Pentagon reporter Tom Vanden Brook first contacted Pentagon contractors involved in the program. Two weeks after his editor Ray Locker’s byline appeared on a story, someone created a similar site, RayLocker.com, through the same company.”
The article notes that a proxy service was used to hide the identity of the owner of the websites, and a third website was registered to a non-existent address.
Slander is just one of the tactics used in organized stalking by counterintelligence operations. Any or all of the tactics – which are described in detail in a section of this overview – could be used as a weapon by people in the business.
In theory, an organized stalking operation against an individual could be initiated by anyone familiar with the tactics who has associates willing to participate. Perpetrators with financial resources could easily employ private investigators, for example, and others with relevant technical skills to wage a sophisticated operation against someone for revenge or intimidation.
Someone with connections to current or former law enforcement or intelligence agency personnel – or military personnel with a background in intelligence – could mount a very serious campaign against a victim without even (officially) involving government agencies in the initial stages of the investigation and harassment.
In a tactic called “baiting” a surveillance operation can selectively capture evidence of a targeted person responding to harassment. That evidence could then be used to justify the initiation of more formal scrutiny by a government agency.
At whatever point at which it becomes useful or necessary, the perpetrators can – officially or unofficially – turn over to the government counterintelligence personnel whatever they have gathered to have the individual targeted more formally. For example, they could contact a “Terrorism Liaison Officer” (TLO) – a government or civilian operative entrusted with hunting for “suspicious activity.” More on TLOs in section 10 below (“The Organizational Structure of Gang Stalking”).
In essence, organized stalking tactics (and a national counterintelligence program which uses such tacics) could easily be exploited – and probably are – as a weapon against individuals who are disliked for any reason by someone who is either a member of the community of intelligence/security firms, law enforcement agencies, and intelligence agencies. Similarly, being a member of the FBI-corporate alliance called InfraGard (discussed in detail below) could create a perfect opportunity to have someone blacklisted.
Being associated with the national counterintelligence program of organized stalking (“Cointelpro 2.0″) is like having a cousin who is in the Mafia.
The Spy Industry and the Threat to American Democracy
“In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex.” – President Dwight D. Eisenhower
In addition to the extreme violations of the Constitutional and state rights of the particular individuals targeted for organized stalking, the current counterintelligence program poses a threat to democracy itself, since it can be used against anyone who dares to question the legitimacy of the government’s authority.
The FBI’s original Cointelpro operations were illegal and disturbing abuses of power; the modern version is similarly corrupt, and it is supported by the now-vast network of powerful secretive agencies and contractors armed with much more powerful technology.
The huge (and largely secret) federal budget for intelligence activities and homeland security supports a large industry of private contractors who provide technology and services for surveillance, investigations, security, and varous intelligence functions. About 70 percent of America’s budget for intelligence activities goes to private contractors, and nearly one-quarter of the 4.9 million people who hold security clearances work for private firms, according to a 2012 report from the Director of National Intelligence.
The collusion between corporations and the federal government in the area of domestic surveillance is inherently dangerous. This July 2013 article in the Atlantic posed the issue this way:
Government and corporations are both capable of terrible things. To have them colluding with one another in secret, inexorably arranging things so that there’s disincentive for disagreement among them, is terrifying. The people can fight Big Government. The people can fight Big Finance. The people can fight Big Tech. Could the people fight them if they’re all working together with secret law on their side? Booz Allen Hamilton is paid handsomely to spy on us for the government, then pours campaign contributions back into that same government, protecting their powerful financial incentive to have the surveillance state expand, something that is already a bipartisan cause.
Political support for a Stasi Big Brother police state in the U.S. is partly rooted in hawkish views about law enforcement and anti-terrorism strategy, but it’s largely rooted in greed.
Spying on Americans is a lucrative business for intelligence-security contractors.
When Congress voted in July 2013 on whether to rein-in the NSA’s domestic surveillance program which tracks Americans’ phone calls and emails, House members who voted to continue the surveillancereceived twice as much campaign finance money from the military and intelligence industry as those who voted to dismantle the program.
Americans are not normally permitted to know how much of their money the federal government spends on spying. NSA whistle-blower Edward Snowden changed that.
Among the secret documents he revealed was the 178-page “black budget” for the 2013 fiscal year. That year’s slush-fund contained $52.6 billion. You can buy a lot of traitorous Stasi rodents with that kind of money.
Also be aware that a lot more money is sloshing around in the federal pig trough which might be getting funneled into spying activities. Many U.S. intelligence operations are conducted under the authority of the Pentagon – for example, those of the Defense Intelligence Agency (DIA). Pentagon spending is notoriously difficult to keep track of. Even the U.S. Government Accounting Office says that U.S. Department of Defense spending is “unauditable.”
Defenders of Constitutional liberties are up against a powerful and well-financed industry of parasites. This May 2013 article in The New Yorker describes a “bureaucratic empire” of entities built around the homeland security industry:
“When the Washington Post surveyed that empire, in 2010, it counted more than three thousand government organizations and associated private companies working on counterterrorism, homeland security, and intelligence, in ten thousand locations across the United States.”
Frontline produced a fascinating documentary in April 2013 about the secretive agencies and corporations which make up the modern military and law enforcement industrial complex. The program is called“Top Secret America – 9/11 to the Boston Bombings.”
The whole thing is interesting, but if nothing else, watch the set-up (minutes 3 to 6) and the five minutes or so in the middle (minutes 27 to 32) about journalists uncovering the massive shadowy industry of private intelligence firms.
Tom Engelhardt, who teaches at the Graduate School of Journalism at the University of California, Berkeley, described the expansion of the national security complex this way:
“It has essentially merged with a set of crony outfits that now do a significant part of its work. It has hired private contractors by the tens of thousands, creating corporate spies, corporate analysts, corporate mercenaries, corporate builders, and corporate providers for a structure that is increasingly becoming the profit-center of a state within a state.”
Barrett Brown on the role of Private Intelligence/Security Contractors
As I am updating this (in November 2013), journalist Barrett Brown is in jail facing charges related to his role in exposing information leaked by hackers who obtained internal emails from private intelligence firms, such as Stratfor and HBGary.
Activities revealed in those leaked emails included things such as plotting to discredit journalist Glenn Greenwald and critics of the Chamber of Commerce by spreading lies about them.
In other words, at least some of these numerous secret firms engage in the kind of actions which the CIA might perform against foreign enemies – but they do so on behalf of corporate interests.
Here is an excellent article by Barrett Brown on this topic published inthe Guardian in July 2013.
Job Ads for Gang Stalkers?
On August 21, 2013 Drudge Report linked to a brief article posted the day before on InfoWars about a job announcement posted in San Diego. The job – advertised on Craigslist – was for a part-time position with an intelligence/security contractor firm as a “surveillance role player.”
As I explain in detail here (along with a link to the article and copies of similar job ads from other contractors), these job listings are numerous, but they are mostly found on on the websites of intelligence/security firms. You can locate them by performing an online search for “surveillance role player job.”
Clearly these jobs are for some type of domestic spying (there are no foreign language requirements, for example). All of the job listings specify that applicants must have active secret clearances andcounterintelligence training.
As of this writing (October 2013), I have been unable to locate any mainstream news reports that might shed light on this issue, but multiple indications suggest that these could be jobs for gang stalkers. I re-visit this critical issue in section 11 of this overview (“The Organizational Structure of Gang Stalking”).
Here is an example of one such job listing:
Click on image to enlarge.
Law Enforcement & Intelligence Agencies’ Support of a Corporate Agenda
Collusion between corporations and the federal law enforcement/intelligence community is not limited to companies in the spying industry. This subject was explored in depth in a May 2013 report from the Center for Media and Democracy, called Dissent or Terror: How the Nation’s Counter-Terrorism Apparatus, in Partnership with Corporate America, Turned on Occupy Wall Street.
That report describes two main entities which facilitate that partnership:
“There are two primary domestic public-private intelligence sharing partnerships at work at the federal level: InfraGard and the Domestic Security Alliance Council (DSAC).
InfraGard is a public-private intelligence sharing partnership managed by the FBI Cyber Division Public/Private Alliance Unit (PPAU). As described by the FBI, Infragard is an “association of businesses, academic institutions, state and local law enforcement agencies and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States.” There are 86 Infragard chapters nationwide. These Infragard chapters serve as representatives of private sector “stakeholders” in many of the nation’s fusion centers.
DSAC is a public-private intelligence sharing partnership between the FBI, U.S. DHS I&A and several of the nation’s leading corporate/financial interests. Some of these corporate/financial interests comprise the DSAC Leadership Board. The DSAC Leadership Board consists of 29 corporations and banks, including several entities that have been the subject of OWS protests/criticism. Corporate/financial interests active in the DSAC Leadership Board include: Bank of America, MasterCard, Citigroup, American Express, Barclays, RBS Citizens, 3M, Archer Daniels Midland, ConocoPhillips, Time Warner and Wal-Mart. Along with DSAC chairmen from the FBI and U.S. DHS I&A, DSAC is co-chaired by a representative of these private sector interests– currently Grant Ashley, vice president of global security for pharmaceutical giant Merck & Co.”
For a fascinating look at InfraGard, watch this episode about that subject from a TV series hosted by Jesse Ventura. The host immediately recognizes the potential for abuse of power by members of this secretive powerful group, and confronts several leaders about it on camera.
The March 2008 issue of The Progressive featured an article about this creepy corporate spy club. It seems that InfraGard’s communications with the FBI and Homeland Security are not a matter for the public to know about, as they are covered by the “trade secrets” exemption of the Freedom of Information Act.
Apparently mindful that the public will be naturally suspicious of the organization’s legitimacy, InfraGard’s website explains that members must carefully manage the image presented to the public:
“The interests of InfraGard must be protected whenever presented to non-InfraGard members,” the website states. “During interviews with members of the press, controlling the image of InfraGard being presented can be difficult. Proper preparation for the interview will minimize the risk of embarrassment. . . . The InfraGard leadership and the local FBI representative should review the submitted questions, agree on the predilection of the answers, and identify the appropriate interviewee. . . . Tailor answers to the expected audience. . . . Questions concerning sensitive information should be avoided.”
For those wishing to join this elite secretive alliance between the FBI and the corporate sector – to learn their secret handshake and to gain the power of being able to name an employee as a suspicious person to be targeted by federal goons, you “must be sponsored by an existing InfraGard member, chapter, or partner organization.”
The existence of programs like InfraGard, along with the FBI’s infiltration of groups like Occupy Wall Street, and the plotting by intelligence firms to wage a disinformation-slander campaign against critics of the Chamber of Commerce (also discussed in this overview), all suggest that activist and hacker Jeremy Hammond is correct in his assessment of the current U.S. law enforcement industry personnel – namely, that they are “the boot boys of the 1 percent, paid to protect the rich and powerful.”
Artist’s rendering of a typical InfraGard member
A Gang Stalking Organization Chart
Victims of organized stalking can only speculate about the exact nature of the shadowy network of perpetrators arrayed against them.
That speculation is made more difficult by the fact that the people who are overtly and covertly watching them and perpetrating various acts of harassment are of different classes of perpetrators with different motivations and have different connections (and often no connection) to the victim.
For example, the street-level perpetrator (“perp” as cops say) is typically someone who appears to be a rough-looking homeless or near-homeless ex-con type.
Their interactions with the target require no technical skills; the perp is just following some simple instruction – for example, to bump into the victim, or to make some specific creepy comment, or to harass the victim at his or her residence by making various noises.
Such participants in the stalking of course would not be told anything about who they are ultimately working for; in some cases perhaps they are simply paid a small sum of cash by a person who approached them on the street to perform a single act of harassment. In other cases, they might be ex-con’s who have been recruited/coerced/paid to function – technically – as “criminal informants.”
At a slightly higher level in the stalker food-chain (among those who interact with the victims) are people who appear more clean-cut and are often carrying a cell phone – presumably to communicate with their handlers.
Some of the intermediate-level participants are apparently recruited because of their relevant technical skills or because their jobs afford them access to facilities and information relevant to the operation – such as phone technicians, security guards, and landlords.
At the level above them are the people who actually orchestrate the operation. Based on my own observations, analysis, speculation, and various material I’ve read (which is included or linked in this website), these people are presumably employed by various intelligence contractors who are ultimately overseen by federal law enforcement and/or intelligence agency personnel.
The active support – or at least approval – of federal law enforcement and intelligence agencies would be necessary for such activities to occur without attracting interference from the massive homeland security infrastructure now in place.
Precedence for Organized Stalking of Dissidents
Such conspiratorial criminality might seem far-fetched if not for the fact that the U.S. government has been caught doing such things before. Context provided by an awareness of documented crimes – past and present – by government agencies is critical for evaluating the plausibility of claims about organized stalking in the U.S.
________________________________________________________
3. Crimes by U.S. Law Enforcement & Intelligence Agencies
“When the president does it, that means it is not illegal.”– Richard Nixon in a 1977 interview with David Frost
Attitudes of Government Officials About the Law
Although scandals such as Watergate and Iran-Contra occasionally break into the public’s consciousness, most Americans are unaware of the criminality which routinely occurs at the upper levels of government.
The same government officials who oversee America’s domestic surveillance and law enforcement programs often have a very casual attitude about their own obligation to obey the law.
In a Senate hearing in March 2013 the Director of National Intelligence, James Clapper, was asked “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?”Clapper said they did not.
NSA whistle-blower Edward Snowden’s subsequent revelations proved that Clapper was lying to Congress – which Clapper himself was forced to acknowledge. A typical American citizen would be prosecuted for perjury if he or she lied to Congress; Clapper obviously has no such concerns.
As a practical matter, intelligence agencies and federal law enforcement agencies exist in a mostly secret and politically-protected realm outside of the laws that bind the rest of us. They know they won’t be punished for their crimes.
The political establishment is similarly unconcerned. Since the intelligence and law enforcement community enjoys virtually unconditional support from both major parties, neither party has to worry about negative political consequences for its role in creating domestic surveillance programs which violate the Fourth Amendment.
In April 2013 WikiLeaks published a searchable database of more than 1.7 million U.S. diplomatic and intelligence documents from the mid-1970s which had been declassified. The documents included a revealing transcript of a discussion involving then-Secretary of State Henry Kissinger.
When a Turkish official suggested that the U.S. arrange to supply military hardware to Turkey – in violation of a U.S. Congressional arms embargo – Kissinger joked about the illegality:
Before the Freedom of Information Act, I used to say at meetings, “The illegal we do immediately; the unconstitutional takes a little longer.” [laughter] But since the Freedom of Information Act, I’m afraid to say things like that.
We’ll make a major effort.
For the average American, violating federal laws would be a serious matter; for government officials like Kissinger it is literally a joke.
In an August 2013 National Review article, conservative columnist John Fund quoted an intelligence official who alluded to the pervasiveness of such arrogance and deception:
A veteran intelligence official with decades of experience at various agencies identified to me what he sees as the real problem with the current NSA: “It’s increasingly become a culture of arrogance. They tell Congress what they want to tell them. Mike Rogers and Dianne Feinstein at the Intelligence Committees don’t know what they don’t know about the programs.” He himself was asked to skew the data an intelligence agency submitted to Congress, in an effort to get a bigger piece of the intelligence budget. He refused and was promptly replaced in his job, presumably by someone who would do as told.
Such behavior at the federal level sets the tone for law enforcement agencies lower down the food chain. I address this issue also in the section of this overview about the U.S. Department of Justice (DOJ).
A disturbing example of the “we’re above the law” attitude of some members of local law enforcement agencies is an event which occurred in Stockton, California in August 2011. Since the case is a clear example of organized stalking by law enforcement personnel – and was reported in a newspaper and TV news report – I include it in the published articles section of this overview and elsewhere. Please forgive the redundancy.
I highlight that incident because the circumstances strongly suggested that the officers involved were familiar with organized stalking tactics and that they were used to getting away with such illegal harassment and intimidation.
The Public’s Trust in Authority Figures
A Gallup poll in May 2013 found that nearly half of the country believes that the federal government poses an “immediate threat” to their rights and freedoms.
Note that this poll was conducted during the month before the revelation by NSA whistle-blower Edward Snowden that the intelligence community was secretly spying on the phone call records of all Americans.
Trust in U.S. government officials has eroded for two reasons: (1) the expansion of power and secrecy of the federal government predictably has led to abuses of authority, and (2) access to information via the Internet has made it harder to keep such abuses secret.
That’s the good news for targets of organized stalking. The bad news is that – as a practical matter – many people still naïvely assume that anyone who seems to be associated with law enforcement should be absolutely trusted – as seen in this ABC TV show segment.
Organized stalkers (and other criminals) can easily exploit that fact to recruit accomplices by persuading them that they are assisting an investigation or a neighborhood watch surveillance program.
Experiments have proven this strong inclination of people to trust authority figures – and to try to gain their approval. Since this tendency is relevant to counterintelligence issues, I address the subject at more length in its own section of this overview.
Evidence of this sheep-like deference to authority is not limited to the realm of science, by the way. In January 2014 a jury in the southern California city of Fullerton decided that it was OK with them that their local police department beat to death an unarmed mentally-ill homeless man who posed no risk to anyone. They were not persuaded by the mere fact that the murder had been captured on surveillance camera video.
Rise of the Police State
Although the amount of money the U.S. government spends on intelligence activities is a secret, it is clear that the monitoring of American citizens is taken seriously by their government. This is especially clear after revelations in 2013 about the scope of domestic surveillance by the National Security Agency (NSA).
Equally clear is that the U.S. justice system aggressively polices and prosecutes its citizens: the U.S. has one of the very highest per capita incarceration rates in the world.
A common – and accurate – critique of the modern U.S. government is that it has become unbalanced by the massive expansion of power and secrecy in the executive branch.
A related problem is that the now-vast network of federal agencies (whose officials of course are unelected) operate with minimal accountability. In many cases they effectively create their own laws.
This is true to some extent in all agencies since they issue and enforce regulations, but the potential to be corrupted by power is infinitely greater in law enforcement and intelligence agencies such as the FBI, the CIA, and the NSA – which operate mostly in secrecy.
The Frequency of Crimes Perpetrated by Government Agencies
You don’t have to visit an obscure blog these days to find complaints that America is becoming something of a police state. But America’s government doesn’t just engage in secret invasive surveillance and aggressive policing – it also engages in crimes.
That’s not my opinion – that’s what the federal government itself says. For example, the CIA constantly commits crimes according to the House Permanent Select Committee on Intelligence, IC 21 (April 9, 1996) – as explained in chapter 6 of Into the Buzzsaw.
The Congressional report cited therein by John Kelly (whose bookTainting Evidence: Inside the Scandals at the FBI Crime Lab was nominated for a Pulitzer Prize) states that “several hundred times every day” officers of the Clandestine Service (CS) of the CIA “engage in highly illegal activities.”
In an August 2013 article, Reuters revealed that – as a matter of official policy – a secretive unit within the U.S. Drug Enforcement Administration (DEA) instructs law enforcement officers in various agencies to lie about the origins of their investigations.
Some cops don’t need to be told to lie. The subject of crimes by police officers is generally under-reported in the mainstream corporate news media – especially on national TV news, but to evaluate the plausibility of widespread acquiescence in gang stalking by local police officers it is helpful to consider criminality by police generally.
This review of crimes by Chicago police officers published by the University of Illinois at Chicago, Department of Political Science is illuminating. Browse through the list of convictions of police officers on pages 24 to 47 of this report. The list is in alphabetical order by the officers’ names, and covers the past half-century. Keep in mind: these were just the crimes that were discovered and prosecuted.
The crimes range from bribery and extortion to torture and murder. Gang stalking would be like jay-walking for the cops on this list.
Crimes Perpetrated Under Authority of the FBI
Law enforcement agencies in America make extensive use of criminal informants in their investigations, and in many cases authorize criminals to commit crimes when an agency believes it furthers its goals, as reported for example in this August 2013 article in USA Today.
“The FBI gave its informants permission to break the law at least 5,658 times in a single year, according to newly-disclosed documents that show just how often the nation’s top law enforcement agency enlists criminals to help it battle crime.”
The FBI report from 2011 which USA Today obtained via the Freedom of Information Act does not reveal the nature of the crimes:
“The report does not spell out what types of crimes its agents authorized, or how serious they were. It also did not include any information about crimes the bureau’s sources were known to have committed without the government’s permission.”
A document released in December 2013 showed that informant crimes authorized by the FBI increased another 5 percent in 2012 to 5,939 crimes.
FBI Whistle-Blowers
Most Americans are unaware that the FBI is exempt from the Whistleblower Protection Act. If anything, the agency deserves extra scrutiny because of its history of domestic spying done for political reasons.
An October 2013 article in Reason described the FBI as a “dangerous” domestic spy agency. The author, J.D. Tucille, explains not only how the FBI is able to mostly keep its agents from revealing the agency’s crimes, but also why the abuses tend not to be investigated very aggressively by the press:
“Never hesitant about flexing its muscles to target dissenters and whistleblowers, the FBI….is more dangerous than ever.”
“Exempted from the Whistleblower Protection Act, the FBI freely retaliates against employees who attempt to call out wrongdoing. As a result, it’s rare for FBI employees to speak out. That culture lends itself to a willingness to target whistleblowers in other agencies—and journalists.”
Tucille quoted from the September 2013 report by the ACLU –Unleashed and Unaccountable: the FBI’s Unchecked Abuse of Authority. That report noted examples of the FBI spying on journalists, such as this:
“In 2010 the Inspector General reported the FBI used an illegal ‘exigent letter’ to obtain the telephone records of 7 New York Times and Washington Post reporters.”
A more high-profile case of spying on journalists was reported in May 2013, when it was revealed that the Justice Department secretly obtained two months of telephone records of reporters and editors of the Associated Press.
Famous Watergate reporter Carl Bernstein said on May 14, 2013 on MSNBC that he believed that the intention of the AP records seizure was “to intimidate people who talk to reporters.”
Mike German
Mike German was a decorated FBI agent who specialized in counter-terrorism. He left the agency after 16 years, when he became a whistle-blower. He had discovered that fellow officers were violating wiretapping regulations. When he reported that to his supervisors, his accusations were ignored, and his career was effectively frozen. Mr. German is now associated with the ACLU, as a senior policy counsel. Apparently, his experience was not unique in an agency which values secrecy more than ethics.
Mike German is one of the guests on this Democracy Now! interviewtogether with an individual who was targeted by the FBI for being a political dissident. The individual was subjected to intense investigation for years – despite having no criminal record, apart from trespassing incidents related to political protests.
At 2:06 in the video of this interview journalist Amy Goodman asks Mike German to explain the FBI’s legal authority to perform the “assessments” which, as I mentioned in the introduction above, are essentially investigations that can now be launched against an individual without any evidence that the individual has committed a crime.
Ted Gunderson
As previously mentioned, USA Today found that the FBI frequently authorizes criminals to commit crimes when its officials believe it furthers their objectives.
According to the late Ted Gunderson, a former high-level FBI official who became a whistle-blower, the crimes which are partly delegated to criminals include aspects of organized stalking.
Gunderson claimed that the FBI’s infamous Cointelpro operations (which lasted from 1956 to 1971) re-emerged in a more sophisticated form a decade or so later.
Because of its enormous prison population – largely associated with the “drug war” – America has a vast number of ex-convicts who can be easily coerced or paid to participate in organized stalking. My personal observations suggest that this is exactly what is being done in many of the instances of street-level harassment of targeted individuals.
The section of this overview which describes the original version of the FBI’s Cointelpro operations has a complete discussion of Ted Gunderson.
How Far Will U.S. Officials Go in their Criminality?
An instructive example of the extremes to which federal agencies sometimes go is the CIA’s secret MK Ultra program. I describe MK Ultra in some detail in section 6 below, so I will just note here that it involved performing experiments (including psychological and physical torture) on American citizens. No one was punished for their participation in that program – which lasted two decades, and the head of the CIA destroyed most of the records about it when it was discovered.
In September 1970 the leftists in Chile won a plurality of that country’s democratic election, as a result of which, their representative would have soon been confirmed as the next president. Right-wing political leaders in Chile, some major U.S. corporations which did business in the country (including Pepsi Cola and Chase Manhattan Bank), and the CIA were not pleased with this development and communicated that to then-president Richard Nixon and his Secretary of State, Henry Kissinger, and they plotted to arrange for a military coup instead.
An obstacle they faced was that the chief of the Chilean General Staff, General René Schnieder did not believe in interfering with the democratic process. So Nixon and Kissinger had him murdered.
The incident – and other very serious transgressions – did not prevent Kissinger from generally being treated with great respect and adulation by the American news media over the rest of his career. That kind of sycophancy and complacency by mainstream journalists obviously makes it difficult to expose and punish the bad behavior done in secret by the U.S. government.
U.S. officials are also quite willing to engage in very serious crimes against their own citizens when they believe it could further their agendas. A good example of this was “Operation Northwoods.”
A proposal was drafted in 1962 by the highest-level officials in the U.S. military establishment to stage “false flag” incidents – covert operations designed to deceive the public into thinking that acts of terrorism against Americans were being perpetrated by another country – in that case, Cuba.
The following is excerpted from a Wikipedia entry on the subject:
Operation Northwoods was a series of false flag proposals that originated within the United States government in 1962, but were rejected by the Kennedy administration.[2] The proposals called for the Central Intelligence Agency (CIA), or other operatives, to commit perceived acts of terrorism in U.S. cities and elsewhere. These acts of terrorism were to be blamed on Cubain order to create public support for a war against that nation, which had recently become communist under Fidel Castro.[3] One part of Operation Northwoods was to “develop a Communist Cuban terror campaign in the Miami area, in other Florida cities and even in Washington”.
Operation Northwoods proposals included hijackings and bombings followed by the introduction of phony evidence that would implicate the Cuban government. It stated:
“The desired result from the execution of this plan would be to place the United States in the apparent position of suffering defensible grievances from a rash and irresponsible government of Cuba and to develop an international image of a Cuban threat to peace in the Western Hemisphere.”
Several other proposals were included within Operation Northwoods, including real or simulated actions against various U.S. military and civilian targets. The plan was drafted by the Joint Chiefs of Staff, signed by Chairman Lyman Lemnitzer and sent to the Secretary of Defense. Although part of the U.S. government’s Cuban Project anti-communist initiative, Operation Northwoods was never officially accepted; it was authorized by the Joint Chiefs of Staff, but then rejected by President John F. Kennedy.
2 – Ruppe, David (May 1, 2001). ”U.S. Military Wanted to Provoke War With Cuba”. ABC News. Retrieved January 21, 2012.
3 – Zaitchik, Alexander (3 March 2011) Meet Alex Jones, Rolling Stone
Lying About Killing
A thorough review of disturbing crimes and conspiracies by the U.S. government is beyond the scope of this website. My goal here is simply to cite a few examples to make the general case that acts and programs involving serious deception and criminality are not aberrations. Here is a final example from a few years ago.
When a U.S. cruise missile struck a village in Yemen in December 2009 killing 41 people – including 14 women and 21 children – the U.S. government and the Yemeni government conspired to lie about the incident, saying that the Yemeni government had launched the attack rather than the U.S., and that the victims were members of an al-Qaeda training camp.
The truth about who launched the attack and the identity of the victims was later revealed by two sources: cables released by Wikileaks and evidence gathered and reported by a young Yemini journalist named Abdulelah Haider Shaye.
After exposing what really happened in the missle strike, Shaye was arrested on apparently trumped-up charges and given a sham trial that was criticized by major human rights organizations such as Amnesty International and sentenced to five years in prison.
In 2011 the president of Yemen announced that he was going to pardon Shaye, but apparently decided against it “because of a phone call from Obama.”
According to Amnesty International, the unexploded cluster bomblet in the photo below was found at the location of the missile strike in Yemen. It would have been one of the 166 bomblets carried by the Tomahawk cruise missile.
Each bomblet explodes “into over 200 sharp steel fragments that can cause injuries up to 150m away. An incendiary material inside the bomblet also spreads fragments of burning zirconium designed to set fire to nearby flammable objects.”
To review: In an incident which barely registered on the radar of the news media and the American public, the U.S. government killed a bunch of women and children. Then they lied about it to cover it up. Then, when they got caught lying about it, they arranged to have the journalist who exposed all the killing and lying kept in prison for reporting it.
If you think that a government which routinely does that kind of stuff (without any negative career consequences or political consequences or legal consequences for those involved) – and which was previously caught waging an illegal counterintelligence program against its own citizens – could not possibly be acquiescing in an illegal program of organized surveillance and harassment of targeted citizens, then you’re not skeptical – you’re just naïve.
________________________________________________________
4. Current Oversight of Law Enforcement and Intelligence Agencies
U.S. law enforcement and intelligence agencies currently operate with essentially the same cloak of secrecy that existed during the days of Cointelpro and MK Ultra.
Following the Church Committee investigations in the 1970s efforts were made to implement policies to protect Americans from crimes by the federal government. Unfortunately, those protections have been thoroughly undone – especially by policies such as the Patriot Act enacted in the wake of the 9/11 attacks. The FBI – and even the IRS – now assert the right to have warrantless access to the email communication of all Americans, to cite just one example.
Arguably, even the Church Committee reforms aimed at outlawing assassinations of foreign leaders have been undermined. The government now orders drone assassinations in places like Yemen and launches wars without the approval of Congress – such as the “military intervention” against Libya launched in March 2011.
It’s difficult to even assess the extent to which America’s law enforcement and intelligence agencies have returned to being rogue entities, given that they now routinely invoke “national security” as a justification for keeping American citizens from knowing their business. Political cowardice by members of Congress – as well as laziness, group-think, and careerism among many journalists at major news outlets has resulted in a lack of oversight of America’s most secretive government agencies.
Fortunately, there are some exceptions; some journalists do report that the intelligence and law enforcement communities have slipped the leash. A Forbes magazine writer – to cite just one example – has suggested that we probably need another Church Committee investigation. The Forbes article quotes a former senior NSA official, William H. Binney, who said we seem to be headed “toward an Orwellian state.”
A November 2013 article in the New York Times on spying by the NSA quoted Binney on the danger of the intelligence community’s powers being used as a weapon against Americans:
Mr. Binney said that without new leadership, new laws and top-to-bottom reform, the agency will represent a threat of “turnkey totalitarianism” — the capability to turn its awesome power, now directed mainly against other countries, on the American public. “I think it’s already starting to happen,” he said. “That’s what we have to stop.”
Here is another one of many examples of media coverage (not just crazy blogger rants) about the creepy government surveillance of American citizens. This Mother Jones article describes the FBI’s “massive network of spies.”
In light of all the above, the government’s acquiescence in organized stalking hardly seems far-fetched. As America deteriorates toward an increasingly Orwellian state, gang stalking victims are the canaries in the coal mine.
________________________________________________________
5. Published Articles & TV Reports on Organized Stalking & Current Counterintelligence Operations
Depending on how you arrived at this website, you might be partly familiar with claims about organized stalking, but skeptical that it is widespread (or even that it exists at all). I respect your skepticism.
If you want to review some of the published articles on the subject before delving into the historical and theoretical discussion presented in this overview, you can go directly to such articles posted on this website (with commentary and links) before proceeding.
Here are some examples:
An article in Newsweek/Daily Beast in August 2000 about systematic intense harassment in the workplace – an element of organized stalking known as “mobbing.”
An episode of the PBS News show NOW broadcast in March 2004, which addressed the issue of the possible re-emergence of the FBI’s Cointelpro operations. NOW is an Emmy-winning weekly TV newsmagazine on PBS. Tom Brokaw described NOW as “fearless about challenging conventional wisdom.” The Austin American-Statesman called NOW ”one of the last bastions of serious journalism on TV.”
While the video of the program is not posted on the PBS website, there is a synopsis of the show under the title “Cointelpro Again?”
Here is the relevant passage:
“Some fear that something like COINTELPRO may again be at hand. There are undercover agents infiltrating peaceful protests in America. Pretending to be political activists, local law enforcement officials are monitoring the activities of advocacy and protest groups based on what one judge calls those organizations’ “political philosophies and conduct protected under the First Amendment.” The tactic has come about as a result of the relaxation of guidelines first put into place after the COINTELPRO scandal investigation.”
An article in Newsweek in June 2004 about the Pentagon quietly re-entering the business of domestic spying. One of the scandals (along with Watergate, Cointelpro, and other crimes) which led to the U.S. Senate’s Church Committee investigations during the 1970s was the spying on Americans by U.S. Army intelligence agents. In the years following the 9/11 attacks, as this article noted, the military sneaked back into that role:
“Without any public hearing or debate, NEWSWEEK has learned, Defense officials recently slipped a provision into a bill before Congress that could vastly expand the Pentagon’s ability to gather intelligence inside the United States, including recruiting citizens as informants.”
An article in The Sunday Times, a major newspaper in the U.K., reported in October 2004 that the intelligence agency MI5 uses gang stalking tactics to punish whistle-blowers. In the article the tactics are referred to as “zersetzung” – as the process was called by the Stasi (the state police of communist East Germany).
An article in The Globe and Mail, a Canadian national newspaper, which reported in May 2006 that the Canadian Security Intelligence Service (CSIS) and the Royal Canadian Mounted Police (RCMP) used gang stalking techniques (referred to as “Diffuse and Disrupt” tactics) against terrorism suspects for whom they lacked sufficient evidence to prosecute.
An academic peer-reviewed criminology study of gang stalking in Belgium was published in the July–September 2006 edition of Revue Internationale de Criminologie et de Police technique et scientifique(volume 49), pages 350-373. Criminologist Nicolas Desurmont described how a secret policy of criminal stalking sanctioned by law enforcement authorities is used as an extrajudicial counterintelligence weapon to psychologically terrorize targeted individuals. Desurmont has published additional papers on the subject since then, and presented his findings at international conferences on criminology. As of December 2013, no (official) English translations of his papers were available (I confirmed this with Mr. Desurmont), although the English language pdf file linked below appears to be a competent translation – especially for someone translating an academic text into a non-native language.
Vers une problématique du harcèlement criminel en réseau (2006)
The original document:
An English translation:
La geocriminologie en contexte de gang-stalking (2009)
Essai de caractérisation des phénomènes de stalking dans un contexte juridique et politique : radiogoniométrie et filature (2010)
A newspaper article in the Verona-Cedar Grove Times in March 2009 titled “Stalker Claims Unsettle Police” described how a self-proclaimed target of gang stalking had been distributing flyers in his former neighborhood in Verona, New Jersey, warning about organized stalking of targeted individuals. The flyers stated: “Their intention is to murder their target without getting their hands dirty. It’s the perfect hate crime.”
A post on the political blog Daily Kos in October 2010 alleged that intelligence agencies in the U.S., the U.K., and Canada use gang stalking (zersetzung as East Germany’s Stasi called it) against targeted individuals. Although the article did not provide sourced details, it might have helped raise awareness of this form of state-sponsored criminal harassment since Daily Kos receives several hundred thousand visits per day.
A local TV news broadcast in California in January 2011 (on KION – Channel 46 and KCBA – Channel 35) featured a report about gang stalking – referred to as such by the reporters and by Lieutenant Larry Richard of the Santa Cruz Police Department.
A newspaper article in The Record and a TV report on KCRA Channel 3 about an organized stalking case in August 2011 involving the city manager of Stockton, California being stalked by local police after a break-down in contract negotiations.
An article in the Sun Sentinel, a Pulitzer Prize-winning newspaper in Florida, in December 2012 about the organized stalking of a police officer by other police officers and sheriff’s deputies from multiple jurisdictions. The victim of the stalking had cited an off-duty police officer for reckless driving (he was later fired). The stalking – which included illegaly snooping on the victim’s private data and efforts to harass and intimidate her – was apparently done in retaliation. The Sun Sentinal later won a Pulitzer Prize for public service journalism for its series of articles on deaths and injuries caused by reckless driving by Florida police officers.
An article in CounterPunch magazine in January 2013 which asserted that the FBI’s infamous Cointelpro operations have re-emerged in full force: “Cointelpro is alive and well.”
An article in the Nation (America’s oldest continuously-published weekly magazine) in June 2013 (“The Strange Case of Barrett Brown”) by Northwestern University professor Peter Ludlow, in which he stated – in reference to actions by private security firms, the FBI, and the Department of Justice: “One might think that what we are looking at is Cointelpro 2.0 – an outsourced surveillance state – but in fact it’s worse.”
An article in the Washington Times and an article in Wiredmagazine both discussed the widespread speculation that theSeptember 2013 mass shooting at the Washington D.C. Navy Yard resulted from the shooter having been systematically tormented by gang stalkers using electronic weapons and noise harassment.
The cover article of Fortean Times in October 2013 (U.S. edition) is about “state-sponsored gangstalking.” The magazine is a U.K.-based publication about odd news. The author, a professor from California State University Long Beach, describes in detail how a former military service member who stole some equipment from the U.S. military has been relentlessly stalked by undercover operatives and tortured using psychological operations tactics and electronic weapons.
A local TV news broadcast in West Virginia on 14 November 2013(on WDTV – local CBS News affiliate Channel 5) presented a report about “organized stalking.” The broadcast featured testimony by two individuals from Pennsylvania who appear to be credible and sincere, discussing their constant harassment by perpetrators using gang stalking tactics.
A TV and radio broadcast of Democracy Now! on 25 November 2013 featured an interview with Gary Ruskin, director of the Center for Corporate Policy in which he discussed the shadowy industry of spies employed by major U.S. corporations to conduct secret – and often illegal – counterintelligence operations against critics of those corporations.
Articles published by CBS, the Daily Mail, RT, Tech Dirt, and Courthouse News Service in December 2013 reported that a U.S. government contractor filed a lawsuit against multiple federal agencies for gang stalking him (the complaint refers to gang stalking as such). The plaintiff claimed that his stalking began after he made a Google search for information about how to build a radio-controlled airplane. While typing his query, Google’s auto-complete function finished his“How to build a radio-controlled…” query with the word “bomb.” The individual was then subjected to constant surveillance – including inside his residence and his vehicle – and constant psychological harassment from co-workers and strangers.
________________________________________________________
6. Historical Predecessors of Gang Stalking: Cointelpro, MK Ultra, Red Squads, & Stasi
J. Edgar Hoover
If I were creating an education plan for American high school students, I would require that everyone take a class during his or her senior year that reviewed the major conspiracies and scandals of American government: the Teapot Dome scandal, the Pentagon Papers, Watergate, Iran-Contra, etc. No one can participate intelligently in a democracy without such an historical background.
Gang stalking is the U.S. government’s current incarnation of the tactics and strategies employed by previous secret illegal federal programs, such as the FBI’s Cointelpro (“Counter-intelligence Program”) and the CIA’s Project MK Ultra.
Anyone who doubts that the U.S. government would be currently sanctioning a widespread conspiracy involving illegal surveillance and harassment of targeted American citizens should read the basic facts about those two programs. Don’t even bother with obscure sources of information; simply read the established mainstream accounts of the undisputed facts. The details are deeply disturbing.
**************************************************
Cointelpro
Cointelpro was a secret illegal program in which U.S. law enforcement personnel and their various government and private citizen accomplices systematically spied on, slandered, terrorized, and committed acts of violence (including murder) against American citizens. The program ended after being exposed in 1971 by civilian activists who obtained information about it and leaked it to the news media.
It would be difficult to overstate the relevance of the Cointelpro operations to modern gang stalking in the U.S. By all available evidence, current organized stalking crimes in the U.S. are not similarto Cointelpro; they are a continuation of Cointelpro.
Significantly, Cointelpro was not exposed by insider whistle-blowers; the FBI agents and their civilian minions dutifully perpetrated their assigned crimes until the operations were derailed by civilian outsiders.
Exposure of the program required those civilians to break into an FBI office and steal documents about the program and give them to the news media.
Also bear in mind: J. Edgar Hoover’s name is still on the FBI headquarters building.
As noted in the introduction above, a January 21, 2013 article inCounterPunch magazine asserted that Cointelpro is now secretly being used again on a wide scale. In that article, “The Return of Cointelpro?” Tom McNamara describes the original program – and its re-emergence – as follows:
For 15 years (1956-1971) the Federal Bureau of Investigation (FBI) ran a broad and highly coordinated domestic intelligence / counterintelligence program known as COINTELPRO (COunter INTELligence PROgrams). What was originally deemed as a justifiable effort to protect the US during the Cold War from Soviet and Communist threats and infiltration, soon devolved into a program for suppressing domestic dissent and spying on American citizens. Approximately 20,000 people were investigated by the FBI based only on their political views and beliefs. Most were never suspected of having committed any crime.
The reasoning behind the program, as detailed in a 1976 Senate report, was that the FBI had “the duty to do whatever is necessary to combat perceived threats to the existing social and political order.” The fact that the “perceived threats” were usually American citizens engaging in constitutionally protected behaviour was apparently overlooked. The stated goal of COINTELPRO was to “expose, disrupt, misdirect, discredit, or otherwise neutralize” any individual or group deemed to be subversive or a threat to the established power structure.
The FBI’s techniques were often extreme, with the agency being complicit in the murder and assassination of political dissidents, or having people sent away to prison for life. Some of the more “moderate” actions that were used were blackmail, spreading false rumors, intimidation and harassment. It has been argued that the US is unique in that it is the only Western industrialized democracy to have engaged in such a wide spread and well organized domestic surveillance program. It finally came to an end in 1971 when it was threatened with public exposure.
Or did it?
In a stunning revelation from the Partnership for Civil Justice Fund (PCJF), it appears that COINTELPRO is alive and well. Through a Freedom of Information Act (FOIA) request, PCJF was able to obtain documents showing how the FBI was treating the Occupy Wall Street (OWS) movement, from its inception, as a potential criminal and domestic terrorist threat.
The article doesn’t mention the phrase “gang stalking,” but if you don’t see the connection, you’re in over your head. If you’re a journalist or a politician, this is probably as close as you will get to a memo telling you to wake up and grasp what is happening.
The author, Tom McNamara, provides an excellent review of the original program, and an analysis of its current incarnation. You can judge for yourself whether he feels free to discuss such things because he’s on the other side of the Atlantic Ocean.
McNamara is “an Assistant Professor at the ESC Rennes School of Business, France, and a Visiting Lecturer at the French National Military Academy at Saint-Cyr, Coëtquidan, France.”
Retired FBI Official from Cointelpro Era Tried to Expose Modern Gang Stalking
Among the most compelling testimony about the current widespread existence of gang stalking is that of a man who was familiar with Cointelpro operations because he participated in them as an FBI official.
The late Ted L. Gunderson served as the head of the FBI field offices in Los Angeles, Dallas, and Memphis. After retiring from the FBI in 1979, he became a private investigator. His investigations included working for the defense in the famous murder case involving former U.S. Army physician, Dr. Jeffrey MacDonald.
In a series of public appearances (and in an affidavit linked below) Gunderson revealed that “rogue” military intelligence and law enforcement units of the federal government oversee a nationwide network of community-based gang stalkers who monitor, harass, and intimidate thousands of American citizens who have been extrajudicially targeted as dissidents or undesirables.
Gunderson claimed that his efforts to expose gang stalking resulted in him becoming a victim himself, as efforts were made to silence him.
Here is an audio clip from a presentation Gunderson gave in which he described how organized stalking tactics – such as electronic surveillance and “gas lighting” – were used against him.
According to Gunderson, gang stalking has been operational since the early 1980s (i.e., it began only a few years after the U.S. Senate thought they had pulled the plug on Cointelpro following the Church Committee investigations). Gunderson said that the scope, intensity, and sophistication of gang stalking have increased since its inception, as it exploits new surveillance and communication technologies.
Analysis of Ted Gunderson’s claims about gang stalking is complicated for several reasons. On one hand, he was a former high-level FBI official who worked in the agency during the era of Cointelpro, so he had professional expertise and first-hand experience with that agency’s counterintelligence operations. On the other hand, his public statements about gang stalking – for example in his affidavit which you can view below, as well as his public discussions of the matter (which can be found on YouTube) include references to various fringe topics, such as satanism and child sex rings, and such.
Such references – along with the fact that he is no longer around to clarify or defend his claims – raise several questions that might never be answered. History contains many examples of well-documented serious crimes, bizarre human experiments, and odd beliefs by sociopaths at high levels of government (in the U.S. and other nations), but Gunderson never proved his theories.
At the same time, anyone skeptical of Gunderson’s claim about the U.S. government’s complicity in gang stalking must admit that he cannot be easily dismissed. If he was crazy – or an incompetent investigator – how come no one noticed that when he was in charge of the FBI’s Los Angeles field office?
__________________________
FBI’s Gang Stalking Campaign Against Actress Jean Seberg
For a sense of the evil nature of gang stalking, take a look at one of the most high-profile well-documented cases of it perpetrated by the FBI in the days of the original Cointelpro operations.
My November 23, 2013 post on the “Gang Stalking News” page of this website is on a documentary about the well-known film actress, Jean Seberg, who was systematically terrorized by the FBI for her support of the civil rights movement.
This was a case with explicitly incriminating “smoking gun” FBI memos and mainstream news reports documenting what the feds did to their victim. (Those documents are included in my post.)
FBI agents blacklisted Seberg, slandered her by planting false stories about her in the news media, monitored her with covert surveillance (wiretaps), and terrorized her with overt surveillance (stalking) and black bag jobs (break-ins).
Emotional distress from the FBI’s operations against Ms. Seberg – while she was pregnant – apparently caused her to give birth prematurely (her baby died), and ultimately led her to commit suicide. Ms. Seberg was just one of many victims targeted by the FBI’s secret police program.
__________________________
The Break-in
A fascinating but under-reported aspect of Cointelpro is the break-in which led to the program’s exposure.
In his March 8, 2006 Los Angeles Times article on the subject, Allan M. Jalon described the event:
THIRTY-FIVE YEARS ago today, a group of anonymous activists broke into the small, two-man office of the Federal Bureau of Investigation in Media, Pa., and stole more than 1,000 FBI documents that revealed years of systematic wiretapping, infiltration and media manipulation designed to suppress dissent.
The Citizens’ Commission to Investigate the FBI, as the group called itself, forced its way in at night with a crowbar while much of the country was watching the Muhammad Ali-Joe Frazier fight. When agents arrived for work the next morning, they found the file cabinets virtually emptied.
Within a few weeks, the documents began to show up — mailed anonymously in manila envelopes with no return address — in the newsrooms of major American newspapers. When the Washington Post received copies, Atty. Gen. John N. Mitchell asked Executive Editor Ben Bradlee not to publish them because disclosure, he said, could “endanger the lives” of people involved in investigations on behalf of the United States.
Nevertheless, the Post broke the first story on March 24, 1971, after receiving an envelope with 14 FBI documents detailing how the bureau had enlisted a local police chief, letter carriers and a switchboard operator at Swarthmore College to spy on campus and black activist groups in the Philadelphia area.
More documents went to other reporters — Tom Wicker received copies at his New York Times office; so did reporters at the Los Angeles Times — and to politicians including Sen. George McGovern of South Dakota and Rep. Parren J. Mitchell of Maryland.
To this day, no individual has claimed responsibility for the break-in. The FBI, after building up a six-year, 33,000-page file on the case, couldn’t solve it. But it remains one of the most lastingly consequential (although underemphasized) watersheds of political awareness in recent American history…
Update….
An article in the January 7, 2014 New York Times revealed the identities of the activists who exposed Cointelpro by breaking into that FBI office to obtain the secret documents.
_________________________
The Official Reports
Since the FBI committed so many crimes against Americans during this era, there are thousands of pages of documents in the U.S. Senate’s Church Committee reports.
Most Congressional reports are boring – but not these. Among the most interesting documents (and the most relevant to gang stalking) are the three which you can view or download below.
Just browsing through the contents pages gives a sense of the scope of the FBI’s crimes. Here are some of the topic headings:
Use of illegal or improper means, mail opening, political abuse,ignoring the law, efforts to discredit, media manipulation, distorting data to influence government policy and public perception,Congress declines to confront the issue “infiltration” investigations, wiretaps,bugging, FBI political intelligence for the White House, exaggeration of communist influence, “Black Bag”jobs, misuse of the IRS by the FBI and CIA, targeting of ideological groups, NSA monitoring, warrantless electronic surveillance, domestic intelligence network, violent and illegal activities of informants, targeting law-abiding citizens, targeting critics and political figures, attorneys general failure to limit and control FBI intelligence activities, efforts to promote enmity and factionalism within groups or between groups, encouraging violence between groups, efforts to prevent speaking/teaching/writing and publishing, propaganda, fictitious organizations, disseminating derogatory information to family, friends, and associates, contacts with employers, interference with the judicial process, blurred distinction between counterintelligence and investigation.
These reports are filled with interesting stuff. For example, Volume 6 of the hearings contains, among other items, a letter about “black bag jobs” (referred to as such). Book 2 of the final reports refers to an apparent attempt to blackmail Martin Luther King, Jr. and encourage him to commit suicide (pages 220-221).
This U.S. Senate webpage has all the Church Committee reports:
_________________________
Two of the individuals deemed “subversives” by the FBI and targeted under the original Cointelpro: Martin Luther King, Jr. and John Lennon.
**************************************************
MK Ultra
Project MK Ultra was a secret illegal program run by the CIA in which mind control and torture experiments were performed on U.S. and Canadian citizens from the early 1950s until the early 1970s.
Many experiments were performed without the consent of the subjects – and in some cases without the subjects even being aware that they were being used for experimentation.
The mind control and torture methods that were tested included sensory deprivation, isolation, hypnosis, verbal and sexual abuse, and the administration of drugs and substances which caused confusion, brain damage, blistering, and paralysis.
That might explain why there are no MK Ultra tribute floats in America’s various holiday parades.
The experiments were performed at dozens of colleges and universities, hospitals, prisons, and pharmaceutical companies in the U.S. and Canada. Front organizations were used by the CIA to operate the program through those institutions, although in some cases the top officials at the institutions knew about the CIA’s involvement.
Keep that in mind when you evaluate the plausibility that a widespread program of organized stalking could exist without being compromised by various officials at private and public institutions and organizations.
In the mid-1970s the program was exposed by the U.S. Senate’s Church Committee investigations. Those investigations (which also examined Cointelpro) were a response to a series of revelations about crimes by the U.S. government, including the attempted assassinations of foreign leaders, the U.S. Army’s spying on civilians, Cointelpro, and the Watergate scandal.
In 1973, when MK Ultra was being exposed, CIA Director Richard Helms destroyed most of the records associated with the program to ensure the American public would never learn the full scope of the agency’s crimes.
One of the best books on the subject is The Search for the “Manchurian Candidate” by John D. Marks. The award-winning book was highly-praised by Seymour Hersh – the famous investigative journalist who exposed the My Lai Massacre and Nixon’s secret bombing of Cambodia during the Vietnam war.
Another widely-praised book on MK Ultra is Operation Mind Control by Walter Bowart. It was originally published in 1978. An updated and expanded (“researcher’s edition”) published in 1994 can be downloaded as a pdf at this website.
Here is the Congressional report on Project MK Ultra.
**************************************************
Red Squads
Red Squads are another historical predecessor of gang stalking in the U.S. They were counterintelligence units within police departments in large cities, and pre-dated the creation of the FBI.
A Wikipedia description:
“Red Squads were police intelligence units that specialized in infiltrating, conducting counter-measures and gathering intelligence on political and social groups during the 20th century. Dating as far back as the Haymarket Riot in 1886, Red Squads became common in larger cities such as Chicago, New York, and Los Angeles during the First Red Scare of the 1920s. They were set up as specialized units of city police departments, as a weapon against labor unions, communists, anarchists, and other dissidents.”
For a well-researched account of Red Squads, see the book Protectors of Privilege (published in 1990) by Frank Donner, a civil rights lawyer.
As the title of Donner’s book suggests, Red Squads and private investigators played the same role in their day as today’s FBI and private intelligence-security contractors. The current federal law enforcement community was described by Anonymous hacker-activist Jeremy Hammond (now serving a 10-year prison sentence) as “the boot boys of the 1 percent, paid to protect the rich and powerful.”
Here is Frank Donner’s description (page 12) of the role of law enforcement personnel and private intelligence contractors in Chicago during the 1880s:
“The reliance by the Chicago business community on repressive police tactics to deal with labor unrest was unconcealed. Indeed, the Chicago police were as much the minions of the business community as hired Pinkertons.”
**************************************************
The Stasi
Insignia of East Germany’s “Ministry for State Security”
Communist East Germany’s Stasi – its secret police agency – is another historical predecessor of gang stalking.
The psychological terrorism strategies used by the Stasi were referred to as “zersetzung” – which translates as “decomposition” or “corrosion.” As used to refer to the Stasi’s tactics, the term meant “to undermine or subvert.” Zersetzung is the noun; zersetzen is the verb.
Methods used by the Stasi – which included overt and covert surveillance, slander, and psychological operations (“psyops”) tactics – were essentially identical to those currently used in organized stalking in counterintelligence operations in America and elsewhere.
Gang stalking harassment tactics described later in this overview borrow heavily from the psychological torture methods refined by the Stasi.
Arguably, the activities of the Stasi are even more closely relevant to modern gang stalking in the U.S. than Cointelpro. The Stasi was famous for controlling citizens by seeding East German society with spies. A January 18, 2008 article in Wired magazine described it this way:
“As the enforcement arm of the German Democratic Republic’s Communist Party, the Stasi at its height in 1989 employed 91,000 people to watch a country of 16.4 million. A sprawling bureaucracy almost three times the size of Hitler’s Gestapo was spying on a population a quarter that of Nazi Germany.
Unlike the prison camps of the Gestapo or the summary executions of the Soviet Union’s KGB, the Stasi strove for subtlety. “They offered incentives, made it clear people should cooperate, recruited informal helpers to infiltrate the entire society,” says Konrad Jarausch, a historian at the University of North Carolina at Chapel Hill. “They beat people up less often, sure, but they psychologically trampled people. Which is worse depends on what you prefer.”
That finesse helped the Stasi quell dissent, but it also fostered a pervasive and justified paranoia.”
Here is the interrogation center where the psychological torture methods of zersetzung were refined. These are the isolation cells in the Hohenschoenhausen Prison in Berlin – which is now a museum.
Click on image to enlarge.
The following excerpt from a Wikipedia entry on the Stasi provides a good description of their strategy and tactics:
By the 1970s, the Stasi had decided that methods of overt persecution which had been employed up to that time, such as arrest and torture, were too crude and obvious. It was realised that psychological harassment was far less likely to be recognised for what it was, so its victims, and their supporters, were less likely to be provoked into active resistance, given that they would often not be aware of the source of their problems, or even its exact nature. Zersetzung was designed to side-track and “switch off” perceived enemies so that they would lose the will to continue any “inappropriate” activities.
Tactics employed under Zersetzung generally involved the disruption of the victim’s private or family life. This often included psychological attacks such as breaking into homes and messing with the contents – moving furniture, altering the timing of an alarm, removing pictures from walls or replacing one variety of tea with another. Other practices included property damage, sabotage of cars, purposely incorrect medical treatment, smear campaigns including sending falsified compromising photos or documents to the victim’s family, denunciation, provocation, psychological warfare, psychological subversion, wiretapping, bugging, mysterious phone calls or unnecessary deliveries, even including sending a vibrator to a target’s wife. Usually victims had no idea the Stasi were responsible. Many thought they were losing their minds, and mental breakdowns and suicide could result.
One great advantage of the harassment perpetrated under Zersetzung was that its subtle nature meant that it was able to be denied. That was important given that the GDR was trying to improve its international standing during the 1970s and 80s.
Zersetzung techniques have since been adopted by other security agencies, particularly the Russian Federal Security Service (FSB).
For more information on the psychological torture methods used by the Stasi – and still used today by the FBI, the CIA, and their minions – you can visit this website.
A film about the Stasi - “The Lives of Others” (“Das Leben der Anderen” was the German title) – won the Academy Award for Best Foreign Language Film (2006).
Here is a New York Times review of the movie.
__________________________________________________________
7. The National and International Scope of Gang Stalking
Well-documented historical and contemporary reporting makes it abundantly clear that organized stalking tactics have been – and continue to be – used by various foreign intelligence services and law enforcement agencies. In the section below, for example, is a news report about a first-hand account of organized stalking tactics being used by Russian intelligence agents. No one disputes that such tactics were widely used by East Germany’s Stasi.
Two mainstream news articles I posted in the “Gang Stalking News” section of this website (October 10, 2004 and May 31, 2006) are about gang stalking tactics used by intelligence and law enforcement agencies in Northern Ireland and Canada.
Incidentally, the U.S. Senate Church Committee investigations found that the government of Canada was also complicit in the infamous CIA program, MK Ultra.
Peer-reviewed academic research articles published by criminologist Nicolas Desurmont (see the “Published Articles” section of this overview above) show that gang stalking has been used extensively by law enforcement agencies in Belgium.
From my perspective, another indication of the international scope of gang stalking is the Internet traffic and emails to this website from countries all over the world.
Based on personal experience and numerous accounts by self-proclaimed victims, organized stalking occurs across the nation here in the U.S. Apparently, moving from one area to another is not likely to help a victim avoid being stalked. Similarly, international cooperation among law enforcement and intelligence agencies means that moving from the U.S. to Canada is probably not going to be helpful.
The most realistic solution is to expose the criminal activities of intelligence and law enforcement agencies – and their private contractors – to the public.
__________________________________________________________
8. Investigation, Surveillance, and Harassment Tactics
Investigation
Apparently, gang stalking begins with a deep investigation of the targeted individual.
An investigation serves multiple purposes in counterintelligence:
(1) Information gathered about the target can later be used to tailor the surveillance and harassment (subversion) strategies. In some cases, an investigation could also reveal that the target is unsuitable for gang stalking because he or she has connections and resources which would enable the target to fight back.
(2) In the unlikely event that acts of harassment get exposed, formal documentation that an “investigation” was being performed could possibly be cited to explain some of the suspicious activity (for example, overt stalking could be easily explained as “covert surveillance” that happened to be noticed by the target).
(3) Law enforcement and intelligence personnel – public and private – at various levels are sometimes under pressure to show that they are being productive, so there could well be a de facto quota for conducting investigations of “suspicious” persons.
(4) Acts of subversion can be seamlessly incorporated into what is ostensibly an investigation. As noted above, overt stalking is a prime example. Stalking was one of the tactics used by the FBI in their subversion campaign against the actress Jean Seberg during their Cointelpro operations, for example. (After years of such harassment she committed suicide.) Another tactic – also used during Cointelpro against various targeted individuals – was slander. An investigation provides a legally bullet-proof opportunity to slander the victim. If an investigator quietly begins questioning persons associated with a targeted individual (co-workers, friends, etc.), and tells them that he is conducting an investigation, it could easily destroy the target’s reputation and relationships.
Obtaining information from the targeted individual and from persons who know the targeted individual is a process undercover investigators and spies call “elicitation.” This pdf document from the FBI explains the strategies and tactics of elicitation: FBI Elicitation Tactics
Surveillance
As with investigations, the surveillance element of organized stalking involves the same tactics used around the world by many private investigators, intelligence agents, and law enforcement personnel: black bag jobs, electronic surveillance (phone wiretaps, hacking of personal computers, listening devices, spy cameras, GPS-monitoring of vehicle location, etc.), combined with direct visual surveillance (“human intelligence”) by various accomplices.
Most personnel involved in managing and performing organized stalking are paid for their services – whether they work directly for an agency such as the FBI, or for private intelligence-security contractor firms, or as criminal “informants.” Others though, are recruited to assist as volunteers. For example, when the FBI’s illegal Cointelpro operations were exposed, internal documents showed that the agency had enlisted a local police chief, letter carriers, and a switchboard operator at Swarthmore College to spy on campus and black activist groups in the Philadelphia area.
Harassment Tactics (“Subversion”)
In counterintelligence, to “subvert” or “neutralize” an enemy is to make it impossible for that enemy to go about his business. Gang stalkers seek to keep their victim in a constant state of agitation and hyper-vigilance so that he or she will find it almost impossible to function.
This serves multiple purposes. For one thing, it makes it hard for the individual to pose a threat to the client of the gang stalkers – whether that is a corporation or a government.
Note that – as discussed in detail elsewhere in this website – the distinction between corporations and the government is often meaningless in America, given the vast industry of private intelligence contractors with secret clearances, the use of the FBI and other agencies to serve corporate interests, and the lucrative revolving-door nature of employment between the public and private spheres in law enforcement and intelligence. This is another obvious purpose of gang stalking: income for the perpetrators.
Another function of gang stalking is to exact revenge against the victim. Stalking is a form of extra-judical punishment for anyone who crosses someone with connections to the vast homeland security infrastructure.
Constant surveillance of targeted individuals (described above) is also an element of subversion. Anyone who knows that he or she is under constant surveillance will not only be inhibited from acting against the interests of the client of the gang stalkers, he or she will also find it difficult to fight back against the harassment or evade the surveillance itself because many efforts at counter-measures will be observed by the stalkers. In addition, anyone who is aware that he or she is constantly being watched by illegal spying will suffer the emotional trauma caused by having virtually no privacy.
“Harassment” is an appropriate description of many of the individual acts perpetrated against gang stalking victims since they are intended to annoy, anger, and frustrate the targeted individual – rather than, say, physically injure him or her. On the other hand, “harassment” does not begin to convey the severity of the cumulative psychological effects of organized stalking.
Slander, verbal abuse, noise, threats by strangers, constant surveillance, and other tactics, performed daily over a period of years will cause psychological torture, social isolation, and financial destruction.
According to some anonymous sources, the overall process is sometimes called “slow kill.” Regardless of whether that term is actually used by perperators of gang stalking, it is an appropriate description. East Germany’s Stasi (state police) referred to it as“zersetzen” – to corrode or decompose.
Some of the psychological operations tactics described below have ancient roots; the frequent and sustained use of noise to torment enemies, for example dates back to ancient siege warfare, and is still used in military operations – such as the U.S. invasion of Panama in 1989.
For the most part, tactics are chosen for their lack of directly observable and legally persuasive evidence. The idea is to completely destroy someone without leaving fingerprints.
Intelligence-gathering and policing are often done in ways that make it inherently difficult to prove misconduct. Gang stalking employs a refined set of practices specifically chosen for the lack of legally incriminating evidence, and for the likelihood that victims’ accounts will be perceived as simply paranoid impressions of routine events when described to others.
Victims’ accounts tend to be dismissed since their experiences sound like commonplace occurrences – because that is indeed what they are: strangers who are rude, noisy neighbors, bad service, being cut-off in traffic, etc. These are things which happen to everyone. But for gang stalking victims, these things happen constantly – which becomes a form of real psychological torture, which must be experienced to comprehend.
Below are the primary tactics associated with counterintelligence subversion. Keep in mind that, by all accounts, a gang stalking campaign starts employing these tactics long before the victim has any clue that he or she is being systematically targeted. Many of the early instances of harassment are only understood by the victim later when the whole process becomes clear. By that point, often the harassment and slandering might have been going on for years.
Slander
As mentioned above, an investigation – or even the pretense of an investigation – is a perfect opportunity to slander a target. If someone who even appears to be an investigator or undercover cop begins quietly asking neighbors, employers, relatives, and co-workers about a targeted individual, it will almost certainly begin to corrode that person’s reputation, even if no explicit allegations are made.
Sometimes slander in a counterintelligence operation can be much more aggressive. A textbook example is the FBI’s successful campaign to destroy the career and life of film actress Jean Seberg during their Cointelpro operations. That case is noteworthy both because it involved a high-profile target – Seberg was a successful actress in the prime of her career – and also because internal FBI memos and news reports explicitly revealed that they were deliberately spreading lies about her.
Tactics used in the spying-and-lying industry are unfamiliar to the general public. Many people will assume that anyone posing as an “investigator” is legitimate. If you doubt that, watch the video clip of the ABC program in the “Gang Stalking Videos” page of this website regarding how easily civilians can be recruited to assist in crimes against strangers – such as in gang stalking operations.
Blacklisting
A tactic closely related to slander is blacklisting. For centuries blacklists have been used to identify and discriminate against individuals (and organizations) deemed to be undesirable. In U.S. history the most famous example was the blacklisting of leftists in the entertainment industry during the 1940s and 1950s.
The tactic is perfectly suited to counterintelligence subversion because it undermines the targeted individual in a way that will likely force the victim to be preoccupied with economic survival rather than political activism or whistle-blowing.
Mobbing
Newsweek magazine published an article in August 2000 titled “They Call it Mobbing.” The article (which you can see in the “Gang Stalking News” section of this website) describes a process of intense systematic harassment of a targeted employee by multiple co-workers and managers at his or her workplace. The abuse involves slandering and isolating an employee and verbal abuse. Apparently, this is a common element of gang stalking campaigns against targeted individuals. Since the tactic is apparently widespread – and since it is apparently connected in some cases to workplace violence – I have devoted the entire next section to it in this overview.
Black Bag Jobs
Breaking into the residence or office of a target is another tactic common to both gang stalking victims and targets of previous government conspiracies such as Cointelpro and Watergate. Among the obvious motives are to gather information, and to plant audio and video surveillance devices.
As noted in the section above about the FBI’s Cointelpro operations, the Senate’s Church Committee reports contain an FBI letter about black bag jobs – referred to as such – which makes clear that the agency had no illusions about the fact that the tactic was completely illegal (just as it is today).
Gas-Lighting
Another example of a classic psyops tactic often reported by gang stalking victims is “gas-lighting” – in which perpetrators enter the victim’s residence and re-locate certain objects to make victims doubt their own memory and create confusion – or to send a message that the victim’s life has been invaded and is now under intense surveillance. Such activities usually stop short of theft – which could lead to police reports. If items are stolen, they are typically limited to items that would be inexpensive and therefore unlikely objects of theft – so reports of the incident will seem implausible and evidence of mental instability.
In this short video clip, Luke Harding, a journalist with the Guardian, describes his personal experience with gas-lighting tactics being used against him by Russian intelligence agentswhile he was living in Moscow. I first saw this video on the “Gang Stalking is Murder” website.
Harding naturally found the experience unsettling, but keep in mind that he had the total support of his wife and his employer. Most victims of gang stalking are more isolated and if they attempt to describe the experience to others, are met with skepticism. The most likely reaction is to assume that the victim simply forgot where he placed something, or whether he left the window open, etc.
Abusive Phone Calls
As with adolescent pranks, phone calls to the victim’s residence are an easy way to harass the victim. Messages can range from insults to threats, although they are subtle, not explicit, in case the calls are being recorded.
Computer Hacking
Of course, this is not unique to gang stalking victims: targets of computer hacking range from random individuals to corporations and governments. The practice can be done for surveillance or harassment or both. See the first section in the “Tactics for Fighting Back” page of this website for an example of how this was used against me.
Framing
As with most of these gang stalking tactics, you can just use your imagination regarding how this could work. Planting evidence can be done either to further a slander campaign, or to actually set up the victim for arrest and prosecution. Additionally, planting evidence can be intentionally done in ways that the victim himself will easily find the evidence – just to send the threatening message that target is vulnerable to this type of attack.
Threats
Other such threats are apparently common in gang stalking cases. They can take any form imaginable, but will inevitably be anonymous and difficult to prove. At one point, the gang stalking crew in my neighborhood began dropping life insurance pamphlets on the walkway inside my courtyard.
Vandalism
Since gang stalking victims are normally under virtually constant surveillance, and since they are rarely in a position to afford counter-surveillance measures to capture evidence of the harassment being done, it’s easy to commit minor acts of vandalism against their premises and belongings. This can be dumping trash on the lawn, scratching the paint of their car, or whatever. Victims should not assume that perpetrators are above doing physical harm to their pets either; I know this both from personal experience and from accounts by a few individuals I have reasons to regard as very credible.
Baiting
Baiting is any effort to evoke a response by the victim which can be used to discredit or legally ensnare him. In a sense, all gang stalking tactics are forms of baiting because their cumulative effect will eventually drive the victim to respond in ways that will create additional trouble.
Street Theater
A commonly-reported tactic involves staging various actions by strangers the victim encounters in public. Typically both the comments and actions of the perpetrators will be carefully scripted to resonate with the victim and to appear benign if captured on video or seen by witnesses.
Blocking/Cutting-Off/Invasion of Personal Space
One example of gang stalking “street theater” is to cut-off the victim – when he or she is walking, driving, or riding a bicycle. A related tactic is to crowd the victim by rudely invading his or her space or brushing against the person. Since this occasionally happens to everyone in the normal course of events, accounts by the victim will likely sound paranoid when described to others. Also, anyone nearby will be unlikely to notice – let alone understand that the action was deliberate.
This tactic was described – among other places – in some information posted in the late 1990s by a small group based in Canada called Spy & Counterspy – whose website indicated that they wanted to reveal tactics used by corrupt and repressive law enforcement agencies. This was part of the group’s self-description:
“We are located just across the border in Canada (nine miles outside the reach of the FBI, BATF, DEA, and other goon squads).”
The group – which claimed to have sources in the intelligence and law enforcement industry – reported that the FBI uses a tactic called“managed aggression” when they are trying to apply pressure to the subject of a surveillance operation.
This is their description of this psychological operations tactic:
Here is an example of how an FBI surveillance team will deliberately provoke you.
When you’re walking through a mall or a downtown shopping district, the surveillance team will intentionally interfere with your route. A pavement artist will “absent-mindedly” cross your path, forcing you to change course to avoid walking into him. A group of agents will “inadvertently” obstruct your path – they’ll be standing together chatting, forcing you to walk around them. Other pavement artists will “accidentally” create near-misses as you walk along. Some of these “pedestrians” will create situations with a potential for a head-on collision, forcing you to dodge them.
As the psychological pressure continues to build, agents may “innocently” bump into you, jostle you, or step on your heel from behind. A group of pavement artists will cue up ahead of you, creating a line-up that delays you as you try to make a purchase, order fast food, buy tickets, and so on.
Activity like this can quickly create frustration, even anger, in you. But because the incidents occur in public locations, it’s difficult to prove who’s behind them. You never see any agent more than once. You don’t know where the next provocation is going to come from. You’re beginning to get upset, irritated, unstable. You’re more likely to make mistakes in judgment. And that’s exactly what the surveillance team wants.
As the authors also mentioned, the tactic’s effectiveness is much greater when it is unexpected:
This is a wicked mind-game. It can be very effective if you’re not anticipating it.
Targets of gang stalking should expect this tactic and have a clear idea in mind of how they will respond. Here is a good response to this tactic – or for that matter, any type of street harassment by a “pavement artist.”
Put your cell phone to your ear as if you are on a phone call (if you don’t have a cell phone immediately accessible, just put your hand to your ear as if you were holding a cell phone – it doesn’t need to be convincing), look directly at the perp’s face and smile and say – very loudly:
“They sent a brown-noser! Can you hear me? Sorry, I have a bad cell phone connection – I’ll try to talk loudly. I said: They sent a brown-noser! Yeah, just some retard who will do anything he’s told. He doesn’t even know who he’s working for. Just some brown-noser! I said: he’s just some brown-noser!”
Keep smiling and looking at the perp and wink at him. Message delivered.
Sensitization
As described in some of the sections below, perpetrators of organized stalking sometimes make use of various cutting-edge technologies, but psychological torture does not require electronic hardware. Nor does it even require unconventional psychology.
A basic concept in Neuro-Linguistic Programming (NLP) is that a particular stimulus – such as a sound or gesture – can become associated or “anchored” in the thoughts and reactions of an individual through repetition. Gang stalkers exploit this phenomenon by repeatedly performing a particular action – such as generating a particular sound as part of a noise harassment campaign.
Since the victim is made aware that the sound is an element of the harassment, his or her mind will naturally begin responding to that sound as a “trigger” for a negative emotional reaction. It’s a way to keep the victim constantly agitated because he or she will have the negative response whenever stalkers generate the sound – or even when the sound occurs in the normal course of events.
Synchronization
Similar to sensitization, “synchronizing” is when gang stalking perp’s always perform a particular action at the same moment as a particular action by the victim. For example, whenever the victim leaves his residence, a stalker in the area will cough or honk a horn or slam a door. It is a way of reminding the targeted individual that he or she is under constant surveillance.
Noise Harassment
One of the major weapons in the arsenal of gang stalkers is noise.
The tactic is ancient; it has been used in siege warfare for centuries. If you want to see a good dramatic portrayal of it, watch the final episode of Season 2 of Game of Thrones, in which a horn was sounded constantly to break-down a character (Theon) in the castle Winterfell, which was under siege.
It was widely reported that loud music was used by the U.S. military in its invasion of Panama in 1989 to harass General Manuel Noriega and flush him from the Vatican Embassy where he was holed-up. Accounts differ about exactly how and why the tactic was used in that instance, but no one questions the potential effectiveness of noise to create distress.
As with many of the tactics described here, the cumulative effects are difficult to fully appreciate if you haven’t personally been on the sharp end of them. Among other things, the tactic can be used to cause sleep deprivation, which in turn can create additional problems, both physical and psychological.
If gang stalkers have access to a residence adjacent to that of the victim (especially, for example, in an apartment building or condominium complex), they can easily generate noises that will be heard only by the target.
As is typical of psychological operations tactics used by FBI minions, harassment by noise is virtually impossible to prove. You could record the noise, but you could not prove where and when you made the recording – let alone where the sound came from or who was generating it. Moreover, even if you could prove all of that, it would be difficult or impossible to legally establish that the perpetrator was conspiring with anyone else to deliberately harass you.
High-Technology Noise Harassment: Hypersonic Sound
In an organized stalking operation, harassment by noise can be much more sophisticated than simply banging on the wall or playing loud music. Sound projection technology developed in 1990s can generate noise which can only be heard by the person being targeted.
This technology – called “hypersonic sound” – involves using a processor to convert a sound into a complex ultrasonic signal (that is, beyond the range of human hearing). Unlike sound from a conventional audio speaker, the sound travels in a column rather than spreading out, so its direction can be precisely controlled. You will only hear it if your ears are inline with the sound column – or if the signals is bounced off a hard surface.
If a victim of organized stalking tells others about sounds that he or she hears – but which no one else hears – it is a safe bet that the individual will be viewed as crazy. That makes this a perfect weapon for torturing someone psychologically because it can destroy the victim’s credibility along with his or her sanity.
In addition, the skeptical responses to the victim’s attempts to describe such harassment will almost certainly cause the victim to become intensely angry – which will further errode the victim’s mental health.
If you are a victim of this type of harassment, you might want to direct your friends and relatives to these two sources:
This document from a corporation that markets the technology has a clear explanation of how it works: Hypersonic Sound
This TV program features an interview with an engineer describing and demonstrating how such devices work. The relevant segment begins at minute 20.
As explained in the “Tactics For Fighting Back” page of this website, noise-reducing headphones can provide some relief from noise harassment; however, the best response to such harassment (and to gang stalking generally) is a low-tech offensive strategy: blanket your neighborhood with flyers (either by mail or hand-delivery or both) and send emails to all local officials, news outlets, churches, schools, Congress members, etc. calling attention to this form of domestic terrorism (gang stalking).
Other High-Tech Gadgetry: Invisibility (Seriously)
Other exotic technologies are also used by the sociopaths in America’s rogue alphabet agencies (and their parasitic intelligence-security contractor firms). An interesting example was described in the well-researched cover article by Robert Guffey about “state-sponsored gang stalking” published in the October 2013 issue of Fortean Times.
In 1987 an American electronics engineer, Richard Schowengerdt, began experimenting with “electro-optical-camouflage.” In 1994 he patented this “cloaking” technology – also called “invisibility technology.” The Fortean Times article describes how that technology was apparently used in a gang stalking operation by the U.S. government to psychologically torture a criminal suspect by enabling stalkers to lurk in the victim’s residence unseen.
The facts of that case suggest that the perpetrators were federal agents testing the technology – and presumably indulging their sociopathic tendencies.
Here is RobertGuffey’s interview with Schowengerdt – in which the inventor mentions the potential use of his technology for psychological warfare.
Of course, there is no reason to think that such technology is being widely used. I include the information here mainly because (a) it was apparently used in gang stalking by the U.S. government as documented in a well-researched published article, and (b) it gives you an idea of the level of technology available for surveillance and psychological warfare in state-sponsored gang stalking.
For anyone specifically interested in invisibility technology, here is another article – published in December 2013 – about a similar technology being developed in China.
Other High-Tech Gadgetry: Seeing Through Walls
Internal documents from the Cointelpro era proved that the FBI secretly used illegal “black bag jobs” (breaking into the residences of targeted individuals) to perform surveillance and to perpetrate psychological warfare – such as the tactic of “gas-lighting” described earlier.
Although the tactic is just as illegal now as it was then (invasive spying without a search warrant), it is apparently used routinely in gang stalking, based on virtually all victim accounts.
Consequently, it would be very easy to deploy miniature spy cameras (which are now very advanced and small and inexpensive) in the victim’s residence. So the use of technology which can see through walls is probably unnecessary in most cases, but the technology does exist.
A June 2005 article in Popular Mechanics by Frank Vizard stated that “through-the-wall” technology “has been aggressively researched by military and university labs since the mid-1990s.” The article is on page 30.
Click here to view a pdf file of the magazine:
This August 2012 article in Popular Science describes a form of this technology which uses Wi-Fi radio signals – which are now available in most U.S. homes. Reportedly, Wi-Fi radar can “determine a person’s location, speed, and direction – even through a one-foot-thick brick wall.”
Such technology could be perfect for gang stalking because, as the article notes, the device cannot be detected, since it does not emit any radio waves.
Other High-Tech Gadgetry: Directed-Energy Weapons (DEWs)
“For years, the U.S. military has explored a new kind of firepower that is instantaneous, precise and virtually inexhaustible: beams of electromagnetic energy. “Directed-energy” pulses can be throttled up or down depending on the situation, much like the phasers on “Star Trek” could be set to kill or merely stun….
The hallmark of all directed-energy weapons is that the target — whether a human or a mechanical object — has no chance to avoid the shot because it moves at the speed of light. At some frequencies, it can penetrate walls.”
A Directed-Energy Weapon (DEW) emits energy at a target without using a projectile, and can produce a variety of lethal or non-lethal effects. Such weapons have existed for decades, and are used by militaries and law enforcement agencies around the world. DEWs use various forms of energy, such as laser beams, electromagnetic radiation, and particle beams, as well as sound.
Weapons of this type are often referred to as “non-lethal weapons” to distinguish them from weapons such as knives, batons, firearms, artillery, and such; however, the intensity of some energy weapons can produce lethal effects.
Naturally, much of the information about these weapons is classified. One example of the publicly-available documents on the subject is the previously-mentioned declassified Pentagon report about electronic weapons (dated 1998) called “Bioeffects of Selected Non-Lethal Weapons” – which was obtained via a Freedom of Information Act request.
Here is the Defense Department’s website about non-lethal weapons.
Occasional references to the subject do appear in the news. An example is this May 17, 2013 article in the Marine Corps Times about the Joint Non-Lethal Weapons Directorate at Quantico, Virginia. The article explains that the directorate performs “research into everything from electroshock weapons to the Active Denial System, a directed energy weapon that causes painful sensations to targeted individuals without burning the skin.”
This September 2012 article in Business Insider – “America’s Scariest Weapons” – gives an idea of some of the electronics weapons being developed by the U.S. government, such as a “heat ray.”
If you are interested in an example of how someone could construct a homemade short-range electromagnetic weapon (for research purposes or for self-defense or whatever), this might be a good place to start.
That is some of the non-disputed information about DEWs. The role of such weapons in U.S. domestic counterintelligence operations is in the realm of speculation and anecdotal evidence.
Many descriptions exist on the Internet which purport to be accounts by gang stalking victims claiming to have been attacked with such weapons. Accounts include descriptions of burning sensations, headaches, nausea, sudden fatigue, a fluttering sensation in the chest, etc.
My observations about DEWs and organized stalking:
(1) The extensive use of disinformation by gang stalkers raises problems when assessing the plausibility of claims about the use of DEWs against targeted individuals. To the extent that the use of DEWs is perceived by non-victims of gang stalking as being implausible, discussion of their use (whether accurate or not) could undermine efforts to expose gang stalking generally. Secondly, even if DEWs are rarely used, it could further the counterintelligence objectives to discuss them on the Internet, if only to raise the anxiety of victims, who might begin wondering whether their headaches, high-blood pressure, and other problems are being induced by DEWs.
(2) It is inherently difficult to distinguish between some of the effects of DEWs and the effects of psychological harassment (“psyops”) tactics. Stress induced by psychological torment can manifest in some of the same ways – accelerated heart rates and headaches, for example.
However…
(3) The use of DEWs against gang stalking victims is technologically plausible. No one disputes the existence of such devices, and they’re consistent with the tactics of gang stalking. For example, harassment by noises generated from adjacent residences is a common gang stalking tactic, so it isn’t much of a stretch to imagine the use of energy weapons in the same situation, as the energy would easily pass through most walls.
(4) Such a tactic would be a logical choice for use in organized stalking, since it would be difficult or impossible to prove that such attacks were happening.
(5) Reportedly, the intensity and lethality of such weapons varies greatly, but even the most extreme applications would be consistent with the malevolent campaigns against gang stalking victims. Anyone willing to terrorize someone relentlessly with psychological torment – even knowing that it could lead to suicide or heart attack (or lethal violence by the victim against others in response), would presumably not have moral reservations about using DEWs.
(6) My own personal contacts with self-proclaimed targeted individuals include three cases in which persons whom I believe (for multiple reasons) to be highly credible reported having apparently been attacked by some form of non-lethal weapons.
Counter-measures
Since the role of DEWs in organized stalking is surrounded by at least as much disinformation as any other area of the subject, it is difficult to know how widespread the use of such weapons could be – let alone how to defend against them. The technical issues involved in possible counter-measures are beyond my ken, but for what it is worth, a credible source – Wired – states in this May 2012 article that a Faraday cage blocks all electromagnetic radiation.
A final note on the efficacy of gang stalking tactics
At the end of his aforementioned book Stopping a Stalker, retired police captain Robert L. Snow describes the psychological aftermath
of stalking.
of stalking.
Keep in mind: Snow is describing the impact of being stalked by a single individual with limited resources – not the long-term effects of being stalked by numerous perpetrators with seemingly unlimited resources, conspiring with each other across a criminal network which has the support of the government and uses refined psychological operations (“psyops”) tactics combined with high-tech surveillance.
“During my 30 years as a police officer I have dealt with thousands of crime victims, and have felt a deep compassion for the majority of these people, who have been robbed, raped, shot, swindled, beaten, and burglarized. Yet, by the time I saw these victims, the crime was over and the healing process had already begun.
With stalking victims, however, the crime wasn’t over with, but continued on and on. Victims of stalking say the experience is like a prolonged rape, a never-ending and terrifying loss of control over one’s life. Stalking is one of the most psychologically crippling things that can happen to a person. Being stalked takes away a person’s freedom, a person’s security, and often a person’s will to live.”
__________________________________________________________
9. Mobbing and Workplace Violence
Mobbing is the workplace harassment component of gang stalking. It is nothing like the activity people commonly associate with terms like “workplace harassment.” Common examples of harassment by employers include things like sexual harassment or verbal abuse by a manager. Mobbing is a systematic campaign of intense harassment by multiple co-workers and managers, often (or perhaps always) done as part of the overall surveillance and harassment process known as gang stalking.
The objective of mobbing is to emotionally torture a targeted employee. It’s done either to force him or her to quit or to keep the person silent (in the case of potential whistle-blowers) or for vengeance when the victim has enraged someone in the organization’s management structure who has the necessary assets and connections to arrange for the stalking (as in my own case).
The Connection between Mobbing and Workplace Violence
Honest law enforcement personnel – as well as criminologists and groups such as the ACLU – should be interested in the apparent connection between mobbing and workplace violence.
Mass shootings at places of employment and schools are sometimes referred to as incidents of employees “going postal” – a reference to the fact that a number of such reported cases involved U.S. Post Office employees.
Peer-reviewed studies by Dr. Kenneth Westhues, Professor Emeritus of Sociology, University of Waterloo, Canada, have found a link between mobbing (group bullying) and mass shootings in recent years in North America in workplaces and educational institutions.
As noted in an article on NowPublic.com, the link between mobbing and workplace violence “eluded authorities, university officials, and, obviously, the mainstream media.”
“In nearly every mass shooting, Westhues found that a programmatic system of workplace or academic bullying had systematically isolated, scapegoated and humiliated the victim and virtually groomed the shooter for the role of monster. The role of psychiatry, police, and administrative bureaucracy as “threat assessment teams” and “safety prevention” was not only an utter failure, but, moreover, prompted the very acts of mass violence they sought to prevent.”
This is a link to the NowPublic.com posting:
Below is a link to Professor Westhues’s report Mobbing and the Virginia Tech Massacre (November 2007)
“On April 16, 2007, Seung-Hui Cho, a fourth-year student in the English Department at Virginia Polytechnic Institute and State University, murdered 32 professors and students and injured a further 25, then took his own life….
Cho appears to have been the target of an uncommon but distinct and devastating social process called workplace mobbing. It is the impassioned ganging up of managers and/or peers against a targeted worker, the object being the target’s absolute humiliation and elimination from respectable company.”
This next link is to a website featuring correspondence between Professor Westhues and attorney Keith Labella, discussing the apparent causal relationship between mobbing and workplace violence “rampage killings.” Westhues estimates that at least a third of all such incidents can be attributed to mobbing (systematic harassment).
Media Narratives about Workplace Violence and Mass Shootings
Reporting and commentary on workplace violence incidents and mass shootings tends to assume that these incidents are either unique unrelated events, or that they are attributable to either the violence in our culture, such as movies and video games, or the prevalence of firearms, or a general moral decline in society, or a combination of these things.
The more you learn about gang stalking and mobbing (especially if you have experienced it first-hand), the more you start to wonder about the extent to which it accounts for the workplace shootings reported in the media.
As with gang stalking generally, articles occasionally appear in the mainstream press about the workplace harassment component of gang stalking (mobbing). This article from Newsweek/Daily Beast is a good example.
____________________________
An example of a case which deserves a closer look
To cite one example (of many), a shooting in Long Beach, California invites suspicion about the possible involvement of mobbing. Even if there are other explanations, this particular case is interesting for several reasons. Incidentally, at the time of this shooting, I lived close to downtown Long Beach, and I witnessed some of the police and ambulance activity associated with the event, and the (minimal) local news coverage. Since I was aware of the incident, I became curious about the relative silence about it in the media.
On February 16, 2012, on the seventh floor of the Glenn M. Anderson Federal Building in downtown Long Beach, Ezequiel Garcia, an agent of Immigration and Customs Enforcement (ICE), shot his boss, Kevin Kozak, six times. Reportedly (see the article linked below for details), Mr. Garcia’s attack on his boss was in response to the fact that Mr. Kozak (who was the second-in-command of ICE’s Los Angeles region) had turned-down Garcia’s request for a transfer within the department.
Apparently, Garcia shot Kozak “following a discussion about Garcia’s job performance.” Another agent, Perry Woo, then rushed into the room and fatally shot Garcia. Kozak survived.
Even if this was not a case of mobbing, it is a workplace violence incident which – despite involving two government officers being shot (one fatally) in a federal building in the downtown area of a major city – barely registered as a blip on the media’s radar. Furthermore, both ICE and the FBI – which investigated the case – declined to provide any of the details about what happened.
After spending a year investigating the incident, the FBI determined that the fatal shooting of Garcia was justified. As the CBS article below notes, The FBI’s spokeswoman, Laura Eimiller, would only say that the details about what led to the incident “would be kept confidential because no criminal charges are planned.”
Apart from several paragraphs in the middle of the article linked below, most of the media did not seem to be curious about the incident – or about the silence of the government agencies involved. Apparently the matter did pique the interest of a few people other than myself though; the article cites concerns about the secrecy surrounding the event expressed by representatives of the Citizens for Responsibility and Ethics in Washington (CREW) and the Open Government Project at the Electronic Privacy Information Center (EPIC).
A skeptic of gang stalking, applying Occam’s razor to the publicly known facts of this incident could understandably conclude that it was simply a case of work-related stress that erupted in violence – perhaps because the persons involved were carrying firearms. However, if you accept the theory – supported by all the information presented elsewhere in this website – that America currently has a modern version of Cointelpro (“gang stalking”) which involves mobbing, and which operates with the acquiescence of law enforcement agencies (such as the FBI, ICE, etc.), that at least raises the question of whether this was a case of mobbing.
Maybe the ICE agent, Mr. Garcia, was just having a bad day. Perhaps someone cut him off in traffic on his way to work that morning and he was a bit wound-up about it, so he shot his boss six times during his job performance review.
On the other hand, maybe he snapped after a period of systematic harassment, and the fed’s did not want that made public. At a minimum, the case illustrates the secrecy which often surrounds the activities of America’s law enforcement agencies.
This is an article about the incident from CBS Los Angeles Local News.
____________________________
The mass shooting at the Washington Navy Yard in September 2013
A website about gang stalking would not be complete without mentioning this incident. News coverage of the shooting – and the public commentary about it – included many references to speculation about the possibility that the shooter had been the target of a gang stalking / MK Ultra-type operation.
Here is what has been reported:
A shooting rampage at the Washington D.C. Navy Yard on September 16, 2013 left a dozen people killed (13 including the shooter), and 8 others wounded. Naturally, the shooting received extensive national news coverage.
The shooter, Aaron Alexis, had claimed to have been stalked by multiple perpetrators and had reported that he was the victim of electronic harassment and noise harassment tactics of the sort commonly described by other self-proclaimed targeted individuals.
Alexis even carved “My ELF Weapon” into the receiver of his shotgun, as seen in this photo. ELF is a common abbreviation for “extremely low frequency.”
The incident involved other red flags for many observers. For example, while some people suggested the voices Alexis reported hearing were symptomatic of schizophrenia, others noted that schizophrenia typically begins in early adulthood, roughly between the ages of 15 and 25. Alexis, who was an information technology employee with a security clearance at a defense-related computer company, was 34 years old. Also, persons afflicted with schizophrenia are not typically violent; if anything, they are more likely to be a danger to themselves.
It should also be noted that Alexis never reported that he believed that the voices he heard were coming from some supernatural source – which would have been more suggestive of mental illness. His accounts were much more consistent with the kind of sonic projection device demonstrated here by an engineer who designs them. See the section which begins at 20:08 of this video.
No manifesto was left by the shooter citing any political or religious agenda that might have motivated him to shoot twenty people at his workplace. His words and actions are more plausibly explained by his claim that he was in fact being systematically harassed, and he eventually snapped.
Other facts about the incident also drew suspicion. For example, the FBI bypassed the ATF (the Bureau of Alcohol, Tobacco, Firearms and Explosives) and performed their own trace of the shotgun used – even though the ATF is the federal agency in charge of tracing guns used in crimes. An Associated Press article included this quote:
“I have never seen an instance where ATF had not been relied upon to trace the gun,” said Mike Bouchard, a former ATF assistant director for field operations. “I have never heard of a situation like that.”
Since the investigation of the shooting is being handled by the FBI – which is notoriously secretive and has a history of perpetrating organized stalking crimes against Americans (Cointelpro) – it is difficult to guess how much critical information about the case is being kept secret from the public.
It has not been reported, for example, whether some of the shooting victims had been intensely harassing (“mobbing”) the shooter – as was done to the plaintiff in the federal gang stalking case filed in December 2013.
Multiple news sources – such as the New York Times – made note of the curious timeline of events surrounding the shooting. The shooter’s employer and the Newport Rhode Island Police Department and the navy were all aware that Alexis had reported being harassed by “voices” and noises, yet no one suspended his security clearance or otherwise intervened.
Similarly – and this has never been explained as far as I know – a tactical response team of the Capitol Police was reportedly in the area at the time, but was ordered to stand down (not participate in the police response).
Here are some excerpts from a BBC News report on September 18 which described the non-response:
Multiple sources in the Capitol Police department have told the BBC that its highly trained and heavily armed four-man Containment and Emergency Response Team (Cert) was near the Navy Yard when the initial report of an active shooter came in about 8:20 local time.
According to a Capitol Police source, an officer with the Metropolitan Police Department (MPD), Washington DC’s main municipal force, told the Capitol Cert officers they were the only police on the site equipped with long guns and requested their help stopping the gunman.
When the Capitol Police team radioed their superiors, they were told by a watch commander to leave the scene, the BBC was told.
The gunman, Aaron Alexis, was reported killed after 9:00.
A few days later, a Congressman confirmed that the local SWAT unit had been inexplicably ordered not to respond. Rep. Michael McCaul (R-Texas) told CNN’s Jake Tapper that he personally spoke with a SWAT team member who confirmed that they were told to stand down (not respond) to the mass shooting at the Washington Navy Yard.
A week after the shooting, The Washington Times (in theirCommunities section) published an article exploring the gang stalking (electronic harassment) speculation surrounding the shooting.
A few days later, Wired magazine posted an article which also examined the gang stalking aspects of the navy yard shooting. Here are some excerpts:
Some conspiracists suggest that Alexis was a “targeted individual,” or “TI,” the term-of-art used by anguished people who believe they’re being “gang stalked” by shadowy enemies, often in the government. The elements of Alexis’ police report — covert microwave weapons, conspiracies and sleep disturbances — are common elements in gang stalking accounts. (Of course, they’re also common elements in schizophrenia.)….
The microwave weaponry theory would be just as absurd as some of the other conspiracies if the Pentagon hadn’t been researching the possibility of using similar voice-projection technology in the past as a nonlethal weapon.
According to one report on the project, such a weapon would create a condition similar to schizophrenia. “Application of the microwave hearing technology could facilitate a private message transmission. It may be useful to provide a disruptive condition to a person not aware of the technology. Not only might it be disruptive to the sense of hearing, it could be psychologically devastating if one suddenly heard ‘voices within one’s head.’”
The year before, Wired featured an article specifically about the so-called “Voice of God” device.
Five weeks after the mass shooting, news reports emerged that the shooter had sent three emails to the group called Freedom From Covert Harassment & Surveillance (FFCHS) – which is ostensibly a gang stalking victims support group (although as explained in the web page about the organization in this website, FFCHS is actually a disinformation front group).
So the fed’s – who apparently monitor everyone’s phone calls, emails, and Internet activity – failed to intervene in any way despite the shooter’s emails (and despite other obvious warning flags mentioned above) in a case involving an employee with a security clearance who was working at military facilities and reporting that he was being harassed and hearing voices.
As The New York Post noted, this added to the list of questions about the official account of the whole incident:
“[The emails] also suggest that the bloody rampage was plotted as a revenge attack against the US Navy — contrary to FBI statements that the former sailor did not appear to have had a specific target.”
On November 20, 2013, The Washington Times reported that U.S. Rep. Darrell E. Issa (R-Calif.), chairman of the Oversight and Government Reform Committee is seeking information from the Office of Personnel Management (OPM) about the security clearance possessed by Aaron Alexis:
“But Mr. Issa says OPM is refusing to turn over those documents and allowing them to be viewed only behind closed doors.”
In January 2014, Politico reported that a local NBC news journalist in Washington D.C., Scott MacFarlane, received an email which the U.S. Navy sent to him by accident.
The internal email – from the Navy’s FOIA (Freedom of Information Act) office – outlined the strategy which they planned to use to limit the amount of information released to MacFarlane, who had filed a FOIA request for internal Navy memos sent on the day of the shooting.
MacFarlane tweeted about the incident with this message:
“EPIC FAILURE- U.S. Navy accidentally sends reporter its strategy memo for dodging his FOIA request”
He included this screenshot of the email.
Click on image to enlarge
The most charitable analysis would be that this was simply routine “cover your ass” protocol for a government entity seeking to avoid embarrassing revelations about its incompetent management of security at a naval facility.
At least one thing seems clear: some reporters in the mainstream news media are still curious about the shooting.
____________________________
Theodore Kaczynski (“The Unabomber”)
A series of bombings was perpetrated from 1978 to 1995 which killed three people and injured 23 others. The bomber, a mathematician named Theodore Kaczynski, was referred to as “the Unabomber” by the FBI before they discovered his identity.
Kaczynski wrote a manifesto which explained that his motive for the bombings was to expose the threat to freedom posed by modern technology.
The court rejected Kaczynski’s request to represent himself at his trial, and made a plea agreement to avoid having Kaczynski possibly use his trial as a public platform to express his views. In return for a promise to not seek the death penalty, Kaczynski pleaded guilty, and was sentenced to life in prison.
Those facts are commonly known; what is less widely-known is that Kaczynski was one of the subjects of the CIA’s secret mind-control experiments program called MK Ultra while he was a student at Harvard University.
An article by Alston Chase in the June 2000 issue of the Atlanticexplored the question of whether Kaczynski’s violence was the result of his psychological torture. Kacyzinski was recruited to participate in a series of psychology experiments, and he was deceived about their true nature, which was to examine the effects of extreme emotional stress – possibly to help the CIA develop interrogation techniques.
The article implies that the experiment could possibly have been a factor in Kaczynski’s later acts of violence. Some excerpts from the article:
“There is no evidence of immediate mental degradation in the project’s aftermath. Emotional turmoil is another matter. As Sally Johnson, the forensic psychiatrist, reported, Kaczynski clearly began to experience emotional distress then, and began to develop his anti-technology views.”
“It is clear, also, that Murray’s experiment deeply affected at least some of its subjects. From interviews conducted after the project ended, it is apparent that certain students had found the experience searing.”
“When, soon after, Kaczynski began to worry about the possibility of mind control, he was not giving vent to paranoid delusions. In view of Murray’s experiment, he was not only rational but right. The university and the psychiatric establishment had been willing accomplices in an experiment that had treated human beings as unwitting guinea pigs, and had treated them brutally.”
“Kaczynski felt that justice demanded that he take revenge on society.”
The injuries and deaths of the 26 victims of Kaczynski’s bombs were quite possibly “collateral damage” from a secret and unethical U.S. government program.
_________________________________________________________
10. Selection of Targeted Individuals
“To a hammer everything looks like a nail. To an intelligence agent, informant, or law enforcement officer, everything unconventional or unorthodox looks like at least a pre-embryonic terrorist danger.”
– Bruce Fein, U.S. Deputy Attorney General in the Reagan administration
In 2009 Bruce Fein advised Congress that the national intelligence-gathering system of regional data fusion centers should be abandoned. He compared the system to those operated by the Soviet Union’s KGB and East Germany’s Stasi.
U.S. government’s terrorist watch list
The U.S. government’s Terrorist Screening Database is shrouded in secrecy. A New York Times article in December 2013 reported that at least 700,000 people were on the federal government’s terrorist watch list, and that little is publicly known about how the list is managed. Some excerpts from the article:
“…the government refuses to confirm or deny whether someone is on the list, officially called the Terrorist Screening Database, or divulge the criteria used to make the decisions…”
“The Terrorist Screening Center, which administers the main terrorist watch list, declined to discuss its procedures, or to release current data about the number of people on various watch lists, and how many of them are American citizens.”
Quotas for reporting suspicious persons
A piece at the gang stalking website HomelandStalk.com called attention to a report by an ABC local news affiliate in Denver in July 2006 which revealed that some federal air marshals said they have quotas for identifying a certain number of passengers as suspicious.
Air marshals interviewed for the article said that if they wish to receive positive performance evaluations, raises, bonuses, and special assignments, they must regularly file Surveillance Detection Reports (SDRs) – at least one per month according to some sources – about passengers who supposedly behaved in a suspicious manner. Individuals identified in such reports can end up in an international database watch list.
While it is unlikely that officials in charge of various homeland security programs would publicly acknowledge the pressure on employees to name persons as being suspicious, it is easy to imagine how that same phenomenon could be manifested in various agencies, resulting in a sort of “witch hunt” to rationalize the budgets and powers of the homeland security bureaucracy.
Black-listing by brown-nosers
In a September 2004 article in the Sociological Forum, David Cunningham and Barb Browning at Brandeis University analyzed the selection of individuals targeted by the FBI’s original Cointelpro operations. The article begins with this quote from Frank Donner’s The Age of Surveillance:
“The selection of a target embodies a judgment of deviance from the dominant political culture.”
In essence, the authors found that FBI agents responded to organizational pressure from the upper echelon of the FBI by rationalizing the targeting of individuals for surveillance and subversion – even when those individuals were not engaged in subversive political activities. They did so by pointing to characteristics of the targets which the agents knew their senior officials regarded as culturally objectionable:
“…field agents drew upon particular culturally resonant signals of deviance to demonize and subsequently act against SDS members even in the absence of threatening political activity.”
Agents were trying to curry favor with a small group at the top of the agency – the directorate – who “made the final decisions about all counterintelligence actions.”
Targeting terrorist suspects and government whistle-blowers
According to some published mainstream news reports, individuals are sometimes targeted for gang stalking because they are suspected of involvement – or potential future involvement – in terrorism or crime, but are not implicated by any legal evidence. For example, see the May 31, 2006 article in the Canadian national newspaper, The Globe and Mail, regarding such tactics being illegally used in Canada.
Other mainstream news reports indicate that gang stalking is also used by intelligence agencies to punish or intimidate whistle-blowers – for example, as reported in the October 10, 2004 article in the Sunday Times, a major newspaper in the U.K., about the use of gang stalking by the intelligence agency MI5.
Targeting individuals for experimental or training purposes
Some unlucky individuals might be targeted essentially for counterintelligence psyops research or training purposes (even if they are ostensibly chosen for some more “legitimate” security reasons).
If you doubt that is plausible, read about the CIA’s MK Ultra experiments, in which many American (and Canadian) citizens were used as human guinea pigs.
Targeting individuals for extra-judicial punishment & experimentation
A well-researched article in the October 2013 issue of Fortean Timesdocumented a case of state-sponsored gang stalking – described as such – in which a former U.S. military member was apparently targeted both for the purposes of extra-judicial punishment and to test psychological operations technology.
Exploiting watch lists for personal vendettas and corporate agendas
In recent years, there have been media reports of something called“swatting” – in which an anonymous person – either for revenge or for amusement – calls 911 and makes a false report of an emergency happening at the address of a neighbor or enemy (or in some cases a celebrity) so police will respond to the residence.
It is not difficult to imagine how a more sophisticated and sinister version of that tactic could be used by someone with connections to America’s now-massive and secretive homeland security infrastructure, by reporting someone as “suspicious.”
As it is now structured, the U.S. law enforcement and intelligence industry provides a perfect environment for abuse of power. The claim that America faces a constant indefinite threat of terrorism has created political cover for seemingly unlimited money and secrecy and power for the agencies and private firms involved.
Increasingly sophisticated surveillance and “non-lethal” weapons technology makes the potential for abuse even greater still.
In theory, organized stalking (counterintelligence subversion) could be used against someone by an individual or a corporation in one of several ways.
One possibility is that a person who has either a personal or professional connection to the law enforcement or intelligence industry could have someone named as a “suspicious person” – for example, by submitting his or her name to a Terrorism Liaison Officer (TLO). This might be easily done by a member of InfraGard (the corporate-FBI alliance) or someone with a friend or relative in an agency such as the FBI.
As explained elsewhere in this website, we know from hacked emails of intelligence-security firms and other sources that corporations hire current and former spooks and law enforcement agents to do their bidding, and that such work includes counterintelligence operations (disinformation, infiltration, etc.). It is certainly possible that such work also includes subversion (gang stalking).
Why would the feds allow non-governmental counterintelligence subversion?
Belgian criminologist Nicolas Desurmont has published several academic articles on state-sanctioned gang stalking (links are in the “Published Articles” section of this overview).
In his 2006 article, Vers une problématique du harcèlement criminel en réseau, Desurmont suggests that in at least some cases, gang stalking is a dual system involving law enforcement agencies and criminal perpetrators, which serves the interests of both groups.
For most people, the notion that law enforcement and intelligence agencies would be working with criminals – rather than pursuing them – seems deeply counter-intuitive. Remember though, U.S. intelligence agencies such as the CIA, routinely engage in criminal activityaccording to the government itself – as explained in an earlier section of this overview (“Crimes by U.S. Law Enforcement & Intelligence Agencies”). Also, law enforcement and intelligence agencies such as the FBI often authorize crimes by criminal informants. Moreover, the Senate Church Committee found that during the original Cointelpro operations, the FBI delegated acts of violence to organized crime groups.
Desurmont makes specific reference to the fact that the gang stalking acquiesced in by the Belgian police includes acts of extra-judicial retribution. Why would governments knowingly permit – and even assist – such criminal stalking, as Desurmont describes?
One reason is that outsourcing can create plausible deniability. If a government agency contracts with a private firm – and then that firm employs criminal informants to perform some of the dirty work – the actual crimes can be several steps removed from officials.
Another reason would be to exploit a counterintelligence concept called “a wilderness of mirrors.” The description – attributed to James J. Angleton, the CIA’s Chief of the Counterintelligence from 1954 until 1974 – comes from T.S. Eliot’s poem “Gerontion.” In essence, the idea is that counterintelligence involves creating an environment in which it is difficult to distinguish reality from illusion.
Having a complex and opaque system of counterintelligence (CI) operations serves the interests of the perpetrators – as does further obfuscating the nature of the system by spreading disinformation.
Some CI operations are handled directly by the FBI and other intelligence agencies. Other CI activities are performed for the government by private intelligence-security firms under government contract. CI work is also done by such firms on behalf of large corporations. In some cases – for example, the infiltration and subversion of the Occupy Wall Street Movement – CI activities were performed by the FBI and by private firms.
Using criminal “informants” and civilian Stasi volunteers to perpetrate gang stalking acts makes the whole process even more difficult to assess from the perspective of victims and potential witnesses. Widespread use of disinformation (discussed in detail in its own section of this overview below) seeks to muddy the waters further with references to possible involvement of mysterious cults and such.
One advantage of having a variety of criminals involved (criminal informants, sleazy private investigators, greedy unregulated intelligence-security contractors, rogue intelligence agencies, useful idiot vigilantes, cops who look the other way, etc.) is that it presumably makes it easier for persons connected to the agencies and corporations involved to use CI subversion as a personal weapon by someone connected with one of those groups.
Official rationale for counterintelligence subversion
Merely invoking the magic phrase “national security” seems to provide sufficient legal and political justification these days for almost any secret policy of the intelligence community. Even in the rare caseswhen the U.S. government’s “Star Chamber” – the secret FISA Court – rules that a policy is out of bounds, Americans are not permitted to know what the feds were trying to get away with.
As practiced, organized stalking is essentially an extra-judicial punishment, and it grossly violates multiple state and federal laws. However, the policy is presumably justified – at least unofficially – within the FBI and DOJ as being a legitimate counterintelligence policy needed to subvert individuals who would otherwise pose a threat.
As explained later in this overview (in the section on the U.S. Department of Justice), probably the closest thing to an official public statement of the philosophy behind targeting certain individuals was expressed in the policy statement of the now-defunct “Weed and Seed” program. That program’s description suggested a law enforcement strategy of identifying and removing undesirable citizens from neighborhoods through a “community-based” law enforcement approach.
Who gets to declare someone a suspicious person?
Consider just one part of the massive “homeland security” infrastructure – electronic surveillance by the NSA. In September 2013it emerged that at least a dozen NSA employees had been illegally spying on their spouses and partners. This was a small glimpse of the potential abuses of power in the modern U.S. spy industry.
NSA whistle-blower Edward Snowden explained that access to the U.S. police state’s weapons is not limited to high-level officials:
“Any analyst at any time can target anyone. Any selector, anywhere… I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your accountant, to a federal judge, to even the President…”
Additional thoughts on how individuals are targeted
For more of my analysis of how individuals are chosen as targets for gang stalking, see my May 28, 2013 entry in the “Gang Stalking News” section of this website, in which I explain my inferences from the fact that certain types of people are not chosen as gang stalking targets.
__________________________________________________________
11. The Organizational Structure of Gang Stalking
“The system of espionage thus established, the country will swarm with informers, spies, delators [accusers], and all that odious reptiles tribe that bred in the sunshine of despotic power; that suck the blood of the unfortunate and creep into the bosom of sleeping innocence.”
– Congressman John Allen, during the debates
about the Alien and Sedition Acts of 1798.
about the Alien and Sedition Acts of 1798.
_________________________
In the shadowy world of gang stalking, it is difficult for the targeted individual to know the exact nature of the organizational structure of his or her enemies. From the victim’s perspective – especially when the person first realizes that he or she is being systematically harassed, it is virtually impossible to know exactly who the enemies are and how they are conspiring with each other.
For many victims, their situation remains opaque because of the vast disinformation campaign they encounter when they attempt to ascertain what is happening via Internet research.
As I described in the introduction to this overview however, the basic nature of the crime – namely, that it is a government counter-intelligence program – is an unavoidable conclusion since the apparent scope of the activity would make it impossible for it to be undetected by America’s now-massive homeland security surveillance and information-sharing infrastructure.
Gang stalking’s organizational structure apparently involves a mixture of personnel. At the top are government officials and agents in federal law enforcement and intelligence agencies, who would need to at least passively acquiesce in the program, if not orchestrate it. Several levels of delegates below them would be needed to manage and perform various operations.
The FBI’s original version of Cointelpro also made use of local government and civilian minions. A Los Angeles Times account of one of the Cointelpro operations explained that “the bureau had enlisted a local police chief, letter carriers and a switchboard operator at Swathmore College to spy on campus and black activist groups in the Philidelphia area.”
Presumably, one major difference between the structure of the original Cointelpro operations and modern gang stalking is the huge number of private intelligence/security firm contractors with secret clearances now employed by “homeland security” programs and corporations.
Intelligence/Security Contractors (“Surveillance Role Players”)
Among the explicit goals of post-9/11 national security reforms was to establish better cooperation between different government agencies, as well as between federal and local jurisdictions. This was done partly to reduce the problem of hoarding (“stove-piping”) information within different agencies.
To enable the sharing of information – for example by a national network of “data fusion centers” – and to support a larger security infrastructure generally – the role of security/intelligence/military contractor firms was greatly expanded.
In addition, law enforcement and intelligence agencies in the U.S. have blurred the boundaries between public agencies and private contractors. Not only do they work closely together, but there is also a lucrative revolving-door career path for employees between the public and private spheres.
Incidentally, the collusion of corporations and federal agencies in the area of domestic intelligence activities is not new. The U.S. government has been colluding with big corporations to spy on Americans since the dawn of the Cold War, as this article in Wired notes, although the practice has greatly expanded.
“The government is increasingly using corporations to do its surveillance work, allowing it to get around restrictions that protect the privacy and civil liberties of Americans, according to a report released….by the American Civil Liberties Union…”
Cointelpro Version 2.0 (gang stalking) apparently makes use of the large supply of Americans who possess security clearances – currently nearly 4.9 million people – almost a quarter of whom work for private firms. A June 2013 article in USA Today noted that about 1.4 million Americans have security clearances of the top-secret class.
As with other intelligence functions these days, one would expect that there might be a large role for private contractors with security clearances in managing organized stalking operations, and that does seem to be the case. Here is an example of intelligence contractors employed as domestic spies.
Numerous online job listings for “surveillance role players” seek applicants with active security clearances and training in counterintelligence. Some of these ads advise applicants that they will “coordinate with local law enforcement.”
These appear to be evidence that federal law enforcement agencies have largely outsourced these operations. I am unaware of any other plausible explanation for such job ads. Nor am I aware of any plausible alternative explanations of who would have the tactical skills, technological assets, funding, law enforcement connections, and secrecy incentives needed to perpetrate nationwide stalking operations involving counterintelligence methods.
If any readers of this website have any insights about the nature of these jobs (which seem never to be discussed in the mainstream news media), I welcome them. Obviously, it’s pure speculation from my perspective that they are possibly connected with organized stalking, but such a connection would neatly answer these three questions:
“What do surveillance role players do?”
“Who perpetrates organized stalking?”
“How do the stalkers maintain the secrecy of their operations?”
Gang stalking crosses multiple boundaries: geographical, jurisdictional, legal, and moral. My guess is that the participants are primarily motivated by the financial benefits, but also by the notion that they are part of a secret group which is essentially above the law, and which imposes what they see as a moral punishment on dissidents. They are America’s more cowardly and more secretive version of the Taliban.
Criminal “Informants”
U.S. law enforcement and intelligence agencies make extensive use of criminal informants – who are never in short supply in a nation with one of the highest per capita incarceration rates in the world. For the purposes of counterintelligence stalking, “criminal informants” are ex-convicts whose “informant” duties are spying on and harassing targeted individuals.
Based on my own observations and accounts of other targeted individuals, most street-level perpetrators are rotated by the persons coordinating the harassment, so the victim is not confronting the same individuals repeatedly. Even though a victim might be harassed daily, most of the stalkers only have a single instance of direct contact with the victim.
Some websites about gang stalking contain speculation (and deliberate disinformation) that suggests organized stalking is perpetrated by criminal syndicates or secret fraternal orders. Supporting evidence for this sometimes includes anonymous “confessions” by people who claimed to have participated in such organizations.
It is true that the U.S. Senate’s Church Committee found that the original FBI Cointelpro operation sometimes employed members of the Mafia to commit certain crimes, but it does not seem plausible that a large-scale contemporary counterintelligence program could be controlled and kept off the public radar if it were not being tightly managed by government personnel with security clearances.
Terrorism Liaison Officers (TLOs)
Mainstream news reports show that since 2008, America’s “national security” personnel include “Terrorism Liasion Officers.” TLOs are firefighters, police officers, paramedics, and utility workers trained to hunt for “suspicious activity” and report it to a secret national government database.
As this Denver Post article noted, the “suspicious activity” could be simply taking photos or expressing “extremist beliefs.” One of the concerns about this policy was expressed by the director of the Electronic Privacy Information Center, John Verdi:
”The problem is, you’re drafting individuals whose job isn’t law enforcement to spy on ordinary Americans and report their activities to the government.”
If you have a traditional (non-police state) view of America, you might have difficulty wrapping your mind around the notion that firefighters, paramedics, and utility workers are – or should be – gathering information on their fellow Americans. For an example of the thinking behind the concept – and an overview of the main elements of the national intelligence-gathering infrastructure – you can read the following document.
This is a Naval Postgraduate School master’s thesis written in 2012 by Joshua M. Dennis, a Chicago Fire Department chief. In his thesis, Mr. Dennis seeks to clarify the role of the U.S. Fire Service in the domestic intelligence community.
Apparently, a pilot program for gathering and sharing information by firefighters was launched by the U.S. Department of Homeland Security (DHS) in 2006, but the national framework for spying (“suspicious activity reporting”) by first-responders has not been fully worked out.
Hat-tip to the blog Cryptoscatology for posting the link.
InfraGard & DSAC Members (the corporate equivalent of TLOs)
As mentioned in the introduction of this overview, two corporate associations – InfraGard and DSAC – have partnerships with the FBI and Homeland Security to share intelligence. Apparently, certain trusted individuals in the participating corporations are granted special membership status by the FBI – complete with ID cards – and have privileged access to information and direct communication with the FBI.
As a practical matter, this very likely means that if one of these elite members of the business community decides to have someone targeted for an “investigation” they could simply tell the FBI that they have concerns that the individual represents what counterintelligence agents call “an insider threat” – meaning that an employee is suspected of being likely to steal proprietary information or that he or she is a “disgruntled employee” or has “extremist beliefs” and poses a safety or national security risk.
For a detailed explanation of this unholy alliance, I recommend readingthis May 2013 report from the Center for Media and Democracy (which reported that certain corporations were/are exploiting this arrangement to use the FBI as a weapon against their political adversary, the Occupy Wall Street Movement.
I also strongly recommend watching this episode of a TV series by Jesse Ventura, in which he confronts a member of InfraGard regarding some of the obvious potential for abuse of power inherent in this arrangement. The relevant section begins 25 minutes into the video.
Citizen Spies
Clearly the government also makes extensive use of citizen informants. An obvious example of this was the Department of Homeland Security’s policy introduced in 2010 encouraging citizens to report anything suspicious (“If you see something, say something”). State and local governments have followed the feds’ lead (and money) and made efforts to encourage a “snitch culture” – such as this Florida program encouraging residents to spy on their neighbors.
Based on my own observations and on speculation about what would be a logical (and in some cases necessary) use of resources for a counterintelligence operation, it seems that some of the people who participate – at least in small ways – in the stalking are civilians who are presumably told they are assisting in an investigation or a “neighborhood watch” type program.
No doubt such neighbors of the targeted individual would not think of themselves as “vigilantes” even though they are in fact participating in an illegal conspiracy designed to inflict severe emotional and financial extra-judicial punishment.
As noted in “The Hidden Evil” by Mark Rich and other sources, the motivations of the stalkers who actually perform acts of harassment can be completely unrelated to the reason the targeted individual was blacklisted in the first place. While the victim may have been targeted simply because he or she crossed someone with connections and money, the perpetrators – including the victim’s neighbors, associates, relatives, etc. – can simply be told various lies about the victim. Those lies can be tailored to fit the particular person or groups of persons being recruited to participate in the harassment.
As for involvement by local law enforcement officers (and I can personally attest to this), it sometimes involves direct participation (such as being closely followed by patrol cars), and other times it simply involves police “looking the other way” as others do the stalking.
As I note in the section of this website about tactics for fighting back, victims can exploit the fact that police do not want to get (officially) involved – for example, by saturating their neighborhood with flyers about gang stalking. My own massive use of that tactic never led to local police responding (at least not in any direct public way), no matter how indiscrete I was about it.
Even if such tactics do not completely stop the harassment, they could diminish it as the perpetrators become aware that their efforts will result in very public exposure. Also, such tactics will help expose the larger conspiracy to the general public – which will eventually undermine the whole Stasi operation.
So the list of participants in the overall process of which organized stalking is an element probably looks something like this:
1) Officials & agents of law enforcement & intelligence agencies (DOJ, FBI, DIA, etc.)
2) Intelligence contractors with security clearances (“surveillance role players”)
3) Members of InfraGard & DSAC
4) Private investigators – for example, PIs employed by InfraGard/DSAC members
5) Terrorism Liaison Officers (firefighters, police officers, paramedics, & utility workers)
6) Other local police officers
7) Civilian volunteers – neighbors, landlords, merchants, and others whose assistance is obtained by informing them they are participating in an investigation or a neighborhood watch program. Probably many of these people are essentially “useful idiots” who are unaware of the exact nature of the operations they’re assisting.
8) Criminal “informants” who are coerced and/or paid to administer the street-level harassment
9) Others (?) – For example, persons informally recruited to assist – such as friends, relatives, and business associates of persons in one of the other categories
2) Intelligence contractors with security clearances (“surveillance role players”)
3) Members of InfraGard & DSAC
4) Private investigators – for example, PIs employed by InfraGard/DSAC members
5) Terrorism Liaison Officers (firefighters, police officers, paramedics, & utility workers)
6) Other local police officers
7) Civilian volunteers – neighbors, landlords, merchants, and others whose assistance is obtained by informing them they are participating in an investigation or a neighborhood watch program. Probably many of these people are essentially “useful idiots” who are unaware of the exact nature of the operations they’re assisting.
8) Criminal “informants” who are coerced and/or paid to administer the street-level harassment
9) Others (?) – For example, persons informally recruited to assist – such as friends, relatives, and business associates of persons in one of the other categories
__________________________________________________________
12. Social Conformity and Obedience to Authority
Nazi soldiers invading Poland
People like to believe that the evil and stupid obedience displayed by people such as Hitler’s followers is far-removed from their own nature and culture. History and science say otherwise.
Anyone wishing to understand gang stalking – or even to assess the plausibility of such a conspiracy – should briefly review the interesting (but disturbing) historical and scientific evidence on conformity and obedience.
History is filled with shocking manifestations of group-think – such as the Salem, Massachusetts witch trials. Examples of blind deference to authority include attrocities such as the “Rape of Nanking” in the 1930s, in which Japanese soldiers, sanctioned by their leaders, raped, tortured, and murdered thousand of Chinese civilians. Many infants were killed in front of their mothers in that massacre; sometimes the soldiers gouged-out the children’s eyes before killing them.
Literature is similarly filled with helpful examples of the evil and idiocy associated with group-think and obedience. William Golding’s Lord of the Flies is one iconic example.
Findings of psychology experiments fully support the notion that it would not be difficult to recruit people to participate in organized harassment of targeted individuals.
Two famous sets of experiments are of particular relevance: theconformity experiments by Solomon Asch of Swarthmore College, and the obedience to authority figures experiments by Yale psychologist Stanley Milgram.
In Asch’s experiments, students were asked to participate – along with others – in what was ostensibly a “vision test.” Actually, the other participants were accomplices of the experimenter, and the study sought to find how the unsuspecting students would be influenced by the behavior of the others.
When asked to assess the relative lengths of lines displayed on cards, unsuspecting students were frequently influenced by the responses of the accomplices around them. In other words, people often changed their beliefs about what they had seen when the group expressed an opinion at variance with their own. In a control group, with no pressure to conform, few of the subjects gave incorrect answers. A majority (75 percent) of the subjects gave an incorrect answer to at least one question when surrounded by others expressing the wrong answer.
“The disappearance of a sense of responsibilityis the most far-reaching consequence of submissionto authority.” – Stanley Milgram
In Milgram’s experiments, participants were led to believe that they were administering small electrical shocks to a person being tested, and that the voltage was being incrementally increased with each delivery of the shock. The experiment (and other similar subsequent experiments by others) found that most people (61 to 66 percent) will administer a fatal electrical shock to an innocent person purely out of deference to authority.
Anyone skeptical – despite such findings – about how easy it is to manipulate average citizens to do very bad things to people they don’t know should watch the video clip of an ABC TV program on the subject, which I included in the “Gang Stalking Videos” section of this website. That video features a private investigator-type person (not unlike the people who manage gang stalking operations presumably) portraying himself as a law enforcement officer, and easily persuading people to participate in serious crimes against strangers.
Chris Hedges on the morons who infest the U.S. military-intelligence industrial complex
As a former member of the U.S. armed forces, I can say with some authority that many of the personnel in our nation’s military are good people who have both integrity and intelligence.
Unfortunately, a large portion of the personnel – and I’m sure this also applies to our intelligence agencies such as the FBI and CIA – are exactly the type of folks described by journalist Chris Hedges in the article linked below.
Just as importantly, persons of the type Hedges refers to are no doubt well-represented among the civilians who are manipulated into participating in gang stalking.
Both the achitects of gang stalking and the minions who perpetrate the street-level harassment are careerist robots and butt-kissers.
Hedges, who spent a couple of decades as a war correspondent, explains the mentality and character of America’s Stasi supporters perfectly:
“Most institutions have a propensity to promote mediocrities, those whose primary strengths are knowing where power lies, being subservient and obsequious to the centers of power and never letting morality get in the way of one’s career. The military is the worst in this respect. In the military, whether at the Paris Island boot camp or West Point, you are trained not to think but to obey. What amazes me about the military is how stupid and bovine its senior officers are. Those with brains and the willingness to use them seem to be pushed out long before they can rise to the senior-officer ranks. The many Army generals I met over the years not only lacked the most rudimentary creativity and independence of thought but nearly always saw the press, as well as an informed public, as impinging on their love of order, regimentation, unwavering obedience to authority and single-minded use of force to solve complex problems.”
__________________________________________________________
13. The U.S. Department of Justice (DOJ) and Gang Stalking
The moral character of the DOJ
“A fish rots from the head down” – whether it’s the Vatican covering up decades of child sex abuse by priests or the current head of the DOJ (as I update this in November 2013) – U.S. Attorney General Eric Holder – apparently doing whatever pleases the President and the law enforcement and intelligence communities.
The DOJ oversees federal law enforcement agencies such as the FBI and the DEA, and apparently acquiesces in a contemporary version of Cointelpro (organized stalking) – just as they did in the original version of that program.
U.S. Attorney General Robert F. Kennedy – who was then-head of the DOJ – authorized some of the original Cointelpro operations, such as wiretaps on the home of Martin Luther King, Jr.
Corruption at the U.S. Department of Justice is a bipartisan phenomenon. In 1971, when civilian activists leaked secret FBI documents to the Washington Post which revealed crimes committed against Americans by the FBI, U.S. Attorney General John Mitchell (who later served prison time for his role in the Watergate scandal)asked the Post’s executive editor Ben Bradlee not to disclose the documents. To his credit, Bradlee chose patriotism and truth over the imperatives of the corrupt police state thugs.
U.S. Attorney General Eric Holder is a good example of the kind of people who often infest the highest echelons of societies’ power structures, and whose participation in counterintelligence operations would not be out of character.
When Holder was President Clinton’s deputy attorney general he approved the pardon of Marc Rich – a wealthy investor who was indicted on 63 counts of tax evasion and other charges and fled to Switzerland to avoid prosecution. By all serious accounts, the only reason Clinton granted the pardon was that Rich’s wife was a big donor to the Democratic Party.
Even the opinion writers for the Washington Post – which is typically sympathetic to the Democrats – said the pardon should have precluded Holder from becoming President Obama’s Attorney General.Richard Cohen wrote of the pardon:
“It suggests that Holder, whatever his other qualifications, could not say no to power. The Rich pardon request had power written all over it — the patronage of important Democratic fundraisers, for instance.”
More recently, Holder’s morally-questionable actions have included aggressive efforts to intimidate whistle-blowers and journalists trying to expose government malfeasance.
James Goodale, a First Amendment lawyer who played a key role in the publication of the Pentagon Papers by the New York Times, makes the case that Holder is essentially treating reporters as criminals.
Federal Judges Report Frequent Lying by DOJ Prosecutors
Most Americans give little thought to their nation’s Department of Justice, except perhaps for high-profile cases with partisan political implications. Evidence of the DOJ’s lack of integrity does not usually show up on the public’s radar.
Federal judges however, often see examples of the moral rot at the DOJ, and have warned for decades that frequent misconduct by prosecutors undermines Constitutional protections of individuals’ rights.A September 2010 article in USA Today reported on the effectiveness of a law enacted by Congress in 1997 intended to curb illegal conduct by prosecutors, such as lying and deliberately concealing evidence:
“…USA TODAY documented 201 criminal cases in the years that followed in which judges determined that Justice Department prosecutors — the nation’s most elite and powerful law enforcement officials — themselves violated laws or ethics rules.
In case after case during that time, judges blasted prosecutors for “flagrant” or “outrageous” misconduct. They caught some prosecutors hiding evidence, found others lying to judges and juries, and said others had broken plea bargains.”
Why would federal prosecutors engage in misconduct? Part of the explanation is that when they get caught, they are unlikely to be fired – as noted in another article by USA Today, which also found that “the Justice Department consistently conceals its own investigations of misconduct from the public.”
Lying by the FBI
Since the DOJ oversees the FBI, it is not surprising that the latter also takes a very elastic view of its obligation to abide by the U.S. Constitution. One way they do this is to assert, when caught lying, that the deception is being done in the name of “national security.”
When various American Islamic organizations and individuals filed a FOIA (Freedom of Information Act) request in 2006 to determine if the FBI had engaged in illegal surveillance of them, the FBI concealed the existence of much of the material requested. In a lawsuit which followed, the 9th Circuit Court of Appeals found that the FBI lied to the plaintiffs and to the court about the existence of the documents sought.
When confronted with their deception, the FBI argued, in effect, that the agency should not be required to tell the truth in court if they feel that doing so could compromise national security interests. The court rejected that claim.
Anyone wondering about the plausibility of claims that federal law enforcement agencies acquiesce in gang stalking should consider the fact that such agencies sometimes explicitly assert that they are above the law.
DOJ’s Complicity in Spying and Lying by Private Intelligence Firms
Members of the Anonymous movement hacked into the emails of the cybersecurity firm HB Gary Federal In February 2011 after an executive at that firm boasted in the Financial Times that his company had infiltrated Anonymous and started to expose them.
One of the reports contained in the emails was a plan for HB Gary to work with several other security firms to destroy the whistle-blower organization WikiLeaks. News reports had indicated that Wikileaks was planning to publish documents showing possible corruption and fraud at Bank of America, so the bank funded a “counterespionage” campaignagainst Wikileaks, which included hiring the large intelligence contractor firm Booz Allen, whose staff includes many former top officials from the intelligence community and the defense department.
One of the proposals was to create and plant fake documents to discredit Wikileaks. The plans also included hacking into Wikileaks’ computer systems. Another proposal was to “attack” and “disrupt” the career of journalist Glenn Greenwald to pressure him into abandoning his public support of Wikileaks.
Bank of America had hired the law firm Hunton & Williams – among the most well-connected law firms in the nation’s capital – to coordinate the bank’s war against Wikileaks at the recommendation of the DOJ.
Glenn Greenwald explained the serious implications of this network of government and corporate players in the private espionage business in a February 2011 article for Salon.com:
“What is set forth in these proposals for Bank of America quite possibly constitutes serious crimes. Manufacturing and submitting fake documents with the intent they be published likely constitutes forgery and fraud. Threatening the careers of journalists and activists in order to force them to be silent is possibly extortion and, depending on the specific means to be used, constitutes other crimes as well. Attacking WikiLeaks’ computer infrastructure in an attempt to compromise their sources undoubtedly violates numerous cyber laws.
Yet these firms had no compunction about proposing such measures to Bank of America and Hunton & Williams, and even writing them down. What accounts for that brazen disregard of risk? In this world, law does not exist as a constraint. It’s impossible to imagine the DOJ ever, ever prosecuting a huge entity like Bank of America for doing something like waging war against WikiLeaks and its supporters. These massive corporations and the firms that serve them have no fear of law or government because they control each.”
As Greenwald notes, a clear example of the extent to which the DOJ serves corporate interests rather than the interests of justice and the American public is the department’s very different reactions to the cyber attacks on corporations versus an attack on Wikileaks:
“After Anonymous imposed some very minimal cyber disruptions on Paypal, Master Card and Amazon, the DOJ flamboyantly vowed to arrest the culprits, and several individuals were just arrested as part of those attacks. But weeks earlier, a far more damaging and serious cyber-attack was launched at WikiLeaks, knocking them offline. Those attacks were sophisticated and dangerous. Whoever did that was quite likely part of either a government agency or a large private entity acting at its behest. Yet the DOJ has never announced any investigation into those attacks or vowed to apprehend the culprits, and it’s impossible to imagine that ever happening.
Why? Because crimes carried out that serve the Government’s agenda and target its opponents are permitted and even encouraged; cyber-attacks are “crimes” only when undertaken by those whom the Government dislikes, but are perfectly permissible when the Government itself or those with a sympathetic agenda unleash them.”
A November 2013 news report from Democracy Now! also asserts that private intelligence-security contractor firms are pretty much free to perpetrate crimes on behalf of their corporate clients without fear of legal punishment.
The report explains that major U.S. corporations are using spies to conduct surveillance (sometimes illegally) of non-profit organizations engaged in advocacy for causes such as anti-war policy, consumer rights, environmentalism, animal rights, and arms control.
Corporations engaging in this kind of espionage reportedly include Wal-Mart, Monsanto, Bank of America, Dow Chemical, Kraft, Coca-Cola, Chevron, Burger King, McDonald’s, Shell, BP, and others – as well as the U.S. Chamber of Commerce.
“…these corporations employ former CIA, National Security Agency and FBI agents to engage in private surveillance work, which is often illegal in nature but rarely — if ever — prosecuted.”
America’s Post-Constitutional Law Enforcement Paradigm
A confluence of developments over the past couple of decades has led to a more militarized and secretive form of law enforcement in America. A counterintelligence subversion strategy of organized stalking is among the most extreme manifestations of the new paradigm.
The government’s natural tendency to expand its size and power has been accelerated by the politics, profits, and career opportunities associated with the “War on Drugs” and the “War on Terrorism.” At the same time, advances in technology have made possible highly invasive surveillance tools which create a constant temptation for abuse by people in the intelligence, law enforcement, and security industries.
Another development has been an erosion of traditional jurisdictional boundaries in law enforcement. By design, numerous federal and local law enforcement and intelligence agencies now work more closely with each other, and with the private contractors who provide much of the infrastructure, such as defense industry firms and private security firms.
U.S. law enforcement agencies rely heavily upon criminal informants – despite the obvious conflicts of interest that involves. Budgets and audits cited in the New York Times for example, showed that the FBI was using more than 15,000 secret informants in 2008, and the DEA (Drug Enforcement Adminstration) had about 4,000 criminal informants on its payroll in 2005.
By my own observations, and by anecdotal reports of others, gang stalking apparently makes extensive use of criminal informants. But those snitches are not being used by the FBI just to spy and inform; they are perpetrating acts of criminal harassment for the purposes of counterintelligence subversion.
Rather than working to ensure the protection of Americans’ rights in this new Big Brother surveillance environment, the U.S. Department of Justice has done everything possible to enable the executive branch to increase its secrecy and power at the expense of Americans’ civil liberties.
A variety of Orwellian legal weapons have emerged – always based on claims of national security. “Suspicious Activity Reports” are now filed by “Terrorism Liaison Officers” and sent to a network of regional “Data Fusion Centers” and reviewed by agents at the “Homeland Security Department.”
Old-fashioned concepts in the Bill of Rights – like obtaining search warrants from judges – have been tossed aside. Now the FBI can just issue a “National Security Letter.” Instead of launching an investigation based on probable cause, the FBI can now just target an individual for surveillance and investigation by calling it an “assessment.”
Concerning other elements of the now-massive U.S. spy network, the public can only speculate. For example, no one has yet said publicly what is being done by the numerous “surveillance role players” (discussed elsewhere in this website) with secret clearances and counterintelligence training who are employed by intelligence-security contractors.
If anyone challenges the Constitutional legitimacy of any of these suspicious policies (or if members of the government question other secret policies whose existence is unknown to the public), the matter is referred to the U.S. government’s “Star Chamber” – the secret FISA Court, which in nearly all cases simply rubber-stamps the policy to maintain the façade of legitimacy.
The DOJ’s Index of Crimes
As mentioned in the introduction to this overview, claims about the widespread existence of gang stalking are supported by the DOJ’s own crime survey statistics (obtained via a Freedom of Information Act request) which showed that in 2006 there were an estimated 446,790 stalking incidents involving three or more perpetrators stalking a single individual.
Claims about gang stalking are also supported by the fact that the National Center for Victims of Crime – which is funded by the DOJ – apparently receives “thousands of calls per month” about such crimes. Yet organized stalking is conspicuously absent from the DOJ’s Index of Crimes.
As previously mentioned, Robert L. Snow, a retired police captain from the Indianapolis P.D., wrote a book called Stopping a Stalker, in which he devoted a chapter to the subject of organized stalking by multiple perpetrators associated with causes (“cause stalking”) – such as stalking by extreme anti-abortion activists.
However, the entire subject of organized stalking (or “group stalking,” “vigilante stalking,” etc.) does not appear in the DOJ’s website – even though the site includes a comprehensive index of types of crimes and legal issues, including some that are relatively obscure.
The DOJ’s “Weed and Seed” Program
The most interesting section of the DOJ website’s crime index – in relation to the government’s apparent acquiescence in gang stalking – is a reference to a program called “Weed and Seed.” The program name was still in the index the last time I checked, but the information for that section – which was part of something called the “Community Capacity Development Office” (CCDO) no longer existed. Elsewhere in the website was a statement explaining that the CCDO was closed due to lack of funding:
“As of June 5, 2011, the Community Capacity Development Office (CCDO) closed due to a lack of federal funding for the office. For Fiscal Year 2012 Weed and Seed grants, the Bureau of Justice Assistance will manage these grants until the end of the grant award period.”
I copied the Weed and Seed program’s description while it was still on the website (in February 2012). It describes a community policing strategy. If you read this without the context of any first-hand experience or historical background (e.g., Cointelpro, MK Ultra, and Stasi), it might seem innocuous. However, if you’re familiar with gang stalking and its historical predecessors, it takes on a much darker character.
Operation Weed and Seed
A strategy within the U.S. Department of Justice’s Office of Justice Programs that incorporates community-based initiatives. It is an innovative and comprehensive multi-agency approach to law enforcement, crime prevention, and community revitalization.
The Weed and Seed Strategy
Operation Weed and Seed is foremost a strategy–rather than a grant program– which aims to prevent, control, and reduce violent crime, drug abuse, and gang activity in targeted high-crime neighborhoods across the country. Weed and Seed sites range in size from several neighborhood blocks to 15 square miles.
The strategy involves a two-pronged approach: law enforcement agencies and prosecutors cooperate in “weeding out” criminals who participate in violent crime and drug abuse, attempting to prevent their return to the targeted area; and “seeding” brings human services to the area, encompassing prevention, intervention, treatment, and neighborhood revitalization.
A community-orientated policing component bridges weeding and seeding strategies. Officers obtain helpful information from area residents for weeding efforts while they aid residents in obtaining information about community revitalization and seeding resources.
Note that this law enforcement model can be exploited not just by government agencies, but also by private groups and individuals for their own agendas. I would suggest that is exactly what is happening. Private organizations and individuals who have the relevant skill sets, connections to law enforcement and intelligence agencies, and assets to hire private investigators, can either create illicit “neighborhood watch” programs to monitor and harass their targets, or they can exploit existing programs by feeding information (whether true or false) about their targets to law enforcement personnel to have the victims become subjects of investigation and surveillance.
The “Weed and Seed” program is the most explicit official statement of the institutional philosophy behind gang stalking – namely, that the victims are deserving of persecution because they are potential criminals, socially marginal dissidents, drug-users, whistle-blowers, trouble-makers, etc. Essentially, the targeted individuals are the “weeds” that need to be removed (or at least isolated and suppressed).
__________________________________________________________
14. Disinformation
The Role of Disinformation in Gang Stalking
Gang stalking is all about deception, so secrecy is a primary element. Inevitably though, a wide-scale program will involve exposure, so another major component of gang stalking (and of counterintelligence operations generally) is disinformation – which is used to mitigate the effects of public exposure.
The effectiveness of disinformation derives from the fact that most people – unlike say, con artists, espionage agents, and detectives – don’t usually consider that the information they’re encountering might be a batch of deliberate lies.
As previously noted, gang stalkers lay the groundwork for the deception by limiting the harassment tactics to things which will tend to be dismissed as benign everyday occurrences and coincidences by non-victims when they are described (neighbors who are noisy and rude, etc.). This makes it an uphill battle for gang stalking victims to persuade people about what is being done to them. The problem is compounded by the fact that sadly, most Americans are totally ignorant of their government’s non-disputed history of similar programs, such as Cointelpro and MK Ultra.
Operation Mockingbird
Sadly, most Americans are thoroughly ignorant of the use of disinformation campaigns by the U.S. government. This is so notwithstanding a long history of such tactics.
One of the most famous programs in which America’s intelligence community systematically lied to the American public ocurred in the 1950s. Here is a portion of a Wikipedia entry about it:
Operation Mockingbird was a secret Central Intelligence Agency campaign to influence media beginning in the 1950s. Organized by Cord Meyer and Allen W. Dulles in the 1950s, it was later led by Frank Wisner after Dulles became head of CIA. The organization recruited leading American journalists into a network to help present the CIA’s views, and funded some student and cultural organizations, and magazines as fronts. As it developed, it also worked to influence foreign media and political campaigns, in addition to activities by other operating units of the CIA.
“By the early 1950s, Wisner ‘owned’ respected members of The New York Times, Newsweek, CBS and other communications vehicles.”[3]
The usual methodology was placing reports developed from intelligence provided by the CIA to witting or unwitting reporters. Those reports would then be repeated or cited by the preceding reporters which in turn would then be cited throughout the media wire services. These networks were run by people with well-known liberal but pro-American big business and anti-Soviet views such as William Paley (CBS), Henry Luce (Time and Life Magazine), Arthur Hays Sulzberger (New York Times), Alfred Friendly (managing editor of the Washington Post), Jerry O’Leary(Washington Star), Hal Hendrix (Miami News), Barry Bingham, Sr. (Louisville Courier-Journal), James Copley (Copley News Services) and Joseph Harrison (Christian Science Monitor).[7]
The Office of Policy Coordination (OPC) was funded by siphoning of funds intended for the Marshall Plan. Some of this money was used to bribe journalists and publishers.
According to Alex Constantine (Mockingbird: The Subversion Of The Free Press By The CIA), in the 1950s, “some 3,000 salaried and contract CIA employees were eventually engaged in propaganda efforts”. Wisner was able to constrain newspapers from reporting about certain events, including the CIA plots to overthrow the governments of Iran (see: Operation Ajax) and Guatemala(see: Operation PBSUCCESS).[9]
3 – Deborah Davis (1979). Katharine the Great. pp. 137–138.
7 – Carl Bernstein (20 October 1977). “CIA and the Media”. Rolling Stone Magazine.
9 – Alex Constantine (2000). Mockingbird: The Subversion Of The Free Press By The CIA.
Current U.S. Government Policy on Lying
The values associated with Operation Mockingbird are alive and well in America’s federal government today – with its penchant for secrecy and for spying on Americans – and its casual attitude about the Constitution and honesty.
An article by journalist Glenn Greenwald in January 2010 in Salon.com called attention to the shockingly Orwellian view of news and propaganda in both the George W. Bush and Barack Obama administrations. In particular, Greenwald focused on a member of the Obama administration.
Cass Sunstein – a close confidant of President Obama – who served as Administrator of the Office of Information and Regulatory Affairs from September 2009 to 2012 – has an interesting view on lying by the federal government: he favors it.
“In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government. This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.
….Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.” He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government). This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”
Glenn Greenwald’s article:
Cass Sunstein’s Harvard Law School paper:
Slandering Critics of Corporations
For a fascinating look at the specific ways that disinformation is used by U.S. government agencies and their corporate contractors, you should read the article in the Nation which I mentioned previously in this overview (“The Strange Case of Barrett Brown” by Peter Ludlow, June 18, 2013).
That article describes, for example, how a group of private intelligence and security contractors with close government ties developed an operation whose objective was to discredit a group which was critical of the Chamber of Commerce, and to discredit others, such as Glenn Greenwald – the journalist who later famously revealed the NSA surveillance program information provided by whistle-blower Edward Snowden in 2013:
Its main objective was to discredit critics of the Chamber of Commerce, like Chamber Watch, using such tactics as creating a “false document, perhaps highlighting periodical financial information,” giving it to a progressive group opposing the Chamber, and then subsequently exposing the document as a fake to “prove that US Chamber Watch cannot be trusted with information and/or tell the truth.” In addition, the group proposed creating a “fake insider persona” to infiltrate Chamber Watch. They would “create two fake insider personas, using one as leverage to discredit the other while confirming the legitimacy of the second.” The leaked e-mails showed that similar disinformation campaigns were being planned against WikiLeaks and Glenn Greenwald.
If operations such as that one were not proven by the documents obtained by hackers, many people would dismiss the allegations of such activities as tin-foil hat conspiracy theories.
Another example (among many) happened in 2012. When a reporter and editor at USA Today investigated one of the Pentagon contractors being paid to spread propaganda, that contractor began a secret smear campaign against them.
“Fake Twitter and Facebook accounts were created in their names, along with a Wikipedia entry and dozens of message board postings and blog comments. Websites were registered in their names…”
A proxy service was used to hide the identity of the owner of the websites, and another website was registered to a non-existent address. Here is an article about it.
Government Front Groups
The U.S. government adds to the wall of secrecy, deception, and ignorance which surrounds gang stalking by using four major disinformation tactics. Each tactic is a variation on the same general strategy – namely, to discredit gang stalking victims by casting doubts on their intelligence and sanity.
One tactic is to create faux support groups for gang stalking victims. Freedom From Covert Harassment and Surveillance (FFCHS), which I discuss in detail in its own section of this website, is the main example. FFCHS was obviously created so that victims will turn to them – rather than forming their own legitimate advocacy groups to lobby Congress and the media to investigate gang stalking. As I explain in that section, everything about the group is designed to convey the impression that people who claim to be gang stalking victims should not be taken seriously.
Websites
A second tactic is the creation of numerous websites about gang stalking which are filled with stupidity and extraneous information. Again, the objective is to discredit all self-proclaimed gang stalking victims by making it appear that they are paranoid tin-foil hat wearing morons.
An honest intelligent person – even with no personal experience with gang stalking – would not have trouble distinguishing the relatively credible websites such as those I cite in the “Recommended Websites” section of this website from those cited in the recommended sites on the FFCHS website.
“Sock-Puppets” (Online Personas)
A third form of disinformation is the use of “sock-puppets” (personas) to monitor and discredit legitimate websites and social media entities which discuss gang stalking.
Anyone who reads the comments posted online whenever the subject of gang stalking is raised, will note that reports of gang stalking almost invariably attract sarcastic – but ultimately unconvincing – statements by forum trolls, registering their skepticism.
One expects that sort of verbal warfare on Internet forums related to political issues, but you have to wonder why the relatively obscure topic of gang stalking attracts such a dedicated army of detractors. As Hamlet’s mother observed, sometimes people “protest too much.”
As this article posted on LiveLeak notes, a former CIA clandestine service trainee and DIA analyst revealed that the FBI and CIA use trolls to monitor social media and interact with users to discredit information disseminated on the web.
Most mainstream news media corporations dutifully avoid discussing the extent to which the U.S. government and its private intelligence contractors systematically spread lies online by means of “sock-puppets” – fake persons.
Thankfully, some news sources do not view themselves as tools for spreading propaganda on behalf of corrupt U.S. agencies and corporations.
The Guardian newspaper – which published the famous revelations about NSA surveillance leaked by Edward Snowden – reported in July 2013 on the sneaky (and possibly illegal) proposals by a consortium of private intelligence contracting firms, such as Stratfor, to spread lies on the Internet on behalf of their corporate clients, using personas:
“[The intelligence firms were] involved in another scheme to deploy sophisticated software-based fake people across social networks in order to infiltrate and mislead.”
Faux Articles Planted in the News Media
Finally, the fourth disinformation tactic is to plant articles in the news media which create the impression that gang stalking exists only in the minds of delusional individuals.
The prime example of this – arguably a textbook case of the art of disinformation – is a lengthy New York Times article on gang stalking called “Sharing Their Demons on the Web” (November 13, 2008).
Because of its relevance to material in the “Gang Stalking Documents” section of this website, the following information also appears there. Please forgive the redundancy.
FBI whistle-blower Ted Gunderson (former head of the Los Angeles FBI office) was a key figure in exposing gang stalking, yet he goes unmentioned in the Times piece. That should be a giant red warning flag to any reader armed with that information who isn’t retarded.
Even if the “reporter” had determined that Gunderson’s claims arose from the fact that he simply became delusional for some reason after a long high-profile law enforcement career, you would think that finding would be worth mentioning. Not a word.
That lengthy article also failed to include any interviews with the licensed private investigators who have written on the subject of gang stalking, such as David Lawson and John B. Lopes.
Instead, the only “experts” interviewed for the article were four mental health professionals (psychiatrists and psychologists) who discussed mental illness and delusions. The one other person interviewed was someone who supposedly claimed to be a victim of gang stalking, Derrick Robinson, who is identified as a janitor in Cincinnati, and president of FFCHS – the aforementioned support group for gang stalking victims.
Most readers of the Times article would not be familiar with FFCHS, and would have no way of knowing – or even suspecting – that it’s a disinformation front group – as I detail in the FFCHS section of this website.
Note that the mental health experts quoted were not asked about their knowledge of crimes (such as stalking) – let alone their views on the plausibility of the existence of a modern version of the FBI’s Cointelpro. In fact, remarkably, the article makes no mention of Cointelpro whatsoever.
Also note that the one supposedly self-proclaimed gang stalking victim, Mr. Robinson, is a janitor – and he is the head of the victims support group. The intended takeaway is that the most capable member of the community of self-proclaimed victims of organized stalking – the one with the wherewithal to become head of their national organization – is a janitor.
The reader is left to infer that the rest of the self-proclaimed gang stalking victim community must really be losers if he’s their brightest bulb. It simply would not have served the objective of the “reporter” to discuss gang stalking victims who were professionals, such as the aforementioned FBI special agent, Mr. Gunderson, or the attorney, Mr. Labella.
Just to be sure readers got the message though, a psychiatrist quoted in the article mentioned that “These people lead quietly desperate lives.” (Read “losers.”)
A final point about the article: none of the websites cited are legitimate, credible websites, such as those I have listed in the “Recommended Websites” section of this blog. If the Times readers had been directed to any of the sites which I recommend, they would have encountered discussions of gang stalking very much at odds with what they were reading in the Times. The websites mentioned in the article – such as Gang Stalking World (as distinguished from Gangstalkingworld.wordpress.com) are badly-edited and filled with extraneous garbage. Most likely, they are also examples of deliberate disinformation.
You can read the Times article at the link below if you want to see a textbook case of disinformation planted by the government in the mainstream news media – the sort of thing people like Noam Chomsky get marginalized for warning people about. (Incidentally, for more on the way government apologists in the media tend to dismiss people like Chomsky who deviate from political orthodoxies, see my March 23, 2013 entry in the “Police State Amerika News” section of this website.)
If, despite the historical background of Cointelpro, and despite all the other information provided in this website, you conclude that this article is simply an example of journalistic incompetence at the nation’s “Paper of Record,” then I have a bridge to sell you.
Incidentally, by a remarkable coincidence, an article that was virtually identical to the Times piece was published by ABC News one month later (although it makes no reference to the Times piece that preceded it). By remarkable coincidence, the “reporter” at ABC interviewed the same psychiatrist who was interviewed by the Times, Ken Duckworth. Also by remarkable coincidence, the “reporters” in both cases were third-tier shills no one has heard of – rather than, say, Pulitzer Prize-winning investigative journalists.
Also by coincidence, the ABC article – like the Times article – failed to include any reference to the important high-profile credible whistle-blower key witness who supports the claims of gang stalking victims, Ted Gunderson. The ABC News article which involved such an extraordinary number of coincidences also failed to even mention Cointelpro or MK Ultra – or any other actual relevant non-disputed government conspiracies, and focused exclusively on discussions of delusional thinking. If you want to read this ground-breaking, hard-hitting piece of brave investigative journalism by the intrepid Lauren Cox, here is the link.
There is a down-side for gang stalkers to all these efforts at disinformation: they constitute evidence of a conspiracy when viewed in the context of other information – such as I have provided in this website.
A final observation about the two articles cited above:
It’s interesting that those two rare examples of mainstream news media articles about organized stalking both appeared (about the same time) years ago, and then the subject has been off the radar since then.
Since that time, the number of online accounts of gang stalking – such as this website – have only increased, and the number of published articles in the alternative media alleging a re-emergence of Cointelpro (such as those cited in section 4 of this overview) have increased. Yet the New York Times and ABC have not re-visited the issue.
That makes perfect sense as a disinformation strategy. Anyone searching for mainstream news reports on gang stalking will see that – apparently – a couple of major news outlets looked into the phenomenon years ago and found it was all rubbish. Case closed. Further articles – even if they were similarly dismissive – might callattention to the topic in an unhelpful way.
__________________________________________________________
15. The Wall of Silence Which Surrounds Gang Stalking
“The first rule of fight club is you do not talk about fight club.”– from the 1999 film Fight Club
Sometimes people violate the rule and they do mention fight club. In the following case, both the news media and a police lieutenant violated the rule and explicitly mentioned gang stalking in a TV news report.
A local TV news broadcast in California on January 29, 2011 (on KION – Channel 46 and KCBA – Channel 35) featured a report about gang stalking in which the reporters used the term and so did Lieutenant Larry Richard of the Santa Cruz Police Department. (This link is also included in the “Published Articles” section of this overview.)
Instances like the one above are the exception though. Despite its apparent pervasiveness, gang stalking is rarely discussed publicly by the mainstream media – let alone by government officials.
What mainly accounts for that silence is the secrecy and disinformation of the perpetrators, and the use of tactics chosen for their lack of incriminating evidence.
Another factor, presumably, is that those members of the media and civil rights groups who are aware of the crime do not wish to risk being publicly associated with any claims likely to be perceived by casual observers as a paranoid conspiracy theory.
FBI’s silence on gang stalking
America’s agency with primary responsibility for domestic counterintelligence operations, the FBI, is notoriously secretive about its activities. One way that silence is maintained is by the agency’s exemption from the Whistleblower Protection Act. Anyone wishing to expose misconduct at the FBI could face severe legal repercussions.
Probably the main reason Americans are mostly unaware of the prevalence of organized stalking is that there has not been a major exposure by an FBI whistle-blower. Nothing comparable to the revelations by Edward Snowden about the NSA’s domestic spying has occurred at the FBI.
Writing on that subject in January 2014, former State Department Foreign Service Officer Peter Van Buren put it this way:
“…count on one thing: we undoubtedly don’t yet know the worst or most illegal aspects of this era of “intelligence.” After all, while Snowden “liberated” up to 1.7 million National Security Agency documents (many of them not yet looked at, analyzed, or written about), there have been no similar twenty-first-century break-ins at the FBI, the CIA, or other parts of the American intelligence community (or for that matter at the Pentagon and the Department of Homeland Security). Massive and shocking as the NSA revelations have been, the curtain has only been pulled back on a corner of the new Washington world that we, the people, continue to fund, even if we aren’t considered important enough to know anything about it.” [emphasis added]
ACLU’s silence on gang stalking
While it would be understandable for a group like the ACLU to be circumspect for such reasons, the more one learns about organized stalking, the more one realizes how unlikely it is that people in such organizations are unaware of what is happening.
Folks at the ACLU are presumably very familiar with Cointelpro, since it was part of the history of persecution of civil rights leaders and other dissidents. It seems inconceivable that the ACLU is unaware of the allegations that a similar program now exists.
The ACLU receives well-deserved credit for its willingness to represent politically-unpopular positions in court. Still, legal advocacy for a minority cause is a very different thing than challenging a shadowy extra-judicial program whose essential function is to destroy the lives of targeted individuals. Ted Gunderson, the former FBI official who tried – with some success – to expose organized stalking, claimed that his efforts resulted in him becoming a target himself. Members of the ACLU have professional careers and families to consider.
It should be noted that the ACLU has never made any public declarations that organized stalking is not real. Apparently it’s simpler to just avoid the topic completely, and not have to worry about being portrayed as a shill for a conspiracy once it eventually becomes widely exposed. A similar dynamic might be at work in the news media.
Anyone who attempts to contact groups such as the ACLU to inquire about their position on the subject of gang stalking will find that they don’t respond with skepticism; they just don’t respond at all.
As I mention in the “Tactics” page of this website, anyone wishing to gain the attention of the ACLU on the subject of organized stalking should probably meet face-to-face with members of their local ACLU chapter rather than trying to contact the organization’s national office.
Censorship (and self-censorship) of the American news media
To discourage reporting on issues it would rather not see publicly discussed, the U.S. government has aimed two weapons of intimidation at the American news media in recent years: surveillance of communication and prosecution of whistle-blowers.
In May 2013 it was revealed that two months of phone records of the Associated Press were secretly obtained by the Department of Justice, seeking the identities of confidential informants. Famed Watergate reporter Carl Bernstein said he believed the seizure of records was intended “to intimidate people who talk to reporters.”
Following the AP phone records incident, journalists reported that trusted sources were becoming noticably more reluctant to provide information. AP President Gary Pruitt said that sources now “fear that they will be monitored by the government.”
A survey published in November 2013 by PEN American Center – an association of American writers dedicated to protecting free expression – found that many published writers in the U.S. reported that they self-censor on subjects such as military affairs, mass incarceration, drug policies, the Occupy Wall Street movement, and criticism of the U.S. government.
The survey found that 40 percent of the writers polled had either curtailed their social media activities or seriously considered doing so. In addition, 33 percent reported deliberately avoiding certain topics – or at least seriously considered avoiding certain topics – in phone or email conversations. The survey also revealed that 28 percent had refrained – or seriously considered refraining – “from conducting Internet searches or visiting websites on topics that may be considered controversial or suspicious.”
Doing its best to chill criticism of the federal government, the Obama administration has prosecuted more whistle-blowers than all former presidents combined. The Committee to Protect Journalists publishedone of the best articles on this disturbing trend in October 2013 by a former editor of the Washington Post. Some excerpts:
“Six government employees, plus two contractors including Edward Snowden, have been subjects of felony criminal prosecutions since 2009 under the 1917 Espionage Act, accused of leaking classified information to the press—compared with a total of three such prosecutions in all previous U.S. administrations. Still more criminal investigations into leaks are under way.”
“Exposing “waste, fraud and abuse” is considered to be whistle-blowing. But exposing questionable government policies and actions, even if they could be illegal or unconstitutional, is often considered to be leaking that must be stopped and punished. This greatly reduces the potential for the press to help hold the government accountable to citizens.”
Alternative media outlets
Some media programs and websites routinely discuss controversial and esoteric subjects that reside in the grey area of speculation and rumor – for example, the Coast-to-Coast am radio show, and websites such as InfoWars.com, and Snopes.com.
Gang stalking, however, goes conspicuously unmentioned at such places. Try contacting Snopes to ask whether gang stalking is real; they won’t answer – let alone explore the topic on their website. When I last checked the Coast-to-Coast website, the search function yielded numerous results for “Big Foot,” but zero results for Cointelpro or gang stalking. In my experience, they also don’t respond to email inquiries about the topic.
Further reading on self-censorhip and corporate censorhip
Anyone wishing to learn more about the media silence on various “off-limits” topics might want to read Noam Chomsky’s classic,Manufacturing Consent (or watch the documentary by that name on YouTube) and Kristina Borjesson’s Into the Buzzsaw.
_____________________________________________________
16. Shining a Light on the Cockroaches
Gang stalking is conducted in secret because, like its predecessors Cointelpro and MK Ultra, it is illegal and unconstitutional. Stalking – described as such, or as “criminal harassment” or “criminal menace” – is now a crime under the laws of every state in America.
The first state to criminalize stalking was California, in 1990. Within three years, all states had done so. Stalking is illegal because the vast majority of Americans deem it morally reprehensible and an assault on the basic rights and freedoms of the victims.
Gang stalkers know that most people – if they fully understood what gang stalkers were engaged in – would regard them as the human equivalent of cockroaches, so they skulk around and ply their trade in the shadows.
They don’t have to worry about being caught and prosecuted however, because (a) their tactics are inherently difficult to prove legally as discussed above, and (b) their crimes are supported directly and indirectly by people with power and money and government connections.
Even if you assume that some/most/all individuals targeted for gang stalking are in some way “undesirable” and deserving of persecution, you should note that gang stalking is very different from “shaming.” The historical practice of a communities shaming individuals had the imprimatur of the society. If gang stalkers had such a sanction, they wouldn’t have to conduct their activities in secret.
Instead, gang stalking is largely a game played by people who are wealthy and/or well-connected to the police state infrastructure. For their personal vendettas and agendas, they exclusively wield gang stalking as a weapon that is unavailable to most people.
Exposing what is happening is the challenge for victims of gang stalking – or anyone who believes that America should be a constitutional free nation instead of a quasi-police state run by plutocrats and neo-fascist law enforcement and intelligence agents with the help of their various minions, opportunistic parasites, and useful idiots.
The balance of power is completely tipped in favor of the bad guys in the battle between gang stalkers and targeted individuals. Also, cowardice and careerism by politicians and members of the mainstream press make it unlikely that much help will spontaneously emerge from those quarters.
On the other hand, civilian activists successfully exposed the Cointelpro conspiracy, which helped lead to the Senate Church Committee investigations, so there is precedent for eventual victory by the good guys. Mind you, those activists had to break into an FBI office to get the documents which led to that exposure, so a certain amount of courage is required.
A final point: the Internet is a game-changer; it has the potential to expose gang stalking, which will ultimately lead to the program’s demise. As I noted in my essay “Gang Stalking and America’s Police State Government” elsewhere in this website, the digital public square is already filled with information and rhetoric which the government would prefer to censor but cannot, posted by Americans fed-up with the secrecy and abuses of power in the upper echelons of government and corporations.
Please help spread the word.
__________________________________________________________
If you can expose the criminal participation in gang stalking by private intelligence/security firms, lawless federal agencies, and local “community policing” vigilante groups, please do so. America needs more patriots like Edward Snowden, Jeremy Hammond, Barrett Brown, Daniel Ellsberg, and Frank Serpico.
__________________________________________________________
FightGangStalking.comG
No comments:
Post a Comment