Our Story Matters

https://youtu.be/IC0UC42ZiNY

Effects from Remotely Applied Directed Energy and Neurological Weapons

Proof of MIND CONTROL: How it Works - Dr. John Hall talks Heterodyning Brain Wavelengths

Science Channel Admits US Used Microwaves in Mind Control

he Victim Experience Record of Organized Gang Stalking [Case:SUNRISEMAN]

INTRODUCTION TO THE HIDDEN EVIL (ALSO TRANSLATED IN DUTCH/VERTAALD IN HET NEDERLANDS DOOR GOOGLE VERTALEN/TRANSLATE)

Introduction to the Hidden Evil

Now that we understand who runs who runs this planet, it will be easier to see how such a secret policy can exist. It also becomes evident why money is no barrier. The reason of course is that they make the money. The Hidden Evil, is also called Gang Stalking, Cause Stalking, Public Mobbing, an Electronic Concentration Camp, Covert War, Mental Rape, and a variety of other names.(*)

It involves two major components. First, the use of Non-lethal Weapons (NLW), which includes Directed Energy Weapons (DEW). Second, heavily networked groups of plain-clothed citizens who encircle targeted people in public. This network appears to involve volunteers who are part of a state-sponsored Neighborhood Watch program, as well as individuals and groups of informants with no official connection to the state. As I'll demonstrate, mainstream news has indicated that one in twenty-four citizens will be recruited as informants. Some publications contend that the goal is the recruitment of one-third of the population.

Organizations from the federal level downward participate in the harassment, which includes local stores and restaurants. This program is not in the process of being created, it is already here. It is thoroughly embedded in most major communities. It is happening in all NATO countries. The program has been operational in some form since at least the early 80s, when families of people with direct or indirect connections to federal agencies were targeted.

Some people spent a significant about of time designing this program. Influential people have ensured its survival. It is also almost invisible and traceless. Some of the organizations I've found to be likely responsible for the Hidden Evil, contain people that are considered to be our world leaders. On the surface, they appear to be humanitarians.

The pretext for the existence of this program is presumably to identify and track potential threats to national security and to rid communities of undesirables. As I'll demonstrate, citizen informants have been used to stalk and harass people in other countries for the same reasons. Microwave weapons have also been used on dissidents. U.S., German, and Russian intelligence agencies have all used these tactics. The Hidden Evil appears to be a culmination of them, which from what I have learned, has been fine-tuned with the help of Establishment Think Tanks.

Julianne McKinney is a former army intelligence officer and director of the Electronic Surveillance Project Association of National Security Alumni, which was an organization composed of former intelligence officers dedicated to exposing excesses by the U.S. Intelligence services. Her preliminary report, Microwave Harassment and Mind-Control Experimentation published in 1991, is a well-documented outline of these activities.

According to her interview on the Republic Broadcasting Network (RBN), these activities have increased significantly since the report was published. She kept this organization operational for four years using her personal funds. She has about 40 years experience with this subject and has talked with and interviewed hundreds of targeted individuals. I'll be referencing her report and her interview on the RBN throughout this book.

Dr. Reinhard Munzert, scientist, psychologist, and university lecturer has authored three books and over 100 articles. He began investigating this phenomenon with the aid of his students after learning he was targeted. His article, Targeting the Human with Directed Energy Weapons, which was the number one listing on Google for two years, will be referenced, as well as his interview on RBN.

I'll also be referencing the work of Leuren Moret, particularly her interview on Vancouver Co-op Radio CFRO 102.7 FM, on August 8th 2005. She is the former Environmental Commissioner of Berkeley California and the president of Scientists for Indigenous People. She has worked at two US nuclear weapons laboratories as a geoscientist and has contributed to a UN sub-commission investigating depleted uranium. She, Julianne and Dr. Munzert have been on the receiving end of this harassment.

In her article, Uncovering the Truth About Depleted Uranium, Moret speaks of her personalGang Stalking experience, which she refers to it as Mobbing. She writes, "'Mobbing' is the purposeful and strategic institutional gathering of all information about an individual by using any method--legal or illegal. Contact for this purpose is made with neighbors, classmates, former partners, family members, former employers, teachers, church members, good friends and even your family tree..."

She continues, "Everything must be known about the support system around you that makes your life possible." This includes, "[the] assessment of strategic resources and future income (finances, mobility, cars, insurance, credit cards, bank safety deposit boxes, post office boxes, wills, health records, birth certificates, transcripts and photographs) is made without your knowledge. The purpose of mobbing is to drive the target individual out of the job force for the rest of their life; the bigger goal is to drive them to the ultimate self-destruction: suicide. The information gathered ... is used to take your life apart ... and to attempt to make you look crazy." She adds, "Your children are harassed, they come home with belongings missing and stories of teachers harassing them."

The psychological aspect of the group harassment which takes place in public is identical to Mobbing; it has the same group dynamics. For that reason I'll make references to Mobbing throughout this book. The Mobbing phenomenon has been well documented and studied in other countries for years. However, it is only now beginning to receive attention in North America.

Mobbing, also known as "psychological terror" involves the systematic harassment of an individual by a group of individuals in the workplace, and according to the authors of the book Mobbing, also in public. In the workplace, the group is often rallied by an authority such as Human Resources. It includes rumors, setups, and skits intended to humiliate the target and make them appear incompetent.

The documented mainstream exposure that Mobbing has received will help us understand how thousands of people in some major cities can be recruited to systematically attack individuals. The Mobbing I'm referring to is committed by multiple people using subtle but repeated harassment, which takes place in the workplace and is difficult to prove. It is used to kick a person out of the workplace or even workforce while leaving little trace. The logic is that it is less of a liability for the organization if you "voluntarily" leave than if they fire you. In addition, some organizations with sadistic intentions enjoy it as a form of sport harassment as well.

Although it would appear that the Hidden Evil is a new phenomenon, it is not. Tyrannical regimes throughout history have used local groups to neutralize dissent. Group Stalking is simply another manifestation of this pattern. In order to understand how an entire country could be complicit in the persecution of perceived undesirables, a study of German and Russian dictatorships is essential.

Therefore, evidence will be presented which describes how similar programs of persecution were used during these dictatorships, and how the U.S. and other NATO countries are heading in that direction. Finally, we'll draw upon the Milgram experiments, which will illustrate how most ordinary people will repeatedly torture innocent people under the direction of an authority figure.

Persecute "To harass or punish in a manner designed to injure, grieve, or afflict; specifically: to cause to suffer..." -Merriam-Webster's Dictionary

[Footnotes] * These names are taken from a combination of web sites listed in the sources.

 

Tactics (Part 1)

It has been said that when you're first targeted, they hit you hard in multiple directions. Presumably, this is done so you'll collapse after experiencing recurrent emotional violence, which is compounded after you've realized that all normal support structures and avenues of grievance have been removed. There appears to be multiple levels of intensity of this program that people can receive. The two main parts of the program are group stalking and Non-lethal Weapons (NLW). Both are violent attacks. And some are apparently hit hard with both.

People tend to associate the word harassment with acts of temporary aggravation or pestering. Therefore, it may not by the proper word to describe the never-ending acts of covert violence inflicted upon targeted people, which amounts to torture and murder. Some of the tactics used in these programs are borderline-subliminal, which is why they are so difficult to detect, explain, and defend against. It is my goal to make the unconscious, conscious. Many of these tactics are a type of mind-control.

Most of these tactics have been used in former Cointelpro operations by the United States, Russia, and Germany against their civilian population. The Hidden Evil's genesis is obviously derived from known tactics such as bogus investigations, surveillance, smear campaigns, the use of noise, thefts, break-ins, character assassination, staged accidents, framings, sabotage and vandalism, mail interference, blacklisting, citizen informant squads for overt surveillance (Gang Stalking), poisoning and drugging, incarceration into prisons and mental institutions, and electromagnetic weaponry.

It is a historical fact that the U.S. has officially targeted its civilian population on multiple occasions. Programs such as MKULTRA and Cointelpro can't be denied. "The methods reportedly employed in these harassment campaigns," explained McKinney, "bear a striking resemblance to those attributed to the CIA and FBI during Operations MKULTRA, MHCHAOS, and COINTELPRO."

In Germany these methods were contained in two programs, Zersetzung and Directive Perceptions. They were basically German versions of Cointelpro. Zersetzung was developed to destroy a targeted person's inner-self. During an interview on the Republic Broadcasting Network, Dr. Munzert, a German target, drew a parallel between the current program, and what occurred in East Germany. He explains, "In Germany this is called Zersetzung and this means the dissolution or disintegration of the targeted person."

Writer, international lawyer, and filmmaker Anna Funder won the Four Samuel Johnson Prize from the BBC in 2004 for her non-fiction book, Stasiland. In it, she wrote, "The German wordZersetzung is harsh, and has no direct English equivalent." She described, "Zersetzung, as a concept, involves the annihilation of the inner-self." It calls for, "[The] targeted spreading of rumours about particular persons with the aid of anonymous [means] ... making compromising situations for them by creating confusion over the facts ... [and] the engendering of hysterical and depressive behaviors in the target person."

"Directive Perceptions," she continued, was another program designed to "develop apathy (in the [targeted] subject) ... to achieve a situation in which his conflicts, whether of a social, personal, career, health or political kind are irreversible ... to give rise to fears in him ... to develop/create disappointments ... to restrict his talents or capabilities ... to reduce his capacity to act and ... to harness dissentions and contradictions around him..." These directives were used by the Ministry for State Security (MfS) against threats to state security. In other words, they were massively used on the population to maintain a dictatorship.

These programs were designed to secretly destroy a target's personal and professional life, ruin them financially, and prevent them from reaching their potential, with the intention to produce irreversible depressive and panic-stricken behaviors. What the Hidden Evil appears to be, is a combination of various Cointelpro operations used by oppressive regimes on their civilian population. It has been refined and deployed globally. As I'll demonstrate, it is likely an indication of the creation of a worldwide dictatorship.

Hidden in Plain View

Many of us have experience with books where the goal is to find the hidden picture contained in the landscape. Or the artwork, where if you look intently, you will eventually see a three-dimensional picture superimposed on a flat background. At first, most of us had some trouble detecting these hidden pictures, but with practice we usually see them. Once the detection mechanism is developed, these hidden objects become clearly visible with little effort. So too with the Hidden Evil. Once you know what to look for, these borderline-subliminal attacks are quite detectable.(*)

So, rather than using a blunt overt attack against a fully functional person, they usually attack covertly, and conceal their harassment by using existing events that occurs naturally. There is usually cover for the harassment as well. However, it is probably a statistical rarity for some of thesestaged events to occur as often as they do. They conceal much of their harassment using what appears to be a simple formula. From what I've learned, the basic formula is as follows:

Frequency: Describes how often an event occurs. It also pertains to the number of acts within a single event.

Duration: Pertains to the length of a single event. It also pertains to the non-stop nature of the harassment in general.

Intensity: The amplification of acts such as sound, sight, crowding, etc. within an event.

A hypothetical example of a car door-slamming event would include this: One neighbor arrives and two others leave. As they're tending to their vehicles there is the repeated opening and shutting doors and trunks, alarms going off, and beeping from alarms being turned on. These disturbances emanate from areas surrounding your house. This may happen simultaneously, or they may be strung together, one right after the other. Synopsis

The event lasted for 5 minutes; longer than normal (Duration). In addition to length of the event being extended, the number of times each act occurred within the event was increased (Frequency). Ex: Multiple, repeated doors/trunk slamming from cars, even if a single individual is at the vehicle. This event also happens many times throughout the day (Frequency). Each individual act of door/trunk shutting is amplified by deliberate slamming to produce a louder than normal noise (Intensity).

The event was louder, contained more activity (acts), and lasted longer than normal to produce a covert attack. Even if a single individual is arriving/leaving, standard practice seems to be multiple slams (trunk, back door, driver's door). This may be synchronized with your activity, such as your arrival or departure. The event may also be a part of a Noise Campaign consisting of an alteration of other types of noise. This basic formula is used with many of the tactics outlined in this chapter. The frequency and duration formula is also used in Mobbing. In addition to the overuse of an individual tactic, these tactics are combined and used in a round-the-clock fashion, which amplifies their overall potency.

Basic Protocol

There is a basic protocol that they begin with which is consistent in all NATO nations. It begins with the surveillance of targets, monitoring of their private lives, and entry into their homes (break-ins). This is done so their personality traits can be cataloged. "There is a basic protocol that the perpetrators begin with," states McKinney, "but the TI [Targeted Individual] contributes to the modification." After they are singled out for preliminary stages of harassment, Gang Stalking ensues, which McKinney describes as part of a "softening-up process." After a period of overt surveillance (Gang Stalking), NLW are introduced. The NLW harassment gradually increases to extreme conditions. This pattern has unfolded consistently in all NATO countries.

Dr. Munzert speaks of basically the same pattern, which he describes as a "double-folded strategy." "It is usually the same procedure," he announced, "but with individual variations." One part includes the victims being "attacked with microwave weapons," and "the other part of the strategy" he says, is to portray the targeted people as "mad [insane]." He explained the effectiveness of this approach as "unbeatable," and reveals that this is essentially what the Stasi did to their targets. Part of this protocol appears to include elements of Neuro-linguistic Programming (NLP), which is a type of mind-control used by behaviorists to affect change. NLP will be covered in more detail shortly.

Some of the tactics below have been called Street Theatre, Harassment Skits, or Staged Events. They are planned harassment skits, such as blocking, or swarming. They also include informants who surround targets and have conversations intended to be overheard, which contain information about the target's personal life. Presumably, citizen informants are told that this is necessary to let targeted people know they're being watched. This may happen in any public place. This is not a complete list of tactics but it includes some of the more common ones reported.

Some of these tactics will sound insane because they're deliberately designed to make someone appear as though they're suffering from a mental disorder. They were definitely created by experts in the behavioral sciences. In addition, people may be emotionally drained, and unable to properly identify or explain what's happening to them. According to the DOJ, mental tactics designed to cause psychological harm must last for months or years before they constitute torture. The Hidden Evil fits this description. So keep in mind, these are Psychological Warfare tactics which are intended to drive people crazy.

Mental Health System

The mental health system is apparently being used worldwide to discredit targeted people who complain. According to the book, Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas, countries around the world, including the U.S., have used doctors to help abuse and discredit people, often for political reasons. It is also a documented fact that there was collaboration between doctors and the military when experiments were carried out in prisons, hospitals, and universities on unwitting people in North America.

McKinney states that medical doctors, as well as psychiatrist and psychologists appear to be providing cover for this program. This is similar to what was done in Russia, where enemies of the dictatorship would be thrown into mental institutions and drugged beyond recovery. "The APA's refusal to acknowledge the impact of terrorization upon the human psyche, even given the publicity stemming from the Church Committee's findings in 1975, raises serious questions about the validity of psychiatry as a profession in this country," declared McKinney, "not to mention, the APA's ethical intent, in the long term."

The DSM is a diagnostic manual for identifying mental disorders. The first edition of the DSM was released in 1952 at a time when the APA was under the control of Dr. Ewen Cameron, who would commit brutal government-sponsored torture under the MKULTRA program. Dr. Rauni Leena Kilde, former Chief Medical Officer of Finland, wrote an article entitled, Microwave Mind Control: Modern Torture and Control Mechanisms Eliminating Human Rights and Privacy. In it she described "The Psychiatric Diagnostic Statistical Manual (DSM) for mental disorders," as a "brilliant cover up operation in 18 languages to hide the atrocities of military and intelligence agencies' actions towards their targets."

Dr. Kilde says the manual "lists all mind control actions as signs of paranoid schizophrenia," and that "all medical schools teach their students that the person is paranoid, ESPECIALLY if he believes intelligence agencies are behind it all." Finally she proclaims, "Never is the medical profession told that these are routine actions all over the world by intelligence agencies against their targets."

Dr. Munzert said that doctors, "first think of paranoia and schizophrenia" if someone complains of this program. He cautions that because of this, "victims" could end up in a "lunatic asylum." Annie Earle, a Licensed Clinical Social Worker, and Board Certified Diplomat in her area of expertise, has over 25 years of psychotherapy experience as an independent practitioner. When referring to the DSM during an interview on the Republic Broadcasting Network, she stated, "It's called theDiagnostic Statistical Manual ... [and all] psychotherapists, regardless of specialty are required to give their patients a diagnosis from this manual, and in order to get the diagnosis you have to fulfill certain criteria that is clearly spelled out in the DSM."

Earle noticed a pattern unfolding when some of the people who came to her who did not fit the standard criteria. "The patients that started coming to me really did not fit any of the standard classifications," she explained. "For example, they might be having what some people consider a psychotic or schizophrenic breakdown in that they might report what seem to be hallucinations, but they did not have any of the other criteria that goes along with schizophrenia. There are many criteria that one is required to ... [detect] in making the diagnosis of schizophrenia, and these people did not meet all that criteria." Apparently Earle became targeted herself while studying this program.

Interestingly, the April/May 1996 issue of Nexus Magazine contained an article entitled, How The NSA Harasses Thousands Of Law Abiding Americans Daily By The Usage Of Remote Neural Monitoring (RNM) written by former NSA worker John St. Clair Akwei. It read, "NSA DOMINT [Domestic Intelligence] has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health."

The DSM appears to have been created with a loophole which allows government-sponsored harassment programs to exist. This was evidently done so that people will appear ill when explaining this to a mental health professional. Adding to this confusion, the program itself is designed to mimic mental illness when explained to those "not-in-the-know." Mental health professionals may also participate in this program, wittingly or unwittingly by labeling targets as mentally ill. It is one of several layers of protection used to help keep this program operating in secrecy. It's easy to see how some mental health professionals might "jump to conclusions."

Surveillance

Surveillance is apparently part of an ongoing bogus investigation that never ends. The investigation may be done for reasons of "national security." Similarly, German and Russian security forces would often target the civilian population for the same reason. After a person is singled out, dwellings surrounding the target will be sublet and used as bases of operation and training.

If the target lives in a house, the base will usually be the closest building to the house. If the target lives in an apartment, then the base will be in one or more of the surrounding apartments. There will be unusual patterns of occupancy with lots of people coming and going into these bases. Vehicles and license plates used by the occupants of the bases may be periodically changed. According to McKinney and Moret, the people who move into these bases have been linked to the DOJ, CIA, and other federal agencies, as well as Universities, and government defense contractors.

"In order to target someone it requires that that person be put under surveillance," proclaimed McKinney, "so that their personality traits, their capacity to inter-relate with people, their capacity for corruption or non-corruption (that seems to be a critical point), and even their religion factors into it." The information obtained by surveillance is used for no ethical reason, "other than to establish a harassment protocol, which will follow that targeted individual for the rest of his or her life," said McKinney. Moret said that neighbors, friends and family are then co-opted into the harassment.

This surveillance is apparently done using very sophisticated equipment which can locate targeted people through walls. This equipment seems to be used in combination with Directed Energy Weapons and other "Non-lethals." According to McKinney, miniature microphones and cameras may be planted in your home, or through-the-wall infrared devices may be used to monitor your movement. The Life Assessment Detector System (LADS) developed at Georgia Tech was apparently created to rescue people trapped in rubble, avalanches, or other disasters. It has a range of about 135 feet can and can detect heartbeat and respiration. It can also be configured to track a specific person's movement inside a building.

SoldierVision A1, a radar flashlight, has a standoff distance of 30 feet and can detect motion behind a wall at 30 feet as well. These flashlights have been steadily researched using military and university testing labs since the 1990s. Some of these flashlights display images in 3D format, can detect respiration, and can see through, wood, brick, plasterboard, glass and concrete. More than likely, the surveillance technology which is now being used on targets worldwide is much more advanced and not publicly available.

Character Assassination

Targets usually experience character assassination which is done to destroy their personal and professional life. Half-truths and lies are often strategically spread into their lives, and may be the basis for a bogus investigation. The rumors circulated about people are apparently not petty, but shocking and repulsive. They are CIA or Stasi-type life-damaging lies. Some of the people spreading these lies may be acquaintances and/or family members that have been recruited (lied to, intimidated and blackmailed) into becoming informants. More on the recruitment of family and friends will be covered in the Informants and Motivational Factors chapters.

U.S. Federal law enforcement has used these tactics to destroy people they either wanted to recruit as informants or those they knew they couldn't recruit and just wanted to destroy. According to former CIA psychologist James Keehner, "It was planned destructiveness. First, you'd check to see if you could destroy a man's marriage. If you could, then that would be enough to put a lot of stress on that individual, to break him down. Then you might start a rumor campaign against him. Harass him constantly." Constant harassment, planned destructiveness, character assassination, destroying relationships, all done in concert with the goal of breaking someone down are a standard part of this program.

Reportedly, the usual rumors spread about a person are that they are a pedophile, prostitute, terrorist, racist, anti-government, mentally ill, drug addict, drug dealer, or a threat to "national security." They are often spread to neighbors, friends, family, employers, etc. A major effort is spent to separate a person from their friends and families.

Apparently these rumor campaigns aid in recruitment. Dr. Rauni Kilde wrote, "Deception is the name of the game, so recruits are told untrue sinister stories of their victims to keep them motivated." According to CNN, the Stasi used the exact same tactics. They stated, "The agency was authorized to conduct secret smear campaigns against anyone it judged to be a threat..." The Russian KGB too, with its massive network of informants, would slander their internal targets.

These rumors may be propagated by multiple people (informants) behind a target's back. Apparently, not letting a targeted person become aware of these rumors is essential to their effectiveness. Victor Santoro noted in his book, Gaslighting: How to Drive Your Enemies Crazy, that "The essence of defaming your target with rumors is it that it not get back to him."

Some targeted people believe that rumors are being spread that they are pedophiles. The organizers realize that labeling someone a pedophile will be highly damaging and produce optimum leverage for gaining community support. It is probably one of the worst rumors you could launch against someone. The Stasi would destroy the character of their targets by labeling them as pedophiles as well. There have been multiple magazine and newspaper reports of pedophiles being harassed by neighbors, and vigilante groups to the point where they are driven out of communities and forced out of work. Some have been driven out of multiple states.

An article in the Toronto Star entitled, Vigilantes Versus Pedophiles on August 8, 2004 outlined how one citizen's group called, Perverted-Justice, would start campaigns to expose people that they have concluded were potential pedophiles. This illustrates the mind-set of some groups of people who have reason to believe a person is a pedophile. The PJ group is run by Xavier Von Erck (real name Phillip John Eide), at www.perverted-justice.com.

Upon visiting a site called Corrupted-Justice at www.corrupted-justice.com, I discovered that multiple members of Perverted Justice have endured trauma such as incest or other forms of sexual abuse and are suffering from a variety of mental disorders. The Corrupted-Justice site obtained this information from member profiles which are publicly available, and located at the Perverted-Justice website. And according to CJ, Eide is on record saying that more than 40% of his followers have endured this type of sexual abuse.

The CJ site also has some very interesting message board chats (publicly available) by PJ members that are worth a look. Apparently the CJ people have documented proof that members of PJ have hacked into their web server. The CJ people are for the full prosecution of potential sex offenders by using law enforcement equipped with the checks and balances built into the legal system. The CJ group basically says that although the PJ system appears to be beneficial, it is heavily corrupted.

Most PJ "busts" do not include law enforcement. According to the article in the Toronto Star and the CJ website, the volunteers at PJ instead begin a relentless campaign to expose people they believe are pedophiles by calling friends, neighbors, children, places of employment and ruining personal and professional relationships. This is similar to what targeted people experience, as indicated by the behavior of their friends, family and co-workers. But they're never told about it. PJ is listed as a potential destructive cult by the Rick A. Ross Institute for the Study of Destructive Cults, www.Rickross.com.

It appears that some PJ members have a psychological need to feel powerful and meet that need by displaying to the public and their targets how they can destroy a life. I believe that some of these volunteers are ill and have latent sadistic intentions, despite their patriotic motives. Apparently some of them receive a sick type of enjoyment/empowerment by ruining the lives of people, as evident by their chats.

Character assassination is standard. My research leads me to conclude that it is not beyond these people to masquerade as "concerned citizens" and call local officials to register destructive complaints about a targeted person. I'm fairly certain they do this. This type of "community service" can be very damaging, especially when the complaints originate from multiple, seemingly unconnected sources.

Sensitivity Programs (NLP)

Some of the sensitivity tactics used by these groups are borderline-subliminal attacks designed to artificially create phobias. They are apparently based on Neuro-Linguistic Programming (NLP). You can think of NLP as a very powerful tool that can be used to produce rapid, profound change. The parts of NLP that groups use are anchors and triggers.

The goal of a these sensitivity programs appears to be to condition people with damaging emotions which are linked to triggers such as objects, colors, movements, and sounds. Once this is done, a target can be covertly injured openly in public. This may happen with or without the target's conscious awareness. As I'll demonstrate, this is brutally violent.

"There is a basic protocol that the perpetrators begin with, but the TI contributes to the modification," explained McKinney. She described that a "pavalonian conditioning" program, is used to get targeted people to "respond emotionally to a particular trigger." These negative emotions are then "built into the protocol." "It's an ongoing process," declared McKinney. Moret agrees saying, "They will stalk the target for a while ... to condition them," and make them "confused and frightened."

Self-help gurus use these programs to create positive emotional states and anchor them to a movement, a sound or an object. Then the sound, movement, or object becomes the trigger that will invoke the emotion. Although this sounds complex it is pretty simple in practice. It is done by creating a peak emotional state, and then while in that state, you anchor it, that is, do something repeatedly. This effectively anchors the emotional state to whatever was repeatedly done.

"A stimulus which is linked to and triggers a physiological state is called an anchor in NLP," stated O'Connor and Seymour in their book, Introducing NLP. They ask, "How are anchors created?" "First by repetition... Secondly, and much more important, anchors can be set in a single instance if the emotion is strong and the timing is right." This process of creating anchors has also been calledEmotional Transference.

We're unconsciously creating anchors in our environment all the time with people, music, places, and objects. These stalking groups are obviously led by people knowledgeable in the behavioral sciences. The groups are used to create negative emotional states in targeted people, such as fear and anxiety, and anchor them to common objects. This is the deliberate creation of a phobia!

O'Connor and Seymour declare "An external stimulus can trigger a very powerful negative state." "This is the realm of phobias," they warn. This is nothing less than using violence to create an injury and then deliberately irritating it. "Targets are constantly monitored and if a target responds emotionally to a particular trigger, that will be built into the protocol," says McKinney.

Organizations known to have studied NLP include military intelligence agencies, CIA, FBI, and other state bureaus of investigation. According to an article called, Non-Lethality, which appeared in June 1993 issue of Lobster Magazine, in the early 1980s, Dr. John Alexander taught NLP to "selected general officers and Senior Executive Service members" as a "set of techniques to modify behavior patterns." Some of the references used in this article were taken from Dr. Alexander's book, The Warrior's Edge, which was co-authored by Janet Morris, who, according to the article, was a student of the Silva course in advanced mind-control. In the Structure chapter, I'll provide evidence that Dr. Alexander and Janet Morris have contributed to the creation of this program on behalf of the Think Tanks, as part of a political agenda.

In their book, Dr. Alexander and Janet Morris wrote, "In 1983, the NLP training group, along with John Alexander, was engaged to teach these skills to several members of Congress, including Al Gore and Tom Downey, under the auspices of Congressmen Clearing House on the Future, a bipartisan activity established to provide information to congressmen when they request it." He continued, "One organization that played a major role in the dissemination of NLP skills was the U.S. Army Intelligence and Security Command (INSCOM). ... Unlike the rest of the U.S. Army, INSCOM does not differentiate between wartime and peacetime roles."

According to his Bio, available at www.platinumstudios.com, Dr. Alexander has worked at "the highest levels of government," such as "the White House Staff, National Security Council, Members of Congress, Director of Central Intelligence, and senior defense officials." Morris' Bio, available at www.m2tech.us, is similar. Some of the organizations she's worked with include: the White House Office of Science and Technology Policy, Office of the Secretary of Defense, the Marine Corps Warfighting Lab, etc.

"Anchoring," stated Morris and Alexander, "is based on the neurophysiological assumption that patterns of behavior can be installed, then reactivated whenever a similar situation is encountered or created. ... Knowing this, you can intentionally install anchors to return your target to specific emotional states. The first step is [to] create the desired emotional state in the individual."

There has been some concern in the mental health field over the potential misuse of NLP. Unfortunately, like other tools, such as guns, they can be misused in the wrong hands. Andreas and Faulkner warned of the "possible uses and misuses of this technology," in their book, NLP: The New Technology of Achievement. They wrote, "We recognize the incredible power," of NLP and "recommend you exercise caution..." The deliberate infliction of emotional pain is an act of violence. The use of NLP in this manner is similar to a physical attack such as a punch or kick, only it leaves no visible injury.

Here's an example of how groups use NLP to make you aware that you're being stalked:

One morning you're walking out to your car and a man walks in front of you, stares directly at you in a hostile manner while repeatedly clicking his pen the whole time. You feel a little uneasy and say to yourself, "Boy that was weird, what was his problem?"

Then two hours later you're leaving a shopping mall on a day that it was not particularly crowded. As you walk out to your car, an old lady approaches you on foot. As she almost collides with you, she locks her eyes onto you with a hostile demeanor, while clicking a pen the whole time. Then maybe you tell yourself something like this. "There couldn't be a relation between those events, probably just a coincidence. But they both stared at me in such a mean way while hammering their pens..."

Later in the afternoon, you're on your way home. You're at a stoplight and out of the corner of your eye you see a passenger in the car to your left. You hear a slight noise, and glance over. You see a man glaring at you with a grin on his face. His arm is hanging out the window and he is holding a pen, which he is repeatedly clicking. Now imagine that happening for a month. Then a few days later you're on a sidewalk with a friend or family member. A man walks by, doesn't look at either one of you, but clicks his pen a couple of times. You feel anxious and afraid.

You may not even know you've been sensitized. One reason people may not realize that they're targeted or can't remember exactly when it began, is because these groups may slowly and gradually increase the harassment over time. But if you did recognize it as an attack, what would you tell your friend or family member?

This is what happened: The collisions, blatant hostile staring, and foul grin created the negative emotions and anchored them to the pen, which has now become the trigger. That is an example of a sensitivity program. Now imagine yourself being sensitized to multiple objects and sounds, and each of them creating pain each time you see or hear them.

Targets around the world have witnessed this being done with sounds, gestures, cell phones, laptops, pens, cars, watches, clothing, symbols, colors, and other items. This type of attack does require some maintenance and will loose its potency unless it is reinforced. So groups will reinforce these anchors and triggers with an occasional blitz attack from time to time.

The example above is a simple tactic which groups can use to let you know that you're being harassed in public. But there are many other attacks which NLP can be used for. For instance, you have recently experienced an extremely traumatizing event (which may have been facilitated by a faction of this network), such as an accident, death of a family member or pet, or some type of a brutal assault. Those who have you under surveillance know that there is a color, object, or sound that you've linked (anchored) massive pain to. Then shortly afterward, you are stalked by multiple people who carry that object, wear that color, or utter that phrase. This brings to the surface all the emotional pain you suffered during that experience. Imagine this happening again and again, every time you go outside. Now think what it would be like if your family and friends started to participate.

Groups will take an object you've been sensitized to and link it to another object. The idea appears to be to keep expanding the amount of objects you associate fear, anxiety, anger, or shame with. For instance, one of your neighbors has made it clear that they're participating in the harassment. Now, you know they're participating, and they know you know. So they may try to sensitize you to another stimulus such as a car alarm.

Because you've already associated them with massive pain, they can extend their harassment to a sound by turning their car alarm on/off in rapid succession over a short period of time, multiple times throughout the day. After they've done this for a couple of days and you've been sensitized to this sound, they can reduce their use of this specific tactic and just use the occasional maintenance sounds to inflict pain.

Now instead of repeatedly turning it on/off ten times, they only do it two or three times in a row, just to let you know you're being attacked. Even though it's only done a couple times in a row, you know why they're doing it and you may feel anger, fear, anxiety or other negative emotions. You may also feel frustrated at the prospect of trying to explain this harassment to another individual.

Anyone else observing this might think it's a little strange that someone would turn their alarm on/off a few times but they'd probably write it off as an isolated strange incident. But because they have not had your experience with that sound, and are not aware that it is a small part of a much larger harassment program, it would be difficult to explain that those beeps were attacks.

In NLP, the process of copying an emotional state from an existing trigger to a new trigger is calledchaining. O'Connor and Seymour state, "Anchors can be chained so that one leads to another. Each anchor provides a link on the chain and triggers the next one, just as the electrical impulse flows from nerve to nerve in our body."

After a person has been sensitized to a color or object, the article can become a unification symbol for the group, much like a uniform. For instance, after a person has been sensitized to the color red, she is surrounded by people wearing red cloths in public. Furthermore, this is an adaptable uniform because it can be changed in less than five minutes. If a person who realizes that they're being Gang Stalked has been sensitized to red, then the organizers of these groups can simply have them blitzed by a horde of citizens wearing the color blue. The harassment has now been chained to this color. Most likely, these uniforms also help promote group cohesiveness, and may foster feelings of empowerment among stalkers.

Space Invasion (Crowding)

Space invasion includes blocking, cut-offs, and swarming or what some TIs refer to as, crowding. Targets may be encircled by people wearing colors or holding objects that they've been sensitized to. Prolonged crowding can have an extremely negative effect on your mental/emotional health. The people who designed this harassment program were obviously well aware of this. While some cultures may be more immune to crowding than others, even people from parts of the world that have been historically crowded react stressfully to crowding. People who have not been invited into your personal space but deliberately violate it are attacking you.

Body language is more accurate and reliable than verbal communication. Most of this non-verbal communication is unconscious. The study of this language has been called Social Kinesics (the study of body communication). There are two components to this communication: One contains movements, gestures, postures, the other is spatial relationships. The study of communication using distance/space is called Proxemics.

For most North Americans the intimate zone is 0-18 inches and personal space is 1�-4 feet. This type of communication is used to harass a person. For instance, while in stores, restaurants and public places that are not busy, a target will have people invading their personal space. This happens even if there are only two customers in a store. If a targeted person makes a move from one place to another, several people may suddenly appear and jump out in front of him from around corners and isles.

The deliberate space invasion use by these people is designed to look like normal cut-offs and collisions that we all experience from time to time. It can happen with vehicles, on foot, or a combination. This type of space invasion is obviously intended to startle people and make them tense. It can be thought of as a virtual slap. They are used in blind areas such as corners, hallways, restrooms, or intersections where targets have people or cars cutting them off, or almost hitting them in a calculated manner. This happens in stores, buildings and on the street, with people and vehicles.

With some artificially induced cut-offs, the perpetrator is seen at a distance. The target and the perpetrator(s) are heading toward the same focal point which is used to maximize crowding. The point may be a corner, a very small walkway, a thin passageway, or an obstruction on the sidewalk such as a telephone pole or a tree. The informants adjust their timing so that they meet the target at the exact point where there is the least amount of space for all parties to pass, thus maximizing the invasion of the target's space. Apparently the idea is to get the target's attention and make them uncomfortable. When standing in a checkout-line, targets may routinely have group members standing a foot or closer behind them. And rather than wait for a target to leave, they may crowd them as they reach to the side or in front of the target to put their items on the counter.

If a target is outdoors in a populated area, he or she may see a wave of people move in the direction that they're headed in order to swarm them. If a target moves, then stops and waits for a few moments, they may see that the activity will settle back to normal again after the horde passes. This test can be run indoors and outdoors as well. Sometimes the horde may blatantly adjust their timing, or linger for a while until the target begins to move again, then they'll continue. These crowding and blocking tactics amount to an obstacle course that follows people wherever they go.(**)

They will also block targets, both on foot and with vehicles. For instance, as a target leaves a parking lot, a vehicle or person will be in the way, usually for a few moments. These things happen to everyone, once in a while, but for targets, it happens consistently, regardless of the time of day or how busy the area is.

This space invasion happens on days/times that there are normally not many people. It happens in stores while making purchases, restaurants, businesses, where targets have people frequently cutting them off, invading their space, using sensitivity programs, or other harassment tactics. If there is one customer in the store, they will probably be invading the target's space. For instance, a TI is indoors when it is not crowded, but witnesses multiple people who, instead of taking the shortest path to their destination, go double or triple the distance just so they can brush by them or cut them off.

Here is one personal example which took place at a YMCA in Boston, shortly after I realized I was being Gang Stalked. At the time, there were four people, including myself in the weight room. After I was there for a few moments I noticed there was an unusual amount weight banging. It was louder and more repetitive that it normally is.

I've been exercising and going to health clubs for about 15 years and I immediately recognized that these few people were repeatedly going out of their way to make as much noise as possible. I sat down on a bench and started doing dumbbell presses. Two students walked in, stood on either side of the bench I was sitting on and began to do lateral arm raises, blatantly invading my personal space. There was no special equipment that they were using in that area. I noticed one had a shirt on that said something like, "The MOST important part of playing rugby is support."

Anyone who can't wait a few minutes for you to finish and needs to stick their arms in your face is probably doing it on purpose. In addition, the exercise they were doing could have been done anywhere else a gym that was almost empty. It was a dead giveaway. Another student arrived and began lingering in an area to my left. He stared at me for a few seconds and started smirking.

Once he had my attention he turned his back to me so I could see his shirt which read, "CHASE." In smaller letters underneath was the word, "Manhattan." These attacks using symbolism are common reports among people who are targeted. The kid with the CHASE shirt left shortly after, and his total stay was about ten minutes. That episode is an example of noise, crowding, and symbolic attacks.

Noise Campaigns

All targets of the Hidden Evil are familiar with noise campaigns. Basically, targets report experiencing a steady stream of noise consisting of a rotation of various types of disturbances around their homes. This includes door slamming, yelling, car alarms, horns, tires screeching, loud music, engines revving, and frequent construction projects which include an assortment of noise from heavy machinery and tools. Not surprisingly, in his books Future War and Winning the War, Dr. Alexander described using noise as a weapon. In Future War he wrote, "Audible sound, in frequencies from 20 to 20,000 hertz, can be applied to influence behavior, as most people are sensitive to very loud noises."(***)

For instance, if you're targeted, there will be doors slamming for a few moments, several minutes of silence will ensue, then a motorcycle will drive by and rev its engine outside of your house. After that you'll have someone mowing the lawn. Then there will be alarms going off. After that you'll hear a loud crowd of people walk by your house. Then you may then hear fire or ambulance sirens. Then there will be hammering and sawing sounds from the ongoing construction projects. Then you'll hear car alarms being turned on/off in succession multiple times from multiple vehicles around your house. There will generally not be a solid five minutes of uninterrupted peace.

Moret spoke of the use of "noise campaigns" which included the frequent use of garbage disposals in surrounding apartments, vehicles with "blaring horns" and the sirens of fire trucks. She also spoke of habitual door slamming, proclaiming, "they'll slam doors all day and all night long." "Door slamming," agreed McKinney, "is also a popular pastime, particularly in apartment settings." Those targeted may experience a "chain reaction" of door slamming by apartments or houses surrounding theirs. Other types of disturbances include frequent noise from lawn mowers, snow blowers, vehicles with loud exhaust systems, and ambulance sirens, etc. Noisy construction projects will usually be ongoing.

"Blaring horns, sirens, [and] garbage disposal[s]" which are "run concurrently in apartment settings, for excessively prolonged periods of time," are common reports wrote McKinney. She also noted that targets experience frequent "amplified transmissions" of "general racket" which is "used on a recurrent basis under circumstances intended to persuade the individual that he or she is under surveillance." She added, "In all of these cases, the individuals' neighbors apparently pretend to be oblivious and/or indifferent to these sudden, continuous explosions of noise." They're oblivious to the noise because they're complicit in the program.

Also, the people above a targeted individual may loudly pace as they mimic his or her movements from above. For instance, if you're targeted, as you walk into your bathroom, you hear loud stomping from above which follows you into the bathroom. McKinney affirmed, "A number of individuals report that occupants of upstairs and downstairs apartments appear to follow them from room to room, tapping on the floor or engaging in other activities which appear intended to advertise an ongoing surveillance." They'll "pace in their apartment," added Moret, and seemingly to the target underneath them, "it sounds like they're being tracked ... from the apartment above."

If you're targeted, helicopters and small propeller planes may frequently pass over your home. Some of these aircrafts may be low enough to vibrate the room you're in. According to Cheryl Welsh's March, 2003 article entitled, List of Mind Control Symptoms, the use of helicopters is a common tactic reported by targets. Apparently these overhead assaults are used for sleep disruption and to undermine the morale of targeted people.

Welsh is one of only six Non-lethal Weapons experts in the world recognized by the United Nations. This noise may follow you to destinations you frequently visit. Foot and vehicular traffic may be re-routed through your street, causing an unnatural amount of vehicles driving by your house (even if you're on a side or dead-end street). There also appears to be a fleet of vehicles equipped with loud mufflers that groups use specifically for creating noise in the targeted area.

Often, noise will be synchronized with some type of activity. For instance, a target hears an ambulance, fire sirens, alarms, or beeps as they leave. Or as they leave, a small aircraft passes overhead, then as they approach their car, they hear alarms or doors slamming. Noises made as they leave also appear to serve as a form of communication to alert group members in the area to begin pursuit. In addition to the standard noise package, whatever noise would naturally occur in the area you live will also be increased in frequency. For instance, if a target lives in a rural area then noisy chainsaws will be quite regular. And in the winter there may be frequent loud snowmobiles that pass near the area.

In this manner, noise is used as a weapon to inflict pain. Chronic exposure to even low-level noise is considered a health hazard that has been known to produce adverse physiological & psychological health effects. Prolonged exposure to noise can produce high blood pressure, a rise in cholesterol, damage to the circulatory, cardiovascular, gastrointestinal, & musculoskeletal systems. If you're targeted & pregnant or plan on having a baby, you may want to think twice. Noise has been known to cause hearing loss & growth disturbances in a fetus, & can lead to birth defects.

Prolonged stress in general has been known to cause miscarriages, and some who have been stalked and harassed over a period of time have attributed their miscarriages to ongoing harassment. Just as the fabricated cut-offs are likened to getting slapped, these noises are the equivalent of being repeatedly shocked. The creators of this program are obviously aware that these noise campaigns are acts of violence.

Synchronization

Groups will try to synchronize their tactics with things that targets do such as entering or leaving their homes. The target's movements will be synchronized with vehicles or people coming or going, or other movements. These synchronization tactics are often done several times, perhaps three or more. For instance, when the target arrives, two cars will drive down their street, while their next-door neighbor leaves.

If a target has a habit of going to the bathroom at 2 AM and looking out his bathroom window at a specific area, then they will eventually arrange it so that there is some activity such as a light being switched on or someone leaving or arriving in that area. This is an example of the level of detail that they will resort to when tailoring a harassment protocol to the profile of a target.

Synchronization is also used with sensitivity tactics and noise. For instance, if you're targeted, you'll hear ambulance or fire truck sirens the moment you enter or leave your house. Or car alarms, hammering or some other type of noise will occur as you look out the window. As you leave your home, you may notice people walking by, wearing a color or holding an object that you've been sensitized to. If you pull into a parking lot, there will usually be cars arriving or leaving. Synchronization is also used with blocking/crowding. For instance, as you approach a store's entrance, people will be either walking in or leaving. They will often be wearing a color or holding an object that you have been sensitized to.

A variation of this is echoing and mirroring. Like other forms of non-verbal communication, echoing and mirroring are very powerful, (but usually unconscious) ways of interrelating. This form of information exchange has been outlined in the book, Secrets of Sexual Body Language: Understanding Non-Verbal Communication, by Martin Lloyed-Elliot. Most of us speak this language without even knowing it to attract others.

However, this form of communication has evidently been incorporated into this program as a tool to annoy targets. With echoing for instance, if a target is in a restaurant, or on public transportation, and they drink then an informant next to them will drink. If they pull out a cell phone, then the informant will produce a cell pone or similar device. When the target puts it away, so do they. In essence, they will mimic the movements of a target.

With mirroring for example, targets may frequently have a person or group of people walking parallel to them, in the same direction on the other side of a street, or any public area. Also, there may be someone directly in front of the target, and approaching the same intersection that they're approaching. The informants adjust their timing so they approach at the same time, and cross the street just as the target does, at which point crowding may occur. The informant(s) may also be wearing red, holding cell a phone or another device, which the target has been sensitized to. Dr. Alexander and Janet Morris also spoke of the use of mirroring to influence people, in their book,The Warrior's Edge.

 

VERTAALD:


25 maart 2015 OM 22:29



Inleiding tot de Hidden Evil

Nu we begrijpen wie loopt wie deze planeet draait, zal het gemakkelijker zijn om te zien hoe zo'n geheim beleid kan bestaan. Het wordt ook duidelijk waarom geld is geen belemmering. De reden is natuurlijk dat ze het geld. The Hidden Evil, wordt ook wel Gang Stalking, Cause Stalking, Openbare Mobbing, een Electronic Concentration Camp, Covert Oorlog, Mental verkrachting, en een verscheidenheid van andere namen. (*)

Het bestaat uit twee belangrijke componenten. Ten eerste, het gebruik van niet-dodelijke wapens (NLW), die Directed Energy Weapons (DEW) omvat. Ten tweede, zwaar genetwerkte groepen van plain-geklede burgers die gerichte mensen omsingelen in het openbaar. Dit netwerk lijkt vrijwilligers die deel uitmaken van een door de staat gesteunde Neighborhood Watch-programma, maar ook als individuen en groepen van informanten te betrekken zonder officiële aansluiting aan de staat. Zoals ik zal laten zien, is mainstream nieuws aangegeven dat een op de vierentwintig burgers zullen worden aangeworven als informanten. Sommige publicaties beweren dat het doel is de aanwerving van een derde van de bevolking.

Organisaties van het federale niveau naar beneden deelnemen aan de pesterijen, die de lokale winkels en restaurants omvat. Dit programma is niet in het proces van wordt gemaakt, is het al hier. Het is goed ingebed in de meeste grote gemeenschappen. Het gebeurt in alle NAVO-landen. Het programma heeft ten minste sinds de vroege jaren '80, toen families van mensen met een directe of indirecte verbinding met de federale agentschappen werden gericht operationeel in een bepaalde vorm.

Sommige mensen bracht een significant over de tijd het ontwerpen van dit programma. Invloedrijke mensen hebben haar voortbestaan ​​verzekerd. Het is ook bijna onzichtbaar en spoorloos. Sommige van de organisaties die ik heb gevonden waarschijnlijk verantwoordelijk voor de Hidden Evil te zijn, bevatten de mensen die worden beschouwd als onze wereldleiders zijn. Op het eerste gezicht lijken ze hulpverleners zijn.

Het voorwendsel voor het bestaan ​​van dit programma is vermoedelijk te identificeren en te volgen potentiële bedreigingen voor de nationale veiligheid en de gemeenschappen van ongewenste personen te bevrijden. Zoals ik zal laten zien, zijn burger informanten gebruikt om stalken en lastigvallen mensen in andere landen om dezelfde redenen. Magnetron wapens zijn ook gebruikt op dissidenten. Amerikaanse, Duitse en Russische inlichtingendiensten hebben al gebruik gemaakt van deze tactiek. The Hidden Evil lijkt een hoogtepunt van hen, die van wat ik heb geleerd, is verfijnd met de hulp van vestiging Think Tanks zijn.

Julianne McKinney is een voormalig leger intelligence officer en directeur van het elektronisch toezicht Project Association of National Security Alumni, die een organisatie bestaande uit voormalige inlichtingenofficieren zich toelegt op het blootstellen van excessen door de Amerikaanse inlichtingendiensten was. Haar voorlopig rapport, Magnetron Intimidatie en Mind-Control experimenten gepubliceerd in 1991, is een goed gedocumenteerd overzicht van deze activiteiten.

Volgens haar interview op de Republic Broadcasting Network (RBN), zijn deze activiteiten aanzienlijk toegenomen sinds het rapport werd gepubliceerd. Ze bleef deze organisatie operationeel voor vier jaar met behulp van haar persoonlijke middelen. Ze heeft ongeveer 40 jaar ervaring met dit onderwerp en heeft gesproken met en interviewde honderden gerichte individuen. Ik zal verwijzen naar haar verslag en haar interview op de RBN in dit boek.

Dr. Reinhard Munzert, wetenschapper, psycholoog en universitair docent heeft drie boeken en meer dan 100 artikelen geschreven. Hij begon het onderzoek naar dit fenomeen met de hulp van zijn leerlingen na het leren dat hij was gericht. Zijn artikel, Gericht op de mens met Directed Energy wapens, die de nummer een bedrijf op Google werd voor twee jaar, zal worden verwezen, evenals zijn interview op RBN.

Ik zal ook te verwijzen naar het werk van Leuren Moret, in het bijzonder haar interview op Vancouver Co-op Radio CFRO 102.7 FM, op ​​8 augustus 2005. Ze is de voormalige milieu-commissaris van Berkeley Californië en de president van de wetenschappers voor inheemse volkeren. Ze heeft gewerkt bij twee Amerikaanse kernwapens laboratoria als een geoscientist en heeft bijgedragen aan een VN-subcommissie onderzoek naar verarmd uranium. Zij, Julianne en Dr. Munzert hebben op het ontvangende einde van deze pesterijen.

In haar artikel, het blootleggen van de waarheid over verarmd uranium, Moret spreekt haar personalGang Stalking ervaring, die ze noemt het Mobbing. Ze schrijft: " 'Mobbing' is de doelgerichte en strategische institutionele verzamelen van alle informatie over een persoon met behulp van een methode -. Legaal of illegaal Contact voor dit doel is gemaakt met de buren, klasgenoten, ex-partners, familieleden, voormalige werkgevers, leraren, kerkleden, goede vrienden en zelfs uw stamboom ... "

Ze vervolgt: "Alles moet bekend zijn over de steunregeling om je heen, dat maakt je leven mogelijk te maken." Dit omvat, "[het] evaluatie van de strategische middelen en toekomstige inkomsten (financiën, mobiliteit, auto's, verzekeringen, credit cards, veiligheid bankdeposito dozen, postbussen, testamenten, medische dossiers, geboorteakten, afschriften en foto's) is gemaakt zonder . je kennis het doel van mobbing is om de doelstelling individuele uit het werk van kracht voor de rest van hun leven te rijden, hoe groter doel is om hen te rijden naar de uiteindelijke zelfvernietiging: zelfmoord de verzamelde informatie ... wordt gebruikt om. neem je leven uit elkaar ... en om te proberen om je gek te kijken. " Ze voegt eraan toe: "Uw kinderen worden lastiggevallen, ze thuis komen met spullen vermist en verhalen van leraren hen lastig te vallen. '

Het psychologische aspect van de groep intimidatie die in het openbaar plaatsvindt is identiek aan Mobbing; het heeft dezelfde groepsdynamiek. Om die reden zal ik referenties om Mobbing in dit boek. Mobbing fenomeen is goed gedocumenteerd en onderzocht in andere landen al jaren. Het is echter nu pas aandacht gekregen in Noord-Amerika.

Mobbing, ook bekend als "psychologische terreur 'heeft betrekking op de systematische intimidatie van een persoon door een groep mensen op de werkvloer, en volgens de auteurs van het boek Mobbing, ook in het openbaar. In de werkplaats wordt de groep vaak rally door een instantie, zoals Human Resources. Het omvat geruchten, opstellingen, en sketches bedoeld om de doelgroep te vernederen en ze te laten verschijnen incompetent.

De gedocumenteerde mainstream blootstelling die Mobbing heeft ontvangen, zal ons helpen begrijpen hoe duizenden mensen in een aantal grote steden kan worden aangeworven om systematisch te vallen individuen. Mobbing Ik verwijs naar is gepleegd door meerdere mensen met behulp van subtiele maar herhaalde pesterijen, die plaatsvindt op de werkplek en is moeilijk te bewijzen. Het wordt gebruikt om een ​​persoon uit te schoppen van de werkplek of zelfs personeelsbestand terwijl weinig sporen. De logica is dat het minder van een verplichting voor de organisatie als u "vrijwillig" te verlaten dan wanneer ze schieten je. Bovendien hebben sommige organisaties met een sadistische bedoelingen geniet ervan als een vorm van sport intimidatie ook.

Hoewel het lijkt erop dat de Hidden Evil is een nieuw fenomeen is, is het niet. Tirannieke regimes door de geschiedenis heen hebben lokale groepen gebruikt om afwijkende meningen te neutraliseren. Groep Stalking is gewoon een andere manifestatie van dit patroon. Om te begrijpen hoe een heel land medeplichtig aan de vervolging van vermeende ongewenste kon zijn, een studie van de Duitse en Russische dictaturen is essentieel.

Daarom zal het bewijs worden gepresenteerd waarin wordt beschreven hoe soortgelijke programma's van de vervolging werden gebruikt tijdens deze dictaturen, en hoe de VS en andere NAVO-landen in die richting. Tot slot zullen we een beroep doen op de Milgram experimenten, die illustreren hoe de meeste gewone mensen herhaaldelijk onschuldige mensen zullen martelen onder leiding van een autoriteit figuur.

Vervolgen "lastig te vallen of te straffen op een manier ontwikkeld om te verwonden, treuren, of teisteren; specifiek: om te veroorzaken om te lijden ..." -Merriam-Webster's Dictionary

[Voetnoten] * Deze namen zijn afkomstig uit een combinatie van web in de bronnen genoemde sites.

 

Tactics (Part 1)

Er is gezegd dat als je voor het eerst bent doelgericht, ze raken je hard in meerdere richtingen. Vermoedelijk gebeurt dit dus je zult instorten na het ervaren van terugkerende emotioneel geweld, die wordt bemoeilijkt nadat je hebt gerealiseerd dat alle normale ondersteunende structuren en lanen van wrok zijn verwijderd. Er blijkt verschillende intensiteitsniveaus van het programma dat mensen kunnen krijgen. De twee belangrijkste onderdelen van het programma zijn groep stalking en niet-dodelijke wapens (NLW). Beide zijn gewelddadige aanvallen. En sommigen blijkbaar hard geraakt met beide.

Mensen hebben de neiging te associëren het woord intimidatie met daden van tijdelijke verergering of pestering. Daarom kan het niet door de juiste woord om de nooit eindigende daden van geheime geweld toegebracht aan gerichte mensen, wat neerkomt op marteling en moord te beschrijven. Sommige van de tactieken die gebruikt worden in deze programma's zijn borderline-subliminale, dat is waarom ze zo moeilijk op te sporen, uit te leggen en te verdedigen tegen. Het is mijn doel om het onbewuste bewust te maken. Veel van deze tactieken zijn een soort mind-control.

De meeste van deze tactieken zijn gebruikt in het voormalige Cointelpro operaties van de Verenigde Staten, Rusland en Duitsland tegen de burgerbevolking. The Hidden Evil's ontstaansgeschiedenis is uiteraard afgeleid van bekende tactieken zoals valse onderzoek, bewaking, lastercampagnes, het gebruik van geluid, diefstal, inbraak, karaktermoord, geënsceneerd ongevallen, kadreringen, sabotage en vandalisme, post interferentie, zwarte lijst, burger informant squads voor openlijke surveillance (Gang Stalking), vergiftiging en drogeren, opsluiting in gevangenissen en psychiatrische inrichtingen, en elektromagnetische wapens.

Het is een historisch feit dat de VS officieel haar burgerbevolking is gericht op meerdere gelegenheden. Programma's zoals MKULTRA en Cointelpro kan niet worden ontkend. "De naar verluidt gebruikt in deze intimidatie campagnes methoden", aldus McKinney, "voorzien van een opvallende gelijkenis met die toegeschreven aan de CIA en FBI tijdens Operations MKULTRA, MHCHAOS en COINTELPRO."

In Duitsland werden deze methoden zoals vervat in twee programma's, Zersetzung en Richtlijn Perceptions. Ze waren in principe Duitse versie van Cointelpro. Zersetzung is ontwikkeld om een ​​gerichte iemands innerlijke zelf te vernietigen. Tijdens een interview op de Republic Broadcasting Network, Dr. Munzert, een Duitse doel, trok een parallel tussen het huidige programma, en wat er gebeurde in Oost-Duitsland. Hij legt uit: "In Duitsland wordt dit Zersetzung geroepen en dit betekent dat de ontbinding of uiteenvallen van de gerichte persoon."

Schrijver, internationaal jurist, en filmmaker Anna Funder won de vier Samuel Johnson Prize van de BBC in 2004 voor haar non-fictie boek, Stasiland. Daarin schreef ze: "De Duitse wordZersetzung is hard, en heeft geen directe Engels equivalent." Ze beschreef, "Zersetzung, als een concept, heeft betrekking op de vernietiging van het innerlijke zelf. ' Het roept op tot "[De] gerichte verspreiding van geruchten over bepaalde personen met behulp van anonieme [betekent] ... het maken van compromitterende situaties voor hen door het creëren van verwarring over de feiten ... [en] het het veroorzaken van hysterische en depressieve gedrag in de doelpersoon. "

"Richtlijn Perceptions," vervolgde ze, was een ander programma dat is ontworpen om "te ontwikkelen apathie (in de [beoogde] onderwerp) ... te komen tot een situatie waarin zijn conflicten, of van een sociale, persoonlijke, carrière, gezondheid of politieke aard zijn onomkeerbaar ... aanleiding geven tot angst in hem ... om te ontwikkelen / creëren teleurstellingen ... zijn talenten of vermogens beperken geven ... om zijn vermogen om te handelen te verminderen en ... om onenigheden en tegenstrijdigheden te benutten om hem heen .. . "Deze richtlijnen werden gebruikt door de Stasi (MfS) tegen bedreigingen van de staatsveiligheid. Met andere woorden, werden ze massaal gebruikt op de populatie als dictatuur handhaven.

Deze programma's zijn ontworpen om in het geheim te vernietigen persoonlijke en professionele leven van een doelwit, ruïneren hen financieel, en voorkomen dat ze het bereiken van hun potentieel, met de bedoeling om onomkeerbare depressieve en paniekerige gedrag te produceren. What the Hidden Evil lijkt te zijn, is een combinatie van verschillende Cointelpro operaties gebruikt door onderdrukkende regimes op hun burgerbevolking. Het is verfijnd en wereldwijd ingezet. Zoals ik zal laten zien, is het waarschijnlijk een indicatie van de oprichting van een wereldwijde dictatuur.

Verborgen in Plain View

Velen van ons hebben ervaring met boeken waar het doel is om de verborgen beeld in het landschap te vinden. Of het kunstwerk, waar als je kijkt aandachtig, zul je uiteindelijk een drie-dimensionaal beeld bovenop een vlakke achtergrond te zien. In eerste instantie, de meesten van ons had wat moeite het opsporen van deze verborgen foto's, maar met de praktijk we ze meestal zien. Zodra de detectie mechanisme is ontwikkeld, deze verborgen voorwerpen duidelijk zichtbaar met weinig inspanning. Zo ook met de Hidden Evil. Als je eenmaal weet wat te zoeken, deze borderline-subliminale aanvallen zijn vrij waarneembaar. (*)

Dus, in plaats van met een stomp openlijke aanval tegen een volledig functionele persoon, zijn ze meestal aanvallen heimelijk, en verbergen hun pesterijen door gebruik te maken van bestaande evenementen die van nature voorkomt. Er wordt meestal dekking voor de pesterijen ook. Het is echter waarschijnlijk een statistische zeldzaamheid voor sommige thesestaged op gebeurtenissen zo vaak als zij. Ze verhullen veel van hun pesterijen met behulp van wat lijkt op een eenvoudige formule zijn. Van wat ik heb geleerd, de basisformule is als volgt:

Frequentie: Beschrijft hoe vaak een gebeurtenis plaatsvindt. Het gaat ook om de teksten in een enkele gebeurtenis.

Looptijd: heeft betrekking op de lengte van een enkele gebeurtenis. Het gaat ook om de non-stop karakter van de kwelling in het algemeen.

Intensiteit: De versterking van de handelingen, zoals geluid, gezicht, verdringing, etc. binnen een evenement.

Een hypothetisch voorbeeld van een autodeur dichtslaan-event zou dit onder meer: ​​Een buurman komt en twee anderen vertrekken. Als ze de neiging om hun voertuigen is er het herhaaldelijk openen en sluiten van deuren en boomstammen, alarm afgaan en piepen van alarmen wordt ingeschakeld. Deze storingen afkomstig uit gebieden rondom uw huis. Deze kan gelijktijdig gebeuren, of ze kunnen achter elkaar worden geplaatst, direct na de andere. Synopsis

Indien duurde 5 minuten; langer dan normaal (duur). Naast lengte van de gebeurtenis die wordt verlengd, het aantal keren dat elke handeling plaatsgevonden in geval verhoogd (Frequency). Ex: meerdere, herhaalde deuren / trunk dichtslaan van auto's, zelfs als een individu het voertuig. Dit evenement gebeurt ook vele malen gedurende de dag (Frequency). Elk afzonderlijk besluit van de deur / trunk sluiting is versterkt door de opzettelijke slamming tot een harder dan normaal lawaai (Intensity) te produceren.

Het evenement was luider, bevatte meer activiteit (handelingen), en duurde langer dan normaal om een ​​geheime aanval te produceren. Zelfs als een enkel individu wordt aankomen / vertrekken, standaardpraktijk lijkt meerdere slams (romp, achterdeur, bestuurdersportier) zijn. Dit kan worden gesynchroniseerd met uw activiteit, zoals uw aankomst of vertrek. De gebeurtenis kan ook een deel van een Noise campagne bestaat uit een wijziging van andere soorten ruis. Deze fundamentele formule wordt gebruikt met veel van de in dit hoofdstuk tactiek. De frequentie en duur formule wordt ook gebruikt in Mobbing. Naast het overmatig gebruik van een tactiek worden deze tactieken gecombineerd en gebruikt in een rond-de-klok mode, die hun totale sterkte versterkt.

Basis Protocol

Er is een eenvoudig protocol dat zij beginnen die consistent in alle NATO landen. Het begint met de bewaking van de doelstellingen, monitoring van hun privé-leven, en de toegang tot hun huis (inbraak). Dit wordt gedaan zodat hun persoonlijkheidskenmerken kunnen worden gecatalogiseerd. "Er is een fundamentele protocol dat de daders te beginnen", zegt McKinney, "maar de TI [Gerichte Individual] draagt ​​bij aan de wijziging." Nadat ze zijn uitgekozen voor voorstadia van intimidatie, Gang Stalking ontstaat, die McKinney omschrijft als onderdeel van een "verzachtende-up proces." Na een periode van openlijke surveillance (Gang Stalking), worden NLW geïntroduceerd. De NLW intimidatie geleidelijk toeneemt tot extreme omstandigheden. Dit patroon is consistent ontvouwd in alle NAVO-landen.

Dr. Munzert spreekt in principe hetzelfde patroon, dat hij omschrijft als een 'dubbel gevouwen strategie. " "Het is meestal dezelfde procedure, 'kondigde hij aan," maar met individuele variaties. " Een deel omvat de slachtoffers worden "aangevallen met magnetron wapens," en "het andere deel van de strategie", zegt hij, is om de beoogde mensen af ​​te schilderen als "gek [gek]." Hij legde de effectiviteit van deze aanpak als "onverslaanbaar", en laat zien dat dit is in wezen wat de Stasi deden om hun doelstellingen. Een deel van dit protocol lijkt om elementen van Neuro-Linguïstisch Programmeren (NLP), dat is een soort van mind-control gebruikt door behaviorists om verandering te beïnvloeden omvatten. NLP zal worden besproken in meer detail binnenkort.

Sommige van de tactieken die hieronder zijn genoemd Street Theatre, Intimidatie Skits of Geënsceneerde Events. Ze zijn gepland intimidatie skits, zoals het blokkeren of zwermen. Ze omvatten ook informanten die doelen omringen en hebben gesprekken bedoeld om te worden gehoord, die informatie over het persoonlijke leven van het doel bevatten. Vermoedelijk worden burger informanten horen dat dit noodzakelijk is om te laten gerichte mensen die weten dat ze in de gaten gehouden. Dit kan gebeuren in een openbare plaats. Dit is niet een volledige lijst van de tactiek, maar het bevat enkele van de meest voorkomende zijn gemeld.

Sommige van deze tactiek zal klinken krankzinnig, omdat ze met opzet zijn ontworpen om iemand lijkt alsof ze lijdt aan een psychische stoornis. Ze waren zeker gemaakt door deskundigen in de gedragswetenschappen. Daarnaast kunnen mensen emotioneel worden afgevoerd, en niet in staat om goed te identificeren of uit te leggen wat er met hen gebeurt. Volgens de DOJ, mentale tactiek ontworpen om psychische schade veroorzaken moeten duren maanden of jaren voordat ze marteling vormen. The Hidden Evil past deze beschrijving. Dus hou in het achterhoofd, deze zijn Psychological Warfare tactiek die bedoeld zijn om mensen gek.

Mental Health System

De geestelijke gezondheidszorg is blijkbaar wordt wereldwijd gebruikt om gerichte mensen die klagen diskrediet te brengen. Volgens het boek, Journey Into Madness: The True Story van geheime CIA-Mind Control en Medical misbruik, door Gordon Thomas, landen over de hele wereld, waaronder de Verenigde Staten, gebruik hebben gemaakt van de artsen om misbruik te helpen en in diskrediet te brengen mensen vaak om politieke redenen. Het is ook een gedocumenteerd feit dat er samenwerking tussen artsen en de militairen bij experimenten in gevangenissen, ziekenhuizen werden uitgevoerd, en universiteiten op onwetende mensen in Noord-Amerika.

McKinney stelt dat artsen, evenals psychiater en psychologen lijken te verstrekken dekking voor dit programma. Dit is vergelijkbaar met wat werd gedaan in Rusland, waar de vijanden van de dictatuur in mentale instellingen zouden worden gegooid en gedrogeerd onherstelbaar. "De weigering van de APA om de impact van terreur op de menselijke psyche te erkennen, zelfs gezien de publiciteit als gevolg van de bevindingen van de kerk commissie in 1975, doet ernstige vragen rijzen over de geldigheid van de psychiatrie als een beroep in dit land", verklaarde McKinney, "niet te noemen, ethische bedoeling van de APA's, op de lange termijn. "

De DSM is een diagnostisch handboek voor het identificeren van psychische stoornissen. De eerste editie van de DSM werd uitgebracht in 1952 op een moment dat de APA was onder de controle van Dr. Ewen Cameron, die brutaal door de overheid gesponsorde martelingen zouden begaan onder het MKULTRA programma. Dr. Rauni Leena Kilde, voormalig Chief Medical Officer van Finland, schreef een artikel getiteld, Microwave Mind Control: Modern Torture en controlemechanismen wegwerken van de mensenrechten en de persoonlijke levenssfeer. Daarin beschreef ze "The Psychiatric Diagnostic Statistical Manual (DSM) voor psychische stoornissen," als een "briljante cover-up operatie in 18 talen om de wreedheden van de acties leger en de inlichtingendiensten 'in de richting van hun doelstellingen te verbergen."

Dr. Kilde zegt het handboek "somt alle mind control handelingen als tekenen van paranoïde schizofrenie," en dat "alle medische scholen onderwijzen hun studenten dat de persoon is paranoïde, vooral als hij gelooft dat inlichtingendiensten achter dit alles." Tenslotte verkondigt ze: 'Nooit is de medische beroepsgroep te horen dat dit routine acties over de hele wereld door de inlichtingendiensten tegen hun doelstellingen. "

Dr. Munzert zei dat de artsen, "eerst denken aan paranoia en schizofrenie" als iemand klaagt over dit programma. Hij waarschuwt dat hierdoor "slachtoffers" kan eindigen in een "psychiatrische inrichting." Annie Earle, een licentie Clinical Social Worker, en Board Certified Diplomat in haar vakgebied, heeft meer dan 25 jaar psychotherapie ervaring als een onafhankelijke arts. Wanneer wordt verwezen naar de DSM tijdens een interview op de Republic Broadcasting Network, zei ze, "Het heet theDiagnostic Statistical Manual ... [en allen] psychotherapeuten, ongeacht de specialiteit zijn verplicht om hun patiënten een diagnose van deze handleiding te geven, en met het oog om de diagnose moet je aan bepaalde criteria die duidelijk wordt gespeld in de DSM te vervullen krijgen. "

Earle merkte een patroon ontvouwen toen een aantal van de mensen die naar haar kwam die niet passen bij de standaard criteria. "De patiënten die begon te komen naar me echt niet een van de standaard indelingen te passen," legde ze uit. "Bijvoorbeeld, kunnen ze worden met wat sommige mensen beschouwen een psychotisch of schizofreen storing in dat ze misschien vertellen wat lijken te hallucinaties zijn, maar dat ze geen enkele van de andere criteria die gepaard gaat met schizofrenie hebben. Er zijn veel criteria die men moet ... [detectie] in stellen van de diagnose van schizofrenie, en deze mensen niet aan al die criteria. " Blijkbaar Earle werd gericht zichzelf terwijl het bestuderen van dit programma.

Interessant is dat de april / mei 1996 nummer van Nexus Magazine bevatte een artikel getiteld, hoe de NSA lastigvalt Duizenden Law Abiding Amerikanen Daily Door het gebruik van Remote Neural Monitoring (RNM) geschreven door voormalig NSA werknemer John St. Clair Akwei. Er stond: "NSA DOMINT [Huishoudelijke Intelligence] heeft de mogelijkheid om heimelijk vermoorden Amerikaanse burgers of lopen geheime psychologische controle operaties om onderwerpen te veroorzaken te worden gediagnosticeerd met een slechte geestelijke gezondheid."

De DSM lijkt te zijn gemaakt met een maas in de wet die het mogelijk maakt de overheid gesponsorde intimidatie programma's te bestaan. Dit werd blijkbaar gedaan zodat mensen ziek zal verschijnen wanneer dit uit te leggen aan een professionele geestelijke gezondheidszorg. Toe te voegen aan deze verwarring, het programma zelf is ontworpen om geestesziekten toen legde die na te bootsen 'niet-in-the-know. " Geestelijke gezondheidszorg kunnen ook deelnemen aan dit programma, bewust of onbewust door middel van etikettering doelen als geestelijk ziek. Het is een van de verschillende lagen van bescherming wordt gebruikt om te voorkomen dat dit programma werken in het geheim. Het is gemakkelijk om te zien hoe sommige geestelijke gezondheidszorg zou kunnen "overhaaste conclusies."

Toezicht

Surveillance is blijkbaar deel uit van een lopend valse onderzoek dat nooit eindigt. Het onderzoek kan worden gedaan om redenen van "nationale veiligheid." Op dezelfde manier zou de Duitse en Russische veiligheidstroepen vaak richten op de burgerbevolking om dezelfde reden. Nadat een persoon is uitgekozen, zullen woningen rondom het doelwit worden onderverhuurd en gebruikt als basis van de werking en training.

Als het doel woont in een huis, zal de basis meestal het dichtstbijzijnde gebouw aan de woning te zijn. Als het doel leeft in een appartement, dan het basisstation in een of meer van de omringende appartementen. Er zullen ongebruikelijke patronen van de bezetting met veel mensen komen en gaan in deze bases. Voertuigen en kentekenplaten gebruikt door de bewoners van de bases kan periodiek worden gewijzigd. Volgens McKinney en Moret, hebben de mensen die verhuizen naar deze bases in verband gebracht met de DOJ, CIA en andere federale agentschappen, evenals universiteiten, en de overheid defensie aannemers.

"Om iemand het vereist dat de betrokkene onder toezicht worden geplaatst richten," verkondigde McKinney, "zodat hun persoonlijkheidskenmerken, hun vermogen om onderling verband met mensen, hun vermogen tot corruptie of niet-corruptie (die lijkt te zijn een kritisch punt), en zelfs hun religie factoren erin. " De resultaten van surveillance informatie wordt gebruikt om geen ethische reden, "anders dan een intimidatie protocol, dat dat gerichte individu voor de rest van zijn of haar leven zal volgen vast te stellen," zei McKinney. Moret zei dat buren, vrienden en familie zijn vervolgens gecoöpteerd in de intimidatie.

Dit toezicht wordt blijkbaar gedaan met behulp van zeer geavanceerde apparatuur die gerichte mensen kunnen vinden door muren. Deze apparatuur lijkt te worden gebruikt in combinatie met Directed Energy wapens en andere "niet-letale." Volgens McKinney, kan miniatuur microfoons en camera's worden geplant in uw huis, of via de muur infrarood-apparaten kunnen worden gebruikt om uw positie te controleren. The Life Assessment Detector System (LADS) ontwikkeld aan de Georgia Tech was blijkbaar geroepen om mensen die gevangen zitten in puin, lawines of andere rampen te redden. Het heeft een bereik van ongeveer 135 voeten en kan de hartslag en ademhaling te detecteren. Het kan ook worden geconfigureerd om de beweging van een specifiek persoon te volgen binnen een gebouw.

SoldierVision A1, een radar zaklamp, heeft een patstelling afstand van 30 voet en kan de beweging achter een muur van 30 voet op te sporen ook. Deze zaklampen gestaag onderzocht het gebruik van militaire en universitaire testlaboratoria sinds de jaren 1990. Sommige van deze zaklampen scherm beelden in 3D-formaat, kan de ademhaling te detecteren, en kan door middel van, hout, baksteen, gipsplaat, glas en beton te zien. Meer dan waarschijnlijk, het toezicht op technologie die nu wordt gebruikt op doelen in de wereld is veel geavanceerder en niet publiekelijk beschikbaar.

karaktermoord

Targets meestal ervaring karaktermoord die wordt gedaan om hun persoonlijke en professionele leven te vernietigen. Halve waarheden en leugens worden vaak strategisch verspreid in hun leven, en kunnen de basis vormen voor een valse onderzoek. De geruchten circuleerden over mensen zijn blijkbaar niet bekrompen, maar schokkend en weerzinwekkend. Ze zijn CIA of Stasi-type van schadelijke leugens. Sommige van de mensen het verspreiden van deze leugens kunnen zijn kennissen en / of familieleden die zijn aangeworven (voorgelogen, geïntimideerd en gechanteerd) tot het worden van informanten. Meer over de werving van familie en vrienden zullen worden behandeld in de Informanten en motivationele factoren hoofdstukken.

Het Amerikaanse federale politie heeft deze tactiek gebruikt om mensen ze ofwel wilden werven als informanten te vernietigen of die ze wisten dat ze niet kon werven en wilde ik gewoon te vernietigen. Volgens de voormalige CIA-psycholoog James Keehner, "Het was de bedoeling vernielzucht. Ten eerste, zou u controleren om te zien of u het huwelijk van een man zou kunnen vernietigen. Als je zou kunnen, dan zou dat genoeg zijn om een ​​hoop stress op die persoon te zetten zijn, breek hem neer. dan moet je misschien een gerucht campagne tegen hem te beginnen. lastig te vallen hem constant. " Constante intimidatie, gepland vernielzucht, karaktermoord, het vernietigen van relaties, alles gebeurt in overleg met het doel van het breken van iemand die naar beneden zijn een standaard onderdeel van dit programma.

Naar verluidt, de gebruikelijke geruchten over een persoon zijn dat ze een pedofiel, prostituee, terrorist, racistische, anti-government, geesteszieken, drugsverslaafde, drugsdealer, of een bedreiging voor de "nationale veiligheid." Ze worden vaak verspreid naar de buren, vrienden, familie, werkgevers, enz. Een grote inspanning wordt besteed aan een persoon te scheiden van hun vrienden en familie.

Blijkbaar deze gerucht campagnes hulpmiddel bij werving. Dr. Rauni Kilde schreef: "Deception is de naam van het spel, dus rekruten worden verteld onwaar sinistere verhalen van hun slachtoffers om ze gemotiveerd te houden." Volgens CNN, de Stasi gebruikte exact dezelfde tactiek. Zij verklaarde: "Het agentschap is gemachtigd om geheime lastercampagnes te voeren tegen iedereen geoordeeld om een ​​bedreiging te zijn ..." De Russische KGB ook, met zijn enorme netwerk van informanten, zouden hun interne doelstellingen te belasteren.

Deze geruchten kunnen worden vermeerderd door meerdere personen (informanten) achter de rug van een doelwit. Blijkbaar, niet te laten een gerichte persoon zich bewust worden van deze geruchten is essentieel voor hun effectiviteit. Victor Santoro merkte in zijn boek, gaslighting: ". De essentie van het belasteren van uw doelgroep van de geruchten is het dat het niet terug naar hem" How to Drive Uw Enemies Crazy, dat

Sommigen gerichte mensen geloven dat de geruchten worden verspreid dat zij pedofielen. De organisatoren beseffen dat het labelen van iemand een pedofiel zeer schadelijk zal zijn en produceren optimale hefboomwerking voor het verkrijgen van steun van de gemeenschap. Het is waarschijnlijk een van de slechtste geruchten kon starten tegen iemand. De Stasi zou het karakter van hun doelstellingen te vernietigen door ze te labelen als pedofielen ook. Er zijn meerdere tijdschriften en kranten berichten over pedofielen worden lastiggevallen door de buren, en burgerwachten tot het punt waar zij uit de gemeenschappen worden gedreven en gedwongen uit van het werk. Sommigen zijn van meerdere staten gereden.

Een artikel in de Toronto Star getiteld Vigilantes Versus Pedofielen op 8 augustus 2004 geschetst hoe de groep een burger genoemd, Perverted-Justice, campagnes zou beginnen aan mensen die ze hebben gesloten waren potentiële pedofielen bloot te leggen. Dit illustreert de mind-set van sommige groepen mensen die reden om te geloven dat een persoon een pedofiel te hebben. De PJ-groep wordt geleid door Xavier Von Erck (echte naam Philip John Eide), bij www.perverted-justice.com.

Bij een bezoek aan een site genaamd Beschadigde-Justice op www.corrupted-justice.com, ontdekte ik dat meerdere leden van Perverted Justice trauma hebben doorstaan ​​zoals incest of andere vormen van seksueel misbruik en lijden aan een verscheidenheid van psychische stoornissen. De site Beschadigde-Justice verkregen deze informatie uit ledenprofielen die publiek toegankelijk zijn, en gelegen aan de website van Perverted-justitie. En volgens CJ, Eide wordt op de plaat te zeggen dat meer dan 40% van zijn volgelingen deze vorm van seksueel misbruik hebben meegemaakt.

De CJ site heeft ook een aantal zeer interessante message board chats (openbaar beschikbaar) door PJ leden die een kijkje waard zijn. Blijkbaar is de CJ mensen hebben het bewijs dat de leden van PJ hebben gehackt in hun webserver gedocumenteerd. De CJ mensen zijn voor de volledige vervolging van potentiële zedendelinquenten met behulp van de rechtshandhaving uitgerust met de checks and balances ingebouwd in het rechtssysteem. De CJ groep zegt in feite dat, hoewel het PJ systeem lijkt te zijn gunstig, het is zwaar beschadigd.

De meeste PJ "borstbeelden" omvatten niet de rechtshandhaving. Volgens het artikel in de Toronto Star en de CJ website, de vrijwilligers bij PJ in plaats daarvan beginnen aan een niet aflatende campagne om mensen die ze geloven zijn pedofielen bloot te stellen door te bellen met vrienden, buren, kinderen, standplaatsen en verpest persoonlijke en professionele relaties. Dit is vergelijkbaar met wat gerichte mensen ervaren, zoals aangegeven door het gedrag van hun vrienden, familie en collega's. Maar ze nooit verteld over het. PJ wordt genoemd als een potentieel destructieve sekte door de Rick A. Ross Instituut voor de Studie van Destructive Cults, www.Rickross.com.

Het lijkt erop dat sommige PJ leden hebben een psychologische behoefte om krachtig te voelen en te voldoen aan die behoefte door het tonen aan het publiek en hun doelstellingen hoe ze een leven kan vernietigen. Ik denk dat sommige van deze vrijwilligers zijn ziek en hebben latent sadistische bedoelingen, ondanks hun patriottische motieven. Blijkbaar een aantal van hen ontvangt een zieke vorm van genot / bekrachtiging door verpest het leven van mensen, zoals duidelijk door hun chats.

Karaktermoord is standaard. Mijn onderzoek leidt mij tot de conclusie dat het niet verder dan deze mensen zich voordoen als "bezorgde burgers" en roep lokale ambtenaren om destructieve registreren van klachten over een gerichte persoon. Ik ben vrij zeker dat ze dit doen. Deze vorm van "dienstverlening aan de gemeenschap" kan zeer schadelijk zijn, vooral wanneer de klachten afkomstig zijn van meerdere, ogenschijnlijk los bronnen.

Gevoeligheid Programs (NLP)

Sommige van de gevoeligheid tactieken die gebruikt worden door deze groepen zijn borderline-subliminale aanvallen ontworpen om kunstmatig fobieën te maken. Ze zijn kennelijk gebaseerd op Neuro-Linguïstisch Programmeren (NLP). U kunt denken aan NLP als een zeer krachtig instrument dat kan worden gebruikt om een ​​snelle, diepgaande verandering te produceren. De onderdelen van NLP die groepen gebruik maken van zijn ankers en triggers.

Het doel van deze gevoeligheid programma lijkt te zijn voor mensen met schadelijke aandoeningen welke zijn verbonden triggers zoals objecten, kleuren, bewegingen en geluiden conditioneren. Zodra dit is gebeurd, een doel kan worden heimelijk openlijk gewond in het openbaar. Dit kan gebeuren met of zonder bewustzijn van het doel. Zoals ik zal laten zien, dit is bruut geweld.

"Er is een fundamentele protocol dat de daders te beginnen, maar de TI draagt ​​bij aan de wijziging," legde McKinney. Ze beschreef dat een programma "pavalonian conditionering" wordt gebruikt om gerichte mensen naar "emotioneel reageren op een bepaalde trekker." Deze negatieve emoties worden vervolgens 'ingebouwd in het protocol. " "Het is een continu proces," verklaarde McKinney. Moret stemt zeggende: "Ze zullen het doelwit stalken voor een tijdje ... om hen te conditioneren," en ze "in de war en bang."

Zelfhulp goeroes gebruik maken van deze programma's om positieve emotionele toestanden te creëren en verankeren ze aan een beweging, een geluid of een object. Dan wordt de trigger die de emotie zal beroep doen op de klank, beweging, of object. Hoewel dit complex klinkt het is vrij eenvoudig in de praktijk. Het wordt gedaan door het creëren van een piek emotionele toestand, en vervolgens, terwijl in die toestand, verankeren jullie, dat wil zeggen, iets te doen herhaaldelijk. Dit verankert effectief de emotionele toestand naar wat werd herhaaldelijk gedaan.

"Een stimulus die is gekoppeld aan en veroorzaakt een fysiologische toestand wordt een anker in NLP genaamd", aldus O'Connor en Seymour in hun boek Introducing NLP. Ze vragen: "Hoe zijn ankers geschapen?"

Introduction to the Hidden Evil

Now that we understand who runs who runs this planet, it will be easier to see how such a secret policy can exist. It also becomes evident why money is no barrier. The reason of course is that they make the money. The Hidden Evil, is also called Gang Stalking, Cause Stalking, Public Mobbing, an Electronic Concentration Camp, Covert War, Mental Rape, and a variety of other names.(*)

It involves two major components. First, the use of Non-lethal Weapons (NLW), which includes Directed Energy Weapons (DEW). Second, heavily networked groups of plain-clothed citizens who encircle targeted people in public. This network appears to involve volunteers who are part of a state-sponsored Neighborhood Watch program, as well as individuals and groups of informants with no official connection to the state. As I'll demonstrate, mainstream news has indicated that one in twenty-four citizens will be recruited as informants. Some publications contend that the goal is the recruitment of one-third of the population.

Organizations from the federal level downward participate in the harassment, which includes local stores and restaurants. This program is not in the process of being created, it is already here. It is thoroughly embedded in most major communities. It is happening in all NATO countries. The program has been operational in some form since at least the early 80s, when families of people with direct or indirect connections to federal agencies were targeted.

Some people spent a significant about of time designing this program. Influential people have ensured its survival. It is also almost invisible and traceless. Some of the organizations I've found to be likely responsible for the Hidden Evil, contain people that are considered to be our world leaders. On the surface, they appear to be humanitarians.

The pretext for the existence of this program is presumably to identify and track potential threats to national security and to rid communities of undesirables. As I'll demonstrate, citizen informants have been used to stalk and harass people in other countries for the same reasons. Microwave weapons have also been used on dissidents. U.S., German, and Russian intelligence agencies have all used these tactics. The Hidden Evil appears to be a culmination of them, which from what I have learned, has been fine-tuned with the help of Establishment Think Tanks.

Julianne McKinney is a former army intelligence officer and director of the Electronic Surveillance Project Association of National Security Alumni, which was an organization composed of former intelligence officers dedicated to exposing excesses by the U.S. Intelligence services. Her preliminary report, Microwave Harassment and Mind-Control Experimentation published in 1991, is a well-documented outline of these activities.

According to her interview on the Republic Broadcasting Network (RBN), these activities have increased significantly since the report was published. She kept this organization operational for four years using her personal funds. She has about 40 years experience with this subject and has talked with and interviewed hundreds of targeted individuals. I'll be referencing her report and her interview on the RBN throughout this book.

Dr. Reinhard Munzert, scientist, psychologist, and university lecturer has authored three books and over 100 articles. He began investigating this phenomenon with the aid of his students after learning he was targeted. His article, Targeting the Human with Directed Energy Weapons, which was the number one listing on Google for two years, will be referenced, as well as his interview on RBN.

I'll also be referencing the work of Leuren Moret, particularly her interview on Vancouver Co-op Radio CFRO 102.7 FM, on August 8th 2005. She is the former Environmental Commissioner of Berkeley California and the president of Scientists for Indigenous People. She has worked at two US nuclear weapons laboratories as a geoscientist and has contributed to a UN sub-commission investigating depleted uranium. She, Julianne and Dr. Munzert have been on the receiving end of this harassment.

In her article, Uncovering the Truth About Depleted Uranium, Moret speaks of her personalGang Stalking experience, which she refers to it as Mobbing. She writes, "'Mobbing' is the purposeful and strategic institutional gathering of all information about an individual by using any method--legal or illegal. Contact for this purpose is made with neighbors, classmates, former partners, family members, former employers, teachers, church members, good friends and even your family tree..."

She continues, "Everything must be known about the support system around you that makes your life possible." This includes, "[the] assessment of strategic resources and future income (finances, mobility, cars, insurance, credit cards, bank safety deposit boxes, post office boxes, wills, health records, birth certificates, transcripts and photographs) is made without your knowledge. The purpose of mobbing is to drive the target individual out of the job force for the rest of their life; the bigger goal is to drive them to the ultimate self-destruction: suicide. The information gathered ... is used to take your life apart ... and to attempt to make you look crazy." She adds, "Your children are harassed, they come home with belongings missing and stories of teachers harassing them."

The psychological aspect of the group harassment which takes place in public is identical to Mobbing; it has the same group dynamics. For that reason I'll make references to Mobbing throughout this book. The Mobbing phenomenon has been well documented and studied in other countries for years. However, it is only now beginning to receive attention in North America.

Mobbing, also known as "psychological terror" involves the systematic harassment of an individual by a group of individuals in the workplace, and according to the authors of the book Mobbing, also in public. In the workplace, the group is often rallied by an authority such as Human Resources. It includes rumors, setups, and skits intended to humiliate the target and make them appear incompetent.

The documented mainstream exposure that Mobbing has received will help us understand how thousands of people in some major cities can be recruited to systematically attack individuals. The Mobbing I'm referring to is committed by multiple people using subtle but repeated harassment, which takes place in the workplace and is difficult to prove. It is used to kick a person out of the workplace or even workforce while leaving little trace. The logic is that it is less of a liability for the organization if you "voluntarily" leave than if they fire you. In addition, some organizations with sadistic intentions enjoy it as a form of sport harassment as well.

Although it would appear that the Hidden Evil is a new phenomenon, it is not. Tyrannical regimes throughout history have used local groups to neutralize dissent. Group Stalking is simply another manifestation of this pattern. In order to understand how an entire country could be complicit in the persecution of perceived undesirables, a study of German and Russian dictatorships is essential.

Therefore, evidence will be presented which describes how similar programs of persecution were used during these dictatorships, and how the U.S. and other NATO countries are heading in that direction. Finally, we'll draw upon the Milgram experiments, which will illustrate how most ordinary people will repeatedly torture innocent people under the direction of an authority figure.

Persecute "To harass or punish in a manner designed to injure, grieve, or afflict; specifically: to cause to suffer..." -Merriam-Webster's Dictionary

[Footnotes] * These names are taken from a combination of web sites listed in the sources.

 

Tactics (Part 1)

It has been said that when you're first targeted, they hit you hard in multiple directions. Presumably, this is done so you'll collapse after experiencing recurrent emotional violence, which is compounded after you've realized that all normal support structures and avenues of grievance have been removed. There appears to be multiple levels of intensity of this program that people can receive. The two main parts of the program are group stalking and Non-lethal Weapons (NLW). Both are violent attacks. And some are apparently hit hard with both.

People tend to associate the word harassment with acts of temporary aggravation or pestering. Therefore, it may not by the proper word to describe the never-ending acts of covert violence inflicted upon targeted people, which amounts to torture and murder. Some of the tactics used in these programs are borderline-subliminal, which is why they are so difficult to detect, explain, and defend against. It is my goal to make the unconscious, conscious. Many of these tactics are a type of mind-control.

Most of these tactics have been used in former Cointelpro operations by the United States, Russia, and Germany against their civilian population. The Hidden Evil's genesis is obviously derived from known tactics such as bogus investigations, surveillance, smear campaigns, the use of noise, thefts, break-ins, character assassination, staged accidents, framings, sabotage and vandalism, mail interference, blacklisting, citizen informant squads for overt surveillance (Gang Stalking), poisoning and drugging, incarceration into prisons and mental institutions, and electromagnetic weaponry.

It is a historical fact that the U.S. has officially targeted its civilian population on multiple occasions. Programs such as MKULTRA and Cointelpro can't be denied. "The methods reportedly employed in these harassment campaigns," explained McKinney, "bear a striking resemblance to those attributed to the CIA and FBI during Operations MKULTRA, MHCHAOS, and COINTELPRO."

In Germany these methods were contained in two programs, Zersetzung and Directive Perceptions. They were basically German versions of Cointelpro. Zersetzung was developed to destroy a targeted person's inner-self. During an interview on the Republic Broadcasting Network, Dr. Munzert, a German target, drew a parallel between the current program, and what occurred in East Germany. He explains, "In Germany this is called Zersetzung and this means the dissolution or disintegration of the targeted person."

Writer, international lawyer, and filmmaker Anna Funder won the Four Samuel Johnson Prize from the BBC in 2004 for her non-fiction book, Stasiland. In it, she wrote, "The German wordZersetzung is harsh, and has no direct English equivalent." She described, "Zersetzung, as a concept, involves the annihilation of the inner-self." It calls for, "[The] targeted spreading of rumours about particular persons with the aid of anonymous [means] ... making compromising situations for them by creating confusion over the facts ... [and] the engendering of hysterical and depressive behaviors in the target person."

"Directive Perceptions," she continued, was another program designed to "develop apathy (in the [targeted] subject) ... to achieve a situation in which his conflicts, whether of a social, personal, career, health or political kind are irreversible ... to give rise to fears in him ... to develop/create disappointments ... to restrict his talents or capabilities ... to reduce his capacity to act and ... to harness dissentions and contradictions around him..." These directives were used by the Ministry for State Security (MfS) against threats to state security. In other words, they were massively used on the population to maintain a dictatorship.

These programs were designed to secretly destroy a target's personal and professional life, ruin them financially, and prevent them from reaching their potential, with the intention to produce irreversible depressive and panic-stricken behaviors. What the Hidden Evil appears to be, is a combination of various Cointelpro operations used by oppressive regimes on their civilian population. It has been refined and deployed globally. As I'll demonstrate, it is likely an indication of the creation of a worldwide dictatorship.

Hidden in Plain View

Many of us have experience with books where the goal is to find the hidden picture contained in the landscape. Or the artwork, where if you look intently, you will eventually see a three-dimensional picture superimposed on a flat background. At first, most of us had some trouble detecting these hidden pictures, but with practice we usually see them. Once the detection mechanism is developed, these hidden objects become clearly visible with little effort. So too with the Hidden Evil. Once you know what to look for, these borderline-subliminal attacks are quite detectable.(*)

So, rather than using a blunt overt attack against a fully functional person, they usually attack covertly, and conceal their harassment by using existing events that occurs naturally. There is usually cover for the harassment as well. However, it is probably a statistical rarity for some of thesestaged events to occur as often as they do. They conceal much of their harassment using what appears to be a simple formula. From what I've learned, the basic formula is as follows:

Frequency: Describes how often an event occurs. It also pertains to the number of acts within a single event.

Duration: Pertains to the length of a single event. It also pertains to the non-stop nature of the harassment in general.

Intensity: The amplification of acts such as sound, sight, crowding, etc. within an event.

A hypothetical example of a car door-slamming event would include this: One neighbor arrives and two others leave. As they're tending to their vehicles there is the repeated opening and shutting doors and trunks, alarms going off, and beeping from alarms being turned on. These disturbances emanate from areas surrounding your house. This may happen simultaneously, or they may be strung together, one right after the other. Synopsis

The event lasted for 5 minutes; longer than normal (Duration). In addition to length of the event being extended, the number of times each act occurred within the event was increased (Frequency). Ex: Multiple, repeated doors/trunk slamming from cars, even if a single individual is at the vehicle. This event also happens many times throughout the day (Frequency). Each individual act of door/trunk shutting is amplified by deliberate slamming to produce a louder than normal noise (Intensity).

The event was louder, contained more activity (acts), and lasted longer than normal to produce a covert attack. Even if a single individual is arriving/leaving, standard practice seems to be multiple slams (trunk, back door, driver's door). This may be synchronized with your activity, such as your arrival or departure. The event may also be a part of a Noise Campaign consisting of an alteration of other types of noise. This basic formula is used with many of the tactics outlined in this chapter. The frequency and duration formula is also used in Mobbing. In addition to the overuse of an individual tactic, these tactics are combined and used in a round-the-clock fashion, which amplifies their overall potency.

Basic Protocol

There is a basic protocol that they begin with which is consistent in all NATO nations. It begins with the surveillance of targets, monitoring of their private lives, and entry into their homes (break-ins). This is done so their personality traits can be cataloged. "There is a basic protocol that the perpetrators begin with," states McKinney, "but the TI [Targeted Individual] contributes to the modification." After they are singled out for preliminary stages of harassment, Gang Stalking ensues, which McKinney describes as part of a "softening-up process." After a period of overt surveillance (Gang Stalking), NLW are introduced. The NLW harassment gradually increases to extreme conditions. This pattern has unfolded consistently in all NATO countries.

Dr. Munzert speaks of basically the same pattern, which he describes as a "double-folded strategy." "It is usually the same procedure," he announced, "but with individual variations." One part includes the victims being "attacked with microwave weapons," and "the other part of the strategy" he says, is to portray the targeted people as "mad [insane]." He explained the effectiveness of this approach as "unbeatable," and reveals that this is essentially what the Stasi did to their targets. Part of this protocol appears to include elements of Neuro-linguistic Programming (NLP), which is a type of mind-control used by behaviorists to affect change. NLP will be covered in more detail shortly.

Some of the tactics below have been called Street Theatre, Harassment Skits, or Staged Events. They are planned harassment skits, such as blocking, or swarming. They also include informants who surround targets and have conversations intended to be overheard, which contain information about the target's personal life. Presumably, citizen informants are told that this is necessary to let targeted people know they're being watched. This may happen in any public place. This is not a complete list of tactics but it includes some of the more common ones reported.

Some of these tactics will sound insane because they're deliberately designed to make someone appear as though they're suffering from a mental disorder. They were definitely created by experts in the behavioral sciences. In addition, people may be emotionally drained, and unable to properly identify or explain what's happening to them. According to the DOJ, mental tactics designed to cause psychological harm must last for months or years before they constitute torture. The Hidden Evil fits this description. So keep in mind, these are Psychological Warfare tactics which are intended to drive people crazy.

Mental Health System

The mental health system is apparently being used worldwide to discredit targeted people who complain. According to the book, Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas, countries around the world, including the U.S., have used doctors to help abuse and discredit people, often for political reasons. It is also a documented fact that there was collaboration between doctors and the military when experiments were carried out in prisons, hospitals, and universities on unwitting people in North America.

McKinney states that medical doctors, as well as psychiatrist and psychologists appear to be providing cover for this program. This is similar to what was done in Russia, where enemies of the dictatorship would be thrown into mental institutions and drugged beyond recovery. "The APA's refusal to acknowledge the impact of terrorization upon the human psyche, even given the publicity stemming from the Church Committee's findings in 1975, raises serious questions about the validity of psychiatry as a profession in this country," declared McKinney, "not to mention, the APA's ethical intent, in the long term."

The DSM is a diagnostic manual for identifying mental disorders. The first edition of the DSM was released in 1952 at a time when the APA was under the control of Dr. Ewen Cameron, who would commit brutal government-sponsored torture under the MKULTRA program. Dr. Rauni Leena Kilde, former Chief Medical Officer of Finland, wrote an article entitled, Microwave Mind Control: Modern Torture and Control Mechanisms Eliminating Human Rights and Privacy. In it she described "The Psychiatric Diagnostic Statistical Manual (DSM) for mental disorders," as a "brilliant cover up operation in 18 languages to hide the atrocities of military and intelligence agencies' actions towards their targets."

Dr. Kilde says the manual "lists all mind control actions as signs of paranoid schizophrenia," and that "all medical schools teach their students that the person is paranoid, ESPECIALLY if he believes intelligence agencies are behind it all." Finally she proclaims, "Never is the medical profession told that these are routine actions all over the world by intelligence agencies against their targets."

Dr. Munzert said that doctors, "first think of paranoia and schizophrenia" if someone complains of this program. He cautions that because of this, "victims" could end up in a "lunatic asylum." Annie Earle, a Licensed Clinical Social Worker, and Board Certified Diplomat in her area of expertise, has over 25 years of psychotherapy experience as an independent practitioner. When referring to the DSM during an interview on the Republic Broadcasting Network, she stated, "It's called theDiagnostic Statistical Manual ... [and all] psychotherapists, regardless of specialty are required to give their patients a diagnosis from this manual, and in order to get the diagnosis you have to fulfill certain criteria that is clearly spelled out in the DSM."

Earle noticed a pattern unfolding when some of the people who came to her who did not fit the standard criteria. "The patients that started coming to me really did not fit any of the standard classifications," she explained. "For example, they might be having what some people consider a psychotic or schizophrenic breakdown in that they might report what seem to be hallucinations, but they did not have any of the other criteria that goes along with schizophrenia. There are many criteria that one is required to ... [detect] in making the diagnosis of schizophrenia, and these people did not meet all that criteria." Apparently Earle became targeted herself while studying this program.

Interestingly, the April/May 1996 issue of Nexus Magazine contained an article entitled, How The NSA Harasses Thousands Of Law Abiding Americans Daily By The Usage Of Remote Neural Monitoring (RNM) written by former NSA worker John St. Clair Akwei. It read, "NSA DOMINT [Domestic Intelligence] has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health."

The DSM appears to have been created with a loophole which allows government-sponsored harassment programs to exist. This was evidently done so that people will appear ill when explaining this to a mental health professional. Adding to this confusion, the program itself is designed to mimic mental illness when explained to those "not-in-the-know." Mental health professionals may also participate in this program, wittingly or unwittingly by labeling targets as mentally ill. It is one of several layers of protection used to help keep this program operating in secrecy. It's easy to see how some mental health professionals might "jump to conclusions."

Surveillance

Surveillance is apparently part of an ongoing bogus investigation that never ends. The investigation may be done for reasons of "national security." Similarly, German and Russian security forces would often target the civilian population for the same reason. After a person is singled out, dwellings surrounding the target will be sublet and used as bases of operation and training.

If the target lives in a house, the base will usually be the closest building to the house. If the target lives in an apartment, then the base will be in one or more of the surrounding apartments. There will be unusual patterns of occupancy with lots of people coming and going into these bases. Vehicles and license plates used by the occupants of the bases may be periodically changed. According to McKinney and Moret, the people who move into these bases have been linked to the DOJ, CIA, and other federal agencies, as well as Universities, and government defense contractors.

"In order to target someone it requires that that person be put under surveillance," proclaimed McKinney, "so that their personality traits, their capacity to inter-relate with people, their capacity for corruption or non-corruption (that seems to be a critical point), and even their religion factors into it." The information obtained by surveillance is used for no ethical reason, "other than to establish a harassment protocol, which will follow that targeted individual for the rest of his or her life," said McKinney. Moret said that neighbors, friends and family are then co-opted into the harassment.

This surveillance is apparently done using very sophisticated equipment which can locate targeted people through walls. This equipment seems to be used in combination with Directed Energy Weapons and other "Non-lethals." According to McKinney, miniature microphones and cameras may be planted in your home, or through-the-wall infrared devices may be used to monitor your movement. The Life Assessment Detector System (LADS) developed at Georgia Tech was apparently created to rescue people trapped in rubble, avalanches, or other disasters. It has a range of about 135 feet can and can detect heartbeat and respiration. It can also be configured to track a specific person's movement inside a building.

SoldierVision A1, a radar flashlight, has a standoff distance of 30 feet and can detect motion behind a wall at 30 feet as well. These flashlights have been steadily researched using military and university testing labs since the 1990s. Some of these flashlights display images in 3D format, can detect respiration, and can see through, wood, brick, plasterboard, glass and concrete. More than likely, the surveillance technology which is now being used on targets worldwide is much more advanced and not publicly available.

Character Assassination

Targets usually experience character assassination which is done to destroy their personal and professional life. Half-truths and lies are often strategically spread into their lives, and may be the basis for a bogus investigation. The rumors circulated about people are apparently not petty, but shocking and repulsive. They are CIA or Stasi-type life-damaging lies. Some of the people spreading these lies may be acquaintances and/or family members that have been recruited (lied to, intimidated and blackmailed) into becoming informants. More on the recruitment of family and friends will be covered in the Informants and Motivational Factors chapters.

U.S. Federal law enforcement has used these tactics to destroy people they either wanted to recruit as informants or those they knew they couldn't recruit and just wanted to destroy. According to former CIA psychologist James Keehner, "It was planned destructiveness. First, you'd check to see if you could destroy a man's marriage. If you could, then that would be enough to put a lot of stress on that individual, to break him down. Then you might start a rumor campaign against him. Harass him constantly." Constant harassment, planned destructiveness, character assassination, destroying relationships, all done in concert with the goal of breaking someone down are a standard part of this program.

Reportedly, the usual rumors spread about a person are that they are a pedophile, prostitute, terrorist, racist, anti-government, mentally ill, drug addict, drug dealer, or a threat to "national security." They are often spread to neighbors, friends, family, employers, etc. A major effort is spent to separate a person from their friends and families.

Apparently these rumor campaigns aid in recruitment. Dr. Rauni Kilde wrote, "Deception is the name of the game, so recruits are told untrue sinister stories of their victims to keep them motivated." According to CNN, the Stasi used the exact same tactics. They stated, "The agency was authorized to conduct secret smear campaigns against anyone it judged to be a threat..." The Russian KGB too, with its massive network of informants, would slander their internal targets.

These rumors may be propagated by multiple people (informants) behind a target's back. Apparently, not letting a targeted person become aware of these rumors is essential to their effectiveness. Victor Santoro noted in his book, Gaslighting: How to Drive Your Enemies Crazy, that "The essence of defaming your target with rumors is it that it not get back to him."

Some targeted people believe that rumors are being spread that they are pedophiles. The organizers realize that labeling someone a pedophile will be highly damaging and produce optimum leverage for gaining community support. It is probably one of the worst rumors you could launch against someone. The Stasi would destroy the character of their targets by labeling them as pedophiles as well. There have been multiple magazine and newspaper reports of pedophiles being harassed by neighbors, and vigilante groups to the point where they are driven out of communities and forced out of work. Some have been driven out of multiple states.

An article in the Toronto Star entitled, Vigilantes Versus Pedophiles on August 8, 2004 outlined how one citizen's group called, Perverted-Justice, would start campaigns to expose people that they have concluded were potential pedophiles. This illustrates the mind-set of some groups of people who have reason to believe a person is a pedophile. The PJ group is run by Xavier Von Erck (real name Phillip John Eide), at www.perverted-justice.com.

Upon visiting a site called Corrupted-Justice at www.corrupted-justice.com, I discovered that multiple members of Perverted Justice have endured trauma such as incest or other forms of sexual abuse and are suffering from a variety of mental disorders. The Corrupted-Justice site obtained this information from member profiles which are publicly available, and located at the Perverted-Justice website. And according to CJ, Eide is on record saying that more than 40% of his followers have endured this type of sexual abuse.

The CJ site also has some very interesting message board chats (publicly available) by PJ members that are worth a look. Apparently the CJ people have documented proof that members of PJ have hacked into their web server. The CJ people are for the full prosecution of potential sex offenders by using law enforcement equipped with the checks and balances built into the legal system. The CJ group basically says that although the PJ system appears to be beneficial, it is heavily corrupted.

Most PJ "busts" do not include law enforcement. According to the article in the Toronto Star and the CJ website, the volunteers at PJ instead begin a relentless campaign to expose people they believe are pedophiles by calling friends, neighbors, children, places of employment and ruining personal and professional relationships. This is similar to what targeted people experience, as indicated by the behavior of their friends, family and co-workers. But they're never told about it. PJ is listed as a potential destructive cult by the Rick A. Ross Institute for the Study of Destructive Cults, www.Rickross.com.

It appears that some PJ members have a psychological need to feel powerful and meet that need by displaying to the public and their targets how they can destroy a life. I believe that some of these volunteers are ill and have latent sadistic intentions, despite their patriotic motives. Apparently some of them receive a sick type of enjoyment/empowerment by ruining the lives of people, as evident by their chats.

Character assassination is standard. My research leads me to conclude that it is not beyond these people to masquerade as "concerned citizens" and call local officials to register destructive complaints about a targeted person. I'm fairly certain they do this. This type of "community service" can be very damaging, especially when the complaints originate from multiple, seemingly unconnected sources.

Sensitivity Programs (NLP)

Some of the sensitivity tactics used by these groups are borderline-subliminal attacks designed to artificially create phobias. They are apparently based on Neuro-Linguistic Programming (NLP). You can think of NLP as a very powerful tool that can be used to produce rapid, profound change. The parts of NLP that groups use are anchors and triggers.

The goal of a these sensitivity programs appears to be to condition people with damaging emotions which are linked to triggers such as objects, colors, movements, and sounds. Once this is done, a target can be covertly injured openly in public. This may happen with or without the target's conscious awareness. As I'll demonstrate, this is brutally violent.

"There is a basic protocol that the perpetrators begin with, but the TI contributes to the modification," explained McKinney. She described that a "pavalonian conditioning" program, is used to get targeted people to "respond emotionally to a particular trigger." These negative emotions are then "built into the protocol." "It's an ongoing process," declared McKinney. Moret agrees saying, "They will stalk the target for a while ... to condition them," and make them "confused and frightened."

Self-help gurus use these programs to create positive emotional states and anchor them to a movement, a sound or an object. Then the sound, movement, or object becomes the trigger that will invoke the emotion. Although this sounds complex it is pretty simple in practice. It is done by creating a peak emotional state, and then while in that state, you anchor it, that is, do something repeatedly. This effectively anchors the emotional state to whatever was repeatedly done.

"A stimulus which is linked to and triggers a physiological state is called an anchor in NLP," stated O'Connor and Seymour in their book, Introducing NLP. They ask, "How are anchors created?" "First by repetition... Secondly, and much more important, anchors can be set in a single instance if the emotion is strong and the timing is right." This process of creating anchors has also been calledEmotional Transference.

We're unconsciously creating anchors in our environment all the time with people, music, places, and objects. These stalking groups are obviously led by people knowledgeable in the behavioral sciences. The groups are used to create negative emotional states in targeted people, such as fear and anxiety, and anchor them to common objects. This is the deliberate creation of a phobia!

O'Connor and Seymour declare "An external stimulus can trigger a very powerful negative state." "This is the realm of phobias," they warn. This is nothing less than using violence to create an injury and then deliberately irritating it. "Targets are constantly monitored and if a target responds emotionally to a particular trigger, that will be built into the protocol," says McKinney.

Organizations known to have studied NLP include military intelligence agencies, CIA, FBI, and other state bureaus of investigation. According to an article called, Non-Lethality, which appeared in June 1993 issue of Lobster Magazine, in the early 1980s, Dr. John Alexander taught NLP to "selected general officers and Senior Executive Service members" as a "set of techniques to modify behavior patterns." Some of the references used in this article were taken from Dr. Alexander's book, The Warrior's Edge, which was co-authored by Janet Morris, who, according to the article, was a student of the Silva course in advanced mind-control. In the Structure chapter, I'll provide evidence that Dr. Alexander and Janet Morris have contributed to the creation of this program on behalf of the Think Tanks, as part of a political agenda.

In their book, Dr. Alexander and Janet Morris wrote, "In 1983, the NLP training group, along with John Alexander, was engaged to teach these skills to several members of Congress, including Al Gore and Tom Downey, under the auspices of Congressmen Clearing House on the Future, a bipartisan activity established to provide information to congressmen when they request it." He continued, "One organization that played a major role in the dissemination of NLP skills was the U.S. Army Intelligence and Security Command (INSCOM). ... Unlike the rest of the U.S. Army, INSCOM does not differentiate between wartime and peacetime roles."

According to his Bio, available at www.platinumstudios.com, Dr. Alexander has worked at "the highest levels of government," such as "the White House Staff, National Security Council, Members of Congress, Director of Central Intelligence, and senior defense officials." Morris' Bio, available at www.m2tech.us, is similar. Some of the organizations she's worked with include: the White House Office of Science and Technology Policy, Office of the Secretary of Defense, the Marine Corps Warfighting Lab, etc.

"Anchoring," stated Morris and Alexander, "is based on the neurophysiological assumption that patterns of behavior can be installed, then reactivated whenever a similar situation is encountered or created. ... Knowing this, you can intentionally install anchors to return your target to specific emotional states. The first step is [to] create the desired emotional state in the individual."

There has been some concern in the mental health field over the potential misuse of NLP. Unfortunately, like other tools, such as guns, they can be misused in the wrong hands. Andreas and Faulkner warned of the "possible uses and misuses of this technology," in their book, NLP: The New Technology of Achievement. They wrote, "We recognize the incredible power," of NLP and "recommend you exercise caution..." The deliberate infliction of emotional pain is an act of violence. The use of NLP in this manner is similar to a physical attack such as a punch or kick, only it leaves no visible injury.

Here's an example of how groups use NLP to make you aware that you're being stalked:

One morning you're walking out to your car and a man walks in front of you, stares directly at you in a hostile manner while repeatedly clicking his pen the whole time. You feel a little uneasy and say to yourself, "Boy that was weird, what was his problem?"

Then two hours later you're leaving a shopping mall on a day that it was not particularly crowded. As you walk out to your car, an old lady approaches you on foot. As she almost collides with you, she locks her eyes onto you with a hostile demeanor, while clicking a pen the whole time. Then maybe you tell yourself something like this. "There couldn't be a relation between those events, probably just a coincidence. But they both stared at me in such a mean way while hammering their pens..."

Later in the afternoon, you're on your way home. You're at a stoplight and out of the corner of your eye you see a passenger in the car to your left. You hear a slight noise, and glance over. You see a man glaring at you with a grin on his face. His arm is hanging out the window and he is holding a pen, which he is repeatedly clicking. Now imagine that happening for a month. Then a few days later you're on a sidewalk with a friend or family member. A man walks by, doesn't look at either one of you, but clicks his pen a couple of times. You feel anxious and afraid.

You may not even know you've been sensitized. One reason people may not realize that they're targeted or can't remember exactly when it began, is because these groups may slowly and gradually increase the harassment over time. But if you did recognize it as an attack, what would you tell your friend or family member?

This is what happened: The collisions, blatant hostile staring, and foul grin created the negative emotions and anchored them to the pen, which has now become the trigger. That is an example of a sensitivity program. Now imagine yourself being sensitized to multiple objects and sounds, and each of them creating pain each time you see or hear them.

Targets around the world have witnessed this being done with sounds, gestures, cell phones, laptops, pens, cars, watches, clothing, symbols, colors, and other items. This type of attack does require some maintenance and will loose its potency unless it is reinforced. So groups will reinforce these anchors and triggers with an occasional blitz attack from time to time.

The example above is a simple tactic which groups can use to let you know that you're being harassed in public. But there are many other attacks which NLP can be used for. For instance, you have recently experienced an extremely traumatizing event (which may have been facilitated by a faction of this network), such as an accident, death of a family member or pet, or some type of a brutal assault. Those who have you under surveillance know that there is a color, object, or sound that you've linked (anchored) massive pain to. Then shortly afterward, you are stalked by multiple people who carry that object, wear that color, or utter that phrase. This brings to the surface all the emotional pain you suffered during that experience. Imagine this happening again and again, every time you go outside. Now think what it would be like if your family and friends started to participate.

Groups will take an object you've been sensitized to and link it to another object. The idea appears to be to keep expanding the amount of objects you associate fear, anxiety, anger, or shame with. For instance, one of your neighbors has made it clear that they're participating in the harassment. Now, you know they're participating, and they know you know. So they may try to sensitize you to another stimulus such as a car alarm.

Because you've already associated them with massive pain, they can extend their harassment to a sound by turning their car alarm on/off in rapid succession over a short period of time, multiple times throughout the day. After they've done this for a couple of days and you've been sensitized to this sound, they can reduce their use of this specific tactic and just use the occasional maintenance sounds to inflict pain.

Now instead of repeatedly turning it on/off ten times, they only do it two or three times in a row, just to let you know you're being attacked. Even though it's only done a couple times in a row, you know why they're doing it and you may feel anger, fear, anxiety or other negative emotions. You may also feel frustrated at the prospect of trying to explain this harassment to another individual.

Anyone else observing this might think it's a little strange that someone would turn their alarm on/off a few times but they'd probably write it off as an isolated strange incident. But because they have not had your experience with that sound, and are not aware that it is a small part of a much larger harassment program, it would be difficult to explain that those beeps were attacks.

In NLP, the process of copying an emotional state from an existing trigger to a new trigger is calledchaining. O'Connor and Seymour state, "Anchors can be chained so that one leads to another. Each anchor provides a link on the chain and triggers the next one, just as the electrical impulse flows from nerve to nerve in our body."

After a person has been sensitized to a color or object, the article can become a unification symbol for the group, much like a uniform. For instance, after a person has been sensitized to the color red, she is surrounded by people wearing red cloths in public. Furthermore, this is an adaptable uniform because it can be changed in less than five minutes. If a person who realizes that they're being Gang Stalked has been sensitized to red, then the organizers of these groups can simply have them blitzed by a horde of citizens wearing the color blue. The harassment has now been chained to this color. Most likely, these uniforms also help promote group cohesiveness, and may foster feelings of empowerment among stalkers.

Space Invasion (Crowding)

Space invasion includes blocking, cut-offs, and swarming or what some TIs refer to as, crowding. Targets may be encircled by people wearing colors or holding objects that they've been sensitized to. Prolonged crowding can have an extremely negative effect on your mental/emotional health. The people who designed this harassment program were obviously well aware of this. While some cultures may be more immune to crowding than others, even people from parts of the world that have been historically crowded react stressfully to crowding. People who have not been invited into your personal space but deliberately violate it are attacking you.

Body language is more accurate and reliable than verbal communication. Most of this non-verbal communication is unconscious. The study of this language has been called Social Kinesics (the study of body communication). There are two components to this communication: One contains movements, gestures, postures, the other is spatial relationships. The study of communication using distance/space is called Proxemics.

For most North Americans the intimate zone is 0-18 inches and personal space is 1�-4 feet. This type of communication is used to harass a person. For instance, while in stores, restaurants and public places that are not busy, a target will have people invading their personal space. This happens even if there are only two customers in a store. If a targeted person makes a move from one place to another, several people may suddenly appear and jump out in front of him from around corners and isles.

The deliberate space invasion use by these people is designed to look like normal cut-offs and collisions that we all experience from time to time. It can happen with vehicles, on foot, or a combination. This type of space invasion is obviously intended to startle people and make them tense. It can be thought of as a virtual slap. They are used in blind areas such as corners, hallways, restrooms, or intersections where targets have people or cars cutting them off, or almost hitting them in a calculated manner. This happens in stores, buildings and on the street, with people and vehicles.

With some artificially induced cut-offs, the perpetrator is seen at a distance. The target and the perpetrator(s) are heading toward the same focal point which is used to maximize crowding. The point may be a corner, a very small walkway, a thin passageway, or an obstruction on the sidewalk such as a telephone pole or a tree. The informants adjust their timing so that they meet the target at the exact point where there is the least amount of space for all parties to pass, thus maximizing the invasion of the target's space. Apparently the idea is to get the target's attention and make them uncomfortable. When standing in a checkout-line, targets may routinely have group members standing a foot or closer behind them. And rather than wait for a target to leave, they may crowd them as they reach to the side or in front of the target to put their items on the counter.

If a target is outdoors in a populated area, he or she may see a wave of people move in the direction that they're headed in order to swarm them. If a target moves, then stops and waits for a few moments, they may see that the activity will settle back to normal again after the horde passes. This test can be run indoors and outdoors as well. Sometimes the horde may blatantly adjust their timing, or linger for a while until the target begins to move again, then they'll continue. These crowding and blocking tactics amount to an obstacle course that follows people wherever they go.(**)

They will also block targets, both on foot and with vehicles. For instance, as a target leaves a parking lot, a vehicle or person will be in the way, usually for a few moments. These things happen to everyone, once in a while, but for targets, it happens consistently, regardless of the time of day or how busy the area is.

This space invasion happens on days/times that there are normally not many people. It happens in stores while making purchases, restaurants, businesses, where targets have people frequently cutting them off, invading their space, using sensitivity programs, or other harassment tactics. If there is one customer in the store, they will probably be invading the target's space. For instance, a TI is indoors when it is not crowded, but witnesses multiple people who, instead of taking the shortest path to their destination, go double or triple the distance just so they can brush by them or cut them off.

Here is one personal example which took place at a YMCA in Boston, shortly after I realized I was being Gang Stalked. At the time, there were four people, including myself in the weight room. After I was there for a few moments I noticed there was an unusual amount weight banging. It was louder and more repetitive that it normally is.

I've been exercising and going to health clubs for about 15 years and I immediately recognized that these few people were repeatedly going out of their way to make as much noise as possible. I sat down on a bench and started doing dumbbell presses. Two students walked in, stood on either side of the bench I was sitting on and began to do lateral arm raises, blatantly invading my personal space. There was no special equipment that they were using in that area. I noticed one had a shirt on that said something like, "The MOST important part of playing rugby is support."

Anyone who can't wait a few minutes for you to finish and needs to stick their arms in your face is probably doing it on purpose. In addition, the exercise they were doing could have been done anywhere else a gym that was almost empty. It was a dead giveaway. Another student arrived and began lingering in an area to my left. He stared at me for a few seconds and started smirking.

Once he had my attention he turned his back to me so I could see his shirt which read, "CHASE." In smaller letters underneath was the word, "Manhattan." These attacks using symbolism are common reports among people who are targeted. The kid with the CHASE shirt left shortly after, and his total stay was about ten minutes. That episode is an example of noise, crowding, and symbolic attacks.

Noise Campaigns

All targets of the Hidden Evil are familiar with noise campaigns. Basically, targets report experiencing a steady stream of noise consisting of a rotation of various types of disturbances around their homes. This includes door slamming, yelling, car alarms, horns, tires screeching, loud music, engines revving, and frequent construction projects which include an assortment of noise from heavy machinery and tools. Not surprisingly, in his books Future War and Winning the War, Dr. Alexander described using noise as a weapon. In Future War he wrote, "Audible sound, in frequencies from 20 to 20,000 hertz, can be applied to influence behavior, as most people are sensitive to very loud noises."(***)

For instance, if you're targeted, there will be doors slamming for a few moments, several minutes of silence will ensue, then a motorcycle will drive by and rev its engine outside of your house. After that you'll have someone mowing the lawn. Then there will be alarms going off. After that you'll hear a loud crowd of people walk by your house. Then you may then hear fire or ambulance sirens. Then there will be hammering and sawing sounds from the ongoing construction projects. Then you'll hear car alarms being turned on/off in succession multiple times from multiple vehicles around your house. There will generally not be a solid five minutes of uninterrupted peace.

Moret spoke of the use of "noise campaigns" which included the frequent use of garbage disposals in surrounding apartments, vehicles with "blaring horns" and the sirens of fire trucks. She also spoke of habitual door slamming, proclaiming, "they'll slam doors all day and all night long." "Door slamming," agreed McKinney, "is also a popular pastime, particularly in apartment settings." Those targeted may experience a "chain reaction" of door slamming by apartments or houses surrounding theirs. Other types of disturbances include frequent noise from lawn mowers, snow blowers, vehicles with loud exhaust systems, and ambulance sirens, etc. Noisy construction projects will usually be ongoing.

"Blaring horns, sirens, [and] garbage disposal[s]" which are "run concurrently in apartment settings, for excessively prolonged periods of time," are common reports wrote McKinney. She also noted that targets experience frequent "amplified transmissions" of "general racket" which is "used on a recurrent basis under circumstances intended to persuade the individual that he or she is under surveillance." She added, "In all of these cases, the individuals' neighbors apparently pretend to be oblivious and/or indifferent to these sudden, continuous explosions of noise." They're oblivious to the noise because they're complicit in the program.

Also, the people above a targeted individual may loudly pace as they mimic his or her movements from above. For instance, if you're targeted, as you walk into your bathroom, you hear loud stomping from above which follows you into the bathroom. McKinney affirmed, "A number of individuals report that occupants of upstairs and downstairs apartments appear to follow them from room to room, tapping on the floor or engaging in other activities which appear intended to advertise an ongoing surveillance." They'll "pace in their apartment," added Moret, and seemingly to the target underneath them, "it sounds like they're being tracked ... from the apartment above."

If you're targeted, helicopters and small propeller planes may frequently pass over your home. Some of these aircrafts may be low enough to vibrate the room you're in. According to Cheryl Welsh's March, 2003 article entitled, List of Mind Control Symptoms, the use of helicopters is a common tactic reported by targets. Apparently these overhead assaults are used for sleep disruption and to undermine the morale of targeted people.

Welsh is one of only six Non-lethal Weapons experts in the world recognized by the United Nations. This noise may follow you to destinations you frequently visit. Foot and vehicular traffic may be re-routed through your street, causing an unnatural amount of vehicles driving by your house (even if you're on a side or dead-end street). There also appears to be a fleet of vehicles equipped with loud mufflers that groups use specifically for creating noise in the targeted area.

Often, noise will be synchronized with some type of activity. For instance, a target hears an ambulance, fire sirens, alarms, or beeps as they leave. Or as they leave, a small aircraft passes overhead, then as they approach their car, they hear alarms or doors slamming. Noises made as they leave also appear to serve as a form of communication to alert group members in the area to begin pursuit. In addition to the standard noise package, whatever noise would naturally occur in the area you live will also be increased in frequency. For instance, if a target lives in a rural area then noisy chainsaws will be quite regular. And in the winter there may be frequent loud snowmobiles that pass near the area.

In this manner, noise is used as a weapon to inflict pain. Chronic exposure to even low-level noise is considered a health hazard that has been known to produce adverse physiological & psychological health effects. Prolonged exposure to noise can produce high blood pressure, a rise in cholesterol, damage to the circulatory, cardiovascular, gastrointestinal, & musculoskeletal systems. If you're targeted & pregnant or plan on having a baby, you may want to think twice. Noise has been known to cause hearing loss & growth disturbances in a fetus, & can lead to birth defects.

Prolonged stress in general has been known to cause miscarriages, and some who have been stalked and harassed over a period of time have attributed their miscarriages to ongoing harassment. Just as the fabricated cut-offs are likened to getting slapped, these noises are the equivalent of being repeatedly shocked. The creators of this program are obviously aware that these noise campaigns are acts of violence.

Synchronization

Groups will try to synchronize their tactics with things that targets do such as entering or leaving their homes. The target's movements will be synchronized with vehicles or people coming or going, or other movements. These synchronization tactics are often done several times, perhaps three or more. For instance, when the target arrives, two cars will drive down their street, while their next-door neighbor leaves.

If a target has a habit of going to the bathroom at 2 AM and looking out his bathroom window at a specific area, then they will eventually arrange it so that there is some activity such as a light being switched on or someone leaving or arriving in that area. This is an example of the level of detail that they will resort to when tailoring a harassment protocol to the profile of a target.

Synchronization is also used with sensitivity tactics and noise. For instance, if you're targeted, you'll hear ambulance or fire truck sirens the moment you enter or leave your house. Or car alarms, hammering or some other type of noise will occur as you look out the window. As you leave your home, you may notice people walking by, wearing a color or holding an object that you've been sensitized to. If you pull into a parking lot, there will usually be cars arriving or leaving. Synchronization is also used with blocking/crowding. For instance, as you approach a store's entrance, people will be either walking in or leaving. They will often be wearing a color or holding an object that you have been sensitized to.

A variation of this is echoing and mirroring. Like other forms of non-verbal communication, echoing and mirroring are very powerful, (but usually unconscious) ways of interrelating. This form of information exchange has been outlined in the book, Secrets of Sexual Body Language: Understanding Non-Verbal Communication, by Martin Lloyed-Elliot. Most of us speak this language without even knowing it to attract others.

However, this form of communication has evidently been incorporated into this program as a tool to annoy targets. With echoing for instance, if a target is in a restaurant, or on public transportation, and they drink then an informant next to them will drink. If they pull out a cell phone, then the informant will produce a cell pone or similar device. When the target puts it away, so do they. In essence, they will mimic the movements of a target.

With mirroring for example, targets may frequently have a person or group of people walking parallel to them, in the same direction on the other side of a street, or any public area. Also, there may be someone directly in front of the target, and approaching the same intersection that they're approaching. The informants adjust their timing so they approach at the same time, and cross the street just as the target does, at which point crowding may occur. The informant(s) may also be wearing red, holding cell a phone or another device, which the target has been sensitized to. Dr. Alexander and Janet Morris also spoke of the use of mirroring to influence people, in their book,The Warrior's Edge.

 

VERTAALD:


25 maart 2015 OM 22:29



Inleiding tot de Hidden Evil

Nu we begrijpen wie loopt wie deze planeet draait, zal het gemakkelijker zijn om te zien hoe zo'n geheim beleid kan bestaan. Het wordt ook duidelijk waarom geld is geen belemmering. De reden is natuurlijk dat ze het geld. The Hidden Evil, wordt ook wel Gang Stalking, Cause Stalking, Openbare Mobbing, een Electronic Concentration Camp, Covert Oorlog, Mental verkrachting, en een verscheidenheid van andere namen. (*)

Het bestaat uit twee belangrijke componenten. Ten eerste, het gebruik van niet-dodelijke wapens (NLW), die Directed Energy Weapons (DEW) omvat. Ten tweede, zwaar genetwerkte groepen van plain-geklede burgers die gerichte mensen omsingelen in het openbaar. Dit netwerk lijkt vrijwilligers die deel uitmaken van een door de staat gesteunde Neighborhood Watch-programma, maar ook als individuen en groepen van informanten te betrekken zonder officiële aansluiting aan de staat. Zoals ik zal laten zien, is mainstream nieuws aangegeven dat een op de vierentwintig burgers zullen worden aangeworven als informanten. Sommige publicaties beweren dat het doel is de aanwerving van een derde van de bevolking.

Organisaties van het federale niveau naar beneden deelnemen aan de pesterijen, die de lokale winkels en restaurants omvat. Dit programma is niet in het proces van wordt gemaakt, is het al hier. Het is goed ingebed in de meeste grote gemeenschappen. Het gebeurt in alle NAVO-landen. Het programma heeft ten minste sinds de vroege jaren '80, toen families van mensen met een directe of indirecte verbinding met de federale agentschappen werden gericht operationeel in een bepaalde vorm.

Sommige mensen bracht een significant over de tijd het ontwerpen van dit programma. Invloedrijke mensen hebben haar voortbestaan ​​verzekerd. Het is ook bijna onzichtbaar en spoorloos. Sommige van de organisaties die ik heb gevonden waarschijnlijk verantwoordelijk voor de Hidden Evil te zijn, bevatten de mensen die worden beschouwd als onze wereldleiders zijn. Op het eerste gezicht lijken ze hulpverleners zijn.

Het voorwendsel voor het bestaan ​​van dit programma is vermoedelijk te identificeren en te volgen potentiële bedreigingen voor de nationale veiligheid en de gemeenschappen van ongewenste personen te bevrijden. Zoals ik zal laten zien, zijn burger informanten gebruikt om stalken en lastigvallen mensen in andere landen om dezelfde redenen. Magnetron wapens zijn ook gebruikt op dissidenten. Amerikaanse, Duitse en Russische inlichtingendiensten hebben al gebruik gemaakt van deze tactiek. The Hidden Evil lijkt een hoogtepunt van hen, die van wat ik heb geleerd, is verfijnd met de hulp van vestiging Think Tanks zijn.

Julianne McKinney is een voormalig leger intelligence officer en directeur van het elektronisch toezicht Project Association of National Security Alumni, die een organisatie bestaande uit voormalige inlichtingenofficieren zich toelegt op het blootstellen van excessen door de Amerikaanse inlichtingendiensten was. Haar voorlopig rapport, Magnetron Intimidatie en Mind-Control experimenten gepubliceerd in 1991, is een goed gedocumenteerd overzicht van deze activiteiten.

Volgens haar interview op de Republic Broadcasting Network (RBN), zijn deze activiteiten aanzienlijk toegenomen sinds het rapport werd gepubliceerd. Ze bleef deze organisatie operationeel voor vier jaar met behulp van haar persoonlijke middelen. Ze heeft ongeveer 40 jaar ervaring met dit onderwerp en heeft gesproken met en interviewde honderden gerichte individuen. Ik zal verwijzen naar haar verslag en haar interview op de RBN in dit boek.

Dr. Reinhard Munzert, wetenschapper, psycholoog en universitair docent heeft drie boeken en meer dan 100 artikelen geschreven. Hij begon het onderzoek naar dit fenomeen met de hulp van zijn leerlingen na het leren dat hij was gericht. Zijn artikel, Gericht op de mens met Directed Energy wapens, die de nummer een bedrijf op Google werd voor twee jaar, zal worden verwezen, evenals zijn interview op RBN.

Ik zal ook te verwijzen naar het werk van Leuren Moret, in het bijzonder haar interview op Vancouver Co-op Radio CFRO 102.7 FM, op ​​8 augustus 2005. Ze is de voormalige milieu-commissaris van Berkeley Californië en de president van de wetenschappers voor inheemse volkeren. Ze heeft gewerkt bij twee Amerikaanse kernwapens laboratoria als een geoscientist en heeft bijgedragen aan een VN-subcommissie onderzoek naar verarmd uranium. Zij, Julianne en Dr. Munzert hebben op het ontvangende einde van deze pesterijen.

In haar artikel, het blootleggen van de waarheid over verarmd uranium, Moret spreekt haar personalGang Stalking ervaring, die ze noemt het Mobbing. Ze schrijft: " 'Mobbing' is de doelgerichte en strategische institutionele verzamelen van alle informatie over een persoon met behulp van een methode -. Legaal of illegaal Contact voor dit doel is gemaakt met de buren, klasgenoten, ex-partners, familieleden, voormalige werkgevers, leraren, kerkleden, goede vrienden en zelfs uw stamboom ... "

Ze vervolgt: "Alles moet bekend zijn over de steunregeling om je heen, dat maakt je leven mogelijk te maken." Dit omvat, "[het] evaluatie van de strategische middelen en toekomstige inkomsten (financiën, mobiliteit, auto's, verzekeringen, credit cards, veiligheid bankdeposito dozen, postbussen, testamenten, medische dossiers, geboorteakten, afschriften en foto's) is gemaakt zonder . je kennis het doel van mobbing is om de doelstelling individuele uit het werk van kracht voor de rest van hun leven te rijden, hoe groter doel is om hen te rijden naar de uiteindelijke zelfvernietiging: zelfmoord de verzamelde informatie ... wordt gebruikt om. neem je leven uit elkaar ... en om te proberen om je gek te kijken. " Ze voegt eraan toe: "Uw kinderen worden lastiggevallen, ze thuis komen met spullen vermist en verhalen van leraren hen lastig te vallen. '

Het psychologische aspect van de groep intimidatie die in het openbaar plaatsvindt is identiek aan Mobbing; het heeft dezelfde groepsdynamiek. Om die reden zal ik referenties om Mobbing in dit boek. Mobbing fenomeen is goed gedocumenteerd en onderzocht in andere landen al jaren. Het is echter nu pas aandacht gekregen in Noord-Amerika.

Mobbing, ook bekend als "psychologische terreur 'heeft betrekking op de systematische intimidatie van een persoon door een groep mensen op de werkvloer, en volgens de auteurs van het boek Mobbing, ook in het openbaar. In de werkplaats wordt de groep vaak rally door een instantie, zoals Human Resources. Het omvat geruchten, opstellingen, en sketches bedoeld om de doelgroep te vernederen en ze te laten verschijnen incompetent.

De gedocumenteerde mainstream blootstelling die Mobbing heeft ontvangen, zal ons helpen begrijpen hoe duizenden mensen in een aantal grote steden kan worden aangeworven om systematisch te vallen individuen. Mobbing Ik verwijs naar is gepleegd door meerdere mensen met behulp van subtiele maar herhaalde pesterijen, die plaatsvindt op de werkplek en is moeilijk te bewijzen. Het wordt gebruikt om een ​​persoon uit te schoppen van de werkplek of zelfs personeelsbestand terwijl weinig sporen. De logica is dat het minder van een verplichting voor de organisatie als u "vrijwillig" te verlaten dan wanneer ze schieten je. Bovendien hebben sommige organisaties met een sadistische bedoelingen geniet ervan als een vorm van sport intimidatie ook.

Hoewel het lijkt erop dat de Hidden Evil is een nieuw fenomeen is, is het niet. Tirannieke regimes door de geschiedenis heen hebben lokale groepen gebruikt om afwijkende meningen te neutraliseren. Groep Stalking is gewoon een andere manifestatie van dit patroon. Om te begrijpen hoe een heel land medeplichtig aan de vervolging van vermeende ongewenste kon zijn, een studie van de Duitse en Russische dictaturen is essentieel.

Daarom zal het bewijs worden gepresenteerd waarin wordt beschreven hoe soortgelijke programma's van de vervolging werden gebruikt tijdens deze dictaturen, en hoe de VS en andere NAVO-landen in die richting. Tot slot zullen we een beroep doen op de Milgram experimenten, die illustreren hoe de meeste gewone mensen herhaaldelijk onschuldige mensen zullen martelen onder leiding van een autoriteit figuur.

Vervolgen "lastig te vallen of te straffen op een manier ontwikkeld om te verwonden, treuren, of teisteren; specifiek: om te veroorzaken om te lijden ..." -Merriam-Webster's Dictionary

[Voetnoten] * Deze namen zijn afkomstig uit een combinatie van web in de bronnen genoemde sites.

 

Tactics (Part 1)

Er is gezegd dat als je voor het eerst bent doelgericht, ze raken je hard in meerdere richtingen. Vermoedelijk gebeurt dit dus je zult instorten na het ervaren van terugkerende emotioneel geweld, die wordt bemoeilijkt nadat je hebt gerealiseerd dat alle normale ondersteunende structuren en lanen van wrok zijn verwijderd. Er blijkt verschillende intensiteitsniveaus van het programma dat mensen kunnen krijgen. De twee belangrijkste onderdelen van het programma zijn groep stalking en niet-dodelijke wapens (NLW). Beide zijn gewelddadige aanvallen. En sommigen blijkbaar hard geraakt met beide.

Mensen hebben de neiging te associëren het woord intimidatie met daden van tijdelijke verergering of pestering. Daarom kan het niet door de juiste woord om de nooit eindigende daden van geheime geweld toegebracht aan gerichte mensen, wat neerkomt op marteling en moord te beschrijven. Sommige van de tactieken die gebruikt worden in deze programma's zijn borderline-subliminale, dat is waarom ze zo moeilijk op te sporen, uit te leggen en te verdedigen tegen. Het is mijn doel om het onbewuste bewust te maken. Veel van deze tactieken zijn een soort mind-control.

De meeste van deze tactieken zijn gebruikt in het voormalige Cointelpro operaties van de Verenigde Staten, Rusland en Duitsland tegen de burgerbevolking. The Hidden Evil's ontstaansgeschiedenis is uiteraard afgeleid van bekende tactieken zoals valse onderzoek, bewaking, lastercampagnes, het gebruik van geluid, diefstal, inbraak, karaktermoord, geënsceneerd ongevallen, kadreringen, sabotage en vandalisme, post interferentie, zwarte lijst, burger informant squads voor openlijke surveillance (Gang Stalking), vergiftiging en drogeren, opsluiting in gevangenissen en psychiatrische inrichtingen, en elektromagnetische wapens.

Het is een historisch feit dat de VS officieel haar burgerbevolking is gericht op meerdere gelegenheden. Programma's zoals MKULTRA en Cointelpro kan niet worden ontkend. "De naar verluidt gebruikt in deze intimidatie campagnes methoden", aldus McKinney, "voorzien van een opvallende gelijkenis met die toegeschreven aan de CIA en FBI tijdens Operations MKULTRA, MHCHAOS en COINTELPRO."

In Duitsland werden deze methoden zoals vervat in twee programma's, Zersetzung en Richtlijn Perceptions. Ze waren in principe Duitse versie van Cointelpro. Zersetzung is ontwikkeld om een ​​gerichte iemands innerlijke zelf te vernietigen. Tijdens een interview op de Republic Broadcasting Network, Dr. Munzert, een Duitse doel, trok een parallel tussen het huidige programma, en wat er gebeurde in Oost-Duitsland. Hij legt uit: "In Duitsland wordt dit Zersetzung geroepen en dit betekent dat de ontbinding of uiteenvallen van de gerichte persoon."

Schrijver, internationaal jurist, en filmmaker Anna Funder won de vier Samuel Johnson Prize van de BBC in 2004 voor haar non-fictie boek, Stasiland. Daarin schreef ze: "De Duitse wordZersetzung is hard, en heeft geen directe Engels equivalent." Ze beschreef, "Zersetzung, als een concept, heeft betrekking op de vernietiging van het innerlijke zelf. ' Het roept op tot "[De] gerichte verspreiding van geruchten over bepaalde personen met behulp van anonieme [betekent] ... het maken van compromitterende situaties voor hen door het creëren van verwarring over de feiten ... [en] het het veroorzaken van hysterische en depressieve gedrag in de doelpersoon. "

"Richtlijn Perceptions," vervolgde ze, was een ander programma dat is ontworpen om "te ontwikkelen apathie (in de [beoogde] onderwerp) ... te komen tot een situatie waarin zijn conflicten, of van een sociale, persoonlijke, carrière, gezondheid of politieke aard zijn onomkeerbaar ... aanleiding geven tot angst in hem ... om te ontwikkelen / creëren teleurstellingen ... zijn talenten of vermogens beperken geven ... om zijn vermogen om te handelen te verminderen en ... om onenigheden en tegenstrijdigheden te benutten om hem heen .. . "Deze richtlijnen werden gebruikt door de Stasi (MfS) tegen bedreigingen van de staatsveiligheid. Met andere woorden, werden ze massaal gebruikt op de populatie als dictatuur handhaven.

Deze programma's zijn ontworpen om in het geheim te vernietigen persoonlijke en professionele leven van een doelwit, ruïneren hen financieel, en voorkomen dat ze het bereiken van hun potentieel, met de bedoeling om onomkeerbare depressieve en paniekerige gedrag te produceren. What the Hidden Evil lijkt te zijn, is een combinatie van verschillende Cointelpro operaties gebruikt door onderdrukkende regimes op hun burgerbevolking. Het is verfijnd en wereldwijd ingezet. Zoals ik zal laten zien, is het waarschijnlijk een indicatie van de oprichting van een wereldwijde dictatuur.

Verborgen in Plain View

Velen van ons hebben ervaring met boeken waar het doel is om de verborgen beeld in het landschap te vinden. Of het kunstwerk, waar als je kijkt aandachtig, zul je uiteindelijk een drie-dimensionaal beeld bovenop een vlakke achtergrond te zien. In eerste instantie, de meesten van ons had wat moeite het opsporen van deze verborgen foto's, maar met de praktijk we ze meestal zien. Zodra de detectie mechanisme is ontwikkeld, deze verborgen voorwerpen duidelijk zichtbaar met weinig inspanning. Zo ook met de Hidden Evil. Als je eenmaal weet wat te zoeken, deze borderline-subliminale aanvallen zijn vrij waarneembaar. (*)

Dus, in plaats van met een stomp openlijke aanval tegen een volledig functionele persoon, zijn ze meestal aanvallen heimelijk, en verbergen hun pesterijen door gebruik te maken van bestaande evenementen die van nature voorkomt. Er wordt meestal dekking voor de pesterijen ook. Het is echter waarschijnlijk een statistische zeldzaamheid voor sommige thesestaged op gebeurtenissen zo vaak als zij. Ze verhullen veel van hun pesterijen met behulp van wat lijkt op een eenvoudige formule zijn. Van wat ik heb geleerd, de basisformule is als volgt:

Frequentie: Beschrijft hoe vaak een gebeurtenis plaatsvindt. Het gaat ook om de teksten in een enkele gebeurtenis.

Looptijd: heeft betrekking op de lengte van een enkele gebeurtenis. Het gaat ook om de non-stop karakter van de kwelling in het algemeen.

Intensiteit: De versterking van de handelingen, zoals geluid, gezicht, verdringing, etc. binnen een evenement.

Een hypothetisch voorbeeld van een autodeur dichtslaan-event zou dit onder meer: ​​Een buurman komt en twee anderen vertrekken. Als ze de neiging om hun voertuigen is er het herhaaldelijk openen en sluiten van deuren en boomstammen, alarm afgaan en piepen van alarmen wordt ingeschakeld. Deze storingen afkomstig uit gebieden rondom uw huis. Deze kan gelijktijdig gebeuren, of ze kunnen achter elkaar worden geplaatst, direct na de andere. Synopsis

Indien duurde 5 minuten; langer dan normaal (duur). Naast lengte van de gebeurtenis die wordt verlengd, het aantal keren dat elke handeling plaatsgevonden in geval verhoogd (Frequency). Ex: meerdere, herhaalde deuren / trunk dichtslaan van auto's, zelfs als een individu het voertuig. Dit evenement gebeurt ook vele malen gedurende de dag (Frequency). Elk afzonderlijk besluit van de deur / trunk sluiting is versterkt door de opzettelijke slamming tot een harder dan normaal lawaai (Intensity) te produceren.

Het evenement was luider, bevatte meer activiteit (handelingen), en duurde langer dan normaal om een ​​geheime aanval te produceren. Zelfs als een enkel individu wordt aankomen / vertrekken, standaardpraktijk lijkt meerdere slams (romp, achterdeur, bestuurdersportier) zijn. Dit kan worden gesynchroniseerd met uw activiteit, zoals uw aankomst of vertrek. De gebeurtenis kan ook een deel van een Noise campagne bestaat uit een wijziging van andere soorten ruis. Deze fundamentele formule wordt gebruikt met veel van de in dit hoofdstuk tactiek. De frequentie en duur formule wordt ook gebruikt in Mobbing. Naast het overmatig gebruik van een tactiek worden deze tactieken gecombineerd en gebruikt in een rond-de-klok mode, die hun totale sterkte versterkt.

Basis Protocol

Er is een eenvoudig protocol dat zij beginnen die consistent in alle NATO landen. Het begint met de bewaking van de doelstellingen, monitoring van hun privé-leven, en de toegang tot hun huis (inbraak). Dit wordt gedaan zodat hun persoonlijkheidskenmerken kunnen worden gecatalogiseerd. "Er is een fundamentele protocol dat de daders te beginnen", zegt McKinney, "maar de TI [Gerichte Individual] draagt ​​bij aan de wijziging." Nadat ze zijn uitgekozen voor voorstadia van intimidatie, Gang Stalking ontstaat, die McKinney omschrijft als onderdeel van een "verzachtende-up proces." Na een periode van openlijke surveillance (Gang Stalking), worden NLW geïntroduceerd. De NLW intimidatie geleidelijk toeneemt tot extreme omstandigheden. Dit patroon is consistent ontvouwd in alle NAVO-landen.

Dr. Munzert spreekt in principe hetzelfde patroon, dat hij omschrijft als een 'dubbel gevouwen strategie. " "Het is meestal dezelfde procedure, 'kondigde hij aan," maar met individuele variaties. " Een deel omvat de slachtoffers worden "aangevallen met magnetron wapens," en "het andere deel van de strategie", zegt hij, is om de beoogde mensen af ​​te schilderen als "gek [gek]." Hij legde de effectiviteit van deze aanpak als "onverslaanbaar", en laat zien dat dit is in wezen wat de Stasi deden om hun doelstellingen. Een deel van dit protocol lijkt om elementen van Neuro-Linguïstisch Programmeren (NLP), dat is een soort van mind-control gebruikt door behaviorists om verandering te beïnvloeden omvatten. NLP zal worden besproken in meer detail binnenkort.

Sommige van de tactieken die hieronder zijn genoemd Street Theatre, Intimidatie Skits of Geënsceneerde Events. Ze zijn gepland intimidatie skits, zoals het blokkeren of zwermen. Ze omvatten ook informanten die doelen omringen en hebben gesprekken bedoeld om te worden gehoord, die informatie over het persoonlijke leven van het doel bevatten. Vermoedelijk worden burger informanten horen dat dit noodzakelijk is om te laten gerichte mensen die weten dat ze in de gaten gehouden. Dit kan gebeuren in een openbare plaats. Dit is niet een volledige lijst van de tactiek, maar het bevat enkele van de meest voorkomende zijn gemeld.

Sommige van deze tactiek zal klinken krankzinnig, omdat ze met opzet zijn ontworpen om iemand lijkt alsof ze lijdt aan een psychische stoornis. Ze waren zeker gemaakt door deskundigen in de gedragswetenschappen. Daarnaast kunnen mensen emotioneel worden afgevoerd, en niet in staat om goed te identificeren of uit te leggen wat er met hen gebeurt. Volgens de DOJ, mentale tactiek ontworpen om psychische schade veroorzaken moeten duren maanden of jaren voordat ze marteling vormen. The Hidden Evil past deze beschrijving. Dus hou in het achterhoofd, deze zijn Psychological Warfare tactiek die bedoeld zijn om mensen gek.

Mental Health System

De geestelijke gezondheidszorg is blijkbaar wordt wereldwijd gebruikt om gerichte mensen die klagen diskrediet te brengen. Volgens het boek, Journey Into Madness: The True Story van geheime CIA-Mind Control en Medical misbruik, door Gordon Thomas, landen over de hele wereld, waaronder de Verenigde Staten, gebruik hebben gemaakt van de artsen om misbruik te helpen en in diskrediet te brengen mensen vaak om politieke redenen. Het is ook een gedocumenteerd feit dat er samenwerking tussen artsen en de militairen bij experimenten in gevangenissen, ziekenhuizen werden uitgevoerd, en universiteiten op onwetende mensen in Noord-Amerika.

McKinney stelt dat artsen, evenals psychiater en psychologen lijken te verstrekken dekking voor dit programma. Dit is vergelijkbaar met wat werd gedaan in Rusland, waar de vijanden van de dictatuur in mentale instellingen zouden worden gegooid en gedrogeerd onherstelbaar. "De weigering van de APA om de impact van terreur op de menselijke psyche te erkennen, zelfs gezien de publiciteit als gevolg van de bevindingen van de kerk commissie in 1975, doet ernstige vragen rijzen over de geldigheid van de psychiatrie als een beroep in dit land", verklaarde McKinney, "niet te noemen, ethische bedoeling van de APA's, op de lange termijn. "

De DSM is een diagnostisch handboek voor het identificeren van psychische stoornissen. De eerste editie van de DSM werd uitgebracht in 1952 op een moment dat de APA was onder de controle van Dr. Ewen Cameron, die brutaal door de overheid gesponsorde martelingen zouden begaan onder het MKULTRA programma. Dr. Rauni Leena Kilde, voormalig Chief Medical Officer van Finland, schreef een artikel getiteld, Microwave Mind Control: Modern Torture en controlemechanismen wegwerken van de mensenrechten en de persoonlijke levenssfeer. Daarin beschreef ze "The Psychiatric Diagnostic Statistical Manual (DSM) voor psychische stoornissen," als een "briljante cover-up operatie in 18 talen om de wreedheden van de acties leger en de inlichtingendiensten 'in de richting van hun doelstellingen te verbergen."

Dr. Kilde zegt het handboek "somt alle mind control handelingen als tekenen van paranoïde schizofrenie," en dat "alle medische scholen onderwijzen hun studenten dat de persoon is paranoïde, vooral als hij gelooft dat inlichtingendiensten achter dit alles." Tenslotte verkondigt ze: 'Nooit is de medische beroepsgroep te horen dat dit routine acties over de hele wereld door de inlichtingendiensten tegen hun doelstellingen. "

Dr. Munzert zei dat de artsen, "eerst denken aan paranoia en schizofrenie" als iemand klaagt over dit programma. Hij waarschuwt dat hierdoor "slachtoffers" kan eindigen in een "psychiatrische inrichting." Annie Earle, een licentie Clinical Social Worker, en Board Certified Diplomat in haar vakgebied, heeft meer dan 25 jaar psychotherapie ervaring als een onafhankelijke arts. Wanneer wordt verwezen naar de DSM tijdens een interview op de Republic Broadcasting Network, zei ze, "Het heet theDiagnostic Statistical Manual ... [en allen] psychotherapeuten, ongeacht de specialiteit zijn verplicht om hun patiënten een diagnose van deze handleiding te geven, en met het oog om de diagnose moet je aan bepaalde criteria die duidelijk wordt gespeld in de DSM te vervullen krijgen. "

Earle merkte een patroon ontvouwen toen een aantal van de mensen die naar haar kwam die niet passen bij de standaard criteria. "De patiënten die begon te komen naar me echt niet een van de standaard indelingen te passen," legde ze uit. "Bijvoorbeeld, kunnen ze worden met wat sommige mensen beschouwen een psychotisch of schizofreen storing in dat ze misschien vertellen wat lijken te hallucinaties zijn, maar dat ze geen enkele van de andere criteria die gepaard gaat met schizofrenie hebben. Er zijn veel criteria die men moet ... [detectie] in stellen van de diagnose van schizofrenie, en deze mensen niet aan al die criteria. " Blijkbaar Earle werd gericht zichzelf terwijl het bestuderen van dit programma.

Interessant is dat de april / mei 1996 nummer van Nexus Magazine bevatte een artikel getiteld, hoe de NSA lastigvalt Duizenden Law Abiding Amerikanen Daily Door het gebruik van Remote Neural Monitoring (RNM) geschreven door voormalig NSA werknemer John St. Clair Akwei. Er stond: "NSA DOMINT [Huishoudelijke Intelligence] heeft de mogelijkheid om heimelijk vermoorden Amerikaanse burgers of lopen geheime psychologische controle operaties om onderwerpen te veroorzaken te worden gediagnosticeerd met een slechte geestelijke gezondheid."

De DSM lijkt te zijn gemaakt met een maas in de wet die het mogelijk maakt de overheid gesponsorde intimidatie programma's te bestaan. Dit werd blijkbaar gedaan zodat mensen ziek zal verschijnen wanneer dit uit te leggen aan een professionele geestelijke gezondheidszorg. Toe te voegen aan deze verwarring, het programma zelf is ontworpen om geestesziekten toen legde die na te bootsen 'niet-in-the-know. " Geestelijke gezondheidszorg kunnen ook deelnemen aan dit programma, bewust of onbewust door middel van etikettering doelen als geestelijk ziek. Het is een van de verschillende lagen van bescherming wordt gebruikt om te voorkomen dat dit programma werken in het geheim. Het is gemakkelijk om te zien hoe sommige geestelijke gezondheidszorg zou kunnen "overhaaste conclusies."

Toezicht

Surveillance is blijkbaar deel uit van een lopend valse onderzoek dat nooit eindigt. Het onderzoek kan worden gedaan om redenen van "nationale veiligheid." Op dezelfde manier zou de Duitse en Russische veiligheidstroepen vaak richten op de burgerbevolking om dezelfde reden. Nadat een persoon is uitgekozen, zullen woningen rondom het doelwit worden onderverhuurd en gebruikt als basis van de werking en training.

Als het doel woont in een huis, zal de basis meestal het dichtstbijzijnde gebouw aan de woning te zijn. Als het doel leeft in een appartement, dan het basisstation in een of meer van de omringende appartementen. Er zullen ongebruikelijke patronen van de bezetting met veel mensen komen en gaan in deze bases. Voertuigen en kentekenplaten gebruikt door de bewoners van de bases kan periodiek worden gewijzigd. Volgens McKinney en Moret, hebben de mensen die verhuizen naar deze bases in verband gebracht met de DOJ, CIA en andere federale agentschappen, evenals universiteiten, en de overheid defensie aannemers.

"Om iemand het vereist dat de betrokkene onder toezicht worden geplaatst richten," verkondigde McKinney, "zodat hun persoonlijkheidskenmerken, hun vermogen om onderling verband met mensen, hun vermogen tot corruptie of niet-corruptie (die lijkt te zijn een kritisch punt), en zelfs hun religie factoren erin. " De resultaten van surveillance informatie wordt gebruikt om geen ethische reden, "anders dan een intimidatie protocol, dat dat gerichte individu voor de rest van zijn of haar leven zal volgen vast te stellen," zei McKinney. Moret zei dat buren, vrienden en familie zijn vervolgens gecoöpteerd in de intimidatie.

Dit toezicht wordt blijkbaar gedaan met behulp van zeer geavanceerde apparatuur die gerichte mensen kunnen vinden door muren. Deze apparatuur lijkt te worden gebruikt in combinatie met Directed Energy wapens en andere "niet-letale." Volgens McKinney, kan miniatuur microfoons en camera's worden geplant in uw huis, of via de muur infrarood-apparaten kunnen worden gebruikt om uw positie te controleren. The Life Assessment Detector System (LADS) ontwikkeld aan de Georgia Tech was blijkbaar geroepen om mensen die gevangen zitten in puin, lawines of andere rampen te redden. Het heeft een bereik van ongeveer 135 voeten en kan de hartslag en ademhaling te detecteren. Het kan ook worden geconfigureerd om de beweging van een specifiek persoon te volgen binnen een gebouw.

SoldierVision A1, een radar zaklamp, heeft een patstelling afstand van 30 voet en kan de beweging achter een muur van 30 voet op te sporen ook. Deze zaklampen gestaag onderzocht het gebruik van militaire en universitaire testlaboratoria sinds de jaren 1990. Sommige van deze zaklampen scherm beelden in 3D-formaat, kan de ademhaling te detecteren, en kan door middel van, hout, baksteen, gipsplaat, glas en beton te zien. Meer dan waarschijnlijk, het toezicht op technologie die nu wordt gebruikt op doelen in de wereld is veel geavanceerder en niet publiekelijk beschikbaar.

karaktermoord

Targets meestal ervaring karaktermoord die wordt gedaan om hun persoonlijke en professionele leven te vernietigen. Halve waarheden en leugens worden vaak strategisch verspreid in hun leven, en kunnen de basis vormen voor een valse onderzoek. De geruchten circuleerden over mensen zijn blijkbaar niet bekrompen, maar schokkend en weerzinwekkend. Ze zijn CIA of Stasi-type van schadelijke leugens. Sommige van de mensen het verspreiden van deze leugens kunnen zijn kennissen en / of familieleden die zijn aangeworven (voorgelogen, geïntimideerd en gechanteerd) tot het worden van informanten. Meer over de werving van familie en vrienden zullen worden behandeld in de Informanten en motivationele factoren hoofdstukken.

Het Amerikaanse federale politie heeft deze tactiek gebruikt om mensen ze ofwel wilden werven als informanten te vernietigen of die ze wisten dat ze niet kon werven en wilde ik gewoon te vernietigen. Volgens de voormalige CIA-psycholoog James Keehner, "Het was de bedoeling vernielzucht. Ten eerste, zou u controleren om te zien of u het huwelijk van een man zou kunnen vernietigen. Als je zou kunnen, dan zou dat genoeg zijn om een ​​hoop stress op die persoon te zetten zijn, breek hem neer. dan moet je misschien een gerucht campagne tegen hem te beginnen. lastig te vallen hem constant. " Constante intimidatie, gepland vernielzucht, karaktermoord, het vernietigen van relaties, alles gebeurt in overleg met het doel van het breken van iemand die naar beneden zijn een standaard onderdeel van dit programma.

Naar verluidt, de gebruikelijke geruchten over een persoon zijn dat ze een pedofiel, prostituee, terrorist, racistische, anti-government, geesteszieken, drugsverslaafde, drugsdealer, of een bedreiging voor de "nationale veiligheid." Ze worden vaak verspreid naar de buren, vrienden, familie, werkgevers, enz. Een grote inspanning wordt besteed aan een persoon te scheiden van hun vrienden en familie.

Blijkbaar deze gerucht campagnes hulpmiddel bij werving. Dr. Rauni Kilde schreef: "Deception is de naam van het spel, dus rekruten worden verteld onwaar sinistere verhalen van hun slachtoffers om ze gemotiveerd te houden." Volgens CNN, de Stasi gebruikte exact dezelfde tactiek. Zij verklaarde: "Het agentschap is gemachtigd om geheime lastercampagnes te voeren tegen iedereen geoordeeld om een ​​bedreiging te zijn ..." De Russische KGB ook, met zijn enorme netwerk van informanten, zouden hun interne doelstellingen te belasteren.

Deze geruchten kunnen worden vermeerderd door meerdere personen (informanten) achter de rug van een doelwit. Blijkbaar, niet te laten een gerichte persoon zich bewust worden van deze geruchten is essentieel voor hun effectiviteit. Victor Santoro merkte in zijn boek, gaslighting: ". De essentie van het belasteren van uw doelgroep van de geruchten is het dat het niet terug naar hem" How to Drive Uw Enemies Crazy, dat

Sommigen gerichte mensen geloven dat de geruchten worden verspreid dat zij pedofielen. De organisatoren beseffen dat het labelen van iemand een pedofiel zeer schadelijk zal zijn en produceren optimale hefboomwerking voor het verkrijgen van steun van de gemeenschap. Het is waarschijnlijk een van de slechtste geruchten kon starten tegen iemand. De Stasi zou het karakter van hun doelstellingen te vernietigen door ze te labelen als pedofielen ook. Er zijn meerdere tijdschriften en kranten berichten over pedofielen worden lastiggevallen door de buren, en burgerwachten tot het punt waar zij uit de gemeenschappen worden gedreven en gedwongen uit van het werk. Sommigen zijn van meerdere staten gereden.

Een artikel in de Toronto Star getiteld Vigilantes Versus Pedofielen op 8 augustus 2004 geschetst hoe de groep een burger genoemd, Perverted-Justice, campagnes zou beginnen aan mensen die ze hebben gesloten waren potentiële pedofielen bloot te leggen. Dit illustreert de mind-set van sommige groepen mensen die reden om te geloven dat een persoon een pedofiel te hebben. De PJ-groep wordt geleid door Xavier Von Erck (echte naam Philip John Eide), bij www.perverted-justice.com.

Bij een bezoek aan een site genaamd Beschadigde-Justice op www.corrupted-justice.com, ontdekte ik dat meerdere leden van Perverted Justice trauma hebben doorstaan ​​zoals incest of andere vormen van seksueel misbruik en lijden aan een verscheidenheid van psychische stoornissen. De site Beschadigde-Justice verkregen deze informatie uit ledenprofielen die publiek toegankelijk zijn, en gelegen aan de website van Perverted-justitie. En volgens CJ, Eide wordt op de plaat te zeggen dat meer dan 40% van zijn volgelingen deze vorm van seksueel misbruik hebben meegemaakt.

De CJ site heeft ook een aantal zeer interessante message board chats (openbaar beschikbaar) door PJ leden die een kijkje waard zijn. Blijkbaar is de CJ mensen hebben het bewijs dat de leden van PJ hebben gehackt in hun webserver gedocumenteerd. De CJ mensen zijn voor de volledige vervolging van potentiële zedendelinquenten met behulp van de rechtshandhaving uitgerust met de checks and balances ingebouwd in het rechtssysteem. De CJ groep zegt in feite dat, hoewel het PJ systeem lijkt te zijn gunstig, het is zwaar beschadigd.

De meeste PJ "borstbeelden" omvatten niet de rechtshandhaving. Volgens het artikel in de Toronto Star en de CJ website, de vrijwilligers bij PJ in plaats daarvan beginnen aan een niet aflatende campagne om mensen die ze geloven zijn pedofielen bloot te stellen door te bellen met vrienden, buren, kinderen, standplaatsen en verpest persoonlijke en professionele relaties. Dit is vergelijkbaar met wat gerichte mensen ervaren, zoals aangegeven door het gedrag van hun vrienden, familie en collega's. Maar ze nooit verteld over het. PJ wordt genoemd als een potentieel destructieve sekte door de Rick A. Ross Instituut voor de Studie van Destructive Cults, www.Rickross.com.

Het lijkt erop dat sommige PJ leden hebben een psychologische behoefte om krachtig te voelen en te voldoen aan die behoefte door het tonen aan het publiek en hun doelstellingen hoe ze een leven kan vernietigen. Ik denk dat sommige van deze vrijwilligers zijn ziek en hebben latent sadistische bedoelingen, ondanks hun patriottische motieven. Blijkbaar een aantal van hen ontvangt een zieke vorm van genot / bekrachtiging door verpest het leven van mensen, zoals duidelijk door hun chats.

Karaktermoord is standaard. Mijn onderzoek leidt mij tot de conclusie dat het niet verder dan deze mensen zich voordoen als "bezorgde burgers" en roep lokale ambtenaren om destructieve registreren van klachten over een gerichte persoon. Ik ben vrij zeker dat ze dit doen. Deze vorm van "dienstverlening aan de gemeenschap" kan zeer schadelijk zijn, vooral wanneer de klachten afkomstig zijn van meerdere, ogenschijnlijk los bronnen.

Gevoeligheid Programs (NLP)

Sommige van de gevoeligheid tactieken die gebruikt worden door deze groepen zijn borderline-subliminale aanvallen ontworpen om kunstmatig fobieën te maken. Ze zijn kennelijk gebaseerd op Neuro-Linguïstisch Programmeren (NLP). U kunt denken aan NLP als een zeer krachtig instrument dat kan worden gebruikt om een ​​snelle, diepgaande verandering te produceren. De onderdelen van NLP die groepen gebruik maken van zijn ankers en triggers.

Het doel van deze gevoeligheid programma lijkt te zijn voor mensen met schadelijke aandoeningen welke zijn verbonden triggers zoals objecten, kleuren, bewegingen en geluiden conditioneren. Zodra dit is gebeurd, een doel kan worden heimelijk openlijk gewond in het openbaar. Dit kan gebeuren met of zonder bewustzijn van het doel. Zoals ik zal laten zien, dit is bruut geweld.

"Er is een fundamentele protocol dat de daders te beginnen, maar de TI draagt ​​bij aan de wijziging," legde McKinney. Ze beschreef dat een programma "pavalonian conditionering" wordt gebruikt om gerichte mensen naar "emotioneel reageren op een bepaalde trekker." Deze negatieve emoties worden vervolgens 'ingebouwd in het protocol. " "Het is een continu proces," verklaarde McKinney. Moret stemt zeggende: "Ze zullen het doelwit stalken voor een tijdje ... om hen te conditioneren," en ze "in de war en bang."

Zelfhulp goeroes gebruik maken van deze programma's om positieve emotionele toestanden te creëren en verankeren ze aan een beweging, een geluid of een object. Dan wordt de trigger die de emotie zal beroep doen op de klank, beweging, of object. Hoewel dit complex klinkt het is vrij eenvoudig in de praktijk. Het wordt gedaan door het creëren van een piek emotionele toestand, en vervolgens, terwijl in die toestand, verankeren jullie, dat wil zeggen, iets te doen herhaaldelijk. Dit verankert effectief de emotionele toestand naar wat werd herhaaldelijk gedaan.

"Een stimulus die is gekoppeld aan en veroorzaakt een fysiologische toestand wordt een anker in NLP genaamd", aldus O'Connor en Seymour in hun boek Introducing NLP. Ze vragen: "Hoe zijn ankers geschapen?"

 

International TI meeting Saturday 28 May 2016, Rotterdam, Netherlands

To all TIs,

During the last Covert Harassment Conference 2015 in Berlin we have showed a trailer of REMOTE CONTROL, an investigative documentary film by Pedro Barbadillo (you can read the synopsis below).

Pedro would like to record interviews and other material from the TIs meeting. For this reason we invite everyone, who is interested in being part of this film, as well as, also possibly being part of the smaller documentary production by STOPEG Foundation.

The TI meeting will be on Saturday 28 May 2016 in Rotterdam, The Netherlands, location to be announced.

It is important to know that Pedro/STOPEG will be filming during the TI meeting. This means you can be filmed. If you come you agree to be filmed and possibly be in the film(s) and possibly be on internet websites, if you do not want this then DO NOT register for this TI meeting.

The working language of the TI meeting is English.

If you are interested in participating in this TI meeting, then please email us as soon as possible:

Beata Zalewska - beata@xs4all.nl or
Peter Mooring - peterpm@xs4all.nl

Thank you.

Best wishes,
Peter

http://www.stopeg.com
http://www.covertharassmentconference.com

REMOTE CONTROL Investigative Documentary 90' + 52'
by Pedro Barbadillo

SYNOPSIS
Is it possible to hack a human being? It is possible to modify his behavior, alter his personality, read his thoughts, implant dreams, memories or ideas in his brain, make him hear voices or pronounce phrases... force him to act against their will, even force him to commit suicide?

Experts say that, with currently available technology, and the convergence between neuroscience and electronics, this is all already possible. Since the experiments of Dr. Jose Delgado in Yale University, in the 60's and 70's, mind control techniques has become one of the main areas of interest for secret services and the military.

And thousands of people, in the United States, in Europe, and spread all over the world, claim to be victims, targeted individuals, used as guinea pigs, in large scale experiments to verify the effectiveness of these techniques.

Those affected by these non consensual trials are starting to group into associations, demanding official investigations that determine who is behind these experiments. Their stories sound like science fiction, and are often rejected, or ridiculed, but the symptoms they explain corresponds with techniques that have been investigated at some point by scientists, and form part of scientific research currently underway, or carried out in recent years.

Developed by neuroscience labs and research centers from some of the leading universities in the United States, many of this trials has been funded by DARPA (the Agency of advanced research for America's defense) and protected by military secrecy. Many of the patents which have been derived from these investigations are part of the list of the so called "black patents", restricted by its strategic interest, and not accessible for the public.

Undeniable Proof of Gang Stalking

More Proof of Organized Stalking

Gang Stalking of a Pakistani Family of 4 in Sacramento County