Posted by: targetedindividuals | August 28, 2008

Gang Stalking Techniques

 

Gang Stalking Techniques

The following techniques are from the Gangstalkingworld.com website and they relate primarily to gang stalking. However many of the techniques are also used in other forms of harassment, such as mobbing, and Cointelpro.

Brighting

As targets walk on the street, usually at night, civilian spies/snitches will turn on their high beams. This might be flashed once or twice at targets. The idea is to intimidate the target and let them know they are being watched at all times.

Crowding/Mobbing

When the target is in public, civilian spies/snitches will usually try to box the target in. Eg. They will surround the target in a square like formation if possible. They will stand too close to the target, or swarm them.

Directed Conversations

These are conversations that complete strangers will have out in public relating to the target and their personal situations. Eg. They will repeat things a target said in their home, or on the phone. They will let drop very personal details into the conversation, that could only be related to the target.

Eg. Civilian Spy #1. It’s a shame Uncle Ed won’t be able to come.

Civilian Spy #2. Yeah since he died golfing on Saturday.

The target will just have learned of a death of a favored uncle, (possibly named Ed.) while out golfing.

Electronic Harassment

Electromagnetic weapons and frequencies will be used on a target on their homes. The purpose of using the EMF (Electromagnetic Frequency) on targets and their belonging are multifaceted. Electronic frequencies can destroy electronic equipment. Electronic frequencies can be used for monitoring and tracking inside the home, and at work. It can also be used for purposes of sleep disturbance. When those conducting these covert investigations feel that they have psychologically destroyed the target to where they are near breakdown they will start to use these weapons. They will also use these weapons if targets are not going along with their harassment protocol.

Gaslighting

  • Doing little things to try to make the target think that they are going crazy.
  • Coming into their homes, moving their furniture around.
  • Changing clothing that they bought and replacing it with similar, but inferior items.
  • Taking small items and then replacing them later on.Gassing/Poisoning
    Spraying fumes or scents into a targets home. Tampering with their food to make them become very ill.

    Illegal Entry

  • To gaslight the target.
  • It’s used to help profile the target.
  • To set up illegal surveillance.
  • It’s a way to find out intimate details about the targets. This can be used later to set up the target by using people in photo albums, or by directed conversations about things in the targets apartment.Surveillance
    This involves setting up audio and some visual surveillance of the target.

     

  • Bugging the targets phone.
  • Surveillance in the targets residence
  • Listening to cell phone and hard line conversations.
  • Hacking into their computers and learning all about what the target is doing, sites they frequent.
  • This also helps to build a profile of the target, and it’s also used for later psychological attacks against the target.Intimate Infiltration
    This is where civilian spies/snitches will go out of their way to get into a targets life. They will try to form friendships with targets. They will try to form intimate relationships with targets.

    They will get close to people that are affiliated with targets. Years before the target ever realises they are targets they will try to get into a targets life.

    Eg. If they can’t get into your life, but you have a best friend, their new significant other might just be a civilian spy/snitch. The same goes for siblings and the people that enter their lives.

    Isolation

    For this harassment to be successful, it’s important to be able to isolate the target from friends, family members, co-workers and even spouses. To accomplish this isolation many methods are used included, but not limited to: slander, lies, fake files, sabotage, anything that will get the target into a situation where they have no support system. This is important for them to succeed.

    Mail and Email tampering

    civilian spies/snitches will steal your mail. They will delay the delivery of your mail, and they will also make sure that your mail does not arrive. The other thing they are known for is the tampering of email. They will delay email, delete email, and stop email that you have sent from arriving

    Mimicking

    This is trying to copy things in a targets life.

     

  • Leaving when they do.
  • Dressing like they dress.
  • Throwing out the garbage
  • Going to the bathroom
  • Doing whatever the target is doing.This is all designed to be psychological warfare, so that the target again feels like they are under observation at all times.

    Profiling

    Targets will be observed and profiled long before they ever become aware that they are targeted for this sort of harassment. Profiles will be created on targets by:

     

  • Following them.
  • Following people close to them.
  • Breaking into their homes and going through their stuff.
  • Listening to their calls.
  • Hacking into their computers.
  • Gathering information from friends, and family.
  • Seeing where they like to shop and eat.
  • What are their weaknesses?
  • What things do they like and dislike?This will all be used to put together a profile of the target and then to get them into situations for their detriment.

    Random Encounters

    This will be people on the street who you randomly and unexpectedly run into. It looks completely natural and it seems to be a random encounter.

    They might ask for your phone number after engaging you in conversation. Ask you out, or just ask you where you are going. Anything from small talk to lengthier conversations.

    All with the purpose of finding out something about you, or even just getting you to do something.

    Ruined Relationship

    When targets are in a relationship, the civilian spies/snitches will try to ruin that relationship. This could be friendships, family or significant others.

    If it’s a romantic relationship, they will find out what your significant other likes and try to get them to cheat, or leave you.

    If it’s a friendship they will tell lies to come between you. The same goes for family. This is done so that targets will have no means of support, once they do realise that something is going wrong in their lives.

    Sensitization

    This is getting targets sensitive to an everyday stimuli. Eg. Colors, patterns or everyday actions. Eg. Red, stripes, pens, whistles, loud coughing, clapping, waves, keys jingling.

    Eg. Joe will be mobbed at work and as part of that daily mobbing his coworkers will loudly cough at him every time they harass him by calling him names like loser, worthless, lame, demented. They will slander him and have others as they are slandering him show disgust by glaring and coughing at him.

    Out in public they will follow him loudly and obnoxiously coughing at him. When he goes to stores they will get others to do the same. After months or years of this, Joe has become sensitive to this stimuli and it can be used to harass him without the names and the glaring looks. The association has been formed because of all the other harassment.

    Eg. A girl is sexually assaulted and a sock is shoved in her mouth , during the assault. To keep her quite or stop her from pressing charges, the assailant, his friends and family will follow her around and throw socks in her path, mention it everywhere she goes and show her their socks every chance they get. She will get the message they are sending. Because of the brutal attack, she and what’s happened after she is now sensitised.

    Signals/Symbols

    civilian spies/snitches will also communicate with each other on the street by using Statsi like signals. Below are some examples. SIGNALS FOR OBSERVATION

    1. Watch out! Subject is coming – touch nose with hand or handkerchief
    2. Subject is moving on, going further, or overtaking – stroke hair with hand, or raise hat briefly
    3. Subject standing still – lay one hand against back, or on stomach
    4. Observing Agent wishes to terminate observation because cover threatened – bend and retie shoelaces
    5. Subject returning – both hands against back, or on stomach
    6. Observing Agent wishes to speak with Team Leader or other Observing Agents – take out briefcase or equivalent and examine contents.

    Slander

    They will go behind the targets back and tell lies about them. Often the lies will consist of the target being into something illegal, or is someone dangerous, or just needs to be watched for some vague reason.

    Eg. The they will say the target is a prostitute, drug dealer, crazy, terrorist, gay, racist, pedophile, etc.

    Strange Encounters or Street Theatre

    This is running into people that are acting very unusual, or people that are putting on a show or production, known as street theater.

    Eg. This could be as minor as public rudeness, or people acting out a skit or skits for your benefit. There will usually be someone near by to see how you react to it. This is again looking for weakness or reactions. If you show an adverse reaction they will try to embellish on this and use it against you later on.

    Telephone Redirects

    When you make a telephone call, get the name and ID of the person that you are speaking to. Covert Investigations have redirected phone calls. This means that when you dial a number they will intercept that phone call and pretend to be the service or repair person you were trying to call. Eg. If you call the cable company, gas or phone company be sure you know that it’s actually them that you are speaking to.

    Theft

    Breaking into a targets home and taking small items, usually nothing of value. However there are exceptions to every rule. Perps will usually try to see what they can get away with.

    Tracking

    The targets are tracked by various methods.

     

  • Targets are tracked on foot by foot soldiers.
  • They are tracked in their cars.
  • Targets can be tracked by using their cell phones, laptops, and other electronic devices. If their cell phone number is know, there are Internet programs that will track a target to within a few feet.
  • GPS tracking on their cars. These are all ways that targets are tracked where they go and their activities monitored.Vandalism
    If the target owns property this can be as simple as broken door handles, knobs, to actual slashing of tires. They will also break in and do small damage to items the target owns. Eg. If you buy a new sweater, they might break in and cut holes in it. Holes in undergarments.

    If you go to a store to get a repair done check for damages. This goes for boots, and coats. Eg. Zippers and the heals of long heeled boots.

    Wrong Number Calls
    Targets will daily get wrong number calls. These can be automated or they can be persons pretending to be wrong number calls. Civilian spies will use this as a means to monitor and psychologically harass targets. They want to know where the target is at all times.

  •  

    Advertisements

    Responses

    1. Hi gangstalking,

      I had linked your new and improved targeted individuals website to find it is gone and only the old one is up. I just linked to this blog. I really liked the new site. Where did it go?


    Leave a Reply

    Fill in your details below or click an icon to log in:

    WordPress.com Logo

    You are commenting using your WordPress.com account. Log Out / Change )

    Twitter picture

    You are commenting using your Twitter account. Log Out / Change )

    Facebook photo

    You are commenting using your Facebook account. Log Out / Change )

    Google+ photo

    You are commenting using your Google+ account. Log Out / Change )

    Connecting to %s

    Categories

    %d bloggers like this: