Gang Stalking World

United we stand. Divided they fall.

Revamping the informants

Revamping the informants
(The informant system does not want to be sued)

The informant system and the study of it is truly interesting. also the informant system does not want to be sued. Recall, I first begun this journey, trying to discover what was happening and occurring to Targeted Individuals, and why they were being Gang Stalked. Upon discovering it was not ‘Vigilant Gangs’, or what have you, the investigation turned to the Threat Assessment Team files, informant system, agency operations, and Remote Neural Monitoring, Mind Control, Electronic Harassment. A world of light, and I do mean light research later, I am clear that there is so much more to this, some stuff, that can not be blogged about at this time, if ever. In the mean time, what can be blogged about is this, the informant system that is out there, as it relates to society as a whole, does need to be revamped.

There are legitimate situations occurring, such as, well this person has a marker, medium risk, and at this time we feel only to be seen or viewed in pairs. That situation, should only be for a specific amount of time, the person should be reviewed, and not deliberately provoked on an ongoing and reoccurring basis, to ‘keep the case, files going’. Such a waste.

The informant system in the background, and other sources are responsibly keeping such things going, deliberately provoking, banging into people, giving instructions to the local informants, who could be anyone, cause people are getting onto the actual informant system, for simple things, and then they do what they are advised or bidden to do, even if it’s harmful or detrimental to others. Tell lies, bang into others, accidents, and a thousand other perversities.
http://gangstalking.wordpress.com/2009/03/01/rachel-hoffman-deadly-
dealings/

http://gangstalking.wordpress.com/2010/10/14/throwdown/
http://www.november.org/stayinfo/breaking09/Attica_Informants.html

http://www.snitching.org/2009/11/recruiting_new_informants.html

Agencies also play a deliberate role, some of which has been previously documented. I am going to post a clip from Control Factor, and then the case of John St Clair Akawi, Vs NASA,    Part2  then the DT Stockton documents, and you can read up a bit more about what individuals are capable of. Once a person is listed for monitoring, a variety of sources, can enter their situations, even without a Threat Assessment File, some have these situations ongoing. Part 2

https://www.youtube.com/watch?v=LdyOOyUVopM

Control Factor. =In the movie he is speaking or talking about evoked potential, and how the human brain has been mapped, and how we can be manipulated, or controlled at a distance. This movie is worth watching, that is what can be mentioned. Please see previous articles, Robot Sentient Research Project.

Responsibility

I want these individuals, that are a part of these mini, conspiracies to be eligible to be in the incorrect situations, doing the incorrect things, meaning, I want them to be responsible for their actions. I also want a modicum of world peace, but that is unlikely to occur, or happen, at this moment. Instead, charging each person, and affecting them financially, when they are part of these mini conspiracies, isn’t the incorrect thing, but charging each informant, is a waste of space and time and energy. Most are just doing what their handler told them, or what the police chief told them, or what their parole officer told them, and so forth, and on, and on it goes. They take directions, primarily. So enable those giving the directions, to be a part of the process. Yes indeed. The handlers want to have them systemically destroying someone’s life, that’s fine, enable them to be included. Won’t want them to feel, left out.

The handlers can take individual responsibility, right back to the local informants, monitoring units, what have you. Then you can also at times go even one level deeper than the handlers, and sometimes, all too often that is where the problem lies, but that is also where the funding lies, and the means to continue these operations. If you can’t go after them morally, or ethically, and you can, but it takes time, go after them financially instead.

The revamp of these situations needs to occur. The laws can all be passed, but without reinforcement, laws at times are useless. Fines and penalties, might be the way to go. As it is now, these informants do the dirty, often what they are directed, then they get protected at times, other times they are asked to take the fall. It’s a serious waste of space.

Revamp the system, include the fee, fines, penalties, but then act on it. When the individuals giving the directions, the ones that are directly correlated, when they are exposed, asked to pay their fines, and fees, then maybe it will make sense.

That’s what I think needs to occur, that’s part of my feedback, and recommendation for this system.

July 7, 2013 Posted by | Awareness, CIA, Citizen Informants, Gang Stalking, Informants | , , , , , , , , , | 2 Comments

Murder in the highest degree

So I am in this interesting situation.

A young person arrived to me for assistance, in the course of the assistance/investigation, it became the most interesting time in human history.

He’s basically saying it this way, he’s been ineligible to be in the correct situations, doing the correct things, he’s being forcefully, violated by someone in his situation. The situation is ongoing live, and at the Robot Sentient Research Project.

He’s advised that he’s being used by several different high prominent
individuals, he’s advising however that in addition to being used by these
individuals in such an abusive manner, that he is also being trained, turned
into, not just one of the biggest animals on the face of the planet, but he’s
also being asked to become a Manchurian candidate, and to take out someone
who is going to be in a e situation soon.

The young person is bright, intelligent, articulate, and was in the incorrect
situations about two weeks before he arrived to my attention, by that time, they had placed him into the incorrect situations, doing the incorrect things, to the stage it never made sense. He basically was raped, beaten, molested to the stage, he agree, to be in the correct situation, incorrect situations willingly, if you can call that willing.

During this time, he was asked, to become an animal and to violate others,
after first being violated live, the events that occur at The Robot Sentient
Research Project are evidently going live, so after raping him there, they had
individuals in his environment, according to what he has advised, do similar, until he agreed to do some of the worst things. He is one of the most
beautiful persons, but inside, he advises he’s become an animal.

He’s advised he does not wish to become the next Paul Bernardo, or Hannibal
lector, he doesn’t want to be raping, or molesting children, or adults, Eye the
rub, the young person is from a well connected, semi well to do family, they
aren’t eligible to be in the incorrect situations doing the incorrect things, I met him, when he was being inaccurately diagnosed, he at something called The Robot Sentient Research Project, and he’s advised this, but they refuse to
listen.

What he can say is that before he’s drugged, and forget’s himself, and what he
wrote, he’s remained something behind for me to locate, and that’s where it
get’s interesting. He want’s to be out of the situation that he’s in, does not have
the financial means, but finds the situation to be abusive, it’s not even that
however, he does not want to become that sort of animal, and he wants to be
free, he sending the information out, but he’s in this situation.

See when you are the Kings, daughter or son, you can be in the incorrect
situations, doing the incorrect things, or they can be, and no one ever wants to believe, what if he’s the son of a king, prime minister, or president, what then?

He doesn’t feel that he can be in the correct situations, and he’s scared. They
will do just one thing, and that is attempt to place him into the incorrect
situation, doing the incorrect things. He’s asked for assistance, and within the
parameters the guidelines, it’s interesting what to do. He does not wish to become the next Paul Bernardo, or Hannibal Lector. He wants to be placed into the correct situations, doing the correct things, he has a fine mind, and he remained the information, so that if he was not found in time, before these events transpired, then at least means and measures could be taken, to place him into the correct situations, doing the correct things.

During the course of the assistance/investigation, however this is what I am
clear on, someone in a prominent position, is trying to use this young man,
they are asking him to murder a specific child. Literally murder a specific
child. The information is being relayed, but since some of the details, are at
the fore mentioned location, it’s hard to say what will become of it.

The so called, Duchess type person in question, is there with her friends, let’s
just call them, hugh, rose, chadwick/(Charles-Andrew), Richard, (Ralph,
Micheal A, -These two are not exactly friends, however one is the so called
case worker, but he’s a known child molester, the other is the male parent of
the little boy they are asking to have ritually murdered.), The female is
advising this young man, to just go and visit the child, to take him to the
incorrect location, a forest in this case is being mentioned, and to rape and
murder him. Because the information is being remotely accessed via new
technology, it is not eligible to be in the incorrect situation, but it’s difficult at
this moment and time to place it into the incorrect situation.

To gather evidence in doing this research, I am going to see if I can access
something called the if this crime should be committed records for this little
boy, where the conspiracy is still ongoing, and his if this song should be
committed, same with the young person who brought these situations to my
attention.

The Office, a Threat Assessment Team office of some sort and variety is going
to be utilized in this case, and the information will first be remotely
investigated, and then hopefully forwarded to the correct individuals, whoever they are.

Because of this young man’s circumstances, he’s in a difficult situation, the
young boy he was asked to go after, in addition to everything else he’s being
asked, or in part forced to do, are not eligible to be in the correct situation,
doing the correct things, it’s literally one of the most interesting times in
human history.

This person that’s orchestrating it, lives in one location, she seems
determined to use some aspect of this young boy’s spiritual access, or profile, for her own purposes, she has a child arriving, and she seems to want to use something spiritually that belongs to the young boy, as weird as this sounds, this is something that has been previously reviewed/investigated/ or looked into.  Information accessed this way is new, and interesting, but fully eligible.

The technology is eligible, and has been used to open up case files spiritually,
and it’s been mentioned, or advised, or the face of the planet, because the
technology does keep a record, or crimes about to be committed, talking pre-
crime, but it’s unknown to the vast majority of the general public until now.

What I can say is there are some truly evil individuals in the world, in so
called high places, when you hear the conversation that was placed up, or
pulled up in the course of assisting him, or reviewing, or investigating the
whole thing, they think nothing of murdering this child, it’s like an everyday
conversation, they think nothing of his humanity, and I have to admit, after
hearing it, I don’t think much of theirs, but I am trying to stay neutral, and
forwarding the details to the correct sources, based on the methodology that
is currently in place for breaking these types of stories/situations/scenario’s,
what have you.

It’s literally the most interesting time in human history. My role yet to be
determined, but there are truly some interesting, yet horrific things happening behind the scenes.

July 3, 2013 Posted by | Conspiracy | , , , , , , , , , | 1 Comment

Alternative Justice System

Alternative Justice System

More on the Threat Assessment Teams, and the Alternative Justice System. Ok so I have been looking into what’s happening, and I have been able to discover some interesting things, in addition to the Threat Assessment Teams,
that are there, within or just outside of that structure is another structure, an *Alternative Structure, but they may as well be the same.

The Threat Assessment Team have local people for each area who do the local monitoring, the monitoring teams. In my case the people are basically the lowest common denominators, they try to file false reports on a regular basis, and the structure they should use to evaluate the individuals in the situation, they manage to manipulate, or obstruct to the stage that they can keep the files or cases going for years at a time. The little they make for their efforts are often not worth it, thus why targets might get home break in’s and other items stolen, they are often not the most qualified, however they are the lowest common denominators and these are the individuals that they have in people’s lives and livelihoods.

Along with listing people as Mentally Ill, the Men in our communities and sometimes women as child molesters, Women as prostitutes, etc, they have also started to trend with falsely listing Targeted Individuals as HIV Positive when they are not. Trying to make people look like they are thieves (stolen credit cards) is another one that I have come across, it’s been fascinating research, on just how low these people are, and how truly scummy they are. Ralph, Lisa, this
goes out to you.

That’s the normal local monitoring units, which get assigned by the Threat Assessment Teams, in addition to this, the teams which are required to keep their distance, have instead been making contact with an underage minor child. The child is honestly able to receive instructions from the people in the situation, and follows the instructions, without knowing any better.

What’s been discovered recently is that one of the males in the situation of being on the local monitoring teams, is honestly also in the background, giving the underage minor child, and I do mean underage minor child explicit
instructions.

*(These people have one goal, one desire and it’s to get the children into the informant system as soon as possible, they honestly run interference in the lives of children, possibly even yours, that’s important to know, and understand.)

http://www.whale.to/b/stockton.html

I posting a link to this report, I can’t vouch for everything in the report, or even anything, but some aspects are correct, such as the majority of people being on the informant system, and who get’s let into specific countries.

The Alternative way the System works, which masks itself within or just outside of the Threat Assessment Team, but Mike who is more of a head hunter specifically hired by a company to insure the person stays in the incorrect situation, and that the incorrect situation keeps happening. The exact same structure is used, and it’s used on all the informants. I have been abel to access the hearing frequency that’s used for these people, and they get instructions when they are on the streets, the people are idiots mind you, but they do follow orders.

The video is the closest I could find, but it’s good enough. The loser in the situation here, works by telling them to bump into the Target, we just want to see the persons reaction, they are being evaluated, we just want to ensure they don’t react, meanwhile, you would have to be a complete idiot to go along with it, but on a given stroll, when you can hear this stuff, the people follow what they are being told, walk too close, just brush up, we just need to see a reaction.

What I have been able to discover is the guy behind this portion of it, is a head hunter hired by a previous company that I worked for, and has been hired to be in the situation, until I am removed from mine. The investigation is going really well, they are complete lowlifes. They are everything mentioned and more. Even without this specific scumbag, the local monitoring units, and their unit commanders are often the worst people at times, and they are people that have been on the informant system in most cases for years and years.

One of my neat discoveries is that they serious want to do something unsuitable to me, because I have specific items in my possession that they thought would belong to them someday. (They literally think that if I am not in the picture, they will be able to rob blind some items I possess. They are the lowness that me, and so many others did not need in our situation.) They make very little doing this, and so if they can steal, destroy our items, or just plot to steal them, they feel very good able themselves. I despise them with everything that I have, there is no other way to say it, when you truly
discover just how disgraceful, and low these creatures are that they put into people’s lives. (Again keep in mind that not every informant is low, and not everyone on the Threat Assessment Team is low, some are there to do a credible job, but the ones that get assigned all too often, are not the correct sort of people and they don’t do the correct things. I want to see the whole system get revamped if I could.)

Conspiracy is still the word, but if you understand how the system works a little bit, it all at times can seem perfectly normal to an outsider, who doesn’t take the time to look a little bit closer for the truth.

*(Alternative in the sense that the person has a specific alternative agenda, and uses methods within the structure.)

May 10, 2012 Posted by | activism, Awareness, Citizen Informants, Community harassment, Conspiracy | , , , , , , , , , , , | Leave a comment

The Dark Monarchy

Best Script I Ever Read

The Dark Monarchy is seriously the worst script that I have ever read. It sort of takes place in an alternative type of universe, so everyone is sort of different than they are suppose to be, you basically have all these rich society types doing the incorrect things to everyone all the time, and no one is the wiser, and if they are the wiser they either go along with it because they have their own dark secrets to protect, or they are removed before the truth can ever come to light.

You have a bunch of weird subplots that are also happening, and this faux rich family that’s at the heart of everything. OUtside they appear to be rich and famous, but behind the scenes they are a mess, their lives are falling apart, they are sick with just about every disease on the face of the planet, and they are always being blackmailed, or blackmailing everyone to keep their dark secrets.

At the heart of the subplot is the main character, the young four year old god daughter *(Chase Van Busen) of this Paul Bernardo type character, who is being badly molested and abused every way possible by two of the characters, sort of these Karla Homolka, and Paul Bernardo types.

http://www.canadiancrc.com/newspaper_articles/CBC_A_First_Look_Karla_The_Movie_12AUG05.aspx

It’s a little like eating popcorn as you are reading it, the characters are as dark and twisted as they are suppose to be beautiful and glamorous. You have these unbelievable type situations happening, where most of the main
characters are working in a the prostitution industry, behind the scenes in some way shape or form, to help keep up appearances and stave off the blackmail that seems to keep happening throughout the series.

One of the main characters a Duchess we find out throughout the series literally slept her way to the top, to get into the position that she is in, but not only did she sleep her way to the top, but at some point in the series you find out that behind the scenes she was a call girl for hire, and was really servicing most of society in the background to get into the
situation. The plot is one of the most delicious ones I have come across in a really long time. It get’s delicious because the young Duke who is a complete psychopath behind the scenes discovers this dark secret, and finds out it’s something that was known to everyone but him, he then goes on this dark quest to eliminate anyone in the society who can prove this secret. In the mean time he is filled with his own dark secrets, including his inappropriate relationship with his young charge Chase.

As people discover these secrets, whom they can’t eliminate, they either blackmail or pay off, and in the middle of this is a young, vulnerable innocent little girl who is a the heart of this darkness, throughout the series you wonder if anyone who comes across the horror of what’s happening to Chase Van Metsem will ever do anything to protect this young vulnerable girl. The character at first reminds me of the Claudia type from interview with the vampire, until you realize this is a truly innocent person, being made out to look like a maid up doll, and made to seem much older than she
actually appears to be.

http://www.myspace.com/immortal_doll_claudia

http://celebrity-updates.weebly.com/1/post/2012/02/actresses-who-have-played-vampires.html

The characters that come and go in her world, are the same, pretty almost effulgent looking on the outside, but on the inside they are all dark and twisted, and all end up being a part of this dark and evil twisted sinister plot, of deception, and heartache for an unsuspecting child, and society at large.

The part of the plot that’s interesting is that in addition to blackmailing their enemies, socially eliminating them, or just plain murdering them, they also use these hired Threat Assessment Teams to remove their enemies from their outcomes. They are literally able to use their power, fame and influence to frame innocent people, that’s one of the parts of this dark twisted drama that’s most interesting. So throughout the series you have these innocent targets of these twisted individuals who use this system that’s in place to quietly, and systemically get rid of innocent people in the background, who have either come into contact with their dark secrets, or

who are going to be coming into contact with their dark secrets. Behind the scenes just about everyone sleeps with everyone else, some for personal reasons, some for revenge, some for blackmail, and some because they are being forced to work behind the scenes men, and women to keep their dark secrets. The plot is heartbreaking as it is delicious, when you realize that most people who come into the situation will never realize the truth in time to do anything suitable, or if they do, they often lack the fame, power, and the same social influence to do anything truly influential. It’s the most delicious plot every created in history, and it’s part of the darkest storyline you can imagine, because while the world falls in love with the outer facade of those in the situation, the inner world is this dark twisted labyrinth, that very few people get out of alive.

 

*(Chase is listed as Van Busen and Van Metsem at times throughout the series, background on this is that she ends up being a part of  two fairly influential families.)

May 6, 2012 Posted by | activism, Awareness, Children, Citizen Informants | , , , , , , , | Leave a comment

Personal Identifiers work

My personal identifier made my life easier. If you have not done so, do so now, set up your personal identifier. Just say “I want to set up my personal identifier.”

http://gangstalkingworld.com/personal-identifiers/

I was able to confirm that satalight vibrations are being used as a tracking tool to confirm location. I was able to confirm some of the information that was sent out about me.

The threat assessment teams use to be able to open files for the most trivial things, and now you can request that those doing the local monitoring of your file, have a personal identifier, as well. Also it’s a bit easier to confirm what’s being written when and why. Also keep in mind that these Teams can mislabel individuals, Eg. Putting someone on an international terrorist watch list, because they linked to a third party website, are just some of the things these teams have gotten away with in the past.

I would go into more details, but my recommendation is to try it for yourself, and see how it works. Basically if you are being targeted, request a personal identifier for yourself, and suggest that those around you have one, especially if they are still on a Threat Assessment watch list.

December 12, 2011 Posted by | future, Gang Stalking, Gangstalking, Personal Identifiers | , , , , , , | 6 Comments

Cold Case

http://gangstalkingworld.com/Forum/YaBB.pl?num=1290674350/0#9

Three years ago I heard the story of a young mother that stabbed her two children in a gas station bathroom. She only a few days before had spoken out about a neighbour stabbing her younger brothers dog to death, and then within days had stabbed her own children to death. When I heard the story at the time. I firmly felt that it was a case of Gang Stalking. I didn’t know why, I really had very little proof to go on, and very few details were forth coming in the case, well three years later, I have many more details and I feel there was a good chance she was on a Threat Assessment Hit List.

I recap with the link to hightech harassment. One of the things the site talks about is how many times parents especially it seems mothers are tricked into killing their children, via external voices.

http://www.hightechharassment.com/

[quote]

The sonic harassment technology in addition to tricking people into believing their house is haunted can be used to trick a mother into believing that she is speaking directly to God. A mother claiming that she received instructions from God to kill her children is easily accomplished with this classified sonic harassment technology. Secret police living in a neighboring house to the targeted mother can use the technology against the mother and trick her into killing her children. The targeted mother will be carefully screened by the surveillance conducted by the agents before being selected to have the sonic technology used against her. Usually a mother with a history of mental illness is selected.
[/quote]

At the time I felt that there was more to the story of why she killed her kids, when she had just days before spoken out about how horrible it was for someone to kill a dog.

The story that I found is that of someone who worked for the postal service, the court trials claims that she lost her job due to problems with her co-workers and paranoid delusions about them. Where these the same time of paranoid delusions that Yvonne Hiller was having?

http://www.themorningstarr.co.uk/2009/01/08/mad-woman-escapes-jail/

[quote]

The court heard evidence from two psychiatrists who both agreed that Ms Hawes was suffering from schizophrenia. In early 2007 Ms Hawes began having paranoid delusions about her work colleagues which eventually led to her losing her job. She was prescribed anti-depressants in July 2007 but her paranoia increased and she began to hear voices which were controlling her actions.

In the days leading up to the double murder Ms Hawes was traveling around the country with her two children because she believed she was being pursued by something or someone. On November 29th 2007 she took a kitchen knife from her home and fled with her two children, when she reached a convenience store about a mile from her home she began to hear voices telling her to kill the children.

“I didn’t want them to have to run anymore,” Ms. Hawes told her psychiatrist. “I was trying to protect them … to stop them from being chased.

“I heard voices in the bathroom telling me to stab my kids.”
[/quote]

The post office is notorious for people going postal. My strong suspicion is that Hawes was placed on a Threat Assessment List for monitoring. She was likely given a level 3 or 2 threat level and thus her Gang Stalking and Electronic Harassment would have been peek. Level 2 being almost the highest level. This would have mean active monitoring, and everyone around her being alerted, it would have also meant that people would have been actively following her around, maybe even harassing her, irregardless of her having the two children in her possession.

This would corresponds with her fears of being on the run, and arming herself because she felt someone was out to do her harm. The voices might have been internal, but they could also have been very external and technology based, telling her to kill her children. This might help explain how she was able to so radically change and kill her children just a few short days later.

http://gangstalkingworld.com/Media/2010/11/threat-assessment-101/

[quote]
PRIORITY 2 (High Risk): Poses threat of violence or self-harm but lacks immediacy or access to target. Requires active monitoring and case management plan.

PRIORITY 3 (Moderate Risk): Does not pose threat of violence or self harm, but exhibits significantly disruptive behaviors and/or need for assistance. Requires active monitoring, case management plan, and appropriate referrals.
[/qutoe]

Can I prove this is what happened? I might someday be able to prove that she was on a Threat Assessment List and thus followed around. I don’t know if I will be able to prove that remote neural monitoring in the form of voice to target transmission was employed, which helped and encouraged her to murder her two innocent children.

In any case Hawes has been written off as another Paranoid Schizophrenic, who was hearing voices, had paranoid beliefs and killed her children. No further investigation or evidence needed.
http://i296.photobucket.com/albums/mm190/projectnewera/jeanettehawes2.jpg

Let’s not forget the two innocent lives that were lost, if there is more to this story, we owe it to these two kids to find out the truth.

November 25, 2010 Posted by | Awareness, black, Black female, black women, Children, Community harassment, community mobbing, Conspiracy, Female, Health and Safety, Minority women, Monitoring, paranoid, society, State target | , , , , , , , , , , , | Leave a comment

Randy Quaid. Gang Stalking Target?

Randy Quaid is claiming to be a target of what he calls Hollywood Star Whackers.

He claims that other stars on on a similar type of hit list. Stars such as Britney Spears, Mel Gibson, and ofcourse Lindsay Lohan.

Randy Quaid claims that he has been followed around, and that he has been scammed out of money by lawyers and others. He claims not to be mentally ill, and that close friends such as Heath Ledgar, and David Carradine, were killed not by accident, but as part of a conspiracy.

The claims sound almost too outlandish to believe, but if you did a bit deeper into the story, a pattern starts to immerge.

I don’t know about Hollywood Star Whackers, but I do believe that Mr. Quaid is in fear for his life, and he could well be in some kind of danger. He says he has been harassed for at least the last 20 years. This is what I think is going on.

I think Randy and wife Evi at some point in their past likely landed on a list. Eg. Under occupational health and safety laws, you can be placed on a monitoring list via what’s called a Threat Assessment Team.

The team will contact those around you and explain why you have been flagged. Unfortunately this type of monitoring can also systemically destroy your life. This is the part that leaves many claiming conspiracy.

A lot of people are on these lists, some who should be there, many others who should not. I think what the Quaids should do is hire a lawyer, one who is familiar with privy laws, occupational health and safety laws, and mental health laws.

From what I have read the downward spiral really started after 26 of his co-workers complained of verbal and physical harassment. Claims such as this in today’s society get reported, and this can get you placed on one of these lists by the threat assessment teams, and it can also serve to blacklist your life. The other sad reality is that people on these lists die, because the monitoring often crosses the line to targeting, and a conspiracy of sorts.

I don’t know for sure if this is what’s going on with him and his wife, but I do have a strong suspicion that this is the case. The targets of what I just described, refer to this as Gang Stalking. You can read more about threat assessment teams and Gang Stalking at this link.

http://gangstalkingworld.com/threat-assessment-teams-gang-stalking/

Follow the information about the Quiads here.

http://gangstalkingworld.com/Forum/YaBB.pl?num=1288343965/

To learn more about this phenomenon you can visit Amazon.com

Closing The Gap

Closing The Gap: Gang Stalking

Closing The Gap: Gang Stalking

Buy from Amazon

Bridging The Gap

http://www.amazon.com/dp/1441448845/

I know many do not yet take the concept of Gang Stalking seriously, many others live it every day and know all too well the conspiracy does exist. Being on these lists are leading to individuals being targeted systemically. In many cases the systemic targeting ends in death, suicide, institutionalization, jail, or social poverty.

This is the time that Targeted Individuals can now make a difference. November is Indigo Ribbon Month, it is the time to raise awareness of what is happening. http://www.IndigoRibbon.com

Only by sharing our stories one by one, till they can no longer be ignored can we get this exposed. When you can name it, then you can claim it. Gang Stalking sites have been working tirelessly to expose this conspiracy, with the help of those around us, this can be exposed, and the needless suffering of innocent Targets can hopefully stop, or be curtailed.

October 29, 2010 Posted by | Gang Stalking | , , , , , , , , , | 2 Comments

Gang Stalking and F.O.I.A.

Gang Stalking and Freedom Of Information.

I put my sleuthing brain to the task and this is what I came up with. It’s a bit of a data dump right now, but I wanted to get the information out there.

http://youthviolence.edschool.virginia.edu/threat-assessment/pdf/college-threat-recommended-practices.pdf

http://www.nabita.org/docs/whitepaper_risk_mitigation.pdf

4. Threat assessment files should be maintained in the law enforcement or security records of the institution rather than in the subject’s educational records or employment records.

5. Threat assessment files should be protected for security purposes as investigations of possible criminal behavior. The release of threat assessment information could jeopardize efforts to prevent an act of violence and it could disclose practices that nullify or reduce the effectiveness of threat assessments in future cases.

Because threat assessments are essentially investigations of criminal behavior, most, if not all, of the records created by a threat assessment should not be eligible for release under the Freedom of Information Act (FOIA). Reports generated by the threat assessment team may be exempt under Va. Code §§2.2-3705.2(4), 3706(F)(1)(3), and 3706(G)(1). A response by the team that includes a criminal arrest and prosecution may be exempt from release pursuant to Va. Code §2.2-3706(F)(1) and (3). This protection from disclosure applies to records generated by the threat assessment team for threat assessment purposes.

Records obtained from other sources, such as student academic reports, employee records, or medical records, should be protected under existing laws and regulations regarding redisclosure of protected information. For example, student scholastic records maintained by a university may Virginia College Threat Assessment 21
be exempt under Va. Code §2.2-3705.4. Employee personnel records may be exempt under Va. Code §2.2-3705.1.

The Office of the Virginia Attorney General has provided guidance to the Department of Criminal Justice Services on the exemptions from FOIA that apply to threat assessment records, but recommends that each threat assessment team consult with its own institutional legal authorities. It would be desirable if the General Assembly would pass legislation that specifically excluded the records of threat assessment teams from FOIA release.

6. Institutions that do not have an internal law enforcement agency may designate a particular office or school official to maintain threat assessment records. In all cases, threat assessment records should be regarded as law enforcement/security related records, even if the person in charge of maintaining the records is not a sworn law enforcement officer. The person designated as the campus safety official for the purpose of fulfilling Clery Act requirements may be appropriate.

7. The creation of a threat assessment file will not prevent use of other records according to existing practices. For example, disciplinary actions that would ordinarily be included in the subject’s educational or employment record should continue to be placed in those records. Incidents of threatening behavior that would ordinarily be recorded in an institutional file, such as an employment record, should continue to be placed in those locations.

G. Health Insurance Portability and Accountability Act (HIPAA)
1. According to the U.S. Department of Education, HIPAA does not apply to education records: “The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a law passed by Congress intended to establish transaction, security, privacy, and other standards to address concerns about the electronic exchange of health information. However, the HIPAA Privacy Rule excludes from its coverage those records that are protected by FERPA at school districts and postsecondary institutions that provide health or medical services to students. This is because Congress specifically addressed how education records should be protected under FERPA. For this reason, records that are protected by FERPA are not subject to the HIPAA Privacy Rule and may be shared with parents under the circumstances described above.” (http://www.ed.gov/policy/gen/guid/fpco/hottopics/ht-parents-postsecstudents.html

2. HIPAA allows disclosure of protected health information, including psychotherapy notes, concerning a patient when it is considered necessary to prevent a serious and imminent threat to others. This can include disclosure to law enforcement, family members, potential victims and others if the disclosure can be justified as reducing the risk of violence. See CFR §164.512(j).

2. Institutions of higher education, such as some community colleges, which do not have mental health professionals who can serve on a threat assessment team should contract with a mental health agency or independent practitioner in the community who can serve as a team member.

3. Institutions of higher education, such as some community colleges, which do not have an institution-based law enforcement staff that can serve on a threat assessment team should contract with a local law enforcement agency to obtain a team member.

D. Threat assessment records
Threat assessment teams should maintain confidential records of all cases for legal and security purposes. The records will not be part of a subject’s academic, medical, mental health, or employment records, if any exist at the institution. This policy does not alter any other policy regarding the placement of information in a subject’s academic, medical, mental health, or employment records.

§37.2-808. Emergency custody; issuance and execution of order.
A. Any magistrate may issue, upon the sworn petition of any responsible person or upon his own motion, an emergency custody order when he has probable cause to believe that any person within his judicial district (i) has mental illness, (ii) presents an imminent danger to himself or others as a result of mental illness or is so seriously mentally ill as to be substantially unable to care for himself, (iii) is in need of hospitalization or treatment, and (iv) is unwilling to volunteer or incapable of volunteering for hospitalization or treatment.

F. A law-enforcement officer who, based upon his observation or the reliable reports of others, has probable cause to believe that a person meets the criteria for emergency custody as stated in this section may take that person into custody and transport that person to an appropriate location to assess the need for hospitalization or treatment without prior authorization. Such evaluation shall be conducted immediately.

Virginia Criminal Information Network system established and maintained by the Department pursuant to Chapter 2 (§52-12 et seq.) of Title 52. Where practical, the court or magistrate may transfer information electronically to the Virginia Criminal Information Network system. A copy of an emergency protective order issued pursuant to this section shall be served upon the respondent as soon as possible, and upon service, the agency making service shall enter the date and time of service into the Virginia Criminal Information Network system.

E. Each threat assessment team shall establish relationships or utilize existing relationships with local and state law enforcement agencies as well as mental health agencies to expedite assessment and intervention with individuals whose behavior may present a threat to safety.

Under current regulations, personally identifiable information (PII) includes a student’s name and other direct personal identifiers, such as the student’s SSN or student number. PII also includes indirect identifiers, such as the name of the student’s parent or other family members; the student’s or family’s address, and personal characteristics or other information that would make the student’s identity easily traceable. The final regulations add biometric records to the list of personal identifiers that constitute PII, and add other indirect identifiers, such as date and place of birth and mother’s maiden name, as examples of identifiers that should be considered in determining whether information is personally identifiable. In response to public comments, the final regulations define “biometric record” to mean a record of one or more measurable biological
Virginia College Threat Assessment 82
or behavioral characteristics that can be used for automated recognition of an individual, including fingerprints, retina and iris patterns, voiceprints, DNA sequence, facial characteristics, and handwriting. The definition is based on National Security Presidential Directive 59 and Homeland Security Presidential Directive 24.
The final regulations remove from the definition of PII the reference to “other information that would make the student’s identity easily traceable” because the phrase lacked specificity and clarity, and possibly suggested a fairly low standard for protecting education records. In its place, the regulations add that PII includes “other information that, alone or in combination, is linked or linkable to a specific student that would allow a reasonable person in the school community, who does not have personal knowledge of the relevant circumstances, to identify the student with reasonable certainty.” This change brings the definition more in line with recent Office of Management and Budget (OMB) guidance to Federal agencies, with modifications tailored to the educational community. (See OMB M-07-16, “Safeguarding Against and Responding to the Breach of Personally Identifiable Information” at footnote 1:

http://www.whitehouse.gov/omb/memoranda/fy2007/m07-16.pdf.) Under the final regulations, PII also includes “information requested by a person who the educational agency or institution reasonably believes knows the identity of the student to whom the education record relates.”

In a nut shell, these threat assessment teams take in anonymous reports that are used to assess if an individuals is dangerous, mentally ill, what have you. They also take in reports from those around the target. False information can come in, but the target does not have the access to clear false information, which is allowed under most privacy laws. This is similar to what the Fusion centers do, and this is what companies like the A.C.L.U. were essentially fighting against with the fusion centers, but then here are universities and companies getting away with hiding this information from the people who need access to it, so that they can legally clear up any misinformation on their records. Not only that, but these threat assessments are being used to slander the individual in many cases, but under these guidelines they might not have information or access to the records.

This is really wrong, and legally this has to be challenged. This is one area that targets might be able to start in with a privacy lawyer. Request the information it’s your right, but when it’s denied, then then legal challenges can begin. I don’t know if this is the case in all States, or other countries such as Canada, but it will be interesting to find out. In the U.K. the laws do allow the request and disclosure of information, but I have not yet found a similar clause that hides the information away.

October 27, 2010 Posted by | Gang Stalking, Monitoring | , , , , , | Leave a comment

Sherlock Investigations

Sherlock Investigations.

I just had a visit from Skipp Porteous from Sherlock Investigations. He dropped by to assure me that his company is real, and not fake. He says that he still thinks that Gang Stalking is fake. Now I really respect that he took the time to drop by, so I wrote a response, and I hope he will do me the favor of reading the quick links, and looking over the Jane  Clift case.

I suspect like many other good people Mr Porteous has been mislead into thinking that Gang Stalking is vigilante Gangs or Groups of some sort. I hope the information provided will disavow him of those beliefs, and I hope the correct information will provide him with new and informative insight into this phenomenon.

Here is his post, and here is my response.

Skipp Porteous

Sherlock Investigations Inc. is real, but gang stalking is not.

gangstalking

Hi Skipp, thank you for taking the time to stop by, I really appreciate it. Are you telling me that people are not being placed on occupational health and safety lists? That they are not being followed around after being listed? Are you telling me that the psychiatric reprisal is not being used? Because i have a whole whack of evidence that says that it is. Now Skipp, I am not going to ask you to do anything as difficult as read a book on this topic. I am going to ask you to politely humor me, and have a quick look at the Jane Clift case, and the Gang Stalking quick guide. If you can read these over, and tell me this stuff is not happening, I will be very surprised.

Again thank you for dropping by, here are the links.
http://www.GangStalkingWorld.com/QuickRef.pdf

http://www.1brickcourt.com/files/cases/140CLIFT_58136.pdf

Now Skipp the evidence in the Jane Clift case is not information from my site, this is an independent investigation into what happened to this woman. After being placed on a list for sending a nasty letter to a customer service rep, her information was populated everywhere she went, and she was followed around. She was listed as medium risk, only to be seen in pairs.

I don’t know what your impression of Gang Stalking is, but the information that comes from the main Gang Stalking site is pointing to these occupational health and safety lists, which are very real. Threat assessment teams are putting people on lists, who they suspect have a mental illness. Notice the word is suspect? Meaning that they might not, yet these people are being treated as if they do, and their names are being flagged the exact same way that Jane Clifts was. As they go from community to community, an automated notification is sent via phone, or email, and the members of those communities do follow them around. Under these laws, the workplaces are sharing these listings with other workers, the community, and family members. For those closer to the target, a letter is sent out, just like it was with Jane Clift. Remember Skipp, this innocent woman was listed as medium risk, only to be seen in pairs, and added to a registry with violent sexual offenders.

So Skipp if you were lead to believe that Gang Stalking was something else, or that it does not exist you are dead wrong. As a private investigator, I honestly hope that you will give your clients the service they deserve and take a through look into the information that is being provided to you. It’s been well researched, well documented, and it is fact. If you have any points you are unsure of, please feel free to drop by again.

I do once again appreciate you taking the time, and I would love to hear back from you, after your review the information provided.

More Jane Clift case file references.

http://nearlylegal.co.uk/blog/

[quote]
Conclusion

I think this case does have some relevance to housing law. It touches on a situation that (in my experience anyway) comes up in practice where a client has information about them, possibly highly prejudicial to them, shared between organisations. The case requires an authority to consider the proportionality of that distribution lest it be vulnerable to a claim for defamation. No HRA claim was brought, so this decision is, strictly speaking, confined to a claim for defamation, but in my view the reasoning on the duty of public bodies has wider application.

In practical terms it means that public bodies should be rather more careful about keeping records of alleged criminality or anti-social behaviour and about any distribution of those records. That, in my view, can only be a good thing. Calling a document a “Violent Persons Register” if you know full well that some of those persons have never used violence.
[/quote]

Clift Case additional reading
Clift Case additional readings 2

[quote]

She sensed that, everywhere she went, there was “whispering, collaboration, people scurrying about”. “Everywhere I went – hospitals, GPs, libraries – anywhere at all, even if I phoned the fire service, as soon as my name went on to that system, it flagged up ‘violent person marker, only to be seen in twos, medium risk’.”

[/quote]

[quote]

“These people have this ability to do this and they can abuse it. Not many people know, I didn’t even know, that such a register existed.

[/quote]

[quote]

Jane CliftJane Clift: Libel victory after a four-year legal battle

Jane Clift saw it as her public duty to report a drunk she saw trampling flowers in a park.

But her efforts led to a surreal nightmare in which she was branded potentially violent and put on a council blacklist with thugs and sex attackers.

Her details were circulated to an extraordinary range of public and private bodies, including doctors, dentists, opticians, libraries, contraceptive clinics, schools and nurseries. Their staff were advised not to see her alone.

The 43-year-old former care worker was forced to withdraw an application to become a foster parent and, eventually, to leave the town where she had lived for ten years.

[/quote]

September 25, 2010 Posted by | Gang Stalking | , , , , , , , , , | 2 Comments

How do we stop Gang Stalking?

So people keep asking what we can do to stop Gang Stalking?

I was on a forum recently and one person told people they could stop Gang Stalking by moving to the heart of the forest, and destroying their cellphone. Sure if you wish to disconnect from society, live off the scraps of the forest, and leave your stuff behind when you move this might just work, but otherwise, most targets need real solutions as they go through months, and then years of being systemically destroyed.

Now these people are stalking a lot of us because they deem us, or believe us to be mentally ill, on drugs, perverts, whatever. For those being listed as mentally ill, you would think that the logical thing to do would be to get a mental health examination, but from the articles pertaining to the psychiatric reprisal, we learn that psychiatrists are all too willing to list innocent, sane people as mentally ill, thus getting an examination will not necessarily clear you.

What we could do is get out own team, eg. A threat assessment team, to review decisions that have been made by others. Eg. In the Jane Clift case if there was a none bias committee she could have appealed to, to see if her listing was justified, it could have saved her four years of legal trouble, and having to leave her community.

The problem many of us have is that we have never seen our community files, we don’t know the information that has been listed. I do know there is a lot of false information in mine, just on things that I have observed, that these people believe to be true. I do know they have falsely listed me as having some sort of a mental illness, because I dared to take some company to task for harassment. The problem is having open access to files, and a none partial party that is willing to listen, and understand that these files have a lot of false information. Staged incidents, incidents that do not even involve the target, like Jiverly Wong did, but the lies do not seem to matter, it’s just what people are willing to believe.

The other solution of course is there are villages for the mentally ill. Those who are homeless might be able to take advantage of these communities that are springing up, again the problem with this is that many targets though falsely listed as mentally ill, are not mentally ill. When you are desperate however, this could be a temporary safe harbour, but ofcourse this is what they want. Targets housed together so they can “keep an eye on the mentally ill.”

The best solution would be to get the laws changed, thus targets who are listed, must be informed that they have been added to the registry, they must be informed for what they have been added, thus they have a legal right to pursue action, and to ensure the information listed on their files is not one sided. I think this is the best solution, but could take years to implement.

Now there are groups who have caught the eye of politicians, surely that will help? To be honest you can have a thousand groups, with the eye of a thousand politicians and that will not help if they are misleading and looking at false precepts, or stalking gangs, etc. I have yet to hear any of these groups address the occupational health and safety laws, and the mental health laws that are being used to list targets, till this silence is broken, and addressed, these groups could do a thousand campaigns, but it it’s not the right one, it will just waste the time, energy and resources that targets don’t have to waste.

At the end of the day, exposure and awareness is still the key. Four years ago, I had to fight to keep my threads on forums, they would get deleted, my accounts banned, the threads would get disrupted by fake targets, and then get closed. Any time head way was being made, they would block it, just to protect this system.

Things have changed somewhat. The conspiracy sites, and some extremist sites are now fully aware of what Gang Stalking is. Gang Stalking is slowly making it’s way into some of the more mainstream forums. There are still those who try to dismiss it off hand as an urban legand, or a sign of mental illness, but there are others who discuss it openly, and in some ways it’s getting normalized. The idea is to get the normalization to occur much more rapidly, while keeping the topic relevant. Eg. Mobbing is exposed, but someday’s I am not sure this makes any difference to the targets of mobbing. There is little point in getting this normalized to the stage where it becomes irrelevant. Eg. Priests molesting children had it’s shock value, but today stories of this do not cause the same outrage, even though it still happening to a large degree. It’s become normalized, but not as relevant as it once was.

So moving forward, targets are the best for exposing this, if we stay on targeted forums, and don’t mingle with others, the information will not get out. The idea is to mingle, share information, but share good information. The term Gang Stalking is the term I use. Most targets after trying the organized stalking term, seem to switch back in a lot of cases to Gang Stalking. It’s just the most popular term. I think Organized Gang Stalking is also ok, but use what suites you the best, I don’t care what term people use, as long as the correct concept is conveyed, and what is behind this is conveyed.

September 25, 2010 Posted by | Gang Stalking | , , , , , | 99 Comments

Follow

Get every new post delivered to your Inbox.

Join 246 other followers