Gang Stalking World

United we stand. Divided they fall.

Tips and Tricks 4

Tips and tricks.

After doing this for sometime I am going to revise some suggestions.

Targets might want to consider wither or not to use their real identities or a faux identity while online. Mark was pretty open and used his real information as were some others. Over time from what I can see, targets might be better off while online using something different or in between. Eg. Anthony Brina and many others use faux names while online. I think this has worked well and might be applied depending on your situation. I have seen it now on several occasions where they think they know who a target is, and they will begin psychological targeting of the Targeted Individual they think it is. (I have
seen them be wrong, and right and the effects that it has.)

This will also depend on how comfortable or uncomfortable you are with your situation. The other thing I would recommend is that if you do use, then do it in a way that protects your identity.  Again can be very effective means of communication, but use it wisely.

Legal and Investigation means.

Over the course of this as you know, I have spoken to police, lawyers, investigators, community workers, individual sources, other targets, etc.

There are many different avenues that a target should try to use when seeking assistance with these covert investigations, or Cointelpro like investigations if you will.

Many targets by the time they find out what is ongoing are usually too improvised to do anything about it, but if you have the means, then you might want to try finding a private investigator, one with prior law enforcement experience, who are familiar with these Covert (Cointelpro) Investigations. (If they say they are not then maybe look elsewhere.)

For the rest who can not afford this means, you can see if you can get your Freedom of information records, keep in mind that you will often get an initial report that there is nothing being investigated, and you might have to follow up with several subsequent requests, or letters.

Going to the police as we have seen usually causes more problems, it does not mean that we should not try, but we have to be careful in our dealings with these people.

Lawyers, there are some that will take a case without proof, but again many will ask that you gather evidence first, and then take it from there.

Background checks.

As a target when doing a background check these are things to consider.

Here is some information one company provided about their background checks.



Your first step in making an informed hiring decision. We make it our business to know your business to provide a total solution for your human resource needs. From initial screening to data verification, qualitative assessment and even post-hire evaluations, we will free you to make decisions and not gather background information.

Through thorough investigations we can verify positions held, performance record, income, job skills, attitude, verify education and much more. Other optional information such as driving history, bankruptcy, financial background, and criminal records.[/quote]

Just some things to be aware of. Also some really good info from I think it focuses on California based background checks, but the information that can be gathered should be pretty consistent across the board.
If you take the time to read the page you will see that there is a great deal of information that can be gathered about you from a standard background checks, up to and including,

[quote]Part 2. What Is Included in a Background Check?

Background reports can range from a verification of an applicant’s Social Security number to a detailed account of the potential employee’s history and acquaintances. There is even some evidence that employers are now searching popular social networking Web sites such as MySpace and Facebook for the profiles of applicants.

Here are some of the pieces of information that might be included in a background check. Note that many of these sources are public records created by government agencies.

Driving records, Vehicle registration, Credit records,
Criminal records, Social Security no, Education records,
Court records, Workers’ compensation, Bankruptcy,
Character references, Neighbor interviews, Medical records, Property ownership, Military records, State licensing records,
Drug test records, Past employers, Personal references, Incarceration records, Sex offender lists.[/quote]

[quote]In both of these situations, the applicant would not have the ability to obtain a copy of the background check to find out what negative information it contained. We have learned of situations where the individual remained unemployed for years, not knowing that wrongful criminal records which resulted from identity theft were the reason for the individual’s failure to find employment. (Read “Identity Theft: The Growing Problem of Wrongful Criminal Records,”[/quote]

So it’s really important as a target that you try to find out what information is out there about yourself, you might want to conduct your own background check and records check, again if you have the means. It might not uncover anything, but it’s a good place to start.

Just some things to think about.

Next time we will look into National Security Letters, the gift that just keeps on giving. I would like to thank the poster who tuned me onto these. If someone is being investigated and your information just happens to be in their possession, accidental or other wise, it could potentially put you onto a list as someone to be monitored. I am still doing the research on these, and I hope to post some good info about these next times. Just one more way society is being silenced, hushed, and turned into a zombie army of snitches, willingly or unwillingly.

August 22, 2007 - Posted by | Background records checks, Censorship, Cointelpro, Covert investigations, files updated, Gang Stalking, Gangstalking, harassment, National Security Letters, Snitches, society, State target


  1. has anyone come up with successful shielding material that doesnt cost 10,000 dollars?
    thank you

    Comment by Catherine | August 29, 2007 | Reply

  2. You can try less I am not sure and then there is this suggestion from this website, but it sounds complicated.

    Comment by gangstalking | August 29, 2007 | Reply

  3. Recently Obama Signed a One Year Extension To The Patriot Act.

    It does not take much knowledge of history to understand how a corrupt U.S. Government could use National Security Letters under the Patriot Act—As A Political or Economic Weapon.
    Currently in the name of fighting terrorism, U.S. Government can use National Security Letters to search a Citizen’s private information and records without having to provide specific facts—the person’s information sought pertains to a foreign power or agent of a foreign power. Government can impose National Security Letters without probable cause on your employer, your business client(s) credit card providers, even your relationships. After you receive a National Security Letter, under current law you can’t tell anyone. National Security Letters if used by a tyrannical U.S. Government, could be very threatening to Americans when you consider methods used by other governments. For example in Nazi Germany, the Gestapo routinely targeted and damaged business people and companies that refused to support the Nazi Government by—interrogating their customers—about them. Not surprisingly targeted business people and companies found it difficult to make a living after their frightened customers and clients distanced themselves after Gestapo interrogation. Some German corporations with ties to the Reich government used the Gestapo to scare off their business rivals’ associates and customers—to take their business. A corrupt U.S. Government could as easily use National Security Letters in the same manner and to intimidate Americans exercising First Amendment Rights.

    Congress needs to pass legislation that prevents Government using National Security Letters to investigate Americans without first demonstrating a clear standard of probable cause.

    Comment by Ross Wolf | March 1, 2010 | Reply

    • Congress and reliance and trust of government is how things became this way.

      Comment by gangstalking | March 1, 2010 | Reply

  4. There are different justifications that people give for being overly intrusive. A reasonable background check can be expected by potential employees. The problems start when a business is willing to break the law under the guise of checking people out. Hacking computers is against the law. I can understand why companies would be tempted to hack a potential employee’s accounts to make sure they don’t hire criminals. But, it’s still a Federal crime. When it comes to music publishing, it’s especially suspect. If publishers hack into a songwriter’s computer with the excuse of checking them out for a future relationship- you can be assured they will choose writers who are showing some potential. It becomes an excuse for music publishers to hack into the best, unprotected songs in town. This can go on for years. It is more than questionable if the publisher has already shown that they will take ideas from writers without giving any credit.

    Hacking into someone’s computer can have horrible effects. When one person is singled out and everyone knows, but no one tells, it’s crushing. The person’s entire life becomes a joke and a game. You realize something is wrong but you can’t figure out what it is. I can’t begin to recount all the times and places that total strangers showed up and made a point of letting me know they knew me and didn’t like me. Something was happening. It took me forever to realize that my life was hacked and I was the only fool not in on it.

    I wonder if there ever comes a time for telling the truth. Was it ever OK to hack into an indie writer’s computer? When you saw how badly things were going, did you ever think it should stop? Did it ever occur to you that there needs to be a time limit on how long you put someone through this? I didn’t really start complaining until after about three years. It’s not like I wasn’t patient. I knew people were following and put up with it for a long time. You’ve been in my computers way too long. You ripped open my life for everyone to see and ridicule. It is impossible to put my life back to the way it was. Everything has changed, including the way my family sees me. You will, no doubt, continue to act like this has not happened. I’m still stuck in the middle of the mess you created. When your Christian faith becomes real, set this right as much as you can. Until you do, don’t bother to praise the God of Truth.

    Comment by stillbreathing | April 5, 2010 | Reply

    • If you look at some of the illegal wiretapping the state got away with where do you think these people take their que from? Also look at how they arrested a man for buying guns, the arrest, taking of his guns, all illegal, but these people get a drop of power, it makes them feel special, and away they go.

      Comment by gangstalking | April 10, 2010 | Reply

  5. can anyone help me find a way to locate the survalnce bugs put in my homes, seems to come from illigal intrances through my attics, in 2 homes and 4 appartments.

    Comment by lacy | January 12, 2013 | Reply

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: