Gang Stalking World

United we stand. Divided they fall.


I notice a new post that I felt needed to be addressed.

Now I contacted Jeremy recently, he had reviewed some of the books relating to Gang Stalking and I shared my feedback with him. I don’t believe the comment was posted to his site, so let me repost it here. He had listed Gang Stalking World and felt that it was a red flag that only some links were posted, while others were not. Just like a certain other person has tried to paint that site as a poison pill. Either way, they come and…

gangstalking said
Your comment is awaiting moderation.
October 5th, 2010 at 6:21 am

The only red flag is that I don’t promote informant sites. If that’s a red flag too bad. I have watched informants come and go, a new kid be crowned, and then dethroned. I have watched informants pitch the Lawson book, and the idiotic nonsense in the book about vigilante gangs. I have watched as some listed my site as a poison pill, while supporting the Lawson book without any proof.

I am familiar all too well with how this system works. The shrills all work together, pitch who they want to pitch and slowly discredit who they want to discredit. All under the guise of doing the community a favor. I have watched them come and go, and fought my battles for the community, and will continue to fight them.

If you missed it by the way, it’s sites like Gang Stalking World that even have these forums taking the topic seriously. I have personally fought most of the battles over the years, to ensure that the topic could be discussed in a rational manner, to ensure that the topic got “normalized”, while watching every newly crowned shrill take pot shots at my site.

I continue as I am, most times they come, they are the flavor of the month, they sell themselves, and then God willing they go again.

If that’s a red flag, then I suggest targets start waving it proudly. I have proven myself, and I have proven the test of time, while withering the slander, that’s been more than unjust. Anyways, let the Karma balance where it may.

I believe the proof is in the pudding, some of the only decent articles like psychological harassment in a group setting happened because of Gang Stalking World, it actually got a none target to sit up, pay attention and write a decent article.

I can only imagine that other similar material will also do the same.

Now Jeremy dear has a new article that again seems to pinpoint the Gang Stalking World website. I have seen worst, and I could ignore it, I could write some professional response, or I can take it there. So which response should I go with?

Well let’s see what Jeremy Stalked has said. Oh before I do that, I just want to say that I think it’s great that Jeremy as a target manages to be able to afford google ads seven days a week, most targets I know can not do this, but it’s great that he can.

Now I don’t know a lot about Jeremy, I think he is loosely affiliated with the FFCH group, or does his own thing, and does something conference call like a lot of them do today.

Either way, I am going to examine his latest post.

The top search results for gang stalking or organized stalking are sites that lead targets to believe one variation or another of these manpower-intensive theories must be true. For example, Gang Stalking World takes it for granted that a Stasi-like organizational structure is behind what targets are experiencing, allowing targets to believe that any signs of hostility exhibited by a person are proof that person has been “recruited” or “threatened”.16 A targeted individual who acted on this belief, and accused mind-controlled patsies of being “in on it”, would end up ruining his reputation by his own hand; meanwhile, the web sites he got his belief from would simply egg him and others like him on, saying the incredulous reactions of accused parties just shows how extensive the cover-up is.

Jeremy Stalked probably doesn’t realise this, but unlike a lot of other sites, Gang Stalking World gives you proof. Gang Stalking World tells you point blank, do your own research. Use the information there, but do your own research, trust your own judgment, think for yourself. All the other sites tell you what to think, or in subtle ways they tell you who you should follow, and who not to follow. If you can say the government is doing this, or not doing this. Gang Stalking World points to the government programs, under occupational health and safety, but then you are presented with proof.

Eg. The Jane Clift case, that was not a rabbit pulled from a hat, and further investigation, unlike others, pointed out that these lists exist in every single city. The lists are given out to those around the target. Letters are sent out. So to say that those around the target are in on it, is not wrong or inaccurate.

It’s not manpower intensive when you realise that many people who own stores, work in the community, in the colleges, etc, are aware of this program. Many do not realise how widespread it is, but it is everywhere. Do your own research.

Oct 6th, 2010, 10:18pm

Warning System, Fast Action Saved Lives At UT
Posted 9/29/2010 6:30 am by Ron Hogan

When a gunman dressed in black was spotted on the campus of the University of Texas, there was no hesitation on the part of school officials. In the wake of the shootings at Virginia Tech, and UT’s own history with crazed gunmen going onto the campus for shooting sprees (Charles Whitman), Texas does not mess around with this kind of stuff, and the quick actions of campus officials and the coordinated responses of campus security, school staff, and the Austin, Texas, police department saved many lives yesterday.

The gunman, 19-year-old Colton Tooley of Austin, was a UT student majoring in math and actuarial studies. At just after 8 in the morning, students spotted the armed man wearing black, firing bursts of gunfire into the air and at the clock tower where Charles Whitman went on his famous killing spree. They panicked and called the police. Police informed campus officials, and in 15 minutes the entire campus was alerted via text messages, warning sirens, and Twitter updates. That kept students out of the way, kept people alive, and made the job of the police easier as they tracked Tooley to the sixth floor of the Perry-Castañeda Library. At 8:50, Tooley committed suicide.

This prompt response it heartening, in that it shows officials can handle these sorts of situations when they come up with the proper training, but isn’t it kind of disheartening that we need these sorts of disaster preparedness plans for people going crazy on our college campuses? It’s a sign of the times, I guess.

Warning System, Fast Action Saved Lives At UT
Text Warning System

Arkansas Tech University has an early warning text messaging system as an additional means of communicating with the campus community during emergency situations on the Russellville campus. Students who register for the service will receive a text message warning in the case of a serious campus emergency. Signing up for the system is optional, but it is strongly encouraged.

here have been several attempts to use text messaging as an alert system, with universities, including Boston University, making it mandatory for students to sign up to such a system. This is despite the notable failure at Louisiana State University when a misunderstanding prevented alerts being sent out to students.

Students, faculty, and employees sign up and opt in for text alerts by providing their cellphone numbers. When an emergency situation occurs, administrators at the college can use a web-based service to send text messages to every phone on the list, reaching people who are sitting in class, walking around on campus, or in mid-commute.

Already, the services have been used in emergency situations. Mobile Campus Inc., based in Austin, Texas, is available on 11 campuses and has used its service to notify students and faculty of everything from a campus closure because of a severe ice storm this year at the University of Texas, Austin, to an emergency closing due to tropical storm Ernesto at University of Central Florida in 2006.

Omnilert LLC , a Leesburg, Va., company that delivers emergency text message alerts for colleges and businesses, already offers a text-messaging alert product, called e2Campus, to 30 universities. Florida A&M University used the service to alert students when a pit bull was loose on campus. g.php

(9) Communication is the heart of a good emergency plan. When a traumatic event occurs in the workplace, employees expect to be informed immediately about the nature of the event and the measures to take to protect themselves. To respond to this vital need for information, lines of communication must be established ahead of time between you and:

* Your employees
* Your senior manager
* The workplace health and security team on your floor
* Your Departmental Security Officer
* Others as appropriate.

Do you and your employees know the names and telephone numbers of those listed above? If this information is not readily available, precious time may be lost. Finding vital information in the middle of a crisis can be complicated by anxiety and fear.

(10) Set up a warning system (code) so co-workers can alert one another if urgent help is required. Possible scenarios include a physical assault, or the presence of a disgruntled employee or an angry client in the workspace. The building’s security response team is responsible for deciding the types of code to be used. The warning system should be standardized and all employees should be informed. Colour codes can be used, for example, to describe various dangers. This will help reassure employees that help can be accessed quickly in case of danger.

(11) Warning messages. In addition to increasing fear and anxiety, waiting for a warning message can lead to confusion and disorganization. Insist that the building’s security response team know how to write brief, clear and accurate warning messages. Standard warning messages need to be written ahead of time and kept on file so people can access them readily when danger threatens. They also need to be updated periodically.

The goal of a warning message is to empower people by providing accurate and appropriate information on what has happened, where it has happened and what protective measures people need to take immediately. If exits are blocked or filled with smoke, or there is a chemical substance in the ventilation system, employees need to know immediately what measures to take (i.e., whether to exit or stay in the building, when to leave, how to protect themselves).

It’s been shown time and time again that this interconnected network exists. It’s been shown how the listings are used. The fact that the warnings on a targets files are transfered when they move from one location to the next location. That the warnings with personal information can go out into the community. That’s pretty Stasi like. It’s not labour intensive, because the system is already in place, and most people are required to be aware of it, or take part in advance.

“In the service sector this may require identifying to employees persons who have a history of aggressive or inappropriate behavior in the store, bar, mall or taxi.

The identity of the person and the nature of the risk must be given to staff likely to come into contact with that person. While workers have the right to know the risks, it is important to remember that this information cannot be indiscriminately distributed.

These listings work in conjunction with community threat assessment teams, which can be and are often comprised of officers, health professional, psychiatrist, etc. If they get a report that a target has done something is acting irregular, or an event happens, they might well send out a new notification. Eg. Target is medium risk, only to be seen in pairs. So you are at work and suddenly the boss who’s office you use to be able to go into by yourself, you now are required to have another person present, and this did not happen before. This is an example of how the warnings could work. It does not mean everytime someone else is in the boss’s office with you, you are on a list, but that is how the listings can and do work. It’s like when they had those crazy terror alerts for terrorists, today it’s code orange, tomorrow it’s yellow, the terror alerts kept people in these states of stupidity, but trusted the terror alerts, and people trust the listings and the warnings. Don’t forget this system does work sometimes, it’s not all bad, but if you are an innocent person, wrongly accused, wrongly listed, with a bunch of people in the background making assessments based on third party evidence, people who have never met you face to face, there are going to be problems. Period.

For example, Gang Stalking World takes it for granted that a Stasi-like organizational structure is behind what targets are experiencing, allowing targets to believe that any signs of hostility exhibited by a person are proof that person has been “recruited” or “threatened”

The occupational health and safety lists are real, they operate in every country, and community, and the individuals on those lists are treated the same as if you had a pedophile lose in the community. Period. Anyone who has ever been a part of a community or neighborhood watch program knows how this works. Someone is dangerous and lose in the community, you get a phone call, be on the look out for such and such. These programs use email and phone message, now many also will be using text messages.

People might be hostile on their own, who knows, but what has been said is that trust your own judgment. It’s not paranoia when they are out to get you. I would rather take things seriously and err on the side of caution, than not take things seriously enough, and end up like Randy Weaver who the state destroyed. People assume that these agencies don’t lay deep traps to destroy people, but I can tell you example after example from years of research that they do. They plot and they lay deep cover to trap people.



the unethical recruitment of drug informants
Submitted by bobbie (not verified) on September 19, 2008 – 4:34am.

[quote]My son was targeted by local law enforcement simply because they valued him as a potential drug informant.

They were interested in him because he did construction work for someone who had a permit to grow marijuana plants.

He had no drug violations. The detectives targeted his specific vulnerabilities, and played on his sympathy with an older informant who said he was going through a bad divorce, and needed marijuana for his anxiety.

The 4 detectives witnessed and videotaped the sale, but did not arrest him. They waited until he reported for a scheduled jail time for a DUI, and rearrested him without publicity, and without family support.

They told him he was “screwed”, and would he work for them? When he didn’t want to consent without talking with his girlfriend, they went after her at work and threatened to prosecute her. He pleaded guilty and got 2 years prison, leaving his 8 yr old son without a dad. Please take a stand against this unethical activity.[/quote]

These systemic setup’s have been going on for many years unchecked. The above example should be helpful in comprehending how these set up’s are being conducted. If you think there is no such thing as a conspiracy in society you would be wrong.

The local law enforcement wanted this woman’s son as an informant. I am not sure if they asked him first, but most likely they just created a scenario where a set up could happen.

They were not really interested in her son, the true target was his employer, look at the steps they went through to get to this person.

1. They profiled her son, to figure out what his vulnerability would be.

2. They hired an Informant who had access to her son. It’s hard to say if they set up the Informant first or not.

3. They used the Informant to entrap her son, assuming that he would become a snitch.

4. Had they been successful, it would have been a matter of time before this woman’s son would have been asked to either set up his employer, or do something to make him look guilty and set him up in that manner.

That’s the way it’s working, and has been for some time now. This happens in society a lot. It’s systemic. If you don’t think this way, operate this way, you might not know it when you see it, or experience it.

People don’t have to be recruited or threatened, in too many cases, they are already a part of this network, and believe anything that they are told. Remember people are willing to do terrible things if they feel that an authority figure is telling them to do it. Many times they will do it without any after thought.

Watch the video, this is what your average unthinking person is willing to do to a complete stranger. Now imagine if they know that you are on a list and think that you are crazy, a druggie, a pervert, or whatever. What do you think the good people of the community are going to be willing to do then. There are so many stories of communities organizing to rid themselves of perverts, well unfortunately, anything on these listings get’s the same treatment, but most targets do see themselves that way, and believe that they are innocent.

Since Jeremy can take pot shots at the Gang Stalking World website and the information presented there, perhaps he could present a better theory, or since he seems so keen at doing research, I am sure with the information presented, he could just CSI this theory in no time. There is enough information there, he loves exposing information that’s already been exposed by others, so this should be fairly straight forward.

Otherwise the information remains the same. Do your own research, learn the one handed sign language, or the bits that have been pieced together, test it out, research the threat assessment teams, occupational health and safety, research the other theories out there. What makes sense, what is plausible, what is logical, what instinctively feels right? Then stop letting others think and speak for you. They work as a network, a group, and they seem to be independent, but all too often are not, and while they can be happily sitting back, while real targets are often having to defend themselves from their little barbs here and there, while they sit back ranting about harmony in the Targeted Individual community.

The reality is Gang Stalking World gives something else that the others do not, it gives you the truth. How many of them are discussing the occupational health and safety laws, and these lists? How many are doing extensive investigations into it, even to just disprove the theory?
I will leave it at that for now.

I will leave you with the lovely Beyonce, I think the video is fun.

I have worked hard for this. I took the bumps, bruises, burns, attempts at my person, slander, betrayal. I have researched this, and I have a huge personal stake in this, especially right now, when they are working every angle around me. I can not afford to sit back like I sometimes do. It’s too important now more than ever, this has to get exposed, and the sooner, the better.

October 14, 2010 - Posted by | Gang Stalking | , , , , , , , , , , ,


  1. Click to access EMHETraining_SATX08_ThreatAssessmentTeams.pdf

    Hi Anon,

    I think it will assist you to read the Virgina Tech Guide to threat assessment. It explains how the evaluation process works. Case management, and it get’s into a bit about the monitoring.

    You can also follow the forum posting on this issue here.

    Basically if someone reports you, even anonymously for odd behavior, if your community, work, or school has a threat assessment team, which most do, or something similar, then you can be investigated.

    If found to be a threat, and you will just love some of the criteria they use, they can either refer you for help, or silently monitor you, and keep a file on you. The file continues even after you let’s say leave the job, place of employment, and this threat assessment team keep tabs on you, and the reports all go into a central database.

    They even use your social networking sites as part of the initial evaluation process. You really have to read the document. Quite fascinating.

    Comment by gangstalking | October 15, 2010 | Reply

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: