Gang Stalking World

United we stand. Divided they fall.

Cold Case

http://gangstalkingworld.com/Forum/YaBB.pl?num=1290674350/0#9

Three years ago I heard the story of a young mother that stabbed her two children in a gas station bathroom. She only a few days before had spoken out about a neighbour stabbing her younger brothers dog to death, and then within days had stabbed her own children to death. When I heard the story at the time. I firmly felt that it was a case of Gang Stalking. I didn’t know why, I really had very little proof to go on, and very few details were forth coming in the case, well three years later, I have many more details and I feel there was a good chance she was on a Threat Assessment Hit List.

I recap with the link to hightech harassment. One of the things the site talks about is how many times parents especially it seems mothers are tricked into killing their children, via external voices.

http://www.hightechharassment.com/

[quote]

The sonic harassment technology in addition to tricking people into believing their house is haunted can be used to trick a mother into believing that she is speaking directly to God. A mother claiming that she received instructions from God to kill her children is easily accomplished with this classified sonic harassment technology. Secret police living in a neighboring house to the targeted mother can use the technology against the mother and trick her into killing her children. The targeted mother will be carefully screened by the surveillance conducted by the agents before being selected to have the sonic technology used against her. Usually a mother with a history of mental illness is selected.
[/quote]

At the time I felt that there was more to the story of why she killed her kids, when she had just days before spoken out about how horrible it was for someone to kill a dog.

The story that I found is that of someone who worked for the postal service, the court trials claims that she lost her job due to problems with her co-workers and paranoid delusions about them. Where these the same time of paranoid delusions that Yvonne Hiller was having?

http://www.themorningstarr.co.uk/2009/01/08/mad-woman-escapes-jail/

[quote]

The court heard evidence from two psychiatrists who both agreed that Ms Hawes was suffering from schizophrenia. In early 2007 Ms Hawes began having paranoid delusions about her work colleagues which eventually led to her losing her job. She was prescribed anti-depressants in July 2007 but her paranoia increased and she began to hear voices which were controlling her actions.

In the days leading up to the double murder Ms Hawes was traveling around the country with her two children because she believed she was being pursued by something or someone. On November 29th 2007 she took a kitchen knife from her home and fled with her two children, when she reached a convenience store about a mile from her home she began to hear voices telling her to kill the children.

“I didn’t want them to have to run anymore,” Ms. Hawes told her psychiatrist. “I was trying to protect them … to stop them from being chased.

“I heard voices in the bathroom telling me to stab my kids.”
[/quote]

The post office is notorious for people going postal. My strong suspicion is that Hawes was placed on a Threat Assessment List for monitoring. She was likely given a level 3 or 2 threat level and thus her Gang Stalking and Electronic Harassment would have been peek. Level 2 being almost the highest level. This would have mean active monitoring, and everyone around her being alerted, it would have also meant that people would have been actively following her around, maybe even harassing her, irregardless of her having the two children in her possession.

This would corresponds with her fears of being on the run, and arming herself because she felt someone was out to do her harm. The voices might have been internal, but they could also have been very external and technology based, telling her to kill her children. This might help explain how she was able to so radically change and kill her children just a few short days later.

http://gangstalkingworld.com/Media/2010/11/threat-assessment-101/

[quote]
PRIORITY 2 (High Risk): Poses threat of violence or self-harm but lacks immediacy or access to target. Requires active monitoring and case management plan.

PRIORITY 3 (Moderate Risk): Does not pose threat of violence or self harm, but exhibits significantly disruptive behaviors and/or need for assistance. Requires active monitoring, case management plan, and appropriate referrals.
[/qutoe]

Can I prove this is what happened? I might someday be able to prove that she was on a Threat Assessment List and thus followed around. I don’t know if I will be able to prove that remote neural monitoring in the form of voice to target transmission was employed, which helped and encouraged her to murder her two innocent children.

In any case Hawes has been written off as another Paranoid Schizophrenic, who was hearing voices, had paranoid beliefs and killed her children. No further investigation or evidence needed.
http://i296.photobucket.com/albums/mm190/projectnewera/jeanettehawes2.jpg

Let’s not forget the two innocent lives that were lost, if there is more to this story, we owe it to these two kids to find out the truth.

November 25, 2010 Posted by | Awareness, black, Black female, black women, Children, Community harassment, community mobbing, Conspiracy, Female, Health and Safety, Minority women, Monitoring, paranoid, society, State target | , , , , , , , , , , , | Leave a comment

Disconnect

Disconnect

I was on a forum recently and they were talking about mind control. One person on the forum claimed to have had something similar to what was described in the John St. Clair Akwei case happen to him.


http://gangstalkingworld.com/john-st-clair-akwei-vs-nasa
/

For electronic surveillance purposes, electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations, characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes.

He said that they had implanted images, and I think audio as well, but I don’t remember. What he did say was that the programing that they tried on him failed to work. He had a really strong mind, a belief in God, and he was just a really strong person at his core. He said that they had repeatedly been trying but failing, and I believe him. What I remember about the first thread is that the person who started the thread tried to imply that because governments now had this tech, that this meant that there was no God.

The poster who had this tech used on him, gave a wonderful answer, something along the lines of God being eternal, and just because man had achieved technology it did not eliminate the creator, and part of the reason the program did not work on him, or was not working, was because he had strong core.

I believe that such technology does exist as described above. I also believe that it can work on some people, but not everyone. I think if you are programed by the swill that they put out on the television set day in day out, the radio, all the popular culture images, I think if those are absorbed into the psyche of the public, then mind control could work. Where I think if you used the same technology on a monk in a religious order, who had spent years in meditation, had never watched T.V. and had a strong religious center, the technology would have a much more difficult time working.

So that brings me back to choice. No one is forcing the average America, Canadian, British, European family to submit to the programing. Owning a television, watching T.V. is a choice. Listening to the radio is a choice. Subscribing to popular culture is a choice. Remaining plugged in to a degree is a choice. I know it’s hard to unplug. I don’t think that everyone could do it overnight, but I think little by little we can try to find ways to unplug. Maybe read a book for several hours, vs several hours of T.V. programing. Maybe avoid the commercials, but even within the shows we watching, there is programing.

Strong core families. The things that make our societies more seceptable to take over are a loss of strong core family values, if we have these, we are harder to control and to be taken over. This has to be a cultural revolution as well as spiritual and self. I believe that humanity can be pulled back from the brink of what is being done, but not when we sheepishly let ourselves be controlled.

I hear of people standing in line to willing be irradiated and strip searched naked. I hear of people willing letting their under age children who’s cells have not fully finished forming and developing go through these machines, and with very little resistance. I also hear about parents willingly letting their kids be physically touched by these TSA agents. We spend years teaching kids about good touch, bad touch, how to spot a pedaphile, and then some parents willing stand still while their children are touched in ways that would be criminal if it were any other scenario. We do make choices. I am not saying that the choices are easy. There is a third option. Choose not to fly, if possible choose a time and send a message to the industry that you will not be stripped bear, that your children will not be felt up and taught to be submissive. If people do not take a stand when such things are presented before them, then they have truly become slaves. They are more bound and more controlled than slaves of old who were forced to wear chains.

Humanity can be saved but not if everyone sheepishly goes along with whatever one else is doing. Not if you line up to take your vaccinations when told like good little sheeple. Last year people had a choice of getting the H1N1 vaccine and when people choose not to let the fear get the better of them, this year they put the vaccine in with the regular flu shot and tried to take the choice away. I would like to think that people this year would either opt out of the flu shot, or see if arrangements can be made to just get the shot without the H1N1. For some reasons governments want this vaccine to be inside of the general populous.

Things can be turned around, the people have shown that they have the capacity, but they have to have the wills. People are just giving up their wills far too easily. I know it’s not easy. They keep the average person ground down day in day out. There is just enough room for getting up, going to work, coming home, enjoying a little entertainment and then starting the whole process all over again, so tired, run down and conditioned that most of us are too tried to question, all we can do is feel like we have to obey to keep surviving and that is the control trap that they have sprung on the populations of the world. Keeping them so poor, and distracted that they can not see the bars slowly closing in around them, and those of us who can are pushed to the sides into the realm of conspiracy theorists, who very few want to pay attention to or listen to, but in many cases we are the ones speaking the truth, and we are the visionaries who see the future intended outcome of these actions that are set before us.

Change can happen, but people have to want that change. McCarthyism only succeeded for as long as people were willing to submit to the lie. The truth is out there if you want it. Freedom is also there if you want it as well, but while you willingly, silently, and complacently submit to these changes, nothing will ever move forward, and nothing will ever change.

November 9, 2010 Posted by | CIA, Conformity, Conspiracy, control, Controlled society, Gang Stalking, High technology, Mind Control, Monitoring, Surveillence | , , , , , , , , , , , , , | Leave a comment

Gang Stalking and F.O.I.A.

Gang Stalking and Freedom Of Information.

I put my sleuthing brain to the task and this is what I came up with. It’s a bit of a data dump right now, but I wanted to get the information out there.

http://youthviolence.edschool.virginia.edu/threat-assessment/pdf/college-threat-recommended-practices.pdf

http://www.nabita.org/docs/whitepaper_risk_mitigation.pdf

4. Threat assessment files should be maintained in the law enforcement or security records of the institution rather than in the subject’s educational records or employment records.

5. Threat assessment files should be protected for security purposes as investigations of possible criminal behavior. The release of threat assessment information could jeopardize efforts to prevent an act of violence and it could disclose practices that nullify or reduce the effectiveness of threat assessments in future cases.

Because threat assessments are essentially investigations of criminal behavior, most, if not all, of the records created by a threat assessment should not be eligible for release under the Freedom of Information Act (FOIA). Reports generated by the threat assessment team may be exempt under Va. Code §§2.2-3705.2(4), 3706(F)(1)(3), and 3706(G)(1). A response by the team that includes a criminal arrest and prosecution may be exempt from release pursuant to Va. Code §2.2-3706(F)(1) and (3). This protection from disclosure applies to records generated by the threat assessment team for threat assessment purposes.

Records obtained from other sources, such as student academic reports, employee records, or medical records, should be protected under existing laws and regulations regarding redisclosure of protected information. For example, student scholastic records maintained by a university may Virginia College Threat Assessment 21
be exempt under Va. Code §2.2-3705.4. Employee personnel records may be exempt under Va. Code §2.2-3705.1.

The Office of the Virginia Attorney General has provided guidance to the Department of Criminal Justice Services on the exemptions from FOIA that apply to threat assessment records, but recommends that each threat assessment team consult with its own institutional legal authorities. It would be desirable if the General Assembly would pass legislation that specifically excluded the records of threat assessment teams from FOIA release.

6. Institutions that do not have an internal law enforcement agency may designate a particular office or school official to maintain threat assessment records. In all cases, threat assessment records should be regarded as law enforcement/security related records, even if the person in charge of maintaining the records is not a sworn law enforcement officer. The person designated as the campus safety official for the purpose of fulfilling Clery Act requirements may be appropriate.

7. The creation of a threat assessment file will not prevent use of other records according to existing practices. For example, disciplinary actions that would ordinarily be included in the subject’s educational or employment record should continue to be placed in those records. Incidents of threatening behavior that would ordinarily be recorded in an institutional file, such as an employment record, should continue to be placed in those locations.

G. Health Insurance Portability and Accountability Act (HIPAA)
1. According to the U.S. Department of Education, HIPAA does not apply to education records: “The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a law passed by Congress intended to establish transaction, security, privacy, and other standards to address concerns about the electronic exchange of health information. However, the HIPAA Privacy Rule excludes from its coverage those records that are protected by FERPA at school districts and postsecondary institutions that provide health or medical services to students. This is because Congress specifically addressed how education records should be protected under FERPA. For this reason, records that are protected by FERPA are not subject to the HIPAA Privacy Rule and may be shared with parents under the circumstances described above.” (http://www.ed.gov/policy/gen/guid/fpco/hottopics/ht-parents-postsecstudents.html

2. HIPAA allows disclosure of protected health information, including psychotherapy notes, concerning a patient when it is considered necessary to prevent a serious and imminent threat to others. This can include disclosure to law enforcement, family members, potential victims and others if the disclosure can be justified as reducing the risk of violence. See CFR §164.512(j).

2. Institutions of higher education, such as some community colleges, which do not have mental health professionals who can serve on a threat assessment team should contract with a mental health agency or independent practitioner in the community who can serve as a team member.

3. Institutions of higher education, such as some community colleges, which do not have an institution-based law enforcement staff that can serve on a threat assessment team should contract with a local law enforcement agency to obtain a team member.

D. Threat assessment records
Threat assessment teams should maintain confidential records of all cases for legal and security purposes. The records will not be part of a subject’s academic, medical, mental health, or employment records, if any exist at the institution. This policy does not alter any other policy regarding the placement of information in a subject’s academic, medical, mental health, or employment records.

§37.2-808. Emergency custody; issuance and execution of order.
A. Any magistrate may issue, upon the sworn petition of any responsible person or upon his own motion, an emergency custody order when he has probable cause to believe that any person within his judicial district (i) has mental illness, (ii) presents an imminent danger to himself or others as a result of mental illness or is so seriously mentally ill as to be substantially unable to care for himself, (iii) is in need of hospitalization or treatment, and (iv) is unwilling to volunteer or incapable of volunteering for hospitalization or treatment.

F. A law-enforcement officer who, based upon his observation or the reliable reports of others, has probable cause to believe that a person meets the criteria for emergency custody as stated in this section may take that person into custody and transport that person to an appropriate location to assess the need for hospitalization or treatment without prior authorization. Such evaluation shall be conducted immediately.

Virginia Criminal Information Network system established and maintained by the Department pursuant to Chapter 2 (§52-12 et seq.) of Title 52. Where practical, the court or magistrate may transfer information electronically to the Virginia Criminal Information Network system. A copy of an emergency protective order issued pursuant to this section shall be served upon the respondent as soon as possible, and upon service, the agency making service shall enter the date and time of service into the Virginia Criminal Information Network system.

E. Each threat assessment team shall establish relationships or utilize existing relationships with local and state law enforcement agencies as well as mental health agencies to expedite assessment and intervention with individuals whose behavior may present a threat to safety.

Under current regulations, personally identifiable information (PII) includes a student’s name and other direct personal identifiers, such as the student’s SSN or student number. PII also includes indirect identifiers, such as the name of the student’s parent or other family members; the student’s or family’s address, and personal characteristics or other information that would make the student’s identity easily traceable. The final regulations add biometric records to the list of personal identifiers that constitute PII, and add other indirect identifiers, such as date and place of birth and mother’s maiden name, as examples of identifiers that should be considered in determining whether information is personally identifiable. In response to public comments, the final regulations define “biometric record” to mean a record of one or more measurable biological
Virginia College Threat Assessment 82
or behavioral characteristics that can be used for automated recognition of an individual, including fingerprints, retina and iris patterns, voiceprints, DNA sequence, facial characteristics, and handwriting. The definition is based on National Security Presidential Directive 59 and Homeland Security Presidential Directive 24.
The final regulations remove from the definition of PII the reference to “other information that would make the student’s identity easily traceable” because the phrase lacked specificity and clarity, and possibly suggested a fairly low standard for protecting education records. In its place, the regulations add that PII includes “other information that, alone or in combination, is linked or linkable to a specific student that would allow a reasonable person in the school community, who does not have personal knowledge of the relevant circumstances, to identify the student with reasonable certainty.” This change brings the definition more in line with recent Office of Management and Budget (OMB) guidance to Federal agencies, with modifications tailored to the educational community. (See OMB M-07-16, “Safeguarding Against and Responding to the Breach of Personally Identifiable Information” at footnote 1:

http://www.whitehouse.gov/omb/memoranda/fy2007/m07-16.pdf.) Under the final regulations, PII also includes “information requested by a person who the educational agency or institution reasonably believes knows the identity of the student to whom the education record relates.”

In a nut shell, these threat assessment teams take in anonymous reports that are used to assess if an individuals is dangerous, mentally ill, what have you. They also take in reports from those around the target. False information can come in, but the target does not have the access to clear false information, which is allowed under most privacy laws. This is similar to what the Fusion centers do, and this is what companies like the A.C.L.U. were essentially fighting against with the fusion centers, but then here are universities and companies getting away with hiding this information from the people who need access to it, so that they can legally clear up any misinformation on their records. Not only that, but these threat assessments are being used to slander the individual in many cases, but under these guidelines they might not have information or access to the records.

This is really wrong, and legally this has to be challenged. This is one area that targets might be able to start in with a privacy lawyer. Request the information it’s your right, but when it’s denied, then then legal challenges can begin. I don’t know if this is the case in all States, or other countries such as Canada, but it will be interesting to find out. In the U.K. the laws do allow the request and disclosure of information, but I have not yet found a similar clause that hides the information away.

October 27, 2010 Posted by | Gang Stalking, Monitoring | , , , , , | Leave a comment

Welcome To The Coming Surveillance Society

Welcome To The Coming Surveillance Society

For the last several years the surveillance society has been documented by many who fear that privacy is being eroded, and that freedoms are being slowly eliminated, for those who have not been keeping up, who always wondered how freedoms could be eroded and eliminated almost overnight, I invite you to visit the coming surveillance society, and get acquainted with just a few of the ways it will be monitoring and tracking your every move.

1. Satellites

A recent CNN video has confirmed that local law enforcement agencies and U.S. civilian agencies will have regular use of the nations spy Satellites. They are going to be providing high resolution images, privacy groups are concerned that the powers will be misused.

In the movie enemy of the state, spy satellites are used to not only listen, recognize faces, but to track from location to location. If such technology is misused, it could have the potential to harm and hinder freedoms that are valued in today’s society.

2. Drones

It has just been announced that predator drones will now be used to watch and monitor the U.S. Mexican border. Predator drones are unmanned mini aircraft, equipped with cameras and in some cases weaponry.

The other notable factor is just how much money the U.S. government has spent on recruitment technology that can be masked as video games. They have even created virtual games that report back the users score. Could the U.S. be training a generation to kill with the remote ease of pushing a button, and with as little remorse?

Will citizens that step out of line be taken out of line as easily as the insurgents in the above video were? Only the future surveillance society will tell.

3. RFID Chips

RFID Chips are in more and more technology items and the chips can be used to track individuals within a few feet. These chips are in cellphones, bank cards, door passes, computers, and a variety of other items that the user carries in their possession on a daily basis.

The technology is becoming more and more invasive, and being used for a wider range of purposes and uses. Walmart recently announced it will start to use RFID in their retail clothing.

In the future, every item you buy, dollar exchanged, and electronic that you carry will may well have some form of RFID that will let the state monitor your activity. RFID tags that are tracked together, could give out a lot of information about the users that are carrying them, such as location and who else is present at the time.

IBM is even working on a Bar Code Reader’ for DNA, while Somark prefects ist’s Invisible barcodes for humans.

It’s the coming age of a truly advanced surveillance society.

4. Mind Reading

The technology is not only currently available, but there were suggestions that this technology would be used at airports in the future.

The hope for the future is to have technology that is so advanced that a simple invisible beam can be remotely placed on the forehead that will be able to tell the monitoring station all that the individual is thinking. Many would be surprised at how far advanced the technology has truly become.

5. Citizen Informant Network

Many do not realise that there is in place a vast citizen network in most cities that are fully capable of tracking and monitoring an average citizen from sunrise to sunset. Many do not realise that in most cities there are groups of citizens informants being used to keep track of average citizens 24/7.

In the book Closing The Gap, it’s reveals that using occupational health and safety laws, communities, workplaces, educational facilities, and others are able to list individuals on community monitoring and watch lists, and have them monitored for years to come.

Not only is the society now set up that way, but it seems that the young are being constantly conditioned to think that this is acceptable, and the way that things should be.

6. CCTV Cameras

Though the U.K. constantly come under fire, and are known for having the most CCTV cameras than any other country. The U.K. has one CCTV camera for every 14 people. Many major world cities are catching up. Cities such as New York, Washington and Toronto are added more and more CCTV cameras.

New York has steadily been increasing it’s use of CCTV, since the bombings, and cities like Toronto increased their CCTV usage for the G20 summit that was held in that city. It’s reported that CCTV’s were installed on nearly every single corner of the Toronto downtown core.

In future those quite little walks and private outings that were enjoyed my many may well no longer exist. Everywhere you go, you may well have someone, or something mechanical monitoring your every move. Giving up privacy for what is a sense of security, but is the trade off truly worth it? Only the citizens of the surveillance society can decide this in future.

7. Online Privacy

More and more laws are being enacted that could challenge online privacy, and anonymity in the future.
China is trying to rapidly end anonymity online. The reason the internet has been so successful and far reaching is that it provides expression, intelligent exchange, and a wide range of ideas not normally found offline. Also because you can be anyone and anything online, you get a wider range of opinions, truthful opinions, and ideas than you might otherwise have. The lightening fast paced exchange of information might not have happened as readily if everyone’s true information had to be revealed. Individuals who blow the whistle to sites such as Conspiracy TV, wikileaks, etc, might not have happened without this essential element of the Internet, and now those freedoms are being directly challenged in many far reaching, and unacceptable ways.

8. Pre-Crime Policing Technology

From the U.K. to the U.S. police and other agencies are starting to dabble in pre-crime policing technology. Technology that could well tell you when someone is about to commit a crime, or rather when the technology tells you that someone is about to commit a crime. The U.S. is even discussing parole based on this technology. Individuals in future could have their stay in jail, shortened or extended based on technology.

In the U.K. C.R.U.S.H. evaluates crime records, intelligence briefings, criminal profiles and weather reports, to try and determine if a crime is about to occur. It’s technology that will be able to prove you guilty, before you have a chance to declare your innocence.

9. Minority Report Ads

These are billboards that are already being developed by Japanese firm NEC. The billboards would use face recognition technology to confirm gender, age, and other factors and then proposition ads accordingly. The faces supposedly will not be stored for every long, but this is just one more way that consumers will be placed under surveillance, and advertised to directly. The name of this technology in Japan is called the Next Generation Digital Signage Solution.

In the U.S. IBM is leading the way for this type of Digital Advertising technology. Train stations, bus stops, and the sides of buildings. Surveillance and advertising all rolled into one. IBM says that consumers will only be shown adverts geared to the individual.

In the city of Leon in Mexico, everything will soon be linked to your iris scans. Technology is being implemented that will access all of your data based on your iris scan. Be it entering your home, opening a car door, going to work, the pharmacy to have a prescription filled, or accessing your medical records, it will all be based on your iris scan.

The creator of this system, believes that every person, place and thing on the planet will be connected to this system within the next 10 years.

10. Social Networking Sites

Our society just loves social networking sites. Seeing who we can connect with, making new friends, catching up with old. We love our social circles, and oddly so does that state for the purposes of monitoring, tracking and surveillance.

One of the top social networking sites online is increasingly being used by law enforcement and others, as a profiling database. Police use it to trackdown the friends, family, and associates of individuals of interests. The site is used to see who is interconnected to whom. Your circle, those of your friends, and their friends. If a crime happens and an individual is sought, some social networking sites have been very helpful with tracking down the individual.

One site is so advanced some users get emails advising them that they might know specific individuals not listed on their friend list, but individuals based on who their extended circles know and associate with.

It’s just one more way that you will be tracked, monitored and placed under surveillance in the future.

Welcome to the Surveillance Society. It’s here.

2. http://news.yahoo.com/s/livescience/20100820/sc_livescience/fortheusmilitaryvideogamesgetserious

http://www.abc.net.au/news/stories/2010/08/31/2998074.htm?section=world

3. http://online.wsj.com/article/NA_WSJ_PUB:SB10001424052748704421304575383213061198090.html

http://www.foxnews.com/scitech/2009/10/05/ibm-builds-bar-code-reader-dna/?test=latestnews

http://somarkinnovations.com/technology/

4. http://www.cbsnews.com/stories/2010/04/08/tech/main6374956.shtml

http://www.ubergizmo.com/15/archives/2010/08/intel_to_develop_mind_reading_computer_technology.html
Full Body Scanners

http://www.cbsnews.com/video/watch/?id=4697682n

http://current.com/technology/91865313_tsa-funding-airport-mind-reading-scanners.htm

5. http://www.lulu.com/product/paperback/closing-the-gap/12456582?productTrackingContext=search_results/search_shelf/center/4

http://www.amazon.com/dp/1453803319

http://www.pogowasright.org/?p=13175

6. http://news.nationalpost.com/2010/06/03/g20-security-cameras-installed-on-nearly-every-corner-of-downtown-toronto/

http://www.zeropaid.com/news/9349/under_surveillance__cctv_cameras_in_north_america/

7. http://www.stinkyjournalism.org/editordetail.php?id=826
http://www.cracked.com/article_18661_the-end-online-anonymity-why-will-you-be-freaking-out.html

http://www.nypost.com/p/news/opinion/opedcolumnists/end_of_internet_anonymity_WEyQu1ci16Bxnx6llqZ9IO

http://www.ibtimes.com/articles/44536/20100821/identity-cards-with-rfid-chip-on-track-in-germany.htm

http://www.nypost.com/p/news/opinion/opedcolumnists/end_of_internet_anonymity_WEyQu1ci16Bxnx6llqZ9IO

http://www.china.org.cn/china/2010-05/04/content_19965441.htm

8. http://www.buzzfeed.com/scott/pre-crime-technology
http://abcnews.go.com/Technology/software-predicts-criminal-behavior/story?id=11448231

http://www.telegraph.co.uk/news/uknews/crime/7908856/Minority-Report-technology-used-by-police-to-predict-crimes.html

9. http://www.telegraph.co.uk/technology/news/7411249/Minority-Report-digital-billboard-watches-consumers-shop.html

http://www.telegraph.co.uk/technology/news/7920057/Minority-Report-style-advertising-billboards-to-target-consumers.html

http://www.fastcompany.com/1683302/iris-scanners-create-the-most-secure-city-in-the-world-welcomes-big-brother?partner=yahoobuzz

10. http://www.computerworld.com/s/article/9141703/Lawsuit_seeks_information_on_federal_surveillance_of_social_networking_sites
http://www.bbc.co.uk/2/hi/europe/8570796.stm
http://www.google.com/hostednews/afp/article/ALeqM5hOdNkpM1lk1CDjhjdV6ryUZffDjw

September 1, 2010 Posted by | Gang Stalking, GPS tracking, Mind Control, Mind Reading, Monitoring, Spirit, Spy cameras, spy satellites, Spying, Stasi, State target, Surveillence | , , , , , , , , , , , , , , | Leave a comment

Jane Clift Case Highlights

Jane Clift Case Highlights

This case is great. She was placed on a list. She used the Data Protection Act and Human Rights Act to sue and win her case.

6# The words complained of contain personal information relating to Ms Clift. That is data which is subject to the Data Protection Act 1998 (“DPA”). This Act implemented in English law some of the rights recognised by Article 8 of the European Convention on Human Rights (“the Convention”). Later those rights were more fully incorporated into English law by the Human Rights Act 1998 (“HRA”). The Council is a public authority. HRA s.6 (1) provides:

“It is unlawful for a public authority to act in a way which is incompatible with a Convention Right”.

Physical Contact. This is an area that some targets might be able to build a case on, in regards to who was given access to their data.

Data Protection Act. Human Rights Act. These are the two acts that she was able to use to file her case.

8# The question in this case is whether, and if so how, the Council must demonstrate that it has complied with its public law duties under HRA (and incidentally DPA) if it is to be able to assert that it has the interest or duty required at common law for there to be a defence of qualified privilege.

This is what the case came down to. The same would likely be true for the Acts in other countries.

EVENTS LEADING TO THIS ACTION

9# As a responsible employer the Council has a policy to protect its employees from violence at work. The policy is set out in a document headed “Safe System of Work (Codes of Practice) H&NS/COP/1.14 Version 1.0 date issued 11/3/03 Violence at Work (Inc Potentially Violent Persons)” (“the Policy”).

This also fell under Violence at Work

15# Mr Kelleher then conducted a number of other interviews. One was with Mr Gulfraz, a friend of Ms Clift. She was accustomed to helping him in making telephone calls and filling out official forms. She was at the time also helping him in a complaint he was making against the Council on a housing matter. He was present at the time Ms Clift made her call to Ms Rashid on 11 August. He heard the whole conversation over the speaker phone. Other witnesses were fellow employees of Ms Rashid. Ms Rashid did not have the phone on loud speaker but her colleagues sitting near her heard her side of the conversation. It was sufficiently unusual to attract their attention.

Witness close to Jane Clift were interviewed. Just like witnesses, family, friends, would be interviewed.

21# Also on 1 December 2005 Mr Kelleher filled out a standard form prepared in accordance with the Policy. It is known as a Violent Incident Report Form.

Same type of reporting form used in other countries as well to document incidents.

22# Mr Satterthwaite is the author of the Policy and the officer of the Council responsible for compliance with Data Protection and other related matters. He maintains the Register. It is a document prepared on Excel spreadsheet software. It contained ten columns and, at the relevant time, about 150 rows. Each row related to a person identified by name and address given in the first two columns. Ms Clift’s name was entered on the Register by Mr Satterthwaite upon information provided by Mr Kelleher. Details of the incident are given in column 5 as “threatening behaviour on several occasions”. The duration for which the person is to remain on the register is given in column 8 and in respect of Ms Clift the period is 18 months. The ninth column contains a title “Risk Rating VH, H, M and L” the entry for Ms Clift is M for medium. Two entries are admittedly inaccurate. The location of the incident is given at column 4 as “via correspondence”. The date of the incident is given in column 6 as “30/11/2005”.

All your information get’s documented.

24# The precise means by which the Register was circulated did not emerge clearly in evidence. Ms Clift protested immediately at her inclusion on the Register and asked if there was a right of appeal. She was informed there was not. In a letter dated 13 December 2005 Mr Satterthwaite (signing himself as Data Protection/ Health and Safety Co-ordinator) explained his decision in terms which implied that the Register had already been circulated by that date, as might be expected. Some information as to whom the Register had been shared with was given in that letter. More detailed information as to the publishees is not recorded in the form of an email before one that has survived dated 27 January 2006.

Health and Safety Co-ordinator did not give her the chance to appeal, so she took it to court.

30# The letter dated 13 December 2005 from Mr Satterthwaite to Ms Clift includes the following:

“Re – your letter dated 10 December 2005 – PVP Marker

A request for information that you sent to the Council, has been passed to me to answer, as I am the Data Controller for the PVP register.

Under the Management of Health and Safety at Work Regulations (1992), we have a duty of care to ensure that we do not put our employees into situations that may cause them physical or mental harm…

This register is shared between the Council’s Health and Safety co-ordinators to distribute on a need to know basis to managers, (especially those services that interface with our customers) so they can take the appropriate actions to protect their staff. This register is also sent to our partner organisations that may provide a service on our behalf (i.e. Slough Accord, Interserve, NHS Primary Care Trust and The Community Safety Partnership). Once the time limit has expired, using the same communication chain, a request is made that all traces of the warning marker is removed from the individual’s name.

This is what get’s distributed, and this is the same wording in most of the documents that I have been reading up on.

31# That letter reflects guidance from two sources. Whether it does so correctly is another matter. The first source is the Policy. This includes what, in another context, would be called sentencing guidelines, listing the activities that may render a person liable to have a violent person marker placed on their file and the “set period” said to be commensurate with the activity. The second document is one issued by the Information Commissioner covering five pages, entitled “Data Protection Act 1998 Compliance advice Violent Warning Markers: used in the public sector” (“the Compliance Advice”).

32# Ms Clift pursued her rights of access and sought further information under the Data Protection Act. By a letter dated 11 January 2006 Mr Satterthwaite wrote as follows:…..

Mainly social services related activities – Supporting People, Community Mental Health Team and Community Nursing

– Community Safety Partnership

Neighbourhood Wardens

Disclosure was made to the above organisations as they may all have cause to visit your address, for face to face contact. A good example of this is one of the many satisfaction surveys carried out.

She wrote the request under the Data Protection Act. Note her file was shared and distributed to quite a few people.

42# After further submissions on the questions to be asked of the jury counsel agreed that I should direct them as follows:

“If you assess damages, then you take into account circulation to 30 people for the e-mail and 150 for the Register. You leave out of account the remainder of the 66 to whom the e-mail was addressed unless you answer question 2 yes [in other words unless they find malice].

If you answer yes to question 2, you take into account all 66 people to whom the e-mail was sent and 150 for the Register”.

THE DATA PROTECTION ACT AND THE HUMAN RIGHTS ACT

These two acts played heavily into her defense.

43# The first proceedings brought by Ms Clift were in the County Court under the DPA. She commenced those proceedings on 13 January 2006 alleging that the Register was inaccurate. Those proceedings have been stayed to await the outcome of this libel action.

This is what Jane Clift had to do to clear her record.

(a) The widespread publication of information that a person is ‘violent’ and their inclusion on a register of ‘violent persons’ is a serious interference with that persons Article 8 rights which requires cogent justification.

(b) Ms Clift had never used violence towards the First Defendant’s employees and had never threatened any such employee with violence. No employee had complained about Ms Clift’s conduct and no contemporaneous ‘Violent Incident Report’ relating to Ms Clift had been completed by any person.

Point 46. interference with a persons Article 8 rights.

47# There followed a plea of malice which is summarised in para 2 above. The plea of publication set out the facts I have already recited in relation to the circulation of the e-mail with the Register as an attachment on 27 January 2006. The next paragraph material to be cited reads as follows:

“10 The Register entry and the e-mail were distributed excessively widely to persons and bodies with whom [Ms Clift] had no contact and had no interest in [Ms Clift].

When I have no contact with individuals across boarders, why is my information shared with them? Clients or associates in other countries should not have this information disseminated, but they are.

50# Nevertheless, it is appropriate to set out the terms of the draft amendment as follows:

“12A Further by publishing the e-mail and the Register Entry the [Council] has interfered with [Ms Clift]’s rights under Article 8 (1) of the European Convention on Human Rights without such interference being justified under Article 8 (2) and as a result its actions were unlawful under Section 6 of the Human Rights Act 1998.

The targets in European countries could start to look into this via data protection and Human Rights Conventions, Articles 8 and 6. See a lawyer first.

66# It is understandable that Mr Beggs should have ordered his arguments as he did. The Council has policies on both health and safety, and on data protection. Mr Kelleher and Mr Satterthwaite made the decisions they did make after considering these policies. Mr Satterthwaite directed himself on the law of health and safety at work, and on data protection, as set out in the Policy and the Compliance Advice. He did not mention the law of libel. Whether or not Mr Satterthwaite directed himself correctly is an issue for the court. But it is understandable that the Defendants should wish to be judged by the law which they understood to be applicable. Mr Beggs may also have taken the view that the course I adopted in the Westminster case at para 151 would be difficult to support. If so, he did not say that.

Health and Safety at work.

75# Mr Beggs submitted that the Council owed a duty to ensure the safety of their staff. He cited Health and Safety at Work Act 1974 ss.2 and 3 and the Management of Health and Safety at Work Regulations 1999 (SI 1999/3242), in particular regulations 3-5 and Schedule 1.

Health and Safety consistently cited throughout this whole case, used for justification.

90# The absence of a system of monitoring to whom the Register was published means that the Claimant may not be able to prove the full extent of the publication. The onus of proof is upon her, and if she is unable to discharge it, that cannot be relevant to the defence of qualified privilege that might be available in respect of other publications which she can prove.

A disgraceful lack of oversight is what I like to call it.

94# Para 16 provides that:

Data controllers should ensure that only those members of staff who are likely to come into physical contact with a potentially violent individual, through visits or by meeting in open plan reception areas, or who can otherwise demonstrate a need to know, have access to violent warning marker information. So for example where a member of staff is required to visit a potentially violent individual, at this point they should be advised of this fact”.

Physical contact. There is that word again.

98# The Compliance Advice does not assist on the definition of violence or violent behaviour. The Policy gives what it states are “Examples of violent behaviour covered by the Code of Practice”. They include: “Shouting, Swearing, Racial / Sexual Abuse, Threats, Pushing, Spitting, Object Thrown, Damage, Hostage and Actual Violence”. These are all things which an employee should expect to be protected from. But to refer to them all as examples of violence, or even potential violence, gives an extended definition of that word. It normally connotes at least a threat of physical force, and one which is meant seriously.

An expanded definition of violence. So shouting by someone’s standards could get you and did help to get Jane Clift on the list. You have to be so very careful with these individuals.

109# Documents are now normally held and communicated electronically. It is easy and common to circulate by e-mail to very large numbers of people, within (and outside) an organisation, information which, in the past, would have been addressed in a letter or memo to very few. It is therefore much more likely than in the past that information will be communicated to persons to whom no duty is owed, or who do not have a legally sufficient interest in receiving the information. It was in order to address this change in practice that the data protection legislation was introduced, first in a limited form in 1984, and then as it is now in DPA. HRA was not specifically targeted at this issue, but it undoubtedly applies to it.

How far and wide is information getting shared? This is going to be an interesting question to look into. I get the feeling with limited oversight, they are using this to smear targets left, right and center.

112# The historical cases show that the values set down in the Convention in 1950 as rights under Articles 8 (including the right to reputation) and Article 10 (including the right of freedom of expression in the giving of references and warnings) were not invented in 1950. These and some other Convention rights can be traced back, not only to the American Bill of Rights and the French Declaration in the eighteenth century, but also to the very beginnings of English law. So one thing that HRA has achieved is to provide a means through which the courts can review the relative priority that the common law gave to those rights (which it already recognised), and adjust those priorities to meet contemporary needs.

This case was very interesting. Lot’s of good points, targets might be able to use. Check with a legal expert.

117#

On the one hand looms the probability, often amounting to a certainty, of damage to the individual, which in some cases will be serious and may indeed be irreparable. The entire future prosperity and happiness of someone who is the subject of a damaging reference which is given carelessly but in perfectly good faith may be irretrievably blighted. Against this prospect is set the possibility that some referees will be deterred from giving frank references or indeed any references.”

Yes slander can ruin your life.

120# The DPA has created new statutory rights which are in no way related to employment or other relationships, although they affect such relationships. That Act requires attention to be focussed on the rights of those who are the subjects of references and warnings, as well as on the rights of those to whom the references and warnings are addressed. Personal data must be processed (which includes disclosed) “fairly and lawfully”, and it must be accurate: see Sch I. There are extensive provisions on the interpretation of these and other principles and a number of statutory instruments containing further provisions. I shall not consider these further, because Mr Tomlinson made no submission based upon them. He confined his submissions to the new rights and duties created by the HRA, which apply to the defendant council, but would not apply directly to a private sector employer.

Wow you mean people can’t just create fake incidents, data must be accurate? Guess it’s time to start reviewing some files and see what is actually out there. What has been said, attributed to individual files vs what is accurate. There has to be a way to do a class action for inaccurate information, especially if there is a systemic practice that is occurring.

128# The jury answered No to each of the first three questions: they rejected the defence of justification and the allegation of malice. They awarded damages of £12,000 to Ms Clift. So, Ms Clift left court with her reputation vindicated and Mr Kelleher left court without a stain on his reputation.

http://www.1brickcourt.com/files/cases/140CLIFT_58136.pdf

March 28, 2010 Posted by | Gang Stalking, Gangstalking, Health and Safety, Isolation, Laws, Minorities, Monitoring, Record keeping, Social Control, society, Spying, Stalking, State target, violent persons registry | , , , , , , , , , , , , , , , , , , , | 10 Comments

Refuse to live in fear

Fear it’s the power that controls and consumes the lives of many people right now. As long as they are consumed by the fear they will be controlled by it. As long as they let others tell them what to be afraid of they will control the masses.

Wars on Drugs, War on Terror, Street Gangs, Global Warming, Swine Flu, etc. It can be anything, the only person or persons that can control this fear or stop it from happening is us. We the people. We have the power and they know it, thus they keep us in a constant state of fear. They put weak and pathetic leaders forwards, ones in their control, who we are then told to emulate.

You see this questionable leadership in all areas of society, but most people never question it, it’s always been like this and they don’t think that things can change, or that they will change. Also they are so comfortable, they are too lazy to put in the effort that it would take to make a change. Even if it’s slavery it’s still a routine that they know and they are willing to work with it.

Targeted Individuals know a lot about fear. We deal with fear when we are mobbed, targeted, electronically harassed, and the various other things that targets go through. Being afraid is a normal human emotion and there is nothing wrong with it, but when it overpowers and controls your life, then it’s a bad thing. That’s when it becomes a problem.

Many targets deal with fears that most people think make them look crazy. Eg. They get sensitized over time to a color, word, action, ect and finally all the negative associations, or the big event that it took to make them sensitized is not needed, any little trigger event will do, and these informants on a daily basis will use little trigger events to keep the target scared and in their control.

They will also try to anchor on other things to keep targets scared of more things, till their life becomes one big fear factor. That is the goal, then all they have to do is snap a finger, jingle a key, cough, sneeze, use the color red, patterns, snap laptops, etc, and the target reacts. Those are some of the sensitivities I have heard about since coming online. These are designed to keep the Targeted Individual in a state of anxiety or fear. Before these little events could work, they used big events to try to make the target afraid. Eg. When I first started being electronically harassed and burnt in my home, or as the informants like to call it, (electronically monitored) they use to always try to attach a noise of a drill to the torture. So there I would be getting burnt, and then at the time I knew nothing about shielding and had no defence so it was pretty raw, and painful. They consistently tried to make sure that drilling was attached to the torture, this was over several months. So when I went back out into the world, they were sure, and banking on the fact that I would be sensitized to the sound of drills and then they could just tell the informants, this person has a phobia, is very sensitize to drills, acts out is not normal, ah but they failed. For the next two years and even to today, they still attempt it once in awhile to see if I was sensitized. It just shows me that with proper knowledge, we can win out over these people in small little ways, day by day.

See I was lucky, I had one sensitivity, I had it for years. Before my torture with electronic harassment started I learnt about anchors, so I realized that they would be trying to attach another sensitivity to the one I already had. I had a working knowledge of Pavlov and the dog experiment so I was familiar with what they were trying to do.

Eg. Pavlov would ring a bell during his dog’s feeding time. The dog would start to salivate over the food. After a while he could just ring the bell and the dog would start to salivate, cause he had associated the sound with food, in our case we associate the sensitivity to negative things they have done to us over time, without in many cases even realising that they are sensitizing us till it’s too late.

The sensitivity that I had when my electronic harassment began, I spent that time at home being tortured and electronically harassed, but also getting over my sensitivity. It was not perfect, but over the next few months, it got better, and is at a normal level to what it was before the sensitivity started.

So what does this have to do with fear that the average person’s experiences? Well let’s take 9/11 a big, huge event that got everyone scared, panicked. Most people because they shared the fear understand it and agree that this was a fear worthy event, and understand and accept that people are scared and have a phobia about this event happening again.

So now several years later, you don’t need another 9/11 to keep the people scared, the occasional terrorist threat, weird plane flying over New York, and keep the citizens on high alert and they are in the grips of fear, and it works. Also if we get them scared of 9/11 then we can add in other fears, attach additional fears.

See these people try to stop us from living our lives by trying to scare us, systemically trying to destroy us, and they want to try to control us. Well 9/11 does the same for the average citizen.

When people are scared they can do silly things, behave in what to the average person seems like irrational behavior, but to them seems perfectly normal. To an outsider that did not know about 9/11, voodoo rituals of taking off belts, shoes, and allowing oneself to be scanned and shown virtually naked to some stranger, would seem bizarre if not flat out crazy, an outsider would laugh and be like what’s wrong with these people, allowing themselves to be treated like that and give up their rights? But because the fear has happened over the last several years it seems normal to the people that share this common fear. Just like our phobias are normal to us, based on our experiences.

Getting past fear, not feeding the fear factor. For my sensitivity it was a process. Each time I was home, I worked on it, I did not have the daily exposure, I knew it was irrational, I knew how it had come about, and I had a pretty good idea how to go about disassociating it with negative things, but it took time, and I had to work on it.

Fear is something that we have in many ways, it’s normal and healthy, it can even keep us safe, but there is a stage where fear becomes irrational and even hurtful. Most times fear is individually based and if your phobia is going to an extreme level, an outsider can often point this out. However fear of 9/11 was group based, and the fear is shared by such a large group that their irrational actions, and activities are not being registered. The vast majority see these crazy measures, as something sane. They see giving up their rights, privacy, dignity as something needful to keep them safe. The fear is so deep routed that they are not only willing to give up their rights as a society and individuals, but then they are like a drug addict willing to drag down those around them who don’t see things this way, those who refuse to give into this irrationality.

They want others to be scared the way they are, and those of us who just don’t function this way, they are happy to take aware our rights, our freedoms. They are happy to go to other countries and attack others to try to bring about safety and security, which only succeeds in making more enemies, but instead of seeing this for what it is, they continue on in the same vain as before. Doing more harm to their chances of having a normal safe future.

Fear can be strong, powerful and irrational. At some stage however if you want to get better as an individual, or as a society, you have to stop giving into this fear, you have to find some way to let it go. Unfortunately being scared, living in fear works for many right now, too many, and like Dr Phil says, if it’s working for you, you are not going to change. Something about this cycle of fear and stupidity is working for a large majority of people, and the rest of us are caught up in their self destructive spiral of destruction.

We can’t force them to stop being scared, I don’t believe that we have the right. But we can point out why the fear is irrational, encourage them to help them get past the fear. We can raise our own vibrational levels, refuse to live in fear in our own lives, and try to help those around us who are gripped by fear to get past it. Many never get past it, but they might be able to get to a stage where they are functioning in a rational and sane manner again. McCarthyism continued until just a few stood up and said, enough is enough, “have you no shame,” and then it fell apart from there.

Change can happen, you can stop living in fear. It’s a painful, daily emotional experience, I am not trying to pretend that it will be easy. Right now this fear is enslaving and to many the fear appears to be protecting, but it’s not, however people will only see this in their own time, when they get ready to deal with the fear. For many it will be never. Yesterday it was the Russian’s, they were the one’s to fear, they were going to drop that nuclear bomb anytime. That fear seemed logical to some, and it allowed them to do crazy things. Today it’s terrorist. Tomorrow it will likely be someone else, or something else. Whatever will get a response from the people. Just like whatever will get a response from the Targeted Individual.

Each person has to take some individual responsibility for what is happening. It’s a normal thing in today’s society to be scared, but each person has to try to move past that fear.

First realise that there is a problem. The society is being destroyed by this fear. The rights and freedoms that you claim others envy so much, where are they? Are they running around naked at airports, well not running around naked, but being scanned naked, with privates available for view? (Yes the naughty bits will be available for view, or there is no point in having the scanners.) Are they getting mind read at the airports? When do you say enough is enough?

Even if the worst thing does happen, you would pick up your lives, your psyche and continue on, that is how normal societies function, and I know you probably don’t want to hear this from the Targeted Individual, but you are no longer behaving in a rational manner.

If you are able to realise that there is a problem with what is happening, then you need to ask yourself what can you do at an individual level to fix this problem? Then take it from there.

Fear controls us as long as we let it. I have watched psycho nut jobs, some of these informants try to destroy my life for years. Jobless at times, threats of losing my roof over my head, almost daily attempts to run/drive into me in lethal ways. Plus the just being annoyed by the informants as they try to provoke. I have been there done that, it’s not a place I like, and it’s one that I want to stay away from. Like others I have to work at it.

If you can raise yourself up from the fear, then you can help others. Some of us got past the Flu Fear recently, and Global Warming fears, but they seem to always be able to pull the people back in with the terror scare. Until you the people find a way to stop being scarred, then they have us, and the terrorists real or imagined, planned or unplanned will have it and you will have lost.

Overcoming fear is not easy, it’s a daily process, but we have to try because freedom and democratic security are worth fighting for.

January 10, 2010 Posted by | 9/11, Brain reading device, changing vibrations, Citizen Informants, Community harassment, community mobbing, control, Controlled society, Covert investigations, crazy, Gang Stalking, Gangstalking, harassment, Informants, Insane, Intimidation, Mind Reading, Monitoring, Surveillence, Targeted Individual, Torture, vibrations | , , , , , , , , , , , , , | 6 Comments

Voice to skull

Voice To Skull otherwise known as V2K.

Now let me state this before I go further. I am not an expert on this topic. I have never been a target of this practice. My knowledge is limited, but I do get questions in regards to this from time to time, so I am going to try to tackle this in a small way.

This is not advise, a professional opinion, or legal feedback in anyway shape or form.

I also want to say to true targets of this practice, I think you are very brave discussing this stuff. It can not be easy, and I hope that technology can be found to counter what is happening.

Some targets legitimate targets complain about hearing voices. If you are from outside the community and someone tells you that they are hearing voices you assume that they are crazy right?

Well the more you know the better able you are to make informed choices and opinions.

Now after watching this video, do you think that everyone hearing voices is crazy?

What about after watching this clip from Real Genius? It’s a 1980’s movie staring Val Kilmeer, where they get someone to hear voices via a tooth implant.

They put the person to sleep, do a bit of drilling in his tooth, and he wakes up thinking that he is hearing the voice of God. This was a cheap 80’s trick. Actual technology has come a long way.

The clip will not be posted here, but if you really look for it you can find it. Or just rent the movie.

You can even watch the movie control factor. Where they also use technology to get people to hear voices. In an apartment not too far from where the target lives.

[quote]”The American people have been kept in the dark about the true scientific progress in this country. Technologies of mass-control exist that the public would never dream off. I know because, I helped developed them. They call it psychotronic warfare, a research program dealing with mind-control. They can control everything what a person does, voices, that is how they get ya. This is not the elected government, this is the national security empire, the dark vaders of the 21st century.” –Control Factor

Credit Source:
This short video clip was taken from the movie “Control Factor(2003) by Universal Studios”

More Mind-Control Sources:

Mind Control The Ultimate Terror:
http://www.educate-yourself.org/mc/

Psychotronics:
http://www.bibliotecapleyades.net/ciencia/cienc ia_psychotronicweapons.htm

Mind Control with Silent Sounds & Super Computers:
http://www.educate-yourself.org/cn/mindcontrolw ithsilentsounds24jun05.shtml

Digital TV – Mind Control by sound of silence:
http://www.bibliotecapleyades.net/sociopolitica /esp_sociopol_mindcon40.htm[/quote]

Now control factor is just a movie, but the concept of the technology is very real.

This silent sound technology was patented years ago. Microwave hearing, which would allow a microwave to send voices directly inside the human head.

http://en.wikipedia.org/wiki/Microwave_auditory_effect

[quote]
The microwave auditory effect, also known as the microwave hearing effect or the Frey effect, consists of audible clicks induced by pulsed/modulated microwave frequencies. The clicks are generated directly inside the human head without the need of any receiving electronic device. The effect was first reported by persons working in the vicinity of radar transponders during World War II. These induced sounds are not audible to other people nearby. The microwave auditory effect was later discovered to be inducible with shorter-wavelength portions of the electromagnetic spectrum. During the Cold War era, the American neuroscientist Allan H. Frey studied this phenomenon and was the first to publish (Journal of Applied Physiology, Vol. 17, pages 689-692, 1962) information on the nature of the microwave auditory effect; this effect is therefore also known as the Frey effect.

Dr. Don R. Justesen published “Microwaves and Behavior” in The American Psychologist (Volume 30, March 1975, Number 3).

Research by NASA in the 1970s[citation needed] showed that this effect occurs as a result of thermal expansion of parts of the human ear around the cochlea, even at low power density. Later, signal modulation was found to produce sounds or words that appeared to originate intracranially. It was studied for its possible use in communications. Similar research conducted in the USSR studied its use in non-lethal weaponry.[citation needed]

The existence of non-lethal weaponry that exploits the microwave auditory effect appears to have been classified “Secret NOFORN” in the USA from (at the latest) 1998, until the declassification on 6 December 2006 of “Bioeffects of Selected Non-Lethal Weaponry” in response to a FOIA request.

The technology gained further public attention when a company announced in early 2008 that they were close to fielding a device called MEDUSA (Mob Excess Deterrent Using Silent Audio) based on the principle.[1]
[/quote]

So if a target starts to hear voices how do they know if they are crazy or being experimented on with one of the above technologies or even something more advanced?

This is a hard question to answer. The targeting that we experience I fully believe is capable of driving a perfectly sane person, mentally unstable. However I do believe that some targets are being played with, using some of the above technologies.

If I was a target in this situation, I would use a very scientific method to investigate.

Location.

Are you hearing the voices at all times, or just in specific locations?

Does it happen under water? Is the effect increased or decreased in anyway?

Have you tried to record the voices? Remember we can not hear dog whistles, but they do work. Many sounds are outside of human hearing, but other technology might be able to pick it up.

I am not sure if a microwave would block the sounds out, but if I was a target in this situation, and thought microwave hearing was being used, I would try to see if the noise could be eliminated by testing out a microwave. Eg. Unplugged a microwave, if you place your head/skull inside for a few seconds, do the voices stop? I know this sounds extreme, but honestly it’s something that I would check, takes about 30 seconds and this may or may not be something that could be attempted.

I mentioned recently that they are working on technology to give the world an invisible cloak, should be ready in the next three years or less. Yes an honest to goodness invisibility cloak. Think Harry Potter.

The materials they are using, are designed to bounce off microwave rays and this might help targets in the future if microwaves are being used. However the materials are expensive, but for targets with money to burn, then this could be something to look into.

Underground bunkers, deprivation chambers? I don’t know if any of these would work. Climbing a high mountain? Just to test out different locations, to see if it is something high tech vs low tech, vs something that is with you 24/7.

Again the above may or may not prove or disprove anything but it’s something that I would look into if in the same situation.

Why I believe some targets who say this is happening to them? Well in part because of the above examples posted, but the targets that I do believe, they were really specific.

Ruth Goodman, said it was men that she had dated, who worked in the intelligence industry. She said it happened to her after she was drugged and put under anesthesia. She thinks some form of micro surgery was done. She says they tried to keep her off the internet and prevent her from writing. She died shortly after, so I can’t confirm this one way or another, but her example fits what others have said.

A man I think his name was Tracy said that he could hear people like they were fighting over a microphone, and he knew at least one. To me based on what he said, it sounded like they were close by where they could see him, and the stuff they said, sounded like hicks who really wanted to mess with someone.

Gloria Naylor from what I recall said that her voices prevented her from writing. Now in her case I don’t know if they were with her all the time, or just when near the computer.

I like what Naylor did in the sense that she tried the traditional method, was given medication, it did not work, so she looked around for other answers.

I think this is logical, but as a target, I know that I would do a lot of research, experimentation and troubleshooting first.

So I spent a large part of the last few days brainstorming trying to figure out what things targets have done, and what they could do.

Remember these people who are doing this to you are not God, they would like to be, but they are not.

[quote]They are trying to develop a beam of light, it would be projected onto your forehead, go a couple of milimeters into your frontal cortex, and then receptors would get the reflection of that light, and you would not know. [/quote]

They even have laser microphones.

http://en.wikipedia.org/wiki/Laser_microphone

[quote]The main type of laser microphone is a surveillance device that uses a laser beam to detect sound vibrations in a distant object. The object is typically inside a room where a conversation is taking place, and can be anything that can vibrate (for example, a picture on a wall) in response to the pressure waves created by noises present in the room. The object preferably has a smooth surface. The laser beam is directed into the room through a window, reflects off the object and returns to a receiver that converts the beam to an audio signal. The beam may also be bounced off the window itself. The minute differences in the distance traveled by the light as it reflects from the vibrating object are detected interferometrically. The interferometer converts the variations to intensity variations, and electronics are used to convert these variations to signals that can be converted back to sound.[/quote]

The world is changing at a rapid pace. If a target today goes to the doctor to complain of hearing voices, they are still automatically in most cases diagnosed as mentally unstable, but the reality is, if a psychiatrist or other health care professional is not upto date on the latest technology, or even aware of secret technologies, they run the risk of making a faulty dignosis, where someone might actually be telling the truth. The science fiction of yesterday, is science fact today.

January 9, 2010 Posted by | Awareness, Brain reading device, changing vibrations, conspiracies, control, driving-crazy, Electronic harassment, Gang Stalking, Gangstalking, Gaslighting, High technology, Insane, Mind Reading, Monitoring, psychological harassment, Science, Surveillence, Targeted Individual, Voice to skull, youtube | , , , , , , , , , , | 8 Comments

Fraternal Twins

And you thought the Human Flesh Search Engine was confusing

http://jolienadine.com/blog/wp-content/uploads/2008/06/mary_kate_ashley_olsen_twins.jpg

Yesterday everyone was introduced to a new concept, well a concept that’s been on the net for the last few months, and that’s the violent person registry.

You were brought the story of Jane Clift who tried to inform on a drunken man who yelled obscenities at her, and got herself placed on a violent persons registry instead of him.

Here are some of the highlights and the recap.

http://www.guardian.co.uk/uk/2009/jun/24/slough-jane-clift-libel-damages

http://www.dailymail.co.uk/news/article-1195399/Woman-branded-potentially-violen t-council-complaining-damaged-flowerbed.html

[quote]But her efforts led to a surreal nightmare in which she was branded potentially violent and put on a council blacklist with thugs and sex attackers.

Her details were circulated to an extraordinary range of public and private bodies, including doctors, dentists, opticians, libraries, contraceptive clinics, schools and nurseries. Their staff were advised not to see her alone.

The 43-year-old former care worker was forced to withdraw an application to become a foster parent and, eventually, to leave the town where she had lived for ten years.

Now, after a bitter four-year legal battle with Slough Council, the stain on her character has finally been removed.

[/quote]

[quote]
She said that after the council acted, she sensed that everywhere she went, there was ‘whispering, collaboration, people scurrying about’.

‘One time I went to the contraceptive clinic and I felt that there were way too many people hovering about for me than should have been there, making me feel very insecure.

‘It did serve as a reminder that everywhere I went – hospitals, GPs, libraries – anywhere at all, even if I phoned the fire service, as soon as my name went on to that system, it flagged up ‘violent person marker, only to be seen in twos, medium risk’.’
[/quote]

http://www.dailymail.co.uk/news/article-1193210/Woman-sues-libel-council-labelle d-potentially-violent-complaining-vandalised-flowerbed.html

[quote]‘It has taken me four years to clear my name and I hope Slough and other councils never again misuse their registers.’ Simon Davies, from the human rights watchdog Privacy International, said: ‘This just shows the megalomania of these local authorities. This poor
woman was subjected to a Kafkaesque ordeal because of an incorrect allegation made by one official.

‘It is the sort of behavior that we would have condemned if it came from China or Russia. Our councils seem to be out of control.’ [/quote]

[quote]Jane Clift lived with the stigma of the violent persons register for three and a half years. Slough Borough Council refused to back down and maintained that she was a violent person. [/quote]

-She was blacklisted
-Forced to Move
-She is single and female
-When in public she felt surrounded by extra people who just should not have been there.
-Being placed on the list was used as an attempt to silence here.

So I have been getting the obvious question, but isn’t this Gang Stalking or Gang Stalking like, the answer is yes, very much so and very much similar. Thus why we have the picture of Mary Kate and Ashley Olsen. They look exactly alike, and for most of their life, I assumed that they were identical twins. They are not. They are in fact fraternal twins, but without the blood work, and to just look at them, they look exactly alike.

I believe the violent person registry is close enough that many of us can use that to say look, here is the story of a women, who was placed on a watch list. Look at what happened to her, she was followed in public, forced to move, and had her life disrupted. If you are looking to get people to believe you, I don’t see why you can’t use this. I also think you can use the existence of such lists, to get legal procedures or inquires going. At the onset it looks enough alike. Also since I have not had a chance to find out the total nature of her harassment, I don’t know how close a match this is yet. For the time being I am placing it in the fraternal twin category.

Where it differs. She was told that she was going to be placed on such a list. I have not come across one Gang Stalking target that was told they would be placed on a list. This means she had reasonable grounds and proof of who placed her on the list, the time frame, the incident that started this, and many of us will not.

When she moved it sounds like some of the harassment might of stopped. I don’t know this for sure, but based on the articles, it sounds like the point of entry onto the violent persons list was where her attack was most virulent, that and ofcourse having that title on her head.

She is a single female, they were using it to keep her quite, so I suspect there was other harassment ongoing, which she probably left out of the article to sound sane. To get the nitty gritty if there was more would require more digging.

With Gang Stalking, or what we are calling Gang Stalking and I plan to continue calling that, we get Gaslighting. They monitor our homes 24/7. I don’t know if that happened to Jane Clift or not. With Gang Stalking they try to make us look crazy, but I am sure that they also want us to look violent, pedophiles etc.

Based on the research, the article from the ACLU, other target testimony, things like the Buzzsaw, what happens with Gang Stalking is systemic. Many targets show a multi-generational aspect to the targeting. They kill targets, that goes beyond any kind of everyday list. What we see with Gang Stalking, is systemic destruction.

I however believe that a person unknowingly could end up on a list like Ms Clift did, and then have the same thing happen that we see in Gang Stalking. I believe that when this story came out, we were suppose to accept that this was all that there is to Gang Stalking and go on to our happy lives, that’s clearly not going to happen.

With Gang Stalking, we not only have electronic monitoring happening, which more times than not, constitutes torture. These people co-ordinate not just from city to city, town to town, but across country lines.

The informants are not just one and few people, the reports, research, shows that we are setting up Stasi States, or States like China, where the citizens are all snitches. Sorry I mean Citizen Informants.

With Gang Stalking, there is a systemic collaboration that happens. Ms Clifts name went out on a list and was spread far and wide, but if she had changed countries would she have been followed? I don’t have an answer, but targets like Jesus Mendez, Gloria Naylor, and so many others report leaving, country, moving, moving again, and it’s the same thing. Same coordination, same gaslighting, same systemic approach to the monitoring.

What we are looking at is a conspiracy, and it goes deep, and it is systemic. I have no doubts on this, proving it will be a bit of a longer road yet. Great strides have been made, and will continue to be made, God willing, people willing, etc.

For many of us however we just want our lives to get back to normal, whatever that is. Will using the methods Jane Clift used work? I don’t know, but it can’t hurt to try. As far as getting people to believe you, getting legal representation involved, then I don’t see why you can’t use this, it’s close enough that if people don’t look to deeply, they won’t know the difference. If you stick to the main points, leave out some of the gaslighting stuff, focus on the facts. Such registries exist, innocent people are being placed on them, investigations are happening, their lives are being disrupted, it’s a start.

For us who have lived this, we know the difference, this goes deeper. This is systemic, has been for sometime now, and people continue to be turned into informants for the state. They continue to have to be a part of the life disruption process that targets are harmed by. With the targeting we experience, it’s deep. 24/7 surveillance, neighbours on all sides monitoring, some get construction projects, street theater, psychological manovours that are used to try to destroy our lives. Our friends, families, co-workers, neighbors, customers, are all co-opted. I have worked at jobs where I was dealing with customers from multiple countries, and it’s the same thing. To even broach the subject sounds crazy, schizo crazy, that is the word right, but it’s not crazy, and it’s been like this for some time.

I have talked to enough people, but seen enough to know that I am correct in this, but do what works for you, this game has been about what we can prove, well targets, we have the ACLU stating investigations are happening.

http://blog.aclu.org/2009/04/30/mass-con-fusion/

[quote]

Quote:
Mass Con-Fusion

You mean to tell me that it is legal for corporations from the private sector to team up with local law enforcement officials in efforts to spy on innocent members of our society? You also mean to tell me that the synthesis of law enforcement authority and the drive of for-profit companies operate under little to no guidelines or restrictions and it is unclear to whom they are responsible to? [/quote]

We know that employees, councils, school officials, etc, can open or get people placed on monitoring lists. Proving the gaslighting and other psychological ops, or that they were designed to eliminate targets of the state, is another story. Do what works for your personal situation, always continue to do your own research.

For now I am calling these lists our fraternal twins. We are never told we are on lists, she moved and I think some of the harassment might have stopped, but she had information that many of us do not have, and I have no proof that her targeting went as deep as ours. I do however have good reason to believe that some would like the world to think that this was the extent of the targeting. It’s not. There are complete strangers following targets, little citizen informants that take turns doing everything to harass targets, people using their children in these skits, etc.

Though it’s not uncommon for a community to get together to get rid of a trouble maker or a dangerous person, this targeting goes wherever a person goes. 24/7, and the goal is to completely destroy the person. Don’t think doctors, or psychiatrists would take part in things like that? Guess again.

http://www.msnbc.msn.com/id/30273330/

[quote]WASHINGTON – When the CIA began what it called an “increased pressure phase” with captured terrorist suspect Abu Zubaida in the summer of 2002, its first step was to limit the detainee’s human contact to just two people. One was the CIA interrogator, the other a psychologist.

During the extraordinary weeks that followed, it was the psychologist who apparently played the more critical role. According to newly released Justice Department documents, the psychologist provided ideas, practical advice and even legal justification for interrogation methods that would break Abu Zubaida, physically and mentally. Extreme sleep deprivation, waterboarding, the use of insects to provoke fear — all were deemed acceptable, in part because the psychologist said so.

“No severe mental pain or suffering would have been inflicted,” a Justice Department lawyer said in a 2002 memo explaining why waterboarding, or simulated drowning, should not be considered torture.
[/quote]

Increased pressure phase? Separating him from others, like they do to us. Interesting. The sleep deprivation that we get due to the harassment, so we can have car accidents, or lash out. The psychologist provided ideas. I bet. Practical advise on how to torture someone, what would be most effective, and even legal advise and justification. Justification for human torture. If they would do this to them, what about us?

A psychologist providing information on what would break someone. The use of insects to provoke fear. No different, than when they sensitize a target and use that to make the person look like they are very sensitive or crazy. These are the type of people helping to run the zoo.

[quote]
Waterboarding was touted as particularly useful because it was “reported to be almost 100 percent effective in producing cooperation,” the memo said.

The agency then used a psychological assessment of Abu Zubaida to find his vulnerable points. One of them, it turns out, was a severe aversion to bugs.

“He appears to have a fear of insects,” states the memo, which describes a plan to place a caterpillar or similar creature inside a tiny wooden crate in which Abu Zubaida was confined. CIA officials say the plan was never carried out.
[/quote]

So if instead of bugs, he had an aversion to keys jangling, they would have used that, and it was the psychologists job to go in, probably build trust and find this out. So if this is what they deem legal, and they are supposedly held in high esteem, what about those who are held in lower esteem, would they do worst then?

Just proof that psychologists, would willingly be part of something like that. So proving some parts of our struggles remain, exposing this system for what it is, it’s already exposed, it’s just getting people to believe it, and accept it.

In situations like the Buzzsaw, there were no violent incidents, that’s another close cousin that we have, but it’s just one more branch of a systemic practice, that is being used to destroy and silence people.

http://gangstalkingworld.com/Forum/YaBB.pl?num=1240578323

[quote]
Prophetically, an acquaintance coolly said to me a year after I left the lab, “You are in a police net you will never get out of … for the rest of your life.” She was right, but I no longer care because now I am not afraid.

We are controlled by our fears until we have none left, and that happens when there is nothing left to lose. The journey to that realization took 12 years of pain, a sense of loss and humiliation, a feeling of abandonment and the lifelong emptiness and absence of being loved—not by any-one, not at any time. The experience and purpose of being mobbed, and what I did not known the isolation of the experience, is that I was not alone.“Mobbing” is the purposeful and strategic institutional gathering of all information about an individual by using any method—legal or illegal. Contact for this purpose is made with neighbors, classmates, former partners, family members, former employers, teachers, church members, good friends and even your family tree … everything must be known about the support system around you that makes your life possible. The assessment of strategic resources and future income (finances, mobility, cars, insur-ance, credit cards, bank safety deposit boxes, post office boxes, wills, health records, birth

Page 3
Uncovering the Truth About Depleted Uranium49certificates, transcripts and photographs) is made without your knowledge. The purpose ofmobbing is to drive the target individual out of the job force for the rest of their life; the big-ger goal is to drive them to the ultimate self-destruction: suicide. There are now laws made by European unions to prevent this cancer on society and productivity, but it is practically unknown in the U.S.The University of California, which had contributed so much to the State of California and to the global community through the benefits of education, had become a pathologi-cally dysfunctional institution through its mobbing practices.

I learned that more than 500 women and minorities had filed lawsuits against the University of California and had then experienced retaliation by the University of California apparatus of mobbing by employees, alumni and law enforcement.1The lawsuits were for denial of tenure, whistleblower retaliation and theft of intel-lectual property. These women had similar complaints about the destruction of their own lives and careers. The information gathered by the University of California is used to takeyour life apart; to destroy all that makes you feel safe; to bankrupt, isolate and alienate you from society and from yourself; and to attempt to make you look crazy.

Your children are harassed, they come home with belongings missing and stories of teachers harassing them and a weirdness takes over your lives. Slowly, documents disappeared from my house; porncharges appeared on my credit card; files, my purse and my keys disappeared; mail was lost. I was forced to carry my documents with me at all times. All of my university transcripts and diplomas have been stolen from my house.Two things kept me going and kept me alive. First, the warrior mother spirit guided me to protect Zephyr. That miracle of life taught me what it means to love unconditionally and completely. I began to learn to love myself. Second, my uncle had told me long ago, “No one can destroy you. Only you can destroy yourself.”

[/quote]

500 Additional cases that she was aware of, the majority woman, all to keep them silent. Please read over the other stories in the above link, and you will see what I mean by systemic.

http://www.crvawc.ca/documents/WorkplaceHarassmentandViolencereport.pdf

A great pdf, where woman talk about their harassment, and you see a pattern with lawyers, doctors, tribunals, etc. Systemic.

http://www.bullyonline.org/action/obstruct.htm

[quote]Many targets of bullying report that they seem to be obstructed every step of the way in their pursuit of justice. The management refuse to investigate, or use an untrained investigator, or whitewash the case. The union refuses to help, or initially shows interest but suddenly changes sides. The solicitor initially shows interest but then starts acting in a manner which suggests they have the other side’s interests at heart rather than yours.

The employer’s lawyers apply for, and obtain, adjournment after adjournment, then obtain a pre-hearing review which the tribunal chairman handles in favour of the employer. In the tribunal, favour is shown to the respondent (employer) and you get the impression that the verdict has been decided in advance. Your solicitor, the respondent’s lawyers and the tribunal chairman seem to know more about your case than you think they should.

After the tribunal you’re left with no option but to privately sue the employer, the union, and your solicitor, and appeal the tribunal decision, but by this time you have no job, no income, your savings are gone, so is your health, maybe your marriage too, and there’s no prospect of ever being employed again, especially in the professions.

Sound familiar? If so, you might be surprised to realise how often this happens. Mostly it’s in cases from the education sector, although it may happen in any public sector case, for example the NHS. Occasionally, but less often, it happens in private sector cases, and in rare cases from the voluntary sector.

Although there’s never any substantive proof, it seems that all the parties arrayed against you have been colluding in secret. The question is, what allegiance binds these individuals together, and where could they meet such that the normal rules of confidentiality do not apply? What fraternal obligation places their duty to support and protect each other above the moral, ethical and legal obligations by which the rest of us are bound?

Employers, unions, law firms, and employees of the justice system are part of society, and every group, professional or otherwise, contains a few poor performers and rotten apples. This ranges from inexperience through ineptitude and incompetence to collusion and corruption.

[/quote]

Many have touched on this. Tim Field passed away, before he could finish the research into the collusion. He was very smart, and had a large following with his bullying movement.

Anyways, it’s systemic, but each piece of the puzzle, helps our cause, that’s what it’s all about, gathering evidence. I think within the last week, a lot of really good material has come out, material that can help targets to get some relief from what is happening.

So again, I would stress awareness and exposure as our two key elements for fighting this. Awareness to the public friends family. Exposure, if you are being bothered bring up the fact that it’s now common knowledge that registries like the violent persons registry exist, and that innocent people are being placed on it, bring up the fact that the ACLU says investigations are happening, without any clarity of who takes care of what. Bring up the fact that there are national, regional, and local linked databases, that are being shared across country lines. Bring up mobbing, the human flesh search engine, use the info that is out there, that has been presented to make your case, and to expose your cause. I can’t guarantee you will win, but you will make a great case, and these people do not hold up well to scrutiny or to the light.

Do what works best for your own situation, if you read something and it does not sound right, research on your own, I always stress this point, maybe you will catch something that another has missed.

I leave you with the scene from my cousin Vinny. If you have not seen the video, watch it, it’s very good.

[quote]

Mona Lisa Vito: ‘Cause Chevy didn’t make a 327 in ’55, the 327 didn’t come out till ’62. And it wasn’t offered in the Bel Air with a four-barrel carb till ’64. However, in 1964, the correct ignition timing would be four degrees before top-dead-center.
D.A.

Jim Trotter: Well… um… she’s acceptable, Your Honor.

Vinny Gambini: Ms. Vito, it has been argued by me, the defense, that two sets of guys met up at the Sac-O-Suds, at the same time, driving identical metallic mint green 1964 Buick Skylark convertibles. Now, can you tell us by what you see in this picture, if the defense’s case holds water?

[Lisa examines the picture]

Vinny Gambini: Ms. Vito, please answer the question: does the defense’s case hold water?

Mona Lisa Vito: No! The defense is wrong!

Vinny Gambini: Are you sure?

Mona Lisa Vito: I’m positive.

Vinny Gambini: How could you be so sure?

Mona Lisa Vito: Because there is no way that these tire marks were made by a ’64 Buick Skylark convertible. These marks were made by a 1963 Pontiac Tempest.
D.A.

Jim Trotter: Objection, Your Honor! Can we clarify to the court whether the witness is stating opinion or fact?

Judge Chamberlain Haller: This is your opinion?

Mona Lisa Vito: It’s a fact!

Vinny Gambini: I find it hard to believe that this kind of information could be ascertained simply by looking at a picture!

Mona Lisa Vito: Would you like me to explain?

Vinny Gambini: I would love to hear this!

Judge Chamberlain Haller: So would I.

Mona Lisa Vito: The car that made these two, equal-length tire marks had positraction. You can’t make those marks without positraction, which was not available on the ’64 Buick Skylark!

Vinny Gambini: And why not? What is positraction?

Mona Lisa Vito: It’s a limited slip differential which distributes power equally to both the right and left tires. The ’64 Skylark had a regular differential, which, anyone who’s been stuck in the mud in Alabama knows, you step on the gas, one tire spins, the other tire does nothing.
[the jury members nod, with murmurs of “yes,” “that’s right,” etc]

Vinny Gambini: Is that it?

Mona Lisa Vito: No, there’s more! You see? When the left tire mark goes up on the curb and the right tire mark stays flat and even? Well, the ’64 Skylark had a solid rear axle, so when the left tire would go up on the curb, the right tire would tilt out and ride along its edge. But that didn’t happen here. The tire mark stayed flat and even. This car had an independent rear suspension. Now, in the ’60’s, there were only two other cars made in America that had positraction, and independent rear suspension, and enough power to make these marks. One was the Corvette, which could never be confused with the Buick Skylark. The other had the same body length, height, width, weight, wheel base, and wheel track as the ’64 Skylark, and that was the 1963 Pontiac Tempest.

Vinny Gambini: And because both cars were made by GM, were both cars available in metallic mint green paint?

Mona Lisa Vito: They were!

Vinny Gambini: Thank you, Ms. Vito. No more questions. Thank you very, very much.

[kissing her hands]

Vinny Gambini: You’ve been a lovely, lovely witness.

Vinny Gambini: Mr. Wilbur, how’d you like Ms. Vito’s testimony?

George Wilbur: Very impressive.

Vinny Gambini: She’s cute too, huh?

George Wilbur: Yes, very.
[laughter]

Judge Chamberlain Haller: Mr. Gambini…

Vinny Gambini: Sorry, Your Honor.

Vinny Gambini: Sheriff Farley, uh… what’d you find out?
Sheriff Dean Farley: On a hunch, I took it upon myself to check out if there was any information on a ’63 Pontiac Tempest stolen or abandoned recently. This computer readout confirms that two boys, who fit the defendants’ description, were arrested two days ago by Sheriff Tillman in Jasper County, Georgia, for driving a stolen metallic mint green 1963 Pontiac Tempest, with a white convertible top, Michelin Model XGV tires, size 75-R-14.

Vinny Gambini: Is that it?

Sheriff Dean Farley: No. A .357 Magnum revolver was found in their possession.

Vinny Gambini: Sheriff Farley, just to refresh the court’s memory, what caliber bullet was used to murder Jimmy Willis?
Sheriff Dean Farley: .357 Magnum.

Vinny Gambini: The defense rests.
[/quote]

October 14, 2009 Posted by | Awareness, Bullying, Citizen Informants, Community harassment, community mobbing, Conspiracy, Controlled society, Corruption, Covert investigations, Gang Stalking, Gangstalking, Gaslighting, harassment, Informants, Insane, Internet, Monitoring, Social Control, society, Stasi, State target, Surveillence, Targeted Individual, white female | 2 Comments

Woman placed on Violent Persons Register

I am really happy about this story. I did not know there was a potentially “violent person registry.” I don’t know what the names would be in Canada, U.S. or Europe, but it should not be hard to find out.

Think of this scenario in the workplace, at school, etc. You make a comment, or perform an action that might upset someone with the capacity to get you on such a list, and then an notice is sent out to several dozen places that you are a potentially violent person who should not be alone with others, and then your life changes.

Here is some really neat info from this article.

I was turned into a Parriah for complaining about a yob

[quote]Jane Clift saw it as her public duty to report a drunk she saw trampling flowers in a park.

But her efforts led to a surreal nightmare in which she was branded potentially violent and put on a council blacklist with thugs and sex attackers.

Her details were circulated to an extraordinary range of public and private bodies, including doctors, dentists, opticians, libraries, contraceptive clinics, schools and nurseries. Their staff were advised not to see her alone.

The 43-year-old former care worker was forced to withdraw an application to become a foster parent and, eventually, to leave the town where she had lived for ten years.

Now, after a bitter four-year legal battle with Slough Council, the stain on her character has finally been removed.[/quote]

A list that put her up there with sex attackers if you can imagine that.

She was a care worker, and got denied fostering a child because of this.

Woman sues council for libel after being labelled
‘potentially violent’ for complaining about a vandalised flowerbed

[quote]Ms Clift told the court that she had to leave Slough, where she had lived for 10 years, and had initially moved to Southampton.

‘I’d like to move back some time in the near future but without this hanging over my head and my family’s head.

‘I have many connections in Slough, I like Slough, but it was impossible for me to function normally in Slough with this on my head for 18 months, and the stain will always be there.’

She said that after the council acted, she sensed that everywhere she went, there was ‘whispering, collaboration, people scurrying about’.

‘One time I went to the contraceptive clinic and I felt that there were way too many people hovering about for me than should have been there, making me feel very insecure.

‘It did serve as a reminder that everywhere I went – hospitals, GPs, libraries – anywhere at all, even if I phoned the fire service, as soon as my name went on to that system, it flagged up ‘violent person marker, only to be seen in twos, medium risk’.’

‘I’m nothing special, no qualifications, don’t have a fancy job but I don’t go getting into trouble. It cuts across class, race, everything.

‘These people have this ability to do this and they can abuse it.
Not many people know, I didn’t even know, that such a register existed.[/quote]

She sensed that everywhere she went there was a whispering and collaboration campaign, with people scurrying about. She also goes on to say more people were hovering about than should have been there, making her feel insecure. I am sure that I have another word for what they were doing, but to continue.

Woman Placed on Violent persons registry
Woman labelled violent by Slough borough council wins damages

[quote]A woman who was labelled potentially violent by a council has won £12,000 in libel damages.

Jane Clift sued Slough borough council and Patrick Kelleher, its head of public protection, over their reaction to her complaint about a three-year-old boy who vandalised a flower bed in a town park.

The authority argued that a 2005 entry about her in its violent persons register was accurate, and that Clift was obsessed with getting Slough’s antisocial behaviour co-ordinator sacked.

Mr Justice Tugendhat found in favour of Clift at the high court, but rejected her claim that Kelleher had been malicious.[/quote]

She had to move and it took four years to get her name removed from this list.

I was just pointing that out, because I am sure that the policy on these lists is not to give our information to the person being placed on the lists.

http://www.doncaster.gov.uk/about/chamber/default.asp?Nav=Report&ReportID=8873

[quote]
Staff Safety (Potentially Violent Persons) Database
employees and others arising from their work activities.

3. Purpose

The purpose of this document is to alert Directorates to their statutory duties and of the corporate information system designed to enable managers to identify potential risks to employees from individuals, animals and premises. The purpose of the recording is to seek to avoid further incidents through the controlled sharing of information that will be used to undertake a better-informed risk assessment of proposed visits by employees.

5. Definitions

The Staff safety register is a secure electronic based database recording incidents involving an employee of DMBC (or partner agency) that have caused actual or potential harm.

6. Policy

It is Doncaster Council policy to ensure the health, safety and welfare of its employees and therefore managers must utilise the staff safety database to achieve this objective.

7. Responsibilities

Managers

All managers in day-to-day control of people, places etc must ensure that risk assessments are completed and are suitable and sufficient for their purpose. Managers must ensure that the significant findings arising from risk assessments are communicated to employees affected by those work activities. For the purposes of this section the work activity relates to visits by Council employees away from Council premises. See Instruction section for detailed Risk assessment.

Senior managers who, after notification of an incident to one of their employees, believe that person(s) and/ or an address now need to be included onto the staff safety register then they must notify the system manager of that decision at the earliest opportunity.

To comply with Data Protection Act 1988 if the manager decides to include a person onto the register then that person must be informed in writing of the intention to do so, the reason for their inclusion and the arrangements for review and removal. The right of appealing against that decision must also be provided.

Employees

Employees who undertake visits to non-Council premises must utilise the Staff safety register to ascertain if the location of the proposed visit is included in the register as a potential to cause harm.

Principal Safety Officer

The Principal Safety Officer as system manager has the ability to create, amend and delete data and to ensure appropriate an advisory/ training service is available to all employees with responsibilities under these instructions. The PSO must ensure that the system is managed and staffed appropriately.

8. Instructions

System Access – Three levels of access are available and a clear level of authorisation will control the granting of each. All levels of direct access to data will be password controlled and the staff safety register itself will record details of every access, including the data viewed and the reason for access.

8.1. Level 1 Access- Basic Interrogation

An email (external email facility) based enquiry function, which tests whether a name or address is registered. Appropriate staff will be specifically authorised to use this function.

8.2. Level 2 Access- View Only

The ability to view data on the software system (software installed on individual pc’s). Only a limited number of managers will be given this access. Where a level 1 user identifies a match from the email system a Level 2 user will obtain the relevant information from the software system and carry out a risk assessment for a visit to the premises and advise accordingly.
[/quote]

Interesting, I bet every single little Human Resources officer knows about this list. It goes hand in hand with make a stink go see a shrink policy they have in their handbook.

http://www.harassment101.com/Article5.html

[quote]
The next day, the plant director of human resources invoked a Ford program for combating workplace violence to bar Crosty from the factory and ordered him to see a company-paid psychiatrist or lose his job.

A little more than fourteen months later, and 725 miles away, officials at Emory University cited a similar concern about violence to justify using armed guards to escort Dr. James Murtagh off university property when Dr. R. Wayne Alexander, chairman of the department of medicine at Emory, ordered him to see a company-selected psychiatrist or lose his job. Six weeks earlier, Murtagh, a professor of pulmonology at Emory, had filed a false claims suit against the university, alleging that it had misspent millions of dollars in federal grant money. He claimed the university diverted money from research grants in order to pay for salaries and trips for administrators and some staff. The specific allegations were sealed by order of the federal judge.

Crosty and Murtagh don’t know each other. It is unlikely their worlds would ever intersect, but they have at least one thing in common. They both are victims of an increasingly popular employer weapon against whistleblowers: the psychiatric reprisal.

Across the United States, companies have seized upon concerns about workplace violence to quash dissent. Hundreds of large corporations have hired psychiatrists and psychologists as consultants to advise them on how to weed out “threatening” employees. They say they are only responding to a 1970 directive from the U.S. Occupational Safety and Health Administration that they maintain a “safe and secure work environment.” But by drawing the definition of “threatening” as broadly as possible, they are giving themselves a new club to bang over the heads of workers.
[/quote]

So in the workplace I am guessing this could be applied for a number of reasons, and then you end up on these little connected lists.

[quote]
132 – Violent Persons Register

Referring to Minute No. 125 – Violent Persons Register, John Irving from the COPS Team had attended the meeting and gave the following advice:

To hold a register of violent or potentially violent people on computer, the information could be de-personalised by using a classification system i.e.: 1 = Potentially violent, 2 = Threatened people before, 3 = Been violent in the past, 4 = Two-man visit, 5 = Don’t Visit.

ITEM

132 – Continued…

The Legal Services Administrator would compile a Violent Persons Database, which would be put on the Council’s Intranet system, and would be password protected. John Irving suggested that as a long-term goal, once the database had been established it would be useful to share the information with Liberata, District Nurses etc.

The Legal Services Administrator also needed to write a procedure to ensure that the Council didn’t fall foul of the Data Protection Act. It was agreed that addresses couldn’t be put onto the Violent Persons Register without proper clarification. It was suggested that a sub-group to this Group be set up to endorse these requests.
[/quote]

Minutes of the meeting from a local booby. How to really mess up someones life. I mean how to share information of violent persons.

Well just some fun food for thought. Tell me what you think, leave comments if you feel like it.

October 12, 2009 Posted by | Blacklisted, Citizen Informants, Civilian Spies, Community harassment, community mobbing, Covert investigations, Female, Gang Stalking, Gangstalking, harassment, Informants, mobbing, Monitoring, Surveillence, whistle blower | , , , , | 16 Comments

Are Canadian’s paranoid enough?

Are Canadians being watched?

I thought that this would be a fun topic to cover. I was recently on a Canadian forum and I had a conversation with several members about electronic harassment and Gang Stalking.

Some thought it was paranoid to worry about being spied upon and monitored, that’s fair, but let’s look at some of the evidence presented and you tell me if they are paranoid enough when it comes to government spying.
The privacy commissioner of Canada, Jennifer Stoddard, warned Canadians this February about Secret databases that can not be accessed by the accused.

 

http://www.corbettreport.com/articles/20080214_snitch_state.htm

http://www.cbc.ca/canada/story/2008/02/13/rcmp-privacy.html?ref=rss

[quote]
Jennifer Stoddart, the Privacy Commissioner of Canada, has given her own Valentine to Canadian citizens: a 48-page report warning them that the RCMP (Canada’s national police force) is keeping thousands of files on regular citizens in secret databases which cannot be seen by the accused.
One of the many disturbing facets of Stoddart’s report are the examples she cites of information for these secret files coming from citizen informants. In one case a man was put into the secret database because a resident of his daughter’s school neighborhood saw him entering a rooming house and—believing drugs were involved—called the police. The police investigation concluded that the man had only stepped out of his car to have a cigarette, but the file was still in the national security databank seven years later.

Another incident cited in the Stoddart report involved a neighbour who saw two men carrying “something that resembled a large drum, wrapped in canvas” into their house. Police were called to investigate but found nothing resembling the reported item, yet the data was still sitting in a top secret databank five years later. As Stoddart points out in the CBC story on the report, this is potentially disastrous for the individuals named in the files, because it “could potentially affect someone trying to obtain an employment security clearance, or impede an individual’s ability to cross the border.”

 

What these seemingly disparate reports point to is a growing movement to turn the citizens of so-called free, democratic nations into a self-regulating secret police, saving the government the hassle of keeping tabs on everyone by delegating the duty to an unwitting public duped by a phoney war on terror.
[/quote]

Ok So Canadians are in secret databases that can not be accessed, not a big deal for some. Let’s see what else might be happening.
http://www.spying101.com/

[quote]If you attended a Canadian university in the past eighty years, it’s possible that, unbeknownst to you, Canadian security agents were surveying you, your fellow students, and your professors for ‘subversive’ tendencies and behaviour. Since the end of the First World War, members of the RCMP have infiltrated the campuses of Canada’s universities and colleges to spy, meet informants, gather information, and on occasion, to attend classes.[/quote]

Spying in Canadian schools and on Campus.
[quote]
The book, a thorough examination of RCMP surveillance of the academic world, also discusses the Mounties’ efforts to keep tabs on other elements of society, including government, the media and women’s groups.
The RCMP created security files on 800,000 Canadians, and it has long been known the force took an active interest in politicians and public 
servantswith links to Communist organizations or other pursuits deemed subversive.[/quote]
Wow 800,000 Canadians and counting with files opened, just for going to a Canadian University or College. That sounds reason to be a bit paranoid.
[quote]The Mounties cultivated informants among students and faculty at universities across the country and sometimes relied on the direct observations of RCMP members who were taking classes to further their education.[/quote]

Fellow students cultivated as Informants who then graduate and go on into the workforce and into the rest of society? Nothing to be paranoid about there, if you care about your privacy.
http://www.cannabisculture.com/articles/2499.html

[quote]According to Redden, citizens can sometimes defeat the snitch culture. He lauds Canadians for discovering a secret government database that contained information on “virtually everyone in the country.”

The system tracked domestic and external travel, personal finances, and other intimate details on 33 million people.

When journalists revealed that the database was being used by spy agencies and the Mounties, 18,000 Canadians petitioned the health ministry to find out what the government knew about them. Eventually, the government was forced to dismantle the database ? or so they said. Government officials admitted the database was insecure, and so countless copies could easily have been made by police or nosy bureaucrats.
[/quote]

Wow a secret government database the contained information on nearly everyone in the country. The last time I heard about something like this, it was East Germany. I wonder how a country the size of Canada, can have a secret government database with information on just about everyone. What intimate details did this system have, and how did it get this information?

They dismantled a database with information on everyone in the country, that they must have spent a great deal of time, effort and money to collect? Does anyone really believe this? Of course they do.
Wow this would make some people a little paranoid.
Lastly not related to spying but an interesting link. From the people who brought you Truman Show Syndrome.

I found out that there is a military link, at least one of the male patients had a former military background.

http://thelastpsychiatrist.com/2008/07/

being_the_main_character_in_yo.html

Also one of the psychiatrist that is researching Truman Show Syndrome works out of McGill University in Quebec.

https://gangstalking.wordpress.com/2008/11/29/truman-show-delusion

[quote]Gold and his brother, Dr. Ian Gold, the Canada research chair in philosophy and psychiatry at McGill University in Montreal, came up with the term “Truman Show delusion.”[/quote]

 

If you will remember the MK Ultra mind control experiments which the Canadian and U.S. government agreed to, were conducted by McGill University in Montreal, Dr Ewen Cameron’s old haunt. Ewen Cameron is the doctor that was at the heart of the MK Ultra experiments and McGill is the very University that allowed them.
Also many of complaints about Gang Stalking in Canada are coming out of Toronto and Vancouver Canada. I have seen at least one news article on this for Vancouver, but I don’t think I have seen any articles about this subject out of Toronto yet, which based on the complains is an epicenter for Gang Stalking.

This is all fun stuff to know. So should Canadians be more concerned, more paranoid, or is there really nothing to see here?  Only time will tell.

December 27, 2008 Posted by | Awareness, Baiting, Citizen Informants, Civilian Spies, Cointelpro, Conspiracy, Controlled society, Covert investigations, domestic spying, driving-crazy, East Germany, Entrapment, Fascist, Gang Stalking, Gangstalking, government corruption, Monitoring, New World Order, NWO, Social Control, Stalking, Stasi, Surveillence, Targeted Individual | , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment