Gang Stalking World

United we stand. Divided they fall.

Poisioned Pill? You would know.

http://gangstalkingworld.com/Forum/YaBB.pl?num=1223643445

I don’t have a lot of time to blog right now, but I was online taking care of some things believe it or not, and I came across a thread, which lead me to a post that I felt the need to address. I really didn’t want to waste the time, but I felt the need.

What I am going to re-post is pretty well what I posted on my forum.

Ok so I was out on one of my strolls around the Internet. I usually stay away from certain specific people for so many reasons. Anyways I came across a thread that links to these two postings which I will address here and then on my blog.

Here are the links. For those of you who don’t know. The author is “suppose to be” a top leader for the Gang Stalking Community.

http://groups.yahoo.com/group/vertacs/message/231

In addressing the first link I wrote.

Since the above post refers to my website, then I think it’s important to address the attacks or issues posted there.

Apparently my site is a poison pill site. The author would know more about poison pills than I would, but I digress. Let me address the comments and meat of the article.

The top two gang stalking techniques are air stalking and brighting because the author of the Gang Stalking World website, fancies a little thing called alphabetical ordering. For those of you who do not know what this means, it means to place items in a list from A-Z.

This means that items that we experience that begin with A will be listed first, then items that begin with B will be listed second and so forth.

Hopefully the none targets will have enough common sense to understand the concept of alphabetical listings. If they do not, I am not responsible for human stupidity, contrary to popular beliefs.

Let’s go to the young mother with the cellphone. Since we now know that children as young as 8 are being recruited to be Covert Human Intelligence Sources, and the site goes on to back this up with appropriate details, then it should be no problem for the common person to understand the concept of how the stalking takes place.

This way the average person can conceptualise what we mean about the stalking being subtle. I also had this concept from another magazine from several years ago, that showed a picture of a mom with a stroller and her shadow was that of a cop. The picture was done to illustrate what the civilian spies would be like. The concept was a good one then, and in my personal opinion is a good one now.

Remember I am not just sitting here daily. I am trying on a continuous bases to bridge the gap between what we experience and what the normal realm has not. I have studied what does and does not work. I have done a great deal to make sure that this does get normalised, and that the actual truth comes out, which is more than I can say for others.

I also wrote and have been meaning to address this issues for some time now, in relationship to the term Gang Stalking.

The term Gang Stalking and why I think it works. When I first came online, there were a lot of terms for what were happening, Gang Stalking, Multi Stalking, Vengeance Stalking, etc, etc.

Over time while I was doing research to try to find out what Gang Stalking was, part of what I tried to do was get the term normalised in society as another website had suggested that we do. This was part of my early activism.

I was able by working the search engines to ensure that the term was well placed and became adapted and more accepted in more normal society.

I think the only people that the term truly confuses, that I have come across in the last 2 years, are people that are citizen informants who have a specific effort to try to discredit the term. You might get the odd person who is truly confused, but overall, this is a term that many normal people have come to understand.

If you change the name, we will and would have had to start all over again. In the middle of trying to get the term normalised, a so called community leader had tried to get the term dropped, and I disagreed with this person and for that reason fought to keep the term alive.

Eg. Imagine if we stopped calling ourselves Targeted Individuals tomorrow and tried for a new term? The same process of normalizing this will begin all over again and that is not good for any movement.

I think if anyone that I have come across in the last two years reads the information they understand what this is.

Also when People go looking for help outside of the community and go searching in their normal places, they use the term gang stalking, mostly. I find that after two years of a lot of garbage, people in normal circles recognise this term and are able to tell people what to do to get help.

I constantly check to see if this is working. I think any attempt to get rid of the term is counter productive for these reason, and I also think this was part of the reason for the attempt by certain parties.

That’s my feedback on the term Gang Stalking. As for the other matters with the young mother and the terms for what happens to us, I am going to be addressing that.

In addressing the second link I wrote.

http://groups.yahoo.com/group/vertacs/messages/245?xm=1&m=e&l=1

Now apparently my site is run by Don Russell? Who the hell is that suppose to be? This is like the time starfish perp said that I was imitating some other guy that I did not know at the time. I really appreciate the methods used. Also I appreciate that they went behind my back.

It’s all good, what is done in darkness will be revealed in light, sooner or later. The day will come. Sooner than later I hope.

[quote]
For example, this site is titled “gangstalking”, a term which may sound great at first hearing,
but when used in conversations with non-targets, has shown that non-targets consistently think
in terms of youth/race/biker/Mafia gangs. [/quote]

Since I actually do know what I am talking about. I get this from time to time believe me. Some will go oh yeah those gang’s out there. In my personal experience, this is only from the multitude of civilian informants. The same way they operate offline, they operate online the exact same way. People who actually want to listen, none targets, in my two years of posting on forums, do understand the concept and respond well to the subject matter. (Well now they do.)

Also considering that the website on the very front lists this

[quote]Gang Stalking is a systemic form of control, which seeks to destroy every aspect of a Targeted Individuals life. The target is followed around and placed under surveillance by Civilian Spies/Snitches 24/7.

The Civilian Spies can be parts of these community oriented policing programs, but most often they are just average citizens. Just like with Cointelpro investigations, everyone in the targets life is contacted and asked to be a part of the ongoing, never ending, monitoring (systemic harassment), which is designed to destroy the target over years and leave them with no form of support.

A short and simple definition of gang stalking.
What is Gang Stalking?

Gang Stalking is experienced by Targeted Individuals as psychological attack, that is capable of immobilizing and destroying a target over time. The covert methods used often leave no evidence to incriminate the Civilian Spies.

It’s similar to workplace mobbing, but takes place outside in the community. It called Gang Stalking, because groups of community Spies organise to stalk and monitor targets 24/7. [/quote]

Again I take no responsibility for human stupidity, or organised citizen informants, or government agents. I think a logical thinking human who is not a perp will understand the concept of what is being said. This site over the last two years for anyone who has been following, has been worked and reworked just so that it can help the average person to understand what we are talking about. When new information comes it’s continually worked into the site. Also on the main FAQ page exhibit B

[quote]
What are some techniques used against targets?

A few of the most common techniques are listed below.

a) Classical conditioning.

Getting a Targeted Individual sensitized to an everyday stimuli. The targeted individual over a period of months, or even years is negatively sensitised to an everyday stimuli, which is then used to harass them. It’s used out in public to let them know they are constantly being harassed and monitored. Some examples of everyday stimulus that might be used include: sounds, colors, patterns, actions. Eg. Red, white, yellow, strips, pens clicking, key jangling, loud coughing, loud whistling, loud smacking of clapping of hands together, cell phones, laptops, etc.

b) 24/7 Surveillance This will involve following the target everywhere they go. Learning about the target. Where they shop, work, play, who their friends and family are. Getting close to the target, moving into the community or apartment where they live, across the street. Monitoring the targets phone, house, and computer activity. Surveillance Policy.

c) Isolation of said target.

This is done via slander campaigns, and lies. Eg. People in the targets community are told that the target is a thief, into drugs, a prostitute, pedophile, crazy, in trouble for something, needs to be watched. Files will even be produced on the target, shown to neighbours, family, store keepers.

d) Noise and mimicking campaigns.

Disrupting the targets life, sleep with loud power tools, construction, stereos, doors slamming, etc. Talking in public about private things in the targets life. Mimicking actions of the target. Basically letting the target know that they are in the targets life. Daily interferences, nothing that would be too overt to the untrained eye, but psychologically degrading and damaging to the target over time.

e) Everyday life breaks and street theatre.

Flat tires, sleep deprivation, drugging food, putting dirt on targets property. Mass strangers doing things in public to annoy targets. These strangers might get text messaged to be at a specific time and place, and perform a specific action.

It might seem harmless to these Citizen Informants, but it could be causing great psychological trauma for the target. Eg. Blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit a response from targets. Etc. It’s like the death of a thousand paper cuts. One or two minor incidents will not cause any harm to the target, but over time the target is slowly worn down. [/quote]

It lists these as the main symptoms of Gang Stalking. On to the next bit.

[quote]
While many of us believe, with good cause, that government is heavily involved, without courtroom quality evidence, a statement like that above is discrediting. [/quote]

Suddenly courtroom evidence is needed? Really? When the same author was sprouting off information about vigilante gangs, where was the court room information then? Right.

Also we don’t need court room information. We have historical facts, we also have current news articles about how the anti-terror laws are being abused. We have dozens of items about covert government actions. We have Gloria Naylor, and other significant targets who can directly link this with government involvement, yet suddenly we need a courtroom document, really?

Again I have already addressed the mother and the child issue. Not only is this what they really do in real life, but it’s a concept image. For anyone who this works. It’s a useful tool for bringing the understanding gap, between the targeted and the none targeted.

[quote]
“Civilian spies are recruited from every level and sector of society.”

“Spies” is a term I would NEVER use to label our perps. Non targets, at this stage in current affairs,
are not prepared to think their neighbourhood is full of “spies.” To use the term “spies”, I suggest,
is very likely to draw the you-are-paranoid response from unaware non-targets. [/quote]

Well many people would never call them Stasi either, or Snitches or Citizen Informants, etc. Many people have different labels for the same things. My site uses various labels to help different people understand the concepts better. Over the last two years. I have talked to people. I have researched, and there are lot’s of different people who will visit the site, there are lot’s of other people who are going to be targeted.

The word spies will appeal to one sort of audience because they understand, oh community spies. Another person will understand, Snitches, cause they come from a community where the stop snitching movement is in full affect and they are familiar with that term. Others will understand the term Stasi because they dealt with this before. Over the last two years I have made every effort to reach a wide variety of audience members, and to ensure than whoever comes to the site, from whichever demographic to get help, they will see terms and read language that is familiar to them.

I have done the same thing with the media that I use. I am trying to do this with the flags that were recently added, since I realised that others in others languages do want access to the information. It’s not a perfect translation, but it will give more people access to help.

Also in doing research for what is behind Gang Stalking, I encountered a wide variety of articles, some used the term spies, actually quite a few used that term. So again, just like some prefer the term organised stalking, while others prefer community mobbing, and others Gang Stalking, it’s all the same term for the same thing, and using a wider variety of terms, reaches a wider audience.

To each their own, but my site has helped many people over the years. The site and the blog, because people see images and concepts that they are familiar with, remember my site is about helping targets first and foremost.

Also my site does have a fair bit of history and also current events on how these programs have been used, and who has used them. It’s always been the same source, be it Cointelpro, Red Squads, Stasi, etc.

I don’t know who Don is, and don’t care. My site in it’s current incarnation will continue to do what it has always done, and that’s help people.

Two years ago when I came online looking into what I thought was harassment, then mobbing then gang stalking, there was help, but not truth. I was chasing phantom vigilante groups, and that was one of the popular terms at the time. A term that was being brandied about. I have no doubt that the term gang stalking was originally chosen to spread confusion, but in the last two years. I and some others have worked really hard to bring the truth of this darkness into the light, and I will not let it be overshadowed.

So I will leave this posting by saying to each his or her own. Your instincts have brought you this far, you know that offline there are many that can not be trusted. You know how programs like Cointelpro worked, and if you don’t, go read up on them.

I have spent two years learning, you have been there with me for most of that time. I hope you will not let anyone or anything deceive you from the truth of what is really happening to us, and what is really behind this.

October 10, 2008 Posted by | Gang Stalking | , , , , , , , , , , , , , , , , , , , , , , | 3 Comments

The structure of our oppression?

The Structure of our oppression.

The following article will try to put into perspective some of the societal structures that are most likely responsible for the targeting some of those in the Targeted Individual community are experiencing.

For years Targeted Individuals have been saying that they are being followed around, stalked, monitored while at home, and out in public. They have complained about a system that is capable of 24/7 surveillance, able to harassment at home, work, in the community, and even while traveling abroad. For several years there has been a great deal of disbelief that such occurrences could even be possible. The follow article, will try to explain referencing sources already available and documented how this could be happening.

The following article represents the views and opinions of the http://www.GangStalkingWorld.com website and does not necessarily reflect the views of any other person, or website in the community.

It has long been a widely expressed view that the monitoring is being done by various groups of citizen informants, members of various community policing type programs. Based on recent research conducted it seems most likely that the people being used to follow Targeted Individuals around are what society and the government in some countries refer to as, “covert human intelligence sources”. They can also be known as own as Citizen Informants. Another slang terms that is often used to describe these individuals is the term Snitch or Snitches.

Covert human intelligence sources

A recent article came out in the London Telegraph, saying that Children as young as 8 are being employed by the state as “Covert human intelligence sources” aka Snitches. Targeted Individuals often complain that the harassment is being perpetrated by all members of the community including children.

Children are being hired and used by the government to spy on their neighbors in the Uk. and “being encouraged to photograph or video neighbors guilty of dog fouling, littering or “bin crimes” The article says there are “hundreds of Junior Streetwatchers, aged 8-10 years old, who are trained to identify and report enviro-crime issues such as graffiti and fly-tipping.” The adult spies according to authorities are recruited via newspaper ads.

Quote:
“Other local authorities recruit adult volunteers through advertisements in local newspapers, with at least 4,841 people already patrolling the streets in their spare time.

Some are assigned James Bond-style code numbers, which they use instead of their real names when they ring a special informer’s hotline.

This escalation in Britain’s growing surveillance state follows an outcry about the way councils are using powers originally designed to combat terrorism and organised crime to spy on residents. In one case, a family was followed by council staff for almost three weeks after being wrongly accused of breaking rules on school catchment areas.” 1

Community Oriented Policing

Though the article primarily focuses on the United Kingdom, it should be noted that other countries are setting up such community structures, via community oriented policing programs. These programs are a

Quote:
“a systemic approach to policing with the paradigm of instilling and fostering a sense of community, within a geographical neighborhood, to improve the quality of life. It achieves this through the decentralization of the police and the implementation of a synthesis of three key components: (1) strategic-oriented policing—the redistribution of traditional police resources; (2) neighborhood-oriented policing—the .interaction of police and all community members to reduce crime and the fear of crime through indigenous proactive programs; and (3) problem-oriented policing-a concerted effort to resolve the causes of crime rather than the symptoms. ” 2

Fusion Centers

The ACLU has released a report on Fusion Centers. 800,000 operatives will be dispersed throughtout every American city and town. Set to report on even the most common everyday behaviors which will go into state, local and regional, linked data bases. These linked databases are not just emerging in the United States, they have already emerged in many countries around the world in the wake of implied terrorist threats.

Quote:
“We pointed out that, while diverse and often still in the early stages of formation, they often seem to be characterized by ambiguous lines of authority, excessive secrecy, troubling private-sector and military participation, and an apparent bent toward suspicionless information collection and datamining.” 3

The article then goes on to point out that in a short space of many of the warning in the report had come to pass. The article talks about the fact that this apparatus is responsible for watching and recording the everyday activity of a growing number of individuals. The reports are then gathered together and then they are accessible to any law enforcement agency that is a part of these fusion centers.

Quote:
“In the six months since our report, new press accounts have borne out many of our warnings. In just that short time, news accounts have reported overzealous intelligence gathering, the expansion of uncontrolled access to data on innocent people, hostility to open government laws, abusive entanglements between security agencies and the private sector, and lax protections for personally identifiable
information.
Overall, it is becoming increasingly clear that fusion centers are part of a new domestic intelligence apparatus. The elements of this nascent domestic surveillance system include:
• Watching and recording the everyday activities of an ever-growing list of individuals
• Channeling the flow of the resulting reports into a centralized security agency
• Sifting through (“data mining”) these reports and databases with computers to identify individuals for closer scrutiny
Such a system, if allowed to permeate our society, would be nothing less than the creation of a total surveillance society.” 3

These fusion center will have the capacity to circumvent laws that are in place to limit federal vs local authorities and the access that each has to specific information.

Quote:
“Even more troubling is the fact that these centers are networked together and seamlessly exchange information with the intelligence community through the Director of National Intelligence’s Information Sharing Environment (ISE). The Washington Post report was based on a document produced from a survey of fusion centers, which shows their intent to maximize the access each of the fusion centers has to the various databases. This would allow a state fusion center that under state law or local policy is prohibited from buying credit reports, as an example, to circumvent its own restrictions by simply calling a
fusion center in Pennsylvania to and asking Pennsylvania authorities to access the records it wants to analyze. This “policy shopping” process guts state and local privacy protections and gives the participating agencies, including the federal intelligence community, access to information they may not legally have on their own.” 3

These centers if allowed to expand will create a one way justice system. Your information, even your daily activities will be allowed to be gathered, collected, and possibly used against you. When you then request information to confirm if you are a target of surveillance, the information will be stored in a secret database and not available for you to access.

Quote:
“Even as fusion centers are positioned to learn more and more about the American public, authorities are moving to ensure that the public knows less and less about fusion centers. In particular, there appears to be an effort by the federal government to coerce states into exempting their fusion centers from state open government laws.31 For those living in Virginia, it’s already too late; the Virginia General Assembly passed a law in April 2008 exempting the state’s fusion center from the Freedom of Information Act.32

According to comments by the commander of the Virginia State Police Criminal Intelligence Division and the administrative head of the center, the federal government pressured Virginia into passing the law, with the threat of withholding classified information if it didn’t.33 Such efforts suggest there is a real danger
fusion centers will become a “one-way mirror” in which citizens are subject to ever-greater scrutiny by the authorities, even while the authorities are increasingly protected from scrutiny by the public.” 3

Public Employees

The next aspect of the targeted that has been reported by the Targeted Individual community is the fact that public servants seem to be taking a part in the continuous monitoring and harassment private citizens. American Civil servants, firefighters, police officers, Corporate Employees, learning to collect data and spy. The information then goes into secret data bases. They will also communicate in code. Many targets have expressed a belief not only that they are being tracked, but that their stalkers are communicating via a one handed sign language similar to that which the Stasi used.

Watch Video
http://www.youtube.com/watch?v=KU-xsQ3Xepw

Quote:
“They are entrusted with hunting for “suspicious activity,” and then they report their findings, which end up in secret government databases.

What constitutes “suspicious activity,” of course, is in the eye of the beholder. But a draft Justice Department memo on the subject says that such things as “taking photos of no apparent aesthetic value” or “making notes” could constitute suspicious activity, Finley wrote. ” 4

Not only will this program used the civil servant already mentioned, but it will expand who is used in the program. They will have secret sources of communication available to them. The members of these programs will connect with the fusion centers. None disclosure agreement or a confidential disclosure agreements will be signed by many in these programs to ensure that the information is protected.

Quote:
“And the private sector would be involved, too. “The program would eventually be expanded to include Health Care personnel and representatives from private, critical infrastructure entities, with communication systems specifically tailored to their needs.”

In this regard, Terrorism Liaison Officers resemble InfraGard members. (See “The FBI Deputizes Business”.) This FBI-private sector liaison group now consists of more than 26,000 members, who have their own secure channels of communication and are shielded, as much as possible, from scrutiny.

Terrorism Liaison Officers connect up with so-called “Fusion Centers”: intelligence sharing among public safety agencies as well as the private sector. The Department of Justice has come up with “Fusion Center Guidelines” that discuss the role of private sector participants.

“The private sector can offer fusion centers a variety of resources,” it says, including “suspicious incidents and activity information.”

It also recommends shielding the private sector. “To aid in sharing this sensitive information, a Non-Disclosure Agreement may be used. The NDA provides private sector entities an additional layer of security, ensuring the security of private sector proprietary information and trade secrets,” the document states.” 4

Other than the United States many other countries have similar programs in place where they have requested that public servants in the course of doing their day to day activities keep an eye out on what is happening.

Stalking and Monitoring.

Though I do not in believe the family in this video are targets of Gang Stalking I will say that the example shown explains very well how someone could be stalked, monitored and spied on 24/7 as this family was. I do not believe they are targets of Gang Stalking, because Gang Stalking is often covert, what this family experienced was extremely overt and left behind lot’s of verification and proof, the harassment targeted individuals experience does not often offer any overt evidence.

The stalking they believe was done primarily using their cell-phone. They were followed 24/7. Their phone conversations listened to. When the mother was in the kitchen making lemonade, the phone rang, and the caller told her, he preferred limes. When the family heard someone at their door in the middle of the night banging, they called the police, when the police arrived the invaders had already left. After the police left this happened again, the family called the police, the invaders had left, this happened a third time and finally the family stopped trying. After filing a complaint with the police, the family were sent a recording of their conversation with the police, by the stalker. They installed a camera system, the stalker called to say that he already knew the code.

The list goes on, and apparently there were a total of three families in the area that the cell phone stalking happened to. The case has received wide media attention, including the Tyra Banks show. There is technology out there designed to do this. A company which I will not name in this report, has a service for cheating spouses, where you can use a phone to know where they are and listen into their conversations. There are also programs which will allow the camera on a phone to be used to spy on the person with the camera phone.

http://www.youtube.com/watch?v=sV_I7cgkqXc

Quote:
“The families say the calls come in at all hours of the night, threatening to kill their children, their pets and grandparents. Voice mails arrive, playing recordings of their private conversations, including one with a local police detective. “

“The caller knows, the families said, what they’re wearing and what they’re doing. And after months of investigating, police seem powerless to stop them. ”

“It got worse. The Kuykendalls and two other Fircrest families told ABC News that they believe the callers are using their cell phones to spy on them. They say the hackers know their every move: where they are, what they’re doing and what they’re wearing. The callers have recorded private conversations, the families and police said, including a meeting with a local detective. ” 5

Not all members of the Targeted Individual community have a cameraphone, but this example is just to show how one family could be terrorized by an encounter such as this. What we experience is ongoing, and often just as upsetting, but we often do not have the same proof that this family had, which enabled them to go to the police.

Quote:
“Recently, the stalkers have begun to come to their home in the early hours of the morning, banging on their doors. The mother said that the first time they came, she immediately called 911, but as soon as the police arrived, the stalkers had fled. The police, unable to do anything, left, and the stalkers returned right away. She said every time this happens she contacts the police, but after about the third call and then the third return, she just stops trying.” 6

Regulation of Investigatory Powers

Regulation of Investigatory Powers is a United Kingdom law, which enables public bodies to carry out investigations and surveillance on individuals. Authorities can use directed surveillance or intrusive surveillance for months or years. These types of operations often employ “covert human intelligence sources’. Recently these laws were abused by using them to spy on families for anti-social behaviours and noise complaints.

Quote:
“Directed surveillance’ is covert surveillance of individuals during a specific but non-intrusive investigation’ (our emphasis). Surveillance is covert where it is carried out in such a way to ensure that those targeted are unaware that it is taking place (cl.25(8)). ‘Surveillance’ is defined as including any monitoring, observing and listening to persons, their movements, conversations or other activities or communications. It also includes any recording of such activity and surveillance by or with assistance of a device.”

” Intrusive surveillance’ is defined as covert surveillance in relation to anything taking place on residential premises or a private vehicle. It may be carried out either by a person or device inside residential premises or a private vehicle or by a device placed outside” 7

Secret Databases

A new story also came out this year claiming that information is being kept on Canadians, in secret databases that they have no access to.

Quote:
“Jennifer Stoddart, the Privacy Commissioner of Canada, has released a 48-page report warning that the RCMP (Canada’s national police force) is keeping thousands of files on regular citizens in secret databases which cannot be seen by the accused.

One of the many disturbing facets of Stoddart’s report are the examples she cites of information for these secret files coming from citizen informants. In one case a man was put into the secret database because a resident of his daughter’s school neighborhood saw him entering a rooming house and—believing drugs were involved—called the police. The police investigation concluded that the man had only stepped out of his car to have a cigarette, but the file was still in the national security databank seven years later.

Another incident cited in the Stoddart report involved a neighbour who saw two men carrying “something that resembled a large drum, wrapped in canvas” into their house. Police were called to investigate but found nothing resembling the reported item, yet the data was still sitting in a top secret databank five years later. As Stoddart points out in the CBC story on the report, this is potentially disastrous for the individuals named in the files, because it “could potentially affect someone trying to obtain an employment security clearance, or impede an individual’s ability to cross the border.” 8

References:

 

1. http://www.telegraph.co.uk/news/uknews/2689996/Children-aged-eight-enlisted-as-c%20ouncil-snoopers.html

2. http://www.amazon.ca/Community-Oriented-Policing-Systemic-Approach/dp/0130141100

3. http://www.aclu.org/pdfs/privacy/fusion_update_20080729.pdf

4. http://www.progressive.org/mag/mc070208

5. http://abcnews.go.com/TheLaw/Story?id=3312813&page=1

6. hs.riverdale.k12.or.us/maverick/?q=node&page=18

7. http://www.fipr.org/rip/JRP2HRA.html

8. http://www.corbettreport.com/articles/20080214_snitch_state.htm

 Other Sources:

 1. http://www.telegraph.co.uk/news/uknews/2696031/Anti-terrorism-laws-used-to-spy-on-noisy-children.html.

2. http://www.youtube.com/watch?v=sV_I7cgkqXc

 

September 17, 2008 Posted by | Citizen Informants, Civilian Spies, community policing, Covert investigations, domestic spying, Gang Stalking, harassment, Laws, mobbing, New World Order, NWO, one handed signals, oppression, paranoid, Police State, Red Squads, Snitches, society, Spying, Stalking, Stasi, State target, Surveillence, Targeted Individual | , , , , , , , , | Leave a comment