Gang Stalking Techniques





The following techniques are several types that may be used against Targeted Individuals (TIs). There are other techniques used, but these are most of the primary ones.





Psychiatric Reprisal



This was used in Russia to have dissidents listed as mentally ill. This practice is now being used against workers in America and other democratic countries.





Violent Person Registry

Some targets might find that they are being targeted because they have been placed on a Violent Person Registry. This means that they will have a flag that comes up anywhere they go listing them as violent or potentially violent. This can happen to anyone, for simple reasons and without your knowledge. This can go on for years. Please read Jane Clift’s Story.

Air Stalking

This is when helicopters are used to track targets that are on foot, or in cars. They fly over head and follow the targets from one location to the next. Some will monitor the targets shortly after they leave their homes.

Brighting

As targets walk on the street, usually at night, civilian spies/snitches will turn on their high beams. This might be flashed once or twice at targets.

Sounding vehicle horns

Sounding vehicle horns operated regularly when the target in the vicinity.





Mobile Phone Stalking

Using a targets mobile phone to track and monitor them. The microphone and video cameras on mobile phones can be used to monitor targets. Even when the phone is off, the microphone can be used to listen into conversation. The camera can be used to view activity in the room. Mobile phones can also be used in conjunction with several Internet programs to locate the Targeted Individuals within a few feet.







Crowding/Mobbing

When the target is in public, civilian spies/snitches will usually try to box the target in. Eg. They will surround the target in a square like formation if possible. They will stand too close to the target, or swarm them.





Directed Conversations

These are conversations that complete strangers will have out in public relating to the target and their personal situations.

Electronic Harassment

Electromagnetic weapons and frequencies will be used on a target on their homes. The purpose of using the EMF (Electromagnetic Frequency) on targets and their belonging are multifaceted. Electronic frequencies can destroy electronic equipment.

Electronic frequencies can be used for monitoring and tracking inside the home, and at work. It can also be used for purposes of sleep disturbance. When those conducting these covert investigations feel that they have psychologically destroyed the target to where they are near breakdown, they will start to use these weapons. They will also use these weapons if targets are not going along with their harassment protocol.

Emotional Sapping

This is similar to the concept of an energy or psychic vampire. You know negative people who drain your energy when you are around them, or who are really good at transferring their negativity onto you. As a target you are being exposed to dozens of people on a daily basis, many of them who do not wish you well, or want to hurt you even though they don’t know you.

Without realising it you are also being emotionally, mentally, and spiritually harmed on a daily basis. After time this can get to you and weaken your defences. This is when you might notice that you are more susceptible to this form of energy drain. It’s a very real phenomenon and one to be on the lookout for. Once you are drained of energy this way, you will notice that it’s easier for these people to access your life and cause you harm in other ways. There are emotional shielding techniques that can be used to help try to prevent this. There are also lot’s of books being written about these types of negative energy draining people.

Entrapment

To lure into dangerous, difficult, or a compromising situation. The Civilian Spies/Snitches will try to lure targets into various situations for the sole purpose of setting them up. Setting up targets could involve getting them arrested, institutionalised, set up on fake sexual harassment charges, drug charges, illegal pornographic materials, etc. Once this happens, it put’s targets at risk for entrapment into becoming civilian spies themselves.

Fake Credibility Reports

Fake Credibility Reports. It’s possible that fake credibility reports are being used to subtly discredit and attack legitimate websites. Under the guise of doing good for the community.

What’s interesting about the fake credibility reports are which sites get targeted and which sites do not.

Files

It has been indicated that targets will have files shown to relatives, store keepers and friends. The files are usually not left behind, but they are used to show legitimacy and to further slander targets.





Gaslighting

Doing little things to try to make the target think that they are going crazy.



Coming into their homes, moving their furniture around.



Changing clothing that they bought and replacing it with similar, but inferior items.



Taking small items and then replacing them later on.



Gassing/Poisoning

Spraying fumes or scents into a targets home. Tampering with their food to make them become very ill.

Heat and Vibrations

Sometimes targets experience vibrations and heat in the home. There can be many sources. I have been advised that informants use many objects. Radar guns, lasers, etc. However, one of the most likely causes of the vibrations in the home might be transducers.

Illegal Entry

To gaslight the target.



It’s used to help profile the target.



To set up illegal surveillance.



It’s a way to find out intimate details about the targets. This can be used later to set up the target by using people in photo albums, or by directed conversations about things in the target’s apartment.

Illegal Surveillance

This involves setting up audio and some visual surveillance of the target.

Bugging the targets phone.



Surveillance in the target’s residence



Listening to cell phone and hard-line conversations.



Hacking into their computers and learning all about what the target is doing, sites they frequent.



This also helps to build a profile of the target, and it’s also used for later psychological attacks against the target.



This is where civilian spies/snitches will go out of their way to get into a targets life. They will try to form friendships with targets. They will try to form intimate relationships with targets.

They will get close to people that are affiliated with targets such as spouses, relatives and friends.





Isolation

For this harassment to be successful, it’s important to be able to isolate the target from friends, family members, co-workers and even spouses. To accomplish this isolation many methods are used included, but not limited to: slander, lies, fake files, sabotage, anything that will get the target into a situation where they have no support system. This is important for them to succeed.





Laser Microphones

Laser microphones are microphones with a laser beam. They detect vibrations with a laser and convert it to a digital signal. Lasers are usually bounced off a window, or off any object near to the conversation monitored. Any object which can resonate/vibrate (for example, a picture on a wall) will do so in response to the pressure waves created by noises present in a room.





Mail and Email tampering

Civilian spies/snitches will steal your mail. They will delay the delivery of your mail, and they will also make sure that your mail does not arrive. The other thing they are known for is the tampering of email. They will delay email, delete email, and stop email that you have sent from arriving





Mimicking

This is trying to copy things in a target’s life.

Leaving when they do.



Dressing like they dress.



Throwing out the garbage



Going to the bathroom



Doing whatever the target is doing.



This is all designed to be psychological warfare, so that the target again feels like they are under observation at all times.

Noise Disturbance

This will include anything from doors slamming above you and below you. Garbage disposal doors, car doors, loud stereos, stomping, moaning at specific times, loud coughing, pots slamming, water running, cupboard doors being slammed, fridge motor running all night, power tools, etc.

Profiling

Targets will be observed and profiled long before they ever become aware that they are targeted for this sort of harassment. Profiles will be created on targets by:

Following them.



Following people close to them.



Breaking into their homes and going through their stuff.



Listening to their calls.



Hacking into their computers.



Gathering information from friends, and family.



Seeing where they like to shop and eat.



What are their weaknesses?



What things do they like and dislike?



What are their weaknesses?



What things do they like and dislike?



What can you bribe them with?



What can you blackmail them with?



How can you bully them?



How can they best be controlled?



This will all be used to put together a profile of the target and then to get them into situations for their detriment.

Random Encounters

This will be people on the street who you randomly and unexpectedly run into. It looks completely natural and it seems to be a random encounter.

They might ask for your phone number after engaging you in conversation. Ask you out, or just ask you where you are going. Anything from small talk to lengthier conversations.

All with the purpose of finding out something about you, or even just getting you to do something.

Ruined Relationships

When targets are in a relationship, the civilian spies/snitches will try to ruin that relationship. This could be friendships, family or significant others.

If it’s a romantic relationship, they will find out what your significant other likes and try to get them to cheat, or leave you.

If it’s a friendship they will tell lies to come between you. The same goes for family. This is done so that targets will have no means of support, once they do realise that something is going wrong in their lives.

Sensitization

This is getting targets sensitive to an everyday stimuli such as colours, patterns or everyday actions.

Some examples are:

The colour red

Stripes



Pens



Whistles



Loud coughing



Clapping



Waves from strangers



Keys jingling



Sensors

These are used around the home or the apartment of a target to let others know the location or room that the target is in. These can also be used on auto pilot. Such as when a target trips a sensor it can turn on a silent alarm or even the sound of running water. This effect can be used when targets are in the bathroom to let them think that their movements are being watched and observed.

Signals/Symbols

civilian spies/snitches will also communicate with each other on the street by using Statsi like signals.

Slander

They will go behind the targets back and tell lies about them. Often the lies will consist of the target being into something illegal, or is someone dangerous, or just needs to be watched for some vague reason.

They will say the target is a:

Prostitute



Drug dealer



Crazy



Terrorist



Gay



Racist



Paedophile



Alchoholic



Drug addict



All of the above!



Sleep Deprivation

Depriving the target of sleep is a really good way of leaving the target stressed out. It’s also a way of leaving them disoriented and functioning at less than 100%. Then the targets can be baited into reacting in public or getting into a car accident.

Strange Encounters or Street Theatre

This is running into people that are acting very unusual, or people that are putting on a show or production, known as street theatre.

Telephone Redirects

When you make a telephone call, get the name and ID of the person that you are speaking to. Covert Investigations have redirected phone calls. This means that when you dial a number they will intercept that phone call and pretend to be the service or repair person you were trying to call.

Theft

Breaking into a targets home and taking small items, usually nothing of value. However there are exceptions to every rule. Perps will usually try to see what they can get away with.

Tracking

The targets are tracked by various methods.

Targets are tracked on foot by foot soldiers.



They are tracked in their cars.



Targets can be tracked by using their mobile phones, laptops, and other electronic devices. If their mobile phone number is known, there are Internet programs that will track a target to within a few feet.



GPS tracking on their cars. These are all ways that targets are tracked wherever they go and their activities monitored.



Vandalism

If the target owns property this can be as simple as broken door handles, knobs, to actual slashing of tires. They will also break in and do small damage to items the target owns

Voice2skull

Also known as V2K. If you are hearing voices you might not be crazy. You can be in the room with someone else and be hearing voices and they will hear nothing.

There is a commercial version which can perform this task.