Wednesday, January 30, 2019

Gang Stalking - Tactics For Fighting Back - Part Nine

The following is taken from

(Continued from Part Eight)

Merely creating one more blog or Facebook page to get lost in the ocean of such information is not going to solve the problem.
If you want to create an anti-stalking website, blog, or Facebook page, by all means go ahead, (in fact, I encourage it), but you should seriously consider also trying to help the community of gang stalking victims coalesce around a few locations -- instead of existing only as isolated points spread across the web in a sea of disinformation.

Toward that end I humbly suggest that you try to promote this website - - as a comprehensive source to which people can go.
This suggestion might seem self-serving, but you can see for yourself that I'm not making any money from this website: there's nothing for sale here.

I will continue attempting to publicize the best suggestions, websites, articles, video links etc. about gang stalking as they come to my attention by listing them in this website.

Instead of having each victim of gang stalking re-invent the wheel and create a website which attempts to explain gang stalking from scratch, consider creating a more limited website, Facebook page, or blog, which describes your experiences with gang stalking, but also prominently features a link to this website.

As mentioned above, another thing that would be helpful is to go online and post comments in other websites, forums, Facebook pages, Twitter messages etc., referring people to this site.

As much as possible, you should do that both at gang stalking websites and in the comments sections beneath articles in major news websites, so they will be seen by non-victims of gang stalking as well.
That's critical.

One very easy way to post such information is to simply copy information from this website - if it relates to an article or forum discussion.

The best way to connect with other victims is online - although you must beware of perps who pose as targeted individuals.
In general, be suspicious of anyone reluctant to publicly criticize the apparent participation in gang stalking by law enforcement officials.

The very best thing would be for victims to create a legitimate victims' support group to lobby for the exposure and elimination of gang stalking by petitions and public demonstrations.

If any particularly ambitious gang stalking victim wishes to spearhead an effort to form such a group, please email me about it so I can promote it here.
Even though it would inevitably be infiltrated by some perps, it could still be very effective.

Tuesday, January 29, 2019

Gang Stalking - Tactics For Fighting Back - Part Eight

The following is taken from


Join forces with other gang stalking victims by concentrating on just a few online platforms to share information and expose gang stalking.

Not only are gang stalking victims often in various stages of financial ruin because of their enemies,  and short of contacts because of their isolation,  they also don't have one clear source to which they can go for information and support.

African-Americans have the NAACP,  American Muslims have CAIR (Counsel on American-Islamic Relations),  if members of those communities are looking for advocacy, they know where to go.

Targets of gang stalking in contrast are isolated individuals with numerous, scattered, marginally-useful websites to go to for information, and those are mixed in among search results with numerous disinformation websites created by government minions.

To have any hope of ever gaining the attention of Congress,  targeted individuals must at least begin coalescing around just a few major information sources.
This website is intended to be one of those.

For every legitimate ant-gang-stalking website, there seems to be at least a dozen which are mostly or completely filled with garbage.
Every gang stalking victim who has searched for information online knows this is true.

As you visit websites which appear in searches about gang stalking,  you first see something which appears to be a possible source of useful information,  but on closer look is just a lot of vague B.S. mixed with UFO abduction story links or whatever.

I have listed some of the few exceptions in the "Recommended Websites" page of this blog.
There are other legitimate sources as well, but not many.

Consequently, anyone who is not a targeted individual searching online - for example, a journalist - will mostly encounter what appears to be evidence that gang stalking is the product of the imaginations of paranoid and mentally-challenged individuals.

(To be continued)

Monday, January 28, 2019

Gang Stalking - Tactics For Fighting Back - Part Seven

The following is taken from


"If you're going through hell, keep going."

Winston Churchill

Persistence will lead to victory.
Already the digital public square is filled with information and rhetoric which the U.S. government would prefer to censor but cannot,  posted by Americans fed-up with the corruption, secrecy, and abuses of power in the upper echelons of government and corporations.

Even the federal government's massive self-serving security apparatus and it's abettors in mainstream media institutions cannot effectively monitor and control the flow of information anymore.
Dissent is harder to marginalize and censor in a digital landscape filled with whistle-blowers, citizen-journalists, bloggers, and alternative media websites.

Independent thinkers, entrepreneurs, entities such as WikiLeaks, and movements such as "Anonymous" have created an information network in which citizens no longer have to wait for The New York Times to expose the next Pentagon Papers conspiracy -- or the Washington Post to expose the next Watergate scandal.

Even The New York Times admits this:
"News no longer needs the permission of traditional gatekeepers to break through.
Scoops can now come from all corners of the media map and find an audience just by virtue of what they reveal."
David Carr, New York Times, June 16, 2013

One of the objectives of gang stalking is to isolate and break-down the targeted individual by creating the impression that the whole society is against him or her.
Don't make the mistake of believing that impression.
Although the number of people who participate in gang stalking must be large, they are still a small minority compared with the general population.
The vast majority of Americans do not wish to have our society become a creepy police state filled with citizen spies, as happened in the communist nation of East Germany.

Gang stalking victims need to challenge the (most dangerous) rodents in the food chain, and support political reformers - libertarians, progressives, and others -- who defend the individual rights and freedoms of Americans against the predatory inclinations of powerful government and corporate institutions.

Sunday, January 27, 2019

Gang Stalking - Tactics For Fighting Back - Part Six

The following is taken from


Technical countermeasures can seriously disrupt some forms of surveillance and harassment used in organized stalking.

If you can afford to buy counter-surveillance and security equipment (cameras, alarm systems, locks, safes, firearms, bug detectors, signal-jammers, etc), you should do so.

Be as discrete as possible about acquiring and implementing such measures so as not to make them easier for your stalkers to defeat.
If possible, try to have friends or relatives make the arrangements and purchases, since they are less likely to be under constant surveillance.

Using technical security measures to fight gang stalking has two major limitations though.

One is the cost.
Most targeted individuals lack the financial assets to take advantage of many security technologies.
People with significant resources and connections are probably not often selected as gang stalking targets in the first place, since they can more easily fight back.

The other problem with a strategy that relies primarily on technical counter-measures is that you will essentially be engaged in a sort of "arms race" with people who have a deeper knowledge of such matters, as well as deeper pockets.

Nevertheless, it is smart to exploit spy gear and security systems as much as possible within your budget.
Some effective technological counter-measures are either free or relatively affordable.

Gang Stalking - Tactics For Fighting Back - Part Five

The following is taken from


One of the reasons that most of the tactics listed here do not involve much risk for the targeted individual is that gang stalking perps have to worry about the following phenomenon:

The "Streisand Effect" is when an effort to suppress information inadvertently causes an increase attention to the information.

An online archive of 12,000 photographs of the California coastline - created to document coastal erosion -- contained an aerial photograph which included the Malibu mansion of singer and actress Barbra Streisand.

In 2003, Streisand filed a lawsuit to remove the photograph from the archive on the grounds that it violated her privacy.
A judge eventually dismissed the lawsuit, but news coverage of the litigation brought much more attention to the photograph than it would otherwise receive.

Gang stalking perps (including corrupt members of local law enforcement agencies) will not want to attract attention to their gang stalking crimes by doing battle with you in a public way, so they have to be very reserved in their efforts to suppress your exposure of what is happening.

You should exploit that.

(To be continued)

Saturday, January 26, 2019

Gang Stalking - Tactics For Fighting Back - Part Four

(Continued from Part Three)

The following is taken from


"Patriotism is supporting your country all the time, and your government when it deserves it."

Mark Twain

Anyone who is already officially or unofficially blacklisted, should exploit that by taking the game to the gang stalkers.
This is not to say that you have nothing to lose:  you should avoid doing things which could lead to serious legal trouble.
Fortunately, most of the tactics on this webpage are 100 percent legal, and the few which are in a gray area are acts of non-violent civil disobedience.

Incidentally, civil disobedience is a well-established, respected, and morally legitimate way to protest injustices.
For targets of criminal harassment by corrupt members of law enforcement agencies and security contractors, it is even more than that; it is a necessary form of self-defense.

You do not need to wade more deeply into the philosophy of civil disobedience for the purposes of understanding it's role in fighting gang stalking (or fighting corruption generally), but if you want to pursue the subject, you might want to start with this classic essay by Henry David Thoreau: "Civil Disobedience".

Another essential document on the subject is "Letter from Birmingham Jail" by Dr. Martin Luther King Jr.
In addition to being among America's most famous proponents of civil disobedience, Dr. King was a target of intense systematic persecution by lawless thugs in the FBI.

Several things are worth noting about the example of Dr Martin Luther King Jr.
Although he was the target of cowardly and illegal harassment by creeps in a rogue law enforcement agency, he never bowed to their efforts at intimidation.
Also note that Dr King is now honored by a national holiday, whereas FBI Director J. Edgar Hoover is mostly reviled.

End of Part Four

Friday, January 25, 2019

Gang Stalking - Tactics For Fighting Back - Part Three

(Continued from Part Two)

The following is taken from

2) Take Calculated Risks

A strategic axiom in all arenas of competition and warfare is that the side which is at a disadvantage should be more aggressive.
In a sports game, the team with a points lead can often exploit it's position by playing cautiously.
Conversely, the opponent with the points deficit has a logical incentive to take more risks.

Targeted individuals need to exploit asymmetrical warfare principles.
As much as possible, we should employ tactics that are unpredictable, creative, cheap, simple and bold.
The worst thing a victim of organized stalking can do would be to adopt a cautious, defensive posture.

Counterintelligence subversion is based on a strategy of intimidating the victim to the point that he or she is afraid to go anywhere or do anything without being constantly vigilant.
That mental state cannot be sustained for a long period and it diverts energy and time and resources which could otherwise be devoted to exposing the criminals who orchestrate and perpetuate the stalking.

Organized stalking is cowardly and illegal, but it is not strategically stupid; it employs tactics which are effective and difficult to prove legally.
Also it exploits the superior financial and political resources of the corrupt agencies and their corporate cronies which use it as a weapon.

We need to change the whole game and play it on our terms.
Give the perps and their handlers some reasons to be uncomfortable.
The way to throw a wrench into the Stasi machine is to expose it's crimes to the public.
Sometimes that requires stepping outside your comfort zone a bit.

By the way, an additional benefit of adopting an offensive strategy is that when you are focused on working aggressively to undermine the criminals, the emotional effects of their harassment will diminish greatly.

End of Part Three

(To be continued)

Gang Stalking - Tactics For Fighting Back - Part Two

(Continued from Part One)

The following is taken from

So the Achilles' Heel of  gang stalking is exposure.

From the perspective of intelligence and law enforcement agencies and corporations which use organized stalking as a secret illegal weapon for subversion, the perfect operation is one in which the target becomes progressively isolated, impoverished, emotionally degraded, and eventually commits suicide.
That does happen in some cases - the most prominent example being the FBI's psychological torture of actress and political activist Jean Seberg.

Seberg's case was tactically successful in the short term (they destroyed her emotionally), but it was ultimately a strategic failure for the FBI because it's crimes against her ended up on the front pages of national newspapers.

Without question the vast majority of Americans do not want to live in a society infested with spies working for a Stasi-type government.
To the extent that you can educate your fellow citizens about the creepy and illegal stalking activities of private security mercenaries, vigilantes, and corrupt law enforcement officers, they will be on your side.

Targets of organized stalking must wage a two-front war:  We must act locally to expose the harassment to neighbors and others, and we must expose what is happening on a national level as well.
Both objectives are critical.

Thursday, January 24, 2019

Gang Stalking - Tactics For Fighting Back -- Part One

The following is taken from


1) Shine a light on the cockroaches

Organized Stalking is a manifestation of the view that intelligence and law enforcement agencies, their corporate cronies, and the military-industrial complex should have supremacy over all other elements of American government.

Even if you think that it is a desirable power structure for national security reasons, it is impossible to deny that it grossly violates core principles of the U.S. Constitution.
Organized Stalking also violates stalking prohibitions under federal and state law in all fifty states.

One of the implications of that is that the perpetrators need to keep it a secret.

This is a primary difference between the use of Organized Stalking as a domestic counterintelligence strategy in America today, and it's use by the Stasi (state police) in East Germany:
In the USA it is illegal.

This was true during the original use of COINTELPRO also - and was a primary reason the U.S. Senate conducted it's Church Committee investigations after the FBI's activities were exposed by civilian activists.

Many of the tactics and strategies employed by the Stasi were virtually identical to those now used by the FBI  and other agencies in the United States.

In East Germany, however, the Stasi WANTED citizens to be aware that their society was infested with spies because it furthered the communist party's goal of political control.

In the USA, such a public awareness would trigger a backlash against the abuse of power by the government and it's cronies, so it's kept under the radar.

So the Achilles' Heel of gang stalking is exposure.

(End of Part One)

Monday, January 14, 2019


January 14, 2019
Organized Stalking Victims United

In past posts on this blog, we have mentioned the fact that there is evidence to support the claim of many Organized Stalking researchers that Organized Stalking, aka "Gang Stalking" is part of a secret government program which was started by the FBI under J. Edgar Hoover in the mid 1950s.

Called COINTELPRO, this secret counterintelligence program was originally formed to expose "Communists," but as the years went on, Hoover used COINTELPRO techniques against anyone he deemed to be "anti-American,"  including government whistle-blowers, liberal or progressive journalists, anti-war activists, and others.

Dr. Martin Luther King Jr. was a target of COINTELPRO, because Hoover hated him.
In the 1960s, Dr. King often gave speeches denouncing the Vietnam War, and that infuriated Hoover.
One could argue that Dr. Martin Luther King Jr. was the first Targeted Individual (TI).
Hoover and COINTELPRO made life hell for Dr. King, and almost destroyed his marriage.

Hoover also hated John F. Kennedy and his brother, Robert F. Kennedy, who became Hoover's "boss" after he became Attorney General and headed the Justice Department, which included the FBI.

JFK didn't trust Hoover, but after he became President, he allowed Hoover to remain Director of the FBI.

COINTELPRO continued operations into the 1970s, and supposedly was ended in 1971 after anti-war activists broke into an FBI field office and stole many documents, including those documents relating to COINTELPRO.

Few legitimate organized stalking researchers believe that the FBI ended the COINTELPRO program after the 1971 break-in.
Previous posts on this website go into more detail on the subject.of COINTELPRO.
Suffice it to say that COINTELPRO did not end, but continues to this day, having changed names many times.
(See previous posts on COINTELPRO)

Like COINTELPRO,  MK-ULTRA was also a covert, illegal, counter-intelligence program.
Started in 1953, MK-ULTRA was a CIA mind-control program which conducted secret experiments on unsuspecting human subjects.

"MK-ULTRA used numerous methods to manipulate people's mental states and alter brain functions, including the surreptitious administration of drugs (especially LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and sexual abuse (including the sexual abuse of children), and other forms of torture."
(United States Senate, 95th Congress, 1st session, Aug. 3, 1977.."Project MKUltra, The CIA's Program of Research in Behavioral Modification" PDF, Joint Hearing Before the Select Committee on Intelligence and the Subcommittee on Health and Scientific Research of The Committee on Human Resources - Report)

In 1977, a Freedom Of Information Act request uncovered a cache of 20,000 documents relating to MK-ULTRA, which led to Senate hearings later that year.
Some surviving information regarding MK-ULTRA was declassified in 2001.

By Donald Bain

"In the 26 years since "The Control of Candy Jones" was first published, the controversy surrounding this wrenching tale of how one of America's most famous models was used by the CIA as a human guinea pig in it's infamous mind control experiments, has never completely vanished.
It has remained a 'cult book,' fueling the cause of critics of the CIA, and further defining the now proven (and accepted) thesis that the minds of certain people can be manipulated.and controlled, in this instance, for evil purposes.

20th Century Fox paid significant money for it as a film vehicle for Jane Fonda, yet never produced the movie despite attempts at screenplays by three of Hollywood's best, and has refused to sell the rights to the many producers who've expressed interest in making the film.

Why has 20th Century Fox still not made the movie about Candy Jones?

Why have they refused to sell the rights to any of the producers who've expressed interest in making the film?

Could the answer be that the CIA doesn't want the movie to be made?

The CIA attempted to suppress the book, as did one of the doctors, Dr. William S. Kroger, a Beverly Hills psychiatrist who spearheaded the intelligence agency's mind control experimentation.

Those who think that Organized Stalking is a part of a new, improved COINTELPRO, and nothing more, should read this book about Candy Jones.

The "new, improved, updated" COINTELPRO program IS very likely involved in Organized Stalking.
However, MK-ULTRA, other covert government intelligence programs, and covert non-governmental private entities (right-wing billionaires) may very likely be involved as well.

Organized Stalking is Organized Crime!

Organized Stalking is EVIL

Organized Stalking is REAL!!

Sunday, January 13, 2019

The Hidden Evil - Part 6 - O.S. Tactics - (Conclusion)

The following is taken from:
"The Hidden Evil: The Financial Elite's Covert War Against The Civilian Population"
By Mark M. Rich

TACTICS  (Conclusion)

"It is impossible and unnecessary to explain every variation of (OS) harassment.
In addition, there are some tactics that are much more subtle than you may experience if you're targeted.
Now you know why some people are driven to suicide.

These organizers may be more aware of some of your habits than you are.
For instance, commonly used routes will be used as avenues for various types of 'Street Theater" as you pass through.

The neighbors who move in next door to you will have loud motorcycles or cars.
In addition, these neighbors may be carpenters, mechanics, etc.and will always seem to have noisy projects to work on.

Moving out of the community or state will not stop this harassment.
This is not only nation-wide but is happening in all NATO countries.
It apparently is one component of  a political movement that appears to be in service to globalization.

Individually, some tactics may not be illegal or very potent, but when combined with other tactics in a systematic, round-the-clock fashion, day in and day out, they are a painful and difficult to prove form of torture."

TORTURE  (As defined in Webster's Dictionary, 1997 edition)
1) The art of inflicting excruciating pain, as punishment or revenge, as a means of getting a confession or information, OR FOR SHEER CRUELTY.
2) A method of inflicting such pain.
3) Often, the pain or suffering caused or undergone
4) Extreme anguish of body or mind; agony."

Saturday, January 12, 2019

The Hidden Evil - Part 5

The following is taken from:
"The Hidden Evil: The Financial Elite's Covert War Against the Civilian Population"
By Mark M. Rich

Part 5

SENSITIZATION -- (Continued from Part 4)

Still under the heading "Sensitization"..Mark M. Rich writes:

'You may not even know you've been sensitized.
But if you recognize it as an attack, what would you tell your friend or family member?

This is what happened.
The collisions, blatant hostile staring, and foul grin created the negative emotions and anchored them to the pen, which has now become the trigger.
That is an example of a sensitivity program.
Now imagine yourself being sensitized to multiple objects and sounds and each of them creating pain every time you see or hear them'
That's the power of NLP!
And that is only one small segment of the entire harassment program.
OS targets around the country and the world have witnessed this being done with sounds, gestures, sell phones, laptops, pens, cars, watches, clothing, symbols, colors and other items.
This type of attack does require some maintenance and will lose it's potency unless it's reinforced.
So groups will reinforce these 'anchors' and 'triggers' with occasional 'blitz attacks' from time to time.

Groups will take an object  you've been sensitized to and link it to another object.
The idea appears to be to keep expanding the amount of fear you associate fear, anxiety, anger or shame with (sensitization).

For example, one of your neighbors has made it abundantly clear that they're participating in the harassment.
Now, you know they're participating, and they know that you know.
So they may try to switch you to another stimulus, such as a car alarm.
Since you've already associated them with massive pain, they can extend their harassment to a 'sound' by turning their car alarm on and off in rapid succession over a short period of time, multiple times, throughout the day.
After they've done this for a couple of days, and you've been sensitized to this sound, they csn reduce their use of this specific tactic and just use the occasional maintenance sounds to keep you sensitized.
Now, instead of repeatedly turning their car alarm on and off for ten times in a row, they only do it for two or three times in a row, just to let you know that you're being harassed.
Even though it's only done a couple of times in a row, you know why they're doing it and you may feel anger, fear, anxiety or other negative emotions.
You may also feel frustrated at the prospect of trying to explain this covert harassment to another individual.

Anyone else observing this might think it's a little strange that someone would turn their car alarm on and off several times, but they'd write it off as an isolated, strange incident.
Since they have not had your previous experience (sensitization) with that sound and are not aware that it's a small part of a much larger harassment program, it would be difficult to explain what those 'beeps' meant.

In NLP the process of copying an emotional state 'anchored' to an existing 'trigger'  is called 'chaining.'"

End of Part 5

(To Be Continued)

Thursday, January 10, 2019

The Hidden Evil - Part 4 - Sensitization

The following is taken from:
"The Hidden Evil: The Financial Elite's Covet War Against  the Civilian Population"
By Mark M. Rich

Part 4


Under the heading:
"Sensitivity Programs"
Mark M. Rich writes:

"Cause Stalking groups usually begin their campaigns with sensitivity programs.
The goals of a sensitivity program are:
- To get the person's attention & let them know they're being harassed
- Anchor damaging emotions to common objects//sounds so a target can then be covertly harassed openly in public.

These sensitivity programs are based on a science called 'Neuro-Linguistic Programming' (NLP)
The parts of this science that Organized Stalking groups use are 'anchors' and 'triggers.'

We're unconsciously creating anchors in our environment all the time with people, music, places and objects.
Initially, the target may not be consciously aware of the harassment, but this is not necessary.
One reason people may not realize that they're being targeted or can't remember exactly when it began, is because these groups may slowly & gradually increase the harassment over time.
But groups can let you know you're being targeted any time they choose by turning up the volume with a 'blitz attack.'
Groups use sensitivity programs in an attempt to create phobias.

Self-help gurus use these programs to create positive emotional states & anchor them to a movement, a sound, or an object.
Then the sound, movement or object becomes the 'trigger' that will invoke the emotion.
Although this sounds complex, it is actually a pretty simple component of NLP.
It is done by creating a peak emotional state, then, while in that state, you anchor it, that is, do something repeatedly.
This effectively anchors the emotional state to whatever repeatedly done.
This process of creating anchors has also been called 'Emotional Transference.'

You can think of NLP as a very powerful took that can be used to produce rapid, profound change.
Harassment groups create negative emotional states such as fear and anxiety, and then anchor them to common objects in the environment.
There has been some concern in the mental health field over the potential misuse of NLP.
Unfortunately, like other tools, such as guns, they can be misused in the wrong hands.
Organized Stalking groups use this science in a destructive format.

Here's an example of how OS groups use these anchors:

One morning, you're walking out to your car & a man walks in front of you, states directly at you in a hostile manner while repeatedly clicking his pen the whole time.
You feel a little uneasy and say to yourself 'Boy, that was weird. What was his problem?'
Then 2 hours later you're leaving a shopping mall on a day that it was not particularly crowded.
As you walk out to your car, an old lady approaches you on foot.
As she almost collides with you, she locks eyes onto you with a hostile demeanor, while clicking a pen the whole time.
Then maybe you tell yourself something like this: 'there couldn't be a relation between these events, probably just a coincidence...But they both stared at me in such a mean way, while clicking their pens.'
Later in the afternoon you're on your way home.
You're at a stoplight and out of the corner of your eye you see a passenger in the car to your left.
You hear a slight noise and glance over.
You see a man glaring at you with a grin on his face.
His arm is hanging out the window and he is holding a pen, which he is repeatedly clicking.
Now imagine that happening for a month,
Then one day a month later you're on a sidewalk with a friend or family member.
A man walks by, doesn't look at either one of you, but clicks his pen a couple of times.
You feel anxious and afraid."


Tuesday, January 8, 2019

The Hidden Evil - Part 3 - More OS Tactics

Part 3   More Tactics Used By The Criminals Who Engage In Organized Stalking

The following is taken from the book:
"The Hidden Evil:: The Financial Elite's Covert War Against the Civilian Population"
By Mark M. Rich

More Tactics

In Parts 1 and 2 we discussed "Collisions and Cut-offs," "Synchronization," and "Convoys of Vehicles"

In this part, we will discuss one of the most common tactics used by the criminals who engage in Organized Stalking --  "Noise Campaigns.'
(See previous blog posts on this OS tactic)

Mark M. Rich writes:

"All targets of Organized Stalking are familiar with noise campaigns.
Basically, there will be a steady stream of noise consisting of a rotation of various types of disturbances around your house.
This noise may even follow you wherever you go.
This includes car doors slamming, people coming and going, people yelling, car alarms, tires screeching, banging, engines revving, cars beeping their horns, constant construction, lawn mowers, snow blowers etc.
An ongoing noise campaign appears to be most effective.
Like the collisions and cut-offs, these noises are done to startle you and keep you uncomfortable.

For instance, there will be doors slamming for a few moments, then a motorcycle will drive by and rev it's engine outside your house.
After that, you'll have someone mowing the lawn.
Then there will be alarms going off.
After that you'll hear a large crowd of people walk by your house.
You may then hear fire or ambulance sirens.
Then there are hammering and sawing sounds.
Then you'll hear car alarms being turned on and off in succession multiple times from multiple vehicles around your house.
After that it will switch back to horns honking, then drilling and car doors slamming.

Often, activity such as noise will be synchronized with you coming, going, or doing some other type of activity.
For instance, you may hear ambulance, fire engine sirens or beeps as you leave.
Noises made as you leave also serve as a form of communication to alert group members in the area to begin pursuit.

Chronic exposure to even low-level noise is considered a hazard that has been known to produce adverse physiological and psychological health effects.
Prolonged exposure to noise can produce high blood pressure, a rise in cholesterol, damage to the circulatory, cardiovascular, gastrointestinal, and musculoskeletal systems.

If you're targeted and pregnant or plan on having a baby, you may want to think twice.
Noise has been known to cause hearing loss and growth disturbances in a fetus and can lead to birth defects.
Just as the fabricated cut-offs are likened to getting slapped, these noises are the equivalent to being repeatedly 'shocked.'
There is no question that these low-intensity neutralization tactics are acts of extreme violence."

End of Part 3

Monday, January 7, 2019

"The Hidden Evil" - Part 2 - More OS Tactics

"The Hidden Evil" - Part Two - More Tactics

From the book: "The Hidden Evil:: The Financial Elite's Covert War Against the Civilian Population,"
By Mark M. Rich

Under the heading, "Tactics"


"Synchronization seems to be very prevalent with Organized Stalking.
Groups will try to synchronize their tactics with things that you do, such as entering or leaving your house.
Your movements will be synchronized with noise, vehicles coming or going, people coming or going, or other movements.
For example, when you arrive (home), two cars will drive down your street & someone will be banging a hammer.
Or you may have two cars leave & one arrive."

I can vouch for the veracity of this claim by Mark Rich.
If you are being targeted by organized stalkers, you may frequently experience the following:
- Aircraft flying low over your house, while at the same time one or two vehicles might be driving by your house.
- After going out your front door, you may hear a car horn honk twice, while at the same time, a different vehicle may drive by your house.
- When returning home from shopping, or the post office, or whatever, one vehicle will drive by your house while, at the same time, a second vehicle will drive by your house in the opposite direction.
If you live on a busy street, these actions may just be accidental coincidences; but if you live on a street with very little traffic, two vehicles going by your house, one going one way and another going in the opposite direction, at exactly the same time,  it could be another example of organized stalkers working together simultaneously to harass you.


"If you're targeted,  you may have foot & vehicular traffic 're-routed' through your street.
You'll have an unnatural amount of vehicles driving by your house.(even if you're on a side or dead-end street) and/or following you while you're out.
Common practice is for vehicles to drive by scratching their tires, blowing their horns, playing loud music, revving their engines, and yelling as they drive by your house.
This can include city utility vehicles, postal vehicles (or other local governmental vehicles).
Some targets have even mentioned that local police vehicles have participated in the harassment."

End of Part 2

Sunday, January 6, 2019

"The Hidden Evil: The Financial Elite's Covert War Against the Civilian Population

By Mark. M. Rich
(This book is available at in paperback for $14.00)

Part 1
Collisions and Cut-offs

Although I haven't read "The Hidden Evil" by Mark M. Rich, I have read excerpts from it.
It's a very good book to read if you're interested in organized stalking.
There are very few books that even mention organized stalking, aka "gang stalking." or "cause stalking."
So a book like "The Hidden Evil" is a kind of "diamond in the rough" so to speak.

On this website, we've said a lot about the behavior of  the criminals who engage in this type of stalking, including the tactics used against targeted individuals (TIs)
(See previous blog posts)

In "The Hidden Evil," Mark Rich goes into much greater detail than we have as far as "tactics" used in organized stalking.

From "The Hidden Evil" by Mark Rich
Under the heading, "Tactics"

"Collisions and Cut-offs"

Mark Rich writes:
"The cut-offs I'm talking about here are usually not physical...They're fabricated, but like most Gang Stalking tactics they are designed to look like normal cut-offs that we all experience from time to time.
They can happen with vehicles, on foot, or a combination.
This type of space invasion is designed to startle you and create tension.
It can be thought of as a virtual slap.
They are used in blind areas such as corners, hallways, restrooms or intersections where you conatantly have people cutting you off or almost hitting you.
The perpetrator is unseen until he jumps out in front of you.
This happens in stores, buildings and on the street, with people and vehicles.
Generally anywhere there is a blind corner."

Mr. Rich provides the following example of this tactic:

"You're on foot and approaching a corner of an intersection, which you are about to cross.
You see a vehicle approaching the street you need to cross.
There is plenty of time & distance to avoid this collision.
Anticipating this, you either speed up or slow down.
The vehicle mirrors your actions.
You start to think that maybe this person is occupied with something else & you begin to cross the street.
As you step off the curb, the vehicle speeds up and meets you at the intersection.
The vehicle stops 10 feet from you and the man inside waves you on.
After this you might feel slightly angry, because you know the whole event could have been avoided."

End of "The Hidden Evil" by Mark Rich...Part 1