Targeted Individual (political_persecution) main
Targeted Individual US (political persecution US) main.
Government-sponsored human rights violations and persecution
exposed by the Church_Committee
such as MK-Ultra and COINTELPRO were never defunded and effectively phased out. In our times, certain individuals, legally associating people and members of ethnic groups may become targets of political repression, police harassment, non-consensual experimentation and psychological abuse; not for any criminal reason or because they constitute any kind of “threat to society“; but, because they are seen as opportunity targets and/or their general views or specific opinions as questionably undesirable to the political status quo.
Socio-political context of individualized targeting
Differences between targeted and socially mediated persecution Uses and Abuses of Technologies
From MK-Ultra and COINTELPRO to FISA courts and fusion centers
Can they really read your mind remotely?
Most social organizations have supervened on political hierarchies based on asymmetrical structures of control under which groups of people have been subjugated and persecuted through the abusive enforcement of societal and engineering technologies. Even after the existence of wheeled carts the ruling classes were carried on other people’s shoulders as an expression of “the ‘natural’, ‘proper’ , ‘Godly’ governmental arrangement”[*]. Through such irrationally uncivil and inhumanely discriminatory practices a minority ruling class in collusion with the military and police forces, as well as social institutions such as business, the media, the legal system, educational and research institutions, manage to control and abuse the large majority of people. Targeted individuals (TIs for short) are the victims used as test subjects and props by policing agencies in their bid for total societal control.
There are specific aspects characterizing the type of abuse TIs are subjected to, even though, at first sight, to those unencumbered, they seem to be indistinguishable:
targeted persecution is always ad hominem: policing agencies start by assembling thorough dossiers with their victims’ “bio-psychological and behavioral profile”: their biography, occupation, financial and intellectual objectives, medical records as “the Patriot Act”[*] stipulates (how is it exactly your medical records relate to your civic and moral views?), political associations and persuasion as well as social and family relationships. Victims’ are singled out, their daily lives’ wants and motives predictively monitored (currently, in our Über-surveillance times every member of society is monitored anyway) and relentlessly subjected to social conflicts and isolation, moral denigration, psychological pressure, conscious dissonance, emotional attrition, covert and/or overt torture with the ultimate goal of destroying the person’s moral integrity and social fabric. As former high profile perpetrator (the party abusing targeting victims, “perp” for short), whistleblower and current activist author John Perkins has related to us, they individualize the type and intensity of the psychological harassment to the point of framing the impression in their targets that they are “reading their targets’ mind”, “know them even better than they themselves do”, “own them” anyway[*].
targeted persecution is very personalized: When targeted individuals share their experiences they can’t find a consensus as to what is and may be, and what isn’t and can’t possibly be. Some TIs complain mostly about annoyingly tiring hissing noises, strangely out-of-place aural perceptions and voices, so-called V2K (voice to skull) and/or experience obviously non-endogenous, induced discomfort (jerky movements of their limbs, vibrations and heat on specific parts of their body), while other complain mostly about sleep deprivation, obviously orchestrated social harassment (concerted discrediting of their professional careers and/or in their day-to-day lives, gang stalking), constant non-responsive calls and misfunctions of their communicating devices. Some TIs believe that the government is using very advanced classified high tech to do such things as “reading our minds remotely from satellites, ‘as they do with cell phones'”, while some other are certain they are just exploiting military-grade technology on civilians and corrupting commercial gadgets in collusion with business and IT companies[*]. Some TIs believe they are being harassed because of their royal lineage, while other think it is “enhanced” racial profiling. Some TIs complain about the harassment directly messing with their children and family or their family members indirectly or directly becoming part of the harassment, while other notice such incidents happening only to themselves while in their homes, their families being spared and for the most part unencumbered about it. Some TIs believe that is just the way alphabet gangs, used as fronts by the government, justify salaries and keep themselves in “a state of semi-paramilitary readiness”, while some other believe their government couldn’t possibly be involved in such irrational, inhumane, unmoral, wasteful and illegal actions. Some TIs are police officers, members of the military and their own perpetrators themselves (at least those can’t say they don’t know what is going on)[*][*].
Social persecution is performed through political, religious, race, class and/or ethnic codes in more or less openly codified ways (even if inhumane, irrational and unjust; victims and perpetrators don’t wonder as to why certain things happen); while most TIs can’t put a finger on exactly why certain things are happening to them, who are the organizations/agents behind those deeds, even though they may be well aware of perps and when, how gradually they started noticing their own targeting. As disgustingly abhorrent and abusive as it is having a “moral” policeman abusively beat a lady for some dress code issue, that is still a social problem with social solutions. The Saudi government has finally allowed women to vote, drive and hold political posts. Martin Luther‘s rejection of several fundamental religious teachings and practices of Christian Catholics: purchasing indulgences payable to the Roman Catholic Church as a monopoly taking care of God’s earthly businesses, his proposal of a public academic discussion of the practice and efficacy of such practices delineated in his Ninety-five Theses (1517), his refusal to renounce all of his writings at the demand of Pope Leo X (1520) and the Holy Roman Emperor Charles V at the Diet of Worms (1521) resulted in his excommunication by the Pope and condemnation as an outlaw by the Emperor; yet, all those disagreements were all formulated in and mediated by shared religious codes. Even though what Rosa Parks effectively did was protesting inequality and segregation; technically, she was arrested and fined for refusing to give up her seat to a “white” person per local ordinance in a segregated city. That was a case of socially mediated, “legally” encoded and enforced injustice; not a targeting incident. In fact, the bus driver “following regulations”, considered to be an all around “nice guy” in his community, stated: “I wasn’t trying to do anything to ‘that Parks woman’ except do my job. She was ‘in violation of the city codes’ …”.
the degree of articulation, scope and relentlessness of incidents clearly prove government involvement and coordination:
if, say, you sign a petition or participate in a demonstration, your stress level will decrease once you head home, go back to your day to day life; whereas TIs’ stress level is ongoing. They would repeatedly receive random silent or strange calls (office background noises or an indiscernible voice talking about indiscernible themes) on the same day, cryptic confusing email messages and their communications attempts to other people will be corrupted. TI will get as hits of their online searches links to denigrating sites, strangely personalized TV broadcastings making fun of them (so, that when they relate such incidents to friends, families and doctors, they are written off as “crazies”, even though, technically speaking, perps did hack analog and can easily hack “smart” digital TVs). TIs find signs pasted on their home’s front door or their car’s windshield, their cars parked in some other place, the light in their homes on, their belonging dinged, their homes infected with bed bugs and people dressed framing messages about certain private aspects of their personal lives way more often and presented to them in such ways that such incidents could not possibly be thought of as random. That kind of gaslighting accompanies TIs wherever they go, even when traveling overseas for long stays or short touristic visits (which is coordinated with perps wherever you go). Law-abiding German citizen, Cambridge University particle physicist graduate Dr. Katherine Horton with no link whatsoever to any terrorist organization or any such things, who has tried fighting her case against human rights abuses in court against British and EU policing agencies, has been relentlessly harassed and tortured in Britain, Switzerland, Germany, Spain, Italy and the Netherlands [*][*][*]. Some TIs have likened the type of power and control dynamics in abusive spousal relationships to the kinds of abuses they are being subjected to. Yet, relationships presuppose some sort of tacit mutual understanding and consciously consensual participation of the involved parties. Individuals who accept on their own accord an abusive relationship, consciously know they can stop it if/whenever they would choose to do so, and given the intersubjectivity that any kind of relationship entails, even the person being permanently or alternatively abused (based on his/her own understanding of reality) does gain something out of it. You have absolutely nothing to “gain” out of being targeted and you can’t brake lose from it. It is a form of enslavement you are subjected to, in which your master doesn’t even care about having to feed you, keep you profitable. Even if you choose to surrender, “cooperate”. Yet, some TIs do accept such conscious demands to being a perp or a “happily unencumbered” individual.
In both, social persecution and targeted cases, perpetrators’ abuses and excesses are institutionally protected by anonymity and oppressive, discriminatory “laws” and “regulations” (and/or lack thereof), which, as is the case of the U.S. government nowadays, are covered by layers of secrecy, classification, redacting obfuscation and intentionally riddled with loopholes. They tend to, quite naturally, rationalize their actions, seeing themselves as “rightly patriotic”, “‘just’ using TIs for medical and social control experimentation, ‘which benefit us all’ as a ‘greater good’ thing”, “‘just’ snitching you for a while”, “on a more responsible, moral high ground”, “good Christians”, … and produce self-serving philosophies to justify their actions at times dressing them in junk science such as “Craniology” and gross misinterpretations of scientific facts, as is deducing a basis for genocidal racism and the breeding of a “superior race” out of Darwin’s evolutionary theories. Successors of MK-Ultra’s Dr. Cameron’s at the Allan Memorial still try to justify his torturous treatments even if they didn’t have any scientific basis or medical purpose whatsoever. Dr. Robert Cleghorn would not consider such treatments “harsh”, since they were “harder on the staff than it was on the patients, because these people had to be fed and ‘cared for’ …”.[*] During the dictatorship Brazil endured for two decades, times from which CIA “operative manuals” are still being found, perps openly boasted about “torturing all Brazilians to find out who the true patriots were”.[*][*]
From the invention of agriculture, writing and later the printing press, to the initial adoption of the social institution of the census primarily for organizational and taxing purposes, to its utilitarian repurposing for social control and repression by the Romans which, as chronicled in the Bible[*], had widespread social repercussion even influencing religion; we, as sharing members in society, have lived through the complex dynamics of interrelationships established by societal and engineering technologies. We have tried to cohesively raise to our collective consciousness their effects and consequences while devising self-control and check-and-balance mechanisms.
Stars beaconing and gazing not just improved sea faring and seasonal farming and therewith societal practices, but, furthermore, also religious beliefs, astrology and, closing its circle, detrimentally, the scientific development of astronomy itself and the physical sciences. By “‘seeing’ God in the sky and our societal and ideological rulers on earth”, we couldn’t see our natural and social reality for what it was.
The ruling classes have historically intervened such dynamics for their domineering and controlling agenda towards their own and other people, at times corrupting technologies’ very own initially utilitarian raison d’être. As the crucial breakthrough enabling the invention of writing (as a phonetic transcription of speech, not just as symbolic marks), Phoenicians invented the alphabet: a grapho-phonemic code, helping social memorization and communication as well as facilitating record keeping and, herewith, trade.
Yet, Plato‘s Socrates in his Phaedrus tells us a brief legend critically commenting on Egyptian god Theuth’s view of “the gift of writing as a remedy for the memory”, to which King Thamus (arguing about its influence on the individual as an external artifact) responds that: “its true effects are likely to be the opposite”, since “it is a remedy for reminding, not remembering”, “with the appearance but not the reality of wisdom”, “future generations will hear much without being properly taught, and will appear wise but not be so, making them difficult to get along with”. Moreover, literacy, was used as a means of control by the ruling classes throughout the ages and with the exception of its advancement in the Eastern Roman Empire, it had to wait for ten centuries after its fall to become a common practice. Initially, business and politicians wondered what telephones (direct one-to-one communication between people) would be good for; [*] after playing a crucial role enabling the domination of the Indian subcontinent by the British empirial masters, the telegraph was eventually phased out by telephones, which utility has been redefined by the Internet. The world-wide-web, initially designed as a way to conveniently address and share ideas among researchers, was turned into a vast spying network primarily by U.S. IT companies which served as proof of concept for NSA’s “sniff it all, collect it all, know it all, process it all, exploit it all, …” incantation.[*][*]. There are, however, U.S.-based companies such as twitter and the archive.org who have been opposed willingly collaborating with the illegal and unconstitutional demands by USG. Some other companies such a [lavabit][Qwest Comm] were shutdown by USG.
The societal and cultural import of technologies is not just technical, the ultimately determining aspect is how we conscientize and effectively make use of them. 11th-century Chinese alchemists invented it but it was Westerners the ones to whom gunpowder‘s most common use occurred and when Kant wrote his memorable critique of armamentism and wars, wars were local, more symmetrical and immediately very costly endeavors, not in times in which wars are “good for business” for very few individuals in control profiteering out of them and “soldiers” could “patriotically” indiscriminately kill scores of unsuspecting people from an air-conditioned room in the other side of the world as if they were playing computer games with a civilian casualty rate (as suggested by themselves) anywhere from 4 to 35 percent; yet, the ethical aspects of his critique is as valid as ever. Medieval Italian merchants wedge themselves as a social class within the status quo of the clergy and the royalty by advertising their goodwill through openness and accountable honesty. They would share their double entry books with merchants they would never meet living in remote places they would never visit[*]. During its abusive, all-encompassing reign for over ten centuries, The Catholic Church has been open and explicit (even carnavalesque) about their ways of social control and repression. They had no FISA courts, nor did they have such things as “secret interpretations of laws“. They instituted and made mandatory the Sacrament of Penance since they didn’t have IT companies doing their dirty Über-surveillance work for them and had the spine and mind power to heed their Index Librorum Prohibitorum to the chapter and paragraph against which authors had the opportunity to defend their writings, while many U.S. high ranking politicians publicly admitted that they didn’t even know what “N-S-A” stood for and New Zealand’s Prime Minister, John Key, manifestly showing the spineless stooges politicians have become nowadays, repeatedly assured his constituency that he was as sure of there being no mass surveillance undertaken by the GCSB or NSA bases in his country (a five eye member country) as he was of “the likelihood of there being Martians in New Zealand”, vowing to step down if that was the case; initially retracted his vow, to then admit he was wrong and, finally, years later, resign (matters about which, due to his very job, he shouldn’t have had to crack jokes, bargain or brag about to begin with).[*] [*][*][*]
[*]. However, after politicians learned what the “NSA stood for” (an institution they were supposed to oversee since it is being funded by tax payers’ monies) through leaks of whistleblowers, after an attempt to defund the NSA, they “democratically” chose to publicly legalize it and increase the degree and scope of their excesses.[*][*]
Our ubiquitous adoption of current communicating technologies has made possible the ongoing interception, recording, correlation and storing of vast amounts of diverse personal data and metadata in searchable, queryable and contextually Zeitgeistable repositories: from all telephone calls you have ever made (both metadata and voice data)[*], to the centimetric record of your whereabouts and people you have crossed your way with even if you don’t and will never know who they are[*], the people you associate with off- and online[*], all books you have read and music you have listened to in the order you did[*][*], your shopping and eating habits[*], your financial standing and all your financial transactions[*], all your medical records (including detail records of visits to medical doctor and therapists/psychologists)[*][*], your DNA[*], your facial expressions[*], your heartbeat[*] … “whatever physically tangible form of communication”![*]
George Orwell in his 1949 dystopian novel “1984” describes “telescreens” as devices invasively placed by governments in people’s own private living spaces to individually monitor their lives, describing the self-censoring, chilling effect of such devices:
“There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You have to live — did live, from habit that became instinct — in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized”. [*]
The 4th Amendment of the U.S. constitution (introduced in the U.S. in Congress in 1789), from a civic point of view, basic social contract precepts, postulates that:
“The right of the people to be secure in their persons, houses, papers, and effects,[*] against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”[*]
What neither “The Founding Fathers”, nor George Orwell could have possibly foreseen was a future in which technology would make the gathering, categorizing and transferring of all tangible pieces of information of all individuals in a society seamless and almost costless for governments,
a future in which “We the people” would not only willingly enter our own “private” information and classify it for merchants and police to prey on, but would allow for chips to be implanted in our bodies for a mere club-membership[Club in Rotterdam] when the idea that the government would interfere in people’s personal affairs would have been considered scandalous less than a generation ago[Chosmky]; a future in which the very notion of privacy when it comes to “people’s ‘houses’, ‘papers’ and ‘effects'” would be totally meaningless. Policing government agencies have been corrupting and repurposing commercial technologies[*][*] and using military-grade devices to see through walls without any awareness of the people inside[*], monitor people’s movements and radiate specific parts of their bodies while inside their own homes even while in pitch dark rooms[*], using DEWs as part of their so-called “no-touch” torture[*]. Handwritten and printed paper ceased to be the primary medium from which information is read more than a generation ago. People nowadays are willing to pay more than 10 times as much money for an easily traceable, hackable electronic version of their books. Nor could they have envisioned that people would be happily and willingly paying for their own portable and in-house two-way “telescreens” through which they would be tacitly relinquishing all functional illusions about their own privacy, nor that people would abysmally, whole heartedly embrace the so-called Internet of Things[*]. In addition to people’s tacit participation in their own surveillance, electromagnetic storage space has become so cheap that it doesn’t make sense to delete any kind of data about all citizens of a nation anymore and the hardware enabling such technologies is being sold in the market place as if they were dishwashers [*][*]. In fact, with the degree of control they have on over all aspects of every individual in society nowadays, there is no need to institutionalize people in places such as that notorious Ravencrag mansion (owned by McGill University) in order to conduct and monitor torturing non-consensual experiments on them, use inmates or groups of unsuspecting people in relatively isolated places.. They now have society at large at their disposal and use TIs as “subjects in their natural social environment”, as their guinea pigs.
The “all-seeing” Argus Panoptes is a many-eyed giant serving as “big brother” sort of watchman in Greek mythology by whom we are always “watched”, “followed”, “trailed” in a relentlessly scrutinizing way to an invasive, distressing degree. Similar allusions to all-seeing, omnipresent social control devices can be found in moralizing memes[*][*] serving the controlling purpose of the powers that be in other cultures. Since times immemorial, people have also wondered about their rulers and watchers. [*]. As a way to economize on “watchers” in prisons/society at large and, most importantly, make inmates/people ultimately watch and control themselves, Jeremy Bentham conceptualized the architectural design of the Panopticon: a type of prison exploiting perspective in such ways that all inmates could be seen at all times from a few points, which was actually implemented to its very specifications in the late 1920s and was used to incarcerate German and Japanese prisoners of wars during WWII: “El Presidio Modelo” (The Model Prison), in the Isles of Pines in Cuba, a U.S. neighboring country always considered part of their “immediate spheres of influence” as part of the Monroe doctrine.
However, even though a revolutionary writer chronicling his 105-day experience[*]
didn’t find absolutely anything worth “modeling” in such a prison[*],
after unsuccessfully trying to fight corruption, political violence and U.S. tacit occupation from a legal point of view after Cubans had fought off Spanish rule and the on the radio suicide of his political idol,
a patriot with a petit burgeois upbringing, notorious inmate Fidel Castro, who was included in the Guinness Book of Records as the person holding the longest UN speech (surely not saying anything nice about USG), who saw a total of 11 U.S. presidents come and go during his and his brother’s dictatorial rule and who survived 634 assassination attempts mainly masterminded by the CIA [*][*][*]; actually considered it “la prisión fecunda” (“the fruitful prison”) where he had his two-year sabbatical to ponder about his revolutionary strategies to then; initially, with widespread popular support, topple U.S. trained and backed bloody dictator Fulgencio Batista. Castro’s is not just a case of a very rare individual under catalyzing circumstances, ethnologists studying the consciousness of ravens have been frustrated by the fact that ravens seemed to have been able to figure out that there was something fishy with the general scheme of things, and did not play “their roles” conducing to the “logical conclusions” experimenters wanted to arrive at, which put into question who was experimenting with whom[*].
After the findings and rulings of the Church Committee, the social control programs ran by USG just became less public and more contractual to third parties, evolving and morphing into our current ubiquitous and pervasive technological dependency, ultimately enabling todays Über-surveillance[*][*], which make dystopia and movies from a earlier eras as: “1984” and The Front, feel silly, nostalgic, even idyllic. When politicians and the media entertain “We the people” talking about, say, “the NSA being just about ‘metadata'”, telling you that “no one is listening to your phone calls” with a well-trained straight face[*]. They are covering the fact that the NSA has been conducting warrantless mass surveillance to their own people since before Snowden was even born. That it has been just a matter of how enabling towards Über-surveillance technologies have been at a certain time.
Constant all encompassing surveillance is not “‘just’ surveillance”, the mere act of surveilling whole societies is wrong on many counts “regardless of how they use that information”.[*][*] It unavoidably is the defining aspect for any form of government to tacitly become a police state. As a matter of course, government agencies can’t help but get “smart” about all that data. During their persecution by Nazis, Jewish people had a harsher time the more detailed were the records that had been kept about them. After Nazis invaded Hungary (just a few SS troops) a massive and thorough campaign of expropriations of businesses, stealing and persecution started against them. It was actually Hungarian citizens the ones who had kept the detailed records that made possible and predisposed such plans. Vocal social activist Sandra Bland was found dead while in police custody for a traffic violation which shouldn’t have ever ended as a detention.
As part of the ongoing Church Committee investigations in 1977 in relation to Project MK-Ultra a misplaced stash of documents was found that survived the 1973 internal destruction orders by Richard Helms (for which he was not prosecuted), about which US Senator Ted Kennedy said:
“The Deputy Director of the CIA revealed that over thirty universities and institutions were involved in an ‘extensive testing and experimentation’ program which included covert drug tests on unwitting citizens ‘at all social levels, high and low, native Americans and foreign.’ Several of these tests involved the administration of LSD to ‘unwitting subjects in social situations’.”
Yes, those “aware” hippie characters in the U.S. of the 1960s and 1970s were hoodwinked into LSD addiction by the government and not a single one of those “prestigious” universities and research centers, has come clear about it as a symbolic conscious statement to humanity, morality.
The NSA, HGCHQ and their partners, as well as Microsoft, Oracle, google and facebook and many other IT companies, and those producing DEWs and other military grade equipment trained on civilians are criticized for aiding and abetting the government in the maintenance of the police state, but the participation of academia not only by preparing armies of acolytes providing most needed “expert knowledge”, but also helping the government create and improve technologies enabling crimes against humanity and entertain ideas about an “AI-controlled world” is seldom questioned and receives very little attention.
No, they absolutely can’t! Many TIs believe that to be possible, suspecting the use of classified, secret technologies; but no one has factually come forward with anything resembling a proof of “Remote Neural Monitoring” (RNM) or any paranormal phenomena for that matter. In fact, the ~*Randi Prize*~ was instituted awarding ~**~ to anyone proving any kind of paranormal phenomena and it has gone unclaimed ever since.
Galvani’s discovery of the electrical reactivity of the deafferented legs of frogs; Penfield probing of the brains of his surgical patients[*] and José Delgado’s bull experiments[*] (which got him hired by the CIA) culminating with offensively dehumanizing titled book[*] have been very misleadingly interpreted by our highly suggestive minds as implying that our brains are like a book which opened to a certain page and paragraph you can “read”, “write to”, or “its pages can be ripped off”; consequently, “your own self could be corrupted” and “your body’s motor and mental functions can be remotely ‘hijacked’ as well, as it is done to cars and all kinds computerized equipment”.[*][*][*]. Yet, Penfield never claimed to have been able to tell the lyrics of the songs his patients listened to, as certain areas of their brains were being mildly exited. Were they listening to Cold Plays “Clocks” or “super cali fragilistic expialidocious“?; and, most importantly, no Neurobiologist has ever claimed to be able to have access in any way to an individual’s own qualia. Yes, anyone could read, say, al-Qur’an or the Bible, but, if you don’t cover your device’s internal cam, at the most, they would be able to notice what section is causing more reflection on your part by monitoring the dilation of your iris, your heart beat and gestures you may make; they may attempt to more accurately eyetrack your reading; but how do you feel about the specific section in it and what does it all mean to you given the circumstances you are living through? In fact, the fringe consciousness experiences of expert practitioners of what are believed to be eminently “abstract” science such as “pure” Mathematics and Logic vary wildly with no apparent rhyme or reason whatsoever among subject matter experts. Bashingly atheist ~*Hardy*~ would get exasperating qualms when his colleague Ramanujan would say to him that “he listened to the voice of God while doing Math”.[Haddamard] However, apparently well-informed and technically savvy author and researcher Robert Duncan suggests that to be possible[*][*][*]. Some even talk about what they call “trans-cranial stimulation” and google shamelessly advertises new, “cool” technologies being able to type for users by “reading their mind”[*][*], which is factually impossible due the fact that the close-range, very low powered reactions in the synaptic clefts of our nervous system are electro-chemical in nature, not biologically encoded after some sort of protocol in any way.[*][*][*]. They may as well pull your arm with a rope instead of using DEWs in order to make it jerk as they do to deafferent legs of frogs, but that doesn’t mean at all that they will be able to hijack your brain and make you play the piano like Egberto Gismonti; besides, experiments have shown that, unless they have a pathological syndrome called “split brain“, people are 100% aware of movements of their own body limbs not being endogenous.[*] In fact, such a notorious MK-Ultra enthusiast as Richard Helms wasn’t happy at all about the results of mind-control experiments.[*]. Nonetheless, as part of their abusive mind control games, after depriving their victims of all forms of privacy, perpetrators are able to psychologically warp individuals to an extent that at times some of them have whole heartedly believed that their minds have been hijacked. Some of those individuals in desperation after years of relentless abuse have committed suicide[*] and/or gone into homicidal rampages.[*][*][*][*]
USG is one of the largest employers of psychology graduates. After meetings in Canada, APA broke ranks with the CIA promising to revoke the professional licenses of psychology graduates aiding the government in the torture, persecution and psychological harassment of other human beings. Furthermore, they have decided to abide by the roster of international law such as the Geneva convention and the treaty against torture. Some of those psychology graduates even boast about their actions and maintain their profitable business “offering their expertise”.[*]. However, not a single case is known of any of them whose practicing license has been revoked, yet. Under current U.S. laws, for an act to constitute “torture”, all the following five qualifiers must apply:
cause severe physical or mental pain or suffering;
be intentionally inflicted;
be inflicted for a proscribed purpose;
be inflicted by (or at the instigation of, with the consent or acquiescence of) a public official who has custody of the victim; and
not arise from lawful sanctions.
Since perps have their own ways to corrupt language and “their interpretations are secret”, regarding §1, they may reserve to themselves the determination of what may be painful to you and preposterously argue (again, in secrecy) about §5 that “what they do to you is not torture because you are not in custody”, or about §3 that “Oh, we are just playing with you”, or about §2 “it is actually you harming yourself for not collaborating with us”. They just turn your own home into a dungeon, have ways to torture you through the walls. “Ego depletion” kinds of experiments with animals have shown the disorienting and disturbing effect on will power, self-control and self-discipline; to the point of making animals constrain themselves to a corner of their cages and commit suicide by inanition if constantly harassed. Well researched and documented reports on human experimentation by Nazi “scientists” whose expertise was sought for by Western allies and by the stasi show the long lasting diseases and irreversible unhealthy conditions and mental imbalances they cause to their victims.[*] Some of the most common methods they use are:
gaslighting: is a form of harassment directed to one’s perception of one’s own personal environment (your home, workplace, car) in which perps alter it in order to sow seeds of doubt in targeted individuals in order to make them question their own memory, senses and sanity. Perps act in ways that would sound “crazy” if you tell other people, leaving obvious evidence of agency as if they know TIs thoughts and feelings:
- “iterations“: messing with a series of objects and/or aspects of your functional life (in your office or home they start moving aside, misplacing or taking away objects belonging to a setting) which may be performed in a thematic fashion (the light bulbs in different rooms sequentially go kaput even after you change them repeatedly; or, people constantly telling you your stuff is theirs: you walk out of a grocery store and someone comes up to you and tells you “what are you doing with my shopping bag?”, or you are ready to drive off when someone shows up telling you “what are you doing in my car? I am calling the police right now”, people paying you a visit show to you fake papers claiming “this is their home”) …; and,
- “mind raping“: messing with minor, fringe aspects of your life; say, you would take a ginger candy they keep in baskets for everyone to take as you use an ATM in your bank. You will notice that the basket has been emptied right before you arrive; in order to check if this is a coincidence you will test your conjecture and once you are about to come to the conclusion that if that be the case it is an incredibly unprobabilistically
consistent one, you realize that they have started to make bank staff stand eating candies in way too demonstrative ways as you arrive and you find the basket empty again;
you would repeatedly find empty shelves at a store while looking for products you need (and only those) and when you ask they would tell you they don’t know; or, say,
you keep attach to your dog’s leash a token you emotionally associate with someone you hold dear in your heart; when that item disappears from the leash, you find it very strange but, even though you can factually check those not to be the cases, as a “logical closure” you force into your mind the belief that probably one of the kids in the family is pranking you or something; then, you notice that the leash itself disappears … and, yes, they may mess with your dog as well, in a contextual fashion.
break ins in which nothing is stolen and messing with particular objects you care about.
Editing or removing a file you are working on for an important project; or rip, stain or change a piece of clothing you are about to wear for an important occasion, take away and in some occasion bring back later personal items or just take one of a pair. Perps do
They do this in order to encroach, put a foot in your mind, “own”, drive you to their bidding, by messing with functional environment, keeping you guessing about what will come next, making the impression on you they would do anything to you. Perps do that as part of their “operational Psychology” training.unlike the abusive playfulness of gaslighting, as defined in the stasi’s
„Wörterbuch der politisch-operativen Arbeit“
(“Dictionary of political-operative work”)[*], the aim of Zersetzung is actually harming and directly messing with TIs in personal ways and with an intensity that they can’t carelessly dismiss it as nonsense.
Everyone has their own phobias, dislikes, safety zone boundaries and illusions about their own “private/secret” matters, which disruptions make them very anxious, as Orwell’s called them: “one’s own rats” or as the Mossad put it while explaining how they find their targets, knowing well they are exposing themselves: “everybody’s got a soft spot in their hearts“. Those become perps’ currency into their victims psychological and spiritual underpinning, used to break them. They keep a keen eye on other aspects of their lives victims will try to hold on to in order to keep relentlessly tormenting them.
Their ultimate goal is permanent damage to their victims; bankrupting their existence, driving them into homelessness, institutionalizing them, reducing them to inactivity.
Perps actively seek to destroy your financial standing, biological well-being and mental stability/health; by messing with your work, poisoning your food and lacing it with psycho-pharmaceutical drugs (which may also be done as part of a research program for those companies), sleep depriving you, harassing your family to a point that they will get angry with you. Some family members have gone as far as writing TIs off their grandparents’ will and give them little cash “in order to protect them”, “since they are mentally unstable”. Perps steal your personal belongings from your office and home (even when you are inside) and constantly smash your car’s windows or make your car misfunction. They also target your social and business relationships as a way to make them stay away from you. Some TIs lock themselves up and sever contact with their relatives and friends. They are abused to an extent, that some may commit suicide wholeheartedly believing their actions to be a way to assert their own self. “gang stalkers” are groups of perps coordinated through their communicating devices by policing agencies and “fusion centers” to field (waiting at certain places at the moment you arrive, leave, or pass by) and follow you around either by following behind you, shadowing, or walking in front of you within an ear shot if you are in a crowded area. They may also ride bikes, use helicopters and/or drones and, at times, be verbally offensive or physically threatening to you by encroaching into your personal space for no apparent reason or even make physical contact with you either directly or stealthily by using DEWs. There may be laws in the books against stalking in your constituency. Those individuals must sign “confidentiality agreements” making themselves directly liable for “breaking the law” and disassociating their actions from government agencies commanding and remunerating them.[*] In the U.S. snitches, gang stalkers and perps are very common specially at airports, medical facilities and universities. Gang stalkers may perform skits in which they frame messages relating to private and/or embarrassing incidents that may have happened or will happen to you soon. You may notice, say, inordinate numbers of individuals or groups of people scratching in front of you too often and in way too demonstrative ways. They exaggerate greatly their actions in order to call one’s attention, because as consciousness experiments show, we tend to unconsciously disregard all kinds of happenings around us we are not actively paying attention to.[whodoneit] [“invisible gorilla“]
They tend to repeat their skits as part of framing the same messages: after noticing people scratching everywhere, you will be awakened at night by bed bug bites and after you thoroughly clean your bedroom, the cycle will start all over again. “Julias” and “Romeos” are individuals they send your way after they have psychologically primed you with emotional distress, in order to make their harassment more one-on-one, to gain more control of you.
Unbeknown to actor Stephen Shellen, he started emotionally relating to and had children with the “Julia” they framed him with, who later admitted to him to having been a prostitute who had been coupled up with him. Neither the local police nor the children aid society offered any help to him. Social justice activist and stasi victim
Markus Meckel related how, even though his wife knew all too well their tricks, the stasi would mess with their relationship by sending postcards from “Julias” with supposedly sexually compromising messages [Doku ZDF History – Operation Zersetzung Der geheime Terror der Stasi (HD)_IzTb6f893XM&t=49m35s] Some “Julias” and “Romeos”, unable to sustain the level of psychopathy, end up spousing their victims, coming clear out of their schemes and turning against perps/the government[tZd9oMtLKOE (27:00) * Phillip Kerh? His girlfriend testified in his favor ][Shellen]. mapping: is the thorough 24×7 monitoring of your whereabouts and all your actions and interactions as you go about the routines of your daily life, including your behavioral postures and gait, in predictable ways using your own communicating devices’ cameras, speakers and GPS, as well as sensors either disguised in your own home, implanted in the walls of your or your neighbors’ and those outside your home and on the streets. Either in- or outdoors, they know if you are taking a shower, watching TV, having sex (and how you enjoy it) with your love partner or cheating, masturbating, or if you stand or sit while taking care of your physiological needs. They also let you know! Each time you open your refrigerator or walk into the bathroom, they would make the fire alarms in the stairways of your building beep and if something is a bit off their patterns, the fire alarms will beep non-stop until you walk away. They would not only monitor all your phone calls real time, but also all the telephone numbers of the individuals you call (in case, you use another phone) and they know who they are and what relationship they have with you. To perps, mapping is the most crucial aspect of their harassment and torturous experimentation since they need to make sure they are not caught while they go about their business and because it is the prerequisite for jailing. Perps also need to monitor their victims’ response to their kind of Pavlovian conditioning as researchers monitor their guinea pigs. Messing with their capabilities to map you, therefore turning yourself into less worthwhile guinea pig, is an easy way to protect yourself as a TI. Out of their victims’ mapping they create some sort of AI Doublegänger of theirs which bones and blood are a graph theoretic description of their behavior, weighted à la Bayesian networks, which they can’t help but project into their own wishful artifacts. Hoover himself chose as their personal pet targets Charles Chaplin, Bobby Fischer‘s mother and Bobby himself since he was a teenager. Even though they couldn’t even tell for sure who his father was, they tormented him to the verge of madness thinking he “might be” or “might become” a spy. They never stopped harassing him even after they themselves admitted “they could be wrong”. jailing: is the man-in-the-middle functional-isolation technique
they use to contextually surround you with a compromised reality actionably choreographed by them, for which they must first thoroughly map you. They turn into fax tones the voice of people talking back to you real time while you are heard just fine on the other end. They hack your phones and routers in order to disable outgoing 911 calls, inject their own altered messages, redirect Web requests, alter the content on web pages and results from online searches and/or corrupt the audio of a video you are watching online. Jailing could be contextual and specific. If, as a way to explain such matters to abused people, you send them a link to the device as advertised by the company producing those DEWs (in that case Applied Energetics), when the people you send the link do click on it, their request is forwarded to an amazon page selling sex toys.
Perps isolate, gasslight and put their victims under Zersetzung in an articulate, multiprompt way in order to make their victims waste time spend their effort. It seems to be a minor thing over which victims are getting all worked up if looked at as a single incident from a single perspective, but for things happen as part of many other coordinating aspects. You may have spent time in an application for your family’s dream home while at the very last minute you find out that it was sold to someone else. You spent months working on your own research to realize half way through that it has been tampered with.
Individualized targeted persecution is a vast and complex issue encompassing many aspects pertaining from political abuses; unwarranted, crassly sadistic excesses by policing agencies; legal encumbrances and the professional, ethical aspects surrounding non-consensual experimentation; to societal awareness, and our individual and collective social health, morality and humanity, even if you are not a TI. Since our minds are not trained for that kind of extra stress, especially during the starting phases of their targeting many TIs feel emotionally overwhelmed and mentally, physically exhausted worrying about questions which may accompany them for the rest of their lives: why me?, who is doing this?, how will I be able to cope with such issues and go on with my life, continue my career?, … At the very least, learning the scope and dimensions of such questions will help TIs manage and possibly even be successful in their lives, as have been the cases of Charles Chaplin and Bobby Fischer.
Transcending their times and circumstances through deeply introspective cogitations about the human condition, historians, writers and artists, from one of the first histories by
Herodotus (fifth century BC) and
Juvenal (late 1st and early 2nd century AD) wondering about ipsos custodes (the watchers themselves), to George Orwell‘s 1984 and Hannah Arendt‘s “Banality of Evil“, have documented and warned society through literature, films, songs, Anthropologies and even cartoons about political excesses and abuses. Some of the most insightful and popular have been:
by George Orwell:
“Animal Farm” (1945) (1949) and “1984” “We” by Yevgeny Zamyatin’s novel which was Orwell’s “1984”‘s and Aldous Huxley “A Brave New World” inspirational drive[Orwell maintained] “Survival In Auschwitz” (1947, Italian: “Se questo è un uomo”: “if this is man/humanity”): Seeing through and past Nazi horror at its worst Primo Levi leaves his autobiographical account about how easily breakable “the human condition” is “The Rape Of The Mind: The Psychology Of Thought Control, Menticide And Brainwashing”, by Joost Meerloo: 320 pages, ISBN-10: 1614277877; concludes by saying: “The modern techniques of brainwashing and menticide—those perversions of psychology—can bring almost any man into submission and surrender”.
Gas light: based on the 1938 play by Patrick Hamilton has been dramatized as film twice (1940) and (1944)
The lives of others (German: Das Leben der Anderen) about living under stasi ruled East Germany.
The most dangerous man in America: 2009 film about Daniel Ellsberg and the Pentagon Papers
The Front: 1976 comedy-drama film set against the Hollywood blacklist in the 1950s during the McCarthy era.
The Gatekeepers: excellent, in-depth and to the point documentary about Shin Bet
Miko Peled: An honest Israeli Jew tells the Real Truth about Israel
The Century of the Self: 2002 British television documentary series about how those in power use psychology techniques to control the masses
The age of psychiatry
Shock the Monkey: Poetic music video of 1982 song by English rock musician Peter Gabriel interpreted as a reference to the famous social experiments described in Stanley Milgram’s book “Obedience to Authority“[*][*][*]
A capella version of proposed NSA anthem: EVERY BREATH YOU TAKE por Vocal SAMPLING
List of well-known target individuals
Mind control | Gaslighting | Microwave_auditory_effect | Psychological torture | Milgram Experiment | Rosenhan Experiment | UN Convention against Torture | American Psychologists Association | American Psychiactrists Association
MK-Ultra | Informed consent | Declaration of Geneva | Declaration of Helsinki | Unethical human experimentation in the U.S. | Tuskegee Syphilis Experiment | Nazi human experimentation | Executive Order 13139
Zersetzung | Operational Psychology | JTRIG | Stasi | Operation Paperclip
COINTELPRO | Red squad | The COINTELPRO Papers | COINTELPRO targets | PROFUNC
Surveillance abuse | Mass_surveillance_in_the_United_States | NSA | PRISM_(surveillance_program) | Total_Information_Awareness | Panopticon | Internet of Things
The Engineering of Consent | Operation Mockingbird | The Pentagon Papers
Police state | Police brutality | Fusion_center
TED talk: Hubertus Knabe: The dark secrets of a surveillance state
theintercept.com/2016/Apr/28: Study shows mass-surveillance breeds meekness, fear and self-censorship
theguardian.com (2015/Jul/23): Jeremy Bentham’s Panopticon, digital surveillance
worldchanging.com: Cascio, Jamais (2005): The Rise of the Participatory Panopticon
chris-kimble.com: Control and Surveillance from Computers in Society
surveillance-and-society.org: The Panopticon. Surveillance and Society (special issue)
TED talk: Julian Assange: Why the world needs WikiLeaks
TED talk: James Lyne everyday cybercrime and what you can do about it (However they targeted Aaron Shwarz)
TED talk: Catherine Crump: The small and surprisingly dangerous detail the police track about you: 3m50s: The NYPD is not trying to “figure out is attending mosques services”, what they are doing is checking out of those who attend who are the ones who either don’t have cell phones or keep them in Faraday cages, so they couldn’t be traced. Those individuals who don’t willingly participate in and pay for their own monitoring, will get more attention, excrutiny and harassment.
aljazeera.com (2017/Apr): Spy Merchants: What is electronic surveillance?
Al Jazeera English (video): Why is Egypt’s Christian minority targeted?