â Richard Nixon in a 1977 interview with David Frost, Attitudes of Government Officials About the Law. Those lies can be tailored to fit the particular person or groups of persons being recruited to participate in the harassment. featured an interview with Gary Ruskin, director of the Center for Corporate Policy, in which he discussed the shadowy industry of spies employed by major U.S. corporations to conduct secret â and often illegal â counterintelligence operations against critics of those corporations. That was important given that the GDR was trying to improve its international standing during the 1970s and 80s. Although the article does not link the reports of such organized harassment to a larger phenomenon, that form of abuse is a common element of victim accounts in organized stalking cases. For example, if there is no legal basis for arresting and prosecuting someone, and assassination is not a legal or practical option, an alternative is a long-term campaign of intense surveillance and harassment. Whatever particular operational structure(s) support COINTELPRO-type stalking in the U.S., it would unavoidably involve at least the passive approval of the U.S. Department of Justice (DOJ), the Federal Bureau of Investigations (FBI), and the Department of Homeland Security (DHS). At whatever point at which it becomes useful or necessary, the perpetrators can â officially or unofficially â turn over to the government counterintelligence personnel whatever they have gathered to have the individual targeted more formally. This is true to some extent in all agencies since they issue and enforce regulations, but the potential to be corrupted by power is infinitely greater in law enforcement and intelligence agencies such as the FBI, the CIA, and the NSA â which operate mostly in secrecy. An excerpt from a Washington Post article published on January 14, 2007:  An academic paper written for the Air Force in the mid-1990s mentions the idea of a weapon that would use sound waves to send words into a person’s head. For example, job ads posted by security-intelligence contractors for âsurveillance role playersâ (domestic spies) all require an active security clearance in addition to counterintelligence training. Anyone even superficially familiar with counterintelligence will recognize this tactic; it is called disinformation. Equally clear is that the U.S. justice system aggressively polices and prosecutes its citizens: the U.S. has one of the very highest per capita incarceration rates in the world. the assassinations of black political organizers Fred Hampton and Mark Clark, to spy on the cell phone records of a whistle-blower, An Associated Press poll published in November 2013, reported on one political activist targeted in Chicago in 1970, the FBI had an 86-page file on Mike Royko, Author Douglas Valentine perfectly described. The ends always justify the means. It may be useful to provide a disruptive condition to a person not aware of the technology. The protagonist in Kafkaâs novel âThe Trialâ was arrested by agents from an unidentified agency and tried without being told the nature of the charges against him. Itâs the branch that is not mentioned anywhere in the U.S. Constitution, and itâs the branch that has the least respect for the rules established in that document. All text content is available under the Open Government Licence v3.0, except where otherwise stated. It has not been reported, for example, whether some of the shooting victims had been intensely harassing (âmobbingâ) the shooter â as was done to the plaintiff in the federal gang stalking case filed in December 2013. The most famous example of Red Squad-type activity was in Chicago in 1886 when police officers and private security agents working for the Pinkerton Detective Agency used spying and violence to suppress a labor rights movement. American high school and college students would be well-served by a deeper study of government conspiracies such as the Teapot Dome scandal, Operation Mockingbird, Operation Northwoods, the Pentagon Papers, Watergate, and Iran-Contra. Sometimes slander in a counterintelligence operation can be much more aggressive. If operations such as that one were not proven by the documents obtained by hackers, many people would dismiss allegations of such activities as tin-foil hat conspiracy theories. On the 41st anniversary of the Haymarket affair â in 1927 â a streetcar driver apparently crashed into the monument intentionally. The U.S. Senateâs Church Committee investigations in the 1970s said this in its conclusions about the NSAâs activities: â…the deliberate targeting of American citizens and the associated incidental interception of their communications demonstrates the need for a legislative charter that will define, limit, and control the signals intelligence activities of the National Security Agency.â (Church Committee Final Report â Book 3, page 764). An August 2014 article by Glenn Greenwald helpfully deconstructed a piece of dishonest reporting by Temple-Raston about NSA whistle-blower Edward Snowden. Although they were familiar with espionage, Americaâs founders certainly could never have envisioned the vast network of rogue U.S. intelligence agencies and corporate intelligence-security contractors who now spy on Americans using advanced technology. Victims should not assume that perpetrators are above doing physical harm to their pets either; I know this both from personal experience and from accounts by a few individuals I have reasons to regard as very credible. German also states that the FBI is now more powerful than at any time since the Cointelpro era. Corrupt members of U.S. intelligence agencies, law enforcement agencies, and their security contractor associates are not motivated by concerns about public safety or national security â let alone respect for the law. Such participants in the stalking of course would not be told anything about who they are ultimately working for; in some cases perhaps they are simply paid a small sum of cash by a person who approached them on the street to perform a single act of harassment. A perfect example of contractors with secret clearances performing dirty work for the federal government was a June 2014 report by Pulitzer Prize-winning New York Times journalist James Risen. Yet the existence of the LEIU and the nature of its activities remained â and still remains â mostly below the radar of the press and the American public. This passage from Andrew Goliszekâs book In the Name of Science (2003) gives a sense of what was involved in MKUltra. From my perspective, another indication of the international scope of gang stalking is the Internet traffic and emails to this website from countries all over the world. These boats, which can reach speeds of 50 knots, are used to transport SCO19 teams along the Thames River network. In the wake of Snowdenâs revelations that the NSA was spying on Americans in violation of the Fourth Amendment, various apologists for the U.S. intelligence community asserted that the revelations had damaged U.S. national security. When he reported that to his supervisors, his accusations were ignored, and his career was effectively frozen. According to some published mainstream news reports, individuals are sometimes targeted for gang stalking because they are suspected of involvement â or potential future involvement â in terrorism or crime, but are not implicated by any legal evidence. A few days later, Wired magazine posted an article which also examined the gang stalking aspects of the navy yard shooting. Based on my own observations, analysis, speculation, and various material Iâve read (which is included or linked in this website), these people are presumably employed by various intelligence contractors who are ultimately overseen by federal law enforcement and/or intelligence agency personnel. (on KION â Channel 46 and KCBA â Channel 35) featured a report about, Distorting data to influence government policy and public perception, FBI political intelligence for the White House, Violent and illegal activities of informants, Attorneys general failure to limit and control FBI intelligence activities, Efforts to promote enmity and factionalism within groups or between groups, Efforts to prevent speaking/teaching/writing and publishing, Disseminating derogatory information to family, friends, and associates, Blurred distinction between counterintelligence and investigation, Red Squads â also called Law Enforcement Intelligence Units (LEIUs), Investigation, surveillance, and harassment,  âSurveillance equals power. Some of Naylorâs comments in an interview on National Public Radio, January 23, 2006: âI think I just ran into the wrong people at the wrong time, and like the book shows, what starts from a very innocent dispute with a neighbor cascades and cascades and cascades into a whole production.â, â…these cars began to surveil me. In a speech Chomsky gave in Bonn, Germany on June 17, 2013, he explained that the standard view of capitalist democracy taught to American schoolchildren is essentially fictional. Businessman Philip Kerr is seeking to win a High Court injunction against the intelligence agents, who he says have targeted him because he refused to co-operate with the security service. For one thing, it makes it hard for the individual to pose a threat to the client of the gang stalkers â whether that is a corporation or a government. Another factor which helps explain the relatively low-profile of organized stalking in the news media is a failure to recognize a common thread between various related news reports. Disinformation is used to mitigate the effects of that exposure. A TV and radio broadcast of Democracy Now! Prior to the shooting, the self-proclaimed âtargeted individual,â Myron May, left a voice message for an acquaintance in which he said âI do not want to die in vain.â He also made other phone calls â and sent emails and text messages â about what was being done to him. You will only hear it if your ears are inline with the sound column â or if the signals is bounced off a hard surface. A Forbes magazine writer â to cite just one example â has suggested that we probably need another Church Committee investigation. From interviews conducted after the project ended, it is apparent that certain students had found the experience searing.âÂ, âWhen, soon after, Kaczynski began to worry about the possibility of mind control, he was not giving vent to paranoid delusions. As with the CIA, one can only speculate about the NSAâs possible involvement with organized stalking, but there are reasons to suspect that the agency is not entirely innocent. Although the NSA â unlike the CIA â specializes in signals intelligence rather than operations, revelations in 2013 by NSA whistle-blower Edward Snowden showed that the NSA is aggressively involved in spying on its own citizens â and lying about it. Oversight of domestic covert operations is minimal. As mentioned in the section above on selection of targeted individuals, a Threat Assessment Team (TAT) is a small group of designated staff members in an organization (public or private) which attempts to assess whether certain individuals in the organization pose a threat. Here is a fascinating web page by that group which summarizes the disinformation schemes organized by the intelligence-security contractors. CIA Director John Brennan denied that his agency was spying on the U.S. Senate while it was investigating the agencyâs use of torture, and then the agencyâs inspector general revealed that the spying did in fact happen. Most of the employment announcements I have seen for SRPs state that one element of the job is training others. Retired FBI official from the COINTELPRO era on âgang stalkingâ. Of course, the most well-known and well-documented crimes by the FBI occurred during the COINTELPRO era, and I devote an entire section to that later in this overview. Obama said that Clapper âshould have been more careful about how he responded.â. A May 2015 column by journalist Tom Engelhardt examined some recurring patterns of deception, hubris, violence, and incompetence in the U.S. national security state. It would be impossible for the feds to be unaware of widespread use of organized stalking by local police â and vice versa. I encourage such efforts, but I would caution targeted individuals to be realistic. One of the proposals was to create and plant fake documents to discredit Wikileaks. COINTELPRO (short for âCounterintelligence Programâ) was a secret, illegal program run by the FBI from 1956 until it was exposed by civilian activists in 1971. One example of gang stalking âstreet theaterâ is to cut-off the victim â when he or she is walking, driving, or riding a bicycle. The more you know about, , David Cunningham and Barb Browning at Brandeis University analyzed the selection of individuals targeted by the FBIâs original COINTELPRO operations. The claim that America faces a constant indefinite threat of terrorism has created political cover for seemingly unlimited money and secrecy and power for the agencies and private firms involved. People familiar with corruption in the U.S. government have deep suspicions about the kinds of crimes being perpetrated by agencies such as the FBI and the CIA. Other facts about the incident also drew suspicion.                       â Glenn Greenwald. Also, the âcode of silenceâ which prevails among corrupt law enforcement agents has deep roots. According to her blogs and Twitter messages, Ms. Williams has been stalked and intensely harassed by the FBI â to the point that she eventually felt compelled to leave the U.S. Another tactic â also used during Cointelpro against various targeted individuals â was slander. A September 2010 article in USA Today reported on the effectiveness of a law enacted by Congress in 1997 intended to curb illegal conduct by prosecutors, such as lying and deliberately concealing evidence: â…USA TODAY documented 201 criminal cases in the years that followed in which judges determined that Justice Department prosecutors â the nation’s most elite and powerful law enforcement officials â themselves violated laws or ethics rules. Alexisâs medical record â like the other facts of the case â  are consistent with his account of having been intensely harassed. Here is Hedges, in a 2015 article at truthdig: â¦Wolin lays bare the realities of our bankrupt democracy, the causes behind the decline of American empire and the rise of a new and terrifying configuration of corporate power he calls âinverted totalitarianism.â. The cops in Stockton were apparently familiar with psyops tactics, and they were used to getting away with such behavior. Whistle-blowers are rare among the people who staff the giant pig trough that is Americaâs shadowy, bloated, post-9/11 security infrastructure. also covered by The Clash (1977). An early example of a Threat Assessment Team: peasants But, when we are confronted with evidence of a systematic attempt to undermine the very political system itself, we recoil in a general failure of imagination and nerve…. Another function of gang stalking is to exact revenge against the victim. Clearly these jobs are for some type of domestic spying (there are no foreign language requirements, for example). For one thing, a pilot program to have firefighters gather and share security intelligence was launched by the U.S. Department of Homeland Security (DHS) in 2006. You should consider what changes are needed to your existing policies and procedures, and how using surveillance technology will help you to achieve your objectives. The Congressional report cited therein by John Kelly (whose book Tainting Evidence: Inside the Scandals at the FBI Crime Lab was nominated for a Pulitzer Prize) states that âseveral hundred times every dayâ officers of the Clandestine Service (CS) of the CIA âengage in highly illegal activities.â. Apparently, Garcia shot Kozak âfollowing a discussion about Garciaâs job performance.â Another agent, Perry Woo, then rushed into the room and fatally shot Garcia. In Aschâs experiments, students were asked to participate â along with others â in what was ostensibly a âvision test.â Actually, the other participants were accomplices of the experimenter, and the study sought to find how the unsuspecting students would be influenced by the behavior of the others.
Saddleback Church Light Of The World 2020, Irish Horse Dealers Uk, Ww110 Cherokee Amazon, Holy Name Cathedral Christmas Mass, Volunteer On Christmas Day 2020, Immigration And Customs Enforcement Headquarters Address, Allied Chemistry By Veeraiyan, Christingle Song To Holly And The Ivy,