
http://educate-yourself.org/cn/groupsta ... ug05.shtml
Group Stalking
Group stalking is a group effort directed against a targeted individual in order to psychologically torture and demoralize the victim.
People who have been targeted for psychotronic (electronic) torture are often also the victim of "street theater" and group stalking. A group of perpetrators act as a "team" to harass the target, but in subtle ways so as not to tip off passersby. A team member will get behind the victim in a grocery line, for instance, and say or do something that is disconcerting to the victim, but not so obvious that other people in the line can easily notice what is taking place.
Team members will try to interfere with the victim in making new friends or create suspicions with their landlord or their neighbors, the mail carrier, etc. Perpetrators will move in next door to the victim or surround him on all sides as his "neighbors." There seems to be no limit to the amount of money and "team" members available to make the victim's life a daily ordeal. People in law enforcement are often involved with this activity either as perpetrators themselves or enablers. The idea is to make the target feel isolated and deprived in order to produce despondency and perhaps suicide.
Whistle blowers, ex-cult members, corruption exposers in law enforcement, former government workers, former employees of certain corporations, trouble makers at universities, researchers or writers who get too close to sensitive topics are the type of people usually targeted, but some victims have no idea why they've been targeted.
http://firstmonday.org/ojs/index.php/fm ... w/1002/923
Corporate Cyberstalking: An Invitation to Build Theory by Paul Bocij
Cyberstalking describes a relatively new form of stalking behaviour where technology is used as the medium of harassment. The term corporate cyberstalking is often used to describe incidents that involve organisations, such as companies and government departments.
This paper uses a number of case studies in order to propose a typology of corporate cyberstalking. It is suggested that incidents involving corporate cyberstalking can be divided into two broad groups, depending on whether or not the organisation acts as a stalker or as a victim.
Examining the motivations behind corporate cyberstalking allows these groups to be subdidvided further. The motives behind corporate cyberstalking can range from a desire for revenge against an employer to cyberterrorism. The paper also briefly discusses definitions of stalking and cyberstalking, concluding with a revised definition of cyberstalking that is more in keeping with the material discussed.
It is also worth pointing out that organisations may sometimes hold some of the responsibility for incidents where company resources are directed towards harassing others. This is because it can be argued that organisations have a duty to ensure that resources are used appropriately. Even when legislation does not impose such a duty, it seems difficult to claim that companies have no professional or moral responsibility to protect the public. Of course, there are also very sound business reasons to ensure that organisational resources are not abused in the ways described here.
It can be argued that some organisations use cyberstalking as a way of controlling some of the information posted to the Internet. As an example, recent years have seen many companies use SLAPPs (Strategic Lawsuits Against Public Participation) to prevent individuals from publishing various kinds information on the Internet, such as complaints. The Civil Liberties Monitoring Project suggests that SLAPPs can be used "... to intimidate activists into silence by filing meritless lawsuits against them ... for such torts as slander or intentional interference with business advantage" (Kirk, 1998). Some well-known cases regarding SLAPPs include the Electronic Frontier Foundation (EFF) and its support of a parody concerning a favourite children's character named BarneyTM [6], Carla Virga and Terminix [7], and some of the numerous disputes concerning Scientology [8].
Terrorist Gang Stalking
http://starfishgirl.org/page.php?id=119
Gang stalking enjoys a long and sordid history. It was a part of the KKK’s infamous lynching campaign that lasted well into the the twentieth century, was called Jew Baiting prior to the Holocaust, was perfected by the East German secret police who were called the Stasi, was called "Rat F'ing" by the Nixon administration, and has also been known as Blacklisting, McCarthyism, The Red Scare, Cause Stalking, Mobbing, Stalking By Proxy, and The Politics of Personal Destruction.
Stalker 4People ranging from activists (democrat and republican) to whistle blowers to women who have dared to break up with abusive partners are being targeted. Terrorist Gang Stalking is a form of abuse designed to control, intimidate, and ultimately destroy.
Case 4: (Unwitting) A Serial Cyberstalker
A detailed account of the following case study is provided by Bocij, Bocij and McFarlane (in press).
Mr. Smith harassed a number of women via e-mail and Internet chat rooms. Victims would be selected by searching the personal profiles that many people submit to various services, such as ICQ. Mr Smith appeared to select victims who were single and lived relatively close to him.
Mr. Smith adopted several distinct identities when communicating with his victims. These identities would be used to minimise the possibility of being caught once he began to conduct a sustained campaign of harassment against his victims. This harassment would take a number of different forms, including sending abusive e-mail messages, placing surveillance software on the victim's computer, following the victim and making threats that implied he would assault the victim in her own home.
Mr. Smith was eventually caught when he deviated from his usual pattern of behaviour and selected a married woman as a victim. The woman's husband was a consultant with expertise in computer security. This man was able to trace Mr. Smith's name, address and place of employment. It was found that Mr. Smith was a network administrator for a relatively large local company and had been using his employer's facilities in order to stalk his victims. This included:
making use of company software packages, such as route planning software and a database containing a register of electors, to find personal information about victims;
establishing numerous false e-mail accounts; and,
intercepting e-mail messages meant for senior management, deleting them and then impersonating managers in replies.
Once notified of Mr. Smith's activities, senior management were quick to offer a guarantee that the matter would be dealt with. However, it does not appear that the police were informed of Mr. Smith's actions and he does not appear to have been dismissed from his post.
Case 6: (Competitive) Microsoft and the Halloween papers
The Web site of the Open Source Initiative describes a series of documents produced by Microsoft employees that outline how the company planned to deal with competition from open source software, such as Linux (an operating system) and Mozilla (a Web browser) [16]. The first document was named "Halloween" because of the date it was leaked. Over a period of a year, six Halloween documents were leaked, each containing information that was embarrassing to Microsoft for one reason or another.
The first memorandum was produced by a Microsoft software engineer. This document suggested that Microsoft could deal with competition from open source software (OSS) by subverting common standards. The engineer, Vinod Valloppillil, stated in his report "By extending these protocols and developing new protocols, we can deny OSS projects entry into the market" (Ricciuti, 1998). The memo also stated that Microsoft's usual FUD tactic would be unlikely to work in the case of products like Linux. FUD stands for "fear, uncertainty and doubt".
The last of the Halloween documents dragged the highly respected Gartner group into the argument. According to the Open Source Initiative, Gartner published a series of five articles that criticised Linux and predicted that its popularity would decline once Windows 2000 became more established. The press responded to these reports by publishing numerous articles suggesting that Linux was doomed to failure. However, Eric Raymond of the Open Source Initiative claims that there is evidence to show that Microsoft wrote and published the articles on Gartner's Web site.
If one accepts the allegations made by the Open Source Initiative, then Microsoft were responsible for harassing the developers of Linux and other open source software for more than a year.
http://fightgangstalking.com/tactics-for-fighting-back/
1. Shine a light on the cockroaches.
Organized stalking is a manifestation of the view that intelligence and law enforcement agencies, their corporate cronies, and the military-industrial complex should have supremacy over all other elements of American government.
Even if you think that is a desirable power structure for national security reasons, it is impossible to deny that it grossly violates core principles of the U.S. Constitution. Organized stalking also violates stalking prohibitions under federal law and state laws in all fifty states.
One of the implications of that is that the perpetrators need to keep it a secret.
This is a primary difference between the use of organized stalking as a domestic counterintelligence strategy in America today and its use by the Stasi (state police) in communist East Germany: in the U.S. it is illegal.
This was true during the original version of Cointelpro also – and was a primary reason the U.S. Senate conducted its Church Committee investigations after the FBI’s activities were exposed by civilian activists.
Many of the tactics and strategies employed by the Stasi were virtually identical to those now used (and largely out-sourced apparently) by the FBI and other agencies in the U.S.
In East Germany however, the Stasi wanted citizens to be aware that their society was infested with spies because it furthered the communist party’s goal of political control. In the U.S., such a public awareness would trigger a backlash against the abuse of power by the government and its cronies, so it is kept under the radar.
So the Achilles’ heel of gang stalking is exposure.
From the perspective of intelligence and law enforcement agencies and corporations which use organized stalking as a secret illegal weapon for subversion, the perfect operation is one in which the target becomes progressively isolated, impoverished, emotionally degraded, and eventually commits suicide. That does happen in some cases – the most prominent example being the FBI’s psychological torture of actress and political activist Jean Seberg.
Seberg’s case was tactically successful in the short term (they destroyed her emotionally), but it was ultimately a strategic failure for the FBI because their crimes against her ended up on the front pages of national newspapers.
Without question, the vast majority of Americans do not want to live in a society infested with spies working for a Stasi-type government. To the extent that you can educate your fellow citizens about the creepy and illegal stalking activities of private security mercenaries, vigilantes, and corrupt law enforcement officers, they will be on your side.
Targets of organized stalking must wage a two-front war: we must act locally to expose the harassment to neighbors and others, and we must expose what is happening on a national level as well. Both objectives are critical.
The Streisand Effect
One of the reasons that most of the tactics listed here do not involve much risk for the targeted individual is that gang stalking perps have to worry about the following phenomenon.
The “Streisand Effect” is when an effort to suppress information inadvertently causes an increase in attention to the information.

Lower-level perpetrators of the direct face-to-face harassment involved in organized stalking almost always interact with the targeted individual in a tightly scripted way. The perpetrator is directed to make a specific comment and/or perform a specific action based upon the particular victim and circumstances.
This is done for a very good reason. It allows the handlers to control the harassment in ways which follow a thoroughly tested playbook that has been developed and honed over years of psychological operations by the Stasi, the FBI, and other counterintelligence agencies.
Comments are intended to be as creepy and insulting and provocative as possible (and tailored to the individual victim as much as possible) without including any language that might be incriminating or legally objectionable or suspicious in case they are recorded.
Based on my own experience and accounts of other targeted individuals, perps don’t like being photographed when they’re stalking you. Some will be more bothered by it more than others, but none of them will want you to do it.
With the variety of digital cameras available (cell phones, spy cameras, etc.), you can take photos and videos either overtly or covertly. Both have advantages. If you are trying to annoy the perp’s, taking their photo in an obvious way, might be a good method. On the other hand, if you’re trying to document their actions, a covert spy-camera approach might be better.
Of course, it’s unlikely that your photos and videos will have much legal significance. Perps are told to avoid doing and saying things that could be incriminating. They are normally following very specific directions from their handlers – for example, they are told to make a comment which is not explicitly threatening or slanderous, but which makes reference to something they know about you from conducting illegal surveillance.
Also, it might be productive to clearly communicate in various ways – in advance – to any local criminal conspirators (professional and volunteer) your willingness to defend yourself.
Distributing flyers is probably the single most powerful tactic for fighting back against America’s Stasi goon squads. Mailing flyers anonymously – or placing them on walkways or doorsteps of residences – is a legal, simple, cheap, and very effective way to expose the crime of organized stalking. Counterintelligence perps do not have a good way to suppress this particular avenue of communication. Also, this tactic circumvents the problem of cowardice and laziness in the mainstream corporate news media because it exposes the information directly to the public.
![]()
Direct interactions with targeted individuals are rarely initiated by law enforcement officers – especially officials who identify themselves as such. Out-sourced overt stalking by agencies and corporations is much more common. Nevertheless, you should be aware of your legal rights in case such encounters occur.
http://www.utne.com/politics/corporate- ... tions.aspx
Corporate Spooks: Private Security Contractors Infiltrate Social Justice Organizations Spies might miss the Cold War, but they’re getting plenty of work tracking activists
by Paul Demko
January-February 2009
Cara Schaffer just wanted to improve the lives of vegetable pickers in the fields of south Florida. In March the idealistic college student signed up to volunteer for the Student/Farmworker Alliance, a group that works closely with the Coalition of Immokalee Workers to fight for better wages.
Schaffer’s fellow activists, however, quickly became suspicious of the new recruit’s excessive enthusiasm, particularly her keen desire to take part in national conference calls that plotted strategy. So they punched her name into an Internet search engine and discovered that Schaffer wasn’t a college student at all. She was the owner of Diplomatic Tactical Services, a private security and espionage firm based in Jupiter, Florida.
Schaffer’s firm had been hired by Burger King, which was locked in a dispute with the coalition over tomato pickers’ wages. In the aftermath of her outing as a corporate mole, two of the burger empire’s executives were fired and the company agreed to meet the workers’ demands.
While activists easily sussed out Schaffer’s rather buffoonish infiltration attempt, highly professional corporate espionage has become a galling reality for many activist groups. In the wake of the Cold War, former spies from the CIA, FBI, Britain’s MI5 and MI6—even the KGB—are increasingly plying their dark arts for private firms with cinematically sinister names such as Diligence, Control Risks, and Kroll.
“The big change in recent years has been the huge growth in these companies,” Annie Machon, a former MI5 agent, told the London-based New Statesman (Aug. 11, 2008). “Where before it was a handful of private detective agencies, now there are hundreds of multinational security organizations, which operate with less regulation than the spooks themselves.”
Perhaps the most disturbing entry in the lucrative corporate espionage field is the private-military firm Blackwater Worldwide (best known for gunning down 17 civilians in Baghdad’s Nisour Square in 2007). Led by J. Cofer Black, who spent 28 years working for the CIA, Blackwater launched the Orwellian-named Total Intelligence Solutions in February 2007. The firm is stacked with former high-ranking officials from the FBI and the U.S. State Department, promising clients around the globe, including foreign governments, unprecedented access to power brokers in Washington. “It is not difficult to imagine clients feeling as though they are essentially hiring the U.S. government to serve their own interests,” the Nation reports (June 23, 2008).
While spying on idealistic do-gooders is undoubtedly a minuscule portion of these firms’ activities, businesses have sometimes taken elaborate steps to acquire the inside dope on protest plans, acts of civil disobedience, and lobbying agendas. This fixation suggests that the regrettably groomed rabble demonstrating outside your local weapons-manufacturing plant might actually be causing some anxiety in corporate boardrooms.