Corporate- & Gang-stalking

"Silence is golden when you can't think of a good answer."
-Muhammad Ali
User avatar
Naga_Fireball
Posts: 2012
Joined: Sat Jul 04, 2015 6:22 pm
Location: earth
Has thanked: 1751 times
Been thanked: 1566 times

Re: Corporate- & Gang-stalking

Post by Naga_Fireball »

p.s. for those who live in Texas/California:
In recent years a handful of states also have passed laws criminalizing impersonation of
individuals on the internet, including New York, California and Texas. In New York and
California, online impersonation is a misdemeanor punishable by fines and up to a year in prison.
In Texas, the crime is a felony punishable by up to ten years in prison.
1


What Can Employers Do to Address the Workplace Implications?
Technology-enabled stalking and harassment become workplace issues in two major ways: when
an employee is the victim of such acts, and when an employee is the perpetrator. Because the
harassment and/or or stalking occurs while the victim- or perpetrator-employee is at work, and
may involve the use of work resources -- an employer-provided computer, smartphone,
telephone, and internet access -- it becomes the employer’s concern; employers have a duty to
provide a safe workplace and to address an employee’s potentially criminal behavior.

The best approach is for employers to get ahead of the issue, and not wait to react to a particular
incident. Employers should strive to create a healthy and safe work environment free of
harassment and stalking, by instituting both preventative and remedial measures. Employers
should make clear that harassing, threatening or stalking behavior is not acceptable inside or
outside of the workplace, and will be addressed. If an employee complains of harassment or
stalking via technology while at work, an employer should not dismiss their concerns or simply
refer them to EAP.

Similarly, if someone reports an employee for harassing or stalking them
using technology, the best practice is for employers to take the complaint seriously and initiate
an investigation. The actions of the Library of Congress employee, Kenneth Kuban, demonstrate
how employees can use work time and technology to perpetrate stalking and harassment that is
not immediately obvious. Employers should document all reported instances of harassment by
the employee-perpetrator and seek the assistance of law enforcement (after consulting the
victim).

Another important piece of a healthy and safe work environment is to address the use of
workplace technology. The best and most comprehensive way to address this is through a
technology policy. Employers should clearly set forth the organization’s appropriate and
acceptable uses for the employer-provided telephone, smartphone, computer, and internet access.
Employers also should take steps to prevent employee identity theft through the use of
technology, especially through work-provided devices. Issues to consider and address include:

Are all work-provided devices and accounts password-protected?

Is personal employee or client information that is stored in company databases or on
servers electronically encrypted?

Can employees use work resources to access non-work related content during work
hours, or during personal time?

Are employees allowed to access personal email or social media (Facebook, Twitter, etc.)
from work devices?


Does the employer monitor, prevent access to or block objectionable content and/or
websites?

The policy should clearly set forth the procedure to be followed if an employee violates the
policy, uses work-provided technology to harass, threaten or stalk, and the potential
consequences.
Brotherhood falls asunder at the touch of fire!
He finds his fellow guilty of a skin
Not coloured like his own, and having power
To enforce the wrong, for such a worthy cause
Dooms and devotes him as his lawful prey.
~William Cowper
User avatar
Naga_Fireball
Posts: 2012
Joined: Sat Jul 04, 2015 6:22 pm
Location: earth
Has thanked: 1751 times
Been thanked: 1566 times

Re: Corporate- & Gang-stalking

Post by Naga_Fireball »

http://www.topix.com/forum/atlanta/TM5SAGJDAJP88RCAB

anonymos

Washington, DC

#1 Sep 18, 2010
ORGANIZED GANG STALKING WHAT YOU NEED TO KNOW


Organized Gang Stalking, also known as Gang Stalking, Cause Stalking, Organized Vigilante Stalking, Stalking by Proxy, Community-Based Harassment, and Covert War, are essentially harassment and discrediting campaigns waged against a targeted individual.

Citizens and neighbors are recruited to participate, often from extremist groups and cults, but also from among employees.

Coordinated psychological warfare attacks, consisting of stalkings, noise campaigns, sensitizing and the spreading of lies and rumors, are executed in an effort to virtually neutralize and destroy the victim using people from all backgrounds and vocations to harass, track 24/7, sometimes organizing lethal vehicle accidents, poisonings, electronic harassment,home invasions/property destruction, corrupt or ignorant doctor diagnosis given to stamp the victim as bogus mentally ill with delusions, paranoid, or schizophrenia, etc.

Everything is done covertly. and with a sophisticated real time dispatching system to organize the criminals' harassments and
attacks, often in the hundreds to thousands of criminals participating as a coordinated mob at any given time while the criminals do their normal routines of work, shopping, commuting to and from work, leisure, etc., using the method of moving foot and vehicular surveillance techniques, and computers, cell phones, verbal and visual cues, and every other conceivable type of communication.

Often, the local network of this mob is connected to a national and international network when the target travels the local network will follow the target to the next city or town when the target arrives there, the network in that location will Stalk follow and Harass the target in that city or town Organized Gang Stalking also known as organized stalking, community harassment community stalking is a systemic form of control, which seeks to destroy every aspect of a Targeted Individuals life.

Using occupational health and safety laws, warning markers can be added to a targets file.

Once a target is flagged, a notification is sent out, and the target is followed around 24/7 by the various communities that they are in. A covert investigation might be opened, and electronic means used by the civilian spies as part of the covert monitoring and surveillance process.

The citizen informants can be parts of these community oriented programs, but are often just average citizens. Everyone in the targets life is contacted, advised as to why the individual has been listed or flagged.

Advised not to discuss the notification and asked to be a part of the ongoing, never ending monitoring (systemic harassment) process.

This process is covertly designed to destroy the target over time, leaving them with no form of support.

Since most civil workers are aware of this notification system, it means that targets reporting incidents of being followed around by various strangers should not have been unfamiliar to the police, and other agencies that targets reported their harassment to.

In most cities this notification is well known, and used by many workers and employers.

Yet Targeted Individuals have had to have mental health evaluations for making complaints about this structure, and the harassment that comes with it. Organized Gang Stalking is experienced by the Targeted Individual as psychological attack, that is capable of immobilizing and destroying them over time.

The covert methods used to harass, persecute, and falsely defame the targets often leave no evidence to incriminate the civilian spies.

It's similar to workplace mobbing, but takes place outside in the community. It called Organized Gang Stalking, because organized groups or community members stalk and monitor the targets 24/7. see Gang Stalking Organized Stalking.


http://www.truedemocracy.net/hj36/10a.html
The Journal of History  Fall 2011   TABLE OF CONTENTS

Targeted
Individual
Gang-Stalking in America

By Sadie Judge

Living as a victim of a particularly terrifying crime has completely changed my life. It's like looking through a mirror and seeing the old world still going on but unable to get in it or access it. Add to this the fact that the detection of the crime is almost impossible, and you have the perfect illegal act happening to millions of citizens on a daily basis.

What is this criminal act that's so deadly that it can actually occur right in front of non-victims without them being aware of it? It's the latest invisible crime called Gang-stalking, Multi-stalking, 24-hour stalking, Organized-stalking etc. Whatever its name it is the same terror day in and day out for the victims who have been given a life sentence, a slow death of physical and emotional harassment.

If you google the name you will find tons of information on this crime; yet most officials will deny that it exists. An international phenomenon that is taking hold right here in America with a frightening intensity. One that has increased dramatically with the advent of the cell-phone and the computer which has allowed organized stalking groups to be able to "track" their "targets" more efficiently and expediently.

Sounds like a science fiction movie you saw recently? Well, science fiction is now reality and functioning quite readily in our ordinary daily lives. Who is gang-stalked? Why anyone and everyone meaning the possibility of you becoming the next "target" is real. Why would anyone want to stalk you? Isn't that reserved for persons of importance are the questions most people ask themselves. Well the answer is that just as in our society everyone can have their 15 minutes of fame or success, you also now have the opposite opportunity in the arena of what I affectionately call "The Shadow World."
These Organized stalking groups like to pretend they have lofty reasons for tagging you. You have been deemed an unsuitable citizen by their less than moralistic standards. They hide behind groups with names like Neighborhood Watch or Community Watchdog groups; groups that receive funding from the federal government and private sources. At one time many of us may have supported such groups who seemed to weed out criminals who were put into our neighborhoods such as pedophiles. People we had not necessarily been completely rehabilitated and needed to be carefully watched. These so called undesirable people would be watched every second and followed everywhere in the neighborhood until they got the message "You're not wanted!"

Now the neighborhood watch group is watching you! Tracking down regular citizens for a lifetime of harassment and torture. Your name has been submitted by an anonymous individual and their identity will never be revealed to you, the target. The information submitted to the group does not even have to be verified. The identifier has perhaps reported that you make too many complaints, you're one of those activist/grassroots people, a whistleblower, a family member/friend of another target or even just to simply get revenge on you because you made the "wrong" person angry. Whatever the reason you were selected, the offense does not fit the torture that will now be doled out to you for the rest of your life.

One day you wake up and find you're being Gang-stalked. There's no mistaking what is happening to you, but almost impossible for anyone else other than the victim to know what is going on because of the "unseen" methods inflicted on the target. Unidentifiable strangers will now feel free to walk up to you and using a particular everyday action
they've been instructed to play out will then proceed to harass you. The type of actions inflicted on the person will be everyday happenings that we the ordinary citizen witness on a daily basis; a cough, whistle, person jogging, accidental loud noises exactly as you walk by, a flashing cell-phone, and the list goes on and on.

Obviously these type of actions in of themselves are not frightening. However if on a particular day there are 10 strangers who cough as you walk by and this happens everyday then you can start to make the connection of the psychological torture inflicted on a gang-stalking victim. Ten coughs a day mean 70 a week and 280 times a month. This includes the other signals; whistling, loud noises etc being executed on your person on a daily basis. A single gang-stalking victim will be victimized easily thousands of times in a single month's period.

After subjecting you to this type of emotional torture for a period of months you now move into the mental stage called "sensitizing." This means that you will become so overly-conscious of these everyday actions that when anyone does these purposefully or not you will now react. Think of Pavlov's Dog that we all learned about in school.

The persons participating in this very ugly crime do not always comprehend the depths of their actions. They may think it is easy money and they are not really hurting anyone if they cough one time as they walk by an individual. They're just helping to identify a 'criminal" or "bad person" not realizing their single action is multiplied hundreds of times by others and they have simply been told a lie about the person to get their cooperation in helping to destroy and decimate someone's life.
The stalking victim will find it virtually impossible to escape the clutches of its "stalkers." You are identified through cell-phone signals and can be located wherever you are. The number or citizens who participate as "stalkers" is staggering. They are located in every our daily lives. This means your mailman, grocer, doctor, teacher, neighbor etc. will be equipped with a phone that will ring at any time of the day that lets them know that they are in the vicinity of a gang-stalking victim. They will then be given specific instructions of an everyday activity they should then mimmick which has been selectively cultivated for the target they are harassing. The individual then performs their specific action and waits to see who will react. They cough and you automatically cringe which identifies you to them as the "target." They now also proceed to give you inferior service or treat you in a manner which is different than the ordinary customer, person. You are on the line and it is moving quickly but once you have been identified as a target and get close to the top of the line the service slows dramatically.
http://www.educate-yourself.org/cn/grou ... ug05.shtml

Group (or Gang) Stalking, a Growing Menace

[Editor's Note: This type of stalking isn't about an obsessed person or former lover following around his old girlfriend. Group stalking is a group effort directed against a targeted individual in order to psychologically torture and demoralize the victim. People who have been targeted for psychotronic (electronic) torture are often also the victim of "street theater" and group stalking. A group of perpetrators act as a "team" to harass the target, but in subtle ways so as not to tip off passersby. A team member will get behind the victim in a grocery line, for instance, and say or do something that is disconcerting to the victim, but not so obvious that other people in the line can easily notice what is taking place. Team members will try to interfere with the victim in making new friends or create suspicions with their landlord or their neighbors, the mail carrier, etc. Perpetrators will move in next door to the victim or surround him on all sides as his "neighbors." There seems to be no limit to the amount of money and "team" members available to make the victim's life a daily ordeal. People in law enforcement are often involved with this activity either as perpetrators themselves or enablers. The idea is to make the target feel isolated and deprived in order to produce despondency and perhaps suicide.

Whistle blowers, ex-cult members, corruption exposers in law enforcement, former government workers, former employees of certain corporations, trouble makers at universities, researchers or writers who get too close to sensitive topics are the type of people usually targeted, but some victims have no idea why they've been targeted. Sometimes, a family bloodline may be the deciding factor. While victims usually feel powerless to stop this activity, there is a technique called "boosting" that can be extremely effective in putting an end to this torment. Go to the Women's Warriors page (http://educate-yourself.org/ww/index.shtml) and read what transpires in a typical boosting session. Then contact Lilly Ochescu at <count90210@yahoo.com> and find out about setting up a "boosting" session to target the perpetrators. Victims are not helpless and they can stop this harassment if they take the time and effort to learn about orgone tools and 'etheric resistance'. The orgone movement is growing and more people are now becoming aware that we all have the power within -with the use of our minds and our emotions-to combat these diabolical scum bags and turn the tables on them. Read the information available at the Women Warriors web site (http://www.thewomenwarriors.net) and find out what is necessary to become an 'etheric warrior' and get on board. People who've been on the receiving end of this torment need to put their victimhood behind them and learn how to kick some butt themselves. It can do wonders for your morale!. ..Ken]

See Eleanor White's review of Terrorist Citizen Gang Stalking in America by David Lawson
http://www.raven1.net/terstalk.htm

Download this 5 minute video clip of stalkers in action (14.5 MB)- Windows Media
http://www.eharassment.ca/multimedia/gangstalking.wmv

or Quicktime (11.7 MB)
http://www.eharassment.ca/multimedia/gangstalking.mp4

Slide Show still shots taken from the above video
http://www.eharassment.ca/evidence/slid ... eshow1.htm

See http://www.multistalkervictims.org/videos.htm for more info and links

See FAQ on Organized Gang Stalking In North America
http://educate-yourself.org/cn/gangstal ... 2001.shtml

http://educate-yourself.org/cn/groupsta ... ug05.shtml
August 17, 2006

Forward courtesy of <allinharmony@gmail.com>



http://nobullying.com/why-parents-shoul ... -is-today/
What Is Gang Stalking?

Modified : May 25,2015

Gang Stalking


What is gang stalking? Where a bully involves the ongoing pattern of mental or physical abuse of another person, gang stalking involves a coordinated activity by a group of like-minded people on an individual target. The best way to describe what gang stalking is involves giving examples that, when put together, show a pattern of psychological attack and harassment from multiple points.

|SEE ALSO: Teaching Your Child Right from Wrong|
What Is Gang Stalking?

Gang stalking includes:

Attacks and harassment happening sporadically or daily over a number of days.
Traffic harassment in the form of being obviously followed, cut-off or forced to brake hard.
Someone obviously watching a person’s activities from a distance.
Repeat passing of previously-unseen cars going by a person’s house.
A sense of being followed but, when examined, no one seems to be the obvious follower.
Finding garbage or trash repeatedly thrown on one’s property.
Things moved around inside a personal space, office or even a home.

The results of organized gang stalking are predictable and expected. A person experiencing these kinds of issues combined or consecutively will begin to have an increasing feeling of anxiety and fear. That will lead to what a rationale person would describe as paranoia, but it seems to be based on real incidents and instances that only the person is experiencing. It’s rare that a third party witness also sees the behavior causing the problem.

Unfortunately, gang stalking is not an imagined condition. It has happened and does happen with frequency for a variety of reasons. The activity goes by a number of names as well, including predatory gang stalking, vigilante stalking, and group stalking.
Victims of Gang Stalking

Victims of gang stalking often share specific characteristics that are not similar to other victims. It is frequently the case that the gang stalking is started because the victim has upset the common sense of a group, right or wrong. The activity then begins to either punish the victim or force compliance in some issue. The reasons vary and can include the following:

The victim represents some kind of perceived threat to a group or a cause.

The target often has no idea who all the group members are.

The gang members frequently don’t know the victim personally, except maybe one or two of them, nor do they know why the victim has been targeted.

The stalking is often indirect and subtle rather than overt and direct.

Some of the most annoying tactics used by gang stalking groups often involves behaviors that have no close or visible contact at all. These can include communications that involve some simple piece of information that is personal. It doesn’t take much; the information just has to be personal enough to irritate the target. This can include the names of family and pets, the time of typical daily schedules, places where family work or go to school, description characteristics, or simply sending messages that the target is being watched with enough detail to confirm the surveillance is indeed occurring. These activities alone can be enough to get under most people’s skin and get them highly irritated if not outright angry.

More general tactics are those that have been around for decades, usually including some kind of minor vandalism that creates an annoying mess to clean up or disturbance to home life. Gang stalking activities can include crank phone calls, graffiti on a person’s property, trash being thrown everywhere on a front lawn, damage to a car, and a large amount of noise in the street at night to wake a person up.
Characteristics of Gang Stalking

What makes gang stalking really stand out from other abusive behavior is the fact that the activity continues for a long period of time. There doesn’t seem to be a letting up, which is a result of a coordinated long-term attack by a group’s members. The harassment often increases or matures as well as the group members often believe their anonymity protects them from being caught.

The goals of gang stalking are far more than just annoyance, however. They often include:

Harassing a victim to the point of psychological fear or even terror.

Convincing everyone else in the community, or at least the target’s peers, that the person is just imagining a gang stalking hoax and is starting to go crazy and paranoid.

Working to isolate the victim so that he can’t rely on anyone for any help.

Alienate the victim from family and friends, which makes the ongoing psychological harm easier and easier to inflict.

Gang stalking really took a rise after the Internet became widely available in the 1990s with numerous gang stalking stories. The ability to communicate quickly with a group using means that covered their identity made it possible for groups to coordinate over times and distances without easily being identified and caught. This also led to initial gang stalking paranoia.

Group dynamics are the core of a successful gang stalking, so the members are also the weakest link. As long as all the members support the plan, follow their roles, and stay hidden from the target, then it will be near impossible for a target to stop the activity without laying some kind of a trap to expose the members. These dynamics provide the fabric for how the group operates when continuing to maintain a target’s harassment. They also serve as a source of interaction and support for the members, allowing them to find a commonality in their actions and justification for a greater cause; they reinforce each other to keep going and maintain the stalking en masses.
Protection

Gang stalking has its weaknesses, however. First off it relies on the assumption that the target will grow demoralized and will stay that way, growing progressively weaker and paranoid under the chronic harassment. Second, the target will not be able to produce or find any viable evidence proving that gang stalking is occurring, thereby isolating him to peers. Third, there won’t be any records available to show a conspiracy actually occurred between suspected persons. Finally, because everything is ambiguous, the target won’t be able to confront anybody as a participant, to then strike back. Again, all of these assumptions are based on the idea that the target is powerless to hit back. The dynamic starts to fall apart, however, where and when a target doesn’t follow these rules.

For those looking to effectively defend themselves from gang stalking activities, information and situational awareness are two tools anyone can become good at collecting. When the products of these tools are put together over time, they begin to produce a niche into the gang stalking group’s system that can be taken advantage of. These efforts should focus on:

Keeping regular and detailed records of activities suspected of being gang stalking. This includes times, dates, details and information about each occurrence.

Taking photographs or videos of any evidence left behind and saving it as an easy reference record of what occurred. This comes in handy later on when it’s time to show a pattern of behavior. It also corroborates the victim’s statements of what occurred.

Keeping a file on every interaction with law enforcement. This includes officer names, case numbers, departments, and who takes evidence from a reported scene if it occurs. Also try to get the incident number and event number from the officer or police department as record tracking can happen under different systems.

Being proactive and obtaining a licensed psychological evaluation as soon as gang stalking starts. This defuses and eliminates any argument by non-psychologists that a target is going crazy. The fact that an evaluation says otherwise long before they ever came to their conclusion refutes such assumptions before they start.

Speaking up and being noisy about what’s occurring. Gang stalking groups want a target to stay silent, to cave in and go into isolation. A noisy target eventually gets someone’s attention to start to take action against the group.

Remembering that stalking is a crime in most jurisdictions, even if done anonymously by a group. Every group eventually has a weakness and can be found out. In fact, groups are more vulnerable to identification than a lone individual. Focusing on nailing down one person’s identification can very quickly lead to the rest of the group, especially if one of them is dumb enough to get caught and arrested.

Gang stalking can be far more powerful in effect than individual bullying, but the problem is the same. The group will often continue to do what it does until the victim stops taking the abuse and starts to push back. When a group gets exposed, its power is gone. So every response should aim at meeting this goal of eliminating the effects of gang stalking.
Brotherhood falls asunder at the touch of fire!
He finds his fellow guilty of a skin
Not coloured like his own, and having power
To enforce the wrong, for such a worthy cause
Dooms and devotes him as his lawful prey.
~William Cowper
User avatar
Naga_Fireball
Posts: 2012
Joined: Sat Jul 04, 2015 6:22 pm
Location: earth
Has thanked: 1751 times
Been thanked: 1566 times

Re: Corporate- & Gang-stalking

Post by Naga_Fireball »

Please feel free to snip this link if it's inappropriate, but since it was in the public forum,
a user on the old site named "BenzSolo" had some very amazing insight on the cyclical nature of "gang stalking":

The folks at the end of the block

:lol:

I'm not sure what possessed him to write it but it's fresh from today IIRC.
One of the few articles on the topic containing a ray of hope.
Brotherhood falls asunder at the touch of fire!
He finds his fellow guilty of a skin
Not coloured like his own, and having power
To enforce the wrong, for such a worthy cause
Dooms and devotes him as his lawful prey.
~William Cowper
User avatar
Naga_Fireball
Posts: 2012
Joined: Sat Jul 04, 2015 6:22 pm
Location: earth
Has thanked: 1751 times
Been thanked: 1566 times

Re: Corporate- & Gang-stalking

Post by Naga_Fireball »

Dear friends,
wanted to let you all know,
my home PC,
my husband's phone, and my voicemail were recently tampered with.

This correlated directly with an attempt by me to let an educational institution know,
one of their employees admitted on social media to deleting the email of a supervisor,
through inappropriate/illegal accessing of the school email servers.

Immediately after this person found out about that warning,
our machines were compromised. Just an FYI,
and thanks for EarthEmpaths' intention to provide a safe space.

I am working on documenting the actual hacking, spoofing,
preferences changes, threatening messages both direct/indirect,
impersonation (! jesus, right?), and of course, the original theft/stalking.


It's very very very sick, sad sad sad,
to derive entertainment via stalking a broken family,
stalking one's spouse a child, really?

Please take care and if any of you experience these things, document and report to police.
Pretty sure that the threats coming from these active criminals are backed by very little except the hacking itself.

FBI really needs to help the police with this one,
considering that the person is opening false social media accounts, changing/deleting phone settings,
spoofing the phone, all that manner of thing,

not to mention again, impersonation is a FELONY IN TEXAS -
there is also a Czech republic hacker involved in this, initials RR.
Brotherhood falls asunder at the touch of fire!
He finds his fellow guilty of a skin
Not coloured like his own, and having power
To enforce the wrong, for such a worthy cause
Dooms and devotes him as his lawful prey.
~William Cowper
User avatar
Naga_Fireball
Posts: 2012
Joined: Sat Jul 04, 2015 6:22 pm
Location: earth
Has thanked: 1751 times
Been thanked: 1566 times

Re: Corporate- & Gang-stalking

Post by Naga_Fireball »

Hi everyone,
would love to share these links expounding the difficulties experienced by investigative journalists (and opinion writers) who encounter corporate stalking/harassment/censorship:
http://nationalpress.org/programs-and-r ... y-hackers/



Programs & Resources |

Protecting Journalists in a World Stalked by Hackers

2015

Why I write….

August 27, 2015

By Heather C. Dahl

In the past year I’ve had one too many conversations with journalists who don’t actively consider digital safety to be a serious part of their job. It’s more of a “nice-to-have” rather than a requirement of our work. I’ve met reporters who brag about disabling their antivirus program, seen photographs of sources in a manner that exposes the person’s sensitive data in the background, learned of news managers using the same passwords on all their accounts, and so many journalists who don’t lock their mobile phones with four-digit pins or thumb prints that it boggles my mind.

I’ve had a Congressional reporter brag that he who would fight in court before disclosing his sources to authorities but didn’t consider the theft of his unlocked device as a risk to his sources’ identities…even though all communications with these individuals are easily accessible with the swipe of a screen!
http://articles.mercola.com/sites/artic ... sment.aspx

Journalist Exposes Inside Strategies to Censor News

By Dr. Mercola

According to Ayn Rand, “You can choose to ignore reality, but you can't ignore the consequences of ignoring reality.” Most of us rely heavily on the media for information, not realizing that 90 percent of it is controlled by a mere six media giants.

Sharyl Attkisson, a five-time Emmy Award winning investigative journalist whose television career spans more than three decades is one of my personal heroes. She was the reporter who, in 2009, blew the lid off the swine flu media hype, showing the hysteria was completely unfounded and manufactured.

She recently left CBS to pursue other avenues of investigative journalism, and has authored a highly praised book, Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama's Washington, which exposes what goes on behind the scenes in the media that gives you the information you come to think of as real and true.
https://geeldon.wordpress.com/2011/09/0 ... ipulation/

Shaming: Manipulator uses sarcasm and put-downs to increase fear and self-doubt in the victim. Manipulators use this tactic to make others feel unworthy and therefore defer to them. Shaming tactics can be very subtle such as a fierce look or glance, unpleasant tone of voice, rhetorical comments, subtle sarcasm. Manipulators can make one feel ashamed for even daring to challenge them. It is an effective way to foster a sense of inadequacy in the victim.

Playing the victim role (“poor me”): Manipulator portrays him- or herself as a victim of circumstance or of someone else’s behavior in order to gain pity, sympathy or evoke compassion and thereby get something from another. Caring and conscientious people cannot stand to see anyone suffering and the manipulator often finds it easy to play on sympathy to get cooperation.

Feigning innocence: Manipulator tries to suggest that any harm done was unintentional or did not do something that they were accused of. Manipulator may put on a look of surprise or indignation. This tactic makes the victim question his or her own judgment and possibly his own sanity.

According to Simon manipulators exploit the following vulnerabilities that may exist in victims:



naïveté – victim finds it too hard to accept the idea that some people are cunning, devious and ruthless or is “in denial” if he or she is being victimized
over-conscientiousness – victim is too willing to give manipulator the benefit of the doubt and see their side of things in which they blame the victim
low self-confidence – victim is self-doubting, lacking in confidence and assertiveness, likely to go on the defensive too easily.
over-intellectualization – victim tries too hard to understand and believes the manipulator has some understandable reason to be hurtful.
emotional dependency – victim has a submissive or dependent personality. The more emotionally dependent the victim is, the more vulnerable he or she is to being exploited and manipulated.

Manipulators generally take the time to scope out the characteristics and vulnerabilities of their victim.

According to Kantor the following are vulnerable to psychopathic manipulators:

too trusting – people who are honest often assume that everyone else is honest. They commit themselves to people they hardly know without checking credentials, etc. They rarely question so-called experts.
too altruistic – the opposite of psychopathic; too honest, too fair, too empathetic
too impressionable – overly seduced by charmers. For example, they might vote for the phony politician who kisses babies.
too naïve – cannot believe there are dishonest people in the world or if there were they would not be allowed to operate.
too masochistic – lack of self-respect and unconsciously let psychopaths take advantage of them. They think they deserve it out of a sense of guilt.
too narcissistic – narcissists are prone to falling for unmerited flattery.
too greedy – the greedy and dishonest may fall prey to a psychopath who can easily entice them to act in an immoral way.
too immature – has impaired judgment and believes the exaggerated advertising claims.
too materialistic – easy prey for loan sharks or get-rich-quick schemes
too dependent – dependent people need to be loved and are therefore gullible and liable to say yes to something to which they should say no.
too lonely – lonely people may accept any offer of human contact. A psychopathic stranger may offer human companionship for a price.
too impulsive – make snap decisions about, for example, what to buy or whom to marry without consulting others.
too frugal – cannot say no to a bargain even if they know the reason why it is so cheap
the elderly – the elderly can become fatigued and less capable of multi-tasking. When hearing a sales pitch they are less likely to consider that it could be a con. They are prone to giving money to someone with a hard-luck story. See elder abuse.

MOTIVATIONS OF MANIPULATORS

Manipulators have possible motivations, including:

– the need to advance their own purposes and personal gain at virtually any cost to others,

– a strong need to attain feelings of power and superiority in relationships with others,

– a want and need to feel in control (aka. control freakery),

– and gaining a feeling of power over others in order to raise self-esteem.
Major Principles of Media Law, 2014 Edition
By Genelle Belmas, Wayne Overbeck

176 Libel and Slander
Getting "SLAPP" Lawsuits Dismissed
A lawsuit can be an intimidating form of harassment, as journalists have sometimes discovered. The whole point of the Anderson case was to allow journalists to get harassment libel suits dismissed quickly on summary judgment. In recent years, it has become commonplace for citizen activists to be sued for libel or slander by wealthy corporations when they speak against a corporate project at public hearings or circulate petitions to oppose a project. These lawsuits are often nothing more than a form of intimidation -- an attempt to silence a corporation's critics. An acronym to describe these lawsuits has gained wide acceptance: SLAPP (strategic lawsuits against public participation).
Brotherhood falls asunder at the touch of fire!
He finds his fellow guilty of a skin
Not coloured like his own, and having power
To enforce the wrong, for such a worthy cause
Dooms and devotes him as his lawful prey.
~William Cowper
User avatar
Naga_Fireball
Posts: 2012
Joined: Sat Jul 04, 2015 6:22 pm
Location: earth
Has thanked: 1751 times
Been thanked: 1566 times

Re: Corporate- & Gang-stalking

Post by Naga_Fireball »

meant to add:
https://en.wikipedia.org/wiki/Intellectual_property

Trade secret misappropriation
Main article: Trade secret § Misappropriation

Trade secret misappropriation is different from violations of other intellectual property laws, since by definition trade secrets are secret, while patents and registered copyrights and trademarks are publicly available. In the United States, trade secrets are protected under state law, and states have nearly universally adopted the Uniform Trade Secrets Act. The United States also has federal law in the form of the Economic Espionage Act of 1996 (18 U.S.C. §§ 1831–1839), which makes the theft or misappropriation of a trade secret a federal crime. <------

This law contains two provisions criminalizing two sorts of activity. The first, 18 U.S.C. § 1831(a), criminalizes the theft of trade secrets to benefit foreign powers. The second, 18 U.S.C. § 1832, criminalizes their theft for commercial or economic purposes. (The statutory penalties are different for the two offenses.) In Commonwealth common law jurisdictions, confidentiality and trade secrets are regarded as an equitable right rather than a property right but penalties for theft are roughly the same as the United States.
Brotherhood falls asunder at the touch of fire!
He finds his fellow guilty of a skin
Not coloured like his own, and having power
To enforce the wrong, for such a worthy cause
Dooms and devotes him as his lawful prey.
~William Cowper
User avatar
Naga_Fireball
Posts: 2012
Joined: Sat Jul 04, 2015 6:22 pm
Location: earth
Has thanked: 1751 times
Been thanked: 1566 times

Re: Corporate- & Gang-stalking

Post by Naga_Fireball »

Heads up, the Dratch creep just posted a Huge amount of what he knows about hacking android phones over on PA.

Spouse & I have had considerable issues and Dratch is the only person who asked for the personal info required in order to compromise the phones.

They also managed to delete our voicemail once including legal & medical stuff.

He raises a shit fit over there anytime someone he is after posts about vaccines or other "big" human rights abuses.
Brotherhood falls asunder at the touch of fire!
He finds his fellow guilty of a skin
Not coloured like his own, and having power
To enforce the wrong, for such a worthy cause
Dooms and devotes him as his lawful prey.
~William Cowper
Pris
Posts: 392
Joined: Tue Dec 22, 2015 1:51 am
Has thanked: 369 times
Been thanked: 434 times

Re: Corporate- & Gang-stalking

Post by Pris »

Naga_Fireball wrote:Heads up, the Dratch creep just posted a Huge amount of what he knows about hacking android phones over on PA.

Spouse & I have had considerable issues and Dratch is the only person who asked for the personal info required in order to compromise the phones.

They also managed to delete our voicemail once including legal & medical stuff.

He raises a shit fit over there anytime someone he is after posts about vaccines or other "big" human rights abuses.
Bob Dratch, eh?... Terrific. I've also had my run-in with that one. Small world.
.
.
User avatar
Christine
Site Admin
Posts: 2587
Joined: Thu Feb 19, 2015 10:29 pm
Has thanked: 4440 times
Been thanked: 4766 times
Contact:

Re: Corporate- & Gang-stalking

Post by Christine »

Image

Once upon a time in a land far, far away there lived a class of fools ... the fool's fooled.
Image
The journey, the challenge is to step into the
projection room and stop being lost in the script.
Pris
Posts: 392
Joined: Tue Dec 22, 2015 1:51 am
Has thanked: 369 times
Been thanked: 434 times

Re: Corporate- & Gang-stalking

Post by Pris »

Christine wrote:Image

Once upon a time in a land far, far away there lived a class of fools ... the fool's fooled.
Lol! Indeed.

"Who's the More Foolish, the Fool, or the Fool Who Follows Him?"

I wouldn't trade the learning experience for anything.
.
.
Post Reply

Return to “General discussions”