UP

Organized Mobbing

Organized Mobbing

In the news

Britsh family meets big brother full story...

CIA targets UC Irvine Librarian full story...

Anti-war Activists Spied on full story...

England's workplace bulling problem and payout full story...

Spying. FBI doesn't require warrant to place GPS full story...

Courts limit NSA data collection or so they think so, full story...

Home raids, but at least legally done full story...

Words you thought you never had learn in life...psy ops...how about the truth for a change full story...

Bucket of chicken Pakistani style, full story...

Stasi, full story...

World shows no concern for American refugees, full story...

Woman and asylum, full story...

Prayer in the workplace and useless ACLU, full story...

Let the 'dirty tricks continue! The USA gets what it gives to its 'general population', full story...

Americas got its own nonviolent crazies and doesn't need more, only evil at the level of Cheney is allowed to cross the border, full story...

Slavery: history repeats itself, first as tragedy and second as farce, full story...

Surveillance, do onto others as they would do onto you, full story...

Canadian cameras in the trees, full story...

To the reader

With this website I try to be as accurate as possible. Unlike books, a website is not permanent, which is good, it can evolve as new understandings are developed. As I learn more, I am able to be more concise with my explanations. As I have discovered, much of what I have learned is more common knowledge than I thought. In other words, the information is out there already. Because of that, I hope to say less and reference more and let the reader put two and two together. If you are interested in knowing more about what I call organized mobbing, look it up. What I have done here is given my story and provided a brief overview with my perspective and adumbration of the tactics. Personal stories provide more details than scholarly books. When someone mentions CointelPro, sure you may be able to say that it was a name of an FBI program did this and that. That is the nuts and bolts of it, but to really understand it, you have to listen to the stories of people who lived it. And to fully understand you have to do more than just examine the root, you have to investigate the DNA the social illness. Also please note most of what is written emphasizes what has happened to various 'groups' and not 'individuals'. Individuals are not exempt which is what I am showing and is stated in the actual literature as well. So reading the so called wrong things (creating the potential for thinking the so called wrong thoughts), joining the wrong organizations whether active or not, just the act of joining...anything that could create the potential for dissent. could make you a target for what you read on this site.

What is organized mobbing?

The terms used by others is gang stalking, organized stalking, community stalking, community mobbing and I am sure other terms I am unaware of. What should it properly be called? Well, I don’t know. That would require knowledge that I don’t have, in other words, what the government calls the recrudescence of this activity they do since COINTELPRO has ended. I am sure the government has just as many names as the 'supposed' victims…operation this or that. In East Germany, this activity was done by the Stasi and was called ‘zersetzung’ or decomposition or disintegration. Essentially this is the same activity with different names. All pick from the same bag of tactics...'fun and games' and 'dirty tricks'. The motivations are similar, the disintegration of someone, with the differences being cultural and the language used in what they are 'supposedly' trying to protect. What is different today, is that these techniques/programs/initiatives have become 'perfected' and have a substantial and solid Network of collaborators. I am not sure, but that may be what Michael German is saying in http://www.youtube.com/watch?v=y4ARnnQmOY0 when he talks about Networks. HG Wells in his book The New World Order discusses the 'abolition of distance' with emerging technologies. So to clean up various weakness of the programs, where before targeted individuals were able to 'escape' or flee to other countries (not always requesting asylum, but living someplace else), today it is possible (if they chooses to take things that far) to thwart that ambition. It is like a worldwide, return the slave back to his/her master agreement. People's families are asked to collaborate leaving no means of support where previously they may have been the target's biggest advocate. That is how low they will go. There was a group that was never caught breaking into an FBI office called Citizens' Committee to Investigate the FBI. Just think what it would require to do that...the secrecy, the trust, the ability to group, the government and its controllers have been able to thwart (no breaking in today) such things with selling out, suspicion, mistrust, fear because organization have infiltrators all the way to the top willing to provide membership lists. The Truth remains hidden forever. The ACLU is well known to be an infiltrated organization. There are improved ways of letting people know they are being watched and listened to as I have shown in My Story I with the PI recording all of which are harder to prove. Once the target is anchored and broken in with something blatant, later psychological harassments become easier in time. Most of these kinds of tactics are easily found on other websites so I won't go into details or personal details....I have experienced it all. Again who started it, a government police agency and from there the psychological torture rolls nonstop. The day to day mobbers, for the most part, have no clue as to why they are doing what they do. They don't know either, who started it...they are simple trash not suppose to know. They know as much as the target, what they do from day to day or what they are plotting next. They know who all is involved. That is all. They do for other benefits...favors (petty favors)...privileges (petty privileges)....power....sadistic fun.

Previously people would get a copy of a recording in the mail, which may still happen who knows, today it is done more surreptitiously improving the 'plausible deniability' factor. Tapes are evidence of some kind. Plus there was a desire to keep things hidden from the public, but now, why bother because everyone knows. The behaviors are made extremely outrageous to increase the 'plausible deniability' factor, to whom, I don't know. Presumably it is deflection for deflections sake (since so many people are aware and share). People's environments are easily turned into prison cells and must deal with also undure the psychological effects of isolation and confinement though they walk around, and, they-must-keep-clear. It is a complete violation of someone's human rights. There is no legal support, another weakness of the past, because those institutions have been infiltrated and gutted out from anything purposeful and people aren't concerned when people are targeted in this way. This is just to name a few. This is COINTELPRO and Zersetzung perfected leaving it inexpugnable. What's left? Like other third world countries, fuck the 'fun and games' and just snatching you right off the streets. There is really nothing stopping that from happening. I hope people think about this on a deeper level and on a global level and understand as things unfold.

"The struggle for total domination of the total population of the earth, the elimination of ever completing nontotalitarian reality, is inherent in the totalitarian regimes themselves; if they do not pursue global rule as the ultimate goal, they are only too likely to lose whatever power they have already seized. Even a single individual can be absolutely and dominated only under global totalitarian conditions" (90). - Hanna Arendt The Origins of Totalitarianism part III

STASI: Decomposition pdf

So a few quotations regarding ‘zersetzung’:
Dennis, Mike. The Stasi: Myth and Reality. London, UK: Pearson Education Limited, 2003. ISBN: 0582414229 “The MfS dictionary summarized the goal of operational decomposition as ‘splitting up, paralyzing, disorganizing and isolating hostile negative forces in order through preventive action, to foil, considerably reduce or stop completely hostile-negative actions and their consequences or, in a varying degree, to win them back both politically and ideologically (113).”

“…the Stasi’s main method of combating subversive activity was operational decomposition (operative zersetzung) (112)”…quiet repression.

“The kind of measures which the ministry employed can be found in documents such as the 1976 guidelines on operational cases, and included: the systematic compromising and isolation of a target by means of rumor, disinformation and deception concerning alleged immorality, excessive drinking, an ‘unclean past’ and spying for the West; undermining their professional and personal reputation; creating fear and uncertainty though frequent telephone calls at night, inserting fictitious adverts in newspapers, sending anonymous letters, and burglary. Some victims have claimed that the MfS deliberately poisoned food and drove targets to contemplate suicide. Other nefarious methods involve telephone tapping and interception of mail…provoking disagreements among opposition groups, and the criminalization of offences such as alleged tax evasion and the disturbance to public order, targets were also subjected to restrictions on their movements, the withdrawal of driving license and illegal house searches (113).”

Targeting of Churches….Regarding target Linke and wife…”rumours about selfishness, embezzlement…prepared as decomposition and differentiation measures to stir up dissension within the church…The report concluded, not without a note of sadistic satisfaction: ‘both are unemployed in West Berlin and have no fixed abode. They received support only from the church.(115).”

Glaeser, Andreas. Political Epistemics: The Secret Police, the opposition and the End of East German Socialism. University of Chicago Press, 2011. ISBN: 978-0-226-29794-1 “Proven methods of decomposition to be used are: systematic destruction of public reputation, standing and prestige on the basis of the connection between true, verifiable, and discrediting as well as untrue, credible, nondisprovable and thus equally discrediting information; systematic organization of professional and social failures to undermine the self-confidence of individual persons; generation of distrust and mutual suspiciousness within groups, groupings and organizations; generation respectively utilization and amplification of rivalries within groups, groupings and organizations with the help of the goal directed use of personal weakness of individual members; busying groups, groupings, and organizations with their own internal problems with the goals to limit their inimical negative actions; local and temporal disruption respectively limitation of mutual relationships between the members of groups, groupings and organizations on the basis of valid legal norms, for example through the utilization at their workplaces or the assignment of work at distant places (495-496).”

“Measures of decomposition are to be directed toward the creation as well as the utilization and amplification of contradictions and disagreements between inimical-negative forces through which they can be splintered, paralyzed, disorganized, and isolated, so that their inimical-negative actions including their effects can be preventively averted, essentially reduced or completely stopped….Measures of decomposition are to be used especially if the casework has yielded the prerequisite proofs for the commitment of a political crime or of an ordinary crime while the operative case cannot be closed through criminal procedures, because of political or political-operative reasons in the interest of realizing a higher social utility. (495)

“Decomposition had no legal status as a regular sanction of the state, and if it did, it would have undermined the state’s legitimacy. (495)”

“Since understandings are always social, one can accordingly analytically differentiate between three fundamental approaches to decomposition: epistemic manipulation, interference with social relationships, and resource deprivation. The first, the more prominently featured approach in the above quotation, encourages officers to interfere with the spaces of validation of individuals or of groups as a whole (496).”

“…money or income played a more limited role in the power calculus of decomposition, because the state had to offer employment while essentials such as rent and base food stuffs where comparatively cheap (496).”

“In particularly disturbing cases, children were mobilized through pressures in school to influences their parents in a more conformist direction (498).”

“Secret informants also deliberately planted understandings…secret informants were used to feed ambitions, misgivings, or desires that could lead to friction…most commonly about a person’s link to the secret police…spreading lies about a person’s sexual life…alcohol consumption…these were often backed by planted…evidence… retouched photographs, sexual toys, or strategically placed liquor bottles (498).”

“The effect the Stasi aimed at these measures was the destruction of the target person’s self-confidence by creating shame-saturated events and/or the erosion of this person’s authority in the eyes of other network members, there ultimately destroying the operability of the network by depriving it of nodal figures (498).”

“Manipulating corroboration was also employed as a tool of decomposition. Most notably, the secret police managed to prevent people from obtaining a desired job or place at an educational institution. It arranged for people to be fired or dismissed. Stasi also influenced performance reviews, grading and decisions to send somebody to continuing education or to an international conference. Decisions to have a manuscript for publication accepted or rejected or to award a particular research project…(498).”

“Where such measures caught their targets unaware of their entanglements in the Stasi’s web of machination, they were meant to confirm doubt about their own abilities. Where people knew who was responsible for their misfortune, they ‘organization of failure ‘was meant to shape people’s assessment of risk involved in party-critical activities. With the same intention, the Stasi often flaunted its presence in front of residences, on the way to and outside events, to enhance movement member’s fear that surveillance was inescapable. They tried to smother actions at people’s doorsteps to confirm activists’ anxieties that the Stasi knew everything and that they were ready to take action and certainly would not let them do what they wanted to do. (498).”

“…the Stasi, even broke into apartments, not just for searches, but to show that they could, with impunity, do as they pleased on this regard (499).”

“Stasi would place ads in periodicals in the name of dissident with the offer to buy or sell particular kinds of goods with the effect that the targeted activist had to busy him or herself fending off buyers or sellers on the phone or worse even, at the door (500).”

“Plans were made to criminalize dissidents by smuggling goods they did not buy into their shopping bags or by feigning robberies in such a way that movement activists were implicated; physical assaults were concocted and even the ultimate became unthinkable: the provocation of accidents entailing the potential death of the victim (502).”

Miller, Barbara. The Stasi: Files Unveiled. Transaction Publishers, 1999.“…liquidation literally meant the physical destruction of the enemy…songwriter Wolf Biermann found evidence in his files that the Stasi had planned to tamper with his car brakes, sometimes the enemy was to be debilitated by mental torture. In the case of Gerd Poppe, who was himself under Stasi surveillance, rumours were spread that he was actually working as an informer. Even after ‘state enemies’ were forced to leave the GDR, they did not escape Stasi. When prominent dissident Jurgen Fuchs arrived in West Berlin…so too did an informer…(56).”

“Most had reconciled themselves to the fact, as they saw it, that they would never leave East Germany and had suppressed their disapproval of state practices in the desire for a life as free of conflict as possible (2).”

“Yet, in the minds of the East German population, the Stasi functioned as though it were physically omnipresent, and many conversation was subject to a form of self-imposed censorship in the belief that it was bring furtively recorded and analysed (4).”

“Stasi informers were primarily engaged in the amassing of vast amounts of often seemingly trivial pieces of information which could be used to demobilize the enemy. To this aim strategies were devised or neutralize those whose political stance was perceived as a threat to the smooth running state (5).”

"In Hungary, for example, legislation was implemented to allow the screening of individuals in specific public positions, but was eventually abandoned in recognition of the fact that there were so few judges available to implement the law who were not themselves liable for screening and possible dismissal (8)."

Schmeidel, John. Stasi: Shield and Sword of the Party. London and New York: Routledge, 2008. “Disruption employed a spectrum of harassment. An individual or family standing alone was easy prey. By simple irritants and low-level psychological terror, the Stasi could make life unbearable for the weaker willed. Sometimes the warfare was petty. Officers would place constant nocturnal phone calls, although not all dissidents had phones, ordering truckloads of cat good or lawn furniture in their name, or cutting off electricity or water. If they wished to step up the pressure, the directive suggests a buffet of options. The MfS might organize professional mishaps all the way to job loss, destroying the victims reputation by spreading rumors or those founded on some checkable facts, or attempt a seduction of him, his spouse or lover by an attractive IM (Romeo Stasi) (46).”

Davis, James Kirkpatrick. Spying on America: The FBI’s Domestic Counterintelligence Program. NY, NY: Praeger Publishers, 1992.“Clifton De Berry…through no apparent fault of his own, De Berry had a great deal of trouble holding onto a job during this period. Years later, after he had learned that the FBI was the source of most of his difficulties, he recalled, “I would get a job and it would last only 3 days. I would go from one job to another. The FBI would visit my boss and I would be fired (61).”

Churchill, Ward and Jim Vander Wall. The Cointelpro Papers: Documents from the FBI’s Secret Wars Against Domestic Dissent . Boston, MA: Southend Press, 1990.

http://www.colorado.edu/AmStudies/lewis/issues/fbinewleft.pdf The FBIs 12-point master plan for COINTELPRO-New Left. "6. The drawing up of anonymous letters egarding individuals active in the New Left. These letters should set out their activities and should be sent to their parents, neighbors and the parents' employers. This could have the effect of forcing parents to take action.... 7. Anonymous letters or leaflets describing faculty members and graduate assistants in the various institutions of higher learning who are active in New Left matters. The activities and associations of the individual should be set out...

 ................

Interesting quotes regarding understanding the police state:

Chapman, Brian. Police State. New York and London: Praeger Publishers, 1970.“The philosophy of this Polizeistaat, as expounded by the [Prussian] Cameralists, was an important as the institutional framework. The state had to be all-powerful since, in the last resort, its welfare must transcend the individual and particular interest of individuals within the state. Citizens who were properly aware of this would always recognize that the state must have the last word, even at the cost of injury or injustice to themselves, since the fundamental concern of all citizens was the protection and integrity of the state…without the state all would be lost (17).”

“An army of informers was recruited by selected police agents, who paid for information received. The spies were drawn from all levels of society and no one was in too lowly a position to be useful: servants, messengers, drivers or porters; colleagues,  neighbors, and business contacts were recruited where necessary (26).”

“It is important to remember that they traditional police state was based on the best motives. Joseph wished to modernize his state, to encourage trade, to provide a corps of honest, dedicated and hard-working officials…He saw his subjects as children, still unable to properly reason or to understand, and in need of guidance. He favoured no class, but expected all men to be like him…he understood human nature he doubted the natural intelligence; integrity, dynamism, and selflessness of his subjects. He created a police system to ensure the integrity of the state…He did not wish to tyrannize his people; he wished to free them, by supervision, of the falling prey to agitators, demagogues and revolutionaries. He wished to free them from their slavery of ignorance, ingenuousness and immaturity and to do so he put them under the tutelage of an all-pervasive police (26-27).”

“…the force so created was to ensure that everything can be known, foreseen, and forestalled…(29)”

[In Prussia],”…officials of all kinds, and in particular officials exercising the police power of the state, were immune to legal proceedings brought against them by injured parties if they could show that they were acting in the course of their official duties…It was virtually impossible to bring actions for false imprisonment or illegal arrest against even individual police officers. Redress remained a matter of bureaucratic rather than judicicial sanctions (38).”

“The common law countries stood outside of this process, and indeed. They regarded the whole matter of the police with the utmost suspicion…Englishmen and foreigners alike agreed that they were prepared to endure an unusual degree of violence in the streets and a consequential lack of personal security rather than risk the incursions of their personal liberty which they considered was the price Europeans had to pay for their police (50).”

“The Times of September 6, 1865, noted for instance, that ‘Austria was long known on the continent as the police state (52-53).”

“In 1939, the War Illustrated’ had the highly significant sentence: ‘Spies are everywhere; indeed, Germany is the modern exemplification of the police state in action (53).”

“…the principal change in the modern police state is the emergence of the police service as an offensive force, reversing its traditional role as defender…This change involves the systematic and deliberate use of police powers to alter the nature of the state, and convert people to views diferent from those they previously held…to ensure that in their public behavior and private conversation they act as if they do hold these new views (81).”

“First, there is the arbitrary nature of police powers. No matter how much police powers are formally controlled by an insistence on due process, objective expert evidence or independent arbitration, there application…is essentially arbitrary (82).”

“The arbitrary use of police powers, brutality, spying, secrecy, the temptation to act as a law unto itself are characteristics inherent in every police system (93).”

“The establishment of an underground network enables the political police not only to identify dissidents at an early stage, but also to manipulate the politics of the underground into an approved direction. It many also be used to incriminate members of other state institutions if this suits the political purpose of the police (123).”

“Political dissent, which threatened the stability of the state was not to be permitted, and the state was to be subordinated to a single political directed will, utilizing a strong administrative state hierarchy of officials, with the explicit aims of centralizing the national effort, mobilizing society and creating national self-consciousness (54).”

Murphy, Paul. The Constitution in Crisis Times 1918-1969. NY, NY: Harper Torchbook, 1972. “Oregon, prodded by the Ku Klux Klan, had enacted a law aimed at eliminating parochial and private schools by requiring children between the ages of eight and sixteen to attend public schools. Defenders of the measure argued that the alarming increase in juvenile crime could be attributed to the lack of public school education by many children; that religious prejudices might result from religious segregation; that subversive economic doctrines might be taught in non-public schools; and that a system of compulsory public education was necessary to encourage the patriotism and insure the loyalty of future citizens…McReynolds held the Oregon statute unconstitutional (55).”

“…the Bureau of Investigation…used…as an instrument to root out enemies of the government, particularly left-wing political critics…the police were working closely with economic power to deny the legitimate rights of workingmen and minority groups (71).”

Harlan Fiske Stone, 12th Chief Justice of United States Supreme Court: “there is always the possibility that a secret police may become a menace to free government and free institutions because it carries with it the possibility of abuses of power which are not always quickly apprehended or understood. It is important that the Bureau’s activities be strictly limited to those functions for which it was created and that its agents…be not above the law or beyond it reach. The Bureau…is not concerned with political or other opinions of individuals. It is concerned with their conduct and then only with such conduct as it is forbidden by the laws of the United States (79).”

Wolfe, Nancy Travis. Policing a Socialist Society: The German Democratic Republic. Westport, CT: Greenwood Press, 1992. ISBN: 0-313-26530-5
East German Objective: “In all countries that purport to be democratic, a balance between freedom for the individual and the welfare of society as a whole must be ascertained. In societies where the latter value predominates, repressive measures can be not only justified, but seen as essential to the ultimate good of the individual….A distinguishing feature of socialist systems in a teleological orientation: members of the society must be cleansed of false values an inculcated with socialist principles in order to progress toward full communism (3).”

“…the number of people who ‘voted with their feet’ for freedom continued to increase…During the fortieth year of its existence, more than 343,000 citizens turned their backs on the GDR. The exodus, which built to a crescendo in the late summer and early fall of 1989, threatened to undermine the legitimacy of government, weaken seriously the economic base of the country, and cause loss of support of western governments. The greater the hemorrhage, the more frantic the efforts of the MfS and the VP to ascertain incipient signs of disloyalty or imminent flight.”

“….At the same time, it must be recognized that the mere presence of a repressive system can serve to violate an individual’s human rights even when no specific action was taken against him personally. (5)”

“Essential individual rights were enumerated in the GDR Constitution Section titled “Basic Rights and Basic Duties’. Particularly significant for the function of police were clauses that included the right of citizens to express opinions freely and publicly, the guarantee of freedom of the media (Article 27), the rights of citizens freely to assemble peacefully (Article 31). As in other countries, these rights were not absolute in the GDR, but they were to be restricted only within legally specified rules…in fact, the GDR citizen, in theory, had more rights than those guaranteed to American citizens under the United States Constitution, laws and appeals court decisions. As in every system, however, there was a gap between theory and practice…(11).”

“When suspicions were aroused, a two-step search routine could be followed. First a secret search of the suspect’s residence was carried out. Through subterfuge the suspect and other nearby residents could be lured away; this could be done by setting up doctor’s appointments or party meetings, by calling someone to the office of his supervisor, by having school children kept in by the teacher, and so on. If the preliminary examination of a formal order could be obtained from a judge, allowing the MfS to make an open search (75).”

“Prisoners were carefully shielded from contact with any person other than interrogators. Kept in single cells, they never walked free but were always accompanied by special agents when moving through the corridors. Red and green lights were set up on the hallways, so that prisoners never saw each other (76).”

"...the more visible government agencies are, the less power they carry, and the less is known of the existence of an institution, the more powerful it will ultimately turnout to be" (101). - Hanna Arendt The Origins of Totalitarianism part III

Davis, James Kirkpatrick. Spying on America: The FBI’s Domestic Counterintelligence Program. NY, NY: Praeger Publishers, 1992. “…Special Agent James O’Connor, from the New Left desk at the Philadelphia FBI field office. Its first issue…instructed agents to intensify contacts with radicals and dissidents so as to enhance ‘the paranoia endemic in these circles and to further serve to get the point across that there is an FBI agent behind every mailbox’ (10).”

“Evidence in the mailing also suggests that the FBI was faced with the problem of informants becoming provocateurs. In a memo dated September 16, 1970, the FBI admonished those in the field to be certain that informants ‘should not become the person who carries the gun, throws the bomb, does the robbery or by some specific violative, overt act becomes deeply involved participant (17).”

http://deskrat.blogspot.com/2008/03/from-archivesconfessions-of-darthard.html

“In time, the FBI’s operation would include not only the monitoring of political expression but, in many cases, the disruption of it (27).”

“The most intrusive and unregulated investigative techniques—justified perhaps by demanding wartime requirements—eventually opened the door for the COINTELPRO operations that would begin in the mid-1950s; electronic surveillance, mail openings, and surreptitious entry (29).”

“In 1950 the Emergency Detention Act became law. This act…stipulated again that the FBI was the agency with the authority to investigate any “individuals” who might be detained in the event of a national emergency (30).”

“The director…’sometimes,’ he said, ‘it is necessary to make a surreptitious entry where on occasion we have photographed secret communist records and other data of great use to our security.’ Additional counterintelligence methods were listed: safecracking; mail interception; telephone surveillance; microphone plants; trash inspection; infiltration, disorganization, and penetration of groups; falsely labeling group members as government informants; using informants to raise controversial issues within groups; encouraging IRS to investigate target groups; encouraging street warfare between certain groups; using misinformation to disrupt target group activities; mailing anonymous letters to target group spouses in which allegations of infidelity are made; mailing reprints of controversial newspaper articles to encourage group disruption…(33).”

“Unjustified investigations of political expression and dissents can have a debilitating effect upon your political system…when people see that this can happen, they become wary of associating with groups that disagree with the government and more wary of what they say or write (180).”

Perkus, Cathy, ed. and intro. by Noam Chomsky. Cointelpro : the FBI's secret war on political freedom. NY, NY: Monad Press, 1975. “They [FBI] demonstrate a commitment to the principle that power must not be threatened or injured. The narrow elites that control the economy, political life, and the system of conventional doctrine must be immune to the means of harassment that are restricted in the normal course of events, to those who raise a serious challenge to ruling ideology or state policy or establishment privilege” (11).”

“…the FBI’s understanding of its function: to block legal political activity that departs from orthodoxy, to disrupt opposition to state policy…(12).”

“One FBI provocateur resigned when he was asked to arrange the bombing of a bridge in such a way that the person who placed the booby-trapped bomb would be killed. This was in Seattle, where it was revealed that FBI infiltrators had been engaged in a campaign of arson, terrorism and bombings of university and civic buildings and where the FBI arranged a robbery, entrapping a young black man who was paid $75 for the job and killed in a police ambush (15).”

“…the ultimate weapon of repression: concentration camps to intern potential troublemakers on the occasion of some loosely defined future ‘Internal Security Emergency’…(29).”

Churchill, Ward and Jim Vander Wall. The COINTELPRO Papers: Documents from the FBI’s Secret Wars Against Domestic Dissent. Boston, MA: South End Press, 1990. “The FBI, by infiltrating and spying on the selected groups in American society, arrogated to itself the role of thought police. It decided which groups were legitimate and which were a danger—by FBI standards—to the Republic. It took sides in social and political  conflicts…deciding, for example, that those who opposed the war in Vietnam, or whose skin was black, should be targets for FBI attention. Since the FBI acted secretly, it distorted the political process by covertly acting against certain groups and individuals. In short, the FBI filled the classic role of a secret political force (21).”

“In 1964, congress passed the Freedom of Information Act (FOIA; 80 Stat. 250), designed and intended to provide citizen access to government files. However, in passing the act, congress failed to challenge the prerogative of the federal executive to simply declare whole bodies of information secret for reasons of national security. Instead, the act allowed agencies such as the FBI to exempt material they felt was: (A) Specifically authorized under criteria established by an Executive Order to be kept secret in the interests of national security and (B) are in fact properly classified pursuant to such executive order (26).”

“…national security classification was still defined quite subjectively under Richard M. Nixon’s EO-11652 (37 FR 5209, March 8, 1972) as material of which “unauthorized disclosure could reasonably be expected to cause damage to national security (26).”

“In 1978, President Jimmy Carter signed EO-12065 (43 FR 28950, July 3, 1978), defining the classification somewhat more stringently: “Confidential’ shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause identifiable damage to the national security…Carter’s executive order and corresponding ICRC directive follow suit…that they define valid national security concerns as being only those matters clearly bearing on ‘the national defense and foreign policy of the United States’…Section 1-601 of the order also specifies that ‘classification may not be used to conceal violations of the law, inefficiently, an administrative error, to prevent embarrassment to a person, organization, or agency, or to restrict competition (26-27).”

“…anyone examining…documents the Bureau has ‘released’…will discover myriad instances in which text has been blacked out, with an accompanying ‘(b)(1)’ notation indicating this was done for reasons of national security…The FBI has also been known to ‘white’ out classification markings entirely, to that the reader cannot tell whether the markings had ever been made…no FBI employees were ever penalized for their blatantly consistent violation of the law…(27).”

The FOIA offers another set of loopholes, collectively known as the ‘(b)(7)’ exemptions,…investigatory records compiled for law enforcement purposes, but only to the extent that the production of such records would (A) interfere with law enforcement proceedings, (B) deprive a person of a right to a fair trial or impartial adjudication, (C) constitute an unwarranted invasion of privacy, (D) disclose the identity of a confidential source and, in the case of a record complied by a criminal law enforcement authority in the course of a criminal investigation, or by any agency conducting a lawful national security investigation, confidential information furnished only by the confidential source (E) disclose investigative techniques and procedures, or (F) endanger the life or physical safety of law enforcement personnel (28).”

Hoover’s letter 1/10/1961 to Kennedy administration: “…penetration of the (CP) Party at all levels with security informants; use of various techniques to keep the Party off-balance and disillusion individual communists concerning communist ideology; investigation of every known member of the CPUSA in order to determine whether he should be detained in the event of a national emergency…As an adjunct to our regular investigative operations, we carry on a carefully planned program of counterattack against the CPUSA…In certain instances, we have been successful in preventing communists from seizing control of legitimate organizations and have discredited others (41).”

................

The tactics used depend upon the targets situation, who they are interacting with and what the perps as well as the target are attempting to accomplish and what is going to have the greatest effect upon the target. Common tactics are in fact: drugging (where you can feel a mental effect) or putting other harmful agents into food or drink (where, until done continuously, the effect is not felt but there are severe changes that occur in the body), continuous harassment, breaking into personal spaces (home, car, storage), damaging of property (mainly computers and cars), disturbing employment causing loss of employment with similar tactics used at educational institutions, gas lighting, accessing phone/email information, stalking, devices in home/car, communication that the target is being watched continuously, verbal abuse and nasty treatment in normal business interactions, tampering with mail (opening, not receiving), harassing anonymous or unanonymous mail, isolation/ostracism, police harassment (stopping, mobs of police cars following or boxing in), police intimidation and indifference with complaints, harassing phone calls, texts and emails, there are noise campaigns, auto theft, sexual assaults by anonymous people who are aware of your targeted state etc. This ubiquitous targeting is what I call 'bandwagon targeting' which is done by a bunch of idiots with no purpose at all but, nonetheless, increases the state of danger for the target individual. The entity that throws the ball into play, you must remember, is the government and that is the entity that should be held accountable.

Interesting quotes:

"Mass atomization in Soviet society was achieved by skillful use of repeated purges which invariably preceded actual group liquidation. In order to destroy all social and family ties, the purges and conducted in such a way as to threaten with the same fate the defendant and all his ordinary relations, from mere acquaintances up to his closest friends and relatives. The consequences of the simple and ingenious device of "guilt by association" is that as soon as a man is accused, his former friends are transformed immediately into his bitterest enemies; in order to save their own skins, they volunteer information and rush in with denunciations to corroborate the nonexistent evidence against him; this obviously is the only way to prove their own trustworthiness. Retrospectively, they will try to prove that their acquaintance or friendship with the accused was only a pretext for spying on him and revealing him as a saboteur...foreign spy...merit being gauged by the number of denuciations of close comrades, it is obvious that the most elementary caution demands that one avoid all intimate contacts...not in order to prevent discovery of one's secret thoughts, but rather to eliminate...future trouble" (21) - Hanna Arendt The Origins of Totalitarianism part III

Who mobs?

Who takes part in this? Easy answer, anyone and everyone. They could be anyone in society and informers throughout history always have been. Nothing new.

Chapman, Brian. Police State. New York and London: Praeger Publishers, 1970. “An army of informers was recruited by selected police agents, who paid for information received. The spies were drawn from all levels of society and no one was in too lowly a position to be useful: servants, messengers, drivers or porters; colleagues,  neighbors, and business contacts were recruited where necessary (26).”

Wolfe, Nancy Travis. Policing a Socialist Society: The German Democratic Republic. Westport, CT: Greenwood Press, 1992. ISBN: 0-313-26530-5 “The total influence of the MfS cannot be reckoned without taking into account the unofficial workers (Inoffizielle Mitarbeiter, IM). Estimations of the number of IMs range from 100,000 to 500,000…Of all aspects of the MfS, the generation of an army of individuals willing to report suspicious information about acquaitances, friends, and family roused the fiercest resentment and fear. The end result was to turn citizens against one another and to create an atmosphere of debilitating apprehension. No relationship was immune from the possibility that an informer might be involved. (78)”

Dennis, Mike. The Stasi: Myth and Reality. London, UK: Pearson Education Limited, 2003. ISBN: 0582414229 “…the Stasi recruited agents by taking advantage of human frailties and needs such as the desire for personal security, material goods, career advancement, trips abroad, university placement for children. Payments could be high…but many informers received nothing or only small sums. (147) Controllers had to encourage IMs to believe that they were helping the state.

Reason why became involved: Monika Maron, well known writer, “claims that her collaboration was prompted by a wish to construct a more humane socialism as an alternative to capitalism,. Working for the Stasi could bring material benefits: a visa for a journey to the West, a better apartment, a higher publishing run, loans, financial bonuses and present (118).”

“Why then did East Germans from all walks of life cooperate with the Stasi? The motives may be classed under give broad headings: political and ideological conviction; coercion and fear; personal advantage; emotional needs; and desire to influence official policy (97).”

“Whereas the Stasi like to stress the high ideals for its IMs…internal documents avoided a term like blackmail, opting for euphemisms like ‘atonement’ for a transgression…internal materials show that the Stasi was not averse to taking advantage of human weakness such as envy, hatred, and vanity in the recruitment process…so-called ‘compromising materials’ were used…dependence on drugs, abnormal sexual inclination and undetected crimes. (98)”

“IM Sandra wrote in her diary “now I am really important (99).”

Wolfe, Nancy Travis. Policing a Socialist Society: The German Democratic Republic. Westport, CT: Greenwood Press, 1992. ISBN: 0-313-26530-5 “Seldom did a Stasi wear MfS uniform…Stasi had a habit of wearing windbreakers and running shoes and often moved around in pairs…Stasi posed as fellow refugees along the transit routes used by foreigners; as customs agents, waiters, tourists guides, train conductors, maids, stewardesses, and musicians. Even in prison, an inmate could not be sure that his cellmate was not Stasi (74).”

Schmeidel, John. Stasi: Shield and Sword of the Party. London and New York: Routledge, 2008. “A willing agent needs psychological reinforcement to give him resilience. The ideal and seldom found was a fanatical but secret Marxist (122).”

Prouty, L. Fletcher. The Secret Team: The CIA and its Allies in Control of the United States and the World. Englewood Cliffs, NJ: Prentice Hall, 1973. “First, there are the open professional intelligence people. Next there is the vast army of support personnel, many of whom are buried as deeply as the ‘fun and games’ types; upon them depends the success of the clandestine side of the house absolutely. This is a "very large group", and it is certainly not all within the structure of the Agency…Beyond these fringes, there are additional thousands of CIA camp followers. There are members of the business world who enroll themselves or who have become enrolled for various reasons in the lure of ‘fun and games’; there are people from the academic world, the publications field and so on (280).”   

Davis, James Kirkpatrick. Spying on America: The FBI’s Domestic Counterintelligence Program. NY, NY: Praeger Publishers, 1992. “…Special Agent James O’Connor, from the New Left desk at the Philadelphia FBI field office. Its first issue…instructed agents to intensify contacts with radicals and dissidents so as to enhance ‘the paranoia endemic in these circles and to further serve to get the point across that there is an FBI agent behind every mailbox’ (10).”

“A third memo discussed the recruiting of college student informers between the ages of eighteen and twenty one to report campus extremist to the FBI. Operating within a network of other informants at their college including college staff personnel, postal employees, and local police, all feigning to be supporters of the cause—the informants would provide information to the FBI, and the bureau would then do its utmost to embarrass and disrupt the extremist (10).”

“Ultimately, informants came from many walks of life, including taxi drivers, bartenders, butchers, liquor store proprietors, salespeople, bill collectors, and more (16).”

“This informant network was designed to intercept extremist activities such as riots, before they actually took place. Later, however, FBI instructions became much more specific and called for diverting surveillance ‘into the involvement of black extremists in criminal activities, black militants who attempt to influence the black community, peddlers and “purchasers” of extremist literature, and efforts by foreign powers to take over the Negro Militant movement (16).”

“It was in these early April mailings that the Citizens’ Commission [to Investigate the FBI] made good on its threat to reveal the names of selected group of FBI informants…the informants included a college switchboard operator, various bank employees and the dean of student affairs…(16).”