Posted by jeremy on April 18, 2011 5:40 pm.
Some of this refers to concepts I haven’t talked about yet, post-take two. I’ll update the list as I continue to flesh out my second take on targeting.
Targeting
Word/phrase and analysis | Verdict |
---|---|
If a person’s beliefs are altered through a program of psychological torture, that person can be said to be brainwashed. Used by cults and military/intelligence organizations, brainwashing can be thought of as forced indoctrination into untrue, implausible and even indefensible belief systems. Both of these are excellent terms describing what has been done to, or attempted on, a majority of targeted individuals. |
Recommended |
The tactics used against targets can be characterized as terrorism. The tactics play on individual targets’ fears, bypass the conscious mind with extreme harassment episodes1, and/or use frightening misinformation - disseminated by others the target trusts. |
Don’t use lightly |
Many targets will experience psychological torture and/or physical abuse. Some may suffer debilitating/crippling electronic harassment. These things can be grouped together as torture. However, using torture to describe individual episodes may be inappropriate. And after hearing this word, some listeners will ask for examples of how you’ve been tortured. If you’re not prepared to answer questions like those, don’t use this word. |
Don’t use lightly |
Surveillance abuse is the abusive use of surveillance in ways that defy societal norms. The information gathered about a target of surveillance abuse will be used against that target, in harmful or distressing ways. |
Add to your vocabulary |
Referring to the entire ordeal as harassment might not convey what the problems are. It’s pretty obvious that harassment is only one tool serving a broader objective. |
Best used for individual episodes |
Psychological warfare, psychological operations, and psychological manipulation are the use of sophisticated techniques originally developed by military and intelligence organizations to change a target’s attitudes and perceptions. This terminology is important to be aware of, but it doesn’t cover damaging assaults or attacks on a target’s livelihood. |
Add to your vocabulary |
Describing stalking-like activities
Word/phrase and analysis | Verdict |
---|---|
High-tech stalking by proxy is probably the best explanation of what’s happening to a solid majority of targets who have found their way to sites like this one. It satisfies targets who perceive they are being stalked - the explanation is that they are, but by a much smaller number of people than they assume - and also explains much of the electronic harassment targets are reporting.2 |
Accurate description of activities in targeting |
Organized harassment is the broadest phrase I’ve been able to come up with to describe what many targets experience. “Organized harassment” encompasses the organized use of surveillance abuse, psychological warfare tactics, actual vandalism, secret boycotts and blacklisting, and even electronic harassment. |
Okay |
Community-based harassment is similar to organized harassment, and its wording is more potent in some ways, as it assigns blame (answering the question, “Who is doing this?”) while not singling any particular group out. However, it doesn’t address the issue of how problems follow the target from one area to another, nor does it address many kinds of electronic harassment. In short, community-based harassment may be “the answer” for some targets; but for other targets, community-based harassment may only be one component of the target’s ordeal, or may not apply at all. |
Potentially misleading |
The use of the word stalking gives undue weight to the target’s perception that large numbers of people are persistently following him, not allowing for mobbing (instinctual out-group hostility) or the possibly of highly deceptive operations intended to look like stalking3. However, stalking/harassment by groups of people does happen, and it can take a while to learn whether things are as they seem, or whether one is targeted4. |
Potentially misleading |
Mobbing is a form of group bullying that may have a ringleader; it seems to develop naturally out of covert communications between group members. I’ve written before that mobbing is essentially instinctual behavior5, exhibited by birds, small animals, and even insects6. While targeting might seem to be mobbing, especially in the beginning, this explanation falls short of explaining multi-year, multi-location harassment. Even though targeting is much more comprehensive than mobbing, mobbing may be an element of an individual target’s ordeal. A target might truthfully say, “I was mobbed out of my last job,” for example. |
Add to your vocabulary |
Gang-stalking (note the hyphen) is a popular term describing highly coordinated patterns of harassment, break-ins, conspicuous surveillance, and so on. This should only be used as a verb or gerund, and never to describe a person. One might say “[an organization] gang-stalked me for years”, or, “they’ve been gang-stalking me”, but one should never say “[he] is a ‘gang stalker’”. The term rolls off the tongue, and I use it. The problems come when you use the term in ways which suggest there is a gang who is stalking you. (High-tech stalking by proxy, above, can fool a person into thinking actual “gangs” are “stalking” him.) |
Use sparingly and carefully; in writing, use with a hyphen |
I’ve concluded that organized stalking, a phrase invented to address the perceived shortcomings of other terminology, is more misleading than gang-stalking, the neologism it’s meant to replace. Organized stalking implies agency (knowledge, cooperation, and ill intent) on the part of the people the target perceives to be stalking him. The contrived controversy over “gang-stalking” versus “organized stalking” distracts from the real issue, namely that the people on the street aren’t really stalkers. |
Misleading; search engine fodder only |
Terrorist stalking (political stalking) and vengeance stalking are in print, and even recognized as a problem by government sources7. Both types of stalking differ from classical stalking in that the objective is not to seek a personal relationship with the target, but to cause harm to the target (vengeance) or coerce the target (terrorist/political). However, terrorist/vengeance stalking aren’t nearly as coordinated or sophisticated as what targets are talking about. Meanwhile, high-tech stalking by proxy (above) can be disguised as these things. |
Use carefully |
Cause stalking: you have to understand the history of this phrase, first put into print in 2001. The term was used to describe religiously- or ideologically- motivated terrorist stalking.8 That year, Lawson published a book describing some harassment tactics targeted individuals were complaining about, and followed up in 2007, claiming cause stalking as his own phrase.9 This book has been discredited.10 |
Misleading; mention only to debunk |
A person who gives signs suggesting knowledge of a target’s private activities, or who is participating in a street theatre skit, will often be accused of perping, targeting, or triggering the target. That person might not be doing what he’s doing knowingly. There will be incidents where a person has been informed that particular phrases or actions bother a target, and does them anyway. This could be called malicious. |
Slang; overused |
Mind-invasive technology, electronic harassment
Term and analysis | Verdict |
---|---|
Electronic mind control is a catch-all term covering all kinds of mind-invasive technologies. Recommended in most cases. It may seem like overkill if you’re just referring to synthetic telepathy / V2K (below). |
Recommended |
A wide range of possible hazards or weapons have been identified as possible instruments of electronic harassment, defined as the use of electronic devices to remotely harass, torture, and/or physically harm a person. If you’re getting electronically harassed, it’s debilitating or crippling, and you can explain why, it’s appropriate to refer to it as electronic torture or simply torture. This terminology has been claimed by others with different meanings11, and can be misleading in other ways. As previously discussed, electronic mind control can be disguised as any form of electronic harassment that doesn’t leave traces behind, and sometimes, even some that do.12 If you’re unable to categorize an electronic harassment episode as a form of electronic mind control with certainty, it’s better to use this phrase - you might volunteer that “it could have been mind control”. If an episode is definitely some kind of electronic mind control, you should categorize it that way. |
Recommended |
Mental surveillance is the form of surveillance that many targets have reason to believe they’re under, through a lengthy process of elimination and eventual direct feedback. Mental surveillance could gather information on every sensation and impulse that passes through the brain - including sensory input and verbal/visual thoughts. This terminology doesn’t presuppose any specific kind of technology. You can think of it as a more focused way of talking about mind reading or thought reading. Like other forms of surveillance, this is essentially unprovable, and a person only knows he’s being surveilled if he’s ‘tipped off’. |
Recommended |
Many targets refer to mental surveillance (above) as remote neural monitoring, citing a questionable early 90’s court filing. The terminology seems to make the speaker sound more authoritative, but:
|
Not recommended, but popular; search engine fodder |
Some targets describe the surveillance they’re under as satellite surveillance, referring to a self-published book about the subject13. This is a really bad idea, as they have no proof they’re under surveillance by any particular device, including a satellite. It also may lead listeners to believe the speaker is saying a satellite is dedicated to watching him. This is exactly the kind of phrasing that leads most people to label targets as delusional. |
Avoid |
Synthetic telepathy is only one aspect of what’s possible with electronic mind control. Nevertheless, it conveys the unwanted invasion of privacy or harassment that comes with these technologies. Furthermore, this terminology has been used by the US military and picked up by the mainstream media.14 |
General use, search engine fodder |
Evoked actions or subconsciously evoked actions refer to the use of electronic mind control technology to get individuals to act out. The work of Jose Delgado corroborates what many targets have learned the hard way: the conscious mind rationalizes externally-evoked behavior; a person being made to act wouldn’t be aware his actions weren’t the product of his free will. The terminology supersedes “subliminals” (below). |
Use in the context of discussions of electronic mind control |
I’ve come to the conclusion that “subliminals” or subliminal messages are a potentially misleading framing of mind control technology. The use of these phrases/words helps to support the vague idea that the problems targets have stem from the abuse of “voice to skull” technology (below). Subconsciously evoked actions (above) is a much better way of describing actions that individuals are made to take. However, it’s possible subliminal messages may be used to jumpstart a train of thought, or to influence a target into thinking about a subject. One person has suggested inner voice cloning to describe this. |
Use with care; avoid in describing evoked actions |
Psychotronics was a term used by Dennis Kuchinich in HR 2977 to refer to mind-invasive technology. Other than that, it’s terminology that’s not widely used. Plus, it just sounds weird. |
Search engine fodder only; not recommended |
Mind control: many unaware targets will search for sites using this terminology. However, the phrase means different things to different people. There are methods of mind control that don’t have anything to do with the use of technology. Even if you restrict the use of this term to the context of government abuses, you’ve got at least a few different groups of people with different issues (and a lot of overlap), such as targeted individuals, MKULTRA/Monarch survivors, and victims of brainwashing. |
Search engine fodder only |
Mind reading doesn’t convey what else can be read. Also, targets might be misled into believing there is some sort of ‘brain scan’ capability, when in fact it’s the target’s thoughts or mental activities that are being read. Finally, there is some confusion over the use of this terminology in other contexts; for example, “mind reading” scanners are being marketed for use in airports, when what they really are is “nervousness reading” scanners15. |
Search engine fodder only |
“Remote neural” is sometimes used to refer to both remote neural monitoring and electronic mind control. |
Slang |
“Holograms” are sometimes used to refer to instances of augmented reality.12 Unaware targets may think they’re experiencing holograms, so any use of this terminology online should at least explain the possibility of augmented reality. |
Slang; misleading; debunk |
V2K or voice to skull is terminology originally invented by the US military to describe the military use of the microwave auditory effect, and pulled from military web pages a few years ago16. The term “V2K” is misleading to targets because it misrepresents the real capabilities of the technology:
|
Slang; misleading |
The people
Using improper terminology to describe the participants playing a role in your life as a target can be highly misleading to others, as well as yourself. Learning to use the correct terminology helps you come to terms with what’s really happening, and helps you talk cogently about targeting with the general public.
These words are all negative or unflattering labels, and applying them necessarily involves accusing people. One of the biggest problems targets have is a tendency - particularly in the beginning - to make accusations that will often turn out to be unfounded. Assume good faith; don’t assume that simply because someone makes a knowing remark or gesture, he knows anything at all.
Term and analysis | Verdict |
---|---|
A handlerstrong> is a person watching a targeted individual and managing his life, using mind control techniques such as persuasion, threats, and deception. This term suggests a real-time and highly invasive connection linking the handler to the target.17 |
Recommended |
An operative or op undertakes long-term operations, some of which may involve a target. An operative will be aware of mission objectives, but might not be aware of their significance, due to the need-to-know principle. Operative is a catch-all term encompassing agents, informants, and assets. A good example would be the reports of small teams of men taking up residence near some targeted individuals. |
Use judiciously |
Patsies are criminally versatile or criminally-credentialled individuals manipulated into committing specific criminal acts on someone else’s behalf; they take the brunt of the blame for what happens. In the event a patsy acts out, most onlookers will assume that everything is as it seems, and be satisfied with official explanations. Investigators may not be so easily fooled, but the availability of an obvious culprit (and a lack of incentives to dig further) will usually thwart a more thorough investigation. Many targets are in agreement that the tools used against them are also sometimes used to create patsies. |
Use judiciously |
Dupes are manipulated into acting out, or acting against a target.18 Unlike patsies, their actions fall short of serious illegality, usually only involving overt (obvious) hostility. Because they don’t feel they have anything to hide - that is, they aren’t doing anything illegal - they will at least be willing to tell the authorities what they’ve been told about a target; this is how one over-the-top smear campaign was recently exposed.19 Many targets believe that certain authoritarian venues or social networks are used to spread smears about them, thereby creating dupes. |
Use judiciously |
Pawns are unwittingly used against targets.18 I’ve previously suggested that most “covert aggression” targets perceive is actually coming from mind-controlled pawns20, or from other innocents who are unaware of the significance of their actions with respect to a target.21 |
Use judiciously |
An agent is employed by an organization, such as a government, and acting on its behalf. Experienced agents like to operate under the cover of the law (if they think there’s a chance they might get caught), and will try to manipulate lower echelons, informants, assets, or local yokels into doing their dirty work for them. |
Use judiciously |
“Local yokels” is an example of derisive terminology used by federal authorities to refer to local authorities who are told a pack of lies about a targeted person or group.18 The locals act on the bad information, and they have to deal with the consequences.22 |
Use caution |
Informants (or snitches) are individuals who provide intelligence to an organization (or an agent of the organization). Some informants may be paid for tips, which creates perverse incentives to manufacture evidence. Police informants may be motivated by non-monetary factors, such as staying out of prison in exchange for the tips they provide. Volunteer informants, whether affiliated with an organization or not, have their own perverse incentives; they may see snitching as a way to get rid of someone they dislike, or to bring down the competition. |
Use judiciously |
Assets are individuals with no formal ties to any organization. An asset has particular skills, talents, credentials, or other qualities which make him useful to a controlling organization, and will be moved into place to use in a particular assignment - such as operations involving a target. The asset will be controlled, often via blackmail. Assets act knowingly. Professionals who risk their licenses to punish a target would fall into this category. |
Can’t prove it |
A case officer is like a handler, but the use of the term implies the person is acting under lawful orders, and has been “assigned” to the target through a chain of command. |
Not recommended |
Perpetrators are individuals involved with your ordeal who have committed actual criminal acts.23 What distinguishes a perpetrator from a patsy (above) is the intent and knowing participation; the perception of many TI’s that perpetrators are “evil” is right on the mark. This label should not be applied lightly. Just because you feel someone nearby is acting funny, doesn’t mean he’s a perpetrator. |
Overused |
Targets will often label perceived perpetrators - that is, anyone who (in the target’s opinion) is “in on it” - as “perps”. A less common use: anyone who has perpetrator psychology (manipulative, exploitative, corrupt) but isn’t necessarily hostile to the target. |
Slang and self-isolating jargon |
Stalkers are perpetrators who are guilty of stalking. According to law and common use, a person who persistently follows a person would be stalking him. Most of the individuals targets encounter don’t qualify as stalkers under this definition. If you encounter strangers who seem to be hanging around, and give subtle signs they’re “in on it”, that doesn’t mean anything; it could be more of that covert aggression I’ve been attributing to mind control technology abuse20. This label, too, is overused. |
Avoid |
You
A targeted individual (or T.I.) is a person who has been targeted for destruction, neutralization, or experimentation/torture by a powerful, state-sanctioned or state-sponsored organization. To an outsider, a T.I. looks like someone who is complaining about, literally, nothing. The numbers of targeted individuals are small enough that you alone, by your actions, can shape the connotations of this term for better or worse.
Choose your words wisely.
References
- ^ Animal mobbing behavior (Wikipedia)
- ^ National Victim Assistance Academy Textbook, chapter 22, 2002.
- ^ "Stopping a Stalker: A Cop's Guide to Making the System Work for You" by Robert L. Snow, published in 2001 (Google Books).
- ^ "Cause Stalking" (Amazon)
- ^ "Army developing 'synthetic telepathy'"; MSNBC, 10/13/2008.
- ^ "Mind-reading scanners could change airport security"; Associated Press, 1/8/2010.
- ^ "Army Yanks ‘Voice-To-Skull Devices’ Site"; Danger Room (Wired Magazine), 5/8/2008.
- ^ This is an age-old tactic which has a new high-tech twist, thanks to fusion centers and military intelligence being fed to police officers. See: "Fusion Centers To Obtain Access To Classified Military Intelligence"; ACLU, 9/15/2009.
Footnotes and further reading on this site
- ^ “Extreme harassment episodes”; September 2010.
- ^ “High-tech interstate stalking by proxy: understanding the crime”; September 2010.
- ^ In my series on organized deception, I point out that there are signs early on that things are not as they seem. I get more explicit in “Totally undetectable mind control: subliminal commands, explained”, pointing out that individuals in the target’s vicinity can be made to ‘act out’ without their knowledge.
- ^ “Only time, and travel, will tell”; January 2011.
- ^ “Oxytocin hormone promotes “out-group aggression”, study says”; June 2010.
- ^ “Cause Stalking is a hoax, perpetrated to mislead targets”; October 2010.
- ^ “An introduction to electronic harassment”; March 2011.
- ^ a b c “Obvious and non-obvious uses of electronic mind control”; March 2011.
- ^ I review that book, and several others, in “Targeting-related books” (October 2010).
- ^ A reliable source tells me that “handling” of the sort targets are aware of isn’t restricted to targeting. Many successful entrepeneurs, inventors, and artists may also have handlers, without even being aware of it.
- ^ a b c While many targets feel they know who is responsible for their targeting, the person who seemed to set everything off might be a pawn or dupe of the real perpetrators. However, just because someone’s been used in this way, doesn’t mean he’s innocent.
- ^ “A perpetrator is tried and convicted”; April 2010.
- ^ a b “Your mind-controlled perps (and why they don’t get a free pass)”; August 2010.
- ^ “Taking credit”; September 2010.
- ^ As a general rule, the persons organizing a target’s campaign can be considered perpetrators or stalkers.
They are still stalking me… More of the same tac-tics, but recently at the laundry-matt a seemingly new move was to block my usual path from the washer to the dryer. A family of 3&1/2 came in shortly after I did and posted up in position like they were normally doing their laundry at first I thought nothing of it but when at myApt. I realized that once again it was the perps/stalkers (I can feel more now when the EMF device is being used on me & recall years ago of it was them using the device on me even back then) fir the family could’ve chosen any washer/dryer as it was not that crowded and the way they set up was actually obvious to block me and the emf device was used on me when I went to squeez by saying excuse me to make me bump the clothes cart holding the baby in its hand-held crib cause before going by I knew I had control of my cart and a straight line of path. It was an involuntary movement of my right arm causing me to bump that cart and I heard the perps/stalkers over the ELF make audience sound effects like ohh & ahhaa, but I didn’t realize it till later… They have perps/stalkers come up to me at work (I’m a cashier & work the floor pushing sales& credit card apps.) & start these seemingly normal convos, but then phrases/topics are delved into by the perp (now I know its a perp) that intrest me or that I’m highly opinionated about then I look around slowly and see who is the other perp taking notes/obviously watching its the one who is watching then sees you see them then looks away for amoment and then looks back to continue watching your behavior and this perp even mumbled something when he realized that he was made… So let us not be fooled by these tac-tics this was street theatre although we were’nt in the street. Please share this Jeremy so that we all can stay not fooled as much as we can and not be provoked by this evil
8 comments
I have a question, regarding satellite technology reference. I have one that is to the back of my home that has been here for years, and is sometimes low in the horizon, or difficult to locate, but can be seen if yo.u look carefully. Sometimes red lights blink on this, and a lot of people in the area have noticed it. My sister in another location has one just like this at her house in New Mexico. I have no proof what this satellite is doing, or why it is here. My guess is that its purpose is as an energy weapon. I dont know if other targets have reported this occurance.
80 comments
If it’s visible to the naked eye, it’s not in orbit, and it’s not a satellite. Your military friends may be calling it a satellite, but they’re misleading you. Don’t believe me? Check out a dictionary, or Wikipedia:
http://en.wikipedia.org/wiki/Satellite
I suspect some TI’s are enlisted in UAV testing programs.
There’s another guy I’ve heard from who’s seeing UAV’s that are roughly the size of small birds (definitely not birds, they’re too mechanical) hovering near his residence and zipping away when he tries to catch up to them. Naturally he’s not going to be believed because of everything else.
702 comments
Thanks Jeremy, and I do believe you, but I am confused about technology, and believed the military source, who looked at it and said “It’s government equipment” I said what does that mean? He said, “It’s a satellite.” The object is rather large, and could be mis-identified, as a UFO. It is several stories tall, and oval in shape, with a series of red lights that occasionally come on and can be solid, or blinking. I will look up UAV testing programs, as that is new to me. Regarding the mechanical bird, I have one at my house, that I thought was part of a noise harrassment program. I saw a picture of a robot hummingbird, that is a drone, developed for the Pentagon. I have not researched this, but is was supposed to be built by AeroVironment, looks like the real thing, takes pictures, for high tech espionage.Thank you for your help, so that I can get to the truth!!!
80 comments
I think it is very important to have the clarity of defining what we are dealing with. An excellent tool, and an excellent job you have done, Jeremy. Thank you!
Jeremy, Could you explain how the use of drones, or UAV testing affects targeted individuals? I see they are used for surveilance, and the military uses in war, like missles, but what exactly would they be testing on citizens? Just sign me confused and uninformed. Thank you!!
80 comments
They might be using the TI’s residence as training grounds for UAV pilots, or they might be testing artificial intelligence software that pilots UAV’s. In fact that last one sounds like a really good possibility. I can imagine how the skies are going to be swarming with those things, and there’s no way they can hire enough pilots to fly them all. So they need software.
702 comments
I think they would have no problem with staff in this military town, with remote piloting UAV’s. I am just a few miles from the hill country with a decreased population, so this location is very noticable, with a lot of subdivisions, near the medical center. The young people going in to the military grew up gaming so that would be easy for them to learn, and they would have a blast doing it too. I just found the military applications, and still don’t know how it relates to targets. Truth will come, but I am still confused. Thanks for responding, and if you find out anything, I would love to hear about it, Thanks for your time.
80 comments