Artist: Lora Zombie Contents A. General Strategies 1. Shine a light on the cockroaches. 2. Take calculated risks. 3. Exploit technology. 4. Never give up. 5. Join forces with other victims. B.…
Tactics for Fighting Back | Fight "Gang Stalking" Fight "Gang Stalking" Expose illegal stalking by corrupt law enforcement personnel Tactics for Fighting Back Artist: Lora Zombie Contents A. General Strategies 1. Shine a light on the cockroaches. 2. Take calculated risks. 3. Exploit technology. 4. Never give up. 5. Join forces with other victims. B. Tradecraft 1. Fortification 2. Disappearing 3. Computer & Phone Security 4. Spy Gear C. Interacting with Perps 1. Scripted Responses & Fake Phone Calls 2. Taking Photos & Videos of Stalkers 3. Making Noise 4. Suppressing Noise 5. Always Smile at the Goon Squad 6. Killing a Stalker in Self-Defense D. Exposing the Perps Locally 1. Emails & Letters to Local Officials & Organizations 2. Flyers ***** 3. Business Cards 4. Window Signs & Bumper-Stickers 5. Chalk Messages 6. Self-Inking Stamps 7. Banners 8. Calling the Police 9. Interacting With Police Officers E. Exposing the Perps Nationally 1. Letters to Congress 2. Online Petitions 3. Calls to Radio Programs 4. Freedom of Information Act (FOIA) Requests 5. Posting Comments in Online Forums 6. Letters & Emails to Journalists & Non-Profit Groups A. General Strategy _______________ “What is of supreme importance in war is to attack the enemy’s strategy.” – Sun Tzu, The Art of War _______________ 1. Shine a light on the cockroaches. Organized stalking is a manifestation of the view that intelligence and law enforcement agencies, their corporate cronies, and the military-industrial complex should have supremacy over all other elements of American government. Even if you think that is a desirable power structure for national security reasons, it is impossible to deny that it grossly violates core principles of the U.S. Constitution. Organized stalking also violates stalking prohibitions under federal law and state laws in all fifty states. One of the implications of that is that the perpetrators need to keep it a secret. This is a primary difference between the use of organized stalking as a domestic counterintelligence strategy in America today and its use by the Stasi (state police) in communist East Germany: in the U.S. it is illegal. This was true during the original version of COINTELPRO also – and was a primary reason the U.S. Senate conducted its Church Committee investigations after the FBI’s activities were exposed by civilian activists. Many of the tactics and strategies employed by the Stasi were virtually identical to those now used (and largely out-sourced apparently) by the FBI and other agencies in the U.S. In East Germany however, the Stasi wanted citizens to be aware that their society was infested with spies because it furthered the communist party’s goal of political control. In the U.S., such a public awareness would trigger a backlash against the abuse of power by the government and its cronies, so it is kept under the radar. So the Achilles’ heel of gang stalking is exposure. From the perspective of intelligence and law enforcement agencies and corporations which use organized stalking as a secret illegal weapon for subversion, the perfect operation is one in which the target becomes progressively isolated, impoverished, emotionally degraded, and eventually commits suicide. That does happen in some cases – the most prominent example being the FBI’s psychological torture of actress and political activist Jean Seberg. Seberg’s case was tactically successful in the short term (they destroyed her emotionally), but it was ultimately a strategic failure for the FBI because its crimes against her ended up on the front pages of national newspapers. Without question, the vast majority of Americans do not want to live in a society infested with spies working for a Stasi-type government. To the extent that you can educate your fellow citizens about the creepy and illegal stalking activities of private security mercenaries, vigilantes, and corrupt law enforcement officers, they will be on your side. Targets of organized stalking must wage a two-front war: we must act locally to expose the harassment to neighbors and others, and we must expose what is happening on a national level as well. Both objectives are critical. __________________________________________________________ 2. Take calculated risks. A strategic axiom in all arenas of competition and warfare is that the side which is at a disadvantage should be more aggressive. In a sports game, the team with a points lead can often exploit its position by playing cautiously. Conversely, the opponent with the points deficit has a logical incentive to take more risks. Targeted individuals need to exploit asymmetrical warfare principles. As much as possible, we should employ tactics which are unpredictable, creative, cheap, simple and bold. The worst thing a victim of organized stalking could do would be to adopt a cautious, defensive posture. Counterintelligence subversion is based on a strategy of intimidating the victim to the point that he or she is afraid to go anywhere or do anything without being constantly vigilant. That mental state cannot be sustained for a long period and it diverts energy and time and resources which could otherwise be devoted to exposing the criminals who orchestrate and perpetrate the stalking. Organized stalking is cowardly and illegal, but it is not strategically stupid; it employs tactics which are effective, and difficult to prove legally. Also, it exploits the superior financial and political resources of the corrupt agencies and their corporate cronies which use it as a weapon. We need to change the whole game and play it on our terms. Give the perps and their handlers some reasons to be uncomfortable. The way to throw a wrench into the Stasi machine is to expose its crimes to the public. Sometimes that requires stepping outside of your comfort zone a bit. By the way, an additional benefit of adopting an offensive strategy is that when you are focused on working aggressively to undermine the criminals, the emotional effects of their harassment will diminish greatly. Civil Disobedience Anyone who is already officially or unofficially blacklisted, should exploit that by taking the game to the gang stalkers. This is not to say that you have nothing to lose: you should avoid doing things which could lead to serious legal trouble. Fortunately, most of the tactics on this webpage are 100 percent legal, and the few which are in a grey area are acts of non-violent civil disobedience. Incidentally, civil disobedience is a well-established, respected, and morally legitimate way to protest injustices. For targets of criminal harassment by corrupt members of law enforcement agencies and security contractors, it is even more than that; it is a necessary form of self-defense. You do not need to wade more deeply into the philosophy of civil disobedience for the purposes of understanding its role in fighting gang stalking (or fighting corruption generally), but if you want to pursue the subject, you might want to start with this classic essay by Henry David Thoreau: Civil Disobedience Another essential document on the subject is “Letter from Birmingham Jail” by Martin Luther King, Jr. In addition to being among America’s most famous proponents of civil disobedience, King was a target of intense systematic persecution by lawless thugs in the FBI. Several things are worth noting about the example of Martin Luther King, Jr. Although he was the target of cowardly and illegal harassment by creeps in a rogue law enforcement agency, he never bowed to their efforts at intimidation. Also note that King is now honored by a national holiday – whereas FBI Director J. Edgar Hoover is mostly reviled. The Streisand Effect One of the reasons that most of the tactics listed here do not involve much risk for the targeted individual is that gang stalking perps have to worry about the following phenomenon. The “Streisand Effect” is when an effort to suppress information inadvertently causes an increase in attention to the information. An online archive of 12,000 photographs of the California coastline – created to document coastal erosion – contained an aerial photograph (seen below) which included the Malibu mansion of singer and actress Barbra Streisand. In 2003 Streisand filed a lawsuit to remove the photograph from the archive on the grounds that it violated her privacy. A judge eventually dismissed the lawsuit, but news coverage of the litigation brought much more attention to the photograph than it would otherwise have received. Before Streisand filed her lawsuit, “Image 3850” had been downloaded from Adelman’s website only six times; two of those downloads were by Streisand’s attorneys. As a result of the case, public knowledge of the picture increased substantially; more than 420,000 people visited the site over the following month. – Wikipedia Click on image to enlarge. Barbra Streisand’s Mansion Gang stalking perps (including corrupt members of local law enforcement agencies) will not want to attract attention to their gang stalking crimes by doing battle with you in a public way, so they have to be very reserved in their efforts to suppress your exposure of what is happening. You should exploit that. Incidentally, I don’t mean to bash Barbra Streisand – who, for example, offered her assistance to whistle-blower Daniel Ellsberg when he was facing serious legal danger because of his revelation of the Pentagon Papers. __________________________________________________________ 3. Exploit technology. Technical counter-measures can seriously disrupt some forms of surveillance and harassment used in organized stalking. If you can afford to buy counter-surveillance and security equipment (cameras, alarm systems, locks, safes, firearms, bug detectors, signal jammers, etc.), you should do so. Be as discrete as possible about acquiring and implementing such measures so as not to make them easier for your stalkers to defeat. If possible, try to have friends or relatives make the arrangements and purchases, since they are less likely to be under constant surveillance. Using technical security measures to fight gang stalking has two major limitations though. One is the cost. Most targeted individuals lack the financial assets to take advantage of many security technologies; people with significant resources and connections are probably not often selected as gang stalking targets in the first place since they can more easily fight back. The other problem with a strategy that relies primarily on technical counter-measures is that you will essentially be engaged in a sort of “arms race” with people who have a deeper knowledge of such matters, as well as deeper pockets. Nevertheless, it is smart to exploit spy gear and security systems as much as possible within your budget. Some effective technological counter-measures are either free or relatively affordable. I try to address those in the sections below. __________________________________________________________ 4. Never give up. Persistence will lead to victory. Already the digital public square is filled with information and rhetoric which the U.S. government would prefer to censor but cannot, posted by Americans fed-up with the corruption, secrecy, and abuses of power in the upper echelons of government and corporations. Even the federal government’s massive self-serving security apparatus and its abettors in mainstream media institutions cannot effectively monitor and control the flow of information anymore. Dissent is harder to marginalize and censor in a digital landscape filled with whistle-blowers, citizen-journalists, bloggers, and alternative media websites (from all across the ideological spectrum). Independent thinkers, entrepreneurs, entities such as WikiLeaks, and movements such as Anonymous have created an information network in which citizens no longer have to wait for the New York Times to expose the next Pentagon Papers conspiracy – or the Washington Post to expose the next Watergate scandal. Even the New York Times admits this: “News no longer needs the permission of traditional gatekeepers to break through. Scoops can now come from all corners of the media map and find an audience just by virtue of what they reveal.” – David Carr, New York Times, June 16, 2013 One of the objectives of gang stalking is to isolate and break-down the targeted individual by creating the impression that the whole society is against him or her. Don’t make the mistake of believing that false impression. Although the number of people who participate in gang stalking must be large, they are still a very small minority compared with the general population. The vast majority of Americans do not wish to have our society become a creepy police state filled with citizen spies, as happened in the communist nation of East Germany. Gang stalking victims need to challenge the careerist statist rodents in the food chain, and support political reformers – libertarians, progressives, and others – who defend the individual rights and freedoms of Americans against the predatory inclinations of powerful government and corporate institutions. __________________________________________________________ 5. Join forces with other victims. Join forces with other gang stalking victims by concentrating on just a few online platforms to share information and expose gang stalking. Not only are gang stalking victims often in various stages of financial ruin because of their enemies, and short of contacts because of their isolation, they also don’t have one clear source to which they can go for information and support. African-Americans have the NAACP; American Muslims have CAIR (Council on American-Islamic Relations). If members of those communities are looking for advocacy, they know where to go. Targets of gang stalking in contrast are isolated individuals with numerous scattered, marginally-useful websites to go to for information, and those are mixed in among search results with numerous disinformation websites created by government minions. To have any hope of ever gaining the attention of Congress, targeted individuals must at least begin coalescing around just a few major information sources. This website is intended to be one of those. For every legitimate anti-gang-stalking website, there seems to be a dozen which are mostly or completely filled with garbage. Every gang stalking victim who has searched for information online knows this is true. As you visit websites which appear in searches about gang stalking, you first see something which appears to be a possible source of useful information, but on closer look is just a lot of vague B.S. mixed with UFO abduction story links or whatever. I have listed some of the few exceptions in the “Recommended Websites” page of this blog. There are other legitimate sources as well, but not many. Consequently, anyone (who is not a targeted individual) searching online – for example, a journalist – will mostly encounter what appears to be evidence that gang stalking is the product of the imaginations of paranoid and mentally-challenged individuals. Merely creating one more blog or Facebook page to get lost in the ocean of such information is not going to solve the problem. If you want to create an anti-gang stalking website, blog or Facebook page, by all means go ahead (in fact I encourage it), but you should seriously consider also trying to help the community of gang stalking victims coalesce around a few locations – instead of existing only as isolated points spread across the web in a sea of disinformation. Toward that end, I humbly suggest that you try to promote this website – FightGangStalking.com – as a comprehensive source to which people can go. This suggestion might seem self-serving, but you can see for yourself that I’m not making any money from this website: there’s nothing for sale here. I will continue attempting to publicize the best suggestions, websites, articles, video links, etc. about gang stalking as they come to my attention by listing them in this website. Instead of having each victim of gang stalking re-invent the wheel and create a website which attempts to explain gang stalking from scratch, consider creating a more limited website, Facebook page, or blog, which describes your experiences with gang stalking, but also prominently features a link to this website. As mentioned above, another thing that would be helpful is to go online and post comments in other websites, forums, Facebook pages, Twitter messages, emails, etc.) referring people to this site. As much as possible, you should do that both at gang stalking websites and in the comments sections beneath articles in major news websites, so they will be seen by non-victims of gang stalking as well. That’s critical. One very easy way to post such information is to simply copy information from this website – if it relates to an article or a forum discussion. The best way to connect with other victims of gang stalking is online – although you must beware of perps who pose as targeted individuals (see the “FFCHS” page of this website for details). In general, be suspicious of anyone reluctant to publicly criticize the apparent participation in gang stalking by law enforcement officials. The very best thing would be for victims to create a legitimate victims’ support group to lobby for the exposure and elimination of gang stalking by petitions and public demonstrations. If any particularly ambitious gang stalking victim wishes to spearhead an effort to form such a group, please email me about it so I can promote it here. Even though it would inevitably be infiltrated by some perps, it could still be very effective. B. Tradecraft I am using this term somewhat loosely here; from the perspective of anyone targeted by America’s Stasi, everything on this webpage is our “tradecraft.” Traditionally, the term refers to the set of specialized methods used by intelligence and counterintelligence agents. 1. Fortification Although it is impossible to make your residence completely secure against all potential threats, you can make it far more risky for intruders by taking certain precautions. A full discussion of home security concepts and hardware is beyond the scope of this website. I will mention a few principles here – and try to add more information in the future – but I encourage you to invest some time reading more about this subject and exploiting established security practices and technology. Here is an example of some good basic advice on this topic. Begin by implementing standard basic security measures. Secure all your windows from the inside with bolt locks, and test them from the outside to ensure integrity. If you have multiple entrance doors, secure all but one of them from the inside with bolt locks before departing, so as to restrict access to a single door. Install a simple, self-contained alarm system on the entrance door. Arguably, a simpler system will be more difficult for stalkers to defeat than a more expensive sophisticated remotely-monitored system. Advances in digital audio and video recording devices are making surveillance cameras better and more affordable all the time. Install several small cameras to monitor the entrance from different angles. Think creatively about how you might arrange for some unpleasant surprises to occur for anyone who visits your residence uninvited while you are not home. Various laws could apply depending upon the country and region where you reside, but if you determine that it is legally appropriate to implement certain arrangements that are physically dangerous for intruders, that would certainly create some interesting options. Those options could be very cheap and low-tech also – perfect for asymme… truncated (77,853 more characters in archive)