Mobbing/Fair game harassment/COINTELPRO

Organized adult harassment uses any available means to discredit, undermine socially, financially ruin, thwart, drive out, neutralize or torment a co-worker, community nuisance, non-conformist or whistle-blower. The harassment almost always involves groups of 2-3 or more.

Leads: direct individuals in harassment. They are most often either staffing professionals or public health workers (see Directory of Audacity) .

Players: engaged in harassment to bait, vex or entrap including those whose role is to witness against the target (see Police Reports). They work in small to large groups with at least one lead. The groups are most often from religious based non-profits but there also appears to be a growing trend of using neighborhood community associations.

Spooks: people who act spooky to trip targets out or it may be done to draw attention away from some other activity.

Targets: subject of harassment

Shadows: people who report on you on a regular basis and point you out to people who are assigned to do the actual harassment or give a heads up to group waiting for you at the next destination on your regular routine. They take cell phone photos of you so that the group will recognize you when they see you and not harass the wrong person. Shadows are often retired people who appear to have either worked in public health or now have family members that do.

Shadows are also often people who appear to be mature IT students and may follow for a couple weeks to fulfill training requirements. Sometimes they can be exposed by varying your routine unexpectedly or if you suddenly standing up and you catch them reaching for their cell phones.  Shadows will also pair up for a day with other shadows when training someone else to take over. A shadow may travel across a state lines to point you out to a new shadow before heading back home.

Bystanders: people unaware the situation is being manipulated. Sometime this can include spouses, co-workers and family members (see My Family).

Witnesses: people aware the situation is being manipulated but are not participants in actual acts (see Matthew Powell in Bethany Community Church).

Black listed: a person prevented from working in an industry. Used against people for belonging to a banned group or having brought disfavor against themselves by a powerful interest whether or not they are personally accused of any wrong doing. Can also be used a short term form of punishment against an employee who misbehaved. For example, in the IT industry, contractors can be barred from working at a company for two years if a supervisor reports problems.

Red listed: a person or group targeted with harassment intended to discredit, disrupt, misdirect, socially undermine and isolate.

Psychological warefare: the methods and strategies used to harass, discredit, disrupt, misdirect, socially undermine and isolate. Used against whistle blowers, political dissidents and non-conformists. Used by KGB, STASI and CIA’s COINTELPRO program. In extreme psychological harassment, an individual is systematically subjected to frequent and prolonged stress for an extended period of time. This makes it difficult for them to psychologically cope and fight back. Extreme psychological abuse can also drive people to suicide, insanity or early death from acute stress. Exposing targets to biological substances such as Toxoplasmosis can facilitate this process.

Branches of Psychology

Behavioral Evolution: the study of how and why human behaviors and social organizations have evolved for optimal fitness relative to the environments in which they exist. Explains survival strategies, competing interests between genders and groups, reproductive and parenting strategies. Used to shape public policy.

Note: For those burnt out on race issues, because skin color is not a correlation for behavioral evolution it is rarely discussed. When we speak of the Inuit and Bushmen we are referring to people who live in nuclear families, rather than extended families, as an adaptation to extreme environments. When we speak of the Navajo, Saami, Maasi or Zulu we are referring to Pastoralists who subsist on herds of animals they own and care for. The theories about social and reproductive strategies are universal to one degree or another, so what can be said for any group can just as well be said for one’s own if, living under the same environmental conditions for many generations. For example, juveniles from wealthy homes, experience higher rates of pregnancy and criminal behavior as the result of the loss of a father figure even when their social economic status is not affected, particularly if a non-blood related relative is present in the home.

Behavioral Medicine (aka Psychosomatic Medicine): the study of how psychology and physiology affect how people unconsciously respond to circumstances and how to manipulate these factors. Used in preventive health, rehabilitation medicine, sports & military psychology, cult studies and PsyOps. Methodologies focus on manipulation of stress levels and reflexive behaviors. Psychological torture is based on reverse engineered strategies for coping with stress to instead induce acute stress.

Behavioral Science: the study what motivates people to behave in particular way and how to manipulate them (with or without the intent to heal). Used in organizational psychology, forensic psychology, education and marketing and politics. Methodologies focus on motivation and shaping behavior change.

Cognitive Psychology: the study of how people perceive, remember, think, speak, and solve problems.

Intelligence gathering terminology

Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PSYOP), have been known by many other names or terms, including Psy Ops, Political Warfare, “Hearts and Minds”, and Propaganda.[1] Various techniques are used, by any set of groups, and aimed to influence a target audience’s value systems, belief systems, emotions, motives, reasoning, or behavior. It is used to induce confessions or reinforce attitudes and behaviors favorable to the originator’s objectives, and are sometimes combined with black operations or false flag tactics. Target audiences can be governments, organizations, groups, and individuals.

Clandestine operations: Until the 1970s, clandestine operations were primarily political in nature, generally aimed at assisting groups or nations favored by the sponsor. Examples include U.S. intelligence involvement with German and Japanese war criminals after World War II. Today these operations are numerous and include technology-related clandestine operations.

Counterintelligence or counter-intelligence (CI) refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence organizations from successfully gathering and collecting intelligence against them. National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there is a wide range of potential threats, so threat assessment, if complete, is a complex task.

Covert Operations: According to the Department of Defense Dictionary of Military and Associated Terms, a covert operation (also as CoveOps or covert ops) is “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor.” It is intended to create a political effect which can have implications in the military, intelligence or law enforcement arenas. Covert operations aim to fulfill their mission objectives without any parties knowing who sponsored or carried out the operation. It is normally financed by government revenues but in this age of super-empowered individuals and corporations they could become a common tool of power beyond traditional war and diplomacy.

Covert operations are employed in situations where openly operating against a target would be disadvantageous. These operations are generally illegal in the target state and are frequently in violation of the laws of the sponsoring country. Operations may be directed at or conducted with allies and friends to secure their support for controversial components of foreign policy throughout the world. Covert operations may include sabotage, assassinations, support for coups d’état, or support for subversion. Tactics include the use of a false flag or front group.

The activity of organizations engaged in covert operations is in some instances similar to, or overlaps with, the activity of front organizations. While covert organizations are generally of a more official military or paramilitary nature, like the DVS German Air Transport School in the Nazi era, the line between both becomes muddled in the case of front organizations engaged in terrorist activities and organized crime.

This entry was posted in 4 Methodology, Glossary and reference. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s