The Hidden Evil Volume II.doc

(677 KB) Pobierz
The Hidden Evil Volume 2

173

 

Mark Rich

“The Hidden Evil”

 

Volume II Part I

 

 

 

 

 

Introduction to the Hidden Evil

Now that we understand who runs who runs this planet, it will be easier to see how such a secret policy can exist. It also becomes evident why money is no barrier. The reason of course is that they make the money. The Hidden Evil, is also called Gang Stalking, Cause Stalking, Public Mobbing, an Electronic Concentration Camp, Covert War, Mental Rape, and a variety of other names.(*)

It involves two major components. First, the use of Non-lethal Weapons (NLW), which includes Directed Energy Weapons (DEW). Second, heavily networked groups of plain-clothed citizens who encircle targeted people in public. This network appears to involve volunteers who are part of a state-sponsored Neighborhood Watch program, as well as individuals and groups of informants with no official connection to the state. As I'll demonstrate, mainstream news has indicated that one in twenty-four citizens will be recruited as informants. Some publications contend that the goal is the recruitment of one-third of the population.

Organizations from the federal level downward participate in the harassment, which includes local stores and restaurants. This program is not in the process of being created, it is already here. It is thoroughly embedded in most major communities. It is happening in all NATO countries. The program has been operational in some form since at least the early 80s, when families of people with direct or indirect connections to federal agencies were targeted.

Some people spent a significant about of time designing this program. Influential people have ensured its survival. It is also almost invisible and traceless. Some of the organizations I've found to be likely responsible for the Hidden Evil, contain people that are considered to be our world leaders. On the surface, they appear to be humanitarians.

The pretext for the existence of this program is presumably to identify and track potential threats to national security and to rid communities of undesirables. As I'll demonstrate, citizen informants have been used to stalk and harass people in other countries for the same reasons. Microwave weapons have also been used on dissidents. U.S., German, and Russian intelligence agencies have all used these tactics. The Hidden Evil appears to be a culmination of them, which from what I have learned, has been fine-tuned with the help of Establishment Think Tanks.

Julianne McKinney is a former army intelligence officer and director of the Electronic Surveillance Project Association of National Security Alumni, which was an organization composed of former intelligence officers dedicated to exposing excesses by the U.S. Intelligence services. Her preliminary report, Microwave Harassment and Mind-Control Experimentation published in 1991, is a well-documented outline of these activities.

According to her interview on the Republic Broadcasting Network (RBN), these activities have increased significantly since the report was published. She kept this organization operational for four years using her personal funds. She has about 40 years experience with this subject and has talked with and interviewed hundreds of targeted individuals. I'll be referencing her report and her interview on the RBN throughout this book.

Dr. Reinhard Munzert, scientist, psychologist, and university lecturer has authored three books and over 100 articles. He began investigating this phenomenon with the aid of his students after learning he was targeted. His article, Targeting the Human with Directed Energy Weapons, which was the number one listing on Google for two years, will be referenced, as well as his interview on RBN.

I'll also be referencing the work of Leuren Moret, particularly her interview on Vancouver Co-op Radio CFRO 102.7 FM, on August 8th 2005. She is the former Environmental Commissioner of Berkeley California and the president of Scientists for Indigenous People. She has worked at two US nuclear weapons laboratories as a geoscientist and has contributed to a UN sub-commission investigating depleted uranium. She, Julianne and Dr. Munzert have been on the receiving end of this harassment.

In her article, Uncovering the Truth About Depleted Uranium, Moret speaks of her personal Gang Stalking experience, which she refers to it as Mobbing. She writes, "'Mobbing' is the purposeful and strategic institutional gathering of all information about an individual by using any method--legal or illegal. Contact for this purpose is made with neighbors, classmates, former partners, family members, former employers, teachers, church members, good friends and even your family tree..."

She continues, "Everything must be known about the support system around you that makes your life possible." This includes, "[the] assessment of strategic resources and future income (finances, mobility, cars, insurance, credit cards, bank safety deposit boxes, post office boxes, wills, health records, birth certificates, transcripts and photographs) is made without your knowledge. The purpose of mobbing is to drive the target individual out of the job force for the rest of their life; the bigger goal is to drive them to the ultimate self-destruction: suicide. The information gathered ... is used to take your life apart ... and to attempt to make you look crazy." She adds, "Your children are harassed, they come home with belongings missing and stories of teachers harassing them."

The psychological aspect of the group harassment which takes place in public is identical to Mobbing; it has the same group dynamics. For that reason I'll make references to Mobbing throughout this book. The Mobbing phenomenon has been well documented and studied in other countries for years. However, it is only now beginning to receive attention in North America.

Mobbing, also known as "psychological terror" involves the systematic harassment of an individual by a group of individuals in the workplace, and according to the authors of the book Mobbing, also in public. In the workplace, the group is often rallied by an authority such as Human Resources. It includes rumors, setups, and skits intended to humiliate the target and make them appear incompetent.

The documented mainstream exposure that Mobbing has received will help us understand how thousands of people in some major cities can be recruited to systematically attack individuals. The Mobbing I'm referring to is committed by multiple people using subtle but repeated harassment, which takes place in the workplace and is difficult to prove. It is used to kick a person out of the workplace or even workforce while leaving little trace. The logic is that it is less of a liability for the organization if you "voluntarily" leave than if they fire you. In addition, some organizations with sadistic intentions enjoy it as a form of sport harassment as well.

Although it would appear that the Hidden Evil is a new phenomenon, it is not. Tyrannical regimes throughout history have used local groups to neutralize dissent. Group Stalking is simply another manifestation of this pattern. In order to understand how an entire country could be complicit in the persecution of perceived undesirables, a study of German and Russian dictatorships is essential.

Therefore, evidence will be presented which describes how similar programs of persecution were used during these dictatorships, and how the U.S. and other NATO countries are heading in that direction. Finally, we'll draw upon the Milgram experiments, which will illustrate how most ordinary people will repeatedly torture innocent people under the direction of an authority figure.

Persecute
"To harass or punish in a manner designed to injure, grieve, or afflict; specifically: to cause to suffer..."
-Merriam-Webster's Dictionary

Persecution
"Persecution is the systematic mistreatment of an individual/group by another group. The most common forms are religious persecution, ethnic persecution, and political persecution."
-Wikipedia Encyclopedia

[Footnotes]
* These names are taken from a combination of web sites listed in the sources.

 

 

 

 

 

 

 

 

 

 

 

 

 

Tactics (Part 1)

It has been said that when you're first targeted, they hit you hard in multiple directions. Presumably, this is done so you'll collapse after experiencing recurrent emotional violence, which is compounded after you've realized that all normal support structures and avenues of grievance have been removed. There appears to be multiple levels of intensity of this program that people can receive. The two main parts of the program are group stalking and Non-lethal Weapons (NLW). Both are violent attacks. And some are apparently hit hard with both.

People tend to associate the word harassment with acts of temporary aggravation or pestering. Therefore, it may not by the proper word to describe the never-ending acts of covert violence inflicted upon targeted people, which amounts to torture and murder. Some of the tactics used in these programs are borderline-subliminal, which is why they are so difficult to detect, explain, and defend against. It is my goal to make the unconscious, conscious. Many of these tactics are a type of mind-control.

Most of these tactics have been used in former Cointelpro operations by the United States, Russia, and Germany against their civilian population. The Hidden Evil's genesis is obviously derived from known tactics such as bogus investigations, surveillance, smear campaigns, the use of noise, thefts, break-ins, character assassination, staged accidents, framings, sabotage and vandalism, mail interference, blacklisting, citizen informant squads for overt surveillance (Gang Stalking), poisoning and drugging, incarceration into prisons and mental institutions, and electromagnetic weaponry.

It is a historical fact that the U.S. has officially targeted its civilian population on multiple occasions. Programs such as MKULTRA and Cointelpro can't be denied. "The methods reportedly employed in these harassment campaigns," explained McKinney, "bear a striking resemblance to those attributed to the CIA and FBI during Operations MKULTRA, MHCHAOS, and COINTELPRO."

In Germany these methods were contained in two programs, Zersetzung and Directive Perceptions. They were basically German versions of Cointelpro. Zersetzung was developed to destroy a targeted person's inner-self. During an interview on the Republic Broadcasting Network, Dr. Munzert, a German target, drew a parallel between the current program, and what occurred in East Germany. He explains, "In Germany this is called Zersetzung and this means the dissolution or disintegration of the targeted person."

Writer, international lawyer, and filmmaker Anna Funder won the Four Samuel Johnson Prize from the BBC in 2004 for her non-fiction book, Stasiland. In it, she wrote, "The German word Zersetzung is harsh, and has no direct English equivalent." She described, "Zersetzung, as a concept, involves the annihilation of the inner-self." It calls for, "[The] targeted spreading of rumours about particular persons with the aid of anonymous [means] ... making compromising situations for them by creating confusion over the facts ... [and] the engendering of hysterical and depressive behaviors in the target person."

"Directive Perceptions," she continued, was another program designed to "develop apathy (in the [targeted] subject) ... to achieve a situation in which his conflicts, whether of a social, personal, career, health or political kind are irreversible ... to give rise to fears in him ... to develop/create disappointments ... to restrict his talents or capabilities ... to reduce his capacity to act and ... to harness dissentions and contradictions around him..." These directives were used by the Ministry for State Security (MfS) against threats to state security. In other words, they were massively used on the population to maintain a dictatorship.

These programs were designed to secretly destroy a target's personal and professional life, ruin them financially, and prevent them from reaching their potential, with the intention to produce irreversible depressive and panic-stricken behaviors. What the Hidden Evil appears to be, is a combination of various Cointelpro operations used by oppressive regimes on their civilian population. It has been refined and deployed globally. As I'll demonstrate, it is likely an indication of the creation of a worldwide dictatorship.

Hidden in Plain View

Many of us have experience with books where the goal is to find the hidden picture contained in the landscape. Or the artwork, where if you look intently, you will eventually see a three-dimensional picture superimposed on a flat background. At first, most of us had some trouble detecting these hidden pictures, but with practice we usually see them. Once the detection mechanism is developed, these hidden objects become clearly visible with little effort. So too with the Hidden Evil. Once you know what to look for, these borderline-subliminal attacks are quite detectable.(*)

So, rather than using a blunt overt attack against a fully functional person, they usually attack covertly, and conceal their harassment by using existing events that occurs naturally. There is usually cover for the harassment as well. However, it is probably a statistical rarity for some of these staged events to occur as often as they do. They conceal much of their harassment using what appears to be a simple formula. From what I've learned, the basic formula is as follows:

Frequency: Describes how often an event occurs. It also pertains to the number of acts within a single event.

Duration: Pertains to the length of a single event. It also pertains to the non-stop nature of the harassment in general.

Intensity: The amplification of acts such as sound, sight, crowding, etc. within an event.

A hypothetical example of a car door-slamming event would include this: One neighbor arrives and two others leave. As they're tending to their vehicles there is the repeated opening and shutting doors and trunks, alarms going off, and beeping from alarms being turned on. These disturbances emanate from areas surrounding your house. This may happen simultaneously, or they may be strung together, one right after the other. Synopsis

The event lasted for 5 minutes; longer than normal (Duration). In addition to length of the event being extended, the number of times each act occurred within the event was increased (Frequency). Ex: Multiple, repeated doors/trunk slamming from cars, even if a single individual is at the vehicle. This event also happens many times throughout the day (Frequency). Each individual act of door/trunk shutting is amplified by deliberate slamming to produce a louder than normal noise (Intensity).

The event was louder, contained more activity (acts), and lasted longer than normal to produce a covert attack. Even if a single individual is arriving/leaving, standard practice seems to be multiple slams (trunk, back door, driver's door). This may be synchronized with your activity, such as your arrival or departure. The event may also be a part of a Noise Campaign consisting of an alteration of other types of noise. This basic formula is used with many of the tactics outlined in this chapter. The frequency and duration formula is also used in Mobbing. In addition to the overuse of an individual tactic, these tactics are combined and used in a round-the-clock fashion, which amplifies their overall potency.

Basic Protocol

There is a basic protocol that they begin with which is consistent in all NATO nations. It begins with the surveillance of targets, monitoring of their private lives, and entry into their homes (break-ins). This is done so their personality traits can be cataloged. "There is a basic protocol that the perpetrators begin with," states McKinney, "but the TI [Targeted Individual] contributes to the modification." After they are singled out for preliminary stages of harassment, Gang Stalking ensues, which McKinney describes as part of a "softening-up process." After a period of overt surveillance (Gang Stalking), NLW are introduced. The NLW harassment gradually increases to extreme conditions. This pattern has unfolded consistently in all NATO countries.

Dr. Munzert speaks of basically the same pattern, which he describes as a "double-folded strategy." "It is usually the same procedure," he announced, "but with individual variations." One part includes the victims being "attacked with microwave weapons," and "the other part of the strategy" he says, is to portray the targeted people as "mad [insane]." He explained the effectiveness of this approach as "unbeatable," and reveals that this is essentially what the Stasi did to their targets. Part of this protocol appears to include elements of Neuro-linguistic Programming (NLP), which is a type of mind-control used by behaviorists to affect change. NLP will be covered in more detail shortly.

Some of the tactics below have been called Street Theatre, Harassment Skits, or Staged Events. They are planned harassment skits, such as blocking, or swarming. They also include informants who surround targets and have conversations intended to be overheard, which contain information about the target's personal life. Presumably, citizen informants are told that this is necessary to let targeted people know they're being watched. This may happen in any public place. This is not a complete list of tactics but it includes some of the more common ones reported.

Some of these tactics will sound insane because they're deliberately designed to make someone appear as though they're suffering from a mental disorder. They were definitely created by experts in the behavioral sciences. In addition, people may be emotionally drained, and unable to properly identify or explain what's happening to them. According to the DOJ, mental tactics designed to cause psychological harm must last for months or years before they constitute torture. The Hidden Evil fits this description. So keep in mind, these are Psychological Warfare tactics which are intended to drive people crazy.

Mental Health System

The mental health system is apparently being used worldwide to discredit targeted people who complain. According to the book, Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas, countries around the world, including the U.S., have used doctors to help abuse and discredit people, often for political reasons. It is also a documented fact that there was collaboration between doctors and the military when experiments were carried out in prisons, hospitals, and universities on unwitting people in North America.

McKinney states that medical doctors, as well as psychiatrist and psychologists appear to be providing cover for this program. This is similar to what was done in Russia, where enemies of the dictatorship would be thrown into mental institutions and drugged beyond recovery. "The APA's refusal to acknowledge the impact of terrorization upon the human psyche, even given the publicity stemming from the Church Committee's findings in 1975, raises serious questions about the validity of psychiatry as a profession in this country," declared McKinney, "not to mention, the APA's ethical intent, in the long term."

The DSM is a diagnostic manual for identifying mental disorders. The first edition of the DSM was released in 1952 at a time when the APA was under the control of Dr. Ewen Cameron, who would commit brutal government-sponsored torture under the MKULTRA program. Dr. Rauni Leena Kilde, former Chief Medical Officer of Finland, wrote an article entitled, Microwave Mind Control: Modern Torture and Control Mechanisms Eliminating Human Rights and Privacy. In it she described "The Psychiatric Diagnostic Statistical Manual (DSM) for mental disorders," as a "brilliant cover up operation in 18 languages to hide the atrocities of military and intelligence agencies' actions towards their targets."

Dr. Kilde says the manual "lists all mind control actions as signs of paranoid schizophrenia," and that "all medical schools teach their students that the person is paranoid, ESPECIALLY if he believes intelligence agencies are behind it all." Finally she proclaims, "Never is the medical profession told that these are routine actions all over the world by intelligence agencies against their targets."

Dr. Munzert said that doctors, "first think of paranoia and schizophrenia" if someone complains of this program. He cautions that because of this, "victims" could end up in a "lunatic asylum." Annie Earle, a Licensed Clinical Social Worker, and Board Certified Diplomat in her area of expertise, has over 25 years of psychotherapy experience as an independent practitioner. When referring to the DSM during an interview on the Republic Broadcasting Network, she stated, "It's called the Diagnostic Statistical Manual ... [and all] psychotherapists, regardless of specialty are required to give their patients a diagnosis from this manual, and in order to get the diagnosis you have to fulfill certain criteria that is clearly spelled out in the DSM."

Earle noticed a pattern unfolding when some of the people who came to her who did not fit the standard criteria. "The patients that started coming to me really did not fit any of the standard classifications," she explained. "For example, they might be having what some people consider a psychotic or schizophrenic breakdown in that they might report what seem to be hallucinations, but they did not have any of the other criteria that goes along with schizophrenia. There are many criteria that one is required to ... [detect] in making the diagnosis of schizophrenia, and these people did not meet all that criteria." Apparently Earle became targeted herself while studying this program.

Interestingly, the April/May 1996 issue of Nexus Magazine contained an article entitled, How The NSA Harasses Thousands Of Law Abiding Americans Daily By The Usage Of Remote Neural Monitoring (RNM) written by former NSA worker John St. Clair Akwei. It read, "NSA DOMINT [Domestic Intelligence] has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health."

The DSM appears to have been created with a loophole which allows government-sponsored harassment programs to exist. This was evidently done so that people will appear ill when explaining this to a mental health professional. Adding to this confusion, the program itself is designed to mimic mental illness when explained to those "not-in-the-know." Mental health professionals may also participate in this program, wittingly or unwittingly by labeling targets as mentally ill. It is one of several layers of protection used to help keep this program operating in secrecy. It's easy to see how some mental health professionals might "jump to conclusions."

Surveillance

Surveillance is apparently part of an ongoing bogus investigation that never ends. The investigation may be done for reasons of "national security." Similarly, German and Russian security forces would often target the civilian population for the same reason. After a person is singled out, dwellings surrounding the target will be sublet and used as bases of operation and training.

If the target lives in a house, the base will usually be the closest building to the house. If the target lives in an apartment, then the base will be in one or more of the surrounding apartments. There will be unusual patterns of occupancy with lots of people coming and going into these bases. Vehicles and license plates used by the occupants of the bases may be periodically changed. According to McKinney and Moret, the people who move into these bases have been linked to the DOJ, CIA, and other federal agencies, as well as Universities, and government defense contractors.

"In order to target someone it requires that that person be put under surveillance," proclaimed McKinney, "so that their personality traits, their capacity to inter-relate with people, their capacity for corruption or non-corruption (that seems to be a critical point), and even their religion factors into it." The information obtained by surveillance is used for no ethical reason, "other than to establish a harassment protocol, which will follow that targeted individual for the rest of his or her life," said McKinney. Moret said that neighbors, friends and family are then co-opted into the harassment.

This surveillance is apparently done using very sophisticated equipment which can locate targeted people through walls. This equipment seems to be used in combination with Directed Energy Weapons and other "Non-lethals." According to McKinney, miniature microphones and cameras may be planted in your home, or through-the-wall infrared devices may be used to monitor your movement. The Life Assessment Detector System (LADS) developed at Georgia Tech was apparently created to rescue people trapped in rubble, avalanches, or other disasters. It has a range of about 135 feet can and can detect heartbeat and respiration. It can also be configured to track a specific person's movement inside a building.

SoldierVision A1, a radar flashlight, has a standoff distance of 30 feet and can detect motion behind a wall at 30 feet as well. These flashlights have been steadily researched using military and university testing labs since the 1990s. Some of these flashlights display images in 3D format, can detect respiration, and can see through, wood, brick, plasterboard, glass and concrete. More than likely, the surveillance technology which is now being used on targets worldwide is much more advanced and not publicly available.

Character Assassination

Targets usually experience character assassination which is done to destroy their personal and professional life. Half-truths and lies are often strategically spread into their lives, and may be the basis for a bogus investigation. The rumors circulated about people are apparently not petty, but shocking and repulsive. They are CIA or Stasi-type life-damaging lies. Some of the people spreading these lies may be acquaintances and/or family members that have been recruited (lied to, intimidated and blackmailed) into becoming informants. More on the recruitment of family and friends will be covered in the Informants and Motivational Factors chapters.

U.S. Federal law enforcement has used these tactics to destroy people they either wanted to recruit as informants or those they knew they couldn't recruit and just wanted to destroy. According to former CIA psychologist James Keehner, "It was planned destructiveness. First, you'd check to see if you could destroy a man's marriage. If you could, then that would be enough to put a lot of stress on that individual, to break him down. Then you might start a rumor campaign against him. Harass him constantly." Constant harassment, planned destructiveness, character assassination, destroying relationships, all done in concert with the goal of breaking someone down are a standard part of this program.

Reportedly, the usual rumors spread about a person are that they are a pedophile, prostitute, terrorist, racist, anti-government, mentally ill, drug addict, drug dealer, or a threat to "national security." They are often spread to neighbors, friends, family, employers, etc. A major effort is spent to separate a person from their friends and families.

Apparently these rumor campaigns aid in recruitment. Dr. Rauni Kilde wrote, "Deception is the name of the game, so recruits are told untrue sinister stories of their victims to keep them motivated." According to CNN, the Stasi used the exact same tactics. They stated, "The agency was authorized to conduct secret smear campaigns against anyone it judged to be a threat..." The Russian KGB too, with its massive network of informants, would slander their internal targets.

These rumors may be propagated by multiple people (informants) behind a target's back. Apparently, not letting a targeted person become aware of these rumors is essential to their effectiveness. Victor Santoro noted in his book, Gaslighting: How to Drive Your Enemies Crazy, that "The essence of defaming your target with rumors is it that it not get back to him."

Some targeted people believe that rumors are being spread that they are pedophiles. The organizers realize that labeling someone a pedophile will be highly damaging and produce optimum leverage for gaining community support. It is probably one of the worst rumors you could launch against someone. The Stasi would destroy the character of their targets by labeling them as pedophiles as well. There have been multiple magazine and newspaper reports of pedophiles being harassed by neighbors, and vigilante groups to the point where they are driven out of communities and forced out of work. Some have been driven out of multiple states.

An article in the Toronto Star entitled, Vigilantes Versus Pedophiles on August 8, 2004 outlined how one citizen's group called, Perverted-Justice, would start campaigns to expose people that they have concluded were potential pedophiles. This illustrates the mind-set of some groups of people who have reason to believe a person is a pedophile. The PJ group is run by Xavier Von Erck (real name Phillip John Eide), at www.perverted-justice.com.

Upon visiting a site called Corrupted-Justice at www.corrupted-justice.com, I discovered that multiple members of Perverted Justice have endured trauma such as incest or other forms of sexual abuse and are suffering from a variety of mental disorders. The Corrupted-Justice site obtained this information from member profiles which are publicly available, and located at the Perverted-Justice website. And according to CJ, Eide is on record saying that more than 40% of his followers have endured this type of sexual abuse.

The CJ site also has some very interesting message board chats (publicly available) by PJ members that are worth a look. Apparently the CJ people have documented proof that members of PJ have hacked into their web server. The CJ people are for the full prosecution of potential sex offenders by using law enforcement equipped with the checks and balances built into the legal system. The CJ group basically says that although the PJ system appears to be beneficial, it is heavily corrupted.

Most PJ "busts" do not include law enforcement. According to the article in the Toronto Star and the CJ website, the volunteers at PJ instead begin a relentless campaign to expose people they believe are pedophiles by calling friends, neighbors, children, places of employment and ruining personal and professional relationships. This is similar to what targeted people experience, as indicated by the behavior of their friends, family and co-workers. But they're never told about it. PJ is listed as a potential destructive cult by the Rick A. Ross Institute for the Study of Destructive Cults, www.Rickross.com.

It appears that some PJ members have a psychological need to feel powerful and meet that need by displaying to the public and their targets how they can destroy a life. I believe that some of these volunteers are ill and have latent sadistic intentions, despite their patriotic motives. Apparently some of them receive a sick type of enjoyment/empowerment by ruining the lives of people, as evident by their chats.

Character assassination is standard. My research leads me to conclude that it is not beyond these people to masquerade as "concerned citizens" and call local officials to register destructive complaints about a targeted person. I'm fairly certain they do this. This type of "community service" can be very damaging, especially when the complaints originate from multiple, seemingly unconnected sources.

Sensitivity Programs (NLP)

Some of the sensitivity tactics used by these groups are borderline-subliminal attacks designed to artificially create phobias. They are apparently based on Neuro-Linguistic Programming (NLP). You can think of NLP as a very powerful tool that can be used to produce rapid, profound change. The parts of NLP that groups use are anchors and triggers...

Zgłoś jeśli naruszono regulamin