strahlenfolter stalking - ti - v2k - review of terrorist stalking in america -...
TRANSCRIPT
Textonly version
This is Google's cache of http://www.hearingvoicesisvoicetoskull.com/ReviewOfTerroristStalking.htm. It is a snapshot of the page as it appeared on 3 Dec 201315:50:08 GMT. The current page could have changed in the meantime. Learn moreTip: To quickly find your search term on this page, press Ctrl+F or ⌘F (Mac) and use the find bar.
Banner on top
Review of Terrorist Stalking in AmericaTerrorist Stalking in America
AuthorDavid Lawson
ISBN0970309201
Published2001
Eleanor White wrote a review of the book with many quotes. I just restyled the text, to make it more clear. The chapters have numbering errors. I didn’t correct those. He writes that the goal is to isolate the target. He writes that leaders say that targets should be killed. It’s conflicting. The book contains useful information, but also the usual stuff from the disinformation mill that has probably been fed to the author. We can’t rely on him for the answer on the questions who and why. And he says nothing about electronic harassment. We are wary that he could have accepted money and/or favors in return for writing particular things.
The author infiltrated street level stalking groups. He rode with them as they carried out harassment assignments.
The police deny that such crimes happen. But, this book could help to convince skeptical family, friends, coworkers, and local authorities. It’s a breakthrough in thecause of exposing and stopping these stalking groups.
Table of contents
FOREWORD ............................... VI1. Intro to Extremist Groups ......... 102. Who Are These People? ............. 163. Selection of Targets .............. 193. Group Structure ................... 225. The Surveillance Operation ........ 256. Search and Seizure ................ 287. Overt or Covert Operation ......... 328. Let’s Pretend ..................... 378. Influence Techniques .............. 409. Self Defense ...................... 4811. Conclusion ........................ 53Appendix A DOJ article on stalking ... 57Bibliography ........................... 67References ............................. 73
The police are aware of these groups
(Page VI)
David Lawson interviewed perpetrators (“perps”), targeted people (“targets”), and the POLICE. This is what the author heard from the police that he interviewed:
I also spoke with police officers from across the country. They confirmed the existence of stalking groups across the country. In general, they said that ‘cause stalking’ isprimarily a civil problem where the plaintiff has to prove financial loss. They also said that there are free speech and grass roots issues involved. In fact, the policethemselves are targets of these groups. In small towns, the number of members in these groups can easily exceed the number of police officers. In general, the police willNOT talk about stalking groups. One officer did say there is a storm brewing as groups become larger and more numerous.
David Lawson explains how he got involved and began to interact with the ‘cause stalking’ perpetrators:
One day, several years ago, I was sitting in my house, and checking out the activity on my scanner. I heard a woman say that she was following a certain vehicle. Shegave the location, the make and model of the car and the license plate number. A few days later, I heard the same woman on the same frequency say that she needed abit of help at a certain location and a few days after that I again heard her broadcasting the position and details about another vehicle she was following. I listened toother people talking on that frequency and they didn’t give any indication that they were with any government agency but they were talking about ARRESTINGPEOPLE.
On another occasion, on the same business band frequency, I heard someone complain that an African American man was crossing the street. “All we could get himfor is jaywalking” responded the leader.
People in the group would discuss where they would go for supper, after their shift was over, so I [the author] went too. I listened to a group of people openlydiscussing various activities as if they were the police.
Real police officers were also sitting in the restaurant, listening to them. I later learned that their presence was not a coincidence.
One man who had supper with the group drove a van marked with the call letters of a local AM radio station. I started listening to it. Most of the guests were peoplewho said they had new revelations about Waco or Ruby Ridge, or had some inside story about government corruption. I also heard advertisements for the meetings of alocal political group and I attended some.
At the first meeting I attended, one young man flashed a phony police badge at me. No one paid any attention. Some of those in attendance were the people I had seenin the local restaurant. This was my introduction to the creepy world of extremists.
David Lawson goes on to explain that he has observed extremist groups for several years while living in New York State, Florida, and Canada.
He monitored their public communications, attended meetings, rode with them.
The author defines the basic reason for being for these stalking groups as CAUSE STALKING. Cause stalking means the group is assembled, under a leader with a“shadowy past,” for some specific cause. But, what actually happens is that these groups seem to be:
... groups of individuals who appear to be borderline retarded, mentally ill, or deluded into thinking that they are secret agents.
Cause stalking has been used by extremist groups since the early 1990s. The basic system is alleged to have been developed by the Ku Klux Klan and refined throughyears of use.
David Lawson is mistaken when he calls the Patriot Movement terroristic.
What is terrorism? Terrorism is the systematic use of terror. Terror is violent or destructive acts (as bombing) committed by groups to intimidate a population orgovernment into granting their demands.
This is clearly not what the Patriot Movement wants. The Patriot Movement strives to expose government crimes.
Tactics used by “cause stalkers”
(Page VII)
Some authors refer to cause stalking as terrorist stalking. Groups do not just stalk individuals. They employ organized programs of harassment which include BREAKINS, PROPERTY DAMAGE, ASSAULT AND OCCASIONALLY, EVEN DEATH. The CHILDREN of a target are a favorite.
Cause stalkers are always there
How about financing these groups? Although the author states that the pay is low, there are still very large expenses to harass people as thoroughly as targets report.Here is an example of what I mean by “large expenses”:
Groups are WELL FINANCED. They can afford to RENT PROPERTY WHEREVER THE TARGET LIVES. If he drives across the country, he will be followed bysupporters of similar groups in that area. If he travels by plane, group members will meet him wherever he lands. They may even accompany him on a plane if they knowhis travel plan, and there is a good chance that they do.
Author’s favorite quotes from perps he “rode” with
(Page 15)
Here are a few quotes from the perpetrators themselves:
We are like the police except we are ABOVE the police.
We are a citizen’s group that helps the police. We are trying to alert people in the area about this person [the target] before he gets to do what he did in the last place helived.
All the cause stalking targets I know did not commit ANY offenses. The stalkers are filled with LIES by their leaders.
When I get the call, I go to whatever the address is. It doesn’t matter what they [targets] do, they can never get away from us.
Personality types of the perpetrators
(Page 16)
More details about the typical cause stalking recruit:
Recruits tend to be blue collar workers who are at the bottom end of the job scale. They are janitors in apartments, hotels, etc., who have keys to get in any lockeddoors. They are security guards, who can let fellow members into places where they would not normally be allowed to go. They are city workers, who can, in manycities, follow a target around all day in their vehicles or have a noisy project underway near his [target’s] residence. They are taxi drivers, who are always on the road.They are cable, telephone and electric company employees who can interfere with a target’s service and spend time on patrol with the group, while they are on the job.
Firemen can be perps
Firemen across the country, and even some police departments have a long history of supporting extremist groups. Fire trucks can sometimes be seen riding in extremistconvoys, with their flashing lights turned on and their sirens screaming. They will also race to greet a convoy which is entering their town. The participation of firemen,city workers and utility company workers helps give group members an illusion of legitimacy and power.
Tearing up road is one recruitment goal
(Page 17)
City employees can be used to harass a target in many ways including tearing up the road in front of a target’s home. Employees of pest control businesses who haveaccess to the keys for apartments and those who work for alarm and locksmith companies are also of interest.
Groups also attack targets of convenience. These people are selected because they are convenient targets, and not for any other reason. These include loners who tendto be more vulnerable to their harassment tactics than those with family and friends around them. Targets of convenience are used for practice.
Groups have contacts in the media which they use to disseminate information about their targets. IT IS NOT UNUSUAL TO SEE THE VEHICLES OF LOCALTELEVISION STATIONS RIDING IN EXTREMIST CONVOYS.
In order to establish bases of operation, they will ENLIST THE ASSISTANCE OF NEIGHBORS. In many areas, they can do this by intimidation. Those who do notcooperate can be targetted, which includes harassment of their families and damage to their homes and vehicles.
If they are dealing with individuals who do not know them, they can also appeal to their sense of patriotism and they can offer drugs, friendship, home repair, free taxirides and what ever else they have to. In some cases they may even be able to get a key to the residence from a ‘patriotic’ landlord.
Surveillance is conducted 24 hours a day, 7 days a week. When a target leaves his residence they will alert the group, either by cell phone or by business band radio.Other members, who are patrolling the perimeter to watch for police and other vehicles driving in the area, will race to the location to begin pursuit. In small towns,where business band radio is widely used, these activities are a local sport among a small group. Anyone with a scanner can join in. Some targets have reported hearingan announcement on their scanners AS SOON AS THEY TURN THEIR LIGHTS ON IN THE MORNING.
Stalker groups’ financial sources
(Page 20)
This is what David Lawson learned about their financing:
The operations of many extremist groups are actually financed by CORPORATIONS which use them to stalk their enemies or potential enemies. The groups are usedas the PRIVATE ARMIES of those corporations. Some countries kill dissidents and in others they are jailed. In the United States, someone who is threatening tocorporations or industries, like a whistleblower or activist, is likely to become the target of an extremist group.
The author makes several statements that these criminal stalking groups not only harass targets specified by their leaders. They are also FOR HIRE a kind of“revenge service” for those wealthy enough to hire them.
Next, let’s look at some of the typical OPERATIONS these groups carry out:
The primary characteristic of cause stalking is that it is done by LARGE GROUPS OF PEOPLE. A target will always be followed, but he is unlikely to see the samestalkers very often.
Many of these groups include hundreds of people.
Perps surround apartment of target
(Page 27)
In a typical apartment setting, they will attempt to lease, sublet, or otherwise have access to apartments above, below, and on both sides of the target. They will also“guard” the vehicles of a target in the parking lot. If they have occupied apartments surrounding a target, typically normal noises like toilets flushing, doors closing,people talking, etc. will not be heard. The only noises that will be heard are in response to something the target does.
“Who are we”, perps’ own statement about themselves
(Page 27)
Who are we? We drive the ambulances that take you to the emergency room. When your house is burning, we put out the fire. We are security guards. We protect youat night. YOU ONLY HAVE ELECTRICITY, PHONE AND CABLE SERVICE BECAUSE OF US. We are janitors. We have the keys. We fix your cars. YOUDON’T WANT TO MESS WITH US.
The “cause” isn’t the most important thing to group members
The author concludes that the “cause” the typical group is “working toward” is mainly an excuse to get the groups together. This is explained at a number of places inthe book. The group members derive a sense of power and a sense of belonging. This is the main motivation of members who stay with these groups. Having a“cause” enhances the feelings of power and righteousness, but group members, according to the author, are most concerned with how their fellow group stalkers feelabout their “work” and accept them.
These groups come into being and are run by leaders. Here is what the author says about them:
Victims don’t always recognize harassment as such
Others do not recognize that they are being harassed by an organized group. They just think that there are much rude people in the world. Targets who do notexperience physical harassment are still targets for other types of attacks.
Isolating victim is the goal
(Page 32)
Physical harassment is used when a target has no witnesses. An objective is to isolate the target from his family and friends. He can tell them about all the strange thingshappening around him, but they will not understand and perhaps will think he is crazy. Sometimes other members of the family will receive the same treatment.
Surrounding victim on the road
(Page 32)
When a target is driving, standard practice is to surround his vehicle and attempt to control his speed. He will not be followed in close proximity by the same vehicles fora long distance. They do frequent tradeoffs. Vehicles line up behind the target for a short distance and then move out of place so the next vehicle can take over.Frequently, vehicles in the convoy will have their high beam headlights on during the day, so a target frequently have a vehicle behind him which has its headlights on.
In many parts of the country it is common to see groups of six to 30 or more vehicles driving around in convoys with their high beams on during the day. This is one ofthe ways a convoy can be identified.
The on foot harassment methods
(Page 33)
A target will be followed on foot wherever he goes. Anyone can go to the same public places he goes, and they will attempt to get into any other restricted places hegoes, including hospitals, places of employment, etc. It has been said that it is possible to go nearly anywhere if you have a clipboard in your hand and it is almost true.They also like to wear name badges on a lanyard, and some carry phony police badges.
Common harassment tactics used by those on foot include PEN CLICKING, in which they repeatedly click a ball point pen, key rattling, and rattling change in theirpockets while standing behind the target. Many tactics are tried and the result is observed. Those which evoke a response from the target are repeated. When a targetsits anywhere in public, group members will attempt to sit behind him in order to create noise, by whatever means, including tapping their feet on the target’s chair. Theobjective is to harass the target constantly.
Ah, the trusty old “noise campaign” trick!
(Page 34)
A common tactic use by groups is noise campaigns. Group members will drive by the target’s residence or work place, honking their horns, squealing tires, and makingwhatever other noise they can.
They will also make noise from whatever NEARBY PROPERTIES they have access to. Typically, they will make noise WHEN THE TARGET GOES OUTSIDE.
OR, when the target opens a window, and I mean timed to the millisecond! Open, close, perfect sync!
Group members will also frequently knock on his door for whatever peculiar reasons they can dream up.
In an apartment setting, targets can expect to hear tapping on the walls in the middle of the night, taps running, hammering etc. from the upper and/or lower apartments,and possibly the apartments on both sides. They will continue to ‘work’ on these activities for as long as they can get away with them.
Other vehicle related tactics include blockade, so the target vehicle cannot leave a parking lot, for example, or he is surrounded by slow moving vehicles.
Standard practice is to watch the target’s vehicles and this subjects them to damage including slashed tires, scratched paint, stolen license plates, etc. Typically theywould not cut the brake lines on vehicles or commit other similar acts of sabotage, but they WOULD drain the oil or antifreeze over a period of TIME.
Neighbors’ synchronized leaving/arriving
(Page 34)
Often they occupy a nearby apartment, part time, when the owner is not there and he receives some benefit. A target may notice someone leaving a nearby apartmentwhen he leaves his, and arrive when he arrives.
All the time, in the experience of Eleanor White.
Adjacent apt steady stream of people day and night
In addition, he will often be accompanied in elevators by a steady stream of different individuals who go to the apartments being used by the group.
Horns/sirens synced to toilet use
(Page 34)
If he flushes a toilet, he may hear a car horn honk, the sound of a power tool or hammering, for example. There will also be a large number of people coming and going,and accompanying rowdiness and noise.
A common ruse used by these groups is that they are a ‘citizens group’ which assists the police and they are ‘just keeping track of’ a certain individual, for whateverreason. The illusion is reinforced by the case files they carry which are complete with photos of the target and look like those used by police.
Typically, harassment tactics are not used unless a target is alone. If he is with others, group members will still surround him, but they will not reveal their presence.Many targets never experience the kind of harassment described here, because they are not alone very often.
Synchronized movement, apts above or below
(Page 35)
... It is not uncommon, in an apartment setting, for a target to hear someone moving from room to room as he does, from the upper or lower apartment.
Eleanor White believes that this will often require commercial through wall radar or more advanced technology.
I believe that observation with pinhole cameras is standard for all targeted individuals. It’s much cheaper and gives a much better image.
Interference with personal and business relationships
(Page 35)
Groups attempt to interfere with any business and personal relationships which the target has. Typically, this interference involves character assassination from someanonymous individual and is not usually taken seriously by those who know the target. It can be effective with people who don’t know the target.
Now that is a HUGE “laundry list” of operations carried out against the targets of these criminal cause stalking groups. But, this book is ALL MEAT, and there ismuch within its covers. If the general public is made aware of this book, these brutal crimes, which have resulted in suicides, just might have a chance of being exposedand stopped.
Currently, the typical justice system response is to label the victim as mentally ill. They wash their hands of the problem. This is itself a criminal act. Public officials haveaccepted job descriptions. They have sworn oaths. It’s a violation of all this. They are NOT doing their jobs!
Leaders’ claims of national security affiliation
(Page 37)
Most of these leaders HAVE BACKGROUNDS WHICH ARE NOT KNOWN TO THEIR SUPPORTERS. They are from ‘somewhere else’ and there isn’t muchinformation available about them from independent sources. This provides a basis for the ‘larger than life’ stature they assume in these groups. Many claim to haveconnections to the C.I.A. or other intelligence agencies which do not reveal the identities of their employees or exemployees.
Stalker groups blame TARGET for their shortcomings
(Page 49)
Group members are taught that THE TARGET IS THE REASON FOR THEIR PROBLEMS. He is the reason why their lives are a failure.
Character assassination
(Page 51)
At work, the target will also experience character assassination. If he works in any position where he has to deal with the public, there will be a steady stream ofcustomers who complain about him. If he is a real estate agent, he will have a steady stream of prospects who OCCUPY HIS TIME but never make an offer.
Eleanor White gives an example of how brutal and serious this “character assassination” can be.
A woman moved in with her husband and children to a house. Unknown to them, it had been a methamphetamine lab. The chemicals, used to brew meth, cause specificsymptoms in the mouth. The dentist of this family felt that he needed to “helping law enforcement.”He reported them as meth users. Foolish! But, the family didn’teven know that the report had been made. They had no way to correct it. (In some places, dentists are required to report suspected cases of meth use.) The police inthat area was linked to the citizen groups. The family was harassed for many years. The husband died because of these chemicals. The lady did a bit detective work.She found out about the reputation of her family. She got some help from a befriended policeman. He was from a different area. He admitted off the record that peoplecan being submitted to citizen groups because of “meth mouth.”
Character assassination is complete and has lifedestroying consequences!
Stalking leaders say targets should be killed
(Page 54)
What about the future, then? Let me close this review with a chilling quote from the book reporting what the author learned from some of the leaders:
The leaders ... are starting to balk at exposing their members to arrest for activities which amount to little gain for the movement. THEY SAY THAT ANYONE WHOIS A TARGET SHOULD BE KILLED, and not just harassed for years.
These gangs masquerade as political or religious groups, but they are private armies. While they have their own targets, which are connected to their political agenda,they are also available, for hire, to corporations and other entities, to destroy or neutralize people.
Illustration
Banner on bottom
Generated with www.html-to-pdf.net Page 1 / 7
Textonly version
This is Google's cache of http://www.hearingvoicesisvoicetoskull.com/ReviewOfTerroristStalking.htm. It is a snapshot of the page as it appeared on 3 Dec 201315:50:08 GMT. The current page could have changed in the meantime. Learn moreTip: To quickly find your search term on this page, press Ctrl+F or ⌘F (Mac) and use the find bar.
Banner on top
Review of Terrorist Stalking in AmericaTerrorist Stalking in America
AuthorDavid Lawson
ISBN0970309201
Published2001
Eleanor White wrote a review of the book with many quotes. I just restyled the text, to make it more clear. The chapters have numbering errors. I didn’t correct those. He writes that the goal is to isolate the target. He writes that leaders say that targets should be killed. It’s conflicting. The book contains useful information, but also the usual stuff from the disinformation mill that has probably been fed to the author. We can’t rely on him for the answer on the questions who and why. And he says nothing about electronic harassment. We are wary that he could have accepted money and/or favors in return for writing particular things.
The author infiltrated street level stalking groups. He rode with them as they carried out harassment assignments.
The police deny that such crimes happen. But, this book could help to convince skeptical family, friends, coworkers, and local authorities. It’s a breakthrough in thecause of exposing and stopping these stalking groups.
Table of contents
FOREWORD ............................... VI1. Intro to Extremist Groups ......... 102. Who Are These People? ............. 163. Selection of Targets .............. 193. Group Structure ................... 225. The Surveillance Operation ........ 256. Search and Seizure ................ 287. Overt or Covert Operation ......... 328. Let’s Pretend ..................... 378. Influence Techniques .............. 409. Self Defense ...................... 4811. Conclusion ........................ 53Appendix A DOJ article on stalking ... 57Bibliography ........................... 67References ............................. 73
The police are aware of these groups
(Page VI)
David Lawson interviewed perpetrators (“perps”), targeted people (“targets”), and the POLICE. This is what the author heard from the police that he interviewed:
I also spoke with police officers from across the country. They confirmed the existence of stalking groups across the country. In general, they said that ‘cause stalking’ isprimarily a civil problem where the plaintiff has to prove financial loss. They also said that there are free speech and grass roots issues involved. In fact, the policethemselves are targets of these groups. In small towns, the number of members in these groups can easily exceed the number of police officers. In general, the police willNOT talk about stalking groups. One officer did say there is a storm brewing as groups become larger and more numerous.
David Lawson explains how he got involved and began to interact with the ‘cause stalking’ perpetrators:
One day, several years ago, I was sitting in my house, and checking out the activity on my scanner. I heard a woman say that she was following a certain vehicle. Shegave the location, the make and model of the car and the license plate number. A few days later, I heard the same woman on the same frequency say that she needed abit of help at a certain location and a few days after that I again heard her broadcasting the position and details about another vehicle she was following. I listened toother people talking on that frequency and they didn’t give any indication that they were with any government agency but they were talking about ARRESTINGPEOPLE.
On another occasion, on the same business band frequency, I heard someone complain that an African American man was crossing the street. “All we could get himfor is jaywalking” responded the leader.
People in the group would discuss where they would go for supper, after their shift was over, so I [the author] went too. I listened to a group of people openlydiscussing various activities as if they were the police.
Real police officers were also sitting in the restaurant, listening to them. I later learned that their presence was not a coincidence.
One man who had supper with the group drove a van marked with the call letters of a local AM radio station. I started listening to it. Most of the guests were peoplewho said they had new revelations about Waco or Ruby Ridge, or had some inside story about government corruption. I also heard advertisements for the meetings of alocal political group and I attended some.
At the first meeting I attended, one young man flashed a phony police badge at me. No one paid any attention. Some of those in attendance were the people I had seenin the local restaurant. This was my introduction to the creepy world of extremists.
David Lawson goes on to explain that he has observed extremist groups for several years while living in New York State, Florida, and Canada.
He monitored their public communications, attended meetings, rode with them.
The author defines the basic reason for being for these stalking groups as CAUSE STALKING. Cause stalking means the group is assembled, under a leader with a“shadowy past,” for some specific cause. But, what actually happens is that these groups seem to be:
... groups of individuals who appear to be borderline retarded, mentally ill, or deluded into thinking that they are secret agents.
Cause stalking has been used by extremist groups since the early 1990s. The basic system is alleged to have been developed by the Ku Klux Klan and refined throughyears of use.
David Lawson is mistaken when he calls the Patriot Movement terroristic.
What is terrorism? Terrorism is the systematic use of terror. Terror is violent or destructive acts (as bombing) committed by groups to intimidate a population orgovernment into granting their demands.
This is clearly not what the Patriot Movement wants. The Patriot Movement strives to expose government crimes.
Tactics used by “cause stalkers”
(Page VII)
Some authors refer to cause stalking as terrorist stalking. Groups do not just stalk individuals. They employ organized programs of harassment which include BREAKINS, PROPERTY DAMAGE, ASSAULT AND OCCASIONALLY, EVEN DEATH. The CHILDREN of a target are a favorite.
Cause stalkers are always there
How about financing these groups? Although the author states that the pay is low, there are still very large expenses to harass people as thoroughly as targets report.Here is an example of what I mean by “large expenses”:
Groups are WELL FINANCED. They can afford to RENT PROPERTY WHEREVER THE TARGET LIVES. If he drives across the country, he will be followed bysupporters of similar groups in that area. If he travels by plane, group members will meet him wherever he lands. They may even accompany him on a plane if they knowhis travel plan, and there is a good chance that they do.
Author’s favorite quotes from perps he “rode” with
(Page 15)
Here are a few quotes from the perpetrators themselves:
We are like the police except we are ABOVE the police.
We are a citizen’s group that helps the police. We are trying to alert people in the area about this person [the target] before he gets to do what he did in the last place helived.
All the cause stalking targets I know did not commit ANY offenses. The stalkers are filled with LIES by their leaders.
When I get the call, I go to whatever the address is. It doesn’t matter what they [targets] do, they can never get away from us.
Personality types of the perpetrators
(Page 16)
More details about the typical cause stalking recruit:
Recruits tend to be blue collar workers who are at the bottom end of the job scale. They are janitors in apartments, hotels, etc., who have keys to get in any lockeddoors. They are security guards, who can let fellow members into places where they would not normally be allowed to go. They are city workers, who can, in manycities, follow a target around all day in their vehicles or have a noisy project underway near his [target’s] residence. They are taxi drivers, who are always on the road.They are cable, telephone and electric company employees who can interfere with a target’s service and spend time on patrol with the group, while they are on the job.
Firemen can be perps
Firemen across the country, and even some police departments have a long history of supporting extremist groups. Fire trucks can sometimes be seen riding in extremistconvoys, with their flashing lights turned on and their sirens screaming. They will also race to greet a convoy which is entering their town. The participation of firemen,city workers and utility company workers helps give group members an illusion of legitimacy and power.
Tearing up road is one recruitment goal
(Page 17)
City employees can be used to harass a target in many ways including tearing up the road in front of a target’s home. Employees of pest control businesses who haveaccess to the keys for apartments and those who work for alarm and locksmith companies are also of interest.
Groups also attack targets of convenience. These people are selected because they are convenient targets, and not for any other reason. These include loners who tendto be more vulnerable to their harassment tactics than those with family and friends around them. Targets of convenience are used for practice.
Groups have contacts in the media which they use to disseminate information about their targets. IT IS NOT UNUSUAL TO SEE THE VEHICLES OF LOCALTELEVISION STATIONS RIDING IN EXTREMIST CONVOYS.
In order to establish bases of operation, they will ENLIST THE ASSISTANCE OF NEIGHBORS. In many areas, they can do this by intimidation. Those who do notcooperate can be targetted, which includes harassment of their families and damage to their homes and vehicles.
If they are dealing with individuals who do not know them, they can also appeal to their sense of patriotism and they can offer drugs, friendship, home repair, free taxirides and what ever else they have to. In some cases they may even be able to get a key to the residence from a ‘patriotic’ landlord.
Surveillance is conducted 24 hours a day, 7 days a week. When a target leaves his residence they will alert the group, either by cell phone or by business band radio.Other members, who are patrolling the perimeter to watch for police and other vehicles driving in the area, will race to the location to begin pursuit. In small towns,where business band radio is widely used, these activities are a local sport among a small group. Anyone with a scanner can join in. Some targets have reported hearingan announcement on their scanners AS SOON AS THEY TURN THEIR LIGHTS ON IN THE MORNING.
Stalker groups’ financial sources
(Page 20)
This is what David Lawson learned about their financing:
The operations of many extremist groups are actually financed by CORPORATIONS which use them to stalk their enemies or potential enemies. The groups are usedas the PRIVATE ARMIES of those corporations. Some countries kill dissidents and in others they are jailed. In the United States, someone who is threatening tocorporations or industries, like a whistleblower or activist, is likely to become the target of an extremist group.
The author makes several statements that these criminal stalking groups not only harass targets specified by their leaders. They are also FOR HIRE a kind of“revenge service” for those wealthy enough to hire them.
Next, let’s look at some of the typical OPERATIONS these groups carry out:
The primary characteristic of cause stalking is that it is done by LARGE GROUPS OF PEOPLE. A target will always be followed, but he is unlikely to see the samestalkers very often.
Many of these groups include hundreds of people.
Perps surround apartment of target
(Page 27)
In a typical apartment setting, they will attempt to lease, sublet, or otherwise have access to apartments above, below, and on both sides of the target. They will also“guard” the vehicles of a target in the parking lot. If they have occupied apartments surrounding a target, typically normal noises like toilets flushing, doors closing,people talking, etc. will not be heard. The only noises that will be heard are in response to something the target does.
“Who are we”, perps’ own statement about themselves
(Page 27)
Who are we? We drive the ambulances that take you to the emergency room. When your house is burning, we put out the fire. We are security guards. We protect youat night. YOU ONLY HAVE ELECTRICITY, PHONE AND CABLE SERVICE BECAUSE OF US. We are janitors. We have the keys. We fix your cars. YOUDON’T WANT TO MESS WITH US.
The “cause” isn’t the most important thing to group members
The author concludes that the “cause” the typical group is “working toward” is mainly an excuse to get the groups together. This is explained at a number of places inthe book. The group members derive a sense of power and a sense of belonging. This is the main motivation of members who stay with these groups. Having a“cause” enhances the feelings of power and righteousness, but group members, according to the author, are most concerned with how their fellow group stalkers feelabout their “work” and accept them.
These groups come into being and are run by leaders. Here is what the author says about them:
Victims don’t always recognize harassment as such
Others do not recognize that they are being harassed by an organized group. They just think that there are much rude people in the world. Targets who do notexperience physical harassment are still targets for other types of attacks.
Isolating victim is the goal
(Page 32)
Physical harassment is used when a target has no witnesses. An objective is to isolate the target from his family and friends. He can tell them about all the strange thingshappening around him, but they will not understand and perhaps will think he is crazy. Sometimes other members of the family will receive the same treatment.
Surrounding victim on the road
(Page 32)
When a target is driving, standard practice is to surround his vehicle and attempt to control his speed. He will not be followed in close proximity by the same vehicles fora long distance. They do frequent tradeoffs. Vehicles line up behind the target for a short distance and then move out of place so the next vehicle can take over.Frequently, vehicles in the convoy will have their high beam headlights on during the day, so a target frequently have a vehicle behind him which has its headlights on.
In many parts of the country it is common to see groups of six to 30 or more vehicles driving around in convoys with their high beams on during the day. This is one ofthe ways a convoy can be identified.
The on foot harassment methods
(Page 33)
A target will be followed on foot wherever he goes. Anyone can go to the same public places he goes, and they will attempt to get into any other restricted places hegoes, including hospitals, places of employment, etc. It has been said that it is possible to go nearly anywhere if you have a clipboard in your hand and it is almost true.They also like to wear name badges on a lanyard, and some carry phony police badges.
Common harassment tactics used by those on foot include PEN CLICKING, in which they repeatedly click a ball point pen, key rattling, and rattling change in theirpockets while standing behind the target. Many tactics are tried and the result is observed. Those which evoke a response from the target are repeated. When a targetsits anywhere in public, group members will attempt to sit behind him in order to create noise, by whatever means, including tapping their feet on the target’s chair. Theobjective is to harass the target constantly.
Ah, the trusty old “noise campaign” trick!
(Page 34)
A common tactic use by groups is noise campaigns. Group members will drive by the target’s residence or work place, honking their horns, squealing tires, and makingwhatever other noise they can.
They will also make noise from whatever NEARBY PROPERTIES they have access to. Typically, they will make noise WHEN THE TARGET GOES OUTSIDE.
OR, when the target opens a window, and I mean timed to the millisecond! Open, close, perfect sync!
Group members will also frequently knock on his door for whatever peculiar reasons they can dream up.
In an apartment setting, targets can expect to hear tapping on the walls in the middle of the night, taps running, hammering etc. from the upper and/or lower apartments,and possibly the apartments on both sides. They will continue to ‘work’ on these activities for as long as they can get away with them.
Other vehicle related tactics include blockade, so the target vehicle cannot leave a parking lot, for example, or he is surrounded by slow moving vehicles.
Standard practice is to watch the target’s vehicles and this subjects them to damage including slashed tires, scratched paint, stolen license plates, etc. Typically theywould not cut the brake lines on vehicles or commit other similar acts of sabotage, but they WOULD drain the oil or antifreeze over a period of TIME.
Neighbors’ synchronized leaving/arriving
(Page 34)
Often they occupy a nearby apartment, part time, when the owner is not there and he receives some benefit. A target may notice someone leaving a nearby apartmentwhen he leaves his, and arrive when he arrives.
All the time, in the experience of Eleanor White.
Adjacent apt steady stream of people day and night
In addition, he will often be accompanied in elevators by a steady stream of different individuals who go to the apartments being used by the group.
Horns/sirens synced to toilet use
(Page 34)
If he flushes a toilet, he may hear a car horn honk, the sound of a power tool or hammering, for example. There will also be a large number of people coming and going,and accompanying rowdiness and noise.
A common ruse used by these groups is that they are a ‘citizens group’ which assists the police and they are ‘just keeping track of’ a certain individual, for whateverreason. The illusion is reinforced by the case files they carry which are complete with photos of the target and look like those used by police.
Typically, harassment tactics are not used unless a target is alone. If he is with others, group members will still surround him, but they will not reveal their presence.Many targets never experience the kind of harassment described here, because they are not alone very often.
Synchronized movement, apts above or below
(Page 35)
... It is not uncommon, in an apartment setting, for a target to hear someone moving from room to room as he does, from the upper or lower apartment.
Eleanor White believes that this will often require commercial through wall radar or more advanced technology.
I believe that observation with pinhole cameras is standard for all targeted individuals. It’s much cheaper and gives a much better image.
Interference with personal and business relationships
(Page 35)
Groups attempt to interfere with any business and personal relationships which the target has. Typically, this interference involves character assassination from someanonymous individual and is not usually taken seriously by those who know the target. It can be effective with people who don’t know the target.
Now that is a HUGE “laundry list” of operations carried out against the targets of these criminal cause stalking groups. But, this book is ALL MEAT, and there ismuch within its covers. If the general public is made aware of this book, these brutal crimes, which have resulted in suicides, just might have a chance of being exposedand stopped.
Currently, the typical justice system response is to label the victim as mentally ill. They wash their hands of the problem. This is itself a criminal act. Public officials haveaccepted job descriptions. They have sworn oaths. It’s a violation of all this. They are NOT doing their jobs!
Leaders’ claims of national security affiliation
(Page 37)
Most of these leaders HAVE BACKGROUNDS WHICH ARE NOT KNOWN TO THEIR SUPPORTERS. They are from ‘somewhere else’ and there isn’t muchinformation available about them from independent sources. This provides a basis for the ‘larger than life’ stature they assume in these groups. Many claim to haveconnections to the C.I.A. or other intelligence agencies which do not reveal the identities of their employees or exemployees.
Stalker groups blame TARGET for their shortcomings
(Page 49)
Group members are taught that THE TARGET IS THE REASON FOR THEIR PROBLEMS. He is the reason why their lives are a failure.
Character assassination
(Page 51)
At work, the target will also experience character assassination. If he works in any position where he has to deal with the public, there will be a steady stream ofcustomers who complain about him. If he is a real estate agent, he will have a steady stream of prospects who OCCUPY HIS TIME but never make an offer.
Eleanor White gives an example of how brutal and serious this “character assassination” can be.
A woman moved in with her husband and children to a house. Unknown to them, it had been a methamphetamine lab. The chemicals, used to brew meth, cause specificsymptoms in the mouth. The dentist of this family felt that he needed to “helping law enforcement.”He reported them as meth users. Foolish! But, the family didn’teven know that the report had been made. They had no way to correct it. (In some places, dentists are required to report suspected cases of meth use.) The police inthat area was linked to the citizen groups. The family was harassed for many years. The husband died because of these chemicals. The lady did a bit detective work.She found out about the reputation of her family. She got some help from a befriended policeman. He was from a different area. He admitted off the record that peoplecan being submitted to citizen groups because of “meth mouth.”
Character assassination is complete and has lifedestroying consequences!
Stalking leaders say targets should be killed
(Page 54)
What about the future, then? Let me close this review with a chilling quote from the book reporting what the author learned from some of the leaders:
The leaders ... are starting to balk at exposing their members to arrest for activities which amount to little gain for the movement. THEY SAY THAT ANYONE WHOIS A TARGET SHOULD BE KILLED, and not just harassed for years.
These gangs masquerade as political or religious groups, but they are private armies. While they have their own targets, which are connected to their political agenda,they are also available, for hire, to corporations and other entities, to destroy or neutralize people.
Illustration
Banner on bottom
Generated with www.html-to-pdf.net Page 2 / 7
Textonly version
This is Google's cache of http://www.hearingvoicesisvoicetoskull.com/ReviewOfTerroristStalking.htm. It is a snapshot of the page as it appeared on 3 Dec 201315:50:08 GMT. The current page could have changed in the meantime. Learn moreTip: To quickly find your search term on this page, press Ctrl+F or ⌘F (Mac) and use the find bar.
Banner on top
Review of Terrorist Stalking in AmericaTerrorist Stalking in America
AuthorDavid Lawson
ISBN0970309201
Published2001
Eleanor White wrote a review of the book with many quotes. I just restyled the text, to make it more clear. The chapters have numbering errors. I didn’t correct those. He writes that the goal is to isolate the target. He writes that leaders say that targets should be killed. It’s conflicting. The book contains useful information, but also the usual stuff from the disinformation mill that has probably been fed to the author. We can’t rely on him for the answer on the questions who and why. And he says nothing about electronic harassment. We are wary that he could have accepted money and/or favors in return for writing particular things.
The author infiltrated street level stalking groups. He rode with them as they carried out harassment assignments.
The police deny that such crimes happen. But, this book could help to convince skeptical family, friends, coworkers, and local authorities. It’s a breakthrough in thecause of exposing and stopping these stalking groups.
Table of contents
FOREWORD ............................... VI1. Intro to Extremist Groups ......... 102. Who Are These People? ............. 163. Selection of Targets .............. 193. Group Structure ................... 225. The Surveillance Operation ........ 256. Search and Seizure ................ 287. Overt or Covert Operation ......... 328. Let’s Pretend ..................... 378. Influence Techniques .............. 409. Self Defense ...................... 4811. Conclusion ........................ 53Appendix A DOJ article on stalking ... 57Bibliography ........................... 67References ............................. 73
The police are aware of these groups
(Page VI)
David Lawson interviewed perpetrators (“perps”), targeted people (“targets”), and the POLICE. This is what the author heard from the police that he interviewed:
I also spoke with police officers from across the country. They confirmed the existence of stalking groups across the country. In general, they said that ‘cause stalking’ isprimarily a civil problem where the plaintiff has to prove financial loss. They also said that there are free speech and grass roots issues involved. In fact, the policethemselves are targets of these groups. In small towns, the number of members in these groups can easily exceed the number of police officers. In general, the police willNOT talk about stalking groups. One officer did say there is a storm brewing as groups become larger and more numerous.
David Lawson explains how he got involved and began to interact with the ‘cause stalking’ perpetrators:
One day, several years ago, I was sitting in my house, and checking out the activity on my scanner. I heard a woman say that she was following a certain vehicle. Shegave the location, the make and model of the car and the license plate number. A few days later, I heard the same woman on the same frequency say that she needed abit of help at a certain location and a few days after that I again heard her broadcasting the position and details about another vehicle she was following. I listened toother people talking on that frequency and they didn’t give any indication that they were with any government agency but they were talking about ARRESTINGPEOPLE.
On another occasion, on the same business band frequency, I heard someone complain that an African American man was crossing the street. “All we could get himfor is jaywalking” responded the leader.
People in the group would discuss where they would go for supper, after their shift was over, so I [the author] went too. I listened to a group of people openlydiscussing various activities as if they were the police.
Real police officers were also sitting in the restaurant, listening to them. I later learned that their presence was not a coincidence.
One man who had supper with the group drove a van marked with the call letters of a local AM radio station. I started listening to it. Most of the guests were peoplewho said they had new revelations about Waco or Ruby Ridge, or had some inside story about government corruption. I also heard advertisements for the meetings of alocal political group and I attended some.
At the first meeting I attended, one young man flashed a phony police badge at me. No one paid any attention. Some of those in attendance were the people I had seenin the local restaurant. This was my introduction to the creepy world of extremists.
David Lawson goes on to explain that he has observed extremist groups for several years while living in New York State, Florida, and Canada.
He monitored their public communications, attended meetings, rode with them.
The author defines the basic reason for being for these stalking groups as CAUSE STALKING. Cause stalking means the group is assembled, under a leader with a“shadowy past,” for some specific cause. But, what actually happens is that these groups seem to be:
... groups of individuals who appear to be borderline retarded, mentally ill, or deluded into thinking that they are secret agents.
Cause stalking has been used by extremist groups since the early 1990s. The basic system is alleged to have been developed by the Ku Klux Klan and refined throughyears of use.
David Lawson is mistaken when he calls the Patriot Movement terroristic.
What is terrorism? Terrorism is the systematic use of terror. Terror is violent or destructive acts (as bombing) committed by groups to intimidate a population orgovernment into granting their demands.
This is clearly not what the Patriot Movement wants. The Patriot Movement strives to expose government crimes.
Tactics used by “cause stalkers”
(Page VII)
Some authors refer to cause stalking as terrorist stalking. Groups do not just stalk individuals. They employ organized programs of harassment which include BREAKINS, PROPERTY DAMAGE, ASSAULT AND OCCASIONALLY, EVEN DEATH. The CHILDREN of a target are a favorite.
Cause stalkers are always there
How about financing these groups? Although the author states that the pay is low, there are still very large expenses to harass people as thoroughly as targets report.Here is an example of what I mean by “large expenses”:
Groups are WELL FINANCED. They can afford to RENT PROPERTY WHEREVER THE TARGET LIVES. If he drives across the country, he will be followed bysupporters of similar groups in that area. If he travels by plane, group members will meet him wherever he lands. They may even accompany him on a plane if they knowhis travel plan, and there is a good chance that they do.
Author’s favorite quotes from perps he “rode” with
(Page 15)
Here are a few quotes from the perpetrators themselves:
We are like the police except we are ABOVE the police.
We are a citizen’s group that helps the police. We are trying to alert people in the area about this person [the target] before he gets to do what he did in the last place helived.
All the cause stalking targets I know did not commit ANY offenses. The stalkers are filled with LIES by their leaders.
When I get the call, I go to whatever the address is. It doesn’t matter what they [targets] do, they can never get away from us.
Personality types of the perpetrators
(Page 16)
More details about the typical cause stalking recruit:
Recruits tend to be blue collar workers who are at the bottom end of the job scale. They are janitors in apartments, hotels, etc., who have keys to get in any lockeddoors. They are security guards, who can let fellow members into places where they would not normally be allowed to go. They are city workers, who can, in manycities, follow a target around all day in their vehicles or have a noisy project underway near his [target’s] residence. They are taxi drivers, who are always on the road.They are cable, telephone and electric company employees who can interfere with a target’s service and spend time on patrol with the group, while they are on the job.
Firemen can be perps
Firemen across the country, and even some police departments have a long history of supporting extremist groups. Fire trucks can sometimes be seen riding in extremistconvoys, with their flashing lights turned on and their sirens screaming. They will also race to greet a convoy which is entering their town. The participation of firemen,city workers and utility company workers helps give group members an illusion of legitimacy and power.
Tearing up road is one recruitment goal
(Page 17)
City employees can be used to harass a target in many ways including tearing up the road in front of a target’s home. Employees of pest control businesses who haveaccess to the keys for apartments and those who work for alarm and locksmith companies are also of interest.
Groups also attack targets of convenience. These people are selected because they are convenient targets, and not for any other reason. These include loners who tendto be more vulnerable to their harassment tactics than those with family and friends around them. Targets of convenience are used for practice.
Groups have contacts in the media which they use to disseminate information about their targets. IT IS NOT UNUSUAL TO SEE THE VEHICLES OF LOCALTELEVISION STATIONS RIDING IN EXTREMIST CONVOYS.
In order to establish bases of operation, they will ENLIST THE ASSISTANCE OF NEIGHBORS. In many areas, they can do this by intimidation. Those who do notcooperate can be targetted, which includes harassment of their families and damage to their homes and vehicles.
If they are dealing with individuals who do not know them, they can also appeal to their sense of patriotism and they can offer drugs, friendship, home repair, free taxirides and what ever else they have to. In some cases they may even be able to get a key to the residence from a ‘patriotic’ landlord.
Surveillance is conducted 24 hours a day, 7 days a week. When a target leaves his residence they will alert the group, either by cell phone or by business band radio.Other members, who are patrolling the perimeter to watch for police and other vehicles driving in the area, will race to the location to begin pursuit. In small towns,where business band radio is widely used, these activities are a local sport among a small group. Anyone with a scanner can join in. Some targets have reported hearingan announcement on their scanners AS SOON AS THEY TURN THEIR LIGHTS ON IN THE MORNING.
Stalker groups’ financial sources
(Page 20)
This is what David Lawson learned about their financing:
The operations of many extremist groups are actually financed by CORPORATIONS which use them to stalk their enemies or potential enemies. The groups are usedas the PRIVATE ARMIES of those corporations. Some countries kill dissidents and in others they are jailed. In the United States, someone who is threatening tocorporations or industries, like a whistleblower or activist, is likely to become the target of an extremist group.
The author makes several statements that these criminal stalking groups not only harass targets specified by their leaders. They are also FOR HIRE a kind of“revenge service” for those wealthy enough to hire them.
Next, let’s look at some of the typical OPERATIONS these groups carry out:
The primary characteristic of cause stalking is that it is done by LARGE GROUPS OF PEOPLE. A target will always be followed, but he is unlikely to see the samestalkers very often.
Many of these groups include hundreds of people.
Perps surround apartment of target
(Page 27)
In a typical apartment setting, they will attempt to lease, sublet, or otherwise have access to apartments above, below, and on both sides of the target. They will also“guard” the vehicles of a target in the parking lot. If they have occupied apartments surrounding a target, typically normal noises like toilets flushing, doors closing,people talking, etc. will not be heard. The only noises that will be heard are in response to something the target does.
“Who are we”, perps’ own statement about themselves
(Page 27)
Who are we? We drive the ambulances that take you to the emergency room. When your house is burning, we put out the fire. We are security guards. We protect youat night. YOU ONLY HAVE ELECTRICITY, PHONE AND CABLE SERVICE BECAUSE OF US. We are janitors. We have the keys. We fix your cars. YOUDON’T WANT TO MESS WITH US.
The “cause” isn’t the most important thing to group members
The author concludes that the “cause” the typical group is “working toward” is mainly an excuse to get the groups together. This is explained at a number of places inthe book. The group members derive a sense of power and a sense of belonging. This is the main motivation of members who stay with these groups. Having a“cause” enhances the feelings of power and righteousness, but group members, according to the author, are most concerned with how their fellow group stalkers feelabout their “work” and accept them.
These groups come into being and are run by leaders. Here is what the author says about them:
Victims don’t always recognize harassment as such
Others do not recognize that they are being harassed by an organized group. They just think that there are much rude people in the world. Targets who do notexperience physical harassment are still targets for other types of attacks.
Isolating victim is the goal
(Page 32)
Physical harassment is used when a target has no witnesses. An objective is to isolate the target from his family and friends. He can tell them about all the strange thingshappening around him, but they will not understand and perhaps will think he is crazy. Sometimes other members of the family will receive the same treatment.
Surrounding victim on the road
(Page 32)
When a target is driving, standard practice is to surround his vehicle and attempt to control his speed. He will not be followed in close proximity by the same vehicles fora long distance. They do frequent tradeoffs. Vehicles line up behind the target for a short distance and then move out of place so the next vehicle can take over.Frequently, vehicles in the convoy will have their high beam headlights on during the day, so a target frequently have a vehicle behind him which has its headlights on.
In many parts of the country it is common to see groups of six to 30 or more vehicles driving around in convoys with their high beams on during the day. This is one ofthe ways a convoy can be identified.
The on foot harassment methods
(Page 33)
A target will be followed on foot wherever he goes. Anyone can go to the same public places he goes, and they will attempt to get into any other restricted places hegoes, including hospitals, places of employment, etc. It has been said that it is possible to go nearly anywhere if you have a clipboard in your hand and it is almost true.They also like to wear name badges on a lanyard, and some carry phony police badges.
Common harassment tactics used by those on foot include PEN CLICKING, in which they repeatedly click a ball point pen, key rattling, and rattling change in theirpockets while standing behind the target. Many tactics are tried and the result is observed. Those which evoke a response from the target are repeated. When a targetsits anywhere in public, group members will attempt to sit behind him in order to create noise, by whatever means, including tapping their feet on the target’s chair. Theobjective is to harass the target constantly.
Ah, the trusty old “noise campaign” trick!
(Page 34)
A common tactic use by groups is noise campaigns. Group members will drive by the target’s residence or work place, honking their horns, squealing tires, and makingwhatever other noise they can.
They will also make noise from whatever NEARBY PROPERTIES they have access to. Typically, they will make noise WHEN THE TARGET GOES OUTSIDE.
OR, when the target opens a window, and I mean timed to the millisecond! Open, close, perfect sync!
Group members will also frequently knock on his door for whatever peculiar reasons they can dream up.
In an apartment setting, targets can expect to hear tapping on the walls in the middle of the night, taps running, hammering etc. from the upper and/or lower apartments,and possibly the apartments on both sides. They will continue to ‘work’ on these activities for as long as they can get away with them.
Other vehicle related tactics include blockade, so the target vehicle cannot leave a parking lot, for example, or he is surrounded by slow moving vehicles.
Standard practice is to watch the target’s vehicles and this subjects them to damage including slashed tires, scratched paint, stolen license plates, etc. Typically theywould not cut the brake lines on vehicles or commit other similar acts of sabotage, but they WOULD drain the oil or antifreeze over a period of TIME.
Neighbors’ synchronized leaving/arriving
(Page 34)
Often they occupy a nearby apartment, part time, when the owner is not there and he receives some benefit. A target may notice someone leaving a nearby apartmentwhen he leaves his, and arrive when he arrives.
All the time, in the experience of Eleanor White.
Adjacent apt steady stream of people day and night
In addition, he will often be accompanied in elevators by a steady stream of different individuals who go to the apartments being used by the group.
Horns/sirens synced to toilet use
(Page 34)
If he flushes a toilet, he may hear a car horn honk, the sound of a power tool or hammering, for example. There will also be a large number of people coming and going,and accompanying rowdiness and noise.
A common ruse used by these groups is that they are a ‘citizens group’ which assists the police and they are ‘just keeping track of’ a certain individual, for whateverreason. The illusion is reinforced by the case files they carry which are complete with photos of the target and look like those used by police.
Typically, harassment tactics are not used unless a target is alone. If he is with others, group members will still surround him, but they will not reveal their presence.Many targets never experience the kind of harassment described here, because they are not alone very often.
Synchronized movement, apts above or below
(Page 35)
... It is not uncommon, in an apartment setting, for a target to hear someone moving from room to room as he does, from the upper or lower apartment.
Eleanor White believes that this will often require commercial through wall radar or more advanced technology.
I believe that observation with pinhole cameras is standard for all targeted individuals. It’s much cheaper and gives a much better image.
Interference with personal and business relationships
(Page 35)
Groups attempt to interfere with any business and personal relationships which the target has. Typically, this interference involves character assassination from someanonymous individual and is not usually taken seriously by those who know the target. It can be effective with people who don’t know the target.
Now that is a HUGE “laundry list” of operations carried out against the targets of these criminal cause stalking groups. But, this book is ALL MEAT, and there ismuch within its covers. If the general public is made aware of this book, these brutal crimes, which have resulted in suicides, just might have a chance of being exposedand stopped.
Currently, the typical justice system response is to label the victim as mentally ill. They wash their hands of the problem. This is itself a criminal act. Public officials haveaccepted job descriptions. They have sworn oaths. It’s a violation of all this. They are NOT doing their jobs!
Leaders’ claims of national security affiliation
(Page 37)
Most of these leaders HAVE BACKGROUNDS WHICH ARE NOT KNOWN TO THEIR SUPPORTERS. They are from ‘somewhere else’ and there isn’t muchinformation available about them from independent sources. This provides a basis for the ‘larger than life’ stature they assume in these groups. Many claim to haveconnections to the C.I.A. or other intelligence agencies which do not reveal the identities of their employees or exemployees.
Stalker groups blame TARGET for their shortcomings
(Page 49)
Group members are taught that THE TARGET IS THE REASON FOR THEIR PROBLEMS. He is the reason why their lives are a failure.
Character assassination
(Page 51)
At work, the target will also experience character assassination. If he works in any position where he has to deal with the public, there will be a steady stream ofcustomers who complain about him. If he is a real estate agent, he will have a steady stream of prospects who OCCUPY HIS TIME but never make an offer.
Eleanor White gives an example of how brutal and serious this “character assassination” can be.
A woman moved in with her husband and children to a house. Unknown to them, it had been a methamphetamine lab. The chemicals, used to brew meth, cause specificsymptoms in the mouth. The dentist of this family felt that he needed to “helping law enforcement.”He reported them as meth users. Foolish! But, the family didn’teven know that the report had been made. They had no way to correct it. (In some places, dentists are required to report suspected cases of meth use.) The police inthat area was linked to the citizen groups. The family was harassed for many years. The husband died because of these chemicals. The lady did a bit detective work.She found out about the reputation of her family. She got some help from a befriended policeman. He was from a different area. He admitted off the record that peoplecan being submitted to citizen groups because of “meth mouth.”
Character assassination is complete and has lifedestroying consequences!
Stalking leaders say targets should be killed
(Page 54)
What about the future, then? Let me close this review with a chilling quote from the book reporting what the author learned from some of the leaders:
The leaders ... are starting to balk at exposing their members to arrest for activities which amount to little gain for the movement. THEY SAY THAT ANYONE WHOIS A TARGET SHOULD BE KILLED, and not just harassed for years.
These gangs masquerade as political or religious groups, but they are private armies. While they have their own targets, which are connected to their political agenda,they are also available, for hire, to corporations and other entities, to destroy or neutralize people.
Illustration
Banner on bottom
Generated with www.html-to-pdf.net Page 3 / 7
Textonly version
This is Google's cache of http://www.hearingvoicesisvoicetoskull.com/ReviewOfTerroristStalking.htm. It is a snapshot of the page as it appeared on 3 Dec 201315:50:08 GMT. The current page could have changed in the meantime. Learn moreTip: To quickly find your search term on this page, press Ctrl+F or ⌘F (Mac) and use the find bar.
Banner on top
Review of Terrorist Stalking in AmericaTerrorist Stalking in America
AuthorDavid Lawson
ISBN0970309201
Published2001
Eleanor White wrote a review of the book with many quotes. I just restyled the text, to make it more clear. The chapters have numbering errors. I didn’t correct those. He writes that the goal is to isolate the target. He writes that leaders say that targets should be killed. It’s conflicting. The book contains useful information, but also the usual stuff from the disinformation mill that has probably been fed to the author. We can’t rely on him for the answer on the questions who and why. And he says nothing about electronic harassment. We are wary that he could have accepted money and/or favors in return for writing particular things.
The author infiltrated street level stalking groups. He rode with them as they carried out harassment assignments.
The police deny that such crimes happen. But, this book could help to convince skeptical family, friends, coworkers, and local authorities. It’s a breakthrough in thecause of exposing and stopping these stalking groups.
Table of contents
FOREWORD ............................... VI1. Intro to Extremist Groups ......... 102. Who Are These People? ............. 163. Selection of Targets .............. 193. Group Structure ................... 225. The Surveillance Operation ........ 256. Search and Seizure ................ 287. Overt or Covert Operation ......... 328. Let’s Pretend ..................... 378. Influence Techniques .............. 409. Self Defense ...................... 4811. Conclusion ........................ 53Appendix A DOJ article on stalking ... 57Bibliography ........................... 67References ............................. 73
The police are aware of these groups
(Page VI)
David Lawson interviewed perpetrators (“perps”), targeted people (“targets”), and the POLICE. This is what the author heard from the police that he interviewed:
I also spoke with police officers from across the country. They confirmed the existence of stalking groups across the country. In general, they said that ‘cause stalking’ isprimarily a civil problem where the plaintiff has to prove financial loss. They also said that there are free speech and grass roots issues involved. In fact, the policethemselves are targets of these groups. In small towns, the number of members in these groups can easily exceed the number of police officers. In general, the police willNOT talk about stalking groups. One officer did say there is a storm brewing as groups become larger and more numerous.
David Lawson explains how he got involved and began to interact with the ‘cause stalking’ perpetrators:
One day, several years ago, I was sitting in my house, and checking out the activity on my scanner. I heard a woman say that she was following a certain vehicle. Shegave the location, the make and model of the car and the license plate number. A few days later, I heard the same woman on the same frequency say that she needed abit of help at a certain location and a few days after that I again heard her broadcasting the position and details about another vehicle she was following. I listened toother people talking on that frequency and they didn’t give any indication that they were with any government agency but they were talking about ARRESTINGPEOPLE.
On another occasion, on the same business band frequency, I heard someone complain that an African American man was crossing the street. “All we could get himfor is jaywalking” responded the leader.
People in the group would discuss where they would go for supper, after their shift was over, so I [the author] went too. I listened to a group of people openlydiscussing various activities as if they were the police.
Real police officers were also sitting in the restaurant, listening to them. I later learned that their presence was not a coincidence.
One man who had supper with the group drove a van marked with the call letters of a local AM radio station. I started listening to it. Most of the guests were peoplewho said they had new revelations about Waco or Ruby Ridge, or had some inside story about government corruption. I also heard advertisements for the meetings of alocal political group and I attended some.
At the first meeting I attended, one young man flashed a phony police badge at me. No one paid any attention. Some of those in attendance were the people I had seenin the local restaurant. This was my introduction to the creepy world of extremists.
David Lawson goes on to explain that he has observed extremist groups for several years while living in New York State, Florida, and Canada.
He monitored their public communications, attended meetings, rode with them.
The author defines the basic reason for being for these stalking groups as CAUSE STALKING. Cause stalking means the group is assembled, under a leader with a“shadowy past,” for some specific cause. But, what actually happens is that these groups seem to be:
... groups of individuals who appear to be borderline retarded, mentally ill, or deluded into thinking that they are secret agents.
Cause stalking has been used by extremist groups since the early 1990s. The basic system is alleged to have been developed by the Ku Klux Klan and refined throughyears of use.
David Lawson is mistaken when he calls the Patriot Movement terroristic.
What is terrorism? Terrorism is the systematic use of terror. Terror is violent or destructive acts (as bombing) committed by groups to intimidate a population orgovernment into granting their demands.
This is clearly not what the Patriot Movement wants. The Patriot Movement strives to expose government crimes.
Tactics used by “cause stalkers”
(Page VII)
Some authors refer to cause stalking as terrorist stalking. Groups do not just stalk individuals. They employ organized programs of harassment which include BREAKINS, PROPERTY DAMAGE, ASSAULT AND OCCASIONALLY, EVEN DEATH. The CHILDREN of a target are a favorite.
Cause stalkers are always there
How about financing these groups? Although the author states that the pay is low, there are still very large expenses to harass people as thoroughly as targets report.Here is an example of what I mean by “large expenses”:
Groups are WELL FINANCED. They can afford to RENT PROPERTY WHEREVER THE TARGET LIVES. If he drives across the country, he will be followed bysupporters of similar groups in that area. If he travels by plane, group members will meet him wherever he lands. They may even accompany him on a plane if they knowhis travel plan, and there is a good chance that they do.
Author’s favorite quotes from perps he “rode” with
(Page 15)
Here are a few quotes from the perpetrators themselves:
We are like the police except we are ABOVE the police.
We are a citizen’s group that helps the police. We are trying to alert people in the area about this person [the target] before he gets to do what he did in the last place helived.
All the cause stalking targets I know did not commit ANY offenses. The stalkers are filled with LIES by their leaders.
When I get the call, I go to whatever the address is. It doesn’t matter what they [targets] do, they can never get away from us.
Personality types of the perpetrators
(Page 16)
More details about the typical cause stalking recruit:
Recruits tend to be blue collar workers who are at the bottom end of the job scale. They are janitors in apartments, hotels, etc., who have keys to get in any lockeddoors. They are security guards, who can let fellow members into places where they would not normally be allowed to go. They are city workers, who can, in manycities, follow a target around all day in their vehicles or have a noisy project underway near his [target’s] residence. They are taxi drivers, who are always on the road.They are cable, telephone and electric company employees who can interfere with a target’s service and spend time on patrol with the group, while they are on the job.
Firemen can be perps
Firemen across the country, and even some police departments have a long history of supporting extremist groups. Fire trucks can sometimes be seen riding in extremistconvoys, with their flashing lights turned on and their sirens screaming. They will also race to greet a convoy which is entering their town. The participation of firemen,city workers and utility company workers helps give group members an illusion of legitimacy and power.
Tearing up road is one recruitment goal
(Page 17)
City employees can be used to harass a target in many ways including tearing up the road in front of a target’s home. Employees of pest control businesses who haveaccess to the keys for apartments and those who work for alarm and locksmith companies are also of interest.
Groups also attack targets of convenience. These people are selected because they are convenient targets, and not for any other reason. These include loners who tendto be more vulnerable to their harassment tactics than those with family and friends around them. Targets of convenience are used for practice.
Groups have contacts in the media which they use to disseminate information about their targets. IT IS NOT UNUSUAL TO SEE THE VEHICLES OF LOCALTELEVISION STATIONS RIDING IN EXTREMIST CONVOYS.
In order to establish bases of operation, they will ENLIST THE ASSISTANCE OF NEIGHBORS. In many areas, they can do this by intimidation. Those who do notcooperate can be targetted, which includes harassment of their families and damage to their homes and vehicles.
If they are dealing with individuals who do not know them, they can also appeal to their sense of patriotism and they can offer drugs, friendship, home repair, free taxirides and what ever else they have to. In some cases they may even be able to get a key to the residence from a ‘patriotic’ landlord.
Surveillance is conducted 24 hours a day, 7 days a week. When a target leaves his residence they will alert the group, either by cell phone or by business band radio.Other members, who are patrolling the perimeter to watch for police and other vehicles driving in the area, will race to the location to begin pursuit. In small towns,where business band radio is widely used, these activities are a local sport among a small group. Anyone with a scanner can join in. Some targets have reported hearingan announcement on their scanners AS SOON AS THEY TURN THEIR LIGHTS ON IN THE MORNING.
Stalker groups’ financial sources
(Page 20)
This is what David Lawson learned about their financing:
The operations of many extremist groups are actually financed by CORPORATIONS which use them to stalk their enemies or potential enemies. The groups are usedas the PRIVATE ARMIES of those corporations. Some countries kill dissidents and in others they are jailed. In the United States, someone who is threatening tocorporations or industries, like a whistleblower or activist, is likely to become the target of an extremist group.
The author makes several statements that these criminal stalking groups not only harass targets specified by their leaders. They are also FOR HIRE a kind of“revenge service” for those wealthy enough to hire them.
Next, let’s look at some of the typical OPERATIONS these groups carry out:
The primary characteristic of cause stalking is that it is done by LARGE GROUPS OF PEOPLE. A target will always be followed, but he is unlikely to see the samestalkers very often.
Many of these groups include hundreds of people.
Perps surround apartment of target
(Page 27)
In a typical apartment setting, they will attempt to lease, sublet, or otherwise have access to apartments above, below, and on both sides of the target. They will also“guard” the vehicles of a target in the parking lot. If they have occupied apartments surrounding a target, typically normal noises like toilets flushing, doors closing,people talking, etc. will not be heard. The only noises that will be heard are in response to something the target does.
“Who are we”, perps’ own statement about themselves
(Page 27)
Who are we? We drive the ambulances that take you to the emergency room. When your house is burning, we put out the fire. We are security guards. We protect youat night. YOU ONLY HAVE ELECTRICITY, PHONE AND CABLE SERVICE BECAUSE OF US. We are janitors. We have the keys. We fix your cars. YOUDON’T WANT TO MESS WITH US.
The “cause” isn’t the most important thing to group members
The author concludes that the “cause” the typical group is “working toward” is mainly an excuse to get the groups together. This is explained at a number of places inthe book. The group members derive a sense of power and a sense of belonging. This is the main motivation of members who stay with these groups. Having a“cause” enhances the feelings of power and righteousness, but group members, according to the author, are most concerned with how their fellow group stalkers feelabout their “work” and accept them.
These groups come into being and are run by leaders. Here is what the author says about them:
Victims don’t always recognize harassment as such
Others do not recognize that they are being harassed by an organized group. They just think that there are much rude people in the world. Targets who do notexperience physical harassment are still targets for other types of attacks.
Isolating victim is the goal
(Page 32)
Physical harassment is used when a target has no witnesses. An objective is to isolate the target from his family and friends. He can tell them about all the strange thingshappening around him, but they will not understand and perhaps will think he is crazy. Sometimes other members of the family will receive the same treatment.
Surrounding victim on the road
(Page 32)
When a target is driving, standard practice is to surround his vehicle and attempt to control his speed. He will not be followed in close proximity by the same vehicles fora long distance. They do frequent tradeoffs. Vehicles line up behind the target for a short distance and then move out of place so the next vehicle can take over.Frequently, vehicles in the convoy will have their high beam headlights on during the day, so a target frequently have a vehicle behind him which has its headlights on.
In many parts of the country it is common to see groups of six to 30 or more vehicles driving around in convoys with their high beams on during the day. This is one ofthe ways a convoy can be identified.
The on foot harassment methods
(Page 33)
A target will be followed on foot wherever he goes. Anyone can go to the same public places he goes, and they will attempt to get into any other restricted places hegoes, including hospitals, places of employment, etc. It has been said that it is possible to go nearly anywhere if you have a clipboard in your hand and it is almost true.They also like to wear name badges on a lanyard, and some carry phony police badges.
Common harassment tactics used by those on foot include PEN CLICKING, in which they repeatedly click a ball point pen, key rattling, and rattling change in theirpockets while standing behind the target. Many tactics are tried and the result is observed. Those which evoke a response from the target are repeated. When a targetsits anywhere in public, group members will attempt to sit behind him in order to create noise, by whatever means, including tapping their feet on the target’s chair. Theobjective is to harass the target constantly.
Ah, the trusty old “noise campaign” trick!
(Page 34)
A common tactic use by groups is noise campaigns. Group members will drive by the target’s residence or work place, honking their horns, squealing tires, and makingwhatever other noise they can.
They will also make noise from whatever NEARBY PROPERTIES they have access to. Typically, they will make noise WHEN THE TARGET GOES OUTSIDE.
OR, when the target opens a window, and I mean timed to the millisecond! Open, close, perfect sync!
Group members will also frequently knock on his door for whatever peculiar reasons they can dream up.
In an apartment setting, targets can expect to hear tapping on the walls in the middle of the night, taps running, hammering etc. from the upper and/or lower apartments,and possibly the apartments on both sides. They will continue to ‘work’ on these activities for as long as they can get away with them.
Other vehicle related tactics include blockade, so the target vehicle cannot leave a parking lot, for example, or he is surrounded by slow moving vehicles.
Standard practice is to watch the target’s vehicles and this subjects them to damage including slashed tires, scratched paint, stolen license plates, etc. Typically theywould not cut the brake lines on vehicles or commit other similar acts of sabotage, but they WOULD drain the oil or antifreeze over a period of TIME.
Neighbors’ synchronized leaving/arriving
(Page 34)
Often they occupy a nearby apartment, part time, when the owner is not there and he receives some benefit. A target may notice someone leaving a nearby apartmentwhen he leaves his, and arrive when he arrives.
All the time, in the experience of Eleanor White.
Adjacent apt steady stream of people day and night
In addition, he will often be accompanied in elevators by a steady stream of different individuals who go to the apartments being used by the group.
Horns/sirens synced to toilet use
(Page 34)
If he flushes a toilet, he may hear a car horn honk, the sound of a power tool or hammering, for example. There will also be a large number of people coming and going,and accompanying rowdiness and noise.
A common ruse used by these groups is that they are a ‘citizens group’ which assists the police and they are ‘just keeping track of’ a certain individual, for whateverreason. The illusion is reinforced by the case files they carry which are complete with photos of the target and look like those used by police.
Typically, harassment tactics are not used unless a target is alone. If he is with others, group members will still surround him, but they will not reveal their presence.Many targets never experience the kind of harassment described here, because they are not alone very often.
Synchronized movement, apts above or below
(Page 35)
... It is not uncommon, in an apartment setting, for a target to hear someone moving from room to room as he does, from the upper or lower apartment.
Eleanor White believes that this will often require commercial through wall radar or more advanced technology.
I believe that observation with pinhole cameras is standard for all targeted individuals. It’s much cheaper and gives a much better image.
Interference with personal and business relationships
(Page 35)
Groups attempt to interfere with any business and personal relationships which the target has. Typically, this interference involves character assassination from someanonymous individual and is not usually taken seriously by those who know the target. It can be effective with people who don’t know the target.
Now that is a HUGE “laundry list” of operations carried out against the targets of these criminal cause stalking groups. But, this book is ALL MEAT, and there ismuch within its covers. If the general public is made aware of this book, these brutal crimes, which have resulted in suicides, just might have a chance of being exposedand stopped.
Currently, the typical justice system response is to label the victim as mentally ill. They wash their hands of the problem. This is itself a criminal act. Public officials haveaccepted job descriptions. They have sworn oaths. It’s a violation of all this. They are NOT doing their jobs!
Leaders’ claims of national security affiliation
(Page 37)
Most of these leaders HAVE BACKGROUNDS WHICH ARE NOT KNOWN TO THEIR SUPPORTERS. They are from ‘somewhere else’ and there isn’t muchinformation available about them from independent sources. This provides a basis for the ‘larger than life’ stature they assume in these groups. Many claim to haveconnections to the C.I.A. or other intelligence agencies which do not reveal the identities of their employees or exemployees.
Stalker groups blame TARGET for their shortcomings
(Page 49)
Group members are taught that THE TARGET IS THE REASON FOR THEIR PROBLEMS. He is the reason why their lives are a failure.
Character assassination
(Page 51)
At work, the target will also experience character assassination. If he works in any position where he has to deal with the public, there will be a steady stream ofcustomers who complain about him. If he is a real estate agent, he will have a steady stream of prospects who OCCUPY HIS TIME but never make an offer.
Eleanor White gives an example of how brutal and serious this “character assassination” can be.
A woman moved in with her husband and children to a house. Unknown to them, it had been a methamphetamine lab. The chemicals, used to brew meth, cause specificsymptoms in the mouth. The dentist of this family felt that he needed to “helping law enforcement.”He reported them as meth users. Foolish! But, the family didn’teven know that the report had been made. They had no way to correct it. (In some places, dentists are required to report suspected cases of meth use.) The police inthat area was linked to the citizen groups. The family was harassed for many years. The husband died because of these chemicals. The lady did a bit detective work.She found out about the reputation of her family. She got some help from a befriended policeman. He was from a different area. He admitted off the record that peoplecan being submitted to citizen groups because of “meth mouth.”
Character assassination is complete and has lifedestroying consequences!
Stalking leaders say targets should be killed
(Page 54)
What about the future, then? Let me close this review with a chilling quote from the book reporting what the author learned from some of the leaders:
The leaders ... are starting to balk at exposing their members to arrest for activities which amount to little gain for the movement. THEY SAY THAT ANYONE WHOIS A TARGET SHOULD BE KILLED, and not just harassed for years.
These gangs masquerade as political or religious groups, but they are private armies. While they have their own targets, which are connected to their political agenda,they are also available, for hire, to corporations and other entities, to destroy or neutralize people.
Illustration
Banner on bottom
Generated with www.html-to-pdf.net Page 4 / 7
Textonly version
This is Google's cache of http://www.hearingvoicesisvoicetoskull.com/ReviewOfTerroristStalking.htm. It is a snapshot of the page as it appeared on 3 Dec 201315:50:08 GMT. The current page could have changed in the meantime. Learn moreTip: To quickly find your search term on this page, press Ctrl+F or ⌘F (Mac) and use the find bar.
Banner on top
Review of Terrorist Stalking in AmericaTerrorist Stalking in America
AuthorDavid Lawson
ISBN0970309201
Published2001
Eleanor White wrote a review of the book with many quotes. I just restyled the text, to make it more clear. The chapters have numbering errors. I didn’t correct those. He writes that the goal is to isolate the target. He writes that leaders say that targets should be killed. It’s conflicting. The book contains useful information, but also the usual stuff from the disinformation mill that has probably been fed to the author. We can’t rely on him for the answer on the questions who and why. And he says nothing about electronic harassment. We are wary that he could have accepted money and/or favors in return for writing particular things.
The author infiltrated street level stalking groups. He rode with them as they carried out harassment assignments.
The police deny that such crimes happen. But, this book could help to convince skeptical family, friends, coworkers, and local authorities. It’s a breakthrough in thecause of exposing and stopping these stalking groups.
Table of contents
FOREWORD ............................... VI1. Intro to Extremist Groups ......... 102. Who Are These People? ............. 163. Selection of Targets .............. 193. Group Structure ................... 225. The Surveillance Operation ........ 256. Search and Seizure ................ 287. Overt or Covert Operation ......... 328. Let’s Pretend ..................... 378. Influence Techniques .............. 409. Self Defense ...................... 4811. Conclusion ........................ 53Appendix A DOJ article on stalking ... 57Bibliography ........................... 67References ............................. 73
The police are aware of these groups
(Page VI)
David Lawson interviewed perpetrators (“perps”), targeted people (“targets”), and the POLICE. This is what the author heard from the police that he interviewed:
I also spoke with police officers from across the country. They confirmed the existence of stalking groups across the country. In general, they said that ‘cause stalking’ isprimarily a civil problem where the plaintiff has to prove financial loss. They also said that there are free speech and grass roots issues involved. In fact, the policethemselves are targets of these groups. In small towns, the number of members in these groups can easily exceed the number of police officers. In general, the police willNOT talk about stalking groups. One officer did say there is a storm brewing as groups become larger and more numerous.
David Lawson explains how he got involved and began to interact with the ‘cause stalking’ perpetrators:
One day, several years ago, I was sitting in my house, and checking out the activity on my scanner. I heard a woman say that she was following a certain vehicle. Shegave the location, the make and model of the car and the license plate number. A few days later, I heard the same woman on the same frequency say that she needed abit of help at a certain location and a few days after that I again heard her broadcasting the position and details about another vehicle she was following. I listened toother people talking on that frequency and they didn’t give any indication that they were with any government agency but they were talking about ARRESTINGPEOPLE.
On another occasion, on the same business band frequency, I heard someone complain that an African American man was crossing the street. “All we could get himfor is jaywalking” responded the leader.
People in the group would discuss where they would go for supper, after their shift was over, so I [the author] went too. I listened to a group of people openlydiscussing various activities as if they were the police.
Real police officers were also sitting in the restaurant, listening to them. I later learned that their presence was not a coincidence.
One man who had supper with the group drove a van marked with the call letters of a local AM radio station. I started listening to it. Most of the guests were peoplewho said they had new revelations about Waco or Ruby Ridge, or had some inside story about government corruption. I also heard advertisements for the meetings of alocal political group and I attended some.
At the first meeting I attended, one young man flashed a phony police badge at me. No one paid any attention. Some of those in attendance were the people I had seenin the local restaurant. This was my introduction to the creepy world of extremists.
David Lawson goes on to explain that he has observed extremist groups for several years while living in New York State, Florida, and Canada.
He monitored their public communications, attended meetings, rode with them.
The author defines the basic reason for being for these stalking groups as CAUSE STALKING. Cause stalking means the group is assembled, under a leader with a“shadowy past,” for some specific cause. But, what actually happens is that these groups seem to be:
... groups of individuals who appear to be borderline retarded, mentally ill, or deluded into thinking that they are secret agents.
Cause stalking has been used by extremist groups since the early 1990s. The basic system is alleged to have been developed by the Ku Klux Klan and refined throughyears of use.
David Lawson is mistaken when he calls the Patriot Movement terroristic.
What is terrorism? Terrorism is the systematic use of terror. Terror is violent or destructive acts (as bombing) committed by groups to intimidate a population orgovernment into granting their demands.
This is clearly not what the Patriot Movement wants. The Patriot Movement strives to expose government crimes.
Tactics used by “cause stalkers”
(Page VII)
Some authors refer to cause stalking as terrorist stalking. Groups do not just stalk individuals. They employ organized programs of harassment which include BREAKINS, PROPERTY DAMAGE, ASSAULT AND OCCASIONALLY, EVEN DEATH. The CHILDREN of a target are a favorite.
Cause stalkers are always there
How about financing these groups? Although the author states that the pay is low, there are still very large expenses to harass people as thoroughly as targets report.Here is an example of what I mean by “large expenses”:
Groups are WELL FINANCED. They can afford to RENT PROPERTY WHEREVER THE TARGET LIVES. If he drives across the country, he will be followed bysupporters of similar groups in that area. If he travels by plane, group members will meet him wherever he lands. They may even accompany him on a plane if they knowhis travel plan, and there is a good chance that they do.
Author’s favorite quotes from perps he “rode” with
(Page 15)
Here are a few quotes from the perpetrators themselves:
We are like the police except we are ABOVE the police.
We are a citizen’s group that helps the police. We are trying to alert people in the area about this person [the target] before he gets to do what he did in the last place helived.
All the cause stalking targets I know did not commit ANY offenses. The stalkers are filled with LIES by their leaders.
When I get the call, I go to whatever the address is. It doesn’t matter what they [targets] do, they can never get away from us.
Personality types of the perpetrators
(Page 16)
More details about the typical cause stalking recruit:
Recruits tend to be blue collar workers who are at the bottom end of the job scale. They are janitors in apartments, hotels, etc., who have keys to get in any lockeddoors. They are security guards, who can let fellow members into places where they would not normally be allowed to go. They are city workers, who can, in manycities, follow a target around all day in their vehicles or have a noisy project underway near his [target’s] residence. They are taxi drivers, who are always on the road.They are cable, telephone and electric company employees who can interfere with a target’s service and spend time on patrol with the group, while they are on the job.
Firemen can be perps
Firemen across the country, and even some police departments have a long history of supporting extremist groups. Fire trucks can sometimes be seen riding in extremistconvoys, with their flashing lights turned on and their sirens screaming. They will also race to greet a convoy which is entering their town. The participation of firemen,city workers and utility company workers helps give group members an illusion of legitimacy and power.
Tearing up road is one recruitment goal
(Page 17)
City employees can be used to harass a target in many ways including tearing up the road in front of a target’s home. Employees of pest control businesses who haveaccess to the keys for apartments and those who work for alarm and locksmith companies are also of interest.
Groups also attack targets of convenience. These people are selected because they are convenient targets, and not for any other reason. These include loners who tendto be more vulnerable to their harassment tactics than those with family and friends around them. Targets of convenience are used for practice.
Groups have contacts in the media which they use to disseminate information about their targets. IT IS NOT UNUSUAL TO SEE THE VEHICLES OF LOCALTELEVISION STATIONS RIDING IN EXTREMIST CONVOYS.
In order to establish bases of operation, they will ENLIST THE ASSISTANCE OF NEIGHBORS. In many areas, they can do this by intimidation. Those who do notcooperate can be targetted, which includes harassment of their families and damage to their homes and vehicles.
If they are dealing with individuals who do not know them, they can also appeal to their sense of patriotism and they can offer drugs, friendship, home repair, free taxirides and what ever else they have to. In some cases they may even be able to get a key to the residence from a ‘patriotic’ landlord.
Surveillance is conducted 24 hours a day, 7 days a week. When a target leaves his residence they will alert the group, either by cell phone or by business band radio.Other members, who are patrolling the perimeter to watch for police and other vehicles driving in the area, will race to the location to begin pursuit. In small towns,where business band radio is widely used, these activities are a local sport among a small group. Anyone with a scanner can join in. Some targets have reported hearingan announcement on their scanners AS SOON AS THEY TURN THEIR LIGHTS ON IN THE MORNING.
Stalker groups’ financial sources
(Page 20)
This is what David Lawson learned about their financing:
The operations of many extremist groups are actually financed by CORPORATIONS which use them to stalk their enemies or potential enemies. The groups are usedas the PRIVATE ARMIES of those corporations. Some countries kill dissidents and in others they are jailed. In the United States, someone who is threatening tocorporations or industries, like a whistleblower or activist, is likely to become the target of an extremist group.
The author makes several statements that these criminal stalking groups not only harass targets specified by their leaders. They are also FOR HIRE a kind of“revenge service” for those wealthy enough to hire them.
Next, let’s look at some of the typical OPERATIONS these groups carry out:
The primary characteristic of cause stalking is that it is done by LARGE GROUPS OF PEOPLE. A target will always be followed, but he is unlikely to see the samestalkers very often.
Many of these groups include hundreds of people.
Perps surround apartment of target
(Page 27)
In a typical apartment setting, they will attempt to lease, sublet, or otherwise have access to apartments above, below, and on both sides of the target. They will also“guard” the vehicles of a target in the parking lot. If they have occupied apartments surrounding a target, typically normal noises like toilets flushing, doors closing,people talking, etc. will not be heard. The only noises that will be heard are in response to something the target does.
“Who are we”, perps’ own statement about themselves
(Page 27)
Who are we? We drive the ambulances that take you to the emergency room. When your house is burning, we put out the fire. We are security guards. We protect youat night. YOU ONLY HAVE ELECTRICITY, PHONE AND CABLE SERVICE BECAUSE OF US. We are janitors. We have the keys. We fix your cars. YOUDON’T WANT TO MESS WITH US.
The “cause” isn’t the most important thing to group members
The author concludes that the “cause” the typical group is “working toward” is mainly an excuse to get the groups together. This is explained at a number of places inthe book. The group members derive a sense of power and a sense of belonging. This is the main motivation of members who stay with these groups. Having a“cause” enhances the feelings of power and righteousness, but group members, according to the author, are most concerned with how their fellow group stalkers feelabout their “work” and accept them.
These groups come into being and are run by leaders. Here is what the author says about them:
Victims don’t always recognize harassment as such
Others do not recognize that they are being harassed by an organized group. They just think that there are much rude people in the world. Targets who do notexperience physical harassment are still targets for other types of attacks.
Isolating victim is the goal
(Page 32)
Physical harassment is used when a target has no witnesses. An objective is to isolate the target from his family and friends. He can tell them about all the strange thingshappening around him, but they will not understand and perhaps will think he is crazy. Sometimes other members of the family will receive the same treatment.
Surrounding victim on the road
(Page 32)
When a target is driving, standard practice is to surround his vehicle and attempt to control his speed. He will not be followed in close proximity by the same vehicles fora long distance. They do frequent tradeoffs. Vehicles line up behind the target for a short distance and then move out of place so the next vehicle can take over.Frequently, vehicles in the convoy will have their high beam headlights on during the day, so a target frequently have a vehicle behind him which has its headlights on.
In many parts of the country it is common to see groups of six to 30 or more vehicles driving around in convoys with their high beams on during the day. This is one ofthe ways a convoy can be identified.
The on foot harassment methods
(Page 33)
A target will be followed on foot wherever he goes. Anyone can go to the same public places he goes, and they will attempt to get into any other restricted places hegoes, including hospitals, places of employment, etc. It has been said that it is possible to go nearly anywhere if you have a clipboard in your hand and it is almost true.They also like to wear name badges on a lanyard, and some carry phony police badges.
Common harassment tactics used by those on foot include PEN CLICKING, in which they repeatedly click a ball point pen, key rattling, and rattling change in theirpockets while standing behind the target. Many tactics are tried and the result is observed. Those which evoke a response from the target are repeated. When a targetsits anywhere in public, group members will attempt to sit behind him in order to create noise, by whatever means, including tapping their feet on the target’s chair. Theobjective is to harass the target constantly.
Ah, the trusty old “noise campaign” trick!
(Page 34)
A common tactic use by groups is noise campaigns. Group members will drive by the target’s residence or work place, honking their horns, squealing tires, and makingwhatever other noise they can.
They will also make noise from whatever NEARBY PROPERTIES they have access to. Typically, they will make noise WHEN THE TARGET GOES OUTSIDE.
OR, when the target opens a window, and I mean timed to the millisecond! Open, close, perfect sync!
Group members will also frequently knock on his door for whatever peculiar reasons they can dream up.
In an apartment setting, targets can expect to hear tapping on the walls in the middle of the night, taps running, hammering etc. from the upper and/or lower apartments,and possibly the apartments on both sides. They will continue to ‘work’ on these activities for as long as they can get away with them.
Other vehicle related tactics include blockade, so the target vehicle cannot leave a parking lot, for example, or he is surrounded by slow moving vehicles.
Standard practice is to watch the target’s vehicles and this subjects them to damage including slashed tires, scratched paint, stolen license plates, etc. Typically theywould not cut the brake lines on vehicles or commit other similar acts of sabotage, but they WOULD drain the oil or antifreeze over a period of TIME.
Neighbors’ synchronized leaving/arriving
(Page 34)
Often they occupy a nearby apartment, part time, when the owner is not there and he receives some benefit. A target may notice someone leaving a nearby apartmentwhen he leaves his, and arrive when he arrives.
All the time, in the experience of Eleanor White.
Adjacent apt steady stream of people day and night
In addition, he will often be accompanied in elevators by a steady stream of different individuals who go to the apartments being used by the group.
Horns/sirens synced to toilet use
(Page 34)
If he flushes a toilet, he may hear a car horn honk, the sound of a power tool or hammering, for example. There will also be a large number of people coming and going,and accompanying rowdiness and noise.
A common ruse used by these groups is that they are a ‘citizens group’ which assists the police and they are ‘just keeping track of’ a certain individual, for whateverreason. The illusion is reinforced by the case files they carry which are complete with photos of the target and look like those used by police.
Typically, harassment tactics are not used unless a target is alone. If he is with others, group members will still surround him, but they will not reveal their presence.Many targets never experience the kind of harassment described here, because they are not alone very often.
Synchronized movement, apts above or below
(Page 35)
... It is not uncommon, in an apartment setting, for a target to hear someone moving from room to room as he does, from the upper or lower apartment.
Eleanor White believes that this will often require commercial through wall radar or more advanced technology.
I believe that observation with pinhole cameras is standard for all targeted individuals. It’s much cheaper and gives a much better image.
Interference with personal and business relationships
(Page 35)
Groups attempt to interfere with any business and personal relationships which the target has. Typically, this interference involves character assassination from someanonymous individual and is not usually taken seriously by those who know the target. It can be effective with people who don’t know the target.
Now that is a HUGE “laundry list” of operations carried out against the targets of these criminal cause stalking groups. But, this book is ALL MEAT, and there ismuch within its covers. If the general public is made aware of this book, these brutal crimes, which have resulted in suicides, just might have a chance of being exposedand stopped.
Currently, the typical justice system response is to label the victim as mentally ill. They wash their hands of the problem. This is itself a criminal act. Public officials haveaccepted job descriptions. They have sworn oaths. It’s a violation of all this. They are NOT doing their jobs!
Leaders’ claims of national security affiliation
(Page 37)
Most of these leaders HAVE BACKGROUNDS WHICH ARE NOT KNOWN TO THEIR SUPPORTERS. They are from ‘somewhere else’ and there isn’t muchinformation available about them from independent sources. This provides a basis for the ‘larger than life’ stature they assume in these groups. Many claim to haveconnections to the C.I.A. or other intelligence agencies which do not reveal the identities of their employees or exemployees.
Stalker groups blame TARGET for their shortcomings
(Page 49)
Group members are taught that THE TARGET IS THE REASON FOR THEIR PROBLEMS. He is the reason why their lives are a failure.
Character assassination
(Page 51)
At work, the target will also experience character assassination. If he works in any position where he has to deal with the public, there will be a steady stream ofcustomers who complain about him. If he is a real estate agent, he will have a steady stream of prospects who OCCUPY HIS TIME but never make an offer.
Eleanor White gives an example of how brutal and serious this “character assassination” can be.
A woman moved in with her husband and children to a house. Unknown to them, it had been a methamphetamine lab. The chemicals, used to brew meth, cause specificsymptoms in the mouth. The dentist of this family felt that he needed to “helping law enforcement.”He reported them as meth users. Foolish! But, the family didn’teven know that the report had been made. They had no way to correct it. (In some places, dentists are required to report suspected cases of meth use.) The police inthat area was linked to the citizen groups. The family was harassed for many years. The husband died because of these chemicals. The lady did a bit detective work.She found out about the reputation of her family. She got some help from a befriended policeman. He was from a different area. He admitted off the record that peoplecan being submitted to citizen groups because of “meth mouth.”
Character assassination is complete and has lifedestroying consequences!
Stalking leaders say targets should be killed
(Page 54)
What about the future, then? Let me close this review with a chilling quote from the book reporting what the author learned from some of the leaders:
The leaders ... are starting to balk at exposing their members to arrest for activities which amount to little gain for the movement. THEY SAY THAT ANYONE WHOIS A TARGET SHOULD BE KILLED, and not just harassed for years.
These gangs masquerade as political or religious groups, but they are private armies. While they have their own targets, which are connected to their political agenda,they are also available, for hire, to corporations and other entities, to destroy or neutralize people.
Illustration
Banner on bottom
Generated with www.html-to-pdf.net Page 5 / 7
Textonly version
This is Google's cache of http://www.hearingvoicesisvoicetoskull.com/ReviewOfTerroristStalking.htm. It is a snapshot of the page as it appeared on 3 Dec 201315:50:08 GMT. The current page could have changed in the meantime. Learn moreTip: To quickly find your search term on this page, press Ctrl+F or ⌘F (Mac) and use the find bar.
Banner on top
Review of Terrorist Stalking in AmericaTerrorist Stalking in America
AuthorDavid Lawson
ISBN0970309201
Published2001
Eleanor White wrote a review of the book with many quotes. I just restyled the text, to make it more clear. The chapters have numbering errors. I didn’t correct those. He writes that the goal is to isolate the target. He writes that leaders say that targets should be killed. It’s conflicting. The book contains useful information, but also the usual stuff from the disinformation mill that has probably been fed to the author. We can’t rely on him for the answer on the questions who and why. And he says nothing about electronic harassment. We are wary that he could have accepted money and/or favors in return for writing particular things.
The author infiltrated street level stalking groups. He rode with them as they carried out harassment assignments.
The police deny that such crimes happen. But, this book could help to convince skeptical family, friends, coworkers, and local authorities. It’s a breakthrough in thecause of exposing and stopping these stalking groups.
Table of contents
FOREWORD ............................... VI1. Intro to Extremist Groups ......... 102. Who Are These People? ............. 163. Selection of Targets .............. 193. Group Structure ................... 225. The Surveillance Operation ........ 256. Search and Seizure ................ 287. Overt or Covert Operation ......... 328. Let’s Pretend ..................... 378. Influence Techniques .............. 409. Self Defense ...................... 4811. Conclusion ........................ 53Appendix A DOJ article on stalking ... 57Bibliography ........................... 67References ............................. 73
The police are aware of these groups
(Page VI)
David Lawson interviewed perpetrators (“perps”), targeted people (“targets”), and the POLICE. This is what the author heard from the police that he interviewed:
I also spoke with police officers from across the country. They confirmed the existence of stalking groups across the country. In general, they said that ‘cause stalking’ isprimarily a civil problem where the plaintiff has to prove financial loss. They also said that there are free speech and grass roots issues involved. In fact, the policethemselves are targets of these groups. In small towns, the number of members in these groups can easily exceed the number of police officers. In general, the police willNOT talk about stalking groups. One officer did say there is a storm brewing as groups become larger and more numerous.
David Lawson explains how he got involved and began to interact with the ‘cause stalking’ perpetrators:
One day, several years ago, I was sitting in my house, and checking out the activity on my scanner. I heard a woman say that she was following a certain vehicle. Shegave the location, the make and model of the car and the license plate number. A few days later, I heard the same woman on the same frequency say that she needed abit of help at a certain location and a few days after that I again heard her broadcasting the position and details about another vehicle she was following. I listened toother people talking on that frequency and they didn’t give any indication that they were with any government agency but they were talking about ARRESTINGPEOPLE.
On another occasion, on the same business band frequency, I heard someone complain that an African American man was crossing the street. “All we could get himfor is jaywalking” responded the leader.
People in the group would discuss where they would go for supper, after their shift was over, so I [the author] went too. I listened to a group of people openlydiscussing various activities as if they were the police.
Real police officers were also sitting in the restaurant, listening to them. I later learned that their presence was not a coincidence.
One man who had supper with the group drove a van marked with the call letters of a local AM radio station. I started listening to it. Most of the guests were peoplewho said they had new revelations about Waco or Ruby Ridge, or had some inside story about government corruption. I also heard advertisements for the meetings of alocal political group and I attended some.
At the first meeting I attended, one young man flashed a phony police badge at me. No one paid any attention. Some of those in attendance were the people I had seenin the local restaurant. This was my introduction to the creepy world of extremists.
David Lawson goes on to explain that he has observed extremist groups for several years while living in New York State, Florida, and Canada.
He monitored their public communications, attended meetings, rode with them.
The author defines the basic reason for being for these stalking groups as CAUSE STALKING. Cause stalking means the group is assembled, under a leader with a“shadowy past,” for some specific cause. But, what actually happens is that these groups seem to be:
... groups of individuals who appear to be borderline retarded, mentally ill, or deluded into thinking that they are secret agents.
Cause stalking has been used by extremist groups since the early 1990s. The basic system is alleged to have been developed by the Ku Klux Klan and refined throughyears of use.
David Lawson is mistaken when he calls the Patriot Movement terroristic.
What is terrorism? Terrorism is the systematic use of terror. Terror is violent or destructive acts (as bombing) committed by groups to intimidate a population orgovernment into granting their demands.
This is clearly not what the Patriot Movement wants. The Patriot Movement strives to expose government crimes.
Tactics used by “cause stalkers”
(Page VII)
Some authors refer to cause stalking as terrorist stalking. Groups do not just stalk individuals. They employ organized programs of harassment which include BREAKINS, PROPERTY DAMAGE, ASSAULT AND OCCASIONALLY, EVEN DEATH. The CHILDREN of a target are a favorite.
Cause stalkers are always there
How about financing these groups? Although the author states that the pay is low, there are still very large expenses to harass people as thoroughly as targets report.Here is an example of what I mean by “large expenses”:
Groups are WELL FINANCED. They can afford to RENT PROPERTY WHEREVER THE TARGET LIVES. If he drives across the country, he will be followed bysupporters of similar groups in that area. If he travels by plane, group members will meet him wherever he lands. They may even accompany him on a plane if they knowhis travel plan, and there is a good chance that they do.
Author’s favorite quotes from perps he “rode” with
(Page 15)
Here are a few quotes from the perpetrators themselves:
We are like the police except we are ABOVE the police.
We are a citizen’s group that helps the police. We are trying to alert people in the area about this person [the target] before he gets to do what he did in the last place helived.
All the cause stalking targets I know did not commit ANY offenses. The stalkers are filled with LIES by their leaders.
When I get the call, I go to whatever the address is. It doesn’t matter what they [targets] do, they can never get away from us.
Personality types of the perpetrators
(Page 16)
More details about the typical cause stalking recruit:
Recruits tend to be blue collar workers who are at the bottom end of the job scale. They are janitors in apartments, hotels, etc., who have keys to get in any lockeddoors. They are security guards, who can let fellow members into places where they would not normally be allowed to go. They are city workers, who can, in manycities, follow a target around all day in their vehicles or have a noisy project underway near his [target’s] residence. They are taxi drivers, who are always on the road.They are cable, telephone and electric company employees who can interfere with a target’s service and spend time on patrol with the group, while they are on the job.
Firemen can be perps
Firemen across the country, and even some police departments have a long history of supporting extremist groups. Fire trucks can sometimes be seen riding in extremistconvoys, with their flashing lights turned on and their sirens screaming. They will also race to greet a convoy which is entering their town. The participation of firemen,city workers and utility company workers helps give group members an illusion of legitimacy and power.
Tearing up road is one recruitment goal
(Page 17)
City employees can be used to harass a target in many ways including tearing up the road in front of a target’s home. Employees of pest control businesses who haveaccess to the keys for apartments and those who work for alarm and locksmith companies are also of interest.
Groups also attack targets of convenience. These people are selected because they are convenient targets, and not for any other reason. These include loners who tendto be more vulnerable to their harassment tactics than those with family and friends around them. Targets of convenience are used for practice.
Groups have contacts in the media which they use to disseminate information about their targets. IT IS NOT UNUSUAL TO SEE THE VEHICLES OF LOCALTELEVISION STATIONS RIDING IN EXTREMIST CONVOYS.
In order to establish bases of operation, they will ENLIST THE ASSISTANCE OF NEIGHBORS. In many areas, they can do this by intimidation. Those who do notcooperate can be targetted, which includes harassment of their families and damage to their homes and vehicles.
If they are dealing with individuals who do not know them, they can also appeal to their sense of patriotism and they can offer drugs, friendship, home repair, free taxirides and what ever else they have to. In some cases they may even be able to get a key to the residence from a ‘patriotic’ landlord.
Surveillance is conducted 24 hours a day, 7 days a week. When a target leaves his residence they will alert the group, either by cell phone or by business band radio.Other members, who are patrolling the perimeter to watch for police and other vehicles driving in the area, will race to the location to begin pursuit. In small towns,where business band radio is widely used, these activities are a local sport among a small group. Anyone with a scanner can join in. Some targets have reported hearingan announcement on their scanners AS SOON AS THEY TURN THEIR LIGHTS ON IN THE MORNING.
Stalker groups’ financial sources
(Page 20)
This is what David Lawson learned about their financing:
The operations of many extremist groups are actually financed by CORPORATIONS which use them to stalk their enemies or potential enemies. The groups are usedas the PRIVATE ARMIES of those corporations. Some countries kill dissidents and in others they are jailed. In the United States, someone who is threatening tocorporations or industries, like a whistleblower or activist, is likely to become the target of an extremist group.
The author makes several statements that these criminal stalking groups not only harass targets specified by their leaders. They are also FOR HIRE a kind of“revenge service” for those wealthy enough to hire them.
Next, let’s look at some of the typical OPERATIONS these groups carry out:
The primary characteristic of cause stalking is that it is done by LARGE GROUPS OF PEOPLE. A target will always be followed, but he is unlikely to see the samestalkers very often.
Many of these groups include hundreds of people.
Perps surround apartment of target
(Page 27)
In a typical apartment setting, they will attempt to lease, sublet, or otherwise have access to apartments above, below, and on both sides of the target. They will also“guard” the vehicles of a target in the parking lot. If they have occupied apartments surrounding a target, typically normal noises like toilets flushing, doors closing,people talking, etc. will not be heard. The only noises that will be heard are in response to something the target does.
“Who are we”, perps’ own statement about themselves
(Page 27)
Who are we? We drive the ambulances that take you to the emergency room. When your house is burning, we put out the fire. We are security guards. We protect youat night. YOU ONLY HAVE ELECTRICITY, PHONE AND CABLE SERVICE BECAUSE OF US. We are janitors. We have the keys. We fix your cars. YOUDON’T WANT TO MESS WITH US.
The “cause” isn’t the most important thing to group members
The author concludes that the “cause” the typical group is “working toward” is mainly an excuse to get the groups together. This is explained at a number of places inthe book. The group members derive a sense of power and a sense of belonging. This is the main motivation of members who stay with these groups. Having a“cause” enhances the feelings of power and righteousness, but group members, according to the author, are most concerned with how their fellow group stalkers feelabout their “work” and accept them.
These groups come into being and are run by leaders. Here is what the author says about them:
Victims don’t always recognize harassment as such
Others do not recognize that they are being harassed by an organized group. They just think that there are much rude people in the world. Targets who do notexperience physical harassment are still targets for other types of attacks.
Isolating victim is the goal
(Page 32)
Physical harassment is used when a target has no witnesses. An objective is to isolate the target from his family and friends. He can tell them about all the strange thingshappening around him, but they will not understand and perhaps will think he is crazy. Sometimes other members of the family will receive the same treatment.
Surrounding victim on the road
(Page 32)
When a target is driving, standard practice is to surround his vehicle and attempt to control his speed. He will not be followed in close proximity by the same vehicles fora long distance. They do frequent tradeoffs. Vehicles line up behind the target for a short distance and then move out of place so the next vehicle can take over.Frequently, vehicles in the convoy will have their high beam headlights on during the day, so a target frequently have a vehicle behind him which has its headlights on.
In many parts of the country it is common to see groups of six to 30 or more vehicles driving around in convoys with their high beams on during the day. This is one ofthe ways a convoy can be identified.
The on foot harassment methods
(Page 33)
A target will be followed on foot wherever he goes. Anyone can go to the same public places he goes, and they will attempt to get into any other restricted places hegoes, including hospitals, places of employment, etc. It has been said that it is possible to go nearly anywhere if you have a clipboard in your hand and it is almost true.They also like to wear name badges on a lanyard, and some carry phony police badges.
Common harassment tactics used by those on foot include PEN CLICKING, in which they repeatedly click a ball point pen, key rattling, and rattling change in theirpockets while standing behind the target. Many tactics are tried and the result is observed. Those which evoke a response from the target are repeated. When a targetsits anywhere in public, group members will attempt to sit behind him in order to create noise, by whatever means, including tapping their feet on the target’s chair. Theobjective is to harass the target constantly.
Ah, the trusty old “noise campaign” trick!
(Page 34)
A common tactic use by groups is noise campaigns. Group members will drive by the target’s residence or work place, honking their horns, squealing tires, and makingwhatever other noise they can.
They will also make noise from whatever NEARBY PROPERTIES they have access to. Typically, they will make noise WHEN THE TARGET GOES OUTSIDE.
OR, when the target opens a window, and I mean timed to the millisecond! Open, close, perfect sync!
Group members will also frequently knock on his door for whatever peculiar reasons they can dream up.
In an apartment setting, targets can expect to hear tapping on the walls in the middle of the night, taps running, hammering etc. from the upper and/or lower apartments,and possibly the apartments on both sides. They will continue to ‘work’ on these activities for as long as they can get away with them.
Other vehicle related tactics include blockade, so the target vehicle cannot leave a parking lot, for example, or he is surrounded by slow moving vehicles.
Standard practice is to watch the target’s vehicles and this subjects them to damage including slashed tires, scratched paint, stolen license plates, etc. Typically theywould not cut the brake lines on vehicles or commit other similar acts of sabotage, but they WOULD drain the oil or antifreeze over a period of TIME.
Neighbors’ synchronized leaving/arriving
(Page 34)
Often they occupy a nearby apartment, part time, when the owner is not there and he receives some benefit. A target may notice someone leaving a nearby apartmentwhen he leaves his, and arrive when he arrives.
All the time, in the experience of Eleanor White.
Adjacent apt steady stream of people day and night
In addition, he will often be accompanied in elevators by a steady stream of different individuals who go to the apartments being used by the group.
Horns/sirens synced to toilet use
(Page 34)
If he flushes a toilet, he may hear a car horn honk, the sound of a power tool or hammering, for example. There will also be a large number of people coming and going,and accompanying rowdiness and noise.
A common ruse used by these groups is that they are a ‘citizens group’ which assists the police and they are ‘just keeping track of’ a certain individual, for whateverreason. The illusion is reinforced by the case files they carry which are complete with photos of the target and look like those used by police.
Typically, harassment tactics are not used unless a target is alone. If he is with others, group members will still surround him, but they will not reveal their presence.Many targets never experience the kind of harassment described here, because they are not alone very often.
Synchronized movement, apts above or below
(Page 35)
... It is not uncommon, in an apartment setting, for a target to hear someone moving from room to room as he does, from the upper or lower apartment.
Eleanor White believes that this will often require commercial through wall radar or more advanced technology.
I believe that observation with pinhole cameras is standard for all targeted individuals. It’s much cheaper and gives a much better image.
Interference with personal and business relationships
(Page 35)
Groups attempt to interfere with any business and personal relationships which the target has. Typically, this interference involves character assassination from someanonymous individual and is not usually taken seriously by those who know the target. It can be effective with people who don’t know the target.
Now that is a HUGE “laundry list” of operations carried out against the targets of these criminal cause stalking groups. But, this book is ALL MEAT, and there ismuch within its covers. If the general public is made aware of this book, these brutal crimes, which have resulted in suicides, just might have a chance of being exposedand stopped.
Currently, the typical justice system response is to label the victim as mentally ill. They wash their hands of the problem. This is itself a criminal act. Public officials haveaccepted job descriptions. They have sworn oaths. It’s a violation of all this. They are NOT doing their jobs!
Leaders’ claims of national security affiliation
(Page 37)
Most of these leaders HAVE BACKGROUNDS WHICH ARE NOT KNOWN TO THEIR SUPPORTERS. They are from ‘somewhere else’ and there isn’t muchinformation available about them from independent sources. This provides a basis for the ‘larger than life’ stature they assume in these groups. Many claim to haveconnections to the C.I.A. or other intelligence agencies which do not reveal the identities of their employees or exemployees.
Stalker groups blame TARGET for their shortcomings
(Page 49)
Group members are taught that THE TARGET IS THE REASON FOR THEIR PROBLEMS. He is the reason why their lives are a failure.
Character assassination
(Page 51)
At work, the target will also experience character assassination. If he works in any position where he has to deal with the public, there will be a steady stream ofcustomers who complain about him. If he is a real estate agent, he will have a steady stream of prospects who OCCUPY HIS TIME but never make an offer.
Eleanor White gives an example of how brutal and serious this “character assassination” can be.
A woman moved in with her husband and children to a house. Unknown to them, it had been a methamphetamine lab. The chemicals, used to brew meth, cause specificsymptoms in the mouth. The dentist of this family felt that he needed to “helping law enforcement.”He reported them as meth users. Foolish! But, the family didn’teven know that the report had been made. They had no way to correct it. (In some places, dentists are required to report suspected cases of meth use.) The police inthat area was linked to the citizen groups. The family was harassed for many years. The husband died because of these chemicals. The lady did a bit detective work.She found out about the reputation of her family. She got some help from a befriended policeman. He was from a different area. He admitted off the record that peoplecan being submitted to citizen groups because of “meth mouth.”
Character assassination is complete and has lifedestroying consequences!
Stalking leaders say targets should be killed
(Page 54)
What about the future, then? Let me close this review with a chilling quote from the book reporting what the author learned from some of the leaders:
The leaders ... are starting to balk at exposing their members to arrest for activities which amount to little gain for the movement. THEY SAY THAT ANYONE WHOIS A TARGET SHOULD BE KILLED, and not just harassed for years.
These gangs masquerade as political or religious groups, but they are private armies. While they have their own targets, which are connected to their political agenda,they are also available, for hire, to corporations and other entities, to destroy or neutralize people.
Illustration
Banner on bottom
Generated with www.html-to-pdf.net Page 6 / 7
Textonly version
This is Google's cache of http://www.hearingvoicesisvoicetoskull.com/ReviewOfTerroristStalking.htm. It is a snapshot of the page as it appeared on 3 Dec 201315:50:08 GMT. The current page could have changed in the meantime. Learn moreTip: To quickly find your search term on this page, press Ctrl+F or ⌘F (Mac) and use the find bar.
Banner on top
Review of Terrorist Stalking in AmericaTerrorist Stalking in America
AuthorDavid Lawson
ISBN0970309201
Published2001
Eleanor White wrote a review of the book with many quotes. I just restyled the text, to make it more clear. The chapters have numbering errors. I didn’t correct those. He writes that the goal is to isolate the target. He writes that leaders say that targets should be killed. It’s conflicting. The book contains useful information, but also the usual stuff from the disinformation mill that has probably been fed to the author. We can’t rely on him for the answer on the questions who and why. And he says nothing about electronic harassment. We are wary that he could have accepted money and/or favors in return for writing particular things.
The author infiltrated street level stalking groups. He rode with them as they carried out harassment assignments.
The police deny that such crimes happen. But, this book could help to convince skeptical family, friends, coworkers, and local authorities. It’s a breakthrough in thecause of exposing and stopping these stalking groups.
Table of contents
FOREWORD ............................... VI1. Intro to Extremist Groups ......... 102. Who Are These People? ............. 163. Selection of Targets .............. 193. Group Structure ................... 225. The Surveillance Operation ........ 256. Search and Seizure ................ 287. Overt or Covert Operation ......... 328. Let’s Pretend ..................... 378. Influence Techniques .............. 409. Self Defense ...................... 4811. Conclusion ........................ 53Appendix A DOJ article on stalking ... 57Bibliography ........................... 67References ............................. 73
The police are aware of these groups
(Page VI)
David Lawson interviewed perpetrators (“perps”), targeted people (“targets”), and the POLICE. This is what the author heard from the police that he interviewed:
I also spoke with police officers from across the country. They confirmed the existence of stalking groups across the country. In general, they said that ‘cause stalking’ isprimarily a civil problem where the plaintiff has to prove financial loss. They also said that there are free speech and grass roots issues involved. In fact, the policethemselves are targets of these groups. In small towns, the number of members in these groups can easily exceed the number of police officers. In general, the police willNOT talk about stalking groups. One officer did say there is a storm brewing as groups become larger and more numerous.
David Lawson explains how he got involved and began to interact with the ‘cause stalking’ perpetrators:
One day, several years ago, I was sitting in my house, and checking out the activity on my scanner. I heard a woman say that she was following a certain vehicle. Shegave the location, the make and model of the car and the license plate number. A few days later, I heard the same woman on the same frequency say that she needed abit of help at a certain location and a few days after that I again heard her broadcasting the position and details about another vehicle she was following. I listened toother people talking on that frequency and they didn’t give any indication that they were with any government agency but they were talking about ARRESTINGPEOPLE.
On another occasion, on the same business band frequency, I heard someone complain that an African American man was crossing the street. “All we could get himfor is jaywalking” responded the leader.
People in the group would discuss where they would go for supper, after their shift was over, so I [the author] went too. I listened to a group of people openlydiscussing various activities as if they were the police.
Real police officers were also sitting in the restaurant, listening to them. I later learned that their presence was not a coincidence.
One man who had supper with the group drove a van marked with the call letters of a local AM radio station. I started listening to it. Most of the guests were peoplewho said they had new revelations about Waco or Ruby Ridge, or had some inside story about government corruption. I also heard advertisements for the meetings of alocal political group and I attended some.
At the first meeting I attended, one young man flashed a phony police badge at me. No one paid any attention. Some of those in attendance were the people I had seenin the local restaurant. This was my introduction to the creepy world of extremists.
David Lawson goes on to explain that he has observed extremist groups for several years while living in New York State, Florida, and Canada.
He monitored their public communications, attended meetings, rode with them.
The author defines the basic reason for being for these stalking groups as CAUSE STALKING. Cause stalking means the group is assembled, under a leader with a“shadowy past,” for some specific cause. But, what actually happens is that these groups seem to be:
... groups of individuals who appear to be borderline retarded, mentally ill, or deluded into thinking that they are secret agents.
Cause stalking has been used by extremist groups since the early 1990s. The basic system is alleged to have been developed by the Ku Klux Klan and refined throughyears of use.
David Lawson is mistaken when he calls the Patriot Movement terroristic.
What is terrorism? Terrorism is the systematic use of terror. Terror is violent or destructive acts (as bombing) committed by groups to intimidate a population orgovernment into granting their demands.
This is clearly not what the Patriot Movement wants. The Patriot Movement strives to expose government crimes.
Tactics used by “cause stalkers”
(Page VII)
Some authors refer to cause stalking as terrorist stalking. Groups do not just stalk individuals. They employ organized programs of harassment which include BREAKINS, PROPERTY DAMAGE, ASSAULT AND OCCASIONALLY, EVEN DEATH. The CHILDREN of a target are a favorite.
Cause stalkers are always there
How about financing these groups? Although the author states that the pay is low, there are still very large expenses to harass people as thoroughly as targets report.Here is an example of what I mean by “large expenses”:
Groups are WELL FINANCED. They can afford to RENT PROPERTY WHEREVER THE TARGET LIVES. If he drives across the country, he will be followed bysupporters of similar groups in that area. If he travels by plane, group members will meet him wherever he lands. They may even accompany him on a plane if they knowhis travel plan, and there is a good chance that they do.
Author’s favorite quotes from perps he “rode” with
(Page 15)
Here are a few quotes from the perpetrators themselves:
We are like the police except we are ABOVE the police.
We are a citizen’s group that helps the police. We are trying to alert people in the area about this person [the target] before he gets to do what he did in the last place helived.
All the cause stalking targets I know did not commit ANY offenses. The stalkers are filled with LIES by their leaders.
When I get the call, I go to whatever the address is. It doesn’t matter what they [targets] do, they can never get away from us.
Personality types of the perpetrators
(Page 16)
More details about the typical cause stalking recruit:
Recruits tend to be blue collar workers who are at the bottom end of the job scale. They are janitors in apartments, hotels, etc., who have keys to get in any lockeddoors. They are security guards, who can let fellow members into places where they would not normally be allowed to go. They are city workers, who can, in manycities, follow a target around all day in their vehicles or have a noisy project underway near his [target’s] residence. They are taxi drivers, who are always on the road.They are cable, telephone and electric company employees who can interfere with a target’s service and spend time on patrol with the group, while they are on the job.
Firemen can be perps
Firemen across the country, and even some police departments have a long history of supporting extremist groups. Fire trucks can sometimes be seen riding in extremistconvoys, with their flashing lights turned on and their sirens screaming. They will also race to greet a convoy which is entering their town. The participation of firemen,city workers and utility company workers helps give group members an illusion of legitimacy and power.
Tearing up road is one recruitment goal
(Page 17)
City employees can be used to harass a target in many ways including tearing up the road in front of a target’s home. Employees of pest control businesses who haveaccess to the keys for apartments and those who work for alarm and locksmith companies are also of interest.
Groups also attack targets of convenience. These people are selected because they are convenient targets, and not for any other reason. These include loners who tendto be more vulnerable to their harassment tactics than those with family and friends around them. Targets of convenience are used for practice.
Groups have contacts in the media which they use to disseminate information about their targets. IT IS NOT UNUSUAL TO SEE THE VEHICLES OF LOCALTELEVISION STATIONS RIDING IN EXTREMIST CONVOYS.
In order to establish bases of operation, they will ENLIST THE ASSISTANCE OF NEIGHBORS. In many areas, they can do this by intimidation. Those who do notcooperate can be targetted, which includes harassment of their families and damage to their homes and vehicles.
If they are dealing with individuals who do not know them, they can also appeal to their sense of patriotism and they can offer drugs, friendship, home repair, free taxirides and what ever else they have to. In some cases they may even be able to get a key to the residence from a ‘patriotic’ landlord.
Surveillance is conducted 24 hours a day, 7 days a week. When a target leaves his residence they will alert the group, either by cell phone or by business band radio.Other members, who are patrolling the perimeter to watch for police and other vehicles driving in the area, will race to the location to begin pursuit. In small towns,where business band radio is widely used, these activities are a local sport among a small group. Anyone with a scanner can join in. Some targets have reported hearingan announcement on their scanners AS SOON AS THEY TURN THEIR LIGHTS ON IN THE MORNING.
Stalker groups’ financial sources
(Page 20)
This is what David Lawson learned about their financing:
The operations of many extremist groups are actually financed by CORPORATIONS which use them to stalk their enemies or potential enemies. The groups are usedas the PRIVATE ARMIES of those corporations. Some countries kill dissidents and in others they are jailed. In the United States, someone who is threatening tocorporations or industries, like a whistleblower or activist, is likely to become the target of an extremist group.
The author makes several statements that these criminal stalking groups not only harass targets specified by their leaders. They are also FOR HIRE a kind of“revenge service” for those wealthy enough to hire them.
Next, let’s look at some of the typical OPERATIONS these groups carry out:
The primary characteristic of cause stalking is that it is done by LARGE GROUPS OF PEOPLE. A target will always be followed, but he is unlikely to see the samestalkers very often.
Many of these groups include hundreds of people.
Perps surround apartment of target
(Page 27)
In a typical apartment setting, they will attempt to lease, sublet, or otherwise have access to apartments above, below, and on both sides of the target. They will also“guard” the vehicles of a target in the parking lot. If they have occupied apartments surrounding a target, typically normal noises like toilets flushing, doors closing,people talking, etc. will not be heard. The only noises that will be heard are in response to something the target does.
“Who are we”, perps’ own statement about themselves
(Page 27)
Who are we? We drive the ambulances that take you to the emergency room. When your house is burning, we put out the fire. We are security guards. We protect youat night. YOU ONLY HAVE ELECTRICITY, PHONE AND CABLE SERVICE BECAUSE OF US. We are janitors. We have the keys. We fix your cars. YOUDON’T WANT TO MESS WITH US.
The “cause” isn’t the most important thing to group members
The author concludes that the “cause” the typical group is “working toward” is mainly an excuse to get the groups together. This is explained at a number of places inthe book. The group members derive a sense of power and a sense of belonging. This is the main motivation of members who stay with these groups. Having a“cause” enhances the feelings of power and righteousness, but group members, according to the author, are most concerned with how their fellow group stalkers feelabout their “work” and accept them.
These groups come into being and are run by leaders. Here is what the author says about them:
Victims don’t always recognize harassment as such
Others do not recognize that they are being harassed by an organized group. They just think that there are much rude people in the world. Targets who do notexperience physical harassment are still targets for other types of attacks.
Isolating victim is the goal
(Page 32)
Physical harassment is used when a target has no witnesses. An objective is to isolate the target from his family and friends. He can tell them about all the strange thingshappening around him, but they will not understand and perhaps will think he is crazy. Sometimes other members of the family will receive the same treatment.
Surrounding victim on the road
(Page 32)
When a target is driving, standard practice is to surround his vehicle and attempt to control his speed. He will not be followed in close proximity by the same vehicles fora long distance. They do frequent tradeoffs. Vehicles line up behind the target for a short distance and then move out of place so the next vehicle can take over.Frequently, vehicles in the convoy will have their high beam headlights on during the day, so a target frequently have a vehicle behind him which has its headlights on.
In many parts of the country it is common to see groups of six to 30 or more vehicles driving around in convoys with their high beams on during the day. This is one ofthe ways a convoy can be identified.
The on foot harassment methods
(Page 33)
A target will be followed on foot wherever he goes. Anyone can go to the same public places he goes, and they will attempt to get into any other restricted places hegoes, including hospitals, places of employment, etc. It has been said that it is possible to go nearly anywhere if you have a clipboard in your hand and it is almost true.They also like to wear name badges on a lanyard, and some carry phony police badges.
Common harassment tactics used by those on foot include PEN CLICKING, in which they repeatedly click a ball point pen, key rattling, and rattling change in theirpockets while standing behind the target. Many tactics are tried and the result is observed. Those which evoke a response from the target are repeated. When a targetsits anywhere in public, group members will attempt to sit behind him in order to create noise, by whatever means, including tapping their feet on the target’s chair. Theobjective is to harass the target constantly.
Ah, the trusty old “noise campaign” trick!
(Page 34)
A common tactic use by groups is noise campaigns. Group members will drive by the target’s residence or work place, honking their horns, squealing tires, and makingwhatever other noise they can.
They will also make noise from whatever NEARBY PROPERTIES they have access to. Typically, they will make noise WHEN THE TARGET GOES OUTSIDE.
OR, when the target opens a window, and I mean timed to the millisecond! Open, close, perfect sync!
Group members will also frequently knock on his door for whatever peculiar reasons they can dream up.
In an apartment setting, targets can expect to hear tapping on the walls in the middle of the night, taps running, hammering etc. from the upper and/or lower apartments,and possibly the apartments on both sides. They will continue to ‘work’ on these activities for as long as they can get away with them.
Other vehicle related tactics include blockade, so the target vehicle cannot leave a parking lot, for example, or he is surrounded by slow moving vehicles.
Standard practice is to watch the target’s vehicles and this subjects them to damage including slashed tires, scratched paint, stolen license plates, etc. Typically theywould not cut the brake lines on vehicles or commit other similar acts of sabotage, but they WOULD drain the oil or antifreeze over a period of TIME.
Neighbors’ synchronized leaving/arriving
(Page 34)
Often they occupy a nearby apartment, part time, when the owner is not there and he receives some benefit. A target may notice someone leaving a nearby apartmentwhen he leaves his, and arrive when he arrives.
All the time, in the experience of Eleanor White.
Adjacent apt steady stream of people day and night
In addition, he will often be accompanied in elevators by a steady stream of different individuals who go to the apartments being used by the group.
Horns/sirens synced to toilet use
(Page 34)
If he flushes a toilet, he may hear a car horn honk, the sound of a power tool or hammering, for example. There will also be a large number of people coming and going,and accompanying rowdiness and noise.
A common ruse used by these groups is that they are a ‘citizens group’ which assists the police and they are ‘just keeping track of’ a certain individual, for whateverreason. The illusion is reinforced by the case files they carry which are complete with photos of the target and look like those used by police.
Typically, harassment tactics are not used unless a target is alone. If he is with others, group members will still surround him, but they will not reveal their presence.Many targets never experience the kind of harassment described here, because they are not alone very often.
Synchronized movement, apts above or below
(Page 35)
... It is not uncommon, in an apartment setting, for a target to hear someone moving from room to room as he does, from the upper or lower apartment.
Eleanor White believes that this will often require commercial through wall radar or more advanced technology.
I believe that observation with pinhole cameras is standard for all targeted individuals. It’s much cheaper and gives a much better image.
Interference with personal and business relationships
(Page 35)
Groups attempt to interfere with any business and personal relationships which the target has. Typically, this interference involves character assassination from someanonymous individual and is not usually taken seriously by those who know the target. It can be effective with people who don’t know the target.
Now that is a HUGE “laundry list” of operations carried out against the targets of these criminal cause stalking groups. But, this book is ALL MEAT, and there ismuch within its covers. If the general public is made aware of this book, these brutal crimes, which have resulted in suicides, just might have a chance of being exposedand stopped.
Currently, the typical justice system response is to label the victim as mentally ill. They wash their hands of the problem. This is itself a criminal act. Public officials haveaccepted job descriptions. They have sworn oaths. It’s a violation of all this. They are NOT doing their jobs!
Leaders’ claims of national security affiliation
(Page 37)
Most of these leaders HAVE BACKGROUNDS WHICH ARE NOT KNOWN TO THEIR SUPPORTERS. They are from ‘somewhere else’ and there isn’t muchinformation available about them from independent sources. This provides a basis for the ‘larger than life’ stature they assume in these groups. Many claim to haveconnections to the C.I.A. or other intelligence agencies which do not reveal the identities of their employees or exemployees.
Stalker groups blame TARGET for their shortcomings
(Page 49)
Group members are taught that THE TARGET IS THE REASON FOR THEIR PROBLEMS. He is the reason why their lives are a failure.
Character assassination
(Page 51)
At work, the target will also experience character assassination. If he works in any position where he has to deal with the public, there will be a steady stream ofcustomers who complain about him. If he is a real estate agent, he will have a steady stream of prospects who OCCUPY HIS TIME but never make an offer.
Eleanor White gives an example of how brutal and serious this “character assassination” can be.
A woman moved in with her husband and children to a house. Unknown to them, it had been a methamphetamine lab. The chemicals, used to brew meth, cause specificsymptoms in the mouth. The dentist of this family felt that he needed to “helping law enforcement.”He reported them as meth users. Foolish! But, the family didn’teven know that the report had been made. They had no way to correct it. (In some places, dentists are required to report suspected cases of meth use.) The police inthat area was linked to the citizen groups. The family was harassed for many years. The husband died because of these chemicals. The lady did a bit detective work.She found out about the reputation of her family. She got some help from a befriended policeman. He was from a different area. He admitted off the record that peoplecan being submitted to citizen groups because of “meth mouth.”
Character assassination is complete and has lifedestroying consequences!
Stalking leaders say targets should be killed
(Page 54)
What about the future, then? Let me close this review with a chilling quote from the book reporting what the author learned from some of the leaders:
The leaders ... are starting to balk at exposing their members to arrest for activities which amount to little gain for the movement. THEY SAY THAT ANYONE WHOIS A TARGET SHOULD BE KILLED, and not just harassed for years.
These gangs masquerade as political or religious groups, but they are private armies. While they have their own targets, which are connected to their political agenda,they are also available, for hire, to corporations and other entities, to destroy or neutralize people.
Illustration
Banner on bottom
Generated with www.html-to-pdf.net Page 7 / 7