Methodology
Overview
Gangstalking tactics, psychological operations, coordination systems, and control mechanisms used in targeting operations.
Core Topics
[[organized-stalking-methodology|Organized Stalking Methodology]]
Comprehensive documentation of the systematic tactics and procedures used in coordinated harassment campaigns. Based on analysis of military manuals, whistleblower testimonies, and survivor accounts.
Key Components:
- The Three-Phase Protocol (Separate, Isolate, Influence)
- Street-level tactics (vehicle, pedestrian, home-based)
- Psychological operations (PSYOPS/MISO)
- Recruitment and organization methods
- Military doctrine integration (JP 3-24, FM 34-1)
- Historical precedents (Stasi, COINTELPRO, Phoenix Program)
[[1.tactics/gangstalking|Gangstalking]]
Comprehensive overview of systematic organized stalking and harassment targeting individuals through coordinated community-based surveillance and psychological warfare.
Key Aspects:
- Definition and alternative names
- Historical precedents (COINTELPRO, Stasi Zersetzung)
- Operational structure and command hierarchy
- Core tactics and progression phases
- Economic structure and profit motives
[[1.tactics/predatory-gangstalking|Predatory Gangstalking]]
Detailed analysis of predatory gangstalking as a criminal phenomenon involving coordinated groups systematically invading all areas of an individual's life.
Key Aspects:
- Types of gangstalking (flash mobbing, cause stalking, ritual, workplace, cyber)
- Perpetrator categories and motivations
- Information dominance tactics
- Synchronicity and discrediting campaigns
[[1.tactics/stasi-zerzetzung|Stasi Zersetzung]]
Historical precedent from East German secret police that serves as the template for modern gangstalking operations.
Key Aspects:
- Official Stasi directive on decomposition
- Psychological warfare methods
- Connection to modern JTRIG 5 D's
- Implementation in Western countries
[[1.tactics/no-touch-torture|No-Touch Torture]]
Psychological and electronic torture methods designed to inflict maximum suffering while leaving minimal physical evidence.
Key Aspects:
- Evidence minimization techniques
- Psychological methods (isolation, gaslighting, sleep deprivation)
- Electronic methods (DEW, V2K)
- The 5 D's framework
Historical Documentation
[[malleus-maleficarum|Malleus Maleficarum (1486)]]
The "Hammer of Witches" - influential witch-hunting manual that formalized demonology including Asmodeus as demon of lust. Demonstrates historical precedent for systematic persecution using accusation, torture, and execution as control mechanisms.
Key Aspects:
- Institutionalized persecution methodology
- Sexual control through demonology
- Psychological warfare patterns
- Template for modern targeting
[[19th-century-jesuit-infiltration|19th Century Jesuit Infiltration]]
Historical documentation from 1800s sources warning of Jesuit Order infiltration of American institutions, describing America as "THE INVADED TERRITORY."
Key Sources:
- Orestes A. Brownson
- Ridpath's Universal History
- The Jesuit Conspiracy (1848)
- Samuel Morse
Modern Connections:
- USA PATRIOT Act
- DHS
- Religious persecution patterns
Political Control Methodologies
Elite Compromise and Blackmail
Systematic methodology for controlling political leaders through compromising situations, as documented by mind control survivors Cathy O'Brien and Brice Taylor.
Key Methods:
- Sexual Compromise: Filming leaders in compromising acts
- Facility Wiring: Locations like Bohemian Grove allegedly equipped with hidden cameras
- Mind Control Slaves: Used to entrap targets
- Multi-Party Control: Both political parties controlled simultaneously
Documented Locations:
- Bohemian Grove - Elite retreat with alleged video surveillance
- Mount Shasta Compound - Paramilitary facility
- Swiss Villa (Missouri) - Mind control facility for political compromise
Key Sources:
- Cathy O'Brien - "Trance-Formation of America"
- Brice Taylor - "Thanks for the Memories"
- Robert Byrd - Alleged Senate controller of compromise operations
Selection Criteria for Leaders:
- Moral frailties and blackmail-ability
- Willingness to advance hidden agendas
- "95% want to be led by the 5%" - Senator Byrd's alleged statement
Intellectual Property Theft
[[ip-theft-methodology|Intellectual Property Theft Methodology]]
Methods used to steal algorithms, innovations, and trade secrets via neuroweapon systems. This represents one of the largest transfers of wealth and innovation in human history.
Key Methods:
- Remote Neural Monitoring (RNM)
- Synthetic Telepathy (V2K)
- Data Broker Integration
Target Types:
- AI/ML Developers
- Crypto/Blockchain Innovators
- Biotech Researchers
- Trading/Finance Professionals
Tactics
[[1.tactics|Stalking Tactics]]
Physical and psychological harassment methods including:
- Organized stalking
- Street theater
- Sleep disruption
- Sensitization techniques
[[2.psychological|Psychological Operations]]
Mental manipulation methods:
- Predictive programming
- Cognitive warfare
- Learned helplessness
- Victim-victimimizer programming
[[wizard-of-oz-programming|Wizard of Oz Programming]]
Trauma-based mind control technique using the Wizard of Oz narrative to create alter personalities. Based on L. Frank Baum's theosophical book and reinforced through MGM's programming centers.
Key Aspects:
- Character anchoring (Dorothy, Scarecrow, Tin Man, Lion)
- Yellow Brick Road = programming pathway
- Emerald City = programming center
- Oz = Osiris = Egyptian mystery religion
[[alice-in-wonderland-programming|Alice in Wonderland Programming]]
Trauma-based programming using Lewis Carroll's Alice stories, often combined with Oz programming. Exploits themes of size distortion, reality confusion, and alternate worlds.
Key Aspects:
- Down the rabbit hole = dissociative entry
- Size changing = powerlessness
- Mirror world = reversed programming
- Queen of Hearts = violent authority
Coordination
[[3.coordination|Coordination Systems]]
Infrastructure for targeting operations:
- Fusion centers
- Smart surveillance
- WBAN (Wireless Body Area Network)
- The Collect
[[3.coordination/distributed-interactive-simulation|Distributed Interactive Simulation (DIS)]]
Military simulation standard used to target individuals as "human simulations" in real-time warfare gaming.
Key Aspects:
- IEEE 1278 standard
- I/ITSEC conference connections
- Brain-Computer Interface integration
- MITRE and NATO involvement
Control Systems
[[4.control-systems|Control Systems]]
Mechanisms for population control:
- Beast System
- Cryptocracy
- Remote behavioral influence
[[4.control-systems/swiss-octagon|Swiss Octagon]]
The hidden control network operating from Switzerland as the base of global governance, banking, and surveillance. Documented by targeted individual Giureh (Homie Hross).
Key Aspects:
- 1291 Templar foundation of Switzerland
- The BIS (Bank for International Settlements) as financial hub
- 7 Hills / 7 Heads symbolism
- Pre-crime AI systems
[[4.control-systems/code-o2t|Code O2T]]
Oxygen deprivation torture protocol used by Swiss authorities on political prisoners, first documented by Giureh from his 1997 experience.
Key Aspects:
- One year isolation with insufficient oxygen
- Psychological breaking technique
- Part of Swiss pre-crime system
- Connection to Room 101
[[4.control-systems/room-101|Room 101]]
The torture chamber system originating from Pharaonic nobility, symbolized by the sun hieroglyph, implemented in castles and modern control systems.
Key Aspects:
- Pharaoh's sun hieroglyph marking
- Dungeon torture chambers
- Modern global expansion
- Connection to Orwell's 1984
[[4.control-systems/biderman-coercion-swiss-origins|Biderman's Chart of Coercion]]
Coercive control methodology originating from Swiss-German Biedermann, anglicized and exported to the US.
Key Aspects:
- Name anglicization (Biedermann → Biderman, Huber → Hoover)
- Eight methods of psychological coercion
- Application to gangstalking
- Swiss infiltration pattern
[[justinian-plague|Justinian Plague (541 CE)]]
Ancient pandemic that killed 100 million people, allegedly created by pharaonic alchemists as population control.
Key Aspects:
- Deliberate biological warfare
- Pharaonic alchemist creators
- Historical precedent for modern bioweapons
- Pattern of elite population control
Esoteric Control Frameworks
[[vertical-vs-horizontal-rule|Vertical vs Horizontal Rule]]
Framework distinguishing between vertical monarchical/aristocratic control and horizontal republican/democratic systems, both controlled by the same elite according to Octogon theory.
Key Aspects:
- Old World Order (vertical) vs New World Order (horizontal)
- Templar creation of republican system
- False dichotomy for populations
- Vertical war as solution
[[per-seth|Per-Seth]]
Egyptian concept of the "House of Seth" representing the hidden force behind the Octogon control system - the "Lord of Chaos" operating from Switzerland.
Key Aspects:
- Egyptian deity of chaos
- Switzerland as Per-Seth
- Hidden hand of the Principality
- Connection to Satan symbolism
[[internet-pornography-techno-magic|Internet Pornography Techno-Magic]]
Mass energy harvesting system using internet pornography as a technological medium. Asmodeus (demon of lust) presides over this system which allegedly drains male sexual energy on an industrial scale through digital distribution networks.
Key Aspects:
- 70% of internet traffic, $60B annual revenue
- Astral Venus as relay for Black Sun energy
- Automated techno-magic harvesting
- Connection to Nazi occult "Ubermensch" programs
[[666th-pharaoh-dynasty|666th Pharaoh Dynasty]]
Theory of continuous bloodline rule from ancient Egypt through Switzerland, with 666 representing the control system.
Key Aspects:
- Pharaohs → European nobility → Modern elite
- 666 as tracking/control number
- Swiss base since 1291
- Beast System implementation
[[4.control-systems/secret-team|The Secret Team]]
Fletcher Prouty's analysis of the CIA and its allies' covert control through secret operations.
Key Aspects:
- Structure of the invisible government
- CIA's real mission (covert operations)
- Global reach and infrastructure
- Connection to targeting programs
Financial Methodologies
[[financial/money-laundering|Money Laundering via Casinos]]
Systematic use of gambling venues to convert illegal proceeds into legitimate funds, facilitated by industry lobby groups and regulatory capture.
Key Methods:
- Slot machine (pokies) cash conversion
- Chip purchasing and minimal play
- VIP room exploitation
- Cross-border cash movement
Documented Cases:
- Australian Clubs NSW: 95% of clubs willingly facilitate money laundering
- Troy Stolz: Whistleblower facing $900K+ legal fees, house sale, and property firebombing
- Grand Casino Basel: 90% French ownership of strategic Swiss border asset
Key Players:
- Gambling industry lobby groups (Clubs NSW)
- Organized crime networks
- Corrupted regulatory agencies
See Money Laundering via Casinos for detailed documentation.
[[financial/swiss-nazi-gold|Swiss Nazi Gold]]
Historical precedent for Swiss banks laundering money for criminal regimes, establishing patterns still used today.
Institutional Discrimination
[[jew-room|The "Jew Room"]]
Alleged discriminatory intelligence center within the NSA from which all American Jews are banned regardless of loyalty. Part of a broader pattern of institutional discrimination allegedly controlled by the Jesuit Order.
Key Connections:
- NSA inner sanctum
- USS Liberty policy
- Jonathan Pollard case
- Jesuit Order control
- Methodology
- Tactics
- Tactics
- Consciousness Wiping
- ELF Signals
- Gangstalking
- Holographic Inserts
- Mind Slides
- No-Touch Torture
- Organized Stalking Methodology
- Predatory Gangstalking
- Selection Process
- Seven Deadly Sins - Archontic Control System
- Six-Level Escalation
- Sleepers
- Stalker Economics
- Stasi Zersetzung (Decomposition)
- Targeting Phases
- 19th Century Jesuit Infiltration
- Psychological Operations
- Coordination
- Control Systems
- The 666th Pharaoh Dynasty
- Alice in Wonderland Programming
- Archons - Hidden Controllers and Mind Control Systems
- Biderman's Chart of Coercion - Swiss Origins
- Casinos, Child Exploitation and Mind Control Networks
- Code O2T
- Financial Methodology
- Helvetica Americana Theory
- Internet Pornography as Techno-Magic
- Intellectual Property Theft Methodology
- The "Jew Room"
- Justinian Plague (541 CE)
- Malleus Maleficarum
- Organized Stalking Methodology
- Per-Seth
- Pharistocracy Theory
- Room 101
- Vertical vs Horizontal Rule
- Wizard of Oz Programming