Surviving the Modern Organized Gang Stalking (OGS) Con
  The Unethical Out of Court Settlement
Harassment is defined as any repeated or continuing unconsented contact that serves no useful purpose beyond creating alarm, annoyance, or [emotional] distress.
Misery is defined as Optional
There are Six Basic types of Plays in the OGS Playbook

The history of OGS comes from the special legitimate needs of the police to deal with expert target criminals, by developing tactics to identify the criminal’s associates (lovers, friends, family, social circle and such) who can be manipulated into trapping the expert criminal…to exert pressure on the criminals closest inner circle and making law enforcement’s tasks much easier.
When the day is over, the criminal OGS cons make use of six coordinated variations of basic plays to employ harassment of some nature. The gang stalking controller manipulates the players against innocent victims though, instead of the police manipulating players against criminals.

Cyber-Stalking – There is no door lock that can’t be beat, no alarm system that can’t be defeated, and extremely few computers that can’t be completely compromised so long as someone else has physical access to it.  If a person has come to believe that they are now a Targeted Individual (TI) then that person needs to accept that they have zero privacy – that perhaps the cameras and microphones in their alarm system might be turned against them, and that every password, username and keystroke is being known.  From time-to-time it may be useful for TIs to review their internet browsing history because google records every search and can match a computer to a search without being logged in (using computer specific information, latency histories, and so-on), and whether you really did or didn’t search certain incriminating phrases or visit certain incriminating websites, in the court’s eyes – you did and it can be expensive and difficult not to be convicted of any computer crime that someone committed on your behalf.

Manipulation of Communications and Isolation Phone cloning ans SIM card copying are the easiest ways to manipulate communications and isolate people.  When someone has a clone of a victim's phone (an exact duplicate down to forged chip signatures) they can send progressively more slightly off-beat texts and emails that no one would question as coming from the TI, and the TI will likely never know.  The same people can intercept incoming texts to find out who is being supportive, find out personal details for street acting or manipulating either party, and can completely delete any trace of supportive incoming emails.  Over time phone cloning is very effective and necessary for the TI to come to believe that they are becoming more and more isolated.

Any compromised (but trusted) contact (snitch) alone with a TI’s phone - while the TI is sleeping, working in yard, or in a lengthy meeting at work, has enough time to get a phone cloned.  So long as the cloned phone and the TI’s phone are using the same cell tower - it is next to impossible to know this is happening.

Gas-Lighting – Convincing victims (TI) that things are or are not changing around them, that actually were changed by others while the victim was away: The idea is get people to question their own sanity.  These types of techniques were demonstrated in the 1944 movie Gas Light, itself being a movie that may have come from someone with firsthand knowledge of the tactics acted out.  An example of gaslighting would be in noticing that inside of a home’s refrigerator, every jar and container’s lid is suddenly nearly completely unscrewed – no matter how many days in a row they are tightened; furniture becomes slightly out of place, a four lamp ceiling fan installed years ago is suddenly now a five-bulb ceiling fan.


Displacement and Scapegoating – People who have gone through addiction recovery programs – if they made it to the resentment stage, have probably heard that “the things that they secretly know they need to address in their own lives are the things that they are most offended by in others.. Scapegoats can be traced back to the sixteenth chapter of the Old Testament’s book of Leviticus, but the modern scapegoat essentially provides people with pent up guilt and anger, the chance to temporarily trade all that in for pleasurable and self-righteous indignation by transferring, displacing, or scapegoating the con’s need to be prosecuted - to transfer dysfunctional needs to a trusting and unsuspecting target – to a targeted individual (TI).


Harassment – There are many flavors but examples will be intended to be similarly annoying such as having a car alarm or car horn sound in different places in the neighborhood every time a person leaves their house, do something to make the TI’s dog bark each time they sit down on the toilet, arrange for a second phone call to arrive nearly every time the TI answers the phone – especially if the phone only rings a couple of times a day.  Other things that are probably worth looking up include the usual protocol of street theater, mobbing, pervasive petty disrespecting being acted-out, produced, and directed nearby uncomfortable conversations that occur.  There are some reports of intense sunlight reflection simulations directed at where the TI might usually stand,
and occasional unconfirmed reports of chemicals being sprayed about the yard or travel areas that TIs'frequent.


One of the easiest tells of organized gang stalking is in being able to locate at least two sets of people who have nothing better to do than to sit behind over-tinted windows (especially wearing sunglasses), are talking excessively loudly, or are projecting grossly obvious arm waiving - both arms - one at a time.  There will always be two groups or units of stalkers in at least two different but proximate places for any given harassing situation for four essential reasons:

  • The stalkers need their backs covered and will have some visual contact with each other to be able to see trouble coming.
  • If things start going sideways the second stalker(s) can become a witnesses to help the first team out of a jam.
  • The players are on a tight leash to make sure that things stay predictable; the stalkers are as likely to snitch on each other for not performing or performing poorly (for their handler’s approval), as they are to snitch on the TI.  No one wants their handler being told that they didn’t act as expected; too, by minimizing the chances of something going sideways the controller has fewer worries that the snitch who was involved in the screw-up won’t be the same snitch that gives up the controller to save themselves – there is no honor in this crowd.
  • People always perform at a higher level when they know there is a critical audience.