Bridging The Gap By: GmB Bailey Cover design by GmB Bailey Book design by GmB Bailey All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means including information storage and retrieval systems, without permission in writing from the author. The only exception is by a reviewer, who may quote short excerpts in a review. GmB Bailey Printed in the United States of America First Printing: January 2009 ISBN is 1441448845 EAN-13 is 9781441448842 Bridging The Gap Copyright © 2009 By: GmB Bailey. Introduction Bridging The Gap is a disturbing, yet poignant look into modern day democratic surveillance societies. The book examines how this structure is used to discredit, disenfranchise, and destroy innocent citizens. Gang Stalking, The Buzzsaw, Cointelpro, what do these words mean and more importantly what do they have in common? They are names that have been used to describe the systemic apparatus that reaches out to destroy and discredit those declared enemy by the state. This book will open your eyes to how the informant system has taken over these democratic countries, and how they are being used to further create a surveillance society where no one will be out of reach, should they too become persona non grata by the system. This book is the culmination of two years of research and investigation. It's a very brief introduction to the subject matter of Gang Stalking. It's a factual account of what Gang Stalking is and the societal mechanisms that are in existence, which allow such a structure to exist. The research has taken many hours to compile and shift through. This book just touches the surface on a very difficult and disturbing topic. The first portion of this book will explain what Gang Stalking is. It just happens to be a systemic structure of control and conformity that is used to destroy the lives of those who go outside of these structures. The next portion of the book tries to help the reader to understand why people take part in something that is destructive and psychologically destroying to another person. Then we will look at the informant structure which is being used in society today, the informant structure which is responsible for a great deal of crime and corruption, but which is also being used to fuel a surveillance society that has previously been almost unheard of in modern times. We will see how a system of set up's and betrayals fuel the informant system, and you will begin to understand how far reaching and controlling this system can be. We will also travel through recent history and review conspiracies and other systems that also allowed these destructive investigations to take place, and destroy the lives of others. You will learn that there are those in our society that do not play by the same rules as others do. Their goals are to entrap and destroy the life of the next target, and to in turn turn that target into a person that is capable of then becoming a part of the same game, that was used to destroy them. Lastly we will review the final pieces of the puzzle that fuel this system and helps it continue to stay in place. We will also briefly review what can be done to help curtail what is happening to so many in society. Table of Contents Table Of Content Introduction Introduction ......................................................................................................... I Table of contents Table of contents ................................................................................................III 1. Bridging the gap Bridging the gap .....................................................................................................1 2. What is Gang Stalking What is Gang Stalking? .....................................................................................2.1 Community Policing ...........................................................................................2.3 Goals of Gang Stalking ......................................................................................2.4 Who gets targeted ..............................................................................................2.5 Who takes part ..................................................................................................2.7 Why people become informants ........................................................................2.7 Common Techniques used ...............................................................................2.8 Funding for Gang Stalking ................................................................................2.9 How do participants communicate ...................................................................2.10 3. Covert Techniques Covert Techniques ............................................................................................3.1 4. Obedience to authority Milgram Experiment ...........................................................................................4.1 The Stanford Prison Experiment.......................................................................... 4.2 Strip Search Call Prank .......................................................................................4.3 5. Informant System The Snitching System ........................................................................................5.1 Alexandra Natapoff ...........................................................................................5.2 6. Conspiracies and history The Secret Persuaders .........................................................................................6.1 Operation Gladio ...............................................................................................6.2 Red Squads ......................................................................................................6.3 McCarthyism ......................................................................................................6.6 Cointelpro .....................................................................................................6.7 Stasi ...................................................................................................................6.8 The Buzzsaw .....................................................................................................6.11 Fusion Centers ..................................................................................................6.13 7. Are Canadians being Watched Secret Databases ................................................................................................7.1 Spying101 .........................................................................................................7.1 8. The Set Up's Conspiracy .........................................................................................................8.1 Paying the price .................................................................................................8.2 9. Chain Reaction The Game .......................................................................................................9.1 Understanding the game ...................................................................................9.2 Stopping the chain reaction .............................................................................9.5 10. Infiltrations Online Infiltrations .......................................................................................10.1 Offline Infiltrations .......................................................................................10.1 11. The final pieces The Final Pieces ...........................................................................................11.1 Checks and balances .....................................................................................11.2 Unwelcome truths ..........................................................................................11.2 12. Coping Coping ..........................................................................................................12.1 13. Closing Thoughts Closing ..........................................................................................................13.1 14. Resources Movies ..........................................................................................................14.1 Videos ...........................................................................................................14.1 Books ............................................................................................................14.1 Articles ...........................................................................................................14.2 Cointelpro .......................................................................................................14.4 Websites .......................................................................................................14.4 15. References References ....................................................................................................15.1 Chapter 1 Bridging The Gap Bridging the Gap How can we bridge the gap? As a individual who has been researching and investigating a practice that is being termed "Gang Stalking" this is the continual question that haunts me. How do I explain in a credible fashion to the general population of so called democratic countries that there are extremely undemocratic practices happening in their own countries? That there are individuals being tortured and harassed to the point of death, suicide, and even extreme acts of violence? How can I do this in a credible
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages116 Page
-
File Size-