Six Phases of Targeting by John Hall
See Chapter 8 of "Guinea Pigs: Technologies of Control
https://online.fliphtml5.com/hajxx/tjoy/#p=1
Selection
Surveillance
Stalking
Defamation
Attack
Monitoring
Surveillance and tracking:
Organized stalking
Electronic harassment
Background checks, credit checks, mail tampering, email hacking, phone cloning and hacking
Cyber bullying
Utilizing GPS tracking 24/7
Brain computer interface
Microchipping
Thru-wall radar used to monitor
External Stress-Street harassment
Participation of strangers, neighbors, and in some cases close friends and family members in harassment:
Rudeness for no cause
Purchases and deliveries delayed, opened , or lost
Unusually loud music, noise, far beyond normal
Vandalism/ Break-ins/sabotage at home:
Breaking and entering, criminal trespassing
Shredding of clothing
Destruction of furniture
Petty theft
Engineered failures of utilities, appliances or parts
Deletion/corruption of computer files
Spreading of rumors
Sabotage to your working reputation
Theft of completed work