The Papantla Flyers Strategy

Also known as gang stalking.

The papantla flyer strategy is the use of local agents and an international pool to target individuals, groups and affect local policies, it is based upon an anonymity matrix created on the social interactions that exist within a specific situation, it uses corruption, blackmail, ideologies and a sense of power derived from acquired techniques during indoctrination to expand upon the local believes system.

The local agents  those used by judicial and intelligence agencies, recruited through blackmail or money, however they can only have a regional role or a temporary one, until their services are no longer required, however once they have gone through this process they are trapped within the security matrix system an extreme example is the witness protection programs for the regional agents, for the temporal ones they are now trapped within the narrative by the unwritten social norms of the area they inhabit, they might be used for a single action or a long period ranging from days to months beyond that the matrix will start to extend within their lives.

The international pool uses similar methods, however indoctrination  has a stronger anonymity base and local along with personal beliefs system, and thus it can be exploited by outsiders, for indoctrination it may start with blackmail upon access to the targeted individual personnel files, it will use this information to “fish” the individual by using automatic bots and a tag system for other human bots to target using a scrabble like strategy that will mirror the targeted individual actions, but always maintaining a plausible deniability, so as to force the individual to notice it but creating a sense that there is nothing that can be done about it.The scrabble like strategy will try and narrow the individual into a specific group response so it might be used or recruited within a subgroup and the matrix itself, the same process of indoctrination teaches this.

After this is achieved the same technique can be carried into the physical world, by which point the indoctrinated will use similar techniques on a local area, by following the tag and scrabble method, they will do it due to blackmail believing the source it’s their local government, belonging in a similar basis or to some ideology targeting the individual, as they have learned the techniques and plausible deniability besides they now feel encouraged and protected by an external force or pressured due to intimidation, this might be exploited by local security agencies however first they will have to know and second they do not have the legal basis to intervene nor the technical ones.

The system is simple enough and once done it will grow by itself, creating subgroups within existing cultures, making individual targeting exponentially simple, although technology can be added to it this will require local agents active participation, different than the international pool this one only requires a remote computer, that will keep data of X number of indoctrinated individuals and targets, the remote location computer will receive what the targeted individual is doing, schedules, and what it has seen or posted in its personal computer/phone/tablet/etc, and generate a scrabble/metaphor response for the indoctrinated agent, which will when available post or use if the targeted individual will see it, this could include commands like go to x place, the system will also send similar commands to the targeted individual with the expectation he will see them and thus create a communication matrix, this allows the system to function by itself from anyplace on the globe, categorizing and localizing tagged ad indoctrinated individuals, communication to indoctrinated individuals can also be accomplished through commonly used websites, post and bots, this same bots can be used to follow the targeted individual at different intervals, for example in comments at the same time this tags the individual and allows the indoctrinated from anywhere to give generic responses with the use of passive agressive methods, this also will go unto the physical world as the indoctrinated will use this techniques as a regular basis, specialy those within the ideology localized paradigm.

The communication matrix can be created through adds, bots, news feeds, notifications, power surges, other individual, etc.Eventualy it will take root within specific groups or communities, creating subgroups withi them msimplifying the process as only few beacons are needed reducing the infromation flow.

This same system might be used for other purposes although they will require active participation,  more technology can be added to this system making it more effective, some technology and what can be accomplishe is explained below.

The simple way to solve this problem is to keep a private and a public log of activities, regular and unexpected ones, wait for them to use a passive agressive action or a scrabble technique and record them using public space cameras and private ones, then make a traffic comparison of the places you visited on different times to see how traffic changes when you go along your regular routes and unexpected ones, confronting them will also show their reaction all this is enough evidence of the situation, and you will get a few if a  lawsuit follows, once the system reacomodates itself it will gradually stop in intensity and  eventualy stop, however due to the way it works based on plausible deniabilty, straggles will remain, however they will be dealt with along with the ongoing lawsuit if they persist, so they become irrelevant unless they remain within your daily routes.This method will also tell you when you are under actual surveillance and what type of equipment they mightt be using, however actual surveillance does not want to be seen so it is unlikely you will encounter both at the same time.

Disclaimer

The use of this technologies is relatively easy to spot at least those within the physical realm, as they will require active vigilance, so they remain within the possibilities, however some of them could be covertly used, if the city infrastructure itself allows it, nevertheless this could be verified and it will imply for the time being that its capabilities cannot exceed those explained in the diagram.

The Papantla Flyer stratagem

LINKS TECHNOLOGY

(2017). Retrieved 18 October 2017, from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2923251/

(2017). Retrieved 18 October 2017, from https://www.windriver.com/whitepapers/iot-for-defense/wind-river_%20IoT-in-Defense_white-paper.pdf

Build an Infrasonic Subwoofer. (2017). Instructables.com. Retrieved 18 October 2017, from http://www.instructables.com/id/Build-an-Infrasonic-Subwoofer/

D’Onfro, J. (2017). Google has quietly figured out a way to fight back against one of Facebook’s key advantagesBusiness Insider. Retrieved 18 October 2017, from http://www.businessinsider.com/google-has-more-logged-in-users-on-mobile-2016-4?utm_content=buffer6f174&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer

GCHQ, the NSA and Edward Snowden – mass surveillance. (2017). Civildefence.co.uk. Retrieved 18 October 2017, from http://www.civildefence.co.uk/gchq-and-snowden.php

La nueva tendencia de ciberacoso en Rusia: desenmascarar actrices porno a través de una app. (2017). PlayGround Magazine. Retrieved 18 October 2017, from http://www.playgroundmag.net/noticias/actualidad/FindFace-actrices_porno-ciberacoso_0_1745225466.html?utm_source=facebook.com&utm_medium=post&utm_campaign=FindFace-actrices_porno-ciberacoso

Long Range Acoustic Device. (2017). En.wikipedia.org. Retrieved 18 October 2017, from https://en.wikipedia.org/wiki/Long_Range_Acoustic_Device

Programs, R. (2017). Research ProgramsIarpa.gov. Retrieved 18 October 2017, from https://www.iarpa.gov/index.php/research-programs

Radar technology allows police to ‘see’ inside homes. (2017). Mail Online. Retrieved 18 October 2017, from http://www.dailymail.co.uk/news/article-2917661/Radar-technology-allows-police-inside-homes-raises-fresh-concerns-judges-civil-liberty-advocates.html

Security Check Required. (2017). Facebook.com. Retrieved 18 October 2017, from https://www.facebook.com/weaponsrcproject/

Startup can direct sound to your ears only. (2017). USA TODAY. Retrieved 18 October 2017, from https://www.usatoday.com/story/tech/columnist/baig/2016/03/03/startup-can-direct-sound-your-ears-only/81220008/

Technology Items Listing Page. (2017). THEY ARE WATCHING. Retrieved 18 October 2017, from https://theyarewatching.org/technology

Thanks, America! How China’s Newest Software Could Predict, Track, and Crush Dissent. (2017). Defense One. Retrieved 18 October 2017, from http://www.defenseone.com/technology/2016/03/thanks-america-china-aims-tech-dissent/126491/

The New Sound of Crowd Control. (2017). Motherboard. Retrieved 18 October 2017, from https://motherboard.vice.com/en_us/article/qkve7q/the-new-sound-of-crowd-control