Organized gang stalking and monitoring and BOLO

Many people who claim they are targeted individuals say that they are tracked wherever they go. In law enforcement and security industries, there is something called a BOLO alert, and BOLO stands for “Be On The Look Out” for someone.
Modern technology in use and practice today has enabled this exact form of targeting of individual, and all LEO’s use these technologies in real time to track and monitor people across cities, states, and state lines, but also, you will see in the writings of targeted individuals that there is a subtle and pervasive attempt to create hopelessness in the target, as the claims sometimes state that ” they can track you wherever you go,”and “it will never stop,” and so on.
All of that is true, as we know today that Homeland Security has massive databases, and dossiers’ on every American. And, the CIA financed the Palantir database system as well as Google, and both of these track people in real time.
Other programs tat are in use every minute, every hour on every American includes cell phone surveillance, and social media monitoring. Wile many say “well, I have noting to worry about, and noting to hide,” I would like to point you to this story here, about how the Nazi Third Reich used IBM pre-computers to track individuals, and used punch cards to round up those who became its victims.
I would also like to state tat at this time, I am currently seeking documents and street camera video footage from a large western city known for gambling, wherein I was “gang stalked” most likely because a BOLO had been issued. As with most scientific claims, there must be scientific evidence, and video footage is pretty good evidence. As noted elsewhere, I have been compiling a lot of actual, falsifiable and often court room worthy evidence that in fact, organized gang stalking is a real thing.
To the researcher, I ask that you simply note that similar things have happened elsewhere, under different names and historical periods, but in my case, do your own research, and test mine against whatever other evidence you wish. I am sure that my claim- that I was followed multiple times, across a city, and security guards and police volunteers positioned themselves directly at my back, on video, in multiple places over a three day period, at odd times, last August. These volunteers wear distinctive yellow shirts, and use bicycles up and down the main boulevard, and are easily identifiable on camera.
I also had security guards, the guys in yellow shirts, and a large, friendly Hispanic man named “Leo” and a crew of what appeared to be four undercover cops/citizen volunteers outside my hotel room door, and a hacker along with them in a hoodie. While many claims of targeted individuals are easily testable, few do test the claims, because most are thougt to be mentally ill. In my case, I have studied the things I say above  and I was only aware of these types of stalkings, because I have studied it for periods of years, going back to 2003, and now know ow to document it. Your methods may differ, but mine are designed to old up in court, and in sociological research studies as well.
But perhaps most importantly, is that the researcher be aware that there is a vast network of agents and agencies who seek to discredit those who claim that this is a ‘real’ thing versus a mental illness, and multiple agencies work together to minimize te view that what they are doing is anything but legal, or Constitutional. In my case, you can decide for yourself.
UPDATE 12/15/2017:
Security gangs are becoming a feature in America because see-something-say-something, combined with an unnaccountable justice system has encouraged rampant criminality in policing and security industry. This is also what “brownshirts” were in the time of Hitler.
Nearly all mass shootings, and their activity is widely documented across multiple sources as creating crime, or creating or participating in a criminal climate. Indeed, many mass shooters or others implicated in “fake manufactured terrorism” are themselves former security team members: Google Omar Mateen, Devin Kelley, Dahir Adan, just to name a few who were security guards.
Here is one description of security gangs from Maryland, from a Wiki source that documents the activity of “fake cops” and security gangs-what better place to hide state level crime than in “security?” How original….:

“Security Gangs”

Some commercial facilities such as shopping centers or office campuses may be unable or unwilling to afford the level of security available through legitimate private security services. Some such may be approached by organizations offering their services to “help clean up the place”. These organizations are, effectively, unlicensed security officers and also often operate as private investigators with no permits. Or, they may possess permits or licenses which do not apply to this sort of work. For example, Bounty Hunters are in fact law-enforcement and may have special permits… which do not apply to any duties outside of seeking bail jumpers. Yet neither the property managers nor the people “apprehended” (usually beaten, intimidated, or frightened away, instead) by these individuals or groups are quite cognizant of the fact that these persons have no legitimate special authority nor license in these places and situations.

If you use my search feature, and the phrase “yellow shirts” you will find that “yellow shirts” are implicated in the Las Vegas shooting, and you will find that I described the operations method of such a security gang above, long before that shooting occurred. I specifically said “two yellow shirts and two undercovers and one guy named Leo.”
Las Vegas Shooter Narrative is Constantly Changing
This is a five person team, and you will note that an exactly similar squad of 2yellow/2 UC/1other  was mentioned “outside the shooters door” in the constantly morphing  narrative of the Stephen Paddock shooting, were we saw: 1) a constantly changing narrative 2) a sketchy story told by a security guard 3) this guard disappearing into another country within days of the shooting 3) the narrative morphed and changed dramatically.
But get out the ROGS BINGO card in these cases, because security gangs are a real feature of modern policing-they are the dirty work rats trying to chew their way up the mast. And, the Paul Blart’s who couldn’t get laid in a whorehouse in Las Vegas.

Gang stalking and whistle blower and mental illness: NYPD's Adrian Schoolcraft

Good Reads: NYPD whistle blower, and NYPD officer Adrian Schoolcraft sent to psych ward 
Most, if not all organized gang stalking activity, or claims of such activity, involve police or other agency involvement. And, one of the claims that is frequently used to discredit those who allege they are being harassed or otherwise manipulated, and sometimes even “mind controlled,” is that these people are mentally ill.I once thought this was true as well, until it happened to me in a similar, but different fashion.
In this case-look up there at the top of this blog-and get out the ROGS BINGO card, because Schoolcrafts case is a ROGS BINGO.

  1. narrative control
  2. 2. actual gang strike forces and hidden in-group tactics and methds
  3. discrediting via claims of mental illness
  4. access by authorities to actual sound weapons
  5. colluson between psychologists and police
  6. an actual conspiracy of deprivation of civil rights
  7. etc.

More and more, we see that those who attempt to create a false narrative loaded with mis- and disinformation (like: Directed Energy Weapons!! UFO’s!!) about gang stalking are in fact encouraging the Martha Mitchell effect among researchers of organized stalking, criminal defense attorney’s, social workers,  journalists, and even psychologists.
And, as sociologist Alex Vitale and others are starting to talk about-there is something wrong with policing in general. It’s not a lack of funding, or a lack of diversity initiatives-it’s the lack of morality, sprinkled with endemic corruption and Israelifiation. Sure-we all have families and all that-but I cannot count on a scientific calculator how many families are destroyed by this current policing scheme.
Here- you can even watch a “directed energy” attack in action as a phone app-Vortex- redirects and hijacks a cell phone:
[youtube https://www.youtube.com/watch?v=DAuEcd5hlio&w=854&h=480]
Lastly- and without irony- Ramsey Orta, who took the footage of Eric Garners murder by the NYPD was gang stalked because he was a whistle blower just as Schoolcraft was suing for being railroaded and gang stalked, and  the NYPD had in fact used electronic sound weapons on peaceful protesters. What do you think such demented people would do a “one of their own” who crossed the ‘thin blue line?’

So far hundreds of people have been arrested for protesting peacefully and over the weekend the NYPD deployed the “LRAD”, which is a sound cannon that projects a painful tone into peoples ears while commanding them to disperse.

Meet Adrian Schoolcraft, NYPD whistle blower who refused to issue phony tickets and make false arrests- and then became a target of “political and punitive psychology”

EXCLUSIVE: NYPD quota whistleblower settles case against hospital over holding him in psych ward

Adrian Schoolcraft had claimed that his fellow 81st Precinct officers conspired to have him held against his will in a Jamaica Hospital psych for six days after he complained of a quota system.

Adrian Schoolcraft had claimed that his fellow 81st Precinct officers conspired to have him held against his will in a Jamaica Hospital psych for six days after he complained of a quota system.
(Freelance/for New York Daily News)

NYPD whistleblower Adrian Schoolcraft has settled his case against the Jamaica Hospital doctors who put him in a psych ward, bringing an end to his explosive case.Schoolcraft, who settled his claims against the city for $600,000 in September, had charged his fellow officers conspired to have him held against his will at the hospital for six days after he complained of a quota system at the 81st Precinct in Bedford-Stuyvesant, Brooklyn.Schoolcraft, 40, alleged that two doctors bought the NYPD’s story that Schoolcraft was crazy without considering that the disgruntled cop was actually telling the truth in October 2009.
A Jamaica Hospital spokesman had no comment.
FRANK SERPICO DRAGGED INTO FELLOW WHISTLEBLOWER ADRIAN SCHOOLCRAFT’S NYPD SUIT

The CIA hack and cell phone surveillance: gang stalking and cell phones

UPDATE 8-13-2020: the link to Spyera software below now goes to an absolutely riduculous page. I suspect that link to Spyera was a front for more spying.
And, the CIA/NSA contractor that is alleged to have dumped the CIAs zero day spy tools (the same types of tools that John Brennans CIA used to spy on US most hallowed institution, the US Congress) has been arrested, and tried, with the result that trial was declared a mistrial. But the agency and its lil’ helpers already had a backup plan: they (whoever “they” are in each case) stashed shitloads of child porn on the guys personal computer servers, which is standard practice in intelligence agencies like the FBI, CIA, Mossad, et al fear that they have a rogue agent who will blow the whistle about military black operations that utilize child porn.
UPDATE  10-04-2020: This post is incredibly popular the last couple days, though its best run.was in 2018, just as CIA contractor Joshua Schulte began to chip away at his political prosecution.
While some have criticised CIA contractor Joshua Schulte for having “weak OpSec (operations security ), in a world of smoke, mirrors, and mirrored cell phones and “electronic implants ” on peoples computers, perhaps no security is the best defense because Schultes own APPs, which are designed to remotely control any and all cell phones, and computers without the user even being aware if it,  provide him the criminal defense of total deniability, as this Obama era critic, and concealed -carry advocate “targeted individual and Libertarian” faces his second trial.
Look at these paragraphs below from Jason Koebler of Vice News (and Vice News itself a politically compromised organization, since its founder abandoned it due to intel agency pressure ) and note that every single claim of “weak security ” and other “evidence ” seeking to tie Schulte to various acts,and actions could easily been performed via a middle man attacker from Israeli, or any other anti-libertarian country.
In other words, any attacker, using Schultes own tools, could impersonate him online, AND make it appear as if he himself was doing it. Intel agency compromise operations,are exactly THAT strange, and brilliant.

  • Schulte’s website allows us to easily connect many of his online personas and accounts to his real identity, discern his politics, his places of residence, and identify his friends and family members. This all came from someone who should, in theory, know better as someone who had access to highly sensitive information.
  • In addition to Project Wizard, Schulte also uploaded screenshots of his Gmail inbox, which have his name as well as emails that show information about his bank, his OKCupid account, his cell phone provider, his friends’ and families’ names, and more.
  • There’s a selfie he took of himself holding a “FUCK OBAMA” pint glass, and a shirtless mirror selfie he took in a hotel bathroom. There’s a folder called “facebook_convos” that are just a series of screenshots of him beefing with his Facebook friends and family about politics. He uploaded a resume, group projects and homework from college, and design files for a 3D printed gun called “The Liberator.”
  • There are narrated video tours of the inside of his house, screenshots of emails he sent to activists advocating for concealed handgun carry permits in Texas, saved IRC chats of “Josh” saying the n-word over and over, and yet more screenshots of his Gmail inbox, which—in the same screenshot—prove that we are looking at “Joshua Schulte’s” inbox and also reveal the pseudonym he used on several different websites. Other files he uploaded tie this pseudonym to a Blogger where he wrote extensively about his libertarian politics. The pseudonym is also present in logged-in screenshots he took of an online quiz that tested his “Brain Performance Index” on a site called Lumosity; he also uploaded a screenshot of the score he got on a MENSA practice test.

In the meantime, there,are literally thousands of APPs that can and do monitor phones in real time.
Targeted individuals often claim that their cell phones are being used as tracking devices, and that intelligence agencies are using them for target practice and experimentation. Now, we know that part of that is true: A disgruntled CIA contractor is alleged to have dumped a list of all the tools that the CIA has been using to spy on us via our cell phones for the last decades. But don’t just point the finger at the CIA, because then, you WILL sound crazy, and Dr.’s Sheridan and James might get a whack at your mind, mind mind!

UPDATE: This post is becoming one of the most popular on this blog. While I experienced “cell phone mirroring” as early as 2010, and “offline computer situation rooms” as early as 2001, you may have just discovered this vast plot against constitutional liberty. Read on, and use my ‘search this blog’ section to find posts relevant to your own OGS.
Then, in a side note, be aware that the US agencies have long farmed out all of their intelligence collection to private contractors, Israeli’s and the Five Eyes Alliance, so any given abuse of your phone could be by : any of 17 US agencies, or any of Britains eight agencies, and many more, not counting the douchebags who work in private security firms, and even local police agencies-and ALL OF IT without a warrant, or even a paper trail.

And the fact is that ALL 17 intelligence agencies in the United States have turned on American citizens, using us for target practice of varying shades of “illegal and unconstitutional” so, they have lot’s of Company (there’s a joke in there, somewhere, about “the Corporation, lol). Your country is also doing these same things to you and your countrymen.

UPDATE: This is one of my most popular posts. So I thought I would add a link for software tat you can buy to do some of the same stuff to these agents and agencies that they are doing to you. Here’s Spyera mirroring and more for cell phones, but there are many others you can use, many freeware (but be careful-most freeware comes with the hidden cost that it was created by-you guessed it….)

You see, these days, electronic tools and toys, entrapments and entrainments of electronic surveillance and propaganda tactics that were once directed at millionaires and mobsters, third world dictators and Iran Contra’s and Osama bin Laden are now directed at ordinary common people who buy houses next to the fire chief, or who seek to trim the budget; or smoke a joint here and there, or who forgot to pay their vehicle tax. This is partially due to the fact  that all of the agencies are crawling with corruption, and blackmailing each other, in the Spirit of the LEIU’s, who, bar none, perform more black bag jobs around America than any CIA agent ever did.

Related Story: Watch this video to see how some of us knew in 2005-2008 that our phones were being used as tracking devices. And, that some would repeat our conversations back to us. Watch it from 4:27 minutes. Disruption campaigns that target activists and others take on purely diabolical and bizarre proportions within six degree’s of a persons relations. The newscatser notes that the FBI use cell phones to “keep tabs on critical conversations between known members of the mafia.”

(psssst: Don’t tell anyone, but this story here about how retired LEO’s work with current LEO’s and intel gencies to perform assasinations and black bag jobs is one of America’s best kept seekrits)
And many wonder how it is that they could write something online, and then, shortly thereafter, have a squad car pull up outside their house.
hazing 4.png
This is enabled by the highly integrated, un-constitutional mechanism of OGS and the tracking in real time of targeted communications of targeted individuals, and coordinated with massive database abuse and fraud on the courts at the local, national, and international level.
Any researcher of OGS can verify that at least, it is true, that indeed 17 intelligence agencies ARE following targets, and doing many other nefarious things as well. Here, below, from the Intercept, is the case of the CIA software that mirrors your cell phone, and uses it to perform MIM attacks on YOURSELF; and here is a full list of the tools that these agencies use to target journalists, whistle blowers, the neighborhood crank, wankers, dole dippers and a few potheads the same as if they are all terrorists, with download links from Wikileaks). But be careful….honeynets and limited hang outs go two ways.

A concerted effort by the CIA produced a library of software attacks to crack into Android smartphones and Apple iPhones, including some that could take full control of the devices, according to documents in a trove of files released by WikiLeaks Tuesday.
The attacks allow for varying levels of access — many powerful enough to allow the attacker to remotely take over the “kernel,” the heart of the operating system that controls the operation of the phone, or at least to have so-called “root” access, meaning extensive control over files and software processes on a device. These types of techniques would give access to information like geolocation, communications, contacts, and more. They would most likely be useful for targeted hacking, rather than mass surveillance. Indeed, one document describes a process by which a specific unit within the CIA “develops software exploits and implants for high priority target cellphones for intelligence collection.”
The WikiLeaks documents also include detailed charts concerning specific attacks the CIA can apparently perform on different types of cellphones and operating systems, including recent versions of iOS and Android — in addition to attacks the CIA has borrowed from other, public sources of malware. Some of the exploits, in addition to those purportedly developed by the CIA, were discovered and released by cybersecurity companies, hacker groups, and independent researchers, and purchased, downloaded, or otherwise acquired by the CIA, in some cases through other members of the intelligence community, including the FBI, NSA, and the NSA’s British counterpart GCHQ , the documents indicate.
One borrowed attack, Shamoon, is a notorious computer virus capable of stealing data and then completely destroying hardware. Persistence, a tool found by the CIA, allows the agency control over the device whenever it boots up again. Another acquired attack, SwampMonkey, allows CIA to get root privileges on undisclosed Android devices.
“This is a very impressive list,” tweeted former GCHQ analyst Matt Tait, noting that at least some of the attacks appeared to still be viable.
Matt Green, cryptographer at Johns Hopkins University, agreed the leak was “impressive,” but concluded there weren’t many “technically surprising” hacks. This lack of originality may have stemmed from a desire on the part of the agency to avoid detection, judging from one document contained in the trove, in which apparent CIA personnel discuss an NSA hacking toolkit known as Equation Group and its public exposure. It was also previously known that the CIA was targeting smartphones; drawing on top-secret documents, The Intercept in 2015 reported on an agency campaign to crack into the iPhone and other Apple products.
In addition to the CIA’s efforts, an FBI hacking division, the Remote Operations Unit, has also been working to discover exploits in iPhones, one of the WikiLeaks documents, the iOS hacking chart, indicates. Last February, while investigating the perpetrator of a mass shooting in San Bernardino, the FBI attempted argued in court that Apple was obligated to give the FBI access to its phones by producing a weakened version of the device’s operating system. If the WikiLeaks documents are authentic, it would appear FBI and other elements of the intelligence community are already deeply involved in discovering their own way into iPhones. The compromise of the documents also calls into question government assurances in the San Bernardino case that any exploit developed by Apple to allow the FBI access to the killer’s phone would never be exposed to criminals or nation states….

….follow the links-connect the dots!
Related Story: The Shadow Brokers Hack in context

Organized gang stalking and surveillance role players and blog forum comments.

The internet has enabled the potential for democracy like never before in history. It has also enabled massive repression, and hidden surveillance operations as well as what could be called “mind control” and influence operations.
This is all possible because entire military battalions work side by side with the CIA, intelligence agencies, and domestic law enforcement agents and agencies to suppress free speech, or control the narrative entirely, funded by massive budgets.
The blog comment forum has long been subverted by hidden agents and agencies, and many if not most trolls are working for war lobbyists, think tanks, NGO’s and more to drown genuine dissent, and to infiltrate all levels of dialogue in full spectrum dominance of any narrative that challenges their special interests.
Here, below, is a comment I received from someone who claims they are a targeted individual, and whose ‘crime’ was that they “pissed of the son of a four star general.” This person, Almost Dead, made that remark after I left a comment at another blog, written by Dr. Michael Wood.
Because most gang stalking related comments use pseudonyms, I have found that it is not wirth getting involved too deeply in any one narrative, unless the person uses their real name, and cites examples that make some kind of sense, i.e. ” I am targeted because I was an informant for MI5,” or something credible that establishes a baseline reality-otherwise, you are swept into plainly abusive and harmful dialogues with complete strangers, many of them bizarre sadists, or other unstable types.
This person also claims other things, but trying to get to the bottom of any online narrative is a deep rabbit hole.Most interesting is that of the posts that are getting attention on my 1.5 week old blog about OGS, these indicate that there is a ‘special interest’ reading what I write, and I won’t disclose that quite yet.
So, I post this comment below from someone who has made three comments directed at me- I inure you to explore this comment below in any way you wish as a researcher of organized gang staking. And, as a researcher, a psychologist, a linguist, or whatever discipline you practice, note also that that the comment is front-loaded with words, phrases and concepts inferring threats of violence, real or imaginary, starting with the nym’ of the poster; and that taken as a whole, is ominous, and threatening, but also imagine reading dozens of such comments over a period of time? The net effect becomes like a neuro-linguistic programming session filled with life threats and other negativity:
Comment from “Almost Dead” at Dr. Mike Wood’s Conspiracy Theory Psychology blog:

Almost Dead

Yeah, it still doesn’t compare, to, say, a black ops guy huddled in a military jacket outside of your door in the morning, who doesn’t respond when you question him. It doesn’t compare to someone setting off your fire alarm just as you’re falling asleep for three days in a row. It doesn’t compare to,… well, a lot of things. They’ll do street theatre and have someone who is pretending to be crazy physically assault you. They’ll drug your food with shit that slowly kills you. They’ll interrupt any connection you’re forming with anyone with noise disturbances. You can always turn your computer off. You can always live without it. There are alot of things you can live with. You can’t survive while being poisoned though. You’ll slowly start to die. You can’t succeed while being chemically castrated, arbitrarily and randomly. The internet is effective at limiting your opportunities, believe me. When your email address is hijacked and they can pick and choose which jobs you can have so they can organize workplace mobbing. However, you don’t need the internet, and you don’t need your phone. Particularly after they’ve reduced you to nothing anyway. When they poison you though with shit that gives you inflammation of the kidneys, turns your skin red and makes your hair fall out, they’re straight-up killing you. You can endure any amount of psychological torture if you’re strong enough. They’ll seduce any woman you start a relationship with…. I mean they’ll do fucking anything. Any way they can attack you. The only attack you can’t withstand is chemical, and at some point, if nothing else is working, they’ll start in on that and kill you slowly. They operate in a network where everyone lies to everyone and everything, if there is any documentation at all on it, is classified. So they don’t actually have any rules. If they can’t achieve their objective without the use of chemical warfare, they will use chemical warfare. So to be perfectly frank, I’m not the least bit sympathetic as far as your web search results go. Or how long it takes your posts to be published. They use a combination of agents-in-training and networks of people who are just above retarded to do anything they want to you. The agents are never people who are actually grounded intellectually, and the imbeciles simply can’t be rational, they’re not that smart. The combination means no rules. If they’re using five gang stalking organizations to attack you, or even three along with two or three groups of citizen volunteers, no one knows exactly whats going on. Even to the fucking gangstalkers themselves you appear to be overreacting.
After notes: I am updating this post to note that the above scenario contains specific, personalized data and details and “clues” that I will not disclose at this time, for legal reasons.
And- I note that Dr. Wood has responded to this poster as if they are an actual mentally ill person, as opposed to what I maintain-that they are part of a world-wide, and highly personalized intelligence operation, and propaganda related to counter-intelligence stalking (which is what most OGS is.)
However, at the time of the posting above, many specific things will bear my thesis to fruition, not least of which are that posters mention of Washington state, Utah, and then, the phrase “even the gang stalkers” and more is evidentiary, and related to other facts and claims that  make throughout ROGS.
Lastly, the pseudonym “Almost Dead” and “gang stalking” appears nowhere on the internet BEFORE that series of posts but the phrase does-and so I note the nym and the phrase are not related.
And Dr. Wood himself-and his web server-can easily document these facts and the IP’s related to my claim. Certainly, Dr. Wood has encountered interesting scenarios since these postings-and his blog is surprisingly silenced since this discussion took place there as well-go over there and note the dramatic drop in postings, but also the general dialogues that have taken place since that one post.
Then, there are the linguistic traits, and semiotic meanings within the posters psychological profile that indicate many other things, which any researcher can cross-check and validate across the online dialectic.
Update 01/06/1018:
I am updating this post for this specific reason: I made several predictions above, and a specific a prediction that linguistics can help solve the language puzzles of “who are gang stalkers.” In this case, you will note that the phrase not “even the gang stalkers” is highlighted above, and also, time-stamped at the time I wrote it in my WOrdpress blog here.
I did this for a very specific reason. I ask you the reader now to use the duckduckgo.com search engine and search that exact phrase, and see how specific it is to another writer who claims to work from the Las Vegas/Clark County “public library” aka “Fusion Center/LEO affiliated organization/institution.
I also ask any law enforcement personnel reading in to ROGS right now to do this search immediately, because you will find an actual gang stalker in action.The phrase “”even the gang stalkers””uses colloquial syntax in a specific mid-western American way-specific to the more rural regions of the American South, and the midwest-and specifically is a hybrid language structure that you can find anywhere rural/southern descended persons mix with more cosmopolitan society (you can research the etymology of the phrase yourself).
Then, I ask you to note that ROGS has specifically  implicated a four stripe lieutenant, whose name is exactly the same as a four star Canadian General in this blog here.
Lastly, that you find and investigate or open a prosecution that person, known variously as “Gladys” and several other nyms. As the reader will note, many “gang stalkers” say frequently that their goal is to stalk people until their victims are “institutionalized, incarcerated, or commit suicide.”
This is the nature of this sort of harassment-the gang stalker/s in this case are able to find my writing online, and specifically target me, personally, across the web, despite all attempts at anonymization.
So-here is two variants of the phrase, as of today’s date, as they appear in Google-this phrase is SO SPECIFIC that Google has only four results for “even the gang stalkers”, and two of them are  here at ROGS as I outline my case against people who I have named elsewhere.
Here are Google.com’s results as of today, 01/06/2018 and I note that because WordPress.com keeps copies of changes and “drafts” of blog posts, it will be noteworthy tat my claim is “evidentiary” in that it fulfills most states/federal definitions of admissible evidence. Then, it is noteworthy that Google also provides back-up E-discovery materials that can and will validate my result:
 even the gang stalkers    Google Search.png

4 results (0.43 seconds)
Here are Duckduckgo.com’s results-and note that I have previously indicted or made claims about the speaker in other writing:
 even the gang stalkers  at DuckDuckGo.png
As a final note, I would like to bring attention to this academic paper called “General Information On Gang Stalking, whereby a poster going by the nym “protectlifenow” appears in the Google results, and has also provided this paper calling upon law enforcement to note that “The Community and Criminal Administration Segments” are integral in this problem.
From that paper:

Currently, the Community and Criminal Administration segmentsare the most detrimental to society.

The focus will be on the community and criminal administration segments because these seem to coincide often and are the most detrimental tosociety at this point in time. The segments are not distinct and often overlap. The community usually supplies the workforce for the campaign by using influential locals to recruit, follow, harass and spread misinformation about TIs. The recruits report to their “handlers” who in turn report to their own “handler”. The street team may not know the person or people in charge of the operation. Information is usually released on a need-to-know basis and in some cases stalkers are unknown or appear unknown to each other.
Currently, the Community and Criminal Administration segments are the most detrimental to society. Segments often overlap with the community supplying the workforce for the campaign

 

 
 

Gang stalking veterans: welcome home-now meet HSI/DHS private contractors and surveillance role players who stalk you as a threat to America.

organized gang stalking and veterans
Many veterans report that they are gang stalked, and some speculate that it is necessary to ensure that they don’t go “postal” and shoot up some stuff here; that it is a form of psychic driving meant to de-pattern them much as the famous mind control doctors such as McGill University’s own Donald Ewen Cameron-who was a CIA contractor- perfected in the 1950-70’s. Or as others speculate, that it is a deliberate effort to create Manchurian candidates ho then go ballistic, and drive political narratives, such as the anti-2nd amendment lobbyists using soldiers to drive anti-gun ownership.
Related Story: How the Department of Homeland Security ICE HSI runs a very welll hidden asset forfeiture racket (when was the last time MSM mentioned THAT?Patterns….patterns….) styled after CIA self-funding black operations
The research on organized gang stalking does indicate that veterans are highly targeted, and that their anxieties are only exacerbated by hidden “domestic terror,”waged by the DHS and the associated private contractors” who act in darkness, beyond a chain of command or accountability, and perpetrate illegal or questionable tactics directed at targeted individuals.
Many veterans have also been exposed to classified tactics and technology, and some of these narratives also indicate that they are stalked much the way that whistle blowers are stalked. And some whistle blowers, like Walter Laak of Las Vegas, Nevada, a combat veteran of two tours in Iraq, (LAs Vegas has inordeinately high reports of gang stalking) sometimes confront the hidden cash cow of the FBIs CVE programs, where pastors, social workers, and psychiatrists all report to the FBI, throwing atient confidentiality out the window.
Here is one other such testimony, a plea really, from a veteran named Douglass Lee Thompson:

My personal investigation is a collection of  victims testimonies, public documents and 1000’s of articles on this subject. I am just a Blogger, and Military Combat Veteran, etc.. but the cries for help to State Representative, Congress, and the State’s Attorney Generals office’s points to massive misuse and abuse of high tech electronic surveillance/ harassment equipment, a well funded operation to sabotage selected individuals.
I personally believe this is a “Organized Criminal Cabal” doing this Gang Stalking. After serving my Country  Honorable for over a decade, serving in two Wars, multiple Operations, I do not believe, I can NOT believe this is a act of Government Operations, but a well funded Criminal Operation.
I pray they get taken down by the professions who are voted in to protect American citizens, taken down by those who raised there hand and swore a oath to protect the values established in the United States Constitution, taken down by those who made a solemn declaration I will support and defend the United States against all enemies foreign and domestic..
I believe and have great confidence Gang Stalking will be declared ” Domestic Terrorism probably funded by someone like ISIL/ISIS , that’s a personal opinion, but the fact this Gang Stalking is happening to American Military Veterans, and many others is fact in my book,,, Blogger investigation complete!!!!…
Lets pray the ones in power put a stop to this… and use the legal system to handle the Judges jobs… Letting the legal process work, the U.S. Constitution work.. and give every American Citizen the privilege to pursue, Life, Liberty, & Happiness, all the Apple Pie they can get…. God Bless…
Gang Stalking does not represent any American values, I grew up with, I’ve served with many who would give there life for America… I do not believe the misc articles saying the Government is involved.  I do believe after two years looking deeply into this subject, its a well funded criminal operation,, sounds like Domestic Terrorism, and ISIL/ISIS from what’s on the the news every day…. Lets Pray the victims of ” Gang Stalking find Justice and Protection from those professional charged with protecting American Citizens.  
http://www.douglasleethompson.wordpress.com

 
It is not impossible to imagine that many veterans have been exposed to some as yet disclosed forms of experimentation. It is also possible many veterans are stalked due to the fact that they have been around classified materials, practices, or technology, and that a psychological operation, or influence with a “discrediting narrative,” is being waged in and around their lives.
Had I told you of my own experience with Virginia based companies, institutions, and subversive internet tactics going back to 2005-and told you that hidden technology can mirror my cell phone, and then subvers the functions of encryption by performing a man-in-the-middle attack from the phone itself-that my phone has been at times  you would have laughed at me. After all-who am I to tell you?  But this was the biggest news story in the world as of yesterday, and even mainstream media like MSNBC carried the story.
When one person says one thing, it is anecdotal-but when many say similar things, well, it becomes empirical.And for most people, when they see it in MSM, well, it’s nearly as truthful as the Bible, or the Talmud.
Here below, is from McGill University, which has admitted that they profited from torture and apologized for mind control:

Imagine being trapped in a small room. Your hands covered in gloves, your sight blocked by translucent glasses, and your head covered by a pillow. You cannot touch, taste, see, smell, or feel. You are totally deprived of your senses. This is the imagery of torture in foreign wars, of espionage blockbusters, of terrible nightmares. It seems hardly something that would occur in Montreal. But it did occur, right here at McGill.
Today, many journalists, doctors, and the general public see the Allan Memorial Institute in Royal Victoria Hospital as the cradle of modern torture, a cradle built and rocked by Scottish-born Dr. Donald Ewen Cameron. To the patients of Dr. Ewen Cameron, our university was the site of months of seemingly unending torture disguised as medical experimentation –– an experimentation that destroyed their lives and changed the course of psychological torture forever.
Cameron’s experiments, known as MK-ULTRA subproject 68, were partially funded by the CIA and the Canadian government, and are widely known for their use of LSD, barbiturates, and amphetamines on patients. In the media, they were known as the “mind control” studies done at McGill and were reported as a brainwashing conspiracy from the CIA and the Canadian government. For journalists, the story was a goldmine. LSD use in a CIA experiment was an angle no sensationalist media could reject, especially in the anti-drug frenzy of the 1960s.

Organized gang stalking, database abuse, Hitler, Holocaust, and IBM punch cards

Fight Gang Stalking; organized gang stalking self defense: Some in the tech industry have signed a petition and are taking a stand against the massive fraud that has been perpetrated by Google, Palantir, and other CIA linked, InQTel funded operations that destroy the most basic of human rights: the right to be left alone, in privacy; and every right that stems from that .
Here below is the petition, which over 2500 people signed in one week! Here is how you can help, and fight against this new, and horrific database abuse that leaves all of us exposed, naked against this vast bureaucracy, and targeted as individuals by unseen and unnaccountable entities.
The Petition:

Write a list of things you would never do. Because it is possible that in the next year, you will do them. —Sarah Kendzior [1]

Our pledge

We, the undersigned, are employees of tech organizations and companies based in the United States. We are engineers, designers, business executives, and others whose jobs include managing or processing data about people. We are choosing to stand in solidarity with Muslim Americans, immigrants, and all people whose lives and livelihoods are threatened by the incoming administration’s proposed data collection policies. We refuse to build a database of people based on their Constitutionally-protected religious beliefs. We refuse to facilitate mass deportations of people the government believes to be undesirable.
We have educated ourselves on the history of threats like these, and on the roles that technology and technologists played in carrying them out. We see how IBM collaborated to digitize and streamline the Holocaust, contributing to the deaths of six million Jews and millions of others. We recall the internment of Japanese Americans during the Second World War. We recognize that mass deportations precipitated the very atrocity the word genocide was created to describe: the murder of 1.5 million Armenians in Turkey. We acknowledge that genocides are not merely a relic of the distant past—among others, Tutsi Rwandans and Bosnian Muslims have been victims in our lifetimes.
Today we stand together to say: not on our watch, and never again.
We commit to the following actions:

  • We refuse to participate in the creation of databases of identifying information for the United States government to target individuals based on race, religion, or national origin.
  • We will advocate within our organizations:
    • to minimize the collection and retention of data that would facilitate ethnic or religious targeting.
    • to scale back existing datasets with unnecessary racial, ethnic, and national origin data.
    • to responsibly destroy high-risk datasets and backups.
    • to implement security and privacy best practices, in particular, for end-to-end encryption to be the default wherever possible.
    • to demand appropriate legal process should the government request that we turn over user data collected by our organization, even in small amounts.
  • If we discover misuse of data that we consider illegal or unethical in our organizations:
    • We will work with our colleagues and leaders to correct it.
    • If we cannot stop these practices, we will exercise our rights and responsibilities to speak out publicly and engage in responsible whistleblowing without endangering users.
    • If we have the authority to do so, we will use all available legal defenses to stop these practices.
    • If we do not have such authority, and our organizations force us to engage in such misuse, we will resign from our positions rather than comply.
  • We will raise awareness and ask critical questions about the responsible and fair use of data and algorithms beyond our organization and our industry.

Gang stalking and punitive psychology: technology abuse meets bad government policy

Organized stalking is  symptom of a mental disease alright- the creeping institutional psychopathology of America’s encroaching police and military state. And it’s also a social disease, where victims who have not been targeted mock, or deride the claims of those who have been targeted.
What do you call a world where the torturers mock their victims, or a world where psychologists work with the FBI as informants against the interests of patients who have endured hidden abuses?
Between the massive fraud waste and abuse at today’s NSA, which targets individuals with chronic and pervasive surveillance, and targets whistle blowers, and then feeds the interactions between these people to the many other alphabet agencies that use NSA data to then follow, wiretap, and target American citizens, democracy is on a precipice like never before in history.And it doesn’t help that psychology is politicized and allied with torture and abuse, as government seeks to eradicate privacy by outright lying and bullying the nation with one false paradox after another; and the silencing of those who believe that privacy is an important personal right; and perhaps the seat of healing itself?
Never in history has there been a bigger invasion of institutions of healing. Well-there WAS MKULTRA, which set the template of course. And once upon a time some psychiatrists, medical doctors and psychologists still had a conscience, and took a stand against punitive psychology. Meet Dr. Moss David Posner, draft resistor, prison doctor and prisoners advocate, who counseled targeted individuals and who was one himself.

So, maybe ONE other period of history- the Stalin era of the Soviet USSR, a time when psychologists diagnosed the complaints of those who were victims of gulags, and victims of chronic and pervasive surveillance and its subsidiary harassment as “mental illness.”
The term for the political use of psychiatry is well known: the Stalin era of punitive psychology.
One other era of history saw psychiatrists and psychologists abuse the practice and principles, as they colluded with military and CIA funded psychiatrists. And what they are doing today torturing people and mind controlling them a Guantanamo is also well documented as exactly that. So, political abuse of psychiatry is a real thing, as we see at Guantanamo, and in the Martha Mitchell effect.

Related Story: Meet Dr. Christine Sarteschi, a social worker and ponerologist, who works closely with organizations like the Association of Threat Assessment Professionals (ATAP ) and other crisis PR factories, hand in glove to black bag and gaslight victims of OGS, who ATAP notes in their literature are in fact victims of “parallel colluding investigations, ” as she joins Dr.s Lorraine Sheridan, David V.James, Joseph Mengele, and the CIAs Mormon torturers Mitchell and Jessen, in denying the reality of 24/7 police and surveillance state abuses, aka punitive psychology.
Extra points for noticing that many ATAP affiliated private contractors use acronyms that are (coincidentally, of course ) close to PsyOps, the military nym for psychological operations.

Then, take a look at the case of a humble garbage collector named Al Ditty from Minneapolis who took a stand against the militarization of garbage collectors (no shit ), and who then was framed as a suspect, including inferences in mefia that he had “mental health issues,”fired from his job where he had a stellar work record, and then, he was “investigated ” in what ATAP calls the “parallel colluding investigation ” by a corrupt police department that is in the record utilizing gang stalking against reporters.
But also-quite unsurprisingly- psychologists even recently ganged up and wrote a letter calling President Donald Trump a nutter. I mean-the irony meter is probably broken at this point over the “what is organized stalking” but this was just too much. And guess where that letter which featured psychiatrists who HAVE NEVER MET Trump, calling him all kinds of high falutin’ names straight out of the DSM-IV?
Yup-at the New Yarwk Times, the same paper that carried the accolades heralding the enshrinement of the David V. James and Lorraine Sheridan study as an “authoritative” document. I mean- go ahead and make my case for me if you want to, I will be glad to examine your claims, but most outside the echo chamber of psychiatry and psychology-and that which sucks the teats of the DVIC, are insular, incestuous, and single focused, as psychology is proven to be little more politicized sociology with a drug prescription to sell.
While applied-psychology once showed promise as a helping tool, today psychology as junk science or pseudo-science is very well documented, and it stymies any rational person that any president or political figure could condone torture, but they do, right here in America. And, psychologists have colluded with that, too, regardless of whether the president was a controlled asset or not. SO, this emergent internet trend of diagnosing mental illness via anonymous survey’s and other equally challenged methods is just plainly bizarre-schizophrenic projection at best, punitive political theater at worst.
Not surprisingly, the two “great white fathers(patriarchs)” of both propaganda operations and psychiatry were actually relatives: Sigmund Freud the mind bender and his nephew Edward Bernay’s the great spin doctor. And this is by design, and by practice, and echoes the very history of both psychology and propaganda to this day, as complimentary organs of mass mind control and opinion formation as well-which is a clear and stated goal of all propaganda, by definition, and by the stated goals of this slick operation.

Related Story: The birth of the MIC Propaganda complex, mass mind control and influence operations, and it’s historic alliance with psychology. “A week after [President]Wilson’s declaration of war, he[Bernay’s] creates the imaginatively named Committee on Public Information (CPI) to propagandize the war and, quite literally, to mass brainwash America. It marks the beginning of scientifically based mass mind control in America.”

Here below, I offer any researcher of OGS to look in on a dialogue between two people who claim they are targeted individuals, and note the sanity with which they speak. This is a very common fact of OGS victims-most are clear headed and plain spoken, and the only thing they seem to “suffer” is having n redress, and few legal recourses to action against their system sanctioned stalkers. And, that the only element of mental dis-ease displayed in the scenario below is that one suspects the other of being a government agent, and exhibits that exact rational, self protective paranoia.
Here is actual dialogue between targeted individuals on The Intercept forum. Note the dialogue between Galactus and Stan (Stan is a well known person there who believes he is targeted, and he frequently mentions surveillance role players, and has an online presence where he seems to exhibit rational reactions to harm he has experienced in the past. 
No tinfoil hats, now DEW’s, no microwave beams-just a discrediting narrative, some possible PTSD,  and one persons attempt to overcome it through seeking validation-which is not, and will not be forthcoming from politicized psychology any time soon. There’s just TOO MUCH money status and power in the game played by institutional sociopaths of all kinds, on a board that is overlayed on any individual’s personal experience.

JB
March 4 2017, 3:16 p.m.
Who ultimately pays the storage fees for all this data, just sitting in a haystack, waiting to be sorted or not? … Seems mighty expensive, my boondoggle.
? Reply
hans gruber
March 4 2017, 3:14 p.m.
IC operates on need to know
and IC has determined that you dont need to know .. so quit whining
? Reply
Stan ? hans gruber
March 4 2017, 5:01 p.m.
Based on the number and scale of past fuck-ups, it seems the intelligence community doesn’t need to know much either.
? Reply
Galactus-36215
March 4 2017, 3:07 p.m.
Spying on Americans is anything but incidental.
My spouse and I are on 24×7 direct surveillance now via our smartphones for the last several years. We are both US citizens.
Although we’ve not been able to confirm it, we suspect we have been on a Watchlist since 2004. Our overseas mail has been redirected through an office/adress in Singapore, our phones tapped in 2005/6, incessantly questioned and interviewed at the US border every time we enter the US from any overseas trip either personal or for business.
? Reply
Stan ? Galactus-36215
March 4 2017, 5:31 p.m.
This guy has made these claims before while vehemently denying the experiences of others who have been subjected less trivial abuses, such as black-listing, constant organized stalking, and physical assaults.
He’s got that smell. The stasi runs sock puppets here, 24×7, trying to manage impressions. If they’re not tossing that space aliens & mind control slop at real targets, they’re pushing “it’s not so bad” bullshit.
Professional vermin? Volunteer patriot? Another naive zoo animal without a clue? Either way, he’s full of it.
? Reply
Christian C Holmer ? Stan
March 4 2017, 5:50 p.m.
I’ve never once questioned the veracity of the experiences you’ve described over the years. Different people can be targeted in different ways Stan no harm no foul. Weaponizing peer reviewed neuroscience has been at the top of the deep state “to do” list for quite some time.
? Reply
Galactus-36215 ? Stan
March 4 2017, 7:05 p.m.
These events are mutually exclusive. It’s perfectly acceptable for someone to believe one story while rejecting another.
The only ‘smell’ I have is usually when I don’t shower on Saturday mornings.
But have at it. Feel free to name call all you want, it doesn’t bother me. It actually makes me happy and to smile. So, go for it. 🙂
? Reply
Nick Torrent ? Galactus-36215
March 4 2017, 6:27 p.m.
You’ve confirmed this for sure?
? Reply
Galactus-36215 ? Nick Torrent
March 4 2017, 6:55 p.m.
Two very key aspects of this, yes. That’s all I’m will to say at this point.
? Reply

Organized stalking and punitive psychology: the paradox of psychologists as arbiters of the mental health of targeted individuals.

Conflict of interest in psychology? Targeted individuals and mental health: CVE programs and dubious intentions; even more dubious results.
Those who experience the quasi legal, and often illegal interactions targeted at them by intelligence agencies, law enforcement and the wide net of affiliated community groups that perpetrate organized gang stalking, such as the LEIU’s,  are often left debilitated, as the goals of OGS are stated in multiple blogs and videos online, and even Urban Dictionary is aware of these campaigns: they seek to destroy individuals.
Urban Dictionary has a list of the activities that TI’s are subjected to, but there are many more descriptions in the less than academic online discussion communities. One theme is certain to come up:  OGS seeks to destroy relationships or exploit them, isolate individuals, demolish and demoralize individuals and leave them broken and homeless.
Programs like the FBI’s Countering Violent Extremism, or CVE program,  enlists psychologists, social workers, teachers, homeless shelter advocates, and many more community members in the stalking, and harassment that a targeted individual experiences, and the TI has little to no chance of privacy, or the ability to recuperate from the stated goals of OGS. They literally have nowhere to run as they are filleted by this mechanism.
Let’s take a look at what a TI experiences as they are pressured or recruited by an FBI informant- and keep in mind that it is not just Muslim’s who are being targeted, but also that every law enforcement agency has versions of their own programs, targeting trailer park kids and south Central teenagers in other crime creation or infiltration schemes, as the FBI CVE is just the template for a wider range of community policing programs. And, as noted elsewhere in my blog, religious organizations and cults, community groups and others use these tactics too, though the purposes vary, the effect is often the same.
From the Intercept:

First, they target a Muslim[see my note above]: not due to any evidence of intent or capability to engage in terrorism, but rather for the “radical” political views he expresses. In most cases, the Muslim targeted by the FBI is a very young (late teens, early 20s), adrift, unemployed loner who has shown no signs of mastering basic life functions, let alone carrying out a serious terror attack, and has no known involvement with actual terrorist groups.
They then find another Muslim who is highly motivated to help disrupt a “terror plot”: either because they’re being paid substantial sums of money by the FBI or because (as appears to be the case here) they are charged with some unrelated crime and are desperate to please the FBI in exchange for leniency (or both). The FBI then gives the informant a detailed attack plan, and sometimes even the money and other instruments to carry it out, and the informant then shares all of that with the target. Typically, the informant also induces, lures, cajoles, and persuades the target to agree to carry out the FBI-designed plot. In some instances where the target refuses to go along, they have their informant offer huge cash inducements to the impoverished target.
Once they finally get the target to agree, the FBI swoops in at the last minute, arrests the target, issues a press release praising themselves for disrupting a dangerous attack (which it conceived of, funded, and recruited the operatives for), and the DOJ and federal judges send their target to prison for years or even decades (where they are kept in special GITMO-like units). Subservient U.S. courts uphold the charges by applying such a broad and permissive interpretation of “entrapment” that it could almost never be successfully invoked.

Once again, we should all pause for a moment to thank the brave men and women of the FBI for saving us from their own terror plots.

One can, if one really wishes, debate whether the FBI should be engaging in such behavior. For reasons I and many others have repeatedly argued, these cases are unjust in the extreme: a form of pre-emptory prosecution where vulnerable individuals are targeted and manipulated not for any criminal acts they have committed but rather for the bad political views they have expressed. They end up sending young people to prison for decades for “crimes” which even their sentencing judges acknowledge they never would have seriously considered, let alone committed, in the absence of FBI trickery. It’s hard to imagine anyone thinking this is a justifiable tactic, but I’m certain there are people who believe that. Let’s leave that question to the side for the moment in favor of a different issue.

So, psychologists in the very least are diagnosing shadows if they are unaware of these types of programs, and doing a great dis-service to psychology, and to the narrative or proper care of TI’s.
These programs incentivize psychology to act as informants themselves, and to report to the authorities the state of mind and mental health of an individual who does not even know who the hidden secret people and groups.In other words, psychology is truly “in on it,” as we have never seen before.
Especially troubling is how one of the leading privacy rape advocates in America, Senator Dianne Feinstein(who  benefits from a $600 million in government/military contract), correlated child pornography with terrorism, and used that as a tool whereby she could pry away patient-therapist privilege.Where once targeted persons and others had the protection of patient-psychologist privilege, today, the agencies have stripped even that. and, in one eerie reminder of past CIA and psychiatry collusion, we now see that California psychologists are mandated to report patients who “use” child pornography, when in fact the agencies distribute it, and likely use it in terrorist recruitment programs in classic compromise operations. As Bruce Schneier has noted, it is likely there is more to the story of terrorists and bad guys and child porn, because hiding secret messages in cp is like “smugglers hiding kilos of cocaine in bales of marijuana.
There is literally nowhere to hide from this form of institutional abuse, and mis-diagnoses brings back the reminders of the Soviet era and Stalin’s punitive psychology. Agency collusion to undermine victims of government abuses is startlingly similar to earlier era’s of experimentation on citizens.And, because this is a ‘cutting edge’ issue, and fairly new to psychology and criminal defense attorney’s, historical perspective is important, as we know from the past the agencies distribute drugs, and even assassinate people. But few historical examples are better than the story of Pulitzer Prize winning journalist Gary Webb, who first revealed the CIA’s drug running in the US in his expose'”Dark Alliance.
But whatever you, the reader decides, don’t shoot the messenger-or call them crazy.
Related: Academic says that the governments are distributing child pornography and using terrorism as stalking horses to destroy privacy rights.

Gang stalking case studies and research: The deeply flawed California gang database and police catalogues of children.

Gang stalking case studies: The deeply flawed California gang database and police catalogues of children.
Gang stalking likely started as a means to control and track gang activity*. And the term organized stalking is likely another variant from the days of RICO when the FBI stalked organized crime. Then, as the NSA worked hard to wiretap all Americans, they told us it was terrorists they were after-despite the fact that not a single terror plot was disrupted by NSA surveillance.
The terrorists, which were-exactly nowhere to be found, despite the FBI working overtime on taxpayer dollars to create terrorists, and even then, the guys swept into these FBI plots are pretty lame, or mentally ill.
So, as actual crime dried up and the massive police and state infrastructure realized that it had some time on its hands and ample funding, it morphed into what we know today as the total surveillance state that uses databases to open hidden investigations, capture, read, store data about any American citizen, and otherwise subvert due process in a secret process that is destroying our Constitution.
First they came for the gangsters of the Mara Salva Trucha, or the guys from Diece Ocho’s. Then, they came for their children.

Street gangs are responsible for most homicides in El Salvador ...
Mara Salva Trucha member. Image from the PanAm Post

The dangerous diapered gangster babies in  the CalGang database.
In 2003, California began attempting to gather the name of every known gangster and gang affiliate in the state. The state credited with having a large part in the birth of the modern street gang movement was doing anything it could to turn the tide.
CalGang, as the database became known, was supposed to only be accessed by law enforcement agencies and used to add people to gang injunctions, support arguments for enhanced sentencing in court and even be used to disqualify families from living in public housing.
Problems quickly arose, however, especially when it came to the question of adding juveniles to the list. CBS Los Angeles reported that a law was passed in 2013 requiring parents or guardians to be notified when their children were added to CalGang.
A new audit (PDF) of the program, however, finds that the problems ran deeper than mere notification; it found that some in state law enforcement appeared to be worried about gangster babies.

And this from Ali Winston at Reveal News:

In a report released this morning, the California State Auditor harshly criticized management, oversight and use of the CalGang database, which tracks people with alleged gang ties across the state.
The 115-page report found inaccuracy rates of over 20 percent for individual gang criteria, a total lack of oversight and transparency, hundreds of people whose entries had not been purged from the system in the mandated five-year timeframe, and a failure to follow a 2013 law requiring that juveniles – and their guardians – be notified when they are included in CalGang.

CalGang Database links:
https://www.revealnews.org/blog/california-state-auditor-rampant-flaws-in-gang-database/
https://theintercept.com/2016/11/28/obamas-use-of-unreliable-gang-databases-for-deportations-could-be-a-model-for-trump/
http://www.cbsnews.com/news/calgang-california-gang-database-slammed-listing-babies-privacy-concerns/
NSA stopped no terror attacks, from NBC news:
http://www.nbcnews.com/news/other/nsa-program-stopped-no-terror-attacks-says-white-house-panel-f2D11783588
The FBI terrorist creation factory:
http://www.alternet.org/civil-liberties/how-fbi-creating-terrorists

In the case of the “Newburgh Four,” for example, a judge said the government “came up with the crime, provided the means, and removed all relevant obstacles,” and had, in the process, made a terrorist out of a man “whose buffoonery is positively Shakespearean in scope.”‘
— from the Summary, “Illusion of Justice: Human Rights Abuses in US Terrorism Prosecutions

https://theintercept.com/2015/02/26/fbi-manufacture-plots-terrorism-isis-grave-threats/

Typically, the informant also induces, lures, cajoles, and persuades the target to agree to carry out the FBI-designed plot. In some instances where the target refuses to go along, they have their informant offer huge cash inducements to the impoverished target.

https://www.techdirt.com/articles/20170223/08534136776/another-terrorist-swept-up-fbi-which-had-to-purchase-20-terrorist-supplies-to-keep-plan-motion.shtml

Robert Lorenzo Hester of Columbia, Missouri, didn’t have the $20 he needed to buy the 9-volt batteries, duct tape, and roofing nails his new FBI friends wanted him to get, so they gave him the money. The agents noted in a criminal complaint that Hester, who at one point brought his two small children to a meeting because he didn’t have child care, continued smoking marijuana despite professing to be a devout Muslim.

UPDATE 09-26-2017:
Since I wrote this post, my blog has been hacked repeatedly, and I have documented several incidents where it was likely taken offline into what is called a “situation rom” aka at “Fusion Center’s”that are actually in the business and practice of altering our rights of free speech, due process, and freedom of association.
Then, there is the issue of redirection, and databases and prograwhere the corporate-government alliances of the security state have literally blurred the lines between corporation and government so badly that they are inseparable in this subversive endeavor.
This is how deeply challenged the security state, and its enablers are by the subject matter that I write about herein.
* that activity decided by the “gang” that controls American, British, and other FVEYs policing, augmented by the racist, race supremacist Jewish organizations that do the dirty work of christian based societies. It is an actual, and true conspiracy at each and every level of such societies.
Todays gang, for example, takes its marching orders from Saudi Arabia, and China, who are both heavilly invested in the USA (masks and face coverings are one example of this blur of ideology, health, day to day living, and religion. I myself would invite,COVID -19 to my doorstep, knowing that I am.immune, and having been tested for that in a non-US medicine based environment. Your results may vary, lol (results from death, to permanent complications, lol. )
 
 
 

Organized gang stalking and the Department of Homeland Security and the Stasi

Department of Homeland Security and the Stasi: Google has 33k hits for those terms today.
1564329153702
A Google search of “Association of Threat Assessment Professionals (ATAP ) and organized gang stalking” brings up exactly one link as of the day I published this, documenting how Fusion Centers use private contractors to target, stalk, and harass people online and off in what their literature calls “colliding parallel investigations.” Then, the other hits are me, here at ROGS.
And what ATAP and other online and offline bullies are doing is crafting threat narratives that have demonstrably caused harm, and they are deploying military psychological operations on individuals both online and off, but they have not stopped a single terrorist in the entire time they have been draining the taxpayers dry with pseudo -science enabled by crisis PR.
So, one of the great ironies of the Department of Homeland Security claiming that Trump ‘drives’ domestic terror in recent news reports is that the hidden campaigns of personalized and targeted assaults of organized stalking are often the work of this same agency, whether they are  sizing up real estate for pre-crime “assessments” along major drug corridors, or feeding data to LEIU’s, or siphoning records from the NSA and feeding them to local law enfarcement. And no one has yet out-done President Obama for the way he used the DHS as his own personal culling tool.

While some speculate that the DHS creates terrorism, others simply claim that because their “investigations” use so many illegal or unethical practices, that they are simply the new version of the East German Stasi.

We also see that the DHS is running what appear to be CIA styled self-sustaining black operations that pre-targets real estate for pre-crime analyses, and pre-appraises its value in a formulaic, highly methodological asset forfeiture racket.
1564392508045
From the Intercept, here is a leaked catalogue of the DHS asset forfeiture methods and tactics. Notice how similar these tactics are too complaints of gang stalking.

And, so, this last claim is partially true, because during the start up of the agency, Markus Wolf-who actually WAS the Stasi-waas said to have consulted with the Bush administration, on everything fromm national ID cards, to detaainment camps to w nation wide snitch culture of chronic and pervasive suspicionless “neighborhood watch” and “community policing” initiatives.

Lipstick on pigs, or pigs in high heels? You can decide for yourself, but since 2004, the total surveillance state is upon us all. Here is Markus Wolf-I will leave this picture speak for itself:
we-88.jpg

Homeland Security Sees Anger At Trump as a Driver of “Domestic Terrorist Violence”

Photo: Alex Milan Tracy/Sipa USA/AP

In the view of the Department of Homeland Security’s intelligence wing, anger over the election of Donald Trump, reflected in protests across the country, is a driving force in “domestic terrorist violence,” according to an unclassified report obtained by The Intercept.
The conclusions, laid out in a February 21 report prepared by the North Carolina Information Sharing and Analysis Center (ISAAC) and DHS’s Office of Intelligence & Analysis (I&A), come amid a series of controversial post-election efforts by Republican lawmakers to criminalize protest.
Focused on North Carolina, the six-page document “was written in response to a spike in violence and criminal acts — including an arson attack — targeting political party offices and staff that occurred prior to of and immediately following the election” and sets out to provide “an overall threat forecast for the first half of 2017 concerning like activities in the state.”
“In the lead up to and immediately following the 2016 election, North Carolina experienced incidents that included the targeting of political campaign offices and government organizations,” the report notes, which, “highlight their attractiveness as targets for domestic terrorists and various cyber actors seeking to advance political aims and/or influence government operations.”
Based largely on open source reporting and law enforcement assessments, the report focuses on a handful of incidents in late October in which GOP offices were targeted with “low level physical violence,” including with BB guns and, in the most serious incident, Molotov cocktails. Though property was damaged in the latter incident, nobody was injured. The report notes that the words “Nazi Republicans leave town or else,” were spray painted on a building adjacent to the burned GOP office — the report does not mention the “Black Lives Don’t Matter and Neither Does Your Votes” graffiti that appeared on a wall in Durham, North Carolina weeks later, however, nor the Democratic office in Carrboro, North Carolina that was tagged with the words “Death to Capitalism.”

Regardless of your personal politics, left right or center, one thing is certain: when some ask “where do the gang stalkers get the money” to wage personalized domestic terror campaigns,  the answer is black budget’s and massive security theater fraud upon the tax payers. And, real estate racketeering where they use tactics and methods like those in the links above to fill houses with criminals and sex offenders, and then, use THAT as pretext to steal property.
1564329560176

The DHS isn’t alone of course, as America becomes Nazified by Anti-Defamation League sponsored trips to “Greater Israel” where American SWAT teams are trained in the fine art of murdering mentally ill people, and as all agencies are in on this “Operation Take Down America.” ere- have a look at “manufactured terrorism” where patsies are created and then murdered-and then, crisis PR industry goes into overdrive to contain the narrative, and the flawed timelines.
Edaward Snowden revealed some of the scope and breadth of this foreign sponsored army that sits in American police forces, and the military, but also we see that American policing has become “Israelified” as if we live in a war zone. Look- Israeli death squads are training their sights on Occupy protesters. I am not alone in imagining that the banksters have begun to wage war on us, AS American’s.
Where once that would have seemed paranoid, we see today that Rotary clubs are active in all the major crisis PR events ranging from staging active shooter events, and then, the next day some kid goes on a school shooting rampage, and guess what? Yup-the Rotary Club is THERE TOO. And all of this as the SAME group wages a “Stalking the Stalkers” campaign, and seeks to remove guns from there logo.
The FBI for instance, according to John Whitehead, has long been a secret police force, cuckolded by international finance, and willing at all turns to burn the Constitution:

America’s Gestapo: The FBI’s Reign of Terror

By John W. Whitehead
March 14, 2016

We want no Gestapo or secret police. The FBI is tending in that direction. They are dabbling in sex-life scandals and plain blackmail. J. Edgar Hoover would give his right eye to take over, and all congressmen and senators are afraid of him.”—President Harry S. Truman
Don’t Be a Puppet” is the message the FBI is sending young Americans.
As part of the government’s so-called ongoing war on terror, the nation’s de facto secret police force is now recruiting students and teachers to spy on each other and report anyone who appears to have the potential to be “anti-government” or “extremist.”
Using the terms “anti-government,” “extremist” and “terrorist” interchangeably, the government continues to add to its growing list of characteristics that could distinguish an individual as a potential domestic terrorist.”

Of course, if the devil is in the details, then surely he has a lot of office workers and little demons to help him with all of that. And because the DHS, FBI, and other LEO’s cannot legally risk their funding to subvert the law (think illegal wiretaps that happen BEFORE the NSA even  gets a whack at the phone call, or black bag jobs and yes-wat is called gas-lighting and OGS as well) the Devil’s lil’ helper is called the  Law Enforcement Intelligence Units that work outside the law and do the dirt (think ‘anonymous tips’ to legitimate LEO’s).
LEIU’s are America’s deep state dossier’ racketeers, who also concurrently draw salaries and retirement across state and federal jurisdictions, and work within law enforcement exfiltating data and compiling dossier’s on everything from petty grudges, to political targets, activists and others who do not comply with deep state agenda’s, and often these work cases that they themselves created from whole cloth, and that, well into retirement.
Put another way, LEIU’s are where the cesspool where  law enforcement criminals all float together sharing data that the obtained illegally. America’s Secret Police [ link to .pdf file on LEIU crimes and subversions, circa 1979]: How LEIU’s have long subverted the letter and the Spirit of the law; or-how the law works outside the law, to create crime and convictions.
From Project Censored-here is the top censored story of 1978, and certainly today as well:

The Law Enforcement Intelligence Unit (LEIU) was one of the top ten “censored” stories of 1978; at the time we described it as follows:
“In contrast to the CIA and FBI, the LEIU is a little known organization; in fact, almost no one has ever heard of it. But its power is considerable and its potential threat to our freedom is enormous.
“The LEIU links the intelligence squads of almost every major police force in the United States and Canada. Although its members are sworn police officers who work for state and city governments, it is a private club, not answerable to voters, taxpayers, or elected officials. It cuts across the lines of authority of local government, for its members hold certain allegiances to the LEIU that cannot be countermanded by a mayor, county manager, or even a state governor.
“The LEIU is a private club and therefore not subject to freedom-­of-information laws. Thus, the LEIU’s files are even more secret than those of the CIA or FBI.”
Ten years later, we find that the LEIU is alive and well and more powerful than ever. It also is still virtually unknown.
In June, 1988, The Los Angeles Times reported that the LEIU was considering suspension or even termination of the Los Angeles Police Department’s membership because two of its police detectives from an organized crime unit allegedly leaked confidential information from LEIU files.
Richard Bacon, LEIU chairman and head of the Minnesota Bureau of Criminal Apprehension, said “Anytime you have a problem in intelligence, it’s a concern to the rest of our membership.”
A police intelligence supervisor on the East Coast who asked not to be identified added that “We have to assess how deep it goes. … It could have jeopardized entire investigations.”

Organized gang stalking and DHS HSI Investigations and database abuse

~ Leave a comment

UPDATE 09/24/2019: Since I began writing the ROGS blog, new facts have been exposed in major media that validate every single thesis statement in this blog. So, never doubt the power of one voice, or the power of free speech- I have changed the media narrative entirely in my tactical assault on gang stalking narrative.
The following post discusses military grade psychological operations (PsyOps) targeting citizens. When I wrote it, the MSM had not yet disclised that the racist, sectarian Anti Defamation League has been secretly targeting people with the Redirect method, or that organizations like the Association of Threat Assessment Professionals, which advises all of the law enforcement agencies I name herein, has been practicing “colluding parallel investigations” on targeted individuals; or that Fusion Centers are actually dabbling in nefarious psychological operations; or that Fusion Center directors are trained in PsyOps either.

The internet is talking to me!
1570435771780
How massive databases that steal the virtual identities of citizens can and are abused, especially when combined with psycholigical and influence operations; and how Google, the NSA, Palantir, artificial intelligence, database abuse, and quasi-legal investigations can-and do-conspire to create the appearance of mental illness in “targeted individuals.”

Databases are forever, and they now hold all of us hostage to corporate and government  interests, as our personal data, including whole capture emails, phone call recordings, health and wealth information, entire maps of our online and offline relationships, our entire browsing histories, and much more have enabled hidden operators to access our minds and our decisions from behind the curtains of color of law practices

On the surface, any complaint of organized gang stalking includes what could be classified as paranoid psychosis with”psychotic features.” Classic psychosis entails hearing voices, and having conversations with imaginary people, or other creatures and entities like god, or demons, and so on. Then, there is the often cited claim that these victims, or targeted individuals are followed, and that certain other things occur, which defy rational or logical-or psychological explanations. Then, psychologists generally label these victims as delusional, much as victims of child abuse, or domestic violence were once labeled as delusional.
This is all documented in the literature. However, in reality today, we can see and begin to document something that wasn’t available to psychologists in years past: we can use metrics, and measurements, and screen captures, and IP address location, and alternative news sources to document that in fact, many claims of this nature can be verified, or validated; tested against a new hypotheses.
And, we can look at the modern techniques, tactics, and programs of modern policing that indicate that psychology is out of touch with reality, not the targeted individuals. The fact that police can and do use massive databases that inform them about very intimate and personal details of each individual they target is in and of itself a horrific spectre; a naked abuse of power.
Each police or other agency involvement is no longer as simple as a couple of arrest records, and an address. No-these modern databases have entire family histories in them with webs of interconnected relations; entire web browsing histories and categories that profile individuals; modern databases are essentially mind maps, with augmented personal data, and predictive analyses.
This is bad enough for these unfortunates who encounter agencies that use these databases-but far more troubling is that each encounter adds to the possibility of further exploitation of any individual, as these agents and agencies also pen investigations like never before in our history-and pass the investigations back and forth sometimes for years, as we frequently see in the cases of mass shooters, and purported gang members, petty criminals; whistle blowers, journalists-your neighbor, maybe.
Because the internet is forever, we can also document actual conversations and engage with subjects who claim that the internet talks to them. The internet podcast like websites of Talkshoe provide endless glimpses of likely provocateurs manipulating these subjects, and also, sowing misinformation and disinformation. I will not provide links because I believe these sites are plainly harmful, especially some of the stuff on Talkshoe.
But there are many more examples that any researcher can find. And too, the many blogs and video’s that document OGS as well often do reference databases, or use information gleaned about a target to exploit that target.
I didn’t sign up for this!
Databases are forever, and they now hold all of us hostage to corporate and government  interests, as our personal data, including whole capture emails, phone call recordings, health and wealth information, entire maps of our online and offline relationships, our entire browsing histories, and much more have enabled hidden operators to access our minds and our decisions from behind the curtains of color of law practices. The Intercept, the paper that published Edwar Snowden’s leaks, has been actively revealing story after story about how databases are used and abused.
Here  is one example of the breadth and scope of the Palantir database to profile, track, run surveillance and communicate with ‘suspects’ and targeted individuals online-and predict, influence, manipulate; suggest, guide, and control the movements and decisions of these individuals in real time. so, when you next encounter a client, or a  patient who complains of these things, take into account that “even paranoids are right sometimes,” and increasingly, paranoia itself is looking like it is a mis-diagnoses:
From The Intercept:
Palantir Provides the Engine for Donald Trump’s Deportation Machine
Spencer Woodman
March 2 2017, 6:18 p.m.
Immigration and Customs Enforcement is deploying a new intelligence system called Investigative Case Management (ICM), created by Palantir Technologies, that will assist in President Donald Trump’s efforts to deport millions of immigrants from the United States…
ICM funding documents analyzed by The Intercept make clear that the system is far from a passive administrator of ICE’s case flow. ICM allows ICE agents to access a vast “ecosystem” of data to facilitate immigration officials in both discovering targets and then creating and administering cases against them. The system provides its users access to intelligence platforms maintained by the Drug Enforcement Administration, the Bureau of Alcohol, Tobacco, Firearms and Explosives, the Federal Bureau of Investigation, and an array of other federal and private law enforcement entities. It can provide ICE agents access to information on a subject’s schooling, family relationships, employment information, phone records, immigration history, foreign exchange program status, personal connections, biometric traits, criminal records, and home and work addresses.
“What we have here is a growing network of interconnected databases that together are drawing in more and more information,” said Jay Stanley, a privacy expert at the American Civil Liberties Union. “If President Trump’s rhetoric on mass deportations is going to be turned into reality, then we’re going to see these tools turned in that direction, and these documents show that there are very powerful and intrusive tools that can be used toward that end.”
Although ICM appears to have been originally conceived for use by ICE’s office of Homeland Security Investigations (HSI), the system appears to be widely available to agents within ICE. Officers of ICE’s Enforcement and Removal Office (ERO) — the U.S. government’s primary deportation force — access the system to gather information for both criminal and civil cases against immigrants, according to a June 2016 disclosure by the Department of Homeland Security, although ERO will use a separate system to manage its civil cases. “HSI and ERO personnel use the information in ICM to document and inform their criminal investigative activities and to support the criminal prosecutions arising from those investigations,” states the DHS filing. “ERO also uses ICM data to inform its civil cases.”
ICE’s Office of the Principal Legal Advisor also uses ICM to represent the office in “exclusion, deportation, and removal proceedings,” among other matters, according to the DHS disclosure.
The DHS disclosure states that Homeland Security Investigations is ICM’s primary user….
Although ICE’s enforcement focuses overwhelmingly on immigrants, the ICM funding documents make clear the intelligence tool can also be aimed at U.S. citizens. “Citizenship can be established a variety of ways to include biographical and biometric system checks,” one document states. “U.S. Citizens are still subject to criminal prosecution and thus are a part of ICM.”
The scope of ICM’s use appears to have expanded during the system’s development. The hundreds of pages of funding documents from 2014 make no mention whatsoever of ICE’s Enforcement and Removal Office (ERO). On the contrary, the 2014 records state that ICM was launched as primarily an HSI initiative and meant for use by HSI agents. Yet by June of last year, this appears to have changed: The recent DHS privacy disclosure repeatedly states that ERO uses ICM to support aspects of its mission.
This is not the only case in which it has remained unclear what kind of limits ICE has on the sorts of missions for which its intelligence systems can be used.
A spokesperson for Palantir declined to provide comment for this story. ICE did not respond to a list of questions, including whether FALCON — ICE’s advanced intelligence and analytics system for Homeland Security Investigations — is also made available to ERO agents.

Organized gang stalking and intelligence agencies and Russia

~ Leave a comment

Organized stalking, gas lighting,  and intelligence agency: the Russians did it?
You open the door to your flat, and there, on the floor is your mascot, your beloved pet, dead on the floor. Your furniture has been moved around-but just enough t cause you to notice, and not enough to be completely out of place. Maybe there is a sugar bowl in the middle of the kitchen floor. Odd, you think. And then, the fear sets in. You have been gas-lighted.
Organized gang stalking and intelligence agencies: From Russia with Love-gang stalking at the US embassy.
US ambassadors gas lighted and stalked. A story about gas lighting makes it’s it’s way into mainstream media every now and then, and then it disappears (disappearance is a common theme in OGS). The story chronicles how the US Embassy in Russia is under surveillance, or how the Russians are gas lighting US diplomats-but also, how the Russians are the eternal bad guys in the western narrative, and especially, that this story is a regurgitation of cold war era politics, and it is generally an arms industry sales pitch: cold war hysteria is good for business in the MIC.

Related Story: How do FBI agents work with sherrifs departments and local police to perpetrate “black bag jobs,”without warrants, due process, while flaunting, and mocking judicial oversight-aka “gas lighting” in the OGS dialectic?

It always states that diplomats were gas lighted, stalked, and harassed in the identical way that targeted individuals claim they are stalked and harassed. In every incident, and in every individual feature, ambassadors, spies, consorts and agents describe the “what is” of organized gang stalking: phone calls, hangups, noise campaigns, electronic interception of communications, dead pets, garbage strewn over their lawns and so on.
All intelligence agencies, whether local, state, federal or international, practice gang stalking and gas lighting. It is a staple of the intelligence community playbook. So it is neither surprising, nor strange that complaints of organized stalking have increased, as the FBI and ICE and the DHS in general attempt to move their Congressional funding goalpost  designation from “law enforcement” to “intelligence agency.”
And it is not surprising that the general sloppiness of their operations have spilled onto the internet, as low status individuals who have been targeted for practice begin to describe it online. Such is the nature of government experimentation on citizens, which has a long dark history in America.And so do police agencies and agents who harass citizens to pad statistical data, or gain funding increases.
Have a look for yourself– US personnel targeted with gang stalking and gas lighting “Organized stalking and intelligence agencies: US ambassadors gas lighted in Moscow”:

Russian spy agency targeting western diplomats

FSB using psychological techniques developed by KGB to intimidate and demoralise diplomatic staff, activists and journalists
Vladimir Putin
The Russian president, Vladimir Putin, was a lieutenant colonel in the KGB and ran its successor, the FSB. Photograph: Carlos Baria/EPA

Russia’s spy agency is waging a massive undercover campaign of harassment against British and American diplomats, as well as other targets, using deniable “psychological” techniques developed by the KGB, a new book reveals.
The federal security service (FSB) operation involves breaking into the private homes of western diplomats – a method the US state department describes as “home intrusions”. Typically the agents move around personal items, open windows and set alarms in an attempt to demoralise and intimidate their targets.
The FSB operation includes the bugging of private apartments, widespread phone tapping, physical surveillance, and email interception. Its victims include local Russian staff working for western embassies, opposition activists, human rights workers and journalists.
The clandestine campaign is revealed in Mafia State, a book by the Guardian’s former Moscow correspondent Luke Harding, serialised in Saturday’s Weekend magazine.
The British and American governments are acutely aware of the FSB’s campaign of intimidation. But neither has publicly complained about these demonstrative “counter-intelligence” measures, for fear of further straining already difficult relations with Vladmir Putin’s resurgent regime. Putin, a former KGB lieutenant colonel, was head of the FSB.

British sources admit they have files “five or six inches thick” detailing FSB break-ins and other incidents of harassment against Moscow embassy staff.
UPDATE: Since I wrote this post, it has been revealed in MSM that the US Government suspects that sound weapons, aka “health weapons” are being used against American diplomats in Cuba.
Meanwhile, US police agencies and intelligence agencies are gleefully continuing their massive spying campaigns against their own citizens, mass shooting victims are piling up as US domestic agencies gang stalk people to madness, and some are running the DHS like the East German Stasi. Guess which “badguys” I am NOT worried about?

Organized stalking and surveillance abuse and Palantir database abuse

~ Leave a comment

Massive, hidden illegal or unethical programs lead to massive abuses. While no one wants a less-safe country, we also want oversight, and insight int how things are done.
Palantir databases are the most widely cited when it comes to surveillance abuse, and The Intercept covers this topic widely.
From the Intercept:
In 2014, ICE awarded Palantir, the $20 billion data-mining firm founded by billionaire Trump advisor Peter Thiel, a $41 million contract to build and maintain ICM, according to government funding records. The system is scheduled to arrive at “final operating capacity” by September of this year. The documents identify Palantir’s ICM as “mission critical” to ICE, meaning that the agency will not be able to properly function without the program.
ICM funding documents analyzed by The Intercept make clear that the system is far from a passive administrator of ICE’s case flow. ICM allows ICE agents to access a vast “ecosystem” of data to facilitate immigration officials in both discovering targets and then creating and administering cases against them. The system provides its users access to intelligence platforms maintained by the Drug Enforcement Administration, the Bureau of Alcohol, Tobacco, Firearms and Explosives, the Federal Bureau of Investigation, and an array of other federal and private law enforcement entities. It can provide ICE agents access to information on a subject’s schooling, family relationships, employment information, phone records, immigration history, foreign exchange program status, personal connections, biometric traits, criminal records, and home and work addresses.
“What we have here is a growing network of interconnected databases that together are drawing in more and more information,” said Jay Stanley, a privacy expert at the American Civil Liberties Union. “If President Trump’s rhetoric on mass deportations is going to be turned into reality, then we’re going to see these tools turned in that direction, and these documents show that there are very powerful and intrusive tools that can be used toward that end.”
Although ICM appears to have been originally conceived for use by ICE’s office of Homeland Security Investigations (HSI), the system appears to be widely available to agents within ICE. Officers of ICE’s Enforcement and Removal Office (ERO) — the U.S. government’s primary deportation force — access the system to gather information for both criminal and civil cases against immigrants, according to a June 2016 disclosure by the Department of Homeland Security, although ERO will use a separate system to manage its civil cases. “HSI and ERO personnel use the information in ICM to document and inform their criminal investigative activities and to support the criminal prosecutions arising from those investigations,” states the DHS filing. “ERO also uses ICM data to inform its civil cases.”
ICE’s Office of the Principal Legal Advisor also uses ICM to represent the office in “exclusion, deportation, and removal proceedings,” among other matters, according to the DHS disclosure.
The DHS disclosure states that Homeland Security Investigations is ICM’s primary user. Although mainly tasked with investigating serious cross-border crimes like drug smuggling, human trafficking, and child pornography, HSI had also been behind some of the most controversial workplace immigration raids of the Obama administration, which immigrant advocates fear could expand massively under President Trump. HSI provided support to the Enforcement and Removal Office during last month’s high-profile enforcement surge, and just last week it was reported that HSI agents spearheaded a controversial sweep of several Asian restaurants in Mississippi that led to the agency apprehending more than 50 immigrants.
 

Organized stalking and keyword harvesting, aka PRISM and XKEYSCORE programs

~ Leave a comment

One of the difficult aspects of researching organized gang staking is that government programs such as those exposed by Edward Snowden, actively monitor the topic of research, and make it difficult for the average citizen to write about their experiences, or to blog about the topic. Each Google search triggers a keyword search, and Google is in fact tied directly to the CIA and the NSA as well as a host of other agencies.
So, here I will demonstrate one of thousands of ways these agencies and their programs subvert  speech, harass online speakers, and skirt Constitutional scrutiny of any kind.
I have written blogs about some topics and never once had problems publishing in WordPress. Writing about organized stalking on the other hand, which is loaded with keywords that are certainly part of the hidden algorithms that target pure speech. This has the net effect of putting the writer ‘on their radar’ whoever they are at the moment.
This blog has been online for just around a week, and in that week I have been able to write smoothly, and efficiently every day. But just after I wrote about certain topics, three of the Five Eyes nations suddenly were interested in what I had to say. I will now type a paragraph and leave this paragraph in the exact form it is in when outside programs of speech monitoring interfere directly with the writing. Here goes:

I genrally type about fifty two words per minute, and seldom ny Wrdpress, but hen agency levek mechanisms interfere and frequentlyget Jscript type rrors, the writing iteself is deteriorated altered, or otherwise d by these pBelow is a screen so.

Now, I will return to the arduous task of documenting how these exploits affect content. The paragraph above was written as my screen flashed white, froze, and also that little blue circle that replaces the cursor appeared multiple times. For the first few days as I wrote this blg, on the exact computer I am using now, none of that happened. But after the Five  Eyes nations looked in, nothing but misery is a screenshot of tha

FiveEyes noticed.png
Writing in WordPress on the topic of organized gang stalking becomes nearly impossible after the Five Eyes nations become involved. This blog had been trouble free until March 2nd, when I get recurrent white screen freeze-ups, and jscript errors. My computer hasn’t changed, nor anything else. Only the fact that three out of five eyes looked in.

There are literally thousands of ways these agencies mess with free speech. This is just one of them.
This blog became nearly unusable yesterday after this incident as I wrote this. Then, when I left the place where I was writing, no less than one Fire Chief in a  Chevy Suburban, and three squad cars from two agencies were in the parking lot. I filmed this, and document it here as well. I will upload the film when I can, but for now, here is one blog that documented it extensively.I have not read through everything at that blog, nor can I attest to its veracity, but the author does appear to be credible.
Here is a snapshot she took of a neighbor, who has accosted her car:

http://stopgangstalkingpolice.com/
I will look into this at a later time, and contact the blogs author, Bonnie Calcagno, but any researcher of OGS can as well. Perhaps there is mental illness, or some back story, but that does rationalize such blatant gas lighting and illegal intimidation.

Organized stalking and international feminism: Nikki Craft stalks men

~ Leave a comment

In many online narratives, we can see that domestic violence is not only a double entendre’, but also, a tool of women’s organizations and police to harass defame or otherwise destroy men who are activists or men who challenge the narrative. This was first put into play in the 1970’s when Nikki craft advocated that women should band together and stalk alleged rapists. We now see that in the progressive dialectic, the term man is in fact synonymous with rapist. And Nikki Craft never made a dime off of this sloganeering, but it is now a tens of billions of dollar per year industry, but police and women’s organizations did. And, they lost the 2016 election because of it’s scope and fraud as well.
Here is from her website:

In 1975, Craft founded Women Armed For Self Protection (WASP), which advocated armed self-defense for women and retaliation against rapists by their victims. In 1976, Craft co-founded the Kitty Genovese Women’s Project when they posed as sociology students under the pretense of doing “statistical study on violent crimes” and compiled, pre-computerization, on index cards, the names of every indicted sex offender in Dallas County from 1959 to 1975. A year later 25,000 copies of a newspaper listing all 2,100 indictments, 1700 of which were multiple offenders, was distributed throughout Dallas. On March 8, International Women’s Day, the group read the names over local community radio KCHU for 13 hours. The same year she wrote and recorded the Rape Song about Inez Garcia and Joan Little.

And here is from her work labelling men as dangerous rapists, and helping to build the massive surveillance and police state that we see today:

Larger Poster

Drifting from the Mainstream
A Chronicle of Early Anti-Rape Organizing

by Nikki Craft
1972 – 1975 — New information was surfacing within the women’s movement about the myths surrounding rape. Women were beginning to discuss rape in feminist consciousness raising groups. For the first time women could benefit from the experience and knowledge of other women. Susan Brownmiller’s eloquent historical analysis in Against Our Will: Men, Women and Rape, Diana Russell’s, The Politics of Rape and Medea and Thompson’s Against Rape laid the foundation for the changes that would sweep the country in the next decade.
1974 — A small group of Dallas women left their consciousness raising group and began to organize specifically around the issue of rape. Each woman in the group, including myself, had been raped at one time in her life. Each was tired of talking about it and wanted to act. None of us were exactly sure of what to do. We began by educating ourselves. Part of that educational process was attending an anti – rape conference in Austin, Texas. It would change our lives.