The Panopticon and gang stalking complaints: 24/7 harassment is what the Panopticon was designed to do

Gang stalking and symptoms and 24/7 harassment and trauma based mind control (TBMC): hidden in plain sight

“At it’s centre, the victim’s known as “Targeted Individuals” or “TI” for short claiming to be consistently harassed 24/7 by unknown perpetrators that to those around them can see no apparent activity is obviously going to become labelled with some form of mental illness.”
–https://gangstalkinginfoblog.wordpress.com/2016/02/

In my experience, this phrase-this claim of 24/7 harassment- appears in some 75% of all the blogs I have read. The reader should note that all of my estimates are ‘shoestring’ estimates, meaning that my data is an opinion, based in intensive research-not yet collated and verified.
More often than not, the 24/7 claim appears in blogs that attempt to discredit or mock  TI’s. However, because OGS is in part an influence operation with features of mind control, it also appears that many TI’s adopt the language of those who stalk them. This is common in Stockholm Syndrome  as we see with the Beatrice Six, but also in operand conditioning and other nefarious victim/torturer  scenarios as well.
And, this is common in torture and blackmail situations where victims attempt to side with their torturer. It famously has been called “Stockholm syndrome,“in the extreme case, and in OGS, we see that it is frequently referred to as “NTT” or “no touch torture”in most online blogs and video’s.
The phrase “24/7” is itself a relic of street culture, and has it’s origins in gang or prison environments too, such as “24/7 lockdown” and so on. But what is important to note is this: in classic mental conditioning, aka behavioral experiments, as well as social engineering, and trauma based mind control, it really doesn’t take much to make a target feel as though they are under constant observation. All it takes is one, well planned event, and then, reminders of the event placed here and there, much like the kinds that are described on TI blogs and video’s.
No Touch Torture (NTT) is also officially part of the CIA’s torture protocols, and because we know that there is virtually no window between intelligence agents and the public these days, and that 17 intelligence agencies are involved in culling through the NSA’s illegally entrapped data of all Americans,  it is not hard to imagine that these things take place. But in the cases we have evidence, it is clear that there is a component of NTT in effect.
Then, if you add Fusion Center spying that can put a squad car in front of someones house within minutes of them logging on to a computer, and some redirection when they are online, and the ‘symptoms’ are no longer imaginary or schizophreniform, but instead are descriptions of the disease itself. And, the disease is social engineering that employs 24/7 surveillance and monitoring of a person via ther cell phone, computers, and programs like the CIA’s Laser, which is used in every day policing.
These programs were put in place quietly over a decade and a half, and few knew about them, or what they do. But we know now: they monitor us in real time.
Here are two actual examples of lawsuits and stories where rea time monitoring activity of citizens under the “watch” of unknown perpetrators made the national news:
Someone in a store or at your job repeats something back to you, and that something just happens to be exactly what you read about on the internet last night. Then, you are stalked and harassed for years, risking you and sounding like a crazy person after you figure out how it was done. This is the famous Jeffrey Kantor lawsuit, documented by the American Bar Association’s ABA online journal:

Autocomplete search led to government stalking, lawsuit contends

image

Image from Shutterstock.

A former employee with a government contractor claims the government began a campaign of harassment against him because of Google’s autocomplete feature.
Jeffrey Kantor says in a federal lawsuit (PDF) that he intended to search for “How do I build a radio-controlled airplane?” in October 2009 because he was thinking of making the toy for his son’s birthday. After he typed “How do I build a,” Google completed the search with the word “bomb,” and Kantor inadvertently hit enter. Courthouse News Service has the story.
The suit names several government officials as defendants, including Attorney General Eric Holder.
Kantor alleges that government investigators visited him at work after the unfortunate search, monitored his book purchases and computer searches, and attached a GPS device to his car….[click to read more]

 
Then there is the complaint (symptom) where your home is entered and  victim suspects they are being filmed all the time.
This happens surreptitiously after you are gas-lighted- things are moved around in your apartment, and windows and doors are left in curious positions. Such as the case of Dr. Facika Tafara, who runs a family health clinic in San Diego (which is arguably the gang stalking capital of America)whose home was broken into on multiple occasions, and at one point the people responsible left behind a small spy camera:
[youtube https://www.youtube.com/watch?v=U0mjwAPtcRY&w=854&h=480]
 
These two incidents can provoke different levels of paranoia, distrust, fear, and other emotions that indicate trauma. But in OGS, these events are repeated over years, and often escalated to absurd points over time (Bob Deis, the Krlich’s of Ohio) so much so that even beginning to describe these experiences, compounded by time, makes one sound crazy simply because of duration.Therapists and lawyers should note that the “onset” of the “symptoms” can be correlated to real life events, rather than as organic brain disease.
For the criminal defense attorney, the psychologist, or the therapist, it is crucial to view the patient/TI claimant/ actual victim through this lens of TBMC, and its effects over time. And ask yourself as a ‘rational’ or ‘reasonable’ person: How much of your personal information would you be able to hear repeated back to you before you exhibit signs of paranoia?
How many small camera’s left behind in your home can you tolerate? It only takes one for most people before they are spooked-but for TI’s it is often years of these occult activities, that are practiced in the ‘community policing’ schema’s across the western world. And, both incidents share features of known instances of gang stalking: Kantor is Jewish in a highly Christian part of America, and Tafara is a family health practitioner, and many abortion doctors as well as alternative medicine clinics are prime targets of documented group and gang stalking.

Gang Stalking and Fusion Center spying and artificial intelligence: yes, "they" ARE spying on you, in real time

Now that the slow roll-out of totalitarian domestic spying has occured (while you were sleeping, perhaps), we can look back at the many felony lies to Congress by NSA and CIA chiefs, and the local lies from Fusion Centers and the FBI and local police to see that, well, it was all lies (then take a look at how deep state players created a bomb hoax, and a designer bomber who allegedly targeted those exact CIA /FBI /SOROS funded senators and others who lied to Congress ).
And, Democracy was dead after that- those with power had, and do, and will continue to destroy our democracy-because they can, and because YOU are letting it happen.

Related Story: the Association of Threat Assessment Professionals (ATAP) calls police and private contractor sponsored organized gang stalking “colluding parallel investigations.” And many ATAP affiliated private contractors company names are, not surprisingly similar to the military acronym for psychological exploitation of targeted influence operations, aka PsyOps. use is closely associated with Fusion Centers, and a staggering amount of OGS complaints, and their crisis PR is what drives narrative in the press, and in police related public relations. . Americas 77 Fusion Centers are also very well disguised, each of them using different names, so that citizens cannot connect the dots.

Related Story: Washington State Fusion Center distributes bizarre “mind control ”documents to FOIA requestor, who asked for a different set of documents entirely 👽💩👻
From Techdirt.com, in April of 2013-two months BEFORE Edward Snowden:

You may recall that, last fall, a Congressional investigation completely slammed Homeland Security’s “Fusion Centers” — noting that despite DHS insisting that they were critical to “fighting terrorism,” the actual evidence showed that they had done nothing helpful in the fight against terrorism, but were instead chock full of wasteful (possibly fraudulent) spending… and with an added dose of civil liberties violations (just for fun).
“There’s misconceptions on what fusion centers are,” he says. “The misconceptions are that we are conducting spying operations on US citizens, which is of course not the fact. That is absolutely not what we do.” link

But what ARE Fusion centers- and what are they supposed to do? Nobody, anywhere seems to know, but those who have experienced various forms of “electronic harassment,” and strange internet shenanigans certainly know that these centers are doing something. Targeted individuals have been telling us for years, what we all now know.
From the ACLU: what Fusion Centers are supposed to be doing

UPDATE: Police, and Fusion Centers have begun waging media hoaxes attempting to discredit victims of illegal Fusion Center spying, and here we see an actual Fusion Center in Washington state distributing “junk information” to the press about mind control, and here we see local police and sheriffs deliberately waging a media hoax, claiming that a dangerous drug, fentanyl, was put onto fliers that were then placed on squad cars, right outside the police station.

Gang stalking and sex trafficking and moral panic industrial complex

Gang stalking and sex trafficking and prostitution abolitionists: “fighting” the worlds oldest profession is a multi-billion dollar industry- and OGS claims show up in many blogs and other media that also chronicle accusations of prostitution.
But the reality is this: most organizaions that claim to fight for the ‘women and children’ are themselves thinly veiled panderers that facilitate high level pedophile operations such as we see in the UK’s pedophile scandals, where cops, social workers, and others charged with the care of children are themselves profiteers and perverts.
And then, there is the curious case of Somaly Mam, a woman whose false narrative allowed government agents full access to children in Cambodia, Thailand and Laos.
Most human trafficking and sex trafficking narratives are so loaded with lies and disinformation that the entire narrative is flawed beyond reason and highly suspect. Like the narrative fictions that western society uses when it employs the scapegoating of pedophiles, prostitution has a longer history as a moral panic inducing scapegoat, as time after time, and century after century we see that prostitutes-for the most part- don’t want to be “saved.”
This link demonstrates one example of cyber staking by morality panic pandering abolitionists and profiteers. In this example, we see a notorious liar and fraud harassing and threatening actual sex workers online- but in interviews, I have confirmed that the harassment comes offline as well, and that sex workers are frequently monitored by local police and more:

Many of us sex worker rights activists have been well aware of the vicious lies told about us by an abolitionist calling herself “Stella Marr.”  She has bullied us and lied about us in numerous articles, forums and on her blogs.  There was nothing we could do about it because we did not know her real identity.  She felt free to spread her falsehoods anywhere and everywhere, knowing that there was nothing we could do as long as her cloak of anonymity protected her.
Now we know who she really is.  Someone who knows her well and obviously dislikes her enough to “out” her, has provided us with her true name and other very personal information.  When I sent a message to Stella’s Facebook page, letting her know that we know who she really is, she confirmed that it was her by responding with a very nasty message threatening action against me if I posted her real name.
It seems her whole story is a fraud, that she is not who she claims to be (in addition to her fake name), and that she was never the victim of pimps who trafficked her into prostitution.

Some speculate that these ‘save the sex slaves’ narratives are thinly veiled western propaganda delivery systems designed by some to cut into the lucrative sex trade in the thin disguise of ‘saving’ people, while others note that these morality campaigns are funded by international banking that use the dialectic of trafficking to get to the women who have social connections to underground capital; and seeks other ways to use people for profits. And it’s ‘for the children,’ of course.
And, like almost all OGS, there is an “influence operation” component as well as a religious component to it. Lastly, there is a well documented investigatory and police aspect of it as well.
Related: How lucrative is the “fighting sex trafficking” industry? Here is just one grant, for one year from Uncle Sam: 44 million dollars.  But the anti-prostitution lobbyists turn a multi-billion dollar international trick across the globe.
The federal government, and many so-called NGO’s* incentivize morality campaigns by first conflating human trafficking and labor trafficking with “sex trafficking.” Then, granting billions of dollars per year to people who claim they are “saving women and children” from prostitution, and there is a huge cottage industry of public relations crisis managers and spin doctors employed to craft messages that sex hurts all women and children, and that free agent sex workers, and gainfully employed prostitutes need saving.
Related: Getting Screwed- How governments, and anti-prostitution religionists, and  abolitionists seek to derive profit from the sex trade, and socially engineered morality crisis campaigns.
Related: Jasmin Abuslin, aka Celeste Guap was pimped and used by police from seven police departments in California, from a very early age. Her mother worked as a police dispatcher, and this is a common theme across America, as we see police heavily involved at all levels of narrative control of child prostitution.
*Non-Governmental Organizations are often financed by international financiers, governments, and intelligence agencies through black budgets to drive social policy across the globe, and domestically as well. A classic example of this type of agency blur is the vaccination program that targeted Osama bin Laden.

Organized gang stalking and pedophiles and sexual morality campaigns

Gang stalking and pedophiles and sex crime’s units and CPS child racketeering

UPDATE 11-11-2019: Western intelligence agencies are activelly using pornography and the associated “free pornography” websites to entrap, and blackmail website visitors.
Much of that takes place from Malaysia, Thailand, the Phillipines, etc., in what is called the “Asian Invasian.”
And, best of all, these scumbags entrap pornography viewers “for Jesus.” via NGOs like this.
Its CIA no matter how you splice it, dice it, or indulge in the “free pornography” psychological operation.

One of the odd paradoxes of our times is that of sexual morality campaigns cloaked in the language “its for the children”, which wages an outright dialectic deception; and then, the blatant social deviance of those who wage these culture wars.
As we see repeatedly in writings about OGS, the stigmatizing label of “pedophile” is one of the main features of OGS complaints.
And, we also see that the majority of children who are sexually abused or harmed, are harmed WHILE IN STATE FOSTER CARE. So, this is a major OGS theme, and we must look at the dialectical distortions of perps/targets from the linguistic standpoint of para-language, but also, auto antonymal meanings to pry meaning from the wider occluded dialectic.
Time and time again, we see that so-called child protective services are little more than child trafficking by another name. And certainly, the case of Andy Ostrowski in Pennsylvania demonstrates what happens to those who challenge the powerful pedophiles that “just love children” from within deep state cover. Each child put into the state system is incentived as an actual “resource” aka a “commodity or product” that can and is capitalized.
States have become to depend upon federal revenue which incentivized child slavery, and the associated “sex trafficking” that we see time and time again in these heinous state sponsored kidnappings:

Foster Children Bring in Great Profits to the State

At another point in the interview, Stefano relates how California benefits financially from having children in foster care. She states that adults who are incarcerated in the penal system on average cost the State about $48,000.00 per prisoner. For children taken in foster care, however, one child can bring in up to $1 million of revenue to the State. Children who need “extra care” are given many medical treatments, such as psychotropic drugs. (See: California’s Crisis: 1 Out of Every 4 Children in California’s Foster Care Prescribed Powerful Psychiatric Drugs)
Stefano gives one example she encountered where a Los Angeles judge sent one mom’s son to a “behavioral modification camp” because he was allegedly labeled “defiant.” He was given electro-shock treatments, and these treatments were billed to the mother at a cost of $7000.00 per week. Stefano stated that the mother is still making payments on these “treatments,” while her son is now 23, and she still has 10 years left on her payment plan. To this day she does not know where her child was sent for these “medical services.”

LA CPS Turning Foster Children Over to Known Sex Abuse Offenders

When Stone asked her who CPS was turning these children over to with such “gruesome” statistics, Stefano replied that what she discovered, and what the Los Angeles Times was kind enough to publish, was that 1000 “convicted sex offenders” had been given a “green light” by CPS to become “approved foster parents” just in Los Angeles County.

CPS Putting Children into Sex Trafficking is a Huge Problem

 
Mental health professionals, social workers, psychiatrists and criminal defense lawyers will note that police investigations by their nature are invasive and often, the investigators must reveal certain information to people who are being interviewed as witnesses, or as potential witnesses to alleged crimes.
But also, these same are complicit in it at every level as now, we see the weaponized investigation used as a tool of “high policing”.
The case of Michael Chadwick Fry of Texas is likely one such case, and there also, we see both extensive jailing of a man who is not guilty of crimes, as the state/county collects federal revenue, and no mechanism exists for victims of these state crimes to unburden themselves of state level predation.
Related Story: Two year old girl kidnapped, tortured, sold to pedophile ring, burned over 80% of her body-because CPS had a quota to fill, and the state wanted money.
And, the researcher of organized gang stalking will find that in nearly every single blog and accessory media that discusses OGS, the phrase “the gang stalkers will tell your neighbors you are a drug dealer, a prostitute, a pedophile,” etc. These are weaponized investigations, where police drag garbage out into the publucs eye about targets-and that stuff, drawn from theoretically protected databases of family courts, juvenile courts, domestic violence courts, or anywhere else that gray area slanders take place, without due process or trials.
Worse, these DHHS/DHS/DVIC whisper campaigns are designed to destroy individuals that LEO’s target for political reasons, and cannot prosecute them for crimes of any kind due to lack of evidence, or due to the fact that police themselves have flagrantly broken the law (the case of Florida state trooper Donna Watts illustrates such an example)cannot prosecute because the information they are investigating is the product of the vast illegal warrantless surveillance that all Americans are subjected to.
This is a major feature in the OGS dialectic, as we see hidden internet actors working to get kids away from parents, because this is what the states DO for revenue-each kidnapped kid is a cool million dollar federal funding trick, turned by state actors.
And, we see that in the case of the Beatrice Six, who spent decades in prison on false charges before they were exonerated official framing and slandeer was central to the narrative; and in the case of Rose McGowan who was stalked by Harvey Weinstein and former Israeli Mossad; and in the many cases online of OGS, ritual slander, and whisper campaigns are central to the “delusion” which is in fact-and practice- the main a feature of a social disease-and also, of the weaponized police“investigation.”
In fact, databases full of personal information are routinely violated across the board, in the absurd situation where our governments hack our social media, and then, leave it wide open on the web, as we saw with the recent NSA hacking programs that left citizens exposed to all kinds of harm; and routinely our data is left open to the public in situations like  the FBI flagrantly violating the constitutional protections of due process some 40,000 times between 9/11, 2001 and 2011 alone.
• Evidence of delays of 2.5 years, on average, between the occurrence of a violation and its eventual reporting to the Intelligence Oversight Board
• Reports of serious misconduct by FBI agents including lying in declarations to courts, using improper evidence to obtain grand jury subpoenas, and accessing password-protected files without a warrant
This practice of defamation begins in databases that are themselves political, and it is beyond due process, and against equal protection under the law, or even the presumption of innocence. And that is by design, as OGS is a form of ritual defamation, practiced by nearly all LEO’s and social services practitioners across the country, and those, affiliated with secret societies, masonic orders, and occult practice by definition of the occult, and, unsurprisingly, a large number of pedophiles work in policing and work with related “social service” industries.
Related Story: Minnesota Reporters stalked by AIPAC and hundreds of local LEO’s. What is a police state?
Worse, as pertains to the smears that affect a persons sexuality and can drive some to the point of madness (Omar Mateen, the Florida night club shooter was widely believed to have been smeared as a homosexual-and, the FBI and security firm G4S was in contact with him multiple times over a three year period, and as we see with the current “full spectrum dominance”he was likely privacy raped by numerous bad actors working in gray/black areas of his life) allows many sworn LEO’s and other social gatekeepers are themselves pedophiles and predators-child abusers and pimps:

Thursday, Jul 10, 2014 01:42 AM UTC
Virginia police have a warrant to take photos of a teenage boy’s erect penis
“We just take him down to the hospital, give him a shot and then take the pictures that we need,” an official said.
Law enforcement officials in Manassas, Va. have come up with a truly creative way to combat the dissemination of child pornography: create more child pornography for comparison! Their first subject could be 17-year-old Manassas
City resident Trey Simms, who faces two felony charges for allegedly sexting his 15-year-old girlfriend.
Prosecutors intend to prove Simms’s guilt by forcing him to provide police with photos of his erect penis, for which a judge actually granted a search warrant (!).
The only problem there is this little detail: the sex crimes officer in charge of this case was himself a pervert and a pedophile, who later killed himself when he was discovered:
A Virginia police officer whose job was to investigate online sex crimes against children committed suicide Tuesday
– moments before he was to be arrested for online sex crimes against children.
Manassas police officer David Edward Abbott, Jr. was the same cop who made  headlines last year when he tried to take photos of a 17-year-old boy’s erect penis for what he claimed was investigative purposes.
A year before that, he won an award for “integrity in investigative work.”
The detective was about to be arrested for having inappropriate relations with two boys, ages 11 and 13, when he killed himself.

And cops who are rapists, pedophiles, child pornographers and more are far more common than you might think-in fact, they are linked time and again to running prostitution rings, starting in the family courts and foster care factories of America, extending that reach well beyond adulthood.
And, judges are complicit so, these cops, social workers, and other “care”providers get sentenced far more leniently than any other pedophile.
Related Reading: Police, Prostitution, and Politics, by Norma Jean Almodovar.
Related Story: Florida cop/Cub scout leader busted after years of raping a little boy for years.
 
And: Some say that police badges actually incorporate the universal symbol of pedophilia and specifically those that advocate for “boy-rape” into their designs:
Police Badges: note the strange triangles
Police badges KLECK - 03_03_17 - B1
FBI bulletin warning about pedophiles
KLECK - 03_03_17 - B4

Organized gang stalking and pedophiles and moral panics

One of the main claims of those who have been gang stalked is that there is a whisper campaign waged behind their backs by law enforcement and others who put themselves in the position of  morality police while slobbering at the windowsills of the public in secret.
The worst of the slander is in-arguably that the people being harassed are “pedophiles” which means social death to anyone who the police label this way, as few things in western society are more deadly to a persons reputation. And, in gang stalking campaigns that are waged in secret, there is no secret that these stalkers are trying o cause targets to commit suicide.
Related: the mysterious death by “stabbing himself in the back and stomach” of John Lang, Fresno, CA anti-corruption activist.
This sort of slander is so powerful, that it guides western nations policy and politics and few labels are more indefensible or impossible to overcome. In sociology and psychology, labeling theory and policing are inseparable companions that stigmatize some, for the benefit of others-that at the intersection of society and the individual, a label is a powerful tool of conformity.
Here, at the link provided below,  Christopher Soghoian of the American Civil Liberties Union, and a TED talks senior fellow notes that some American’s, working in the Deep State, and with the assistance of compromised, blackmailed Congressional members are currently sacrificing your Constitutional liberties, and representative Democracy over their fears of nearly mythical, statistically nearly non-existent pedophiles*while bartering your privacy for their own financial freedom:
Soghoian link “Your Privacy, or else: PEDOPHILES!”: https://media.ccc.de/v/33c3-8136-stopping_law_enforcement_hacking/oembed

Chronic, pervasive, warrantless and total government surveillance: “This is just the beginning”
Privacy researcher Christopher Soghoian sees the landscape of government surveillance shifting beneath our feet, as an industry grows to support monitoring programs. Through private companies, he says, governments are buying technology with the capacity to break into computers, steal documents and monitor activity — without detection. This TED Fellow gives an unsettling look at what’s to come.

  • there is no doubt that pedophiles are, and should be a major concern for any parent, or any decent citizen. The problem is that well organized, and well hidden pedophiles currently control the narrative, as they all work in government, in police departments, and other positions like churches, the Boy Scouts, and the various Masonic and ‘community’ clubs that claim to work for boys and girls of America, where they have authority over children. And, these same organized networks of #goodguys are distributing child porn across the globe.
  • while there are some 700,000 people on sex offender registries across America, the vast majority of them are not pedophiles. In fact, few have ever had actual sexual contact with a  child. Most on the registries are on them for nefarious and irrational reasons.
  • The pedophile in western dialectic serves as a universal scapegoat, and so those who are actually raping and harming children are able to hide behind official titles, positions of power, and narratives that control the dialectic to the minutest levels of social discourse, even shunning, harassing and stalking those who attempt to wrest the false narrative from their grasp.
  • Interestingly, Dr. Lorraine Sheridan- who wrote the famously flawed study about gang stalking-apparently works with men in prison, and sex offenders.

Related: Many pedophiles work in policing and also act as gatekeepers for pedophile networks that operate from all of societies ‘social services’ networks, institutions such as medicine and schools, and child protective services such as CPS, and the subsidiary  ‘domestic violence’ industries that keep fathers out of the lives of the majority of children in low income homes.

What is the "Redirect Method" of targeting individuals? Organized stalking and artificial intelligence (AI)

What is the “Redirect Method” of targeting individuals? Targeted advertising, and targeted minds: mind control by any other name.

UPDATE 09-19-2019:Since I wrote this post a few years ago, it has since been revealed that political NGOs, and police /intellugence agencies and private contractors and specifically the Anti Defamation League has been using this Moonshot CVE method to perform non -consensual surveillance and targeted psychological operations on non -consenting subjects online. This redirection has also been linked to several mass shooters, and beyond simply reinforcing stereotypes of Jews as mind controlling Svengalis, that organization is purely toxic.

Moonshot CVE is designed to manipulate you, your choices, and your political beliefs.
Many online in the community of “targeted individuals” claim that they are subjected to mind control, which, in the day to day world, usually indicates mental illness to psychologists, social workers, and criminal defense attorneys who eventually encounter targeted individuals.These claims can seem outrageous or preposterous-after all-where is the mind control facility? Where is the mad doctor D.E. Cameron, and the electro-shocks and LSD with the CIA funding? And so on.
Those were the old days- now meet the new: artificial intelligence programmed to manipulate web search results targeting individuals thought processes, choices, and emotions via electronic and other methods.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.
-Edward Snowden, NSA whistle blower, on warrantless NSA harassment and targeting of individuals

Here, below, is a snapshot of a real, actual program that is in fact  a form of mind control, where a viewer is “redirected” from one area of interest into another, where those who seek to influence and control the individual then perform an influence operation on the subject-against the subjects “free will”,and without the subjects informed consent.
Here we see that the amorphous and ever changing definition of potential “terrorist” has been applied to 320,000 persons, who have been for whatever reason, arbitrarily labelled first according to their political beliefs as indicated by their internet searches, and then, as potential jihadists or right wing conservatives in America.
Their internet searches are then analyzed using an NSA-like keyword program (Google and the PRISM and XKEYSCORE programs are CIA funded, while startup commpany Moonshot CVE appears to be a British operation , screened with 1700 key words selectors and then redirected in their searches on the internet.
This redirection is without a warrant, and without the informed consent of the searcher. Or: a man-in-the-middle attack, targeting the ambiguity and definitional peculiarities of pure speech alone. And- it is designed to influence peoples actions remotely.
What is most striking is that many early caricatures of mind control from the early 21st century and onward,  utilized hypnosis, and mental influence via “suggestion” as a form of controlling the actions of individuals, and groups, even whole societies.
And here, we see that far beyond the caricature of a Svengali or a pulsing swirl of black and white imagery hypnotizing a subject, we have instead, Google-which collaborates with the CIA/NSA/FBI and all other intelligence agencies-acting as the arbiter and the impetus for guiding an individuals thoughts and actions through suggestion and algorithmic programming.
th(10) Photo: John Barrymore plays Svengali. Today, we see another ROGS thesis validated, as the,Anti Defamation League now deploys psychological operations on unsuspecting Google users who that organization has “othered.”

Not only does Google collaborate with these agencies, but in fact, it has worked specifically with NSA and others to develop programs of social control via search engine results, and more. So, here is one of the latest attempts to influence and alter the behaviors (behavior modification) of people who are targeted with these programs:
From the Intercept:
“A GOOGLE-INCUBATED PROGRAM that has been targeting potential ISIS members with deradicalizing content will soon be used to target violent right-wing extremists in North America, a designer of the program said at an event at the Brookings Institution on Wednesday.
Using research and targeted advertising, the initiative by London-based startup Moonshot CVE and Google’s Jigsaw technology incubator targets potentially violent Jihadis and directs them to a YouTube channel with videos that refute ISIS propaganda.
In the pilot program countering ISIS, the so-called Redirect Method  collected the metadata of 320,000 individuals over the course of eight weeks, using 1,700 keywords, and served them advertisements that led them to the videos. Collectively, the targets watched more than half a million minutes of videos.
The event at Brookings was primarily about the existing program aimed to undermine ISIS recruiting. “I think this is an extremely promising method,” said Richard Stengel, U.S. Undersecretary of State for public diplomacy and public affairs.
Ross Frenett, co-founder of Moonshot, said his company and Jigsaw are now working with funding from private groups, including the Gen Next Foundation, to target other violent extremists, including on the hard right.
“We are very conscious as our own organization and I know Jigsaw are that this [violent extremism] is not solely the problem of one particular group,” Frenett said.”
 
First, they came for the jihadi’s-then they came for the ‘bad ideas’ in peoples minds….then…?

 
This targeting has been going on for decades, specifically targets individuals and whoe classes of persoons, and as we see above in commercial use-these programs are policing  “thoughts” expressed online, and more.
Here, from the early days of Snowden’s leaks:
Glenn Greenwald, reporting for the Guardian, wrote:

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.
“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Gang stalking and retired law enforcement and LEIU's

Eleanor White is one of the few who have a internet presence documenting gang stalking, and also, one of the few who has revealed that retired law enforcement agents participate in or otherwise instigate gang stalking.

Update, March, 08,2020: Exactly as I describe in this post you are reading, several years after I wrote it, we see the MSM describing how a literal “gang” of retired cops, private detectives, profilers and more were active in stalking a grandfather, who they claimed was the legendary D.B. Cooper.
That stalking included directed conversations (false conversation designed to elicit prosecuteable testimony ), electronic surveillance (wiretaps, other gear like this here ), and teams of surveillance role players like these here.
Lastly, I have come to concur with the author of Fightgangstalking.com, that the character Eleanor White is an “online persona” or a fake internet character that any police or intel person can adopt as they stalk and harass people online and off, as we see in the United States Air Force OSI podcasts, and Youtube talk shows.

https://targetedindividualscanada.files.wordpress.com/2011/06/ti-canada-raven1-ontario-1.jpg
She is widely discussed in the online TI community, and has several websites that became inactive around 2011, just as myself and others began to document this “phenomenon.”
Ms. White claims she was smeared for decades in Canada as a pedophile. The pedophile smear is a well known tactic of gang stalkers, and lical pice departments, state police, etc. actively distribute child pornography; and the FBI and NGOs run black operations distributing it as well.
I personally find her work a bit questionable or suspect for two reasons, but not entirely invalid: 1) she is heavily engaged in the “DEW’s” side of the discussion, which largely discredits others in the OGS community that are reporting police abuses and corporate or institutional level harassment, and even repeating words and phrases and entire belief systems that are clearly the products of influence operations aka soft force mind control 2) she always uses the word “raven” in her work, and ravens are synonymous with signals intelligence community-one of the ways that operatives signal to each other online.

UPDATE 09/15/2019: the Intercept, which published Edward Snowdens revelations, has now covered how former NSA and intelligence agency people-just like Eleanor White-leave the NSA and then work in a variety of spying, and psychological/influence operations, spying on US citizens and others. In that case, female spies were targeting US citizenes from a secret base in the United Arab Emirates
Here is another piece, from the worldwide MSM feed,Reuters, documenting how a female spy left the NSA and then,“became the bad kind of spy”and spied on US citizens at the behest of a totalitarian foreign power.
Also see these posts about the woman who started the “incel movement,”which has been linked to mass shootings, and also how horse-faced lesbians, and female pundits like Dr. Tomo Shibata show up in many, many, many mass homicide related news coverage.
Lastly, note that one specific electronic weapon is named Raven, and it is a cell phone interception tool, aka a type of wiretapping device

You can find many examples online where blackbirds, ravens and more are used to signal, but especially note that in CIA funded domestic control and infiltration programs such as MHCHAOS*-which was operated by the Navy– of the 1960’s, where media mockingbirds and others literally mocked the “truth,” and as some online today, using backdoor access to Twitter’s firehose from the domestic spy and democracy subversion centers called “Fusion Centers”, all of which go by different names, and which make them harder to pin  down- just like a flock of crows itself; birds are indeed a theme in signals intelligence and elsewhere when OGS is mentioned. As such, “birds” are part of military jargon, and “argot” language and integral to OGS.
Related: The Society of Old Crows-retired military and LE signals intelligence uses the blackbird as its mascot.
You can contact them on Twitter @AOCrows if you have any doubt about blackbirds, ravens, swallows, or rats nibbling through the bottom planks of American Democracy
Assoc. of Old Crows
I am not saying that much or most of White’s work is not credible, but there are a few red flags for me, personally. Your interpretation might differ. And I am NOT saying that here experience is entirely poorly described either, as she ws one of those who frequently encouraged others, and also encouraged the use of common terms to describe the experiences of TI’s, most notably advising that the use of the agency created term “gang stalking” was itself a poor descriptor, and a way for those who have the power to manipulate others to force them to use their language via sheep dipping the individual complaint with a poorly chosen term.
It is now well known that retired cops, and other intelligence or investigative  agency old timers are involved in organized gang stalking, as they do the dirty work and act out revenge fantasies for active LEO’s on people who they target. Most cited is that fact that Law Enforcement Intelligence Units (LEIU’s) and Fusion Centers handle much of the high level targeting and especially the stalking, but also, that they utilize hidden resources, and exploit previous relationships in government and LE to break the law, and create cases.
And, whereas once their was doubt that America’s police and intelligence services are waging a domestic war of “us and them” on citizens outside the view of the courts and Congress, slowly we see that the law no longer applies to some, and that due process has been denied to ALL Americans in the NSA/FBI/CIA domestic spying pipeline that provable targets individuals, but also, flagrantly violates the rights of many in their quest to create a narrative.
Related Story: The Electronic Frontier Foundation documents 40,000 flagrant violations of due process by the FBI
So- partially to answer the recurring questions that many TI’s ask, such as  “where do the gang stalkers get the money to target me?” and “but who has the time to target me in such an elaborate scheme of violations?” the answers become more clear-there is no law and no oversight of the agencies that have effectively blackmailed Congress and the courts into submission.
Acting as agents of social control, and outside of the constitutional protections of due process, these cops work in ways that violate the letter and the spirit f the law as they harass, monitor, wiretap, or otherwise work outside of the courts and the law to enact petty revenge, intimidate, bully, or otherwise violate targeted individuals.
As awareness begins to mount on this topic, and many sane and reputable people such as whistle blowers and journalists report being targets of these hidden domestic campaigns, and as damage control has gone into high gear-the internet is becoming a target itself- a target of ‘revisionism’ that seeks to hide the few details that expose who the perpetrators actually are.
Eleanor White is widely said to be a leader of the OGS awareness movement. Although this author has no opinion one way or another on her credibility, I can say that she has at times brought interesting cockroaches out of their hidey holes-as the thin blue line sometimes cracks when she shows up on radio programs or online discussion boards.
Here below is an example of evidence that retired law enforcement agents participate in OGS, but also, as I document, how they are currently scrubbing the internet to hide this fact. And I will note, no other blogger or OGS reporter has documented either of these facts.
Swallows and Ravens: the language of Spies or the language of “people caught in an ideological echo chamber?”
Duckduckgo Search Terms: “Eleanor White had called in to the Richard Syrett show on Mojo Radio, 640 AM”
Original link: http://www.gangstalkingwiki.com/www.MultiStalkerVictims.org/default.htm
The following text was part of the material that I saved offline last year as I researched this topic:

“Eleanor White had called in to the Richard Syrett show on Mojo Radio, 640 AM, Toronto about organized stalking. A short while later, another caller called in to “explain” to me that what happens is that retired police officers sometimes “make life Hell” for selected people “until certain conditions are met.”
The examples the caller gave were deadbeat dads paying up their child support, or sex offenders moving away. Clearly, the original Ku Klux Klan setup has been extended to include many other “undesirables”.
“Prophetically, an acquaintance coolly said to me, a year after I left the lab, ‘You are in a police net you will never get out of … for the rest of your life.’ http://www.gangstalkingwiki.com/www.MultiStalkerVictims.org/default.htm

Screen captures that document the now-broken links to this web-page (just after I documented this elsewhere online). If one thing is highly targeted, it is the online comments and other “leaks” that reveal this aspect of OGS:
Retired cops gang stalking child support and sex offenders
Note the two classes of persons above who retired law enforcement officers (who took an oath to uphold our Constitution) and others working with them target for harassment “child support debtors and sex offenders.” First they came for the—-.
Now, one piece of evidence is interesting, but other blogs and media formats also document these situations as well, and especially noteworthy are the cases of Jeff Pataky, a blogger who wrote “Bad Phoenix Cops,” or Bob Deis the former Stockton city manager who was gang stalked by the police union, and former marine John Lang, who was found dead in his burning home as firefighters parked blocks away.
The web is full of disinformation, paranoia and other classic official source gas-lighting but the video’s and testimony of  John Lang, a father, a marine, and a police corruption whistle blower, captured some of the most credible video on the web of what these intimidation campaigns look like[link here]. He claims also that the local PD was constantly trying to “pedofy” him just as White claims she was pedofied (this is also a word from the LE jargon).
Here, below is one random comment that also documents this common perception that certain classes of people are targeted outside the law by those who feel they are  above the law-that they have somehow earned the ‘right’ to harass others. Most notably- the  classes of individuals who can be “targeted and harassed” has bloomed from child support owing fathers and sex offenders to seven categories of citizens who are targeted.
First, they came for——–, and I said nothing, because I wasn’t a ——–. Then, the category bloomed to seven other classes of people….(see footnote below)

1)child support and unscrupulous collectors, 2)domestic violence anything, 3)people who except plea bargins and “deals,”or suspended sentences instead of saying “not guilty,” 4) any call to 911, 5) insufficient representation by an inadequate attorney who fails to inform you of all the possible consequences and side effects of anything short of not guilty, trial by jury and acquittal/dismissal, 6)any sex offender accusation (even public urination) or worse, 7) beating the police at their own game or having them think you’ve gotten away with something are all good points from which to start when looking for answers

George T Boneyard
I tried to track down the person who commented on that forum but could not find the ‘nym’ “George T. Boneyard” anywhere else on the internet except one web forum similar to Ebay that sells goods. The answer that Boneyard gave, however, encapsulates in a paragraph what can be found in many other blogs and forums online.
And, without irony, I note that this comment appeared on Techdirt.com, which is both an excellent website, but also, one of the very few that has ever attempted to shine light on OGS. The article was covering how an accidental click on a weblink brought a person into the wonderful world of hidden and secret, pervasive and horrific investigation and harassment.
And that man, Jeffrey Kantor, was one of the very few who have ever attempted to document this “phenomenon” of police, fire, security industry, and military OGS.
From the article (but follow the link-it is an excellent read):

“In October of 2009, Kantor used the search engine Google to try to find, ‘How do I build a radio-controlled airplane,'” he states in his complaint. “He ran this search a couple weeks before the birthday of his son with the thought of building one together as a birthday present. After typing, ‘how do I build a radio controlled’, Google auto-completed his search to, ‘how do I build a radio controlled bomb.'”

From that point on, Kantor alleges coworkers, supervisors and government investigators all began “group stalking” him. Investigators used the good cop/bad cop approach, with the “bad cop” allegedly deploying anti-Semitic remarks frequently. In addition, his coworkers at Appian (a government contractor) would make remarks about regular people committing murder-suicides (whenever Kantor expressed anger) or how normal people just dropped dead of hypertension (whenever Kantor remained calm while being harassed).
Kantor also claims he was intensely surveilled by the government from that point forward.

He claims government officials monitored his book purchases and home computer, and implied that everything he did was being monitored…
Kantor [also] claims the stalking spilled over into his personal life when the government secretly attached a GPS antenna to his car to track him.

Kantor alleges this harassment continued long after he lost his job at Appian (who he’s currently suing as well). The claims of stalking, harassment and surveillance fill a great deal of the 33-page filing. His suit also claims that personal information obtained through “FISA warrants” was routinely used against him (and repeated back to him) by a number of people — the so-called “group stalking” or “gang stalking.”
Most importantly, Kantor’s lawsuit came at a time BEFORE we knew with certainty that Fusion Centers are actively disrupting our communications; and just around the time when Edward Snowden revealed this Democracy destroying plot by the deep state.
So, a therapist, psychologist, or other care provider, legal counsel, or judge or jury member should be instructed that such appearances of mental illness that indict the nebulous “the government” is in fact a much wider, much better organized entrapment and harassment scheme.
———————————————————————————————–
*While the 1960’s might well have defeated the sex biased military draft, where Dr. Moss David Posner became a target, those efforts did not defeat the full militarization of democratic processes, or the total takeover of the individual citizens right to dissent. In fact today what we see as “targeted individuals” are in fact an extenuation of the CIA’s “executive assassination” programs that were hinted at by Seymour Hersh, but instead, they target activists and potential influencers of public discourse, such as an avowed targeted individual, Gavin Long aka Cosmo Setepenra, and the Ferguson MO activists who continue to be found shot dead in burning cars in mysterious “suicides.”
MHCHAOS was the program where the CIA had fully inserted itself into American domestic policy and democratic processes, participating in the subversion of American Constitutional rights of due process, and violating it’s charter. Common leaflet printers and major activists were targeted and all military agencies began the wok together on American soil, against democracy. Most are familiar with the FBI’s COINTELPRO, but few are aware that the US has not been an actual democracy since this era.

Operation MH/CHAOS was the code name for a domestic espionage project conducted by the Central Intelligence Agency in the late1960s and early 1970s. Operation MH/CHAOS was the code name for a domestic espionage project conducted by the Central Intelligence Agency in the late1960s and early 1970s. MH/CHAOS: The CIA’s Campaign Against the Radical New Left and the Black Panthers is an insider’s account of the CIA’s Counterintelligence Staff’s Special Operations Group first charged by Presidents Lyndon Johnson and later by Richard Nixon to find foreign intelligence, terrorist, organizations or government contacts, controlling or influencing Anti-Vietnam War activists or American black extremists protesting, bombing and carrying out other anti-government, unlawful or illegal activities in the United States. The operation was launched under Director of Central Intelligence Richard Helms, by chief of counter-intelligence, James Jesus Angleton, and headed by Richard Ober. The program’s goal was to unmask possible foreign influences on the student antiwar movement. The “MH” designation signified that the program had a worldwide area of operations.”

Without irony, this author notes that the NSA/CIA/DHS/FBI and 13 other agencies are currently combing through the data of ALL American citizens alike, looking for evidence of crimes or blackmail material that can be leveraged against votes, and more, in an operation that makes the CIA’s 1960’s social experiment look like a gnat compared to today’s dying Athena.
Footnote: I spoke on te phone with a single mother of two grown children the other day, 08-16-2017. She is a homeowner who had applied for SSI, and who had been gang stalked for years by her block captains in a slander campaign in Coon Rapids, MN.
Her harassment included claims that she was “crazy” and “violent” and more, frequently after cmplaining about her neighbors loud parties;  and false arrests and eventually a fifty year restraining order-but no criminal conviction. As such, we see the new targets have bloomed to eight, as single mothers were once inviolable bastions of American virtue.
The couple who acted as block captains in the fashion of Stalin’s Russia, Hitler’s Germany, or Mao’s China, who I shall not yet name, harassed her for years with noise and more, and exacerbated her community to the point where she was demonized, and police encouraged repeated calls to her home.
Without irony, the couple who moved in next door to her has now moved out, and also, divorced or separated. She however, still has the 50 year restraining order, despite never having laid a hand on anyone.
 

Disinformation, misinformation, and military PSYops: cooption of narrative and damage control in the gang stalking community

Disinformation, misinformation, and military PSYops: cooption of narrative and damage control in the gang stalking community
As I have discussed elsewhere, in the summer of 2016, the military and intelligence services were in overdrive, trying to discredit those who claim that they are targeted individuals.These attempts to discredit the people who have experienced gang stalking ranged from the now infamous New York Times hit piece to brand new “news sources”
that purported to have the inside scoop on OGS.
Perhaps the best example of this is a bog that appeared just before the summer of 2016, and a writer calling themselves “Xkeyscore.” This author was one of the first to realize that actual proof of OGS was being divulged daily by victims and targeted individuals, and they wrote some of the best articles ever published on the web about OGS, covering wide ranging topics beyond OGS, the author broke new ground by avoiding the pitfalls of the old discrediting narratives by avoiding the obvious discrediting language of DEW’s, UFO’s, microchips, and microwaves inserted into every dialogue.
However, in all information and influence operations, the work is flawed in the way that alll propaganda is flawed: i revealed only what had been known already by others, while also subtly undermining the claims of TI’s by attempting to discredit Edward Snowden, or by using well known and oft repeated mockery of the main claims of TI’s such as using the phrase “people of such high moral caracter,” or writing articles that on one hand contained complete facts, such as that the FBI is running Operation Pedophile to ruin reputations of activists and others, or that the internet is itself a form of human experimentation and so on due to AI and massive databases like all Palantir projects, with predictive technology and counter-narrative functions.
But what marks this writing as almost definitely false is the timing and the predictable politics revealed in the writing: the operation began, and ended on intellihub between March and June of 2016-the same month that other operations went into full effect, and just before President Obama officially sanctioned propaganda operations and behavior modification targeting American citizens.
“So what is one of the FBI’s primary operational tools to Deny, Deceive, Disrupt, Degrade, and inevitably Destroy the targeted individual?. Well who are the targets one might logically ask next?If one looks at potential threats through the eyes of the federal government, they will soon discover that NRA members, returning veterans, activists, whistle-blowers, watch-dog bloggers, and investigative journalists are lumped in with the likes of al Qaeda and ISIS operatives. In many cases these “domestic threats” are considered to be more of a risk than actual terrorists.
Why one may ask?
Well, because there are tens of thousands more innocent Americans than there are real terrorists, it keeps federal budgets plump and fluffy, whilst simultaneously allowing for asset seizure under (false) premises. Additionally, it appears as though Americans with a strong moral compass are a threat to the status quo, to the corrupt power structure.”
Read more here:
https://www.intellihub.com/opinion/xkeyscoresblog/
https://www.intellihub.com/snowden-acknowledge-targeted-americans-kill-list/
https://www.intellihub.com/covert-stalking-america-national-security-racketeering-network-exposed/
https://www.intellihub.com/the-deep-state-gang-stalking-and-zersetzung/
https://www.intellihub.com/fbi-and-nsa-outsource-their-harassment-of-targeted-individuals-and-watchlisted-
individuals-to-private-firms/
Purported Bio:
The author of this article, who prefers to use the nom de plume “XKeyscore” in order to maintain his anonymity, is
a Doctoral Candidate and multiglot with two Master’s Degrees and a Baccalaureate specializing in Middle Eastern Studies. He holds one Master’s Degree specializing in Intelligence and Counter-intelligence operations, and a second Master’s Degree in Security Studies. XKeyscore has studied under a United States intelligence agency analyst
and now-retired, high ranking, American military officers. XKeyscore writes exclusively for Intellihub News & Politics.

Homeless and gang stalking: a major theme has an articulated cause-police corruption and real estate

Gang stalking and real estate and police corruption
One of the interesting things about what is often referred to online as “organized gang stalking” is that there are frequent references to both real estate and the fact that the “gang stalkers” will try to make you lose your house, or cause you to rent property to criminals, and thus, force an asset forfeiture, or other default. That essentially, the ‘perps’ will make you homeless.
Homelessness is a major theme in most if not all gang stalking narratives that discuss OGS, as  even  the  notorious  disinformation outlet Vice magazine has  noted via  its article in  its technology section called-unironically  in  the  DVIC  era- Motherboard.
That  article,  titled  The  Nightmarish  World  of  Gang Stalking served  as  well-timed  discrediting of  OGS  victims  at  the height  of a presidential  election  year, and  ran  at  the  same  time-during the  summer,  when  Dr.  Lorraine  Sheridans  comments  were  noted  by  now  discredited Mike McPhate, and  around the same  time as  Dr.  Mike  Woods  commentary as well.
And  so, unsurprisingly,  that  Motherboard  article started by  saying  that  in  the  “nightmarish world ” of  gang  stalking,  everything  seems  connected,  which is  probably  a  “delusion,”aka  apophenia (see  here,  and here  as  well.)
 
Oh,  those  “media  coincidences”sure  are  interesting  from  a  scientific  analasis  of  propaganda, and  linguistic,  dialectic  standpoint,  arent they?
In one of the most famous cases of gang stalking on the internet, Stockton, CA city manager Bob Deis literally had the police union buy the house next to him from where they waged a war of attrition, in a gang stalking event covered in major media, because Deis sought to save the citizens some money by trimming some fat from the now-bankrupt city. He later retired in crisis mode, and the city of Stockton was bankrupted by the harassment tactic, and like many of these cases, it also involved the fire department.
The situation went beyond stressful, or even rational, and bordered on the sociopathic and the illegal, and the Press Democrat reported that upon his retirement. he stated that “I’ve been operating in crisis mode for three years,” he said. “I can’t do that forever.
According to the Press Democrat, not only was Deis bullied and abused for trying to do the right thing, but “his tenure may have covered the city’s rockiest and most contentious time of its 163-year history. He came on amid a pitched battle over a ballot measure that gave the City Council more control over the fire union contract.”
A city council woman noted also that Deis and others were victimized, noting “You…. have had to go through things here in Stockton that are so far beyond what could normally be expected,” Miller said. “It hasn’t been fair a lot of times. It’s been outrageous at times.”
And also, as with the case of the Rick and Cindy Krlich of Ohio, where we see that today, they are suing the fire chief and the local police who waged a ten year long campaign of harassment whereby these city actors honked their horns in front of the Krlich’s house, sometimes one hundred times per day (TEN YEARS).
Here below is a snapshot of some more police corruption that employs not only ‘gang stalking’ tactics, but particularly ‘organized’ crime stalking to gain unethical advantage and real estate by essentially putting the squeeze on mobsters, or by doing business with them in shady transactions. The story below is some excellent reporting by Bob Lewis of WNYC news:

https://www.wnyc.org/story/politicians-loan-shark-and-piles-money-one-top-nypd-cops-tangled-web/
A Missing Loan Shark, Some Politicians, and Piles of Money: One Top NYPD Cop’s Tangled Web
In April 2010, Vincent “Jimmy” Durso — a devoted family man and small-time loan shark — dropped off his wife’s home health aide in the Morrisania neighborhood of the Bronx. Four days later, police found Durso’s black Honda Accord parked on a shaded street a dozen blocks away near Crotona Park.
He was never heard from again.
For his family, it was a tragedy; his daughter hired a private investigator and even a psychic to help find him. For detectives it was a mystery: Was it the result of dementia, or a worse fate for a man who kept $30,000 cash in a jacket?
But for one top NYPD cop, it was a business opportunity. Assistant Chief Edward Delatorre Jr. bought two of Durso’s investment properties from the man’s grieving daughter at a below market price — while detectives were still investigating the disappearance.
No one involved in the Durso sale would talk to WNYC, so there’s no way to determine how Chief Delatorre came to buy the property. At best it was simply the case of a broker bringing the Durso’s together with Delatorre and his wife, who is herself a licensed broker.
At worst?
“Is he capitalizing on knowledge of the value or undervalue of such a property that he was able to come in with insider knowledge and profit as a result of the man’s death?” said Dick Dadey, executive director of good government group Citizens Union. “That’s an egregious conflict of interest.”
WNYC reviewed six years’ worth of financial disclosure forms for more than 200 high-ranking NYPD officials who had to file such information with the city’s Conflicts of Interest Board.  About three dozen reported outside income. Dozens more are wealthy investors.
For more on cops cashing in on illicit opportunities, check out the series “NYPD Inc.”
http://www.wnyc.org/series/nypd-inc

CIA and internet backbone surveillance and InfraGard: there is no window between the average American and intelligence agents anymore

Cisco Internet Backbone and CIA, human experimentation, Moonshot CVE, Google Jigsaw
Psychology is struggling to control the narrative of organized gang stalking, and doing a really bad job of it, because some of their favored labels for political dissidents and whistle blowers are being exposed as little more than political smears masked with official diagnostic criterion. And of course, in a the ends justify the means” world, the “state purpose” of fighting boogiemen is tantamount to rational basis social controls, which is why the NSA/CIA/FBI manipulation of the internet backbone is cancer to Democracy.
Paranoia, schizophrenia, delusions that people are being persecuted, followed, or harassed- all of this and more is happening all across America today, as the thousands of miles, and the improbabilities and the impossibilities of actual contact between the average citizen and intelligence officers and agents are no longer impossibilities at all: they are a daily fact of life for every citizen, as Google, Facebook, Snapchat or Twitter have put all of us one click away from these agents every single day.
So, whereas once psychologists could keep institutional and social control of the narratives of “mentally ill” people who claim that the “CIA is spying on me,” or that the “FBI is out to get me,” and other such claims, and psychologists have long ignored these claims as delusions, it is no longer the case that prospective patients are wrong in any sense, because, all of our communications are intercepted, and our lives monitored via our cell phones, Facebook-which has admitted to actual chemically based mind control, aka manipulating dopamine levels in the brain of non-consenting children and adults-to the NSA-FiveEyes(FVEY)-Israel data theft and sifting operation that is in play 24/7.
It forms a de facto and pre-emptive prior restraint of any individuals private thought processes, intentions, and.free will any time they are online.
And, curiously, this is against the US and British constitions- but ALSO many international laws and treaties~and ironically also against the UN charter, and the Universal Declaration of Human Rights!
Previous to the era of the internet, it was nearly un-imaginable that the average person would come into contact with a CIA case officer, FBI handler, NSA agent, or rings of unethical Israeli spies and unregistered foreign agents , or other intelligence agency operators. Today, these same are compiling dossiere’s and databases full of profiles about every one of us, as secret, hidden operators monitor our social media, cell phones, and emails in real time, we  are as close as a click on Facebook, or a phone call to a foreigner. And, our childrens bath tub photos are now accessible to InfraGard, an a host of international players, including Saudi Arabia.
Compounding that, is the fact that these agents have eradicated the barriers between civilian and agency boundaries, as they float in and out of the government, to the corporate sector; in and out of one top-secret clearance and into cold-blooded capitalism the next,  and back again.
This “high policing” aka political policing, aka organized stalking is now a nation wide infection.
So, the next time a patient or a ‘delusional’ or ‘psychotic’ individual tells you that there is a spook on their internet backbone, listen a little bit more, because, well, there is in fact a spook network spread across every connection, at every minute, and a ratio of one security industrial complex worker, police and surveillance role player to every 30 civilians in Amerca alone.
Here- from Forbes magazine, meet Chris Burgess, one of the many spooks on my Cisco router:

Cisco Internet Backbone and CIA https://www.forbes.com/sites/realspin/2012/10/12/what-do-former-cia-spies-do-when-they-quit-the-spy-game/#2df634382374
Chris Burgess, now COO and CSO of Atigeo, a Bellevue, Washington firm focused on mining Big Data. The second was Ren Stelloh, who until July 2012 was CEO
After retiring with 30+ years of service from the Agency, I spent several years as adviser to Cisco System’s Chief Security Officer, and I found Cisco was doing great work; they’re one of the backbones of the internet. The more info you can provide to the more people, the better people can see and understand what was obscured
Now I’m COO and CSO of Atigeo and we’re a compassionate technology company. We want to provide the tools to mine big data, as that is unquestionably the major resource of this century

 

NCIS, US Navy, targeted individuals and surveillance of Americans: criminal defense lawyers and gang stalking

It is no longer a secret that the United States military, and its various intelligence collectors are targeting Americans. Criminal defense lawyers should be especially keen to note that the ACLU has been fighting a case since 2014, where a Navy NCIS officer was wiretapping American citizens internet connections.
From the Electronic Frontier Foundation:

Military investigators with the Naval Criminal Investigative Service (“NCIS”) launched an investigation into online criminal activity by anyone in the state of Washington without limiting their search to military personnel or computers.

And from the ACLU:
In United States v. Dreyer, a Naval Criminal Investigative Service (NCIS) officer stationed in Georgia believed he was entitled to conduct Internet surveillance of any computer within a specific jurisdiction and did not have to limit his monitoring to U.S. military or government computers or personnel. While monitoring computers in the state of Washington, he identified an IP address sharing child pornography, determined the IP address belonged to Dreyer, and passed that information along to local police who arrested Dreyer.

The problem? Dreyer, like most residents of Washington, was a civilian and had no connection to the military. The Posse Comitatus Act (PCA), a federal statute enacted in 1876, prohibits the military from investigating civilians and otherwise participating in civilian law enforcement activities.
In the district court, Dreyer unsuccessfully challenged the NCIS surveillance as a violation of the PCA, but a three-judge panel of the Ninth Circuit reversed. Noting this wasn’t the first time the NCIS had engaged in this sort of activity, the appellate court found the surveillance “extraordinary” and in clear violation of the PCA. Most importantly, the panel found that the evidence NCIS obtained should be suppressed. This is the first time a federal court has suppressed evidence obtained in violation of the PCA (a few state courts have suppressed PCA violations). The government asked the court to rehear the case but abandoned any argument that there was a PCA violation. Instead, the government merely urged the court to reconsider its decision to suppress the evidence. The Ninth Circuit agreed to reconsider, deciding to have the case argued again before an 11-judge en banc panel.

OSI informers and Air Force and gang stalking: it's a real operation

OSI informers and gang stalking and USAF

UPDATE: This post gets almost as many hits per day as the post about CIA/FBI/etc recruitment of Mormons. Apparently, those who stalk “We the People,” are very interested when they get outed as “real.” How nice it feels to track, trap and trace the people who are doing that to “We the People.” Ahhh. Mm–Mmmm good.
The third/fourth most popular posts here are about equal as per the feminist gang stalkers for Domestic Violence Industrial Complex dollars, and the internet “study” by Dr. Lorraine Sheridan and the farce that is Fusion Center subversion of all of our privacy/due process at the switch.
To any civil attorney or criminal defense lawyer, psychologist, or other researcher of Organized Gang Stalking looking in, this is verifiable prima facie evidence that speech is targeted at the site of the speaker, and thereafter.

Targeted individuals and those who seek to debunk “perps” often and frequently claim that one online group, OSInformers, is a disinformation outfit composed of perps who stalk targeted individuals. Also, the claim is that these perps are very well funded, and that mass shooters are often connected to them, or that this is a psychological operation.
And, those who claim this would be right, and the claim has scientific merit, because, in fact, the United States Air Force has a program full of informants called-unsurprisingly- OSI Informant Program. Of the many hits that are generated by this search term below, there are slickly produced video’s, and thousands of comments, but especially, and nefariously, are the Talkshoe podcasts where targeted individuals are mocked, derided, and humiliated. And all of this, because the various U.S. military services are in fact, spying on Americans.
From the ACLU, a case in the courts exposes civilians to un-warranted, non-incidental surveillance-what other programs might they be running off-shore?
Google Search: OSI informers-About 101,000 results
https://www.facebook.com/OrganizedStalkingInformers

 
OSI and gang stalking
https://en.wikipedia.org/wiki/United_States_Air_Force_Office_of_Special_Investigations#Air_Force_Informant_Program
Air Force Informant Program
AFOSI’s Cornerstone is to vigorously solve crime; protect secrets; warn of threats; exploit intelligence opportunities; operate in cyber.[5] AFOSI investigates a wide variety of serious offenses – espionage, terrorism, crimes against property, violence against people, larceny, computer hacking, acquisition fraud, drug use and distribution, financial misdeeds, military desertion, corruption of the contracting process, and any other illegal activity that undermines the mission of the U.S. Air Force or the Department of Defense.
In December 2013, The Colorado Springs Gazette[10] reported that the OSI was operating a Confidential Informant Program at the Air Force Academy which recruited cadets to gather information about other rule breakers and criminals. The program left the recruits to take responsibility for both the initial incident that got them into trouble and any subsequent rule-breaking behavior resulting from the directions of OSI agents. One of the cadets who participated said “…it was effective. We got 15 convictions of drugs, two convictions of sexual assault. We were making a difference. It was motivating, especially with the sexual assaults. You could see the victims have a sense of peace.”[11]
In response, The Air Force Academy Superintendent will now have oversight of the program at the Academy. Though she will be aware of the operations, the Office of Special Investigations will still have command and control of the program.[12]

Wiretap and gang stalking and paranoia: the internet as a tool of investigation, and spreading paranoia

Wiretap and gang stalking and paranoia and psychology
There is ample evidence that agents and agencies, and institutional psychopaths and others are using the internet to actually cause paranoia, and spread fear. Don’t believe me? Just ask ‘the internet:’

Google search: How do I find out if I am under investigation?
Answer: This question makes me think the asker is paranoid because they did something wrong or paranoid because they have some type of mental illness.  Neither are good and you should either 1. stop doing something wrong or 2. seek medical help.”
Answered by:Robert Anspaugh, worked at Federal Bureau of Investigation
https://www.quora.com/How-do-I-find-out-if-I-am-under-investigation

Surveillance, intrusion, violation, and privacy rape are all major themes of gang stalking stories. Whether it is complaints of being wiretapped, or a feeling of being followed, and harassed secretly it is empirically documented in blog after blog that paranoia is a major theme. In the example above, this is what I call “webterrogation,” where the internet is used by many people as an investigative tool, or just as a tool whereby they can abuse their power.
And while the internet can be a valuable investigative tool whereby cold cases are solved by web forums like Websleuths, it is also a tool whereby LEO’s use and misuse databases and InfraGard to settle scores, harass, and unethically interrogate people.
It is the duty of criminal defense lawyers, psychologists and others to represent the best interests of their clients, and in cases where wiretaps are claimed, we must expand our paradigm beyond the quaint “pen register” of the 1970’s, and understand that the internet, cell phones, databases, and everything that interacts with them forms a total surveillance tool, much less the thousands of hidden programs that run on it.
While today’s victim of gang stalking has the advantage of being able to point to specific government programs and tactics that were hidden in the era before Edward Snowden, every narrative of the past must be viewed in light of few facts: that, in fact, any American that uses a phone are ALL wiretapped on some level, and, some are specifically targeted for NSA extra-judicial surveillance, even if we don’t call it a wiretap.
As revealed in the scandal with President Trump stating that “Obama wiretapped my phone,” and the ensuing nit-picking in the partisan media of the factual basis of “what is a wiretap, exactly?”- there is no longer any doubt that Trump Tower was in fact wiretapped, that his associates were in fact under surveillance, and that the “deep state” did it. And no rational person-no psychologist or criminal defense lawyer, or other interpreter or trier of facts could state that wiretap abuse is not rampant , and in  fact, the new normal in America’s nascent police state.
Here, below from Techdirt.com is a story about a prosecutor who not only used wiretap orders to target enemies, but also- hundreds of times- simply forged a judges signature to do so. Ridiculous, abusive, and illegal-sure. But she, like most corrupt prosecutors, will likely get a slap on the wrist, as this form of prosecutorial misconduct is seldom discovered, and nearly never punished.
This case is the exception, not the rule, though in light of the Snowden leaks and others, abuse can be presumed in most post-Snowden cases; and this one only got noticed because of the massive scale of her operation:

More Prosecutors Abusing Their Access And Power To Illegally Eavesdrop On Conversations
from the give-’em-enough-leash dept
Last time we checked in with (former) Brooklyn prosecutor Tara Lenich, she was facing state charges for abusing wiretap warrants to listen in on conversations between a police detective and one of her colleagues. This stemmed from what was termed a “personal entanglement” between her and the detective.
The wiretap warrants couldn’t be obtained without a judge’s signature. Since there was no probable cause for the warrant, no judge would sign them. Lenich had a solution. She just forged the judge’s signature on the warrant. And then she kept forging judges’ signatures, stretching out her illicit surveillance for more than a year, with a faked signature on every 30-day renewal.
Lenich is now facing federal charges. An indictment handed down by DOJ pretty much repeats the allegation of the state charges, detailing Lenich’s long-running, extremely-personal wiretap operation.
Related Story: Kansas prosecutors illegally monitored over 700 attorney’s conversations with clients, destroying attorney client privilege.
http://www.thedailybeast.com/articles/2017/03/27/700-attorneys-spied-on-in-one-prison-investigator-finds.html?via=desktop&source=twitter

Separating gang stalking claims from electronic weapons harassment reporting: a necessary step to understanding the dialectic, and reports of mind control.

The single most prominent feature of the research that exists in regards to organized gang stalking is that those who claim to be researching it seldom if ever actually speak to those who claim they are targeted.  Let that sink in a bit….
But in the world famous internet pol/study/junk science by Dr.s Lorraine Sheridan and David V.James, they didnt interview a single person in person.
And, as you might expect, predominantly white, middle aged females were the respondents, much like other online hoaxes, and frauds such as Morgellons disease, or sex work abolitionists and prudes pulling the number 13 outof the DVIC/UN Transatlantic Crime/fakerape/NGO money pot.
Then, have a look at a study that concludes that targeted individuals are dangerous co-opters and interlopers on the supremacy of the psychological narrative of the DSM-V:

Diagnosis of Delusions on the Internet:

Bell V, Maiden C, Munoz-Solomando A, Reddy V. (2006) ‘Mind control’ experiences on the internet: implications for the psychiatric diagnosis of delusions.

While this disconnect between psychologists and those they seek to diagnose anonymously is a feature in every study on the subject thus far, it is also clear that there is evidence of a vast, well funded network of intelligence agents and agencies that on one hand, literally target individuals (most notoriously the UK’s “dirty tricks” division, JTRIG), with influence operations, and then, seeks to discredit targeted individuals, it is crucial to psychologists and criminal defense lawyers, as well as social workers and others in the healing professions to understand that no all victims claim that they are harassed with electronic weapons, and that not all those who report electronic harassment, noise campaigns, or other modern media deployments aimed at destroying them or their privacy are delusional.
But in the extant research on this topic, we see that few-if any- of those who have weighed in to this dialectic are willing, or able to separate the many cases of law enforcement, or DHS, or FBI harassment from the intelligence cults, or religious harassment that some targeted individuals endure.

Related Story and UPDATE 10-16-2019: Since I wrote this piece that you are reading, the Anti Defamation League (a race-based organization which is most known for defaming individuals)has confessed that they are using military derived psychological operations online, and targeting non-consenting subjects with actual military PsyOps, and some of THOSE victims of these hidden online operations are now linked to many mass shootings.
In other words, online psycholigical operations,are literally linked both correlated with, and linked to the direct CAUSATION of mass shootings.

In that light, I suggest that it is mportant when encountering these individual victims that any psychologist, or criminal defense lawyer who represents targeted individuals examine the basis of the claims, and look carefully for signs of actual harassment early in the encounter. Also, be aware that the discrediting narrative is very well financed (the DHS and intelligence agency budget was 71 billion in 2016), and that many NSA whistle blowers, actual victims of abuse by police and fire departments, and others report similar symptoms, and similar experiences as targeted individuals.
Here below is one of the few studies online that attempts to understand the ‘phenomenon’ from a perspective of the DSM-V criterion, where we bump into a similar situation as was apparent at the height of the Nixon years, where the horrific illegality and  lawlessness of the CIA’s mind control cover-ups, worked hand in hand with FBI COINTELPRO and a know-nothing MSM to obfuscate actual insight into the scope of these problems-annd the easiest solution was to blame the victims, or in the case of Bell, Ready, and Munoz Solomando, paint them as deviant co-opters of technology:

It is particularly noteworthy that a potentially disabled and disenfranchised group have co-opted available technology
-Bell V, Maiden C, Munoz-Solomando A, Reddy V. (2006)

This is literally the Martha Mitchell effect in action, and in practice as psychologists seek now, as they did then, to discredit actual victims, and squash them into a pill box. While there is little to no doubt that psychopaths, psychotics and delusionals and others are involved in the community (notoriously, the leaders of the so-called TI support group FFCHS has been implicated in 3 mass shooter events), there is also a much larger portion of this community that is “under the influence” of something, and that something has a name: influence operations working with Crisis PR agents and psychology to lend authority to an otherwise debunked narrative.

‘Mind control’ experiences on the internet: Implications for the psychiatric diagnosis of delusions
Abstract
Diagnosis of Delusions on the Internet:

Bell V, Maiden C, Munoz-Solomando A, Reddy V. (2006) ‘Mind control’ experiences on the
internet: implications for the psychiatric diagnosis of delusions.
Psychopathology
, 39(2), 87-91.
Background:
The DSM criteria for a delusion indicate that it should not include any beliefs held by
a person’s ‘culture or subculture’. The internet has many examples of people reporting ‘mind control experiences’ (MCEs) on self-published web pages, many of which suggest a community based around such beliefs and experiences. It was hypothesised that some of these reports are likely to reflect delusional beliefs and the hyperlinks between web reports were likely to show evidence of social structure, demonstrating the ‘culture or subculture’ exemption to be increasingly redundant in light of new technology.
Sampling and Methods:
Texts from web sites reporting MCEs (n = 10), experience of cancer (n =
10), depression (n = 10) and being stalked (n = 10) were identified, and were blind-rated by three independent psychiatrists for the presence of delusions. Hyperlinks from web sites reporting MCEs were used to create a network structure; this was compared with a size-matched, randomly generated network and known social networks from the literature using social network analysis.
Conclusions:
The sampled web-published accounts of MCEs are highly likely to be influenced by
delusional beliefs. Social network analysis suggests there is significant evidence of an online community based around these beliefs. The fact that individuals can form a community based on the content of a potentially delusional belief present a paradox for the DSM diagnostic criteria for a delusion, and suggests the need to revise and revisit the original operational definition in the light of these new technological developments.
It is particularly noteworthy that a potentially disabled and disenfranchised group have co-opted available technology to create a complex, dynamic and information-rich community that serves to support and inform similarly-affected people within the confines of a world view driven by potentially psychotic symptoms. This is a striking example of a support network completely removed from the traditional medico-legal support networks of the state and even the grassroots support networks run by mental health services user groups. In particular it demonstrates that the internet may enable complex support mechanisms without reference to a view of reality held by the authorities or even the mainstream of opinion. Whether this sort of support network works well for all, if any individuals, remains to be seen.
In conclusion, the presence of a complex and evolving online community based around the content of potentially psychotic experience challenges mainstream psychiatric understanding and diagnostic criteria for how a delusion is defined. This paper also presents the first application of internet-based social network analysis to clinical research, which the authors hope will be a useful tool in furthering medical research.
zz