Manufacturing terrorism suspects, fake web pages, and informants using lots of rope in darkness: modern lynching online and CVE programs

Whether the target is a Muslim, a Mormon cattle rancher, a black activist, or a poor white kid like William Atchison who get stalked online and then offline by agents provocateurs, aka DHS/FBI/DIA/private contractor/NGO/foreign spy outfit unspecified, informants, a few patterns stand out in the data:
UNDERCOVER FBI AGENTS SWARM THE INTERNET SEEKING CONTACT WITH “TERRORISTS”who they then profile via behavioral analysts, psycholigical operations, and then endlessly monitor their speech online and off, in concert with HUNDREDS of agencies, and using NSA data.
The FBI’s online activities are so pervasive that the bureau sometimes finds itself investigating its own people.

Almost all targets of provocation are male.
All targets of provocations are ensnared online, and followed, monitored and more offline for using words~aka pure first amendment protected speech~sometimes for decades since the NSA dumped hay all over needles in a theretofore previously non-existent “haystack.”
All targets of provocateurs have long term contact with people working under the counter-terrorism rubtrik, or so calked community policing, who seek to INFLUENCE the speaker, from hidden or occulted positions online and off (for instance, social workers, college, or DV type “counselors” target and track individuals, usi.g multiple databases, and share information about their targets with police)
All targets of these hidden programs are manipulated in “directed conversations”which is well documented in the online TI community,and this unrecorded anywhere.
All targets are manipulated, and frequently their most base impulses to food, clothing and shelter~indeed, their base drives, what Freud called libido~are used as tools to manipulate them, and much more, as we saw with the Tsaernev family being targeted for a decade BEFORE the Boston bombing, as well as in the cases of the Seattle Somalis employment and travel being stifled by federal agents, hearsay, and policy (not law.)
In any study of what is colloquially called mind control, and stemming from Nazi/US/British styled torture, or the well documented MKULTRA and its companions Monarch, Bluebird, Phoenix, Gladio-all of these used base drives as ways to manipulate subjects and targets.
And, all base drives, stationed a man, or a woman in the middle to impede or encourage the target toward one or another behavioral goal. So, any study of targeted individuals must account for ling term state/federal ibstruction of base drives, and achievements.
Related Story: Niftygerbil, Niftychinchilla, and other Nifty names for Tor nodes, courtesy of the same geniuses who gave the world Monarch and Bluebird.
So, we see now, the entire organized gang stalking dialectic mirrors the ACTUAL complaints of targeted individuals. Refer to the ROGS BINGO card at the top of this blog for comparison.
So, OGS is far from a delusional complaint, and rather,indicative of manufactured terrorisms un Constitutional basis, and the occulted use of informants whose work in online terror/criminal/other incitement is undocumented by design-a totally unchecked use of actual psychological operations-agents provocateurs actions are not on the record, or in courtroom documents either.
So, in the very least, these online influence and psyops using unchecked, unregulated, hidden, occulted and obscured methods, repeated over time, do indeed form, as the good doctor Lorraine Sheridan has noted~a closed echo chamber, echo chamber, where words themselves are the primary targets, as are the individuals who use the words- they are literally under close monitoring every time a banned word hits Google/Wordpress/Twitter, etc.
Here from NBC News is a story about how the FBI uses informants online and on social media in occulted fashion to police pure speech, and then, to target individuals:
https://www.nbcnews.com/storyline/isis-terror/no-lol-matter-fbi-trolls-social-media-would-be-jihadis-n226841s
And here is a bit more about that from the Intercepts Cora Courier in 2017: ghttps://theintercept.com/2017/01/31/undercover-fbi-agents-swarm-the-internet-seeking-contact-with-terrorists/
“”According to the guie, an online counterterrorism investigation can target websites or online networks that the FBI believes terrorists are using “to encourage and recruit members” or to spread propaganda. Such probes may extend to the administrators or creators of those forums, as well as people engaged in “the development of communications security practices” or “acting as ‘virtual couriers’ for terrorist organizations by passing online messages among members or leadership.”
The guide classes as online investigations those that rely primarily on online informants or undercover employees, and those that involve surveilling internet facilities or foreign websites hosted on U.S. servers. The FBI often runs such operations jointly with other U.S. intelligence agencies or “international partners,” according to the document.
Since 2008, the Counterterrorism Division has coordinated these operations under a program called the Net Talon National Initiative. Net Talon uses informants, linguists, and FBI employees working undercover, posing as ordinary internet users, to zero in on terrorists’ use of the internet, according to the guide. The initiative was meant to centralize expertise on particular targets and platforms, to “address intelligence gaps,” and to create a clearinghouse of the intelligence the bureau has collected on terrorists’ use of the internet.
The FBI’s online activities are apparently pervasive and uncoordinated enough to lead to confusion. The document refers to “resources being wasted by investigating or collecting on FBI online identities,” including undercover employees, informants, or people who have already been investigated by other offices or agencies. An FBI official told the Intercept, “You would be in a forum, and you’re like, ‘This person’s way out there,’ and we’ve gone and opened up a case, and sometimes that was a local police department, or a friendly foreign service. There are still instances of that, and deconfliction is still necessary.”
Khurrum Wahid and Joshua Dratel, defense attorneys for Ahmed Omar Abu Ali, answer questions from the media after Abu Ali was sentenced on March 29, 2006, at a federal court in Alexandria, Va. Photo: Alex Wong/Getty Images
THE COUNTERTERRORISM POLICY GUIDE shows just how much flexibility informants and undercover agents have when operating online, even when they’re not working specific targets. The FBI insists that there is nothing to see here: In statements provided to The Intercept, the FBI said that “while there are obvious differences between online and offline environments,” FBI employees and informants working on the internet are subject to the same rules, and that bureau employees can only monitor people’s online activity as part of an authorized investigation.
The guide, however, suggests that the internet offers areas of ambiguity. Much comes down to the questions of what informants can do, as opposed to FBI employees, and whether the goal of an operation should be construed as seeking to obtain specific intelligence, simply watching public websites, or developing a profile for an undercover identity.
For instance, the guide states that an FBI employee can visit a message forum or blog only when the site is relevant to an investigation. An FBI employee, according to the guide, could be an undercover agent or an “online covert employee,” a term that presumably refers to FBI workers other than agents, like analysts. FBI employees can’t chat online with someone who isn’t already the subject of an investigation for the purposes of gathering intelligence on that person. They can, however, “engage in unlimited communication with associates” of a person under investigation, if the conversations are relevant to the investigation.
Informants and undercover FBI employees are also allowed to do a great deal online in the name of “building bona fides,” such as creating fake identities or making themselves appear to be normal commenters on online fora. The guide says that in order to establish credibility, FBI employees “may make postings and communicate with individuals who are neither the subjects nor the associates of subjects … there is no limitation with respect to the amount of communication [they] may initiate in this regard.”
And the FBI is allowed to open new investigations on people it identifies through “passive monitoring or active communication” on websites.
An FBI spokesperson clarified that in order for an undercover or covert employee to monitor a website or forum, the site must already be associated with an investigation, “either because the forum was known to be used by a subject [of an investigation], or because the subjects are there. I can’t be in the forum trying to bait you into conversation.”
However, the FBI acknowledges that when its employees participate in online fora, they interact with people who may be bystanders to whatever activity led the bureau there in the first place. And that is not accidental. “We want to know if the subject has other people who are joining in, which people are part of the activity, and who is just there,” a spokesperson explained.
In other words, FBI agents can post and chat online with people who have nothing to do with an investigation, so long as they aren’t collecting intelligence — but in the course of those online communications, they can decide to start investigating someone.
Michael German, a former FBI agent who is now with the Brennan Center for Justice at New York University Law School, said that agents have always had a little bit of wiggle room in this regard. They can have a certain number of in-person meetings with someone, or in some circumstances go to public meetings or public websites, without identifying themselves as part of the FBI. This helps agents avoid a bureaucratic mess when carrying out a simple “buy and bust” drug sting, for example, German said.
But the ability to conduct unlimited online conversations in the name of building bona fides gives agents “a pretty long rope,” German said.
Criminal defense attorney Khurrum Wahid, who has handled or been an adviser on many national security cases, notes that FBI employees or informants frequently pose as experts offering guidance to lost individuals.
“These uninformed young people go online and become almost smitten with people who show a level of knowledge, who often turn out to be informants or undercovers,” said Wahid.
Informants operate under looser rules than FBI personnel. They are allowed unlimited engagement with a target in the course of an “assessment,” a preliminary investigation that can be opened on a loose tip of suspicious behavior, in order to collect general intelligence on a subject, or to evaluate a potential new informant. Assessments were created as a category in 2008. German finds their allowance for the expansive use of informants problematic.
“What we’ve seen in sting operations is that there is this shady portion before the official operation begins which often involves the informant,” said German. “And then it’s passed off to an agent, and it looks like they are ready to commit a crime pretty quickly.”
Wahid noted that at least in online cases, there are generally logs of all the conversations between suspect and informant, whereas “when it’s a live informant, they can turn off the recorder and we never know what it was all about.”
The use of informants in counterterrorism sting operations has expanded since the 9/11 attacks, when the FBI adopted the mantra that its job is to stop terror attacks before they occur, not just investigate them afterward. The government argues that the anonymity the internet affords to suspects necessitates an aggressive approach, including stings. The FBI’s national security director told the New York Times this summer that “using undercover agents online allowed the FBI to ‘flesh out’ suspects by gaining their trust and persuading them to disclose their real identities.” In some cases, the FBI even created fake webpages in order to draw in suspects.
“Agencies are under a lot of pressure to find a needle in a haystack, something that has haunted us since the beginning of the war on terror,” said Karen Greenberg, director of the Center on National Security at Fordham Law School. “It’s true that the internet has changed everything about how we communicate, but are we just going to be trawling online forever? It turns the principles of criminal investigation on their head.””

WA Fusion Center, limited hangouts, disinformatio, misinformation, mind control documents.

Mr X:
The WA state Fusion Center mind control docs are what is called a limited hangout in intelligence circles. The LH is designed to taint a dialogue, or misguide you, but in themselves reveal the cavalier attitude of these domestic spies.
The images widely circulated from raven1.net are among many that were used by one Eleanor White, a self described whistle blower.
She reigned as the go to disinformation specialist about a topic called gang stalking, between 2001- and 2011. White claimed that she was slandered as a pedophile everywhere she went, but in reality, was likely part of the pre-Fusion center deep state, a likely courier for illegally intercepted communications, and the defamation campaigs that followed.
These materials are used to discredit people who psychologists then label as delusional. But as we see, they also nearly and completely describe how the NSA trickles data to state and federal agencies, who then use Fusion Centers, so called community policing elements, and more to monitor activists and dissidents, via real time cell phone tracking, computers, ALPRs, BOLOs, and more, frequently utilizing plainly bizarre methods.
I also wish to inform you that I have been tracked since 2001, by many agencies across America, for many reasons not least of which is that [REDACTED] also wrote the Lewinsky defense, and represented Cheney during the Scooter Libby, Valerie Plame affair; And, a few other things.
I appreciate [REDACTED] FOIA release from the Fusion Center, but also wish to inform you that there are other questions to ask in these cases, because those documents are designed to discredit any who take them too seriously.
The good news is that the real questions that should be asked are easy, once you know where to look.
For instance~regardless of your political stance on gun control~ask about Fusion Centers monitoring activists, and people in alternative media, or even Facebook.
So, black activists, and mass shooters are a great place to start with mind control. Fusion Centers monitor these guys relentlessly, and mercilessly, via phone, computer, ALPRs, and BOLOs.
To understand the mind part, separate it from the control part, outside of due process, and constituting what could arguably be called unusual punishments.
Then, understand it like this: the FVEY nations
cooperate to target and harass each others activists. A great example is a boy named William Atchison, who shot two kids in a NM school, and who was killed by SWAT.
In his case, he was contacted online by British intel, who waged Gamergate across the globe, and also on American citizens, outside the law, and likely in violation of international treaties.
Then, they passed the “anonymous” tip to FBI, who then waged community policing on the boy.
FBI contacted the kid~who never owned a gun in his life~and then FBI CVE kicked in, meaning the kid was frequently followed online and off, by any of many domestic spy/intel/Rotary clubbers/VFW members/etc organizations attempting to “conform him” and these take on plainly bizarre online and offline stalking proportions.
Only after this, did the boy buy a gun, and this we see in case after case after case. Then, the boy goes ballistic, after being isolated and terrorized by literal hidden and actual armies of psychological operations specialists, for WORDS he expressed online.
So, in that one case alone, you can find evidence that what I say above is true, if you learn to ask the right questions.
How many calls went to which Fusion Centers, about What, When, and Why about this one boy, william Atchison. Were ALPRs reporting his license plate every time he drove, and were satellites literally tracking and recording his every move? Which police departments/school officers pinged his computer or cell phone~or did bad stuff like redirect his internet switch?
Did his computer have electronic implants, aka, coded applications that did/do as yet described things/wiretapped/ monitored and utilized key stroke logging?
Etc.
But taken as a whole, the boy was without a doubt, surrounded by influencers, and others who aided, coerced, and manipulated his choices from his first contact online with British intel, who flagged him during Gamergate.
First, they came for the kid online who said bad words (and those words decided by religious theocrats, and others)~then, they came for the mass shooter after they, working internationally, from sectarian religious basis, occulted pisitions along the internet backbone, and in violation of due process, civil rights, and treaties, bullied him mercillessly, via electronic platforms online, commmunity policing offline, and CVE provocateurs.
I hope this can help point you in the right direction.
I can be contacted here, if you wish more details.
Best Regards,
ROGS (my obvious nym)

Washington State, mind control documents, Fusion Center spying, police state bloggers, and GOD BLESS TECHDIRT.COM

DHS Fusion Center Gets Request For Documents On Extremists, Decides To Hand Over Mind Control Docs Instead
from the here’s-the-thing-you-didn’t-ask-for-but-will-probably-enjoy-reading dept

What  is  24-7 monitoring  of targeted  activists,  dissidents,  journalists, and  other  targeted individuals? Fusion Center  spying, the bizarre  quasi-Constitutional DHS/ICE/HSI  methods of secret policing, and the  NSA-Israel-FVEY data  theft  is de facto total  spectrum monitoring and  psycholigical  operations, aka mind  control,  by any  other name.

By  Tim  Cushing, of  Techdirt.com
Once you release a document to a public records requesters, it’s a public record, whether you meant to release it or not. The person handling FOIA requests for the Washington State Fusion Center (a DHS/local law enforcement collaboration known more for its failures than successes) sent Curtis Waltman something unexpected back in April. Waltman asked the Fusion Center for records pertaining to Antifa and white supremacy groups. He did get those records. But he also got something titled “EM effects on human body.zip.”
Instead of intel and assessments on local Antifa/white supremacists, Waltman found things like this:
And this:
The files did not appear to have been generated by any government agency, but rather collected from other sources who thought there might be some way the government could control minds using electronic stimulation or “remote brain mapping.” Why the Fusion Center had them on hand remains a mystery, as does their attachment to a FOIA request containing nothing about electronic mind manipulation.
This inadvertent disclosure has led to more requests for the same documents. Only this time, requesters — like Joshua Eaton of ThinkProgress — are asking specifically for government mind control files.
It appears the Fusion Center first thought about withholding some mind control docs, but somewhere along the line decided it couldn’t pretend the documents that weren’t supposed to be released hadn’t actually been released.
An email chain in the release [PDF] to Eaton contains an apology from the staffer who accidentally sent Waltman the mind control files.
Good afternoon Gretchen,
First of all I want to apologize the same way I apologize with my supervisor Lt Boyle and [redacted] I do not like to give excuses but I really sent this without intention when it was not responsive. I sent the original email to [redacted] with the attachments. I will try not make more mistakes…. Now, because of my error MuckRock sent another PDR. Sorry again for the situation and have great afternoon…
Gretchen (the Public Records Officer for the Washington State Police) tells the staffer not to worry about it. Apparently, sending the wrong files to requesters happens frequently, but otherwise, everyone is doing a great job, including the person who sent mind control files with a batch of extremist docs.
But that apology and forgiveness is preceded by the same staffer asking for another review of documents she already released to another requester, possibly in hopes of denying this release.
Erik,
[redacted] told me if you could review this. Mudrock is claiming that DHS did created this. I think I was not supposed to release this but it was public.
Can you help me what can I tell my Public Disclosure coordinator?
Sorry for the inconvenience
No response from Erik is included in the document so one assumes the release went ahead without his additional input. Now this requester has a copy of this email chain, something pulled from an internet “mind control forum,” and, inexplicably, the KKK documents released to Waltman in response to his FOIA request.
So, if you’re looking to obtain public records but don’t particularly care what records you receive, it appears the Washington State Fusion Center is a great place to try your luck.

The Cult of Bill W.'s AA revisited: gang stalking and the policing of anonymity as the National Sherrifs Association polices privacy.

AA,NA, GANG STALKING, AND THE HIDDEN HAND OF THE HIGHER POWER:YOU ARE NOT ANONYMOUS IN AA, OR ANY OTHER RECOVERY INDUSTRY CULT because the National Sheriffs Association and local LEOs, working under due process defying community policing schemes are always there to stalk you, or someone you know in “recovery.”
Bill W. aka Bill Wilson was both a proponent of LSD use, and documented as having occulted ties to both hidden western religion (occult ) and CIA programs of social control.

Read: AA and the occult and also this from the Guardian UK, about Bill W. and the well documented CIA LSD program

Follow this link to watch online terror stalking as they target several individuals.

POLICE USE AA AND NA, etc. MEETINGS TO GATHER EVIDENCE, OR WAGE PSYCHOLOGICAL COERCION, OR INTERROGATION ON TARGETED INDIVIDUALS WHO CANNOT OR WILL NOT BE CONFORMED/COERCED INTO THE JEWISH-CHRISTIAN NARRATOLOGY OF SUBMISSION TO HIDDEN BAD ACTORS AND OCCULTISTS, AKA “HIGHER POWERS”which most frequently are church and police affilliated Masonic lodges, such as Freemasons, Rotary Clubs, Lions Clubs, etc., all of which have been.implicated with solid evidence to “organized gang stalking. ”
Worse, judges, prosecutors, social workers and psychologists are indeed complicit in it, frequently deriving income and other sicial benefits from denying that gang stalking is, “real.”
Then, the multi -billiin dollar cottage industry of “recovery programs” work directly with those denialists, FREQUENTLY REQUIRING AA/NA/SA/ETC AA, as a term and condition of a persons freedom,  as a range of other “healthcare providers” derive billions too.

MANY ORGANIZED STALKINGS BEGIN WITH OCCULTED POLICE INVESTIGATIVE PRIVILEGE/SLANDER CAMPAIGNS, AND THE JUDICIAL, INSTITUTIONAL BLUR BETWEEN RIGHTS AND LAWS OF DUE PROCESS AND RIGHTS TO ANONYMITY, AND THE PSEUDO-THERAPY, PSEUDO -PSYCHOLOGY OF AA.

Related Reading: Mental health, mediated by those who cause law and due process defying disruptions in individuals lives. It cannot be forgotten that when.a, “gang of police ” murdered Ahmaud Arbery, the conservative Jewish -christian smear machine cranked up slanders in the press about his “mental health ”

How western police uphold the Jewish christian (and now, Islamic) mythology of God, G_d, Gawd, THE LAWD /LORD/Allah  and its variants of submission to hidden superstition oriented narrative of mental health, and victims of the hidden hand of gas lighting and privacy invasion by policing mechanisms that defy law and order.
Here is the National Sherrifs statement on mental health, via Policemag online:
http://www.policemag.com/channel/patrol/articles/2007/06/mentally-ill-subjects.aspx
OGS is widely recognized as having only two categories of discourse: OGS victims, and OGS denialists. It is striking to note that of these two binary groups, all OGS denialists are, in some way, direct beneficiaries of the DVIC money pot, while OGS victims are NOT beneficiaries of the DVIC money pot.
The researcher of OGS can easily find empirical evidence of this claim anywhere and everywhere onlune, or, just read through ROGS here, where you will find this scientific, falsifiable proof of OGS.
Then, we also see that Alcoholics Anonymous-like Scientology-sprang up just after the Federal Reserve displaced rural Americans, and eugenically targeted their families, during the 1930’s, and the Great Depression.
Related Story: AA Mobbing is “Bill W. on acid~ literally. Here is Bill W. droping CIA supplied acid, in the era of Frank Olson, who met his fateful end after “falling” from the 13th floor of a hotel, while doped up on acid, as a CIA handler sat next to him.”
Today, many sane people, and those who use reason to solve social problems, are calling these industries what they are: out dated models of cult/sectarian control of our society by the usual suspects.
And, extra points in your ROGS Bingo card for noticing that all of the mobbing, directed conversations, and other bizarre, repeated activity by police, occulted in gang stalking roles strangely mirrors the exact activities used in psychic driving.
Look around ROGS here for evidence that this is so, and also, that therapists all deny that gang stalking is real.

Blogger robboy39 said…
recovery is riddled with National sheriff association members as well as national citizens patrol association they are orginized and when they get your number due to step work or what not conversations you may have, they will turn your life inside out. The gassilghting is illegal and they ignor this it is wide spread. yes they will follow you in to all aspects of your life and reack havock by recurting persons to harass the target anyway possible. the first Narcotics Anonymous was held in a police station owned building this was not a mistake law enforcement has been stalking persons who attend these meetinsg for years.
Old timers as well as newcomers the opertives are diverse by design to build friendships and trust to intrap the target then in a moments time they orginize the group against a single person. i am a victom i am looking to build repor with other victims Robboy39 youtube.
9:36 AM
Blogger robboy39 said…
national citizens police academy alumni association and national sheriffs association lookthen up they are evil. they have harassed me for 4 years. they have broken many laws and need to be held accountable for thier actions……

….follow the links and connect the dots© in your own case!
AND:How deeply are OGS denialists involved in downplaying Bill Ws dabbling with CIA drugs and cult control?
Ask the addictionologists! (addictionology is a pseudo-science similar to ponerology,the study of human evil, lol.) This is how far Jewish-christians will go to mask their occulted religion in secular society.

Electronic implants, Wikileaks Vault 8, victims of organized gang stalking, hive mind, and honeypits.

ROGS loves the Constitutional guarantees of due process, and ROGS loves America. I am pathetic that way~the grand American delusion is so appealing.
(Vault 8 is an inside joke.)
BUT: The DVIC is actually a war on speakers and words, and without a doubt, the first amendment itself is the target of neocon and tribal, religious interests, now interfacing with the massive influx of Saudi, and other nations cash flows, and the media narrative.
I have been gang stalked since the DVIC was birthed into our lives in 1993 ( the exact same year when the Anti Defamation League was outed as a domestic spy ring that sold out American activists) and became severely gang stalked after I broke a nation wide story in 2003-4 about how America’s agencies manufacture terrorists by occluding access to civil rights and due process.
To journalists, researchers, and others interested in answering the many questions that are presented in the “bizarre” online dialectic of gang stalking, here below is how the CIA (and every other IC agency, private contractor, and the FBI) uses the term “electronic implants,” which describes covert hacking techniques, and plausible deniability in exploitation of targeted computers, targeted computer networks, and targeted individuals.
Without a single doubt, this is empirical evidence of CIA/other IC/NGOs operations on US soil, and anywhere else where OGS is taking place.
And it single handedly validates the inherent mission creep of the WOT redirecting and exploiting domestic targets.

UPDATE 10-19-2019: Almost two years after I wrote this post, and became active online, the ADL implicated itself as actually deploying military psychological operations on target individuals, using artificial intelligence software called Moonshot CVE, which had previously been used in theaters of war; and, perpetuating negative stereotypes of Jewish people as mind controlling Svengalis.

1570435771780
Electronic implants and gang stalking, courtesy of Wikileaks, and Julian Assange, who is literally being isolated, and denied visitation from other people as I write this. And, the American/FVEY deep state has worked tirelessly to force Ecaudor to revoke his asylum.
Isolation, you will recall, is ALSO a major threat/complaint/”delusion” of targeted individuals.


RELATED STORY
:I wrote about the HIVE in coded language long before this story below became mainstream news. The reader can infer that writing openly about such things is dangerous, and also, ROGS personal writing style is somewhat coded for reasons I have explained elsewhere.

The Hive mind in the gang stalkung dialectic online, from Wikileaks.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.
…………..
And-I hope the dood doctors like David V. James, and Lorraine Sheridan-and certainly Dr. Mike Wood, dont get to caught up in the echo chamber as wasps and bees of all kinds swarm them for commentary in these matters.
But OGS is very real, and puts MHCHAOS and MKULTRA to shame.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

Threats of homelessness, child sexual abuse and trafficking, CPS, and DVIC profiteering: Americas child traffickers ARE the good guys in high heels.

The keen ROGS reader might have noticed that my own case of OGS began when I met a victim of child trafficking named “Piper” who was a literal and figurative nightmare. I  mentioned  her in Just for “Lucie,” aka “Miranda.
Her father, a disgraced county sherrif in a north midwestern state, had fallen from grace because his adopted daughter claimed he abused her. She  was  at one  time  a  child  prostitute, pulling  dollars  in Hollywood,  and truck  stops  around  the country.
And,  Las  Vegas,  too, where  the wolf  at  the  door is  often those  guys  in  the  pretty  yellow  shirts who uphold  a  systemic  form of institutional  bullying  called  organized  gang  stalking, but  who  couldnt  get  laid  at  a  donkey  dick  show  in  Mexico.
Piper  told  me  once: I  dont  know  how they  do it,  but  everywhere  I  go, there  is this  gang that always  knows  where  Im  at,  and  what  I do…
And  NONE  of  that  stopped  her  from  turning  tricks  across  the country,  or “saved”her.
As a 12 year  old, Piper  became  a  whore,  though her  family  history  indicates  more,  starting  much  earlier,  every  time her mother  put  “medicine”on her  privates,  for  what  she,  and her  sisters  all  agreed  “seemed  to  last  for  a  long  time.” Her  mother,  quite  interedtingly,  was  a  Basque….
Well,  in  those  days, the  DVIC  was so  busy hand crafting  and building  boogiemen,  that  they  -somehow-overlooked  female  pedophiles  and child  abusers, like  The  Hart  Family,  who  drove  there  six foster care financed  kids  off  of a  cliff a  month  ago  in  California. They  were  snout  deep  in  federal  funds  that  incentivize  medical kidnappings,  and states  get  a  one  million  dollar  payout,  every  time  a  kid  is taken  into  “care.”
Well, anyways,  this is  what  OGS  is. The  gift  of  white  slavery,  from  which  all  states  derive  income,  and  cops,  social  worker,  Big  Pharma psychologists all  suck  the  teats  of  children  who are ensnared  in  these  systems. And  white  in  this  case  means  all kids  regardless  of race  taken  into  that  system,  whereas  the  term  itself  comes  from  an  era when  specifically  Jewish  pimps used  speciffically  white European  girls  this  way.
And all of that has taken place from the founding years of the Domestic Violence Industrial Complex, and VAWA, from the 1980s forward,  until  todays  modern  secret  police and surveillance  state.
I had no idea at the time that white slavery existed, because then, the news and documentaries all talked about the horrors of black slavery,  as  the racist ADL  spied  on  activists,  and  true  to their  roots  as  Eastern  Bloc slavers  and  pimps,  sold  every  social  cause  to  the  cops, in  hidden dossiers  that in  and  of  themselves  crushed  real  dissent.

We see time and time again that America’s actual child trafficking takes place from behind the judges bench,or from the officers squad car, as these shuffle children around the states, into and out of group homes,foster care, and un-neccessary mental health “care providers.” This  is  what  the  DVIC  is.
But it isn’t just me saying that now…..
Texas Foster Care: “Rape, Abuse, Psychotropic Medication, and Instability” Still the Norm as State Fights Against Reform
 
The battle continues between the State of Texas and attorneys who represent more than 12,000 children in the state’s foster care system. A panel of three judges in the Fifth Circuit Court of Appeals in New Orleans heard arguments Monday, April 30, about the constitutionality of the state’s troubled foster care system. This is the latest chapter in a fight to change the system in which, according to U.S. District Judge Janis Graham Jack, “… children have been shuttled throughout a system where rape, abuse, psychotropic medication, and instability are the norm.” After Judge Jack ruled in December 2015 that the system as it stood was unconstitutional, Texas Attorney General Kenneth Paxton appealed the decision, defending the state’s foster care system. Many of the original plaintiffs in the lawsuit, who were formerly foster care children, have now become adults and aged out of the system and are missing. The San Antonio Express ran a story looking into what has happened to these Texas foster children who aged out of the system, and they found that most of them suffer unemployment, homelessness, and sex trafficking as adults.

The un-naming of a man: Gang stalking, bizarre claims, chemicals, poisons, delusions, and the DHS- man dies, first responders sickened from chemical poisoning in DeKalb County Georgia GA motel room.

As  we  see  time  and  time  again, gang  stalking victims frequently  report bizarre encounters with people  online  and  off  who  threaten  them  with poisons,  chemicals,  and  fear  or  anxiety about being  murdered by  gang  stalkers.

UPDATE 11-07-2019:This post you are reading is very popular lately, after James Douglass Lark apparently blew himself up last week , while under FBI and GBI surveillance in Dekalb County Georgia, under mysterious -even bizarre circumstances.
ROGS suspects that this was a K 4 rated gang stalking gone bad (or good, considering that the goal of police /FBI/ intel agency stalking is to force a person into an institution, prison, or to commit suicide, which is what Lark apparently did, for some reason )
UPDATE: The un-named man has now been named.He was Frances Wilkes, 47, of Stone Mountain Georgia.
BODY IDENTIFIED IN HOTEL ROOM THAT SICKENED THREE DEKALB OFFICERS
The cause of death for Frances Wilkes has not been released.

Related  Story: Yeah- silence THIS: how internet forum boards are attacked by gang stalking denialists, and not  so subtle  threats of  being  poisoned. This is one  example  from  my  own,  PERSONALIZED,  targeted  experience online.
Here  is  a  case  where  actual  intelligence  agents, from  the  US border  patrol  and the  DHS are  alleged to  utilize bizarre  psychological  and  other  harassment  on  a  whistle  blower, including  mystery  poisoning:  Delusions, poison, bizarre claims, and schizophrenic narrative in gang stalking: the case of DHS whistle blower Julia Davis
And,  the  Russians,  of course, are  suspected  of  poisoning  dissenters and detractors in  Britain, which  is  widely  documented  all  over  the  MSM.
And  the  Las  Vegas  shooter Stephen  Paddock was  said to be so delusional, that  he  kept  a  gas mask  handy, with  fears of being   poisoned.
SO:
How  bizarre is  modern gray  area,  due process-free  policing  that utilizes  intelligence  operations on  ordinary  Joe Blows who  said  something online,  and  then,  were stalked,  harassed, framed,  and  worse by  operatives  who  sit  on  the  internet  backbone  in  Toronto  Canada,  or  San  Diego,  CA?
Or  at Los  Angeles  JRIC which uses miltary grade surveillance gear to target people they do not like, , or  who  are  affiliated  with  Princess Megumi,  from  the Masonic  Capital  of California, whose  relative  just  happens  to  be the  deputy  sherrif  in  those  parts? Bacon  bits,  and  blowflies-or  flying  pig-cow  hybrids  in  fishnet  stalkings  and high heels?
I ask  you, the  reader, to decide  how  bizarre claims  of  poison  are  in  the “delusional  complaint” or  organized  stalkung.
Yeah-  organized  gang  stalking  is THAT  BIZARRE.
ROGS  wonders:  who  will  help  me  keep  an  eye  on  this  story,  below?
Get  out the  ROGS  BINGO  card  before  you  file  FOIAs  in  this  case,  and especially, dig for  records  about the  dead  mans  past-  see  if kangaroo courts, mental  health,  unproven lopsided  claims  of domestic  violence,  and more were there. Because  it  is  possible  you  will  find that  soeone, soewhere,  didn’t  like  what  he  said online  or  off. Also notice that it was a workplace conflict related situation
Something  just  ain’t  right  about High  Heeled,   DVIC  policing,  as  these para-military,  quasi-judicial,  extra judicial  suicides,  homicides-and  poisonings  are  taking  place ALL  ACROSS  THE  WESTERN  WORLD, now.
SO,  here  is  the case where  an “un named man” died  in a  motel  room, from  what  federal  agents  and  the Department of Homeland  Security claim were household  cleaning  agents.
__________
Federal agents investigating hazmat situation that sent officers to hospital
By: Wendy Halloran , Rikki Klaus
Updated: May 13, 2018 – 11:31 AM
Federal agents investigating….
DEKALB COUNTY, Ga. – Federal agents are investigating after police found a man dead inside a DeKalb County motel, and then a chemical odor sent officers to the hospital.
Channel 2’s Wendy Halloran said agents with the FBI and the Department of Homeland Security were investigating inside the room late Saturday night.
“We have a dead body in the room and we can’t make any determination on cause of death until they have cleared the scene,” Shiera Campbell, with the DeKalb County Police Department, said.
All police had determined was there was body a man inside a room on the third floor of the United Inn on Memorial Driver in Decatur.
Guests told Halloran that they were stunned when they were told they needed to evacuate their rooms.
“We were all in the sun standing out for a long time when I did find out what was going on. It was kind of sad,” a hotel guest, who only identified himself as Bryan, told Halloran.
Once inside the room, three DeKalb County police officers knew something was very wrong.
“The officers were feeling a little bit dizzy, weren’t feeling too much like themselves, so they quickly came out of the room,” Capt. Eric Jackson with Dekalb County Fire and Rescue said.
The strong chemical smell sent three officers to the hospital. Firefighters then put on hazmat suits and went inside.
“Based on the samples we took we are going to try to attempt to identify whatever that source was,” Jackson told Halloran.
Hour after hour went by Saturday as forensic investigators waited to see if they could go inside to process the scene and the medical examiner remove the body.
Motel guests waited and watched. Some had to move to other rooms.
Hazmat trucks pulled in late in the night, with all signs pointing to something potentially deadly inside that motel room.
It is still unclear what was inside the room.
Police said late Saturday night the body was that of a 48-year-old man.
………..follow  the  links-  connect  the  dots!
_____________
While many  over the  counter chemicals such  as  bleach,  and  ammonia, and  sulphuric  acid  and  more can  be  freely  purchased from  hardware  stores  and big  box  retailers such as Walmart, they  can  also  be  used  to make  dangerous  chemical  weapons.
Was this a case where hidden policing, and possibly, vigilantes or provocateurs tried to force a bombers hand, or otherwise wage attrition for something the un-named man said online? ROGS asks you, the journalist or researcher of organized gang stalking to decide.
But also, decide WITH EVIDENCE and data that you can access by learning to ask the RIGHT QUESTIINS in these odd, bizarre cases, and to adopt the ROGS framework analysis of the claims inherent in these plainbizarre gang stalking events.
We  know  with  empirical  evidence  that the  alphabet  agencies work with local  law  enforcement and  community  mobs to  wage  hidden and highly personalized war,  psychological  war,  that  frequently  ends  in  suicides,  homcides  and mass shootings, and  that  they  wage  these  outside  of  judicial  oversight,  on  targeted  individuals.
We  in case  after  case  of  case  that  these  political, malicious prosecutions primarily target  speech,  and  speakers,  and, that  online  speech bis .targeted  offline.
And,  we see  the  bizarre  claims  of  threats  of  poisoning,  actual  poisoning,  and rarely~EXTREMELY  RARELY~delusional  people  who  fear  pousoning  by  “imaginary”people  they  “”imagine.
MORE LINKS  TO POISON  IN  THE EMERGENT ONLINE DELUSIONAL  GANG STALKING  DIALECTIC:
A credible analysis by a credible researcher of organized gang stalking:
https://medawarscornflakes.blogspot.com/2009/12/toxic-materials-in-stalking.html
And, those OTHER, likely actual gang stalkers, whose comment section was always filled with Lions Club members from OHIO, TEXAS, USAF affiliates, academics who are well known stalkers, and a few retired police (and someone who lived on Duckwood Drive in Eagan MN,in 2013):
https://neverending1.wordpress.com/2010/11/19/gang-stalking-the-gang-stalkers/
And, one for you, the researcher of organized stalking to figure out for yourself-especially if you are a federal agent, or another “good guy or gal” who wants to STOP gang stalking, as we see that it frequently leads to mysterious deaths:
https://perthsgangstalking.wordpress.com/2017/01/12/posions-and-toxins/

Gang stalking BINGO: targeted individual, targeted real estate, targeted electronics, targeted childROGS ren…….

Let  me  know  if,  and  when  you  start  seeing  patterns in  the  data  of  organized  gang  stalking……because  the  Experts  all  agree that  an  obsession  with patterns  can  indicate delusions, and  maybe  even  schizophrenia!
But  there are,  in  fact, links  between  organized  gang stalking and  real  estate, organized  stalking  and kangaroo  DVIC  courts, links between Gang stalking and Electronic implants: (Here is how the NSA uses electronic implants.) and electronic  implants that  monitor  our  computer  activity, sometimes  for  YEARS.

Related  Story: How secret  policing tactical  assaults  can  induce  delusion-like  symptoms in  politically  targeted  individuals,  as  those  targeted  try to  find  words  for  un-Constitutional  government conduct:
Gang stalking and delusions and paranoid complaints: what is Level X thinking and cognitive bias in psychologists/psychology? 
OGS victims obsession  with  patterns can  indicate  delusions to  therapists  and psychologists  on  the  state  teats!

But  here  below is a  case study  in  organized  gang  stalking  that  is  full  of  the  EXACT  patterns that  I  describe here  at  ROGS.  Organized  gang  stalking  IS  what  I  say  it is!
So…BINGO: Lets Play ROGS BINGO, in  the  case  of  the  targeted  activist!
Black  activist jailed  for  Facebook  posts speaks out about secret FBI surveillance that  went  on for  YEARS.
Exclusive: Rakem Balogun spoke out against police brutality. Now he is believed to be the first prosecuted under a secretive US effort to track so-called ‘black identity extremists’
…….. The father of three said he was shocked to later learn that agents investigating “domestic terrorism” had been monitoring him for years and were arresting him that day in part because of his Facebook posts criticizing police.
“It’s tyranny at its finest,” said Balogun, 34. “I have not been doing anything illegal for them to have surveillance on me. I have not hurt anyone or threatened anyone.”
Balogun spoke to the Guardian this week in his first interview since he was released from prison after five months locked up and denied bail while US attorneys tried and failed to prosecute him, accusing him of being a threat to law enforcement and an illegal gun owner.
Balogun, who lost his home and more while incarcerated, is believed to be the first person targeted and prosecuted under a secretive US surveillance effort to track so-called “black identity extremists”.
In a leaked August 2017 report from the FBI’s Domestic Terrorism Analysis Unit, officials claimed that there had been a “resurgence in ideologically motivated, violent criminal activity” stemming from African Americans’ “perceptions of police brutality”.
The counter-terrorism assessment provided minimal data or evidence of threats against police, but discussed a few isolated incidents, notably the case of Micah Johnson who killed five officers in Texas.
The report sparked backlash from civil rights groups and some Democrats, who feared the government would use the broad designation to prosecute activists and groups like Black Lives Matter.
Balogun, who was working full-time for an IT company when he was arrested, has long been an activist, co-founding Guerrilla Mainframe and the Huey P Newton Gun Club, two groups fighting police brutality and advocating for the rights of black gun owners. Some of the work included coordinating meals for the homeless, youth picnics and self-defense classes – but that’s not what interested the FBI.
A march in the wake of the deaths of Alton Sterling and Philando Castile at police hands.
Investigators began monitoring Balogun, whose legal name is Christopher Daniels, after he participated in an Austin, Texas, rally in March 2015 protesting against law enforcement, special agent Aaron Keighley testified in court….follow  the  links  above….connect  the organized  gang  stalking  dots! Because  nearly  ALL  mass shooters  endure YEARS  of these  tactics by hidden  policing,  aka  “High  Policing,  aka Americas secret  police.”

The Intercept covers organized gang stalking AGAIN. LAPD, Palantir, CIA LASER, Targeted individuals, elecronic harassment

Aided by Palantir, the LAPD, community mobs, and the CA Highway Patrol Uses Predictive Policing to Monitor Specific People and Neighborhoods~Maha Ahmed
Revisiting  an  intelligence  agency  wet  dream:  full  spectrum monitoring of groups and  individuals to  influence  and  alter  their  lives.
May 11 2018
Police stops in Los Angeles are highly concentrated within just a small portion of the population, and the Los Angeles Police Department has been using targeted predictive policing technology that may exacerbate that focused scrutiny. That’s according to a report put out this week by the research and activist organization Stop LAPD Spying Coalition, which draws from the testimony of city residents and newly released police documents to paint a picture of a “racist feedback loop” where a “disproportionate amount of police resources are allocated to historically hyper-policed communities.”

Dr. Mike Wood takes on the MIC troll army, for free-doesn't cost taxpayers a dime!

If  you  came here  to  ROGS  to  find  evidence  of  a conspiracy,  stop  reading  here,  because what some  call  “conspiracy  theory”is actually “the way  the  MIC/PIC/DVIC” and  all  of  their  federal  fund  hungry  mockingbirds perpetuate  their  salaries, and their  bizarre  religions, through propaganda aka “crisis PR ”. It’s how  things  really  work out there in  Goodguylandia, aka, the west under neocon Israelfication.
Here,  watch police, and  military, and psychological profilers, and  other  stank  ass operators hack my blog a few times, or take a look at infiltrate  Dr. Mike Wood’s conspiracy  theory  blog .
Then  keep  in  mind  that each comment,  each post,  each linguistic or  electronic  signature leaves  its  imprint  SOMEWHERE.
And  keep  in  mind  that  this  over  funded  world  wide  speech, press, and  association monitoring  apparatus  claims  real  and  actual  victims  around  the  world,  and in  America,  Britain,  etc. Its also a sort of holy war, as we see neocons from all western teligious sects and cults involved in it, and deriving profit.

Related Story : Watch how a former NSA hacker switches to being “the bad kind of spy ”and now, works to TARGET and cyberstalk and hack Americans, at the behest of the Saudi military. Extra credit for my regular readers who notice that I mentioned how the Intelligence Community (IC )uses the term “Ravens ” and blackbirds, etc., as they cyberstalk Americans, long before the MSM covered it …

This  is what a  PSywar  IS. Here, look  at  one in  action here,  at  Woods  blog.
I am  remembering that  scene  from  Gladiator,  where the  good general Russel  Crowe  is  rewarded for  his heroics,  waging war  on the  Barbarians-  a  war  that  Rome  started  to  begin  with-and how,  after battle, he  is visited by the the  emperor,  who is a psychopath.
Then,  I  am  remembering  Russel  Crowe stripped  of his power,  because the  shitty  little  Emperor  sicced  a  gang on  him, because  his ACTUAL   bravery  is a  threat  to  the  Emperors bravery  on Twitter,  Facebook,  and at the  local  Fusion  Centers,  where,  for  a  price, armies  of well  hidden,  paid  mercenaries  spy  on real actually brave  dissidents,  activists  and  so on, sniping at words online. And,  sometimes  targeting,  and  killing them offline (nearly  every straight  black  male  activist  from  Ferguson  MO, has  died  since  those  protests).
Well…..we  know  how  THAT  turned  out, after  the E sicced  armed  hoardes  on  the Gladiator:  the  Emperor raped, lynched, and killed  the  Gladiators wife  and  child.  Cuz’ this  is  how  the  Emperor  rolls. The Emperor, it  seems, is  EVERYTHING  that  he  fears  others  MIGHT be,  COULD be,  or otherwise MAY BE if  he  isn’t  pre-emptively  worse, and in control of the  narrative at  all  times.
I  suspect  that  this  is why FVEY,  and the  NSA-Israel  data  theft  and blackmail entrapment mechanism, and  the  UKUSA, and  the  UN Transnational  Crime  wave is perpetrated  on unsuspecting local populations in  the  first place.
But:  I   don’t  just  suspect  it- I  provide  you,  the  reader,  with  EVIDENCE of it,  and believe me,  there’s  more than  I  am  letting  on. And:  shout out to  Ed  the Morgellons  guy, again-  thanks for  NO HELP,   you  shitbag. But  according  to the  internet, you  are  practicing  law again?
Good!
I  hope  you  will join me  in  civil  action-  and  explain  the  Asian Law Caucus/Frank Tomota/Eickenburg/Ohio/MN/Tennessee/Texas/Arizona/homeless shelter/rats and  informants and AIPAC/Tarek/gang stalking link to  a  jury!
I  sure  could  use  the  help-  after  all,  that  whole  thing  spanned  well  over  a decade.  I mean,  I   dont actually  need  YOUR  help  or  testimony-  I  have  others  now,  helping  out,  moving  the  ball back  to  due  process of  law, while  revealing what  YOU  do  “in  darkness.”
Progress!
And, of  course, these  hidden  heroes got  close to  some  seriously  sweet  real  estate  too.  Even that  moron on Twitter who  works  in  hidden capacity running Ruby slippers off  the  rails said “Kenneth,  LOOK! I got  a  nice  house!”
Use  my  search  feature  to find posts about  real  estate,  and  how the hidden hand of  police  corruption that  works  at  all  levels  of  community policing works, and  works on  individuals to steal  land.
But  apparently,  the  crazy  internet guy-that one lone  voice-  isn’t  totally alone  anymore. And,  like  the  writer in  Vonneguts novel whose  testicles  shrank  every  time Kazak  the collaborator sprang  out  of the internet, there will be  consequences now.
So, for  those peeking  in  from  the  FVEY, and  one  or  another  speech subversuon  deep state  bunker in  Washington state, Utah, California (you  should  see  the map  of  California  that  I  was  looking at the  other  day!) -know  that a  few  are  peeking  back  at  you now. And- this  is what Thoreau  styled, passive,  non-violent resistance to deep  state corruption reads  like  in practice.
HAHA. I told you so.First they  came  for those  they had  gas-lighted  and PsyOp’d in  the  darkness of the  intetnet….and  I refused  to  shut up:)
 
 

Profile of the informant/rat as mass shooters:were the Mormon Danites the prototype Zionist assassins?

The  FBI  is  widely believed  to have  a  literal  army  of paid and  unpaid  rats,  snitches,  and informants,  all  of whom  were  entrapped,  or  ensnared  somehow  into  complicity  with  the  modern  American  police  state. This  is  well  documented in  nearly  all  mainstream media  today.
Less documented  is  how  religioun  uses  their fanatics  to create  murderers,  and  mass  murderers  to enforce  conformity,  or  cause  “the  fear  of  the  lord”in or  upon  others.
While  greasy  bearded  Jewish bombers  of  earlier  eras in  American  history  provide  a  useful  stereotype, and the  current near mythological  Muslim  bombers are nearly  created  from whole  cloth- it is  eady  to  miss modern Zionist terrorism that  expresses  itself  from  within any  of  many militant  Jewish  groups  such as  the  Jewish  Federation, and  the  many  tentacles of  George Soros  and  Haym  Saban  sponsored  radicalization.
So it is  worthy  of  note  that other religions  are  widely  documented nurturing  the  murderous  among  them, and  propelling  them  into  terror  events. Akso  worthy of note  is  that these  all  hearken  to  Zion.
The  case  of the Zionized  Mormon Murderers: Danite assassins and Mormon  history
In  cases  of  modern American mass  shooters,  we  frequently  see  several  things that are  indisputably linked:

  1. recent  contact  with the  local  law  enforcement,  DHS  “community  policing,” that  can  be termed  long  term  pervasive and  chronic  surveillance, or  long  term contact with the FBI that  precedes  these  events (the Boston bombers, the Tsaernevs  were  in  contact  with  the  CIA  and the  FBI for  over  a decade; Omar  Mateen  for three years; William  Atchisson for  one year; Devin  Kelly  for  several  years; Matt  Riehl was  harassed across state  lines, and  a  whisper  campaign waged  behind  his back  for  years; Stephen  Paddock  was  an  inter-generational  FBI  project)
  2. Media  narratives  that  do not  discuss the  link  between  mass shooters  and provocateurs  in  policing, and instead, shift bthe  goal posts to  pet  causes  that garner  federal  funding,  such  as  the  dubious link  between  mass  shooters  and  domestic  violence (in  these  cases we  frequently  see the  lop-sided,  gender  biased DVIC narrative  slanting  the  story  in  gendered fashion,  as bif  women  have no  agency  in  the  violence they  perpetrate. Then,  we  see  the  NGOs  in  community  policing  violently and aggresdively  stalking men  like  Nikki Craft advocates)
  3. Individuals targeted AS  individuals, followed in surveillance by community  policing  elements(frequently  with  religious  fervor); followed  across  social  media, cell phones,  emails, and  more until  a pervasive  and  literal “no  touch”  bullying occurs in  gray  area “high  policing” as  outlined  by Brodheur,  but  by  his  definition, it  is  actually  now police  state  policing,  due  to  the  nationwide  wiretap  of  the  NSA  and Fusion  Centers working  between  the CIA  and Paul  Blart  the  mall cop.
  4. Clear affiliations to  Amerucas  various  sects  and  cults,  many  of them  militant
  5. the  climate of  Ich, Du being mediated  by rats,  snitches,  and  informants  who  are  neither Ich,  nor Du,  but rather-  trained  psychopaths and assassins

 
So-  meet  the  Mormon  Danites: the psychopathic killers  of  Brigham  Young  and Joseph  Smith. Its  an  interedting  profile  of  how  the  religious use  murderers to  maintain status quo.
 

Gang Stalking BINGO: Superman, Scientology, Emma Best, FOIA, and Mike Masnick's Techdirt.com

Theres a stretch  of  filthy glittered  roads  that  runs  across Los Angeles, CA, USA that is literally an  organized  gang  stalking training ground. And  I, ROGS, have survived a few cars  trying  to run  me  off  the  roads, and  state vehicles with  kewl  decals brighting me; brush  passes with people  who  told me odd,  unasked for stories,  and  other forms of domestic terrorism perpetrated on individuals  who suffer  in  silence on  those  roads.
And,  no,  I  am  not  talking  to  you  Ofcr. One Cup-O-Donut-Shop-Joe  too many, stuck  with  your running  partner  Gomez, who  ate  bean  burritos for lunch.
No-  I am  talking  to  those  who  you  are  stalking  right  now, who  might  eventually  encounter the  proper  language  to call  this thing  of yours-  this  unConstitutional  thing  that frames cases, and  people in  a false  light, as  your  shadows leer  and loom  over  our window  ledges,  or into our Windows 10 (which  is widely  described  as  A  Box Of  Government Spyware)
SO-  I  wrote  ROGS   for the little  peeple  who get stomped on by  the  good guys like  Four  Star  General Dean, who  wipes his ass  with  the Constitution,  as  he works  behind the  scene  with  the  Rotary  club, and  any of many  NGOs  who  seek  to  obliterate  due process in  America  by waging  DVIC  war  with kangaroo courts ang  High  Policing, and  to  gang  stalk people when  their shitty little  ego  gets bruised.
Look  at  the  top of ROGS blog  here  to read  the  BEST  GANG  STALKING  STORY EVER,  written  by  Duck  Twacy,  which  documents  police  and  firemen, gangsters and  religious  nutters ALL  working  together  to harass  an  individual, with  what  the  stated  goal of  gang  stalkers  is:  to drive  a  target to institutionaluzation, incarceration, or  suicide.
But to the avid  researcher  of  organized  gang  stalking,  I hope you see that even  if  something “mysterious”happens  to me?  Others will pick  up  where  I  left  off,  as  we  see  Mike  Masnick of  Techdirt.com has once  again  brought  OGS cockroaches  into  the  light, via promoting the pitbull  journalism of Emma  Best.
And-  through  FOIAs,  and hard investigative  journalism, you  too  can  discover  how to  file  a lawsuit  against  your own  gang stalkers. Because  the butterfly  wing effect is  in effect now,  and  ROGS has  done his  homework. Now others  have  climbed  aboard!
Comb  through  ROGS  blog  here for a   post  where  I invoke  the powers of Superman and  also, cannoli, and another post where I  lost  my  way, as  I  trolled Los  Angeles’ main Gang  Stalker  corridor,  and  some  CVE  junkies  stole my  GPS(use my  search feature  to  see  how  bizarre  these  endless stalkings  are).
You  see,  on  one  single  stretch  of  road, between  downtown LA and  Santa Monica, you  can  find  the  following,  oddly  juxtaposed:

  1. the  Church of  Scientology
  2. the headquarters of  the  Mormon  Mafia, aka, the Whistling and Whittling clubs of LA, aka the LA  FBI
  3. Major Masonic Temples
  4. more hungry rats,  snitches, and informants than  you  can  shake a  bag  of dicks  at
  5. nearly  all of  Americas  major left-leaning  political donors whose  penises grew  their  foreskins back  after  the  election of  Trump
  6. Major Chinese, Russian and other  new  money waging capitalism
  7. my lost  GPS

So-  what has  all  that  have to  do with organized gang stalking,  you  ask?  Well,  this,  for  starters- a  MAJOR  LAWSUIT in  the  works  against the  Church  of  Scientology, and its  alleged  gang stalking  activity, aka  Fair  Gaming  the  system of  checks  and  balances that Americans  seem  to have  forgotten.
And the  FBI, DHS, etc  in that  area-and  everywhere else-cant  seem  to  figure out  if OGS  is real. But  some  journalusts  are  getting  on  the  case  now (search  ROGS  blog  about  how  I  list  a  story  about airplane surveillance in 2014-15).
WELL,  never  doubt  the  power  of  one  voice. And  NEVER  FORGET  that  those who  hide  in darkness will  be  brought into  the  light. Hopefully,  in  more  and more  court  rooms of  the  future.
Here’s Mike  Masnick-the  inventor of  the  term  “the  Streisand  Effect”- on the  strange  case of the  FBI protecting  the real  name  of  Superman, in  the  name  of *cough cough*Nashunul  Secrecy!
Fair Game, and the  power  of  FOIAs take on Scientology.
Well, I  would  provide  a  link,  but  now  that  I have been  writing again,  my  browser  gets  the  full Jscript  treatment  from  the many  FVEY  nations that have  foregone the  rule  of  law, and who target  pure  speech  and speakers  online.
So, Google  the  search terms in  the title  of  this post instead,  and  see  the  massive  lawsuits  brewing  against gang  stalkers,  and the  institutions  they  hide  in.
 
 

Trump hired Israeli Spies to spy on Obama's Israeli spies

Every  single day,  the ROGS  thesis  of organized stalking is validated in mainstream  news.
But  you  dont  have  to  take my  word for  it-just  comb  through  my  blog  here,  and see  how  much of  what  I write  becomes  mainstream  within   A YEAR.
And  LOOK!
The Trump team hired Israeli spies to spy on Obamas Israeli spies. Let me know if you start seeing trends in the data, or if you discover a thing or two about coincidental data colection at foreign internet spy outfits.
 
The  Trump  team hired Israeli  spies  to  spy  on  Obamas  Israeli  spies. Let  me  know  if  you  start  seeing  trends in  the  data, or if you discover a  thing or  two  about coincidental  data  collection  at  foreign spy  outfits…..
Trump team ‘hired Israeli spy firm to collect dirt on Obama officials in an attempt to discredit Iran nuclear deal’
New report says Trump aides hired Israeli firm last year after visit to Tel Aviv
Israeli spies allegedly tried to gather dirt on Obama aides behind Iran deal
Revelation comes amid international jockeying ahead of May 12 deadline
By Keith Griffith For Dailymail.com
Published: 01:54 BST, 6 May 2018 | Updated: 14:40 BST, 6 May 2018
e-mail
1k
shares
388
View comments
Aides to President Donald Trump reportedly contracted an Israeli private security firm to collect dirt on Obama administration officials and discredit the Iran nuclear deal.
The operation to ‘get dirt’ on Barack Obama’s former staffers Ben Rhodes and Colin Kahl was launched last May, according to unnamed sources and documents cited by UK newspaper The Observer.
The sources said that officials linked to Trump’s team contacted Israeli investigators just days after Trump visited Tel Aviv a year ago, his first foreign trip as US president.
The goal was apparently to discredit the Iran nuclear deal framework, which Trump has repeatedly threatened to scuttle ahead of a key May 12 deadline for certifying Iran’s compliance.
Trump is seen conferring with Israel Prime Minister Benjamin Netanyahu in Tel Aviv last May, just days before his camp allegedly hired an Israeli private spy firm to dig dirt on Obama aides
+4
Trump is seen conferring with Israel Prime Minister Benjamin Netanyahu in Tel Aviv last May, just days before his camp allegedly hired an Israeli private spy firm to dig dirt on Obama aides
Former Deputy National Security Adviser Benjamin Rhodes (right) was one of the architects of the Iran deal that the alleged covert smear operation targeted
+4
Former Deputy National Security Adviser Benjamin Rhodes (right) was one of the architects of the Iran deal that the alleged covert smear operation targeted
RELATED ARTICLES
Previous
1
Next
The President’s newest attorney Rudy Giuliani calls for…
John Kerry ‘secretly met with top Iranian official in…
Share this article
Share
Investigators contracted by the Israeli intelligence agency were instructed to dig into the personal lives and political careers of Rhodes, a former deputy national security adviser for strategic communications, and Kahl, a national security adviser to the former vice-president Joe Biden, according to documents cited by the Observer.
‘The idea was that people acting for Trump would discredit those who were pivotal in selling the [Iran] deal, making it easier to pull out of it,’ said an unnamed source quoted in the report.
Among things the investigators allegedly examined were personal relationships, any involvement with Iran-friendly lobbyists, and whether the Obama aides had benefited personally or politically from the peace deal.
The private investigators were also allegedly instructed to contact prominent Iranian Americans as well as pro-deal journalists to determine whether Rhodes and Kahl had violated rules by leaking.
Rhodes famously said in a 2016 New York Times profile that he relied on inexperienced reporters to create an ‘echo chamber’ to helped sway public opinion in favor of the deal.
The investigators were said to be examining Rhodes and Kahl’s contacts with the New York Times, MSNBC, the Atlantic, Vox website and Israeli newspaper Haaretz, among others.
But  the  data seems  to indicate that  some  people  are  targeted for intrusive surveillance MORE  than  others.
And,  it  seems  that  the  same  Man in the  middle  attacks  are  used, from  the  same groups of  women, and their children too.