I write about the social phenomenon called "gang stalking. All cases and claims of gang stalking are traceable to current and former police, military, intelligence, security contractors, and their related flying monkeys, targeting citizens. Scientific evidence based "proof" of gang stalking, and gang stalking lawsuits for journalists, psychologists, and criminal defense attorneys to sort the "electronic"psychobabble from the facts.
Dear future Texas public defender of Michael Chadwick Fry: please contact me here at the ROGS blog, because you will need the free ROGS Bingo card to understand your case.
Your defendant claims that he was brainwashed, and, semantics aside, I believe him.
Your client has named some names, and he encountered odd things after witnessing a deputy involved homicide of hs friend, and your client has also named some names that in themselves have an interesting history in that area.
I would focus in on the Sheriffs department media spokesperson too, because Fry (apparently) named him prominently on his flyers, and that person has an interesting academic history. I can testify with unimpeachable evidence that I have encountered these same types acting in undercover capacity to skirt the law.
And as we see in nearly ALL cases where claims of of mind control and influence operations, or gang stalking operations are presented, so we see that Fry was attempting to garner media attention to an attemp to frame him somehow, and even states that he was the intended target of an institutional homicide.
Related Story: Nearly all major mass shooter events, and other “odd”cases like this reveal that these men and boys partcipated in alternative media and counter-narrative.
We ALSO see that alleged shooters are frequently “on police radar” for years and years as they are stalked inline and off, but ALSO that many-ranging from Omar Mateen whose father was an FBI informant and also had an alternative news show, to Mathew Riehl who used Facebook, and many more were in fact, stalked by local, state and federal poluce but ALSO that their web pages are webscrubbed after their events, often at the direct request of Israel.
And while these claims initially look like classic “delusions,” I urge you to bear with me, as I am prepared to offer you free assistance to understand his claims, and also, organized gang stalking~and please, read this article first, about a media hoax in your area that attempts to discredit people who claim they are under an influence operation.
You see: your client has all the signs and symptoms of being what is colloquially called a “targeted individual of organized gang stalking”and the “symptoms”likely appeared just AFTER witnessing the homicide of his friend, just AFTER he was railroaded multiple times, and spending many months in jail, held for aggregious amounts of time in jails-but apparently NEVER found guilty of crimes.
you might like to know that Dr.Otto Dorr Zoeggers discusses such things in context to torture here and correlates that with what can be descrubed as mind control.
All of that, good defender, is already a full ROGS BINGO, but wait! Theres much more…..
The cows are coming home to roost, finally. And, they are taking huge craps on journalism AGAIN.
It really suX to be “that one guy” or gal in Marcy Wheeler’s case, who is “way the [email protected] ahead of ‘the game,’ because then, you get totally gang stalked for decades as the NSA/FBI/CIA/FiveEyes/Israel backdoor butt buddies cornhole all of your communications, and send hidden subverter’s of law and justice into your every relationships in what is called colloquially “organized gang stalking.”
Or, as some have noted, “being accosted, assaulted, delayed, redirected, or robbed outright by the ‘Are You Jewish’ guys.”
All of these subversions are what the Association of Threat Assessment Professionals calls “the colliding parallel investigation, ”as they discuss in their crisis narrative formation, aka “advising law enforcement ” how to discuss this NSA-Israel spying on citizens, and the accompanying psychological operations waged covertly on yargeted persons across America who have no idea what hit them; and, that are causing mass homicides across America. Fifth column indeed- and talk about burying the lede! Pierre Omidyar has shown his fur, and the Intercept has been invaded by the Sterns Gang!
Ask James Risen about that-he’d probably disagree, but at least organized stalking is coming out of the woodwork finally, and then, use my search feature to find posts about how Tor is subverted and “captured” and “entrapped” directly, and always, BY THE NSA, which technically, gives every single Tor user ‘legal standing’to sue for section 702 spying on American’s abuses, because the Tor user can ‘prove’ that they are spied on PERSONALLY by the NSA Data Theft Pipeline Bandits.
Yup-privacy rape is a real thing, and emptywheel covers it like John Ashcroft on the statue of Lady Justice, but in a “good touch” way.
Unlike all of those vagina hat wearing morons that have taken over the Democratic Party everywhere for the sake of weeping vahjayjay’s, Marcy Wheeler focuses on “civil liberties for EVERYONE” instead of those who have a mysterious sacred Isis Temple where they get together and talk about “safe spaces and the sense of belonging when being used like “a Liberty Torch,” and then, march about the worlld in an endless killing spree, to the tune of the bankster’s as hey light the Constitution on fire, and then look around and cry “But there’s nothing to put the fire out!” havng burned down the Barn.
I myself prefer the analogy of being a Maxi-Pad for freedom, because I feel less cramped, and more free, but each to their own.
Here’s Marcy on the “Tor Exception,”which helps every single American to begin to wage a case where they can prove beyond any reasonable doubt that they have been personally targeted, and spied on:
Richard Burr has released his draft Section 702 bill.
Contrary to what you’re reading about it not “reforming” 702, the SSCI bill makes dramatic changes to 702. Effectively, it makes 702 a domestic spying program.
THE SSCI EXPANDS THE KINDS OF CRIMINAL PROSECUTIONS WITH WHICH IT CAN USE SECTION 702 DATA
It does so in Section 5, in what is cynically called “End Use Restriction,” but which is in reality a vast expansion of the uses to which Section 702 data may be used (affirmatively codifying, effectively, a move the IC made in 2015). It permits the use of 702 data in any criminal proceeding that “Affects, involves, or is related to” the national security of the United States (which will include proceedings used to flip informants on top of whatever terrorism, proliferation, or espionage and hacking crimes that would more directly fall under national security) or involves,
Serious bodily injury
Specified offense against a minor
Incapacitation or destruction of critical infrastructure (critical infrastructure can include even campgrounds!)
Cybersecurity, including violations of CFAA
Transnational crime, including transnational narcotics trafficking
Human trafficking (which, especially dissociated from transnational crime, is often used as a ploy to prosecute prostitution; the government also includes assisting undocumented migration to be human trafficking)
This effectively gives affirmative approval to the list of crimes for which the IC can use 702 information laid out by Bob Litt in 2015 (in the wake of the 2014 approval).
Importantly, the bill does not permit judicial review on whether the determination that something “affects, involves, or is related to” national security. Meaning Attorney General Jeff Sessions could decide tomorrow that it can collect the Tor traffic of BLM or BDS activists, and no judge can rule that’s an inappropriate use of a foreign intelligence program.
“So what?” you might ask, this is a foreign surveillance program. So what if they find evidence of child porn in the course of spying on designated foreign targets, and in the process turn it over to the FBI?
The reason this is a domestic spying program is because of two obscure parts of 702 precedent.
THE 2014 EXCEPTION PERMITS NSA TO COLLECT TOR TRAFFIC — INCLUDING THE TRAFFIC OF 430,000 AMERICANS
First, there’s the 2014 exception.
In 2014, the FISC approved an exception to the rule that the NSA must detask from a facility when it discovers that a US person was using it. I laid out the case that the facilities in question were VPNs (collected in the same way PRISM would be) and Tor (probably collected via upstream collection). I suggested then that it was informed speculation, but it was more than that: the 2014 exception is about Tor (though I haven’t been able to confirm the technical details of it).
NSA is collecting Tor traffic, including the traffic of the 430,000 Americans each day who use Tor.
One way to understand how NSA gets away with this is to consider how the use of upstream surveillance with cybersecurity works. As was reported in 2015, NSA can use upstream for cybersecurity purposes, but only if that use is tied to known indicators of compromise of a foreign government hacking group.
On December 29 of last year, the Intelligence Community released a Joint Analysis Report on the hack of the DNC that was considered — for cybersecurity purposes — an utter shitshow. Most confusing at the time was why the IC labeled 367 Tor exit nodes as Russian state hacker indicators of compromise.
But once you realize the NSA can collect on indicators of compromise that it has associated with a nation-state hacking group, and once you realize NSA can collect on Tor traffic under that 2014 exception, then it all begins to make sense. By declaring those nodes indicators of compromise of Russian state hackers, NSA got the ability to collect off of them.
NSA’S MINIMIZATION PROCEDURES PERMIT IT TO RETAIN DOMESTIC COMMUNICATIONS THAT ARE EVIDENCE OF A CRIME
The FISC approved the 2014 exception based on the understanding that NSA would purge any domestic communications collected via the exception in post-tasking process. But NSA’s minimization procedurespermit the retention of domestic communications if the communication was properly targeted (under targeting procedures that include the 2014 exception) and the communication 1) includes significant foreign intelligence information, 2) the communication includes technical database information (which includes the use of encryption), 3) contains information pertaining to an imminent threat of serious harm to life or property OR….[follow this link to read more about how the Fabulous Empty Wheel is one of like, ten journalists around the world who has her head screwed on right] UPDATE: As of today, the Congress has extended the FISA bill, and section 702, which is, and has been, collecting data on American’s since 2001, and through “back door searches” using the data they gain on Americans to further target individuals with many un-Constitutional practices ranging from opening ‘investigations’ and then, hiding the fact that these investigations were started at the NSA; to outright “mind control and influence operations,” and much more as yet disclosed in public.
Or-what actual targeted individuals have been telling us ALL ALONG (as opposed to well financed disinformation and misinformation campaigns like these here.)
The good news however, is that we know with certainty that due to the “Tor exception” any and every American who uses Tor now has de minimis legal standing to challenge this collection. See this post, this one and this one for evidence and suggestions for lawyers and others who wish to build a case of that.
Then, have a look at the Guide to Government Hacking, at the top of ROGS, which was written by the ACLU, the EFF, and the NACDL for civil litigators and criminal defense lawyers in cases where government hacking is likely-which is every and any case, retroactive to 2001, now that we know with certainty that we are indeed being spied on every day.
Lastly-some 420,000 people in the US are spied on EVERY DAY, and we know this with empirical certainty because the NSA targets Tor users in the US, specifically. Here are those statistics from Tor, the Onion Browser-and another metric whereby we can gauge the veracity of the stories of those who claim they are “targeted indviduals:”
DIRTY RATS ROBO RATS PLAGUE RATS SEBACIUM and internet search redirection
Gee- I hope I don’t get in trouble for this Mom-and thanks for letting me sleep in your basement for all these years, but like I said over and over again: I HATE RATS. You can read this here to see how long I have been on record discussing how RATS have taken over our country, and especially, our internet. But Mom, Frankly, either there are laws, or there are not laws, and nations that forego their own Constitutions have no basis in law. Related Story:CCleaner has been hacked and malwared by the government
And I for one, have not feared terrorists, journalists, pedophiles, or boogiemen since forever (or, 2003-4)- because I know with scientific certainty that these all work in government, the military, vague NGO’s with snazzy mission statements, or in crisis PR. And especially, I don’t fear nebulous “hackers on the internet” because I know these are the SAME PEOPLE who work in-yeah, Mom, these all work in government, the military, vague NGO’s with snazzy mission statements, or in crisis PR.
Mom, some of us knew about these rats for many years before the MSM and even altMedia decided to take our complaints seriously; but also before we could get at the “proofs” that are necessary in journalism to “prove” that what we say is true. Which only makes one more highly targeted. And again, I say: I am NOT a RAT-but I have been telling you about them for years (use my search feature to understand the context of this phrase here at ROGS).
But lots of other people are RATS, Mom, and they are destroying the American democracy quicker than Ellen DeGeneres can stick her fingers in dykes. Like I have been telling others for years-and nearly EVERYTHING I have been telling others for years- is hitting the news EVERY DAY now.
And Mom, I know we disagree on this, but I thought the Constitution and due process, and law meant something! Now come to find out, it means nothing, because everything is “for the children.” (and here, and here, and here and everywhere). Mom, Hitler did the SAME THINGS, and told us that it “takes a village to raise a child,” and all that, and look how that turned out.
Now, people are waking up, Mom! After only 16 years of this crap, and our country going broke, and people are talking about RATS nibbling away at our Democracy, and eventually, we know these same will be nibbling away at our children as well, like this little ditty about RATS , from the Intercepts latest Edward Snowden document releases:
Mom- while the Intercept does an amazing job of providing the public with a glimpse of how our own governments are nibbling through the bottom of the huge DVIC trough, and destroying or selling democracy, they frequently miss how those who “come in the name of the children” are also those who go away holding the children by the hand. And, sometimes, the Intercept is ALSO a huge part of the problem, because it is largely becoming partisan media. Mom, I told them about these rats over three years ago, for example.
But, Mom, look at how hese billion dollar Military Industrial Complex subsidiary industries of the DVIC are raking in BILLIONS of dollars per year to “eradicate” problems that have existed since time began, and how they are using the good names of our children to do it. Just today for example, these vampires are reading this, and the many of my stories like this, that chronicles how these “good guys and gals” are subtly threatening our children with phony moral imperatives in the guise of the moral panic industrial complex, aka “Bernaysian Crisis PR”.
Which is why I also read Techdirt.com, by Mike Masnik, who invented the term the Streisand Effect, and his team of writers that covers news and tech news from a legal perspective. You might also remember Masnik as the originator of the Shirky-Masnik bureaucracy Perpetuation Principle as well.
And he, like me, is concerned about all the RATS that have streamed into America from Britain, after they were led here by NSA cheese and DVIC dollars.
Masnik writes about a program that the GCHQ used to undermine anonymity, privacy, and even redirect searches over the eMule and BitTorrent platforms, and selectively send targeted results to targeted persons IP’s (and these agencies-as I have noted EVERYWHERE, are redirecting ALL searches of EVERYONE most of the time) under the thin veneer of goodguyism and ‘saving the children’.
But the “human experimentation” didn’t stop there- not by a longshot, because then, the GCHQ would send the results to London Metro police and the FBI, who then participated in the activity in a variety of ways, ranging from political to other targeted activity, such as malware delivery (and all of this long before the Section 41 ‘changes’ became a “general warrant”-and all of THIS without Congressional oversight, or even judicial approval). And then, they sent their contrived ‘information’ and ‘anonymous tips’ down to the local level, where gang stalking takes place.
Over in the UK, GCHQ was taking much more proactive steps toward turning torrent traffic into both a weapon and a source of intel. “The page describes DIRTY RAT, a GCHQ web application used by analysts that at the time had “the capability to identify users sharing/downloading files of interest on the eMule (Kademlia) and BitTorrent networks. … For example, we can report on who (IP address and user ID) is sharing files with ‘jihad’ in the filename on eMule. If there is a new publication of an extremist magazine then we can report who is sharing that unique file on the eMule and BitTorrent networks.”
The RAT was also tasked with gathering info to be shared with law enforcement….
…A tool called PLAGUE RAT “has the capability to alter the search results of eMule and deliver tailored content to a target,” the wiki article states. “This capability has been tested successfully on the Internet against ourselves and testing against a real target is being pursued.”
So, Masnik is one of the few who is aware that our Democracies are crawling with RATS, and, so, mom, while I appreciate you letting me live in your basement all these years, I think a change is in order, because sleeping with rats isn’t my idea of America.
More from Masnik:
Released Snowden Doc Shows NSA Thwarting Electronic Dead Drops By Using Email Metadata
from the ‘just-metadata’-strikes-again dept
The latest batch of Snowden docs published at The Intercept cover a lot of ground. The internal informational sheets from the Signals Intelligence Directorate include info on a host of surveillance programs that haven’t been revealed by previous document dumps. Nor do they discuss the programs in full. As such, some of the information is limited.
One of those published last week mentions the NSA’s targeting of internet cafes in Iraq and other Middle Eastern countries using a program called MASTERSHAKE. Using MASTERSHAKE, analysts were apparently able to drill down location info to which target was sitting in which chair at the cafes under surveillance.
Further down the page [PDF], past this brief mention of a program discussed more fully elsewhere, there’s another interesting tidbit. Apparently, the NSA can suss out electronic dead drops using harvested metadata. (h/t Electrospaces)
[REDACTED] will be briefing on THERAPYCHEATER. This is a system that uses metadata analysis to detect and exploit the communication patterns of targets about whom the SIGINT system has no specific a priori knowledge. By identifying suspicious patterns in the access to draft folders of webmail accounts, THERAPYCHEATER will identify email addresses potentially being used in a form of covert communication known as a cyber dead drop. There are numerous examples in both SIGINT and collateral of terrorists using cyber dead drops to communicate operational information and plans.
In well organized assaults waged by governments that work in hidden capacities to enforce and socially engineer a society through constant attacks on civil liberties, we frequently find useful idiots who willingly place themselves as obstacles to free speech, and especially, as obstructionist forces that ‘steal time,’ aka ‘time-thieves.’
these are situations where people will often seek to preserve a problem or a falsehood, rather than recognize that it doesn’t need to be that way. There are lots of industries where this is a major issue.
-Mike Masnik of Techdirt.com
Organized gang stalking is one such case where we see this at work-how bureaucracies work in “the gray area of law and social oversight” to prevent insight. This is best embodied in the common phrase that appears in the OGS dialectic “what is hidden” which some use because it is a Masonic/other symbolic speech, while others use it to flaunt their access to the many hidden technologies that I document herein, as well as their ability to abuse others in this capacity. Obstructionism and OGS are Partners in Crime and Civil Consiracy
Techdirt.com does some of the most reputable, fearless, well written public interest journalism in the history of technology-and journalism. As such, while most MSM journalists cower(or put on their knee pads and slurp down some payola) in the face of the 72 Billion dollar per year NSA/CIA/FBI/DEA privacy rape machine, Mike Masnik, and the excellent writers over there have incurred their unfair share of detractors.
And, as can be predicted, some of those detractors are little more than liars and punks who live in their mothers basements, and guys like Shiva Ayyadurai, who claimed he invented email. And gay robotic toilet slaves, like Peter Thiel, the guy who worked hard to subvert ALL democratic liberty via the Palantir/CIA/Google collaboration. Notably, Thiel has skipped town, and run off to New Zealand, where he is hiding out, no doubt doing “special work” for his corporate and military and CIA overlords.
In the fight to demolish free speech, the MIC and its DVIC handmaidens use every dirty trick, every crooked backdoor trick to obstruct due process and civil rights; but also useful idiots like Thiel and Ayyadurai are the backup girls for the band of merry robbers who wantonly lie, cheat or steal to destroy the rights of others while getting filthy rich. They are the contrarians of logic, and the cock-block of free enterprise; and it begins with their pillow bitingly wimpish and vain, immature, fascist impulses, attacking pure speech and then, the free press.
SO it cannot be missed that these same are also on the forefront of the technologies that are currently accessing other peoples privacy via their “inventions, and imputing to those who they steal from “intentions” that are not only false, but aslo” classic Freudian projections, and in that light, they are also perverse voyeurs.
A world of smoke and mirrors indeed. From Techdirt.com, Mike Masnik scores a victory over Shiva Ayyadurai’s perversity, and his perversion and abuse of law:
As you likely know, for most of the past nine months, we’ve been dealing with a defamation lawsuit from Shiva Ayyadurai, who claims to have invented email. This is a claim that we have disputed at great length and in great detail, showing how email existed long before Ayyadurai wrote his program. We pointed to the well documented public history of email, and how basically all of the components that Ayyadurai now claims credit for preceded his own work.
We discussed how his arguments were, at best, misleading, such as arguing that the copyright on his program proved that he was the “inventor of email” — since patents and copyrights are very different, and just because Microsoft has a copyright on “Windows” it does not mean it “invented” the concept of a windowed graphical user interface (because it did not). As I have said, a case like this is extremely draining — especially on an emotional level — and can create massive chilling effects on free speech.
A few hours ago, the judge ruled and we prevailed.
Now- an object lesson in how all of these companies-and then, their complete subversion of intelligence agents and agencies have the ability to destroy speech at the switch. Look at this paragraph below:
The Shirky Masnik principle states that bureaucracies will d anything to perpetuate themselves-anything.. And that includes using total sh!tbags like Ayyadurai, or his counterpart in institutional sociopathy, Peter Thiel-who was so mad that he was outed as queer by Gawker media that he sued it into the dirt and put it o ut of business. to subvert the very foundations of both free economies, and free democracies.
Do you see the paragraph -how convoluted and broken it is? This paragraph was written as this blog, and the computer it is written with, came under ‘attack’ by ‘unknowns’ and the browser froze, and Tor reported multiple “j-script’ malfunctions. And this, just one day after the same browser, on the same computer, was crashed using an attack I cannot identify-one where the browser opened repeated multiple windows until it was useless ( I could identify it, but I am still researching that particular attack).
You see- speech itself is under attack, by the multiple agents and agencies I describe herein, and that attack is at the site of the speaker, which is me in this case, but this goes on all across democracies everywhere, as the United States, working with the Five Eyes Alliance, and literally HUNDREDS of other agencies, NGO’s target speech itself, online speech, and all other media with disruption campaigns; in this case at the site of speech itself as I type into this blog. I document this as well as note its psychological, and ‘real world’ effects here, but elsewhere too, I have records of these attacks, which are incessant. And in the “TI” community of gang stalking victims, this is an extremely common complaint, and dis-information agents can be found mocking TI’s with comments such as “yes, I have heard that TI’s frequently complain about sticky keyboards, e-mail theft, and computer hacking.”
In fact, hacking “target’s” is what the NSA and the rest are doing, as even the famous (and well funded) “OSI informers” has noted, alongside the fact that TI’s are also targeted with other nefarious attacks such as “porn deluges.” I have preserved a copy of the web page where OSI informers makes this claim, because frequently, the web gets “scrubbed” after I validate one or another fact or tactic of these hidden operators at our internet switches, and the thousands of programs that are trained on TI’s. Here is a snippet of “OSI informers”claim/advice:
Cyber Stalking or Cyber Harassment is a related group of harassing behavior occurring via internet/online. Cyber Stalking includes, but is not limited to; Computer Hacking, “Trolling”, Spamming (Often including “Porn Deluges”, Verbal Assaults, Character Assassination, and Impersonations of the victim. Online harassment is a plank of the harassment protocol. If you have a website devoted to Organized Stalking you may have people emailing you to flame you, or claiming that they are victims & asking for support with the intention of discrediting you.
Now- I will rewrite the paragraph above as it was intended, but I note that my computer literally heated up to an extreme degree, and I was forced eventually to crash the browser, reload, and change settings-this is what is called a “social engineering attack” where hidden operators force the user to change behavior, aka “behavior modification.” And I note that while my computer is less secure in this second attempt to write this post, I can write easily now. See how that works? Seeing any patterns yet? The Shirky-Masnik Bureaucracy Perpetuation Principle
The Shirky Principle forms the headline of the following piece of writing by Mike Masnik of Techdirt.com forms the Shirky-Masnik Principlestated as below describes how OGS online has become an institutional force,with offline consequences, and especially, how writers are targeted by morons with kewl toolz directed at us from ilitary bases, police and Fusion Centers, as well as NGO’s with dominionists, zionists, and Infragard rats working behind the scenes:
Institutions Will Seek To Preserve The Problem For Which They Are The Solution
“Institutions will try to preserve the problem to which they are the solution.”
Kelly calls this the “Shirky Principle.” To me, it calls to mind Upton Sinclair’s famous line:
“It is difficult to get a man to understand something, when his salary depends upon his not understanding it!”
They are not the same point, but they are related. In both cases, these are situations where people will often seek to preserve a problem or a falsehood, rather than recognize that it doesn’t need to be that way. There are lots of industries where this is a major issue.
To those who have written here to express your anxiety or to tell your tales of your adventures with OGS, thank you for reading. I hope you find this information helpful, and please pass it along.
To those who came here to experience the rare breath of non-bullshit in the OGS community, and to the researchers, criminal defense attorney’s and psychologists who have and will come here for research; my contact information is posted, and feel free to write.
And to those who feel that my opinions and commentary are slanderous, or libelous, or otherwise inaccurate, feel free to write, or rebut my opinions; and I will decide of corrections are needed or called for. And please note that nothing I have written herein was written with intent of malice or actual malice, except towards those who willingly and wittingly are part of the subversion of Constitutional liberty, or the harassment of vulnerable individuals, aka “TI’s”. To you I say there is a solution: why don’t you kill yourself, and, failing that, I will see your gang stalking corruption plugged asses in a proper legal forum of law; see you in court.
Update 08-27-2017: the disclaimer below is out dated. Due to new information and other factors, I have decided to continue to write here occasionally. And to the shills and those who participate in OGS, I seriousy ask that you stop writing. I am not one of “you” whatever “you” are.
Some 20-50 people per day read this blog voraciously, and it gets about 80 clicks per day. That means some 25-50 people are NOT being isolated, rendered suicidal or hopeless, bullied, abused, officially gas-lighted or deprived of awareness of this un-Constitutional Praetorian scheme. Best of all, they can fight back using peaceful means of civil disobedience, such as these here, and here
I provide this information as a tool and as a public service. Any actual TI’s can be contact me via my contact page. NSA/CIA/FBI/DHS/DEA/.mil/Israeli disinformation shitbags and shills- you can all go to hell, or Florida where your kind belong, game over.
However, due to the facts below, this author will no longer be writing ResearchOrganizedGangStalking herein, and will concentrate on other anonymous blogs:
When writing this blog-as I have demonstrated time and again on other blogs-my email accounts get hacked, and then, certain individuals/agencies then begin to read ONLY those materials whereby they can develop a “profile” of the author. And, as my Tor browser is crashed, it is in the least ONE perfect proof that both “targeted attacks” and “targeted speaker” are taking place, as they seek identifying data from the crash dumps, offline servers and Infragard infested nodes; and seek to subvert my privacy as an author via IP, machine name/AP/MAC addresses. Then, there are the multiple times I catch my browser being taken offline into a remote browser situation room, or otherwise having my machine Metasploited.
This blog repeatedly gets hits from the Five Eyes nations, but also and curiously, everywhere there is a CIA outpost or black site. Thailand, Pakistan, Mexico-everywhere the “drug war” is raking in black cash- and many others are actively peeking in and actively reading posts that document their subversive intentions and my academically sound theoretical proofs. Switzerland, the UAE, and others as well. An curiously, everywhere there is a Muslim who is being gang stalked, an atheist or secular humanist, or others targeted by the mystery cults of mystery religions, there is a reader who seeks to understand the OGS that is taking place in their life.
So, here below is a tribute for those who are real people with real troubles caused by the sad situation with secret practices, secret laws, secret courts and secret agencies experimenting on citizens in the grand subversion of due process outlined herein; and that at a time when the NSA/DHS/FBI/CIA have blackmailed our entire Congress and the courts into silence. I will let YOU, the reader decide which is which (I’m leaning toward number 2, but who knows, right? She never wrote back.)
And also, a thumb of my nose and a flip of my middle digit to the unaccountable anti-American LEO’s, intelligence agencies, punk ass security contractors, and other cowards who work in secret to subvert due process, like the LEIU’s and Infragard who willingly have sold the Constitutional due process, and whose chief goals are to invade privacy and destroy free speech, assembly, association, and due process online.
Lastly, a thank you to all of the LEO’s who understand this situation outlined above, and al the boys in blue who understand thatthere is a deeper level wherein even your rights are being taken away by the cowards mentioned above, and who might find value in the writing herein-and who genuinely seek to perform the duty to their oath to our Constitution, and fight against enemies both foreign and domestic. TI’s are generally NOT your enemy, but those who pose as them are. With that in mind, I get letters:
Comment from correspondent A: Me and my family have been targeted for many generation’s and daily attacked by the NSA DEW’s. Covert Electronic Harassment and Surveillance …and gang stalking. Listening to the government informant’s I know, that every track that goes down to the data-base is altered by the General or his staff. They arase the torture and the abuse to cover it up the attack’s so they can state that it was only mind control and brain washing but let the truth be known that the abuse and attack’s are very real and daily.
Mz. donna joy
Comment from correspondent B: I am a victim of organized gang-stalking and have suffered several horrific, near-death experiences at their hands. As a 5’2″ lady, a widow… they warped justice in the worst possible psyop way. This goes deep and somehow, they’re getting away with this in every neighborhood I’ve lived in. Neighbors are oblivious to it while they conduct air and ground surveillance with so-called less-than-lethal weapons. The use of psychotronics (brain mapping/control) is heinous enough, but when its done with planes and helicopters daily (as many of us middle-aged to now senior citizens) must live and slow die like this leaves me speechless. Tyranny is at our door–I consider this worse than Hitler because its done so covertly. Appreciate your research. I was Phi Theta Kappa when this came down on me chasing me out of my home till I was far away and broke, now. If we can’t get our family, friends (whom they turn against us) and neighbors (whom know something is wrong as I look horrible now) to notice these extremely loud (motorcycles/suvs and trucks) to notice, now does one awaken them to the totalitarian at their doorsteps. trust me I have tried. Appreciate your response and assistance.
My Reply: get an RF meter
Dear correspondent B:
Thanks for writing again. I wish you the best of luck in your struggle. And, I extend an offer to you: I have noticed that you are very involved in this topic, and for many years. May I ask what your degree is? You said you were Phi Theta Kappa. What is your credential? And your comments about “them” stalking an older lady are interesting to me in a personal way. Then, I will tell you a brief story about my experience.
Many years ago, I lived in a particular area i an artists warehouse/studio.
The DEA occupied the entire upper floor, and hosted interesting parties. The local LEO’s also frequently dropped in for frequent “who knows what.” And they were in league with the landlord, a man from Iowa who is/was a major Republican sponsor and supporter. He imported spice and had a maquilladora in Juarez Mexico at the height of the “Drug War,” and eventually sold that building in a sweet heart deal for millions of dollars in profit.
In those days I wrote a story online about how the “one thing a drug sniffing dog cannot sniff through” is cayenne pepper. So, to me, the marriage of Republicans, the DEA, and illegal drug running in an out of the way warehouse was interesting in the least. This warehouse, I might add, had special federal ‘zoning laws’ attached to it which made it a sort of ‘independent republic’ as much railroad owned property is governed by special laws, outside the local state or federal laws.
Well, around that time, I began to experience massive and regular warrantless searches, black bag jobs, break-ins and more on a regular basis. And one of the interesting things from that era was that my computer was jimmied and jiggled, and one time, my screen saver was altered.
In those days-the era of “Microsoft Longhorn” and the initial versions of XP (remember how they called us conspiracy theorists for claiming that “the gov’rmint” had hidden back doors to ALL of our data?) had as a screen saver an old man in a rocking chair with a hound dog at his side. Well, the creative geniuses from SOD, or TAO, or the local PD back squad- r other creative minds in the OGS community took that screen saver, and replaced the head with a picture of my face. At the time, I reported it to a psychologist, who took notes-I demanded that he specifically take note of that event.
And then, I showed other people, and put them on notice that I was enduring constant and regular events such as this. Witnesses, it turns out, are a great reality check-and the stories that I heard thereafter were quite telling.
So, your comment about getting old rings true- a component of this is indeed to bully a person until they are old. Very sick and twisted, but true.
Fast forwards to one day I discover that my rental properties are filling up with certain, specific types of people that all share locational and relational connections-and one of my tenants is a girl whose father was also the DEA. I had just been officially “pushed” into the OGS dialectic, and online, certain people were re-directing me to conversations where ominous threateners talked frequently about how the “gang stalkers will make you homeless”(asset forfeiture).
Also quite curiously, this girl-an artist-told me that when she was in Israel, she had the distinct feeling of being followed everywhere she went. That is called “Jerusalem syndrome” a curious disease of the Abrahamic-religion afflicted, and others who share the mental illness of religiosity, and the ancestor worship of dead middle eastern desert people.
Well, you can imagine-I have documented in earnest what OGS is for years before and since then, and with films and photos, check stubs, emails, rental applications, and the mapping of community and agency connections. And, all of this as a team of morons circled my house daily at all hours, and communicated directly, and on camera, with local LEO’s.
So-on that note- do yo have any evidence of your own? Have you purchased an RF meter to document the electronics? Without evidence, none of this holds water. In my case, I enlisted psychologists, social workers lawyers and journalists along the way.Then- today I find it quite interesting that many of the hits to my blog are from Thailand-where the CIA and the DEA run massive illegal wiretapping ad drug running operations. SO, not a coincidence at all. Related Blog Post: Since it was revealed that the APA and the CIA torture psychologists and other psychologists in general are in bed with CVE programs, and CIA torture- now is the time to ask: Is psychology suffering an identity crisis? Multiple personalities? Or have wee the peeple finally woken up?
Fight Gang Stalking; organized gang stalking self defense: Some in the tech industry have signed a petition and are taking a stand against the massive fraud that has been perpetrated by Google, Palantir, and other CIA linked, InQTel funded operations that destroy the most basic of human rights: the right to be left alone, in privacy; and every right that stems from that .
Here below is the petition, which over 2500 people signed in one week! Here is how you can help, and fight against this new, and horrific database abuse that leaves all of us exposed, naked against this vast bureaucracy, and targeted as individuals by unseen and unnaccountable entities. The Petition:
Write a list of things you would never do. Because it is possible that in the next year, you will do them.—Sarah Kendzior 
We, the undersigned, are employees of tech organizations and companies based in the United States. We are engineers, designers, business executives, and others whose jobs include managing or processing data about people. We are choosing to stand in solidarity with Muslim Americans, immigrants, and all people whose lives and livelihoods are threatened by the incoming administration’s proposed data collection policies. We refuse to build a database of people based on their Constitutionally-protected religious beliefs. We refuse to facilitate mass deportations of people the government believes to be undesirable.
We have educated ourselves on the history of threats like these, and on the roles that technology and technologists played in carrying them out. We see how IBM collaborated to digitize and streamline the Holocaust, contributing to the deaths of six million Jews and millions of others. We recall the internment of Japanese Americans during the Second World War. We recognize that mass deportations precipitated the very atrocity the word genocide was created to describe: the murder of 1.5 million Armenians in Turkey. We acknowledge that genocides are not merely a relic of the distant past—among others, Tutsi Rwandans and Bosnian Muslims have been victims in our lifetimes.
Today we stand together to say: not on our watch, and never again.
We commit to the following actions:
We refuse to participate in the creation of databases of identifying information for the United States government to target individuals based on race, religion, or national origin.
We will advocate within our organizations:
to minimize the collection and retention of data that would facilitate ethnic or religious targeting.
to scale back existing datasets with unnecessary racial, ethnic, and national origin data.
to responsibly destroy high-risk datasets and backups.
to implement security and privacy best practices, in particular, for end-to-end encryption to be the default wherever possible.
to demand appropriate legal process should the government request that we turn over user data collected by our organization, even in small amounts.
If we discover misuse of data that we consider illegal or unethical in our organizations:
We will work with our colleagues and leaders to correct it.
If we cannot stop these practices, we will exercise our rights and responsibilities to speak out publicly and engage in responsible whistleblowing without endangering users.
If we have the authority to do so, we will use all available legal defenses to stop these practices.
If we do not have such authority, and our organizations force us to engage in such misuse, we will resign from our positions rather than comply.
We will raise awareness and ask critical questions about the responsible and fair use of data and algorithms beyond our organization and our industry.
Who finances organized gang stalking, proof, George Soros, Goldman Sacks, Government Stalking.
“Who finances gang stalking?”
What’s the difference between 3 million and 4 billion dollars anyways?
Decorated intelligence officer William Binney built a machine to monitor the communications of foreign targets for just over 3 million. Then, he became a whistle blower when the NSA and the FBI targeted and harassed him– and they used “their machine” instead, which cost 4 BILLION dollars in prototype A, and it was designed to entrap the communications of EVERY AMERICAN.
And, they tossed that machine, wasted the four billion, and built a new one, which costs the taxpayer even more.
Their version of the great terrorist/badguy/activist/journalist/whistleblower/pedophile catcher machine (The TBAJWPCM72) costs the taxpayer between 52 and 72 billion dollars per year. And YOU pay for organized gang stalking every time you vote for security over liberty; your own silence over speaking up. And that isn’t counting the lawsuits that occur as a direct result of this “small town terrorism.”
Because of the hidden, well orchestrated and well financed occult (meaning hidden, and in this case,black budget) nature of organized gang stalking, where we see institutions, corporations, and “chosen individuals” like FBI Infragard agents and even Eastern Star freemasons like Nikki Giovanni inciting mayhem AS THEY WORK WITH POLICE, proof is very hard to find in the narratives of those who claim they are stalked.
Related Story: how absurd/absurdist id gang stalking? Have a look at the case of Michael Chadwick Fry in Texas, or Mathew Riehl in Colorado, where we see all the elements of OGS come together; slander campaigns, crybullying by women who use police to fo their violence for them, and especially note the “coincidental” numer 13 in most of these cases-and the FBI refusing to investigate these well documented features in EVERY CASE .
However, as you read through this blog you will see several well documented incidents of systematic, organized harassment, and few of the people who report this are crazy, or mentally ill in the sense of organic mental illness.
What the victims of OGS are, often times, is under extreme stress, and duress, and sometimes under a debateably real form of psychosis that has been described in psychology, but not specifically in relation to tareted individuals, until we see that psychology is complicit in cases such as Martha Mitchell, and Jean Seberg, and maybe even your neighborhood “delusional person.”. And no doubt many Targeted Individuals do have pre-existing or recent onset symptoms of mental illness, and those who victimize them are frequently the cause of it; because there is no palpable legal or psycholigical mechanism with which to fight pervasive, chronic, disprivating warrantless police abuse, and illegal, unconstitutional surveillance.
What must be considered is a mental health related question of “who finances gang stalking?” This question routinely comes up in many blogs and video’s, but until recently, few of the bloggers attempted to answer this question. So, what must be considered is the proven cases of gang stalking that I have written about so far. Other researchers can find other proofs, and balance claims of OGS against what is extant, but here below arjust a e a few I have covered up to now. Stockton city manager Bob Deis had the well heeled police/fire union move in next door to him and wage an endless campaign of noise terror, and more. This was financed by tax paying citizens, who can’t seem to find real work anywhere, while literal domestic terror is waged by public sector employees to protect their double and riple police and fire pension funds. The situation was so absurd that they even bought the house next to Deis to pad their portfolio. Meanwhile, like many cities across America that are being bilked in the “see something say something” make work scheme’s of these public servants, Stockton was then, and is now, totally broke and in massive debt. Bob Deis lost his job.
Related Story: Anti-fascist, acclaimed author, and freedom fighter Ernest Hemingway was said to be depressed, and even delusional before he committed suicide. He told friends he was being followed, harassed, and deprived of his privacy, by the pro-fascist FBI.
As history has shown, time and again,psycholigy/psycholigists collude at all levels to deny validation of patient complaints, and is an inneffective tool against an all-pervasive poluce state, as Hemingway was absolutely correct.
Anti-corruption blogger Jeff Pataky had nearly an entire police department ruin his life, and it was financed by local, state and federal taxes paid by citizens. And if I recall, he was caught up in a domestic dispute with his wife who later dated or got “extremely close to” one of her heroic saviors from the police department, which is a common theme in many of these cases.Makes one wonder- if you have nothing to hide, then….
And in these two cases alone, we see a pattern emerge which I will flesh out later, bt it appears that a mercenary element within police and public unions and institutions is blatantly abusing their power, and benefiting financially.
For example, when Rick Krlich and his wife Cindy bought a house in Hubbard Ohio, and the local police overlooked and even participated in what amounts to a ten year harassment campaign similar to the year that Bob Deis endured, and that waged by the local fire chief ;or the seven plus years that Jeff Pataky was targeted, these campaigns domestic terror have consequences and real mental health effects.
And I am certain that local residents aren’t always aware that this is the way their funds are being spent-and certainly each of these cities gets federal dollars as well, which makes these local occurrences a federal question. I mean-how many fires do they have in Hubbard Ohio? So I imagine those engines, and the fire fighters in them aren’t very busy with anything OTHER THAN stalking Krlich.
Well known whistle blowers William Binney and Kirk Wiebe, Dianne Roark, and many more were fired for blowing the whistle on NSA spying on American’s, and the agencies then set out to destroy them. After Binney tried to stop the NSA from spying on American’s while also saving taxpayers a few billion dollars– he was fired, stalked, and indicted for it after the FBI kicked his doors in and tossed his house. And all that because he tried to save the taxpayers a few billion dollars. Remind me again- who are the good guys?
So- when the researcher of organized gang stalking encounters the question, often written in a mocking tone on the extant blogs online, “but where do the gang stalkers get all the money??” it is usually “one of them,” mocking the impotence of the people to defend themselves against this new and horrific privacy rape, fraudulent spending, and military madness.
Of course, if you have nothing to hide-then let’s talk about who finances gang stalking, and let’s have a look at the way these massive black budgets are being spent. But stop trying to silence victims of it. Because it costs tax payers billions of dollars per year in waste, fraud, and abuse. Thin Thread versus TrailBlazer: a 4 billion dollar loss, at the expense of the taxpayers of the United States. Here is some of William Binney’s interview with Juan Gonzalez on NPR in 2012:
JUANGONZALEZ: What—did it have a name, the program? WILLIAMBINNEY: Well, it was called Thin Thread. I mean, Thin Thread was our—a test program that we set up to do that. By the way, I viewed it as we never had enough data, OK? We never got enough. It was never enough for us to work at, because I looked at velocity, variety and volume as all positive things. Volume meant you got more about your target. Velocity meant you got it faster. Variety meant you got more aspects. These were all positive things. All we had to do was to devise a way to use and utilize all of those inputs and be able to make sense of them, which is what we did. JUANGONZALEZ: And when they didn’t use your system, they—the NSA developed another or attempted to develop another system to do the same? WILLIAMBINNEY: Well, that one failed. They didn’t produce anything with that one. AMYGOODMAN: And that one was called? WILLIAMBINNEY: Trailblazer, yeah. AMYGOODMAN: Trailblazer, and— WILLIAMBINNEY: I called it—I called it five-year plan number one. Five-year plan number two was Turbulence. Five-year plan number three is— AMYGOODMAN: And Trailblazer cost how much money? WILLIAMBINNEY: That was, I think, in my—my sense, was a little over $4 billion. AMYGOODMAN: Four billion dollars. WILLIAMBINNEY: Right. AMYGOODMAN: But it was scuttled. It was done away with in 2006? WILLIAMBINNEY: Yes, ’05, I think it was. But yes, that’s right. And we developed our program with $3 million, roughly.
Decorated intelligence officer William Binney’s sworn testimony here.
While on the surface, a casual researcher of organized gang stalking might not see the correlation between police and fire departments, and bloggers, and whistle blowers, most legitimate alternative media does see it; and legitimate psychologists can make the link. Further, in the cases above, we see the pattern: whistle blowing or challenging officials; real estate investments, federal dollars,well connected and well organized groups in positions of trust, and narrative control- who can and can’t have a job in modern America to pay a mortgage; and then, massive fraud on the courts and the localities that have no idea this is going on, thanks to the collusion of some in mass media, influence operations, and psychology.
So, when a psychologist might say (as Dr. Michael Wood said) “well, the term itself doesn’t appear in the literature,” or that ” these people who claim this all show clear indicators of delusions,”you can point them here, to this one article, and work your way back from here. While each case may be different in it’s facts or in it’s “onset” it is indisputable that it is a real thing, and it is very well financed.
Meet Dr. Michael Wood, who writes thoughtful academic analyses about conspiracy theories. In a sea of conspiracy theorists and government disinformation agents, Dr. Wood is a rare, and respectable opinion as regards the “what is” of organized gang stalking. But he is incorrect in relegating it to the realm of mental illness, as much of the actual research demonstrates that organized stalking occurs and is under-reported, but also, because law enforcement collaborates with other institutions to perpetrate it, it remains hidden (here, here, here, here, and here).
The University of Winchester
Winchester SO22 4NR
Like Dr. Lorraine Sheridan, who has been widely discredited in the online community of targeted individuals, Dr. Wood seems to suffer from bouts of academia, and spells of full spectrum propaganda absorption but once you get past that, he seems to be one of the few rational minds out there who has addressed this topic of research, and he is clearly NOT one of the many CIA, NSA or other alphabet affiliated misinformation specialists with a “Dr.” before their name such as Dr. Robert Duncan, et al, who are as much informative as they are dangerous in the dialectic of gang stalking, as they are actively involved with mind control.
From Dr. Wood’s blog (which analyzes conspiracy theories from the perspective of a psychology lecturer).
If you’ve spent enough time on the Internet (or read the New York Times yesterday), you might have come across the phenomenon of gang stalking – the alleged stalking of particular individuals by organized groups. It might seem like gang stalking is a sort of conspiracy theory, and that we can maybe understand it in the same way that we think about things like the 9/11 Truth Movement and beliefs in UFO coverups. I’m not sure about this. There are some pretty major psychological differences between the two. It’s probably not helpful to conflate run-of-the-mill conspiracy theories, which are not considered to be an indicator of psychopathology, with gang stalking, which is widely considered to be the product of delusional thinking.
….follow the link to learn more.
Dr. Wood is a rare breath of fresh air in the smog that most gang stalking blogs are, and he has a solid background to interpret the data. However, as I stated above, he is also an academic with limited world experience, and as a psychologist, he is clinically trained to avoid the schizophrenic narrative, and the pitfalls of personal narratives, which I have always found to be one of the most interesting failings of psychology, because as much as it is expedient to put people into categories and boxes with labels, schizophrenia is one of the most mis-diagnosed of all mental illnesses.
Then, there is the Martha Mitchell effect, whereby people who describe real life experiences to psychiatrists get diagnosed as nutters, when in fact, they are often whistle blowers, and others with counter-narratives that challenge the powerful. Martha Mitchell famously told her shrink that the Nixon White House was corrupt, then, she was mis-diagnosed, and some have speculated that she was a victim of punitive psychology.
In the case of Dr. Wood’s analyses, he falls short as most of these pundits and bloggers do, because he simply does not appear to have had a life outside of academia long enough to get a glimpse of the real world.
And most interestingly, his work linked above, came out around the same time as the United States government and the British liberals were attacking “fake news,” and decrying all of the conspiracy theories that harmed their pet causes- “All men are rapists-but Bill Clinton is NOT a RAPIST!; while promulgating conspiracy theories of their own ( It was the RUSSIANS! They raped all dese’ emails and dese elections!).
There was a huge push in June of 2016 to discredit those who were experiencing an increase in political gang stalking, sponsored by neocon liberals and academics. In his work he cites one of the most widely discredited narratives ever written about organized gang stalking: the Mike McPhate hit piece that cites Dr. Lorraine Sheridan, a psychological specialist whose work indicates that she sees male sexuality as deviant, and the article which carries one of the most pathetic propaganda poster children for gang stalking ever-Timothy Trespas.
All in all, it’s hard to tell if Dr. Woods politics have clouded his vision, or if his academic training has clouded his ability to discern propaganda from real cases of real people who have been staked and abused. And I am not saying his politics are anything radical or even that I can define, but I can say with certainty that academia leans left, and also has the selective blinders of the AIPAC and other Israel forever war lobbies clouding their vision.
But my best guess is that his approach is the wrong one-for now, and Martha Mitchell is in full effect, and like it or not, academia is a huge cult.And certainly, academia is immune to the concept of “do no harm,” as pertains to propaganda.
On a bright note, he is quite well published, and his opinions appear open to dialogue. I suggest you follow the link above and read more.
It is widely documented in nearly every blog that discusses organized gang stalking that there is or has been police, FBI, DHS, or other agency involvement (much of it mis-attributed, as we see in the case of LEIU’s that they work in “darkness” and complicity with bad actors, across disciplines, and from within the hidey-holes of the “see something say soomething, even if you make it up” framework; and they do this with total impunity-even the FBI does not have access to the LEIU files*- and as such, like a gang or criminal enterprise itself), and all gang stalking is deeply rooted in deep state tools and database abuse where a targeted individuals data was gleaned illegally and without a warrant, and then used to “spook” them in a variety of ways, that any researcher of organized stalking is already likely familiar with. Why the NSA database abuse is far worse than anyone could ever imagine.
But others note that surveillance role players and contractors with the Department of Homeland Security are also clearly involved in these activities. So in my research, I use this as one measure of the veracity of writings and video’s that document it. Gavin Seim has many video’s where we can watch the process in action as chubby government workers hide behind “rules and reguations” that they pulled out of a hat, rather than laws and due process, which are written in our Constitutions.
In security and especially covert operations, those who deploy these tactics do not want them widely known. And articles that chronicle the stalking of Rose McGowan by an army of spies provides a template of the horrific potential to coerce and frame individuals when we allow a surveillance state to go unchecked, and unaccountable. The cases of James McClynas of Florida and Rick Krlich of Ohio are also notable cases that document the abuses of local syndicates and city councils that were covered by MSM.
So, to a researcher of organized gang stalking, you will note that blogs that discuss this, but also provide documentation of this are valuable allies to falsifiable evidence that it exists, as opposed to bloggers who write about aliens, the devil, and talking to dead people.
The trick for the researcher is to uncover which is which, and then, to weed out the blogs and videos that are classic misinformation and disinformation, as well those that are purely deep state mind control operations, as we see here . For example, most blogs and video’s that reference Directed Energy Weapons, and electronic’s that are bizarre; or websites that dabble in the absurdly paranormal, although some are just odd accounts of unique worldviews, sprinkled with paranoia. And-most of the accounts are written by these same DHS/private contractor/NGO’s/foreign spies, unregistered foreign agents, and other scumbags working under the “community policing” and CVE schemes.
But any cursory search of the how-to and the who-to-target of propaganda and influence operations can be found online, and compared to these many blogs and accounts of OGS. Here is just one of the many declassified Psychological Operations manuals of the CIA. And here is the famous Simple Sabotage manual as well. PsyOps is a major feature of these operations.
Other clues that blogs and videos of gang stalking are psychological operations is that they give patently bad advice, such as https://neverending1.wordpress.com ( a site that borders on psychological sadism), which once advised TI’s to put a jar of water next to an electrical outlet; or sites that are very well funded, as is the case with OSI informers and others. Interestingly, several of the commenters at NE1 are Lions Club members, and others who fit certain profiles, as I have described herein, and many of them have now deleted or closed their blogs since I wrote about them. Others have gone on to work in OSI-type disinformation honey net operations.
In my experience, my rough estimate is that some 5-25% of all blogs are actually people who are indeed targeted individuals (TI’s) and the rest are useful idiots (some 45-50%) who work in and around LE communities, or subsidiary to them; some 20% are actually agency or agency affiliated. And small number of them are mentally ill, elderly, or just lonely people trying to fit in (these also show up in many blogs, like the neverending1 blog).
FightGangStalking.com is one apparently decent site that seems to steer clear of honey-netting or “DEW” misinformation, as of 2/28/2017 (so far-many of these sites start out well, and then get taken over, or manipulated by agencies, as many of them are just entrapment schemes.) So, fightgangstalking.com, is notable among the many blogs because the writer only documents verifiable news sources and stories that any researcher of organized gang stalking can refer to as an official source. And, the writer is a former security industry worker.
Related: Here is a suite of free and pay-for investigative tools from Einvestigator.com that you can use to study your stalkers.
Also, and perhaps most importantly, the blog author gives credible background information about themselves, is open to dialogue ( we have exchanged emails), and does NOT allow a comments section. This last point is important because the great majority of blogs are a sort of free for all of madness, manipulation, mind control/influence operations, or honeypots whereby investigators entrap those who comment, or like Dr. Mike Wood’s blog on Conspiracy Theory Psychology, the comments eventually become disinformation outlets due to the well oiled crisis PR industry that I describe elsewhere.
The author of FGS is also familiar with the fact that much of gang stalking is perpetrated by security contractors and surveillance role players, and disreputable blackmaailers who work in any of themay “spy rings” that permeate the west today, likely funded by black budget’s and grants from the Department of Homeland Security and others. These quasi-investigations take on Orwellian proportions, and are highly reminiscent of the brutal psychological operations and blackmailing population control East German Stasi tactics of the 1960’s. But also, exactly like the case of Rose McGowan, who was followed, monitored, harassed, and manipulated across the globe for decades by an army of spies hired by Harvey Weinstein. Surveillance role players and gang stalking
In the same way that members of the organized stalking community raised awareness that the NSA and other agencies were breaking the letter and the spirit of the law by wiretapping them, all American’s now know tat TI’s were right-the NSA is tapping all of our phones. And worse, continuing the harassment of TI’s by distributing that data to 15 other agencies long before that was made public. As some of us predicted in 2003-4, it will NOT get any more Constitutional around here, any time soon. Police states simply don’t go away-because they work in secret, and against due process at every step, building traps over periods of decades in some cases, as we see with Rose McGowan, who was followed for three decades by private spies. TI’s are now warning that the Department of Homeland Security is using surveillance role players and cowardly, subversive, hidden armies of rats and snitches to target and harass them, and implicating the LEIU’s and others. This is not insignificant, because the DHS is actually said to be based on the model of the Stasi, and many today forget that it was a former Stasi agent, Markus Wolf, that was consulted to set up the DHS in its early years. From 2005:
Why would Homeland Security hire former Stasi chief Markus Wolfe and former head of the KGB General Yevgeni Primakov?
Is this part of the Bush anti-terror strategy? After all, Wolfe is the man who is credited with building up the feared East German secret police that was responsible for the disappearance and deaths of thousands of citizens. And, Primakov’s record is not any better. As skipper of the KGB he was driving force behind the machinery of state terror; a legacy that still has a chilling affect on many Russians.
Now, apparently, they’ve found a new place to hang their hats at Homeland Security. Or have they? Perhaps, the numerous stories on the internet are just fabrications intended to mislead independent research. That’s certainly one possibility. But, consider this; for those who have followed the activities of the current administration (the torture, the deception, the death squads, the destruction of Falluja) stories like this are difficult to discount. As a matter of fact, the hiring of Primakov and Wolfe seems fairly consistent with the long-term goals of the Bush team.
A large part of what the organized gang stalking dialectic seems to be is the result of psychological operations, and influence by suggestion. And some 70% of the blogs I have read talk about something called “electronic no touch torture,” which in my mind at least, is an accurate description of how one feels after their privacy is invaded, and or they are subjected to contact with agency level psychological operations. Every agency has a dirty tricks section, and they use them covertly, and judges and juries much less the average citizen are never aware they were there.
Even the world reknowned authorities, and pro -prosecution OGS denialists David V. James and Lorraine Sheridan on OGS agree that the mysterious and nebulous “the internet” creates an “ideological echo chamber,” i.e. that for some, the targeted advertisements, the targeted switches and targeted routers in targeted American communities who have ISP’s that target words, and CEO’s that target speakers, and hidden FBI Infragard agents feeding community policing that trickles in from the internet switch- and for targeted individuals “The internet creates a sort of ‘closed ideology echo chamber’ wherein people who share unusual beliefs reinforce each other’s thinking”
Which is, or course, by systemic design as we see the redirection method being used by “mystery money” funded startups to influence “jihadists” and the equally nebulous “right wing” alike via linguistic analyses, which is known as “persuasion,” and also “soft force mind control, and more. Then there is the direct access to any given targets mind via hacked cell phones, and then, hacked relationships-because that is EXACTLY what the Panopticon via products like Palantir, Moonshot CVE, and “captology” was designed to do.
Most sites and discussions about no touch torture are loaded at the front end and are themselves psychological operations. Butt of the few sites that are not, we see that it is a real concept, and practice.
Psychotherapist Otto Doerr-Zegers, who has treated Chilean victims tortured under General Augusto Pinochet stated; “The psychological component of torture becomes a kind of total theater, a constructed unreality of lies and inversion, in a plot that ends inexorably with the victim’s self-betrayal and destruction. …”
This is similar to the technique of “street theater” that mind control victims described in the Washington Post Magazine article. As torture victims are not mentally ill, mind control victims would not be mentally ill but rather have undergone and are undergoing a traumatic situation comparable to torture, such as the alleged illegal targeting with government mind control weapons.
“British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”
Imagine yourself sitting down to write an email, and all of a sudden your connection is cut. Then, you look in the body of your email and that masterpiece that you spent some 10 minutes writing to your aunt Alice has also and without explanation, disappeared-and NO COPY EXISTS in you drafts folder.
The first time this happens to you, you would be pissed-but if it happened dozens of times as you write critical stuff-emails to your doctor, a hot tip to your bookie(*jk*), or an even hotter tip to a journalist who believes in Constitutional liberty, you would begin to see patterns in your own mind-that your data is being messed with inside you.And, in fact, the internet has literally come into your home, and changed your behavior even before your fingers hit the keyboard-and altered your actions inside you.
This is what no touch electronic torture really is in real world deployment. And while it may seem insignificant, it has the cumulative effect over time of wearing a person down, letting them know that they are being watched, and that crucial and critical communications are being stopped at one’s fingertips. Important friends and associations are being destroyed each time you bring up these “odd happenings.”
And this, combined with other electronic no touch torture: your computer is hacked repeatedly, or flashing white screens; your cell phone apps turning your phone on and off seemingly at will, or the coincidental amplification of your conversation in your ear. here are literally hundreds of ways that a persons phone can be messed with, and TI’s talk about that too. Taken as a broader picture, it is the cumulative effect that does the damage.
Torture in any form is abhorrent, and never necessary, despite the claims of those who torture, who also happen to be the same people who have collected all of our internet data and are now culling through it with 17 other agencies for blackmail purposes. If I had told you this is what is happening even five years ago, you would have called me a nutter. And now, I bet, even you are afraid to say it out loud much less do anything about it. First they came for the crazy guy on the internet….
Using neuro-linguistic programming techniques as simple as Google auto search”suggestion,” and subtle verbal intimidation, as well as the deployment of various internet tricks, such as cutting off a persons ability to write blogs, or the interception of emails, much of what we see can be said to have the hallmarks of classic operant conditioning, combined with learned helplessness.
This last link is important because many in the dialectic feel as though they will never be able to overcome their situation. And, the one venue they have, the internet, is subverted at every point as heir blogs get hacked, and their emails intercepted, and so on. Some 50% or more of the hundreds of blogs I have read indicate that these things happen. So it could be an indicator that there is something afoot, as other online communities of bloggers do not report these things, dwell on them, or even infer that they happen.
So, even a casual investigator of this community will readily recognize this feature. And, there appear to be some blogs that use learned helplessness language, and others that d not. Simple phrases like oh, targets, just get used to it, Wherever we go, there will always be gang stalkers,” and so on. A great example of that is the blog https://neverending1.wordpress.com, where the writer never loses the chance to use negative language that reinforces the hopelessness of those who go here for advice.( I refuse to provide a link it is that negative.)
Extra Bonus: Here is the CIA page for psychological operations to control populations.
Sigmund Freud, in “Civilization and its Discontents,” notoriously classified modern men as “men of action,” and the intelligence agencies are really into that.
“The man who is predominantly erotic will give first preference to his emotional relationships to other people; the narcissistic man, who inclines to be self-sufficient, will seek his main satisfactions in his internal mental processes; the man of action will never give up the external world on which he can try out his strength….”
And, in the targeted individual community, there is no small irony that they begin to refer to themselves as “TI’s” when in fact the PsyWar equivalent is the “TA” meaning targeted audience.
Here from the CIA link above:
The intelligence officer is not inspired by the purpose of merely collecting and evaluating information or making analytic studies. His mission is not an end in itself, but a means to an end — a contribution to the defense and foreign policy objectives of his country. His work is therefore meaningful only to the extent that the information he provides is utilized through appropriate action. The individual operator’s performance, to be sure, does not lose merit if significant information which he acquired in due time and reported to proper authority is not acted upon; but the intelligence organization as a whole has failed to function effectively if the information it produces does not lead to some kind of policy determination or action.
I must at this juncture make note that in classic schizophrenia, there has always been the element that these claim that they are being followed or harassed by the CIA or the FBI. While organized gang stalking DOES have these claims within it, sometimes, even the paranoids are right, as we se now with the Palantir database which is equipped with artificial intelligence an predictive software, as well as a host of other means by which to ‘read a person’s mind’ and control or manipulate their online behaviors.
But it’s simply not fair to blame the CIA for everything, although it is convenient, and the idea is within the vernacular of most people.Since Edward Snowden revealed that the NSA is sweeping up the data of everyone, and all Americans as well, we are now able to track the basic flow of this data in news stories that document the reach of this grand psychological operation we see that the picture is much bigger, in much more horrible ways than the CIA could imagine all by its lonesome.
Here in this link are the tactics and techniques of guiding, misguiding, or poisoning the dialectic entirely, and then, disguising victims in the cloak of mental illness.Any researcher of organized gang stalking will find correlations between the phhrase “electronic harassment” and discrediting tactics outlined in the CIA manual. In the targeted individual community, the psy-war elements are everywhere.
The Five Eyes nations are all in on it, and Great Britain is one of the worst offenders, using the dirty tricks division JTRIG to compromise, blackmail, and discredit targeted individuals.
Israel has been getting ALL Americans data since forever, and waging hasbara and other psyops across the globe to enforce, reinforce, or otherwise promote Jewish religion and culture (the apartheid, mind control, old lady killing zionist version of it.)
From the Washington Post:
So- if those are “our friends”-our enemies must be real shitbags right? But even China has yet to catch up with us as comes to waging active psy-war on it’s citizens. We can read CNN as they try to downplay the fact that China is doing EXACTLY what the Five Eyes alliance is doing to suppress, control, discredit and destroy the free speech rights of western nations.Meet the CNN version of “the Great Cannon of China.”
But-does it hold up well against the Free Speech Steamroller that we use? Only time will tell-or, maybe someone can get standing to sue our agencies and see what they are really up to. I bet the Chinese are rolling in laughter as they watch how the agencies and law enforcement in general are using our Constitution as toilet paper.
Lastly, it cannot be understated that “the CIA tortured some folks.” And that the American Psychiatry Association provided advice as to how to do this. Meanwhile, their guys always get the help they need when they are done torturing others. I don’t mean to imply that the CIA and other’s are using the internet as a form of torture for some, but YES THAT IS WHAT I AM IMPLYING. But clearly, they aren’t the only ones doing it.
Stalin, Hitler, and their go-to guys in Psychological Operations, Edward Bernays (whose books lined the shelves of all Nazi propaganda officed)and Sigmund Freud, both of them Jewish, had nothing on our guys when it comes to propaganda, and mind control techniques; and China last I checked had no Manchurian Candidates, because as we see time and time again, only western nations and Israel are literally manufacturing terrorists.