ROGS Blog has been hit by a nation-state level attack, and is on hiatus for awhile

My blog was recently hit by a nation state level attack, which likely came from US police and military assets. Here is a bit about nation state level cyber attacks, from BAE Systems.

Yes, indeed, words do have consequences, and those consequences are usually Jewish-christian and other western flying monkeys and fanatics who work in policing, politics, or in the matrix of Infragard, Fusion Centers, Law Enforcement Intelligence, current and retired military, and others lobbying cyber bombs and real bombs at people who believe in civil rights, due process, and constitutional rights.

That attack appears to have started in Harris County, Texas (one of the attackers referenced that locality ), where George Floyd was recently laid to rest, after having been murdered by Minneapolis, MN cops.

And, shortly before that attack, this blog was visited from Kuwait and other places, where the US military and its plague of private contractors wage cyberwar on free speech, and democracies upheld by free speech everywhere.

The avid reader will take notice that ROGS (the writer you are reading ) has been writing about gang stalking in Minnesota, the same state where George Floyd was murdered. And, that.my writing goes straight to the heart of an issue that has now become a world -wide issue. So, never doubt the power of one voice (and a few excellent, now world-wide slogans ).

1592021382618

The evidence of that attack is collected, and incident reports too.

The attack was staged in various ways, and included:

* Social engineering exploits that exploited features of WordPress insecure comment feature. This attack also referenced a crackpot case I once covered, that of Sarah Degeyter

* email and phishing attacks

* DNS cache poisoning, which you can read about here which utility zed the now defunct address www.lanelwilson.com, (which can still be accessed in the internet archive, though the blog has been closed. )

The net effect of these attacks is that it slows down my writing process, but it will not stop me entirely.

And, as we see, ROGS writing is quite effective, considering the world wide protests that started in the same city where George Floyd was murdered by police.

So, adios, for now, and ROGS will continue “Bringing people together, ” in other ways, much as we see with the Floyd protests, which started literally, at my doorstep.

Signing out for now, but I will be back, I promise you, “bringing peace by pleasing the palette, ” of those who are ensnared and entrapped in the illegal policing tactics of western governments and their bizarre, racist, due -process free “organized gang stalking” dialectic.

In the meantime, entertain yourselves with this video, and the related links, from a restaurant owner whose store was right next to the place where,Derek Chauvin worked with his coworker, George Floyd and where Chauvin likely began plotting that murder, as he gang stalked El Nuevo Rodeo (and undeniably gang infested dancehall in Minneapolis ).

[youtube https://www.youtube.com/watch?v=Y3NcQ6VkCfk&w=360&h=203]

And, a second hand blurb from the “New Yarwk Times,” just for fun:

A bit from the HuffPost:

https://www.huffpost.com/entry/gandhi-mahal-minneapolis-protest-george-floyd_n_5ed142a8c5b6bc97e7682588

And, speaking of infiltration, informants, and spies in social justice, activist, and religious networks, have a look at this link, because religious gangs, and their affiliated NGOs are very real indeed :

Ruhel Islam

I guess theres more than one way to make it into the New Yarwk Times, Dr.s Lorraine Sheridan, David V. James, Christine Sarteschi, et al.

Next time you are tempted to open your (uninformed) yaps about gang stalking, and “are complaints of gang stalking delusional” maybe put your own vanity aside, and try this instead:

[email protected]

In the meantime, if you wanna actually help, DEFUND THE POLICE and dismantle the DHS /FUSION CENTER /FBI/LEIU /ATAP/NGO octopus of undemocratic, unconstitutional investigation, targeting, and extra-judicial homicide, because NONE of these local police act alone, without that type of support.

And, the simple fact is, that ROGS Analysis of organized gang stalking and the fact that even Google search results have changed dramatically since I began writing is spot on.

Gang stalking is: organized groups of current and former state actors doing illegal things, and targeting individual activists, dissenters, change agents, and others who challenge establishment power. These do this under the unconstitutional mob rule of “community policing ”, working with police, intelligence agencies, private contractors, and police affilliated non-governmental organizations such as the Ford Foundation, the Rotary club, Lions club, the Law Enforcement Intelligence Units (LEIUs ), the Association of Threat Assessment Professionals (ATAP ) etc.

Especially pernicious within the gang stalking dialectic is how state level actors spew total gibberish about aliens, Nibiru, UFOs, and other dubious crap about electronic brain beams online, in order to cover up state level police brutality, coercion, and manipulation of social discourse. Examples of that are plentiful such as Targeted Justice, and the US Air Force “OSI informers ”, which you can.contrast against cases like Ahmaud Arbery, stalked and hunted, and finally murdered by retired cops, their relatives, and others after a many years long gang stalking .

Hell, you can even have a look at my recent state level hack and the sunsequent state -level actors who tried to cover their tracks afterwards for evidence. The only “electronic weapons ” aimed at me that time were keyboards and internet cables, unlike this other electronic weapon called a “Taser”that was aimed at Ahmaud Arbery two years before his murder.

Y’all would do well to adopt it as a framework to investigate gang stalking complaints, from any angle, because unlike other blogs, ROGS provides evidence, using the scientific method. And, you can test and verify my results.

What is Level X thinking in the gang stalking dialectic? Revisiting the Cuban “sonic attacks ” with new evidence

Level X thinking, gang stalking, electronic devices, delusions v. Level X thinking

Because the modern world is overrun with mercenary security contractors, intelligence agents, and police agencies that defy constitutional law, there is always uncertainty, by design of the conditions of the modern police state, and that state defined by secret control, such as Fusion Centers, FVEYs world wide spying, and the hidden tactics of the innocently named tactics of “community policing.”

So, while we have been taught as western people that nations like Cuba are “totalitarian police states,” we have sat idyll as our democracies were overturned by undemocratic NSA spying, that leaks out across our nations and the world into hidden forms of police brutality that have yet to be defined.

What is a police state? Wikipedia gives us a few clues:

“The inhabitants of a police state may experience restrictions on their mobility, or on their freedom to express or communicate political or other views, which are subject to police monitoring or enforcement. Political control may be exerted by means of a secret police force that operates outside the boundaries normally imposed by a constitutional state.”

All over this blog, you will find empirical evidence that in fact and practice, my country, the USA, is no longer a democracy, but a police state by definition, particularly in that its domestic spying on.its citizens is occluded from our view

So,

Related Story: There is nothing democratic about modern due process violating “parallel colliding investigations.”

The origins of undemocratic and unconstitutional policing is disguised as “Countering Terror through Community Intelligence and Democratic Policing.” How police agents and agencies make work for themselves is the exact opposite of democracy, and modern western democracies policing tactics fit the exact definition of “what is a police state? ”

The suit alleges the Canadian government failed to properly inform, protect, treat and support the Canadians.

“Throughout the crisis, Canada downplayed the seriousness of the situation, hoarded and concealed critical health and safety information, and gave false, misleading and incomplete information to diplomatic staff,” the suit alleges.

During the past few years, the lawsuit contends, Canadian diplomatic families in Havana “have been targeted and injured, suffering severe and traumatic harm by means that are not clear but may be some type of sonic or microwave weapon.”

The brain injuries they’ve experienced, similar to injuries suffered by American diplomats posted to Cuba, are now known as Havana Syndrome.

Online “personas ” and what to do about them: gang stalking by AI assisted robots and targeted individuals online

Online “personas ” and what to do about them: gang stalking by AI assisted robots and targeted individuals online: a gang stalking conundrum.

Gang stalking is automated, but also, assisted by living breathing humans, who are sometimes paid players, and other times, mere useless idiots who play along with the Mockingbird Effect.

Here, have a look at how I was cyberstalked on Mike Masnicks (fabulous ) blog, Techdirt.com:

The gang stalking started around 2013, when I tried to raise awareness of organized gang stalking. Out of necessity for dealing with a troll farm friendly commenting sytem at Techdirt, I used different “personas” to manage a conversation, but without any software, or automated programs to assist me:

https://www.techdirt.com/articles/20131210/07555625519/lawsuit-claims-accidental-google-search-led-to-years-government-investigation-harrassment.shtml

I responded to a comment from a guy name George Boneyard, which I referenced here.

I was defending/empathizing with a guy named Jeffrey Kantor who had been targeted by a Google based algorithym, and that had served him bullshit results, and possibly, those results spoonfed to him after some online gang stalking by Fusion Center operatives and military contractors/AI programs that manipulated his search results.

Back in those days, AI gang stalking was new to the “normies ” whereas I first experienced online “redirection” after I reported on the first Somali manufactured terrorist in the City College News, Mohammed Warsame, who was an FBI snitch.

Redirection is where people search Google, or other search engines for materials and get different results, depending upon who is targeting the searcher based upon an IP address, as we see in the case of ADL online cyberstalking here.

So, the Jewish, parochial journalist (Mike Masnick, of Techdirt.com, for example ) who searches for information about “why do Somalis get…. ” blankety blank, will get Google results for:

https://www.somalispot.com/threads/why-do-innocent-people-get-punished.76125/

https://www.somalinet.com/forums/viewtopic.php?t=357328

And other such discussions, whereas myself, I got results sponsored by shitbags like the Anti Defamation League, and bbbb,,b other shit-persons. I also got Nazi logo laden websites (courtesy of the Bronfman klan and local Fusion Centers, working with Infragard shitbags like that colleges president) every time I searched forresults like, “human rights in Palestine” and so on.

And, besides the ibvious terroris recruitment pop -ups, and as in Arabuc tat I couldnt read, when I searched for information on Somalis, I got stuff like this instead :


Why do Somalis smell bad
?

And, occassionally, stuff like this:

https://www.mnopedia.org/somali-and-somali-american-experiences-minnesota

But always, reverting to this:

Etc.

If you guessed that not all searches online are equal, you would be correct. Because our filtered internet serves some of us, different results than others of us.

Now, take a look at how I predicted that:

1 the Redirect Method will be used by the Anti Defamation League to bully, target, and harass individuals

2 the Anti Defamation League (and Mike Masnicks in -house trolls ) bully commenters online.

Its a ROGS BINGO.

So, now when I go online, I practice persona management, and I recommend it to anyone who is being targeted in the Panopticon.

Read this article about how defense contractors use persona management to target us,

https://m.dailykos.com/stories/2011/02/16/945768/-UPDATED-The-HB-Gary-Email-That-Should-Concern-Us-All

and keep in mid tat its not just “the gubmint ” targeting you, but tese das, it could be racist groups like the Anti Defamation League and its octopus of NGOs, or even te Klan, and any of the militant feminist groups who work behind Sexual Violence Centers (also note the para-language involved in nearly all DVIC industries )

I will provide more context at a later date, with evidence.

The going dark problem and Silence on the Wire: silence is a two way street, and the case of Russian counter -surveillance of Americas political police using “low risk” tactical methods.

If you’ve ever sat still, in a quiet room, for a single moment, you know that there is no such thing as actual silence, because your own body makes noise.

“The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,”

Breath, and other organic, natural acoustic utterances or disturbances are a constant compliment to your presence. Then, there are the subsidiary, environmental and natural sounds around you, as the breeze, or the distant hum of nature in its various forms.

And so, this is the human baseline of silence, and it is a valuable starting point within which we discover the fatal flaw of all so called intelligence, and counter -intelligence: the arrogance of intel operators in assessing the value of data received or sent, because after disruption and beyond the human baseline,its all just “other ”noise. And noise then, becomes a two way street.


Related Content:
Free download of Silence on the Wire: Field Guide to Passive Reconnaissance and Indirect Attacks,by Michal Zalewski

So, in a free world, one would expect that the human rights and guarantees of “freedom ” would be maintained nearly religiously; as nearly religion itself, by those who draw paychecks based upon their oaths that they vow to uphold our constitutions.

But thats not what is actually happening in the west, since US, British, and the allied nations began their religion based, tribal-sectarian holy war that kicked off in 2001, and guys like me got to meet the “deep state ” head -on, after writing news stories without tribal -sectarian bias, and true to the form of the principles of journalism, and anticipating the Total Surveillance State.

 

Related Story: Take a look at how I was the first person in America to report on manufactured terrorism, and then, got years and years of black bag jobs,cowardly morons rifling through my belongings, and news stories stolen right out of my phone and email, and everything I describe herein AFTER that and more.

And look how that turned out for me, PERSONALLY.

Indeed, with the US FVEY spying,the accompanying “community policing, ” the western governments can no longer claim that they respect, or uphold anything resembling democracy backed by civil rights and due process procedures, much less freedom of any type.

So, it is here, where western governments have turned ordinary citizens into involuntary, non -consensual surveillance targets( aka Human Intelligence or, HUMINT )where the noise of ones own, voluntary silence is, “disrupted ” by the FVEYs data theft on every persons phone or computer and then, the exploitation of that data by intelligence operators to create what Dr. Lorraine Sheridan and others call “an echo chamber ” both online and off that is mediated by western extremist religious and political ideology, as we see here and here.

So, ROGS, the blog you are reading here, is what is called in psychology, a reaction formation, to the newly emerged total surveillance state, and the death of American democracy, which I once believed in whole heartedly, and fought for, very vainly, with well chosen words.

My country is no longer a democracy, insomuch as it ever was due to the multi-tiered levels of privilege, doled out to the select men and women, contrasted against the multi -tiered levels of slavery, peonage, and debt servitude that these others cast upon the poor, the dissenter or activist; the heretic and others who fall into the hidden slavery nets of any of the many sects and cults of organized religion, working through government apparatus both online and off .

So, this theological filtering, regardless of what cult, or sect, is also the baseline for all western dialogistics as we see in the sectarian targeting of men by known race -based operators; and in the resultant cult practices that follow, such as the un -naming of (primarily ) men in this example here and other examples I provide here at ROGS.

So, in such an environment of what is essentially the mass exploitation if individuals, and groups of individuals, one cannot act of actual free will, because these operations, and these operators, are in constant disruption mode. Its what their version of a society is.

In that light, there are many ways to use silence, and also noise to discern their capabilities, tactics, and methodology, AFTER the fact of them, casting you into their various webs of interaction FIRST.

Keep in mind that the pre -emptive, anti-democracy, anti-due process, sectarian secret police state justifies itself not from law, but from their version of tribal -religious and moral superiority.

In that world, its all binary, I /O data analyses: Kill or be killed; heaven and hell; black or white; Jewish or not Jewish; Republucan or Democrat woman or man, etc.

And it is that analyses which is its flaw, which is why they break and bend, and prostrate the law in gray area policing, aka “high policing ” aka political policing, as we saw with the al Ghazali problem.

So, no small surprise then, when ROGS was able to out a few Department of Defense affilliated persons here who targeted me on US soil as they worked ine or another angle of fraudulent FBI /DHS /Private contractor CVE program, or cult members who cyberstalked me on Twitter, working with Democrat party with operatives INSIDE Twitter monitoring my location; or most recently, yet ANOTHER Department of Defense affilliated, Brookings Institute person following my blog.

As I said: I know what kind of noise is natural, like how this humble electrician and merchant mariner was literally recruited by a gang strike force in LA, versus any of hundreds of bizarre DoD/DHS /FBI /NGO affilliated time wasters they toss,at me, like these guys here

So if little old ROGS, an American citizen who has never been convicted of any crime in any trial based in constitutional law, civil rights, and due process can be targeted and stalked, and harrassed by those I define, and name herein, wha else is goung on in western democracies that remains hidden?

And it is that last question that has,ROGS cheering for all the “bad guys, ” like Russia and China and even lil Kim in North Korea, apparently absent from an important meeting recently, lol. Because when “America, land of the free ” morphed into “America, just another police state, ” ROGS and hundreds of thousands like me got thrown under the bus.

Listen: China is thriving, and Russia protects Edward Snowden to this day, and Kim is no threat to anyone.

But I guarantee that CIA/DIA/NSA /FBI feeding down into “parallel colluding investigations ” and the subsequent constant surveillance of our webs of relationships single -handedly voids the constitutional compact, and the social compact as well.

So, I like to fight back by deploying counter -surveillance directly at those who point it at me, because my personal silence has been “disrupted ”. And in so doing, I learn a lot.

Here below, we see how Russians were able to anihilate FBIs urveillance teams privacy, and also how they were able to use this not -so -covert, sloppy, bizarre surveillance to gain valuable data about US security.

Which, would, under normal circumstances, inevitably undermine US security, if our own agencies hadnt ALREADY done that.

But in total surveillance states, security is ALREADY pre -emptively undermnied by tribal -sectarianism, and those who have deployed high policing on their own citizens .

The case of the Spies who laughed last, at Americans who use their own fellow citizens for “electronic target practice,” or:

FBI Follies, from Russiagate, With Love, via,Yahoo News Exclusive

Exclusive: Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil
Zach Dorfman, Jenna McLaughlin and Sean D. Naylor

Yahoo NewsSeptember 16, 2019

The discovery of Russia’s newfound capacity to crack certain types of encryption was particularly unnerving, according to former U.S. officials.

“Anytime you find out that an adversary has these capabilities, it sets off a ripple effect,” said a former senior national security official. “The Russians are able to extract every capability from any given technology. … They are singularly dangerous in this area.”

The FBI’s discovery of these compromises took place on the heels of what many hoped would be a breakthrough between Washington and Moscow — the Obama administration’s 2009 “reset” initiative, which sought to improve U.S.-Russia relations. Despite what seemed to be some initial progress, the reset soon went awry.

In September 2011, Vladimir Putin announced the launch of his third presidential campaign, only to be confronted during the following months by tens of thousands of protesters accusing him of electoral fraud. Putin, a former intelligence officer, publicly accused then-Secretary of State Hillary Clinton of fomenting the unrest.

It was around this time that Putin’s spies in the United States, operating under diplomatic cover, achieved what a former senior intelligence official called a “stunning” technical breakthrough, demonstrating their relentless focus on the country they’ve long considered their primary adversary.

That effort compromised the encrypted radio systems used by the FBI’s mobile surveillance teams, which track the movements of Russian spies on American soil, according to more than half a dozen former senior intelligence and national security officials. Around the same time, Russian spies also compromised the FBI teams’ backup communications systems — cellphones outfitted with “push-to-talk” walkie-talkie capabilities. “This was something we took extremely seriously,” said a former senior counterintelligence official.

The Russian operation went beyond tracking the communications devices used by FBI surveillance teams, according to four former senior officials. Working out of secret “listening posts” housed in Russian diplomatic and other government-controlled facilities, the Russians were able to intercept, record and eventually crack the codes to FBI radio communications.

Some of the clandestine eavesdropping annexes were staffed by the wives of Russian intelligence officers, said a former senior intelligence official. That operation was part of a larger sustained, deliberate Russian campaign targeting secret U.S. government communications throughout the United States, according to former officials.

The two Russian government compounds in Maryland and New York closed in 2016 played a role in the operation, according to three former officials. They were “basically being used as signals intelligence facilities,” said one former senior national security official.

Russian spies also deployed “mobile listening posts.” Some Russian intelligence officers, carrying signals intelligence gear, would walk near FBI surveillance teams. Others drove vans full of listening equipment aimed at intercepting FBI teams’ communications. For the Russians, the operation was “amazingly low risk in an angering way,” said a former senior intelligence official.

The FBI teams were using relatively lightweight radios with limited range, according to former officials. These low-tech devices allowed the teams to move quickly and discreetly while tracking their targets, which would have been more difficult with clunkier but more secure technology, a former official said. But the outdated radios left the teams’ communications vulnerable to the Russians. “The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,” said the former official.

A former senior counterintelligence official blamed the compromises on a “hodgepodge of systems” ineffective beyond the line of sight. “The infrastructure that was supposed to be built, they never followed up, or gave us the money for it,” said the former official. “The intelligence community has never gotten an integrated system.”

The limitations of the radio technology, said the former senior officials, led the FBI’s surveillance personnel to communicate on the backup systems.

“Eventually they switched to push-to-talk cellphones,” said a former counterintelligence executive. “The tech guys would get upset by that, because if they could intercept radio, they might be able to intercept telephones.”

That is indeed what happened. Those devices were then identified and compromised by Russian intelligence operatives. (A number of other countries’ surveillance teams — including those from hostile services — also transitioned from using radios to cellphones during this time, noted another former official.)

Electronic implants, Wikileaks Vault 8, victims of organized gang stalking, hive mind, and honeypits.

ROGS loves the Constitutional guarantees of due process, and ROGS loves America. I am pathetic that way~the grand American delusion is so appealing.
(Vault 8 is an inside joke.)
BUT: The DVIC is actually a war on speakers and words, and without a doubt, the first amendment itself is the target of neocon and tribal, religious interests, now interfacing with the massive influx of Saudi, and other nations cash flows, and the media narrative.
I have been gang stalked since the DVIC was birthed into our lives in 1993 ( the exact same year when the Anti Defamation League was outed as a domestic spy ring that sold out American activists) and became severely gang stalked after I broke a nation wide story in 2003-4 about how America’s agencies manufacture terrorists by occluding access to civil rights and due process.
To journalists, researchers, and others interested in answering the many questions that are presented in the “bizarre” online dialectic of gang stalking, here below is how the CIA (and every other IC agency, private contractor, and the FBI) uses the term “electronic implants,” which describes covert hacking techniques, and plausible deniability in exploitation of targeted computers, targeted computer networks, and targeted individuals.
Without a single doubt, this is empirical evidence of CIA/other IC/NGOs operations on US soil, and anywhere else where OGS is taking place.
And it single handedly validates the inherent mission creep of the WOT redirecting and exploiting domestic targets.

UPDATE 10-19-2019: Almost two years after I wrote this post, and became active online, the ADL implicated itself as actually deploying military psychological operations on target individuals, using artificial intelligence software called Moonshot CVE, which had previously been used in theaters of war; and, perpetuating negative stereotypes of Jewish people as mind controlling Svengalis.

1570435771780
Electronic implants and gang stalking, courtesy of Wikileaks, and Julian Assange, who is literally being isolated, and denied visitation from other people as I write this. And, the American/FVEY deep state has worked tirelessly to force Ecaudor to revoke his asylum.
Isolation, you will recall, is ALSO a major threat/complaint/”delusion” of targeted individuals.


RELATED STORY
:I wrote about the HIVE in coded language long before this story below became mainstream news. The reader can infer that writing openly about such things is dangerous, and also, ROGS personal writing style is somewhat coded for reasons I have explained elsewhere.

The Hive mind in the gang stalkung dialectic online, from Wikileaks.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.
…………..
And-I hope the dood doctors like David V. James, and Lorraine Sheridan-and certainly Dr. Mike Wood, dont get to caught up in the echo chamber as wasps and bees of all kinds swarm them for commentary in these matters.
But OGS is very real, and puts MHCHAOS and MKULTRA to shame.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

Delusions, poison, bizarre claims, and schizophrenic narrative in gang stalking: the case of DHS whistle blower Julia Davis

Delusions, poisons, poisoning, discrediting, counter intelligence, schizophreniform disorders, and targeted individuals of organized-and Irgunized– gang stalking.
In what many psychologists describe as delusional complaints of targeted individuals of organized gang stalking, the facts in each case are strikingly similar, frequently bizarre, and then, in some of the outliers, we encounter claims that TI’s believe they are being poisoned, have been poisoned, or have been threatened with poison.

Related Story: Have a look at how Israeli spies work in five person teams, and use poison, in this story</ from mainstream news sources, and this wiki from Infogalactic describing these five person teams too.
Then note the correlation between the assassination described in my story below, and note how a “
five person team ” bungled/allowed /participated in the Las Vegas shooting, where Stephen Paddock shot up a crowd of key influencers.

And yes, many drug  addicts, and mentally  ill people, AS WELL AS POLICE AND PRIVATE CONTRACTORS, AND THOSE WHO WORK IN THE USAF OSI INFORMERS, claim similar things, and we see tens of thousands of references to it in forums like this from Medawarscornflakes, a blog that provides highly reputable and interesting content and analysis, particularly having documented how retired FBI and other LEOs utilize OGS in real estate gang stalking..
But the differences  are  striking when we examine the “onset” of these alleged disorders, and even more striking when activists, journalists, and others encounter OGS, as we saw in the case of Minnesotas Electronic Peeping Toms and Tinas, as agents and agencies used over 180 police departments to stalk and harass Minnesota MSM reporters in a massive gang stalking that ended up in court.

You see, many whistle blowers and activists like Andy Ostrowski, and Rakem Balogun are suddenly stricken with a severe case of Organized Gang Stalking, just AFTER they reveal institutional corruption, or outrageous government conduct.
And others, who are connected to intergenerational organized crime figures who are FBI informants or agency targets, like Stephen Paddock and his brother, also seem to suffer OGS.
For instance, there are many strange anomalies in the ever changing narrative of the Las Vegas mass shooter Stephen Paddock, and he also believed he would be poisoned, or had encountered programming or had suspicions that such was  possible. There are literally so many holes in that story  that it looks like a pair of headless, fat  pig legs named BUCK TOOTHED AMY , wearing  fishnet stockings, and high heels, and a red felt lined tinfoil hat.
Then,  there  are the cases  where  alleged autistics were  contacted online by unknown parties, and  then,  who exhibited disorders  related  to  germ phobia, or  other “advanced sequalae” of mind control-like operations online. Most  famous of  these is  perhaps the Newtown shooter, who, like  Paddock,  was  smeared  with  the  label  of  pedophile after the fact, and  with disappeared  hard drives  to boot.
Military Psychological operations(PsyOps)in modern policing, with Fusion Center monitoring of individuals

Indeed, there is even a well known case in Oregon (and I have noted repeatedly here at ROGS that OR and WA state have extensive connections to OGS complaints ) where police, and others worked to gas light a fellow so badly that he believes his wife poisoned him.
His wife eventually holed up with the local police department, and he apparently lost some real estate. Google “poisonedbywife””  and gang stalking” or “Terry Wagar and  gang stalking” for evidence in that case, which, much like the case of  Lawrence Guzzino, deserves a  second look for  any civil or criminal defense lawyer to understand OGS.

Related Story: private contractors like Gavin de Becker that work with the DHS and FBI CVE programs are using harmful psychological oerations on targeted individuals, as discussed here in the official literature of the Association of Threat Assessment Professionals(ATAP), and noted by private contractors like,Jack Palladino (an ATAP member) whose company acronym is Psops.

The evidence, and  the case studies of organized gang stalking are EVERYWHERE in the news now, as this  new thing,  High Policing, aka political policing has taken root, as the Domestic Violence Industrial Complex (DVIC) and its little helpers in the information sharing environment,aka nation state blackmail programs works its mythology ever deeper into American culture in a “soft takeover”of our country by lies and half truths; but especially through lop-sided story telling that started in the era of VAWA,1993.
Its for the children,  they  say without irony, as the same banking interests that feuledtheeastern blocnations takeover work their magic-and their state sanctioned child kidnapping rings here now; that these  types will  do  ANYTHING  for  the children-and  often,  each child  taken  in to  state  care  nets those who facilitate  that, a one million   dollar  paycheck,  as social  services,  psychologists, police and  others  derive  income  from  these  schemes, and the federal power of cash to states that swell their foster care factories has incentived this behavior in the pseudo-feminist, DVIC baby farming era. 
This form of venture capitalism used to be called slavery when it was racialized here, or “white slavery” in the eastern bloc,or in Americas peonage and prison system during the heyday if Americas growing prison industrial complex, but today it crosses all racial and political divides.
The  boogieman,  it  seems,  is  always lurking anywhere  EXCEPT  in places  where  he  gets  hard  dollars-or federal grants as  there are documented correlations  between  homelessness of  targeted individuals, and  gang stalking too.
Then, there is the strange, bizarre case where a DHS whistle blower, Julia Davis, who has helped uncover emerging evidence that one or another element of the socalled Hollywood  mafia (Haym Saban, forex ample, isan Israeli), and elements in  deep  state  policing is implicated in some way or another with poisoning actress Brittany Murphy, whose father is an old mobster.
Get out the  ROGS  BINGO card in these cases, because counterintelligence gangstalking is literally~ LITERALLY~designed to “cut the victims throat with Occams Razor”.

Related Story: Right wing nut, uberzionist, Muslim hater,and and foam mouthed attorney Debbie Schlussel wages a disinformation campaign about DHS whistle blower Julia Davis, with video.

To understand how bizarre gang stalking complaints are, one must understand how bizarre counter intelligence tactics are, and then, to understand how the testosterone/progesterone charged DHS works against due process, actively occulting its methods, and skirting or flaunting the law and due process every step of the way, as we see in their training materials released by The Intercept, that this is their stated objective. Have a look through ROGS here at their  massive pre-emptive real estate  and  forfeiture racket that uses sex offenders and prostitutes to target real estate- search terms DHS-HSI, real estate.
Or,  Google dead Ferguson activists, who have disapeared in mystery suicides where they manage to start thei cars on fire, after shooting themselves in the head  or Google Gavin  Seim  and  informants  to  see  how  deeply  Americas  social  fabric of dissent,  activism, and protest  is moled by people with  hipster tats  and tactical beards-and ask: when did  the  welfare  state  turn into  a police state?
Yup, it was  when  these  tatted up Hegellian soldiers of the DVIC were raised up between 1993 and the  full blown surveillance  state of today.
Then, one must factor in how agencies are currently competing against each other as Americas political police compete for CVE funds, and the extreme lengths these go to to literally create terror-as is demonstrated by the case of a DHS whistle blower Julia Davis, who was “investigated” no less than 54 times over YEARS of time, BY the department she blew the whistle on, and whose home was invaded with a Blackhawk helicopter.
The  keen reader might recall that claims of being followed by helicopters are deemed “delusional complaints”by people like Dr. Mike Wood, and Dr.s Lorraine Sheridan, David V. James,  and social workers Christine and Liz all of whom are OGS denialists, who believe victims of gang stalking should be isolated (isolation is seldom ever/ NEVER a good or legitimate therapeutic remedy for any mental illness documented ANYWHERE except in discredited mind control and torture psychology of the D.E.Cameron era).
But yes, this is one tactical  assault in the No Touch Torture paradigm-you dont have  to believe  me though,  cuz Im just one voice- Google the following case below, and see  what  you think of “full spectrum dominance”of an individual.
Or, see if there are connections to radical zionism, and Anti Defamation League ideological and tactical alliances with Israeli secret police, as we see in case after case, such as the San Bernardino,Florida,and New Mexico shooters~indeed, nearly ALL mass shooters are targeted by right wing zionists at some point,and the FBI is fully complicit with them,with the now fired former head of the FBI James Comey once noting that he was in a love affair with one of the most toxic, sectarian racist organizations in the US, the Anti Defamation League, stating that he exchanges “love notes” and dossiers with them; and this was stated in major media.

They See Gangs of Deep State, DHS,FBI,CIA,DEA,NSA Illegality, working in the Gray Area of Law, and spitting on due process rights at every opportunity.
The Bizzare Gang Stalking Delusions of former DHS  whistle blower Julia Davis: poisons, mystery deaths, helicopters, organized crime, paranoia, and aliens-Gangs of Illegal Aliens and al Qeada at the Border, As the Mighty Wurlitzer Plays the Mossads Greatest Hits

From Wikipedia, the BIZARRE  facts of a well documented DHS gang stalking of one of its own:
….Bonner was informed that Julia Davis was not under investigation, he directed Department of Homeland Security’s San Diego office of Immigration and Customs Enforcement to investigate and discredit her. In a matter of weeks, Davis was subjected to 19 Internal Affairs investigations (that number later increased to 54 investigations). Her newly appointed supervisor, who previously served solely in an administrative capacity, proceeded to target Davis, along with other Port management. When it became evident that the DHS management intended to drive her from federal law enforcement through malicious investigations, mistreatment and harassment, Davis involuntarily resigned.
Davis filed a lawsuit against the Department of Homeland Security, which was determined in her favor. Judge Daniel Leach ruled that the government caused Davis to resign involuntarily, since no one would be able to continue working under such deplorable conditions. Federal Judge Leach also ruled that the government engaged in “illegal conduct” against Julia Davis. Shortly after she prevailed against the DHS in litigation, the agency escalated their reprisals by raiding her home with a Blackhawk Helicopter and a Special Response Team, with a total of 28 federal agents armed with assault weapons. In spite of not possessing a search warrant, the DHS spent over 1 hr. 45 min. searching the Davis’ residence. Julia’s neighbor, Matthew Judd, videotaped the raid. At the young age of 25, Judd mysteriously died several weeks later.

So,  exactly how bizarre is  the  situation where  the  DHS  is unnaccountable,  and  works  outside  the laws of due process? Have a look at  the death of Brittany Murphy, and the link to Julia Davis:

The DHS falsely claimed that Brittany Murphy provided a statement to support one of the government’s 54 investigations against Julia Davis. Brittany Murphy formally refuted the falsehoods leveled by the DHS and issued a written rebuttal in support of Julia Davis. After being named as a witness in Davis’ litigation, the DHS/ICE attempted to deport Murphy’s husband (fiance at that time) Simon Monjack. Murphy and Monjack reported being wiretapped and followed, including aerial surveillance with helicopters. In 2009, Murphy died under suspicious circumstances. Her husband also died six months later. Brittany Murphy’s death is currently being independently examined through the efforts of her father, as well as Julia Davis and her husband.

 
Yup. Threats of poison is a real  feature of organized gang stalking under an Israelified narrative. The recent poisoning of a Russian Colonel in London, and many other examples of Russians poisoned in London, has cast new light on intelligence  agency involvement in poisoning dissenters, and deep  state IC targets, but  the lil’ Mossadi  Jihadi among us- and in many online narratives  involving “sayanim,” poison is a feature too.
The Russian Colonel, it turns out, was a source for the infamous and  slanderous Steele dossier, according to Newsweek magazine, which claims that the Russians are blackmailing the American President with films of prostitutes peeing on him.
For my part, I hope these imaginary whores in the  fakenews dossiere were, like many Russian and other foreign prostitutes, lovely, skilled, hygenic, and careful whores, whose busy, naughty bits are well trimmed, and scrubbed. And, like many Russian  whores, that their pee was little more  than filtered vodka, or champagne. Also, hoping that they cleaned up after themselves, rather than leaving gross sheets behind for an under earning maid to clean up.
And regardless-it is appalling how the perverse left/neocon/progressives on one hand, derive power from the  many  LGBTVWTF and all of the odd practices that go on there, like mommies  who neuter and pimp their sons and play  dressup,  or as replacements for a man in the house; or chopping off the tips of young boys penises (circumcision) to delight of lesbians who practice vaginal fisting, and menstrual blood/sperm/feces tastings that goes on in that community, and on the other hand, attacks an elected free world leader for an imaginary”Trumped up” golden shower. And then, there is the feature if those dirty, dirty tefilin fringes collecting bacteria and spreading it in every news story. Thats a bit gross too.
So, bizarre and devoid of due process  is what the New World Udder is, thanks  to whol internet data  capture  of  all  western  citizens: and targeting begins  there, along with blackmail schemes, real estate racketeering, corrupt cops trying to out corrupt each other-and due process of law totally in the pusser.
And so, American/western  police  forces are undeniably at a cross roads, charged with a peculiar religious  fervor, due to the fact that they are wined and dined, and shown the contents of GODS little black book (which strangely resembles the dossieres of Stasi East Germany, compiled by the ADL just as the  DVIC era  was  birthed in 1993) and during privately  paid  junkets  to  Israel,  where  the ADL  trains in Ich, DU “counter-terrorism,”whis  is  by  all educated  accounts,  the creation and  manufacture of terrorists, EXACTLY the way British and Jewish interests created terror there in 1948  and in Gaza today.
In case  after  case  after  case  of  mass shooters, we see several common features that are seldom analyzed in the press, due to the religious  bent of those who-for some reason-control western media. I mean- these zionist terrorists are even calling each other anti-semites now.
Here- have a look at an assasination- and keep in mind ROGS many  thesis, and the ROGS BINGO  card, and have a look at the use of a five person security team here in the case of Stephen Paddock, and also here, where I mentioned these five person teams many months befor the Las Vegas shooting):

Five agents of the Mossad, Israel’s external intelligence agency, were duly sent to Amman, posing as Canadian tourists. They ambushed Mr Meshaal on a street corner and sprayed poison into his left ear, inflicting instant paralysis and, so they hoped, death within 48 hours.
Then everything went wrong. The Jordanian security forces responded to this brazen daylight attack, arresting two of the Israeli agents and forcing three to hide in their country’s embassy, which was promptly surrounded by troops.
Instead of escaping over the border, the Mossad team found itself trapped in Amman. Mr Netanyahu was forced to send emissaries to King Hussein of Jordan to plead for their release. The king, who was dying of cancer, drove a hard bargain. First, Israel had to supply an antidote to the poison that was killing Mr Meshaal. Jordanian doctors duly used this to save his life.
Then Mr Netanyahu had to go beyond a standard release of Arab prisoners from Israeli jails. He ended up freeing nine Jordanians, 61 Palestinians and – most painfully of all – Sheikh Ahmed Yassin, the spiritual leader of Hamas and Israel’s most hated foe.
Only then did King Hussein release the five Israelis. Mr Netanyahu, trapped in a debacle of his own making, found himself supplying the means to save Mr Meshaal’s life and allowing Hamas’s old mentor to walk free. (Google  this story for links  to how terrorist are  manufactured, then  targeted  and  assasinated in Israel.)

So,  once again, in the spirit  of peaceful,  non- violent, Thoreau styled resistance, I once  again leave you, the  reader,  with a set of facts that you can validate  with science and empirical evidence. But threats  of poisonings are ALL OVER THE OGS DIALECTIC, which is itself a psychological operation.
And, kids, whatever you do- remember: if they want to  frame  you,  they  have ten  thousand ways  to Sunday to do it. But  be  awsre  that  this  IS  how  they  do it,  and  learn  to  fight back using  peaceful,  non-violent resistance.
That works, sometimes, in Democracies.
Further Reading:
The Death of Dissent, and the Birth of Our Police State:how the Anti Defamation League, a tribal-sectarian, racist organization began the modern police and surveillance state in 1993, as they were revealed to be spying on over 12000 activists and organizations, and feeding information to police.
 

Gang stalking and Electronic implants: Here is how the NSA uses electronic implants.

I first experienced an electronic implant in or around 2004-5. Computer implants are real, NSA and other agency break-ins to hardware and software are real, and documented in main stream news.

In case you were sleeping during the takeover of the United States by the so-called “deep state,”(and it might be noted that both left wing AND right wing opinion leaders agree that the deep state, aka criminal syndicates in government, are real. And, the Harvard Law Review documents debt bondage, a shadow justice system, and a bizarre “deep state” second tier of the justice system that preys upon the poor in the USA, aka the collusion between corporations, international finance and its hydra’s and Octopussies of NGO’s slopping the troughs of American police and intelligence agencies such as the FBI, the CIA and the DHS, as the NSA spies on all of us and trickles data out to Fusion Centers, here is one of the phrases they use online to distort the meaning of the phrase “gang stalking,” and to obscure their illegal actions:
They stuck “electronic implants”in me!!!!!
1575275037998
Electronic implants are very real in many ways, but not the way they are discussed in the online dialectic of OGS. In fact, the use of the term as a biological implant is designed to obscure other more real implants, because in case after case ranging from intellectual property theft BY the state or a subsidiary corporate, private intel gathering firms like Facebook, or the host of DHS/FBI /ADL “contractors” who stalk political targets, to major spy operations-all deploy malware, spyware, and electronic code to infect the cell phones, computers, and other electronics of targeted persons.
1575275037998
And surely as we see in case after case of mass shooters, we see long term agency involvement in those peoples lives as predicate for these mass homicides, and quite frequently, contact with zionism, FBI careerist shitbags banking on the unnaccountability of CVE programs and their accompanying “parallel colluding investigations” aka gang stalking,  and Jewish/zionist Supremacy in college settings, as we saw with the recent Texas cases, and dozens of others ranging from Stephen Paddock, to this guy here, Mathew Riehl, an attorney who himself ranted AGAINST Nazi’s and the Eastern Bloc Judenrate’s favorite go-to pundit, white females, before he was shot in cold blood in Colorado after invoking his Constitutional rights to be served a warrant before he is gunned down in his own home by Israelified “Ich, Du” Buberism and Hegel, in a steroid can.

Related Story: The Doctrine of Superior People-How a racist and actual Cabal of misanthropes murder with impunity, wage slander and disinformation, steal resources, control cultures, buy police forces cheaper than dime store drag queen lipstick, and get away with it, century after century-and blame it all on YOU!

And dozens of other well documented abuses of databases, and actual electronic snooping and hacking such as the Minnesota cases of reporters stalked by hundreds of NGOs/AIPAC/federal dollar/DVIC funding related stalkings- to cases of journalists like former CBS investigative reporter Sharyll Atkisson are sabotaged and spied on by political police (the FBI, DHS, et al are merely that), we do in fact see electronic implants as part of the illegal Constitution defying nature of the FISA court coup, the DHS sectarianism,  and the attendant cowardly conduct at the SCOTUS.
As I have noted, my personal circumstances indicate that I have been targeted by multiple cause based/ religion based/ and other stalkers for decades, because I defy their mystery cults and religions-but also because I refuse to be circumscribed by their un-Constitutional gray area policing methods, and have been a first amendment fighter and more for decades (Here’s lookin’ at YOU Phil!)
I first experienced an electronic implant in or around 2004-5, as progressive organizations and institutions ranging from colleges, to state agencies and their attendant database abuses worked to frame me/harass me/ implicate me/ cause me to be “flipped” as a useful idiot to their political causes, or otherwise charged criminally in a variety of ways.
There I was, sitting in a college newsroom, when the computer redirected, all by itself, as if a spell had been cast upon it! To Nazi-land!….an imaginary place created generation after generation by the SAME FOLKS, as international bankers create, and then gut local economies.
But what really mattered then more than anything, was that they attempted to defuse my activism by following me around with nebulously middle eastern photographers, and tried to neuter my ability to have political effect. And what an effect!
Only lately is MSM talking about how a militant, AIPAC financed zionist sect of rapists and baby killers has taken over our airwaves, and purchased our police cheaper than donkey-dick-meat in a Mexican strip bar. Its an actual multi-billion dollar industry,where some-like the famous case of the Jewish nazi Frank Collin play both sides of the drama,and get paid in each role.

Related Story: Why has the American Civil Liberties Union(ACLU)dropped so many free speech, assembly,association, and privacy balls in the last decades, despite having ample funding, and amplecauses to challenge FISA courtera NSA spying? The answermughtbe: the same answer we always come back to, which is “why is the case of Frank Collin~nee~Cohen, the famous Jewish Nazi of Skokie, IL,revered as a victory forfree speech, when so.many other cases(like prisoners reading materials) NOT heralded,or defended by this group?”

Well, at least Marcy Wheeler sees the utility of the word “targeted” now, and how it pertains to individuals, despite her emergent socialist bent (oh, those poor deluded young people, dont they know thatthey are useful idiots for the other four tentacles of the Bilderbergtopuss?…) And the Intercept-despite its ADL sponsorship, occasionally takes on organized gang stalking in one way or another-especially the manufactured terrorism parts of it, as these cases-case after case after case indicate that OGS is in fact a precipitator, and NOT a mental illness at all. Get out the ROGS BINGO card!
See the source image
And while this benefited a few people in the short term-like the bald headed AIPAC sponsored college president, a notorious AIPAC shill and an American Studies professor/rat whose favorite read then was “Blood in the Face” by notorious James Ridgeway ( a likely informant), and a handful of dirty cops whose testosterone outweighs their shrinking testicles- in the wider dialectic.
And, it revealed to me that the facts I put forward herein are true and replicable elements of how the political processes of America are entirely broken-but also how a lawsuit could begin to challenge these practices. I mean- a few militant armed American neo -Nazis/alt-Rightists/bad-guy-racists-du-jour (those who aren’t Jewish in the first place, like the famous Nazi of Skokie, Frank Collin, ne~ Cohen, or who aren’t working for the agencies, if any can be found) have NOTHING on people who can purchase the American police cheaper than trailer park trucker meth made out of truck-stop pep pills.
But actual electronic implants aren’t anything like what you read about online, and anything to the contrary is pure insanity. You see: agents of the state and its Israelified, racist, zionazi sponsored spy aparatizionazi sponsored spy aparati literally gave me a computer that phoned home to a local political precinct, several political organizations in a certain state, the local police department, and computer servers located curiously between a college and these various agency operated and  maintained computer main frames.
And THOSE main frames were situated curiously close to SEVERAL of the above named agencies. They were literally within blocks of each other, as is the case with most cities and towns across America. But, of course, much of the evidence of THAT disappeared in a burglary in 2009, which I have documented elsewhere.
Well- of course I sabotaged the crap out of their sooper seekrit recruitments, entrapments and implantations, much to their chagrin, and found friends who were less crappy than them. And here below is how they were using implants then, but only I and a select few others knew this, and many of those are now deceased, distanced and afraid, or otherwise co-opted. And, my discovery THEN is when the break-ins to my homes began in force as well, because I laughed in their faces, every time.

How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

“Equation Group” ran the most advanced hacking operation ever uncovered.

In an exhaustive report published Monday at the Kaspersky Security Analyst Summit here, researchers stopped short of saying Equation Group was the handiwork of the NSA—but they provided detailed evidence that strongly implicates the US spy agency.
First is the group’s known aptitude for conducting interdictions, such as installing covert implant firmware in a Cisco Systems router as it moved through the mail.

Second, a highly advanced keylogger in the Equation Group library refers to itself as “Grok” in its source code. The reference seems eerily similar to a line published last March in an Intercept article headlined “How the NSA Plans to Infect ‘Millions’ of Computers with Malware.” The article, which was based on Snowden-leaked documents, discussed an NSA-developed keylogger called Grok.
….read the full article on the NSA’s 14 year hidden domestic spy operation here.
Gray area policing, aka “high policing,” and Grayfish computer intrusions
<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

 
Well, anyways- for the researcher of organized gang stalking, the legal defense counsel or civil litigator who encounters the “gang stalking dialectic” or one of its many actual victims-and for the sworn *cough, cough* peace officers whose goal is to uphold our law and our Constitution-I suggest you have a read through that article-because now, other nations are peeking in here, quite routinely-and some of THOSE are peeking at you as you peek in at my writing.
And, for those who I have named herein-I suggest you keep your eyes open at night, because the moon near YOUR house will be getting brighter. A LOT brighter now.  Bright enough to encompass whole families.
Try not to see patterns, though….and maybe, watch your back, too. Apophenia, and all that kind of makes life hard, if you know what I mean. And certainly, that trick you played on Sharyll Atkisson wasn’t funny. Yup-I hear gang stalkers want to make you go broke fighting for your rights in courts that have deaf ears and blind eyes.

Six codenames

In all, Kaspersky has tied at least six distinct pieces of malware to Equation Group. They include:
EquationLaser: an early implant in use from 2001 to 2004.
DoubleFantasy: a validator-style trojan designed to confirm if the infected person is an intended target. People who are confirmed get upgraded to either EquationDrug or GrayFish.
EquationDrug: also known as Equestre, this is a complex attack platform that supports 35 different modules and 18 drivers. It is one of two Equation Group malware platforms to re-flash hard drive firmware and use virtual file systems to conceal malicious files and stolen data.
It was delivered only after a target had been infected with DoubleFantasy and confirmed to be a target. It was introduced in 2002 and was phased out in 2013 in favor of the more advanced GrayFish.

GrayFish: the successor to EquationDrug and the most sophisticated of all the Equation Group attack platforms. It resides completely in the registry and relies on a bootkit to take hold each time a computer starts. Whereas EquationDrug re-flashed hard drives for six models, GrayFish re-flashed 12 classes of hard drives. GrayFish exploits a vulnerability in the CloneCD driver ElbyCDIO.sys—and possibly drivers of other programs—to bypass Windows code-signing requirements.

<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

Enlarge/ The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code (“blue pill”, “red pill” – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly “swallows.”The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.

GrayFish is the crowning achievement of the Equation Group. The malware platform is so complex that Kaspersky researchers still understand only a fraction of its capabilities and inner workings. Key to the sophistication of GrayFish is its bootkit, which allows it to take extraordinarily granular control of the machines it infects.
“This allows it to control the launching of Windows at each stage,” Kaspersky’s written report explained. “In fact, after infection, the computer is not run by itself anymore: it is GrayFish that runs it step by step, making the necessary changes on the fly.”

Fanny: A computer worm that exploited what in 2008 were two zero-day vulnerabilities in Windows to self-replicate each time an infected USB stick was inserted into a targeted computer. The main purpose of Fanny was to conduct reconnaissance on sensitive air-gapped networks. After infecting a computer not connected to the Internet, Fanny collected network information and saved it to a hidden area of the USB drive. If the stick was later plugged in to an Internet-computer, it would upload the data to attacker servers and download any attacker commands. If the stick was later plugged into the air-gapped machine, the downloaded commands would be executed. This process would continue each time the stick was switched between air-gapped and Internet-connected machines.

Kaspersky Lab

TripleFantasy: A full-featured backdoor sometimes used in tandem with GrayFish.

Want to know the real reason the “deep state”(aka AIPAC sponsord organizations, racist sectarian political factions that hide behind NGO’s, and of course, every other American “law enforcement agency”  is at war with Kaspersky? Read the full article!But I for one, am not scared of the Chinese, or the Russians taking over anything.
Hell, I will show them to your door;-)
Related Story: That time-just that ONE-where I was approached by someone from Vegas who knew about these hacks, and wrote to me here at ROGS.

Have you noticed the CIA listens in to key discussions online?

The headline up there is an inside joke-it came from inside my head. You see, lot’s of people think that sooper seekrit agencies like the CIA listens to us all. But that’s not true! That’s crazy! And worse- a “potentially dangerous tribe of troubled minds” in the organized gang stalking online community are starting to talk about their troubles online! They must be stopped!
But the truth is, the CIA listens to some of us, more than others of us in this modern Operation Gladio/aka CHAOS. And: the star chambers wage battle between six pointed stars versus five pointed stars, and MORE CHAOS!!!! With some THIRTEENS thrown in to the lions den (lions are seldom reported to wear high heels, but there are exceptions. Like when the rotary wheel is used as a form of domestic NTT, and Mooses and Elks and Lions Bears conspire in High Heels Policing. Ooops. Bears are Russians-never mind)
Related Story: The Privacy Raping Boondoggle That is the NSA/FiveEyes-Israel (New Zealand) data theft pipeline. What’s in a name? The FOUR MILLION DOLLAR Thin Thread versus the FOUR BILLION DOLLAR Trailblazer.
And William Binney, who recently sat down with the CIA director, is one of those “troubled people.” He has even lent his name to the targeted individual community, to investigate gang stalking. Yeah, for real.
And the Washington Post-one of the deep states favorite places to take a leak-say’s “Binney is playing with fire!” Let me know if that sounds like a threatening/threat narrative laden headline (does the use of THAT word up my DHS “threat matrix score?”)-because that could indicate paranoia, and we would have to get you some mental health treatment. Maybe, the CIA’s Mormon torturers, Mitchell and Jessen could take a whack at you in a black site, and get YOU the help YOU need! Because psychologists are in on it at every level-to help you, of course.
Here-let’s have a look at what one of the Rubin Klan have to say about that meeting (you might start to see patterns in journalism when people who are in the Klan of Rubin show up pin a narrative. Here-look at this Rubin sand-witch- a serial rape hoaxer):
William Binney About to Get Tossed Into Sheol!!! According to Jennifer Rubin
My Post colleague Aaron Blake reports:

The Intercept just broke a pretty big story: CIA Director Mike Pompeo reportedly met with the purveyor of a disputed theory about the internal Democratic National Committee emails that were released last year — a theory that runs counter to the intelligence community’s own long-standing conclusions about the matter.
It’s not the first example of Pompeo doing something that has been put under microscope. But there is a common thread running through just about every example: Pompeo doing and saying questionable things involving Russia — and those questionable things tend to lean in a pro-Trump direction.

I still remember when “those people” said the “deep state” was a conspiracy theory-do you? Yeah, and now look-Google has 42 MILLION results for that exact term. Sorry, Dr’s Mike, and Lorraine, and David- but the troubled minds tribe is growing! And- deep state is really a code word for “traitors.”
And even our own government has noted that SOMEONE likely has an actual sound cannon that was used on our diplomats in Cuba. Never mind the narrative distortion that has gone on since this story broke-because “webwashing” is a real thing.
Ever notice how the things I write about here at ROGS happen in “real news” shortly after I get on the case? Yeah-it’s a pattern-my long term case of apophenia following me around like Gloria Ghost. You might have forgotten Gloria, so here is a picture of my damned sell in dis’ dress:

rabbit
This is my imaginary friend, Gloria Ghost, the scar faced bunny. Only I can see her-she’s totally in my head. Psychologists tell me it’s apophenia. Some people say Gloria is full of sh!t, but I always correct them, and let them know that it’s not sh!t-it’s dumpsters full of garbage called a “dossiere'” with augmented reality at the internet switch, and recycling of old, tired tropes and narratives of moral panics dating back to 1913. Gloria is Edward Bernay’s favorite daughter- he lit her on fire and called her a “Liberty Torch.” Poor poor Gloria.

Well-who knew? My old neighbor Doug’s friend Pompeo called one of my favorite whistle blowers, William Binney into his star chamber the other day-no kidding. And I’m pretty sure that it was Doug who made it happen (Hi Doug! Where dd you disappear to anyways-and was REAL ESTATE involved?). So, I think now is a good time to revisit my “theory” of the horsehair worm in the crickets head, which I call “memetic neuro-fasciitis of the mind.”
Or, as you know it “the NSA data entrapment scheme that targets ALL American’s and uses the collected data to steal elections by harassing, manipulating, and “no touch torturing” political opponents of the deep state (aka the “gay mafia”) and so on.
You might remember Bill Binney as a true and real American Hero who built a sooper seekrit internet email and phone call interception machine back around 2001, the goal of which was to capture intelligence on FOREIGN spies and bad guys. But because his machine respected our Constitutional rights of due process, and was extremely cost effective, coming in just under FOUR MILLION- he was fired, and the NSA built a FOUR BILLION dollar machine instead, and targeted AMERICANS and politics. Then, they tossed that machine in the dumpster, and built one that cost 72 BILLION per year.
Then, the FBI kicked his door in to shut him up from talking about it. You can beat the charge, but you can’t beat the ride, they say.
Well- how else to build and enforce, and police, and re-police a narrative that demands a climate of domestic terror??!! And how to get more monies for all those helpful, and hungry hungry hungry DVIC Gloria Bunnies in high heels? I have an idea! How about we AMERITHRAX the crap out of the narrative? Yeah! Go team black/red! Here- from Washington’s bloghave a look at the AMERITHRAX hoax, which claimed the lives of five American’s.
Good Ol’ FBI-I guess every totalitarian bankster state needs a domestic political police to suppress, intimidate, bully, frame, and harass journalists and dissenters and writers and save cute puppies and all that- to save them from those who break into our Windows 10 to get a grab at our kids, or wage years long black bag jobs. I mean-Hitler had the SS and all those brownshirted patriots stalking for Der Muterland, and Stalin had the Cheka and the NKDV, and who can forget how well the Stasi worked in East Germany as John LeCarre’ wrote about folks who tinker around behind the scenes and exploit the narrative itself(or whose asses get fatter by the day counting beans in the DHS right now)!?
Well anyways- if you have been following my writing for the last few years before this blog, you will see I have chronicled these deep state “disruption campaigns” since around 2004. Yeah- not a profitable business model, that’s for sure. BUT: a very important check against the balance sheet which is always hungry hungry hungry! Checks and balanceslike alternative media and blogging– are the thinnest and most fragile threads that sew our democracy together, so that those who would-and can and do-tear us apart don’t get their way.
Here’s a bit from the VIPS memo, which is a complete refutation of the DNC “Russian Hacking” narrative, which documents INSTEAD a “someone most likely copied the data to a thumb drive” narrative (maybe the drive had a case of bad USB??):

MEMORANDUM FOR: The President
FROM: Veteran Intelligence Professionals for Sanity (VIPS)
SUBJECT: Was the “Russian Hack” an Inside Job?
Executive Summary
Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computer. After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device.

Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack. Of equal importance, the forensics show that the copying was performed on the East coast of the U.S. Thus far, mainstream media have ignored the findings of these independent studies [see here and here].
Independent analyst Skip Folden, who retired after 25 years as the IBM Program Manager for Information Technology, US, who examined the recent forensic findings, is a co-author of this Memorandum. He has drafted a more detailed technical report titled “Cyber-Forensic Investigation of ‘Russian Hack’ and Missing Intelligence Community Disclaimers,” and sent it to the offices of the Special Counsel and the Attorney General. VIPS member William Binney, a former Technical Director at the National Security Agency, and other senior NSA “alumni” in VIPS attest to the professionalism of the independent forensic findings.
The recent forensic studies fill in a critical gap. Why the FBI neglected to perform any independent forensics on the original “Guccifer 2.0” material remains a mystery – as does the lack of any sign that the “hand-picked analysts” from the FBI, CIA, and NSA, who wrote the “Intelligence Community Assessment” dated January 6, 2017, gave any attention to forensics.
NOTE: There has been so much conflation of charges about hacking that we wish to make very clear the primary focus of this Memorandum. We focus specifically on the July 5, 2016 alleged Guccifer 2.0 “hack” of the DNC server. In earlier VIPS memoranda we addressed the lack of any evidence connecting the Guccifer 2.0 alleged hacks and WikiLeaks, and we asked President Obama specifically to disclose any evidence that WikiLeaks received DNC data from the Russians [see here and here].
Addressing this point at his last press conference (January 18), he described “the conclusions of the intelligence community” as “not conclusive,” even though the Intelligence Community Assessment of January 6 expressed “high confidence” that Russian intelligence “relayed material it acquired from the DNC … to WikiLeaks.”
Obama’s admission came as no surprise to us. It has long been clear to us that the reason the U.S. government lacks conclusive evidence of a transfer of a “Russian hack” to WikiLeaks is because there was no such transfer. Based mostly on the cumulatively unique technical experience of our ex-NSA colleagues, we have been saying for almost a year that the DNC data reached WikiLeaks via a copy/leak by a DNC insider (but almost certainly not the same person who copied DNC data on July 5, 2016).
From the information available, we conclude that the same inside-DNC, copy/leak process was used at two different times, by two different entities, for two distinctly different purposes:
-(1) an inside leak to WikiLeaks before Julian Assange announced on June 12, 2016, that he had DNC documents and planned to publish them (which he did on July 22) – the presumed objective being to expose strong DNC bias toward the Clinton candidacy; and
-(2) a separate leak on July 5, 2016, to pre-emptively taint anything WikiLeaks might later publish by “showing” it came from a “Russian hack.”
*  *  *
Mr. President:
This is our first VIPS Memorandum for you, but we have a history of letting U.S. Presidents know when we think our former intelligence colleagues have gotten something important wrong, and why. For example, our first such memorandum, a same-day commentary for President George W. Bush on Colin Powell’s U.N. speech on February 5, 2003, warned that the “unintended consequences were likely to be catastrophic,” should the U.S. attack Iraq and “justify” the war on intelligence that we retired intelligence officers could readily see as fraudulent and driven by a war agenda.

The January 6 “Intelligence Community Assessment” by “hand-picked” analysts from the FBI, CIA, and NSA seems to fit into the same agenda-driven category. It is largely based on an “assessment,” not supported by any apparent evidence, that a shadowy entity with the moniker “Guccifer 2.0” hacked the DNC on behalf of Russian intelligence and gave DNC emails to WikiLeaks.
The recent forensic findings mentioned above have put a huge dent in that assessment and cast serious doubt on the underpinnings of the extraordinarily successful campaign to blame the Russian government for hacking. The pundits and politicians who have led the charge against Russian “meddling” in the U.S. election can be expected to try to cast doubt on the forensic findings, if they ever do bubble up into the mainstream media. But the technical limitations of today’s Internet are widely understood. We are prepared to answer any substantive challenges on their merits.
You may wish to ask CIA Director Mike Pompeo what he knows about this. Our own lengthy intelligence community experience suggests that it is possible that neither former CIA Director John Brennan, nor the cyber-warriors who worked for him, have been completely candid with their new director regarding how this all went down.

HAhahahahaHahaha. Apophenia. Epiphanies. Hahahahahaha. I’m going CRAAaaaAAAAzzzYYY!. Mmmmmmbwahaahahahhaaha.
And now, you are too. But-it IS all related indeed-to politics and political policing of words themselves. Try not to get too involved in all the pattterns….But if you REALLY want to go nuts, decipher the meaning of all those letters just above this paragraph. That should keep you busy for awhile-I mean-you lard asses have nothing better to do anyways.
Well sure- looking for Stephen Paddocks hard drive and all. That will keep you busy the same way that Oswald thingy kept you busy for 60 years or so. HAHAHHAHAHAHAHAHAAHa.
Yeah- it’s in the party van.
FBI caught with its pants down, and its game wide open in Asia-is that really a bad thing?!?FBI_Party_van2FBI_Party_van2.jpg

What is "gang stalking"? It is the result of a nation that respects no laws- and a nation 'for sale.'

The article below is from Business Insider in 2012. It documents one of the first official sources that claimed the government had sold our rights to “others,” who were wiretapping the entire nation.
The article chronicles decorated intelligence officer, and NSA whistle-blower William Binney’s ostracization, and excommunication from the cult of intelligence, as well as his harassment by the FBI for trying to save the taxpayers FOUR BILLION DOLLARS- but also, that he tried to preserve “Costitutional Liberty,” aka “due process of law, which Americans have not had since 2004.
In 2012, many already knew that the local police were using and abusing massive databases. Many already knew that ‘somehow’ that police, and multi-agency Task Forces had access to cell phones in real time, and that ‘somehow’ they could track “targeted” communications across a city, or across a continent- and into international jurisdictions (Hi Toronto!)- and that they could repeat back selected words and phrases just to let them know they  are watching.
While these people didn’t have a ‘name’ for it them, we now know it is the current sate of affairs where Fusion Centers were spying on citizens in local environments outside the view of any court, and outside the view of due process of law, and without respect for the Bill of Rights.
These people have a name- they are “targeted individuals,” and here is where the world began to know what “TI’s” knew as far back as 2003-4:

NSA Whistleblower Says The Feds Are Gathering Data On Nearly Every US Citizen

NSA ACLU
The government has been collecting data on nearly every U.S. citizen and assembling webs of their relationships, National Security Agency whistleblower William Binney told the Hackers On Planet Earth (HOPE) conference last week.
Binney worked for the Defense Department’s foreign signals intelligence agency for 32 years before resigning in late 2001 because he “could not stay after the NSA began purposefully violating the Constitution,” according to a statement he made in court records.
On April 20 he gave his first interview after resigning to Democracy Now!, asserting that the FBI raided his home after he blew the whistle on the NSA’s extensive spying on Americans.
On July 2 Binney, along with two other former NSA employees, agreed to provide evidence in the Electronic Frontier Foundation’s lawsuit that alleges the U.S. government operates an illegal mass surveillance program (i.e. Jewel vs. NSA).
His sworn declaration of facts that he’s willing to testify to are both telling and scary:

• In the ’90s Binney supervised the development of a NSA program called “Thin Thread” that was designed to identify international networks of connections between people from their internet communications. Since one side of the communications was domestic, the program encrypted the data so as to protect the privacy of U.S. citizens until a warrant could be obtained.
After 9/11 all safeguards went out the window as “the individual liberties preserved in the U.S. Constitution were no longer a consideration.” Members of his Thin Thread team began implementing a program called the President’s Surveillance Program (PSP), which collected domestic electronic communications traffic without any privacy protections.
• The NSA began seizing and storing most electronic communications passing through 10 to 20 wiretapping rooms in key telecommunication points throughout the country where all data must pass in order to move from one party’s network to another’s, allowing the government to identify and analyze any individual or group through a searchable database.
• Binney cites the $1.2 billion Utah data center currently being built and the new supercomputing center at the NSA headquarters in Fort Meade, Maryland, pointing out that the immense size and computing power of these facilities far exceeds the capacity necessary for storing targeted communications but is “consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications.”
In a nutshell Binney states – with considerable authority – that the NSA has been conducting comprehensive surveillance on U.S. citizens for more than a decade.

 
[youtube https://www.youtube.com/watch?v=JuvJ7tKIF2c&w=561&h=432]

Apophenia and the epiphany: can you spot the difference?

I briefly touched on the difference between schizophrenic delusions and delusions not yet specified, which is how crisis PR agents and agencies, disreputable media pundits, police, intelligence,and psychologists on the state teat manipulate the entire dialectic of online gang stalking through complicity with “perception management,” a well known propaganda technique.

Related Story:
UPDATE JANUARY, 07,2019
The Association of Threat Assessment Professionals (ATAP)officially linked gang stalking to mass shootings and domestic violence one and a half years AFTER I began to write this blog.
Note these stories here, here, and here, where I document OGS in Los Angeles, Hollywood, and Las Vegas, and indict the Million Man Army of Paul Blarts.
Then, take a look at a recent security guard involved murder of a gay black man in Hollywood, CA, where the cowardly guard Donald Vincent Ciota shot a man in the back.

Sure. Conspiracy theorists are all crazy, right? Except just that one guy….
the individual is handicapped by coming face to face with a conspiracy so monstrous he cannot believe it exists
Here below is one source of opinion about the difference between the two related ‘phenomena’ of the epiphany, which is an important awakening of some kind, versus the apophanie, which is an “awareness false flag.” The reader will take speecial note that psychologists and psychology still use references from the 1950’s, which was the height of the MKULTRA era of bad science and human exprimentation meeting MIC budgets, and the associated Bernaysian crisis PR industry after that. Without irony again, we must examine the religious tribal narrative, and its attendants in psychology.
Or, how one persons/tribes/religious sect’s apophanie is another persons/tribes/religions sects epiphany. [ Special note to Islamic readers: if this is the first time you have encountered the horror of Jewish-christian mind control, then have a look at Radio Islam’s take on it here.]
This is the nature of the Jewish cultural narrative and its attendant perversity of sliding scales of morality, competing with the christian cultures false morality and rigidity imposed upon the weak and the accessible, as well as the cultural co-option of Jewish history and mythology, and then, the wider reach and appeal of christianity, which is NOT based in nepotism, racism, or tribalism. Regardless, they work together to replicate this form of culture.
Chaos and Order-from apophanie to epiphany, and back again
Then, in the piece below, by I ask the reader to take special note that Ms. Waldman has invoked “chaos”as well as “order,” directly, and also that the number 13 represents “chaos” in some numerological interpretations, and also that she has pointed the reader to “Ramsey Theory,” which is ” is a branch of mathematics that studies the conditions under which order must appear.”

It’s All Connected

A German scientist named Klaus Conrad coined apophanie (from the Greek apo, away, and phaenein, to show) in 1958. He was describing the acute stage of schizophrenia, during which unrelated details seem saturated in connections and meaning. Unlike an epiphany—a true intuition of the world’s interconnectedness—an apophany is a false realization. Swiss psychologist Peter Brugger introduced the term into English when he penned a chapter in a 2001 book on hauntings and poltergeists. Apophenia, he said, was a weakness of human cognition: the “pervasive tendency … to see order in random configurations,” an “unmotivated seeing of connections,” the experience of “delusion as revelation.” On the phone he unveiled his favorite formulation yet: “the tendency to be overwhelmed by meaningful coincidences.”
In statistics, a problem akin to apophenia is a Type I error, or false positive. It means believing something is real when it isn’t, based on a misleading pattern in the data. The equal and opposite misstep, a Type II error, involves attributing a true relationship to chance. Defaulting to Type I thinking may have once conferred a survival advantage: Assume every rustle in the grass is a tiger, and you’ll last a lot longer than the carefree naïf who chalks each disturbance up to the wind. So, the theory goes, human brains evolved into “belief engines” and “pattern-recognition machines,” keen to organize jumbled sensory inputs into meaningful data. We are also expert detectors of conspiracies in random events, whispers in radio static, and the Virgin Mary in grilled cheese. Sometimes these false positives create an orderly perceptual continuum that helps us think. They aren’t strictly necessary, but they are at least usually benign. When I see a scowling man in the moon, or you see clouds that remind you of fluffy lambs, our brains are making the world a more diverse and beautiful place. Plus, every now and then, chaos offers up glimmers of order.

Yet apophenia can also lure us into false and damaging convictions.

Now, here below is a case study between the difference between the two subjects-and notice that in order for a person labeled “mentally ill” and for that person so-labelled to be vindicated, in western society, there is always a “narrator” or an “intermediator” or a “man-in-the-middle” that cats as the “gatekeeper” of what is “sane” or “insane” and then, that mediator is frequently a member of one f our many cults, sects, and other orders.
So, here below is a series of photographs that I took a few days ago, as I was followed around by some unknown person who was photographing me (see if this seems familiar to you). Then, note the many different ways I have “filtered” these photos, in order to demonstrate a “viewpoint” as well a to manipulate color, which in turn, manipulates emotion and perception.
See what you think- and keep in mind that I was “shooting” these photo’s of this unknown person over my shoulder as I walked, just off of Sunset Blvd., in Hollywood, CA:
photog 1.jpg
 
photog 2.jpg
photog 3.jpg
photographer ominous.jpg
IMG_3216
So, I ask the reader to look at these photos above, and ask these questions:

  1. what is apophenia?
  2. which filter shows “reality”?
  3. which image provokes or invokes a profound response, or an ambiguos response in the reader? does a person following you provoke any ther resonses? Which responses might those be?
  4. how many “layers of schizophrenic narrative” would be entirely missed by a psychologist, a media pundit, or a lay person on a jury, without the advantage of photography as a form of evidence?
  5.  does filtering an image change the viewers perception of the image, and then, the incident captured on film? Does the media filter about OGS serve a similar purpose?
  6. does the viewers emotion change when incidents like this “occur”? How about their perceptions? Would the addition of proof of gang stalking change the way that an individual then perceives their individual situation in contrast to the ‘social compact?’ Woud it impact a psychological assessment (psychological assessments do not factor in photographic evidence)?
  7.  is there an epiphany that challenges the apopheny? Would there be-could there be- an epiphany, if the individual experience was filtered through societies gate keepers, without the aid of “proof of gang stalking?”

I will let the reader decide. Answer the questions above, through any filter that YOU choose. But for me, actual proof of the claim of being “followed around and photographed” requires the proof.
Seeing any patterns yet? Try not to let the patterns drive you crazy-some say that an obsession with patterns can indicate mental illness.
Here- have a look at some of the complaints that psychology relegates to the category of “likely delusional”-and keep in mind that psychology generally avoids deep contact with the “schizophrenic narrative” as a way to stigmatize, enforce, and reinforce stigma, such as the classic case of Martha Mitchel effect and  “mis-diagnoses,” aka, they will label you, hurt you, stigmatize you and gas light your complaints if they have power. And only proof will dispute their claims and invalidate the psychological pseudo science.
But due to the duration of many complaints of OGS, ranging from days too years to decades, certainly being followed around for years takes a mental toll, and as such, qualifies as “no touch torture” in every sense, starting with gross privacy invasions, and more (certainly data basing our photographs is bad enough to qualify, much less wondering what “they” are doing with them. I once had a photo of me at a peace march in a mid-western American city crop up on a website hosted in Toronto, Canada, with my body photoshopped into a rally in Toronto, which I had never attended.)
But it is important to note that psychology is ill equipped-and in fact, weaponized against-proper care, or interpretation of the experience of targeted individuals of organized gang stalking for many reasons, not least of which is that in systems governance and its curiously convenient ploy of labeling critical thinkers, non-conformists, individualists and others as “mentally ill”, as well as it’s associated conformity operations, it is the individual who is the target of communitarian policing and gatekeeping schemes-and indeed, individuality is itself under attack.
Related Reading: I use the number 13 frequently in my discussions of OGS, because I have found correlations between it, and it’s use in the OGS dialectic as both a sign and a signifier. Examples of this correlation can be found by using my “search” feature.
Because those who practice OGS seek to cause chaos for some, at the expense of others, I document this so that future readers will understand this one number, and weed out the rest of the endless numerological cr^p that otherwise can occupy your time.
Lastly, because I reject the Jewish-christian social confabulation/ “world order”, I could care less if they, or their social order all just fell off the planet. Every single one of them.
 
 
 
 

Organized stalking and police surveillance of social media: ACLU notes that targeted 'influencers,' activists and other TI's are 'real'

Police Use of Social Media Surveillance Software is Escalating, and Activists are in the Digital Crosshairs

By: Nicole A. Ozer
Map of California, with dots marking the areas where local law enforcement has acquired social media monitoring software

It goes without saying that speaking out against police violence or government overreach shouldn’t land you in a surveillance database. But it can, and it does.

The ACLU of California has received thousands of pages of public records revealing that law enforcement agencies across the state are secretly acquiring social media spying software that can sweep activists into a web of digital surveillance.

This set of public records requests is part of our ongoing work with community groups to shine a light on surveillance technologies and call for community control in decision-making around policing. Last year, we worked with local activists in Fresno to reveal that its police department was using a MediaSonar social media surveillance tool that boasted the capacity to identify so-called “threats to public safety” by monitoring hashtags such as #BlackLivesMatter, #DontShoot, #ImUnarmed, #PoliceBrutality, and #ItsTimeforChange.

But we had a hunch that Fresno was not an isolated case.

So this summer, we requested records from 63 police departments, sheriffs, and district attorneys across California. And what we learned from the documents was alarming.

Of the responses we’ve received, 40% of the agencies (20 in total) have acquired social networking surveillance tools — many of them in the last year.

We found no evidence in the documents of any public notice, debate, community input, or lawmaker vote about use of this invasive surveillance.

And no agency produced a use policy that would limit how the tools were used and help protect civil rights and civil liberties.

The utter lack of transparency, accountability, and oversight is particularly troubling because social media surveillance software used by California law enforcement — tools like MediaSonarX1 Social Discovery, and Geofeedia — are powerful. And our records from Fresno and several other communities reveal that some have been marketed in ways to target protesters.

Our records show that Geofeedia’s marketing materials, for instance, refer to unions and activist groups as “overt threats,” and suggest the product can be used in ways that target activists of color. At least 13 California law enforcement agencies have used or acquired Geofeedia.

In one exchange with law enforcement, a company representative suggested to San Jose Police that they should use the product to surveil the “Ferguson situation,” even though the city is roughly 2,000 miles from Ferguson, Missouri. San Jose Police did in fact use Geofeedia software to monitor South Asian, Muslim, and Sikh protesters only a few days after acquiring it.

An email to the San Diego Sheriff touts a “collection” of social media content curated by Geofeedia following the non-indictment of Darren Wilson.

And yet another promotional email invites the Los Angeles District Attorney to learn how Baltimore used the software to monitor and “stay one step ahead of the rioters” after the police killing of Freddie Gray.

Law enforcement should not be using tools that treat protesters like enemies.

The racist implications of social media surveillance technology are not surprising. We know that when law enforcement gets to conceal the use of surveillance technology, they also get to conceal its misuse. Discriminatory policing that targets communities of color is unacceptable — and secretive, sophisticated surveillance technologies supersize the impact of racial profiling and abuse.

The good news is that we’ve seen that when surveillance is forced into the light, communities have the power to call out racist policing practices and stop discriminatory surveillance in its tracks.

Remember Fresno? Armed with proof of Fresno’s social media surveillance experiment, a diverse coalition of local activistsknown as Faith in the Valley successfully mobilized and organized to pressure the police to roll back their social media surveillance program. The community is now pushing to pass a surveillance technology ordinance to make sure all surveillance technologies are publicly debated.

In Oakland, community members organized against plans to build an expansive Domain Awareness Center that would have collected and stored hundreds of terabytes of data on Oakland residents. Now Oakland has a Privacy Commission that advises the City Council on surveillance decisions and is currently drafting a surveillance technology ordinance.

And in Santa Clara County, right in the heart of Silicon Valley, a diverse coalition successfully organized against plans to buy a Stingray cell phone tracker and then worked to enact a comprehensive surveillance technology ordinance that requires transparency, accountability, and oversight for all surveillance technologies.

In this spirit, a powerful coalition of national organizations is launching a multi-city legislative initiative, Community Control Over Police Surveillance (CCOPS), to introduce more local laws to bring transparency and community control to the acquisition and use of local police surveillance technologies.

Here in California, community members are working in Palo Alto, Fresno, Oakland, Berkeley, Santa Rosa, and Santa Cruz to ensure that similar laws are introduced in their cities.

Whether it’s social networking surveillance, stingrays, or something else we haven’t heard of yet — it’s time to push secret surveillance into the light.

We have the power to stop discriminatory surveillance and put control where it belongs — in the hands of the community.

Nicole Ozer is the Technology and Civil Liberties Policy Director at the ACLU of California. 

Read more about community control and surveillance technology in California:

US claims Cuba used high frequency electronic weapons on American diplomats, and made them deaf.

Separating gang stalking claims from “electronic weapons and DEW’s”: the most important step to understanding OGS
As I have stated elsewhere, I avoid all of the claims that some make about “electronic weapons and DEW’s” as well as UFO’s and other psychological head [email protected] But as of 08-09-2017, here is a story that proves that the United States government has acknowledged the possible use of high tech, high frequency”electronic weapons” on American diplomats, with one of them reporting becoming deaf, and all of them reporting other physical symptoms.
From the AP and Newser.com, “Diplomats suffer hearing loss” from electronic weapons:

US Expels Cuban Diplomats After Strange Incidents-US diplomats in Cuba ‘suffered severe hearing loss’
By Newser Editors and Wire Services
Posted Aug 10, 2017 12:36 AM CDT
(Newser) – The State Department has expelled two diplomats from the Cuban Embassy in Washington following a series of unexplained incidents in Cuba that left US officials there with physical symptoms that one official said includes potentially permanent hearing loss. Spokeswoman Heather Nauert said the two Cubans were asked to leave the US on May 23 after Americans in Cuba “reported incidents which have caused a variety of physical symptoms,” causing them to leave the island, the AP reports. Nauert said the first of the incidents was reported in late 2016 and that they had continued. She would not say what the symptoms were except that they were not life-threatening, though other officials say they include hearing loss.
One person familiar with the US investigation says investigators are looking into whether elements of the Cuban government placed sonic devices that produce non-audible sound inside or outside the residences of roughly five US Embassy staffers with the intent of deafening them. Sources say that after the staffers arrived in Havana in the summer of 2016 and moved into housing owned and maintained by the Cuban government, the affected diplomats and their spouses began to experience symptoms of hearing loss so severe and puzzling that an investigation was launched, and it was determined that they were at risk. The sources say the Cuban government denied any involvement.

In the online gang stalking community of claimants who say that they are “being harassed by electronic weapons and DEW’s”as well as “microwaves.” In these claims there are certainly a small portion of 1) mentally ill people, and 2) whether these people had pre-existing conditions, or 3) the conditions were exacerbated by harassment is unknown, as each persons case history is unique. And finally, it is unclear if 4) those who experience this form of trauma were otherwise mentally sound or ‘near normal’ before the harassment began. Finally, within that milieu are some people who 5) repeat what they hear in th media, for whatever reason, repeating these claims, and much like regular Main Stream Media (MSM) the parrot effect is in action, and people will say whatever they are taught to say.
This repetition is an intended, and stated goal of all media and military psychological and influence operations, as well as they stated goal of viral marketing. One example from recent history is that “Saddam Hussein attacked America on 911,” which one can find repeated as a belief even today in some parts of America(some people still  believe Saddam did 911)
And occasionally, we get a glimpse behind the curtain that claims of noise harassment are very real, such as the cases of Bob Deis and Rick and Cindy Krlich, who had police and firemen wage ill-motivated wars of local harassment on them, and noise was the tool they used.Hammering at all hours of the day and ight, revving car motors, squealing tires; car horn blasts timed to annoy, and more.

Organized stalking, police stalking, database abuse and journalists and reporters

The curious, sexually charged gang stalking of Minnesota reporters

Imagine police from over one hundred and eighty (180)  agencies combing through a database, gossiping in email’s and in radio chatter, and then, driving by your house (on a relatively quiet block), and stalking you in databases to look at your drivers license photo. Then, they were talking about you behind your back.
Then the identity theft, computer hacking, redirections of your internet searches, online blogs about your personality, and other strange occurrences “happened,”and you had no idea who was behind it? And: the current line of nearly all peace officers is that “people who say they are stalked by mysterious gangs are delusional.”

Related Story: MSM reporter Sharyl Atkisson of FOX news suing the Department of Justice for computer hacking, redirection, and leaving classified documents on her computer. DOJ says “Catch Me If You Can!” as it hides the ball.
And: “It’s not Us-maybe, ask one of our other Five Eyes Partners or Israel!” Or-ask this Fourteen Eyed Monster aka the UKUSA Agreement (which rhymes with “Yakuza easement”)
Attkisson alleges that three separate computer forensic exams showed that hackers used sophisticated methods to surreptitiously monitor her work between 2011 and 2013.
“I just think it’s important to send a message that people shouldn’t be victimized and throw up their hands and think there’s nothing they can do and they’re powerless,” Attkisson said in an interview”

What would you do? Well, in Minnesota, which is a notorious gang stalking state, where the one party rule of “progressive” DFL politics prevail most of the time, the reporters who found out about the source of their stalking and the abuse of the drivers database sued the cr^p out of the police, and the state:

“officers from different law enforcement agencies “monitored” Miles by driving past her house, and she believes they got her address through the illegal accesses.”

I bet you would ask yourself how you became a targeted individual-“Why me?” and “What did I do wrong,” and a host of other questions. And then, it would slowly sink in that you had done nothing wrong; and then it would sink in that you had been compromised, and you might feel violated-like that dirty feeling after someone knows a secret about you. Because-that is what organized state level gang staling is designed to do.
So-what would you do about it? Well, Minnesota journalist Jessica Miles and several other Minnesota reporters filed lawsuits because police, and their hydra of community policing stalkers were harassing them, and  database stalking them-thousands of times.
Here is how Tim Cushing of Techdirt.com wrote about it (and it is interesting to note that Techdirt is being sued by a big fat egotistical liar and mama’s boy named Shiva Ayyadurai in an attempt to crush free speech and press rights, via a frivolous lawsuit and shut down a vibrant and brilliant media outlet over Ayyadurai’s false claim that he invented email as we know it.)

State Approved Stalking: MN Newscaster’s License Info Viewed 1,380 Times

from the more-access-than-oversight:-always-a-bad-idea dept

Just recently we covered the story of the rampant abuse of Minnesota driver’s license data and the resulting lawsuits, including one featuring 18 plaintiffs. One of the plaintiffs, Steve Drazkowski, is a state representative that had his information illegally accessed over 600 times by various state employees, something he believes was politically motivated.
Well, a Minnesota newscaster has Drazkowski beat.

 
And this, below from the Minneapolis Star Tribune:

KSTP-TV anchor has her driver’s license data searched 1,380 times, lawsuit alleges

Suit says Jessica Miles was “shocked and disgusted” to learn that her driver’s license info was accessed by officers and personnel from about 180 different departments and agencies.

Jessica Miles, a KSTP-TV midday anchor and reporter, became the news herself on Monday.

Miles filed a federal lawsuit claiming that her private driver’s license information was illegally searched about 1,380 times, believed to be the highest number so far in the mushrooming scandal.

Miles is the on-air last name of Jessica Kampschroer. Her husband, Cory Kampschroer, was looked up 92 times and joined her in the lawsuit. He is a digital news manager at KSTP and previously worked as a reporter and anchor for WCCO Radio.

Miles is one of about 20 people who have sued a slew of local and state government agencies after obtaining information from the Department of Public Safety (DPS) that public employees had illegally accessed their private records.

“On July 30, 2013, Jessica was shocked and disgusted to learn from DPS that it had determined that officers and personnel from approximately 180 different departments and agencies had reviewed and improperly obtained or used her private data,” her lawsuit states.

In case you ever wondered what police and firemen are doing when their not saving old ladies, cute kitties and puppies, and saving children-of course!-saving children from rapists and pedophiles who start fires just so they can rape and eat children in mid-air, as the pre-cooked kids jump out of fifteen story windows (all of the windows pre-broken of course by the “Broken Windows Policing schemes), then this above is your answer.
Because the facts are, there simply isn’t that much crime around those parts, and the only fire that needs to get put out might crimp the pensions of gang stalkers. And, that roasted pig that shows up on Minnesota’s dorrstep every year in the form of a 65 BILLION DOLLAR appropriation for DVIC policies.
But Miles wasn’t alone then, and she isn’t alone now, as gang stalking grows as a threat to democracy itself, because police are in on it at every level, from the database on down, as well as a host of InfraGard members and others with access to the internet switches, and the blackmail that can be inferred from this collusion, as Fusion Centers in Minnesota are used as political tools of targeted spying.
And they stalk their own as quick as the stalk others.  Attractive women-long the bane of lesbian feminists and old cops on pensions-even Brooke Bass, herself a lawyer for the police union was gang stalked in these databases, and in the real world as well.
And Beth McDonough a KSTP reporter was gang stalked too.
In fact, gang stalking is becoming so common that it has emerged that targeted individuals are frequently involved in media, journalism, and alternative media alike. Even the crew of Alex Jones Info-wars was stalked by a “terrorism task force.”
I advise you to research gang stalking and reporters-a Google search easily turns up thousands of hits. While the fashion is to focus on some crazy guy stalking a good looking reporter, the reality on the ground is that political campaigns, and police, stalk those who work in media.
Then, when you factor in how prosecutors and the legal system is frequently in on it, and that they hide behind authority and play the victim in the crybully narrative when their unethical or illegal practices are exposed, as in the cases of the discredited CIA psychologists and those who discredit gang stalking as a legitimate complaint, we see clear pattern: gang stalking is a real thing, with a well oiled counter-narrative to discredit those who complain of it, and tese days, it is very partisan; and very AIPAC-y.
Most importantly, each and every single “women’s organization” and their affiliated battalions of human right’s advocates was then, and is now silent about the sexually charged gang stalking of Minnesota reporters by hordes of police driving by their houses all day and night. See how that works in “progressive” states? All of the victim advocates, the save the women and their children’s lobbyists,  and the police are curiously silent about this form of highly organized stalking.
So, we can only speculate that these same are you in on it? It seems SJW moral equivalence is showing like wolf’s fur underneath sheep’s wool, aka Fabian Socialism and its “community policing” scheme, aka “organized stalking,” because all of the “civil rights” and “human rights” organizations in Mnnesota are strangely silent about this form of staling.
Is it because they are doing it, along with the DFL as some have suggested? Or is that one of the LGBTI’s new bi-polar hairstyles for crotch faced advocates again, saying “castrate all the rapists! RApe is everywhere! Men’s rights people and hetero enablers are all whiners!” And all of this, straight out of a communist manifesto, aka the “Hegelian Dialectic.”
The  Electronic Peeping Tom’s of Minnesota: List of reporters gang stalked by Minnesota police agencies and other electronic Peeping Tom’s
Jay Kolls of KSTP
Jessica Miles, as noted above
Beth McDonough as noted above
Fox9 news anchor Alix Kendal was stalked multiple times by Minnesota cops
Related Stories: Minneapolis police chief Janee’ Harteau fires herself after she failed to come to the defense of a white woman from Australia who was shot by a Somali police officer. And of course, the Minnesota crisis PR machine was quick to slap the word RAAAAAAAPE all over the headlines. I dunno-perhaps more white women need to get shot* to understand what the rest of us are going through.
Is their a curious trend in news people being gang stalked? Is “control of the media” a component to gang stalking? Ask Vester Lee Flanagan, who was being secretly blackmailed before he went on a news room rampage.
United States declares “Alarming levels of Israeli spy rings in the US.
How did the Anti Defamation League and the Law Enforcement Intelligence Unit(LEIU) spying scandals get swept under the rug, between the 1970’s and 2003-and today these spying, back bag job operations have become America’s NSA/FBI/CIA/DHS data theft pipeline, and America’s total surveillance state?
 
*Note to my special JTRIG/DHS/FBI/SJW NGO’s and their DVIC accomplices, who routinely hack my writing in progress, and other voyeuristic profilers and government sponsored, bankster funded word police: while it is obvious that your training does not include the use of words to solve social problems, unless those words pop out on the screen their in front of you, and mediated by Big Data abuse, or unless you yourselves derive direct benefits-and your kind entirely fail to understand the first amendment- a short explainer is necessary.
This phrase, signified with an *asterisk is a mere conjecture, a juxtaposition of words that can cause and create an emotional response in a reader, not necessarily a suggestion for “Change” and not a threat, or otherwise to be construed as one.
However, if some random reader interprets that phrase as the “voice of God,” and does exactly that, I advise you to talk amongst yourselves and your co-subverters of the Constitutional guarantees of privacy, liberty, free speech and press, and due process in general- consult about “what is organized gang stalking,” and maybe, note this link below to an AP news story which documents that the United States Diplomatic service has kicked two Cubans out of the country, because Cubans are suspected of having used electronic weapons on our own diplomats, which was in yesterdays news, 08-10-2017.

“US diplomats in Cuba ‘suffered severe hearing loss'” as “investigators are looking into whether elements of the Cuban government placed sonic devices that produce non-audible sound inside or outside the residences of roughly five US Embassy staffers with the intent of deafening them.”

And, should any of you sh!tbags construe it that way, expect a lawsuit-and with my winnings, I will hunt you down like a deer, and when I find your cowardly stalking, hacking, black bag jobbing asses, I will sue you and then hire private investigators, crisis PR manufacturers, and surveillance role players to stalk you, your husbands, wives and children into the dirt for the rest of your lives, and into generations yet unborn, using your own databases to blackmail you with-if I haven’t already done that herein.
This is not to be construed as a threat-it’s a promise, one form of legal, peaceful, non-violent resistance, as I live for the word, and proper legal due process in a forum to express that, which is indeed, a more courageous act, and definitely mightier than the sword, if the Constitution is any guide. And all that, of course, if the judge isn’t already compromised in this grand scheme of database fraud and abuse, or otherwise involved in statist-cult activity.
Click this link for a REWARD OFFERED FOR THE ARREST, CAPTURE AND SUCCESSFUL PROSECUTION OF OGS PERPETRATORS who operate with impunity under color of law and authority.
-those who have been abused n the manner above would do well to revisit their personal organized gang stalking, and apply for the reward.
 

Organized gang stalking and Countering Violent Extremism programs: how"Disruption"programs work-a privacy and due process raping boondoggle, and security theater cash cow.

The goal of all of this privacy rape, and due process subversion by the NSA/CIA/FBI/LEO data theft? Who knows, and  whatever-cuz’ it’s “for the children.” And ANYTHING that is for the children is big money in a totalitarian or surveillance state. The ones who aren’t bombed overseas-aka “the remnants of” the “children”-those that are left after the DVIC and the MIC with ts affiliated “industries” has “their way with them,” first. Pre-natal supremacy over ‘the children’ and the MIC is a one way street.
Soft force eugenics and child abuse: how the DVIC and the MIC maintain religious, and narrative supremacy over future generations. Meet the Countering Violent Extremism programs which are really ideological restraints on privacy, rights of assembly, and rights of free expression, coupled with violations of the equal protection clause of the United States Constitution.
Imagine you are a peace activist, or NOT a member of one or another sect/cult/order/denomination of a Jewish-christian religion; or you’re an atheist/humanist/whistle blower/ activist-even a ‘petty criminal’ who smokes pot-and one day, you find that you seem to bump into the same faces all over town-that ‘faces’ re following you. That’s odd, you think: that 6’2″ tall guy in the brown Eddie Bauer loafers, classic Dickey’s slacks, and the close cropped, fawny Germanic brown hair that matches his shoes,and who drives an oversized big red Ford pickup-he was everywhere I was today: whipping into the parking lot at Target, or sweeping into the restaurant that serves the “ethnic food,”and trying to bury his angular 6’2” frame into a booth. Odd, you think- how a guy that big can hide himself behind an 18″ tall menu….
Naw, you think- must be my imagination. The 18″ menu format, I mean.
And then, for weeks, this pattern repeats itself, sometimes with the tall guy, sometimes with others, usually white but frequently erudite and well dressed 6’3″ brown and black people (also, often with dreadlocks and blue suits; or pert Persian women in sensible flats, with cameras in hand, asking to take your picture at peace marches, or anti-apartheid meetings). The squat, weight-lifter framed black woman with the bad weave, and the sensible backpack and recognizable mid-western accent coupled inevitably with the tall brown shoed flatfoot; the Asian man who is a modern Charlie Chan, but with real Asian heritage and ethnicity, showing up on buses, coffee shops, AA meetings maybe (I have that on reliable sources, I promise…).
That’s odd, you think- this has been happening for weeks! Months! YEARS!! And you become a bit ‘paranoid’ and a bit on edge, looking over your shoulder all the time, because those same faces show up frequently; sometimes across the states.
Related Story: The Brennan Center for Justice at NYU CVE link roundup
About then, when you notice, and especially, when you begin to document it in some form-it stops-day after day goes by and you don’t see the tall guy, or the middle eastern or the Kenyan man following you; and the late middle aged shrew with the strange comments in the grocery store about ” I know what you READ!” disappears too. A week or two or a month goes by, and then new things happen: you come home, and the lock on your door is somehow different-usually it is more loose-but now it’s harder to get your key into(this can go both ways, as each lock smith, or lock picking set is different); or there are strange marks on your door jamb (sometimes a three pronged tool is used, other times what appears to be a wide, flat screwdriver).
The Black Bag Job, illustrated:
1563470456369
IMG_20190719_012742
1563470581341
1563470538651
And the internet, of course- you try to log in to Gmail, and as if you are being transferred to a computer across the world-twice-as it takes between seven and twenty seconds just to log in-EVERY TIME, whereas in the past several years, it was a matter of one to three seconds. You notice that you Gmail address has been switched from San Francisco to Irland, or he UK-odd, that you would take the time to notice that-you probably are losing it.
Strange, you think, I haven’t changed ISP’s, or used a new computer, nor have I changed any settings on ANYTHING. And certainly, I don’t live in Kansas, anymore. And certainly, those brand new wireless AP’s that spring up outside your house with kewl names like “MAdame PSycho,” and “Not the FBI Surveillance Van,” or “TAO2” are all in your head. Sure-that’s an option too.
Hmmm. And the pop-ups and advertisements on your computer will take on a life of their own, as for years upon years, you got ESPN, Manchester United schedules,  and “subscribe now!” popups every time you are on the computer reading news for free, or maybe an occasional ad for the “Penis Pump,” or free Viagra samples(no-really that wasn’t my case, I swear) but you now get pop-ups asking you about tinitus, and advertisements for middle eastern vacations-ads in Arabic. Maybe you get the weird pop-up about gun shows in Texas(“deep discounts for LEO’s who buy in bulk!”), as your IP registers in Nebraska….
And, the phone of course- your phone now has the ability to occasionally talk back to you- about what you did yesterday, or an hour ago (and this will happen only once or twice, just so that you cannot begin to document it.)
This is on the surface one of two things: you are going totally and completely bonkers-nuts to the meat grinder mad-you are deteriorating as if your mind has been taken over by ‘something else” that somehow knows who YOU are, and WHERE you are at all times, even if you’ve never owned a gun in your life, or used a penis pump (well-who HASN’T used one of those?!!).
You become pre-occupied with little strange happenings like your garbage being tipped over in your alley, or the long scraping marks left on the siding of your house by a ladder-maybe in your paranoid mind, you connect those random events: the ladder marks to your now debilitated security cameras whose cables had been disconnected RIGHT WHERE THOSE LADDER MARKS scrape your siding, and ding your white aluminum window trim with deep scars and gray marks.
Maybe the little camera left behind in your sons bedroom is a sign of something evil-who knows, right? It’s your word against the deep state, and all of it’s military/LEO/psychologist/MIC/PIC/religionist/occultists-who-work-in-government. And who are you, really? It’s for the Children (hitler youth), after all!
Or, maybe the reports from your neighbors about how they saw other strange fat white men jumping your fences, or signalling to each other from your alley to the street, or using strange hand signals just as they hopped into cabs that JUST HAPPENED TO BE WAITING THERE in front of your house strikes you as “odd” reports from a good and trusted neighbor.
Suuure. Maybe your going crazy-along with your neighbors, who ALL report these things to you. And some of whom are suddenly building fences, or installing their own security lights and cameras.
Yup-you’re nuts, prolly. Orrr mebbe….
Maybe another option that is a little less crazy perhaps: you are being covertly and totally [email protected] with by one of any number of sources ranging from LEO’s to military operations, to strange cultists or organized gangs of pedophiles* that most often are run from within the official cover of state agencies and their affiliated “good guys” and girls (here is one possible case of that. And read through this blog to help understand who else it might be.)
But in many of the early cases-stemming back to around 2001-these were often covert intimidation/recruitment/entrapment/coercion/conformity/manipulation schemes that loosely fall under the category of “countering violent extremism” programs run by any of a number of unethical operators ranging from LEO’s, task forces, and intelligence agencies to private contractors.
And, the one key feature they all have in common has a plausible connection: agents and agencies that practice fraud upon the courts, and fraud upon the Constitution via massive, unchecked database abuse, and surveillance via electronic media such as computers, cell phones, and even televisions. You have been selected, and targeted for intelligence collection (HUMINT), informant recruitment (they want to use you as a rat), or possibly, you have been deemed a criminal, without due process of law,  due to the use of unauthorized access to your computer and Google searches, and, because that access was illegal, and parallel construction not warranted in your case (there’s a joke in there somewhere about warrants) “they” have chosen to use you as a moving target for all their new military grade electronic toys and weapons.
Related Stories: Have a look at the bizarre world of parallel construction from Techdirt.com-the practice of LEO’s breaking the law, and violating the Constitution, and then doing plastic surgery to put a new face on “criminality.”
Sooo…….
Welcome to the shadowy, sketchy, often bizarre (and incredibly well financed) world of CVE programs!

“Countering violent extremism programs have been identified by the government as a top national security priority, but the public knows appallingly little about them,” says Hina Shamsi, director of the ACLU’s National Security Project. “We’re suing because government agencies have repeatedly failed to provide us information that we’ve requested about the nature of their CVE initiatives.”
In a briefing paper released with its lawsuit, the ACLU said that CVE programs often target “people for monitoring based on their beliefs or ideologies,” thus potentially criminalizing speech protected under the First Amendment. It also highlighted past abuses of CVE programs, including instances in which young people who refused to take part were characterized as radicals and where community leaders were told they would have to identity and discuss cases of specific youths with law enforcement.
The Department of Homeland Security declined to comment for this story, citing pending litigation. The Department of Justice did not respond to request for comment.
Government-led CVE efforts in the United States are inspired in large part by programs rolled out in past years in the United Kingdom. Broadly speaking, CVE programs seek to expand counterterrorism efforts beyond law enforcement to involve other government workers, like teachers and social workers, as well as community leaders outside of government, like clergy. They can involve propaganda and other communication strategies as well as monitoring and questioning.
Those programs have been deeply controversial in the UK, where civil society activists have blamed them for exacerbating ethnic tensions within British society while failing to meaningfully fight extremism. In recent months, the U.K. government has also rolled out anti-radicalization programs in schools, which have led to instances in which Muslim schoolchildren have been stigmatized by teachers as potential terrorists.”

*One recurrent theme in almost ALL OGS blogs is that those who are targeted are also slandered with a variety of “labels” ranging from drug dealer/user/ to prostitute to “pedophile”. But the reality is that state organizations, police, psychologists, lawyers, the courts, CPS, foster care, social work, and many other subsidiary organizations are a multi-billion dollar per year domestic industry, subsidized by the Jewish-christian ideological state to get children funneled into the Domestic Violence Industrial Complex (DVIC) by hook or by crook (be the shepherd, not the sheeple and all that.)
Each child that is successfully stolen or otherwise diverted into this “system” is a cash cow (cash sheep?) returning dividends to those who are part of this system. For instance-foster parents can rake in between 800-1800 per month, depending on the state, per child. And any child that becomes involved with CPS ca returns some 70k or so per year to those who participate in this business.
Not surprisingly, Myron May, a man who claimed he was gang stalked, was the product of the multi-million dollar Christian foster care factories that are dotted across America-and no researcher of OGS has yet made this connection between him, and this systematic profiteering off of children as commodities.
Disclaimer: I make no claims herein specifically or intentionally relating to the financing of the Taunton Foster care community, and intend this example as one of many where children are used as cultural capital as well as actual capital. owever, I have long been a critic of the DVIC foster care factories that dot America and that are themselves a 4 billion dollar per year industry. Children taken into foster care stand an 80% ncreased chance of sexual abuse, or othher harmful situataions, and the feminists/internationalist/bolshevik elements of many “progressive” state depend on this revenue, and use it for political action.

Organized gang stalking, Scott Crow, disinformation and informants.

Scott Crow, an anarchist, animal rights activist, has gone on record stating that organized “gang stalking is bullshit,”which is alright- because everyone is entitled to an opinion. And as they say, even assholes have those. Opinions, of course. And, I guess for some, it’s easier to love fuzzy or feathered critters and act like cute, four year old anarchists with lil’ diapies full of doodoo, than to deal with the real issues of gross human rights abuses of corporatism colluding with a full blown surveillance/security state to do things to people that were unimagined at the height of America’s last Constitutional crisis of the 1960’s (click here to see the catalogue of surveillance gear available to LEO’s who spy on American citizens without warrants).
But to the hundreds of thousands of people world wide who claim to be harassed by unknown assailants, various electronics ranging from wiretaps and StingRay towers, cell phone emulation, and sound weapons (what’s that clicking on my phone?!), and stalkers- lots of stalkers who do plainly weird shit called street theater- the evidence is against Mr. Crow’s opinion.
There is ample evidence of religions and cults that stalk people; evidence that the intelligence agencies and some really bad  LEO’s stalk people; retired LEO’s stalk people, the USAF and Naval NCIS working with the CIA and others stalk people; a HUGE well heeled operation of conformity enforcement run by the OSI and there is sh!tloads of evidence that it is part of a large, orchestrated crisis PR movement. And of course, every crisis PR movement needs useful idiots, who are just glad the pendulum missed their neck.
Scott Crow.org, on gang stalking:

In the last couple of years I became aware that I have accidentally become the poster child for a marginal, but rising movement.   It’s a movement of the disaffected, and somewhat marginalized in civil society. And like all of us its made of those alienated by the ills of capitalism: our atomized communities,  the overwhelming media (online and corporate) that can reverberate any idea into truth and the growing overwhelming complexities of our social and political spheres.  There is also another important piece that I have to throw into this cauldron that has given rise to this movement too; the farce called the war on terror and its all ensuing baggage of the surveillance state. Sounds intriguing doesn’t it? If you guessed I was talking about anarchy, social justice or even LOLcats you would have guessed wrong.  What I am referring to is an internet phenomena called gangstalking and somehow my surveillance by the FBI and Joint Terrorism Task Force for almost 9 years became the actual proof they all needed to say they were right all along; that they weren’t just paranoid.  Except I wasn’t gangstalked.

Related Story: The famous Civil Rights photographer Ernest Withers-who photographed ALL of the black leaders of the 1960’s, was a paid RAT. Bonus points if you can answer the question: And WHY was this guy at the hotel where Martin Luther King was shot dead?
SO- make of Scott Crow’s opinion what you will, But psychologists and other paid disinformation agents who both benefit directly from drug companies and privatized prison payrolls, and those who work with schizophrenics and sex offenders have even waged a classic “black propaganda” campaign to discredit those who claim they are harassed.
I DUNNO. MEBBE They is all caaaaraaaazy. Or not.
Either way? Any scientist, sociologist, intel agent, or crisis PR moron can take the data provided in this blog and test the many proofs and hypotheses themselves, against historical events like COINTELPRO, and the destruction/co-option of the peace/anti-war/Civil rights movement. You can look for- and find- the evidence that I provide herein-and replicate the methods, and find new validation yourself. I have merely provided a starting point.
But it boils down to this: people like Scott Crow, who was followed, surveilled and harassed by the FBI in what amounts to a fairly traditional investigation of a fairly pasty white traditional ‘suspect’ claims OGS is “total bullshit.” I mean-after all- animal rights people are startlingly quiet about warrantless surveillance, human rights, prison reform, and how the targeted, flawed and sociopathic Countering Violent Extremism programs work with local LEO’s and private security contractors to terrorize TI’s into complicity with snitch culture.
You don’t have to believe me- ask an actual RAT, Greg Monteilh, former FBI informant, about the “murky” practice of “flipping” innocent people into becoming agency informants-from the Guardian UK:

The ex-FBI informant with a change of heart: ‘There is no real hunt. It’s fixed’-Craig Monteilh describes how he pretended to be a radical Muslim in order to root out potential threats, shining a light on some of the bureau’s more ethically murky practices….(follow the link to learn more).

Just off the top of my internet, I can think of these many many validated tactics below that are reported by TI’s. And these days, as the NSA shares data with 16 other intel agencies and targets American citizens, it ain’t gettin’ any prettier out there without due process (even if Mr. Crow thinks it’s all bullshit, some of us still believe in Constitutional Democracy. And Mr. Crow and his pals- most of them animals- don’t read the Constitution anyways.).
A short list of what the NSA et al is doing to American citizens BEFORE they turn the data over to the local LEO’s-from Brian Lehrer-and ask yourself how YOU would feel with this arsenal pointed at YOU, personally:
THE NSA CAN:

  •  track the numbers of both parties on a phone call, as well location, time and duration. (More)
  • It can hack Chinese phones and text messages. (More)
  • It can set up fake internet cafes. (More)
  • It can spy on foreign leaders’ cell phones. (More)
  • It can tap underwater fiber-optic cables. (Clarification: Shane Harris explains that there were reports the NSA was trying to tap directly into cables using submarines, but is now more likely trying to intercept information once it has reached land.) (More)
  • It can track communication within media organizations like Al Jazeera. (More)
  • It can hack into the UN video conferencing system. (More)
  • It can track bank transactions. (More)
  • It can monitor text messages. (More)
  • It can access your email, chat, and web browsing history. (More)
  • It can map your social networks. (More)
  • It can access your smartphone app data. (More)
  • It is trying to get into secret networks like Tor, diverting users to less secure channels. (More)
  • It can go undercover within embassies to have closer access to foreign networks. (More)
  • It can set up listening posts on the roofs of buildings to monitor communications in a city. (More)
  • It can set up a fake LinkedIn. (More)
  • It can track the reservations at upscale hotels. (More)
  • It can intercept the talking points for Ban Ki-moon’s meeting with Obama. (More)
  • It can crack cellphone encryption codes. (More)
  • It can hack computers that aren’t connected to the internet using radio waves. (Update: Clarification — the NSA can access offline computers through radio waves on which it has already installed hidden devices.) (More)
  • It can intercept phone calls by setting up fake base stations. (More)
  • It can remotely access a computer by setting up a fake wireless connection. (More)
  • It can install fake SIM cards to then control a cell phone. (More)
  • It can fake a USB thumb drive that’s actually a monitoring device. (More)
  • It can crack all types of sophisticated computer encryption. (Update: It is trying to build this capability.) (More)
  • It can go into online games and monitor communication. (More)
  • It can intercept communications between aircraft and airports. (More)
  • (Update 1/18) It can physically intercept deliveries, open packages, and make changes to devices. (More) (h/t)
  • (Update 1/18) It can tap into the links between Google and Yahoo data centers to collect email and other data. (More) (h/t)
  • (Update 4/2) It can monitor, in real-time, Youtube views and Facebook “Likes.” (More)
  • (Update 4/2) It can monitor online behavior through free Wi-Fi at Canadian airports. (More)
  • (Update 4/2) It can shut down chat rooms used by Anonymous and identify Anonymous members. (More)
  • (Update 4/2) It can use real-time data to help identify and locate targets for US drone strikes. (More)
  • (Update 4/2) It can collect the IP addresses of visitors to the Wikileaks website. (More)
  • (Update 4/2) It can spy on US law firms representing foreign countries in trade negotiations. (More)
  • (Update 4/2) It can post false information on the Internet in order to hurt the reputation of targets. (More)
  • (Update 4/2) It can intercept and store webcam images. (More)
  • (Update 4/2) It can record phone calls and replay them up to a month later. (More)
  • (Update 6/2) It can harvest images from emails, texts, videoconferencing and more and feed it into facial recognition software. (More)

Did we miss any? Mischaracterize any capabilities? Let us know in the comments, or tweet @brianlehrer.
Suuure. It’s all bullshit- yeah, that sounds about right. Yup-keep your head up your ass, play it safe, m’boy. “They” are prolly all crazy- no electronics involved at all. Nothing to see here move along now….