ROGS Blog has been hit by a nation-state level attack, and is on hiatus for awhile

My blog was recently hit by a nation state level attack, which likely came from US police and military assets. Here is a bit about nation state level cyber attacks, from BAE Systems.

Yes, indeed, words do have consequences, and those consequences are usually Jewish-christian and other western flying monkeys and fanatics who work in policing, politics, or in the matrix of Infragard, Fusion Centers, Law Enforcement Intelligence, current and retired military, and others lobbying cyber bombs and real bombs at people who believe in civil rights, due process, and constitutional rights.

That attack appears to have started in Harris County, Texas (one of the attackers referenced that locality ), where George Floyd was recently laid to rest, after having been murdered by Minneapolis, MN cops.

And, shortly before that attack, this blog was visited from Kuwait and other places, where the US military and its plague of private contractors wage cyberwar on free speech, and democracies upheld by free speech everywhere.

The avid reader will take notice that ROGS (the writer you are reading ) has been writing about gang stalking in Minnesota, the same state where George Floyd was murdered. And, that.my writing goes straight to the heart of an issue that has now become a world -wide issue. So, never doubt the power of one voice (and a few excellent, now world-wide slogans ).

1592021382618

The evidence of that attack is collected, and incident reports too.

The attack was staged in various ways, and included:

* Social engineering exploits that exploited features of WordPress insecure comment feature. This attack also referenced a crackpot case I once covered, that of Sarah Degeyter

* email and phishing attacks

* DNS cache poisoning, which you can read about here which utility zed the now defunct address www.lanelwilson.com, (which can still be accessed in the internet archive, though the blog has been closed. )

The net effect of these attacks is that it slows down my writing process, but it will not stop me entirely.

And, as we see, ROGS writing is quite effective, considering the world wide protests that started in the same city where George Floyd was murdered by police.

So, adios, for now, and ROGS will continue “Bringing people together, ” in other ways, much as we see with the Floyd protests, which started literally, at my doorstep.

Signing out for now, but I will be back, I promise you, “bringing peace by pleasing the palette, ” of those who are ensnared and entrapped in the illegal policing tactics of western governments and their bizarre, racist, due -process free “organized gang stalking” dialectic.

In the meantime, entertain yourselves with this video, and the related links, from a restaurant owner whose store was right next to the place where,Derek Chauvin worked with his coworker, George Floyd and where Chauvin likely began plotting that murder, as he gang stalked El Nuevo Rodeo (and undeniably gang infested dancehall in Minneapolis ).

[youtube https://www.youtube.com/watch?v=Y3NcQ6VkCfk&w=360&h=203]

And, a second hand blurb from the “New Yarwk Times,” just for fun:

A bit from the HuffPost:

https://www.huffpost.com/entry/gandhi-mahal-minneapolis-protest-george-floyd_n_5ed142a8c5b6bc97e7682588

And, speaking of infiltration, informants, and spies in social justice, activist, and religious networks, have a look at this link, because religious gangs, and their affiliated NGOs are very real indeed :

Ruhel Islam

I guess theres more than one way to make it into the New Yarwk Times, Dr.s Lorraine Sheridan, David V. James, Christine Sarteschi, et al.

Next time you are tempted to open your (uninformed) yaps about gang stalking, and “are complaints of gang stalking delusional” maybe put your own vanity aside, and try this instead:

[email protected]

In the meantime, if you wanna actually help, DEFUND THE POLICE and dismantle the DHS /FUSION CENTER /FBI/LEIU /ATAP/NGO octopus of undemocratic, unconstitutional investigation, targeting, and extra-judicial homicide, because NONE of these local police act alone, without that type of support.

And, the simple fact is, that ROGS Analysis of organized gang stalking and the fact that even Google search results have changed dramatically since I began writing is spot on.

Gang stalking is: organized groups of current and former state actors doing illegal things, and targeting individual activists, dissenters, change agents, and others who challenge establishment power. These do this under the unconstitutional mob rule of “community policing ”, working with police, intelligence agencies, private contractors, and police affilliated non-governmental organizations such as the Ford Foundation, the Rotary club, Lions club, the Law Enforcement Intelligence Units (LEIUs ), the Association of Threat Assessment Professionals (ATAP ) etc.

Especially pernicious within the gang stalking dialectic is how state level actors spew total gibberish about aliens, Nibiru, UFOs, and other dubious crap about electronic brain beams online, in order to cover up state level police brutality, coercion, and manipulation of social discourse. Examples of that are plentiful such as Targeted Justice, and the US Air Force “OSI informers ”, which you can.contrast against cases like Ahmaud Arbery, stalked and hunted, and finally murdered by retired cops, their relatives, and others after a many years long gang stalking .

Hell, you can even have a look at my recent state level hack and the sunsequent state -level actors who tried to cover their tracks afterwards for evidence. The only “electronic weapons ” aimed at me that time were keyboards and internet cables, unlike this other electronic weapon called a “Taser”that was aimed at Ahmaud Arbery two years before his murder.

Y’all would do well to adopt it as a framework to investigate gang stalking complaints, from any angle, because unlike other blogs, ROGS provides evidence, using the scientific method. And, you can test and verify my results.

What is Level X thinking in the gang stalking dialectic? Revisiting the Cuban “sonic attacks ” with new evidence

Level X thinking, gang stalking, electronic devices, delusions v. Level X thinking

Because the modern world is overrun with mercenary security contractors, intelligence agents, and police agencies that defy constitutional law, there is always uncertainty, by design of the conditions of the modern police state, and that state defined by secret control, such as Fusion Centers, FVEYs world wide spying, and the hidden tactics of the innocently named tactics of “community policing.”

So, while we have been taught as western people that nations like Cuba are “totalitarian police states,” we have sat idyll as our democracies were overturned by undemocratic NSA spying, that leaks out across our nations and the world into hidden forms of police brutality that have yet to be defined.

What is a police state? Wikipedia gives us a few clues:

“The inhabitants of a police state may experience restrictions on their mobility, or on their freedom to express or communicate political or other views, which are subject to police monitoring or enforcement. Political control may be exerted by means of a secret police force that operates outside the boundaries normally imposed by a constitutional state.”

All over this blog, you will find empirical evidence that in fact and practice, my country, the USA, is no longer a democracy, but a police state by definition, particularly in that its domestic spying on.its citizens is occluded from our view

So,

Related Story: There is nothing democratic about modern due process violating “parallel colliding investigations.”

The origins of undemocratic and unconstitutional policing is disguised as “Countering Terror through Community Intelligence and Democratic Policing.” How police agents and agencies make work for themselves is the exact opposite of democracy, and modern western democracies policing tactics fit the exact definition of “what is a police state? ”

The suit alleges the Canadian government failed to properly inform, protect, treat and support the Canadians.

“Throughout the crisis, Canada downplayed the seriousness of the situation, hoarded and concealed critical health and safety information, and gave false, misleading and incomplete information to diplomatic staff,” the suit alleges.

During the past few years, the lawsuit contends, Canadian diplomatic families in Havana “have been targeted and injured, suffering severe and traumatic harm by means that are not clear but may be some type of sonic or microwave weapon.”

The brain injuries they’ve experienced, similar to injuries suffered by American diplomats posted to Cuba, are now known as Havana Syndrome.

The going dark problem and Silence on the Wire: silence is a two way street, and the case of Russian counter -surveillance of Americas political police using “low risk” tactical methods.

If you’ve ever sat still, in a quiet room, for a single moment, you know that there is no such thing as actual silence, because your own body makes noise.

“The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,”

Breath, and other organic, natural acoustic utterances or disturbances are a constant compliment to your presence. Then, there are the subsidiary, environmental and natural sounds around you, as the breeze, or the distant hum of nature in its various forms.

And so, this is the human baseline of silence, and it is a valuable starting point within which we discover the fatal flaw of all so called intelligence, and counter -intelligence: the arrogance of intel operators in assessing the value of data received or sent, because after disruption and beyond the human baseline,its all just “other ”noise. And noise then, becomes a two way street.


Related Content:
Free download of Silence on the Wire: Field Guide to Passive Reconnaissance and Indirect Attacks,by Michal Zalewski

So, in a free world, one would expect that the human rights and guarantees of “freedom ” would be maintained nearly religiously; as nearly religion itself, by those who draw paychecks based upon their oaths that they vow to uphold our constitutions.

But thats not what is actually happening in the west, since US, British, and the allied nations began their religion based, tribal-sectarian holy war that kicked off in 2001, and guys like me got to meet the “deep state ” head -on, after writing news stories without tribal -sectarian bias, and true to the form of the principles of journalism, and anticipating the Total Surveillance State.

 

Related Story: Take a look at how I was the first person in America to report on manufactured terrorism, and then, got years and years of black bag jobs,cowardly morons rifling through my belongings, and news stories stolen right out of my phone and email, and everything I describe herein AFTER that and more.

And look how that turned out for me, PERSONALLY.

Indeed, with the US FVEY spying,the accompanying “community policing, ” the western governments can no longer claim that they respect, or uphold anything resembling democracy backed by civil rights and due process procedures, much less freedom of any type.

So, it is here, where western governments have turned ordinary citizens into involuntary, non -consensual surveillance targets( aka Human Intelligence or, HUMINT )where the noise of ones own, voluntary silence is, “disrupted ” by the FVEYs data theft on every persons phone or computer and then, the exploitation of that data by intelligence operators to create what Dr. Lorraine Sheridan and others call “an echo chamber ” both online and off that is mediated by western extremist religious and political ideology, as we see here and here.

So, ROGS, the blog you are reading here, is what is called in psychology, a reaction formation, to the newly emerged total surveillance state, and the death of American democracy, which I once believed in whole heartedly, and fought for, very vainly, with well chosen words.

My country is no longer a democracy, insomuch as it ever was due to the multi-tiered levels of privilege, doled out to the select men and women, contrasted against the multi -tiered levels of slavery, peonage, and debt servitude that these others cast upon the poor, the dissenter or activist; the heretic and others who fall into the hidden slavery nets of any of the many sects and cults of organized religion, working through government apparatus both online and off .

So, this theological filtering, regardless of what cult, or sect, is also the baseline for all western dialogistics as we see in the sectarian targeting of men by known race -based operators; and in the resultant cult practices that follow, such as the un -naming of (primarily ) men in this example here and other examples I provide here at ROGS.

So, in such an environment of what is essentially the mass exploitation if individuals, and groups of individuals, one cannot act of actual free will, because these operations, and these operators, are in constant disruption mode. Its what their version of a society is.

In that light, there are many ways to use silence, and also noise to discern their capabilities, tactics, and methodology, AFTER the fact of them, casting you into their various webs of interaction FIRST.

Keep in mind that the pre -emptive, anti-democracy, anti-due process, sectarian secret police state justifies itself not from law, but from their version of tribal -religious and moral superiority.

In that world, its all binary, I /O data analyses: Kill or be killed; heaven and hell; black or white; Jewish or not Jewish; Republucan or Democrat woman or man, etc.

And it is that analyses which is its flaw, which is why they break and bend, and prostrate the law in gray area policing, aka “high policing ” aka political policing, as we saw with the al Ghazali problem.

So, no small surprise then, when ROGS was able to out a few Department of Defense affilliated persons here who targeted me on US soil as they worked ine or another angle of fraudulent FBI /DHS /Private contractor CVE program, or cult members who cyberstalked me on Twitter, working with Democrat party with operatives INSIDE Twitter monitoring my location; or most recently, yet ANOTHER Department of Defense affilliated, Brookings Institute person following my blog.

As I said: I know what kind of noise is natural, like how this humble electrician and merchant mariner was literally recruited by a gang strike force in LA, versus any of hundreds of bizarre DoD/DHS /FBI /NGO affilliated time wasters they toss,at me, like these guys here

So if little old ROGS, an American citizen who has never been convicted of any crime in any trial based in constitutional law, civil rights, and due process can be targeted and stalked, and harrassed by those I define, and name herein, wha else is goung on in western democracies that remains hidden?

And it is that last question that has,ROGS cheering for all the “bad guys, ” like Russia and China and even lil Kim in North Korea, apparently absent from an important meeting recently, lol. Because when “America, land of the free ” morphed into “America, just another police state, ” ROGS and hundreds of thousands like me got thrown under the bus.

Listen: China is thriving, and Russia protects Edward Snowden to this day, and Kim is no threat to anyone.

But I guarantee that CIA/DIA/NSA /FBI feeding down into “parallel colluding investigations ” and the subsequent constant surveillance of our webs of relationships single -handedly voids the constitutional compact, and the social compact as well.

So, I like to fight back by deploying counter -surveillance directly at those who point it at me, because my personal silence has been “disrupted ”. And in so doing, I learn a lot.

Here below, we see how Russians were able to anihilate FBIs urveillance teams privacy, and also how they were able to use this not -so -covert, sloppy, bizarre surveillance to gain valuable data about US security.

Which, would, under normal circumstances, inevitably undermine US security, if our own agencies hadnt ALREADY done that.

But in total surveillance states, security is ALREADY pre -emptively undermnied by tribal -sectarianism, and those who have deployed high policing on their own citizens .

The case of the Spies who laughed last, at Americans who use their own fellow citizens for “electronic target practice,” or:

FBI Follies, from Russiagate, With Love, via,Yahoo News Exclusive

Exclusive: Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil
Zach Dorfman, Jenna McLaughlin and Sean D. Naylor

Yahoo NewsSeptember 16, 2019

The discovery of Russia’s newfound capacity to crack certain types of encryption was particularly unnerving, according to former U.S. officials.

“Anytime you find out that an adversary has these capabilities, it sets off a ripple effect,” said a former senior national security official. “The Russians are able to extract every capability from any given technology. … They are singularly dangerous in this area.”

The FBI’s discovery of these compromises took place on the heels of what many hoped would be a breakthrough between Washington and Moscow — the Obama administration’s 2009 “reset” initiative, which sought to improve U.S.-Russia relations. Despite what seemed to be some initial progress, the reset soon went awry.

In September 2011, Vladimir Putin announced the launch of his third presidential campaign, only to be confronted during the following months by tens of thousands of protesters accusing him of electoral fraud. Putin, a former intelligence officer, publicly accused then-Secretary of State Hillary Clinton of fomenting the unrest.

It was around this time that Putin’s spies in the United States, operating under diplomatic cover, achieved what a former senior intelligence official called a “stunning” technical breakthrough, demonstrating their relentless focus on the country they’ve long considered their primary adversary.

That effort compromised the encrypted radio systems used by the FBI’s mobile surveillance teams, which track the movements of Russian spies on American soil, according to more than half a dozen former senior intelligence and national security officials. Around the same time, Russian spies also compromised the FBI teams’ backup communications systems — cellphones outfitted with “push-to-talk” walkie-talkie capabilities. “This was something we took extremely seriously,” said a former senior counterintelligence official.

The Russian operation went beyond tracking the communications devices used by FBI surveillance teams, according to four former senior officials. Working out of secret “listening posts” housed in Russian diplomatic and other government-controlled facilities, the Russians were able to intercept, record and eventually crack the codes to FBI radio communications.

Some of the clandestine eavesdropping annexes were staffed by the wives of Russian intelligence officers, said a former senior intelligence official. That operation was part of a larger sustained, deliberate Russian campaign targeting secret U.S. government communications throughout the United States, according to former officials.

The two Russian government compounds in Maryland and New York closed in 2016 played a role in the operation, according to three former officials. They were “basically being used as signals intelligence facilities,” said one former senior national security official.

Russian spies also deployed “mobile listening posts.” Some Russian intelligence officers, carrying signals intelligence gear, would walk near FBI surveillance teams. Others drove vans full of listening equipment aimed at intercepting FBI teams’ communications. For the Russians, the operation was “amazingly low risk in an angering way,” said a former senior intelligence official.

The FBI teams were using relatively lightweight radios with limited range, according to former officials. These low-tech devices allowed the teams to move quickly and discreetly while tracking their targets, which would have been more difficult with clunkier but more secure technology, a former official said. But the outdated radios left the teams’ communications vulnerable to the Russians. “The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,” said the former official.

A former senior counterintelligence official blamed the compromises on a “hodgepodge of systems” ineffective beyond the line of sight. “The infrastructure that was supposed to be built, they never followed up, or gave us the money for it,” said the former official. “The intelligence community has never gotten an integrated system.”

The limitations of the radio technology, said the former senior officials, led the FBI’s surveillance personnel to communicate on the backup systems.

“Eventually they switched to push-to-talk cellphones,” said a former counterintelligence executive. “The tech guys would get upset by that, because if they could intercept radio, they might be able to intercept telephones.”

That is indeed what happened. Those devices were then identified and compromised by Russian intelligence operatives. (A number of other countries’ surveillance teams — including those from hostile services — also transitioned from using radios to cellphones during this time, noted another former official.)

Sloppy Cops: Judge slams FBI for improper cellphone search, stingray use "They are not the only instances of sloppy, inappropriate law enforcement work." What is organized gang stalking?

What is “bad faith” and how organized gang stalking is “fraud upon the courts.”
Federal Agent describes how he gang stalks, breaks the laws, shits on due process of law, performs gas lighting black bag jobs, which are known as “gas lighting” in the OGS dialectic.

Stonie Carlson,FBI agent describes how he performs the black bag job:
“When we approached Apartment 405, I knocked on the door loudly, as I have hundreds of times,” Carlson wrote in a November 2017 declaration. “When I knocked, the door swung open as if it had not been latched shut in the first place. Never before in my career had this happened, and its occurrence struck me as troubling and concerning, especially in the high-crime area in which the apartment was located. I immediately began to fear for the well-being of anyone who might be inside. I decided to conduct a safety sweep of the apartment.”

A case from California highlights how a bad actor in the FBI,Stonie Carlson(who lives in Alameda,CA)liesto get warrants, breaks in to peoples houses without leaving a warrant, and much more “criminality.”
Or: what is “gas lighting” as pertains to illegal government breakins, aka black bag jobs?
Lets examine the breadth and scope of how sherrifs departments are willingly corrupted by neverending investigations that use illegal means and unconstitutional methods to get“the bad guys.”()
Corruption in California, or: Caliphonication, and illegal activity by cops who work in federal Task FARCES, from ArsTechnica.com
During a December 2017 hearing, Judge Chhabria also had this incredible exchange with Randall Leonard, an Assistant United States Attorney who argued that because Agent Carlson was part of a sheriff-federal task force, he should be considered a sheriff, with all the rights of a state “peace officer.”
Judge Chhabria didn’t buy it.
THE COURT: Federal law makes him a sheriff under California law?
MR. LEONARD: Well, I mean—
THE COURT: So if federal law said that all French poodles are sheriffs under California law, would that be OK?
MR. LEONARD: Of course not, Your Honor.
THE COURT: There would have to be California law saying, “Yes, we agree that French poodles are sheriffs;” right?
MR. LEONARD: Certainly.
THE COURT: Otherwise French poodles would not be a sheriff under California law, right?
MR. LEONARD: That’s right.

Electronic implants, Wikileaks Vault 8, victims of organized gang stalking, hive mind, and honeypits.

ROGS loves the Constitutional guarantees of due process, and ROGS loves America. I am pathetic that way~the grand American delusion is so appealing.
(Vault 8 is an inside joke.)
BUT: The DVIC is actually a war on speakers and words, and without a doubt, the first amendment itself is the target of neocon and tribal, religious interests, now interfacing with the massive influx of Saudi, and other nations cash flows, and the media narrative.
I have been gang stalked since the DVIC was birthed into our lives in 1993 ( the exact same year when the Anti Defamation League was outed as a domestic spy ring that sold out American activists) and became severely gang stalked after I broke a nation wide story in 2003-4 about how America’s agencies manufacture terrorists by occluding access to civil rights and due process.
To journalists, researchers, and others interested in answering the many questions that are presented in the “bizarre” online dialectic of gang stalking, here below is how the CIA (and every other IC agency, private contractor, and the FBI) uses the term “electronic implants,” which describes covert hacking techniques, and plausible deniability in exploitation of targeted computers, targeted computer networks, and targeted individuals.
Without a single doubt, this is empirical evidence of CIA/other IC/NGOs operations on US soil, and anywhere else where OGS is taking place.
And it single handedly validates the inherent mission creep of the WOT redirecting and exploiting domestic targets.

UPDATE 10-19-2019: Almost two years after I wrote this post, and became active online, the ADL implicated itself as actually deploying military psychological operations on target individuals, using artificial intelligence software called Moonshot CVE, which had previously been used in theaters of war; and, perpetuating negative stereotypes of Jewish people as mind controlling Svengalis.

1570435771780
Electronic implants and gang stalking, courtesy of Wikileaks, and Julian Assange, who is literally being isolated, and denied visitation from other people as I write this. And, the American/FVEY deep state has worked tirelessly to force Ecaudor to revoke his asylum.
Isolation, you will recall, is ALSO a major threat/complaint/”delusion” of targeted individuals.


RELATED STORY
:I wrote about the HIVE in coded language long before this story below became mainstream news. The reader can infer that writing openly about such things is dangerous, and also, ROGS personal writing style is somewhat coded for reasons I have explained elsewhere.

The Hive mind in the gang stalkung dialectic online, from Wikileaks.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.
…………..
And-I hope the dood doctors like David V. James, and Lorraine Sheridan-and certainly Dr. Mike Wood, dont get to caught up in the echo chamber as wasps and bees of all kinds swarm them for commentary in these matters.
But OGS is very real, and puts MHCHAOS and MKULTRA to shame.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

Gang stalking and Electronic implants: Here is how the NSA uses electronic implants.

I first experienced an electronic implant in or around 2004-5. Computer implants are real, NSA and other agency break-ins to hardware and software are real, and documented in main stream news.

In case you were sleeping during the takeover of the United States by the so-called “deep state,”(and it might be noted that both left wing AND right wing opinion leaders agree that the deep state, aka criminal syndicates in government, are real. And, the Harvard Law Review documents debt bondage, a shadow justice system, and a bizarre “deep state” second tier of the justice system that preys upon the poor in the USA, aka the collusion between corporations, international finance and its hydra’s and Octopussies of NGO’s slopping the troughs of American police and intelligence agencies such as the FBI, the CIA and the DHS, as the NSA spies on all of us and trickles data out to Fusion Centers, here is one of the phrases they use online to distort the meaning of the phrase “gang stalking,” and to obscure their illegal actions:
They stuck “electronic implants”in me!!!!!
1575275037998
Electronic implants are very real in many ways, but not the way they are discussed in the online dialectic of OGS. In fact, the use of the term as a biological implant is designed to obscure other more real implants, because in case after case ranging from intellectual property theft BY the state or a subsidiary corporate, private intel gathering firms like Facebook, or the host of DHS/FBI /ADL “contractors” who stalk political targets, to major spy operations-all deploy malware, spyware, and electronic code to infect the cell phones, computers, and other electronics of targeted persons.
1575275037998
And surely as we see in case after case of mass shooters, we see long term agency involvement in those peoples lives as predicate for these mass homicides, and quite frequently, contact with zionism, FBI careerist shitbags banking on the unnaccountability of CVE programs and their accompanying “parallel colluding investigations” aka gang stalking,  and Jewish/zionist Supremacy in college settings, as we saw with the recent Texas cases, and dozens of others ranging from Stephen Paddock, to this guy here, Mathew Riehl, an attorney who himself ranted AGAINST Nazi’s and the Eastern Bloc Judenrate’s favorite go-to pundit, white females, before he was shot in cold blood in Colorado after invoking his Constitutional rights to be served a warrant before he is gunned down in his own home by Israelified “Ich, Du” Buberism and Hegel, in a steroid can.

Related Story: The Doctrine of Superior People-How a racist and actual Cabal of misanthropes murder with impunity, wage slander and disinformation, steal resources, control cultures, buy police forces cheaper than dime store drag queen lipstick, and get away with it, century after century-and blame it all on YOU!

And dozens of other well documented abuses of databases, and actual electronic snooping and hacking such as the Minnesota cases of reporters stalked by hundreds of NGOs/AIPAC/federal dollar/DVIC funding related stalkings- to cases of journalists like former CBS investigative reporter Sharyll Atkisson are sabotaged and spied on by political police (the FBI, DHS, et al are merely that), we do in fact see electronic implants as part of the illegal Constitution defying nature of the FISA court coup, the DHS sectarianism,  and the attendant cowardly conduct at the SCOTUS.
As I have noted, my personal circumstances indicate that I have been targeted by multiple cause based/ religion based/ and other stalkers for decades, because I defy their mystery cults and religions-but also because I refuse to be circumscribed by their un-Constitutional gray area policing methods, and have been a first amendment fighter and more for decades (Here’s lookin’ at YOU Phil!)
I first experienced an electronic implant in or around 2004-5, as progressive organizations and institutions ranging from colleges, to state agencies and their attendant database abuses worked to frame me/harass me/ implicate me/ cause me to be “flipped” as a useful idiot to their political causes, or otherwise charged criminally in a variety of ways.
There I was, sitting in a college newsroom, when the computer redirected, all by itself, as if a spell had been cast upon it! To Nazi-land!….an imaginary place created generation after generation by the SAME FOLKS, as international bankers create, and then gut local economies.
But what really mattered then more than anything, was that they attempted to defuse my activism by following me around with nebulously middle eastern photographers, and tried to neuter my ability to have political effect. And what an effect!
Only lately is MSM talking about how a militant, AIPAC financed zionist sect of rapists and baby killers has taken over our airwaves, and purchased our police cheaper than donkey-dick-meat in a Mexican strip bar. Its an actual multi-billion dollar industry,where some-like the famous case of the Jewish nazi Frank Collin play both sides of the drama,and get paid in each role.

Related Story: Why has the American Civil Liberties Union(ACLU)dropped so many free speech, assembly,association, and privacy balls in the last decades, despite having ample funding, and amplecauses to challenge FISA courtera NSA spying? The answermughtbe: the same answer we always come back to, which is “why is the case of Frank Collin~nee~Cohen, the famous Jewish Nazi of Skokie, IL,revered as a victory forfree speech, when so.many other cases(like prisoners reading materials) NOT heralded,or defended by this group?”

Well, at least Marcy Wheeler sees the utility of the word “targeted” now, and how it pertains to individuals, despite her emergent socialist bent (oh, those poor deluded young people, dont they know thatthey are useful idiots for the other four tentacles of the Bilderbergtopuss?…) And the Intercept-despite its ADL sponsorship, occasionally takes on organized gang stalking in one way or another-especially the manufactured terrorism parts of it, as these cases-case after case after case indicate that OGS is in fact a precipitator, and NOT a mental illness at all. Get out the ROGS BINGO card!
See the source image
And while this benefited a few people in the short term-like the bald headed AIPAC sponsored college president, a notorious AIPAC shill and an American Studies professor/rat whose favorite read then was “Blood in the Face” by notorious James Ridgeway ( a likely informant), and a handful of dirty cops whose testosterone outweighs their shrinking testicles- in the wider dialectic.
And, it revealed to me that the facts I put forward herein are true and replicable elements of how the political processes of America are entirely broken-but also how a lawsuit could begin to challenge these practices. I mean- a few militant armed American neo -Nazis/alt-Rightists/bad-guy-racists-du-jour (those who aren’t Jewish in the first place, like the famous Nazi of Skokie, Frank Collin, ne~ Cohen, or who aren’t working for the agencies, if any can be found) have NOTHING on people who can purchase the American police cheaper than trailer park trucker meth made out of truck-stop pep pills.
But actual electronic implants aren’t anything like what you read about online, and anything to the contrary is pure insanity. You see: agents of the state and its Israelified, racist, zionazi sponsored spy aparatizionazi sponsored spy aparati literally gave me a computer that phoned home to a local political precinct, several political organizations in a certain state, the local police department, and computer servers located curiously between a college and these various agency operated and  maintained computer main frames.
And THOSE main frames were situated curiously close to SEVERAL of the above named agencies. They were literally within blocks of each other, as is the case with most cities and towns across America. But, of course, much of the evidence of THAT disappeared in a burglary in 2009, which I have documented elsewhere.
Well- of course I sabotaged the crap out of their sooper seekrit recruitments, entrapments and implantations, much to their chagrin, and found friends who were less crappy than them. And here below is how they were using implants then, but only I and a select few others knew this, and many of those are now deceased, distanced and afraid, or otherwise co-opted. And, my discovery THEN is when the break-ins to my homes began in force as well, because I laughed in their faces, every time.

How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

“Equation Group” ran the most advanced hacking operation ever uncovered.

In an exhaustive report published Monday at the Kaspersky Security Analyst Summit here, researchers stopped short of saying Equation Group was the handiwork of the NSA—but they provided detailed evidence that strongly implicates the US spy agency.
First is the group’s known aptitude for conducting interdictions, such as installing covert implant firmware in a Cisco Systems router as it moved through the mail.

Second, a highly advanced keylogger in the Equation Group library refers to itself as “Grok” in its source code. The reference seems eerily similar to a line published last March in an Intercept article headlined “How the NSA Plans to Infect ‘Millions’ of Computers with Malware.” The article, which was based on Snowden-leaked documents, discussed an NSA-developed keylogger called Grok.
….read the full article on the NSA’s 14 year hidden domestic spy operation here.
Gray area policing, aka “high policing,” and Grayfish computer intrusions
<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

 
Well, anyways- for the researcher of organized gang stalking, the legal defense counsel or civil litigator who encounters the “gang stalking dialectic” or one of its many actual victims-and for the sworn *cough, cough* peace officers whose goal is to uphold our law and our Constitution-I suggest you have a read through that article-because now, other nations are peeking in here, quite routinely-and some of THOSE are peeking at you as you peek in at my writing.
And, for those who I have named herein-I suggest you keep your eyes open at night, because the moon near YOUR house will be getting brighter. A LOT brighter now.  Bright enough to encompass whole families.
Try not to see patterns, though….and maybe, watch your back, too. Apophenia, and all that kind of makes life hard, if you know what I mean. And certainly, that trick you played on Sharyll Atkisson wasn’t funny. Yup-I hear gang stalkers want to make you go broke fighting for your rights in courts that have deaf ears and blind eyes.

Six codenames

In all, Kaspersky has tied at least six distinct pieces of malware to Equation Group. They include:
EquationLaser: an early implant in use from 2001 to 2004.
DoubleFantasy: a validator-style trojan designed to confirm if the infected person is an intended target. People who are confirmed get upgraded to either EquationDrug or GrayFish.
EquationDrug: also known as Equestre, this is a complex attack platform that supports 35 different modules and 18 drivers. It is one of two Equation Group malware platforms to re-flash hard drive firmware and use virtual file systems to conceal malicious files and stolen data.
It was delivered only after a target had been infected with DoubleFantasy and confirmed to be a target. It was introduced in 2002 and was phased out in 2013 in favor of the more advanced GrayFish.

GrayFish: the successor to EquationDrug and the most sophisticated of all the Equation Group attack platforms. It resides completely in the registry and relies on a bootkit to take hold each time a computer starts. Whereas EquationDrug re-flashed hard drives for six models, GrayFish re-flashed 12 classes of hard drives. GrayFish exploits a vulnerability in the CloneCD driver ElbyCDIO.sys—and possibly drivers of other programs—to bypass Windows code-signing requirements.

<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

Enlarge/ The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code (“blue pill”, “red pill” – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly “swallows.”The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.

GrayFish is the crowning achievement of the Equation Group. The malware platform is so complex that Kaspersky researchers still understand only a fraction of its capabilities and inner workings. Key to the sophistication of GrayFish is its bootkit, which allows it to take extraordinarily granular control of the machines it infects.
“This allows it to control the launching of Windows at each stage,” Kaspersky’s written report explained. “In fact, after infection, the computer is not run by itself anymore: it is GrayFish that runs it step by step, making the necessary changes on the fly.”

Fanny: A computer worm that exploited what in 2008 were two zero-day vulnerabilities in Windows to self-replicate each time an infected USB stick was inserted into a targeted computer. The main purpose of Fanny was to conduct reconnaissance on sensitive air-gapped networks. After infecting a computer not connected to the Internet, Fanny collected network information and saved it to a hidden area of the USB drive. If the stick was later plugged in to an Internet-computer, it would upload the data to attacker servers and download any attacker commands. If the stick was later plugged into the air-gapped machine, the downloaded commands would be executed. This process would continue each time the stick was switched between air-gapped and Internet-connected machines.

Kaspersky Lab

TripleFantasy: A full-featured backdoor sometimes used in tandem with GrayFish.

Want to know the real reason the “deep state”(aka AIPAC sponsord organizations, racist sectarian political factions that hide behind NGO’s, and of course, every other American “law enforcement agency”  is at war with Kaspersky? Read the full article!But I for one, am not scared of the Chinese, or the Russians taking over anything.
Hell, I will show them to your door;-)
Related Story: That time-just that ONE-where I was approached by someone from Vegas who knew about these hacks, and wrote to me here at ROGS.

Have you noticed the CIA listens in to key discussions online?

The headline up there is an inside joke-it came from inside my head. You see, lot’s of people think that sooper seekrit agencies like the CIA listens to us all. But that’s not true! That’s crazy! And worse- a “potentially dangerous tribe of troubled minds” in the organized gang stalking online community are starting to talk about their troubles online! They must be stopped!
But the truth is, the CIA listens to some of us, more than others of us in this modern Operation Gladio/aka CHAOS. And: the star chambers wage battle between six pointed stars versus five pointed stars, and MORE CHAOS!!!! With some THIRTEENS thrown in to the lions den (lions are seldom reported to wear high heels, but there are exceptions. Like when the rotary wheel is used as a form of domestic NTT, and Mooses and Elks and Lions Bears conspire in High Heels Policing. Ooops. Bears are Russians-never mind)
Related Story: The Privacy Raping Boondoggle That is the NSA/FiveEyes-Israel (New Zealand) data theft pipeline. What’s in a name? The FOUR MILLION DOLLAR Thin Thread versus the FOUR BILLION DOLLAR Trailblazer.
And William Binney, who recently sat down with the CIA director, is one of those “troubled people.” He has even lent his name to the targeted individual community, to investigate gang stalking. Yeah, for real.
And the Washington Post-one of the deep states favorite places to take a leak-say’s “Binney is playing with fire!” Let me know if that sounds like a threatening/threat narrative laden headline (does the use of THAT word up my DHS “threat matrix score?”)-because that could indicate paranoia, and we would have to get you some mental health treatment. Maybe, the CIA’s Mormon torturers, Mitchell and Jessen could take a whack at you in a black site, and get YOU the help YOU need! Because psychologists are in on it at every level-to help you, of course.
Here-let’s have a look at what one of the Rubin Klan have to say about that meeting (you might start to see patterns in journalism when people who are in the Klan of Rubin show up pin a narrative. Here-look at this Rubin sand-witch- a serial rape hoaxer):
William Binney About to Get Tossed Into Sheol!!! According to Jennifer Rubin
My Post colleague Aaron Blake reports:

The Intercept just broke a pretty big story: CIA Director Mike Pompeo reportedly met with the purveyor of a disputed theory about the internal Democratic National Committee emails that were released last year — a theory that runs counter to the intelligence community’s own long-standing conclusions about the matter.
It’s not the first example of Pompeo doing something that has been put under microscope. But there is a common thread running through just about every example: Pompeo doing and saying questionable things involving Russia — and those questionable things tend to lean in a pro-Trump direction.

I still remember when “those people” said the “deep state” was a conspiracy theory-do you? Yeah, and now look-Google has 42 MILLION results for that exact term. Sorry, Dr’s Mike, and Lorraine, and David- but the troubled minds tribe is growing! And- deep state is really a code word for “traitors.”
And even our own government has noted that SOMEONE likely has an actual sound cannon that was used on our diplomats in Cuba. Never mind the narrative distortion that has gone on since this story broke-because “webwashing” is a real thing.
Ever notice how the things I write about here at ROGS happen in “real news” shortly after I get on the case? Yeah-it’s a pattern-my long term case of apophenia following me around like Gloria Ghost. You might have forgotten Gloria, so here is a picture of my damned sell in dis’ dress:

rabbit
This is my imaginary friend, Gloria Ghost, the scar faced bunny. Only I can see her-she’s totally in my head. Psychologists tell me it’s apophenia. Some people say Gloria is full of sh!t, but I always correct them, and let them know that it’s not sh!t-it’s dumpsters full of garbage called a “dossiere'” with augmented reality at the internet switch, and recycling of old, tired tropes and narratives of moral panics dating back to 1913. Gloria is Edward Bernay’s favorite daughter- he lit her on fire and called her a “Liberty Torch.” Poor poor Gloria.

Well-who knew? My old neighbor Doug’s friend Pompeo called one of my favorite whistle blowers, William Binney into his star chamber the other day-no kidding. And I’m pretty sure that it was Doug who made it happen (Hi Doug! Where dd you disappear to anyways-and was REAL ESTATE involved?). So, I think now is a good time to revisit my “theory” of the horsehair worm in the crickets head, which I call “memetic neuro-fasciitis of the mind.”
Or, as you know it “the NSA data entrapment scheme that targets ALL American’s and uses the collected data to steal elections by harassing, manipulating, and “no touch torturing” political opponents of the deep state (aka the “gay mafia”) and so on.
You might remember Bill Binney as a true and real American Hero who built a sooper seekrit internet email and phone call interception machine back around 2001, the goal of which was to capture intelligence on FOREIGN spies and bad guys. But because his machine respected our Constitutional rights of due process, and was extremely cost effective, coming in just under FOUR MILLION- he was fired, and the NSA built a FOUR BILLION dollar machine instead, and targeted AMERICANS and politics. Then, they tossed that machine in the dumpster, and built one that cost 72 BILLION per year.
Then, the FBI kicked his door in to shut him up from talking about it. You can beat the charge, but you can’t beat the ride, they say.
Well- how else to build and enforce, and police, and re-police a narrative that demands a climate of domestic terror??!! And how to get more monies for all those helpful, and hungry hungry hungry DVIC Gloria Bunnies in high heels? I have an idea! How about we AMERITHRAX the crap out of the narrative? Yeah! Go team black/red! Here- from Washington’s bloghave a look at the AMERITHRAX hoax, which claimed the lives of five American’s.
Good Ol’ FBI-I guess every totalitarian bankster state needs a domestic political police to suppress, intimidate, bully, frame, and harass journalists and dissenters and writers and save cute puppies and all that- to save them from those who break into our Windows 10 to get a grab at our kids, or wage years long black bag jobs. I mean-Hitler had the SS and all those brownshirted patriots stalking for Der Muterland, and Stalin had the Cheka and the NKDV, and who can forget how well the Stasi worked in East Germany as John LeCarre’ wrote about folks who tinker around behind the scenes and exploit the narrative itself(or whose asses get fatter by the day counting beans in the DHS right now)!?
Well anyways- if you have been following my writing for the last few years before this blog, you will see I have chronicled these deep state “disruption campaigns” since around 2004. Yeah- not a profitable business model, that’s for sure. BUT: a very important check against the balance sheet which is always hungry hungry hungry! Checks and balanceslike alternative media and blogging– are the thinnest and most fragile threads that sew our democracy together, so that those who would-and can and do-tear us apart don’t get their way.
Here’s a bit from the VIPS memo, which is a complete refutation of the DNC “Russian Hacking” narrative, which documents INSTEAD a “someone most likely copied the data to a thumb drive” narrative (maybe the drive had a case of bad USB??):

MEMORANDUM FOR: The President
FROM: Veteran Intelligence Professionals for Sanity (VIPS)
SUBJECT: Was the “Russian Hack” an Inside Job?
Executive Summary
Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computer. After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device.

Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack. Of equal importance, the forensics show that the copying was performed on the East coast of the U.S. Thus far, mainstream media have ignored the findings of these independent studies [see here and here].
Independent analyst Skip Folden, who retired after 25 years as the IBM Program Manager for Information Technology, US, who examined the recent forensic findings, is a co-author of this Memorandum. He has drafted a more detailed technical report titled “Cyber-Forensic Investigation of ‘Russian Hack’ and Missing Intelligence Community Disclaimers,” and sent it to the offices of the Special Counsel and the Attorney General. VIPS member William Binney, a former Technical Director at the National Security Agency, and other senior NSA “alumni” in VIPS attest to the professionalism of the independent forensic findings.
The recent forensic studies fill in a critical gap. Why the FBI neglected to perform any independent forensics on the original “Guccifer 2.0” material remains a mystery – as does the lack of any sign that the “hand-picked analysts” from the FBI, CIA, and NSA, who wrote the “Intelligence Community Assessment” dated January 6, 2017, gave any attention to forensics.
NOTE: There has been so much conflation of charges about hacking that we wish to make very clear the primary focus of this Memorandum. We focus specifically on the July 5, 2016 alleged Guccifer 2.0 “hack” of the DNC server. In earlier VIPS memoranda we addressed the lack of any evidence connecting the Guccifer 2.0 alleged hacks and WikiLeaks, and we asked President Obama specifically to disclose any evidence that WikiLeaks received DNC data from the Russians [see here and here].
Addressing this point at his last press conference (January 18), he described “the conclusions of the intelligence community” as “not conclusive,” even though the Intelligence Community Assessment of January 6 expressed “high confidence” that Russian intelligence “relayed material it acquired from the DNC … to WikiLeaks.”
Obama’s admission came as no surprise to us. It has long been clear to us that the reason the U.S. government lacks conclusive evidence of a transfer of a “Russian hack” to WikiLeaks is because there was no such transfer. Based mostly on the cumulatively unique technical experience of our ex-NSA colleagues, we have been saying for almost a year that the DNC data reached WikiLeaks via a copy/leak by a DNC insider (but almost certainly not the same person who copied DNC data on July 5, 2016).
From the information available, we conclude that the same inside-DNC, copy/leak process was used at two different times, by two different entities, for two distinctly different purposes:
-(1) an inside leak to WikiLeaks before Julian Assange announced on June 12, 2016, that he had DNC documents and planned to publish them (which he did on July 22) – the presumed objective being to expose strong DNC bias toward the Clinton candidacy; and
-(2) a separate leak on July 5, 2016, to pre-emptively taint anything WikiLeaks might later publish by “showing” it came from a “Russian hack.”
*  *  *
Mr. President:
This is our first VIPS Memorandum for you, but we have a history of letting U.S. Presidents know when we think our former intelligence colleagues have gotten something important wrong, and why. For example, our first such memorandum, a same-day commentary for President George W. Bush on Colin Powell’s U.N. speech on February 5, 2003, warned that the “unintended consequences were likely to be catastrophic,” should the U.S. attack Iraq and “justify” the war on intelligence that we retired intelligence officers could readily see as fraudulent and driven by a war agenda.

The January 6 “Intelligence Community Assessment” by “hand-picked” analysts from the FBI, CIA, and NSA seems to fit into the same agenda-driven category. It is largely based on an “assessment,” not supported by any apparent evidence, that a shadowy entity with the moniker “Guccifer 2.0” hacked the DNC on behalf of Russian intelligence and gave DNC emails to WikiLeaks.
The recent forensic findings mentioned above have put a huge dent in that assessment and cast serious doubt on the underpinnings of the extraordinarily successful campaign to blame the Russian government for hacking. The pundits and politicians who have led the charge against Russian “meddling” in the U.S. election can be expected to try to cast doubt on the forensic findings, if they ever do bubble up into the mainstream media. But the technical limitations of today’s Internet are widely understood. We are prepared to answer any substantive challenges on their merits.
You may wish to ask CIA Director Mike Pompeo what he knows about this. Our own lengthy intelligence community experience suggests that it is possible that neither former CIA Director John Brennan, nor the cyber-warriors who worked for him, have been completely candid with their new director regarding how this all went down.

HAhahahahaHahaha. Apophenia. Epiphanies. Hahahahahaha. I’m going CRAAaaaAAAAzzzYYY!. Mmmmmmbwahaahahahhaaha.
And now, you are too. But-it IS all related indeed-to politics and political policing of words themselves. Try not to get too involved in all the pattterns….But if you REALLY want to go nuts, decipher the meaning of all those letters just above this paragraph. That should keep you busy for awhile-I mean-you lard asses have nothing better to do anyways.
Well sure- looking for Stephen Paddocks hard drive and all. That will keep you busy the same way that Oswald thingy kept you busy for 60 years or so. HAHAHHAHAHAHAHAHAAHa.
Yeah- it’s in the party van.
FBI caught with its pants down, and its game wide open in Asia-is that really a bad thing?!?FBI_Party_van2FBI_Party_van2.jpg

What is "gang stalking"? It is the result of a nation that respects no laws- and a nation 'for sale.'

The article below is from Business Insider in 2012. It documents one of the first official sources that claimed the government had sold our rights to “others,” who were wiretapping the entire nation.
The article chronicles decorated intelligence officer, and NSA whistle-blower William Binney’s ostracization, and excommunication from the cult of intelligence, as well as his harassment by the FBI for trying to save the taxpayers FOUR BILLION DOLLARS- but also, that he tried to preserve “Costitutional Liberty,” aka “due process of law, which Americans have not had since 2004.
In 2012, many already knew that the local police were using and abusing massive databases. Many already knew that ‘somehow’ that police, and multi-agency Task Forces had access to cell phones in real time, and that ‘somehow’ they could track “targeted” communications across a city, or across a continent- and into international jurisdictions (Hi Toronto!)- and that they could repeat back selected words and phrases just to let them know they  are watching.
While these people didn’t have a ‘name’ for it them, we now know it is the current sate of affairs where Fusion Centers were spying on citizens in local environments outside the view of any court, and outside the view of due process of law, and without respect for the Bill of Rights.
These people have a name- they are “targeted individuals,” and here is where the world began to know what “TI’s” knew as far back as 2003-4:

NSA Whistleblower Says The Feds Are Gathering Data On Nearly Every US Citizen

NSA ACLU
The government has been collecting data on nearly every U.S. citizen and assembling webs of their relationships, National Security Agency whistleblower William Binney told the Hackers On Planet Earth (HOPE) conference last week.
Binney worked for the Defense Department’s foreign signals intelligence agency for 32 years before resigning in late 2001 because he “could not stay after the NSA began purposefully violating the Constitution,” according to a statement he made in court records.
On April 20 he gave his first interview after resigning to Democracy Now!, asserting that the FBI raided his home after he blew the whistle on the NSA’s extensive spying on Americans.
On July 2 Binney, along with two other former NSA employees, agreed to provide evidence in the Electronic Frontier Foundation’s lawsuit that alleges the U.S. government operates an illegal mass surveillance program (i.e. Jewel vs. NSA).
His sworn declaration of facts that he’s willing to testify to are both telling and scary:

• In the ’90s Binney supervised the development of a NSA program called “Thin Thread” that was designed to identify international networks of connections between people from their internet communications. Since one side of the communications was domestic, the program encrypted the data so as to protect the privacy of U.S. citizens until a warrant could be obtained.
After 9/11 all safeguards went out the window as “the individual liberties preserved in the U.S. Constitution were no longer a consideration.” Members of his Thin Thread team began implementing a program called the President’s Surveillance Program (PSP), which collected domestic electronic communications traffic without any privacy protections.
• The NSA began seizing and storing most electronic communications passing through 10 to 20 wiretapping rooms in key telecommunication points throughout the country where all data must pass in order to move from one party’s network to another’s, allowing the government to identify and analyze any individual or group through a searchable database.
• Binney cites the $1.2 billion Utah data center currently being built and the new supercomputing center at the NSA headquarters in Fort Meade, Maryland, pointing out that the immense size and computing power of these facilities far exceeds the capacity necessary for storing targeted communications but is “consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications.”
In a nutshell Binney states – with considerable authority – that the NSA has been conducting comprehensive surveillance on U.S. citizens for more than a decade.

 
[youtube https://www.youtube.com/watch?v=JuvJ7tKIF2c&w=561&h=432]

Organized stalking and police surveillance of social media: ACLU notes that targeted 'influencers,' activists and other TI's are 'real'

Police Use of Social Media Surveillance Software is Escalating, and Activists are in the Digital Crosshairs

By: Nicole A. Ozer
Map of California, with dots marking the areas where local law enforcement has acquired social media monitoring software

It goes without saying that speaking out against police violence or government overreach shouldn’t land you in a surveillance database. But it can, and it does.

The ACLU of California has received thousands of pages of public records revealing that law enforcement agencies across the state are secretly acquiring social media spying software that can sweep activists into a web of digital surveillance.

This set of public records requests is part of our ongoing work with community groups to shine a light on surveillance technologies and call for community control in decision-making around policing. Last year, we worked with local activists in Fresno to reveal that its police department was using a MediaSonar social media surveillance tool that boasted the capacity to identify so-called “threats to public safety” by monitoring hashtags such as #BlackLivesMatter, #DontShoot, #ImUnarmed, #PoliceBrutality, and #ItsTimeforChange.

But we had a hunch that Fresno was not an isolated case.

So this summer, we requested records from 63 police departments, sheriffs, and district attorneys across California. And what we learned from the documents was alarming.

Of the responses we’ve received, 40% of the agencies (20 in total) have acquired social networking surveillance tools — many of them in the last year.

We found no evidence in the documents of any public notice, debate, community input, or lawmaker vote about use of this invasive surveillance.

And no agency produced a use policy that would limit how the tools were used and help protect civil rights and civil liberties.

The utter lack of transparency, accountability, and oversight is particularly troubling because social media surveillance software used by California law enforcement — tools like MediaSonarX1 Social Discovery, and Geofeedia — are powerful. And our records from Fresno and several other communities reveal that some have been marketed in ways to target protesters.

Our records show that Geofeedia’s marketing materials, for instance, refer to unions and activist groups as “overt threats,” and suggest the product can be used in ways that target activists of color. At least 13 California law enforcement agencies have used or acquired Geofeedia.

In one exchange with law enforcement, a company representative suggested to San Jose Police that they should use the product to surveil the “Ferguson situation,” even though the city is roughly 2,000 miles from Ferguson, Missouri. San Jose Police did in fact use Geofeedia software to monitor South Asian, Muslim, and Sikh protesters only a few days after acquiring it.

An email to the San Diego Sheriff touts a “collection” of social media content curated by Geofeedia following the non-indictment of Darren Wilson.

And yet another promotional email invites the Los Angeles District Attorney to learn how Baltimore used the software to monitor and “stay one step ahead of the rioters” after the police killing of Freddie Gray.

Law enforcement should not be using tools that treat protesters like enemies.

The racist implications of social media surveillance technology are not surprising. We know that when law enforcement gets to conceal the use of surveillance technology, they also get to conceal its misuse. Discriminatory policing that targets communities of color is unacceptable — and secretive, sophisticated surveillance technologies supersize the impact of racial profiling and abuse.

The good news is that we’ve seen that when surveillance is forced into the light, communities have the power to call out racist policing practices and stop discriminatory surveillance in its tracks.

Remember Fresno? Armed with proof of Fresno’s social media surveillance experiment, a diverse coalition of local activistsknown as Faith in the Valley successfully mobilized and organized to pressure the police to roll back their social media surveillance program. The community is now pushing to pass a surveillance technology ordinance to make sure all surveillance technologies are publicly debated.

In Oakland, community members organized against plans to build an expansive Domain Awareness Center that would have collected and stored hundreds of terabytes of data on Oakland residents. Now Oakland has a Privacy Commission that advises the City Council on surveillance decisions and is currently drafting a surveillance technology ordinance.

And in Santa Clara County, right in the heart of Silicon Valley, a diverse coalition successfully organized against plans to buy a Stingray cell phone tracker and then worked to enact a comprehensive surveillance technology ordinance that requires transparency, accountability, and oversight for all surveillance technologies.

In this spirit, a powerful coalition of national organizations is launching a multi-city legislative initiative, Community Control Over Police Surveillance (CCOPS), to introduce more local laws to bring transparency and community control to the acquisition and use of local police surveillance technologies.

Here in California, community members are working in Palo Alto, Fresno, Oakland, Berkeley, Santa Rosa, and Santa Cruz to ensure that similar laws are introduced in their cities.

Whether it’s social networking surveillance, stingrays, or something else we haven’t heard of yet — it’s time to push secret surveillance into the light.

We have the power to stop discriminatory surveillance and put control where it belongs — in the hands of the community.

Nicole Ozer is the Technology and Civil Liberties Policy Director at the ACLU of California. 

Read more about community control and surveillance technology in California: