Final Analysis and proof of stalking by “gangs”: Who are the gang stalkers? Will the police/FBI/DHS/Et Alphabet investigate gang stalkers? Is gang stalking a “delusion?”

UPDATE 7-28-2020: ROGS apologizes for the many, many updates below in this post, but please bear with me, starting with this post here, where we see that the George Floyd protests actually began 12 years before his death, as his murderer, and his “police gang”, stalked a small family owned Indian restaurant in Minneapolis, where ROGS provided guidance, security, public relations, and other “assistance” to begin a now global movement against the surveillance and police states that the western governments, (FVEYs) have become.

In fact, George Floyd and,his murderer, Derek Chauvin were coworkers, right next door at El Nuevo Rodeo, which has now been burned to the ground.

1594582309778
Kabbuliwalla indeed. This small restaurant fielded more visits from police, FBI, DHS, religious, and NGO informants per capita than the Los Angeles field office– or Tel Aviv.

And, shitbag murderer Derek Chauvin and his racist Anti Democracy League (ADL) sponsored “dieversity gang” used to try to stare us down from the precinct station across the street, as my “partner*” tried to feed me envelopes of cash while sitting at the front picture window at night; and unmarked cars with self-flagellants in the parking lot across the street, too.

See this post for a direct reference(and use my search feature for other posts about Gandhi Mahal, or its FBI informant owner, or this post, where I name a few police and FBI “gang stalkers who used Fusion Centers and wiretaps to alter, manipulate, and “disrupt” political organization in that era) , and have a laugh about “marginalization,” mentioned in the flier above, cast back upon arch-conservatives and their gangs in policing, and their complicit multi-billion dollar NGOs and “community assets” who despise democracy; and of course my tribute to the famous Dick Cheney f-bomb tirade from many years ago seems fitting, dont you think?

Americas Right AND Left both despise and abuse due process now, so its a win for them,” whoever “they” are, lol.

ORIGINAL POST BELOW:

ROGS Analysis is a falsifiable strategic and dialectical analyses and theorem of organized gang stalking, based in the scientific method, wherein you can analyze cases of gang stalking. My evidence, and theories can be tested, and my analyses falsified or replicated; and in mass shooting cases, I’m batting around 1000%.

For proof of the veracity of ROGS-Analysis (ROGS-A) look at the recent cases of the Molson Coors shooting, the Virginia Beach shooting, and the recent arrest of an actual gang (aka a “posse”) that includes the exact suspects (police, retired police, and others affilliated with prosecutors and community assets) that ROGS Analysis predicts.

Read more about “the scientific method” here.

The scientific method is what scientists and others like ROGS, a former “doorman” who refused to be a police rat, and others use to prove, or disprove our theories, and as such, ROGS Analysis has repeatedly proven a useful tool in analysing gang stalking, and answering the questions “who are the gang stalkers,” and “what is gang stalking,” as we saw in the recent arrests of a retired cop on the phone with police, as he and and his neighbors and relatives murdered Ahmaud Abery in cold blood.

Police and security gangs are indeed a sad reality of OGS, and you can find evidence of that in many ROGS posts. Use my search feature, and search the cases of mass shooters and other victims of OGS doing strange stuff, like Omar Mateen, Cesar Sayoc, Ian Long, Stephen Paddock, and many other cases where security gangs,and police are implicated as provocateurs, and precipitators of mass shootings.

Related Reading: the Aspen Hill Wiki accurately documents police and security gangs.

For the reader to fully comprehend this post, where I shine a light on the faux-left wing stalkers** who targeted myself and others, as well as understanding my final analysis, you must also read the linked stories.

But perhaps more importantly, brief yourself about violent, militant bombers and murderers in the radical left, and especially in the militant, gender lesbian movement, and note the linkage between militant women in the many cases of OGS that I document herein,and asthe New York Post has documented, the bombers and murderers of the lesbian terror group M19, which “hid in plain sight” because of the biases of law enforcement agents of an earlier era who could not fathom womens violence, nor develop suspects accordingly.

The reader will note that I fully acknowledge the old paradigms of white supremacists in highly organized gangs, and that I personally took direct, covert, and decisive political action to combat a white supremacist police department, which had been infiltrated by racist Jewish and zionist elements,fro organizations like the notoriously criminal Anti Defamation Leaue tactics and tacticians; but that I now turn my attention to radicalized left-wing gangs, organized under what I call Kommunity Kulture Klubs and Kovens, K4. These groups (sometimes mistaken under the blanket term “antifa” obviously have different names for themselves,(indeed, one of the primary academic concerns going in to analysing these gangs is identifying the language they use to describe themselves, and their actions, as Professor Robert Guffey of Cal State has noted).

Related Story: Law Enforcement agents, the FBI, and other security and surveillance state players are at a “crossroads” as factions within these organizations compete to create manufactured terror events, and gain federal resources each time they pull these things off..

I have repeatedly documented radical lesbians, and beneficiaries of the Womens Funding Network and other similar, networked NGOs and DVIC profiteers present in the lives of shooters in the pre-ballistics of mass shootings, school shootings, and especially in the post-shooting “bystander interviews” after the fact of these events, most notably in the crybully initiated case of manufactured terrorist Cesar Sayoc, where we saw the left turn against one of its own, via the victim narrative of Baltimore police spokesperson Rochelle Ritchie.

Most notably, in the case of <a href=”https://researchorganizedgangstalking.wordpress.com/2018/11/11/a-bonus-13-in-the-case-of-thousand-oaks-borderline-bar-shooter-ian-long-dvic-slanderer-horse faced-gym-coach-made-him-run-13-miles-amid-constant-harassment/”the Thousand Oaks shooter Ian Long and the unusual, predicted use of the number 13 by one of his militant, self-appointed adversaries; and in my accurate, and verifiable predictive analysis in the case of the Virginia Beach shooting has demonstrated with empirical evidence.

What is Organized Gang Stalking, and who does it?

Organized gang stalking is good old fasioned mob rule, updated with technologies that were unimaginable just twenty years ago, and replaced with new excuses for mob rule, like countering violent extremism, or domestic violence, and other pet causes of western Jewish-christian societies, as we now see both altRight, and radical left gang stalking.

OGS is also the result of due process-free, uncivil, and unconstitutional policing tactics called “community policing” and “parallel colluding investigations ” (according to the fraternal and sororal organization Association.of Threat Assessment Professionals, ATAP ) based in massive database and private records abuses, and “high policing” which places actual military and police trained spies into the lives of targeted domestic civilians waging “weaponized investigations” aka “colliding parallel investigations” against individuals, and is a direct result of so-called intelligence sharing environment of countering violent extremism programs(CVE)that place current and former CIA /Mi5-6/Mossad, FBI (and their anti-democratic, secret police network of Infragard) etc. agencies and agents into the local, domestic theater of operations, which manufacture terrorists via intelligence agency tactical assaults on individuals, utilizing military derived psychological operations, and actual electronic surveillance, data manipulation, and political, weaponized technology aimed at targets, as documented by the Guardian, and the Intercept, and many more sources, post Edward Snowden.

What organized gang stalking is not

Organized gang stalking is not a delusion, in most cases, because behind every false claim spewed by psychobabbling fruitcakes like Dr. Tomo Shibata and others like her online, who are most associated with the delusional sounding psychobabble about electronic weapons, UFOs, and other discrediting gibberish, you will also find the following :

The psychobabbling fruitcakes like these examples here are are nearly ALL current and former police, security profiteers, and spies who worked /work directly in the CIA /NSA /FBI /Mi5/JTRIG /Mossad /etc.

* Women like Eleanor White, a former NSA employee; and who some say is not a real person at all, but rather, a cut out that anyone can assume online, an intelligence agency online profile.

* Men like Dr. Robert Duncan, former CIA, who practices, and writes about “mind control”.

* Women like Karen Stewart, former NSA, and an alleged whistle blower who no major media has taken seriously, ever. She and her pals started Targeted Justice, a website that prominently features all of the debunked gibberish about electronic brain beams and sattellite mind control (which is a euphimism for NSA spying on our communications devices) and who manages to squeeze the word “directed energy weapons” and other psycho-gibberish into everything she writes or speaks; but these like her who NEVER take up the cases of men like Ahmaud Arbery, and Darren Seals of Ferguson, MO, both of whom were stalked by gangs up cops, retired cops, and security contractors before they were murdered.

* And, in my own case, I had an actual Brookings Institute affilliated bully online, who is linked directly to both the US Air Foece intelligence squad, and the Mossad (thats how bizarre OGS is, when you do the research. I am a civilian-WTF is some retired military/foreign agent/spook and their pals cyber stalking and harassing me for?)

As we see, time and again, OGS is PLAINBIZARRE, whether its cops waging disinformation hoaxes like this, or spooks in the lives of ordinary people. Thats actually quite common in cases of manufactured terrorism too.

When I began to write ROGS around three years ago, as a reaction formation to the most famous case of gang stalking denialism ever written, where the partisan newspaper the New York Times published the now discredited journalist Mike McPhates gang stalking disinformation dangle, headlined “United States of Paranoia: They see Gangs of Stalkers” and quoted forensic psychologist and gang stalking denialist Dr. Lorraine Sheridan, I had no firm idea about how to answer the questions in the headline of this post.
1564328132878

Related Story: The average reader of ROGS blog will easily miss the nuanced discussions taking place between me, the researcher, and my many US Department of Defense/ Texas affiliated/Georgetown University/University of Michigan/Brookings Institute/John Jay College of Criminal Justice/NGO affiliated “followers” who have literally clicked the link to follow my blog, (and as I demonstrate here, in order for other researchers to understand the difference between Type 1 and 2 errors in delusional beliefs, versus documentation and empirical evidence of organized gang stalking by people working in and around the exact institutions that I indict herein , aka, proof of gang stalking such as my analyses of the use of the words “blackbird, raven, and crow” in the online dialectic of organized gang stalking, which was later revealed by The Intercept, and Reuters International news; and much more evidence which I present all over this blog.

ROGS Predictive Analysis is a scientifically and empirically proven tool of assessing cases of organized gang stalking, and validating an OGS victims complaints.

UPDATE Nov. 3rd, 2019: Woman shrouded in pixelation: the occulted nature of women AS gang stalkers, but also womens roles as purported intelligence analysts who wage hoaxes, and harrassment of all kinds,online and off, which leads to manufactured terrorism, as we saw in the recent case of the Pensacola shooter, who was sexually harassed, and who filed a complaint against his harasser, and who was then cyber bullied, and actually stalked online by FBI-Mossad affiliated persons before they go ballistic, and target the people who target them.

Most notably, click that link above about the Pensacola shooting, and note how the news coverage literally occludes /occults the name of the shitty, sneaky person who was cyberstalking, harassing, and tracking the eventual shooter. That news story is not unique in this practice of occulting the names of women who do illegal, unethical and bizarre activity, but is noteworthy because the stalker herself, Rita Katz,of the dubious terrorist hunting /terrorist manufacturing SITE Intelligence group, is herself a one person ROGS BINGO.

Please, someone, run this womans mug through some facial recognition software, as I encountered her in an unexpected place recently , as yet another NGO affiliated christian warrior for Jeesus tried to “save ” me; and that person, the son of a four star general.

Then, take a look at a ProPublica expose of a bizarre “mind reading ” tool that has led to false convictions, and is based in ponerology, aka junk science, and which was developed by a former Israeli spy .
1572767794810

Organized gang stalking is extremely bizarre, but in no way is it delusional once you apply ROGS Analysis

As you read through this blog, you will see that I have answered the general questions presented by Mike McPhates New York Times piece above, though each individual case will differ in aspects such as what specific institutions, tribal-religious sects, or local/national/international law enforcement elements are actually harassing them; and what technologies are actually used to target them outside of “level X” descriptions of technolgoy, where technical awareness is outside of the lay persons understanding of modern and actual spy programs in use every day on the internet, cell phones, and every other high tech device that reports directly to many actual spy agencies, via programs like Palantir Gotham,which literally monitors all of our online communications, or the Facebook feeds directly to Israel, and the infamous Twitter “firehose,”which police use to track, stalk, blackmail, coerce and influence activists online and off.

This “level X thinking” is actually, and verifiably far from delusional in basis and is just the laymans terms and descriptions for military grade technologies that are now targeted at all of our communications systems(with the vast majority of the psycho babble about other electronics being military and police and actual intelligence agency affilliated operatives deliberately poisoning the discussion online, as I have demonstrated repeatedly; and as the LA Times has begun to document hidden gangs in police forces.)

And, because I was well aware of police stalking, and how the FBIs COINTELPRO worked; and also aware that America is and has always been a quasi-democratic country with a two-tiered justice system where slavery and debt bondage now hide itself in the DVIC apparatus, instead of outright slavery, but exactly as how right wing scholar Stephen Baskerville has described, I had that as a starting point to begin research here.

Also, due to extensive previous studies of the Ku Klux Klan and its close working relationship with the FBI, and all other police institutions.

Such indoctrination and study is required in American public funded schools due to ADL involved publishing houses near lockup on school textbook curriculum and the narratives within them,as we now see the connection between mass shooter Jared Loughner and his love of “classic” literature via narrative control in college classrooms preceding his seemingly un-connected demise into alleged mental health crisis) and how current police work with retired police and others in an occulted fashion via “community policing ”to control, negate, or incite various social movements, or attack political speech, and its speakers, I used that as a guide.

But none of that could constitute “proof of gang stalking,“ from an evidence based scientific perspective. Simply knowing that one lives in a corrupt society does not prove that such corruption is targeted at one specific individual any more than such corruption is targeted at society at large by these hidden (occulted) elements of society; these hidden elements that are frequently referred to as “the deep state”.

So, how to “prove” that you are personally targeted by the “deep state” without actual evidence?

Well, as I demonstrate throughout this blog, after I personally wrote news stories in a college newspaper in 2001-2004 that directly challenged deep state narrative control,and funding sources for the fraudulent War on Terror, its religious fervor and slaughtering tone, and its false binary accompanying “Save the Women and Children” narrative; I then had my college newsroom ransacked, and more, and realized that I was personally targeted, and so later, I PERSONALLY allowed and encouraged these sociopaths to target me PERSONALLY, collected evidence along the way, and then applied that research finding to other cases, some of which are now reported in mainstream news sources.

Simply put, I was personally pinched between the bad policies of two bad presidents, who have demonstrably and inarguably damaged both journalism and journalists, as well as destroyed the protections of our United States Constitution, through the use and abuse of unconscionable, amoral black programs, online and off, spanning two decades.

And LOOK!

Exhibit A: the president of the United States LITERALLY parks an army of limos, and a full SS cohort a block away from my house after political events online, and offline that I documented, and which included a corrupt police department and specific, named dirty cops(you just cannot make this shit up. This event was covered in world-wide media)
1564329557079

Related: the historic mafia/mob affilliated police department in the,area where my gang stalking began

One complaint that victims of OGS are routinely gas lighted over is that they make claims that powerful individuals or their political or religious sectarian accolytes are stalking or harassing them. But few ever collect evidence, as I did in the photo above, as hackers in hoodies redirected my internet and cell phone communications, and morons online somehow knew that-and literally mocked me online for the fact that I had a I had a bust of John F. Kennedy on my backdoor. See this post here for evidence of that, as squad cars circled my house, and online shitbags quoted from DHS private contractor Gavin de Becker.

Exhibit B

I did have a list of names to work from in my personal case,some of whom, like Jame Doyle of Minnesota who was a very good friend at the time, and who, unbeknownst to me at the time of our initial meeting, was an FBI informant against Mohammed Warsame, a Somali immigrant who had “buufiis” which is a mental condition that translates roughly to “desert sickness” caused by heat and superstition, and isolation; and who had approached the agency to become an informant himself, claiming to have eaten dinner with Osama bin Laden, and more.

The FBI then manufactured him as an Informant against other Somali men, and Doyle, who had been funneled into the informant pool by local cops from Afton, MN, who caught him peeing in a park in the dark of night, and and charged him with a trumped up sex offense of “indecent exposure” which is a rite of passage in the US for affluent white males; a litmus test for adherence to Americas religious constructs of sexuality.

And I had other names from that era to work with, and many blog postings and comments that litter the internet with bizarre claims and misinformation, and more in the cases of others.

But the real evidence came when Department of Defense affilliated stalkers filled up my life, and eventually my Twitter feed
(which I have never disclosed here at ROGS, but have shared with other journalists; and a story that would require a seperate novel entirely)and then, I trapped, tracked, and traced these morons and sociopaths using Social Media analysis (SOCMINT ),and then, named them online and off (my latest military and think tank affilliated admirer here)and another recent “follower” with extensive DoD, and CIA connections here too.

The reader will note that my personal stalkers are both LEFT and RIGHT, Jewish and christian religious zealots,but also that I have named many other tribal /ethnic groups that utiluze gang stalking too; and so as an atheist I cannot help but continue to reveal western Jewish-christian fanaticism, and importantly note that I am not partial to any religion, much less Islam, though it is currently the bad Abrahamic insanity du jour.

Exhibit C: ROGS Predictive analysis scores BINGO after BINGO after BINGO as we see in the linked cases, and those cases derivitive of K4 affiliated gang stalking.

Exhibit D: The dialectical link between passive-aggressive crybullies, womens institutionalized violence, and K 4 gang stalking , and manufactured terrorism; and Jewish christian cultural practices, which is affirmed in my predictive link between concert and event security bungling around at the site of the the Las Vegas shooting by Stephen Paddock, and later, major media carrying stories about “five person teams” and Jewish organizations deploying military grade psychological operations on unsuspecting targets, and also, people who work in the DVIC trifecta industries of policing, narrative control/influence, and EVENT SECURITY with extra RIGS BINGO chips for noting that persons connection to white slavery racketeering, and “its for the children®” narratives.

You really CANNOT make this stuff up, it is exactly that bizarre.

Exhibit E : After I, the author of this blog became active in major and minor media, I personally began to change the dialectic of organized gang stalking at venues like OGS denialist Dr. Mike Woods blog www.conspiracytheorypsychology.com , and other places online too. In other words, I personally waged my own influence operation, to great, and demonstrable effect.

Then, discrediting narratives about me, and my purported character (or lack of it, lol😁) began in force, as some threatened to publish my blog material without proper accreditation, or as the FBIs own web masters peeked in here at ROGS, during a government shutdown, causing it to be identified as a “refferer” in my blog stats.

And its important to note that Dr. Mike Woods concurrence with the NYT piece has still not been rebutted by him in a single comment at his own blog, although he acknowledges the fact that Scientologists do utilize gang stalking tactics (and the link between Scientology is also affirmed in the case of Civil Rights attorney Andy Ostrowski as well ).

1575275087173

And, I personally participated, and am participating with a few major news outlets on other stories which I will not yet reveal.

So, like a RAT trapper, or a cockroach exterminator, I personally dragged the neocon religious zealots, and tribal-sectarian Wizards of Oz and a few real, and actual spies out of their internet hidey-holes (here, and here, and in other places at this blog), as some of them were forced to acknowledge their hidden internet operations, as we see in Exhibit D where NGOs like the Anti Defamation League work with Fusion Centers to target free speech, and frequently bully and harass people for bizarre and due process free periods of time until they go ballistic, like what happened to Asian American Mathew Riehl.

And, for later conversation, have a look at my most recent follower from southeast Asia, who is actually a Department of State, Georgetown University, CIA affilliated “save the children” specialist, for an eyebrow raiser about EXACTLY how the gang stalking dialectic works, including bizarre claims (deliberate disinformation) and especially the use of “coded” linguistic para-language. Gang stalking is, WITHOUT ANY DOUBT, Jewish-christian, militant and weaponized religious proselytization “on acid.”

Exhibit F: Before I wrote ROGS, no one, anywhere online or off had connected this form of “bullying on steroids” to the blurry Countering Violent Extremism programs, and the hidden mechanism of online speech policing leading to manufactured terrorism that the ineptly named Association of Threat Assessment Professionals calls,“the colluding parallel investigation” or the accompanying psychological operations that Fusion Center operatives are targeting at individuals.

But ROGS isnt afraid of some mystical devil, or adherent to western relgious biases, its attendant and fickle forms of racism, or sectarianism. ROGS is clearly a revelation that if anything, these fanatics have proven that there is no god, g-d, G -D, GAWD, Lord, lawd, or anything resembling anything close to a higher power or deity, or even humanity in their books, which is why they created the Total Surveillance state in the west to begin with , and proving that exact point: their version of a god is false, predatory, murderous, greedy, common group of amoral, petty, conspiring tribal animals and most importantly, poised at our windowsills, cock or faux phallus in hand wanking it to our innermost thoughts and ideas via internet voyeurism of a genuine secret police state; and as Edward Snowden has noted, these are frequently stolen, or redirected, or otherwise manipulated before they are formed, and then, denying that he/she/it was there as a voyeur.

Then, when I applied that research finding, everything fell into place after that, with many surprises, which I document throughout this blog.

So, in that light, Dr. Lorraine Sheridan IS an actual gang stalker according to her own biography at Curtin University where we see that she is closely allied with forensic psychology, and the dark arts practitioners of occulted internet stalking, such as cold case investigators and other true and actual “conspiracy theorists” who profile and cyberstalk and actually stalk their actual targets, much like we see in this example here.

Like this little piggy, who I also wrote about herewhere I link people who are prominent among the comments sections of gang stalking blogs but also, who were quoted in the LA Times in an article they appeared in a decade ago(follow that link); and cold case investigator and ATAP affilliated Dr. Christine Sarteschi, and also psychobabble spewing anti-pornography crusader Tomo Shitbata who is closely allied with the horse-faced antiporn neocon feminist relic from the 1980s lesbian porn wars, Catherine McKinnon of Michigan (and yes, Michigan has high rates of Google searches for “gang stalking and Michigan”) and all of these, integral in my thesis of high heeled policing related to the lesbian sex and porn wars of the 1980s–and all of that seems significant, dont you think?

UPDATE: Within days of me writing this post, a Michigan electronic billboard was hacked, and a pornographic clip of a Phillipino couple having sex played. This event was preceded by a similar event in the Makati financial district of Manila.

Then, one of my psychobabbling followers also made his presence known via an.inbound link days before.

Once again, ROGS scores a BINGO, in having linked gang stalking to pseudo-feminist neocon theology, and the re-booted 1980s anti-pornography and anti-prostitution money pot.

SO: Considering that one of the most famous mass shooters Seung Ho Choi was targeted and harrassed by none other than Eastern Star affilliated Nikky Giovanni, which Professor Emeritus of Waterloo University, Dr. Kenneth Westhues has documented extensively;and that other men like Mathew Riehl, and Scott Bierle, and Ian Long all also endured this form of womens institutionalized violence, crybullying, and the ATAP “colluding parallel investigations,” that are hidden from the public-ROGS asks: if you want to prevent mass shootings, and butter knifings, and “Incel movement” car crashers, why dont you, the reader, investigate the links I provide above?

Start here, where we see that the “incel movement” was started by a woman, who is a lesbian, long after men and boys like those I have written about here at ROGS go ballistic, after being blackmailed, compromised, or leveraged in online PsyOps-maybe investigate THAT link to psychological operations online, and how empowered women* are every bit as dangerous and violent and predatory as men? Because in case after case, we see mass shooters radicalized by these hidden PsyOps, and the people behind them.

In that light, ROGS asks: why does the FBI or the DHS not investigate K4 radicalization of targeted individuals?

And the answer, obviously, is that they are paid to do the exact opposite, because specially made high heels are very expensive.

Related Reading: Here is the text of an email that I received a couple years ago from one of these psychobabbling loons who used the WordPress contact feature to send me an email. Frequently, agents, social workers, and other “deep state” manipulators from these DoD and CIA affilliated NGOs totally slip up and I get their real name or IP, sometimes not.

And based on that, I was quite surprised at the amount of social workers (LSWs) who are involved as gang stalkers, under the FBI/DHS manufactured terrorism programs, or otherwise feeding the online dialogues, and offline shenanigans.

Below is one example of how “they” participate in forming a false dialectic space, signal to each other using the number 13, but also, they use stupid gender biased pseudnoyms.Most of them use Protonmail addresses, while the hackers that attack targets use the hack proof Guerrillamail system.

See if you can spot the (not-too) hidden number 13:

Sent: Tuesday, December 05, 2017 at 3:03 AM
From: “Freddie Goodman”
To: (ROGS)@mail.com

Subject: [Research and data about organized stalking, gang stalking, multi stalking, community mobbing, and community policing.]

Contact
Name: Freddie Goodman

Email: [email protected]

Website:

Comment: Good god please help. They’ve been doing this to me for, I think 6 or 7 years. Does it usually go on that long? They’ve destroyed my whole life. Everyone thinks I’m crazy. (strangely enough, unlike many others, no one has diagnosed me with schizophrenia, though). I swear to everything holy, that they even put a directed energy weapon on a boat when I was hiding from them in the woods and zapped the shit out of me until I started screaming “please for godssake stop I’m going to die.” It stopped, and I heard the engine turn off. People think I hallucinated it, but I swear there’s no reason I should have been hallucinating, at least not that badly. I was not abusing drugs, though I had been having moderate insomnia for some time.

The point is, what do I do? I have hard evidence that some “agency” at least at some time has taken an interest in me and has spread defamatory content. But, the lawyers won’t tell me who, though they seem to know. Also, they seem to put “plants” in the psych hospital (I turn myself in for anxiety and insomnia, but in reality I’m just trying to hide from them) in order to torture me in there, too. They even called my social worker’s boss and admitted they followed me all around, but he wouldn’t say who or why. How do I stop this? How are so many others around me aware, but somehow won’t spill the beans? I’m absolutely shocked. I don’t know what else to say.

Please help. Thanks

Time: December 5, 2017 at 3:03 am
IP Address: 173.164.76.169
Contact Form URL: https://researchorganizedgangstalking.wordpress.com/contact/
Sent by an unverified visitor to your site.

Lastly: One of the unexpected treasures from my exploration of gang stalking was how easily and readily police are corrupted by international banksters and their NGOs. Perhaps this was best revealed by the unexpected link between high policing and libertarians. I am not a libertarian, and though I reject the false right-left binary of US politics, I find the link between corrupt police and international NGOs to be substantiated as early as the 1980s, in cases such as this, where we see a now deceased British Libertarian and intellectual, Tony Hollick stalked, blackmailed, assaulted, with entrapment attempts, and mysterious car crashes too, even naming George Soros’ open Society as a culprit.

For the record, ROGS is 100% for open borders, and one big happy world, the same day that George Soros and other billionaires like Jeff Bezos and Jeffrey Epstein and Rupert Murdoch, and The Last Remaining Koch brother© allow their many homes to be occupied by unwashed immigrants from third world countries, and they eat from a garbage can, bathe in a mud puddle everyday, and dodge a few bullets, as many of them (and even ROGS ) must do to merely survive.

In the meantime, I think there is a THIRD WAY to get things done, and those shitbags arent helping much.

*empowered women is a euphimism for militarized, weaponized police state activity that fronts women to do the dirty work of illegal activity such as online cyberstalking, offline stalking and slander, and actual spying as I demonstrate repeatedly, and with scientific consistency.

* that partner was himself an FBI informant, having been placed on the lists just after 9-11. I created him as a Gandhi styled peacenik strictly for public relations purposes, and he regularly held political, community, and inter-faith events thereafter, at my direction.

** The history of dissent always includes “co-option” of grass roots social movements by a host of bad actors working in policing, intelligence, and non-governmental organizations.

Classic examples are the Anti Defamation League spying on activists, while feeding data to the FBI and local police which still happens today; or the famous case of the CIA drug experiments to co-opt the peace movement; or the anti-democracy FBI manipulation and related assassinations of civil rights leaders in the 1960s and so on.

We see echoes of all of this cooption today, as primarily male activists are being murdered or dying in movie mystery styled “suicides” and homicides (Darren Seals and many more Ferguson activists, Duncan Socrates Lemp, Marc Angelluci Esq., and more.)

The real left is distinctly different than these corpirate sponsored Ford Foundation, Womens Empowerment Funds, ADL styled fake dissent, all of which hide religion, and bias behind “philanthropy.”

Electronic implants, Wikileaks Vault 8, victims of organized gang stalking, hive mind, and honeypits.

ROGS loves the Constitutional guarantees of due process, and ROGS loves America. I am pathetic that way~the grand American delusion is so appealing.
(Vault 8 is an inside joke.)
BUT: The DVIC is actually a war on speakers and words, and without a doubt, the first amendment itself is the target of neocon and tribal, religious interests, now interfacing with the massive influx of Saudi, and other nations cash flows, and the media narrative.
I have been gang stalked since the DVIC was birthed into our lives in 1993 ( the exact same year when the Anti Defamation League was outed as a domestic spy ring that sold out American activists) and became severely gang stalked after I broke a nation wide story in 2003-4 about how America’s agencies manufacture terrorists by occluding access to civil rights and due process.
To journalists, researchers, and others interested in answering the many questions that are presented in the “bizarre” online dialectic of gang stalking, here below is how the CIA (and every other IC agency, private contractor, and the FBI) uses the term “electronic implants,” which describes covert hacking techniques, and plausible deniability in exploitation of targeted computers, targeted computer networks, and targeted individuals.
Without a single doubt, this is empirical evidence of CIA/other IC/NGOs operations on US soil, and anywhere else where OGS is taking place.
And it single handedly validates the inherent mission creep of the WOT redirecting and exploiting domestic targets.

UPDATE 10-19-2019: Almost two years after I wrote this post, and became active online, the ADL implicated itself as actually deploying military psychological operations on target individuals, using artificial intelligence software called Moonshot CVE, which had previously been used in theaters of war; and, perpetuating negative stereotypes of Jewish people as mind controlling Svengalis.

1570435771780
Electronic implants and gang stalking, courtesy of Wikileaks, and Julian Assange, who is literally being isolated, and denied visitation from other people as I write this. And, the American/FVEY deep state has worked tirelessly to force Ecaudor to revoke his asylum.
Isolation, you will recall, is ALSO a major threat/complaint/”delusion” of targeted individuals.


RELATED STORY
:I wrote about the HIVE in coded language long before this story below became mainstream news. The reader can infer that writing openly about such things is dangerous, and also, ROGS personal writing style is somewhat coded for reasons I have explained elsewhere.

The Hive mind in the gang stalkung dialectic online, from Wikileaks.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.
…………..
And-I hope the dood doctors like David V. James, and Lorraine Sheridan-and certainly Dr. Mike Wood, dont get to caught up in the echo chamber as wasps and bees of all kinds swarm them for commentary in these matters.
But OGS is very real, and puts MHCHAOS and MKULTRA to shame.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

Delusions, poison, bizarre claims, and schizophrenic narrative in gang stalking: the case of DHS whistle blower Julia Davis

Delusions, poisons, poisoning, discrediting, counter intelligence, schizophreniform disorders, and targeted individuals of organized-and Irgunized– gang stalking.
In what many psychologists describe as delusional complaints of targeted individuals of organized gang stalking, the facts in each case are strikingly similar, frequently bizarre, and then, in some of the outliers, we encounter claims that TI’s believe they are being poisoned, have been poisoned, or have been threatened with poison.

Related Story: Have a look at how Israeli spies work in five person teams, and use poison, in this story</ from mainstream news sources, and this wiki from Infogalactic describing these five person teams too.
Then note the correlation between the assassination described in my story below, and note how a “
five person team ” bungled/allowed /participated in the Las Vegas shooting, where Stephen Paddock shot up a crowd of key influencers.

And yes, many drug  addicts, and mentally  ill people, AS WELL AS POLICE AND PRIVATE CONTRACTORS, AND THOSE WHO WORK IN THE USAF OSI INFORMERS, claim similar things, and we see tens of thousands of references to it in forums like this from Medawarscornflakes, a blog that provides highly reputable and interesting content and analysis, particularly having documented how retired FBI and other LEOs utilize OGS in real estate gang stalking..
But the differences  are  striking when we examine the “onset” of these alleged disorders, and even more striking when activists, journalists, and others encounter OGS, as we saw in the case of Minnesotas Electronic Peeping Toms and Tinas, as agents and agencies used over 180 police departments to stalk and harass Minnesota MSM reporters in a massive gang stalking that ended up in court.

You see, many whistle blowers and activists like Andy Ostrowski, and Rakem Balogun are suddenly stricken with a severe case of Organized Gang Stalking, just AFTER they reveal institutional corruption, or outrageous government conduct.
And others, who are connected to intergenerational organized crime figures who are FBI informants or agency targets, like Stephen Paddock and his brother, also seem to suffer OGS.
For instance, there are many strange anomalies in the ever changing narrative of the Las Vegas mass shooter Stephen Paddock, and he also believed he would be poisoned, or had encountered programming or had suspicions that such was  possible. There are literally so many holes in that story  that it looks like a pair of headless, fat  pig legs named BUCK TOOTHED AMY , wearing  fishnet stockings, and high heels, and a red felt lined tinfoil hat.
Then,  there  are the cases  where  alleged autistics were  contacted online by unknown parties, and  then,  who exhibited disorders  related  to  germ phobia, or  other “advanced sequalae” of mind control-like operations online. Most  famous of  these is  perhaps the Newtown shooter, who, like  Paddock,  was  smeared  with  the  label  of  pedophile after the fact, and  with disappeared  hard drives  to boot.
Military Psychological operations(PsyOps)in modern policing, with Fusion Center monitoring of individuals

Indeed, there is even a well known case in Oregon (and I have noted repeatedly here at ROGS that OR and WA state have extensive connections to OGS complaints ) where police, and others worked to gas light a fellow so badly that he believes his wife poisoned him.
His wife eventually holed up with the local police department, and he apparently lost some real estate. Google “poisonedbywife””  and gang stalking” or “Terry Wagar and  gang stalking” for evidence in that case, which, much like the case of  Lawrence Guzzino, deserves a  second look for  any civil or criminal defense lawyer to understand OGS.

Related Story: private contractors like Gavin de Becker that work with the DHS and FBI CVE programs are using harmful psychological oerations on targeted individuals, as discussed here in the official literature of the Association of Threat Assessment Professionals(ATAP), and noted by private contractors like,Jack Palladino (an ATAP member) whose company acronym is Psops.

The evidence, and  the case studies of organized gang stalking are EVERYWHERE in the news now, as this  new thing,  High Policing, aka political policing has taken root, as the Domestic Violence Industrial Complex (DVIC) and its little helpers in the information sharing environment,aka nation state blackmail programs works its mythology ever deeper into American culture in a “soft takeover”of our country by lies and half truths; but especially through lop-sided story telling that started in the era of VAWA,1993.
Its for the children,  they  say without irony, as the same banking interests that feuledtheeastern blocnations takeover work their magic-and their state sanctioned child kidnapping rings here now; that these  types will  do  ANYTHING  for  the children-and  often,  each child  taken  in to  state  care  nets those who facilitate  that, a one million   dollar  paycheck,  as social  services,  psychologists, police and  others  derive  income  from  these  schemes, and the federal power of cash to states that swell their foster care factories has incentived this behavior in the pseudo-feminist, DVIC baby farming era. 
This form of venture capitalism used to be called slavery when it was racialized here, or “white slavery” in the eastern bloc,or in Americas peonage and prison system during the heyday if Americas growing prison industrial complex, but today it crosses all racial and political divides.
The  boogieman,  it  seems,  is  always lurking anywhere  EXCEPT  in places  where  he  gets  hard  dollars-or federal grants as  there are documented correlations  between  homelessness of  targeted individuals, and  gang stalking too.
Then, there is the strange, bizarre case where a DHS whistle blower, Julia Davis, who has helped uncover emerging evidence that one or another element of the socalled Hollywood  mafia (Haym Saban, forex ample, isan Israeli), and elements in  deep  state  policing is implicated in some way or another with poisoning actress Brittany Murphy, whose father is an old mobster.
Get out the  ROGS  BINGO card in these cases, because counterintelligence gangstalking is literally~ LITERALLY~designed to “cut the victims throat with Occams Razor”.

Related Story: Right wing nut, uberzionist, Muslim hater,and and foam mouthed attorney Debbie Schlussel wages a disinformation campaign about DHS whistle blower Julia Davis, with video.

To understand how bizarre gang stalking complaints are, one must understand how bizarre counter intelligence tactics are, and then, to understand how the testosterone/progesterone charged DHS works against due process, actively occulting its methods, and skirting or flaunting the law and due process every step of the way, as we see in their training materials released by The Intercept, that this is their stated objective. Have a look through ROGS here at their  massive pre-emptive real estate  and  forfeiture racket that uses sex offenders and prostitutes to target real estate- search terms DHS-HSI, real estate.
Or,  Google dead Ferguson activists, who have disapeared in mystery suicides where they manage to start thei cars on fire, after shooting themselves in the head  or Google Gavin  Seim  and  informants  to  see  how  deeply  Americas  social  fabric of dissent,  activism, and protest  is moled by people with  hipster tats  and tactical beards-and ask: when did  the  welfare  state  turn into  a police state?
Yup, it was  when  these  tatted up Hegellian soldiers of the DVIC were raised up between 1993 and the  full blown surveillance  state of today.
Then, one must factor in how agencies are currently competing against each other as Americas political police compete for CVE funds, and the extreme lengths these go to to literally create terror-as is demonstrated by the case of a DHS whistle blower Julia Davis, who was “investigated” no less than 54 times over YEARS of time, BY the department she blew the whistle on, and whose home was invaded with a Blackhawk helicopter.
The  keen reader might recall that claims of being followed by helicopters are deemed “delusional complaints”by people like Dr. Mike Wood, and Dr.s Lorraine Sheridan, David V. James,  and social workers Christine and Liz all of whom are OGS denialists, who believe victims of gang stalking should be isolated (isolation is seldom ever/ NEVER a good or legitimate therapeutic remedy for any mental illness documented ANYWHERE except in discredited mind control and torture psychology of the D.E.Cameron era).
But yes, this is one tactical  assault in the No Touch Torture paradigm-you dont have  to believe  me though,  cuz Im just one voice- Google the following case below, and see  what  you think of “full spectrum dominance”of an individual.
Or, see if there are connections to radical zionism, and Anti Defamation League ideological and tactical alliances with Israeli secret police, as we see in case after case, such as the San Bernardino,Florida,and New Mexico shooters~indeed, nearly ALL mass shooters are targeted by right wing zionists at some point,and the FBI is fully complicit with them,with the now fired former head of the FBI James Comey once noting that he was in a love affair with one of the most toxic, sectarian racist organizations in the US, the Anti Defamation League, stating that he exchanges “love notes” and dossiers with them; and this was stated in major media.

They See Gangs of Deep State, DHS,FBI,CIA,DEA,NSA Illegality, working in the Gray Area of Law, and spitting on due process rights at every opportunity.
The Bizzare Gang Stalking Delusions of former DHS  whistle blower Julia Davis: poisons, mystery deaths, helicopters, organized crime, paranoia, and aliens-Gangs of Illegal Aliens and al Qeada at the Border, As the Mighty Wurlitzer Plays the Mossads Greatest Hits

From Wikipedia, the BIZARRE  facts of a well documented DHS gang stalking of one of its own:
….Bonner was informed that Julia Davis was not under investigation, he directed Department of Homeland Security’s San Diego office of Immigration and Customs Enforcement to investigate and discredit her. In a matter of weeks, Davis was subjected to 19 Internal Affairs investigations (that number later increased to 54 investigations). Her newly appointed supervisor, who previously served solely in an administrative capacity, proceeded to target Davis, along with other Port management. When it became evident that the DHS management intended to drive her from federal law enforcement through malicious investigations, mistreatment and harassment, Davis involuntarily resigned.
Davis filed a lawsuit against the Department of Homeland Security, which was determined in her favor. Judge Daniel Leach ruled that the government caused Davis to resign involuntarily, since no one would be able to continue working under such deplorable conditions. Federal Judge Leach also ruled that the government engaged in “illegal conduct” against Julia Davis. Shortly after she prevailed against the DHS in litigation, the agency escalated their reprisals by raiding her home with a Blackhawk Helicopter and a Special Response Team, with a total of 28 federal agents armed with assault weapons. In spite of not possessing a search warrant, the DHS spent over 1 hr. 45 min. searching the Davis’ residence. Julia’s neighbor, Matthew Judd, videotaped the raid. At the young age of 25, Judd mysteriously died several weeks later.

So,  exactly how bizarre is  the  situation where  the  DHS  is unnaccountable,  and  works  outside  the laws of due process? Have a look at  the death of Brittany Murphy, and the link to Julia Davis:

The DHS falsely claimed that Brittany Murphy provided a statement to support one of the government’s 54 investigations against Julia Davis. Brittany Murphy formally refuted the falsehoods leveled by the DHS and issued a written rebuttal in support of Julia Davis. After being named as a witness in Davis’ litigation, the DHS/ICE attempted to deport Murphy’s husband (fiance at that time) Simon Monjack. Murphy and Monjack reported being wiretapped and followed, including aerial surveillance with helicopters. In 2009, Murphy died under suspicious circumstances. Her husband also died six months later. Brittany Murphy’s death is currently being independently examined through the efforts of her father, as well as Julia Davis and her husband.

 
Yup. Threats of poison is a real  feature of organized gang stalking under an Israelified narrative. The recent poisoning of a Russian Colonel in London, and many other examples of Russians poisoned in London, has cast new light on intelligence  agency involvement in poisoning dissenters, and deep  state IC targets, but  the lil’ Mossadi  Jihadi among us- and in many online narratives  involving “sayanim,” poison is a feature too.
The Russian Colonel, it turns out, was a source for the infamous and  slanderous Steele dossier, according to Newsweek magazine, which claims that the Russians are blackmailing the American President with films of prostitutes peeing on him.
For my part, I hope these imaginary whores in the  fakenews dossiere were, like many Russian and other foreign prostitutes, lovely, skilled, hygenic, and careful whores, whose busy, naughty bits are well trimmed, and scrubbed. And, like many Russian  whores, that their pee was little more  than filtered vodka, or champagne. Also, hoping that they cleaned up after themselves, rather than leaving gross sheets behind for an under earning maid to clean up.
And regardless-it is appalling how the perverse left/neocon/progressives on one hand, derive power from the  many  LGBTVWTF and all of the odd practices that go on there, like mommies  who neuter and pimp their sons and play  dressup,  or as replacements for a man in the house; or chopping off the tips of young boys penises (circumcision) to delight of lesbians who practice vaginal fisting, and menstrual blood/sperm/feces tastings that goes on in that community, and on the other hand, attacks an elected free world leader for an imaginary”Trumped up” golden shower. And then, there is the feature if those dirty, dirty tefilin fringes collecting bacteria and spreading it in every news story. Thats a bit gross too.
So, bizarre and devoid of due process  is what the New World Udder is, thanks  to whol internet data  capture  of  all  western  citizens: and targeting begins  there, along with blackmail schemes, real estate racketeering, corrupt cops trying to out corrupt each other-and due process of law totally in the pusser.
And so, American/western  police  forces are undeniably at a cross roads, charged with a peculiar religious  fervor, due to the fact that they are wined and dined, and shown the contents of GODS little black book (which strangely resembles the dossieres of Stasi East Germany, compiled by the ADL just as the  DVIC era  was  birthed in 1993) and during privately  paid  junkets  to  Israel,  where  the ADL  trains in Ich, DU “counter-terrorism,”whis  is  by  all educated  accounts,  the creation and  manufacture of terrorists, EXACTLY the way British and Jewish interests created terror there in 1948  and in Gaza today.
In case  after  case  after  case  of  mass shooters, we see several common features that are seldom analyzed in the press, due to the religious  bent of those who-for some reason-control western media. I mean- these zionist terrorists are even calling each other anti-semites now.
Here- have a look at an assasination- and keep in mind ROGS many  thesis, and the ROGS BINGO  card, and have a look at the use of a five person security team here in the case of Stephen Paddock, and also here, where I mentioned these five person teams many months befor the Las Vegas shooting):

Five agents of the Mossad, Israel’s external intelligence agency, were duly sent to Amman, posing as Canadian tourists. They ambushed Mr Meshaal on a street corner and sprayed poison into his left ear, inflicting instant paralysis and, so they hoped, death within 48 hours.
Then everything went wrong. The Jordanian security forces responded to this brazen daylight attack, arresting two of the Israeli agents and forcing three to hide in their country’s embassy, which was promptly surrounded by troops.
Instead of escaping over the border, the Mossad team found itself trapped in Amman. Mr Netanyahu was forced to send emissaries to King Hussein of Jordan to plead for their release. The king, who was dying of cancer, drove a hard bargain. First, Israel had to supply an antidote to the poison that was killing Mr Meshaal. Jordanian doctors duly used this to save his life.
Then Mr Netanyahu had to go beyond a standard release of Arab prisoners from Israeli jails. He ended up freeing nine Jordanians, 61 Palestinians and – most painfully of all – Sheikh Ahmed Yassin, the spiritual leader of Hamas and Israel’s most hated foe.
Only then did King Hussein release the five Israelis. Mr Netanyahu, trapped in a debacle of his own making, found himself supplying the means to save Mr Meshaal’s life and allowing Hamas’s old mentor to walk free. (Google  this story for links  to how terrorist are  manufactured, then  targeted  and  assasinated in Israel.)

So,  once again, in the spirit  of peaceful,  non- violent, Thoreau styled resistance, I once  again leave you, the  reader,  with a set of facts that you can validate  with science and empirical evidence. But threats  of poisonings are ALL OVER THE OGS DIALECTIC, which is itself a psychological operation.
And, kids, whatever you do- remember: if they want to  frame  you,  they  have ten  thousand ways  to Sunday to do it. But  be  awsre  that  this  IS  how  they  do it,  and  learn  to  fight back using  peaceful,  non-violent resistance.
That works, sometimes, in Democracies.
Further Reading:
The Death of Dissent, and the Birth of Our Police State:how the Anti Defamation League, a tribal-sectarian, racist organization began the modern police and surveillance state in 1993, as they were revealed to be spying on over 12000 activists and organizations, and feeding information to police.
 

Have you noticed the CIA listens in to key discussions online?

The headline up there is an inside joke-it came from inside my head. You see, lot’s of people think that sooper seekrit agencies like the CIA listens to us all. But that’s not true! That’s crazy! And worse- a “potentially dangerous tribe of troubled minds” in the organized gang stalking online community are starting to talk about their troubles online! They must be stopped!
But the truth is, the CIA listens to some of us, more than others of us in this modern Operation Gladio/aka CHAOS. And: the star chambers wage battle between six pointed stars versus five pointed stars, and MORE CHAOS!!!! With some THIRTEENS thrown in to the lions den (lions are seldom reported to wear high heels, but there are exceptions. Like when the rotary wheel is used as a form of domestic NTT, and Mooses and Elks and Lions Bears conspire in High Heels Policing. Ooops. Bears are Russians-never mind)
Related Story: The Privacy Raping Boondoggle That is the NSA/FiveEyes-Israel (New Zealand) data theft pipeline. What’s in a name? The FOUR MILLION DOLLAR Thin Thread versus the FOUR BILLION DOLLAR Trailblazer.
And William Binney, who recently sat down with the CIA director, is one of those “troubled people.” He has even lent his name to the targeted individual community, to investigate gang stalking. Yeah, for real.
And the Washington Post-one of the deep states favorite places to take a leak-say’s “Binney is playing with fire!” Let me know if that sounds like a threatening/threat narrative laden headline (does the use of THAT word up my DHS “threat matrix score?”)-because that could indicate paranoia, and we would have to get you some mental health treatment. Maybe, the CIA’s Mormon torturers, Mitchell and Jessen could take a whack at you in a black site, and get YOU the help YOU need! Because psychologists are in on it at every level-to help you, of course.
Here-let’s have a look at what one of the Rubin Klan have to say about that meeting (you might start to see patterns in journalism when people who are in the Klan of Rubin show up pin a narrative. Here-look at this Rubin sand-witch- a serial rape hoaxer):
William Binney About to Get Tossed Into Sheol!!! According to Jennifer Rubin
My Post colleague Aaron Blake reports:

The Intercept just broke a pretty big story: CIA Director Mike Pompeo reportedly met with the purveyor of a disputed theory about the internal Democratic National Committee emails that were released last year — a theory that runs counter to the intelligence community’s own long-standing conclusions about the matter.
It’s not the first example of Pompeo doing something that has been put under microscope. But there is a common thread running through just about every example: Pompeo doing and saying questionable things involving Russia — and those questionable things tend to lean in a pro-Trump direction.

I still remember when “those people” said the “deep state” was a conspiracy theory-do you? Yeah, and now look-Google has 42 MILLION results for that exact term. Sorry, Dr’s Mike, and Lorraine, and David- but the troubled minds tribe is growing! And- deep state is really a code word for “traitors.”
And even our own government has noted that SOMEONE likely has an actual sound cannon that was used on our diplomats in Cuba. Never mind the narrative distortion that has gone on since this story broke-because “webwashing” is a real thing.
Ever notice how the things I write about here at ROGS happen in “real news” shortly after I get on the case? Yeah-it’s a pattern-my long term case of apophenia following me around like Gloria Ghost. You might have forgotten Gloria, so here is a picture of my damned sell in dis’ dress:

rabbit
This is my imaginary friend, Gloria Ghost, the scar faced bunny. Only I can see her-she’s totally in my head. Psychologists tell me it’s apophenia. Some people say Gloria is full of sh!t, but I always correct them, and let them know that it’s not sh!t-it’s dumpsters full of garbage called a “dossiere'” with augmented reality at the internet switch, and recycling of old, tired tropes and narratives of moral panics dating back to 1913. Gloria is Edward Bernay’s favorite daughter- he lit her on fire and called her a “Liberty Torch.” Poor poor Gloria.

Well-who knew? My old neighbor Doug’s friend Pompeo called one of my favorite whistle blowers, William Binney into his star chamber the other day-no kidding. And I’m pretty sure that it was Doug who made it happen (Hi Doug! Where dd you disappear to anyways-and was REAL ESTATE involved?). So, I think now is a good time to revisit my “theory” of the horsehair worm in the crickets head, which I call “memetic neuro-fasciitis of the mind.”
Or, as you know it “the NSA data entrapment scheme that targets ALL American’s and uses the collected data to steal elections by harassing, manipulating, and “no touch torturing” political opponents of the deep state (aka the “gay mafia”) and so on.
You might remember Bill Binney as a true and real American Hero who built a sooper seekrit internet email and phone call interception machine back around 2001, the goal of which was to capture intelligence on FOREIGN spies and bad guys. But because his machine respected our Constitutional rights of due process, and was extremely cost effective, coming in just under FOUR MILLION- he was fired, and the NSA built a FOUR BILLION dollar machine instead, and targeted AMERICANS and politics. Then, they tossed that machine in the dumpster, and built one that cost 72 BILLION per year.
Then, the FBI kicked his door in to shut him up from talking about it. You can beat the charge, but you can’t beat the ride, they say.
Well- how else to build and enforce, and police, and re-police a narrative that demands a climate of domestic terror??!! And how to get more monies for all those helpful, and hungry hungry hungry DVIC Gloria Bunnies in high heels? I have an idea! How about we AMERITHRAX the crap out of the narrative? Yeah! Go team black/red! Here- from Washington’s bloghave a look at the AMERITHRAX hoax, which claimed the lives of five American’s.
Good Ol’ FBI-I guess every totalitarian bankster state needs a domestic political police to suppress, intimidate, bully, frame, and harass journalists and dissenters and writers and save cute puppies and all that- to save them from those who break into our Windows 10 to get a grab at our kids, or wage years long black bag jobs. I mean-Hitler had the SS and all those brownshirted patriots stalking for Der Muterland, and Stalin had the Cheka and the NKDV, and who can forget how well the Stasi worked in East Germany as John LeCarre’ wrote about folks who tinker around behind the scenes and exploit the narrative itself(or whose asses get fatter by the day counting beans in the DHS right now)!?
Well anyways- if you have been following my writing for the last few years before this blog, you will see I have chronicled these deep state “disruption campaigns” since around 2004. Yeah- not a profitable business model, that’s for sure. BUT: a very important check against the balance sheet which is always hungry hungry hungry! Checks and balanceslike alternative media and blogging– are the thinnest and most fragile threads that sew our democracy together, so that those who would-and can and do-tear us apart don’t get their way.
Here’s a bit from the VIPS memo, which is a complete refutation of the DNC “Russian Hacking” narrative, which documents INSTEAD a “someone most likely copied the data to a thumb drive” narrative (maybe the drive had a case of bad USB??):

MEMORANDUM FOR: The President
FROM: Veteran Intelligence Professionals for Sanity (VIPS)
SUBJECT: Was the “Russian Hack” an Inside Job?
Executive Summary
Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computer. After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device.

Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack. Of equal importance, the forensics show that the copying was performed on the East coast of the U.S. Thus far, mainstream media have ignored the findings of these independent studies [see here and here].
Independent analyst Skip Folden, who retired after 25 years as the IBM Program Manager for Information Technology, US, who examined the recent forensic findings, is a co-author of this Memorandum. He has drafted a more detailed technical report titled “Cyber-Forensic Investigation of ‘Russian Hack’ and Missing Intelligence Community Disclaimers,” and sent it to the offices of the Special Counsel and the Attorney General. VIPS member William Binney, a former Technical Director at the National Security Agency, and other senior NSA “alumni” in VIPS attest to the professionalism of the independent forensic findings.
The recent forensic studies fill in a critical gap. Why the FBI neglected to perform any independent forensics on the original “Guccifer 2.0” material remains a mystery – as does the lack of any sign that the “hand-picked analysts” from the FBI, CIA, and NSA, who wrote the “Intelligence Community Assessment” dated January 6, 2017, gave any attention to forensics.
NOTE: There has been so much conflation of charges about hacking that we wish to make very clear the primary focus of this Memorandum. We focus specifically on the July 5, 2016 alleged Guccifer 2.0 “hack” of the DNC server. In earlier VIPS memoranda we addressed the lack of any evidence connecting the Guccifer 2.0 alleged hacks and WikiLeaks, and we asked President Obama specifically to disclose any evidence that WikiLeaks received DNC data from the Russians [see here and here].
Addressing this point at his last press conference (January 18), he described “the conclusions of the intelligence community” as “not conclusive,” even though the Intelligence Community Assessment of January 6 expressed “high confidence” that Russian intelligence “relayed material it acquired from the DNC … to WikiLeaks.”
Obama’s admission came as no surprise to us. It has long been clear to us that the reason the U.S. government lacks conclusive evidence of a transfer of a “Russian hack” to WikiLeaks is because there was no such transfer. Based mostly on the cumulatively unique technical experience of our ex-NSA colleagues, we have been saying for almost a year that the DNC data reached WikiLeaks via a copy/leak by a DNC insider (but almost certainly not the same person who copied DNC data on July 5, 2016).
From the information available, we conclude that the same inside-DNC, copy/leak process was used at two different times, by two different entities, for two distinctly different purposes:
-(1) an inside leak to WikiLeaks before Julian Assange announced on June 12, 2016, that he had DNC documents and planned to publish them (which he did on July 22) – the presumed objective being to expose strong DNC bias toward the Clinton candidacy; and
-(2) a separate leak on July 5, 2016, to pre-emptively taint anything WikiLeaks might later publish by “showing” it came from a “Russian hack.”
*  *  *
Mr. President:
This is our first VIPS Memorandum for you, but we have a history of letting U.S. Presidents know when we think our former intelligence colleagues have gotten something important wrong, and why. For example, our first such memorandum, a same-day commentary for President George W. Bush on Colin Powell’s U.N. speech on February 5, 2003, warned that the “unintended consequences were likely to be catastrophic,” should the U.S. attack Iraq and “justify” the war on intelligence that we retired intelligence officers could readily see as fraudulent and driven by a war agenda.

The January 6 “Intelligence Community Assessment” by “hand-picked” analysts from the FBI, CIA, and NSA seems to fit into the same agenda-driven category. It is largely based on an “assessment,” not supported by any apparent evidence, that a shadowy entity with the moniker “Guccifer 2.0” hacked the DNC on behalf of Russian intelligence and gave DNC emails to WikiLeaks.
The recent forensic findings mentioned above have put a huge dent in that assessment and cast serious doubt on the underpinnings of the extraordinarily successful campaign to blame the Russian government for hacking. The pundits and politicians who have led the charge against Russian “meddling” in the U.S. election can be expected to try to cast doubt on the forensic findings, if they ever do bubble up into the mainstream media. But the technical limitations of today’s Internet are widely understood. We are prepared to answer any substantive challenges on their merits.
You may wish to ask CIA Director Mike Pompeo what he knows about this. Our own lengthy intelligence community experience suggests that it is possible that neither former CIA Director John Brennan, nor the cyber-warriors who worked for him, have been completely candid with their new director regarding how this all went down.

HAhahahahaHahaha. Apophenia. Epiphanies. Hahahahahaha. I’m going CRAAaaaAAAAzzzYYY!. Mmmmmmbwahaahahahhaaha.
And now, you are too. But-it IS all related indeed-to politics and political policing of words themselves. Try not to get too involved in all the pattterns….But if you REALLY want to go nuts, decipher the meaning of all those letters just above this paragraph. That should keep you busy for awhile-I mean-you lard asses have nothing better to do anyways.
Well sure- looking for Stephen Paddocks hard drive and all. That will keep you busy the same way that Oswald thingy kept you busy for 60 years or so. HAHAHHAHAHAHAHAHAAHa.
Yeah- it’s in the party van.
FBI caught with its pants down, and its game wide open in Asia-is that really a bad thing?!?FBI_Party_van2FBI_Party_van2.jpg

CIA and internet backbone surveillance and InfraGard: there is no window between the average American and intelligence agents anymore

Cisco Internet Backbone and CIA, human experimentation, Moonshot CVE, Google Jigsaw
Psychology is struggling to control the narrative of organized gang stalking, and doing a really bad job of it, because some of their favored labels for political dissidents and whistle blowers are being exposed as little more than political smears masked with official diagnostic criterion. And of course, in a the ends justify the means” world, the “state purpose” of fighting boogiemen is tantamount to rational basis social controls, which is why the NSA/CIA/FBI manipulation of the internet backbone is cancer to Democracy.
Paranoia, schizophrenia, delusions that people are being persecuted, followed, or harassed- all of this and more is happening all across America today, as the thousands of miles, and the improbabilities and the impossibilities of actual contact between the average citizen and intelligence officers and agents are no longer impossibilities at all: they are a daily fact of life for every citizen, as Google, Facebook, Snapchat or Twitter have put all of us one click away from these agents every single day.
So, whereas once psychologists could keep institutional and social control of the narratives of “mentally ill” people who claim that the “CIA is spying on me,” or that the “FBI is out to get me,” and other such claims, and psychologists have long ignored these claims as delusions, it is no longer the case that prospective patients are wrong in any sense, because, all of our communications are intercepted, and our lives monitored via our cell phones, Facebook-which has admitted to actual chemically based mind control, aka manipulating dopamine levels in the brain of non-consenting children and adults-to the NSA-FiveEyes(FVEY)-Israel data theft and sifting operation that is in play 24/7.
It forms a de facto and pre-emptive prior restraint of any individuals private thought processes, intentions, and.free will any time they are online.
And, curiously, this is against the US and British constitions- but ALSO many international laws and treaties~and ironically also against the UN charter, and the Universal Declaration of Human Rights!
Previous to the era of the internet, it was nearly un-imaginable that the average person would come into contact with a CIA case officer, FBI handler, NSA agent, or rings of unethical Israeli spies and unregistered foreign agents , or other intelligence agency operators. Today, these same are compiling dossiere’s and databases full of profiles about every one of us, as secret, hidden operators monitor our social media, cell phones, and emails in real time, we  are as close as a click on Facebook, or a phone call to a foreigner. And, our childrens bath tub photos are now accessible to InfraGard, an a host of international players, including Saudi Arabia.
Compounding that, is the fact that these agents have eradicated the barriers between civilian and agency boundaries, as they float in and out of the government, to the corporate sector; in and out of one top-secret clearance and into cold-blooded capitalism the next,  and back again.
This “high policing” aka political policing, aka organized stalking is now a nation wide infection.
So, the next time a patient or a ‘delusional’ or ‘psychotic’ individual tells you that there is a spook on their internet backbone, listen a little bit more, because, well, there is in fact a spook network spread across every connection, at every minute, and a ratio of one security industrial complex worker, police and surveillance role player to every 30 civilians in Amerca alone.
Here- from Forbes magazine, meet Chris Burgess, one of the many spooks on my Cisco router:

Cisco Internet Backbone and CIA https://www.forbes.com/sites/realspin/2012/10/12/what-do-former-cia-spies-do-when-they-quit-the-spy-game/#2df634382374
Chris Burgess, now COO and CSO of Atigeo, a Bellevue, Washington firm focused on mining Big Data. The second was Ren Stelloh, who until July 2012 was CEO
After retiring with 30+ years of service from the Agency, I spent several years as adviser to Cisco System’s Chief Security Officer, and I found Cisco was doing great work; they’re one of the backbones of the internet. The more info you can provide to the more people, the better people can see and understand what was obscured
Now I’m COO and CSO of Atigeo and we’re a compassionate technology company. We want to provide the tools to mine big data, as that is unquestionably the major resource of this century

 

Organized gang stalking, psychological and influence operations.

A large part of what the organized gang stalking dialectic seems to be is the result of psychological operations, and influence by suggestion. And some 70% of the blogs I have read talk about something called “electronic no touch torture,” which in my mind at least, is an accurate description of how one feels after their privacy is invaded, and or they are subjected to contact with agency level psychological operations. Every agency has a dirty tricks section, and they use them covertly, and judges and juries much less the average citizen are never aware they were there.
Even the world reknowned authorities, and pro -prosecution OGS denialists David V. James and Lorraine Sheridan on OGS agree that the mysterious and nebulous “the internet” creates an “ideological echo chamber,” i.e. that for some, the targeted advertisements, the targeted switches and targeted routers in targeted American communities who have ISP’s that target words, and CEO’s that target speakers, and hidden FBI Infragard agents feeding community policing that trickles in from the internet switch- and for targeted individualsThe internet creates a sort of ‘closed ideology echo chamber’ wherein people who share unusual beliefs reinforce each other’s thinking”
Which is, or course, by systemic design as we see the redirection method being used by “mystery money” funded startups to influence “jihadists” and the equally nebulous “right wing” alike via linguistic analyses, which is known as “persuasion,” and also “soft force mind control, and more. Then there is the direct access to any given targets mind via hacked cell phones, and then, hacked relationships-because that is EXACTLY what the Panopticon via products like Palantir, Moonshot CVE, and “captology” was designed to do.
Most sites and discussions about no touch torture are loaded at the front end and are themselves psychological operations. Butt of the few sites that are not, we see that it is a real concept, and practice.

Psychotherapist Otto Doerr-Zegers, who has treated Chilean victims tortured under General Augusto Pinochet stated; “The psychological component of torture becomes a kind of total theater, a constructed unreality of lies and inversion, in a plot that ends inexorably with the victim’s self-betrayal and destruction. …”
This is similar to the technique of “street theater” that mind control victims described in the Washington Post Magazine article. As torture victims are not mentally ill, mind control victims would not be mentally ill but rather have undergone and are undergoing a traumatic situation comparable to torture, such as the alleged illegal targeting with government mind control weapons.

Here below, is one of the ways it is deployed in the real world, from NBC news, is Britain’s JTRIG dirty tricks division:

“British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”

Imagine yourself sitting down to write an email, and all of a sudden your connection is cut. Then, you look in the body of your email and that masterpiece that you spent some 10 minutes writing to your aunt Alice has also and without explanation, disappeared-and NO COPY EXISTS in you drafts folder.
The first time this happens to you, you would be pissed-but if it happened dozens of times as you write critical stuff-emails to your doctor, a hot tip to your bookie(*jk*), or an even hotter tip to a journalist who believes in Constitutional liberty, you would begin to see patterns in your own mind-that your data is being messed with inside you.And, in fact, the internet has literally come into your home, and changed your behavior even before your fingers hit the keyboard-and altered your actions inside you.
This is what no touch electronic torture really is in real world deployment. And while it may seem insignificant, it has the cumulative effect over time of wearing a person down, letting them know that they are being watched, and that crucial and critical communications are being stopped at one’s fingertips. Important friends and associations are being destroyed each time you bring up these “odd happenings.”
And this, combined with other electronic no touch torture: your computer is hacked repeatedly, or flashing white screens; your cell phone apps turning your phone on and off seemingly at will, or the coincidental amplification of your conversation in your ear. here are literally hundreds of ways that a persons phone can be messed with, and TI’s talk about that too. Taken as a broader picture, it is the cumulative effect that does the damage.
Torture in any form is abhorrent, and never necessary, despite the claims of those who torture, who also happen to be the same people who have collected all of our internet data and are now culling through it  with 17 other agencies for blackmail purposes. If I had told you this is what is happening even five years ago, you would have called me a nutter. And now, I bet, even you are afraid to say it out loud much less do anything about it. First they came for the crazy guy on the internet….
Using neuro-linguistic programming techniques as simple as Google auto search”suggestion,” and subtle verbal intimidation, as well as the deployment of various internet tricks, such as cutting off a persons ability to write blogs, or the interception of emails, much of what we see can be said to have the hallmarks of classic operant conditioning, combined with learned helplessness.
This last link is important because many in the dialectic feel as though they will never be able to overcome their situation. And, the one venue they have, the internet, is subverted at every point as heir blogs get hacked, and their emails intercepted, and so on. Some 50% or more of the hundreds of blogs I have read indicate that these things happen. So it could be an indicator that there is something afoot, as other online communities of bloggers do not report these things, dwell on them, or even infer that they happen.
So, even a casual investigator of this community will readily recognize this feature. And, there appear to be some blogs that use learned helplessness language, and others that d not. Simple phrases like oh, targets, just get used to it, Wherever we go, there will always be gang stalkers,” and so on. A great example of that is the blog https://neverending1.wordpress.com, where the writer never loses the chance to use negative language that reinforces the hopelessness of those who go here for advice.( I refuse to provide a link it is that negative.)
Extra Bonus: Here is the CIA page for psychological operations to control populations.
Sigmund Freud, in “Civilization and its Discontents,” notoriously classified modern men as “men of action,” and the intelligence agencies are really into that.

“The man who is predominantly erotic will give first preference to his emotional relationships to other people; the narcissistic man, who inclines to be self-sufficient, will seek his main satisfactions in his internal mental processes; the man of action will never give up the external world on which he can try out his strength….”
-Sigmund Freud

And, in the targeted individual community, there is no small irony that they begin to refer to themselves as “TI’s” when in fact the PsyWar equivalent is the “TA” meaning targeted audience.
Here from the CIA link above:

The intelligence officer is not inspired by the purpose of merely collecting and evaluating information or making analytic studies. His mission is not an end in itself, but a means to an end — a contribution to the defense and foreign policy objectives of his country. His work is therefore meaningful only to the extent that the information he provides is utilized through appropriate action. The individual operator’s performance, to be sure, does not lose merit if significant information which he acquired in due time and reported to proper authority is not acted upon; but the intelligence organization as a whole has failed to function effectively if the information it produces does not lead to some kind of policy determination or action.

I must at this juncture make note that in classic schizophrenia, there has always been the element that these claim that they are being followed or harassed by the CIA or the FBI. While organized gang stalking DOES have these claims within it, sometimes, even the paranoids are right, as we se now with the Palantir database which is equipped with artificial intelligence an predictive software, as well as a host of other means by which to ‘read a person’s mind’ and control or manipulate their online behaviors.
But it’s simply not fair to blame the CIA for everything, although it is convenient, and the idea is within the vernacular of most people.Since Edward Snowden revealed that the NSA is sweeping up the data of everyone, and all Americans as well, we are now able to track the basic flow of this data in news stories that document the reach of this grand psychological operation we see that the picture is much bigger, in much more horrible ways than the CIA could imagine all by its lonesome.
Here in this link are the tactics and techniques of guiding, misguiding, or poisoning the dialectic entirely, and then, disguising victims in the cloak of mental illness.Any researcher of organized gang stalking will find correlations between the phhrase “electronic harassment” and discrediting tactics outlined in the CIA manual. In the targeted individual community, the psy-war elements are everywhere.
The Five Eyes nations are all in on it, and Great Britain is one of the worst offenders, using the dirty tricks division JTRIG to compromise, blackmail, and discredit targeted individuals.

A slide from the JTRIG dirty tricks and mind control presentation. Note the emphasis of “making something happen in the real world.” Mass shooters anyone? What else are these guys “making to happen?”via The Intercept

Israel has been getting ALL Americans data since forever, and waging hasbara and other psyops across the globe to enforce, reinforce, or otherwise promote Jewish religion and culture (the apartheid, mind control, old lady killing zionist version  of it.)
From the Washington Post:

“The relationship was described in a “Memorandum of Understanding” between the NSA and the Israeli SIGINT National Unit (ISNU)”

So- if those are “our friends”-our enemies must be real shitbags right?  But even China has yet to catch up with us as comes to waging active psy-war on it’s citizens. We can read  CNN as they try to downplay the fact that China is doing EXACTLY what the Five Eyes alliance is doing to suppress, control, discredit and destroy the free speech rights of western nations.Meet the CNN  version of “the Great Cannon of China.”
But-does it hold up well against the Free Speech Steamroller that we use? Only time will tell-or, maybe someone can  get standing to sue our agencies and see what they are really up to. I bet the Chinese are rolling in laughter as they watch how the agencies and law enforcement in general are using our Constitution as toilet paper.
Lastly, it cannot be understated that “the CIA tortured some folks.” And that the American Psychiatry Association provided advice as to how to do this. Meanwhile, their guys always get the help they need when they are done torturing others. I don’t mean to imply that the CIA and other’s are using the internet as a form of torture for some, but YES THAT IS WHAT I AM IMPLYING. But clearly, they aren’t the only ones doing it.
Stalin, Hitler, and their go-to guys in Psychological Operations, Edward Bernays (whose books lined the shelves of all Nazi propaganda officed)and Sigmund Freud, both of them Jewish, had nothing on our guys when it comes to propaganda, and mind control techniques; and China last I checked had no Manchurian Candidates, because as we see time and time again, only western nations and Israel are literally manufacturing terrorists.