Kära Sverige: din USDOJ kille i Thailand är bara CIA lite. Jag kommer att göra mina nya vänner medvetna om det

Dear Soon to be New Friends:

You have recently been approached by a representative of an organization that had “information” about how they can use the religious “science” of ponerology and internet black magic to help you enforce a hypothetical moral code, or some vague, or unwritten laws.

And, deep in their sales pitch, they offered you a bribe, in the form of grant money,or other financial reward or incentive to help you, personally, or your country in general down the great new road to the future. But there is a problem with that rationale, and it is this: with religious orders, the future is always the past, and their offer to you can only lead you, and those they have approached, back there.

Well, you might have noticed that this blog you are reading,( as I type it,) is a useful spy hunting tool and that the author-the guy writing this from a fully entrapped communications device, is a useful and reliable, proven spy hunter, who is familiar with how these “good people” operate, online, and off, and that I am deeply familiar with their religious, tribal,theocratic, sectarian, and coded online psychological operations.

You might also have noted that I can train teams of other spy hunters to do what I do, but to do it better, because everything works better if everyone is on the same team-and if we all get a paycheck, of course. And, because it takes a huge amount of time and resources to do it.

Related Story: Look at how India is waking up to the fact that western spy agencies by proxy of “corporations” like Facebook and Twitter have been entrapping their soldiers, and others in sensitive infrastructure positions, using social media, and “religious gurus” and utilizing “honeytraps.”


‘Crucial source of intelligence’: Indian Army urges officers to wipe Facebook accounts & avoid WhatsApp over security gaps
15 Nov, 2019 01:19

So, in that light, I would ask you to take special note of the religious and tribal sectarian affiliations of your recent informers, and then, notice THEIR affilliation with my own Department of State, and Department of Defense, and other levels of our “deep state.”

But also, please especially notice that our spy agencies are targeting your networks, and switches, using these types of tools, all of which leave electronic signatures behind if you know where to look; but also that certain online dialigues can lead you to these people who use those pieces of code, and even subsidiary languages online. And, that everything is not always what it appears to be.

In western theology, there is the concept of scapegoating, which featured heavily in recent tribal sectarian holidays. The story is basically thus:

A tribe full of baby bombers and affilliated seething lunatics refuses to be held responsible for their hateful crimes and high misdemeanors that they perpetrate on others across the globe, and so, with high pomp, and ceremony, they blame a goat for their crimes, even marking that goat with a “red” scarf.

Yeah, I thought you might chuckle at that last part. Me too.

Well, anyways, they then throw this goat off a cliff, much the way that we see in this odd case from the USA, or this one from Australia, but ESPECIALLY this one, which involved a foreign born billionaire encountering the perverse honey traps that western governments are using to compromise you, your diplomats, your citizens, and others who are integral to your countries public safety.

So, read the headline above from that perspective, and then, lets return to the narrative of the goat.

As you know, the western dialectic is infused with signs and signifiers that are not always apparent, and the goat is one such narrative that we see repeating in many forms in the western theology, and for many sundry reasons.

But here, lets focus on what is seldom discussed in liturgies that appear during this holiday season: what happens to the goat after they toss it off a hill, or, in this case, off of Capitol Hill?

Well, a little known fact about the goat is this: once kicked into the wilds, it becomes a beacon, easily followed due to it red scarf, and, that goat will inevitably fend for itself.

This of course, means that the goat will find new sources of food, water, and shelter, as well as to bring actual, and real predators out of their internet hiding places. And then, of course,the shitbags who tossed the goat all pounce on the food, water, shelter-and you, eventually.

So, I think you might be interested in hearing more? You know where to find me if you want to hear more.

Best Regards,

ROGS

The discrediting of the gang stalking narrative and proof of gang stalking: inbound and outbound links

So:because ROGS-the blog you are reading now-has thoroughly refuted the notion that those who are victims of organized gang stalking are in any way delusional, and that ROGS is making a difference in an Israelified/ADLified world of deference, take a look at the following picture, and note that it is an “inbound link”from the FBIs very own webpages, which are situated in some of the most theoretically secure servers in the world, meaning that in order for someone to click that link INSIDE the FBI webpage HTML where I have linked a post critical of theier ridiculous slogan “Dont be a Puppet”, they would have to have access to the administrative control panel AT that agency (and, un-ironically, that this happened during the longest government shutdown in history, January 2019, in case you wonder what slop-thighed FBI web admins DO on their days off):
1548058383686.jpg
Well, you can decide for yourself if gang stalking is real, or if it is connected to the FBI, because in fact, that agency is merely the corporate bankster army of domestic enforcers, and nothing more, working outside of oversight of citizens, and with total disrespect for anything related to the US constitution, or due process of law.
Or,you can also decide if claims by TIs if strange breakins to their homes are real, or uf shitbags at that agency perform black bag jobs, or if in fact the agency itself isnt a totally corrupt sectarian secret police, as we see the now-shitcanned former head of this agency,former Director James Comey, spouting Rienhold Niehburs philosophies of “Christ in Culture here,” or, as the Intercept has noted, if the Tel Aviv office of the FBI is likely where the ADL and the Mossad plot their targeted webterrogations and webscrubbing after the facts of OGS targeting individuals.
That agency, and the hidden political rot within it simply doesn’t follow any known parameters of law, ever, in what many informed opinions call COINTELPRO 2.0

Related Story: Federal judge castigates SA who performed a black bag job, while he was illegally “embedded” in a corrupt sherrifs department Task Farce, asking “So, if the LAPD or sherrifs department put a badge on a French poodle and elected that gay, Jessica Valenti styled poodle as the Umpiress Gay Gaian Goddess of All Task Farces, is it now a sherrifs deputy too?”.

So, in a world where speech policing of pure speech, first amendment words, ideas, and online performance art via blogs like mine become targets of “lashon hara” white-slavery patrols, and when such things happen,so frequently, and for so many, and for so long without a Constitutional challenge, have a look at what happened AFTER I linked the Association of Threat Assessment Professionals(ATAP) to the creation of crisis via junk science, in what they, and the clusterfuck of 17 spy agencies and Fusion Centers call the “parallel colluding investigation,”and just AFTER yet another unnaccountable asshat committed a felony or two andtried to hack my email AGAIN:
1-the following search language came in to this blog a day or so after someone clicked MY inbound link TO the FBI webpage (which is embedded in the HTML code of every webpage where inbound /outbound links interact with the internet) entitled “Dont be a Puppet” ,which caused their click-which someone clicked -to become MY inbound link FROM the “refferrer” and, just just AFTER someone linked my blog to an interesting right wing/libertarian discussion on Zerohedge

And here is one of the first results from this search language.
homeland security +the cia +nsa and local police gang stalking
gangstalking coven
2-the next day, someone linked the following language to an obsolete search engine named FIREBALL in Germany which officially went offline in 2002, as my stats registered some 20 hits from that country
https://fireball.com/search?q=surveillance+role+players+%2Bgangstalkers+targeted+individuals+%2Bfbi+%2Bcops+%2Bcointelpro+-aliens+-reptilians+-nibiru
This is the discrediting narrative in action, and notice which came FIRST, starting at the inbound link FROM the FBI website, a very ammateur webpage designed by what looks like a 13 year olds attempt to be clever and “do art,” which I mocked in this post here, in the first screencapture.
Then, notice that fireball itself died in 2002, and was absorbed by the NSA fake Googleopus, but is now a conduit for agency level shenanigans.
The death of Fireball:

And now, notice how hidden, cowardly agents, and agencies “frame” the OGS dialectic, wrapping it in total bullshit about aliens, and other time wasting crap of the sort that US military and Psychological and influence Operations practitioners have done historically, linking the agency practice of “colluding parallel investigations,” aka, Organized Gang Stalking, in the same junk-science way they have linked domestic violence to terrorism and the “paranoid delusion” of cyberstalking by agencies who target pure speech online.
This is how neocon, sectarian religious societies ruled by secret police and colinized by racist, sectarian Israeli thought and private junkets to apartheid states works in practice.
And, how dead democratic republics act in the final days of Praetorian democracy :
homeland security +the cia +nsa and local police gang stalking
gangstalking coven
https://fireball.com/search?q=surveillance+role+players+%2Bgangstalkers+targeted+individuals+%2Bfbi+%2Bcops+%2Bcointelpro+-aliens+-reptilians+-nibiru

Delusions, poison, bizarre claims, and schizophrenic narrative in gang stalking: the case of DHS whistle blower Julia Davis

Delusions, poisons, poisoning, discrediting, counter intelligence, schizophreniform disorders, and targeted individuals of organized-and Irgunized– gang stalking.
In what many psychologists describe as delusional complaints of targeted individuals of organized gang stalking, the facts in each case are strikingly similar, frequently bizarre, and then, in some of the outliers, we encounter claims that TI’s believe they are being poisoned, have been poisoned, or have been threatened with poison.

Related Story: Have a look at how Israeli spies work in five person teams, and use poison, in this story</ from mainstream news sources, and this wiki from Infogalactic describing these five person teams too.
Then note the correlation between the assassination described in my story below, and note how a “
five person team ” bungled/allowed /participated in the Las Vegas shooting, where Stephen Paddock shot up a crowd of key influencers.

And yes, many drug  addicts, and mentally  ill people, AS WELL AS POLICE AND PRIVATE CONTRACTORS, AND THOSE WHO WORK IN THE USAF OSI INFORMERS, claim similar things, and we see tens of thousands of references to it in forums like this from Medawarscornflakes, a blog that provides highly reputable and interesting content and analysis, particularly having documented how retired FBI and other LEOs utilize OGS in real estate gang stalking..
But the differences  are  striking when we examine the “onset” of these alleged disorders, and even more striking when activists, journalists, and others encounter OGS, as we saw in the case of Minnesotas Electronic Peeping Toms and Tinas, as agents and agencies used over 180 police departments to stalk and harass Minnesota MSM reporters in a massive gang stalking that ended up in court.

You see, many whistle blowers and activists like Andy Ostrowski, and Rakem Balogun are suddenly stricken with a severe case of Organized Gang Stalking, just AFTER they reveal institutional corruption, or outrageous government conduct.
And others, who are connected to intergenerational organized crime figures who are FBI informants or agency targets, like Stephen Paddock and his brother, also seem to suffer OGS.
For instance, there are many strange anomalies in the ever changing narrative of the Las Vegas mass shooter Stephen Paddock, and he also believed he would be poisoned, or had encountered programming or had suspicions that such was  possible. There are literally so many holes in that story  that it looks like a pair of headless, fat  pig legs named BUCK TOOTHED AMY , wearing  fishnet stockings, and high heels, and a red felt lined tinfoil hat.
Then,  there  are the cases  where  alleged autistics were  contacted online by unknown parties, and  then,  who exhibited disorders  related  to  germ phobia, or  other “advanced sequalae” of mind control-like operations online. Most  famous of  these is  perhaps the Newtown shooter, who, like  Paddock,  was  smeared  with  the  label  of  pedophile after the fact, and  with disappeared  hard drives  to boot.
Military Psychological operations(PsyOps)in modern policing, with Fusion Center monitoring of individuals

Indeed, there is even a well known case in Oregon (and I have noted repeatedly here at ROGS that OR and WA state have extensive connections to OGS complaints ) where police, and others worked to gas light a fellow so badly that he believes his wife poisoned him.
His wife eventually holed up with the local police department, and he apparently lost some real estate. Google “poisonedbywife””  and gang stalking” or “Terry Wagar and  gang stalking” for evidence in that case, which, much like the case of  Lawrence Guzzino, deserves a  second look for  any civil or criminal defense lawyer to understand OGS.

Related Story: private contractors like Gavin de Becker that work with the DHS and FBI CVE programs are using harmful psychological oerations on targeted individuals, as discussed here in the official literature of the Association of Threat Assessment Professionals(ATAP), and noted by private contractors like,Jack Palladino (an ATAP member) whose company acronym is Psops.

The evidence, and  the case studies of organized gang stalking are EVERYWHERE in the news now, as this  new thing,  High Policing, aka political policing has taken root, as the Domestic Violence Industrial Complex (DVIC) and its little helpers in the information sharing environment,aka nation state blackmail programs works its mythology ever deeper into American culture in a “soft takeover”of our country by lies and half truths; but especially through lop-sided story telling that started in the era of VAWA,1993.
Its for the children,  they  say without irony, as the same banking interests that feuledtheeastern blocnations takeover work their magic-and their state sanctioned child kidnapping rings here now; that these  types will  do  ANYTHING  for  the children-and  often,  each child  taken  in to  state  care  nets those who facilitate  that, a one million   dollar  paycheck,  as social  services,  psychologists, police and  others  derive  income  from  these  schemes, and the federal power of cash to states that swell their foster care factories has incentived this behavior in the pseudo-feminist, DVIC baby farming era. 
This form of venture capitalism used to be called slavery when it was racialized here, or “white slavery” in the eastern bloc,or in Americas peonage and prison system during the heyday if Americas growing prison industrial complex, but today it crosses all racial and political divides.
The  boogieman,  it  seems,  is  always lurking anywhere  EXCEPT  in places  where  he  gets  hard  dollars-or federal grants as  there are documented correlations  between  homelessness of  targeted individuals, and  gang stalking too.
Then, there is the strange, bizarre case where a DHS whistle blower, Julia Davis, who has helped uncover emerging evidence that one or another element of the socalled Hollywood  mafia (Haym Saban, forex ample, isan Israeli), and elements in  deep  state  policing is implicated in some way or another with poisoning actress Brittany Murphy, whose father is an old mobster.
Get out the  ROGS  BINGO card in these cases, because counterintelligence gangstalking is literally~ LITERALLY~designed to “cut the victims throat with Occams Razor”.

Related Story: Right wing nut, uberzionist, Muslim hater,and and foam mouthed attorney Debbie Schlussel wages a disinformation campaign about DHS whistle blower Julia Davis, with video.

To understand how bizarre gang stalking complaints are, one must understand how bizarre counter intelligence tactics are, and then, to understand how the testosterone/progesterone charged DHS works against due process, actively occulting its methods, and skirting or flaunting the law and due process every step of the way, as we see in their training materials released by The Intercept, that this is their stated objective. Have a look through ROGS here at their  massive pre-emptive real estate  and  forfeiture racket that uses sex offenders and prostitutes to target real estate- search terms DHS-HSI, real estate.
Or,  Google dead Ferguson activists, who have disapeared in mystery suicides where they manage to start thei cars on fire, after shooting themselves in the head  or Google Gavin  Seim  and  informants  to  see  how  deeply  Americas  social  fabric of dissent,  activism, and protest  is moled by people with  hipster tats  and tactical beards-and ask: when did  the  welfare  state  turn into  a police state?
Yup, it was  when  these  tatted up Hegellian soldiers of the DVIC were raised up between 1993 and the  full blown surveillance  state of today.
Then, one must factor in how agencies are currently competing against each other as Americas political police compete for CVE funds, and the extreme lengths these go to to literally create terror-as is demonstrated by the case of a DHS whistle blower Julia Davis, who was “investigated” no less than 54 times over YEARS of time, BY the department she blew the whistle on, and whose home was invaded with a Blackhawk helicopter.
The  keen reader might recall that claims of being followed by helicopters are deemed “delusional complaints”by people like Dr. Mike Wood, and Dr.s Lorraine Sheridan, David V. James,  and social workers Christine and Liz all of whom are OGS denialists, who believe victims of gang stalking should be isolated (isolation is seldom ever/ NEVER a good or legitimate therapeutic remedy for any mental illness documented ANYWHERE except in discredited mind control and torture psychology of the D.E.Cameron era).
But yes, this is one tactical  assault in the No Touch Torture paradigm-you dont have  to believe  me though,  cuz Im just one voice- Google the following case below, and see  what  you think of “full spectrum dominance”of an individual.
Or, see if there are connections to radical zionism, and Anti Defamation League ideological and tactical alliances with Israeli secret police, as we see in case after case, such as the San Bernardino,Florida,and New Mexico shooters~indeed, nearly ALL mass shooters are targeted by right wing zionists at some point,and the FBI is fully complicit with them,with the now fired former head of the FBI James Comey once noting that he was in a love affair with one of the most toxic, sectarian racist organizations in the US, the Anti Defamation League, stating that he exchanges “love notes” and dossiers with them; and this was stated in major media.

They See Gangs of Deep State, DHS,FBI,CIA,DEA,NSA Illegality, working in the Gray Area of Law, and spitting on due process rights at every opportunity.
The Bizzare Gang Stalking Delusions of former DHS  whistle blower Julia Davis: poisons, mystery deaths, helicopters, organized crime, paranoia, and aliens-Gangs of Illegal Aliens and al Qeada at the Border, As the Mighty Wurlitzer Plays the Mossads Greatest Hits

From Wikipedia, the BIZARRE  facts of a well documented DHS gang stalking of one of its own:
….Bonner was informed that Julia Davis was not under investigation, he directed Department of Homeland Security’s San Diego office of Immigration and Customs Enforcement to investigate and discredit her. In a matter of weeks, Davis was subjected to 19 Internal Affairs investigations (that number later increased to 54 investigations). Her newly appointed supervisor, who previously served solely in an administrative capacity, proceeded to target Davis, along with other Port management. When it became evident that the DHS management intended to drive her from federal law enforcement through malicious investigations, mistreatment and harassment, Davis involuntarily resigned.
Davis filed a lawsuit against the Department of Homeland Security, which was determined in her favor. Judge Daniel Leach ruled that the government caused Davis to resign involuntarily, since no one would be able to continue working under such deplorable conditions. Federal Judge Leach also ruled that the government engaged in “illegal conduct” against Julia Davis. Shortly after she prevailed against the DHS in litigation, the agency escalated their reprisals by raiding her home with a Blackhawk Helicopter and a Special Response Team, with a total of 28 federal agents armed with assault weapons. In spite of not possessing a search warrant, the DHS spent over 1 hr. 45 min. searching the Davis’ residence. Julia’s neighbor, Matthew Judd, videotaped the raid. At the young age of 25, Judd mysteriously died several weeks later.

So,  exactly how bizarre is  the  situation where  the  DHS  is unnaccountable,  and  works  outside  the laws of due process? Have a look at  the death of Brittany Murphy, and the link to Julia Davis:

The DHS falsely claimed that Brittany Murphy provided a statement to support one of the government’s 54 investigations against Julia Davis. Brittany Murphy formally refuted the falsehoods leveled by the DHS and issued a written rebuttal in support of Julia Davis. After being named as a witness in Davis’ litigation, the DHS/ICE attempted to deport Murphy’s husband (fiance at that time) Simon Monjack. Murphy and Monjack reported being wiretapped and followed, including aerial surveillance with helicopters. In 2009, Murphy died under suspicious circumstances. Her husband also died six months later. Brittany Murphy’s death is currently being independently examined through the efforts of her father, as well as Julia Davis and her husband.

 
Yup. Threats of poison is a real  feature of organized gang stalking under an Israelified narrative. The recent poisoning of a Russian Colonel in London, and many other examples of Russians poisoned in London, has cast new light on intelligence  agency involvement in poisoning dissenters, and deep  state IC targets, but  the lil’ Mossadi  Jihadi among us- and in many online narratives  involving “sayanim,” poison is a feature too.
The Russian Colonel, it turns out, was a source for the infamous and  slanderous Steele dossier, according to Newsweek magazine, which claims that the Russians are blackmailing the American President with films of prostitutes peeing on him.
For my part, I hope these imaginary whores in the  fakenews dossiere were, like many Russian and other foreign prostitutes, lovely, skilled, hygenic, and careful whores, whose busy, naughty bits are well trimmed, and scrubbed. And, like many Russian  whores, that their pee was little more  than filtered vodka, or champagne. Also, hoping that they cleaned up after themselves, rather than leaving gross sheets behind for an under earning maid to clean up.
And regardless-it is appalling how the perverse left/neocon/progressives on one hand, derive power from the  many  LGBTVWTF and all of the odd practices that go on there, like mommies  who neuter and pimp their sons and play  dressup,  or as replacements for a man in the house; or chopping off the tips of young boys penises (circumcision) to delight of lesbians who practice vaginal fisting, and menstrual blood/sperm/feces tastings that goes on in that community, and on the other hand, attacks an elected free world leader for an imaginary”Trumped up” golden shower. And then, there is the feature if those dirty, dirty tefilin fringes collecting bacteria and spreading it in every news story. Thats a bit gross too.
So, bizarre and devoid of due process  is what the New World Udder is, thanks  to whol internet data  capture  of  all  western  citizens: and targeting begins  there, along with blackmail schemes, real estate racketeering, corrupt cops trying to out corrupt each other-and due process of law totally in the pusser.
And so, American/western  police  forces are undeniably at a cross roads, charged with a peculiar religious  fervor, due to the fact that they are wined and dined, and shown the contents of GODS little black book (which strangely resembles the dossieres of Stasi East Germany, compiled by the ADL just as the  DVIC era  was  birthed in 1993) and during privately  paid  junkets  to  Israel,  where  the ADL  trains in Ich, DU “counter-terrorism,”whis  is  by  all educated  accounts,  the creation and  manufacture of terrorists, EXACTLY the way British and Jewish interests created terror there in 1948  and in Gaza today.
In case  after  case  after  case  of  mass shooters, we see several common features that are seldom analyzed in the press, due to the religious  bent of those who-for some reason-control western media. I mean- these zionist terrorists are even calling each other anti-semites now.
Here- have a look at an assasination- and keep in mind ROGS many  thesis, and the ROGS BINGO  card, and have a look at the use of a five person security team here in the case of Stephen Paddock, and also here, where I mentioned these five person teams many months befor the Las Vegas shooting):

Five agents of the Mossad, Israel’s external intelligence agency, were duly sent to Amman, posing as Canadian tourists. They ambushed Mr Meshaal on a street corner and sprayed poison into his left ear, inflicting instant paralysis and, so they hoped, death within 48 hours.
Then everything went wrong. The Jordanian security forces responded to this brazen daylight attack, arresting two of the Israeli agents and forcing three to hide in their country’s embassy, which was promptly surrounded by troops.
Instead of escaping over the border, the Mossad team found itself trapped in Amman. Mr Netanyahu was forced to send emissaries to King Hussein of Jordan to plead for their release. The king, who was dying of cancer, drove a hard bargain. First, Israel had to supply an antidote to the poison that was killing Mr Meshaal. Jordanian doctors duly used this to save his life.
Then Mr Netanyahu had to go beyond a standard release of Arab prisoners from Israeli jails. He ended up freeing nine Jordanians, 61 Palestinians and – most painfully of all – Sheikh Ahmed Yassin, the spiritual leader of Hamas and Israel’s most hated foe.
Only then did King Hussein release the five Israelis. Mr Netanyahu, trapped in a debacle of his own making, found himself supplying the means to save Mr Meshaal’s life and allowing Hamas’s old mentor to walk free. (Google  this story for links  to how terrorist are  manufactured, then  targeted  and  assasinated in Israel.)

So,  once again, in the spirit  of peaceful,  non- violent, Thoreau styled resistance, I once  again leave you, the  reader,  with a set of facts that you can validate  with science and empirical evidence. But threats  of poisonings are ALL OVER THE OGS DIALECTIC, which is itself a psychological operation.
And, kids, whatever you do- remember: if they want to  frame  you,  they  have ten  thousand ways  to Sunday to do it. But  be  awsre  that  this  IS  how  they  do it,  and  learn  to  fight back using  peaceful,  non-violent resistance.
That works, sometimes, in Democracies.
Further Reading:
The Death of Dissent, and the Birth of Our Police State:how the Anti Defamation League, a tribal-sectarian, racist organization began the modern police and surveillance state in 1993, as they were revealed to be spying on over 12000 activists and organizations, and feeding information to police.
 

Read through ROGS to note that I indict some of the same suspects that Sharyll Atkisson's lawsuit did: Hillary Clinton, Al Franken, lawsuit, Department of Justice Department of Justice, FISA, Fisc, Obstruction of due process, America's Political Police

Could federal watchdog tamper with Trump wiretap evidence? It may not be a first- The Hill

Could federal watchdog tamper with Trump wiretap evidence? It may not be a first
© Greg Nash

Everyone hopes the Department of Justice’s inspector general (IG) will fairly investigate surveillance activities conducted on U.S. citizens by the FBI and intel agencies. Just like we hope the IG’s office will reach fair conclusions in its probes of alleged FBI misconduct concerning the Hillary Clinton investigation, leaks to the media and conflicts of interest.

But, for me, there’s reason to be wary.

I turned to the IG’s office in 2013 after independent forensics proved my computers had been infiltrated by remote intruders using software proprietary to a federal intel agency. Instead of fair findings, I got a lot of mischief and stonewalling.

And wait until you hear what I recently learned.

By way of background, in 2013, I filed a complaint with the IG’s office asking it to investigate the government-based computer surveillance. CBS News — where I worked at the time — would not allow the IG to examine my CBS laptop, which had been infiltrated (as CBS publicly announced on Aug. 7, 2013). But I asked the IG to examine one of my personal home computers that was also compromised.

Some of my intel sources didn’t want me to hand over any computer. “You can’t trust the inspector general,” they told me.

But I figured there was little downside. We already had our irrefutable forensics findings from our examinations. If the IG probe was competent and honest, as I expected it might be, then it could turn up names of the government actors responsible. If not, no harm done.

I don’t blame the IG computer investigators for what ultimately went wrong. They got briefed up on Apple forensics for their inspection of my computer, visited my house on numerous occasions, communicated freely, shared findings along the way and seemed to earnestly do a thorough job.

But as the investigation neared a conclusion, things changed.

On their last visit to my house, they wanted to be sure to segregate the malicious activity they identified from any work I might have done on the computer. They told me someone operated the computer in advanced mode, something I don’t know how to do. They found that — like the CBS laptop — the intruders had repeatedly altered the computer’s internal system times and dates. And they discovered that — like the CBS laptop — key files had been destroyed. (We already knew these things and more from our own exams.) We went through pages of their notes together. I asked for copies.

“You can get those later,” the lead investigator assured me. “When the investigation is finished.”

If there’s one thing I’ve learned, it’s that you can’t count on getting something from the government tomorrow. I made contemporaneous notes of the visit and findings.

The weirdest part of the visit was that, for the first time, the IG investigators began insisting the intruders weren’t working remotely but were in my house, sitting at my computer, doing these things. They had dates and times. I told them that was impossible; nobody was sitting at my computer upstairs in my home for hours while my husband was home on those days, at those times. Besides, we already knew from our own forensics that the intruders had operated remotely. My forensics team said the IG experts were not fully competent on their Apple work and, for some reason, seemed to be misreading the remote intrusions as local intrusions. Still, if nothing else, the IG work provided additional confirmation of some of our more basic forensics. No harm done.

Not long after that, my communications with the IG’s office changed. They notified me that their investigation had been “narrowed,” from looking into an illegal intrusion to determining only if there had been a remote intrusion. Nobody would explain to me who narrowed the scope of the probe or why. You’d think they’d be interested in any intrusion, remote or otherwise. Why the distinction?

In the next few weeks, when I learned the IG had finished its investigation into my Apple computer, I asked for my copy of the report. The investigators told me they’d been ordered to send it to the office of IG general counsel Bill Blier for approval.

Over the coming weeks, I repeatedly asked for the findings but was told it was still in the IG general counsel’s office. I formally requested that the general counsel release a copy to me. No luck.

One investigator had told me I could always file a Freedom of Information Act request to obtain my report and notes. I did so; under the law, a response was due within about 30 days. It’s been years.

When the DOJ’s inspector general won’t follow the law, to where can a citizen turn?

Meantime, under pressure from Congress, the IG eventually released what my attorney refers to as a “wiped” summary — not the actual report or notes — with spin that implied there had been no intrusion. This was quickly presented, publicly, by then-Sen. Al Franken (D-Minn.), who had gotten a copy of the summary with lightning speed; and it was dutifully reported by some in an unquestioning press.

The IG’s obfuscation and stonewalling doesn’t adversely impact my lawsuit against the federal government for the computer intrusions. The case is progressing through court with evidence from multiple forensics exams.

As our lawsuit continues, so do our forensics. New computer investigative tools have become available, and grains of evidence have been solidified into forensic mountains. Our evidence involves multiple computers and government I.P. addresses discovered improperly residing in them.

That brings us to the news.

Not long ago, my forensics team asked if I used that Apple computer after the IG returned it. My team was conducting a new exam. “No,” I replied, “it hasn’t functioned since before I gave it to the IG. I just stored it when they returned it. Why?”

“Because — that’s not your hard drive inside the computer they gave back to you,” they told me. “… We know the serial number on the hard drive when you bought it. We recorded the same serial number on our earlier forensics exams. This is a different hard drive. Completely different serial number. Not even close.”

I would never have known if we hadn’t gone back in that computer for additional forensics.

In addition to somebody changing the scope of the IG investigation midstream, and the office withholding from me the notes and the report on my own complaint, somebody also switched out my hard drive before the IG returned it to me.

What does all this mean to the integrity of the DOJ’s inspector general?

You decide.

Sharyl Attkisson is an Emmy Award-winning investigative journalist, author of The New York Times bestsellers “The Smear” and “Stonewalled,” and host of Sinclair’s Sunday TV program “Full Measure.” Follow her on Twitter @SharylAttkisson.

Sharyl Attkisson, United States Postal Service,computer hacking, Advanced Persistent Threat's (APT's) and targeted individuals

Even the casual reader of ROGS will note that I have documented the tactics and tools and methods of “organized stalking” in ways that defy the previous dialectic-and, tha I roundly have indicted “progressives,” and people who sit on the Intelligence committee, and, I have noted the perverted, nepotistic vampires of a pig’s feather roll around in hell together, much as J. Edgar Hoover and Edward Bernay’s are doing today, having wedded crisis PR to policing in such a way that democracy was murdered BY these types of people, and no one noticed.

Related Story: The House Intelligence Committee’s Domestic Spying On American Citizens Bill is a “Wolf in Sheep’s Clothing.”
And Mike Masnick of Techdirt.com notes that both many Republicans and Democrat’s agree-domestic spying and it’s accompanying blackmail will get Senator’s to vote for ANYTHING, including Section 702 “spying on targeted American’s” renewal:

Senate To Vote Tuesday On Surveillance Bill; Four Senators Try To Rally Others To Oppose

from the say-bye-to-the-4th-amendment dept

Following yesterday’s bizarre vote in the House, in which many members who opposed President Donald Trump and warn about his abuses of office voted to give him much greater surveillance capabilities, the issue quickly moved to the Senate. Senate Majority Leader Mitch McConnell made a procedural move to ensure no amendments are added, and the bill the Senate will vote on will be basically the awful bill in the House.

Or, as Marcy Wheeler has noted, American’s are noww officially targeted individuals as we now ALL fall under FISA Section 702 “targeted interception of the communications of targeted individuals,” and the FBI/CIA/DEA/NSA/Google back door searches of targeted American’s since 2001-17, and how our government in the form of the NSA data theft pipeline to Israel dropped haystacks on people’s heads in 2001-5, and then, started poking these people with hidden needles with something called “no touch torture,” aka passive aggressive shenanigans on our internet switches courtesy of Fusion Center’s and “the deep state.”
In the case of Sharyl Atkisson, we see all of that and more, with bonus points for actual documentation that, according to an NSA/CIA/DoD trained computer forensics expert- some of her computer hacker’s used USPS IP’s and that she has long been a target of government spying, with a partisan flavor: she reported things that conservatives touted, like Benghazi and Fast and Furious- and she was personally targeted by Barak Obama’s political policing initiatives.
Let’s look at a simple equation, starting with my assertion from last November, where I chronicle how United States Postal Service trucks are frequently cited by gang stalking victims as participants in OGS. Here is a refresher from last November, where I touched on how the USPS policies and practices have long been criticized for making people go crazy, aka “going postal.”
I said:

“organized stalking in vehicles frequently involves official vehicles, with no license plates, like this one:

no plates USPS.jpg
I have obscured the number on the lower left, but this vehicle has no license plate. And, this is frequently reported by people who are being stalked by counter-intelligence agents as well.

Google returns some 150, 000 results for “mail trucks and gang stalking.”
In the US, the postal service has long used postal employees to stalk and harass non-conformists in the ranks, which is the origin of the term “going postal,” as disgruntled employees became mass shooters because they were mobbed at work, and thus became synonymous with “politicized government workplaces” back in the 1970’s-90’s, just before the Big DVIC Mass Shooter era.

Today, I note that Google returns  320,000 results for mail trucks and gang stalking if I search without quotation marks.
And, so, I also note that many of the mass shooters of the 1970’s-1990’s worked in the Post Office. In fact, so many of them went on rampages after being gang stalked and harassed that the term “going postal” has 7,050,000 results in Google, and is forever ingrained in the American Dialectic as the very definition of workplace-created insanity.
Now, let’s watch another of my many thesis come together, as I validate links between the United States Postal Service, government styled hacking, and bizarre criminality that targets reporters and journalists computers with PLAINBIZARRE tactics and hidden operations that I discussed briefly here, and then, the case of former CBS reporter Sharyl Attkisson, and the USPS, where I ask all the “good peeple” in America’s Political Police the question:
What the [email protected] Is the Post Office-which is NOT and American government entity– Doing In ANYONE’S [email protected] Computer? And why are all you “good peeple” in our Alphabet agencies allowing American citizen’s to be targeted by the “deep state?”
 

Attkisson v. DOJ: The Computer Intrusion Lawsuit against the Federal Govt.

As my federal case moves slowly through court system, there is a new development: ongoing forensic work of my computer laptop system has revealed a second government Internet Protocol (IP) address used in the illegal cyber-attacks on my computer laptop system.
The IP addresses don’t belong there.
In a new affidavit filed in federal court last week, cyber-security expert David Scantling states, “[T]he presence of these USPS addresses on [Attkisson’s] computer is not a mistake; it is not a random event; and it is not technically possible for these IP addresses to simply appear on her computer systems without activity by someone using them as part of the cyber-attack.”
Scantling served as a contractor for the National Security Agency (NSA), the Central Intelligence Agency (CIA), and as a Department of Defense (DoD) civilian employee. He’s familiar with “Advanced Persistent Threat” (“APT”) cyber-attacks. In fact, he developed and deployed similar APT cyber-attacks against foreign government, commercial, insurgent and terrorist targets. He also developed and deployed cyber-security countermeasures in the private sector to defend against such attacks.

Interestingly, both government IP addresses found embedded deep in my computer system trace to the U.S. Postal Service (U.S.P.S.), which has been known to cooperate with intelligence agencies on various levels. The U.S.P.S.

In order to understand the totality, and the totalitarian-and sectarian corruption of the “progressives” one must first look at the many cases of reputable journalists who have been targeted by IC and the “deep state” elements that work with immunity and impunity, right under the noses of America’s Finest. Our agencies are totally corrupt.
And the Post Office relationship between the Senate Intelligence Committee and gang stalking even moreso. Most noteably are the sweetheart deals between Richard Blum in real estate. Are you seeing the connection between real estate and gang stalking yet?
Look who owns the Post Office-which is not an American government entity-and look at the “crisis PR” that was waged when the pubic realized that Dianne Feinstein used her connections in government to steer hundreds of millions of “mystery money” from the taxpayer’s pockets into her husband’s business:

See if you can spot the crisis PR in the following from the widely discredited and highly partisan Snopes.com: Going Postal
Richard Blum, the husband of Senator Dianne Feinstein, obtained a contract to broker sales of USPS facilities, but no evidence documents that it was due to his wife’s influence.

Influence? What’s THAT?

Related Story: How “influence operations” under color of law and NSA back door searches-and “mind control experiences on the internet”are destroying American democracy.

Of course not! Plausible criminality requires that we gas light the evidence until we get a day in court-which will NEVER happen because these crooks are waging the NSA blackmail schemes we see today.

Crooks crooks crooks. In postman’s clothing.

So- there is a documented link between organized stalking and mail trucks, OGS and Democrats, and OGS and computer hacking. Without a doubt, we see that one sector of our political wolves are participating in the “deep state” blur between rights and due process on one hand, and highly organized disinformation, and gang stalking.

Rose McGowan GANG STALKED by mind controlling Mossadi-jihadi's

To get an idea how wide ranging and vast these civil conspiracies of gang stalking are, and how deep the rabbit hole goes-follow along in the case of Rose McGowan and Harvey Weinstein’s ADL styled spy operation. Then, ask yourself all of those questions that law enforcement and retired law enforcement aren’t asking about gang stalking-because they ARE IN ON IT, to the last rotten Dodger Dog.

The Hegelian dialectic seeks to cause conflict, and those who work “in darkness” exploit each side, banking on the fact that no one will step forwards to combat their bullying and harassment. Rose McGowan talking about her actual rapist (as opposed to all that fakerape going around on the left) IS that, on some level. And the Hegelian conflict is showing sectarian rifts, as it seems silencing is a two way street, with no street lights at night.
Hey! FBI and the rest of the “good guy Red Squads:” I SAW something! I am SAYING something: the ADL spy rings of 1993 have bloomed into stanky corpse flowers, and our country is over-run with un-registered foreign agents and spies! Look! Rose McGowan was a “targeted individual” and a victim of “psychological operations” for decades, because Harvey Weinstein hired a gang of thugs (un-registered foreign agents) to harass her!
And: she was actually raped, as opposed to the Democrats favorite weapon of choice to wage war on individuals from Fusion Centers, aka”privacy rape.”
Related stories: The FBI’s BFF’s-the Russian spies learning the dark arts of dancing the “limbo” in Oregon as Nathan moans from the grave “Tanya, where’s that redhottt…OOooooohmmmmph.”and everyone wonders “How does Hollywood think all this stuff up anyways?” in the thriller “The Spies Who Fooled Seattle.
But McGowan isn’t the only one who is being harassed with “organized gang staling” by a longshot, as OGS is de facto policy all over America for anyone who has a story to tell. The FBI does it, he DHS does it, they barter and trade names back and forth for decades, frequently destroying ives; and foreign spies do it too as these agencies watch on.
They  all share our data back and forth for DECADES. Here, “good guys” have a peek at what the “other guys” are doing:

The New Yorker reports that “Harvey Weinstein Hired an Army of Domestic spies to Harass Rose McGowan”
In the fall of 2016, Harvey Weinstein set out to suppress allegations that he had sexually harassed or assaulted numerous women. He began to hire private security agencies to collect information on the women and the journalists trying to expose the allegations. According to dozens of pages of documents, and seven people directly involved in the effort, the firms that Weinstein hired included Kroll, which is one of the world’s largest corporate-intelligence companies, and Black Cube, an enterprise run largely by former officers of Mossad and other Israeli intelligence agencies. Black Cube, which has branches in Tel Aviv, London, and Paris, offers its clients the skills of operatives “highly experienced and trained in Israel’s elite military and governmental intelligence units,” according to its literature.
Two private investigators from Black Cube, using false identities, met with the actress Rose McGowan, who eventually publicly accused Weinstein of rape, to extract information from her. One of the investigators pretended to be a women’s-rights advocate and secretly recorded at least four meetings with McGowan. The same operative, using a different false identity and implying that she had an allegation against Weinstein, met twice with a journalist to find out which women were talking to the press. In other cases, journalists directed by Weinstein or the private investigators interviewed women and reported back the details.
The explicit goal of the investigations, laid out in one contract with Black Cube, signed in July, was to stop the publication of the abuse allegations against Weinstein that eventually emerged in the New York Times and The New Yorker. Over the course of a year, Weinstein had the agencies “target,” or collect information on, dozens of individuals, and compile psychological profiles that sometimes focussed[sic] on their personal or sexual histories. Weinstein monitored the progress of the investigations personally. He also enlisted former employees from his film enterprises to join in the effort, collecting names and placing calls that, according to some sources who received them, felt intimidating.

certainly, and more, as we see now that she was  in fact a victim and a long-term Israeli “targeted individual” od an illegal and actionable spying campaign.
While the damsel in distress is certainly over-rated and over-used as a symbolic representation in morality campaigns (such as we are immersed in right now), she is quite effective on thine sheeple. And, the de-nuded damsel is also a symbol of ethnic conflict as well-lie many of the examples I provide here on ROGS, where the Roman’s, comprised of multiple tribal and ethnic groups, frequently rained hell upon their foes and conquests.
As such, we see that a very powerful mafia has for a time waged war on American’s via narrative control, and the DVIC entrapment scheme that profiteers and exploits every single man woman and child. Big Pimpin’ indeed, and it came with a cost. McGowan, at least got paid for whoring araound as she did-but when we add the cost of being spied on by the Mossad-well, maybe not so much, because this is what organized gang stalking IS. And it is painful.
Hmmm. Off the top, the DVIC put 2.3 million men in prisons with no decent reading materials (which created “jobs” for about a million Paul Blart’s);  foster care factories are a 4 billion dollar per year domestic industry; family court’s are well documented multi-billion dollar racketeering schemes and are hidden tribunals with the foregone conclusion that men are merely indentured servants whose task is to buy their children out of modern slavery by another name; women’s crisis centers are actually de facto spy rings themselves.
MMMMMM. The smell of Progress in the morning is a corpse flower in bloom, full of blow flies and surrounded by “men” who wait for the crisis PR guys in heels to show up before they stop a mass shooter. [email protected] We’re [email protected] The bottom of the trough HAS been chewed completely through, and ten thousand Dick’s drilling for oil won’t save “we the peeple.”
So- when certain elements of media collaborate on spin, small wonder that they have uplifted McGowan as a modern Boudicca of sorts, and her current incarnation has her with concentration camp length hair instead of flowing red locks.
McGowan, the daughter of the tribal narrative-a white woman with a Scotch Irish name, and now, concentration camp hair and wearing gray all the time (because those vampires that are now holding her up  drained the life out of our economy, but only AFTER eating up all the men who could have opposed them; then they ate Weinstein, and now McGowan’s hair too)-the Golem lifted up much too late-but boy oh boy, it worked so well while they were building that other queen.
And I say too late because this charade of forty year blackmail and entrapment scheme of kangaroo courts and gray area policing is coming to an end soon-and that replaced by an emergent totalitarianism via the surveillance state.
And how did all of this happen you ask? Well-Peter Thiel, the guy who created the Palantir mind control and data manipulation machine has fled to New Zealand (and you will frequently be threatened on Twitter if you criticize zionist’s and dominionist’s with this specific threat “Shall we send him down to NEW ZEALAND??!!).
And in this cartoon reality, only the political cartoonists could think up the image of Dick Cheney, Rupert Murdoch and the Rothschild’s drilling for oil in Syria as “ISIS” wages war. But the REALITY is that they are ACTUALLY doing that. Even whacky conspiracy nutters couldn’t envision that comedic scheme-but it’s really happening. Don’t hate Israel-hate those [email protected] and all the bad PR that bad actors heap on “we the people” over such blatant criminality.

Related Stories: Who’s drilling who? Nazi’s and Zionists make great Pal’s as Peter Thiel states “New Zealand is Der future!”as Israel grants Dick Cheney oil rights in the Golan Heights.
And, speaking of cartons-you should see my tracert results. But what really stands out is this one here: 4.16.24.105. I suggest my astute reader ping the sh!t out of it for a few days.

Yah, Pizzagate. Sure, nice try. Nice distraction-because the real action is getting off your fat, overpaid lazy asses and policing this crap, and protecting targeted individuals rather than trying to turn them into bag men and rats. Or worse-dead crickets.
To my regular readers who have been following this for the last seven years, keep in mind all of the ROGS “theories” because this is a real and actual case of memetic neuro fasciitis, complete with “advanced sequalae, and apophenia.”
Then-watch how the spin doctors try to turn this into an anti-semitic thing, or worse, a “progressive cause” that will kill the donkey-again-in 2020, because the “thing to talk about” is how foreign agents are influencing our democracy-I’m not scared f Nazi’s like the Intercept is- but I’m terrified that our Cnstitutional Democracy has been bought beyond repair by law enforcement dependency on spy-dollars and dossiere’s that are passed around more frequently than for-sale Hollywood starlets.
If I sat back rubbing my hands together and plotting the downfall of a political party, I could do no better job that moling the corpses of these DVIC designed fakerapes backed by cricket headed media, and gray area policing, and then,  dragging them out in the press. We just don’t care anymore about women in gray-because we know the vampires that drank them dry.

Organized gang stalking and silencing and SAM's: Special Administrative Measures are what gray area policing IS.

Lynne Stewart-the “terrorists lawyer” speaks from the grave.
As you can see by the headline there, ROGS is a blog that asks the questions that could get a guy killed by the “good guys.” You see, in a police state-every police state- the good guys HATE journalists and lawyers-especially criminal defense lawyers, cuz’ “We don’t need no steenking warrant” and all that other hero stuff (apologies for my bad, stereotypical accent to any Latino’s and especially the Senor Gomez and family who invaded my class room a couple years back with bad street theater. But the word “steenking” is actually James Cagney, imitating George Raft, imitating someone from the middle east.)
*SIGH* I guess that is the short history of journalism in America. I mean- at least America isn’t “Bleeding Kansas”-yet.
Not that the Israelification and the ADLification of American police isn’t trying real hard to make it so, though….

Reynolds's Political Map of the United States 1856.jpg
Bleeding Kansas: journalists were tarred, feathered, and murdered for reporting on racist raiders who tried to turn us into slavers.

And, I have pointed readers of the future to who it is that might do me in, and specifically, I have implicated the NSA data theft as a starting point; and certainly, it is widely known that the center of my claim is that hey have spied on me since 2004, and that, specifically targeted me as I have documented throughout this blog.  I have also noted that mysterious secret society members show up in my life (the last several years have all the “good people” from the Rotary Club International setting up stake outs next to my apartments, or otherwise doing stuff like THIS that the MSM doesn’t cover.)
I have moments of pure bliss though, when I see a story that I covered some 13 years ago finally make it into the MSM, or the Intercept. That’s how far behind into the dark ages that the Democrat neocons have pushed free speech.
Here- Look: just yesterday, Aviva Stahl covered Lynne Stewart, the “terrorists lawyer” who was a target of nefarious police conduct for several decades, because as Stewart told me once that cops, and  The NYPD HATED her (and so did those pork-nosed assclowns whose slogans say “Stop HATE!” and “End HATE! and “A World of Deference” and so on).

A prisoner prohibited from speaking to his family for four months after uttering the words “As-Salaam-Alaikum.” Books that have to be destroyed after one prisoner reads them, lest he somehow use the pages to pass along secret notes. Letters to family members that have to be copied and analyzed by intelligence officers before they are sent out, meaning they may take months and months to arrive.
These are the types of restrictions faced by a small number of prisoners locked up in the United States, including some people who have never been convicted of a crime The rules, called Special Administrative Measures, or SAMs, are the subject of a recently released report by the Center for Constitutional Rights and Yale Law School’s Allard K. Lowenstein’s International Human Rights Clinic. The study, an unusual undertaking, makes the case that SAMs violate both U.S. and international law, threaten basic constitutional protections, and may even constitute torture.

Prisoners who have previously been subject to this sort of detention describe the experience as like being in a world unto itself.

Just about 50 prisoners nationwide were subject to SAMs as of June this year, most of them Muslim. Prisoners who have previously been subject to this sort of detention describe the experience as like being in a world unto itself, in which they have no human contact with anyone other than their lawyers and very occasional, highly restricted communication with immediate family members. Many of those on SAMs have developed mental health issues as a result of the isolation, which may prevent them from contributing to their own defense. Moreover, people under SAMs are prohibited from contacting the media, and their attorneys and family members could be prosecuted for revealing anything the prisoner has said — meaning the highly restrictive world of SAMs is highly secretive, too.
“I wouldn’t be able to publicly repeat anything a SAMs client might have told me, whether about her health, her conditions, her treatment by guards, the weather, what she ate for lunch,” said Pardiss Kebriaei, a senior staff attorney at the Center for Constitutional Rights who has represented clients on SAMs in the past. “Every utterance is off limits, even if it is in no reasonable way linked to safety and security.”
Justice Department officials have claimed that SAMs are a crucial tool in the government’s national security arsenal, an assertion fiercely disputed by defense attorneys of terrorism suspects as well as human rights advocates. Among the most serious concerns raised in the CCR report is that the government uses SAMs to coerce accused terrorists into pleading guilty or sharing sensitive information.

 
Her “crime,” long before she was “taken out” by gray area administrative rules called SAM provisions? Lynne said “I refuse to be intimidated by the police.”
And then-even worse than cowering before the authorities-she committed speech crimes, and spoke to the relatives of her client, in order to vigorously provide a defense.
See how that works- America’s police are so corrupt that they targeted and harassed people for decades with frame jobs, and set-ups; IRS audits, drive by’s and hone taps, StingRays and more. Then, they busted her for words. Because this is what cowards do.
And-silencing has become the tool of choice in the DVIC asault against speech too. see how that works? First they came for the word “fart” and then….”butterfly wing!”
And I said nothing….
It was said that Ms. Stewart was an advocate of violence every official smear online and in the news, and even Wikipedia repeat that in some form.But to my knowledge, she never caled for specific armed resistance, or otherwise advcated tat people take up arms. As far as I know, she believed as I do-that the word is mightier than the sword.
Which is why, of course, they came for her because of what she said. See how that works? Systemic violence directed at a woman, and not a single SJW stood up for her rights, because they were too busy inventing fakerape scandals like Sabrina Rubin Erdeley and the UVA rape hoax or plotting the next gold theft like they did in Benghazi.
so-words themselves have now been pushed to the edge of the slippery slope, and so, I got to thinkin’ that if there is any sad feature of the lives of targeted individuals, it is that they do not do their research-and then hunt down and maim/maul/stalk/frame/setup/or kill the exact people from the exact agencies that hunt and target them.
Really- this is a tragedy, that TI’s take out their frustrations on abortion clinics, and country music fans, and random strangers,  instead of researching who it is that their stalkers are, and then, taking names and addresses, and then, organizing, and working together in hidden ways, selectively….well you can use your imagination what you can do if you put your mind to it.
But fighting sociopaths who hide behind institutional networks of cowards is not easy. And when psychologists like Lorraine Sheridan and David V. James write studies back to back which basically state:

  1. people targeted as individuals, in illegal ways, by institutions, groups and persons using the well known and forensically described processes of OGS, and then are abused by secret societies and institutional forces- that these should be isolated, discredited, and then, returned into the control of policewho are the exact group of people that are implicated time and time and time again as the primary participants in organized gang stalking, such as we saw with the Beatrice Six,  and
  2. that we just ignore the problem of institutional sociopaths and good guys and gallies who use the lives of others as foils against insight into the huge fraud that DVIC policing initiatives are, and or to create human beings as “Manchurian Candidate’s” like mass shooters and active shooters, as we see time and again that LEO’s ranging from the FBI to the NSA, to local community policing and security guards all participate in individualized harassment, over extensive periods of time lasting sometimes for years,  until a Stephen Paddock or a Myron May-or, a Jared Loughner especially is created from whole cloth(it is wdiely reported in blogs about OGS that Loughner was stalked by official institutional elements), and so I would like to draw the journalists and the lawyers here, where we see a boy leave his mother’s house one day, excited to get a brand new, privacy protecting Apple Iphone, only to come into the conclusion that “sure, why not- I think I will just stab a few people until-coincidentally-an off duty cop shows up, whereupon I will be killed” just “happens,”
  3. that these same “caregivers” and social workers, doctors, and more frequently subscribe to the same magazine where these psychologists publish articles such as the famous “More Lies and pap: don’t let those dangerous people tell it like it is” as we saw in the case of David V. James, and his extensive body of work entitled “How to CYA with botched patients under the DVIC and CVE disruption scheme.”

http://www.newser.com/story/250508/one-whiff-of-blood-molecule-separates-hunters-hunted.html
so- as an early caasualty in COINTELPRO 2.0, yes-I practiced journalism once, and ten, watched in horror as every single thiing that I learned in classes ranging from “Journalism Ethics,” to “The AP Style Guide” and especially all those lectures from first amendment scholars, and “embedded” reporters” were literally rendered useless when this “new thing” took over.
Yah. Ethics scmethicks. Edit this punctuate that, and especially- try to write live into WordPress as the “good guys” hidden all over the cancerous backbone of the net try to perform brain surgery on the writer with J-script errors, and Ruby on Rails exploits; and metasploitation of a Tor browser, who even remember such things.
Yah, sure. Misogyny wutever. Rape-prolly not enough of it on women who do little else than worry about their vahjayjay’s. And Anthony Weiner/Weinstein/et al. God that’s hilarious.
Embed this:

Wordpress on Tor on NSA attack.jpg
This is one attack that I have documented of a Tor browser writing in WordPress. Note the auto-refresh attack, and the quadrupling effect of the available screen space. And, the IP went directly to Booz Allen server in Kansas, then pinged a Fusion center, and then I traced it to NSA headquarters in Maryland-but then, the browser crashed, and took my notes with it. Also, notice the “fratured” effect of the images on the screen. The CIA and other agencies use these methods to attempt to “split” the view and emotions of the viewer.

Again, I ask: when did THIS….become this….become this….*

*The regular reader knows what this means, and if you do not, use my search feature to look it up

 

Las Vegas shooter Stephen Paddock slandered after death: patterns in gang stalking

Crisis PR manufacturing factories are in overdrive exploiting the narrative with the Las Vegas shooting, the worst mass shooting in US history (not counting the slaughters of Native American’s by the “good guys” and the women they are “protecting” in the last few centuries). And, while “active shooters” and “mass shooters” are anomalies in the data of organized gang stalking, far to the outside of the outliers on a Bell curve-we see one pattern emerge in media: ritualistic slander and defamation, which has long been a practice of cults and sects within organized religion, policing, and government.
Good Reads: Author  and cross-disciplinary integrator Jeremy Lent notes  in “The Patterning Instinct” that mind control is real-and it’s happening to you right now.

Update 01/21/2018: Stephen Paddock is alleged to have had searches on his hard drive that contained searches for “LaHoya, CA” and “Santa Monica, CA” in his internet history. Here is the Las Vegas police exhaustive report on their event.
The irony meter explodes when we see the patterns in the data, as Santa Monica is perhaps one of the best-protected enclaves of retired CIA/FBI/alphabet agents, and, the home of many of Hillary Clinton’s multi-billionaire donors. Also without irony, award winning journalist Robert Parry gave a talk in Santa Monica, where he warned us in 1993 that the CIA psychological operations had come home to roost. The FBI is literally a mouse click away from any internet connection in that area (and everywhere else) on the internet since the latest extension of the NSA’s “spying on American’s program popularized by the Obama administration.)
And, the once “paranoid” claim that secret agents are  following people around-and within one single mouse click of anyone’s life are now validated in what some believe is a post-Constitutional America.
So, it seems a good time to ask: why are they framing Santa Monica as a haven for the CIA/other agencies botched brain surgeries, aka “Manchurian internet victims,” which is increasingly popular these days. But this has precedence as we saw previous connections to the CIA and a mind controlled asset who claimed he trained with Omar Mateen in one or another of the modern MHCAOS programs that target American’s with other American’s as if we are all darts on their dart boards. Or, needles with hay dumped all over our lives since NSA whistle blower Bill Binney came forwards, and after General Keith Alexander (who spied on me personally, and then, stole my hard drive)took millions in covert graft in an unethical-possibly illegal scheme of data theft.

UPDATE 10/03/2019: Since I wrote this post a couple years ago, the Association of Threat Assessment Professionals (ATAP) was forced to go on record discussing how they advise law enforcement and Fusion Centers about waging “parallel colluding investigations” on targeted individuals, using miltary psychological operationson civilian targets.

Then, the anti-democracy, racist, sectarian Anti Defamation League was forced to acknowledge that they are using military-derived psychological operations on non-consenting subjects online, some of whom have gone on shooting rampages afterwards.
Then- they make up another good story to cover the pointy tracks their high heels leave in the dirt around every mass shooting. My best guess is that someone in the “deep state” in Mexico is the person to ask about this particular event, but these internet operators work from all the FiveEyes countries-anywhere their is the UKUSA (sounds like Yukuza), we see these exact events.

And, we see another familiar pattern: the DVIC vampires and the crisis PR agencies are sinking their teeth into the still warm corpses of the many victims, and claiming Stephen Paddock had a ‘history of domestic violence,’ which is mere hearsay, never litigated in any trial, anywhere, and true to form in the lop-sided narrative,  outlined here in the case of Gaergate, where the Five Eyes spy apparatus used influence and psychological operations to sway voters, and form mass minds,  that the lie runs quicker than a truth, or the results of a fair trial.
While no one wants to stick up for a dead maniac, a terrorist, a wife beater, or child abuser (these are the worst smears the deep state can put on people),or even be associated with such a dialogue, we see over and over again how speakers are targeted by secret agents and local police for merely expressing alternative explanations, or counter-narrative-that our sons and daughters are pre-targeted by British intelligence in black operations on video games.
Then, we see scripted events that follow the predictable patterns and classic propaganda and influence operations-It must be remembered that-for now-we are still a democracy.
So, whether you are a Nazi moron/Koch Brothers clone, or a United Nations/George Soros funded crybully in Fabian fur, even you will see that the DV smear is also classic IC smear in every sense, straight out of the PsyOps manual-the CIA literally used it in the Iran-Contra era, and Viet Nam.

Related Story: former CBS investigative reporter Sharyl Attkisson is suing the DoJ for spying on her computer, planting documents on her hard drive, and using the United States Postal Service to do so. I ask you, the reader-how personalized are these “deep state attacks on journalists?” Sharyl Attkisson can tell you better than I can.

Then, we see that evenPaddock’s girlfriend (the one who he paid for trips, and life’s little luxuries, and who he sent away as he “bubbled” himself, is no doubt a target of these psyops now as media pits a hooker against the girlfriends version of the shooter, which was a well known tactic in the MHCHAOS years that targeted black activists in America), says he was “a caring man.”
And this, AFTER the smear-and after we see tat the girlfriends fingerprints are on the bullets…..the irrony meter is jammed like a cheap bump stock now. So, the DVIC narrative is a powerful tool of interrogation in its own right, a sort of pre-emptive assault on critical thinking, but also, a powerful tool of propaganda.
So, my goal is NOT to vindicate a mass murderer-my goal is to expose that our media is no longer a media of facts, but one of “opinions and propaganda guided by military and banking interests.”And, that these active shooter events are something other than what we are being presented. And make no mistakes- my goal is also to raise awarenesof this new corruption of “gray area policing.” where the state eradicates law and order by precipitating AND particpating in disorder and domestic chaos.

Related Story: FBI whistle blower Sibel Edmonds discusses the CIA’s 1960’s Operation Chaos which targeted dissenters-and how it has been updated on a massive scale

But defamation in “gray area policing” IS the the link between active shooters, mass shooters, and “lone wolves”as LEO’s “stalk the stalkers” according to the Rotary Club model of policing, where we see that men are objectified by Ich, Du Buberism’s, rather than having their day in court.
It is not insignificant that there are “odd” discrepancies emerging now about the official narrative of the Las Vegas shooter, and less odd that a security guards story has now changed- that a “missing link” in what would make sense to “ordinary and rational people,” is now falling under scrutiny: why did a guy who was shot in the leg wait SIX MINUTES to call for help?
I have personally been shot in the femoral artery-and I can tell you from experience that when you get shot, your body takes over and tries in every way it can to save it’s life from “bleeding out.”And, it takes about seven minutes to bleed out from a leg injury; I know this because I have had such an injury.
So, as security guards fall somewhere between jailhouse snitches and Paul Blart, the Mall Cop when it comes to waging the “official story,”I can also tell you that these guys are not the most stolid “truth tellers.”
I have personally collected evidence of one instance of OGS where security guards Tased a man in the back, and then worked with police for over half an hour to try to cover their asses in their Constitutionally cringe-worthy conduct. I have also documented OGS in Las Vegas on numerous occasions, which has inordinately high amounts of gang stalking complaints, if you search Googles for “gang stalking” and “Las Vegas.”If I seem cynical, it is because I am-and as we see time and again, cynicism and skepticism are themselves under attack.
But first, here are the DVIC narrative details about the man who shot up a crowd of country western music fans:

Stephen Paddock shared a trait with other mass killers: He abused women

Las Vegas Shooter Was Known To Verbally Abuse His Girlfriend In Public

So- we see that sander and defamation after death isn’t specifically tied to his conduct and bad actions-but instead, that the Domestic Violence Industry has piggy-backed it’s lop-sided narrative onto another narrative to keep itself fat and happy (there’s a joke n there somewhere about troughs, and the obesity of the self-perpetuating and so on.)
Here: have a look at my thesis about the DVIC, and all of it’s one sided, gendered, quasi-religious, non-egalitarian story telling in the gray area of law and society:
When did THIS:
5da90-iu
Become this:
Walk-A-Mile-In-Her-Shoes-police-stilletos
And THAT, MEDIATED by this:

cropped-showimage-arcadia-switch
Every single American communication is mediated by middle-man-attacks, aka the NSA/DHS/FBI/CIA/FiveEyes and Israel data theft pipeline. And this seeks to throw our culture BACK into an era of Jewish-christian religious hegemony and neo-conservativism that is anti-thetical to a free and liberal Democracy.

 
So-what would cause multi-millionaire Stephen Paddock to arm himself so heavily that he would eventually just “snap?” I bet being stalked by well armed thugs who operate in the gray area of the law might do it. Or maybe, hidden things that only the many thousands and thousands of camera’s in Las Vegas can tell us- but you better get the data quick, because Las Vegas only keeps footage for FOURTEEN DAYS.
Then: imagine you were a high stakes player who won a lot? Do you think Casino’s love the high stakes players who “game the system” or do you think Casino’s “not love” the high stakes players? How about high stakes players who sued them and prevailed? I urge you to use critical thinking skills here-and some cynicism.
Related: Stephen Paddock sued more than one casino for slip and fall accidents.
Here- have a look into a Casino, which is looking at you as you gamble:

The age of anonymity is largely extinct in casinos these days, thanks to rapidly evolving technology and surveillance teams tasked with keeping resorts safe from criminals and cheats. Most Strip casinos operate at least 2,000 surveillance cameras on property, said George Joseph, a casino surveillance consultant and former director of surveillance at Bally’s.

Ted Whiting, director of surveillance at Aria, shows off a prototype card recognition program at the casino Tuesday, Sept. 16, 2014. Credit: Steve Marcus

The “eyes in the sky” have become much smaller and more discreet, blending in with casino interiors to give surveillance operators a bird’s-eye view of the floor or a close-up shot of someone’s face.
“What has really changed is that casinos have 100 percent coverage of virtually every square inch,” Joseph said.

Or, “a closeup shot of someones face”…..just sayin’.
 
So-just to demonstrate the fact that Google is itself a de facto arm of the surveillance industrial complex, let’s Google the phrase “the effects of chronic surveillance,” one f MANY phrases we can use to decipher the meaning of this event, and its related outcomes. There are many such phrases that you can use, but this one seems to make the most sense-and I note tat I have deliberately left out the word “medical” or “health” effects.

This language returns About 6,790,000 results-and the entire first age is about “medical” and “health” effects. Here, we note there is a total “blackout” of data that answers our research question. And then, of course, there is the same auto-complete distortion that we see when we Google “Dr. Moss David Posner,”a doctor who counseled TI’s until he died in 2011 of natural causes.
Here are some of Googles recomended searches at the bottom of the page:

So, we see that this idea of “public health” is in fact, a carefully crafted dialectic in and of itself, that-fr some reason-isn’t concerned about the effects of “chronic surveillance.” Again and again, we see that few studes are highlighted by Google, and institutions that receive massive amounts of federal funding (tax payer dollars) have been co-opted at the switch-and the search box in Google. These are not minor or insignificant ommissions- most Americans today are wellaware that we are under chronic, pervasive, and law-defying surveillance-but not Google, again, for some reason.
And, then, with a crisis PR machine greased to the hilt, it didn’t take long before the pundits and the MSM defamation specialists invoked the “after death body punch” and linked Stephen Paddock with defamation and smears about domestic violence. And this is a pattern in these cases, much as we saw the Guardian UK’s pundit mocking Hugh Hefner, who was long the envy of feminists and lesbians, but also, of all the “good guys” who on one hand, did good/god stuff and on the other, read Playboy magazine in darkened garages, or in tree-forts far away from the clutching pearls of the “good gals.” And I will leave it to the reader to infer what these good guys did with “the other hand,”and then skulked away, ashamed of themselves, like whipped poopy puppies.
So, here at ROGS blog we ask a question that could literally get us (me) stalked and  murdered– is the Rotary Club and a certain smear machine, hooked up with the UN’s “Transnational Crime Syndicate”-all of which are connected to the DVIC- linked to active shooters (click the link for EVIDENCE)? The evidence is starting to pile up that the Rotary Club International is linked to “Stalking the Stalkers,crisis PR manufacturing, gun control, and more. Feel feee to sue me, and dispute that linkage, which is clear in their own literature.
Then- here’s that OTHER elephant in a garter and heels-how much does it cost  to get a hooker to say what you want her to say? (No offense or disrespect to hookers intended; and especially to those I count among my friends who take pride in the word “whore.”). But this is important in my broader thesis-that OGS, hookers, and mass shootings are all related, an that the UN is operating black operations on US soil, as we see time and again that certain political interests ranging from gun control, to legalized prostitution, to police who are pimps or rapists; to international finance as we saw in the case of Dominique Strauss Kahn, and now, Henry Weinstein, long the darlings of certain elites, now mere chaff and detritus; brought down because those who once benefited from their activities have turned to “bigger, better financed” pushers of policy and people.
Without irony, I note that the Weinstein debacle is symptomatic of the clash between neocons and Catholics that plays itself out over sex ( I mean- if these women were unwitting or unwilling “victims” then….why wait? Bigger, better, newer money, maybe?)
So, we see the smear is well timed, and designed as a political tool that is primarily about power, and then, that power extrapolated through media. This is “feminist jurisprudence” and the police state in action-lurid headlines, moral panic, and violence is EXACTLY how the moral panics of preceding era’s took place, but this time, with a white boogieman, instead of a black one or an Asian.
But at the root, it is the same group of international banksters, and bald headed Eastern bloc socialist’s that we saw in the 1920’s, and the 1950’s, have combined with the “Popery” they once demonized, and together now, they are on board with the coming dark ages to perpetuate their old mythologies and cultic beliefs, via bills like the “Save Eastern Sex Toys Act.”
And, this battle was planned long before men like Paddock went ballistic, as globalist Fabian Socialism both divides and conquers-but also reunites old friends and enemies alike in the formation of new capital interests. But how to capitalize it all? I have an idea! Let’s “save the women and children from words,” by flooding the internet with porn! Then, swoop in and save them all from critical thinking, reason, and free speech online!

There’s a terrifying link between mass murder and domestic violence that nobody is talking about

Sex Worker Spills About Stephen Paddock

I was born bad’: Las Vegas prostitute who romped with mass killer Stephen Paddock says he enjoyed violent rape fantasies as she reveals he boasted he had always been evil

-Stephen Paddock [[reportedly]] had violent rape fantasies and was abusive to his girlfriend. This all sounds too familiar when thinking of America’s most recent mass shooting perpetrators

So- we see a well orchestrated moral panic as neocons and arch conservatives have united with religious interests and that policing has become little more than the guardians at the literal “Chicken Ranch.” And then, not only “controlling the sex supply,” which was long thegoal of globalists, but ALSO controlling the narrative about men who “purchase sex.” DO you see any patterns with “BIG PIMPIN'” and globalism? No?
Have a look here, then, at the UN Transatlantic Crime Initiative where we see the UN inserting it’s fingers into…young nubile Japanese girls….lives. Like the masive DHS asset forfeiture racket, the TCI seeks control of local economy, but also, control of the information channels, the freeways, and the side streets as well, of local culture; and that, via local policing of speech and speakers.
Or: Dark Ages redux, as these forces claim control over our society; and leave the “usual suspects” in control of our children.
Good Guy/Galism on Acid = High Heels Policing
From Hamisch Brown, former Scotland Yard Inspector, who advises Rotary Int’l and the FBI to many LEO’s around the world on how to “stalk the stalkers,” cops have increased their social capital as “enforcers,” but not much of it has anything to do with “law.” Any security guard/renta cop/off duty cop who has ever done bar duty knows what this means, both to a place of business, but also, to local economy: it means the dollars stay in the bar if you just shut up and go along with it all. But in this case, history teaches us that the dollars will in fact, LEAVE the bar, and then, well, you figure it out. We’re being robbed.
And anyone who knows the jargon of policing knows that the sexist tropes of ‘saving the women and children’ lead frequently to the DVIC “Heels on the Ground” policing that we see today as these divvy up the pork-pot of DVIC funding, in make work projects across the western world-but few women I have talked to lately are elling me they feel “helped,” because in fact, they are entrapped in constant double binds of “state check” versus “independent initiative,” which is where the DVIC steps in, and claims BILLIONS in their names.
I am preserving this Rotary Club sales pitch below, because the DVIC has a tendency of scrubbing the web as soon as I write about how police corruption intersects with religious conservative fundamentalism, and it’s hand-maiden of global feminism:

STALKING THE STALKER
Hamish retired in 2004 as a Detective Inspector on the Specialist Crime Directorate at New Scotland Yard after over 30 years service with the Metropolitan Police.  Although he has a thorough investigative background, especially regarding rape, murder and contract killing, and being commended on many occasions, he went on to specialise in stalking cases.  Hamish is a leading authority in the UK and of international standing and regularly lectures and gives advice on a global basis. He has been key note speaker in Houston, Texas at the conference of End Violence Against Women International and other high profile events in Europe, Hong Kong, Los Angeles and Singapore.
He is the author of the Home Office publication Stalking and other forms of harassment, an investigators guide.  This booklet was distributed throughout the UK and to many countries around the world and had to be reproduced to meet demand.  Hamish also created the Metropolitan Police advice literature Stalking and harassment, a guide to minimising the risk to children.  His work on stalking was acknowledged with the award by HM the Queen of the MBE.
His presentation will commence with a fascinating case history of an investigation where he was ultimately commended both by the trial judge at the Crown Court and the Commissioner of the Metropolitan Police.  This involved the stalking of a young lady by a series of anonymous letters, over a six month period, which were of an intimidatory and frightening nature.  Hamish will outline the investigation he led and emphasise the psychological affect stalking can have on its victims.
He will go on to explain what stalking is, or can be, and give investigative tips on how to deal with victims of this unique and distressing crime.  From there Hamish will show methods previously used by stalkers that will encourage others to understand it is necessary to

Narcissistic abuse, versus targeted individuals who are frequently trauma survivors.

Few situations present a more clear picture of institutional sociopaths who are actually somewhere on the scale between narcissistic bullies and full blown psychopaths than that of OGS and targeted individuals. And certainly, the current psychology is just not up with the times, as we face the most intrusive, privacy raping, mind melding force that ever existed: the internet and the Panopticon it has created.
Related Reading: Mind Control Experiences on the Internet: implications for the psychiatric diagnoses of delusions

Trauma bonded survivors “can come to find that it can be almost impossible to relate to anyone, even family or old friends, except superficially. There is a biological craving for intensity that no normal relationship will satisfy. This provides a feeling of being totally alone, and totally empty”

Not only do TI’s fit the profile of intelligence agency assets that are easily exploited, but they also fit many criterion for victims of common bullying.
So, my  reader might find it interesting that in propaganda operations, the numbers DO indicate certain things to readers who understand the ‘coded’ nature of propaganda, and speech itself. Have a look here, at the use of the number 13 in propaganda, and then, here below for the use of the number 12. I recommend that the reader read the entire post in order to connect my thesis with military grade trauma creation through propaganda, but here below, I have simply focused on the authors number “three”

12 Classic Propaganda Techniques Narcissists Use to Manipulate You

3) The Big Lie:  Spinning a lie so outrageous that others are at a loss where to even begin to refute it.
Narcissists are convinced that whatever they say in the moment is 100 percent true just because they are saying it. Lying often comes naturally. They know that the bigger the lie, the more it may overwhelm others’ critical faculties.
Example:  A narcissist when confronted with a credit-card bill evidence of an extra-marital affair:  “I’ve never been to that hotel in my life. That hotel is notorious for making up fake check-in records and then blackmailing innocent people like me. There was a big article online about that a while back. You probably saw it. I might even have an email from the hotel trying to blackmail me in my inbox right now. I will fight this slander all the way to the Supreme Court. They will be sorry they ever made up this lie about me.”

 
And, many in the OGS dialectic complain of narcissistic abuse, which any researcher will readily find to be true based on the many online blogs about this topic; and others seem to relish their positions hidden away on the internet backbone, which gives the psychopath ideal cover to sadistically persecute those whom they target.
Then, in order to comprehend the psychological aspects of it, it is helpful to know with certainty that psychology is, for the most part, not a “hard science,” but is instead, a centuries long attempt at mind control, through labeling theory an especially, through Public Relations, hence the term “pop-psychology.” In other words, psychology is the literal outward manifestation of “the lie that repeats itself so often it becomes a truth,” despite it being a lie in the first place.
And, much like today’s current ideological basis for neverending war, we see that those who bomb others first are “hero’s” and those who suggest better alternatives are “loser’s and badguys.”
1575274396350
So lets filter the dialectic through these two “mental illnesses,” those of narcissism, meeting victims of OGS, through first examining how trite and inaccurate most diagnoses can be, and how the ‘diagnoses’ are little more than labels that indicate conformity or resistance to it, or that indicate ‘ideal personalities’ versus ‘personalities that cannot be easily realized, and then idealized by the observer.”
Look! Even YOU can spot a narcissist! (and based in current propaganda, an male th i no easily conformable to the biological clocks o 20-30 something fertile myrtles is likely to end up being discussed on some internet chat forum by one of these as one of those ‘bad men.’ How dare he find his own life/time/biological impulses more important than my own!)
How to spot a narcissist with just on question.
Now, let’s look at the profile of many TI’s that I personally have encountered, but also, which is evident from reading their blogs online: many TI’s are classic victims of trauma, and then, trauma bonding through narcissistic abuse, aka OGS.
Trauma Bonding: from abuseandrelationships.org
We see time and time again that those who are drawn/coerced/manipulated/blackmailed/pushed/other into the OGS dialectic online have indicated trauma-there are literally too many examples to point at, ranging from drug addicts swept into OGS by LEO’s, or people who have been black bag jobbed by any of the numerous security contractors that derive funding fro the DHS, to prostitutes who have been pushed by hidden forces into online discourse; to whistle blowers whose careers ended when they “did the RIGHT thing.”[the reader can use my search feature to find examples, or just Google it.]
Most sites on bullying document this trauma connection, but here is a bit about trauma bonding from the link directly above- and it cannot be missed that isolation is a factor:

Trauma Bonding

Bonding is a biological and emotional process that makes people more important to each other over time. Unlike love, trust, or attraction, bonding is not something that can be lost. It is cumulative and only gets greater, never smaller. Bonding grows with spending time together, living together, eating together, making love together, having children together, and being together during stress or difficulty. Bad times bond people as strongly as good times, perhaps more so.
Bonding is in part why it is harder to leave an abusive relationship the longer it continues. Bonding makes it hard to enforce boundaries, because it is much harder to keep away from people to whom we have bonded. In leaving a long relationship, it is not always useful to judge the correctness of the decision by how hard it is, because it will always be hard.
Moreover, experiencing together extreme situations and extreme feelings tends to bond people in a special way.. Trauma bonding, a term developed by Patrick Carnes, is the misuse of fear, excitement, sexual feelings, and sexual physiology to entangle another person. Many primary aggressors tend toward extreme behavior and risk taking, and trauma bonding is a factor in their relationships.
Strangely, growing up in an unsafe home makes later unsafe situations have more holding power. This has a biological basis beyond any cognitive learning. It is trauma in one’s history that makes for trauma bonding. Because trauma (and developmental trauma or early relational trauma is epidemic) cause numbing around many aspects of intimacy, traumatized people often respond positively to a dangerous person or situation because it makes them feel. It is neither rational nor irrational. If survivors can come to see that part of the attraction is, while very unwanted, a natural process, they may be able to understand those feelings and manage the situation more intentionally.
An excellent book on the effects of trauma (and repair) is The Body Keeps the Score: Brain, Mind, and Body in the Healing of Trauma by Bessel van der Kolk MD
Intense relationships also tend to hijack all of a survivor’s relating capacity. It is like a state of being burnt out. First, while it is very easy to become attached to a very chaotic and inconsistent person, it is simply not possible to form a consistent internal object representation (feeling memory) about them. When separated from the intense partner, the urge to make contact is usually intense because it is a stable feeling memory (or internal object) that makes separation from an important other person tolerable in any circumstance.
Second. the survivor can come to find that it can be almost impossible to relate to anyone, even family or old friends, except superficially. There is a biological craving for intensity that no normal relationship will satisfy. This provides a feeling of being totally alone, and totally empty.
 

Neo Nazi's and other alt-Right hate groups are using gang stalking tactics to DOX those who DOX'd them

I have documented how hidden groups with official cover ranging from Infragard members to the LEIU’s and those who work in NGO’s and under the umbrella of “community policing” to steal data, and build dossier’s on Americans. And I have documented that both the left and the right do it, albeit differently in some specific cases.
Micah Lee of the Intercept notes that “homelessness,” and rape threats as are a host of other complains that Targeted Individuals mention on their blogs, and that these are all features of DOX campaigns in garden variety internet and online stalking from police departments,Fusion Centers,and political NGOs that comes offline via policing and community organization harassment:

doxing efforts associated with prior online hate campaigns have forced targets to leave their homes in the face of death threats, rape threats, and other forms of harassment. And those attacks were mounted even before President Donald Trump came to power
….
so-called alt-right members collected private information from over 50 anti-fascist activists from the states of California, Florida, Illinois, Iowa, Maryland, Massachusetts, Minnesota, Missouri, Nebraska, North Carolina, South Dakota, Texas, Virginia, and Washington.
The information collected often included photographs, social media profiles, home address, phone numbers, email addresses, date of birth, driver license numbers, vehicle information, place of employment, and in one instance, a social security number

And I have written about how they are abusing databases around America and using the illegally obtained data to DOX people they don’t like or otherwise using those databases to gain compromising information and how they pass it around in hidden gossip and slander campaigns; and that “Anonymous” is a co-opted movement where these hidden operators are actually cops and other’s who are charged with protecting American’s are in fact compromising them instead
This is what police states DO at the beginning of the END of a democracy.

The photo above is President Barak O‘Bamas presidential convoy parked at Matts Bar in Minneapolis, one block away from my house after I had endured an entire year of bizzare gang stalking by so called Progressives, local NGOs, and Jewish groups sponsored by the DHS, who tracked my every movement via Fusion Centers, Stingrays, and computer hacking.
I mentioned briefly that I was privy to watching the neo-con left encroach on a major database that leaked the personal information of cops, and others, and that certain individuals in that case were specifically targeting “white males.”
The “hidden hand,”and reprehensible slanders of racist groups like the Anti Defamation League are everywhere in these cases, and police chiefs look the other way, lest they fall victim to political slanders.
I eventually pushed a situation where this “leakage” was revealed, and then, I watched as no one gave a shit, and the whistle blower was framed as a “racist,” and more, and then, slandered in the “official record” in exactly that language.
So it’s hard to care about others getting DOX’d now, especially those on the left who targeted those on the right when Obama was in power. And I might point out to the savvy reader (only long term readers will understand this reference) that under Obama, gang stalking of criminals became frame jobs, and slander campaigns, hacking and warrantless intrusion of political enemies and fence sitters, as a way to intimidate, enforce conformity or to encourage silence-that Obama was known to park his army of Secret Service in front of the houses of people that Democrats targeted, personally, based on what his political allies said.
So now, I watch as the pendulum begins to swing the other way, and kind of laugh, or mock those who laughed, or mocked me. And I especially nte that of those DOX’d, we have the academic opportunity to interview them and ask simple questions, like “Have you been directed into conversations of organized gang stalking?” Or “has your internet developed it’s own mind is constant redirection taking place?”
And my answer would be this: it is not likely that these things are being  done to those who are swept up in this round of harassment-because even though right wingers are brash, crass, abrasive and threatening- unlike the left, they have not yet directed the full toolkit of compromise and blackmail operations at the left. That, somehow, the right seems to maintain a boundary between who is and who isn’t a “foreign enemy,” nor does the right seem to work within the “umbrella” of NGO’s and UN sponsored database abuse.
From the Intercept’s security and technology wizard, and Micah Lee, a tale of gang stalking 101:

Chat logs obtained from message boards used by neo-Nazis and other far-right groups show a concerted effort to compile private information on leftist enemies and circulate the data to encourage harassment or violence.
The messages were obtained by an anonymous source, who infiltrated and gained the trust of white nationalists and other right-wingers, and has been leaking the material to Unicorn Riot, a “decentralized media collective” that emerged from leftist protest movements.
The chat logs originate from various web discussion communities hosted by the provider Discord and closed to the public. The communities, which have names like “Vibrant Diversity,” “Ethnoserver,” “Safe Space 3,” “4th Reich,” and “Charlottesville 2.0,” range from having 36 users to 1,269 users. The most active, with nearly a quarter million messages over seven months, is “Vibrant Diversity,” a neo-Nazi community forum that includes a channel called “#oven,” where users share racist memes. The 4th Reich server, the second most active, has 130,000 messages over the course of four months and includes a channel called “#rare_hitlers,” where users share propaganda posters and other glorified media from Nazi Germany. The “Charlottesville 2.0” server, which contains 35,000 messages, is where the “Unite the Right” hate rally in Charlottesville was organized.
This article is based solely on chat logs from a community called “Pony Power” (Unicorn Riot published the logs yesterday). The Pony Power server has 50 users, and the chat logs contain just over 1,000 messages, posted over the course of 10 days and ranging in topic from far-right politics to advice about digital and operational security to debates about the legal limits of online behavior. The primary activity on the Pony Power server is posting private information, like names, photos, home addresses, and phone numbers of dozens of anti-fascist activists.
Victims of the outings, also known as “doxing,” described reactions ranging from terror to anger to annoyance, and have variously turned to friends and family for support and locked down their accounts. They said the Pony Power doxing campaign is just the latest in a series of online efforts by neo-Nazis and their allies to marginalize their opponents. The information compiled on Pony Power hasn’t yet been distributed to the larger right-wing extremist community. However, doxing efforts associated with prior online hate campaigns have forced targets to leave their homes in the face of death threats, rape threats, and other forms of harassment. And those attacks were mounted even before President Donald Trump came to power on the back of racist attacks against his predecessor, Mexicans, and Muslims, and before he embraced white nationalists and encouraged violence against protesters at campaign rallies.
People chatting on the Pony Power server spoke openly, as though behind closed doors, often using offensive slurs. So be warned, some of the following conversations are hard to stomach….
….follow this link to read more!

 

The CIA hack and cell phone surveillance: gang stalking and cell phones

UPDATE 8-13-2020: the link to Spyera software below now goes to an absolutely riduculous page. I suspect that link to Spyera was a front for more spying.
And, the CIA/NSA contractor that is alleged to have dumped the CIAs zero day spy tools (the same types of tools that John Brennans CIA used to spy on US most hallowed institution, the US Congress) has been arrested, and tried, with the result that trial was declared a mistrial. But the agency and its lil’ helpers already had a backup plan: they (whoever “they” are in each case) stashed shitloads of child porn on the guys personal computer servers, which is standard practice in intelligence agencies like the FBI, CIA, Mossad, et al fear that they have a rogue agent who will blow the whistle about military black operations that utilize child porn.
UPDATE  10-04-2020: This post is incredibly popular the last couple days, though its best run.was in 2018, just as CIA contractor Joshua Schulte began to chip away at his political prosecution.
While some have criticised CIA contractor Joshua Schulte for having “weak OpSec (operations security ), in a world of smoke, mirrors, and mirrored cell phones and “electronic implants ” on peoples computers, perhaps no security is the best defense because Schultes own APPs, which are designed to remotely control any and all cell phones, and computers without the user even being aware if it,  provide him the criminal defense of total deniability, as this Obama era critic, and concealed -carry advocate “targeted individual and Libertarian” faces his second trial.
Look at these paragraphs below from Jason Koebler of Vice News (and Vice News itself a politically compromised organization, since its founder abandoned it due to intel agency pressure ) and note that every single claim of “weak security ” and other “evidence ” seeking to tie Schulte to various acts,and actions could easily been performed via a middle man attacker from Israeli, or any other anti-libertarian country.
In other words, any attacker, using Schultes own tools, could impersonate him online, AND make it appear as if he himself was doing it. Intel agency compromise operations,are exactly THAT strange, and brilliant.

  • Schulte’s website allows us to easily connect many of his online personas and accounts to his real identity, discern his politics, his places of residence, and identify his friends and family members. This all came from someone who should, in theory, know better as someone who had access to highly sensitive information.
  • In addition to Project Wizard, Schulte also uploaded screenshots of his Gmail inbox, which have his name as well as emails that show information about his bank, his OKCupid account, his cell phone provider, his friends’ and families’ names, and more.
  • There’s a selfie he took of himself holding a “FUCK OBAMA” pint glass, and a shirtless mirror selfie he took in a hotel bathroom. There’s a folder called “facebook_convos” that are just a series of screenshots of him beefing with his Facebook friends and family about politics. He uploaded a resume, group projects and homework from college, and design files for a 3D printed gun called “The Liberator.”
  • There are narrated video tours of the inside of his house, screenshots of emails he sent to activists advocating for concealed handgun carry permits in Texas, saved IRC chats of “Josh” saying the n-word over and over, and yet more screenshots of his Gmail inbox, which—in the same screenshot—prove that we are looking at “Joshua Schulte’s” inbox and also reveal the pseudonym he used on several different websites. Other files he uploaded tie this pseudonym to a Blogger where he wrote extensively about his libertarian politics. The pseudonym is also present in logged-in screenshots he took of an online quiz that tested his “Brain Performance Index” on a site called Lumosity; he also uploaded a screenshot of the score he got on a MENSA practice test.

In the meantime, there,are literally thousands of APPs that can and do monitor phones in real time.
Targeted individuals often claim that their cell phones are being used as tracking devices, and that intelligence agencies are using them for target practice and experimentation. Now, we know that part of that is true: A disgruntled CIA contractor is alleged to have dumped a list of all the tools that the CIA has been using to spy on us via our cell phones for the last decades. But don’t just point the finger at the CIA, because then, you WILL sound crazy, and Dr.’s Sheridan and James might get a whack at your mind, mind mind!

UPDATE: This post is becoming one of the most popular on this blog. While I experienced “cell phone mirroring” as early as 2010, and “offline computer situation rooms” as early as 2001, you may have just discovered this vast plot against constitutional liberty. Read on, and use my ‘search this blog’ section to find posts relevant to your own OGS.
Then, in a side note, be aware that the US agencies have long farmed out all of their intelligence collection to private contractors, Israeli’s and the Five Eyes Alliance, so any given abuse of your phone could be by : any of 17 US agencies, or any of Britains eight agencies, and many more, not counting the douchebags who work in private security firms, and even local police agencies-and ALL OF IT without a warrant, or even a paper trail.

And the fact is that ALL 17 intelligence agencies in the United States have turned on American citizens, using us for target practice of varying shades of “illegal and unconstitutional” so, they have lot’s of Company (there’s a joke in there, somewhere, about “the Corporation, lol). Your country is also doing these same things to you and your countrymen.

UPDATE: This is one of my most popular posts. So I thought I would add a link for software tat you can buy to do some of the same stuff to these agents and agencies that they are doing to you. Here’s Spyera mirroring and more for cell phones, but there are many others you can use, many freeware (but be careful-most freeware comes with the hidden cost that it was created by-you guessed it….)

You see, these days, electronic tools and toys, entrapments and entrainments of electronic surveillance and propaganda tactics that were once directed at millionaires and mobsters, third world dictators and Iran Contra’s and Osama bin Laden are now directed at ordinary common people who buy houses next to the fire chief, or who seek to trim the budget; or smoke a joint here and there, or who forgot to pay their vehicle tax. This is partially due to the fact  that all of the agencies are crawling with corruption, and blackmailing each other, in the Spirit of the LEIU’s, who, bar none, perform more black bag jobs around America than any CIA agent ever did.

Related Story: Watch this video to see how some of us knew in 2005-2008 that our phones were being used as tracking devices. And, that some would repeat our conversations back to us. Watch it from 4:27 minutes. Disruption campaigns that target activists and others take on purely diabolical and bizarre proportions within six degree’s of a persons relations. The newscatser notes that the FBI use cell phones to “keep tabs on critical conversations between known members of the mafia.”

(psssst: Don’t tell anyone, but this story here about how retired LEO’s work with current LEO’s and intel gencies to perform assasinations and black bag jobs is one of America’s best kept seekrits)
And many wonder how it is that they could write something online, and then, shortly thereafter, have a squad car pull up outside their house.
hazing 4.png
This is enabled by the highly integrated, un-constitutional mechanism of OGS and the tracking in real time of targeted communications of targeted individuals, and coordinated with massive database abuse and fraud on the courts at the local, national, and international level.
Any researcher of OGS can verify that at least, it is true, that indeed 17 intelligence agencies ARE following targets, and doing many other nefarious things as well. Here, below, from the Intercept, is the case of the CIA software that mirrors your cell phone, and uses it to perform MIM attacks on YOURSELF; and here is a full list of the tools that these agencies use to target journalists, whistle blowers, the neighborhood crank, wankers, dole dippers and a few potheads the same as if they are all terrorists, with download links from Wikileaks). But be careful….honeynets and limited hang outs go two ways.

A concerted effort by the CIA produced a library of software attacks to crack into Android smartphones and Apple iPhones, including some that could take full control of the devices, according to documents in a trove of files released by WikiLeaks Tuesday.
The attacks allow for varying levels of access — many powerful enough to allow the attacker to remotely take over the “kernel,” the heart of the operating system that controls the operation of the phone, or at least to have so-called “root” access, meaning extensive control over files and software processes on a device. These types of techniques would give access to information like geolocation, communications, contacts, and more. They would most likely be useful for targeted hacking, rather than mass surveillance. Indeed, one document describes a process by which a specific unit within the CIA “develops software exploits and implants for high priority target cellphones for intelligence collection.”
The WikiLeaks documents also include detailed charts concerning specific attacks the CIA can apparently perform on different types of cellphones and operating systems, including recent versions of iOS and Android — in addition to attacks the CIA has borrowed from other, public sources of malware. Some of the exploits, in addition to those purportedly developed by the CIA, were discovered and released by cybersecurity companies, hacker groups, and independent researchers, and purchased, downloaded, or otherwise acquired by the CIA, in some cases through other members of the intelligence community, including the FBI, NSA, and the NSA’s British counterpart GCHQ , the documents indicate.
One borrowed attack, Shamoon, is a notorious computer virus capable of stealing data and then completely destroying hardware. Persistence, a tool found by the CIA, allows the agency control over the device whenever it boots up again. Another acquired attack, SwampMonkey, allows CIA to get root privileges on undisclosed Android devices.
“This is a very impressive list,” tweeted former GCHQ analyst Matt Tait, noting that at least some of the attacks appeared to still be viable.
Matt Green, cryptographer at Johns Hopkins University, agreed the leak was “impressive,” but concluded there weren’t many “technically surprising” hacks. This lack of originality may have stemmed from a desire on the part of the agency to avoid detection, judging from one document contained in the trove, in which apparent CIA personnel discuss an NSA hacking toolkit known as Equation Group and its public exposure. It was also previously known that the CIA was targeting smartphones; drawing on top-secret documents, The Intercept in 2015 reported on an agency campaign to crack into the iPhone and other Apple products.
In addition to the CIA’s efforts, an FBI hacking division, the Remote Operations Unit, has also been working to discover exploits in iPhones, one of the WikiLeaks documents, the iOS hacking chart, indicates. Last February, while investigating the perpetrator of a mass shooting in San Bernardino, the FBI attempted argued in court that Apple was obligated to give the FBI access to its phones by producing a weakened version of the device’s operating system. If the WikiLeaks documents are authentic, it would appear FBI and other elements of the intelligence community are already deeply involved in discovering their own way into iPhones. The compromise of the documents also calls into question government assurances in the San Bernardino case that any exploit developed by Apple to allow the FBI access to the killer’s phone would never be exposed to criminals or nation states….

….follow the links-connect the dots!
Related Story: The Shadow Brokers Hack in context