Forensic photography and actual gangs: the difference between gang stalkers and actual gang members

UPDATE: Since I chronicled the story below, the web has been scrubbed of the story mentioned herein, shortly thereafter.
That story was about how Canadian intelligence agencies selectively utilize internet and MSM, to create cross-talk (feedback loops ) to speak with mainland Chinese police investigators, while pursuing a suspect, and a gang of suspects.

There is no difference between actual gang stalkers and actual gang members. Zero- Cero. Zip. Zilch. Nada-except for the federal/state paycheck. And the “high policing” basis of criminal morality, of course.
Oh-that, and the fact that official corruption is better financed, far more brutal, operates with total impunity, and it’s illegality and mercenary scope far better hidden from the courts (as we see with the Section 702 and the FISA charade/masquerade ball), because it is easy to pick easy targets and then, drag them before a judge, and say “look! We got a badguy!” because this serves the social purpose of “security theater,” or, what has been referred to in the gang stalking dialectic as “street theater,” finalized by the three well known and often repeated phrases: gang stalking “ends in institutionalization, incarceration, or suicide.”

Related Google Fun: “Bush phone and gang stalking” returns  514,000 results “Obama phone and gang stalking” returns 641,000 results. “Trump phone and gang stalking” returns  750,000 results. Is organized gang stalking just a phenomenon, or is it the emergence of a social contagion? Emergent norm theory predicts that gang stalking is becoming a new normal-and that’s not good for democracy.

The Alcoholics Anonymous  variant is ” incarceration, institutionalization, or death,” and in the online dialogues of gang stalking, we can also find links between it and M. Scott Peck, a Catholic psychologist,and a debunked ponerologist. So, these strange and limited outcomes  of organized gang stalking ALSO and  without irony, derive from the Cult of Bill W., and AA’s across America.In a tenuous way, this links OGS directly to the FBI, and the curious rise of gang stalking complaints.
It cannot be missed that this is a direct dialectical link to specifically James Comey’s FBI, which ran from 2005 until his firing in 2017 because he had turned the agency into a political police that J.Edgar would only drem of, because they didnt have internet drag queen porn durng Hoover’s reign, which would have kept him very busy-possibly TOO BUSY to wage war on American’s.
And, this AA phrase is also linked directly to Mr. Comey’s chosen buddha, Reinhold Niehbur, who is said to have written the serenity prayer(although a few spurious crickets  in the head of Bill W.’s Protestant/Catholic universe dispute the origins-remember; ALL WORDS and SYMBOLS ARE SECTARIAN, and  POLITICAL in “WESTERN” JEWISH-cHRISTIANITY)
Sure- real gangs sometimes use cell phones and computers to stalk, harass, and harm people. But keep in mind that all of THOSE phones are monitored by any of 17 agencies here in the US and hundreds of others in the FiveEyes scheme AS CRIME HAPPENS. Then, the “goodguys” sweep in and grab all the cash from the “badguys”, after pre-emptivey pre-targeting real estate after pre-assessing and pre-apraising and predictively pre-empting crimes that could/might/would/will happen in or on or around a house, aka “real estate;”and that just after they have manipulated a rental property via a Fusion Center, or manipulated a landlord from long distance-Virginia to Minnesota for instance-and filled the property with drug dealers and sex offenders (Google “real estate” and “gang stalking,” or “John Lang Fresno” and “sex offender”).
Tell ya what: if John Forbes Nash didn’t sound nuts BEFORE he met those guys, he sure did AFTER he met those guys. I mean- no gang has anything on this new federal-state-local scheme. The goodguys lost and this is all that’s left of the shredded democracy we all once trusted to rely upon due process. It’s enough to make you wear shoes on your head.
Or:

chinese gangster 20 Photos from a Chinese gangsters lost cell phone (21 Photos)
This is a photograph of a Chinese gangster, in unfortunate circumstances. I ask you, the reader: why does he have a shoe on his head? Google “Chinese” and “sadness” or “mourning” and “shoe’s on head” But WHAT ABOUT THE WATER BOTTLE?

Moving on now: some have at times confused the terminology and blurred the line between “organized criminal gangs” and “organized gang stalkers,” which would be a false binary. As we see time and time again, the Hegelian dialectic has demanded that we choose an “us versus them” paradigm. It also makes us look stupid, corrupt, short sighted, and weak.
As I have noted, I am biologically and psychologically unable to think that way, whereas some 98% of American’s and others from cricket headed cultures think that way by default. I admit: it’s a personal flaw. A fault of my birth, also in unfortunate circumstances in a Catholic-Jewish cultureruled from hidden mechanisms and hidden activity from a sky god who sits “in the cloud.”

Related Stories: What is the FBI’s “bizarre” method of off-the-books harassment aka COINTELPRO 2.0? It’s called a “disruption” campaign. And according to byline.com, these are “How the U.S. Federal Bureau of Investigation is violating the liberty and privacy interests of Americans by using extra-judicial investigations designed to never lead to a formal criminal charge.”

But the problem with that type of thinking is that once “we” adopt it (whoever “we” are on that day/that election/that locality), “we” become gangs ourselves, and thus, there can be no actual morality, and no actual higher purpose. And for me at least, the war on terror has actually been a war on ideas, and the people who have them, because the predatory structure of highly institutionalized and RITUALIZED  illegality (the inter-connected tribal-religious-sectarian FISA/Section 702/Fusion Center/FBI-DHS-CIA ‘backdoor searches’/ political spying/ targeted police brutality/etc) affects some of us, provably more than others of us.
Here- look where their war on my ideas began. I was just a lil’ ol’ amateur journalist then. Imagine where the narrative would be if I hadn’t become a target of their hidden and brutal and constant attacks on my ability to write? I mean-this happened less than three years ago. Whoever the apophonetic “they” are of course, “on that day” in this bizarre inter-connected web of hidden and constant atrocities against liberty.
So as you might guess, I am the crazy guy on the internet, walking around in cyberspace with a pair of shoes on my head, and nothing but pocket litter in my worn out overhauls. And even that, “they” pick through it like a gold strike.
And, as I have documented repeatedly, in many ways, with the best saved for that one important day in the light, because it will take more than me to gain standing to sue this monstrosity of the Panopticon in a court room. And, there is much more than meets the blog- the rabbit hole goes much deeper than your eyes, there, reading this post. And that is what is colloquially called a “Constitutional crisis,” and a well considered challenge to its basis.
Wheeeeeew. I am glad others are on the case now. I’m very tired! I can’t keep the shoes on my head much longer. AND: my green hat falls off when I hang my head, remembering those oddly timed car accidents. But these, too, will have their day in court, again-because, it is in fact, all related.
And look! The ACLU, and the EFF, and the NACDL now has a manual for civil and criminal litigators to challenge government hacking! And generally, it is becoming more widely known that gang stalking” is actually “counter-surveillance stalking” by the “goodguys,” against “everyone else who ruffles their flying pig feathers. Now, if we can just get them onboard with these many entrapment and containment schemes that all agencies are practicing.
That will be THE game changer-when “we” get wider publicity for the fact that kids like the mass shooter in New Mexico are created from the information “sharing” GCHQ/FBI/CVE fraud that targets our son’s online gaming habits on pure speech grounds-or no grounds other than that they are easy targets, alone in “their mothers basements”; and then “privacy rapes” them, while stirring up gender wars via “Gamergate.” How Catholic/Jewish/Protestant is THAT?
Here- have a look at a Chinese gangsters cell phone from 2012, and see how many forensic clues YOU can pick out from his culture/location/situation/status/power.
How big IS this little guy? One western/American/British linguistic feature is to use diminutives like “little” when speaking about Asian men and women, whereas many Asian cultures and specifically Chinese culture uses the diminutive the opposite way- to state that a person has great status and great power)?
chinese gangster 6 Photos from a Chinese gangsters lost cell phone (21 Photos)
 
 

The CIA hack and cell phone surveillance: gang stalking and cell phones

UPDATE 8-13-2020: the link to Spyera software below now goes to an absolutely riduculous page. I suspect that link to Spyera was a front for more spying.
And, the CIA/NSA contractor that is alleged to have dumped the CIAs zero day spy tools (the same types of tools that John Brennans CIA used to spy on US most hallowed institution, the US Congress) has been arrested, and tried, with the result that trial was declared a mistrial. But the agency and its lil’ helpers already had a backup plan: they (whoever “they” are in each case) stashed shitloads of child porn on the guys personal computer servers, which is standard practice in intelligence agencies like the FBI, CIA, Mossad, et al fear that they have a rogue agent who will blow the whistle about military black operations that utilize child porn.
UPDATE  10-04-2020: This post is incredibly popular the last couple days, though its best run.was in 2018, just as CIA contractor Joshua Schulte began to chip away at his political prosecution.
While some have criticised CIA contractor Joshua Schulte for having “weak OpSec (operations security ), in a world of smoke, mirrors, and mirrored cell phones and “electronic implants ” on peoples computers, perhaps no security is the best defense because Schultes own APPs, which are designed to remotely control any and all cell phones, and computers without the user even being aware if it,  provide him the criminal defense of total deniability, as this Obama era critic, and concealed -carry advocate “targeted individual and Libertarian” faces his second trial.
Look at these paragraphs below from Jason Koebler of Vice News (and Vice News itself a politically compromised organization, since its founder abandoned it due to intel agency pressure ) and note that every single claim of “weak security ” and other “evidence ” seeking to tie Schulte to various acts,and actions could easily been performed via a middle man attacker from Israeli, or any other anti-libertarian country.
In other words, any attacker, using Schultes own tools, could impersonate him online, AND make it appear as if he himself was doing it. Intel agency compromise operations,are exactly THAT strange, and brilliant.

  • Schulte’s website allows us to easily connect many of his online personas and accounts to his real identity, discern his politics, his places of residence, and identify his friends and family members. This all came from someone who should, in theory, know better as someone who had access to highly sensitive information.
  • In addition to Project Wizard, Schulte also uploaded screenshots of his Gmail inbox, which have his name as well as emails that show information about his bank, his OKCupid account, his cell phone provider, his friends’ and families’ names, and more.
  • There’s a selfie he took of himself holding a “FUCK OBAMA” pint glass, and a shirtless mirror selfie he took in a hotel bathroom. There’s a folder called “facebook_convos” that are just a series of screenshots of him beefing with his Facebook friends and family about politics. He uploaded a resume, group projects and homework from college, and design files for a 3D printed gun called “The Liberator.”
  • There are narrated video tours of the inside of his house, screenshots of emails he sent to activists advocating for concealed handgun carry permits in Texas, saved IRC chats of “Josh” saying the n-word over and over, and yet more screenshots of his Gmail inbox, which—in the same screenshot—prove that we are looking at “Joshua Schulte’s” inbox and also reveal the pseudonym he used on several different websites. Other files he uploaded tie this pseudonym to a Blogger where he wrote extensively about his libertarian politics. The pseudonym is also present in logged-in screenshots he took of an online quiz that tested his “Brain Performance Index” on a site called Lumosity; he also uploaded a screenshot of the score he got on a MENSA practice test.

In the meantime, there,are literally thousands of APPs that can and do monitor phones in real time.
Targeted individuals often claim that their cell phones are being used as tracking devices, and that intelligence agencies are using them for target practice and experimentation. Now, we know that part of that is true: A disgruntled CIA contractor is alleged to have dumped a list of all the tools that the CIA has been using to spy on us via our cell phones for the last decades. But don’t just point the finger at the CIA, because then, you WILL sound crazy, and Dr.’s Sheridan and James might get a whack at your mind, mind mind!

UPDATE: This post is becoming one of the most popular on this blog. While I experienced “cell phone mirroring” as early as 2010, and “offline computer situation rooms” as early as 2001, you may have just discovered this vast plot against constitutional liberty. Read on, and use my ‘search this blog’ section to find posts relevant to your own OGS.
Then, in a side note, be aware that the US agencies have long farmed out all of their intelligence collection to private contractors, Israeli’s and the Five Eyes Alliance, so any given abuse of your phone could be by : any of 17 US agencies, or any of Britains eight agencies, and many more, not counting the douchebags who work in private security firms, and even local police agencies-and ALL OF IT without a warrant, or even a paper trail.

And the fact is that ALL 17 intelligence agencies in the United States have turned on American citizens, using us for target practice of varying shades of “illegal and unconstitutional” so, they have lot’s of Company (there’s a joke in there, somewhere, about “the Corporation, lol). Your country is also doing these same things to you and your countrymen.

UPDATE: This is one of my most popular posts. So I thought I would add a link for software tat you can buy to do some of the same stuff to these agents and agencies that they are doing to you. Here’s Spyera mirroring and more for cell phones, but there are many others you can use, many freeware (but be careful-most freeware comes with the hidden cost that it was created by-you guessed it….)

You see, these days, electronic tools and toys, entrapments and entrainments of electronic surveillance and propaganda tactics that were once directed at millionaires and mobsters, third world dictators and Iran Contra’s and Osama bin Laden are now directed at ordinary common people who buy houses next to the fire chief, or who seek to trim the budget; or smoke a joint here and there, or who forgot to pay their vehicle tax. This is partially due to the fact  that all of the agencies are crawling with corruption, and blackmailing each other, in the Spirit of the LEIU’s, who, bar none, perform more black bag jobs around America than any CIA agent ever did.

Related Story: Watch this video to see how some of us knew in 2005-2008 that our phones were being used as tracking devices. And, that some would repeat our conversations back to us. Watch it from 4:27 minutes. Disruption campaigns that target activists and others take on purely diabolical and bizarre proportions within six degree’s of a persons relations. The newscatser notes that the FBI use cell phones to “keep tabs on critical conversations between known members of the mafia.”

(psssst: Don’t tell anyone, but this story here about how retired LEO’s work with current LEO’s and intel gencies to perform assasinations and black bag jobs is one of America’s best kept seekrits)
And many wonder how it is that they could write something online, and then, shortly thereafter, have a squad car pull up outside their house.
hazing 4.png
This is enabled by the highly integrated, un-constitutional mechanism of OGS and the tracking in real time of targeted communications of targeted individuals, and coordinated with massive database abuse and fraud on the courts at the local, national, and international level.
Any researcher of OGS can verify that at least, it is true, that indeed 17 intelligence agencies ARE following targets, and doing many other nefarious things as well. Here, below, from the Intercept, is the case of the CIA software that mirrors your cell phone, and uses it to perform MIM attacks on YOURSELF; and here is a full list of the tools that these agencies use to target journalists, whistle blowers, the neighborhood crank, wankers, dole dippers and a few potheads the same as if they are all terrorists, with download links from Wikileaks). But be careful….honeynets and limited hang outs go two ways.

A concerted effort by the CIA produced a library of software attacks to crack into Android smartphones and Apple iPhones, including some that could take full control of the devices, according to documents in a trove of files released by WikiLeaks Tuesday.
The attacks allow for varying levels of access — many powerful enough to allow the attacker to remotely take over the “kernel,” the heart of the operating system that controls the operation of the phone, or at least to have so-called “root” access, meaning extensive control over files and software processes on a device. These types of techniques would give access to information like geolocation, communications, contacts, and more. They would most likely be useful for targeted hacking, rather than mass surveillance. Indeed, one document describes a process by which a specific unit within the CIA “develops software exploits and implants for high priority target cellphones for intelligence collection.”
The WikiLeaks documents also include detailed charts concerning specific attacks the CIA can apparently perform on different types of cellphones and operating systems, including recent versions of iOS and Android — in addition to attacks the CIA has borrowed from other, public sources of malware. Some of the exploits, in addition to those purportedly developed by the CIA, were discovered and released by cybersecurity companies, hacker groups, and independent researchers, and purchased, downloaded, or otherwise acquired by the CIA, in some cases through other members of the intelligence community, including the FBI, NSA, and the NSA’s British counterpart GCHQ , the documents indicate.
One borrowed attack, Shamoon, is a notorious computer virus capable of stealing data and then completely destroying hardware. Persistence, a tool found by the CIA, allows the agency control over the device whenever it boots up again. Another acquired attack, SwampMonkey, allows CIA to get root privileges on undisclosed Android devices.
“This is a very impressive list,” tweeted former GCHQ analyst Matt Tait, noting that at least some of the attacks appeared to still be viable.
Matt Green, cryptographer at Johns Hopkins University, agreed the leak was “impressive,” but concluded there weren’t many “technically surprising” hacks. This lack of originality may have stemmed from a desire on the part of the agency to avoid detection, judging from one document contained in the trove, in which apparent CIA personnel discuss an NSA hacking toolkit known as Equation Group and its public exposure. It was also previously known that the CIA was targeting smartphones; drawing on top-secret documents, The Intercept in 2015 reported on an agency campaign to crack into the iPhone and other Apple products.
In addition to the CIA’s efforts, an FBI hacking division, the Remote Operations Unit, has also been working to discover exploits in iPhones, one of the WikiLeaks documents, the iOS hacking chart, indicates. Last February, while investigating the perpetrator of a mass shooting in San Bernardino, the FBI attempted argued in court that Apple was obligated to give the FBI access to its phones by producing a weakened version of the device’s operating system. If the WikiLeaks documents are authentic, it would appear FBI and other elements of the intelligence community are already deeply involved in discovering their own way into iPhones. The compromise of the documents also calls into question government assurances in the San Bernardino case that any exploit developed by Apple to allow the FBI access to the killer’s phone would never be exposed to criminals or nation states….

….follow the links-connect the dots!
Related Story: The Shadow Brokers Hack in context