How to gain legal standing to sue the NSA: "the Tor Exception" and Marcy Wheeler aka emptywheel tell you how.

SOoooO…shit.
The cows are coming home to roost, finally. And, they are taking huge craps on journalism AGAIN.
It really suX to be “that one guy” or gal in Marcy Wheeler’s case, who is “way the [email protected] ahead of ‘the game,’ because then, you get totally gang stalked for decades as the NSA/FBI/CIA/FiveEyes/Israel backdoor butt buddies cornhole all of your communications, and send hidden subverter’s of law and justice into your every relationships in what is called colloquially “organized gang stalking.”

UPDATE: Marcy Wheeler turned into an FBI informant, as soon as she became targeted by the deep state, and even wrote about it.

Or, as some have noted, “being accosted, assaulted, delayed, redirected, or robbed outright by the ‘Are You Jewish’ guys.”
All of these subversions are what the Association of Threat Assessment Professionals calls “the colliding parallel investigation, ”as they discuss in their crisis narrative formation, aka “advising law enforcement ” how to discuss this NSA-Israel spying on citizens, and the accompanying psychological operations waged covertly on yargeted persons across America who have no idea what hit them; and, that are causing mass homicides across America.
Fifth column indeed- and talk about burying the lede! Pierre Omidyar has shown his fur, and the Intercept has been invaded by the Sterns Gang!
Ask James Risen about that-he’d probably disagree, but at least organized stalking is coming out of the woodwork finally, and then, use my search feature to find posts about how Tor is subverted and “captured” and “entrapped” directly, and always, BY THE NSA, which technically, gives every single Tor user ‘legal standing’ to sue for section 702 spying on American’s abuses, because the Tor user can ‘prove’ that they are spied on PERSONALLY by the NSA Data Theft Pipeline Bandits.
Yup-privacy rape is a real thing, and emptywheel covers it like John Ashcroft on the statue of Lady Justice, but in a “good touch” way.

no plates USPS2
Are you there SOD-it’s me, the “Whisperette” [sounds of the Constitution gagged and bound like a kidnapping victime in the back of a postal van, then: “GrrgggHhh!” Then: radio crackle. “Did someone mention Tor??! Standing??”

stern-gang-irgun-betar-syria-civil-war-jihadists
Ruthie: That WHORE! Who said Tor!? Riva: Ruthie, I think he’s just kidding-he said “Your so pretty in that clever hat, which rhymes with vintage Sterns Gang Gat.”

Unlike all of those vagina hat wearing morons that have taken over the Democratic Party everywhere for the sake of weeping vahjayjay’s, Marcy Wheeler focuses on “civil liberties for EVERYONE” instead of those who have a mysterious sacred Isis Temple where they get together and talk about “safe spaces and the sense of belonging when being used like “a Liberty Torch,” and then, march about the worlld in an endless killing spree, to the tune of the bankster’s as hey light the Constitution on fire, and then look around and cry “But there’s nothing to put the fire out!” havng burned down the Barn.
I myself prefer the analogy of being a Maxi-Pad for freedom, because I feel less cramped, and more free,  but each to their own.
Here’s Marcy on the “Tor Exception,”which helps every single American to begin to wage a case where they can prove beyond any reasonable doubt that they have been personally targeted, and spied on:

Bacon bits and blowflies: linguistic analyses of news stories

I don’t know who has a longer memory: me, or the internet. But I do recall the days before fake news too the place of “journalism.” So-in the story below-note how the headline-which was once protected speech-is now “classified” as a “symbolic interaction” that is attacked all along it’s internet journey from the old LA Times(back when people still had paper news), to your computer screen there in front of you now.
Or: speech policing 101.

UPDATE 07-20-2020: The savvy reader can skip my “coded speech, ” and go directly to a post about the gang stalker, retired county coroner Joyce Kato, and her explosives-savvy former boyfriend Frank Tomota, mentioned below.
When I was gang stalked, I used every linguistic clue that these stalkers leave behind, including IP addresses, names, pseudonyms and more to prove my case. And, if one thing is CERTAIN, gang stalkers are sloppy fucks, leaving sloppy trails to follow online and off. The odd name “Frank Tomota ” appears in many online narratives, and especially in Minnesota, where I was gang stalked. A weirdo named Deb Matheny was part of that.

I mean-now, of course, we see the Utah Data Center loaded to the water-cooled core with NSA-tampered conversations-whole webs of relationships,and whole political elections manipulated at the switch-Hitlers IBM punch card-genocide dream come true-sure, “they” win, now-whoever “they” are this time around. I mean, my brain is only so magnificent. I’m no Aaron Hernandez brain-one of the most damaged brains of all time-but wow! “They” would love to crack it open-again.
Many who read ROGS are surely wondering “why is the ROGS thesis so damned different than any and every other writer who writes about organized gang staking?” And: how can ROGS remember all this stuff?Well- get out your ROGS bingo card cuz’ this ain’t my first time at the wheel.

Related: How to read ROGS for journalists, civil litigators, criminal defense lawyers, psychologists sociologists and others who have encountered gang stalking. Compare the basic claims in these “disappeared internet” cases with the case of former CBS investigative journalist Sharyl Attkisson, who is suing the DoJ for hacking her and planting documents on her computer.

And-certainly that lawyer in San Francisco helped me a bit, if only because his “lizard hunting” kept him from speaking up (Hi Tarek, and Ed “the meth slave,” the number 13, and the compromised and enslaved ALC! Here below is a blast from YOUR past).
And, of course, the answer is that the brains that were formed in the pre-internet era were not flooded with constant shots of dopamine, as we see now that the former Facebook CEO has admitted that their actual goal was to do just that-and to DO IT to kids.[link] Kids. On YOUR WATCH. Yup-literal mind control, at the corporate switcharoo.
Yet, still, no matter how many battalions of paid shills and trolls-no matter how many manufactured terrorist events-and no matter how hard they try to shut us (you) up, waging peace is the right thing to do-that peaceful, civil disobedience and protest via the spoken and written word is the only proper reaction to the rampant abuse and corruption that has overtaken our nation, and our national narrative. And sure- you can do whatever you want to my naked, Windows 10 system-and I will STILL eat you up in a proper legal forum, single wordedly.
And, too, because I have been studying the internet in a different way than most: I have studied it as a dialectical tool of social control, and propaganda dissemination targeting a doe-eyed public, going back into the 1990’s. You know-way before *we* knew that the net was a two way remote viewing session every time we log in, routed between ATT switched hubs and NSA interactions from Michigan/Ohio/Georgia Naval stations and so on.
Here-have a look back into my own Palantir-which, because I write for free, is really a Volintir (Hahaha that is play on the word volunteer. Remember when “they” said that TI’s have no sense of humor, lol) Lets first look at “novel legal theories” going back into 1996:

1996 Novel Theories of Criminal Defense Based Upon the Toxicity of the Social Environment: Urban Psychosis, Television Intoxication, and Black Rage Patricia J. Falk Cleveland State University, [email protected]

Then, let’s study a story about love and loss-and police humor, and one of the most difficult, sad, thankless and arduous jobs anyone could ever do: the county coroner’s investigator.
You will note that in those days-before the internet became an actual 24/7 wiretap, beyond any dispute or legal challenge to that thesis statement-that decent journalism based in ethical reportage existed with public policy narratives that weren’t merely politicized crisis PR by brainwashed Twitter bots and bobble heads.
And journalists like Robert Parry wrote good stuff, as did Gary Webb who wrote Dark Alliance, and wo has since been vindicated as a genuine joournalist who earned his Pullitzer(and, who died from a mystery suicide-with two bullets for it(!?)).
Then, in the story below, note some of the language features, and shop talk- some of the jargon in the story. And also, note, that not everything rhymes with “Tomato.” Or gang stalking clues, 101. Friends and family, and all of that. You’ll see.
Hahaha. That’s another gang stalking joke about a certain and actual gang, that works from within “hidden places.” But I will leave it to you, the daily OGS reader (you, there, in Denver maybe-the guy with the flag on his truck, who has never read the Constitution) to figure out what the joke is.
And while you are at it-could you run these license plates for me? Here: 4.68.72.82 and its leap node, 4.16.24.105.
Who are the peeple in your neighborhood, In your neighborhood….” Yeah- it IS nice to know who my neighbors are indeed. And I, like you, want to ensure they are not baby raping, baby bombing Nazi’s with flags on their trucks, but no knowledge of the Constitution that brought that flag into being-or exactly how it is under attack today (hint: speech prohibitions backed by organized gang stalking).
But in a Panoptical world-be careful that all of that peering (and Peer2Peering) into the abyss won’t byte you back; don’t think you are the only one “peering” in, cuz’ even the Oculus sheds a tear or two-and a name that is associated with the “deep state” (for now)”investigative privileged tool” of webterrogation. Then, there was that debacle back in 2012 where some tried to sell us on Limewire with a six way split screen. Nice try, bad guys!
So-try not to cry, big fellah’s and felates, I have protected first amendment speech FOR ALL OF US, and even you. So- what do you think Emile Durkheim would think of these wrods-and do you think there would “Whorfianism” would apply?
Well: Ain’t it cool what a fellah can do in the spirit of Thoreau and all those good guys? That a single person, unarmed, with words and cadavers? Hahaha. That’s a coroners joke from my own moldie oldie files (you’ll get the joke f you read the story below). Try not to eat head cheese over it though-you might get a case of “blow fly belly farts,” that leak slower than the DEA’s SOD:
Let’s keep this in mind as we read forwards-because none of us signed on for this:

WASHINGTON (Reuters) – A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Yeah-that tastes yuckie. so, eat this story below for now-it seems the trough is gone-and even the chicken shit under it too.

Death and Kindness
As a Coroner’s Investigator, Joyce Kato Finds That Caring For the Dead Is Caring For the Living
January 06, 1997|ANGIE CHUANG | TIMES STAFF WRITER
A 91-year-old San Gabriel man had slipped into his pool and drowned. He lay on a gurney in his yard, a county worker a few feet away waiting to wheel him to a van. Los Angeles County Coroner Investigator Joyce Kato gently unwrapped his face for his daughter.
“Daddy . . . I’m so sorry . . . I didn’t want you to go this way,” the daughter sobbed as she stroked his cheek.
During her two years on the job, Kato, 31, has learned how to examine heads blown open by bullets, trained herself not to flinch at the stench of bodies decomposed beyond recognition, and taken up a weightlifting regimen to better equip her petite 5-foot frame to lift corpses.
But confronting those left behind never gets any easier. Though she has learned to subdue her emotions in most cases, she has cried alongside grieving family members. You never forget that the most routine case is someone’s personal tragedy, she says.
As a coroner’s investigator, Kato is part detective, part grief counselor and part body pickup worker. Most of all, her job is about bringing closure when life ends.
She is one of 27 investigators who are called to the scene of a death to identify the body, collect its personal effects and make observations to help determine the cause of death. Sometimes, investigators notify the next of kin. They do not perform autopsies, which are the domain of pathologists.
Ask Kato why she does the job, and she will tell you that caring for the dead is caring for the living. When she examines the bloody, bullet-ridden body of a young gang member, she knows there are loved ones who cannot understand why. When she must resort to labeling a body as John Doe because it is so decomposed or burned, she knows there may be somebody who agonizes over the uncertainty.
“If you ask a really good coroner’s investigator, ‘Why do you do it?’ they’ll say ‘for the families.’ I feel the same way myself. I try my hardest for the families.”
The Los Angeles County Department of the Coroner, one of the busiest in the nation, handles 19,000 cases a year. The investigator’s role often falls into the public eye in high-profile homicide cases. But homicides make up less than 10% of the coroner caseload. Those who die unremarkably and in obscurity–unexplained natural deaths, accidents and suicides–constitute the majority of a investigator’s work.
Balancing professionalism with humanity can be as subtle as a certain inflection in her voice or as demonstrative as an embrace. “I’ve hugged people before,” Kato said. “You just know that’s what they want to do.”
Kato’s capacity for caring was apparent from the start, said Craig Harvey, chief of operations for coroner’s office. “She has the type of compassion to be sensitive when things are really raw for the family.”
But emotional sensitivity can lead to harrowing moments for investigators. Kato remembers a suicide, one of her first cases. The teenage son of an immigrant Vietnamese family had hung himself. She needed the older brother to translate the suicide note, written in Vietnamese, for her. The parents sat in the living room as the brother read the letter out loud in Vietnamese and then in English.
The parents began to weep, and then the brother broke down and could not finish. Kato says she couldn’t help crying.
Capt. Dean Gilmour of the coroner’s investigative division said every investigator has a tearful moment at some time or another, even if it is quietly alone at the end of a workday.
Still, Kato said, the experience with the suicide “has changed the way I handle myself out on the field. I try to be as professional and polite as possible without getting emotional. I let them know they can give me a call if they need something, and then I try to go.”
Suppressing emotions does take a toll, however. Since starting her job, Kato has gone from smoking a pack a week to a pack every two days–a habit she said is “a way of handling the stress.”
*
Another coping mechanism among coroners is a macabre sense of humor. A colorful vocabulary often accompanies shop talk in the office. A body found in a damp place is a “moldy oldie.” A decomposed body is a “stinker.” Toys of skeletons, vultures and rats decorate some of the investigators’ desks, though Kato chose more conventional family photos to hang above hers.
Kato said she understands why an outsider would be horrified by this irreverent humor, or upset by seeing coroners laughing among themselves at a death scene. “I hope the public understands it’s a necessary part of how we function,” she said. “Otherwise it would be too pathetic.”
It’s not always easy to come home and talk about her workday with friends and family. Although Kato’s boyfriend of 10 years, Frank Tomota, an automotive service advisor, is “very proud and very supportive” of what she does, he doesn’t like to hear the specifics, she said. He’s getting better, she added, but she doesn’t expect him to take a tour of the office any time soon.
Kato’s mom also is adjusting–slowly. “She keeps telling me to find a new job.”

The CIA hack and cell phone surveillance: gang stalking and cell phones

UPDATE 8-13-2020: the link to Spyera software below now goes to an absolutely riduculous page. I suspect that link to Spyera was a front for more spying.
And, the CIA/NSA contractor that is alleged to have dumped the CIAs zero day spy tools (the same types of tools that John Brennans CIA used to spy on US most hallowed institution, the US Congress) has been arrested, and tried, with the result that trial was declared a mistrial. But the agency and its lil’ helpers already had a backup plan: they (whoever “they” are in each case) stashed shitloads of child porn on the guys personal computer servers, which is standard practice in intelligence agencies like the FBI, CIA, Mossad, et al fear that they have a rogue agent who will blow the whistle about military black operations that utilize child porn.
UPDATE  10-04-2020: This post is incredibly popular the last couple days, though its best run.was in 2018, just as CIA contractor Joshua Schulte began to chip away at his political prosecution.
While some have criticised CIA contractor Joshua Schulte for having “weak OpSec (operations security ), in a world of smoke, mirrors, and mirrored cell phones and “electronic implants ” on peoples computers, perhaps no security is the best defense because Schultes own APPs, which are designed to remotely control any and all cell phones, and computers without the user even being aware if it,  provide him the criminal defense of total deniability, as this Obama era critic, and concealed -carry advocate “targeted individual and Libertarian” faces his second trial.
Look at these paragraphs below from Jason Koebler of Vice News (and Vice News itself a politically compromised organization, since its founder abandoned it due to intel agency pressure ) and note that every single claim of “weak security ” and other “evidence ” seeking to tie Schulte to various acts,and actions could easily been performed via a middle man attacker from Israeli, or any other anti-libertarian country.
In other words, any attacker, using Schultes own tools, could impersonate him online, AND make it appear as if he himself was doing it. Intel agency compromise operations,are exactly THAT strange, and brilliant.

  • Schulte’s website allows us to easily connect many of his online personas and accounts to his real identity, discern his politics, his places of residence, and identify his friends and family members. This all came from someone who should, in theory, know better as someone who had access to highly sensitive information.
  • In addition to Project Wizard, Schulte also uploaded screenshots of his Gmail inbox, which have his name as well as emails that show information about his bank, his OKCupid account, his cell phone provider, his friends’ and families’ names, and more.
  • There’s a selfie he took of himself holding a “FUCK OBAMA” pint glass, and a shirtless mirror selfie he took in a hotel bathroom. There’s a folder called “facebook_convos” that are just a series of screenshots of him beefing with his Facebook friends and family about politics. He uploaded a resume, group projects and homework from college, and design files for a 3D printed gun called “The Liberator.”
  • There are narrated video tours of the inside of his house, screenshots of emails he sent to activists advocating for concealed handgun carry permits in Texas, saved IRC chats of “Josh” saying the n-word over and over, and yet more screenshots of his Gmail inbox, which—in the same screenshot—prove that we are looking at “Joshua Schulte’s” inbox and also reveal the pseudonym he used on several different websites. Other files he uploaded tie this pseudonym to a Blogger where he wrote extensively about his libertarian politics. The pseudonym is also present in logged-in screenshots he took of an online quiz that tested his “Brain Performance Index” on a site called Lumosity; he also uploaded a screenshot of the score he got on a MENSA practice test.

In the meantime, there,are literally thousands of APPs that can and do monitor phones in real time.
Targeted individuals often claim that their cell phones are being used as tracking devices, and that intelligence agencies are using them for target practice and experimentation. Now, we know that part of that is true: A disgruntled CIA contractor is alleged to have dumped a list of all the tools that the CIA has been using to spy on us via our cell phones for the last decades. But don’t just point the finger at the CIA, because then, you WILL sound crazy, and Dr.’s Sheridan and James might get a whack at your mind, mind mind!

UPDATE: This post is becoming one of the most popular on this blog. While I experienced “cell phone mirroring” as early as 2010, and “offline computer situation rooms” as early as 2001, you may have just discovered this vast plot against constitutional liberty. Read on, and use my ‘search this blog’ section to find posts relevant to your own OGS.
Then, in a side note, be aware that the US agencies have long farmed out all of their intelligence collection to private contractors, Israeli’s and the Five Eyes Alliance, so any given abuse of your phone could be by : any of 17 US agencies, or any of Britains eight agencies, and many more, not counting the douchebags who work in private security firms, and even local police agencies-and ALL OF IT without a warrant, or even a paper trail.

And the fact is that ALL 17 intelligence agencies in the United States have turned on American citizens, using us for target practice of varying shades of “illegal and unconstitutional” so, they have lot’s of Company (there’s a joke in there, somewhere, about “the Corporation, lol). Your country is also doing these same things to you and your countrymen.

UPDATE: This is one of my most popular posts. So I thought I would add a link for software tat you can buy to do some of the same stuff to these agents and agencies that they are doing to you. Here’s Spyera mirroring and more for cell phones, but there are many others you can use, many freeware (but be careful-most freeware comes with the hidden cost that it was created by-you guessed it….)

You see, these days, electronic tools and toys, entrapments and entrainments of electronic surveillance and propaganda tactics that were once directed at millionaires and mobsters, third world dictators and Iran Contra’s and Osama bin Laden are now directed at ordinary common people who buy houses next to the fire chief, or who seek to trim the budget; or smoke a joint here and there, or who forgot to pay their vehicle tax. This is partially due to the fact  that all of the agencies are crawling with corruption, and blackmailing each other, in the Spirit of the LEIU’s, who, bar none, perform more black bag jobs around America than any CIA agent ever did.

Related Story: Watch this video to see how some of us knew in 2005-2008 that our phones were being used as tracking devices. And, that some would repeat our conversations back to us. Watch it from 4:27 minutes. Disruption campaigns that target activists and others take on purely diabolical and bizarre proportions within six degree’s of a persons relations. The newscatser notes that the FBI use cell phones to “keep tabs on critical conversations between known members of the mafia.”

(psssst: Don’t tell anyone, but this story here about how retired LEO’s work with current LEO’s and intel gencies to perform assasinations and black bag jobs is one of America’s best kept seekrits)
And many wonder how it is that they could write something online, and then, shortly thereafter, have a squad car pull up outside their house.
hazing 4.png
This is enabled by the highly integrated, un-constitutional mechanism of OGS and the tracking in real time of targeted communications of targeted individuals, and coordinated with massive database abuse and fraud on the courts at the local, national, and international level.
Any researcher of OGS can verify that at least, it is true, that indeed 17 intelligence agencies ARE following targets, and doing many other nefarious things as well. Here, below, from the Intercept, is the case of the CIA software that mirrors your cell phone, and uses it to perform MIM attacks on YOURSELF; and here is a full list of the tools that these agencies use to target journalists, whistle blowers, the neighborhood crank, wankers, dole dippers and a few potheads the same as if they are all terrorists, with download links from Wikileaks). But be careful….honeynets and limited hang outs go two ways.

A concerted effort by the CIA produced a library of software attacks to crack into Android smartphones and Apple iPhones, including some that could take full control of the devices, according to documents in a trove of files released by WikiLeaks Tuesday.
The attacks allow for varying levels of access — many powerful enough to allow the attacker to remotely take over the “kernel,” the heart of the operating system that controls the operation of the phone, or at least to have so-called “root” access, meaning extensive control over files and software processes on a device. These types of techniques would give access to information like geolocation, communications, contacts, and more. They would most likely be useful for targeted hacking, rather than mass surveillance. Indeed, one document describes a process by which a specific unit within the CIA “develops software exploits and implants for high priority target cellphones for intelligence collection.”
The WikiLeaks documents also include detailed charts concerning specific attacks the CIA can apparently perform on different types of cellphones and operating systems, including recent versions of iOS and Android — in addition to attacks the CIA has borrowed from other, public sources of malware. Some of the exploits, in addition to those purportedly developed by the CIA, were discovered and released by cybersecurity companies, hacker groups, and independent researchers, and purchased, downloaded, or otherwise acquired by the CIA, in some cases through other members of the intelligence community, including the FBI, NSA, and the NSA’s British counterpart GCHQ , the documents indicate.
One borrowed attack, Shamoon, is a notorious computer virus capable of stealing data and then completely destroying hardware. Persistence, a tool found by the CIA, allows the agency control over the device whenever it boots up again. Another acquired attack, SwampMonkey, allows CIA to get root privileges on undisclosed Android devices.
“This is a very impressive list,” tweeted former GCHQ analyst Matt Tait, noting that at least some of the attacks appeared to still be viable.
Matt Green, cryptographer at Johns Hopkins University, agreed the leak was “impressive,” but concluded there weren’t many “technically surprising” hacks. This lack of originality may have stemmed from a desire on the part of the agency to avoid detection, judging from one document contained in the trove, in which apparent CIA personnel discuss an NSA hacking toolkit known as Equation Group and its public exposure. It was also previously known that the CIA was targeting smartphones; drawing on top-secret documents, The Intercept in 2015 reported on an agency campaign to crack into the iPhone and other Apple products.
In addition to the CIA’s efforts, an FBI hacking division, the Remote Operations Unit, has also been working to discover exploits in iPhones, one of the WikiLeaks documents, the iOS hacking chart, indicates. Last February, while investigating the perpetrator of a mass shooting in San Bernardino, the FBI attempted argued in court that Apple was obligated to give the FBI access to its phones by producing a weakened version of the device’s operating system. If the WikiLeaks documents are authentic, it would appear FBI and other elements of the intelligence community are already deeply involved in discovering their own way into iPhones. The compromise of the documents also calls into question government assurances in the San Bernardino case that any exploit developed by Apple to allow the FBI access to the killer’s phone would never be exposed to criminals or nation states….

….follow the links-connect the dots!
Related Story: The Shadow Brokers Hack in context