“Targeted” individual journalism wins the Taylor Award: who wants to apply for the Gary Webb Award for Excellence in gang stalking journalism?

The series “Targeted,” by the Tampa Bay Times chronicled the targeted individual program run by Chris Nocco, a corrupt county sheriff.

Pasco County parents and teachers are calling for changes to a secretive Sheriff’s Office program that uses student data to profile schoolchildren as potential future criminals, with some demanding the practice be stopped

Then, it began winning awards for fairness, and truth in journalism.

From Harvard University`s Nieman Foundation, a story of “the best of gang stalking journalism:”

Cambridge, Mass. – “Targeted,” an in-depth investigation by the Tampa Bay Times into a police program that for years monitored, intimidated and harassed families in Pasco County Florida, is winner of the 2020 Taylor Family Award for Fairness in Journalism.

The reporting by Kathleen McGrory and Neil Bedi revealed that ten years ago, the Sheriff’s Office in Pasco County, Florida, created a secretive data-driven system ostensibly designed to proactively combat crime. The algorithm instead was used to try to predict which residents might break the law. During the last five years, the sheriff’s department used that information to target nearly 1,000 people and assigned deputies to repeatedly show up at their homes, often without probable cause, a warrant or evidence of a crime.

The Gary Webb Award for Excellence in Gang Stalking Journalism is still open for submissions, if any enterprising journalist is interested.

Long Island, NY gang stalking case study: white couple arrested for years long stalking of their neighbor &Who wants to bet cops or firefighters are involved?

One of the problems that existed in the online community of gang stalking before ROGS began writing was the usual problem of biases, and particularly confirmation bias in observers who are actual victims of gang stalking.

But heres another ROGS Bingo which is confirmed by ROGS Analysis:CAMPAIGN OF HARASSMENT ‘Racist’ white couple spent years ‘tormenting black neighbor by leaving dog poop and dead animals in their yard’

John McEneaney, 57, and his partner Mindy Canarick, 53, of Valley Stream, New York, have been charged after allegedly tormenting Jennifer McLeggan, 39.

VP-COMP-GUNMAN Image Credit Instagram /Sun.co.uk

So, sure, biases get in the way, and ROGS -A has eliminated that by separating the “gang stalking denialists ” from their victims, aka targeted individuals, and isolating crackpots who yammer on about total crap like electronic brain zappers, and biblical, mind reading locusts, while others have their heads crammed up the ideologies of various assholes, ranging from white privileged, white female narratives in the case of psychobabbling fruitcake Dr. Tomo Shibata; or in cases where any of the many military trained disinformation and misinformation specialists proliferate, such as,the USAF OSI, or actual milutary and intel agency spies, like this one here.

RELATED CONCEPTS:  The dialectic of gang stalking is full of strange words and phrases, most of which trace to specialized military and police or intelligence  sources. ROGS calls this “gang stalking para -language ” because up until I began to write, only Dr. Robert Guffey had described the paucity of evidence of “what the gang stalkers call themselves, ” mych less,what language and terms they ude amongst themselves.So,

 here is a milutary related and actual use of electronics, and “bomb sniffing locusts.”

Then:    Confirmation Bias is the tendency to look for information that supports, rather than rejects, one’s preconceptions, typically by interpreting evidence to confirm existing beliefs while rejecting or ignoring any conflicting data (Source: Britannica online encyclopedia )


So, ROGS solved that biases problem by developing ROGS Analysis. You can search my blog for those posts, using search term ROGS Analysis, or read this, my “conclusion” post where I discuss a twelve year period wherein ROGS-A was refined as a scientific method based predictive tool with which to assess these cases.

And, using the scientific method, I discovered that nearly all gang stalking is police, firefighters, city workers, and their related tenracles in the community, such as various political NGOs, Infragard agents, local block clubs full of ex -military and retired police, and government workers, working with active police, and city /state /federal officials, and stalking individuals for years, as we saw with the murder of Ahmaud Arbery, by a highly organized “gang ” of the exact types of “members ” that I describe.

So, what exactly is “Proactive Policing,”and “threat assessment ” aka gang stalking and threat creation, anyways? See this post, where police, and police affilliated persons from a specific town, and town council  harass an old lady, including poisoning her yard, and her, with lawn chemicals.

Lets examine a recent case against ROGS Analysis to see if we can confirm, or refute my analysis. And, its important to when note that I was gang stalked, I had no “preconceptions, ” or beliefs, one way or another about “what is gang stalking, and who are the gang stalkers.”

I simply followed the evidence, which led me to unexpected conclusions, like this one here, and even better evidence, like the organized gang stalking of Bob Deis, or the case study of Rick Krlich in Ohio, where a firefighter from the local stalking gang (made up entirely of current and former police, city council persons, their associates and relatives ) was convicted of stalking, and calling in fake fires, robbing the town till, as Krlich succeeded in getting restraining orders on the other local, highly organized gang members, who work, or worked in, official capacities.

So, in the following gang stalking case study, I ask the reader to note the following “claims ” that targeted individuals make about gang stalkers and their enabling Karens:

  • they throw shit in your yard – they use, “no touch torture ” to threaten you, or to simulate fight or flight provoking responses, or near death experiences
  • dead animals, as we see in the case of the Ebay executives who gang stalked critics of Ebay, and also used dead animals as symbolic threats
  • they will wage a harassment campaign using city workers, and city protocols (false claims /slander/defamation /harassment )
  • they will target you as an organized group, using friends, relatives and associates; and misuse city resources too

All this, and much more, in the following gang stalking that lasted three years, and ended with a successful lawsuit.

And now, the local prosecutor has filed a gang staljing lawsuit, and charged these stalkers . TIs, this is how you fight gang stalking!

Jennifer taped a sign to her door – photos of which have went viral – detailing the allegations and how police allegedly refused to help her.

She admits she clashed with fellow residents over her supposedly untidy garden when she first moved in.

The nurse told WABC-TV: “I bought the property when I was pregnant and this is the truth, the property was in bad shape.

“I’m trying my best to make every effort to clean the property. I’ve done my best to clean the property.”

Jennifer claims that her neighbors have thrown dog poo onto her yard leading to her being fined.

She said: “I kept on noticing dog feces. I kept on noticing ticket ordinances from the Valley Stream Village town.

“I keep getting tickets. I keep seeing dog feces.”

This prompted her to install a camera which she claims captured her neighbor throwing the animal excrement.

Now, ROGS will move into phase two of this analysis to see if any.of the people in that story are police, firefighters, city workers, and other “narrative control agents. ” Stay tuned, because preliminary research seems to link one of the stalkers to an NYPD fire engine, E231.

Is gang stalking real? Are police, and firefighters nearly always involved?

 

Is ROGS Analysis of organized gang stalking worth the paper its written on!?

You decide!

Dear Caitlin Lam: why are you following ROGS blog? : gang stalking case study

The usual suspects: I think the cabal is forming up. I ask my one, special reader, for advice now. You know where to find me.

Ed. Note: this post you are reading references this post here

My “followers,” are listed in the screenshot below, all of whom have extremely non-descript blogs* featuring only photographs, sans commentary; and a,surprising number of my followers are also Captain Karens and their spawn. And, they never respond to Nice emails, asking simply “Hi, thanks for following. May I ask why you find my work interesting?”That pattern repeats in these cases.

Continue reading

Canada, mass shooting, real estate, gang stalking: another ROGS Bingo with Gabriel Wortman, and 22 dead

Gabriel Wortman, real estate mobbing, police pension funds, DVIC tactics, mass shooting, Tom Taggart, Paladin Security, Nova Scotia, security contractors and gang stalking, Tom Taggart Realtor

These words above fit a clear, and distinct pattern: real estate (Google real estate and gang stalking for an eye opener), Domestic Violence industry narratives,real estate squabbles, and predatory policing that is tied to police pension funds, and state revenue streams, as we saw in the police involved, major media reported, organized gang stalking of Lawrence Guzzino in California, who barely knew what hit him.

The guy was filthy rich, and his ex-wife and child was shacking up with a hillbilly biker; a perfect recipe for state predation on a guys real estate, and also a suspected ROGS Bingo.

The funny thing is, I cant tell you who the gang of stalkers was, or if this was just one gang versus another gang of gang stalkers, because Wortman fits part of the profile if a gang stalker, because he was a fan of refurbishing used police cruisers, and guys who do that are often gang stalkers themselves.

UPDATE July, 2020: As predicted, via ROGS Analysis, and the scientific method, the case of Gabriel Wortmans shooting rampage is a total ROGS BINGO, starting with “mystery whisperers” lime crackpot lay Catholic nun Linda MacDonald (A Dominican University accolyte )and her gang running a bizarre, one sided sexist narrative about domestic violence behind his back. And, extra points if you note that the crackpots who now appear in the media are running false narratives about “non-governmental torture, ” quite similar to the crackpots at Targeted Justice.

Then, fill out the ROGS Bingo card, as we see the UN Transatlantic crime initiative coupled with a provably fale narrative about human trafficking (religious proselytization disguised behind NGOs and fakefeminsts like Linda McDonald )

But what the official narrative wants you to focus on, are always a distraction away from what leads to these cases: that the hidden harassment directed at men like Gabriel Wortman, and predatory state practices and policies target that real estate and other assets are always hidden behind some bizarre narrative and smears of that mans character, with the blatant propaganda “he was a crazy guy” because he collected police gear that he legally bought at state auctions.

As we see in one of the best gang stalking stories online, guys who collect police and military gear become targets of gang stalking BY the police, fire personell, retired cops, and military, and NGO and their affilliates and others who participate in it.

Related Stories: Meet another real estated related gang of stalkers–the Hubbard Ohio gang of civil servants, who were featured on CBS news, after they harassed a man by going bizarre, juvenile things like dumping garbage in his yard, and drove by his house blasting their car horns, sometimes up to one hundred times per day, which the victim caught on film, and got restraining orders in his “perps”.

Then, Dont Be a Dickwit!! One of those gang stalkers plead guilty to phoning in fake fires, and stealing from the town treasury.

As a rule, most gang stalkers *are* the police, and their relatives; city workers, state workers, public union and pension involved persons, as we saw in the case of Minneapolis public sector union leader, and humble garbage collector Al Ditty, who killed himself after being gang stalked there. And, real estate agents, like the widely quoted,Tom Taggart in our story herein.

So, little coincidence that the Tom Taggart quoted in many articles about the gang stalking of Gabriel Wortman ALSO has a son named “Tom Taggart,”and there is a security contractor in Nova Scotia who lists a Tom Taggart as their employee.

Death toll reaches 19 after mass shooting in Canada

Wortman, a denture fitter, apparently started his attack by targeting his ex-wife and her new boyfriend in the town of Portapique, around 60 miles from Halifax, before attacking people at random at a number of different crime scenes across the province. All told, his rampage and the subsequent manhunt lasted about 12 hours from Saturday night into Sunday morning.

The motive behind one of Canada’s deadliest shootings is still under investigation, Chris Leather, a Royal Canadian Mounted Police chief superintendent, said.

The motive seems pretty clear to me, though: Gabriel Wortman was without a doubt, gang stalked by realtors, a security company, and various DVIC associated, and painted as a bad guy in his community, long before this event. And, as many gang stalkers claim, they will cause marriages to break up, and more.

He was likely surrounded in his own home, by DVIC narratives, as we see his neighbors adopting the bad guy narrative in the press, that one neighbor “saw him talk very badly to his girlfriend in 2004,” and that neighbor, refusing to repeat whatever the guy said to the reporter.

I mean, if whatever the guy said is so heinous, why not repeat it, and let the public decide? And the answer to that is, as ROGS has maintained all along, these are ritualized defamations.

And, I am willing to bet that womens shelter adocates were involved, too. And I will continue checking the news for these facts.

The stories at the center of this mass homicide are clearly a gun-control narrative, using a potentially explosive divorce as pretext for all of the predatory state practices that target real estate, using DVIC domestic violence narratives, and of course, the official smear, and trial in the press; and notably,in these operations, the “parallel colluding investigations” in threat assessment that has now morphed into DV narrative framing. These ATAP colliding investigations are at the center of every mass shooting now, and they are literally designed to drive targets crazy, or otherwise institutionalize them, or force a suicide.

Wortman chose option four, the mass homicide option, and it appears that he planned, and executed some of those who targeted him.

And in those narratives ONLY the state benefits, using women as pawns to target the assets that a man has accumulated, and getting its hands on some real estate.

UPDATE 04-25-2020: I am investigating a lead, that Tom Taggart, the realtor who is widely quoted in news stories, who is also a local politician, is related to a security company in that area, because Taggarts,son is,also named Tom Taggart, and a Tom Taggart, of Paladin Security, also located in Nova Scotia refused to comment for this story.

Here is the quote:

Local politician Tom Taggart told The Associated Press he didn’t know Wortman well but had spoken to him a few times in the past when he called about municipal issues.

The AP wrote, “Taggart described knowing Wortman’s lovely big home on Portapique Beach Road. He said Wortman owned a few other properties and was believed to divide his time between Portapique and his business in Dartmouth.”

Strange, that a politician-realtor would know,a guys house, but not know the guy in it.

But not so strange when we see the house-and the guy in it-becoming a target, because so many cases involve real estate. Here is a small sample:
1, 2
, 3
, 4, 5.

So, without a doubt, gang stalking is local police, firefighters, and city council related, and, real estate was indeed involved in huge numbers. And, as I say, document it, and take names.

Then, take revenge, if you can, against your imaginary frenemies. Because remember: gang stalking is not real, according to the professionals, and our *upstanding law enforcement* cabals, who all control the narrative after the fact of every real estate related mass shooting.

(Does Stephen Paddock ring any bells, lol. The guy was a one man real estate empire.)

Online “personas ” and what to do about them: gang stalking by AI assisted robots and targeted individuals online

Online “personas ” and what to do about them: gang stalking by AI assisted robots and targeted individuals online: a gang stalking conundrum.

Gang stalking is automated, but also, assisted by living breathing humans, who are sometimes paid players, and other times, mere useless idiots who play along with the Mockingbird Effect.

Here, have a look at how I was cyberstalked on Mike Masnicks (fabulous ) blog, Techdirt.com:

The gang stalking started around 2013, when I tried to raise awareness of organized gang stalking. Out of necessity for dealing with a troll farm friendly commenting sytem at Techdirt, I used different “personas” to manage a conversation, but without any software, or automated programs to assist me:

https://www.techdirt.com/articles/20131210/07555625519/lawsuit-claims-accidental-google-search-led-to-years-government-investigation-harrassment.shtml

I responded to a comment from a guy name George Boneyard, which I referenced here.

I was defending/empathizing with a guy named Jeffrey Kantor who had been targeted by a Google based algorithym, and that had served him bullshit results, and possibly, those results spoonfed to him after some online gang stalking by Fusion Center operatives and military contractors/AI programs that manipulated his search results.

Back in those days, AI gang stalking was new to the “normies ” whereas I first experienced online “redirection” after I reported on the first Somali manufactured terrorist in the City College News, Mohammed Warsame, who was an FBI snitch.

Redirection is where people search Google, or other search engines for materials and get different results, depending upon who is targeting the searcher based upon an IP address, as we see in the case of ADL online cyberstalking here.

So, the Jewish, parochial journalist (Mike Masnick, of Techdirt.com, for example ) who searches for information about “why do Somalis get…. ” blankety blank, will get Google results for:

https://www.somalispot.com/threads/why-do-innocent-people-get-punished.76125/

https://www.somalinet.com/forums/viewtopic.php?t=357328

And other such discussions, whereas myself, I got results sponsored by shitbags like the Anti Defamation League, and bbbb,,b other shit-persons. I also got Nazi logo laden websites (courtesy of the Bronfman klan and local Fusion Centers, working with Infragard shitbags like that colleges president) every time I searched forresults like, “human rights in Palestine” and so on.

And, besides the ibvious terroris recruitment pop -ups, and as in Arabuc tat I couldnt read, when I searched for information on Somalis, I got stuff like this instead :


Why do Somalis smell bad
?

And, occassionally, stuff like this:

https://www.mnopedia.org/somali-and-somali-american-experiences-minnesota

But always, reverting to this:

Etc.

If you guessed that not all searches online are equal, you would be correct. Because our filtered internet serves some of us, different results than others of us.

Now, take a look at how I predicted that:

1 the Redirect Method will be used by the Anti Defamation League to bully, target, and harass individuals

2 the Anti Defamation League (and Mike Masnicks in -house trolls ) bully commenters online.

Its a ROGS BINGO.

So, now when I go online, I practice persona management, and I recommend it to anyone who is being targeted in the Panopticon.

Read this article about how defense contractors use persona management to target us,

https://m.dailykos.com/stories/2011/02/16/945768/-UPDATED-The-HB-Gary-Email-That-Should-Concern-Us-All

and keep in mid tat its not just “the gubmint ” targeting you, but tese das, it could be racist groups like the Anti Defamation League and its octopus of NGOs, or even te Klan, and any of the militant feminist groups who work behind Sexual Violence Centers (also note the para-language involved in nearly all DVIC industries )

I will provide more context at a later date, with evidence.

Sol Pais suicide, failed FBI CVE programs aka community policing, Israelification, and Fusion Centers.

she had never made a specific threat against a specific school.

(Newser) – Sol Pais, the Florida 18-year-old who was reportedly obsessed with the Columbine school shooting and caused that school and many others to go on lockout last week when she flew to Colorado and bought a gun, was likely dead before the lockout even occurred, authorities say. Pais flew from Miami to Denver on Monday, bought a pump-action shotgun and two boxes of ammunition near Littleton, then took a rideshare to Mount Evans. A massive manhunt ensued after her parents reported her missing and police warned of apparent threats indicating she could be targeting Columbine as the 20th anniversary of the school shooting approached; she was ultimately found dead Wednesday. But the local undersheriff now says she likely killed herself on the remote mountainside Monday night, and that that was likely her intent all along.
No credit card purchases or cellphone pings indicate the high school senior left Mount Evans once she was dropped off late Monday afternoon. Even if she didn’t kill herself that night, police say she was cut off from the outside world with no cell signal in the area and no transportation. “She had no idea what occurred from late Monday afternoon to Tuesday when a search for her began and to Wednesday when her body was found,” Clear Creek County Undersheriff Bruce Snelling tells the Denver Post. “The logical likelihood was she was here to end her journey. … This poor, mentally ill girl needed help and probably never got it.” Police followed footprints in deep snow on the mountain and found her body, which appeared to have been dead more than a day, about three-quarters of a mile from a lodge. An FBI agent in the Denver office notes that while agents considered her a credible threat, she had never made a specific threat against a specific school. (More on the “red flags” she raised here.)

Police gang stalking, children, Canada, gang stalking denialists, CBC covers gang stalking

The Canadian Broadcast Corporation (CBC), which is Canada’s official federal news service, has now exposed an actual gang of cops, who stalked, harassed, wiretapped, and otherwise “made life a living hell”for a woman involved in a custody dispute, targeting her child EXACTLY as I have described in this story, and here, and here, and here.
This is not an isolated case, this is not a rogue element in policing, and it is not “a few bad apples”: it is how modern DVIC policing works, and we only hear of it when these sick fucks get prosecuted.
Note the following in this case:
1-active police working with retired police FROM THE SAME DEPARTMENT who run private investigation firms; one of many glaring conflicts of interests that springs from DVIC policing

2-personalized vendettas hidden behind threat assessments and utilizing public funded police resources, and cross-contaminated investigations by private individuals, aka “parallel colluding investigations”as described by ATAP here
3- the theft of a child is the goal, and a discrediting slander campaign is waged BY POLICE against a parent EXACTLY AS DESCRIBED by targeted individuals. Especially note the ROGS thesis that organized pedophiles in policing are behind these crimes, and then, as you follow the coverage,note that a mediator hired by the gang stalking police stalkers had been charged with sex offenses against children-in Texas!
4-the incredible duration of time where active duty police, and a poluce department rife with corruption, which allowed access to non-public databases by private investigators and retired police, as one INDIVIDUAL was targeted
5-the use of phone wire tapping, illegal entry into homes,and GPS tracking devices
6-that what is hidden in darkness only comes to light when we prosecute gang stalkers, and stamp them out like cockroaches, and target them, the way they target us
7-that all of this takes place in a climate where police CANNOT claim they are unaware of this cross contamination of mission creep, and the inherent blur of by-design corruption built into DVIC policing, as outlined in the DHS manual, which outlines how agencies skurt, flaunt, and mock the laws and due process rights.

Cops stalked Calgary mother with GPS device and bugged her home, court hears on first day of corruption trial
steve-walton-anthony-braile(2).jpg
Three current and former Calgary police officers engaged in a two-year “campaign of harassment” against a Calgary mother with the goal of getting her to give up her parental rights during a bitter custody battle, according to the prosecution at the start of a four-week corruption trial.
Tony Braile, Bryan Morton and Bradford McNish were paid thousands of dollars by a private investigation firm to illegally use Calgary Police Service resources, said Leah Boyd, who is prosecuting the case alongside Julie Snowdon.
The trio face charges of bribery and unauthorized use of a computer system. Braile and Morton also face charges of criminal harassment, while Morton and McNish each face a charge of breach of trust.
All alleged offences stem from activity between 2012 and 2015 during which time all three were CPS officers, though Braile had been suspended for unrelated matters.
Calgary police officers charged in corruption probe
Court heard Monday the trio was working for a private investigation firm run by retired CPS officer Steve Walton and his wife Heather, a retired civilian employee of the service. The PI firm had a client named Ken Carter, who was in the middle of an acrimonious split from his partner, Akele Taylor.
The charges stem from a “protracted and acrimonious” custody battle between Taylor and Carter during which the prosecution alleges Taylor was stalked and harassed by employees of the PI firm.
The goal of the three on trial — according to the testimony of Det. Todd Nichol of CPS’s anti-corruption unit — was to pressure Taylor to give up her parental rights by gathering information that was designed to show she was an unfit mother.
Braile even pretended to be interested in purchasing Taylor’s home so he could install “listening devices,” said Nichol, who eventually became the lead detective for the investigation.

So: it causes me to wonder why shitbags like the New Yarwk Times media pundit Mike McPhate, and Brooklyn resident Laura Yan, and Dr.s Mike Wood, or psychologists of record Lorraine Sheridan, and David V. James would toss their professional reputations in the toilet by actively participating in gang stalking denialism, which is officially linked now, to mass shootings via this ATAP conference.
Oh, I know: its because ALL of them actively work in the carceral/penal system aka the Prison Industrial Complex(PIC), or are affiliated directly with racist organizations like the, Anti Defamation League who uses a form of private graft to send cops on privately paid trips to Israel, to train in racist, sectarian, tribal Ich, Du policing.
Related Story: Dr. Lorraine Sheridan is much loved by the LGBT-flavor-of-the month Klub, as ROGS laughs every time these Kommunity Kulture Klybs and Kovens wakes up to the neutering racism of the racist, fascist Anti Defamation League, whose cultural roots are in white slavery profiteering, and gangsterism.
Or, maybe its because the Professor Fuck Your Life Finklesteins, and the horse-faced lesbian linebackers in academia, and involved in gang stalking around the world are not prosecuted as they should be.
Well, at least Canada appears to be waking up, and calling OGS what it really is: police corruption and sociopathic criminals who are drawn to police work, psychology, and the family court DVIC.
Related Story: The junk science of “threat assessment”is an industry that derives BILLIONS per year from governments around the world, yet they have stopped no terror attacks anywhere, ever, despite the industry having direct, persistent, 24/7k access to all of the worlds cell phones, and Twitter, Instagram, and Facebook accounts and more.
And, we see these threat assessment professionals use acronyms that mirror the phrase “psycholigical operations,“and that they are now officially in the record adopting Sheridan and James thesis, despite it being thoroughly discredited.
And we see time, and time again that men who are activists, dissidents, and others in America are so terrorized by these hidden,private, DHS/FBI/NGO armies of Israeli counter terror trained online and offline bullies that some of them go ballistic.
So, I now ask my readers to make the connections themselves, and read ROGS chronilogically so that you can see that I have priven what organized gang stalking is, with falsifiable, replicable scientific evidence.
And, I ask the Department of Justice secret police to dig the high heels out of your asses, and make the links yourself.
Hell, I will even give you the free ROGS BINGO CARD, and point you to the cases of Andy Ostrowski, Rakem Balogun, Matt Riehl, Ian Long, Cosmo Setepenra, Cesar Sayoc,Scott Beierle, and literally dozens of others that prove my thesis.
Now get off your porky fat asses, bitches, and go get some gang stalkers. Start with this one here, and maybe investigate the San Gabriel Valley connection I have provided you here.

Parma, Ohio,gang stalking, policing-for-profits, Crisis PR agents, Fusion Center tracking, and what to do about it: break the Deep State at the switch

The deep state is basically just massive corruption, enabled by NSAFVEYs-Israeli political spying, starting at the internet switch, and utiluzing the policing for profit model of social control.
Routinely,we see intelligence agencies, police and their affiliates, and other institutional corruption, working behind the scenes using Fusion Centers,and institutional or corporate mechanisms like the Twitter “firehose” to violate due process rights,target dissenters from hidden databases, and more, enabled by the trickle-down data capture schemes of the NSA-FBI-DHS-DEA-Etc whole nation wiretap of our communications systems.

Related Story: what is webwashing, and webscrubbing,and how does it relate to psychological operations online that create mass shooters, so-called incel terrorist and car crashers, and many others who are profiled, andstalked,and harrassed online and off by hidden agents and agencies? Read “FACEBOOK scrubs webpages because the Pentagon and our lil Pal Israel tell them to.”
Then, ask yourself: when did America become a religious extremist, sectarian police state?

An old story from Parma Ohio, which sits in the asshole of the gang stalking universe, demonstrates the predatory policing methods of for-profit policing that Rutherford Institute constitutional scholarJohn Whitehead has documented, and which has replaced the protect and serve model ofpolicing since the beginning of the DVIC in 1993.
Have a read through this, from Scumbagged.com, to watch how citizensin a predatory for-profit policing town reveal one gross abuse after another by Parma police,only to have some anonymous crisis PR troll named”Jack”come in at the very end of the discussion to try to frame the whistle blower as abad person, and diminish ordenigrate insight into corrupt profit based policing.And- notice the connection to real estate, for extra ROGS bingo points.

The city of Parma and it’s residents have a tough road ahead of them, literally. Home values have declined by more than 20% since 2007, businesses are leaving, stores are closing, drugs & crime are running rampant & the cities police officers are harassing & gang stalking their motorists.
The individuals who could make things better, who should be focused on cleaning up the city & making Parma a safer & better place to live, simply aren’t. The Parma Police are too busy and primarily focused on what is known as gang stalking. In this article, you will see first hand as Parma Police Sergeant John Porec deliberately harasses & gang stalks Matt Osbourne, all of which was caught on video.

And that, which has replaced due process, civil liberty,and the rule of law in American communities, starting in 1993 as well.
AND,if you read through this blog post written by a tow truck driver,we see that the greater, more important story of predatory policing is slightly diffused by one or another city/state/crisis PR agent, who attempts to discredit the complaintant, and distract the readers from the larger issue of for-profit policing.
If you read deep into OGS narratives, you will nearly ALWAYS find police/NGO/institutional affiliates gas-lighting individual narratives(shout out to Maggie K.in Minnesota- a crisis PR agent,and graduate of UWA Puget Sound,who will be a named party in a coming lawsuit), as we see here, in the case of Michael C. Fry of Texas,who actually named the Denton County sherrifs crisis PR agent Tim Reedy in his flyers as he tried to draw attention to gang stalking, and narrative control elements; to the case of designer-bomber-scapegoat Cesar Sayoc, who shared associations with narrative control agent and former spokespersonforHouse Democrats Rochelle Ritchie, who was curiously close to both police,and prosecutors in the execution of Freddie Gray, in Baltimore, MD,and who also-for some as-yet disclosed reason-was both the primary crybully, but also the point-person who fingered Cesar Sayoc a month before the bizarre bomb hoax that he is alleged to have perpetrated.
While the regular ROGS reader will note that many well documented cases of OGS, like the case of Rick Krlich of OH,and my passing mention of the case if a gang stalked journalist in OH,by a Pentagon affiliated “private contractor”, and also here,
And, much like Broward County FL, where we see the Q-Anon “conspiracy” being advertised by SWAT team members(who are integral players in the hidden so-called deep state that is encouraged by the NSA-FVEYs-Israel whole nation wiretap of America) and Minneapolis,MN, which is in the record gang stalking reporters,while using OGS to suppress dissenters,and corrupt the political process,and the entire state of California, which has some of the highest rates of Google searches for gang stalking related complaints,and, one of the best online accounts of how organized gang stalking IS police and police affiliated NGOs and institutions working to control the American political process,outside the scope of the Constitutional rights of citizens.

CNNs Jim Acosta, the honeytrap and butt grabs, gropes, and #fakerape: Americas politics of deference, “progressive”white female privilege, and crybullies revealed

The American right has now latched on to an effective means of defaming rivals and controlling narrative, a tool created by the defamation prone left wing as a useful political tool: #fakerapes, crybullying, and contrived incidents where cameras, camera angles,and more are manipulated to create false light facts.
In the case of President Trumps team, framing CNN propagandist Jim Acosta, we see an aide to the president molested by CNN propagandist Jim Acosta.
In my thesis herein, we see that, repeatedly,men who are FIRST defamed by DVIC high heels policing, are then stalked, framed,and harassed by faggy people and horse-faced lesbian linebackers from the Multi Kultural Klubs and Kovens, or one of many NGOs, and kommunity policing whisper campaigns and that, for YEARS after the initial DVIC slander.
And, we see the number thirteen frequently involved too.

Related story: what does the number 13 mean to witches, and Wiccans?

Again: you dont have to take my word for it, because you can verify my research,and validate it in nearly every case of these political stalkings/defamings/harrassments/homicides/suicides.
So, as we see in cases like Scott Beierle, and others, these men are stalked and slandered as “butt grabbers,”and worse, in gray areas of DVIC paperwork, andinlune and offline terror campaigns.
Well- how exactly do these smears work? Iwill let you decide, as we see time, and time again that tribal-religious elements of neocon, and progressive and conservatuve forces in America embrace #fakerape and continue to wage war on sexual liberty, and liberty in general.
Here is the right wing, adopting #fakerape tactics created in #safespace during the lefts tactical planning for the.now eroded #MeToo political movement:

…“I’ll tell you what: CNN should be ashamed of itself having you working for working for them. You are a rude, terrible person. You shouldn’t be working for CNN,” Trump told Acosta.
The White House later announced it was pulling Acosta’s White House press pass “until further notice,” accusing the CNN reporter of “placing his hands on a young woman just trying to do her job as a White House intern.”
The White House alleged that Acosta had acted brutishly toward an intern who was responsible for handling the press conference’s handheld microphones.
….fillow this link to see a #fakerape in action, courtesy of Sarah Sanders

AMERICAS FINEST: Comey’s “sisters” in FBI pissing leaks into the face of the New Yarwk Times, MSM, like a Tel Aviv golden shower.

Witch hunt? No. But if you change just one letter….
Even the casual, or lazy ROGS reader has noted that I am an equalist-and that I give women “agency,” unlike the sectarians and occulted religious nutjobs, and faux-feminist fascists who work in “the agencies,” ranging from the NSA-Et Alphabeticus, to the crisis PR firms that stalk us, and bomb us with media, and online with one manufactured terrorist, or boogie MAN crisis or another.
And, that while I was once a liberal-progressive, I was never a Vagina Hat wearing moron, or anything close to a Southern Poverty Law Center (SPLC), or Anti Defamation League (ADL)Hate Manufacturing Industry (HMI)donor.
And, of those casual readers, even they must have noticed that organized gang stalking denialists and perpetrators are very frequently women( see here, here, here, here, and anywhere else you look online or offline.)
Then, increasingly, we see the term “witches” thrown around every time some deluded political criminal like useful idiot Reality Winner who got crapped on by the ADL sponored The Intercept, or some sex-biased and privileged yellow journalist like Marcy Wheeler does something cowardly and unethical; or, when a guy rams a rented truck into something, like Michael Chadwick Fry did in Texas, after he was stalked for many years by what he says were female deputies~nee “witches”, after he witnessed a questionable deputy-involved murder, where he believed he was targeted, rather than the man who was murdered.
So, yeah: this due process free Fusion Center derived organized gang stalknig, and all of its accompanying “high heels policing”really is THAT BIZARRE.
But not neccessarily MORE bizarre than the FBI leaking like the U.S.S. Liberty, in 1967; or even alternative journalism turning piss yellow, like much of the MSM today, including the INTERCEPT.
Golden Showers, indeed– Peter “the Stroke”Strzok, and Lisa “Peed-My Size-13-Maxi-pad-for-You” Page leaked emails smell like a Girl Scout camp outhouse.
And, I am certain the only fumes around here are wafting from those high heeled, high policing political police, aka the Americas Political Police and Domestic Violence Industrial Complex Overseers(APPDVICO, sounds like RICO), the organization formerly known as the Federal Bureau of Instigation

Trump is NOT fuming over anything, compared to the wafting odor of the DVIC and its smelly cesspool of a diaper that they have swaddled around “Its For the Children”

New messages between ex-FBI lawyer Peter Strzok and Lisa Page have been revealed

One text states ‘our sisters have begun leaking like mad’
Another mentions the ‘times doing a story about the rnc hacks’
Strzok was fired after an Inspector General’s report came down on the FBI lovers for anti-Trump texts
‘This should never have happened but we are learning more and more by the hour,’ Trump wrote
He quoted from a Fox News commentator who called it a ‘cesspool of corruption’
President Donald Trump inveighed Thursday against the release of more texts from former FBI lawyers Peter Strzok and Lisa Page that referenced people in the government ‘leaking like mad.’
The president brought up the 2016 messages a day after they appeared in a Fox News report that dug up still more texts from the former FBI officials, following an earlier release of anti-Trump texts.
In one of them, Strzok, a former member of special counsel Robert Mueller’s team, tells Page that ‘our sisters have begun leaking like mad.’

Meet Laura Yan, freelance writer, gang stalking denialist, and total bullshit artist.

There are only two ways to understand organized gang stalking: to separate actual victims from the many total bullshit artists in the discussion, as well as to separate claims of nebulous,strange, unproven electronic harassment from only those claims that are validated, such as when the CIA and the US government withdrew diplomats from Cuba, and Gaungzhou China; or in the valid, and widely reported domestic spying and electronic harassment of ALL of our computers and cell phones by the NSA/CIA/FBI/DHS.
And of these bullshit artists, and OGS denialists- without coincidence, most are women, and most could loosely be called neocon Progressives (Marcy Wheeler, for instance, couldnt turn into an FBI informant fast enough,just after she noted that we are all targeted individuals now that NSA domestic spying has been made official. See how that works? If you cant take the heat-or if you are a neocon progessive-become a rat.)

Related Story: Look at how FBI-INTIMIDATED, and Anti Defamation Leagued (ADL) LITTLE mARCY heeler is, then, get back to me (ROGS)

Freelance writer Laura Yan, who wrote an OGS denialist hit piece in Wired magazine last March is one of the latter, and I will tell you how I know this later. And, like Mike McPhate, the Canadian who wrote the infamous hit piece in the New Yarwk Times,her work in Wired is one of a kind- it is her only published work there-a one night stand.

Related Story: Mike McPhate, who wrote the infamous OGS hit piece entitled“They See Gangs of Deep State Disinformation Schills”now writes a newsletter from California, and has written about secret societies of tattooed LAPD deputies who stalk, and sometimes murder targeted individuals. Extrapoints if you notice that he has placed that story at number 13, here at his newsletter as he covers actual secret society members in policing who murder people. And, I give you a free ROGS BINGO card if you notice that he wrote thst piece AFTER I personally waged acdiscrediting narrative against the fakenews NYT piece he wrote

Here is Ms. Yans website, and please, send her an email-or thousands of them-anonymously, and tell her your thoughts:
http://laurayan.com/
But first,a question: why are most/ all Morgellons disease claimants middle aged whit-ish females? I will tell you at the end of this post.
So,I will also tell you that when this blog here that you are reading linked crisis public relations(CPR) to the DVIC and the various DHS/FBI/Alphabet soup domestic spying to OGS, I was suddenly inundated with writers from Washington State, Arizona,Iowa,and New York, who claimed to have Morgellons; and most of those were women, and more oddly, many were social workers.

Related Story: The Association of Threat Assessment Professionals (ATAP)calls gang stalking “parallel colluding investigations ” in their literature.
ATAP, which advises these “investigations ” also advises the use of miitary grade psychological operations on civilians, and unsurprisingly, condones the targeting of individuals, and calls individuals targeted this,way “delusional.”

And, with no surprise, they were middle aged white females, some of whom work closely with police. And most of whom used Proton mail for anonymity, or switched to protonmail just after I told them that Morgellons is what is called a psychological operation in propaganda operations; and all of whom stopped writing when I told them that my goal is to expose them.
Organized gang stalking is nothing like Morgellons disease claimants claims because unlike MD(which is similar to Munchausens Syndrome in that it masks female psychopathy, while occasionally it is used to discredit andc manipulate women online), many people have died, or been murdered because of OGS, which is a form of actual bullying and harassment that has a well heeled discrediting campaign behind it that is unsurprisingly split into two categories:
OGS victims, and OGS denialists.

Then, a necessary step to understanding OGS is to separate those who claim odd forms of electronic torture from those who are actually being harassed, because as I document all over this blog, Level X thinking, as described here by a security industry Technical Counter-Surveillance professional permeates the dialectic,because various agents and agencies, institutions and corporations, and government are actively using electronic wiretaps and other devices on citizens, without judicial oversight,and without the public at large being informed.
Any researcher of OGS can find that evidence, and easily validate it with replicable results.
Then,the OGS dialectic has within it actual proven cases where political gang stalking, feminist gang stalking, NGO sponsored gang stalking, and all of these in collusion with police and intelligence agencies participate in OGS.
And, dozens of disinformation warehousing operations (Google Lissa Kriss, or prayerwarriorpsychicnot for two examples)that act as de facto noise to cover up NSA domestic spying, and backdoor leakage into political policing.
Well, anyways: Meet Laura Yan, who will soon be wearing size 13 MaxiPads for the DVIC,bleeding out noxious propaganda in the form of news and infotainment.
Mind Games: The Tortured Lives of ‘Targeted Individuals’
Thousands of people think that the government is using implanted chips and electronic beams to control their minds. They are desperate to prove they aren’t delusional.
Related Story: How does the NSA, and the various spy organizations and private spy contractors use the term “electronic implants” when they imolant an electronic device, like a computer or phone with wire tapping software, or computer chips?
Every morning, Liza wakes up and remembers that she’s been tortured. When she looks down at her hands, she can see slightly raised bumps where she believes she’s been implanted with microchips. She is certain that the chips track her every move, that her family has been programmed not to listen to her. She knows that her mind had been pushed to the limits of human endurance (“the most pain you could put on a person before they die”). The targeting, the rewiring of her brain, is so extreme that she can no longer even cry.
Liza is 56, a thin, wiry woman with elf-like ears and bright eyes, an artist who grew up in the Rocky Mountains. She worked at Microsoft for 10 years and started her own web development company with her partner before the electronic attacks, the stalking, and the surveillance began. She knew it had to be some form of technology attacking her—she’d worked in the technology industry for more than a decade. She knew what it was capable of.
…..follow the links.Connect the dots!
Related: Why is Morgellons disease-the self diagnosed skin and mental health related condition that was “discovered”by an Asian American woman whose son showed signs of Munchaussen-by-proxy abuse,overwhelmingly reported by middle aged white females who are highly skilled in the tradecraft of internet Crisis PR, and frequently beneficiaries of the DVIC federal slush funds- AND who frequently work in the technology centers of state institutions, colleges,Microsoft,or government?

Manufacturing terrorism suspects, fake web pages, and informants using lots of rope in darkness: modern lynching online and CVE programs

Whether the target is a Muslim, a Mormon cattle rancher, a black activist, or a poor white kid like William Atchison who get stalked online and then offline by agents provocateurs, aka DHS/FBI/DIA/private contractor/NGO/foreign spy outfit unspecified, informants, a few patterns stand out in the data:
UNDERCOVER FBI AGENTS SWARM THE INTERNET SEEKING CONTACT WITH “TERRORISTS”who they then profile via behavioral analysts, psycholigical operations, and then endlessly monitor their speech online and off, in concert with HUNDREDS of agencies, and using NSA data.
The FBI’s online activities are so pervasive that the bureau sometimes finds itself investigating its own people.

Almost all targets of provocation are male.
All targets of provocations are ensnared online, and followed, monitored and more offline for using words~aka pure first amendment protected speech~sometimes for decades since the NSA dumped hay all over needles in a theretofore previously non-existent “haystack.”
All targets of provocateurs have long term contact with people working under the counter-terrorism rubtrik, or so calked community policing, who seek to INFLUENCE the speaker, from hidden or occulted positions online and off (for instance, social workers, college, or DV type “counselors” target and track individuals, usi.g multiple databases, and share information about their targets with police)
All targets of these hidden programs are manipulated in “directed conversations”which is well documented in the online TI community,and this unrecorded anywhere.
All targets are manipulated, and frequently their most base impulses to food, clothing and shelter~indeed, their base drives, what Freud called libido~are used as tools to manipulate them, and much more, as we saw with the Tsaernev family being targeted for a decade BEFORE the Boston bombing, as well as in the cases of the Seattle Somalis employment and travel being stifled by federal agents, hearsay, and policy (not law.)
In any study of what is colloquially called mind control, and stemming from Nazi/US/British styled torture, or the well documented MKULTRA and its companions Monarch, Bluebird, Phoenix, Gladio-all of these used base drives as ways to manipulate subjects and targets.
And, all base drives, stationed a man, or a woman in the middle to impede or encourage the target toward one or another behavioral goal. So, any study of targeted individuals must account for ling term state/federal ibstruction of base drives, and achievements.
Related Story: Niftygerbil, Niftychinchilla, and other Nifty names for Tor nodes, courtesy of the same geniuses who gave the world Monarch and Bluebird.
So, we see now, the entire organized gang stalking dialectic mirrors the ACTUAL complaints of targeted individuals. Refer to the ROGS BINGO card at the top of this blog for comparison.
So, OGS is far from a delusional complaint, and rather,indicative of manufactured terrorisms un Constitutional basis, and the occulted use of informants whose work in online terror/criminal/other incitement is undocumented by design-a totally unchecked use of actual psychological operations-agents provocateurs actions are not on the record, or in courtroom documents either.
So, in the very least, these online influence and psyops using unchecked, unregulated, hidden, occulted and obscured methods, repeated over time, do indeed form, as the good doctor Lorraine Sheridan has noted~a closed echo chamber, echo chamber, where words themselves are the primary targets, as are the individuals who use the words- they are literally under close monitoring every time a banned word hits Google/Wordpress/Twitter, etc.
Here from NBC News is a story about how the FBI uses informants online and on social media in occulted fashion to police pure speech, and then, to target individuals:
https://www.nbcnews.com/storyline/isis-terror/no-lol-matter-fbi-trolls-social-media-would-be-jihadis-n226841s
And here is a bit more about that from the Intercepts Cora Courier in 2017: ghttps://theintercept.com/2017/01/31/undercover-fbi-agents-swarm-the-internet-seeking-contact-with-terrorists/
“”According to the guie, an online counterterrorism investigation can target websites or online networks that the FBI believes terrorists are using “to encourage and recruit members” or to spread propaganda. Such probes may extend to the administrators or creators of those forums, as well as people engaged in “the development of communications security practices” or “acting as ‘virtual couriers’ for terrorist organizations by passing online messages among members or leadership.”
The guide classes as online investigations those that rely primarily on online informants or undercover employees, and those that involve surveilling internet facilities or foreign websites hosted on U.S. servers. The FBI often runs such operations jointly with other U.S. intelligence agencies or “international partners,” according to the document.
Since 2008, the Counterterrorism Division has coordinated these operations under a program called the Net Talon National Initiative. Net Talon uses informants, linguists, and FBI employees working undercover, posing as ordinary internet users, to zero in on terrorists’ use of the internet, according to the guide. The initiative was meant to centralize expertise on particular targets and platforms, to “address intelligence gaps,” and to create a clearinghouse of the intelligence the bureau has collected on terrorists’ use of the internet.
The FBI’s online activities are apparently pervasive and uncoordinated enough to lead to confusion. The document refers to “resources being wasted by investigating or collecting on FBI online identities,” including undercover employees, informants, or people who have already been investigated by other offices or agencies. An FBI official told the Intercept, “You would be in a forum, and you’re like, ‘This person’s way out there,’ and we’ve gone and opened up a case, and sometimes that was a local police department, or a friendly foreign service. There are still instances of that, and deconfliction is still necessary.”
Khurrum Wahid and Joshua Dratel, defense attorneys for Ahmed Omar Abu Ali, answer questions from the media after Abu Ali was sentenced on March 29, 2006, at a federal court in Alexandria, Va. Photo: Alex Wong/Getty Images
THE COUNTERTERRORISM POLICY GUIDE shows just how much flexibility informants and undercover agents have when operating online, even when they’re not working specific targets. The FBI insists that there is nothing to see here: In statements provided to The Intercept, the FBI said that “while there are obvious differences between online and offline environments,” FBI employees and informants working on the internet are subject to the same rules, and that bureau employees can only monitor people’s online activity as part of an authorized investigation.
The guide, however, suggests that the internet offers areas of ambiguity. Much comes down to the questions of what informants can do, as opposed to FBI employees, and whether the goal of an operation should be construed as seeking to obtain specific intelligence, simply watching public websites, or developing a profile for an undercover identity.
For instance, the guide states that an FBI employee can visit a message forum or blog only when the site is relevant to an investigation. An FBI employee, according to the guide, could be an undercover agent or an “online covert employee,” a term that presumably refers to FBI workers other than agents, like analysts. FBI employees can’t chat online with someone who isn’t already the subject of an investigation for the purposes of gathering intelligence on that person. They can, however, “engage in unlimited communication with associates” of a person under investigation, if the conversations are relevant to the investigation.
Informants and undercover FBI employees are also allowed to do a great deal online in the name of “building bona fides,” such as creating fake identities or making themselves appear to be normal commenters on online fora. The guide says that in order to establish credibility, FBI employees “may make postings and communicate with individuals who are neither the subjects nor the associates of subjects … there is no limitation with respect to the amount of communication [they] may initiate in this regard.”
And the FBI is allowed to open new investigations on people it identifies through “passive monitoring or active communication” on websites.
An FBI spokesperson clarified that in order for an undercover or covert employee to monitor a website or forum, the site must already be associated with an investigation, “either because the forum was known to be used by a subject [of an investigation], or because the subjects are there. I can’t be in the forum trying to bait you into conversation.”
However, the FBI acknowledges that when its employees participate in online fora, they interact with people who may be bystanders to whatever activity led the bureau there in the first place. And that is not accidental. “We want to know if the subject has other people who are joining in, which people are part of the activity, and who is just there,” a spokesperson explained.
In other words, FBI agents can post and chat online with people who have nothing to do with an investigation, so long as they aren’t collecting intelligence — but in the course of those online communications, they can decide to start investigating someone.
Michael German, a former FBI agent who is now with the Brennan Center for Justice at New York University Law School, said that agents have always had a little bit of wiggle room in this regard. They can have a certain number of in-person meetings with someone, or in some circumstances go to public meetings or public websites, without identifying themselves as part of the FBI. This helps agents avoid a bureaucratic mess when carrying out a simple “buy and bust” drug sting, for example, German said.
But the ability to conduct unlimited online conversations in the name of building bona fides gives agents “a pretty long rope,” German said.
Criminal defense attorney Khurrum Wahid, who has handled or been an adviser on many national security cases, notes that FBI employees or informants frequently pose as experts offering guidance to lost individuals.
“These uninformed young people go online and become almost smitten with people who show a level of knowledge, who often turn out to be informants or undercovers,” said Wahid.
Informants operate under looser rules than FBI personnel. They are allowed unlimited engagement with a target in the course of an “assessment,” a preliminary investigation that can be opened on a loose tip of suspicious behavior, in order to collect general intelligence on a subject, or to evaluate a potential new informant. Assessments were created as a category in 2008. German finds their allowance for the expansive use of informants problematic.
“What we’ve seen in sting operations is that there is this shady portion before the official operation begins which often involves the informant,” said German. “And then it’s passed off to an agent, and it looks like they are ready to commit a crime pretty quickly.”
Wahid noted that at least in online cases, there are generally logs of all the conversations between suspect and informant, whereas “when it’s a live informant, they can turn off the recorder and we never know what it was all about.”
The use of informants in counterterrorism sting operations has expanded since the 9/11 attacks, when the FBI adopted the mantra that its job is to stop terror attacks before they occur, not just investigate them afterward. The government argues that the anonymity the internet affords to suspects necessitates an aggressive approach, including stings. The FBI’s national security director told the New York Times this summer that “using undercover agents online allowed the FBI to ‘flesh out’ suspects by gaining their trust and persuading them to disclose their real identities.” In some cases, the FBI even created fake webpages in order to draw in suspects.
“Agencies are under a lot of pressure to find a needle in a haystack, something that has haunted us since the beginning of the war on terror,” said Karen Greenberg, director of the Center on National Security at Fordham Law School. “It’s true that the internet has changed everything about how we communicate, but are we just going to be trawling online forever? It turns the principles of criminal investigation on their head.””

WA Fusion Center, limited hangouts, disinformatio, misinformation, mind control documents.

Mr X:
The WA state Fusion Center mind control docs are what is called a limited hangout in intelligence circles. The LH is designed to taint a dialogue, or misguide you, but in themselves reveal the cavalier attitude of these domestic spies.
The images widely circulated from raven1.net are among many that were used by one Eleanor White, a self described whistle blower.
She reigned as the go to disinformation specialist about a topic called gang stalking, between 2001- and 2011. White claimed that she was slandered as a pedophile everywhere she went, but in reality, was likely part of the pre-Fusion center deep state, a likely courier for illegally intercepted communications, and the defamation campaigs that followed.
These materials are used to discredit people who psychologists then label as delusional. But as we see, they also nearly and completely describe how the NSA trickles data to state and federal agencies, who then use Fusion Centers, so called community policing elements, and more to monitor activists and dissidents, via real time cell phone tracking, computers, ALPRs, BOLOs, and more, frequently utilizing plainly bizarre methods.
I also wish to inform you that I have been tracked since 2001, by many agencies across America, for many reasons not least of which is that [REDACTED] also wrote the Lewinsky defense, and represented Cheney during the Scooter Libby, Valerie Plame affair; And, a few other things.
I appreciate [REDACTED] FOIA release from the Fusion Center, but also wish to inform you that there are other questions to ask in these cases, because those documents are designed to discredit any who take them too seriously.
The good news is that the real questions that should be asked are easy, once you know where to look.
For instance~regardless of your political stance on gun control~ask about Fusion Centers monitoring activists, and people in alternative media, or even Facebook.
So, black activists, and mass shooters are a great place to start with mind control. Fusion Centers monitor these guys relentlessly, and mercilessly, via phone, computer, ALPRs, and BOLOs.
To understand the mind part, separate it from the control part, outside of due process, and constituting what could arguably be called unusual punishments.
Then, understand it like this: the FVEY nations
cooperate to target and harass each others activists. A great example is a boy named William Atchison, who shot two kids in a NM school, and who was killed by SWAT.
In his case, he was contacted online by British intel, who waged Gamergate across the globe, and also on American citizens, outside the law, and likely in violation of international treaties.
Then, they passed the “anonymous” tip to FBI, who then waged community policing on the boy.
FBI contacted the kid~who never owned a gun in his life~and then FBI CVE kicked in, meaning the kid was frequently followed online and off, by any of many domestic spy/intel/Rotary clubbers/VFW members/etc organizations attempting to “conform him” and these take on plainly bizarre online and offline stalking proportions.
Only after this, did the boy buy a gun, and this we see in case after case after case. Then, the boy goes ballistic, after being isolated and terrorized by literal hidden and actual armies of psychological operations specialists, for WORDS he expressed online.
So, in that one case alone, you can find evidence that what I say above is true, if you learn to ask the right questions.
How many calls went to which Fusion Centers, about What, When, and Why about this one boy, william Atchison. Were ALPRs reporting his license plate every time he drove, and were satellites literally tracking and recording his every move? Which police departments/school officers pinged his computer or cell phone~or did bad stuff like redirect his internet switch?
Did his computer have electronic implants, aka, coded applications that did/do as yet described things/wiretapped/ monitored and utilized key stroke logging?
Etc.
But taken as a whole, the boy was without a doubt, surrounded by influencers, and others who aided, coerced, and manipulated his choices from his first contact online with British intel, who flagged him during Gamergate.
First, they came for the kid online who said bad words (and those words decided by religious theocrats, and others)~then, they came for the mass shooter after they, working internationally, from sectarian religious basis, occulted pisitions along the internet backbone, and in violation of due process, civil rights, and treaties, bullied him mercillessly, via electronic platforms online, commmunity policing offline, and CVE provocateurs.
I hope this can help point you in the right direction.
I can be contacted here, if you wish more details.
Best Regards,
ROGS (my obvious nym)

Washington State, mind control documents, Fusion Center spying, police state bloggers, and GOD BLESS TECHDIRT.COM

DHS Fusion Center Gets Request For Documents On Extremists, Decides To Hand Over Mind Control Docs Instead
from the here’s-the-thing-you-didn’t-ask-for-but-will-probably-enjoy-reading dept

What  is  24-7 monitoring  of targeted  activists,  dissidents,  journalists, and  other  targeted individuals? Fusion Center  spying, the bizarre  quasi-Constitutional DHS/ICE/HSI  methods of secret policing, and the  NSA-Israel-FVEY data  theft  is de facto total  spectrum monitoring and  psycholigical  operations, aka mind  control,  by any  other name.

By  Tim  Cushing, of  Techdirt.com
Once you release a document to a public records requesters, it’s a public record, whether you meant to release it or not. The person handling FOIA requests for the Washington State Fusion Center (a DHS/local law enforcement collaboration known more for its failures than successes) sent Curtis Waltman something unexpected back in April. Waltman asked the Fusion Center for records pertaining to Antifa and white supremacy groups. He did get those records. But he also got something titled “EM effects on human body.zip.”
Instead of intel and assessments on local Antifa/white supremacists, Waltman found things like this:
And this:
The files did not appear to have been generated by any government agency, but rather collected from other sources who thought there might be some way the government could control minds using electronic stimulation or “remote brain mapping.” Why the Fusion Center had them on hand remains a mystery, as does their attachment to a FOIA request containing nothing about electronic mind manipulation.
This inadvertent disclosure has led to more requests for the same documents. Only this time, requesters — like Joshua Eaton of ThinkProgress — are asking specifically for government mind control files.
It appears the Fusion Center first thought about withholding some mind control docs, but somewhere along the line decided it couldn’t pretend the documents that weren’t supposed to be released hadn’t actually been released.
An email chain in the release [PDF] to Eaton contains an apology from the staffer who accidentally sent Waltman the mind control files.
Good afternoon Gretchen,
First of all I want to apologize the same way I apologize with my supervisor Lt Boyle and [redacted] I do not like to give excuses but I really sent this without intention when it was not responsive. I sent the original email to [redacted] with the attachments. I will try not make more mistakes…. Now, because of my error MuckRock sent another PDR. Sorry again for the situation and have great afternoon…
Gretchen (the Public Records Officer for the Washington State Police) tells the staffer not to worry about it. Apparently, sending the wrong files to requesters happens frequently, but otherwise, everyone is doing a great job, including the person who sent mind control files with a batch of extremist docs.
But that apology and forgiveness is preceded by the same staffer asking for another review of documents she already released to another requester, possibly in hopes of denying this release.
Erik,
[redacted] told me if you could review this. Mudrock is claiming that DHS did created this. I think I was not supposed to release this but it was public.
Can you help me what can I tell my Public Disclosure coordinator?
Sorry for the inconvenience
No response from Erik is included in the document so one assumes the release went ahead without his additional input. Now this requester has a copy of this email chain, something pulled from an internet “mind control forum,” and, inexplicably, the KKK documents released to Waltman in response to his FOIA request.
So, if you’re looking to obtain public records but don’t particularly care what records you receive, it appears the Washington State Fusion Center is a great place to try your luck.

Electronic implants, Wikileaks Vault 8, victims of organized gang stalking, hive mind, and honeypits.

ROGS loves the Constitutional guarantees of due process, and ROGS loves America. I am pathetic that way~the grand American delusion is so appealing.
(Vault 8 is an inside joke.)
BUT: The DVIC is actually a war on speakers and words, and without a doubt, the first amendment itself is the target of neocon and tribal, religious interests, now interfacing with the massive influx of Saudi, and other nations cash flows, and the media narrative.
I have been gang stalked since the DVIC was birthed into our lives in 1993 ( the exact same year when the Anti Defamation League was outed as a domestic spy ring that sold out American activists) and became severely gang stalked after I broke a nation wide story in 2003-4 about how America’s agencies manufacture terrorists by occluding access to civil rights and due process.
To journalists, researchers, and others interested in answering the many questions that are presented in the “bizarre” online dialectic of gang stalking, here below is how the CIA (and every other IC agency, private contractor, and the FBI) uses the term “electronic implants,” which describes covert hacking techniques, and plausible deniability in exploitation of targeted computers, targeted computer networks, and targeted individuals.
Without a single doubt, this is empirical evidence of CIA/other IC/NGOs operations on US soil, and anywhere else where OGS is taking place.
And it single handedly validates the inherent mission creep of the WOT redirecting and exploiting domestic targets.

UPDATE 10-19-2019: Almost two years after I wrote this post, and became active online, the ADL implicated itself as actually deploying military psychological operations on target individuals, using artificial intelligence software called Moonshot CVE, which had previously been used in theaters of war; and, perpetuating negative stereotypes of Jewish people as mind controlling Svengalis.

1570435771780
Electronic implants and gang stalking, courtesy of Wikileaks, and Julian Assange, who is literally being isolated, and denied visitation from other people as I write this. And, the American/FVEY deep state has worked tirelessly to force Ecaudor to revoke his asylum.
Isolation, you will recall, is ALSO a major threat/complaint/”delusion” of targeted individuals.


RELATED STORY
:I wrote about the HIVE in coded language long before this story below became mainstream news. The reader can infer that writing openly about such things is dangerous, and also, ROGS personal writing style is somewhat coded for reasons I have explained elsewhere.

The Hive mind in the gang stalkung dialectic online, from Wikileaks.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.
…………..
And-I hope the dood doctors like David V. James, and Lorraine Sheridan-and certainly Dr. Mike Wood, dont get to caught up in the echo chamber as wasps and bees of all kinds swarm them for commentary in these matters.
But OGS is very real, and puts MHCHAOS and MKULTRA to shame.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.