Gang stalking case study: Meet the Manfredonia’s of Newtown, CT!

First, we heard the name “Chris Manfredonia in the news, running around in the woods behind Sandy Hook Elementary school, and the, getting detained–in the FRONT SEAT–of a squad car, as the Newtown shooting was happening.

Then, we heard the name of his nephew, “Peter Manfredonia”after he went on a three state killing spree, targeting people who had accused him of stalking and domestic violence.

THEN came the arrest of that guys father, Robert Manfredonia, for sexual assault of a minor female.

But before those legal snafu’s, another Manfredonia was running Newtown High School.

Meet former US Marine, William Manfredonia, grand sire to the clan above, and ask yourself: do gangs of stalkers target children?

You can bet they do.

Let me know if you start seeing patterns in the data of mass shootings, ok? But be careful–“the experts” might call you delusional because you see patterns, whereas scientists, and “gang stalker profilers” like ROGS would call you “observant.”

Go over to Rebecca Carnes Newtown news site, the Newtown Rooster for more about that crime family–who were documented at the site of a mass shooting–and Meet the Manfredonia’s!

Ask yourself: who are the gang stalkers? What do gang stalkers do? And especially–do police know who these gangs are?

You bet they, because they work for them.

  1. And, as ROGS Analysis demonstrates, gangs of stalkers are ALWAYS current and former military, police, intelligence agents, their families, and their associates. See here for reference and actual evidence.

The limitation of harm principle in journalism, and shady journalists: Jody Murray aka Steven Murray of the Fresno Bee, caused activist John Lang’s suicide

Whats wrong with journalism? Well, for starters, journalists like Steven Murray, aka Jody Murray, aka “Jazz Mine” Murray, aka “Murray Murray” of the Fresno Bee are shady bastards.

Please, write him hate mail, or any other creative thing you can think of:

Jody, is no Gary Webb, thats for sure, as he sits in a sea of police corruption, and refuses to report on it, or investigate it. Here is just a glimpse of police and sherrifs department corruption in that area, and not a peep out of this coward about it; and what a shame on journalism.

Murrays works at the Fresno Bee include publishing police cock munching shit like this, and he was single handedly the precipitator to the police gang stalking related suicide of Fresno activist John Lang, who crusaded against ticketing scams that targeted the working poor by doing drive-by license plate reading in parking lots.

And, Jody Murray tossed journalism ethics right out the window when he fed John Langs IP address to dirty cops, who then targeted Lang with a years long gang stalking operation.

John Lang claims his story began in 2009 in the Fresno Bee regarding some comments he made from 2009 to 2013 about the use of FPD’s and Fresno’s Fire Department’s budget.

I am being targeted by multiple City of Fresno departments and the Fresno Sheriff’s Office for comments I made on the Fresno Bee from 2009 to 2013. Comments that were critical of the way Fresno PD and Fresno Fire utilized their budgets. My Disqus handle
during that time was “John21”. Posters on the Fresno Bee, using the then Disqus comment system were suppose to be anonymous. However, Fresno Bee employee Jody Murray shared Fresno Bee log data and ip address information with Jared L McCormick, a Fresno Sheriff Sergeant, who then used the Fresno Bee provided information to retrieve name and address information in order to maliciously track-down, stalk, and harass Fresno Bee comment posters, including myself.

McCormick’s Disqus handle on the
Bee was “Hikerdude1967”. I notified Jim Boren, the then Fresno Bee Editor via email on two occasions in 2013 regarding an employee at the Bee who was sharing website ip and log data of Fresno Bee commenters
with Fresno PD and Fresno Sheriff personnel.

I explained in these emails that as a result of Jody Murray’s nefarious efforts Fresno Bee commenters were subsequently stalked and harassed by Fresno Law Enforcement. I never received a reply from from Mr. Boren on either occasion. However, consequently, I have been made a constant target of
harassment, intimidation, and worse by multiple City of Fresno
Departments and the Fresno Sheriff’s office.

You can read the whole story here.

Below is more of Murrays contact info, from Radaris, and I publish this in the publics interest, but also, in the hope that actual harm comes to Murray’s life, and career, because this guy is the kind of writer who would write an Amazon blurb for “beautiful lampshades, made out of gorgeous leather! Look at the lovely butterfly tattoo pattern, each comes boxed with its own serial number emblazoned on it in tasteful blue ink.”

You know where to find me Jody/Steven/Murray Murray/Jazzmine Murray if you want to sue me for something or other, you pissant coward. But as we see time and again, ROGS never gets sued for defamation, libel, or slander, because what I publish is factually accurate, and legally defensible speech.

So, instead of court cases and lawsuits which call for discovery of these police tactics, otherwise known as “high policing” tactics and ideology, what we see is that police and FBI/DHS gang stalking has replaced contests of law with police stalking instead, a never ending assault on civil liberty and due process.

Gang stalking is the ultimate form of unconstitutional, but difficult to document “third party punishment” aka “stalking by proxy” which some Intercept journalists, and sociologist Alex Vitale have directly called police stalking, and also noted “the stalker state,” and it is what has replaced the rule of law in the west.

Lang did an excellent job filming and photographing his police affilliated stalkers, perhaps too good, so they stashed child pornography on his computer instead of charging him with anything after his years long stalking. The illicit porn deluge is indeed a new/old police state tactic, and was famously satirized in the novel Confederacy of Dunces, whose author, John Kennedy Toole also committed suicide.

With that in mind, anyone who is reading this post, I urge you to look into this journalist who goes by many names, and whose actions against John Lang directly caused Langs suicide. This is what is discussed online in the gang stalking dialectic as,“forced suicide.”

The principle of “limitation of harm” used to be taught in journalism classes, but since 2001, police and other intel agencies have been infiltrating college journalism classes and harming students in a sort of extreme vetting process, who are skeptical of official narratives, or do not take a pro-police stance in reporting. And they do that via non governmental organizations like the ultra-right ADL, Opus Dei, Campus Christian alliances, and the fraternal/sororal systems, but also the left wing K4 organizations have now matched these other citizen spy orgs, and perhaps surpassed them in recruitment, and police affilliated spying.

I was one such student who encountered these mechanisms nearly twenty years ago, and I encountered DHS and other agency stalkers just after I reported on the nations first manufactured terrorist in 2003. My colleagues, including notable award winning journalists who taught at my college called it a “Dick Cheney” problem then, as my computer redirected to unknown servers, as other students typed out their work with ease.

So, yeah, we know what it looks like when we see it. In that light, here’s more on coward and surveillance state collaborator Jody Murray of the Fresno Bee:

Steven Murray appears to live at the addresses listed below, and then, there are his relatives listed too (according to Radaris, it looks like his mother was an early breeder, having shit him out at the prime, ripe old age of sixteen or so.)Jody Murray is probably a mother fucker too.

Gee, I hope I dont get gang stalked by police, or get sued for this.

Steven “Jody”Murray Doxx:

8859 5Th, Fresno, CA 93720(559) 435-56393910 Beechwood, Fresno, CA 93711(559) 435-5639

3910 Beechwood, Fresno, CA 93711(559) 435-5639

Known as: Jody Murray, Murray Murray, S J Murray …

Related to: Joy Murray, 77 Teresa Murray, 75Thomas Murray, 74 …

Has lived in: Fresno, CA, El Paso, TX, Madera, CA

The number twelve (12) and gang stalking by intelligence agencies: the case of the Saudi dissident: child kidnapping, death squads, and 12 person teams

Canada’s National Post covers the story of a gang stalking lawsuit, where a twelve person team of Saudi Arabian intelligence agency assassins targeted Saad Aljabri, a high ranking former Saudi palace insider.

He is now suing them.

U.S. court slaps Saudi crown prince with summons over Canadian hit squad case

The summons lists 12 additional defendants who, dissident Saad Aljabri alleges, were involved in a failed attempt on his life
Tyler Dawson
Publishing date:
Aug 10, 2020

“Aljabri has been living in Canada since 2017 after fleeing his homeland following a palace coup. that saw bin Salman put next in line for the throne. Aljabri was the right-hand man of Mohammed bin Nayef, who’s the nephew of King Salman bin Abdulaziz Al Saud. Bin Nayef was deposed in favour of Mohammed bin Salman, making Aljabri a target for the new regime, a source close to the Aljabri family told the National Post earlier this year.

Since then, there have been numerous attempts to coerce Aljabri to return to the Kingdom, including the abduction of two of Aljabri’s adult children, who were forbidden from leaving Saudi Arabia.”

ROGS readers will note that I have discussed these twelve person teams many times, and in many places here at ROGS blog; and I have discussed how these cowards threaten to steal children too, as we see in this case.

Whats most important in cases of OGS however isnt that you are 100% correct in assessing the precise numerology involved but rather, that you have a general idea that it exists at all, because the difference between random crime, and other forms of stalking, is that most gang stalkers are “intellugence trained” meaning that they have trained in military, police, and other related fields.

As such, their levels of organization belie some interesting habits,one of which is the basic structure of their literal team “organization.”

This strange man, Gernot Ueblacker, who wrote to me about a fake kidnapping hoax, uses the number twelve in his liturgical entitled “Mornins Twelve Mafia,”, as do many others.

His father was,the famous Horst Ueblacker who designed the technology of the Eisenhower Tunnel. I suspect his “mafia” is a christian prayer group, with police and intelligence ties, and it was he who claimed that some group was targeting him with NSA Equation Group styled “electronic implants,sheep_dog_working_with_Da_Man” in his computer, and that he had tons of evidence, but couldnt produce it when asked.

* There was the case of my mysterious pair of neighbors who always seemed to arrive, and leave their apartment when I did; and my various ways of monitoring my internet revealed that pair monitoring my internet too, via a Motorola router, as I read a news story about Mahmoud Al Mabhouh’s Assassination by an Israeli hit squad in Dubai.

* That team mentioned above had 17 or 18 persons involved in the murder, depending on the source one could read at the time it happened, which is explained by the sort-of well known 5/12 configuration that you can see as in this story where former New York detectives discuss it in context to the Smiley Face Killer theory (that is an actual conspiracy theory with far less evidence than gang stalking).

It can also be glimpsed in the final count of the 12/5 or 13/5 team that was observed murdering Mahbouh on film.

Heres a Wiki on that topic,but by far, one of my favorite forums about that topic came courtesy of security guru Bruce Schneier; and also where we later saw the “team” grow to 26 or more.

* I discussed it in the case of the Mandalay Bay/ Las Vegas mass shooting too. In that case, a team of five that included Jose Campos cowering in a stairwell as Stephen Paddock allegedly shot up a crowd of key gun control influencers and country music fans.

In fact, I used the five person team configuration to develop ROGS Analysis, which is batting nearly 1000% in predicting key features of mass shootings, and other bizarre events like incel related car crashings, and butter knife weilding madmen, pawns in the manufactured terrorism events that fill western newspapers every week.

And, I discussed that five person team a lot in the case of Stephen Paddock, and you can use my search feature to fund other posts about that link.

* I used the number twelve, and also thirteen in several contexts all over this blog for a variety of reasons, none of which are that I am somehow obsessed with it, or that it as personal meaning to me, because it doesn‘t.

It does, however, have meaning to many who operate in policing and intelligence related environments, but also to media and crisis public relations fields. These types use that number to signal to each other online, as we saw with the author of the infamous gang stalkng hit piece called “They See Gangs of Stalkers.”

That author, Mike McPhate is entirely discredited (as is the NYTs ridiculous opinion pages, as we see with the recent welcome resignation of racist propagandist Bari Weiss), and we see his use of the number thirteen in a piece about actual gangs of police, ling after his smear against TIs.

Writing about that linkage would require an extensive, novel length explication, so read these ROGS posts about the thirteens and twelves instead:

* Propaganda and sensationalist news items frequently use the numbers twelve, and thirteen, depending on the targeted audience

– A main stream Jewish writer stumbles through Kabbalistic meanings of Order and Chaos, much as psychologists get stuck analyzing true delusions from OGS symptoms, or discerning apopheny from epiphany.

– An actual occultist, one of my rabid zionist cyberstalkers, who followed me on Twitter, and whom I later researched intensely after she started her schtick about “face orbs” and talking with the dead, is a former United States Air Force investigator from its OSI division, and she claims to belong to an actual USAF sponsored intelligence cult of 13 members.

I suspect that her cult has something to do with child abductions, and child abuse as we saw with the Col. Aquino scandals, but I dont have proof of that. In order for the ROGS readers to understand the threat that these types of people pose to targeted individuals, a look back at the Satanic Panic era, and specifically at the Presidio Satanic Ritual Abuse hoax, and Col. Acquinos response to his vile, and actual occultist, religious critics is an eye opener.

* Thirteen and spying is even tied together in the Jewish-christian books, bibles and Torahs too. Have a look at how its used in biblical spy activity. ROGS primarilly profiles Jewish-christian terrorists, so I dont know what the numbers twelve and 13 mean to sociopaths like the Saudi Prince in the story above.

On that note, yes, OGS is indeed bizarre, and I urge the reader to use my search feature for other posts about the numbers twelve and thirteen, because it is used as a sign and signifier in OGS cases, for a variety of reasons.

The number twelve in our case at hand is a case of Saudis, not our usual suspects from the Jewish-christian world, and will require more analysis on my part to understand its Arabian and Muslim context.

For now, heres more about the propaganda features of these numbers, from the kabbalistic, cultic, sectarian and oral traditions:

Chabad Jewish kabbalah, the number 13 which is related to the synagogue shootings, and police freemasonry/other poluce occult groups

What Are the 13 Attributes of Mercy?
The number 13 signifies the infinite. The number 12 signifies constraint and order: e.g., the 12 zodiac signs and the 12 months in a year. Above order and control, 13 connotes boundlessness and immeasurability.

And 12 from the western religious and gnostic, Knights Templars, and other occult symbology, the zodiac, months of the year, etc.:

The thirteens, spies, and gang stalking under the ATAP threat creation scheme: the biblical basis of spying, and black ops, related to mass homicide, and manufactured terrorism

As my avid readers have taken note, ROGS Predictive analysis is nearly flawless, even predicting two key features of the Virginia Beach mass shooting, where a man who had encountered DVIC high policing during his divorce shot up some colleagues after enduring an office environment where “pranks”included the use of the symbols of Freemasonry(and this was noted in the MSM) and also women from within the DVIC apparatus moving in next door to him; and with zero irony at this point, the number thirteen appearing in the murder stats, as I have frequently predicted, and documented.

So, once again, ROGS asks high heeled policing price -fessionals to get off their porky fat asses, and examine the link between how the Association of Threat Assessment Professionals is advising police departments to utilize hidden tactical stalking, surveillance role players, and military psychological operations (PsyOps )run out of Fusion Centers during their neverending weaponized investigations that target men who encounter the due process free DVIC.

In that light, to once again demonstrate how accurate my analysis is, lets take a look at one aspect of Israelification that resonates in every mass shooting that is predictably predicated by the above mentioned “collusion ”of police and community resource sharing utilizing high policing.
IMG_20191001_121608

Related Reading: American police and SWAT teams train in Israel, where they “become zionists,”according to mainstream news sources, and one of my own (protected) sources- who noted that SWAT team commanders are “politicians, not real cops.”

So, my reader should note that Israeli intellgience uses five person teams to perform black bag jobs and assassinations. This is also well documented in online publications, and in the MSM, as we see a botched assassination attemptdescribed in The Daily Telegraph.

Then, we see me, the author of ROGS, describing “five person teams ” working in Las Vegas, and seven months later, implicated in the Stephen Paddock shooting.

Why is the number 13 a nearly consistent number associated with many mass homicides, as early as the Columbine shooting, and used in headlines about the Pulse nightclub shooting, and in the recent Virginia Beach shooting where ROGS Analysis predicted key features of a mass homicide and also in the case of Ian Long and the Ten Thousand Oaks shooting, right up until more recent shootings? Start with biblical basis for tribal -religious spying, which leads to mass slaughters! ( and take a look at my most recent encounters with Brookings Institute affiliated cyber followersand actual spies and occultists who use the number 13

Tribal religious, sectarian spying, ARE the basis of mass homicides related to the number 13
Continue reading

Moonshot CVE, revisited: I ask the reader (and Mike "the ADLs stepchild” ) Masnick to revisit each, and every ROGS thesis about ADLification, redirection, and “Jewish mind control”-prove me wrong!

“Internet content skews toward the virality of controversy, polluting the marketplace of ideas with vitriolic speech. The Redirect Method actually improves the online marketplace of ideas…

According to Mike Masnick* the progenitor of the Anti Defamation Leagues new go-to internet rag, techdirt.com (and Svengali himself would approve).
th(10)
Let that sink into your brain a little bit. ….like poison, or a horsehair worm, infecting a cricket….ROGS will still be here, awaiting your analysis.
Oh, wait- that quote comes from the paranoid racist people at the Anti Defamation League, specifically defamer-in-chief, Jonathan Greenblatt, who has now acknowledged EXACTLY what ROGS has alleged ALL ALONG.
And, the language echoes Mike Masnicks comments in the linked posts below.
So, dont ask lil’ ol ROGS about the link between the dialectic of “polluting the internet, ” and the Anti Defamation Leagues(ADL) blackmail and smear streams (that traffic in negative stereotypes about Jews, as Svengali mind controlling wizards)!
Ask Masnick, himself, if lil ol ROGS is polluting the internet (whatever the fuck that means ) as Mike walks the plank between internet fact and fiction, in the case of the ADLs Jonathan Greenbacks v Free Speech online, because every ROGS,thesis,about the #ADLification of media, AND the hidden “high policing” methods being deployed on mass shooters before they go on rampages is validated here, as ROGS now affirms the toxic ADL being directly linked to mass shooters, and inciting mass homicides.
K4 manufactured terrorism has now replaced the KKK as a force of domestic terror, via the creation of the mass shooter through online and offline harassment.

RELATED POST: Look at how FBI/CIA/ADL affilliated neocon terrorist/manufactured terror creator Rita Katz shows up at so many manufactured terrorist events, as a person whose company has preemptively cyberstalked and harassed people who eventually become mass shooters.
Is any US law enforcement agency monitoring her? Nope: because theres no money to be made from that. Cops and alphabet agencies ONLY get PAID AFTER these manufactured terror events.

The Anti Defamation League, most known for practicing defamation, and paranoid “anti-semitic conspiracy theories,” now ties itself directly to EVERY ROGS THESIS about sick, sad, racist Jews practicing online psychological operations against those who they target, stalk, harass, and pre-emptively defame online (with Techdirt.coms Mike Masnick highlighted as a polluter of internet discourse, via following ADL boilerplate defamation tactics):
From Smolokos favorite shithole, the ADLs own blog, I bid the ROGS reader 小心, and I ask that you excercise caution when reading the radicalizing racist hate literature of the ADL, the SPLC, and their sattelute news outlets and enablers, be ause that irganization, founded by notorious gangster Mayer Lansky, has sponsored bombings, and stalkings and other US centered Israelified mayhem for the entirety of the last century into the current one; and has been implicated as subverters of democracy since they famously spied on activists in 1993; and, ROGS has linked them and their intelligence agency accolytes, and Jewish stalking, AND redirection repeatedly, here at this blog(look at my posts about this person who stalked me on Twitter, or these ADL affilliated stalkings, ranging from Ian Long, to Matt Riehl, and even the odd case of designer fake bomber Cesar Sayoc, and more .)
https://www.adl.org/news/op-ed/can-google-search-be-used-to-counter-white-supremacy
ROGS asks: who is better at ROMPER STOMPER BINGO, the alt-Right, or white Jews who masquerade online as Zionazis in sheeps clothing?….

Can Google Search Be Used to Counter White Supremacy?

We’re co-opting the online platforms that embolden extremists who fan the flames of bigotry and violent fantasies to stop them before they act.
by:
Jonathan Greenblatt, National Director of the Anti-Defamation League
July 1, 2019
This article originally appeared in The Times of Israel
From hateful speech on Stormfront and Gab to the harassment of rabbis walking down the street in Germany to recent deadly violence at houses of worship in Pittsburgh, Christchurch, and Poway, it is painfully clear how online radicalization truly endangers communities. There’s a bright through-line from online hateful ecosystems to in-person violence. In fact, the perpetrators of all three of the aforementioned shootings were inspired by what they read online and actively involved in internet forums where extremism thrives.
The stakes couldn’t be higher. We must deploy every possible tool — from both the public and private sectors — to aggressively tackle growing online white supremacy as the global terror threat that it can pose.
That’s why the Anti-Defamation League is partnering with Moonshot CVE and the Gen Next Foundation to counter white supremacist and jihadist activity online. The program, dubbed the Redirect Method, will use advertising to provide individuals who search Google for violent extremist material with content that exposes the falsehoods of extremist narratives, providing searchers the choice of an off-ramp to radicalization.
Targeting content potential extremists search for — rather than focusing, for example, on what they post to social media — can directly address their harmful online behavior and desires. By providing them with credible sources, we hope to decrease the impact of extremist content and increase the spread of the truth, such as, there is no one “European” identity that is under threat. In this way, we speak directly to those who may be at risk of radicalization, and we incentivize re-thinking those ideologies with accurate information.
While it is too early to tell whether this method works, there is early evidence to suggest that it can have an impact on what content people searching for extremist content are ultimately engaging with and viewing.
Moonshot and Google previously launched a Redirect Method program for ISIS-related searches, which found that those who searched for ISIS content were highly likely to engage with the more constructive, non-violent content that was offered. This led to several thousand views of constructive materials in place of searches related to Islamist extremism. Our new project builds on this success while pulling from ADL’s subject matter expertise in extremist codewords and unique insights to lead the project.
The data on extremism is clear: white supremacist threats are increasing. ADL research has found that of the 50 murders in the US committed by extremists in 2018, all but one were linked to right-wing extremism and 78 percent were tied specifically to white supremacy.
Technology has accelerated the speed with which this hate spreads. Extremists have leveraged the anonymity and connectivity of the internet to move out of the shadows and into the spotlight. They have developed sophisticated, media savvy strategies to circulate their messages and reach a wider audience than previously possible. No longer is this content confined to the margins of society, online platforms embolden extremists like never before by creating an echo chamber that fans the flames of bigotry and violent fantasies. The internet now makes it possible for round-the-clock white supremacist rallies.
Throughout the next year, we will run thousands of ad campaigns across the United States. We will harness the vast array of content that has already been created by local organizations and individuals. We expect the results to provide promising insights into how white supremacists engage with online content and how we can use commercial tools to empower positive messaging to influence their behavior before they commit acts of violence.
Some people might hear about this and raise concerns that it could inhibit free speech. In fact, the opposite is the case. Internet content skews toward the virality of controversy, polluting the marketplace of ideas with vitriolic speech. The Redirect Method actually improves the online marketplace of ideas, not by limiting any speech, but by ensuring that hateful propaganda and intellectually honest information are presented side-by-side. Individuals are always free to ignore online advertisements, but we hope the alternative content will effectively challenge harmful ideologies.
There’s more to be done in fighting hate from wherever it rears its ugly head, but this is a significant step forward. We hope the Redirect Method will inspire tech companies, governments, and international groups to join us in creatively tackling this challenge so that platforms that are meant to bring us together to share ideas will not tear us apart. Together, we can be a force for good that prevents the viral infection of extremism from spreading further throughout our digital world.
If you are interested in learning how to perpetrate a swastihoax on yourself, or study crybullying and #fakerape, contact these guys:

Anti-Defamation League
605 Third Avenue
New York, NY 10158-3650
(212) 885-7700
Contact Us: www.adl.org/contact
Tax ID/EIN: 13-1818723
© 2019 Anti-Defamation League. All rights reserved.
Svengali says: I APPROVE OF THIS MESSAGE
* Mike Masnick and Techdirt.com is one of the extremely few online places where free speech happens. Unfortunately, it is only 90% free, because any criticism of the spy network known as the “Anti Defamation League,” or its octopus of affilliates, including spy agencies like the Israeli IDF, or the Mossad; or Israeli rech companies that spy on Americans from Silicon Valley (like this withered old cunt that spied on me via,Twitter, or this pathetic example of a United Nations rat that couldnt even shoot a digital camera) are “VERBOTTEN!”

Proof of gang stalking: search language that describes it, or seeks to rebut the ROGS thesis by nit picking details

is willian binney a target of gangstalking
horn honking, hubbard
what is rogs community policing
kids sold to gang stalking groups
kids being used for gang stalking

Its WILLIAM Binney, for the spelling impaired…
Generally, no one wants the CIA or other intelligence agencies in their 屁股, but, hey, it happens sometimes, like it or not in our now fully militarized, and subverted domestic spaces, aka, first amendment protected *cough cough * places, its a reality that any American citizen can, and will be targeted by Israelified FVEYs militants online whenever they trigger the entrapment bells and whistles of the psychopathic new world internet order /s .
Far worse, is when we encounter gang stalking racist or sectarian nutcases and sordid scumbags online , who “talk to the dead,” or like this moron below who stalked me on Twitter, sending me hateful private messages that I am likely a serial mass murderer.
Like many others who work or retired from US military intelligence who ramble on about aliens,and UFOs, angels and sylphs etc., this one ALSO uses the number 13 as both a sign, and a signifier of their “gang ” affiliation.”
IMG_20190516_154617
Most of these online are frequently retired cops, and military personel, forensics people, behavioral psychologists and psychometrics assessors like Christine Sarteschi , all of whom are gang stalking denialists, and a main, core compinent of the question “who are the gang stalkers ” is: it is these types waging bizarre harassment aka OGS online.

Related Story: The Association of Threat Assessment Professionals (ATAP ) is on record linking gang stalking to their practice of “colluding parallel investigations ”where police, city officials, intelligence agencies, and community policing scum share data via Fusion Centers, and then, target the communications, and relationships of disdidents, activists, politicians, and even humble garbage collectors like Al Ditty, of Minneapolis, MN.

And here, look!
1557932406031
Twelve people clicked my “contact ” form just after I wrote about this intellence cult above, and named a name of someone who harrassed me during the 2016 election cycle. Gee, I hope I dont get gang stalked AGAIN by a military /police /intel agency /private contractor cult. And, of course, this has never happened before hete at ROGS, because I monitor my blog pretty closely.
Like Edward Snowden said, when he worked at CIA /NSA /Booz Allen, all he needed was an email address to wiretap, and monitor a person, 24-7
The next day, I got a follower from Kuwait, where various ex -military, ex -NSA /CIA types run black ops, working in capacities like this self described “bad kind of spy ”covered in the MSM.
1557984363924

Fuck. I hope “they, ”whoever “they ”are dont drop a drone on my kids school, or my neighbors wedding party.
So, because these days, our military bombs entire villages in order to target one dissident, and even American citizens, I have repeatedly asked Dr. Mike Wood, the author of www.conspiracypsychology.com if he is a gang stalking denialist or not, and if not, is he interested in rebutting anything herein.
Still no answer, of course, so I wont hold my breath.
This form of policing is part of what is called “high policing ” or secret policing, and American law enforcement, and their affiliated cults of intelligence, and hidden sectarian violent action has long hidden behind nebulous threat scenarios, and equally bizarre pretexts that target individuals who challenge, or refute christian and Jewish narraties of our culture.
Here, have a look at cult formation in action, as a former military mass communications specialist, Anna Conkey, who also happens to be an MSM reporterfor NBC gets framed as a potential terrorist.
anna-conkey

So, lets meet some highly organized gang stalkers now.
(and Dr. Mike Wood, if you are following along, pay close attention to the number 13, lol.)
Organized gang stalking is military and ex-military, police and DVIC stalking.
ROGS is a non -partisan refutation of the claim that organized gang stalking is some kind of delusion, according to partisan media like the New York Times, and partisan or tribalist, or sectarian agents of the deep state of the FVEYs nations, like Dr. Lorraine Sheridan, David James, and ponerolologist Christine Sarteschi, or this social work candidate (now graduated )Liz Dietrick, who hails from the lesbian capital of academia, Smith college , hamster faced Tomo Shitbata and so many more.
Even Otto Doer Zoeggers uses the number thirteen, lol, as he describes no touch torture, aka, harrassment of targeted individuals by sectarian, tribalist, partisan hacks and hackers who illegally and with impunity, cause mass homicides, and other mayhem with counter intelligence stalking.
Well: ROGS aint scared of cunts. Gawd knows I have tangled with my share and then some.
But womens calculated, institionalized militancy and violence is a much under-explored theme in academia. Its the reason de etre ’of our modern police and surveillance state, and, its surveillance capitalism too.
I was privileged to have been able to exchange emails with NSA whistle blower William Binney, who was harrassed, and defamed and pseudo investigated by the American political police and democracy suppression agency known as theFBI,et ass, after he was fired for upholding the Constitutional guarantees of due process that make America great.
Shortly thereafter he was able to meet with CIA chief Mike Pompeo about undisclosed matters, and, the phony Russia investigation driven by a Jeff Bezos narrative, and a Robert Mueller partisan swamp full of fascist alligators.
You can follow that timeline here:
* William Binney created an internet spy device/algorythm /spyware that cost tax payers 4 million dollars, protected our civil liberties, and due process, and that device which allowed Americans to stay one step ahead of its so called “totalitarian nation state enemies, by protecting civil liberties.
* William Binney was fired, just after he began to question why the NSA had decided to build a bigger, better 72 billion per year RAT trap to target Americans due process rights and civil liberties, such as rights of speech, assembly, and now more and more, the rights of journalists over their reportage and sources.
And now someone searches for whether or not Bill Binney is gang stalked? Alittle late for that, dontcha think?
But ROGS truly was the writing on the wall, back in 2004, when the ADL /AIPAC affiliated greasy college president ransacked my lil ’ ol ’ college newsroom.
And now, Techdirt.com cries foul, as a San Francisco stringer gets his house raided in an act of pure police state.
Anyone wanna apply for my Gary Webb award, which carries a one thousand dollar stipen, and a trophy of a pigs trough with the bottom chewed out ?
I promise, if anyone from the MSM picks this beat, Art Buchwald will rise from the dead and personally sign the award certificate, which I will grant to the awardee at the steps of the FBI building on Wilshire blvd, in Los Angeles, if you write about organized gang stalking, and call it by its proper name.
And, most importantly, always remember who your friends are. It is they who will keep you pointed in the right direction.
1557988280052
Because in an America that has gone full -blown secret police state, there is a lot of bullshit online about OGS, and, many police /military operatives flooding the dialectic with psychobabble and PsyOps.
You can decide for yourself what OGS is, or, take my word for it. But, I am putting my money on my Gary Webb Award For Excellence In Journalism, so that you, the reader can do the right thing.

Sol Pais: "a complete comedy,” courtesy of FBI gang stalking and another suicide: …BONUS BINGO: keep your eyes open for the "coincidental 13s”

Sol Pais, gang stalked from Florida to Colorado, commits suicide as FBI and local police stalk, manipulate her on social media, and monitor her from Fusion Centers.

Of all the things to write about, while being cyber-stalked by “community speech police,” that range from private contractors, to intelligence agencies, to FBI agents, handlers, and behavioral analysts, the young and beatiful Sol Pais became “infatuated” with the Columbine Massacre, according to FBI crisis PR agents, behavioral analysts, and other “handlers”of narrative.

Related Story: a story from the MSM, Denver Post news, describes how an FBI agents son directed the Columbine Massacre, with bonus 13
FBI agent Dwayne Fuselier downplays son Scott Fuseliers Columbine bloody, coincidentally homicidal film that was shot one year before the Columbine Massacre
By Howard Pankratz
Denver Post Legal Affairs Writer
May 13 – An FBI agent investigating the Columbine High School shooting whose son helped produce a video parody in which the school is destroyed says the film is a comedy and not a depiction of gratuitous violence.
Dwayne Fuselier also said the participation of his son, Scott, in the video, which was made more than two years before the April 20 massacre, does not compromise his ability to investigate the case.

“I’ve searched my heart and my soul for anything that was wrong here – that the kids (who made the video) should not have done,” Fuselier said. “There certainly was no evil intent. … It is a terrible irony, and they would never make that video again.”
Fuselier said he was speaking to The Denver Post as a “Columbine parent” – not in his capacity as an FBI agent. Scott Fuselier, now a college sophomore majoring in film and TV production, said Wednesday that the group of Columbine students who made the video “intended it as a complete comedy.”

So, ROGS,for my part as an investigative blogger, I would imagine that the fact that an FBI agents son planned, executed, and directed a movie at Columbine that directly mirrored the slaughter that occured one year later would become a little detail that would draw suspicion, or even “infatuation”.
Or, that writers who write about such things online, later get stalked across the country, and forced into suicide would ring a few bells in the “something is heinously and disastrously wrong with FBI gang stalking, aka ATAP “colluding parallel investigations” (and here, as we see Rotary Club cyber-stalkers like Hamish Brown of Scotland Yard strategizing with ATAP to occlude Fusion Center spying and the WWWwiretaphere too).
Well, RIP, SOL PAIS, and know that you are not alone in being a victim of speech policing, gang stalking, taxpayer draining FBI CVE programs.

Heres what the cyber-stalkers are Googling today(and,I get weird letters, part 2202): frances wilkes stone mountain targeted

They are also Googling the following [this is a rough draft post]:

ibm gangstalking
organized stalkers informant
sueing police an community for gang stalking harrassment
como se comunican los gang stalkers
ibm gang stalking
new mexico gangstalking
frances wilkes stone mountain targeted

Is gang stalking online and offline real? Who finances gang stalking? What happens to gang stalking targets?
DO NOT ASK FRANCES WILKES, formerly of Stone Mountain Georgia~ hes dead.
But, like many in the online/offline world of gangstalking, he encountered actual poison, which is one of the online threats that gang stalkers make to their victims, using para-language, and auto-antonymal language, and language cues, aka NLP.
Here are a few examples where discussions of poison take place associated with OGS,and often associated with one or another military/IC/police/domestic law enforcement hoax, or other “hidden,privileged law enforcement”function, and sometimes actual deaths:
1-the recent Texas hoax,that took place right in front of a police precints door, and is a proven hoax/lie/deliberate disinformation.
And,in another demonstration of how ridiculous gang stalking is, the number 13, Catholics, and Baptists are mentioned, and occultism is involved at the institutional level, as Americas religious fanatics are every bit as terroristic as any others.
2- Julia Davis, a DHS whistle blower who was targeted,literally, with dozens of investigations, and ACTUAL Blackhawk helicopters hoveringin front of her house (no shit-gang stalking is THAT bizarre)and a link to poison. Snd, the net result of those fraudulent investigations is that they discovered NOTHING except a whistle blower, at home, terrified BY state institutions.
3-the Mossad (who work in the US alongside US task farces, as well as feeding information derived from NSA switched networks that monitor US citizens to Fusion Centers; And also in SWAT teams at protests targeting dissidents),and their world-wide networks of “sayanim” use poison to assassinate people,in contravention of international law, and treaties, but so does everyone else in the IC,such as the CIA, Mi5, and Russia(it is equally likely that Russia poisoned its dissenters as it is any other IC agency, or banksters, for that matter.)
So, I did cursory research and found these things, which you too can research:
Wilkes and his family-line live in and around major KuKluxKlan associated areas like Florida,Alabama, Georgia, and even in interesting areas full of American jingoism laden lore,like Wilkes-Barre, PA.
And, there is also a link between people who collect Nazi memorabilia, and gang stalking by publicly financed police and fire persons, as I have demonstrated here, in this piece where we see military elements,police, fireman, and actual gangs WORKING TOGETHER in California.
And they have many mugshots,forpetty crimes,or self-abusive behaviors, and so on- exactly the types of targets that the One Percent holds up in effigy, to hide their own sickness, and degeneracy~ I mean whoever “they” are,this One Percent.
These areas also host other hate and propaganda groups, like the Southern Poverty Law Center, which hides Jewish racism behind “causes,”while exploiting black people with impunity.
The SPLC also sits like a WASP on a carcass of political PAC styled donations,and hosts a site where they monitor every form of “hate,” except their own,disguised as wealthy donors, and this form.of racism hides behind a huge money pot which is used for political influence operations, and media placements, while seldom,if ever, taking any serious court cases thatget to the SCOTUS.
I also discovered links to inter-generational poverty in the American south being exploited by all races, but primarily, that wealthy Jews and whites have had “dominion” over blacks there since slavery times.
So,in that light, and in the spiritof expising cockroaches and other verminon all sides.of Americas diseased rats in the social closets, and after the hacking of thisblog last month, I have newer, even more weird email “Pals”
Here, from today alone, someone who claims they will use my entire blog, sans copyright, without my permission (actually two.personas, one of whichsends alink to Criptex email, whichhas a laughable internet presence):

This morning at the outside 7AM meeting.. Amxxxxx’s name was mentioned. Account has only been up for 2 days. The two speaking were using the word Ambyr to describe something that could only be the color pink… With the “tone” of we have exposed “her” alias already. She’s been attending meetings just outside of the Bohemian Network and speaking sharing the stories of various 12_step related deaths and suicides as if they were still alive. She’s attempting to awaken sleeper’s inside of the circle.This has made the elder’s in the respond by gas-lighting and using mob-mentality and CIA/ICE/MS-13 counter-parts to stalk, threaten and bully her out of the rooms.

And here is persona number two which is actually the first that wrote,and whose name I have obscured above; and.note that these writers are connected to my criticism.of Americas totally corrupt polucing schema that.is directly associated with various sheriffs departments using OGS to garnertheir shitty communities some federal funds via the bloated DVIC/PIC pipeline.
also directly related to how police abuse people who are attempting to “get clean,” in cultish 12-Step Programs.like AA,NA, EtcA, none.of which are actually anonymous at all:
…….

Baltimore Detective Sean Suitor: another gang stalking death by “suicide.”

I am about to take a sh!t in the face of the Baltimore police commissioner Gary Tuggle (sounds like snuggle, but with tugs) and take a p!ss on the thin blue line like a free-speech green beret, because writing about police gang stalking can get people killed, and worse….:

Related: FBI initially refused to investigate Detective Suitors death by gang stalking, because it would open thePandoras Box of Panopticon-related electronic surveillance data available to any investigator.

Gary-do you mind if I call you Gary?-you are either a mobbed up piece of shit,or, your investigation into the alleged suicide of Detective Sean Suitor is a fraud.
And I am calling on journalists,and personal injury attorneys to investigate the following via FOIAs,and other means, because this is what gang stalking IS,and how it often ENDS:
Baltimore police commissioner Gary Tuggles investigation into the organized gang stalking related death of Sean Suitor is flawed.

Heres why:
The suggested outcome of police and counter-intelligence perpetrated gang stalking is always one of three well known options, and outcomes, stated in thousands of Talkshoe podcasts,Youtube and Vimeo videos, and thousands of blogs online, that of themselves, form a “threat narrative”:
1-the targeted individual will be driven to madness or phony mental health lockups, as we see with NYPD whistle blower Adrian Schoolcraft, and Pennsylvanias Andy Ostrowski, who brought attention to judges, social workers, CPS,and police LITERALLY selling children in a scandal called Kid$ for Ca$h.

2-frame jobs,set-ups, and parallel constructions of cases and alleged crimes or other charges that lead to incarceration is frequently threatened by the hidden gang stalkers online, (as we saw with the targeted incarceration after stalking ofthe man who filmed the Eric Garner homicide)and also by the hidden internet operations of the United States Air Force Office of Special Investigations, aka “OSI Informers,”, which is a notorious gang stalking operation, included and validated as an actual government-military-police operation/co-operation in Wikipedia, and online in thousands of online postings, blogs,and other media, and not incoincidentally, the Open Systems Interconnection model (OSI model) provides a technical templatewhereby corrupt institutional actors can utilize Fusion Centers, cell phones,and even police squad car GPS and cell phone towers to triangulate and locate every single bad actor who was at, around, near, or far from Detective Sean Suitor in his final days.
Did you query THOSE databases, Gary?
Did you check Suitors online presence, and offline emails for signs of blackmail, or compromise, in the days, weeks, months before this event?
I mean~some of us got that sort of local pork/DHS/Fusion Center/FBI/NGO/community policing blackmail for DECADES.
It seems that, in Suitors case, gang stalking woul be very easy to prove,now that we know how whistleblowers are monitored.
Because if you did, you would have found the most basic evidence-that Suitors phone was AT ALL TIMES connected to the NSA and the Panopticon.
Here is an example of the multi-layered model from Wikipedia whereby these institutional bad actors-most notoriously the FBIs Cowardly Due Process and Constitution Subverting Infragard, who are the exact politicized, sectarians most cited online as actual organized gang stalkers-redirect/switch/re-route/and spy upon citizens “24/7”
1280px-OSI-model-Communication.svg.png
~Mr.Tuggles- did your investigation of Suitors death include data from the 77 Fusion Centers that would have showed you ALL of the devices and web applications connected to Suitors phones?
Or the criss-crossing data points that would show you who was stalking him- I mean-you assholes use cellphone tower dumps all the time to catch all kinds of small fish, and guys with dime bags of weed-so, who was near Suitor in these hours? Who were THEY talking to?
But,Gary, heres a butt-simple version of what Infragard spies, working from Fusion Centers, poluce departments, law offices and and others who abuse our communications do at the local level: they “manage”us in our many electronic“instances,”by“monitoring” of our lives, and incidents, of course.

OSI management,from Wikipedia:

Management functions, i.e. functions that permit to configure, instantiate, monitor, terminate the communications of two or more entities: there is a specific application-layer protocol, common management information protocol (CMIP) and its corresponding service, common management information service (CMIS), they need to interact with every layer in order to deal with their instances.

3- Obviously, suicide is the most frequently suggested outcome f nearly ALL OGS that targets whistle blowers,and others who encounter gang stalking, and obviously, this is Mr. Tuggles official conclusion, despite unprecedented closing down of an entire neighborhood shortly after Suitors death, and unprecedented disinformation campaign run as cover, that ACTUALLY claimed witnesses to a scurrilous suspect that likely NEVER EXISTED and if there was anyone there, they would have been a witness(which is likely why the neighborhood was closed down in the first place.)
So, to the reader, the journalist,the personal injury attorney, and others who are aware of Detective Sean Suitors case, have a look at how incomplete Mr. Tuggles investigation was, in an era where the FBI routinely, and daily flies airplanes above Baltimore, and uses Hyper-spectral, push-broom thermal imaging electronic equiptment that can LITERALLY make a 3D model of you taking a shit in “the privacy of” your house.
Sure~nothing to see.here folks, mive along now.
No electronics or harassment at all, most conspicuously not in Mr. Tuggles “investigation”into the organizedgang stalking of poluce corruption whistle blower Sean Suitors death by curious suicide, one day before he wasto testify about police, racketeering behind the badge.
MooooOOOOooove along now, little sheeple- and dont forget to wear your high heels.
Related Story: Detective Suitors wife rejects the suicide theory.
Like most investigations of police and counter-intelligence gang stalking,all of the new tools and toys that these dirty cops use on citizens to “cut the victims throat with Occams Razors”, can also be used to investigate “strange” police whistle blower “suicides.”
Or, can they?
Is Panopticon just a one way street, littered with those who still recall what a democracy is, and the civilvrights and due process that it stood for, before the NSA-Spying on citizens took hold?
Final Analysis: What is the US Department of Defense Four Layer model?US Department of Defense Four Layer Network model?

Gang stalking fliers, Texas, police lies and disinformation, fentanyl hoax, the 13s, FightGangStalking.com

There are an incredibly few websites online that maintain a reputable narrative about organized gangstalking.
But: of those few, www.fightgangstalking.com is an opinion leader that manages to separate the dialectic into its necessary two categories of OGS denialists, and OGS victims, while creating safe space between obvious police and military influence/psychological operations like OSI informers:
So: the two categories of Organized Gang Stalking participants online are
1. gang stalking denialists, disinformation,misinformation, and psycho/sociopathic military and police, and NGO affiliated or crisis PR sponsored bullies, trolls, and hackers/harassers like this case here, or this one, and especially these examples here
2 actual, verifiable cases of organized gangstalking and actual victims who were hacked, stalked, and harrassed by any number of institution level slander campaigns such aswhen the “gay mafia,” and academics gang stalk dissidents, and or even murdered as we saw in the case of Mathew Riehl, an Iraq war veteran,who was framed as being mentally ill, ratherthanbeinga man who stood for Constitutional rights.
In that light, Texas police have inadvertently given actual victims of their illegal “high policing” tactical assault on dueprocess a boost: they appear to have waged an incredibly stupid media hoax, replete with the signs and symbols of Jewish-christian/cult unspecified, as we see again and again and again, these occulted police/intelligence agency and others use that number online to signal to each other.
Related Story: Organized gang stalking denialists, such as Dr. Lorraine Sheridan, and other trans-humanists frequently cite aninymous polls,.or reference statistics that they pull out of their asses, and the number 13 and the arbitrary “ten thousand,”appear frequently in their online work in media. Use ROGS search feature to find dozens of examples, or this one, particularly.
But dont take my word for it- ask FGS, whose blog has gotten some 400000 views since it has been around.
And,whose information and analyses borders on solid AP styled magazine type reporting,according to any and all reputable sources.
In that light, the ROGS blog-this one you are reading-has tossed the salad of journalistic ethics,and deliberately flaunts the rules,because writing live in a mirrored WordPress blogis.like writing from a live-fire zone.
And so, I lifted this story about Texas police, and gang stalking fliers, and fentanyl hoaxing entirely from FGS, because hesaid it better than I could:
July 6, 2018
The curious case of the Fentanyl flyers
When high-profile organizations and individuals call attention to unethical and illegal activities in the security and intelligence industry, it creates public relations problems for that industry. A good example is the campaign described in the June 13th posting below. Another is the support by professional athletes of the Black Lives Matter movement. Sometimes the damage is countered by apologist politicians and a friendly corporate press. Social media corporations also help by purging messages which are deemed excessively radical.
Some types of unwanted exposure get handled differently, though. Among the simplest and most effective ways to mitigate the damage from revelations, claims, and criticisms about corruption in the surveillance and policing business is to spread disinformation to discredit and marginalize those criticisms and allegations. Especially helpful, from the perspective of a subset of employees in the security industry, are efforts to associate all discussion of “disruption” operations (extreme harassment by public and/or private security goons) with being stupid, paranoid, and dangerous.
In reality, no one who is familiar with the clandestine activities of the security-intelligence business, and who is being honest with you, would deny that some government agents and private security operatives sometimes engage in long-term, undercover surveillance that’s combined with relentless, but mostly-inconspicuous, harassment. Links posted on this site feature several non-disputed, published news reports and official communications which refer to such matters. Call the practice what you want; differences of opinion and speculation among informed professionals on this subject would involve the structure and scope of such operations, not whether they exist.
Occasionally, as with the FBI’s COINTELPRO scandal, systematic crimes perpetrated by law enforcement agents and their private associates get exposed. The COINTELPRO revelations, though, required some exceptionally brave and clever citizens breaking into an FBI office and stealing secret files. In between such rare events – the Pentagon Papers was another – the public is mostly in the dark. But sometimes, things start to appear on the fringe of the media – curious references to “organized stalking” and such. And you have to wonder.
Some observations about leaflets: Because of their physical (non-digital) nature, (a) leaflets get noticed by the recipients, and (b) their distribution is difficult to interfere with inconspicuously. Further, because of First Amendment protections traditionally associated with leafleting, suppression of that form of speech can also be legally difficult. Consequently, paper and ink, even in the modern digital world, can be a perfect means to convey information about corruption. Although the scale of distribution – and the cost – is small, it’s highly disruptive.
Judge for yourself whether such motives and concerns were the source of what happened – or was staged – last week in Houston, Texas. Keep in mind that the website you’re now reading – like the website in this story – includes flyers intended to be printed and distributed to discourage, through public exposure, criminal harassment by corrupt cops and corrupt private security investigators.
Even without the benefit of social media promotion or commercial support, the website you’re now reading has been visited more than half a million times. Perhaps some people would be happy to see this site – and its tactical advice, such as advocacy of spreading flyers – discredited by associating it with a ridiculous disinformation website.
TV news reports on June 26th (KPRC Houston, Channel 2 and KRIS Corpus Christi, Channel 6), indicated – initially – that someone (or several people) had apparently distributed some flyers laced with Fentanyl – a drug far more powerful than morphine, and associated with numerous overdose deaths. The toxic flyers had been placed on approximately a dozen vehicles parked on the street, outside a Harris County sheriff’s station at 601 Lockwood Drive.
According to the apparently-official version of what happened, the notion that the flyers were laced with Fentanyl arose when a sergeant at the scene reported that she was feeling “light-headed.” She was taken to a hospital to get checked out. The initial reports were vague on how sheriff’s officials determined the toxic nature of the flyers, and about the medical treatment.
Aaron Barker and Jacob Rascon at KPRC Houston:
“The sergeant removed one of the flyers from her windshield and later began feeling light-headed, according to Harris County Sheriff Ed Gonzalez. She started driving herself to a hospital, but pulled over when she started feeling sick. A lieutenant met her and drove her to the Houston Northwest Medical Center.”
A website called “Targeted Justice” is the apparent origin of the flyers (the flyers can be printed from that website). This is their Twitter page. The document seems to feature diagrams of mind-control ray guns or something. If you’re interested, you can probably download it from them (whoever they are). The official photo of the flyers (below) was provided to the press, and posted on KPRC’s website with this caption: “Deputies released these images of flyers that they said were placed on some vehicles at a Harris County Sheriff’s Office facility June 26, 2018, in Houston.”
Official image
My initial reaction to this photo was this: Given America’s massive post-9/11 security spending binge, why do Harris County detectives have to take their evidence photos using a cell phone made in 2002? Maybe we should we hold a bake sale to raise money, so they can better equip themselves. On second thought, though, I decided that the image is appropriately obscure, given the whole nature of this incident.
A second observation about this story: A street in front of a sheriff’s office is a remarkably bold choice of location to anonymously place strange leaflets. The Google Maps street view of the address seems to confirm the unlikeliness of the area as a venue for radical pamphleteers. Also, the flyers were reportedly distributed in the middle of the day (approximately 1 pm, according to a June 29th update from KHOU Houston, Channel 11). If someone other than a cop had been there, milling about in very close proximity to the government vehicles parked there, that person would have appeared suspicious even if he or she were not distributing flyers about ray guns and such.
Another thought I had upon seeing this news: Since, in effect, we were being invited to believe that someone – or several people – apparently attempted to poison American law enforcement personnel – in an attack which also involved the distribution of strange flyers, presumably, the FBI is all over this – you know, because of that whole “terrorism” thing. Although the reporting made no mention of any federal agencies, I presumed we would hear something soon.
In the meantime, as reported on June 28th by KTRK Houston, Channel 13, the Harris County Sheriff’s Office responded promptly to the grave new threat posed by the Fentanyl-laced flyers. They tweeted the above photo of the flyer, on the day of the incident, with the following message:
warning tweet
KTRK reporter Marla Carter also recognized the severity of the danger:
The tough part for investigators is that it could have been anyone who printed and passed out these flyers. The only clues on the flyers themselves may be fingerprints. “Someone could have died. The fact it is now being used against officers is a game-changer,” said Harris Co. Pct. 1 Constable Alan Rosen.
Several other local law enforcement agencies are trying to stay on top of the game by arming officers with Narcan, an emergency treatment used for opioid overdoses.
The encounter with Fentanyl can be deadly even if found on a flyer and absorbed through the skin.
The same news report noted that “Targeted Justice” (whatever that actually is) acknowledged authoring the flyer, but denied any involvement in the leafleting in Houston:
The organization listed on the flyers, Targeted Justice, says it had nothing to do with incident. They believe that the flyers were printed off of their website.
So that might have ruled out a few possible suspects, but the dangerous pamphleteer remained unknown. Don’t worry though, because – surprise! – it turned out that the Fentanyl was fictional. A news update from KTRK Houston, Channel 13, on Friday, June 29th:
“After warning the public about flyers potentially tainted with the opioid Fentanyl, the Harris County Sheriff’s Office now confirms lab tests showed no signs of the drug.
“The Harris County Institute of Forensic Sciences tested 13 flyers and found all of them came back negative.”
“…In addition to testing the 13 flyers, the lab also tested clothing items, and blood and urine samples collected from the sergeant. Those tests also were negative for the drug.”
Here’s some additional good news: If you live in Houston, don’t worry about the technical skills of your law enforcement officers. The KTRK article helpfully explains that the mistake didn’t arise from professional incompetence (or the fact that the whole matter appears to have been staged), but rather, from “an abundance of caution.” I find it difficult to read that phrase without hearing it in George Carlin’s sarcastic voice.
The odd phenomenon of countless vague, paranoia websites, of which “Targeted Justice” is an example, is chronicled in detail in several places on the site you’re now reading. The trend ought to seem curious, by the way. Apparently, these websites sort of sprang up out of nowhere, and have proliferated like mushrooms, despite never being interesting – let alone credible. Did something get into the water supply?
Here’s a tip-off that someone is trying very hard to appear crazy. The image below is from the “Who to follow” section of Targeted Justice’s Twitter page. The glowing brain image is essentially an icon for “I’m a nut!”
Targeted Justice Twitter page cropped
Alternatively, an actually-crazy person is still at large, wandering around Houston and maybe distributing more flyers. Remember: this is also someone who can approach a sheriff’s station, for example, distribute pamphlets (or whatever), and depart unseen, in the middle of the day, like some kind of ninja. From the June 29 KTRK report:
“The sheriff’s office has not questioned any persons of interest in the case, and no criminal charges have been filed.”
For private citizens in America, the lesson of this story is that some security-intelligence officials appear to have concerns about the potentially disruptive effects of flyers which call attention to illegal surveillance and harassment.

Washington State, mind control documents, Fusion Center spying, police state bloggers, and GOD BLESS TECHDIRT.COM

DHS Fusion Center Gets Request For Documents On Extremists, Decides To Hand Over Mind Control Docs Instead
from the here’s-the-thing-you-didn’t-ask-for-but-will-probably-enjoy-reading dept

What  is  24-7 monitoring  of targeted  activists,  dissidents,  journalists, and  other  targeted individuals? Fusion Center  spying, the bizarre  quasi-Constitutional DHS/ICE/HSI  methods of secret policing, and the  NSA-Israel-FVEY data  theft  is de facto total  spectrum monitoring and  psycholigical  operations, aka mind  control,  by any  other name.

By  Tim  Cushing, of  Techdirt.com
Once you release a document to a public records requesters, it’s a public record, whether you meant to release it or not. The person handling FOIA requests for the Washington State Fusion Center (a DHS/local law enforcement collaboration known more for its failures than successes) sent Curtis Waltman something unexpected back in April. Waltman asked the Fusion Center for records pertaining to Antifa and white supremacy groups. He did get those records. But he also got something titled “EM effects on human body.zip.”
Instead of intel and assessments on local Antifa/white supremacists, Waltman found things like this:
And this:
The files did not appear to have been generated by any government agency, but rather collected from other sources who thought there might be some way the government could control minds using electronic stimulation or “remote brain mapping.” Why the Fusion Center had them on hand remains a mystery, as does their attachment to a FOIA request containing nothing about electronic mind manipulation.
This inadvertent disclosure has led to more requests for the same documents. Only this time, requesters — like Joshua Eaton of ThinkProgress — are asking specifically for government mind control files.
It appears the Fusion Center first thought about withholding some mind control docs, but somewhere along the line decided it couldn’t pretend the documents that weren’t supposed to be released hadn’t actually been released.
An email chain in the release [PDF] to Eaton contains an apology from the staffer who accidentally sent Waltman the mind control files.
Good afternoon Gretchen,
First of all I want to apologize the same way I apologize with my supervisor Lt Boyle and [redacted] I do not like to give excuses but I really sent this without intention when it was not responsive. I sent the original email to [redacted] with the attachments. I will try not make more mistakes…. Now, because of my error MuckRock sent another PDR. Sorry again for the situation and have great afternoon…
Gretchen (the Public Records Officer for the Washington State Police) tells the staffer not to worry about it. Apparently, sending the wrong files to requesters happens frequently, but otherwise, everyone is doing a great job, including the person who sent mind control files with a batch of extremist docs.
But that apology and forgiveness is preceded by the same staffer asking for another review of documents she already released to another requester, possibly in hopes of denying this release.
Erik,
[redacted] told me if you could review this. Mudrock is claiming that DHS did created this. I think I was not supposed to release this but it was public.
Can you help me what can I tell my Public Disclosure coordinator?
Sorry for the inconvenience
No response from Erik is included in the document so one assumes the release went ahead without his additional input. Now this requester has a copy of this email chain, something pulled from an internet “mind control forum,” and, inexplicably, the KKK documents released to Waltman in response to his FOIA request.
So, if you’re looking to obtain public records but don’t particularly care what records you receive, it appears the Washington State Fusion Center is a great place to try your luck.

The Cult of Bill W.'s AA revisited: gang stalking and the policing of anonymity as the National Sherrifs Association polices privacy.

AA,NA, GANG STALKING, AND THE HIDDEN HAND OF THE HIGHER POWER:YOU ARE NOT ANONYMOUS IN AA, OR ANY OTHER RECOVERY INDUSTRY CULT because the National Sheriffs Association and local LEOs, working under due process defying community policing schemes are always there to stalk you, or someone you know in “recovery.”
Bill W. aka Bill Wilson was both a proponent of LSD use, and documented as having occulted ties to both hidden western religion (occult ) and CIA programs of social control.

Read: AA and the occult and also this from the Guardian UK, about Bill W. and the well documented CIA LSD program

Follow this link to watch online terror stalking as they target several individuals.

POLICE USE AA AND NA, etc. MEETINGS TO GATHER EVIDENCE, OR WAGE PSYCHOLOGICAL COERCION, OR INTERROGATION ON TARGETED INDIVIDUALS WHO CANNOT OR WILL NOT BE CONFORMED/COERCED INTO THE JEWISH-CHRISTIAN NARRATOLOGY OF SUBMISSION TO HIDDEN BAD ACTORS AND OCCULTISTS, AKA “HIGHER POWERS”which most frequently are church and police affilliated Masonic lodges, such as Freemasons, Rotary Clubs, Lions Clubs, etc., all of which have been.implicated with solid evidence to “organized gang stalking. ”
Worse, judges, prosecutors, social workers and psychologists are indeed complicit in it, frequently deriving income and other sicial benefits from denying that gang stalking is, “real.”
Then, the multi -billiin dollar cottage industry of “recovery programs” work directly with those denialists, FREQUENTLY REQUIRING AA/NA/SA/ETC AA, as a term and condition of a persons freedom,  as a range of other “healthcare providers” derive billions too.

MANY ORGANIZED STALKINGS BEGIN WITH OCCULTED POLICE INVESTIGATIVE PRIVILEGE/SLANDER CAMPAIGNS, AND THE JUDICIAL, INSTITUTIONAL BLUR BETWEEN RIGHTS AND LAWS OF DUE PROCESS AND RIGHTS TO ANONYMITY, AND THE PSEUDO-THERAPY, PSEUDO -PSYCHOLOGY OF AA.

Related Reading: Mental health, mediated by those who cause law and due process defying disruptions in individuals lives. It cannot be forgotten that when.a, “gang of police ” murdered Ahmaud Arbery, the conservative Jewish -christian smear machine cranked up slanders in the press about his “mental health ”

How western police uphold the Jewish christian (and now, Islamic) mythology of God, G_d, Gawd, THE LAWD /LORD/Allah  and its variants of submission to hidden superstition oriented narrative of mental health, and victims of the hidden hand of gas lighting and privacy invasion by policing mechanisms that defy law and order.
Here is the National Sherrifs statement on mental health, via Policemag online:
http://www.policemag.com/channel/patrol/articles/2007/06/mentally-ill-subjects.aspx
OGS is widely recognized as having only two categories of discourse: OGS victims, and OGS denialists. It is striking to note that of these two binary groups, all OGS denialists are, in some way, direct beneficiaries of the DVIC money pot, while OGS victims are NOT beneficiaries of the DVIC money pot.
The researcher of OGS can easily find empirical evidence of this claim anywhere and everywhere onlune, or, just read through ROGS here, where you will find this scientific, falsifiable proof of OGS.
Then, we also see that Alcoholics Anonymous-like Scientology-sprang up just after the Federal Reserve displaced rural Americans, and eugenically targeted their families, during the 1930’s, and the Great Depression.
Related Story: AA Mobbing is “Bill W. on acid~ literally. Here is Bill W. droping CIA supplied acid, in the era of Frank Olson, who met his fateful end after “falling” from the 13th floor of a hotel, while doped up on acid, as a CIA handler sat next to him.”
Today, many sane people, and those who use reason to solve social problems, are calling these industries what they are: out dated models of cult/sectarian control of our society by the usual suspects.
And, extra points in your ROGS Bingo card for noticing that all of the mobbing, directed conversations, and other bizarre, repeated activity by police, occulted in gang stalking roles strangely mirrors the exact activities used in psychic driving.
Look around ROGS here for evidence that this is so, and also, that therapists all deny that gang stalking is real.

Blogger robboy39 said…
recovery is riddled with National sheriff association members as well as national citizens patrol association they are orginized and when they get your number due to step work or what not conversations you may have, they will turn your life inside out. The gassilghting is illegal and they ignor this it is wide spread. yes they will follow you in to all aspects of your life and reack havock by recurting persons to harass the target anyway possible. the first Narcotics Anonymous was held in a police station owned building this was not a mistake law enforcement has been stalking persons who attend these meetinsg for years.
Old timers as well as newcomers the opertives are diverse by design to build friendships and trust to intrap the target then in a moments time they orginize the group against a single person. i am a victom i am looking to build repor with other victims Robboy39 youtube.
9:36 AM
Blogger robboy39 said…
national citizens police academy alumni association and national sheriffs association lookthen up they are evil. they have harassed me for 4 years. they have broken many laws and need to be held accountable for thier actions……

….follow the links and connect the dots© in your own case!
AND:How deeply are OGS denialists involved in downplaying Bill Ws dabbling with CIA drugs and cult control?
Ask the addictionologists! (addictionology is a pseudo-science similar to ponerology,the study of human evil, lol.) This is how far Jewish-christians will go to mask their occulted religion in secular society.

Electronic implants, Wikileaks Vault 8, victims of organized gang stalking, hive mind, and honeypits.

ROGS loves the Constitutional guarantees of due process, and ROGS loves America. I am pathetic that way~the grand American delusion is so appealing.
(Vault 8 is an inside joke.)
BUT: The DVIC is actually a war on speakers and words, and without a doubt, the first amendment itself is the target of neocon and tribal, religious interests, now interfacing with the massive influx of Saudi, and other nations cash flows, and the media narrative.
I have been gang stalked since the DVIC was birthed into our lives in 1993 ( the exact same year when the Anti Defamation League was outed as a domestic spy ring that sold out American activists) and became severely gang stalked after I broke a nation wide story in 2003-4 about how America’s agencies manufacture terrorists by occluding access to civil rights and due process.
To journalists, researchers, and others interested in answering the many questions that are presented in the “bizarre” online dialectic of gang stalking, here below is how the CIA (and every other IC agency, private contractor, and the FBI) uses the term “electronic implants,” which describes covert hacking techniques, and plausible deniability in exploitation of targeted computers, targeted computer networks, and targeted individuals.
Without a single doubt, this is empirical evidence of CIA/other IC/NGOs operations on US soil, and anywhere else where OGS is taking place.
And it single handedly validates the inherent mission creep of the WOT redirecting and exploiting domestic targets.

UPDATE 10-19-2019: Almost two years after I wrote this post, and became active online, the ADL implicated itself as actually deploying military psychological operations on target individuals, using artificial intelligence software called Moonshot CVE, which had previously been used in theaters of war; and, perpetuating negative stereotypes of Jewish people as mind controlling Svengalis.

1570435771780
Electronic implants and gang stalking, courtesy of Wikileaks, and Julian Assange, who is literally being isolated, and denied visitation from other people as I write this. And, the American/FVEY deep state has worked tirelessly to force Ecaudor to revoke his asylum.
Isolation, you will recall, is ALSO a major threat/complaint/”delusion” of targeted individuals.


RELATED STORY
:I wrote about the HIVE in coded language long before this story below became mainstream news. The reader can infer that writing openly about such things is dangerous, and also, ROGS personal writing style is somewhat coded for reasons I have explained elsewhere.

The Hive mind in the gang stalkung dialectic online, from Wikileaks.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.
…………..
And-I hope the dood doctors like David V. James, and Lorraine Sheridan-and certainly Dr. Mike Wood, dont get to caught up in the echo chamber as wasps and bees of all kinds swarm them for commentary in these matters.
But OGS is very real, and puts MHCHAOS and MKULTRA to shame.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

Delusions, poison, bizarre claims, and schizophrenic narrative in gang stalking: the case of DHS whistle blower Julia Davis

Delusions, poisons, poisoning, discrediting, counter intelligence, schizophreniform disorders, and targeted individuals of organized-and Irgunized– gang stalking.
In what many psychologists describe as delusional complaints of targeted individuals of organized gang stalking, the facts in each case are strikingly similar, frequently bizarre, and then, in some of the outliers, we encounter claims that TI’s believe they are being poisoned, have been poisoned, or have been threatened with poison.

Related Story: Have a look at how Israeli spies work in five person teams, and use poison, in this story</ from mainstream news sources, and this wiki from Infogalactic describing these five person teams too.
Then note the correlation between the assassination described in my story below, and note how a “
five person team ” bungled/allowed /participated in the Las Vegas shooting, where Stephen Paddock shot up a crowd of key influencers.

And yes, many drug  addicts, and mentally  ill people, AS WELL AS POLICE AND PRIVATE CONTRACTORS, AND THOSE WHO WORK IN THE USAF OSI INFORMERS, claim similar things, and we see tens of thousands of references to it in forums like this from Medawarscornflakes, a blog that provides highly reputable and interesting content and analysis, particularly having documented how retired FBI and other LEOs utilize OGS in real estate gang stalking..
But the differences  are  striking when we examine the “onset” of these alleged disorders, and even more striking when activists, journalists, and others encounter OGS, as we saw in the case of Minnesotas Electronic Peeping Toms and Tinas, as agents and agencies used over 180 police departments to stalk and harass Minnesota MSM reporters in a massive gang stalking that ended up in court.

You see, many whistle blowers and activists like Andy Ostrowski, and Rakem Balogun are suddenly stricken with a severe case of Organized Gang Stalking, just AFTER they reveal institutional corruption, or outrageous government conduct.
And others, who are connected to intergenerational organized crime figures who are FBI informants or agency targets, like Stephen Paddock and his brother, also seem to suffer OGS.
For instance, there are many strange anomalies in the ever changing narrative of the Las Vegas mass shooter Stephen Paddock, and he also believed he would be poisoned, or had encountered programming or had suspicions that such was  possible. There are literally so many holes in that story  that it looks like a pair of headless, fat  pig legs named BUCK TOOTHED AMY , wearing  fishnet stockings, and high heels, and a red felt lined tinfoil hat.
Then,  there  are the cases  where  alleged autistics were  contacted online by unknown parties, and  then,  who exhibited disorders  related  to  germ phobia, or  other “advanced sequalae” of mind control-like operations online. Most  famous of  these is  perhaps the Newtown shooter, who, like  Paddock,  was  smeared  with  the  label  of  pedophile after the fact, and  with disappeared  hard drives  to boot.
Military Psychological operations(PsyOps)in modern policing, with Fusion Center monitoring of individuals

Indeed, there is even a well known case in Oregon (and I have noted repeatedly here at ROGS that OR and WA state have extensive connections to OGS complaints ) where police, and others worked to gas light a fellow so badly that he believes his wife poisoned him.
His wife eventually holed up with the local police department, and he apparently lost some real estate. Google “poisonedbywife””  and gang stalking” or “Terry Wagar and  gang stalking” for evidence in that case, which, much like the case of  Lawrence Guzzino, deserves a  second look for  any civil or criminal defense lawyer to understand OGS.

Related Story: private contractors like Gavin de Becker that work with the DHS and FBI CVE programs are using harmful psychological oerations on targeted individuals, as discussed here in the official literature of the Association of Threat Assessment Professionals(ATAP), and noted by private contractors like,Jack Palladino (an ATAP member) whose company acronym is Psops.

The evidence, and  the case studies of organized gang stalking are EVERYWHERE in the news now, as this  new thing,  High Policing, aka political policing has taken root, as the Domestic Violence Industrial Complex (DVIC) and its little helpers in the information sharing environment,aka nation state blackmail programs works its mythology ever deeper into American culture in a “soft takeover”of our country by lies and half truths; but especially through lop-sided story telling that started in the era of VAWA,1993.
Its for the children,  they  say without irony, as the same banking interests that feuledtheeastern blocnations takeover work their magic-and their state sanctioned child kidnapping rings here now; that these  types will  do  ANYTHING  for  the children-and  often,  each child  taken  in to  state  care  nets those who facilitate  that, a one million   dollar  paycheck,  as social  services,  psychologists, police and  others  derive  income  from  these  schemes, and the federal power of cash to states that swell their foster care factories has incentived this behavior in the pseudo-feminist, DVIC baby farming era. 
This form of venture capitalism used to be called slavery when it was racialized here, or “white slavery” in the eastern bloc,or in Americas peonage and prison system during the heyday if Americas growing prison industrial complex, but today it crosses all racial and political divides.
The  boogieman,  it  seems,  is  always lurking anywhere  EXCEPT  in places  where  he  gets  hard  dollars-or federal grants as  there are documented correlations  between  homelessness of  targeted individuals, and  gang stalking too.
Then, there is the strange, bizarre case where a DHS whistle blower, Julia Davis, who has helped uncover emerging evidence that one or another element of the socalled Hollywood  mafia (Haym Saban, forex ample, isan Israeli), and elements in  deep  state  policing is implicated in some way or another with poisoning actress Brittany Murphy, whose father is an old mobster.
Get out the  ROGS  BINGO card in these cases, because counterintelligence gangstalking is literally~ LITERALLY~designed to “cut the victims throat with Occams Razor”.

Related Story: Right wing nut, uberzionist, Muslim hater,and and foam mouthed attorney Debbie Schlussel wages a disinformation campaign about DHS whistle blower Julia Davis, with video.

To understand how bizarre gang stalking complaints are, one must understand how bizarre counter intelligence tactics are, and then, to understand how the testosterone/progesterone charged DHS works against due process, actively occulting its methods, and skirting or flaunting the law and due process every step of the way, as we see in their training materials released by The Intercept, that this is their stated objective. Have a look through ROGS here at their  massive pre-emptive real estate  and  forfeiture racket that uses sex offenders and prostitutes to target real estate- search terms DHS-HSI, real estate.
Or,  Google dead Ferguson activists, who have disapeared in mystery suicides where they manage to start thei cars on fire, after shooting themselves in the head  or Google Gavin  Seim  and  informants  to  see  how  deeply  Americas  social  fabric of dissent,  activism, and protest  is moled by people with  hipster tats  and tactical beards-and ask: when did  the  welfare  state  turn into  a police state?
Yup, it was  when  these  tatted up Hegellian soldiers of the DVIC were raised up between 1993 and the  full blown surveillance  state of today.
Then, one must factor in how agencies are currently competing against each other as Americas political police compete for CVE funds, and the extreme lengths these go to to literally create terror-as is demonstrated by the case of a DHS whistle blower Julia Davis, who was “investigated” no less than 54 times over YEARS of time, BY the department she blew the whistle on, and whose home was invaded with a Blackhawk helicopter.
The  keen reader might recall that claims of being followed by helicopters are deemed “delusional complaints”by people like Dr. Mike Wood, and Dr.s Lorraine Sheridan, David V. James,  and social workers Christine and Liz all of whom are OGS denialists, who believe victims of gang stalking should be isolated (isolation is seldom ever/ NEVER a good or legitimate therapeutic remedy for any mental illness documented ANYWHERE except in discredited mind control and torture psychology of the D.E.Cameron era).
But yes, this is one tactical  assault in the No Touch Torture paradigm-you dont have  to believe  me though,  cuz Im just one voice- Google the following case below, and see  what  you think of “full spectrum dominance”of an individual.
Or, see if there are connections to radical zionism, and Anti Defamation League ideological and tactical alliances with Israeli secret police, as we see in case after case, such as the San Bernardino,Florida,and New Mexico shooters~indeed, nearly ALL mass shooters are targeted by right wing zionists at some point,and the FBI is fully complicit with them,with the now fired former head of the FBI James Comey once noting that he was in a love affair with one of the most toxic, sectarian racist organizations in the US, the Anti Defamation League, stating that he exchanges “love notes” and dossiers with them; and this was stated in major media.

They See Gangs of Deep State, DHS,FBI,CIA,DEA,NSA Illegality, working in the Gray Area of Law, and spitting on due process rights at every opportunity.
The Bizzare Gang Stalking Delusions of former DHS  whistle blower Julia Davis: poisons, mystery deaths, helicopters, organized crime, paranoia, and aliens-Gangs of Illegal Aliens and al Qeada at the Border, As the Mighty Wurlitzer Plays the Mossads Greatest Hits

From Wikipedia, the BIZARRE  facts of a well documented DHS gang stalking of one of its own:
….Bonner was informed that Julia Davis was not under investigation, he directed Department of Homeland Security’s San Diego office of Immigration and Customs Enforcement to investigate and discredit her. In a matter of weeks, Davis was subjected to 19 Internal Affairs investigations (that number later increased to 54 investigations). Her newly appointed supervisor, who previously served solely in an administrative capacity, proceeded to target Davis, along with other Port management. When it became evident that the DHS management intended to drive her from federal law enforcement through malicious investigations, mistreatment and harassment, Davis involuntarily resigned.
Davis filed a lawsuit against the Department of Homeland Security, which was determined in her favor. Judge Daniel Leach ruled that the government caused Davis to resign involuntarily, since no one would be able to continue working under such deplorable conditions. Federal Judge Leach also ruled that the government engaged in “illegal conduct” against Julia Davis. Shortly after she prevailed against the DHS in litigation, the agency escalated their reprisals by raiding her home with a Blackhawk Helicopter and a Special Response Team, with a total of 28 federal agents armed with assault weapons. In spite of not possessing a search warrant, the DHS spent over 1 hr. 45 min. searching the Davis’ residence. Julia’s neighbor, Matthew Judd, videotaped the raid. At the young age of 25, Judd mysteriously died several weeks later.

So,  exactly how bizarre is  the  situation where  the  DHS  is unnaccountable,  and  works  outside  the laws of due process? Have a look at  the death of Brittany Murphy, and the link to Julia Davis:

The DHS falsely claimed that Brittany Murphy provided a statement to support one of the government’s 54 investigations against Julia Davis. Brittany Murphy formally refuted the falsehoods leveled by the DHS and issued a written rebuttal in support of Julia Davis. After being named as a witness in Davis’ litigation, the DHS/ICE attempted to deport Murphy’s husband (fiance at that time) Simon Monjack. Murphy and Monjack reported being wiretapped and followed, including aerial surveillance with helicopters. In 2009, Murphy died under suspicious circumstances. Her husband also died six months later. Brittany Murphy’s death is currently being independently examined through the efforts of her father, as well as Julia Davis and her husband.

 
Yup. Threats of poison is a real  feature of organized gang stalking under an Israelified narrative. The recent poisoning of a Russian Colonel in London, and many other examples of Russians poisoned in London, has cast new light on intelligence  agency involvement in poisoning dissenters, and deep  state IC targets, but  the lil’ Mossadi  Jihadi among us- and in many online narratives  involving “sayanim,” poison is a feature too.
The Russian Colonel, it turns out, was a source for the infamous and  slanderous Steele dossier, according to Newsweek magazine, which claims that the Russians are blackmailing the American President with films of prostitutes peeing on him.
For my part, I hope these imaginary whores in the  fakenews dossiere were, like many Russian and other foreign prostitutes, lovely, skilled, hygenic, and careful whores, whose busy, naughty bits are well trimmed, and scrubbed. And, like many Russian  whores, that their pee was little more  than filtered vodka, or champagne. Also, hoping that they cleaned up after themselves, rather than leaving gross sheets behind for an under earning maid to clean up.
And regardless-it is appalling how the perverse left/neocon/progressives on one hand, derive power from the  many  LGBTVWTF and all of the odd practices that go on there, like mommies  who neuter and pimp their sons and play  dressup,  or as replacements for a man in the house; or chopping off the tips of young boys penises (circumcision) to delight of lesbians who practice vaginal fisting, and menstrual blood/sperm/feces tastings that goes on in that community, and on the other hand, attacks an elected free world leader for an imaginary”Trumped up” golden shower. And then, there is the feature if those dirty, dirty tefilin fringes collecting bacteria and spreading it in every news story. Thats a bit gross too.
So, bizarre and devoid of due process  is what the New World Udder is, thanks  to whol internet data  capture  of  all  western  citizens: and targeting begins  there, along with blackmail schemes, real estate racketeering, corrupt cops trying to out corrupt each other-and due process of law totally in the pusser.
And so, American/western  police  forces are undeniably at a cross roads, charged with a peculiar religious  fervor, due to the fact that they are wined and dined, and shown the contents of GODS little black book (which strangely resembles the dossieres of Stasi East Germany, compiled by the ADL just as the  DVIC era  was  birthed in 1993) and during privately  paid  junkets  to  Israel,  where  the ADL  trains in Ich, DU “counter-terrorism,”whis  is  by  all educated  accounts,  the creation and  manufacture of terrorists, EXACTLY the way British and Jewish interests created terror there in 1948  and in Gaza today.
In case  after  case  after  case  of  mass shooters, we see several common features that are seldom analyzed in the press, due to the religious  bent of those who-for some reason-control western media. I mean- these zionist terrorists are even calling each other anti-semites now.
Here- have a look at an assasination- and keep in mind ROGS many  thesis, and the ROGS BINGO  card, and have a look at the use of a five person security team here in the case of Stephen Paddock, and also here, where I mentioned these five person teams many months befor the Las Vegas shooting):

Five agents of the Mossad, Israel’s external intelligence agency, were duly sent to Amman, posing as Canadian tourists. They ambushed Mr Meshaal on a street corner and sprayed poison into his left ear, inflicting instant paralysis and, so they hoped, death within 48 hours.
Then everything went wrong. The Jordanian security forces responded to this brazen daylight attack, arresting two of the Israeli agents and forcing three to hide in their country’s embassy, which was promptly surrounded by troops.
Instead of escaping over the border, the Mossad team found itself trapped in Amman. Mr Netanyahu was forced to send emissaries to King Hussein of Jordan to plead for their release. The king, who was dying of cancer, drove a hard bargain. First, Israel had to supply an antidote to the poison that was killing Mr Meshaal. Jordanian doctors duly used this to save his life.
Then Mr Netanyahu had to go beyond a standard release of Arab prisoners from Israeli jails. He ended up freeing nine Jordanians, 61 Palestinians and – most painfully of all – Sheikh Ahmed Yassin, the spiritual leader of Hamas and Israel’s most hated foe.
Only then did King Hussein release the five Israelis. Mr Netanyahu, trapped in a debacle of his own making, found himself supplying the means to save Mr Meshaal’s life and allowing Hamas’s old mentor to walk free. (Google  this story for links  to how terrorist are  manufactured, then  targeted  and  assasinated in Israel.)

So,  once again, in the spirit  of peaceful,  non- violent, Thoreau styled resistance, I once  again leave you, the  reader,  with a set of facts that you can validate  with science and empirical evidence. But threats  of poisonings are ALL OVER THE OGS DIALECTIC, which is itself a psychological operation.
And, kids, whatever you do- remember: if they want to  frame  you,  they  have ten  thousand ways  to Sunday to do it. But  be  awsre  that  this  IS  how  they  do it,  and  learn  to  fight back using  peaceful,  non-violent resistance.
That works, sometimes, in Democracies.
Further Reading:
The Death of Dissent, and the Birth of Our Police State:how the Anti Defamation League, a tribal-sectarian, racist organization began the modern police and surveillance state in 1993, as they were revealed to be spying on over 12000 activists and organizations, and feeding information to police.
 

Gang stalking and Electronic implants: Here is how the NSA uses electronic implants.

I first experienced an electronic implant in or around 2004-5. Computer implants are real, NSA and other agency break-ins to hardware and software are real, and documented in main stream news.

In case you were sleeping during the takeover of the United States by the so-called “deep state,”(and it might be noted that both left wing AND right wing opinion leaders agree that the deep state, aka criminal syndicates in government, are real. And, the Harvard Law Review documents debt bondage, a shadow justice system, and a bizarre “deep state” second tier of the justice system that preys upon the poor in the USA, aka the collusion between corporations, international finance and its hydra’s and Octopussies of NGO’s slopping the troughs of American police and intelligence agencies such as the FBI, the CIA and the DHS, as the NSA spies on all of us and trickles data out to Fusion Centers, here is one of the phrases they use online to distort the meaning of the phrase “gang stalking,” and to obscure their illegal actions:
They stuck “electronic implants”in me!!!!!
1575275037998
Electronic implants are very real in many ways, but not the way they are discussed in the online dialectic of OGS. In fact, the use of the term as a biological implant is designed to obscure other more real implants, because in case after case ranging from intellectual property theft BY the state or a subsidiary corporate, private intel gathering firms like Facebook, or the host of DHS/FBI /ADL “contractors” who stalk political targets, to major spy operations-all deploy malware, spyware, and electronic code to infect the cell phones, computers, and other electronics of targeted persons.
1575275037998
And surely as we see in case after case of mass shooters, we see long term agency involvement in those peoples lives as predicate for these mass homicides, and quite frequently, contact with zionism, FBI careerist shitbags banking on the unnaccountability of CVE programs and their accompanying “parallel colluding investigations” aka gang stalking,  and Jewish/zionist Supremacy in college settings, as we saw with the recent Texas cases, and dozens of others ranging from Stephen Paddock, to this guy here, Mathew Riehl, an attorney who himself ranted AGAINST Nazi’s and the Eastern Bloc Judenrate’s favorite go-to pundit, white females, before he was shot in cold blood in Colorado after invoking his Constitutional rights to be served a warrant before he is gunned down in his own home by Israelified “Ich, Du” Buberism and Hegel, in a steroid can.

Related Story: The Doctrine of Superior People-How a racist and actual Cabal of misanthropes murder with impunity, wage slander and disinformation, steal resources, control cultures, buy police forces cheaper than dime store drag queen lipstick, and get away with it, century after century-and blame it all on YOU!

And dozens of other well documented abuses of databases, and actual electronic snooping and hacking such as the Minnesota cases of reporters stalked by hundreds of NGOs/AIPAC/federal dollar/DVIC funding related stalkings- to cases of journalists like former CBS investigative reporter Sharyll Atkisson are sabotaged and spied on by political police (the FBI, DHS, et al are merely that), we do in fact see electronic implants as part of the illegal Constitution defying nature of the FISA court coup, the DHS sectarianism,  and the attendant cowardly conduct at the SCOTUS.
As I have noted, my personal circumstances indicate that I have been targeted by multiple cause based/ religion based/ and other stalkers for decades, because I defy their mystery cults and religions-but also because I refuse to be circumscribed by their un-Constitutional gray area policing methods, and have been a first amendment fighter and more for decades (Here’s lookin’ at YOU Phil!)
I first experienced an electronic implant in or around 2004-5, as progressive organizations and institutions ranging from colleges, to state agencies and their attendant database abuses worked to frame me/harass me/ implicate me/ cause me to be “flipped” as a useful idiot to their political causes, or otherwise charged criminally in a variety of ways.
There I was, sitting in a college newsroom, when the computer redirected, all by itself, as if a spell had been cast upon it! To Nazi-land!….an imaginary place created generation after generation by the SAME FOLKS, as international bankers create, and then gut local economies.
But what really mattered then more than anything, was that they attempted to defuse my activism by following me around with nebulously middle eastern photographers, and tried to neuter my ability to have political effect. And what an effect!
Only lately is MSM talking about how a militant, AIPAC financed zionist sect of rapists and baby killers has taken over our airwaves, and purchased our police cheaper than donkey-dick-meat in a Mexican strip bar. Its an actual multi-billion dollar industry,where some-like the famous case of the Jewish nazi Frank Collin play both sides of the drama,and get paid in each role.

Related Story: Why has the American Civil Liberties Union(ACLU)dropped so many free speech, assembly,association, and privacy balls in the last decades, despite having ample funding, and amplecauses to challenge FISA courtera NSA spying? The answermughtbe: the same answer we always come back to, which is “why is the case of Frank Collin~nee~Cohen, the famous Jewish Nazi of Skokie, IL,revered as a victory forfree speech, when so.many other cases(like prisoners reading materials) NOT heralded,or defended by this group?”

Well, at least Marcy Wheeler sees the utility of the word “targeted” now, and how it pertains to individuals, despite her emergent socialist bent (oh, those poor deluded young people, dont they know thatthey are useful idiots for the other four tentacles of the Bilderbergtopuss?…) And the Intercept-despite its ADL sponsorship, occasionally takes on organized gang stalking in one way or another-especially the manufactured terrorism parts of it, as these cases-case after case after case indicate that OGS is in fact a precipitator, and NOT a mental illness at all. Get out the ROGS BINGO card!
See the source image
And while this benefited a few people in the short term-like the bald headed AIPAC sponsored college president, a notorious AIPAC shill and an American Studies professor/rat whose favorite read then was “Blood in the Face” by notorious James Ridgeway ( a likely informant), and a handful of dirty cops whose testosterone outweighs their shrinking testicles- in the wider dialectic.
And, it revealed to me that the facts I put forward herein are true and replicable elements of how the political processes of America are entirely broken-but also how a lawsuit could begin to challenge these practices. I mean- a few militant armed American neo -Nazis/alt-Rightists/bad-guy-racists-du-jour (those who aren’t Jewish in the first place, like the famous Nazi of Skokie, Frank Collin, ne~ Cohen, or who aren’t working for the agencies, if any can be found) have NOTHING on people who can purchase the American police cheaper than trailer park trucker meth made out of truck-stop pep pills.
But actual electronic implants aren’t anything like what you read about online, and anything to the contrary is pure insanity. You see: agents of the state and its Israelified, racist, zionazi sponsored spy aparatizionazi sponsored spy aparati literally gave me a computer that phoned home to a local political precinct, several political organizations in a certain state, the local police department, and computer servers located curiously between a college and these various agency operated and  maintained computer main frames.
And THOSE main frames were situated curiously close to SEVERAL of the above named agencies. They were literally within blocks of each other, as is the case with most cities and towns across America. But, of course, much of the evidence of THAT disappeared in a burglary in 2009, which I have documented elsewhere.
Well- of course I sabotaged the crap out of their sooper seekrit recruitments, entrapments and implantations, much to their chagrin, and found friends who were less crappy than them. And here below is how they were using implants then, but only I and a select few others knew this, and many of those are now deceased, distanced and afraid, or otherwise co-opted. And, my discovery THEN is when the break-ins to my homes began in force as well, because I laughed in their faces, every time.

How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

“Equation Group” ran the most advanced hacking operation ever uncovered.

In an exhaustive report published Monday at the Kaspersky Security Analyst Summit here, researchers stopped short of saying Equation Group was the handiwork of the NSA—but they provided detailed evidence that strongly implicates the US spy agency.
First is the group’s known aptitude for conducting interdictions, such as installing covert implant firmware in a Cisco Systems router as it moved through the mail.

Second, a highly advanced keylogger in the Equation Group library refers to itself as “Grok” in its source code. The reference seems eerily similar to a line published last March in an Intercept article headlined “How the NSA Plans to Infect ‘Millions’ of Computers with Malware.” The article, which was based on Snowden-leaked documents, discussed an NSA-developed keylogger called Grok.
….read the full article on the NSA’s 14 year hidden domestic spy operation here.
Gray area policing, aka “high policing,” and Grayfish computer intrusions
<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

 
Well, anyways- for the researcher of organized gang stalking, the legal defense counsel or civil litigator who encounters the “gang stalking dialectic” or one of its many actual victims-and for the sworn *cough, cough* peace officers whose goal is to uphold our law and our Constitution-I suggest you have a read through that article-because now, other nations are peeking in here, quite routinely-and some of THOSE are peeking at you as you peek in at my writing.
And, for those who I have named herein-I suggest you keep your eyes open at night, because the moon near YOUR house will be getting brighter. A LOT brighter now.  Bright enough to encompass whole families.
Try not to see patterns, though….and maybe, watch your back, too. Apophenia, and all that kind of makes life hard, if you know what I mean. And certainly, that trick you played on Sharyll Atkisson wasn’t funny. Yup-I hear gang stalkers want to make you go broke fighting for your rights in courts that have deaf ears and blind eyes.

Six codenames

In all, Kaspersky has tied at least six distinct pieces of malware to Equation Group. They include:
EquationLaser: an early implant in use from 2001 to 2004.
DoubleFantasy: a validator-style trojan designed to confirm if the infected person is an intended target. People who are confirmed get upgraded to either EquationDrug or GrayFish.
EquationDrug: also known as Equestre, this is a complex attack platform that supports 35 different modules and 18 drivers. It is one of two Equation Group malware platforms to re-flash hard drive firmware and use virtual file systems to conceal malicious files and stolen data.
It was delivered only after a target had been infected with DoubleFantasy and confirmed to be a target. It was introduced in 2002 and was phased out in 2013 in favor of the more advanced GrayFish.

GrayFish: the successor to EquationDrug and the most sophisticated of all the Equation Group attack platforms. It resides completely in the registry and relies on a bootkit to take hold each time a computer starts. Whereas EquationDrug re-flashed hard drives for six models, GrayFish re-flashed 12 classes of hard drives. GrayFish exploits a vulnerability in the CloneCD driver ElbyCDIO.sys—and possibly drivers of other programs—to bypass Windows code-signing requirements.

<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

Enlarge/ The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code (“blue pill”, “red pill” – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly “swallows.”The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.

GrayFish is the crowning achievement of the Equation Group. The malware platform is so complex that Kaspersky researchers still understand only a fraction of its capabilities and inner workings. Key to the sophistication of GrayFish is its bootkit, which allows it to take extraordinarily granular control of the machines it infects.
“This allows it to control the launching of Windows at each stage,” Kaspersky’s written report explained. “In fact, after infection, the computer is not run by itself anymore: it is GrayFish that runs it step by step, making the necessary changes on the fly.”

Fanny: A computer worm that exploited what in 2008 were two zero-day vulnerabilities in Windows to self-replicate each time an infected USB stick was inserted into a targeted computer. The main purpose of Fanny was to conduct reconnaissance on sensitive air-gapped networks. After infecting a computer not connected to the Internet, Fanny collected network information and saved it to a hidden area of the USB drive. If the stick was later plugged in to an Internet-computer, it would upload the data to attacker servers and download any attacker commands. If the stick was later plugged into the air-gapped machine, the downloaded commands would be executed. This process would continue each time the stick was switched between air-gapped and Internet-connected machines.

Kaspersky Lab

TripleFantasy: A full-featured backdoor sometimes used in tandem with GrayFish.

Want to know the real reason the “deep state”(aka AIPAC sponsord organizations, racist sectarian political factions that hide behind NGO’s, and of course, every other American “law enforcement agency”  is at war with Kaspersky? Read the full article!But I for one, am not scared of the Chinese, or the Russians taking over anything.
Hell, I will show them to your door;-)
Related Story: That time-just that ONE-where I was approached by someone from Vegas who knew about these hacks, and wrote to me here at ROGS.