‘Mind control’ experiences on the internet: Vaughan Bell et al., and “psychologists are complicit”: Psychopathology and gang stalking, delusions, the redirect method Moonshot CVE, and racist hate groups alter our choices online

Non governmental organizations (NGOs), governments, police and intelligence firms, corporate interests, and even sectarian and religious and hate groups like the Anti Defamation League (ADL), with its tentacles in the NGOs and their related industries are using non -consensual, unethical ,and possibly illegal “middle man attacks ” of web browser searches online to target people they dont like. And, those online operations come offline too.

Related Story:  CAIR Los Angeles sues the government for disclosure about how LA is spending the $425,000 government grant allicated for “countering violent extremism (CVE )” programs. These programs include onlune and offline “redirection and disruption ” of individuals who fall into these targeting programs.

These religion based hate groups and their compatriots in the altRight, a hodgepodge of occulted religious orders working through activist circles, police, intelligence firms, and private contractors aka DHS /FBI/Mi5-6 private contractor spies are employing(deploying ) varying levels of “extrinsic religion ” as we saw with former FBI director James Comey and his allegiance to theologian Rienhold Niehbur; and  using programs like Moonshot CVE, and the Palantir octopus of “predictive policing” technology and internet monitoring “tools” to “target individuals” and whole demographics with non-consensual “internet redirection”online, based on Google search language; and then, its associated unconstitutional “proactive policing” offline.

This “redirection,”and military “psychological operations ” waged against non-consensual subjects is what “mind control” actually is in the extant literature, and by definition and an example of what is commonly known as a, “black program,”in military and intelligence circles, and in these dangerous, mind manipulating black ops, we now see them privatized, wholly unaccountable to anyone .

Related Story: anti-Muslim bigot and terror manufacturer Rita Katz and her gang of intelligence /security thugs pops up at the site of many strange mass shootings, and other mayhem both BEFORE and AFTER,these events, almost as if she had written the script: Search ROGS for cases yhat examine “mind control”, strange internet happenings, and the terminology or weaponized use of of pornography.

And, these corporate operatives, police, and others like British Intelligence (GCHQ-JTRIG) widely use internet forum infiltration, hacking, redirection, and more to manipulate speakers, cyberstalk, harass, defame, and otherwise “control” people and their choices too.

Psychology and the quaint, pre-internet, pre-redirection, post “free will” internet, and post-MKULTRA era notion of “free will”

The average citizens chances of encountering “spies” used to be nearly impossible, whereas today, the chance of “average, normal people” encountering spies and their assets is a 1/30 chance, EVERY DAY, according to the numbers on the rosters of US based security industry, intelligence, and policing agents, who act in hidden capacities online and off. That means  there is one security /intel /police agent per US person, compared to the general population, and that number does not include retired police and military agents who are still active in organizations like ATAP, LEIUs,  Citizens on Patrol, or the often cited anti -democracy FBI -Infragard.

The anti-democratic FBI Infragard is behind every internet switch, using cowardly police state, Fusion Center monitoring and provocateur manipulation of real-time conversations on social media, and more to alter, redirect, and otherwise “influence” the minds, and choices of individuals that they target online.

And then, after that, comes their offline, real time harassment of activists as documented by the ACLU, dissenters, and first amendment speakers. Like this, for example. 

So: Why do psychologists resist using the term “mind control” in discussing the above mentioned psychological manipulation of targeted audiences, and targeted individuals? Is it only because the APA squashed the research into that topic in the 1980s, or that they are deliberately stuck in the past, struggling over the legitimacy of not just the legitimacy of claims of mind control, but especially narrative control, post MKULTRA, and at the height of the Ronald Reagan/Edwin Meese-pornography and Moral Majority era?

From Wikipedia:

  • Dualism makes the problem insoluble; materialism denies the existence of any phenomenon to study, and hence of any problem.

The short bus answer, is that psychologists are simply and often deliberately out of touch with the reality of the internet and its hidden speech police, as we see with Dr.Lorraine Sheridan, Vaughan Bell, et al., but also focus on the following examples of gang stalking denialism by Vaughan Bell, et. al. because these were written at exactly the time that the US -FVEYs were actually torturing human beings in Iraq, and imprisoning-and drugging – men in Guantanamo Bay Cuba, which many argue is a mere ectension of MKULTRA programs providing torture porn to people like US vice president Dick Cheney.

Laypersons, public relations industry persons, sociologists, movie script writers, and others call these types of targeted “non-consensual alterations of human perception, aka perception management” mind control because the targets dont have a “choice” in these matters. And its at this juncture where we can make educated guesses that anyone who calls targeted, non-consensual internet experiences anything other than “mind control” is likely getting research grants from government or other “vested” resources.

So, lets examine gang stalking denialism from the perspective of the related concept of mind control denialism.

Psychology has almost always been nearly junk science, because its purely subjective* and relies heavily upon the subjective opinions and diagnoses of biased, non-objective, primarily white christian and Jewish observers.

As such, it is an inneffective tool with which to analyze delusions in any form other than the white Jews,and christians who adhere to those “beliefs ” and the exigent religion based societies that enforce those beliefs, as this analyses relies upon cultural observers who themselves are denying the experiences–and story telling conventions and traditions– of the other two thirds of the worlds population.

But also, because it is entirely subjective, not objective in the clinical sense at all, because of that glaring Jewish -christian bias inherent in the research at its foundations.

Lets look at a few of the infamous Western Holy War era psychological studies that sought to “question” the narratives of people who had claimed mind control experiences online, what some studies called MCEs, and correlate these studies with the well known and oft repeated gang stalking memetic, that “psychologists are in on it,” which they generally are, bbased in what they read(such as these studies below), and their strange belief systems, like the,absolute “good” of government funding.

So, ROGS,asks: is the “government” part of some “conspiracy” to deny the ample evidence of “non-consensual redirection and psychological and influence operations,” stated above (and stated in millions of internet and MSM sources too)?

Lets ask the US National Institute of Health, and the National Library of Medicine about their “mind control denialism” study from 2006, and a few others, and, as usual, ROGS asks you, the reader to decide for yourself. But also, if your lawter, shrink, parole officer, medical doctor, social worker, etc. says you are “delusional”, point them here to these junk science papers, written by pseudo-scientists, aka psychologists:

Comparative Study

‘Mind control’ experiences on the internet: implications for the psychiatric diagnosis of delusions
Vaughan Bell et al. Psychopathology. 2006.

Abstract

Background: The DSM criteria for a delusion indicate that it should not include any beliefs held by a person’s ‘culture or subculture’. The internet has many examples of people reporting ‘mind control experiences’ (MCEs) on self-published web pages, many of which suggest a community based around such beliefs and experiences. It was hypothesized that some of these reports are likely to reflect delusional beliefs and the hyperlinks between web reports were likely to show evidence of social structure, demonstrating the ‘culture or subculture’ exemption to be increasingly redundant in light of new technology.

Sampling and methods: Texts from web sites reporting MCEs (n = 10), experience of cancer (n = 10), depression (n = 10) and being stalked (n = 10) were identified, and were blind-rated by three independent psychiatrists for the presence of delusions. Hyperlinks from web sites reporting MCEs were used to create a network structure; this was compared with a size-matched, randomly generated network and known social networks from the literature using social network analysis.

Conclusions: The sampled web-published accounts of MCEs are highly likely to be influenced by delusional beliefs. Social network analysis suggests there is significant evidence of an online community based around these beliefs. The fact that individuals can form a community based on the content of a potentially delusional belief presents a paradox for the DSM diagnostic criteria for a delusion, and suggests the need to revise and revisit the original operational definition in the light of these new technological developments.

Heres a few more moldie oldies from the War on (manufactured) Terror era of endless money spent on junk science and psycholigy to justify that illegal war, and likely beneficiaries like Vaughan Bell:

Bells pre-masterpiece of fraudulent (or merely uninformed and pandering)junk science, pondering “delusions” that the governments of the western world and their propaganda agents are manipulating our online experiences:

‘Internet delusions’: a case series and theoretical integration
Vaughan Bell et al. Psychopathology. May-Jun 2005.

Heres some other crackpot junk science pushing shrink from that era too:


Why do people with delusions fail to choose more realistic explanations for their experiences? An empirical investigation
Daniel Freeman et al. J Consult Clin Psychol. 2004 Aug.

ROGS CHALLENGE: ROGS,dares,any and,all gang stalking denialists, and mind control deniers, and “internet delusions” espousing psychologists, therapists and others, to refute the evidence above, that proves definitively that “psycholigists are in on it,” fat as rats, and thick as thieves.

* Subjective, meaning that most diagnoses of various “mental illnesses” ranging from personality disorders to delusions, and Type 1&2 errors, are largely derived from Jewish-christian culture and its flawed, biased, incentivized cultural observers.

So, while issues like physical brain damage, Alzheimers, aneurysms, and other “organic” brain disorders have observable effects,and affective symptoms, backed by actual science which can be analyzed using the scientific method, issues like “delusions,” or ratings of narcissism, schizo-affect, and other western gibberish have less than scientific interpretations, are wholly an opinion, and are not consistent across cultures.

So, organic brain disorders are observable across cultures, and separate from so called “mental disorders” based in some square pegs opinion about cogs in wheels.

What is Level X thinking in the gang stalking dialectic? Revisiting the Cuban “sonic attacks ” with new evidence

Level X thinking, gang stalking, electronic devices, delusions v. Level X thinking

Because the modern world is overrun with mercenary security contractors, intelligence agents, and police agencies that defy constitutional law, there is always uncertainty, by design of the conditions of the modern police state, and that state defined by secret control, such as Fusion Centers, FVEYs world wide spying, and the hidden tactics of the innocently named tactics of “community policing.”

So, while we have been taught as western people that nations like Cuba are “totalitarian police states,” we have sat idyll as our democracies were overturned by undemocratic NSA spying, that leaks out across our nations and the world into hidden forms of police brutality that have yet to be defined.

What is a police state? Wikipedia gives us a few clues:

“The inhabitants of a police state may experience restrictions on their mobility, or on their freedom to express or communicate political or other views, which are subject to police monitoring or enforcement. Political control may be exerted by means of a secret police force that operates outside the boundaries normally imposed by a constitutional state.”

All over this blog, you will find empirical evidence that in fact and practice, my country, the USA, is no longer a democracy, but a police state by definition, particularly in that its domestic spying on.its citizens is occluded from our view

So,

Related Story: There is nothing democratic about modern due process violating “parallel colliding investigations.”

The origins of undemocratic and unconstitutional policing is disguised as “Countering Terror through Community Intelligence and Democratic Policing.” How police agents and agencies make work for themselves is the exact opposite of democracy, and modern western democracies policing tactics fit the exact definition of “what is a police state? ”

The suit alleges the Canadian government failed to properly inform, protect, treat and support the Canadians.

“Throughout the crisis, Canada downplayed the seriousness of the situation, hoarded and concealed critical health and safety information, and gave false, misleading and incomplete information to diplomatic staff,” the suit alleges.

During the past few years, the lawsuit contends, Canadian diplomatic families in Havana “have been targeted and injured, suffering severe and traumatic harm by means that are not clear but may be some type of sonic or microwave weapon.”

The brain injuries they’ve experienced, similar to injuries suffered by American diplomats posted to Cuba, are now known as Havana Syndrome.

Fire Departments and gang stalking: its not a delusion when thousands of people search for that information

Gang stalking, following, fire truck, fire fighters, ambulance, EMS, sirens, gang stalking

Police and fire unions are frequently cited as being gang stalkers.

img_1487

This blog you are reading frequently gets asked (by internet search engines) “Why is the fire department driving by my house every day,” or “fire trucks following me everywhere,” and “gang stalking and fire trucks,” etc.

Theres even a blog written by a woman named Bonnie Calcagno, who lives in Oceanside, CA, about ONLY that, and she documents it pretty good. Her story is that she crossed paths with some firefighter prick in New York, and the shitbag filed a malicious Suspicious Activity Report (SAR), and then, her gang stalking then followed her across the country. This really is what these shitbags do.

So, tens of thousands of Google or other search engine results indicates that this is a common question in discussions about gang stalking, as we also see in the many excellent description of police and firefighters gang stalking each others during election years, and gang stalkung targeted individuals year round, and members of the public too, who challenge their triple -dipping pension fund schemes.


“Do fire fighters gang stalk people?”

You bet they do. In fact, one of the most famous cases online, the case of Rick and Lucinda Krlich indicates that gang stalking by corrupt fire departments is indeed a “thing.”There story was featured in one of the big three media outlets (I think it was CBS television).

(you can use my search feature to find stories about that, and also another story covered in the major media, that of Stockton, CA city manager Bob Deis, who was gang stalked by the police and fire unions).

But there is help for victims of gang stalking if victims are willing to help themselves: all fire trucks and EMS (and police)vehicles have onboard tracking devices, that data is public information, and citizens can access that data with a Freedom of Information Act (FOIA) type of request.

While FOIA applies to federal agencies, states use various different names for the FOIA, so contact the “information officer” at the city where you are being gang stalked, and ask them what form or webpage link you must use to file your request for data. Be clear that you seek to file “an FOIA type of request”. This might be called a “data practices act request,” or similar name.

And do not mention gang stalking, or anything else. Your goal with the information officer is simply to get data. Its better if you request that in writing, in case they jerk you off about it. So you must know what data to ask for.

Here are a few stories that you can read to discover what the names or general language you will need to use as you request this information:

Fire trucks use onboard GPS vehicle tracking

Many of the medical supplies, and other gear on a fire truck or EMS vehicle have RFID tracking chips on it.

And heres more about actual tracking technology from How Stuff Works online.

Lastly, remember: these people can be held accountable in many ways, and you can even track them too, because their names, pay grades and more are public information. You can even shoot photograph of them like this example here, and all their equiptment, their trucks and more.

You can shoot photos of them as if you would shoot photograph a park bench, or a fire hydrant, because they are like public property.

While I dont recommend it, you can even follow them around if you have the time. But be prepared for them to call the police, and if the police come, tell them that you are “observing how your tax dollars are being spent.”

Its your right.

Molson Coors Milwaukee shooting and Anthony Ferrill: classic gang stalking, by definition. Its a ROGS BINGO

One only need to read three paragraphs of the story about the Milwaukee Molson Coors brewery shooting to declare it a PERFECT ROGS BINGO:

* the shooter was targeted at length by private investigators who were working a weaponized investigation whose pretext was that he was cheating on workers comp (a common charge directed at people who have suffered OTJ injuries, and an especially common smear of African Americans and other slave-classes of people as *lazy* since the beginning of slavery into today)

* workplace mobbing was involved, that included so-called *pranks*(the Virginia Beach shooting included *pranks* that used Masonic symbolism)which are actually properly called “workplace harassment.”

* the victim complained about mysterious break ins to his home and office (a common complaint in OGS, so common in fact, that I made a meme for it, from a photo in my personal archives of a black bag job at my own home)

* these actual events, that actually happened coincide coincidentally with the psychiatric definitions of a delusion

You know you are definitely NOT delusional, when you capture a black bag job on a hidden camera at your house:

1564328132878

About a year ago, the co-worker said, Ferrill started saying he believed brewery workers were coming into his home, bugging his computer and moving chairs around.

“I was: ‘Are you serious, Anthony? What?’ We all kind of joked about it, saying we should maybe get him an aluminum hat. Things just started getting weird. But he was dead serious about it,” the co-worker said.

But another co-worker, Keith Giese, said Ferrill seemed fine when he saw him earlier this week.

“I never had a clue. I talked to him a couple of days ago and he seemed fine to me,” Giese said. “I had no idea that there was a problem, that somebody could snap like that.”

So, classic and notably healthy and necessary self-protective paranoia, derived from workplace conflict and harassment, union activity targeting an individual(see this post about the Virginia Beach workplace shooting, where another black man was gang stalked by primarily white people, and notice the mention in the news story of “workplace pranks” that included the symbols of freemasonry in the news story),and then:

according to neighbor Erna Roenspies, who said she had become close to Ferrill and his wife during the 15 years they’ve lived on her block.

A few years ago, he told her that insurance investigators were parked in the neighborhood, watching to see if he was working around the house, which could affect his workman’s compensation claim, Roenspies said.

Hmm. Actual, unregulated private investigators, stalking the guy for a couple years, in front of his house.

Gee, I cant imagine that could make a guy anything less than paranoid, absent of ANY delusion whatsoever. HAHA, sure, like someone is following people around, and blatantly photographing you, right?

“HAHA, alminum hat wearer,” the gang stalking denialists and psychologists frequently say, “what makes,YOU so special that an army of people follow YOU,around, and snap photos of you,” etc.?

Well, few OGS victims ever make such broad claims, because those broad claims online are usually made by psycho-babbling loons who are actually disinformation agents, working for agencies. claims. And, it only takes one photographer to send the message that victims are being watched.

So, get those gang stalking cocksuckers on film, as I did. Its more useful than therapy, and more validating and empowering for victims of OGS,too.

1564392508045
So, lets revisit the definition if a delusion for a minute, according to the Oxford dictionary:

delusion
[dəˈlo͞oZHən]
NOUN

an idiosyncratic belief or impression that is firmly maintained despite being contradicted by what is generally accepted as reality or rational argument, typically a symptom of mental disorder.
“the delusion of being watched”

synonyms:
misapprehension · mistaken impression · [more]
the action of deluding or the state of being deluded.
“what a capacity television has for delusion”
synonyms:
deception · misleading · deluding · fooling · tricking · trickery · duping

The “delusion of being watched” its no longer a false assumption, in light of the empirical fact that western governments now spy on all of their citizens; or that corporations literally collude to rape our privacy, and our “Big Data.”

And, it is no longer a “belief system” but it is the underlying and quite scientific fact of our modern lives, as both NSA spying, and corpirations that mine and sell our data are in fact, a reality now.

I might also add, what a capacity psychologists have for being delusional in cases of OGS,because the myth of delusion is a,HUGE cash cow in the DVIC apparatus, and the psycholigical services industries.

As we see time and again, gang stalking denialists are all on the state teats, working in punitive psychology, or working with cold case investigators and other state paid functionaries and apparatchiks, the myth of delusion reveals an interesting fallacy: that ONLY those who derive income from the,DVIC,deny OGS is real.

In the case of Anthony Ferrill, we see his complaint validated in multiple ways with evidence–a complete ROGS BINGO.

Here, have a look yourself, using the fentanyl free and scientifically proven OGS assessment tool, the ROGS Bingo card.

So, in this case, the gang stalking denialists will say that the man (who was in fact on doctor prescribed pharmaceuticals) was a drug addict, or suffering delusions of one kind or another.

And, we have evidence that in fact the shooter was actually being followed by “mysterious people,” who the evidence indicates were in fact, private investigators, and that the man also had a documented workplace harassment going on, with a group of organized individuals mocking him(they are literally organized union members), and telling him that he needs an aluminum hat, aka a “tinfoil hat,” adding insult to narcissistic abuse-based injury, applied to a man who was literally enduring the trauma of chronic back pain.

Gang stalking denialists such as Dr.s Lorraine Sheridan, David V.James, Christine Sarteschi, et al have chosen to relegate the complaints of gang stalking victims as delusional in basis, yet case after case of mass shooters and workplace and school shooters indicates that the complaintants are frequently correct about being followed, surveilled, mocked, etc., as in the case above, which could have been validated BEFORE the shooting occured.

But as we see repeatedly, gas lighting a victims complaints is the norm, not the exception; and, there is no legal mechanism in Human Resources departments, psychology, or court rooms where the victims complaints are validated either. Why is that?

Well, the answer is complex, for many reasons. But none of those reasons are that the victims of OGS are actually delusional, as opposed to merely being factually incorrect about “who” their actual stalkers are.

Ferrill made the claim that it was coworkers gang stalking him, during a period of harassment, which is a valid, healthy paranoia that many African Americans have. And, he was,at some point followed around by actual investigators whose tactics are frequently unregulated or supervised to ensure that the law, and due process is observed.

Its a small and quibbling detail, whether or not he can actually name his gang stalkers; because thats not his job, its the job of law enforcement, which are themselves implicated in.nearly every case of gang stalking.

Again, from WebMD:

Delusions come in many forms, but they all have one thing in common: The people affected by them can’t be convinced that something they believe isn’t true. Those unshakeable beliefs are different from person to person and affect different parts of their lives.

In the Molson-Coors Milwaukee shooting, we see that what psychologists call delusions are in fact actual complaints of highly organized gang stalking that includes the usual suspects: corrupt union members, and other organizations, and organizational institutions, in this case Molson-Coors bad HR practices; retired cops acting as private or corporate investigators, and claims that the victim is crazy, rather than the sociopathic gang stalking workplace mobs.

And, another entirely preventable mass homicide assisted by psychologists who are gang stalking denialists spouting rhetoric about delusions and gang stalking.

The going dark problem and Silence on the Wire: silence is a two way street, and the case of Russian counter -surveillance of Americas political police using “low risk” tactical methods.

If you’ve ever sat still, in a quiet room, for a single moment, you know that there is no such thing as actual silence, because your own body makes noise.

“The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,”

Breath, and other organic, natural acoustic utterances or disturbances are a constant compliment to your presence. Then, there are the subsidiary, environmental and natural sounds around you, as the breeze, or the distant hum of nature in its various forms.

And so, this is the human baseline of silence, and it is a valuable starting point within which we discover the fatal flaw of all so called intelligence, and counter -intelligence: the arrogance of intel operators in assessing the value of data received or sent, because after disruption and beyond the human baseline,its all just “other ”noise. And noise then, becomes a two way street.


Related Content:
Free download of Silence on the Wire: Field Guide to Passive Reconnaissance and Indirect Attacks,by Michal Zalewski

So, in a free world, one would expect that the human rights and guarantees of “freedom ” would be maintained nearly religiously; as nearly religion itself, by those who draw paychecks based upon their oaths that they vow to uphold our constitutions.

But thats not what is actually happening in the west, since US, British, and the allied nations began their religion based, tribal-sectarian holy war that kicked off in 2001, and guys like me got to meet the “deep state ” head -on, after writing news stories without tribal -sectarian bias, and true to the form of the principles of journalism, and anticipating the Total Surveillance State.

 

Related Story: Take a look at how I was the first person in America to report on manufactured terrorism, and then, got years and years of black bag jobs,cowardly morons rifling through my belongings, and news stories stolen right out of my phone and email, and everything I describe herein AFTER that and more.

And look how that turned out for me, PERSONALLY.

Indeed, with the US FVEY spying,the accompanying “community policing, ” the western governments can no longer claim that they respect, or uphold anything resembling democracy backed by civil rights and due process procedures, much less freedom of any type.

So, it is here, where western governments have turned ordinary citizens into involuntary, non -consensual surveillance targets( aka Human Intelligence or, HUMINT )where the noise of ones own, voluntary silence is, “disrupted ” by the FVEYs data theft on every persons phone or computer and then, the exploitation of that data by intelligence operators to create what Dr. Lorraine Sheridan and others call “an echo chamber ” both online and off that is mediated by western extremist religious and political ideology, as we see here and here.

So, ROGS, the blog you are reading here, is what is called in psychology, a reaction formation, to the newly emerged total surveillance state, and the death of American democracy, which I once believed in whole heartedly, and fought for, very vainly, with well chosen words.

My country is no longer a democracy, insomuch as it ever was due to the multi-tiered levels of privilege, doled out to the select men and women, contrasted against the multi -tiered levels of slavery, peonage, and debt servitude that these others cast upon the poor, the dissenter or activist; the heretic and others who fall into the hidden slavery nets of any of the many sects and cults of organized religion, working through government apparatus both online and off .

So, this theological filtering, regardless of what cult, or sect, is also the baseline for all western dialogistics as we see in the sectarian targeting of men by known race -based operators; and in the resultant cult practices that follow, such as the un -naming of (primarily ) men in this example here and other examples I provide here at ROGS.

So, in such an environment of what is essentially the mass exploitation if individuals, and groups of individuals, one cannot act of actual free will, because these operations, and these operators, are in constant disruption mode. Its what their version of a society is.

In that light, there are many ways to use silence, and also noise to discern their capabilities, tactics, and methodology, AFTER the fact of them, casting you into their various webs of interaction FIRST.

Keep in mind that the pre -emptive, anti-democracy, anti-due process, sectarian secret police state justifies itself not from law, but from their version of tribal -religious and moral superiority.

In that world, its all binary, I /O data analyses: Kill or be killed; heaven and hell; black or white; Jewish or not Jewish; Republucan or Democrat woman or man, etc.

And it is that analyses which is its flaw, which is why they break and bend, and prostrate the law in gray area policing, aka “high policing ” aka political policing, as we saw with the al Ghazali problem.

So, no small surprise then, when ROGS was able to out a few Department of Defense affilliated persons here who targeted me on US soil as they worked ine or another angle of fraudulent FBI /DHS /Private contractor CVE program, or cult members who cyberstalked me on Twitter, working with Democrat party with operatives INSIDE Twitter monitoring my location; or most recently, yet ANOTHER Department of Defense affilliated, Brookings Institute person following my blog.

As I said: I know what kind of noise is natural, like how this humble electrician and merchant mariner was literally recruited by a gang strike force in LA, versus any of hundreds of bizarre DoD/DHS /FBI /NGO affilliated time wasters they toss,at me, like these guys here

So if little old ROGS, an American citizen who has never been convicted of any crime in any trial based in constitutional law, civil rights, and due process can be targeted and stalked, and harrassed by those I define, and name herein, wha else is goung on in western democracies that remains hidden?

And it is that last question that has,ROGS cheering for all the “bad guys, ” like Russia and China and even lil Kim in North Korea, apparently absent from an important meeting recently, lol. Because when “America, land of the free ” morphed into “America, just another police state, ” ROGS and hundreds of thousands like me got thrown under the bus.

Listen: China is thriving, and Russia protects Edward Snowden to this day, and Kim is no threat to anyone.

But I guarantee that CIA/DIA/NSA /FBI feeding down into “parallel colluding investigations ” and the subsequent constant surveillance of our webs of relationships single -handedly voids the constitutional compact, and the social compact as well.

So, I like to fight back by deploying counter -surveillance directly at those who point it at me, because my personal silence has been “disrupted ”. And in so doing, I learn a lot.

Here below, we see how Russians were able to anihilate FBIs urveillance teams privacy, and also how they were able to use this not -so -covert, sloppy, bizarre surveillance to gain valuable data about US security.

Which, would, under normal circumstances, inevitably undermine US security, if our own agencies hadnt ALREADY done that.

But in total surveillance states, security is ALREADY pre -emptively undermnied by tribal -sectarianism, and those who have deployed high policing on their own citizens .

The case of the Spies who laughed last, at Americans who use their own fellow citizens for “electronic target practice,” or:

FBI Follies, from Russiagate, With Love, via,Yahoo News Exclusive

Exclusive: Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil
Zach Dorfman, Jenna McLaughlin and Sean D. Naylor

Yahoo NewsSeptember 16, 2019

The discovery of Russia’s newfound capacity to crack certain types of encryption was particularly unnerving, according to former U.S. officials.

“Anytime you find out that an adversary has these capabilities, it sets off a ripple effect,” said a former senior national security official. “The Russians are able to extract every capability from any given technology. … They are singularly dangerous in this area.”

The FBI’s discovery of these compromises took place on the heels of what many hoped would be a breakthrough between Washington and Moscow — the Obama administration’s 2009 “reset” initiative, which sought to improve U.S.-Russia relations. Despite what seemed to be some initial progress, the reset soon went awry.

In September 2011, Vladimir Putin announced the launch of his third presidential campaign, only to be confronted during the following months by tens of thousands of protesters accusing him of electoral fraud. Putin, a former intelligence officer, publicly accused then-Secretary of State Hillary Clinton of fomenting the unrest.

It was around this time that Putin’s spies in the United States, operating under diplomatic cover, achieved what a former senior intelligence official called a “stunning” technical breakthrough, demonstrating their relentless focus on the country they’ve long considered their primary adversary.

That effort compromised the encrypted radio systems used by the FBI’s mobile surveillance teams, which track the movements of Russian spies on American soil, according to more than half a dozen former senior intelligence and national security officials. Around the same time, Russian spies also compromised the FBI teams’ backup communications systems — cellphones outfitted with “push-to-talk” walkie-talkie capabilities. “This was something we took extremely seriously,” said a former senior counterintelligence official.

The Russian operation went beyond tracking the communications devices used by FBI surveillance teams, according to four former senior officials. Working out of secret “listening posts” housed in Russian diplomatic and other government-controlled facilities, the Russians were able to intercept, record and eventually crack the codes to FBI radio communications.

Some of the clandestine eavesdropping annexes were staffed by the wives of Russian intelligence officers, said a former senior intelligence official. That operation was part of a larger sustained, deliberate Russian campaign targeting secret U.S. government communications throughout the United States, according to former officials.

The two Russian government compounds in Maryland and New York closed in 2016 played a role in the operation, according to three former officials. They were “basically being used as signals intelligence facilities,” said one former senior national security official.

Russian spies also deployed “mobile listening posts.” Some Russian intelligence officers, carrying signals intelligence gear, would walk near FBI surveillance teams. Others drove vans full of listening equipment aimed at intercepting FBI teams’ communications. For the Russians, the operation was “amazingly low risk in an angering way,” said a former senior intelligence official.

The FBI teams were using relatively lightweight radios with limited range, according to former officials. These low-tech devices allowed the teams to move quickly and discreetly while tracking their targets, which would have been more difficult with clunkier but more secure technology, a former official said. But the outdated radios left the teams’ communications vulnerable to the Russians. “The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,” said the former official.

A former senior counterintelligence official blamed the compromises on a “hodgepodge of systems” ineffective beyond the line of sight. “The infrastructure that was supposed to be built, they never followed up, or gave us the money for it,” said the former official. “The intelligence community has never gotten an integrated system.”

The limitations of the radio technology, said the former senior officials, led the FBI’s surveillance personnel to communicate on the backup systems.

“Eventually they switched to push-to-talk cellphones,” said a former counterintelligence executive. “The tech guys would get upset by that, because if they could intercept radio, they might be able to intercept telephones.”

That is indeed what happened. Those devices were then identified and compromised by Russian intelligence operatives. (A number of other countries’ surveillance teams — including those from hostile services — also transitioned from using radios to cellphones during this time, noted another former official.)

ROGS BINGOs are EVERYWHERE: note the use of the term “Ravens”in the following Reuters piece about “targets ”

As I demonstrate all throughout ROGS, the sooner that journalists, attorneys, psychologists, etc. adopt the ROGS predictive analysis in cases of organized gang stalking, the quicker you resolve the quandry of “high policing v delusional disorder” connundrum presented by our out -of -control domestic spying on citizens problem.
1564329153702

they saw the mission cross a red line: targeting fellow Americans for surveillance.

And, you can solve cases and vindicate the narratives of targeted individuals, who are stalked, harrassed, and frequently murdered, or who go on rampage killings in America, and elsewhere, after being stalked and harrassed by US /British /Israeli /private contractors and other Panopticon affiliated hackers and spies.
Notice in the following piece, that the NSA is directly implicated, and a female spy is involved stalking activists, and also, the use of the term “ravens”as I have documented here,with Eleanor White, and here and many other places in the OGS dialectic.
But ravens, blackbirds, and crows are SYNONYMOUS with signals intelligence operations (SIGINT) and black operations that target individuals and wage actual “electronic warfare.”
images
Without further adieu, a tale of NSA trained spies,waging black operations over the internet, working as private contractors, speech police, and highly organized, methodical bullies, targeting individuals,around the world, and inside the USA.
From Reuters:
January 30, 2019
Special Report – Inside the UAE’s secret hacking team of U.S. mercenaries
Christopher Bing, Joel Schectman
WASHINGTON (Reuters) – Two weeks after leaving her position as an intelligence analyst for the U.S. National Security Agency in 2014, Lori Stroud was in the Middle East working as a hacker for an Arab monarchy.
She had joined Project Raven, a clandestine team that included more than a dozen former U.S. intelligence operatives recruited to help the United Arab Emirates engage in surveillance of other governments, militants and human rights activists critical of the monarchy.
Stroud and her team, working from a converted mansion in Abu Dhabi known internally as “the Villa,” would use methods learnt from a decade in the U.S intelligence community to help the UAE hack into the phones and computers of its enemies.
Stroud had been recruited by a Maryland cybersecurity contractor to help the Emiratis launch hacking operations, and for three years, she thrived in the job. But in 2016, the Emiratis moved Project Raven to a UAE cybersecurity firm named DarkMatter. Before long, Stroud and other Americans involved in the effort say they saw the mission cross a red line: targeting fellow Americans for surveillance.
“I am working for a foreign intelligence agency who is targeting U.S. persons,” she told Reuters. “I am officially the bad kind of spy.”
The story of Project Raven reveals how former U.S. government hackers have employed state-of-the-art cyber-espionage tools on behalf of a foreign intelligence service that spies on human rights activists, journalists and political rivals.
Interviews with nine former Raven operatives, along with a review of thousands of pages of project documents and emails, show that surveillance techniques taught by the NSA were central to the UAE’s efforts to monitor opponents. The sources interviewed by Reuters were not Emirati citizens.
The operatives utilized an arsenal of cyber tools, including a cutting-edge espionage platform known as Karma, in which Raven operatives say they hacked into the iPhones of hundreds of activists, political leaders and suspected terrorists. Details of the Karma hack were described in a separate Reuters article today.

What are psychological operations (PSYOPS) in OGS: PSOPS, Los Angeles, Jack Palladino,Russell Palarea, Ph.D., President, Operational Psychology Services(OPS ), and cr ISIS PR

ROGS is painting some new targets on peoples names and faces today, and asking why the DHS, the FBI, and every other scumbag alphabet agency is waging war on Americans, due process rights, and civil liberty, via what these agencies, and their cohort pig trough practitioners call “colliding parallel investigations,”according to the Association of Threat Assessment Professionals(ATAP).

“So, a group of security-intel industry people say that claims about criminality in America’s security-intel industry are delusional? Seems persuasive. : )

I wrote to several of the people associated with the August, 2018 ATAP conference-people who I named in the headline of this post, and others, where the speakers officially and with calculated specificity linked Dr. Lorraine Sheridan and David V. James junk science and denialism with actual gang stalking by corporate security and private contractors who work under the “intelligence sharing environment” to the targeting and stalkung if indivuduals, and that they used “police science” mixed with psychology to create that link*.
The active ROGS reader will note that the S &J study quoted in the article “United States of Paranoia: They See Gangs of Stalkers“was actually a poll, much like an advertising survey,or one of those questionaires that borderline personality disordered neurotic federal agents fill out in websites designed for “women,” like the horrifically biased, sh!tposting Jezebel, or Vice magazine online, and that the Sheridan and James “study” was in the form of an anonymous internet survey to purported gang stalking victims, that concluded with the New Yarwk Times and Lorraine Sheridan (who works in the Australian prison system)calling the self-reporting victims a “dangerous tribe of troubled minds.”
The reader might also recall that since that poll,and even before, we have evidence of security contractors, threat “assessors /creators “and major spy agencies polluting the internet with their garbage and conspiracy theories, and that the EXACT NYT that published the fraudulent S &J poll has since then even acknowledged the use of actual sound weapons being deployed on US diplomats too.
[FACEPALM ]
PPL0021YE_1

Related story: Forensic science, like blood splatter evidence, or “bite mark”evidence is junk science, created by whacky people with “police science ” degrees , and judges and juries are waking up to that fact, despite the television crime show crisis PR. Threat Assessment, and its cohort DVIC junk science pushers are this generations forensic fraud

So, you might recall that New York Times piece,was authored by one now-discredited Mike McPhate, who has ironically now adopted the ROGS thesis that hidden, secretive gangs work in policing, and security /intel, to stalk, harass, and murder people outside the laws, and outside of due process.
Follow the links to McPhate’s newsletter, where, again, without irony, he posts his story about the documented hidden gangs that work in LAPD at number 13.
🤑🤐😂👮👮👮👮[FACEPALM]

the link between domestic violence and gang stalking is that security contractors work outside of the law,break the law, and violate due process rights and civil liberties of those they target under the DHS zero-accountability DVIC scheme of “colluding parallel investigations.”

I won’t hold my breath waiting for a response from these “official sources”, because they derive literally billions of dollars of income by manufacturing the cris, and then, linking gang stalking to a “paranoid delusion” rather than linking it to what it is:
Gang stalking is: “unconstitutional, chronic, pervasive surveillance by alphabet agencies, and private contractors who work outside of Constitutional due process, frequently violating civil liberty, and without meaningful or any oversight, and frequently in direct collusion with the FBI/DHS/NSA-leaked-local-via-Fusion Centers, targeting individuals, and especially targeting key constituents in dialectic space like Twitter, Youtube, Facebook, Instagram, Spotify, etc, as documented by the ACLU, and as described in CIA counter-intelligence manuals and psychological operations that target individuals, groups, and entire nations
In fact, a couple of those that I wrote to are the DIRECTORS OF FUSION CENTERS, and without coincidence, it is these same men and women who participated in this series of talks at the 28th Annual ATAP Threat Mangement conference which officially linked gang stalking denialism to their domestic operations against individuals, activists, dissidents, and others, which, in their jargon is called “colluding parallel investigations. ”
But I did manage to get a quote from the widely respected author of Fightgangstalking.com, a military veteran,and security industry professional who was himself gang stalked, and, who has free downloads of fentanyl-free fliers on his website, where you can get literature to help raise awareness about high heeled policing.
When I brought ATAPs fraud to his attention he said “So, a group of security-intel industry people say that claims about criminality in America’s security-intel industry are delusional? Seems persuasive. : )

FGS has chronicled OGS for many years, and his work is respected by many around the world, giving his advertiser, and sponsor-free blog some 500,000 reads in the time it has been around, as compared with ROGS blog here, which got just over 50,000 reads, and unknown impressions in the two years I investigated and written about OGS.
So:”Colluding Parallel Investigations” is what ATAP calls organized gang stalking
OGS is to ATAP and the security industrial complex, aka, the secret police state, what slop is to pigs: more fat.They literally are manufacturing terrorists, via constant, chronic harassment that they call “colliding investigations.”

Related Story: the sordid story of Rakem Balogun is a ROGS Bingo that demonstrates the ROGS thesis perfectly, and also the total failure of the FBI et alphabet to manufacture a terrorist via chronic surveillance and social media bullying, incitement, and harrassment and even phony charges that stemmed from DVIC policing.

And, it is a situation where individuals are monitored, tracked,surveilled, and more sometimes for decades, in privacy raping, Constitution defying, bizarre “investigations,” that involve local, state, and federal agencies, hiding their pseudo -investigations behind NGOs, and community policing in collusion with private contractors, and waged from Fusion Centers (one of which is on record distributing bizarre mind control literature ).
And, of course, I saved screen captures and the actual emails for later, to demonstrate at a later point how stonewalling the facts I outline herein guarantees these people another slurp at the police -state funding barrel.
So, ATAP is the nexus between crisis PR and crisis CREATION, and it “advises” current, and retired police and the vast array of private contractors hidden within this scheme as well as the nefarious LEIUs whothe FBI refuses to investigate, because it is what our nations “deep state”is; and also,the Army of Paul Blarts calls gang stalking a “colluding parallel investigation. ”
And as we see now, ROGS-the blog you are reading now-has changed the entire dialectic, and police-state/tribal -sectarian frauds, hoaxers, and other associated scum, all of whom are draining the taxpayes dry, have begun to respond in a bizarre, sociopathic fashion.
There was the infamous “fentanyl fliers ”hoax waged by mystery people in Texas, where NSA affiliated fliers were put on squad cars, and then, the sherrifs department waged a misinformation/deception campaign.
There was the recent rash of mass shootings where “colluding parallel investigations ” like the gang stalking murder of Mathew Riehl was preceded by a several years long gang stalking by academics, campus police, sherrifs department gang stalkers, and slanderers of all kinds stalked him at school, and across state lines until he was forced into a DVIC connundrum; and all of that, so that our bloated police state can chew through more boards from the bottom of the trough .
Then, their were the designer mass shootings in cases of Cesar Sayoc the Wiley Coyote styled ACME bomber ,who was being stalked by crisis PR agents like Rochelle Ritchie, and other speech police and ADL styled crybullies,as he cartoonishly and allegedly mailed really crappy fake bombs to a designer list of people who lied to Congress, and other tribal-sectarian traitors.
And the Hot Yoga shooting, of course, where a veteran was gang stalked by Kommunity Kulture Klub members, and then, likely murdered one of his slanderers.
And, the Thousand Oaks shooting, where Ian Long, a US marine who saw combat duty was stalked so bad he lived in his garage, before he went ballistic. Ine of his after -death body punchers even claimed she bullied him, and made him run “thirteen miles,”as punishment on a high school track team.
I ask the reader to try to avoid seeing the following patterns in EVERY CASE that occurs:
1-unlitigated he said she said DVIC slanders that precede the shootings
2- that it is a gendered narrative, where mens alleged /purported violence is BOTH preceded AND followed by gangs of horse faced lesbian-like DVIC slanderers, aka, bullies who are women, and members of the Army of Paul Blarts too who couldnt get laid at a dinkey dick show in Mexico if they tried.
3-like the case of Michael Chadwick Fry, also in Texas, where the NSA operates a major listening post, that he ALSO named both crisis PR agents, and specifically FEMALE bullies who stalked him, as he tried to get the word out about a deputy involved homicide.
4-the recent arrest of Andy Ostrowski in the Kid$ for KKa$h state of Pennsylvania, where judges and “womens organizations” literally target men wth hit lists, ad interfere in ever aspect of mens lives, incentivizing child theft. This one case alone valudates OGS, as I have demonstrated with empirical, scientific, and falsifiable evidence.
5-Lastly, notice (or maybe. Not!) that the number 13 appears in every narrative, in many different ways, as Jews, christians, Catholics, and even Wiccans utilize that number when they count coup on a victim of organized gang stalking (use my search feature and the terms: the thirteens; apophenia; 13).
So: What is a psychological operation(PSYOPS),and who wages them?
Well: I will let the reader decide, but first, take a look at the following acronyms, after reading through the ATAP .pdf, keeping your eyes peeled for the following talk, entitled

The Link Between the Neverending Pork Barrel, and Ever-morphig definitions of Terrorism as the DVIC Seeks to Replace the Rule of Constitutional Law with Gang Stalking

Hard link here:
https://c.ymcdn.com/sites/www.atapworldwide.org/resource/resmgr/2018-ATAP-Preliminary-TMC-Pr.pdf
Psychological Operations (PsyOps)in a military setting, includes proaganda wars, influence operations, and neutraization of counter -narrative
Operational Psychology Services(OpPsych,or OPS)– A company funded by Dr. Russell Palarea. This organization linked Dr. Sheridans debunked thesis and its accompanying internet poll and its concusions to the multi-agency money grab known as the “colluding parallel investigation” which is behind every mass shooting in the USA.
http://oppsych.com/about/meet-the-team/
PSOPS A private domestic spy organization in Los Angeles, headed by Jack Palladino, which was the organzation Harvey Weinstein hired to gang stalk Rose McGowan
https://www.npr.org/sections/thetwo-way/2017/11/07/562631069/report-weinstein-hired-agents-to-investigate-and-suppress-accusations-against-hi
*this form of psychology being practiced here by ATAP pundits is called punitive, or political psychology, and was a feature of Stalinist Russia, Nazi Germany, and other periods of history where activists and dissenters were labeled mentally ill and gang stalked, and slandered, frequently imprisoned, and, like Andy Ostrowski, locked up on phony mental health charges.

Revisiting the case of Andy Ostrowski: organized gang stalking, federal judges, and political policing

Andy Ostrowski, a civil rights attorney, was gang stalked in Wilkes-Barre, Pennsylvania last year, his personal electronics were monitored from Fusion Centers, and local Wilkes-Barre police literally marauded through his yard,and,as is frequently threatened online by the “hidden”operatives at the internet switch- he was on multiple occasions licked up for “mental health evaluations.”
So,to the researchers of organized gang stalking, criminal and civil defense lawyers, etc.-please note this update in Ostrowskis case below,and the actual mob involved in his back story, as we see how bad actors in the judiciary,work with cortupt political police, and psychologists to literally frame suspects, and entire political narratives.
Because sometimes, the organized mob
is real, and gang stalking denialists Dr.Sheridan, James,et al are purely complicit.
From Happyvalleycitizen.com, the story of a local and possibly literal mob of gang stalkers, working over egregious periods of time to stalk, frame, and harass a civil rights lawyer,with actual Fusion Center hacking and electronic harassment to boot.

Every civil lawyer takes on cases that challenge big government entities or powerful insurance companies, but the marked difference I noticed when scrolling through and looking at Ostrowski’s cases were that there were a plethora of cases that were challenging the Pennsylvania judiciary directly. As in, the message seemed to be it’s okay if you want to go after big government or corporate America, but don’t you dare touch the judiciary. I realize having this perspective when considering Ostrowski is challenging in mostly part due to who Ostrowski is or you think he is. For those reasons, I bolster my findings by pointing out his disbarred law partner Don Bailey.
Don Bailey, (attorney for former PA treasurer who committed suicide during live television on a press conference, and was accused of some pretty nasty financial fraud allegation), caught my attention due to the cases that he was known for. Activists like Molly Biancovo or Mike Ferrence are active in promoting this idea that the Pa court Judges in Superior Court are Italian placed and part of some sort of some type of mob organization. I laughed at this idea initially, it’s like hearing someone claim that the moon landing was fake. But when you start to draw the lines that connect the relations, to the people sitting on the Superior and Supreme Courts, there is also something unsettling about the nepotism. Molly specifically first drew my attention to the Zapalla crime family out of Pittsburgh. One Zapalla brother is the Allegheny County District Attorney, but if you look a little deeper, most (almost all) of these judges have some sort of ties to the Zapalla family. Like I said, it’s one of those ideas that is so hard to wrap your head around, I resisted the inference from the beginning. Difference is, I was curious and skeptical enough to look and see what she was ranting and raving about. I wasn’t expecting there to be any merit to what Biancovo was claiming, yet the close ties are shocking.

Michael Chadwick Fry, Sheriff Tracy Murphree,and claims of brainwashing: I invite Mr. Frys public defender to contact me ASAP, for a ROGS BINGO card: gang stalking case study

Dear future Texas public defender of Michael Chadwick Fry: please contact me here at the ROGS blog, because you will need the free ROGS Bingo card to understand your case.
1536180580800
Your defendant claims that he was brainwashed, and, semantics aside, I believe him.
Your client has named some names, and he encountered odd things after witnessing a deputy involved homicide of hs friend, and your client has also named some names that in themselves have an interesting history in that area.
I would focus in on the Sheriffs department media spokesperson too, because Fry (apparently) named him prominently on his flyers, and that person has an interesting academic history. I can testify with unimpeachable evidence that I have encountered these same types acting in undercover capacity to skirt the law.
And as we see in nearly ALL cases where claims of of mind control and influence operations, or gang stalking operations are presented, so we see that Fry was attempting to garner media attention to an attemp to frame him somehow, and even states that he was the intended target of an institutional homicide.

Related Story: Nearly all major mass shooter events, and other “odd”cases like this reveal that these men and boys partcipated in alternative media and counter-narrative.
We ALSO see that alleged shooters are frequently “on police radar” for years and years as they are stalked inline and off, but ALSO that many-ranging from Omar Mateen whose father was an FBI informant and also had an alternative news show, to Mathew Riehl who used Facebook, and many more were in fact, stalked by local, state and federal poluce but ALSO that their web pages are webscrubbed after their events, often at the direct request of Israel.

And while these claims initially look like classic “delusions,” I urge you to bear with me, as I am prepared to offer you free assistance to understand his claims, and also, organized gang stalking~and please, read this article first, about a media hoax in your area that attempts to discredit people who claim they are under an influence operation.
You see: your client has all the signs and symptoms of being what is colloquially called a “targeted individual of organized gang stalking”and the “symptoms”likely appeared just AFTER witnessing the homicide of his friend, just AFTER he was railroaded multiple times, and spending many months in jail, held for aggregious amounts of time in jails-but apparently NEVER found guilty of crimes.
you might like to know that Dr.Otto Dorr Zoeggers discusses such things in context to torture here and correlates that with what can be descrubed as mind control.
All of that, good defender, is already a full ROGS BINGO, but wait! Theres much more…..

https://answers.yahoo.com/question/index?qid=20090209123524AAPoDtb
http://www.paganlibrary.com/introductory/witchcraft-some_answers.php
https://www.sheriffstx.org/county_map/county/2584
https://m.washingtontimes.com/news/2018/feb/28/tracy-murphree-texas-sheriff-deputies-we-do-not-ta/
https://www.angelo.edu/dept/english_modern_languages/alumni_spotlight.php

‘Wake Up America’: TX Sheriff Rants On Terror After UK Attack

Electronic implants, Wikileaks Vault 8, victims of organized gang stalking, hive mind, and honeypits.

ROGS loves the Constitutional guarantees of due process, and ROGS loves America. I am pathetic that way~the grand American delusion is so appealing.
(Vault 8 is an inside joke.)
BUT: The DVIC is actually a war on speakers and words, and without a doubt, the first amendment itself is the target of neocon and tribal, religious interests, now interfacing with the massive influx of Saudi, and other nations cash flows, and the media narrative.
I have been gang stalked since the DVIC was birthed into our lives in 1993 ( the exact same year when the Anti Defamation League was outed as a domestic spy ring that sold out American activists) and became severely gang stalked after I broke a nation wide story in 2003-4 about how America’s agencies manufacture terrorists by occluding access to civil rights and due process.
To journalists, researchers, and others interested in answering the many questions that are presented in the “bizarre” online dialectic of gang stalking, here below is how the CIA (and every other IC agency, private contractor, and the FBI) uses the term “electronic implants,” which describes covert hacking techniques, and plausible deniability in exploitation of targeted computers, targeted computer networks, and targeted individuals.
Without a single doubt, this is empirical evidence of CIA/other IC/NGOs operations on US soil, and anywhere else where OGS is taking place.
And it single handedly validates the inherent mission creep of the WOT redirecting and exploiting domestic targets.

UPDATE 10-19-2019: Almost two years after I wrote this post, and became active online, the ADL implicated itself as actually deploying military psychological operations on target individuals, using artificial intelligence software called Moonshot CVE, which had previously been used in theaters of war; and, perpetuating negative stereotypes of Jewish people as mind controlling Svengalis.

1570435771780
Electronic implants and gang stalking, courtesy of Wikileaks, and Julian Assange, who is literally being isolated, and denied visitation from other people as I write this. And, the American/FVEY deep state has worked tirelessly to force Ecaudor to revoke his asylum.
Isolation, you will recall, is ALSO a major threat/complaint/”delusion” of targeted individuals.


RELATED STORY
:I wrote about the HIVE in coded language long before this story below became mainstream news. The reader can infer that writing openly about such things is dangerous, and also, ROGS personal writing style is somewhat coded for reasons I have explained elsewhere.

The Hive mind in the gang stalkung dialectic online, from Wikileaks.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.
…………..
And-I hope the dood doctors like David V. James, and Lorraine Sheridan-and certainly Dr. Mike Wood, dont get to caught up in the echo chamber as wasps and bees of all kinds swarm them for commentary in these matters.
But OGS is very real, and puts MHCHAOS and MKULTRA to shame.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

Gang stalking BINGO: targeted individual, targeted real estate, targeted electronics, targeted childROGS ren…….

Let  me  know  if,  and  when  you  start  seeing  patterns in  the  data  of  organized  gang  stalking……because  the  Experts  all  agree that  an  obsession  with patterns  can  indicate delusions, and  maybe  even  schizophrenia!
But  there are,  in  fact, links  between  organized  gang stalking and  real  estate, organized  stalking  and kangaroo  DVIC  courts, links between Gang stalking and Electronic implants: (Here is how the NSA uses electronic implants.) and electronic  implants that  monitor  our  computer  activity, sometimes  for  YEARS.

Related  Story: How secret  policing tactical  assaults  can  induce  delusion-like  symptoms in  politically  targeted  individuals,  as  those  targeted  try to  find  words  for  un-Constitutional  government conduct:
Gang stalking and delusions and paranoid complaints: what is Level X thinking and cognitive bias in psychologists/psychology? 
OGS victims obsession  with  patterns can  indicate  delusions to  therapists  and psychologists  on  the  state  teats!

But  here  below is a  case study  in  organized  gang  stalking  that  is  full  of  the  EXACT  patterns that  I  describe here  at  ROGS.  Organized  gang  stalking  IS  what  I  say  it is!
So…BINGO: Lets Play ROGS BINGO, in  the  case  of  the  targeted  activist!
Black  activist jailed  for  Facebook  posts speaks out about secret FBI surveillance that  went  on for  YEARS.
Exclusive: Rakem Balogun spoke out against police brutality. Now he is believed to be the first prosecuted under a secretive US effort to track so-called ‘black identity extremists’
…….. The father of three said he was shocked to later learn that agents investigating “domestic terrorism” had been monitoring him for years and were arresting him that day in part because of his Facebook posts criticizing police.
“It’s tyranny at its finest,” said Balogun, 34. “I have not been doing anything illegal for them to have surveillance on me. I have not hurt anyone or threatened anyone.”
Balogun spoke to the Guardian this week in his first interview since he was released from prison after five months locked up and denied bail while US attorneys tried and failed to prosecute him, accusing him of being a threat to law enforcement and an illegal gun owner.
Balogun, who lost his home and more while incarcerated, is believed to be the first person targeted and prosecuted under a secretive US surveillance effort to track so-called “black identity extremists”.
In a leaked August 2017 report from the FBI’s Domestic Terrorism Analysis Unit, officials claimed that there had been a “resurgence in ideologically motivated, violent criminal activity” stemming from African Americans’ “perceptions of police brutality”.
The counter-terrorism assessment provided minimal data or evidence of threats against police, but discussed a few isolated incidents, notably the case of Micah Johnson who killed five officers in Texas.
The report sparked backlash from civil rights groups and some Democrats, who feared the government would use the broad designation to prosecute activists and groups like Black Lives Matter.
Balogun, who was working full-time for an IT company when he was arrested, has long been an activist, co-founding Guerrilla Mainframe and the Huey P Newton Gun Club, two groups fighting police brutality and advocating for the rights of black gun owners. Some of the work included coordinating meals for the homeless, youth picnics and self-defense classes – but that’s not what interested the FBI.
A march in the wake of the deaths of Alton Sterling and Philando Castile at police hands.
Investigators began monitoring Balogun, whose legal name is Christopher Daniels, after he participated in an Austin, Texas, rally in March 2015 protesting against law enforcement, special agent Aaron Keighley testified in court….follow  the  links  above….connect  the organized  gang  stalking  dots! Because  nearly  ALL  mass shooters  endure YEARS  of these  tactics by hidden  policing,  aka  “High  Policing,  aka Americas secret  police.”

Gang stalking and Electronic implants: Here is how the NSA uses electronic implants.

I first experienced an electronic implant in or around 2004-5. Computer implants are real, NSA and other agency break-ins to hardware and software are real, and documented in main stream news.

In case you were sleeping during the takeover of the United States by the so-called “deep state,”(and it might be noted that both left wing AND right wing opinion leaders agree that the deep state, aka criminal syndicates in government, are real. And, the Harvard Law Review documents debt bondage, a shadow justice system, and a bizarre “deep state” second tier of the justice system that preys upon the poor in the USA, aka the collusion between corporations, international finance and its hydra’s and Octopussies of NGO’s slopping the troughs of American police and intelligence agencies such as the FBI, the CIA and the DHS, as the NSA spies on all of us and trickles data out to Fusion Centers, here is one of the phrases they use online to distort the meaning of the phrase “gang stalking,” and to obscure their illegal actions:
They stuck “electronic implants”in me!!!!!
1575275037998
Electronic implants are very real in many ways, but not the way they are discussed in the online dialectic of OGS. In fact, the use of the term as a biological implant is designed to obscure other more real implants, because in case after case ranging from intellectual property theft BY the state or a subsidiary corporate, private intel gathering firms like Facebook, or the host of DHS/FBI /ADL “contractors” who stalk political targets, to major spy operations-all deploy malware, spyware, and electronic code to infect the cell phones, computers, and other electronics of targeted persons.
1575275037998
And surely as we see in case after case of mass shooters, we see long term agency involvement in those peoples lives as predicate for these mass homicides, and quite frequently, contact with zionism, FBI careerist shitbags banking on the unnaccountability of CVE programs and their accompanying “parallel colluding investigations” aka gang stalking,  and Jewish/zionist Supremacy in college settings, as we saw with the recent Texas cases, and dozens of others ranging from Stephen Paddock, to this guy here, Mathew Riehl, an attorney who himself ranted AGAINST Nazi’s and the Eastern Bloc Judenrate’s favorite go-to pundit, white females, before he was shot in cold blood in Colorado after invoking his Constitutional rights to be served a warrant before he is gunned down in his own home by Israelified “Ich, Du” Buberism and Hegel, in a steroid can.

Related Story: The Doctrine of Superior People-How a racist and actual Cabal of misanthropes murder with impunity, wage slander and disinformation, steal resources, control cultures, buy police forces cheaper than dime store drag queen lipstick, and get away with it, century after century-and blame it all on YOU!

And dozens of other well documented abuses of databases, and actual electronic snooping and hacking such as the Minnesota cases of reporters stalked by hundreds of NGOs/AIPAC/federal dollar/DVIC funding related stalkings- to cases of journalists like former CBS investigative reporter Sharyll Atkisson are sabotaged and spied on by political police (the FBI, DHS, et al are merely that), we do in fact see electronic implants as part of the illegal Constitution defying nature of the FISA court coup, the DHS sectarianism,  and the attendant cowardly conduct at the SCOTUS.
As I have noted, my personal circumstances indicate that I have been targeted by multiple cause based/ religion based/ and other stalkers for decades, because I defy their mystery cults and religions-but also because I refuse to be circumscribed by their un-Constitutional gray area policing methods, and have been a first amendment fighter and more for decades (Here’s lookin’ at YOU Phil!)
I first experienced an electronic implant in or around 2004-5, as progressive organizations and institutions ranging from colleges, to state agencies and their attendant database abuses worked to frame me/harass me/ implicate me/ cause me to be “flipped” as a useful idiot to their political causes, or otherwise charged criminally in a variety of ways.
There I was, sitting in a college newsroom, when the computer redirected, all by itself, as if a spell had been cast upon it! To Nazi-land!….an imaginary place created generation after generation by the SAME FOLKS, as international bankers create, and then gut local economies.
But what really mattered then more than anything, was that they attempted to defuse my activism by following me around with nebulously middle eastern photographers, and tried to neuter my ability to have political effect. And what an effect!
Only lately is MSM talking about how a militant, AIPAC financed zionist sect of rapists and baby killers has taken over our airwaves, and purchased our police cheaper than donkey-dick-meat in a Mexican strip bar. Its an actual multi-billion dollar industry,where some-like the famous case of the Jewish nazi Frank Collin play both sides of the drama,and get paid in each role.

Related Story: Why has the American Civil Liberties Union(ACLU)dropped so many free speech, assembly,association, and privacy balls in the last decades, despite having ample funding, and amplecauses to challenge FISA courtera NSA spying? The answermughtbe: the same answer we always come back to, which is “why is the case of Frank Collin~nee~Cohen, the famous Jewish Nazi of Skokie, IL,revered as a victory forfree speech, when so.many other cases(like prisoners reading materials) NOT heralded,or defended by this group?”

Well, at least Marcy Wheeler sees the utility of the word “targeted” now, and how it pertains to individuals, despite her emergent socialist bent (oh, those poor deluded young people, dont they know thatthey are useful idiots for the other four tentacles of the Bilderbergtopuss?…) And the Intercept-despite its ADL sponsorship, occasionally takes on organized gang stalking in one way or another-especially the manufactured terrorism parts of it, as these cases-case after case after case indicate that OGS is in fact a precipitator, and NOT a mental illness at all. Get out the ROGS BINGO card!
See the source image
And while this benefited a few people in the short term-like the bald headed AIPAC sponsored college president, a notorious AIPAC shill and an American Studies professor/rat whose favorite read then was “Blood in the Face” by notorious James Ridgeway ( a likely informant), and a handful of dirty cops whose testosterone outweighs their shrinking testicles- in the wider dialectic.
And, it revealed to me that the facts I put forward herein are true and replicable elements of how the political processes of America are entirely broken-but also how a lawsuit could begin to challenge these practices. I mean- a few militant armed American neo -Nazis/alt-Rightists/bad-guy-racists-du-jour (those who aren’t Jewish in the first place, like the famous Nazi of Skokie, Frank Collin, ne~ Cohen, or who aren’t working for the agencies, if any can be found) have NOTHING on people who can purchase the American police cheaper than trailer park trucker meth made out of truck-stop pep pills.
But actual electronic implants aren’t anything like what you read about online, and anything to the contrary is pure insanity. You see: agents of the state and its Israelified, racist, zionazi sponsored spy aparatizionazi sponsored spy aparati literally gave me a computer that phoned home to a local political precinct, several political organizations in a certain state, the local police department, and computer servers located curiously between a college and these various agency operated and  maintained computer main frames.
And THOSE main frames were situated curiously close to SEVERAL of the above named agencies. They were literally within blocks of each other, as is the case with most cities and towns across America. But, of course, much of the evidence of THAT disappeared in a burglary in 2009, which I have documented elsewhere.
Well- of course I sabotaged the crap out of their sooper seekrit recruitments, entrapments and implantations, much to their chagrin, and found friends who were less crappy than them. And here below is how they were using implants then, but only I and a select few others knew this, and many of those are now deceased, distanced and afraid, or otherwise co-opted. And, my discovery THEN is when the break-ins to my homes began in force as well, because I laughed in their faces, every time.

How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

“Equation Group” ran the most advanced hacking operation ever uncovered.

In an exhaustive report published Monday at the Kaspersky Security Analyst Summit here, researchers stopped short of saying Equation Group was the handiwork of the NSA—but they provided detailed evidence that strongly implicates the US spy agency.
First is the group’s known aptitude for conducting interdictions, such as installing covert implant firmware in a Cisco Systems router as it moved through the mail.

Second, a highly advanced keylogger in the Equation Group library refers to itself as “Grok” in its source code. The reference seems eerily similar to a line published last March in an Intercept article headlined “How the NSA Plans to Infect ‘Millions’ of Computers with Malware.” The article, which was based on Snowden-leaked documents, discussed an NSA-developed keylogger called Grok.
….read the full article on the NSA’s 14 year hidden domestic spy operation here.
Gray area policing, aka “high policing,” and Grayfish computer intrusions
<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

 
Well, anyways- for the researcher of organized gang stalking, the legal defense counsel or civil litigator who encounters the “gang stalking dialectic” or one of its many actual victims-and for the sworn *cough, cough* peace officers whose goal is to uphold our law and our Constitution-I suggest you have a read through that article-because now, other nations are peeking in here, quite routinely-and some of THOSE are peeking at you as you peek in at my writing.
And, for those who I have named herein-I suggest you keep your eyes open at night, because the moon near YOUR house will be getting brighter. A LOT brighter now.  Bright enough to encompass whole families.
Try not to see patterns, though….and maybe, watch your back, too. Apophenia, and all that kind of makes life hard, if you know what I mean. And certainly, that trick you played on Sharyll Atkisson wasn’t funny. Yup-I hear gang stalkers want to make you go broke fighting for your rights in courts that have deaf ears and blind eyes.

Six codenames

In all, Kaspersky has tied at least six distinct pieces of malware to Equation Group. They include:
EquationLaser: an early implant in use from 2001 to 2004.
DoubleFantasy: a validator-style trojan designed to confirm if the infected person is an intended target. People who are confirmed get upgraded to either EquationDrug or GrayFish.
EquationDrug: also known as Equestre, this is a complex attack platform that supports 35 different modules and 18 drivers. It is one of two Equation Group malware platforms to re-flash hard drive firmware and use virtual file systems to conceal malicious files and stolen data.
It was delivered only after a target had been infected with DoubleFantasy and confirmed to be a target. It was introduced in 2002 and was phased out in 2013 in favor of the more advanced GrayFish.

GrayFish: the successor to EquationDrug and the most sophisticated of all the Equation Group attack platforms. It resides completely in the registry and relies on a bootkit to take hold each time a computer starts. Whereas EquationDrug re-flashed hard drives for six models, GrayFish re-flashed 12 classes of hard drives. GrayFish exploits a vulnerability in the CloneCD driver ElbyCDIO.sys—and possibly drivers of other programs—to bypass Windows code-signing requirements.

<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

Enlarge/ The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code (“blue pill”, “red pill” – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly “swallows.”The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.

GrayFish is the crowning achievement of the Equation Group. The malware platform is so complex that Kaspersky researchers still understand only a fraction of its capabilities and inner workings. Key to the sophistication of GrayFish is its bootkit, which allows it to take extraordinarily granular control of the machines it infects.
“This allows it to control the launching of Windows at each stage,” Kaspersky’s written report explained. “In fact, after infection, the computer is not run by itself anymore: it is GrayFish that runs it step by step, making the necessary changes on the fly.”

Fanny: A computer worm that exploited what in 2008 were two zero-day vulnerabilities in Windows to self-replicate each time an infected USB stick was inserted into a targeted computer. The main purpose of Fanny was to conduct reconnaissance on sensitive air-gapped networks. After infecting a computer not connected to the Internet, Fanny collected network information and saved it to a hidden area of the USB drive. If the stick was later plugged in to an Internet-computer, it would upload the data to attacker servers and download any attacker commands. If the stick was later plugged into the air-gapped machine, the downloaded commands would be executed. This process would continue each time the stick was switched between air-gapped and Internet-connected machines.

Kaspersky Lab

TripleFantasy: A full-featured backdoor sometimes used in tandem with GrayFish.

Want to know the real reason the “deep state”(aka AIPAC sponsord organizations, racist sectarian political factions that hide behind NGO’s, and of course, every other American “law enforcement agency”  is at war with Kaspersky? Read the full article!But I for one, am not scared of the Chinese, or the Russians taking over anything.
Hell, I will show them to your door;-)
Related Story: That time-just that ONE-where I was approached by someone from Vegas who knew about these hacks, and wrote to me here at ROGS.

Marcy Wheeler, aka emptywheel, wants you to know that the NSA WANTS you to know that "ON 702, NSA WANTS TO ASSURE YOU YOU’RE NOT A TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET"

What journalists should know about the deep state Alphabetross domestic spying on Americans by the NSA/CIA/DEA/ODNI/FBI/SOD and FiveEyes-Israel Alliance, according to Marcy Wheeler (and I quote):

“ON 702, NSA WANTS TO ASSURE YOU YOU’RE NOT A TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET”


NSA just released a touchy-feely Q&A, complete with a touchy-feely image of the NSA, explaining “the Impact of Section 702 on the Typical American.”
I shall now shred it.
First note that this document deals with 702? It should be dealing with Title VII, because the entire thing gets reauthorized by 702 reauthorization. That means Sections 704 and 705(b), which are used to target Americans, will be reauthorized. And they have had egregious problems in recent years (even if the problems only affect some subset of around 300 Americans). Sure, Paul Manafort and Carter Page are not your “typical” Americans, but abuses against them would be problematic for reasons that could affect Americans (not least that they could fuck up the Mueller probe if FISA disclosure for defendants weren’t so broken).
The piece starts by talking about how the IC uses 702 to “hunt” for information on “adversaries,” which it suggests include terrorists and hackers.

The U.S. Intelligence Community relies on Section 702 of the Foreign Intelligence Surveillance Act in the constant hunt for information about foreign adversaries determined to harm the nation or our allies. The National Security Agency (NSA), for example, uses this law to target terrorists and thwart their plans. In a time of increasing cyber threats, Section 702 also aids the Intelligence Community’s cybersecurity efforts.

Somehow, it neglects to mention the foreign government certificate — which can target people who aren’t “adversaries” at all, but instead foreign muckety mucks we want to know about — or the counterproliferation certificate — which can target businesses of all kinds that deal in dual use technologies. Not to mention the SysAdmins that it might target for all these purposes.
The piece then lays out in two paragraphs and six questions (I include just one below) the basic principles that 702 can only “target” foreigners overseas.

Under Section 702, the government cannot target a U.S. person anywhere in the world, or any person located in the United States.
Under Section 702, NSA can target foreigners reasonably believed to be located outside the United States only if it has a basis to believe it will acquire certain types of foreign intelligence information that have been authorized for collection.
[snip]
Q: Can I, as an American, be the target of Section 702 surveillance?
A: No. As an American citizen, you cannot be the target of surveillance under Section 702. Even if you were not an American, you could not be targeted under Section 702 if you were located in the United States.

Effectively, this passage might as well say, “target target target target target target target target target target
target target target target target target target target target,” which is how many times (19) the word is used in the touchy-feely piece. The word “incidental” appears just once, where it entertains what happens if one of “Mary’s” foreign relatives were in a terrorist organization….[follow this link to read more!]

New Readers Start Here: Test every ROGS thesis, and then, get back to me.

As I state repeatedly here at ROGS, I ask you, the reader, to test and retest my many hypotheses. And also- I ask you to note that I am as non-sectarian as I can possibly be when it comes to religions, and bad cultural practices-I repudiate them all with equal ferocity, and I wrote ROGS so that those who are bothered by these lunatics who “work in darkness” have a place to begin studying their “hidden assailants” and other cowards who work under this Democracy subversion scheme.
Here below are some of the many thesis you can test and re-test for scientific certainty:
1)”gang stalking is the actions of corporate spies and counter-intelligence agents who all work in one way or another under the crisis PR narrative of “the War on Terror,” with warrantess surveillance and hidden “watch listing”
2)”cowards who work in government and as private sector rats, abusing official data, stolen from citizens, and passing it around interstate, and internationally to settle scores, wage revenge, blackmail, or destroy open and free election processes and democracy itself”
3)”cults and sects of organized religion that use data entrapment schemes from the NSA to the Five Eyes Nations, to Israel, to stalk and harm dissenters and activists and speakers of First Amendment protected pure speech”
4)”gang stalking is the actions of state unionists, city, state and federal level officials, and low-life state teat suckers such as collections agents, social workers, and prison industrial complex agents who derive their income from the many state industries that are little more than peonage systems”
5) ” gang stalking is connected to online data collection and abuse of persons whose data is collected”
6) “gang stalking uses artificial intelligence to target people online, and the stalking comes offline”
7) “gang stalkers belong to secret or exclusive clubs wh have access to the internet backbone and who do nefarious things from hidden capacities”
I have sprinkled many many more testable hypotheses here at ROGS, and I believe all of them can be replicated, and validated for generations to come.
Just look around ROGS here, and you will begin to understand that gang stalking is darker than the dark web, and deeper than any rabbit hole you ever imagined. Then, learn to use the proper language, separate the genuinely mentally ill schizophrenics and delusionals from those who are targeted because they are dissidents, activists, whistle blowers, journalists, and more.
And, in my peaceful, non-violent approach to the dialectic of gang stalking, I hope that you, the actual targeted person, can find ways to fight back, using words and the many electronic methods I recommend.
As predicted, my email has become an interesting circus of people-AGAIN, and predictably, traceable in many cases to these same I mention above (no offense intended to the actual TI’s I have counseled, or spoken with via email.) I even encountered someone who believes that their time is worth more than my own, which is a provably false presumption.
SO, again, these parts of my many thesis are validated repeatedly, and the researcher of OGS can validate these and similar results. As I have maintained throughout ROGS, my goal is to eradicate the ability of these people and this “program” to harm other individuals.
And, I see every day that it is working-the word is getting out all over the world. But mostly, as the keen reader will note, some very calculated racists and tribalists have managed to make their religious war a problem for all of us, regardless of our race class or gender. And in doing so, we see how the Five Eyes-Israel connection to ‘counter-terrorism’ is actually a massive broadside against the rights of speakers to speak.
Since ROGS will be seen eventually as a “game changer” that challenges the One Percent their hordes of flying monkeys, and their armies of bullies in High Heels who use “high policing” methods off the books to manipulate targeted speakers and targeted citizens- we see how it works in practice, as it is revealed-again-that the Five Eyes and its religious cults and sects, using Israel as a shield to destroy individuals and nations alike, using religious right eugenicists, human rights abusers, and other fanatics who are attempting, and succeeding, in suppressing speech and speakers.
This, more than anything is, and has been the goal of all organized gang stalking since the word first hit the internet, and as we see in the extant “studies” of OGS, the main goal of OGS denialists is exactly that: to silence speakers, or to target and harass them should they refuse to yield the floor to this un-litigated nightmare of the NSA data theft pipeline, its associated assaults on liberty, privacy, and due process; and how it affects us all-and steals our time and opportunities, one abuse of data at a time; one slander campaign, one whisper network at a time, outside of the rule of law.
And, we also see that ROGS isn’t alone in asking the right questions, or challenging corporate and state power as it colludes in these endeavors. But organized gang stalking, properly named, is “counter-inteligence stalking” and it is illegal, unethical, and un-paralleled in its use on citizens of our “free” nations, regardless of race class and gender; because it targets those of us who actually know how to name evil as what evil actually is. See points 1-7 above if you are in doubt.
Meantime, I leave you with more details of how foreign agents who work under a religious-theocratic methodology are influencing/stealing our election processes, our privacy and due processes, and waging hidden wars on speakers; and also, Glenn Greenwald’s latest column, where he names another evil, and the evil that seeks to kill democracy, for all rational people of civilized nations.
So-“what is Israelification?”What is “a suspended Constitution?” And: “How are Democracies destroyed, one targeted speaker at a time?”
Ask Glenn Greenwald, whose courageous journalism brought Edward Snowden into the limelight, and brought he NSA-FiveEyes-Israel blackmail scheme out of its hidey hole. And next time you see the phrase “deleted his web page,” or you observe an internet trll war, or ye another “safe space keepin mind tat these are all attempts to discourage speakers, and the actual beginning of one or another form of stalking that targets individuals as “influencers.”
Then, keep this below, in mind-if you still have one- when this massive trance formation via influence operation is complete:

Glenn _Greenwald

424
Photo: Eric Risberg/AP

In September of last year, we noted that Facebook representatives were meeting with the Israeli government to determine which Facebook accounts of Palestinians should be deleted on the ground that they constituted “incitement.” The meetings — called for and presided over by one of the most extremist and authoritarian Israeli officials, pro-settlement Justice Minister Ayelet Shaked — came after Israel threatened Facebook that its failure to voluntarily comply with Israeli deletion orders would result in the enactment of laws requiring Facebook to do so, upon pain of being severely fined or even blocked in the country.
The predictable results of those meetings are now clear and well-documented. Ever since, Facebook has been on a censorship rampage against Palestinian activists who protest the decades-long, illegal Israeli occupation, all directed and determined by Israeli officials. Indeed, Israeli officials have been publicly boasting about how obedient Facebook is when it comes to Israeli censorship orders:
Shortly after news broke earlier this month of the agreement between the Israeli government and Facebook, Israeli Justice Minister Ayelet Shaked said Tel Aviv had submitted 158 requests to the social media giant over the previous four months asking it to remove content it deemed “incitement.” She said Facebook had granted 95 percent of the requests.
She’s right. The submission to Israeli dictates is hard to overstate: As the New York Times put it in December of last year, “Israeli security agencies monitor Facebook and send the company posts they consider incitement. Facebook has responded by removing most of them.”
What makes this censorship particularly consequential is that “96 percent of Palestinians said their primary use of Facebook was for following news.” That means that Israeli officials have virtually unfettered control over a key communications forum of Palestinians.
In the weeks following those Facebook-Israel meetings, reported The Independent, “the activist collective Palestinian Information Center reported that at least 10 of their administrators’ accounts for their Arabic and English Facebook pages — followed by more than 2 million people — have been suspended, seven of them permanently, which they say is a result of new measures put in place in the wake of Facebook’s meeting with Israel.” Last March, Facebook briefly shut down the Facebook page of the political party, Fatah, followed by millions, “because of an old photo posted of former leader Yasser Arafat holding a rifle.”
A 2016 report from the Palestinian Center for Development and Media Freedoms detailed how extensive the Facebook censorship was:
Pages and personal accounts that were filtered and blocked: Palestinian Dialogue Network (PALDF.net) Gaza now, Jerusalem News Network, Shihab agency, Radio Bethlehem 2000, Orient Radio Network, page Mesh Heck, Ramallah news, journalist Huzaifa Jamous from Abu Dis, activist Qassam Bedier, activist Mohammed Ghannam, journalist Kamel Jbeil, administrative accounts for Al Quds Page, administrative accounts Shihab agency, activist Abdel-Qader al-Titi, youth activist Hussein Shajaeih, Ramah Mubarak (account is activated), Ahmed Abdel Aal (account is activated), Mohammad Za’anin (still deleted), Amer Abu Arafa (still deleted), Abdulrahman al-Kahlout (still deleted).
Needless to say, Israelis have virtually free rein to post whatever they want about Palestinians. Calls by Israelis for the killing of Palestinians are commonplace on Facebook, and largely remain undisturbed.

 
As Al Jazeera reported last year, “Inflammatory speech posted in the Hebrew language … has attracted much less attention from the Israeli authorities and Facebook.” One study found that “122,000 users directly called for violence with words like ‘murder,’ ‘kill,’ or ‘burn.’ Arabs were the No. 1 recipients of hateful comments.” Yet there appears to be little effort by Facebook to censor any of that.

 

Lastly, to my dedicated readers, I note that I watched this video below many years ago,in 2011, which was a banner year for gang stalking complaints, according to Google, and the extant literature about gang stalking online. I watched it as strangers occupied the apartment next door to me, strange people on foot and on bicycles, and local morons who drove used Crown Victoria’s that they purchased from state auctions followed me everywhere, and flashed “red dot” lasers through my windows, set up makeshift “sniper nests” outside my apartment, and more-and all of that under the watchful eyes of US agents and agencies.
Then, later, “my” internet history re-appeared on another computer, two cities away, in the form of “desktop folders” that were in .zip files, with arrows on them pointing “offline.” Against my will, and with no recurse to legal channels, or even proper names for what this “thing of theirs” is (who do you call when it is “them” doing these things?), I was drawn and quartered in hidden internet operations, where hidden actors did hidden things.
All of this took place as the Obama Administration waged war on journalists, and prosecuted more “leaks”than any president ever, revealing that fascism is neither left or right, black or white; christian, Catholic or Jewish-that fascism is what we are living under today in the NSA-FiveEyes-Israel data theft scheme. While I was a victim of nefarious government and private sector abuse, others were persecuted and prosecuted to a much higher degree.
Here is former New Yark Times reporter James Risen, who first revealed the illegal NSA spying on America and unconstitutional NSA data theft scheme, describing the political, the bizarre, and sometimes-the freakishly odd events that he endured as a journalist during the “War On Terror.” Risen’s book, “A State of War,“came out in 2006, around the time I was writing a play about a compromised deputy US Attorney General, who had foregone the “rule of law,” and deliberately acquiesced to NSA spying on citizens.
Risen had refused to reveal his sources for seven years, and  faced jail time, and the “investigation” was eventually dropped. The source he was protecting was former CIA agent Jeffrey Sterling who was prosecuted under the archaic Espionage Act because he was alleged to have revealed bizarre CIA plans that were straight out of a comic book, and all of THAT while the NSA was spying on all Americans, and worse, using the data selectively, and punitively in various entrapment/compromise/blackmail operations of varying degrees.
So-what does “Organized Gang Stalking” look like in practice?
The case of Mahmoud Al Mabhouh’s Assassination by Israeli “sayanim.” Also, see this post here for how that affects the Five Eyes Nations of the US, UK, Canada, Australia, New Zealand
 
[youtube https://www.youtube.com/watch?v=7d9KDysPbZ0&w=854&h=480]
So, for those who are targeted with these things, take note that your only option is to build evidence, and wage peaceful, non-violent resistance to OGS. Then, when you have yourself pointed in the right direction, with substantial film and photographic evidence, combined with other types of evidence (see the top of this blog for sections that teach you how to collect evidence), bring it to a lawyer, and have that lawyer contact the police.
Because without counter-narrative to organized gang stalking” aka “counter-intelligence stalking, you could end up framed, defamed, slandered, or dead, as “the good guys” look on-because as of now, complaints of gang stalking are being called “crazy” by those who derive income from one or another form of the DVIC, MIC, or PIC industries.
And here at ROGS, I want YOU to learn to fight back, using peaceful, non-violent resistance and dissent, and, knowing you are not alone. Because any other way-they win, whoever your  “they” are, because we know with scientific certainty that “they” are the One Percent and their enablers.
Related Story: What are “sayanim” and who do they target with organized gang stalking? Many center-to-right christians note that “SAYANIM ARE INDISPENSABLE IN FALSE FLAGS AND MOSSAD ASSASSINATIONS” while the Huffington Post calls these foreign agents and their networks of NGO affiliates that work behind the scenes on the internet, and in various social functions in America and elsewhere:

Mossad’s Little Helpers

By Jamal Dajani Not much has been left to the imagination in the assassination of Hamas commander Mahmoud al-Mabhouh in Dubai on January 19. The entire operation has unfolded on closed circuit television cameras in front of millions of viewers across the globe, just like an episode from a reality show.
Pictures of the perpetrators, all 27 of them, have been plastered all over the web. Dubai Police Chief Dhahi Khalfan Tamim has on more than one occasion declared to the media that he was all but 100% certain that the hit on al-Mabhouh had all the markings of the Mossad on it.
He recently said that his men had obtained the DNA of part of the members of the hit squad and vowed to resign from his post if this claim proves to be false.“I challenge Israel to bring the suspects there in order to undergo a DNA test and compare them with the samples we have,” he said in an interview to the UAE-based al-Khaleej newspaper.“If it turns out that the results do not match, I will resign. You can lie about anything, but not about DNA,” he added.
The Bayonet
The assassination of al-Mabhouh has thrown an unwanted spotlight on the workings of Mossad and its specially trained assassination team, known as a kidon, the Hebrew word for bayonet, something that the Israeli government had not bargained for when the approval to conduct such an operation came directly from the top: Prime Minister Benjamin Netanyahu.
Incidentally, it was also during Mr. Netanyahu’s first term as prime minister in 1997 when a kidon unit of the Mossad bungled the attempted assassination of Khalid Mish’al, the current leader of Hamas, in the streets of Amman in Jordan by injecting a mysterious poison into his ear.
The Helpers
The use of forged European passports by Mossad agents entering Dubai to assassinate al-Mabhouh has kicked up a diplomatic storm in recent days. The EU issued a strong condemnation of the stolen IDs, indirectly criticizing Israel. Israeli ambassadors in Britain, Ireland, France, Australia and Germany have been called in to discuss the issue, and Israel’s Foreign Minister Avigdor Lieberman has been given an earful by many of his counterparts.
But were the Israeli dual nationals whose foreign passports were allegedly forged unaware that their identities were stolen by the Mossad? Or were they acting as sayanim, the Hebrew word for helpers, whom the Mossad relies on across the globe to provide shelter, money, and logistical support… in this case identity. A sayan, singular for sayanim, must be 100% Jewish, and in many cases a dual national.
The CIA
Also, why was not a single agent out of the 27 identified to be holders of foreign passports a US passport holder?Israel has a large number of dual-national Jewish-Americans living in the country, many of whom serve in the Israeli military and various government related jobs. Was this deliberate so as not to draw the wrath of the United States? Or was it simply that this operation was coordinated with the CIA?
The Wall Street Journal, the New York Times, and numerous foreign press outlets have reported that two men linked to the assassination of al-Mabhouh entered the U.S. on specific dates after the killing. According to the reports, someone using an Irish passport with the name Evan Dennings entered the U.S. on Jan. 21, and someone using a British passport with the name Roy Allan Cannon entered the U.S. on Feb. 14.
Are sayanim in the US? Follow this link to learn more!
Yup.
In case you are wondering, in every totalitarian state, communist country, or religious theocracy, free speech and due process of law are “the enemy” of these types of governments, who will stop at nothing to twist and distort meaning and intentions of speakers.Then-ask yourself, or ask a friend why it is exactly that some organizations that claim to speak for rights, or the Constitution,  are so biased and racist when it comes to interpreting simple things like due process rights?
In case you are wondering who these spokes-persons of the One Percent might be-ask the one of those organizations, as nearly all of them are led by the descendants of Eastern Bloc Bolsheviks who work “in darkness,” and pick easy fights against individuals, while doing NOTHING about the NSA-FiveEyes-Israel data theft and spying pipeline. These mock, malign and pick on “the little people,” in fights that they can easily win, while sitting on millions and billions of dollars in cash to subvert the due process. In case you guessed “superficial crybullies from the One Percent” you would be correct.
Here is an individual, who speaks for due process of law, and the Constitution of Jefferson, and Haym Solomon alike, being mocked, chided, and filleted by a multi-million dollar ‘do nothing” organization whose focus is on distorting it’s own biases and hatred so that we, the people never get a glimpse of their eugenic nature in what can only be called Edward Bernaysian Irony.
Edward Bernays, you might recall, is the guy who led American women into a century of tobacco addiction, much as Mark Zuckerberg, in league with our current government, and “the deep state” are leading our children into brain-deforming dopamine rushes,in what some are calling a propaganda and mind control operation that is “much worse than Hitler.”
“Propaganda is to democracy what violence is to dictatorship. In a democracy you cant get away with controlling people by force so you use propaganda to manufacture an illusory version of consent.”
[youtube https://www.youtube.com/watch?v=CWoorJKA6pg&w=640&h=360]
But today-some people-for some reason-get away with murder, which is often preceded by organized stalking in that begins in a database; in colleges, universities, government institutions; online and offline. These people “whoever They are” are literally abusing targeted individuals because, as the ACLU has noted, they have the ability to “influence” other citizens.
You don’t have to take my word for it-ask the internet if “gang stalking” of targeted individuals by gangs of people who stalk individuals online AND offline, in cowardly ways, and in secret” is real.  Ask Val, the merchant mariner, and part time family electrician. Ask “the internet” if it targets and talks back to people, or otherwise manipulates their minds and choices without informed consent.
Or, ask the 1.5 BILLION dollar crisis PR budget that the fed doles out to “some people” who are “gazillionaires,” for “some reason” more than others; and those who likely forgot where they came from.
Or-ask the “authorities-they will surely be glad to mislead you; or haul you away in a straight jacket like they did to Andy Ostrowski when you speak up abut it; or chase you to Mexico after stalking and conspiring against you like they did-and are doing-to Gavin Seim.

Google, demographic searches, Facebook, dopamine, criminal defense lawyers, and gang stalking

The reader might have noticed that gang stalking is gaining credibility as a valid complaint online, and calling it by its proper name: counter-intelligence and police stalking
,
as we see in this example where a couple reporters and sociologists held a forum about the stalker state.

And, we also see that forums like Reddit and main stream news have begun to cover stories that walk the fine line between covering gang stalking as what it is “a rampant abuse of counter-terrorism funding and propaganda, and high policing as pretext to target the ‘usual suspects:’ the poor, the disenfranchised, the vulnerable, and the marginalized; the dissident voice, and the non-ADL infiltrated activist.”

Related: Read this brilliant Reddit analysis about how the One Percent have inter-linked their tribal-sectarian racism with artificial intelligence, and the nefarious Facebook and other CIA InQtel startups.
Then, read how ROGS Analysis has scientifically predicted key elements of a recent mass shooting, and also that racists are using labelling theory and framing people online, using military grade psychological operations, targeted at individuals.

And the main stream news is aware that they have been asked to put a “spin” on complaints of gang stalking that make it to a court room or two, because their fakenews depends upon near-mythical badguys, and wolf’s at the door that can be relegated to delusional complaints. All western Jewish-Christian-Abrahamic societies work from that level of fakemyth in order to substantiate and affirm their story telling basis based in superstition, and that superstition backed by actual human sacrifices (the Jesus myth is the classic example.)
Here is a case of this EXACT media framing in action, as we see a guy involved in drugs, and murdering another guy, just after he gets a “strange phone call about gang staking.”
Notice that the phone call is described as a “prank,” which seems to require more evidence, and more exploration, because the ROGS thesis holds that it was actually a deep state, or OTB black ops police tactic, or involvement of OTB snitches; or who were directly connected to Fusion Center tracking, and other elements .
In other words, ROGS is saying that this crime-like so many we see today-is possibly and likely the direct result of state leave actors using the obscured tactics of counter-terrorism tactic of gang stalking, and it CAUSED or CONTRIBUTED to a homicide (and keep in mind that the ROGS purpose is to destroy the ability of LEO’s to continue to mask bad behavior, and use illegal tactics and methods while cowering behind the thin veneer of counter-terrorism).
For reference, I have highlighted the relevant text, or linked it to other ROGS posts that discuss how gang stalking tactics affect cases “in darkness”and note that one of the metrics of measuring the ineffectiveness of counter terror gang stalking is that actual homicides are carried out, and many of those are a direct result of this neverending harrassment of targets, as we saw in the Virginia Beach shooting, Ian Long, Mathew Riehl, and many others:

Murder trial gets underway with opening statements

[Prosecutor]Smith argued that the level of violence indicates it was not self-defense.
A picture can be worth a thousand words, and I think this picture says a lot,” Smith said as he flashed a grisly photo of Maulding’s body across a large screen. “He beat him to a pulp.”
Reichow’s defense attorney, Sean Downs, argued that there are two sides to every story and “sometimes three, four, five. It’s not always going to fit together perfectly for you,” he told the jury.
What the attorneys do seem to agree on is that Reichow and Maulding had been hanging out earlier in the day. They were picked up by another friend, Anne Tanninen, from Maulding’s house and went to a storage unit that Tanninen had rented.
The trio was inside the storage space when Tanninen received a strange phone call, Smith said, from someone talking about $5,000, drugs and picking something up. He said both Reichow and Tanninen shared paranoid beliefs about the world, and they thought they were being “gang stalked.” Gang stalking can include being harassed by an organized group of people.
Up until the call, which turned out to be a prank, nothing was out of the ordinary, Smith said. The trio were unloading some items at the storage space, and Maulding was toying around with a bat inside the unit, he said.
Tanninen became upset after the call, however, and started arguing with Reichow, Smith said. She and Maulding confronted Reichow about possibly being associated with the call.
Downs said Maulding started taunting Reichow with the bat, saying “Come here, boy. Come here, boy.” Maulding, who had been drinking earlier in the day, was still intoxicated and threatened Reichow, Downs said.

Or, perhaps the reader today has noticed that Big Tech like Facebook is being indicted BY IT’S OWN CORPORATE OFFICERS as sick and exploitative manipulators of public discourse, AND psychological processes that amount to mind disruption.
Here-from yesterday’s news, is something that I wrote about many months ago, before the MSM picked it up-yet another Facebook CEO/investor/developer has come forwards to blow the whistle on the practice of manipulating dopamine levels in our brains. Keep in mind that their investors are largely drawn from the jingoistic Jewish-Christian fold, for whom no excess of cultic or chemical abuse of children is ever enough to satisfy their bulimic hunger):

“CHAMATH PALIHAPITIYA, A former Facebook executive has spoken out against the social network he helped to create, saying it is ‘ripping society apart'”

 

He cited an incident in India where hoax messages about kidnappings shared on WhatsApp led to the lynching of seven innocent people, according to reports in The Verge.

During his talk, Mr Palihapitiya called out not only Facebook, but Silicon Valley’s entire system of funding.

He claimed money pumped into the region would be better spent addressing problems like climate change and disease.

Speaking to an audience at Stanford Graduate School of Business, Mr Palihapitiya said: ‘I think we have created tools that are ripping apart the social fabric of how society works.

‘The short-term, dopamine-driven feedback loops we’ve created are destroying how society works.

‘No civil discourse, no cooperation; misinformation, mistruth.

‘And it’s not an American problem — this is not about Russians ads. This is a global problem.’

This is not the first time that prominent figure at Facebook has spoken out about the social network.

For those of you who use such products, my heart goes out to you, and I hope you can read through ROGS here and find “the help you need” to possibly begin a class action lawsuit that will provably be bigger than Big Tobacco if we do it right.
But I haven’t personally used social media since 2005-6, and have never used the social network’s except AS investigative tools, for reasons that I will write about later (it started with total hacking of all my email and academic accounts for nearly a decade, between 2003-13).
But it will take a lawsuit against Facebook and other social media which will expose the multi-headed hydra’s and other monsters that our governments have been pointing at our minds in a direct webterrogation of our personalities, our intentions, our hopes and dreams-and a direct influence operation on our choices, and that, through direct manipulation of our free will, via dopamine.But I would go one step further, and state that the internet itself, weaponized by the FiveEyes, has literally designed this effect.
And certainly, “they” have been literally targeting SOME people differently than other people. Mass shooter Devin Kelley’s Facebook was webwashed after his rampage. Why is that?

Related Stories: Where does the NSA end and Facebook begin? Facebook and its investors range from CIA butt boys like Peter Thiel, to Hong Kong mobster’s such as Li Ka- Shing, to standard front companies, to Goldman Sachs.And, how the FBI and NSA made Facebook the perfect surveillance tool after the great Culling of 2001.

Facebook executives admit deliberately manipulating dopamine levels in children to create “positive feedback loops.” Is it possible then, that they also help or enable negative feedback loops? I think Devin Kelley and many other “terrorists” mass shooters are examples of that, as I have studied this since 2005, being fully aware that the internet is “interactive” without our informed consent.
So, the War on Terror is ACTUALLY a war on ideas, and the people who have them-it is a cover operation for mass mind control. Literally using dopamine manipulation and propaganda tactics that other Facebook executives have called “brainwashing on a level that Edward Bernay’s could never have imagined as he powered Hitler, and Big Tobacco.’ But it is also an assault on individuals, and many of thse individuals that LEO’s and all the counter-terror hero’s can use as unpaid HUMINT to lead them to cases that they otherwise could NOT access.
And worse, because of the egregious and outrageous hidden mechanisms, and unchecked, un-monitored use of tactics, and toys and tools of OGS beyond the knowledge of courts of law, we see that citizens are robbed of free will, and instead, are used as unpaid labor that drives federal funding initiatives. This is what “high policing” is and how it has affected society-and individual cases-at large.
Again, do your own research, but there is an over-whelming bunch of evidence and data is increasing that indicates this is true. While George Orwell got it right about Big Government, he missed the part where government would use corporations as front companies, like any CIA operation ever, but this time, it is 17 agencies waging the ongoing Operation MHCHAOS, with augmented internet that targets “bad ideas” and “PRISM’s” and “XKEYSCORES” of words, mind mapping, and SOCMINT profiles long before the activist, dissident, whistle blower, or others, sometimes criminals, get targeted for “disruption.”
And, failing THAT, we now see that “destruction” soon follows, as in the case of the mass shooters, homicides, petty crimes, and more.

brave new piggies.jpg
And certainly, Brave New World is here, but augmented highly industrious DVIC flying pigs, and an ever morphing wolf at the chimney, via mind control via Facebook-and studies that claim targeted individuals are suffering from delusional disorder.

The only thing that can be said at this time about the “delusion” of gang stalking, and backed with ROGS Predictive Analysis, and empirical evidence is that psychologists like Dr. Lorraine Sheridan, et al. also share funding sources, and utilize ATAP damage control narratives, every time another layer of this un-constitutional policing scheme is revealed.