I write about the social phenomenon called "gang stalking," which is the direct and predictable result of the surveillance states that were released upon us after 2001, a directed effort of social control, deployed against activists, and dissidents in what were formerly known as "western democracies." All cases of gang stalking are actually current and former police, military, intelligence, security contractors, and their related fraternal and sororal organizations, working to target ordinary citizens. You can find proof of gang stalking, and related gang stalking lawsuits here- because they leave distinctive tracks, and so I follow them where they lead.
Duncan Socrates Lemp, software developer, startup entrepreneur, GitHub contributor, and Habitat for Humanity volunteer, was murdered in cold blood, in his bed, as he slept, by police who were waging a no-knock raid on his home (despite the fact that not a single person in that home had ever been charged, or convicted of any crime ).
The murder by police of this promising software developer doesnt fit the profile of the “usual ” police murder victim, either.
“The constitution is dead.”
-Duncan Lemps last Tweet,the evening before he was murdered as he slept
I am passionate about using technology to improve the world in a data driven manner.
– J-Gravity Contributor (Janus N-Body Universe Simulation)
– Invited to speak to thousands of developers on multiple occasions
– Volunteer for Habitat for Humanity & My Sisters Place
Potomac San Francisco San Juan Herndon Denver
Finance Technology Fin Tech Investment Management Trading Cryptocurrency Algorithms Machine Learning Big Data
But he definitely shares features that indicate he could have been a gang stalking victim, starting with the after death body punch of people and organizations who use the number 13in their handywork like we see in case, after case, after case where the,Anti Defamation League and its K 4 mob is implicated.
Lets use Rogs Analysis to see if we can.pick up a few leads, and ask the questions that pit ROGS Analysis of Gang Stalking against falsifiable scientific standards of proof.
To do that, lets take a look at one of the first stories I read in the MSM,from CBS:
Man killed by officer was asleep when police fired
An attorney says a Maryland man who was shot and killed by a police officer was asleep in his bedroom when police opened fire from outside his house
MICHAEL KUNZELMAN Associated Press
14 March 2020, 10:47
This 2019 photo shows Duncan Lemp in Venice, Italy. Lemp was asleep in his bedroom when police opened fire from outside his house, killing him and wounding his girlfriend, an attorney for the 21-year-old man’s family said Friday, March 13, 2020. (Mercedes Lemp via AP)
This 2019 photo shows Duncan Lemp in Venice, Italy. Lemp was asleep in his bedroom when police opened fire from outside his house, killing him and wounding his girlfriend, an attorney for the 21-year-old man’s family said Friday, March 13, 2020. (Mercedes Lemp via AP)The Associated Press
So, thats,the first story I saw that brought my attention to thise case, and it raised red flags.
So, here are those red flags:
* The guy was active on social media,both as a libertarian, but also as what is called a, “three percenter ” aka a Constitutional activist who believes in the,US Cobstitution. Notice that my research indicates that libertarians are targeted
* The ADL, a racist organization that funded the second rise of the KKK,appears in the official news media as if they are a credible source, and documents that they have, in fact, been “monitoring ” aka spying on the guy, as we see in cases ranging from New Mexico shooter William Atchisson, to Mathew Riehl, and so many more.
I am watching this case closely, and watching for a ROGS BINGO.
Here are a few scientific predictions:
* the guy was speech monitored for something he said online
* the ADL and its flying monkeys were spying on him, and using bizarre online and offline interactions
* they provided the fake “tip ” to police
* aw hisper campaign.was waged online,and off about the guy
* the FBI CVE programs,were active
* whispers about the guys mental health
* race -based monitoring
* so much more I could predict, but I,will short hand it: in nearly every mass shooter in recent memory,a Hispanic police chief runs narrative, and /or the cop who killed the guy was Hispanic or other K 4. identity.
This last prediction is more for fun than it is for science, so I cant wait to find out.
Meantime, yup, there was in fact a “thirteen ” involved, but I,wont disclose it at this time, for fun, of course.
Online “personas ” and what to do about them: gang stalking by AI assisted robots and targeted individuals online: a gang stalking conundrum.
Gang stalking is automated, but also, assisted by living breathing humans, who are sometimes paid players, and other times, mere useless idiots who play along with the Mockingbird Effect.
Here, have a look at how I was cyberstalked on Mike Masnicks (fabulous ) blog, Techdirt.com:
The gang stalking started around 2013, when I tried to raise awareness of organized gang stalking. Out of necessity for dealing with a troll farm friendly commenting sytem at Techdirt, I used different “personas” to manage a conversation, but without any software, or automated programs to assist me:
I was defending/empathizing with a guy named Jeffrey Kantor who had been targeted by a Google based algorithym, and that had served him bullshit results, and possibly, those results spoonfed to him after some online gang stalking by Fusion Center operatives and military contractors/AI programs that manipulated his search results.
Back in those days, AI gang stalking was new to the “normies ” whereas I first experienced online “redirection” after I reported on the first Somali manufactured terrorist in the City College News, Mohammed Warsame, who was an FBI snitch.
Redirection is where people search Google, or other search engines for materials and get different results, depending upon who is targeting the searcher based upon an IP address, as we see in the case of ADL online cyberstalking here.
So, the Jewish, parochial journalist (Mike Masnick, of Techdirt.com, for example ) who searches for information about “why do Somalis get…. ” blankety blank, will get Google results for:
And other such discussions, whereas myself, I got results sponsored by shitbags like the Anti Defamation League, and bbbb,,b other shit-persons. I also got Nazi logo laden websites (courtesy of the Bronfman klan and local Fusion Centers, working with Infragard shitbags like that colleges president) every time I searched forresults like, “human rights in Palestine” and so on.
And, besides the ibvious terroris recruitment pop -ups, and as in Arabuc tat I couldnt read, when I searched for information on Somalis, I got stuff like this instead :
and keep in mid tat its not just “the gubmint ” targeting you, but tese das, it could be racist groups like the Anti Defamation League and its octopus of NGOs, or even te Klan, and any of the militant feminist groups who work behind Sexual Violence Centers (also note the para-language involved in nearly all DVIC industries )
I will provide more context at a later date, with evidence.
According to Mike Masnick* the progenitor of the Anti Defamation Leagues new go-to internet rag, techdirt.com (and Svengali himself would approve).
Let that sink into your brain a little bit. ….like poison, or a horsehair worm, infecting a cricket….ROGS will still be here, awaiting your analysis.
Oh, wait- that quote comes from the paranoid racist people at the Anti Defamation League, specifically defamer-in-chief, Jonathan Greenblatt, who has now acknowledged EXACTLY what ROGS has alleged ALL ALONG.
And, the language echoes Mike Masnicks comments in the linked posts below.
So, dont ask lil’ ol ROGS about the link between the dialectic of “polluting the internet, ” and the Anti Defamation Leagues(ADL) blackmail and smear streams (that traffic in negative stereotypes about Jews, as Svengali mind controlling wizards)!
Ask Masnick, himself, if lil ol ROGS is polluting the internet (whatever the fuck that means ) as Mike walks the plank between internet fact and fiction, in the case of the ADLs Jonathan Greenbacks v Free Speech online, because every ROGS,thesis,about the #ADLification of media, AND the hidden “high policing” methods being deployed on mass shooters before they go on rampages is validated here, as ROGS now affirms the toxic ADL being directly linked to mass shooters, and inciting mass homicides.
K4 manufactured terrorism has now replaced the KKK as a force of domestic terror, via the creation of the mass shooter through online and offline harassment.
RELATED POST: Look at how FBI/CIA/ADL affilliated neocon terrorist/manufactured terror creator Rita Katz shows up at so many manufactured terrorist events, as a person whose company has preemptively cyberstalked and harassed people who eventually become mass shooters.
Is any US law enforcement agency monitoring her? Nope: because theres no money to be made from that. Cops and alphabet agencies ONLY get PAID AFTER these manufactured terror events.
The Anti Defamation League, most known for practicing defamation, and paranoid “anti-semitic conspiracy theories,” now ties itself directly to EVERY ROGS THESIS about sick, sad, racist Jews practicing online psychological operations against those who they target, stalk, harass, and pre-emptively defame online (with Techdirt.coms Mike Masnick highlighted as a polluter of internet discourse, via following ADL boilerplate defamation tactics):
From Smolokos favorite shithole, the ADLs own blog, I bid the ROGS reader 小心, and I ask that you excercise caution when reading the radicalizing racist hate literature of the ADL, the SPLC, and their sattelute news outlets and enablers, be ause that irganization, founded by notorious gangster Mayer Lansky, has sponsored bombings, and stalkings and other US centered Israelified mayhem for the entirety of the last century into the current one; and has been implicated as subverters of democracy since they famously spied on activists in 1993; and, ROGS has linked them and their intelligence agency accolytes, and Jewish stalking, AND redirection repeatedly, here at this blog(look at my posts about this person who stalked me on Twitter, or these ADL affilliated stalkings, ranging from Ian Long, to Matt Riehl, and even the odd case of designer fake bomber Cesar Sayoc, and more .)
ROGS asks: who is better at ROMPER STOMPER BINGO, the alt-Right, or white Jews who masquerade online as Zionazis in sheeps clothing?….
Can Google Search Be Used to Counter White Supremacy?
We’re co-opting the online platforms that embolden extremists who fan the flames of bigotry and violent fantasies to stop them before they act.
Jonathan Greenblatt, National Director of the Anti-Defamation League
July 1, 2019
This article originally appeared in The Times of Israel
From hateful speech on Stormfront and Gab to the harassment of rabbis walking down the street in Germany to recent deadly violence at houses of worship in Pittsburgh, Christchurch, and Poway, it is painfully clear how online radicalization truly endangers communities. There’s a bright through-line from online hateful ecosystems to in-person violence. In fact, the perpetrators of all three of the aforementioned shootings were inspired by what they read online and actively involved in internet forums where extremism thrives.
The stakes couldn’t be higher. We must deploy every possible tool — from both the public and private sectors — to aggressively tackle growing online white supremacy as the global terror threat that it can pose.
That’s why the Anti-Defamation League is partnering with Moonshot CVE and the Gen Next Foundation to counter white supremacist and jihadist activity online. The program, dubbed the Redirect Method, will use advertising to provide individuals who search Google for violent extremist material with content that exposes the falsehoods of extremist narratives, providing searchers the choice of an off-ramp to radicalization.
Targeting content potential extremists search for — rather than focusing, for example, on what they post to social media — can directly address their harmful online behavior and desires. By providing them with credible sources, we hope to decrease the impact of extremist content and increase the spread of the truth, such as, there is no one “European” identity that is under threat. In this way, we speak directly to those who may be at risk of radicalization, and we incentivize re-thinking those ideologies with accurate information.
While it is too early to tell whether this method works, there is early evidence to suggest that it can have an impact on what content people searching for extremist content are ultimately engaging with and viewing.
Moonshot and Google previously launched a Redirect Method program for ISIS-related searches, which found that those who searched for ISIS content were highly likely to engage with the more constructive, non-violent content that was offered. This led to several thousand views of constructive materials in place of searches related to Islamist extremism. Our new project builds on this success while pulling from ADL’s subject matter expertise in extremist codewords and unique insights to lead the project.
The data on extremism is clear: white supremacist threats are increasing. ADL research has found that of the 50 murders in the US committed by extremists in 2018, all but one were linked to right-wing extremism and 78 percent were tied specifically to white supremacy.
Technology has accelerated the speed with which this hate spreads. Extremists have leveraged the anonymity and connectivity of the internet to move out of the shadows and into the spotlight. They have developed sophisticated, media savvy strategies to circulate their messages and reach a wider audience than previously possible. No longer is this content confined to the margins of society, online platforms embolden extremists like never before by creating an echo chamber that fans the flames of bigotry and violent fantasies. The internet now makes it possible for round-the-clock white supremacist rallies.
Throughout the next year, we will run thousands of ad campaigns across the United States. We will harness the vast array of content that has already been created by local organizations and individuals. We expect the results to provide promising insights into how white supremacists engage with online content and how we can use commercial tools to empower positive messaging to influence their behavior before they commit acts of violence.
Some people might hear about this and raise concerns that it could inhibit free speech. In fact, the opposite is the case. Internet content skews toward the virality of controversy, polluting the marketplace of ideas with vitriolic speech. The Redirect Method actually improves the online marketplace of ideas, not by limiting any speech, but by ensuring that hateful propaganda and intellectually honest information are presented side-by-side. Individuals are always free to ignore online advertisements, but we hope the alternative content will effectively challenge harmful ideologies.
There’s more to be done in fighting hate from wherever it rears its ugly head, but this is a significant step forward. We hope the Redirect Method will inspire tech companies, governments, and international groups to join us in creatively tackling this challenge so that platforms that are meant to bring us together to share ideas will not tear us apart. Together, we can be a force for good that prevents the viral infection of extremism from spreading further throughout our digital world. If you are interested in learning how to perpetrate a swastihoax on yourself, or study crybullying and #fakerape, contact these guys:
Crisis PR manufacturing factories are in overdrive exploiting the narrative with the Las Vegas shooting, the worst mass shooting in US history (not counting the slaughters of Native American’s by the “good guys” and the women they are “protecting” in the last few centuries). And, while “active shooters” and “mass shooters” are anomalies in the dataof organized gang stalking, far to the outside of the outliers on a Bell curve-we see one pattern emerge in media: ritualistic slander and defamation, which has long been a practice of cults and sects within organized religion, policing, and government. Good Reads: Author and cross-disciplinary integrator Jeremy Lent notes in “The Patterning Instinct”that mind control is real-and it’s happening to you right now.
And, we see another familiar pattern: the DVIC vampires and the crisis PR agencies are sinking their teeth into the still warm corpses of the many victims, and claiming Stephen Paddock had a ‘history of domestic violence,’ which is mere hearsay, never litigated in any trial, anywhere, and true to form in the lop-sided narrative, outlined here in the case of Gaergate, where the Five Eyes spy apparatus used influence and psychological operations to sway voters, and form mass minds, that the lie runs quicker than a truth, or the results of a fair trial.
While no one wants to stick up for a dead maniac, a terrorist, a wife beater, or child abuser (these are the worst smears the deep state can put on people),or even be associated with such a dialogue, we see over and over again how speakers are targeted by secret agents and local police for merely expressing alternative explanations, or counter-narrative-that our sons and daughters are pre-targeted by British intelligence in black operations on video games.
Then, we see scripted events that follow the predictable patterns and classic propaganda and influence operations-It must be remembered that-for now-we are still a democracy.
So, whether you are a Nazi moron/Koch Brothers clone, or a United Nations/George Soros funded crybully in Fabian fur, even you will see that the DV smear is also classic IC smear in every sense, straight out of the PsyOps manual-the CIA literally used it in the Iran-Contra era, and Viet Nam.
Then, we see that evenPaddock’s girlfriend (the one who he paid for trips, and life’s little luxuries, and who he sent away as he “bubbled” himself, is no doubt a target of these psyops now as media pits a hooker against the girlfriends version of the shooter, which was a well known tactic in the MHCHAOS years that targeted black activists in America), says he was “a caring man.”
And this, AFTER the smear-and after we see tat the girlfriends fingerprints are on the bullets…..the irrony meter is jammed like a cheap bump stock now. So, the DVIC narrative is a powerful tool of interrogation in its own right, a sort of pre-emptive assault on critical thinking, but also, a powerful tool of propaganda.
So, my goal is NOT to vindicate a mass murderer-my goal is to expose that our media is no longer a media of facts, but one of “opinions and propaganda guided by military and banking interests.”And, that these active shooter events are something other than what we are being presented. And make no mistakes- my goal is also to raise awarenesof this new corruption of “gray area policing.” where the state eradicates law and order by precipitating AND particpating in disorder and domestic chaos.
But defamation in “gray area policing” IS the the link between active shooters, mass shooters, and “lone wolves”as LEO’s “stalk the stalkers” according to the Rotary Club model of policing, where we see that men are objectified by Ich, Du Buberism’s, rather than having their day in court.
It is not insignificant that there are “odd” discrepancies emerging now about the official narrative of the Las Vegas shooter, and less odd that a security guards story has now changed- that a “missing link” in what would make sense to “ordinary and rational people,” is now falling under scrutiny: why did a guy who was shot in the leg wait SIX MINUTES to call for help?
I have personally been shot in the femoral artery-and I can tell you from experience that when you get shot, your body takes over and tries in every way it can to save it’s life from “bleeding out.”And, it takes about seven minutes to bleed out from a leg injury; I know this because I have had such an injury.
So, as security guards fall somewhere between jailhouse snitches and Paul Blart, the Mall Cop when it comes to waging the “official story,”I can also tell you that these guys are not the most stolid “truth tellers.”
I have personally collected evidence of one instance of OGS where security guards Tased a man in the back, and then worked with police for over half an hour to try to cover their asses in their Constitutionally cringe-worthy conduct. I have also documented OGS in Las Vegas on numerous occasions, which has inordinately high amounts of gang stalking complaints, if you search Googles for “gang stalking” and “Las Vegas.”If I seem cynical, it is because I am-and as we see time and again, cynicism and skepticism are themselves under attack.
But first, here are the DVIC narrative details about the man who shot up a crowd of country western music fans:
So- we see that sander and defamation after death isn’t specifically tied to his conduct and bad actions-but instead, that the Domestic Violence Industry has piggy-backed it’s lop-sided narrative onto another narrative to keep itself fat and happy (there’s a joke n there somewhere about troughs, and the obesity of the self-perpetuating and so on.)
Here: have a look at my thesis about the DVIC, and all of it’s one sided, gendered, quasi-religious, non-egalitarian story telling in the gray area of law and society:
When did THIS:
And THAT, MEDIATED by this:
So-what would cause multi-millionaire Stephen Paddock to arm himself so heavily that he would eventually just “snap?” I bet being stalked by well armed thugs who operate in the gray area of the law might do it. Or maybe, hidden things that only the many thousands and thousands of camera’s in Las Vegascan tell us- but you better get the data quick, because Las Vegas only keeps footage for FOURTEEN DAYS.
Then: imagine you were a high stakes player who won a lot? Do you think Casino’s love the high stakes players who “game the system” or do you think Casino’s “not love” the high stakes players? How about high stakes players who sued them and prevailed? I urge you to use critical thinking skills here-and some cynicism. Related: Stephen Paddock sued more than one casino for slip and fall accidents. Here- have a look into a Casino, which is looking at you as you gamble:
The age of anonymity is largely extinct in casinos these days, thanks to rapidly evolving technology and surveillance teams tasked with keeping resorts safe from criminals and cheats. Most Strip casinos operate at least 2,000 surveillance cameras on property, said George Joseph, a casino surveillance consultant and former director of surveillance at Bally’s.
Ted Whiting, director of surveillance at Aria, shows off a prototype card recognition program at the casino Tuesday, Sept. 16, 2014. Credit: Steve Marcus
The “eyes in the sky” have become much smaller and more discreet, blending in with casino interiors to give surveillance operators a bird’s-eye view of the floor or a close-up shot of someone’s face.
“What has really changed is that casinos have 100 percent coverage of virtually every square inch,” Joseph said.
Or, “a closeup shot of someones face”…..just sayin’.
So-just to demonstrate the fact that Google is itself a de facto arm of the surveillance industrial complex, let’s Google the phrase “the effects of chronic surveillance,” one f MANY phrases we can use to decipher the meaning of this event, and its related outcomes. There are many such phrases that you can use, but this one seems to make the most sense-and I note tat I have deliberately left out the word “medical” or “health” effects.
This language returns About 6,790,000 results-and the entire first age is about “medical” and “health” effects. Here, we note there is a total “blackout” of data that answers our research question. And then, of course, there is the same auto-complete distortion that we see when we Google “Dr. Moss David Posner,”a doctor who counseled TI’s until he died in 2011 of natural causes.
Here are some of Googles recomended searches at the bottom of the page:
So, we see that this idea of “public health” is in fact, a carefully crafted dialectic in and of itself, that-fr some reason-isn’t concerned about the effects of “chronic surveillance.” Again and again, we see that few studes are highlighted by Google, and institutions that receive massive amounts of federal funding (tax payer dollars) have been co-opted at the switch-and the search box in Google. These are not minor or insignificant ommissions- most Americans today are wellaware that we are under chronic, pervasive, and law-defying surveillance-but not Google, again, for some reason.
And, then, with a crisis PR machine greased to the hilt, it didn’t take long before the pundits and the MSM defamation specialists invoked the “after death body punch” and linked Stephen Paddock with defamation and smears about domestic violence. And this is a pattern in these cases, much as we saw the Guardian UK’s pundit mocking Hugh Hefner, who was long the envy of feminists and lesbians, but also, of all the “good guys” who on one hand, did good/god stuff and on the other, read Playboy magazine in darkened garages, or in tree-forts far away from the clutching pearls of the “good gals.” And I will leave it to the reader to infer what these good guys did with “the other hand,”and then skulked away, ashamed of themselves, like whipped poopy puppies.
So, here at ROGS blog we ask a question that could literally get us (me)stalked and murdered– is the Rotary Club and a certain smear machine, hooked up with the UN’s “Transnational Crime Syndicate”-all of which are connected to the DVIC- linked to active shooters (click the link for EVIDENCE)? The evidence is starting to pile up that the Rotary Club International is linked to “Stalking the Stalkers,” crisis PR manufacturing, gun control, and more. Feel feee to sue me, and dispute that linkage, which is clear in their own literature.
Then- here’s that OTHER elephant in a garter and heels-how much does it cost to get a hooker to say what you want her to say? (No offense or disrespect to hookers intended; and especially to those I count among my friends who take pride in the word “whore.”). But this is important in my broader thesis-that OGS, hookers, and mass shootings are all related, an that the UN is operating black operations on US soil, as we see time and again that certain political interests ranging from gun control, to legalized prostitution, to police who are pimps or rapists; to international finance as we saw in the case of Dominique Strauss Kahn, and now, Henry Weinstein, long the darlings of certain elites, now mere chaff and detritus; brought down because those who once benefited from their activities have turned to “bigger, better financed” pushers of policy and people.
Without irony, I note that the Weinstein debacle is symptomatic of the clash between neocons and Catholics that plays itself out over sex ( I mean- if these women were unwitting or unwilling “victims” then….why wait? Bigger, better, newer money, maybe?)
So, we see the smear is well timed, and designed as a political tool that is primarily about power, and then, that power extrapolated through media. This is “feminist jurisprudence” and the police state in action-lurid headlines, moral panic, and violence is EXACTLY how the moral panics of preceding era’s took place, but this time, with a white boogieman, instead of a black one or an Asian.
But at the root, it is the same group of international banksters, and bald headed Eastern bloc socialist’s that we saw in the 1920’s, and the 1950’s, have combined with the “Popery” they once demonized, and together now, they are on board with the coming dark ages to perpetuate their old mythologies and cultic beliefs, via bills like the “Save Eastern Sex Toys Act.”
And, this battle was planned long before men like Paddock went ballistic, as globalist Fabian Socialism both divides and conquers-but also reunites old friends and enemies alike in the formation of new capital interests. But how to capitalize it all? I have an idea! Let’s “save the women and children from words,” by flooding the internet with porn! Then, swoop in and save them all from critical thinking, reason, and free speech online!
-Stephen Paddock [[reportedly]] had violent rape fantasies and was abusive to his girlfriend. This all sounds too familiar when thinking of America’s most recent mass shooting perpetrators
So- we see a well orchestrated moral panic as neocons and arch conservatives have united with religious interests and that policing has become little more than the guardians at the literal “Chicken Ranch.” And then, not only “controlling the sex supply,” which was long thegoal of globalists, but ALSO controlling the narrative about men who “purchase sex.” DO you see any patterns with “BIG PIMPIN'” and globalism? No?
Have a look here, then, at the UN Transatlantic Crime Initiative where we see the UN inserting it’s fingers into…young nubile Japanese girls….lives. Like the masive DHS asset forfeiture racket, the TCI seeks control of local economy, but also, control of the information channels, the freeways, and the side streets as well, of local culture; and that, via local policing of speech and speakers.
Or: Dark Ages redux, as these forces claim control over our society; and leave the “usual suspects” in control of our children. Good Guy/Galism on Acid = High Heels Policing
From Hamisch Brown, former Scotland Yard Inspector, who advises Rotary Int’l and the FBI to many LEO’s around the world on how to “stalk the stalkers,” cops have increased their social capital as “enforcers,” but not much of it has anything to do with “law.” Any security guard/renta cop/off duty cop who has ever done bar duty knows what this means, both to a place of business, but also, to local economy: it means the dollars stay in the bar if you just shut up and go along with it all. But in this case, history teaches us that the dollars will in fact, LEAVE the bar, and then, well, you figure it out. We’re being robbed.
And anyone who knows the jargon of policing knows that the sexist tropes of ‘saving the women and children’ lead frequently to the DVIC “Heels on the Ground” policing that we see today as these divvy up the pork-pot of DVIC funding, in make work projects across the western world-but few women I have talked to lately are elling me they feel “helped,” because in fact, they are entrapped in constant double binds of “state check” versus “independent initiative,” which is where the DVIC steps in, and claims BILLIONS in their names.
I am preserving this Rotary Club sales pitch below, because the DVIC has a tendency of scrubbing the web as soon as I write about how police corruption intersects with religious conservative fundamentalism, and it’s hand-maiden of global feminism:
STALKING THE STALKER
Hamish retired in 2004 as a Detective Inspector on the Specialist Crime Directorate at New Scotland Yard after over 30 years service with the Metropolitan Police. Although he has a thorough investigative background, especially regarding rape, murder and contract killing, and being commended on many occasions, he went on to specialise in stalking cases. Hamish is a leading authority in the UK and of international standing and regularly lectures and gives advice on a global basis. He has been key note speaker in Houston, Texas at the conference of End Violence Against Women International and other high profile events in Europe, Hong Kong, Los Angeles and Singapore.
He is the author of the Home Office publication Stalking and other forms of harassment, an investigators guide. This booklet was distributed throughout the UK and to many countries around the world and had to be reproduced to meet demand. Hamish also created the Metropolitan Police advice literature Stalking and harassment, a guide to minimising the risk to children. His work on stalking was acknowledged with the award by HM the Queen of the MBE.
His presentation will commence with a fascinating case history of an investigation where he was ultimately commended both by the trial judge at the Crown Court and the Commissioner of the Metropolitan Police. This involved the stalking of a young lady by a series of anonymous letters, over a six month period, which were of an intimidatory and frightening nature. Hamish will outline the investigation he led and emphasise the psychological affect stalking can have on its victims.
He will go on to explain what stalking is, or can be, and give investigative tips on how to deal with victims of this unique and distressing crime. From there Hamish will show methods previously used by stalkers that will encourage others to understand it is necessary to
Most of those who write about OGS mention that they are frequently the targets of specialized internet harassment that takes various, often personalized forms*. There is the standard theft of email, sometimes as one writes it; there is the recurrent and constant theme of computers being hacked; and online manipulation of speakers who use words to communicate ideas to others, like we see with the outed JTRIG harassment-but the NSA/FBI DITU and military orgs, often working hand in hand with zionist hasbara roaches from Israel are all in on it, trying to censor and manipulate and control online dialogues, and targeting individual speakers.
And, similar things went on in Germany just before the Holocaust as well, with zionists involved at every level. In fact, everywhere you look, these religious fanatics are implicated by even the MSM. Here, the Daily Beast notes that a religious fanatic from Jews for Jesus torched the mosque of the shooter after the Pulse nightclub shooting, and like many of these types do, they also used religion as their basis (click the link- the firebombers statements are telling). So, any keen reader will note that my thesis of fanatical religions-whether Jewish or christian or one or another cult or sect-religion being key to the OGS narrative is validated, over and over.
And speaking of Israeli mind control and cockroaches, and how religion and those who practice it use all forms of coercion and bulying, even invading the heads of it’s targets, with memetc neuro fasciitis- there’s this, from Haaretz: Israeli Scientists Unlock Secret of Mind Control — in Zombie Cockroaches: Now we know how the jewel wasp turns the bugs into helpless living nurseries. read more.
But let’s first have a look at the catalogue’s of spy tools that these institutions are using on unsuspecting citizens. And you can imagine others have these tools as well: The Electronic Frontier Foundation catalogues NSA spy tools aimed at us AND them-whoever “they are” since “they” became “us too”:https://www.eff.org/files/2014/01/06/20131230-appelbaum-nsa_ant_catalog.pdf
How the CIA spies on you through your TV, and more: https://www.wired.com/2017/03/cia-can-hack-phone-pc-tv-says-wikileaks/
Renowned security guru Bruce Schneier has the British spies catalogue of tools: https://www.schneier.com/blog/archives/2014/07/gchq_catalog_of.html
One of the ways that the claims of TI’s can be tested-one of the simplest ways actually- is for any researcher to merely write a blog about OGS. Then, use the key words “organized gang stalking,” “gang stalking” “targeted individuals,” and any of any number of keywords that PRISM and XKEYSCORE, and their specially trained, biased and calculatingly and deviant religious analysts are targeting.
You will have more rapid results if you mention the fact that the US Department of Homeland Security gives special black budget money into the hundreds of millions to zionist-Jewish groups and organizations affiliated with the Anti-Defamation League, which they use for organized stalking.
Or, if you mention the fact that the FBI is basically a zionist and cult-controlled organization that has benefited from illegal ADL spying operations for generations, and those hidden campaigns of domestic terror/spying are waged by any of a number of fanatical cults and religious sects in America, with the net results being “anonymous tips” from well known informants.
But where were the NYT headlines screaming about this form of domestic terrorism? There weren’t any, because aas I have noted, Jewish-christianity is the cricket, with the worm in its head.
It is also not a stretch to note that these same zionists not only helped create Hitler, but they shared similar goals and killed millions of people (which is ALWAYS the shared goal of fascists, communists, and globalists who are in fact all Fabian Socialists), while using other egregious forms of database abuse, like the IBM punch cards that were used to round up gypsies, dissenters, the mentally ill, and many other categories of people.
Then, link that blog to any substantive conversation about warrantless surveillance, criticize this system of targeting pure speech online (and in our own ‘private’ emails), or criticize the plausible deniability and unaccountability built into this system, and especially criticize any law enforcement body in any of the 5Eyes nation-states, and watch the fireworks begin! Your blog will suddenly become the darling of the Five Eyes nations as the UK, Australia, New Zealand (have a look at what and WHO is in New Zealand now),Canada, and the US start to hit your blog up EVERY DAY, 20-50 hits per day.
You will note that they key in to certain posts and pages that mention their culpability. This blog here is a recent favorite of some who read these specific posts below, nearly every day, in this order-and you can test these results yourself:
1) Gang stalking, Mormons, FBI/CIA recruitment of same
2) Gang stalking and punitive psychology
3) Gang stalking and the Martha Mitchell effect and influence operations; or how retired LEIU members act as auxilliary LEO’s, often outside the law-and as para-judiciary inluencers of the legal process.
4) the CIA and phone hacking/NSA mass surveilance of citizens/ crisis PR counter-narrative about OGS
5) Any post that criticizes, implicates, or indicts LEO’s as particpants in OGS
6) Any post that implicates military involvement in OGS
7) you will especially note that avid readers who target posts about how the surveillance state is a Panopticon especially seek your personal information/contact info/biographical data, and most of THOSE readers from military bases and so on.
In my experience, it takes about a week to ten days before the FiveEyes nations and their many web crawling, word hunting,speaker targeting data analysts, or targeted search bots/Palantir/Media Sonar/etc or any of a number of retired LEIU types and Israeli “mind controllers,” or just plain odd people who are immersed in the even-more-odd disinformation dialectic of the “paranormal” find your blog.
Then, kick your feet up and watch as your email accounts get broken into or your internet gets redirected, and your online life becomes “redirected,” or stalked even by identifiable operators( usually those who follow your blog are affiliated with the groups mentioned above). I advise that you do all of this “anonymously” within reason-but also advise you to use Tor as a research control, just so you can see how easily it is subverted. And then, do ‘timing attacks’ against your own blog using Tor as a control, and your own blog as a subject. Note how slow your blog/s load/s now-or especially, how when you type, your posts begin to drop letters here and there as if your keyboard is full of peanut butter, or cracker crumbs-or screen cast across a Fusion Center control room, or to a couple of squad cars up the block.
Use Tor on one browser, and then use several others- you should find that Tor will be ‘crashed’ frequently AFTER they find your blog, but NOT BEFORE. And, you will find as described above with the ‘suddenly sticky keyboard,” and more. Also, AFTER they find your blog, you will note that Tor loads incredibly slowly, and that frequent time-out errors will occur. Further, if you publish over Tor, you will find it to then be a target of other exploits from the Metasploit toolkit. Teardrop attacks are common, and timing attacks that crash the browser and then time your reconnection to both the internet and your blog-which also leaves your ‘cookie’ and sign in data floating about cyberspace are among the most common attacks.
And-if any of your (hopefully, deliberately anonymized and obscured) blogs become targets of this extra special attention, extra-legal, extra-judicial attention, notice also “what they are reading” across your blogs-that the subject matter frequently seeks to develop a “profile” of the writer as certain posts that contain “personal” information are pieced together to form a parallel constructed “you” in the mind or the dossier of an analyst, investigator, or agency black ops practitioner.
Test it yourself, and prove me wrong-after all, the “pro’s ” and professional activists present a unified front that OGS is a myth- a symptom of mental disease; an indicator that MORE isolation and discrediting is needed to contain the dangers of the world finding out about this practice that benefits those who practice it! So prove me wrong-if you can.
But I have found these things described above for over a decade (as have others), using multiple blogging platforms, multiple computers, from multiple states, countries and localities ranging from communist countries to countries that thrive on mob hush money, to here, in “the land of the free (lol)”and using multiple word/phrase selectors.
These terms and subjects I discuss above are the quickest, and most replicable to get the results I describe, but you can find your own.
The net result is a simple and can be replicated, and prima facie evidence that gang stalking is real in the sense that it triggers both PRISM-like bots and humans, but also triggers intense scrutiny and malfeasance: it is prima facie proof that CERTAIN speakers are targeted, and then harassed, or blog-stalked in the very least, and others are not.
In the US, this means that a pre-judicial mechanism of “denial of equal protection” under the Constitution is in effect at a baseline of un-Constitutional government conduct (and really- most Silicon Valley startups from Google to Twitter and Facebook are ALL funded with seed capital from the CIA, and fully interactive with NSA/CIA/DIA/FBI packet capture/black operations via the internet ‘backbone’/influence operations/redirection/code injection/ at ALL times).
Lastly, I would like to point out another fact of OGS: if and when the writer reveals their actual IP location, or actual contact information, they will also be able to document “web interception and redirection” in a variety of ways. This story herein covers that. I bring this up, because upon the discovery of writers and others who document OGS, the Five Eyes then entraps the blog off shore, or on a server that cannot be traced back to them directly-that hose who work in these intelligence collection hubs ‘contain’ or entrap’ the blogs so that further black ops/surveillance/timing attacks/code injection can take place.
And this too, can be monitored, and data collected to document that OGS online s indeed a “real thing” and evidence of same accrues as soon as a researcher follows the steps outlined above.
some things are just TOO predictable: as I wrote this post above, online-live- I was cut off the net, and the AP that I was using disappeared, replaced by several that are unfamiliar to me, or the location from where I blogged this post. I could not log back in because the AP I used( from a well known corporate coffee shop)completely disappeared. You just can’t invent some things. I ket sceen captures, but I do not have an anonymizer to strip the meta-data from those. But you can test this scenario yourself as well.
A large part of what the organized gang stalking dialectic seems to be is the result of psychological operations, and influence by suggestion. And some 70% of the blogs I have read talk about something called “electronic no touch torture,” which in my mind at least, is an accurate description of how one feels after their privacy is invaded, and or they are subjected to contact with agency level psychological operations. Every agency has a dirty tricks section, and they use them covertly, and judges and juries much less the average citizen are never aware they were there.
Even the world reknowned authorities, and pro -prosecution OGS denialists David V. James and Lorraine Sheridan on OGS agree that the mysterious and nebulous “the internet” creates an “ideological echo chamber,” i.e. that for some, the targeted advertisements, the targeted switches and targeted routers in targeted American communities who have ISP’s that target words, and CEO’s that target speakers, and hidden FBI Infragard agents feeding community policing that trickles in from the internet switch- and for targeted individuals “The internet creates a sort of ‘closed ideology echo chamber’ wherein people who share unusual beliefs reinforce each other’s thinking”
Which is, or course, by systemic design as we see the redirection method being used by “mystery money” funded startups to influence “jihadists” and the equally nebulous “right wing” alike via linguistic analyses, which is known as “persuasion,” and also “soft force mind control, and more. Then there is the direct access to any given targets mind via hacked cell phones, and then, hacked relationships-because that is EXACTLY what the Panopticon via products like Palantir, Moonshot CVE, and “captology” was designed to do.
Most sites and discussions about no touch torture are loaded at the front end and are themselves psychological operations. Butt of the few sites that are not, we see that it is a real concept, and practice.
Psychotherapist Otto Doerr-Zegers, who has treated Chilean victims tortured under General Augusto Pinochet stated; “The psychological component of torture becomes a kind of total theater, a constructed unreality of lies and inversion, in a plot that ends inexorably with the victim’s self-betrayal and destruction. …”
This is similar to the technique of “street theater” that mind control victims described in the Washington Post Magazine article. As torture victims are not mentally ill, mind control victims would not be mentally ill but rather have undergone and are undergoing a traumatic situation comparable to torture, such as the alleged illegal targeting with government mind control weapons.
“British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”
Imagine yourself sitting down to write an email, and all of a sudden your connection is cut. Then, you look in the body of your email and that masterpiece that you spent some 10 minutes writing to your aunt Alice has also and without explanation, disappeared-and NO COPY EXISTS in you drafts folder.
The first time this happens to you, you would be pissed-but if it happened dozens of times as you write critical stuff-emails to your doctor, a hot tip to your bookie(*jk*), or an even hotter tip to a journalist who believes in Constitutional liberty, you would begin to see patterns in your own mind-that your data is being messed with inside you.And, in fact, the internet has literally come into your home, and changed your behavior even before your fingers hit the keyboard-and altered your actions inside you.
This is what no touch electronic torture really is in real world deployment. And while it may seem insignificant, it has the cumulative effect over time of wearing a person down, letting them know that they are being watched, and that crucial and critical communications are being stopped at one’s fingertips. Important friends and associations are being destroyed each time you bring up these “odd happenings.”
And this, combined with other electronic no touch torture: your computer is hacked repeatedly, or flashing white screens; your cell phone apps turning your phone on and off seemingly at will, or the coincidental amplification of your conversation in your ear. here are literally hundreds of ways that a persons phone can be messed with, and TI’s talk about that too. Taken as a broader picture, it is the cumulative effect that does the damage.
Torture in any form is abhorrent, and never necessary, despite the claims of those who torture, who also happen to be the same people who have collected all of our internet data and are now culling through it with 17 other agencies for blackmail purposes. If I had told you this is what is happening even five years ago, you would have called me a nutter. And now, I bet, even you are afraid to say it out loud much less do anything about it. First they came for the crazy guy on the internet….
Using neuro-linguistic programming techniques as simple as Google auto search”suggestion,” and subtle verbal intimidation, as well as the deployment of various internet tricks, such as cutting off a persons ability to write blogs, or the interception of emails, much of what we see can be said to have the hallmarks of classic operant conditioning, combined with learned helplessness.
This last link is important because many in the dialectic feel as though they will never be able to overcome their situation. And, the one venue they have, the internet, is subverted at every point as heir blogs get hacked, and their emails intercepted, and so on. Some 50% or more of the hundreds of blogs I have read indicate that these things happen. So it could be an indicator that there is something afoot, as other online communities of bloggers do not report these things, dwell on them, or even infer that they happen.
So, even a casual investigator of this community will readily recognize this feature. And, there appear to be some blogs that use learned helplessness language, and others that d not. Simple phrases like oh, targets, just get used to it, Wherever we go, there will always be gang stalkers,” and so on. A great example of that is the blog https://neverending1.wordpress.com, where the writer never loses the chance to use negative language that reinforces the hopelessness of those who go here for advice.( I refuse to provide a link it is that negative.)
Extra Bonus: Here is the CIA page for psychological operations to control populations.
Sigmund Freud, in “Civilization and its Discontents,” notoriously classified modern men as “men of action,” and the intelligence agencies are really into that.
“The man who is predominantly erotic will give first preference to his emotional relationships to other people; the narcissistic man, who inclines to be self-sufficient, will seek his main satisfactions in his internal mental processes; the man of action will never give up the external world on which he can try out his strength….”
And, in the targeted individual community, there is no small irony that they begin to refer to themselves as “TI’s” when in fact the PsyWar equivalent is the “TA” meaning targeted audience.
Here from the CIA link above:
The intelligence officer is not inspired by the purpose of merely collecting and evaluating information or making analytic studies. His mission is not an end in itself, but a means to an end — a contribution to the defense and foreign policy objectives of his country. His work is therefore meaningful only to the extent that the information he provides is utilized through appropriate action. The individual operator’s performance, to be sure, does not lose merit if significant information which he acquired in due time and reported to proper authority is not acted upon; but the intelligence organization as a whole has failed to function effectively if the information it produces does not lead to some kind of policy determination or action.
I must at this juncture make note that in classic schizophrenia, there has always been the element that these claim that they are being followed or harassed by the CIA or the FBI. While organized gang stalking DOES have these claims within it, sometimes, even the paranoids are right, as we se now with the Palantir database which is equipped with artificial intelligence an predictive software, as well as a host of other means by which to ‘read a person’s mind’ and control or manipulate their online behaviors.
But it’s simply not fair to blame the CIA for everything, although it is convenient, and the idea is within the vernacular of most people.Since Edward Snowden revealed that the NSA is sweeping up the data of everyone, and all Americans as well, we are now able to track the basic flow of this data in news stories that document the reach of this grand psychological operation we see that the picture is much bigger, in much more horrible ways than the CIA could imagine all by its lonesome.
Here in this link are the tactics and techniques of guiding, misguiding, or poisoning the dialectic entirely, and then, disguising victims in the cloak of mental illness.Any researcher of organized gang stalking will find correlations between the phhrase “electronic harassment” and discrediting tactics outlined in the CIA manual. In the targeted individual community, the psy-war elements are everywhere.
The Five Eyes nations are all in on it, and Great Britain is one of the worst offenders, using the dirty tricks division JTRIG to compromise, blackmail, and discredit targeted individuals.
Israel has been getting ALL Americans data since forever, and waging hasbara and other psyops across the globe to enforce, reinforce, or otherwise promote Jewish religion and culture (the apartheid, mind control, old lady killing zionist version of it.)
From the Washington Post:
So- if those are “our friends”-our enemies must be real shitbags right? But even China has yet to catch up with us as comes to waging active psy-war on it’s citizens. We can read CNN as they try to downplay the fact that China is doing EXACTLY what the Five Eyes alliance is doing to suppress, control, discredit and destroy the free speech rights of western nations.Meet the CNN version of “the Great Cannon of China.”
But-does it hold up well against the Free Speech Steamroller that we use? Only time will tell-or, maybe someone can get standing to sue our agencies and see what they are really up to. I bet the Chinese are rolling in laughter as they watch how the agencies and law enforcement in general are using our Constitution as toilet paper.
Lastly, it cannot be understated that “the CIA tortured some folks.” And that the American Psychiatry Association provided advice as to how to do this. Meanwhile, their guys always get the help they need when they are done torturing others. I don’t mean to imply that the CIA and other’s are using the internet as a form of torture for some, but YES THAT IS WHAT I AM IMPLYING. But clearly, they aren’t the only ones doing it.
Stalin, Hitler, and their go-to guys in Psychological Operations, Edward Bernays (whose books lined the shelves of all Nazi propaganda officed)and Sigmund Freud, both of them Jewish, had nothing on our guys when it comes to propaganda, and mind control techniques; and China last I checked had no Manchurian Candidates, because as we see time and time again, only western nations and Israel are literally manufacturing terrorists.