Gang stalking and Electronic implants: Here is how the NSA uses electronic implants.

I first experienced an electronic implant in or around 2004-5. Computer implants are real, NSA and other agency break-ins to hardware and software are real, and documented in main stream news.

In case you were sleeping during the takeover of the United States by the so-called “deep state,”(and it might be noted that both left wing AND right wing opinion leaders agree that the deep state, aka criminal syndicates in government, are real. And, the Harvard Law Review documents debt bondage, a shadow justice system, and a bizarre “deep state” second tier of the justice system that preys upon the poor in the USA, aka the collusion between corporations, international finance and its hydra’s and Octopussies of NGO’s slopping the troughs of American police and intelligence agencies such as the FBI, the CIA and the DHS, as the NSA spies on all of us and trickles data out to Fusion Centers, here is one of the phrases they use online to distort the meaning of the phrase “gang stalking,” and to obscure their illegal actions:
They stuck “electronic implants”in me!!!!!
1575275037998
Electronic implants are very real in many ways, but not the way they are discussed in the online dialectic of OGS. In fact, the use of the term as a biological implant is designed to obscure other more real implants, because in case after case ranging from intellectual property theft BY the state or a subsidiary corporate, private intel gathering firms like Facebook, or the host of DHS/FBI /ADL “contractors” who stalk political targets, to major spy operations-all deploy malware, spyware, and electronic code to infect the cell phones, computers, and other electronics of targeted persons.
1575275037998
And surely as we see in case after case of mass shooters, we see long term agency involvement in those peoples lives as predicate for these mass homicides, and quite frequently, contact with zionism, FBI careerist shitbags banking on the unnaccountability of CVE programs and their accompanying “parallel colluding investigations” aka gang stalking,  and Jewish/zionist Supremacy in college settings, as we saw with the recent Texas cases, and dozens of others ranging from Stephen Paddock, to this guy here, Mathew Riehl, an attorney who himself ranted AGAINST Nazi’s and the Eastern Bloc Judenrate’s favorite go-to pundit, white females, before he was shot in cold blood in Colorado after invoking his Constitutional rights to be served a warrant before he is gunned down in his own home by Israelified “Ich, Du” Buberism and Hegel, in a steroid can.

Related Story: The Doctrine of Superior People-How a racist and actual Cabal of misanthropes murder with impunity, wage slander and disinformation, steal resources, control cultures, buy police forces cheaper than dime store drag queen lipstick, and get away with it, century after century-and blame it all on YOU!

And dozens of other well documented abuses of databases, and actual electronic snooping and hacking such as the Minnesota cases of reporters stalked by hundreds of NGOs/AIPAC/federal dollar/DVIC funding related stalkings- to cases of journalists like former CBS investigative reporter Sharyll Atkisson are sabotaged and spied on by political police (the FBI, DHS, et al are merely that), we do in fact see electronic implants as part of the illegal Constitution defying nature of the FISA court coup, the DHS sectarianism,  and the attendant cowardly conduct at the SCOTUS.
As I have noted, my personal circumstances indicate that I have been targeted by multiple cause based/ religion based/ and other stalkers for decades, because I defy their mystery cults and religions-but also because I refuse to be circumscribed by their un-Constitutional gray area policing methods, and have been a first amendment fighter and more for decades (Here’s lookin’ at YOU Phil!)
I first experienced an electronic implant in or around 2004-5, as progressive organizations and institutions ranging from colleges, to state agencies and their attendant database abuses worked to frame me/harass me/ implicate me/ cause me to be “flipped” as a useful idiot to their political causes, or otherwise charged criminally in a variety of ways.
There I was, sitting in a college newsroom, when the computer redirected, all by itself, as if a spell had been cast upon it! To Nazi-land!….an imaginary place created generation after generation by the SAME FOLKS, as international bankers create, and then gut local economies.
But what really mattered then more than anything, was that they attempted to defuse my activism by following me around with nebulously middle eastern photographers, and tried to neuter my ability to have political effect. And what an effect!
Only lately is MSM talking about how a militant, AIPAC financed zionist sect of rapists and baby killers has taken over our airwaves, and purchased our police cheaper than donkey-dick-meat in a Mexican strip bar. Its an actual multi-billion dollar industry,where some-like the famous case of the Jewish nazi Frank Collin play both sides of the drama,and get paid in each role.

Related Story: Why has the American Civil Liberties Union(ACLU)dropped so many free speech, assembly,association, and privacy balls in the last decades, despite having ample funding, and amplecauses to challenge FISA courtera NSA spying? The answermughtbe: the same answer we always come back to, which is “why is the case of Frank Collin~nee~Cohen, the famous Jewish Nazi of Skokie, IL,revered as a victory forfree speech, when so.many other cases(like prisoners reading materials) NOT heralded,or defended by this group?”

Well, at least Marcy Wheeler sees the utility of the word “targeted” now, and how it pertains to individuals, despite her emergent socialist bent (oh, those poor deluded young people, dont they know thatthey are useful idiots for the other four tentacles of the Bilderbergtopuss?…) And the Intercept-despite its ADL sponsorship, occasionally takes on organized gang stalking in one way or another-especially the manufactured terrorism parts of it, as these cases-case after case after case indicate that OGS is in fact a precipitator, and NOT a mental illness at all. Get out the ROGS BINGO card!
See the source image
And while this benefited a few people in the short term-like the bald headed AIPAC sponsored college president, a notorious AIPAC shill and an American Studies professor/rat whose favorite read then was “Blood in the Face” by notorious James Ridgeway ( a likely informant), and a handful of dirty cops whose testosterone outweighs their shrinking testicles- in the wider dialectic.
And, it revealed to me that the facts I put forward herein are true and replicable elements of how the political processes of America are entirely broken-but also how a lawsuit could begin to challenge these practices. I mean- a few militant armed American neo -Nazis/alt-Rightists/bad-guy-racists-du-jour (those who aren’t Jewish in the first place, like the famous Nazi of Skokie, Frank Collin, ne~ Cohen, or who aren’t working for the agencies, if any can be found) have NOTHING on people who can purchase the American police cheaper than trailer park trucker meth made out of truck-stop pep pills.
But actual electronic implants aren’t anything like what you read about online, and anything to the contrary is pure insanity. You see: agents of the state and its Israelified, racist, zionazi sponsored spy aparatizionazi sponsored spy aparati literally gave me a computer that phoned home to a local political precinct, several political organizations in a certain state, the local police department, and computer servers located curiously between a college and these various agency operated and  maintained computer main frames.
And THOSE main frames were situated curiously close to SEVERAL of the above named agencies. They were literally within blocks of each other, as is the case with most cities and towns across America. But, of course, much of the evidence of THAT disappeared in a burglary in 2009, which I have documented elsewhere.
Well- of course I sabotaged the crap out of their sooper seekrit recruitments, entrapments and implantations, much to their chagrin, and found friends who were less crappy than them. And here below is how they were using implants then, but only I and a select few others knew this, and many of those are now deceased, distanced and afraid, or otherwise co-opted. And, my discovery THEN is when the break-ins to my homes began in force as well, because I laughed in their faces, every time.

How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

“Equation Group” ran the most advanced hacking operation ever uncovered.

In an exhaustive report published Monday at the Kaspersky Security Analyst Summit here, researchers stopped short of saying Equation Group was the handiwork of the NSA—but they provided detailed evidence that strongly implicates the US spy agency.
First is the group’s known aptitude for conducting interdictions, such as installing covert implant firmware in a Cisco Systems router as it moved through the mail.

Second, a highly advanced keylogger in the Equation Group library refers to itself as “Grok” in its source code. The reference seems eerily similar to a line published last March in an Intercept article headlined “How the NSA Plans to Infect ‘Millions’ of Computers with Malware.” The article, which was based on Snowden-leaked documents, discussed an NSA-developed keylogger called Grok.
….read the full article on the NSA’s 14 year hidden domestic spy operation here.
Gray area policing, aka “high policing,” and Grayfish computer intrusions
<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

 
Well, anyways- for the researcher of organized gang stalking, the legal defense counsel or civil litigator who encounters the “gang stalking dialectic” or one of its many actual victims-and for the sworn *cough, cough* peace officers whose goal is to uphold our law and our Constitution-I suggest you have a read through that article-because now, other nations are peeking in here, quite routinely-and some of THOSE are peeking at you as you peek in at my writing.
And, for those who I have named herein-I suggest you keep your eyes open at night, because the moon near YOUR house will be getting brighter. A LOT brighter now.  Bright enough to encompass whole families.
Try not to see patterns, though….and maybe, watch your back, too. Apophenia, and all that kind of makes life hard, if you know what I mean. And certainly, that trick you played on Sharyll Atkisson wasn’t funny. Yup-I hear gang stalkers want to make you go broke fighting for your rights in courts that have deaf ears and blind eyes.

Six codenames

In all, Kaspersky has tied at least six distinct pieces of malware to Equation Group. They include:
EquationLaser: an early implant in use from 2001 to 2004.
DoubleFantasy: a validator-style trojan designed to confirm if the infected person is an intended target. People who are confirmed get upgraded to either EquationDrug or GrayFish.
EquationDrug: also known as Equestre, this is a complex attack platform that supports 35 different modules and 18 drivers. It is one of two Equation Group malware platforms to re-flash hard drive firmware and use virtual file systems to conceal malicious files and stolen data.
It was delivered only after a target had been infected with DoubleFantasy and confirmed to be a target. It was introduced in 2002 and was phased out in 2013 in favor of the more advanced GrayFish.

GrayFish: the successor to EquationDrug and the most sophisticated of all the Equation Group attack platforms. It resides completely in the registry and relies on a bootkit to take hold each time a computer starts. Whereas EquationDrug re-flashed hard drives for six models, GrayFish re-flashed 12 classes of hard drives. GrayFish exploits a vulnerability in the CloneCD driver ElbyCDIO.sys—and possibly drivers of other programs—to bypass Windows code-signing requirements.

<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

Enlarge/ The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code (“blue pill”, “red pill” – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly “swallows.”The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.

GrayFish is the crowning achievement of the Equation Group. The malware platform is so complex that Kaspersky researchers still understand only a fraction of its capabilities and inner workings. Key to the sophistication of GrayFish is its bootkit, which allows it to take extraordinarily granular control of the machines it infects.
“This allows it to control the launching of Windows at each stage,” Kaspersky’s written report explained. “In fact, after infection, the computer is not run by itself anymore: it is GrayFish that runs it step by step, making the necessary changes on the fly.”

Fanny: A computer worm that exploited what in 2008 were two zero-day vulnerabilities in Windows to self-replicate each time an infected USB stick was inserted into a targeted computer. The main purpose of Fanny was to conduct reconnaissance on sensitive air-gapped networks. After infecting a computer not connected to the Internet, Fanny collected network information and saved it to a hidden area of the USB drive. If the stick was later plugged in to an Internet-computer, it would upload the data to attacker servers and download any attacker commands. If the stick was later plugged into the air-gapped machine, the downloaded commands would be executed. This process would continue each time the stick was switched between air-gapped and Internet-connected machines.

Kaspersky Lab

TripleFantasy: A full-featured backdoor sometimes used in tandem with GrayFish.

Want to know the real reason the “deep state”(aka AIPAC sponsord organizations, racist sectarian political factions that hide behind NGO’s, and of course, every other American “law enforcement agency”  is at war with Kaspersky? Read the full article!But I for one, am not scared of the Chinese, or the Russians taking over anything.
Hell, I will show them to your door;-)
Related Story: That time-just that ONE-where I was approached by someone from Vegas who knew about these hacks, and wrote to me here at ROGS.

Neo Nazi's and other alt-Right hate groups are using gang stalking tactics to DOX those who DOX'd them

I have documented how hidden groups with official cover ranging from Infragard members to the LEIU’s and those who work in NGO’s and under the umbrella of “community policing” to steal data, and build dossier’s on Americans. And I have documented that both the left and the right do it, albeit differently in some specific cases.
Micah Lee of the Intercept notes that “homelessness,” and rape threats as are a host of other complains that Targeted Individuals mention on their blogs, and that these are all features of DOX campaigns in garden variety internet and online stalking from police departments,Fusion Centers,and political NGOs that comes offline via policing and community organization harassment:

doxing efforts associated with prior online hate campaigns have forced targets to leave their homes in the face of death threats, rape threats, and other forms of harassment. And those attacks were mounted even before President Donald Trump came to power
….
so-called alt-right members collected private information from over 50 anti-fascist activists from the states of California, Florida, Illinois, Iowa, Maryland, Massachusetts, Minnesota, Missouri, Nebraska, North Carolina, South Dakota, Texas, Virginia, and Washington.
The information collected often included photographs, social media profiles, home address, phone numbers, email addresses, date of birth, driver license numbers, vehicle information, place of employment, and in one instance, a social security number

And I have written about how they are abusing databases around America and using the illegally obtained data to DOX people they don’t like or otherwise using those databases to gain compromising information and how they pass it around in hidden gossip and slander campaigns; and that “Anonymous” is a co-opted movement where these hidden operators are actually cops and other’s who are charged with protecting American’s are in fact compromising them instead
This is what police states DO at the beginning of the END of a democracy.

The photo above is President Barak O‘Bamas presidential convoy parked at Matts Bar in Minneapolis, one block away from my house after I had endured an entire year of bizzare gang stalking by so called Progressives, local NGOs, and Jewish groups sponsored by the DHS, who tracked my every movement via Fusion Centers, Stingrays, and computer hacking.
I mentioned briefly that I was privy to watching the neo-con left encroach on a major database that leaked the personal information of cops, and others, and that certain individuals in that case were specifically targeting “white males.”
The “hidden hand,”and reprehensible slanders of racist groups like the Anti Defamation League are everywhere in these cases, and police chiefs look the other way, lest they fall victim to political slanders.
I eventually pushed a situation where this “leakage” was revealed, and then, I watched as no one gave a shit, and the whistle blower was framed as a “racist,” and more, and then, slandered in the “official record” in exactly that language.
So it’s hard to care about others getting DOX’d now, especially those on the left who targeted those on the right when Obama was in power. And I might point out to the savvy reader (only long term readers will understand this reference) that under Obama, gang stalking of criminals became frame jobs, and slander campaigns, hacking and warrantless intrusion of political enemies and fence sitters, as a way to intimidate, enforce conformity or to encourage silence-that Obama was known to park his army of Secret Service in front of the houses of people that Democrats targeted, personally, based on what his political allies said.
So now, I watch as the pendulum begins to swing the other way, and kind of laugh, or mock those who laughed, or mocked me. And I especially nte that of those DOX’d, we have the academic opportunity to interview them and ask simple questions, like “Have you been directed into conversations of organized gang stalking?” Or “has your internet developed it’s own mind is constant redirection taking place?”
And my answer would be this: it is not likely that these things are being  done to those who are swept up in this round of harassment-because even though right wingers are brash, crass, abrasive and threatening- unlike the left, they have not yet directed the full toolkit of compromise and blackmail operations at the left. That, somehow, the right seems to maintain a boundary between who is and who isn’t a “foreign enemy,” nor does the right seem to work within the “umbrella” of NGO’s and UN sponsored database abuse.
From the Intercept’s security and technology wizard, and Micah Lee, a tale of gang stalking 101:

Chat logs obtained from message boards used by neo-Nazis and other far-right groups show a concerted effort to compile private information on leftist enemies and circulate the data to encourage harassment or violence.
The messages were obtained by an anonymous source, who infiltrated and gained the trust of white nationalists and other right-wingers, and has been leaking the material to Unicorn Riot, a “decentralized media collective” that emerged from leftist protest movements.
The chat logs originate from various web discussion communities hosted by the provider Discord and closed to the public. The communities, which have names like “Vibrant Diversity,” “Ethnoserver,” “Safe Space 3,” “4th Reich,” and “Charlottesville 2.0,” range from having 36 users to 1,269 users. The most active, with nearly a quarter million messages over seven months, is “Vibrant Diversity,” a neo-Nazi community forum that includes a channel called “#oven,” where users share racist memes. The 4th Reich server, the second most active, has 130,000 messages over the course of four months and includes a channel called “#rare_hitlers,” where users share propaganda posters and other glorified media from Nazi Germany. The “Charlottesville 2.0” server, which contains 35,000 messages, is where the “Unite the Right” hate rally in Charlottesville was organized.
This article is based solely on chat logs from a community called “Pony Power” (Unicorn Riot published the logs yesterday). The Pony Power server has 50 users, and the chat logs contain just over 1,000 messages, posted over the course of 10 days and ranging in topic from far-right politics to advice about digital and operational security to debates about the legal limits of online behavior. The primary activity on the Pony Power server is posting private information, like names, photos, home addresses, and phone numbers of dozens of anti-fascist activists.
Victims of the outings, also known as “doxing,” described reactions ranging from terror to anger to annoyance, and have variously turned to friends and family for support and locked down their accounts. They said the Pony Power doxing campaign is just the latest in a series of online efforts by neo-Nazis and their allies to marginalize their opponents. The information compiled on Pony Power hasn’t yet been distributed to the larger right-wing extremist community. However, doxing efforts associated with prior online hate campaigns have forced targets to leave their homes in the face of death threats, rape threats, and other forms of harassment. And those attacks were mounted even before President Donald Trump came to power on the back of racist attacks against his predecessor, Mexicans, and Muslims, and before he embraced white nationalists and encouraged violence against protesters at campaign rallies.
People chatting on the Pony Power server spoke openly, as though behind closed doors, often using offensive slurs. So be warned, some of the following conversations are hard to stomach….
….follow this link to read more!

 

Organized gang stalking makes strange bedfellows- how police are compromised by the "Hegelian dialectic" and "community "policing.": Or Hegel meets God in the gray area of undue processes of "G-d."

San Diego Detective Phillip Worts noted in 2001 that “community policing” is in fact and practice, “communist policing.”
GeorgWilhelm Friedrich Hegel, et al versus The Bible, Luke, Mathew, and “divide and conquer”(let me know if you see patterns with these Nazi sounding names-or in cults and sects within policing):

Karl Marx: “The philosophers have only interpreted the world in different ways. The point, however, is to change it.”
Luke 12:5151Do you think I came to bring peace on earth? No, I tell you, but division” New International Version Bible citation
Mathew 10:35 King James Bible
For I am come to set a man at variance against his father, and the daughter against her mother, and the daughter in law against her mother in law.

Related Reading: How Hegelian Dialectic destroys individual alterity and thus perpetuates endless war because it wars on individuals, aka “organized gang stalking.”

Policing is literally at a crossroads in western nations, as community policing aka “communist policing” competes with the “G-d model” of policing, with seemingly no middle ground. This is by design of the Hegelian Dialectic, which is a polarizing force in politics, and every other element of our society. So for some “just doin’ mah job,” means getting home in one piece, one day at a time, whereas for others, the goal is constant conflict creation via “community policing,” which is a make-work project, and a Communist model of social control.
So, if there is a problem with police, the FBI, or other agencies that are charged to uphold our secular laws, it is this exact conflict, that hamstrings Christians, while empowering fascists and communists, all of whom are working from within their own version of personal morality “for the greater good” and in our police power institutions. And I have noted that policing is rife with cults, both religious and secular and also some seek to use their police power to proselytize, instead of merely upholding the law.
So- while it may seem odd to some that a secular humanist/atheist/naturist would find myself siding with “God fearing men,” it is not entirely without awareness that each man’s personal faith-and thus individual choices- is challenged by the Hegelian dialectic materialism, which shares features with Martin Buber’s Zionism as well.
The careful reader will note that I have mentioned Israeli control of our SWAT teams, and police chiefs, most of whom think they are working for “God” but who also in fact are duped because they are working for the “othering” power of “Ich, Du” in Buber’s construct, while completely foregoing due process of law, or even respect for the US Constitution, which is the traditional gray area process of law.
Others will note that I am a constant critic of “neverending war.” This state of affairs-wars without end- is as some have noted, designed for that exact purpose, that in the Hegelian dialectic of  constant conflict, there can literally be no solutions, ever. So, this situation of ongoing and forever war, we see, is fully exploited by the DVIC and police chiefs who are faithful not to the Constitution, or to due process rights, but serving another master instead-that of international finance, and the deep trough of capital that flows through it and which carries the price tag of amoral and mercenary policing.
So, here is a snippet from Det. Worts, one of the early canaries in the coal mine of police and free speech rights that foreshadowed our current situation of “time theft” via “gray area policing schemes” that literally use par-judicial kangaroo courts to build data and then use the DVIC, domestic violence courts, family courts, academic hearings, and the many inter-linked and assorted databases for blackmail, and who wage slander campaigns based on dosssiers that have not had the opportunity of refutation in any Constitutional  legal setting; and this which has led to the NSA/CIA/DEA/FBI/local police data theft pipeline:

The home for this new wave of dialectical Marxist thinking became the emerging “science” of socio-psychology. It may come as a surprise to many to discover that virtually all of the pillars of modern psychology were humanistic utopians who believed that there is no God, that mankind can and should be manipulated (for its own good, of course), and that all social problems can be solved by the proper reprogramming of man’s mind. This would lead to an era of peace and prosperity based on diversity, tolerance and unity. Most of their work dealt with the details of human behavior, but their over-arching view was that of transforming society (echo the revolution). Hence, they came to be known as “Transformational Marxists.”
One such group was the Fabian Socialists, who took their name from the Roman general, Fabius. Fabius, it will be remembered, was confronted with Hannibal’s invasion of Italy.