Online “personas ” and what to do about them: gang stalking by AI assisted robots and targeted individuals online

Online “personas ” and what to do about them: gang stalking by AI assisted robots and targeted individuals online: a gang stalking conundrum.

Gang stalking is automated, but also, assisted by living breathing humans, who are sometimes paid players, and other times, mere useless idiots who play along with the Mockingbird Effect.

Here, have a look at how I was cyberstalked on Mike Masnicks (fabulous ) blog, Techdirt.com:

The gang stalking started around 2013, when I tried to raise awareness of organized gang stalking. Out of necessity for dealing with a troll farm friendly commenting sytem at Techdirt, I used different “personas” to manage a conversation, but without any software, or automated programs to assist me:

https://www.techdirt.com/articles/20131210/07555625519/lawsuit-claims-accidental-google-search-led-to-years-government-investigation-harrassment.shtml

I responded to a comment from a guy name George Boneyard, which I referenced here.

I was defending/empathizing with a guy named Jeffrey Kantor who had been targeted by a Google based algorithym, and that had served him bullshit results, and possibly, those results spoonfed to him after some online gang stalking by Fusion Center operatives and military contractors/AI programs that manipulated his search results.

Back in those days, AI gang stalking was new to the “normies ” whereas I first experienced online “redirection” after I reported on the first Somali manufactured terrorist in the City College News, Mohammed Warsame, who was an FBI snitch.

Redirection is where people search Google, or other search engines for materials and get different results, depending upon who is targeting the searcher based upon an IP address, as we see in the case of ADL online cyberstalking here.

So, the Jewish, parochial journalist (Mike Masnick, of Techdirt.com, for example ) who searches for information about “why do Somalis get…. ” blankety blank, will get Google results for:

https://www.somalispot.com/threads/why-do-innocent-people-get-punished.76125/

https://www.somalinet.com/forums/viewtopic.php?t=357328

And other such discussions, whereas myself, I got results sponsored by shitbags like the Anti Defamation League, and bbbb,,b other shit-persons. I also got Nazi logo laden websites (courtesy of the Bronfman klan and local Fusion Centers, working with Infragard shitbags like that colleges president) every time I searched forresults like, “human rights in Palestine” and so on.

And, besides the ibvious terroris recruitment pop -ups, and as in Arabuc tat I couldnt read, when I searched for information on Somalis, I got stuff like this instead :


Why do Somalis smell bad
?

And, occassionally, stuff like this:

https://www.mnopedia.org/somali-and-somali-american-experiences-minnesota

But always, reverting to this:

Etc.

If you guessed that not all searches online are equal, you would be correct. Because our filtered internet serves some of us, different results than others of us.

Now, take a look at how I predicted that:

1 the Redirect Method will be used by the Anti Defamation League to bully, target, and harass individuals

2 the Anti Defamation League (and Mike Masnicks in -house trolls ) bully commenters online.

Its a ROGS BINGO.

So, now when I go online, I practice persona management, and I recommend it to anyone who is being targeted in the Panopticon.

Read this article about how defense contractors use persona management to target us,

https://m.dailykos.com/stories/2011/02/16/945768/-UPDATED-The-HB-Gary-Email-That-Should-Concern-Us-All

and keep in mid tat its not just “the gubmint ” targeting you, but tese das, it could be racist groups like the Anti Defamation League and its octopus of NGOs, or even te Klan, and any of the militant feminist groups who work behind Sexual Violence Centers (also note the para-language involved in nearly all DVIC industries )

I will provide more context at a later date, with evidence.

Gang stalking and Electronic implants: Here is how the NSA uses electronic implants.

I first experienced an electronic implant in or around 2004-5. Computer implants are real, NSA and other agency break-ins to hardware and software are real, and documented in main stream news.

In case you were sleeping during the takeover of the United States by the so-called “deep state,”(and it might be noted that both left wing AND right wing opinion leaders agree that the deep state, aka criminal syndicates in government, are real. And, the Harvard Law Review documents debt bondage, a shadow justice system, and a bizarre “deep state” second tier of the justice system that preys upon the poor in the USA, aka the collusion between corporations, international finance and its hydra’s and Octopussies of NGO’s slopping the troughs of American police and intelligence agencies such as the FBI, the CIA and the DHS, as the NSA spies on all of us and trickles data out to Fusion Centers, here is one of the phrases they use online to distort the meaning of the phrase “gang stalking,” and to obscure their illegal actions:
They stuck “electronic implants”in me!!!!!
1575275037998
Electronic implants are very real in many ways, but not the way they are discussed in the online dialectic of OGS. In fact, the use of the term as a biological implant is designed to obscure other more real implants, because in case after case ranging from intellectual property theft BY the state or a subsidiary corporate, private intel gathering firms like Facebook, or the host of DHS/FBI /ADL “contractors” who stalk political targets, to major spy operations-all deploy malware, spyware, and electronic code to infect the cell phones, computers, and other electronics of targeted persons.
1575275037998
And surely as we see in case after case of mass shooters, we see long term agency involvement in those peoples lives as predicate for these mass homicides, and quite frequently, contact with zionism, FBI careerist shitbags banking on the unnaccountability of CVE programs and their accompanying “parallel colluding investigations” aka gang stalking,  and Jewish/zionist Supremacy in college settings, as we saw with the recent Texas cases, and dozens of others ranging from Stephen Paddock, to this guy here, Mathew Riehl, an attorney who himself ranted AGAINST Nazi’s and the Eastern Bloc Judenrate’s favorite go-to pundit, white females, before he was shot in cold blood in Colorado after invoking his Constitutional rights to be served a warrant before he is gunned down in his own home by Israelified “Ich, Du” Buberism and Hegel, in a steroid can.

Related Story: The Doctrine of Superior People-How a racist and actual Cabal of misanthropes murder with impunity, wage slander and disinformation, steal resources, control cultures, buy police forces cheaper than dime store drag queen lipstick, and get away with it, century after century-and blame it all on YOU!

And dozens of other well documented abuses of databases, and actual electronic snooping and hacking such as the Minnesota cases of reporters stalked by hundreds of NGOs/AIPAC/federal dollar/DVIC funding related stalkings- to cases of journalists like former CBS investigative reporter Sharyll Atkisson are sabotaged and spied on by political police (the FBI, DHS, et al are merely that), we do in fact see electronic implants as part of the illegal Constitution defying nature of the FISA court coup, the DHS sectarianism,  and the attendant cowardly conduct at the SCOTUS.
As I have noted, my personal circumstances indicate that I have been targeted by multiple cause based/ religion based/ and other stalkers for decades, because I defy their mystery cults and religions-but also because I refuse to be circumscribed by their un-Constitutional gray area policing methods, and have been a first amendment fighter and more for decades (Here’s lookin’ at YOU Phil!)
I first experienced an electronic implant in or around 2004-5, as progressive organizations and institutions ranging from colleges, to state agencies and their attendant database abuses worked to frame me/harass me/ implicate me/ cause me to be “flipped” as a useful idiot to their political causes, or otherwise charged criminally in a variety of ways.
There I was, sitting in a college newsroom, when the computer redirected, all by itself, as if a spell had been cast upon it! To Nazi-land!….an imaginary place created generation after generation by the SAME FOLKS, as international bankers create, and then gut local economies.
But what really mattered then more than anything, was that they attempted to defuse my activism by following me around with nebulously middle eastern photographers, and tried to neuter my ability to have political effect. And what an effect!
Only lately is MSM talking about how a militant, AIPAC financed zionist sect of rapists and baby killers has taken over our airwaves, and purchased our police cheaper than donkey-dick-meat in a Mexican strip bar. Its an actual multi-billion dollar industry,where some-like the famous case of the Jewish nazi Frank Collin play both sides of the drama,and get paid in each role.

Related Story: Why has the American Civil Liberties Union(ACLU)dropped so many free speech, assembly,association, and privacy balls in the last decades, despite having ample funding, and amplecauses to challenge FISA courtera NSA spying? The answermughtbe: the same answer we always come back to, which is “why is the case of Frank Collin~nee~Cohen, the famous Jewish Nazi of Skokie, IL,revered as a victory forfree speech, when so.many other cases(like prisoners reading materials) NOT heralded,or defended by this group?”

Well, at least Marcy Wheeler sees the utility of the word “targeted” now, and how it pertains to individuals, despite her emergent socialist bent (oh, those poor deluded young people, dont they know thatthey are useful idiots for the other four tentacles of the Bilderbergtopuss?…) And the Intercept-despite its ADL sponsorship, occasionally takes on organized gang stalking in one way or another-especially the manufactured terrorism parts of it, as these cases-case after case after case indicate that OGS is in fact a precipitator, and NOT a mental illness at all. Get out the ROGS BINGO card!
See the source image
And while this benefited a few people in the short term-like the bald headed AIPAC sponsored college president, a notorious AIPAC shill and an American Studies professor/rat whose favorite read then was “Blood in the Face” by notorious James Ridgeway ( a likely informant), and a handful of dirty cops whose testosterone outweighs their shrinking testicles- in the wider dialectic.
And, it revealed to me that the facts I put forward herein are true and replicable elements of how the political processes of America are entirely broken-but also how a lawsuit could begin to challenge these practices. I mean- a few militant armed American neo -Nazis/alt-Rightists/bad-guy-racists-du-jour (those who aren’t Jewish in the first place, like the famous Nazi of Skokie, Frank Collin, ne~ Cohen, or who aren’t working for the agencies, if any can be found) have NOTHING on people who can purchase the American police cheaper than trailer park trucker meth made out of truck-stop pep pills.
But actual electronic implants aren’t anything like what you read about online, and anything to the contrary is pure insanity. You see: agents of the state and its Israelified, racist, zionazi sponsored spy aparatizionazi sponsored spy aparati literally gave me a computer that phoned home to a local political precinct, several political organizations in a certain state, the local police department, and computer servers located curiously between a college and these various agency operated and  maintained computer main frames.
And THOSE main frames were situated curiously close to SEVERAL of the above named agencies. They were literally within blocks of each other, as is the case with most cities and towns across America. But, of course, much of the evidence of THAT disappeared in a burglary in 2009, which I have documented elsewhere.
Well- of course I sabotaged the crap out of their sooper seekrit recruitments, entrapments and implantations, much to their chagrin, and found friends who were less crappy than them. And here below is how they were using implants then, but only I and a select few others knew this, and many of those are now deceased, distanced and afraid, or otherwise co-opted. And, my discovery THEN is when the break-ins to my homes began in force as well, because I laughed in their faces, every time.

How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

“Equation Group” ran the most advanced hacking operation ever uncovered.

In an exhaustive report published Monday at the Kaspersky Security Analyst Summit here, researchers stopped short of saying Equation Group was the handiwork of the NSA—but they provided detailed evidence that strongly implicates the US spy agency.
First is the group’s known aptitude for conducting interdictions, such as installing covert implant firmware in a Cisco Systems router as it moved through the mail.

Second, a highly advanced keylogger in the Equation Group library refers to itself as “Grok” in its source code. The reference seems eerily similar to a line published last March in an Intercept article headlined “How the NSA Plans to Infect ‘Millions’ of Computers with Malware.” The article, which was based on Snowden-leaked documents, discussed an NSA-developed keylogger called Grok.
….read the full article on the NSA’s 14 year hidden domestic spy operation here.
Gray area policing, aka “high policing,” and Grayfish computer intrusions
<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

 
Well, anyways- for the researcher of organized gang stalking, the legal defense counsel or civil litigator who encounters the “gang stalking dialectic” or one of its many actual victims-and for the sworn *cough, cough* peace officers whose goal is to uphold our law and our Constitution-I suggest you have a read through that article-because now, other nations are peeking in here, quite routinely-and some of THOSE are peeking at you as you peek in at my writing.
And, for those who I have named herein-I suggest you keep your eyes open at night, because the moon near YOUR house will be getting brighter. A LOT brighter now.  Bright enough to encompass whole families.
Try not to see patterns, though….and maybe, watch your back, too. Apophenia, and all that kind of makes life hard, if you know what I mean. And certainly, that trick you played on Sharyll Atkisson wasn’t funny. Yup-I hear gang stalkers want to make you go broke fighting for your rights in courts that have deaf ears and blind eyes.

Six codenames

In all, Kaspersky has tied at least six distinct pieces of malware to Equation Group. They include:
EquationLaser: an early implant in use from 2001 to 2004.
DoubleFantasy: a validator-style trojan designed to confirm if the infected person is an intended target. People who are confirmed get upgraded to either EquationDrug or GrayFish.
EquationDrug: also known as Equestre, this is a complex attack platform that supports 35 different modules and 18 drivers. It is one of two Equation Group malware platforms to re-flash hard drive firmware and use virtual file systems to conceal malicious files and stolen data.
It was delivered only after a target had been infected with DoubleFantasy and confirmed to be a target. It was introduced in 2002 and was phased out in 2013 in favor of the more advanced GrayFish.

GrayFish: the successor to EquationDrug and the most sophisticated of all the Equation Group attack platforms. It resides completely in the registry and relies on a bootkit to take hold each time a computer starts. Whereas EquationDrug re-flashed hard drives for six models, GrayFish re-flashed 12 classes of hard drives. GrayFish exploits a vulnerability in the CloneCD driver ElbyCDIO.sys—and possibly drivers of other programs—to bypass Windows code-signing requirements.

<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

Enlarge/ The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code (“blue pill”, “red pill” – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly “swallows.”The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.

GrayFish is the crowning achievement of the Equation Group. The malware platform is so complex that Kaspersky researchers still understand only a fraction of its capabilities and inner workings. Key to the sophistication of GrayFish is its bootkit, which allows it to take extraordinarily granular control of the machines it infects.
“This allows it to control the launching of Windows at each stage,” Kaspersky’s written report explained. “In fact, after infection, the computer is not run by itself anymore: it is GrayFish that runs it step by step, making the necessary changes on the fly.”

Fanny: A computer worm that exploited what in 2008 were two zero-day vulnerabilities in Windows to self-replicate each time an infected USB stick was inserted into a targeted computer. The main purpose of Fanny was to conduct reconnaissance on sensitive air-gapped networks. After infecting a computer not connected to the Internet, Fanny collected network information and saved it to a hidden area of the USB drive. If the stick was later plugged in to an Internet-computer, it would upload the data to attacker servers and download any attacker commands. If the stick was later plugged into the air-gapped machine, the downloaded commands would be executed. This process would continue each time the stick was switched between air-gapped and Internet-connected machines.

Kaspersky Lab

TripleFantasy: A full-featured backdoor sometimes used in tandem with GrayFish.

Want to know the real reason the “deep state”(aka AIPAC sponsord organizations, racist sectarian political factions that hide behind NGO’s, and of course, every other American “law enforcement agency”  is at war with Kaspersky? Read the full article!But I for one, am not scared of the Chinese, or the Russians taking over anything.
Hell, I will show them to your door;-)
Related Story: That time-just that ONE-where I was approached by someone from Vegas who knew about these hacks, and wrote to me here at ROGS.

Copies of Nothing: police psychology and the replication of power through willful ignorance, and bullying.

It is nearly impossible to impute to the reader how disproportionate the telling of the story of “targeted individuals” of organized gang stalking is in terms of power versus those who are powerless; or that the issue of “TI’s” is in fact one of “first they came for the ________, and I said nothing, because I wasn’t a (member of the Beatrice Six). But the fact is that beyond interagency collaborationn to subvert the Constitution in the name of “goodguyism,” only the little guys and gals get targeted, while others get “flipped” or otherwise compromised.

Related Story: The Association of Threat Assessment Professionals (ATAP ) is on record calling modern “high policing ” by its proper name,which is the “parallel colluding investigation, ”and has linked this in their literature to “delusions ”. Now, I ask the reader to decide for themselves what OGS is, and take,a look at a retired United States Air Force OSI (USAFOSI) investigator who targeted me on Twitter, accusing me of being a serial murderer, goading me with violence, and, eventually being hacked, with “face orbs ” and a link to pogo-pins placed on my computer, as bizarre -acting people in hoodies ran around outside my apartment .
Organized-and Irgunized gang stalking is THAT weird. And, so was the depopulation /genocide /ethnic cleansing of Palestine, aka the Great Israelification

So let’s take a look at one of the many illegal database schemes that has been minimized or eradicated from our ability to view this illegality in the press, and where innocent people and Americans were targeted by an intelligence agency that was really a multi-agency Hydra of subversion on American-and international shores.
The DEA and the SOD database: They needed a code word to describe their voyeurism, and then, to discredit those they targeted with clandestine, illegal, iun-Constitutional HUMINT campaigns of coercion and terror.

Let’s first take a look at “police psychological profiles” that are generally stuck somewhere in the toilet, as most of the religiously/Freudian afflicted are, and then, add the opportunistic and voyeuristic and eugenic nature of feminist jurisprudence through the eyes of Kurt Vonnegut, who was popular with militarist feminists during the rise of the neocon “left” and the DVIC, where we discovered that women’s violence is well financed, and internationalist, because “hungry hungry hungry!“:
From “Breakfast of Champions,” where Vonnegut- a survivor of the fire-bombing of Dresden– critiques “white male power” but forgets to note “white female privilege,”which is perhaps more deadly, if Dresden, or Holodmor are any example .
wide open beavers.jpg
So, voyeurism (the NSA to local LEO data theft pipeline) and photography ( they frequently make threats that they have secret databases with TI’s pictures in them; and agencies are indeed using our televisions and our laptop camera’s to spy on us according to all major media) is a major them of these neo-fascists and their Hegelian counter parts, and the “TI” is their secret passion, as women’s deviance and violence takes different and creative forms.
If I showed you pictures of “TI’s” you might laugh, or mock them somehow, as many of them appear in mug shots, due to the disproportionate force and fury with which western societies prosecute the poor and the disenfranchised. Many of them, like the now-famous Timothy Trespas, are easily discredited because they “don’t look like “us”.”
Odd, how the bane of aging white feminists everywhere-“lookism” has become the exact tool with which these target and harass people in official source gas lighting, such as the case where the New York Times Mike McPhate conspired with Lorraine Sheridan to cover up this crime in last years article.
I have written about TI’s from a variety of standpoints, but one thing that can be said with certainty is that they are frequently “not” super models or muscle bound ‘heroic’ figures from ancient Greece, though there ARE exceptions. And, like anyone, they ave their faults and flaws.
What makes them different though, is that they are often stripped of the pretenses of power fairly early in life, and have frequently been labeled by those who value power. As such, as Glenn Greenwald has noted, they have “no place to hide,” when operations like the illegal and warrantless  NSA/DEA/CIA/FBI decides to turn their lives into a free for all. so beyond merely being involuntary HUMINT assets, they are also mocked for being so, and with the approval apparently, of “psychology,” despite NONE OF THIS being authorized or even acknowledged in a legal framework anywhere.
I recently spoke with a man who was engaged in a custody dispute with his wife, a former stripper who has an extensive network of admirers in policing, and he described how he was forced onto a stretcher in a bizarre “set up,” much as we saw in the DVIC deterioration of Andy Ostrowski, who once opposed PA Governor Tom Ridge.
The source was locked up on a 72 hour psychiatric hold, to try to create the appearance that he is mentally ill, which is bad enough (tested negative). But the story gets really sick when he describes how “there was even a photographer present taking closeup pictures of my face as they did this, pulling him from his home and placing him in that position, as his young daughter was spirited away by Child Services.”
And I spoke with a woman whose neighbors-wonderful progressives in a “progressive” city, framed her as the neighborhood crank as they waged loud parties next door. Her mugshot looks exactly like that. And then, after they got a fifty year restraining order on her (because she told the judge ‘why don’t you just make it ten, twenty or forty years’) they moved away! See how that works- let me know if you start seeing patterns-because seeing patterns can indicate delusional thinking.
So, the claim that communitarian policing is framing people is not unusual, nor is it unprecedented when individuals take a stand against this nefarious bullying. And this is no small claim, nor is it an uncommon one in the “frame jobs” that much of these make-work projects of our current government is involved in.
And the internet abounds with video’s of “authorities” in power citing vague “rules” or even more un-Constitutional “policies” that prohibit photographers from filming them-public servants-at work in public. So, without a doubt, photography-which is NOT a crime- has become a tool with which institutions collaborate to defame those it targets.
In the video below, some from the DEA gets their authoritarian asses handed to them by an individual who knows that “policies” and “rules” are not LAWS, and that-for now- citizens still have the right to film and photograph these cowards who work anonymously from behind the internet switches plotting the destruction of free speech rights, due process of law, and more; that these who invade our privacy with impunity, and from behind the veil of absolutist secrecy are themselves annoyed by cameras.
And,  the citizen knows that people who cite policies and rules are in fact cowards who hide behind authority, and mobsterism, and the psychopathology of institutions that are destroying Democracy with obstructionism in the gray area of law.
And especially, note the license plates, as these federal agents work in a state that has granted official “anonymity”to public “servants.” In order to understand “what is a police state” one must understand the “privileged immunity and institutional anonymity” of these operatives.
And this, below, is what breeds contempt for the public by these same. And it cannot be missed that the photographer is described as being 5’4″ tall, and is standing against men and women who top the scales at body mass and weight. Welcome to feminist jurisprudence and policing! It seems that the “little people” are an extreme threat:

MUST SEE VIDEO:

“Fascist DEA Scum bags attempting to Censor 1St Amendment freedom of Press”

[youtube https://www.youtube.com/watch?v=kxH9N5oXkgY&w=854&h=480]
 
But for the most part, many if not all TI’s are the product of inter-generational bullying by institutional forces ranging from neighbors and schoolmates to police to mental health professionals, and the hidden networks of “goodguys and gals” who somehow see nothing wrong with “piling on.”So in order to understand my version and interpretation of “TI’s” and OGS, it requires that I define “what is a coward,”as you and others who research organized gang stalking will note that claims that GS are cowards are quite frequent in the online dialectic of OGS, and in fact a staple comment.
So, it cannot be missed that this individual filming is a 5’4″ sprite, unarmed, and questioning the authority of those who are IN FACT AND IN PRACTICE a huge factor in OGS online dialogues. Nor can it be missed that each of these photographers is practicing their rights against thousands of pounds of human meat that makes it’s living from violence, and that they are all armed.
So, beyond institutional sociopathy, and psychopaths whose sickness finds a welcome home in institutions of power, I personally view TI’s as “not mentally ill” anymore than those who pursue them, and “pile on.” It is instructive to note two things about this “phenomenon” that will help put it in perspective

  1. many of those who are “targeted” are people whose civil rights and due process rights were violated in durations of time that defy imagination and are frequently derived from warrantless surveillance and the “War on Terror.”
  2. Nearly all of them that I have talked to report bullying, and “strange” internet encounters with hidden bad actors

Read together, these form a narrative drawn from the replication of status quo superstitions and outright mythological lies that form the narrative of police and state power psychological basis, but also, plain old bullying by any other name.
So, here below is a link farm to stories about how the DEA (which is inseparable in mission or tactical applications, and methodology from the CIA at this point) used a database to illegally, and un-Constitutionally profile, monitor, perform surveillance and harass American citizens.
And for those of us who walk “unarmed” in the world with the expectation that these “goodguys and their gunz and bomz” won’t shoot us for excercising our rights is in fact and in practice, true bravery, because we KNOW they are murderous, slanderous, malevolent crooks who love to “shine a light” on “we the people” but somehow, cringe when the light gets cast on them-or scurry away like cockroaches-the video above is prima facie proof of that.
Special Operations Division (SOD) database abuse and lawsuits to follow? Who would even know where to look for the proof? I have an idea- ask those crazy peepl in the TI community!
Testilying as security theater and “goodguyism gone wild!”: How DEA agents and all other LEO’s use illegally obtained data to create and then “dry clean or launder” a case, aka “parallel construction-as well as to follow peole around and do plainly bizarre sh!t to their internet connections, telephones, cars, homes, etc, etc….
http://bangordailynews.com/2013/08/05/politics/agents-ordered-to-cover-up-dea-program-used-to-investigate-americans-critics-say-methods-unconstitutional/
More on parallel case laundering, dry cleaning alleged crime, and illegal spying
http://www.businessinsider.com/dea-agents-cover-up-spying-program-2013-8?IR=T
Prosecutors and supervisors cover up the program that covers up illegal spying, of “cover up squared,” layers upon layers of subterfuge and criminality from “the good guys and gals”
http://www.rawstory.com/2013/08/secretive-drug-enforcement-agency-dea-unit-told-to-cover-up-massive-spy-program-used-to-investigate-americans/
The cover up of the cover up of the cover ups, layered in a discrediting narrative, aka “who are targeted individuals?” What happens to targeted individuals?”
http://www.reuters.com/article/us-dea-sod/exclusive-u-s-directs-agents-to-cover-up-program-used-to-investigate-americans-idUSBRE97409R20130805
Correction: This post states that the videographer said he is 5‘4″ tall, when in fact, he did not say that.
That quote came from another video like tens of thousands of these types of videos, where those who actually practice civil rights then, become targeted, stalked, and harrassed by intel agents and agencies.
The guy in the video above is around 5’8″, and unarmed. If you got nothin ta hide, the “good guys and gals ”, whats the harm of one lil ol photog?