Gang stalking and Electronic implants: Here is how the NSA uses electronic implants.

I first experienced an electronic implant in or around 2004-5. Computer implants are real, NSA and other agency break-ins to hardware and software are real, and documented in main stream news.

In case you were sleeping during the takeover of the United States by the so-called “deep state,”(and it might be noted that both left wing AND right wing opinion leaders agree that the deep state, aka criminal syndicates in government, are real. And, the Harvard Law Review documents debt bondage, a shadow justice system, and a bizarre “deep state” second tier of the justice system that preys upon the poor in the USA, aka the collusion between corporations, international finance and its hydra’s and Octopussies of NGO’s slopping the troughs of American police and intelligence agencies such as the FBI, the CIA and the DHS, as the NSA spies on all of us and trickles data out to Fusion Centers, here is one of the phrases they use online to distort the meaning of the phrase “gang stalking,” and to obscure their illegal actions:
They stuck “electronic implants”in me!!!!!
1575275037998
Electronic implants are very real in many ways, but not the way they are discussed in the online dialectic of OGS. In fact, the use of the term as a biological implant is designed to obscure other more real implants, because in case after case ranging from intellectual property theft BY the state or a subsidiary corporate, private intel gathering firms like Facebook, or the host of DHS/FBI /ADL “contractors” who stalk political targets, to major spy operations-all deploy malware, spyware, and electronic code to infect the cell phones, computers, and other electronics of targeted persons.
1575275037998
And surely as we see in case after case of mass shooters, we see long term agency involvement in those peoples lives as predicate for these mass homicides, and quite frequently, contact with zionism, FBI careerist shitbags banking on the unnaccountability of CVE programs and their accompanying “parallel colluding investigations” aka gang stalking,  and Jewish/zionist Supremacy in college settings, as we saw with the recent Texas cases, and dozens of others ranging from Stephen Paddock, to this guy here, Mathew Riehl, an attorney who himself ranted AGAINST Nazi’s and the Eastern Bloc Judenrate’s favorite go-to pundit, white females, before he was shot in cold blood in Colorado after invoking his Constitutional rights to be served a warrant before he is gunned down in his own home by Israelified “Ich, Du” Buberism and Hegel, in a steroid can.

Related Story: The Doctrine of Superior People-How a racist and actual Cabal of misanthropes murder with impunity, wage slander and disinformation, steal resources, control cultures, buy police forces cheaper than dime store drag queen lipstick, and get away with it, century after century-and blame it all on YOU!

And dozens of other well documented abuses of databases, and actual electronic snooping and hacking such as the Minnesota cases of reporters stalked by hundreds of NGOs/AIPAC/federal dollar/DVIC funding related stalkings- to cases of journalists like former CBS investigative reporter Sharyll Atkisson are sabotaged and spied on by political police (the FBI, DHS, et al are merely that), we do in fact see electronic implants as part of the illegal Constitution defying nature of the FISA court coup, the DHS sectarianism,  and the attendant cowardly conduct at the SCOTUS.
As I have noted, my personal circumstances indicate that I have been targeted by multiple cause based/ religion based/ and other stalkers for decades, because I defy their mystery cults and religions-but also because I refuse to be circumscribed by their un-Constitutional gray area policing methods, and have been a first amendment fighter and more for decades (Here’s lookin’ at YOU Phil!)
I first experienced an electronic implant in or around 2004-5, as progressive organizations and institutions ranging from colleges, to state agencies and their attendant database abuses worked to frame me/harass me/ implicate me/ cause me to be “flipped” as a useful idiot to their political causes, or otherwise charged criminally in a variety of ways.
There I was, sitting in a college newsroom, when the computer redirected, all by itself, as if a spell had been cast upon it! To Nazi-land!….an imaginary place created generation after generation by the SAME FOLKS, as international bankers create, and then gut local economies.
But what really mattered then more than anything, was that they attempted to defuse my activism by following me around with nebulously middle eastern photographers, and tried to neuter my ability to have political effect. And what an effect!
Only lately is MSM talking about how a militant, AIPAC financed zionist sect of rapists and baby killers has taken over our airwaves, and purchased our police cheaper than donkey-dick-meat in a Mexican strip bar. Its an actual multi-billion dollar industry,where some-like the famous case of the Jewish nazi Frank Collin play both sides of the drama,and get paid in each role.

Related Story: Why has the American Civil Liberties Union(ACLU)dropped so many free speech, assembly,association, and privacy balls in the last decades, despite having ample funding, and amplecauses to challenge FISA courtera NSA spying? The answermughtbe: the same answer we always come back to, which is “why is the case of Frank Collin~nee~Cohen, the famous Jewish Nazi of Skokie, IL,revered as a victory forfree speech, when so.many other cases(like prisoners reading materials) NOT heralded,or defended by this group?”

Well, at least Marcy Wheeler sees the utility of the word “targeted” now, and how it pertains to individuals, despite her emergent socialist bent (oh, those poor deluded young people, dont they know thatthey are useful idiots for the other four tentacles of the Bilderbergtopuss?…) And the Intercept-despite its ADL sponsorship, occasionally takes on organized gang stalking in one way or another-especially the manufactured terrorism parts of it, as these cases-case after case after case indicate that OGS is in fact a precipitator, and NOT a mental illness at all. Get out the ROGS BINGO card!
See the source image
And while this benefited a few people in the short term-like the bald headed AIPAC sponsored college president, a notorious AIPAC shill and an American Studies professor/rat whose favorite read then was “Blood in the Face” by notorious James Ridgeway ( a likely informant), and a handful of dirty cops whose testosterone outweighs their shrinking testicles- in the wider dialectic.
And, it revealed to me that the facts I put forward herein are true and replicable elements of how the political processes of America are entirely broken-but also how a lawsuit could begin to challenge these practices. I mean- a few militant armed American neo -Nazis/alt-Rightists/bad-guy-racists-du-jour (those who aren’t Jewish in the first place, like the famous Nazi of Skokie, Frank Collin, ne~ Cohen, or who aren’t working for the agencies, if any can be found) have NOTHING on people who can purchase the American police cheaper than trailer park trucker meth made out of truck-stop pep pills.
But actual electronic implants aren’t anything like what you read about online, and anything to the contrary is pure insanity. You see: agents of the state and its Israelified, racist, zionazi sponsored spy aparatizionazi sponsored spy aparati literally gave me a computer that phoned home to a local political precinct, several political organizations in a certain state, the local police department, and computer servers located curiously between a college and these various agency operated and  maintained computer main frames.
And THOSE main frames were situated curiously close to SEVERAL of the above named agencies. They were literally within blocks of each other, as is the case with most cities and towns across America. But, of course, much of the evidence of THAT disappeared in a burglary in 2009, which I have documented elsewhere.
Well- of course I sabotaged the crap out of their sooper seekrit recruitments, entrapments and implantations, much to their chagrin, and found friends who were less crappy than them. And here below is how they were using implants then, but only I and a select few others knew this, and many of those are now deceased, distanced and afraid, or otherwise co-opted. And, my discovery THEN is when the break-ins to my homes began in force as well, because I laughed in their faces, every time.

How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

“Equation Group” ran the most advanced hacking operation ever uncovered.

In an exhaustive report published Monday at the Kaspersky Security Analyst Summit here, researchers stopped short of saying Equation Group was the handiwork of the NSA—but they provided detailed evidence that strongly implicates the US spy agency.
First is the group’s known aptitude for conducting interdictions, such as installing covert implant firmware in a Cisco Systems router as it moved through the mail.

Second, a highly advanced keylogger in the Equation Group library refers to itself as “Grok” in its source code. The reference seems eerily similar to a line published last March in an Intercept article headlined “How the NSA Plans to Infect ‘Millions’ of Computers with Malware.” The article, which was based on Snowden-leaked documents, discussed an NSA-developed keylogger called Grok.
….read the full article on the NSA’s 14 year hidden domestic spy operation here.
Gray area policing, aka “high policing,” and Grayfish computer intrusions
<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

 
Well, anyways- for the researcher of organized gang stalking, the legal defense counsel or civil litigator who encounters the “gang stalking dialectic” or one of its many actual victims-and for the sworn *cough, cough* peace officers whose goal is to uphold our law and our Constitution-I suggest you have a read through that article-because now, other nations are peeking in here, quite routinely-and some of THOSE are peeking at you as you peek in at my writing.
And, for those who I have named herein-I suggest you keep your eyes open at night, because the moon near YOUR house will be getting brighter. A LOT brighter now.  Bright enough to encompass whole families.
Try not to see patterns, though….and maybe, watch your back, too. Apophenia, and all that kind of makes life hard, if you know what I mean. And certainly, that trick you played on Sharyll Atkisson wasn’t funny. Yup-I hear gang stalkers want to make you go broke fighting for your rights in courts that have deaf ears and blind eyes.

Six codenames

In all, Kaspersky has tied at least six distinct pieces of malware to Equation Group. They include:
EquationLaser: an early implant in use from 2001 to 2004.
DoubleFantasy: a validator-style trojan designed to confirm if the infected person is an intended target. People who are confirmed get upgraded to either EquationDrug or GrayFish.
EquationDrug: also known as Equestre, this is a complex attack platform that supports 35 different modules and 18 drivers. It is one of two Equation Group malware platforms to re-flash hard drive firmware and use virtual file systems to conceal malicious files and stolen data.
It was delivered only after a target had been infected with DoubleFantasy and confirmed to be a target. It was introduced in 2002 and was phased out in 2013 in favor of the more advanced GrayFish.

GrayFish: the successor to EquationDrug and the most sophisticated of all the Equation Group attack platforms. It resides completely in the registry and relies on a bootkit to take hold each time a computer starts. Whereas EquationDrug re-flashed hard drives for six models, GrayFish re-flashed 12 classes of hard drives. GrayFish exploits a vulnerability in the CloneCD driver ElbyCDIO.sys—and possibly drivers of other programs—to bypass Windows code-signing requirements.

<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

Enlarge/ The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code (“blue pill”, “red pill” – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly “swallows.”The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.

GrayFish is the crowning achievement of the Equation Group. The malware platform is so complex that Kaspersky researchers still understand only a fraction of its capabilities and inner workings. Key to the sophistication of GrayFish is its bootkit, which allows it to take extraordinarily granular control of the machines it infects.
“This allows it to control the launching of Windows at each stage,” Kaspersky’s written report explained. “In fact, after infection, the computer is not run by itself anymore: it is GrayFish that runs it step by step, making the necessary changes on the fly.”

Fanny: A computer worm that exploited what in 2008 were two zero-day vulnerabilities in Windows to self-replicate each time an infected USB stick was inserted into a targeted computer. The main purpose of Fanny was to conduct reconnaissance on sensitive air-gapped networks. After infecting a computer not connected to the Internet, Fanny collected network information and saved it to a hidden area of the USB drive. If the stick was later plugged in to an Internet-computer, it would upload the data to attacker servers and download any attacker commands. If the stick was later plugged into the air-gapped machine, the downloaded commands would be executed. This process would continue each time the stick was switched between air-gapped and Internet-connected machines.

Kaspersky Lab

TripleFantasy: A full-featured backdoor sometimes used in tandem with GrayFish.

Want to know the real reason the “deep state”(aka AIPAC sponsord organizations, racist sectarian political factions that hide behind NGO’s, and of course, every other American “law enforcement agency”  is at war with Kaspersky? Read the full article!But I for one, am not scared of the Chinese, or the Russians taking over anything.
Hell, I will show them to your door;-)
Related Story: That time-just that ONE-where I was approached by someone from Vegas who knew about these hacks, and wrote to me here at ROGS.

Eleanor White tries to change the terms of the OGS argument for the better, and others contemplate civil lawsuits against OGS

What is Organized gang stalking and why Eleanor White did not like the term

My focus, and I urge all targets to adopt this focus, is on how to speak and write to UNAWARE members of the public, which most quickly and easily helps them understand what this crime is all about.–Eleanor White

Eleanor White was a crusader who raised awareness of OGS, and as such, she tried like many to change the terms of the argument, starting with what many consider to be a loaded term- “gang stalking,” which discredits those who have encountered this nefarious practice.
If you are a researcher of organized gang stalking, a therapist, or psychologist or a civil or criminal defense lawyer charged with the care or representation of TI’s, take note that Eleanor White’s work is rapidly being scrubbed from the web.
But as a term of an influence operation, it is very descriptive of those who stalk gangs-in the “jargon” or the “argot” language of policing, it is in fact and practice a valid term. Search this blog for “NSA data theft pipeline” or “CalGang database which demonstrate how databases are used to track and entrap “gang members” from birth.

And maybe read up on how the LEIU’s stated purpose of breaking the law in order to create cases became a national and now international practice back in the 1970’s as their stated goal was to chase “organized crime.”

Here below is the discussion about the term gang stalking, from Eleanor White:
 
Chazzy
Posts: 2069
Joined: Fri Mar 26, 2004 2:52 am
Law of Parties
“One of the few prosecutors I talked to who accepted the “reality” of my situation called it participatory stalking which probably is a better term because the individuals involved are participating in a stalking at someone’s request. There is always one person who “targets” the victim. In some states where they have what’s called the “Law of Parties” the “participants” can also be charged as a “party to the crime.”
It’s a matter of semantics. In a general sense I use the word cause stalking to indicate someone being targeted because of their involvement in something that results in their being targeted by a group who are motivated by political and/or religious positions and I use the word gang stalking to indicate someone being targeted, as noted above, simply to discredit them and their complaint against someone. And they do act similarly to the way a gang acts. It is a form of bullying behavior in both instances. The “participants” are bullies. Which is why they so willingly participate. But both are participatory stalking simply on the basis of the participation.
One member has posted about her psychosis. She was not psychotic to begin with. She became psychotic as a result of the post traumatic stress and has won half the battle by acknowledging it. The cause of the psychosis is something psychologists and psychiatrists overlook when “treating” a stalking victim. They also do not “know it.”
Eleanor White says:
“Participatory” stalking carries the danger that some may interpret that as what is called “stalking by proxy.” Stalking by proxy is the usual single stalker, who is the sole source of the criminal activity, enlisting the help of others.
That’s not what organized stalking is. Organized stalking is carried on by an international network of stalking groups in each community. These groups, according to David Lawson and my own observations, think they are “helping police” keep someone “dangerous” under control.”
My focus, and I urge all targets to adopt this focus, is on how to speak and write to UNAWARE members of the public, which most quickly and easily helps them understand what this crime is all about. This includes carefully reflecting on how unware people assimilate information that is negative, information they’d rather not hear about. That’s our greatest need.
“Gang” stalking utterly fails at that.”
Chazzy later notes:
I have to add that some people do know the reality. And simply are afraid of speaking out. Some organizations that deal with domestic abuse/violence have spoken out about the problem of law enforcement “looking the other way” when the situation involves a law enforcement officer. But they are quickly silenced. But reality is reality. And if law enforcement “looks the other way” with its own it is reasonable to assume that many of these officers who are abusers themselves are going to “look the other way” with other abusers. The same dynamic is at work with regard to stalking victims in many cases. The officer doesn’t see a problem and decides they will be the prosecutor and make the call themselves instead of allowing a prosecutor to. One reason why so few cases are prosecuted may be that so few cases are actually taken to a prosecutor. It is a problem that has begun to affect all victims.
One other reality is that the “professions” including law and medicine do attract sociopaths who in many cases simply are looking for a “position of authority” that in essence allows them to view themselves above the law. They seek out positions of authority that allow them to abuse that authority in order to be able to abuse others. The “code of honor” is at work in all the “professions” not just law enforcement.
The bottom line is stalking victims are left to fend for themselves. Part of the “fending” is accepting that those we turn to in most cases turn their backs to us.”
Eleanor later replies:
http://www.stopos.info/osatv.pdf
… you will see that local community members are co-opted by spreading vicious lies about the target, often that the target is a child molester. Anyone with half a brain can see that immediately, so it’s not a problem to explain why community members participate.
I’ve had people call me, a senior lady, a pedophile to my face, and spit on the sidewalk in front of me. A colleague in another city in this province was a successful mainstream media reporter. She also is a senior and has brutal harassment everywhere she goes by people who believe she is a child molester.
The problem is, most targets are so flustered by their experience that they forget to mention that important motivation.
You can hold the opinion that organized stalking is “gang” stalking but clearly you are not a target. Commonly known gangs, youth, ethnic, biker, Mafia, are NOT carrying out organized stalking. If you say they are, you are not painting an accurate picture and are making it more difficult for OS targets to achieve justice.
As I explained, the stalkers are community members from every walk of life who have been told they are “helping police keep dangerous criminals under control.”
As I explained, any reference to “gang” stalking with unaware people throws the conversation way off on an irrelevant side track, burning up all the available attention span.
If you insist on calling this “gang” stalking, I hope you will minimize your use of that term as it does not help our cause.
We all need to EDUCATE THE PUBLIC about the reality of organized stalking, and do so regardless of whether the perps see it as a “reaction” or not. If we don’t educate the public, the nightmare of organized stalking will never end.
(A good step in that direction would be to find a way to force the National Center for Victims of Crime to stop treating OS as mental illness, and include it in their educational materials.)
I’m sad to report that the relatively small number of targets who do speak out choose absolutely the very worst things to say and write. This is such a huge problem I don’t see any way it will be solved in my lifetime. Targets do not care at all about how their words are received by the public – all they want to do is rant and shout about their pain.
Now that is perfectly natural, and it is NOT the “fault” of the very human OS targets. But this natural and blameless behaviour is keeping the perps in business.
To see examples of different activism material and my credibility ratings, visit:
http://www.multistalkervictims.org/creviews
To see a booklet of the things I have learned (the hard way) over my 15 years as an activist, visit:
http://www.randomcollection.info/osih.pdf
Eleanor White
Talking with unaware people throws the conversation way off on an irrelevant side track, burning up all the available attention span.
If you insist on calling this “gang” stalking, I hope you will minimize your use of that term as it does not help our cause.