Have you noticed the CIA listens in to key discussions online?

The headline up there is an inside joke-it came from inside my head. You see, lot’s of people think that sooper seekrit agencies like the CIA listens to us all. But that’s not true! That’s crazy! And worse- a “potentially dangerous tribe of troubled minds” in the organized gang stalking online community are starting to talk about their troubles online! They must be stopped!
But the truth is, the CIA listens to some of us, more than others of us in this modern Operation Gladio/aka CHAOS. And: the star chambers wage battle between six pointed stars versus five pointed stars, and MORE CHAOS!!!! With some THIRTEENS thrown in to the lions den (lions are seldom reported to wear high heels, but there are exceptions. Like when the rotary wheel is used as a form of domestic NTT, and Mooses and Elks and Lions Bears conspire in High Heels Policing. Ooops. Bears are Russians-never mind)
Related Story: The Privacy Raping Boondoggle That is the NSA/FiveEyes-Israel (New Zealand) data theft pipeline. What’s in a name? The FOUR MILLION DOLLAR Thin Thread versus the FOUR BILLION DOLLAR Trailblazer.
And William Binney, who recently sat down with the CIA director, is one of those “troubled people.” He has even lent his name to the targeted individual community, to investigate gang stalking. Yeah, for real.
And the Washington Post-one of the deep states favorite places to take a leak-say’s “Binney is playing with fire!” Let me know if that sounds like a threatening/threat narrative laden headline (does the use of THAT word up my DHS “threat matrix score?”)-because that could indicate paranoia, and we would have to get you some mental health treatment. Maybe, the CIA’s Mormon torturers, Mitchell and Jessen could take a whack at you in a black site, and get YOU the help YOU need! Because psychologists are in on it at every level-to help you, of course.
Here-let’s have a look at what one of the Rubin Klan have to say about that meeting (you might start to see patterns in journalism when people who are in the Klan of Rubin show up pin a narrative. Here-look at this Rubin sand-witch- a serial rape hoaxer):
William Binney About to Get Tossed Into Sheol!!! According to Jennifer Rubin
My Post colleague Aaron Blake reports:

The Intercept just broke a pretty big story: CIA Director Mike Pompeo reportedly met with the purveyor of a disputed theory about the internal Democratic National Committee emails that were released last year — a theory that runs counter to the intelligence community’s own long-standing conclusions about the matter.
It’s not the first example of Pompeo doing something that has been put under microscope. But there is a common thread running through just about every example: Pompeo doing and saying questionable things involving Russia — and those questionable things tend to lean in a pro-Trump direction.

I still remember when “those people” said the “deep state” was a conspiracy theory-do you? Yeah, and now look-Google has 42 MILLION results for that exact term. Sorry, Dr’s Mike, and Lorraine, and David- but the troubled minds tribe is growing! And- deep state is really a code word for “traitors.”
And even our own government has noted that SOMEONE likely has an actual sound cannon that was used on our diplomats in Cuba. Never mind the narrative distortion that has gone on since this story broke-because “webwashing” is a real thing.
Ever notice how the things I write about here at ROGS happen in “real news” shortly after I get on the case? Yeah-it’s a pattern-my long term case of apophenia following me around like Gloria Ghost. You might have forgotten Gloria, so here is a picture of my damned sell in dis’ dress:

rabbit
This is my imaginary friend, Gloria Ghost, the scar faced bunny. Only I can see her-she’s totally in my head. Psychologists tell me it’s apophenia. Some people say Gloria is full of sh!t, but I always correct them, and let them know that it’s not sh!t-it’s dumpsters full of garbage called a “dossiere'” with augmented reality at the internet switch, and recycling of old, tired tropes and narratives of moral panics dating back to 1913. Gloria is Edward Bernay’s favorite daughter- he lit her on fire and called her a “Liberty Torch.” Poor poor Gloria.

Well-who knew? My old neighbor Doug’s friend Pompeo called one of my favorite whistle blowers, William Binney into his star chamber the other day-no kidding. And I’m pretty sure that it was Doug who made it happen (Hi Doug! Where dd you disappear to anyways-and was REAL ESTATE involved?). So, I think now is a good time to revisit my “theory” of the horsehair worm in the crickets head, which I call “memetic neuro-fasciitis of the mind.”
Or, as you know it “the NSA data entrapment scheme that targets ALL American’s and uses the collected data to steal elections by harassing, manipulating, and “no touch torturing” political opponents of the deep state (aka the “gay mafia”) and so on.
You might remember Bill Binney as a true and real American Hero who built a sooper seekrit internet email and phone call interception machine back around 2001, the goal of which was to capture intelligence on FOREIGN spies and bad guys. But because his machine respected our Constitutional rights of due process, and was extremely cost effective, coming in just under FOUR MILLION- he was fired, and the NSA built a FOUR BILLION dollar machine instead, and targeted AMERICANS and politics. Then, they tossed that machine in the dumpster, and built one that cost 72 BILLION per year.
Then, the FBI kicked his door in to shut him up from talking about it. You can beat the charge, but you can’t beat the ride, they say.
Well- how else to build and enforce, and police, and re-police a narrative that demands a climate of domestic terror??!! And how to get more monies for all those helpful, and hungry hungry hungry DVIC Gloria Bunnies in high heels? I have an idea! How about we AMERITHRAX the crap out of the narrative? Yeah! Go team black/red! Here- from Washington’s bloghave a look at the AMERITHRAX hoax, which claimed the lives of five American’s.
Good Ol’ FBI-I guess every totalitarian bankster state needs a domestic political police to suppress, intimidate, bully, frame, and harass journalists and dissenters and writers and save cute puppies and all that- to save them from those who break into our Windows 10 to get a grab at our kids, or wage years long black bag jobs. I mean-Hitler had the SS and all those brownshirted patriots stalking for Der Muterland, and Stalin had the Cheka and the NKDV, and who can forget how well the Stasi worked in East Germany as John LeCarre’ wrote about folks who tinker around behind the scenes and exploit the narrative itself(or whose asses get fatter by the day counting beans in the DHS right now)!?
Well anyways- if you have been following my writing for the last few years before this blog, you will see I have chronicled these deep state “disruption campaigns” since around 2004. Yeah- not a profitable business model, that’s for sure. BUT: a very important check against the balance sheet which is always hungry hungry hungry! Checks and balanceslike alternative media and blogging– are the thinnest and most fragile threads that sew our democracy together, so that those who would-and can and do-tear us apart don’t get their way.
Here’s a bit from the VIPS memo, which is a complete refutation of the DNC “Russian Hacking” narrative, which documents INSTEAD a “someone most likely copied the data to a thumb drive” narrative (maybe the drive had a case of bad USB??):

MEMORANDUM FOR: The President
FROM: Veteran Intelligence Professionals for Sanity (VIPS)
SUBJECT: Was the “Russian Hack” an Inside Job?
Executive Summary
Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computer. After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device.

Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack. Of equal importance, the forensics show that the copying was performed on the East coast of the U.S. Thus far, mainstream media have ignored the findings of these independent studies [see here and here].
Independent analyst Skip Folden, who retired after 25 years as the IBM Program Manager for Information Technology, US, who examined the recent forensic findings, is a co-author of this Memorandum. He has drafted a more detailed technical report titled “Cyber-Forensic Investigation of ‘Russian Hack’ and Missing Intelligence Community Disclaimers,” and sent it to the offices of the Special Counsel and the Attorney General. VIPS member William Binney, a former Technical Director at the National Security Agency, and other senior NSA “alumni” in VIPS attest to the professionalism of the independent forensic findings.
The recent forensic studies fill in a critical gap. Why the FBI neglected to perform any independent forensics on the original “Guccifer 2.0” material remains a mystery – as does the lack of any sign that the “hand-picked analysts” from the FBI, CIA, and NSA, who wrote the “Intelligence Community Assessment” dated January 6, 2017, gave any attention to forensics.
NOTE: There has been so much conflation of charges about hacking that we wish to make very clear the primary focus of this Memorandum. We focus specifically on the July 5, 2016 alleged Guccifer 2.0 “hack” of the DNC server. In earlier VIPS memoranda we addressed the lack of any evidence connecting the Guccifer 2.0 alleged hacks and WikiLeaks, and we asked President Obama specifically to disclose any evidence that WikiLeaks received DNC data from the Russians [see here and here].
Addressing this point at his last press conference (January 18), he described “the conclusions of the intelligence community” as “not conclusive,” even though the Intelligence Community Assessment of January 6 expressed “high confidence” that Russian intelligence “relayed material it acquired from the DNC … to WikiLeaks.”
Obama’s admission came as no surprise to us. It has long been clear to us that the reason the U.S. government lacks conclusive evidence of a transfer of a “Russian hack” to WikiLeaks is because there was no such transfer. Based mostly on the cumulatively unique technical experience of our ex-NSA colleagues, we have been saying for almost a year that the DNC data reached WikiLeaks via a copy/leak by a DNC insider (but almost certainly not the same person who copied DNC data on July 5, 2016).
From the information available, we conclude that the same inside-DNC, copy/leak process was used at two different times, by two different entities, for two distinctly different purposes:
-(1) an inside leak to WikiLeaks before Julian Assange announced on June 12, 2016, that he had DNC documents and planned to publish them (which he did on July 22) – the presumed objective being to expose strong DNC bias toward the Clinton candidacy; and
-(2) a separate leak on July 5, 2016, to pre-emptively taint anything WikiLeaks might later publish by “showing” it came from a “Russian hack.”
*  *  *
Mr. President:
This is our first VIPS Memorandum for you, but we have a history of letting U.S. Presidents know when we think our former intelligence colleagues have gotten something important wrong, and why. For example, our first such memorandum, a same-day commentary for President George W. Bush on Colin Powell’s U.N. speech on February 5, 2003, warned that the “unintended consequences were likely to be catastrophic,” should the U.S. attack Iraq and “justify” the war on intelligence that we retired intelligence officers could readily see as fraudulent and driven by a war agenda.

The January 6 “Intelligence Community Assessment” by “hand-picked” analysts from the FBI, CIA, and NSA seems to fit into the same agenda-driven category. It is largely based on an “assessment,” not supported by any apparent evidence, that a shadowy entity with the moniker “Guccifer 2.0” hacked the DNC on behalf of Russian intelligence and gave DNC emails to WikiLeaks.
The recent forensic findings mentioned above have put a huge dent in that assessment and cast serious doubt on the underpinnings of the extraordinarily successful campaign to blame the Russian government for hacking. The pundits and politicians who have led the charge against Russian “meddling” in the U.S. election can be expected to try to cast doubt on the forensic findings, if they ever do bubble up into the mainstream media. But the technical limitations of today’s Internet are widely understood. We are prepared to answer any substantive challenges on their merits.
You may wish to ask CIA Director Mike Pompeo what he knows about this. Our own lengthy intelligence community experience suggests that it is possible that neither former CIA Director John Brennan, nor the cyber-warriors who worked for him, have been completely candid with their new director regarding how this all went down.

HAhahahahaHahaha. Apophenia. Epiphanies. Hahahahahaha. I’m going CRAAaaaAAAAzzzYYY!. Mmmmmmbwahaahahahhaaha.
And now, you are too. But-it IS all related indeed-to politics and political policing of words themselves. Try not to get too involved in all the pattterns….But if you REALLY want to go nuts, decipher the meaning of all those letters just above this paragraph. That should keep you busy for awhile-I mean-you lard asses have nothing better to do anyways.
Well sure- looking for Stephen Paddocks hard drive and all. That will keep you busy the same way that Oswald thingy kept you busy for 60 years or so. HAHAHHAHAHAHAHAHAAHa.
Yeah- it’s in the party van.
FBI caught with its pants down, and its game wide open in Asia-is that really a bad thing?!?FBI_Party_van2FBI_Party_van2.jpg

The CIA hack and cell phone surveillance: gang stalking and cell phones

UPDATE 8-13-2020: the link to Spyera software below now goes to an absolutely riduculous page. I suspect that link to Spyera was a front for more spying.
And, the CIA/NSA contractor that is alleged to have dumped the CIAs zero day spy tools (the same types of tools that John Brennans CIA used to spy on US most hallowed institution, the US Congress) has been arrested, and tried, with the result that trial was declared a mistrial. But the agency and its lil’ helpers already had a backup plan: they (whoever “they” are in each case) stashed shitloads of child porn on the guys personal computer servers, which is standard practice in intelligence agencies like the FBI, CIA, Mossad, et al fear that they have a rogue agent who will blow the whistle about military black operations that utilize child porn.
UPDATE  10-04-2020: This post is incredibly popular the last couple days, though its best run.was in 2018, just as CIA contractor Joshua Schulte began to chip away at his political prosecution.
While some have criticised CIA contractor Joshua Schulte for having “weak OpSec (operations security ), in a world of smoke, mirrors, and mirrored cell phones and “electronic implants ” on peoples computers, perhaps no security is the best defense because Schultes own APPs, which are designed to remotely control any and all cell phones, and computers without the user even being aware if it,  provide him the criminal defense of total deniability, as this Obama era critic, and concealed -carry advocate “targeted individual and Libertarian” faces his second trial.
Look at these paragraphs below from Jason Koebler of Vice News (and Vice News itself a politically compromised organization, since its founder abandoned it due to intel agency pressure ) and note that every single claim of “weak security ” and other “evidence ” seeking to tie Schulte to various acts,and actions could easily been performed via a middle man attacker from Israeli, or any other anti-libertarian country.
In other words, any attacker, using Schultes own tools, could impersonate him online, AND make it appear as if he himself was doing it. Intel agency compromise operations,are exactly THAT strange, and brilliant.

  • Schulte’s website allows us to easily connect many of his online personas and accounts to his real identity, discern his politics, his places of residence, and identify his friends and family members. This all came from someone who should, in theory, know better as someone who had access to highly sensitive information.
  • In addition to Project Wizard, Schulte also uploaded screenshots of his Gmail inbox, which have his name as well as emails that show information about his bank, his OKCupid account, his cell phone provider, his friends’ and families’ names, and more.
  • There’s a selfie he took of himself holding a “FUCK OBAMA” pint glass, and a shirtless mirror selfie he took in a hotel bathroom. There’s a folder called “facebook_convos” that are just a series of screenshots of him beefing with his Facebook friends and family about politics. He uploaded a resume, group projects and homework from college, and design files for a 3D printed gun called “The Liberator.”
  • There are narrated video tours of the inside of his house, screenshots of emails he sent to activists advocating for concealed handgun carry permits in Texas, saved IRC chats of “Josh” saying the n-word over and over, and yet more screenshots of his Gmail inbox, which—in the same screenshot—prove that we are looking at “Joshua Schulte’s” inbox and also reveal the pseudonym he used on several different websites. Other files he uploaded tie this pseudonym to a Blogger where he wrote extensively about his libertarian politics. The pseudonym is also present in logged-in screenshots he took of an online quiz that tested his “Brain Performance Index” on a site called Lumosity; he also uploaded a screenshot of the score he got on a MENSA practice test.

In the meantime, there,are literally thousands of APPs that can and do monitor phones in real time.
Targeted individuals often claim that their cell phones are being used as tracking devices, and that intelligence agencies are using them for target practice and experimentation. Now, we know that part of that is true: A disgruntled CIA contractor is alleged to have dumped a list of all the tools that the CIA has been using to spy on us via our cell phones for the last decades. But don’t just point the finger at the CIA, because then, you WILL sound crazy, and Dr.’s Sheridan and James might get a whack at your mind, mind mind!

UPDATE: This post is becoming one of the most popular on this blog. While I experienced “cell phone mirroring” as early as 2010, and “offline computer situation rooms” as early as 2001, you may have just discovered this vast plot against constitutional liberty. Read on, and use my ‘search this blog’ section to find posts relevant to your own OGS.
Then, in a side note, be aware that the US agencies have long farmed out all of their intelligence collection to private contractors, Israeli’s and the Five Eyes Alliance, so any given abuse of your phone could be by : any of 17 US agencies, or any of Britains eight agencies, and many more, not counting the douchebags who work in private security firms, and even local police agencies-and ALL OF IT without a warrant, or even a paper trail.

And the fact is that ALL 17 intelligence agencies in the United States have turned on American citizens, using us for target practice of varying shades of “illegal and unconstitutional” so, they have lot’s of Company (there’s a joke in there, somewhere, about “the Corporation, lol). Your country is also doing these same things to you and your countrymen.

UPDATE: This is one of my most popular posts. So I thought I would add a link for software tat you can buy to do some of the same stuff to these agents and agencies that they are doing to you. Here’s Spyera mirroring and more for cell phones, but there are many others you can use, many freeware (but be careful-most freeware comes with the hidden cost that it was created by-you guessed it….)

You see, these days, electronic tools and toys, entrapments and entrainments of electronic surveillance and propaganda tactics that were once directed at millionaires and mobsters, third world dictators and Iran Contra’s and Osama bin Laden are now directed at ordinary common people who buy houses next to the fire chief, or who seek to trim the budget; or smoke a joint here and there, or who forgot to pay their vehicle tax. This is partially due to the fact  that all of the agencies are crawling with corruption, and blackmailing each other, in the Spirit of the LEIU’s, who, bar none, perform more black bag jobs around America than any CIA agent ever did.

Related Story: Watch this video to see how some of us knew in 2005-2008 that our phones were being used as tracking devices. And, that some would repeat our conversations back to us. Watch it from 4:27 minutes. Disruption campaigns that target activists and others take on purely diabolical and bizarre proportions within six degree’s of a persons relations. The newscatser notes that the FBI use cell phones to “keep tabs on critical conversations between known members of the mafia.”

(psssst: Don’t tell anyone, but this story here about how retired LEO’s work with current LEO’s and intel gencies to perform assasinations and black bag jobs is one of America’s best kept seekrits)
And many wonder how it is that they could write something online, and then, shortly thereafter, have a squad car pull up outside their house.
hazing 4.png
This is enabled by the highly integrated, un-constitutional mechanism of OGS and the tracking in real time of targeted communications of targeted individuals, and coordinated with massive database abuse and fraud on the courts at the local, national, and international level.
Any researcher of OGS can verify that at least, it is true, that indeed 17 intelligence agencies ARE following targets, and doing many other nefarious things as well. Here, below, from the Intercept, is the case of the CIA software that mirrors your cell phone, and uses it to perform MIM attacks on YOURSELF; and here is a full list of the tools that these agencies use to target journalists, whistle blowers, the neighborhood crank, wankers, dole dippers and a few potheads the same as if they are all terrorists, with download links from Wikileaks). But be careful….honeynets and limited hang outs go two ways.

A concerted effort by the CIA produced a library of software attacks to crack into Android smartphones and Apple iPhones, including some that could take full control of the devices, according to documents in a trove of files released by WikiLeaks Tuesday.
The attacks allow for varying levels of access — many powerful enough to allow the attacker to remotely take over the “kernel,” the heart of the operating system that controls the operation of the phone, or at least to have so-called “root” access, meaning extensive control over files and software processes on a device. These types of techniques would give access to information like geolocation, communications, contacts, and more. They would most likely be useful for targeted hacking, rather than mass surveillance. Indeed, one document describes a process by which a specific unit within the CIA “develops software exploits and implants for high priority target cellphones for intelligence collection.”
The WikiLeaks documents also include detailed charts concerning specific attacks the CIA can apparently perform on different types of cellphones and operating systems, including recent versions of iOS and Android — in addition to attacks the CIA has borrowed from other, public sources of malware. Some of the exploits, in addition to those purportedly developed by the CIA, were discovered and released by cybersecurity companies, hacker groups, and independent researchers, and purchased, downloaded, or otherwise acquired by the CIA, in some cases through other members of the intelligence community, including the FBI, NSA, and the NSA’s British counterpart GCHQ , the documents indicate.
One borrowed attack, Shamoon, is a notorious computer virus capable of stealing data and then completely destroying hardware. Persistence, a tool found by the CIA, allows the agency control over the device whenever it boots up again. Another acquired attack, SwampMonkey, allows CIA to get root privileges on undisclosed Android devices.
“This is a very impressive list,” tweeted former GCHQ analyst Matt Tait, noting that at least some of the attacks appeared to still be viable.
Matt Green, cryptographer at Johns Hopkins University, agreed the leak was “impressive,” but concluded there weren’t many “technically surprising” hacks. This lack of originality may have stemmed from a desire on the part of the agency to avoid detection, judging from one document contained in the trove, in which apparent CIA personnel discuss an NSA hacking toolkit known as Equation Group and its public exposure. It was also previously known that the CIA was targeting smartphones; drawing on top-secret documents, The Intercept in 2015 reported on an agency campaign to crack into the iPhone and other Apple products.
In addition to the CIA’s efforts, an FBI hacking division, the Remote Operations Unit, has also been working to discover exploits in iPhones, one of the WikiLeaks documents, the iOS hacking chart, indicates. Last February, while investigating the perpetrator of a mass shooting in San Bernardino, the FBI attempted argued in court that Apple was obligated to give the FBI access to its phones by producing a weakened version of the device’s operating system. If the WikiLeaks documents are authentic, it would appear FBI and other elements of the intelligence community are already deeply involved in discovering their own way into iPhones. The compromise of the documents also calls into question government assurances in the San Bernardino case that any exploit developed by Apple to allow the FBI access to the killer’s phone would never be exposed to criminals or nation states….

….follow the links-connect the dots!
Related Story: The Shadow Brokers Hack in context