Dear Smiley Face Killers researchers: Do five person teams ring any bells?

When I first met the guys pushing the Smiley Face Killer conspiracy theory, at a lecture in a journalism classroom, I scoffed. And I scoffed for all the wrong reasons.

I can, in fact, admit when I am wrong. Which is not a frequent occurence. See the ROGS Analyses of mass shooters.

I seem to recall it was emenent and amazing first amendment scholar and overall mensch, Pofessor Jane Kirtley who had invited them to speak, and my thought then was: why are old white guys pushing a theory about dead white guys, who had all been ruled death by accidental drowning or suicide.

I scoffed because I had no sympathy for these dead young men, because they were all white, all rather affluent, and all who had better lives than I had ever had a chance to have.

And, scoffing at dead white guys, and “first world problems” was part of my indoctrination in the progressive education system.

So, generally, such scoffing goes like this: “There are curious coincidences in all of the deaths, and death sites of these dead yound white males.”

*SCOFF!*

“But wutabout SLAVERY, and wutabout the HOLOCAUST and wutabout LGBTQInfinity! Wutabout Empower WOMEN! Huh?? Wutabout that!!!”

Wutaboutism is like, a real thing, because the,American education system.is full of ADL sponsored textbooks. And, so are the deaths of those boys, many of whom were found with the date rape drug GBH in their corpses, in rivers and other bodies of water, all over America. And, leering Smiley Faces nearby.

OIP.DfVk8_uutiWb0evnmHeS0wHaE7

Well, cold case guys, I think I can explain that dripping smile, if you care to write to me here. Use my contact button at the top of the page. Then, take a look at Americas first mass shooter, Howard Unruh, for context, because my opion is 180° away from yours about who this “gang of stalkers” is.

Now, going through my memory of the event, I recall that retired detective, and his colleague many years later, and I wonder: would you be interested in my ROGS Analysis of five person teams, derived from twelve person cells? Because I,see that you were quoted as hypothesizing exactly that, in major media, like Oxygen, and the Daily Beast, nearly three years AFTER I documented that pattern, in several mass shootings, and in my own case too.

And, I even have emails that indicate that the twelve person configuration has merit, which I referenced in this story here, about a troll named Ueblacker in Las Vegas, who claimed his stepson had been kidnapped by meth heads.

Here are more stories where I document the five/12 configuration:

Las Vegas and the BOLO

* I wrote that story two years before your team mentioned the 5/12 configuration,and specifically named event security, and two armed undercover cops, and a *sixth* man, a hacker in a hoodie( a boy, actually). You might recall that I wrote to you about that.

Then, this story, about Mandalay Bay alleged shooter Stephen Paddock, where we also see the five person configuration, and the wrongfully terminated Cordell Hendrix, one of the fall guys in that event.

Well, I could go on, but thats enough, I think.

So, now, I,have a,question for your team: when did you develop your theory about the 5/12 configuration? I wrote mine down, and timestamped it in 2016, and wrote about it in 2017.

Would you care to compare notes? Because I noticed that your theory doesnt include a 13 in it. Guess why?

Feel free to contact me. You have my information.

The Pros and Cons of the Smiley Face Killer Theory


Global Death Investigations
, the Retired New York City detectives Kevin Gannon and Anthony Duarte first proposed the SFK theory.

Yet another person named “Caitlin” (a white, progressive female, Wutaboutist in the,MSM, or anywhere for that matter, as if we need more of those for fucks sake) claims the theory is debunked ”Yeah, but wutabout yet another Caitlin in Mockingbird ”progressive“ media?? Huh, huh?! ALLCAPS!)

The Daily Beast, with the five/twelve configuration quote

And lastly, for reference, the case of the Minnesota Fakerape Factory, courtesy of progressives in St. Louis Park, and Minnetonka, trapping a billionaire with fakerape allegations.

And a fun read : One hand looks for money, the other hand looks for goods: analyzing a,Minnesota Fakerape

Update 04-21-2020:Afyer reading through a few more of the various Smiley Face Killer stories that litter the internet, I did indeed find that the SFK story contains numerous 13s, starting with the original case study and report compiled by these detectives, and in several other places, most notably:

“The smiley faces are one-thirteenth of the evidence we have,” Gannon says on the phone. “We found 13 distinct signs, symbols and markings.”

And so, on that note, have a look at how gang staljers,*in policing* also use the number thirteen.

The thirteens, are like, a real thing in police forensics, and, free masonry as well. Use my search feature to find more links to the 13s.

Proof of gang stalking: search language that describes it, or seeks to rebut the ROGS thesis by nit picking details

is willian binney a target of gangstalking
horn honking, hubbard
what is rogs community policing
kids sold to gang stalking groups
kids being used for gang stalking

Its WILLIAM Binney, for the spelling impaired…
Generally, no one wants the CIA or other intelligence agencies in their 屁股, but, hey, it happens sometimes, like it or not in our now fully militarized, and subverted domestic spaces, aka, first amendment protected *cough cough * places, its a reality that any American citizen can, and will be targeted by Israelified FVEYs militants online whenever they trigger the entrapment bells and whistles of the psychopathic new world internet order /s .
Far worse, is when we encounter gang stalking racist or sectarian nutcases and sordid scumbags online , who “talk to the dead,” or like this moron below who stalked me on Twitter, sending me hateful private messages that I am likely a serial mass murderer.
Like many others who work or retired from US military intelligence who ramble on about aliens,and UFOs, angels and sylphs etc., this one ALSO uses the number 13 as both a sign, and a signifier of their “gang ” affiliation.”
IMG_20190516_154617
Most of these online are frequently retired cops, and military personel, forensics people, behavioral psychologists and psychometrics assessors like Christine Sarteschi , all of whom are gang stalking denialists, and a main, core compinent of the question “who are the gang stalkers ” is: it is these types waging bizarre harassment aka OGS online.

Related Story: The Association of Threat Assessment Professionals (ATAP ) is on record linking gang stalking to their practice of “colluding parallel investigations ”where police, city officials, intelligence agencies, and community policing scum share data via Fusion Centers, and then, target the communications, and relationships of disdidents, activists, politicians, and even humble garbage collectors like Al Ditty, of Minneapolis, MN.

And here, look!
1557932406031
Twelve people clicked my “contact ” form just after I wrote about this intellence cult above, and named a name of someone who harrassed me during the 2016 election cycle. Gee, I hope I dont get gang stalked AGAIN by a military /police /intel agency /private contractor cult. And, of course, this has never happened before hete at ROGS, because I monitor my blog pretty closely.
Like Edward Snowden said, when he worked at CIA /NSA /Booz Allen, all he needed was an email address to wiretap, and monitor a person, 24-7
The next day, I got a follower from Kuwait, where various ex -military, ex -NSA /CIA types run black ops, working in capacities like this self described “bad kind of spy ”covered in the MSM.
1557984363924

Fuck. I hope “they, ”whoever “they ”are dont drop a drone on my kids school, or my neighbors wedding party.
So, because these days, our military bombs entire villages in order to target one dissident, and even American citizens, I have repeatedly asked Dr. Mike Wood, the author of www.conspiracypsychology.com if he is a gang stalking denialist or not, and if not, is he interested in rebutting anything herein.
Still no answer, of course, so I wont hold my breath.
This form of policing is part of what is called “high policing ” or secret policing, and American law enforcement, and their affiliated cults of intelligence, and hidden sectarian violent action has long hidden behind nebulous threat scenarios, and equally bizarre pretexts that target individuals who challenge, or refute christian and Jewish narraties of our culture.
Here, have a look at cult formation in action, as a former military mass communications specialist, Anna Conkey, who also happens to be an MSM reporterfor NBC gets framed as a potential terrorist.
anna-conkey

So, lets meet some highly organized gang stalkers now.
(and Dr. Mike Wood, if you are following along, pay close attention to the number 13, lol.)
Organized gang stalking is military and ex-military, police and DVIC stalking.
ROGS is a non -partisan refutation of the claim that organized gang stalking is some kind of delusion, according to partisan media like the New York Times, and partisan or tribalist, or sectarian agents of the deep state of the FVEYs nations, like Dr. Lorraine Sheridan, David James, and ponerolologist Christine Sarteschi, or this social work candidate (now graduated )Liz Dietrick, who hails from the lesbian capital of academia, Smith college , hamster faced Tomo Shitbata and so many more.
Even Otto Doer Zoeggers uses the number thirteen, lol, as he describes no touch torture, aka, harrassment of targeted individuals by sectarian, tribalist, partisan hacks and hackers who illegally and with impunity, cause mass homicides, and other mayhem with counter intelligence stalking.
Well: ROGS aint scared of cunts. Gawd knows I have tangled with my share and then some.
But womens calculated, institionalized militancy and violence is a much under-explored theme in academia. Its the reason de etre ’of our modern police and surveillance state, and, its surveillance capitalism too.
I was privileged to have been able to exchange emails with NSA whistle blower William Binney, who was harrassed, and defamed and pseudo investigated by the American political police and democracy suppression agency known as theFBI,et ass, after he was fired for upholding the Constitutional guarantees of due process that make America great.
Shortly thereafter he was able to meet with CIA chief Mike Pompeo about undisclosed matters, and, the phony Russia investigation driven by a Jeff Bezos narrative, and a Robert Mueller partisan swamp full of fascist alligators.
You can follow that timeline here:
* William Binney created an internet spy device/algorythm /spyware that cost tax payers 4 million dollars, protected our civil liberties, and due process, and that device which allowed Americans to stay one step ahead of its so called “totalitarian nation state enemies, by protecting civil liberties.
* William Binney was fired, just after he began to question why the NSA had decided to build a bigger, better 72 billion per year RAT trap to target Americans due process rights and civil liberties, such as rights of speech, assembly, and now more and more, the rights of journalists over their reportage and sources.
And now someone searches for whether or not Bill Binney is gang stalked? Alittle late for that, dontcha think?
But ROGS truly was the writing on the wall, back in 2004, when the ADL /AIPAC affiliated greasy college president ransacked my lil ’ ol ’ college newsroom.
And now, Techdirt.com cries foul, as a San Francisco stringer gets his house raided in an act of pure police state.
Anyone wanna apply for my Gary Webb award, which carries a one thousand dollar stipen, and a trophy of a pigs trough with the bottom chewed out ?
I promise, if anyone from the MSM picks this beat, Art Buchwald will rise from the dead and personally sign the award certificate, which I will grant to the awardee at the steps of the FBI building on Wilshire blvd, in Los Angeles, if you write about organized gang stalking, and call it by its proper name.
And, most importantly, always remember who your friends are. It is they who will keep you pointed in the right direction.
1557988280052
Because in an America that has gone full -blown secret police state, there is a lot of bullshit online about OGS, and, many police /military operatives flooding the dialectic with psychobabble and PsyOps.
You can decide for yourself what OGS is, or, take my word for it. But, I am putting my money on my Gary Webb Award For Excellence In Journalism, so that you, the reader can do the right thing.

ROGS BINGOs are EVERYWHERE: note the use of the term “Ravens”in the following Reuters piece about “targets ”

As I demonstrate all throughout ROGS, the sooner that journalists, attorneys, psychologists, etc. adopt the ROGS predictive analysis in cases of organized gang stalking, the quicker you resolve the quandry of “high policing v delusional disorder” connundrum presented by our out -of -control domestic spying on citizens problem.
1564329153702

they saw the mission cross a red line: targeting fellow Americans for surveillance.

And, you can solve cases and vindicate the narratives of targeted individuals, who are stalked, harrassed, and frequently murdered, or who go on rampage killings in America, and elsewhere, after being stalked and harrassed by US /British /Israeli /private contractors and other Panopticon affiliated hackers and spies.
Notice in the following piece, that the NSA is directly implicated, and a female spy is involved stalking activists, and also, the use of the term “ravens”as I have documented here,with Eleanor White, and here and many other places in the OGS dialectic.
But ravens, blackbirds, and crows are SYNONYMOUS with signals intelligence operations (SIGINT) and black operations that target individuals and wage actual “electronic warfare.”
images
Without further adieu, a tale of NSA trained spies,waging black operations over the internet, working as private contractors, speech police, and highly organized, methodical bullies, targeting individuals,around the world, and inside the USA.
From Reuters:
January 30, 2019
Special Report – Inside the UAE’s secret hacking team of U.S. mercenaries
Christopher Bing, Joel Schectman
WASHINGTON (Reuters) – Two weeks after leaving her position as an intelligence analyst for the U.S. National Security Agency in 2014, Lori Stroud was in the Middle East working as a hacker for an Arab monarchy.
She had joined Project Raven, a clandestine team that included more than a dozen former U.S. intelligence operatives recruited to help the United Arab Emirates engage in surveillance of other governments, militants and human rights activists critical of the monarchy.
Stroud and her team, working from a converted mansion in Abu Dhabi known internally as “the Villa,” would use methods learnt from a decade in the U.S intelligence community to help the UAE hack into the phones and computers of its enemies.
Stroud had been recruited by a Maryland cybersecurity contractor to help the Emiratis launch hacking operations, and for three years, she thrived in the job. But in 2016, the Emiratis moved Project Raven to a UAE cybersecurity firm named DarkMatter. Before long, Stroud and other Americans involved in the effort say they saw the mission cross a red line: targeting fellow Americans for surveillance.
“I am working for a foreign intelligence agency who is targeting U.S. persons,” she told Reuters. “I am officially the bad kind of spy.”
The story of Project Raven reveals how former U.S. government hackers have employed state-of-the-art cyber-espionage tools on behalf of a foreign intelligence service that spies on human rights activists, journalists and political rivals.
Interviews with nine former Raven operatives, along with a review of thousands of pages of project documents and emails, show that surveillance techniques taught by the NSA were central to the UAE’s efforts to monitor opponents. The sources interviewed by Reuters were not Emirati citizens.
The operatives utilized an arsenal of cyber tools, including a cutting-edge espionage platform known as Karma, in which Raven operatives say they hacked into the iPhones of hundreds of activists, political leaders and suspected terrorists. Details of the Karma hack were described in a separate Reuters article today.

Gang stalking children and babies: cults and sects and CPS stalk children for profit-and the Pink Pussiehat movement is showing cracks! deedni תיקון עולם‬ .

UPDATE 09/24/2019:Since I wrote this post a couple years ago, it has now been disclosed that notorious anti-democracy, anti-free speech organizations, and tribal sectarian race supremacist organizations like the Anti Defamation League are actually using military grade psychological operations to stalk, monitor, and harass targeted individuals, using military grade programs like Moonshot CVE, and others that do even worse things. Its not “mind control” if “we” do it, right?
NEVER DOUBT THE POWER OF ONE VOICE. This blog that you are reading, ROGS has changed the dialectic entirely
Related Story: Rita,Katz, and her misanthropic quest to vindicate her father, an Israeli spy, comes home to Pensacola, FL: a primer i manufactured terrorism 101

Trigger Warning: This post contains the names of a few people from the “women and their children” crowd who participate in gang stalking. And, I wrote it for whoever is searching this .terminology: “gang stalking babies.”

But first, a free announcement from the STOP SESTA sponsors:

Let’s tell Congress: SESTA wouldn’t stop sex trafficking, but it would strangle online communities.

This post is also dedicated to all of those hard working Bernaysian Liberty Torches who participate in and profit from Organized Gang Stalking-and especially to Morgellon’s sufferers like Ed, in San Francisco,  a down and out former federal public defender who, disgraced by federal prosecutoer~cum financial~crimes~investigato Tarek,  now works in the Ohio cult of Eikenburg as a toilet slave trainee.
(You might recal Ed as the likely Fusion Center courier from this story, and from extensive correspndence with him that I documented elsewhere,as occulted law enforcement moved into an apartment three doors away from my own. )
Where and when did “high policing,” begin to target men as wage slaves, in the post-modern peonage system? What kind of people do that? The short answer is “racists, manipulative slavery profiteers, and their enablers,” andthose,derivative of Eastern Bloc banksterschemes of the One Percent, most of whom are nebulously Jewish, and well connected tothe DHS gang stalking pork barrel.
 

From Welfare State to Police State
It is not called the welfare “state” for nothing. Unnoticed by reformers and even more striking than the economic effects have been subtle but far-reaching political developments. These developments involve the quiet metamorphosis of welfare from simply a system of public assistance into nothing less than a miniature penal apparatus, replete with its own tribunals, prosecutors, police, and punishments: juvenile and family courts, “matrimonial” lawyers, child protective services, domestic violence units, child-support enforcement agents, and other elements.
Originally created to treat ills endemic to low-income, single-parent homes, this machinery is increasingly intervening with police actions in middle-class families. Kafkaesque in its logic, this machinery lends plausibility to the warnings, most famously by F. A. Hayek in The Road to Serfdom (1944), that socialist and welfare-state principles would eventually threaten not only economic prosperity, but also civil freedom.
-STEPHEN BASKERVILLE

I have up until now avoided writing about how the old government programs that the United States “borrowed” from the Nazi’s are still in play in the world but on a much wider scale, including eugenics programs where elements of society attempt to kill off resistance with cleverly worded political phrases, slogans, and clearly religious/sectarian agendas that hide their true intentions in secular law and culture; and that ALL of those agendas stink, because they work from within cultic and sectarian frameworks, and against due process of law.
Or, in this case that follows-vagendas.
Some white women-most notoriously from the “progressive” folds of our politics- perpetuate a form of racism that is very “eastern bloc,” and without concidence, the current money pot of “save the sex trafficked women and their children!” has historical precedent. Then, we can frequently find in the dialectic of OGS references to slavery of one kind or another.

Related Story: The Island of Guernsey-which reads ROGS- settled a lawsuit with 3M for allegedly poisoning people with cancer causing agents found in firefighting foam. Now, The MN State attorney general is suing 3M for $5 billion for potentially causing infertility, and cancer as others contemplate domestic spying and gang stalking lawsuits against Minnesota state agencies.
UPDATE:Minnesotas Attorney General, Lorrie Swanson, noted in some online writing as an actual gangstalker(muchOGS involves the hidden political violations of prosecutors and law enforcement- Minnesota leads the nation in this form of corruption, second only to New York and California) settled quickly, for far less. That skanky bankster whore took 800 million, instead of taking a stand and fighting- and possibly prevailing in a first of its kind prosecution that could have netted far more,possibly into tens of billions,  had citizens attained legal standing.  This is the bolshevik white female in action: settles quick an low, while keeping her job. These are devoid of morality, or even common sense, like much of the for sale #MeToo whores of our era.

 
We also see in the work of Stephen Baskerville that these same are every bit as racist/racial and a desperate as Hitler was to promote their version of tribalism, which sometimes takes the form of multi-cultism but not always-sitting down to dinner of a Saturday with any of them finds that their daughters don’t generally marry black men from Chiraq, or Compton.
And, we see their politics nearly  always ends with supremacist outcomes, and “word policing.” And lot’s of boogieMAN creation schemes, assisted by the bald headed prick in the administrative offices at some podunk college’s and backwater-states where much gang stalking begins. My reader from Washington State and my associated daily Triune of readers might appreciate my co-option of their phrase there;-)

Related Story: Why are most people who report Morgellon’s “disease” white, middle aged females?

But let me explain it this way: there is a currently split in the “progressive” vagenda, as a bunch of pussies walk into a bar- or an election; and I’ve got President Barak Obama parked a block away from my house, munching a burger with a progressive voter, after I have endured a years long gang stalking operation (see photo below ).

Related image
From the Jewish Progressive magazine Forward: “For thousands in the anti-Trump movement, the pink “pussyhat” is a symbol of resistance. For its co-creator Jayna Zweiman, it’s also an act of “Tikkun Olam,” while others ask if something isn’t a little fishy in the progressive folds, as desperate tribalists try to get their fingers into some “color”.[image and text from Forward magazine]
We saw the beginnings of what is colloquially called the American version of “mind control” and other things in the “Liberty Torches of Freedom” example where Hitler’s guru of propaganda Edward Bernay’s provided a template for “women’s rights”, where he used American women to promote cigarette smoking in the gap years between WW1 and WW2- and we see today that women from these same folds are also willingly manipulated as “vagina hat wearing morons,” today, but even there, those who claim to speak for “all women” are showing a few cracks in the ranks.
Progressive women intimidate fay men, and women’s violence is under-explored in academic settings 我一次他妈的老虎
Wǒ yīcì tā mā de lǎohǔ, or-wo sao hu yi ci guo.

So how to solve the problem? Moral panic’s, they say, are the devil’s best friend. Social contagions! Moral diseases! And-lot’s of “working in darkness” with Leon Trotsky’s favorite tool from the devils toolkit-RACISM! But where-and on who- to cast that spell? And who will help? Enter crisis PR and it’s many agents in high heels, with the associated dog and pony show waged “in darkness,” against unsuspecting targets of domestic spying.
All of these things can cause political rifts and nasty splits of all kinds, not least of which is profitable for those who cause them, and use us, one against anther, as they chew through our Constitution, and our rights of due process. This is the case with SESTA, which is a bad bill that claims to seek help for sex trafficking victims, but is in fact, a HUGE broadside against free speech on the internet. And even progressives agree that we all need to pitch in and STOP SESTA.

Related story-Falling through the cracks: Women are throwing their pink pussiehats in the gutter– is it because they think pussies aren’t ‘dirty enough’ or is their something much wider, and deeper? Or-because white Jewish and white female racism has finally bared it’s teeth to cannibalize brown/black/yellow and red pussies?

Related image
Something stinks in white-woman-privilege-land (even WITH Ed in San Francisco on the case): Are brown, black and yellow women tired of having white women’s privileged pink pussies on their heads all the time, and having the hand of Eastern Bloc banksters up their crotch, using them like Puppets? Don’t Be a Puppet!

But who are these cunts who claim to speak for women (as if women cannot speak on their own?) The answer is: they are the same slavers of each and every generation before this one, and they have roots in Eastern Bloc “white Slavery,” and Roman conquests, but also, these SAME people had deep tentacles in the slavery of African American’s, and the peonage of the indentured Irish.
But keep in mind that Protest is Protestant, and we need more of it, but without the veiled intentions of destroying Democracy at the internet switcharoo. And maybe, toss the religion too, so we can all pitch in on this projct, together.
So let me run through a case study drawn from the current online Psychological Operations that were also in play in the run-up to the election of 2016, and the associated offline and actual “gang stalking” that occurred. As the regular reader will note, I have discussed these operations as they affected the proliferation of “mass shooters” in 2016, and how progressive politics encouraged these events-but also encourage the law enforcement agents reading in to note this correlation as well.

Related Photo gallery:President Barak OBAMAs Secret Service Limo, and its cohort, parked a block away from my house, as “Progressive Welfare Cheese Staters”maraud through my neighborhood, leer through my windows, and destroy my security cameras(the great irony is that I voted for him, a move I soon began to regret).

Psychological operations and gang stalking: blurring the narrative, blurring legal, moral,  and ethical lines, one targeted speaker at a time, and a strange form of cyber stalking that comes offline, after “secret” operations:

  1. The case of the neverending war on profits derived from “white slavery,” that currently takes the form of the DVIC industrial complex and the massive money pot that has incentivized the transition from welfare state to police state; and the question “who wages these wars?” Then, I ask the reader to Google the phrase “even the gang stalkers” with quotation marks and “follow the money” and compare your results here. And, then have a look at the story of the bat-sh!t crazy Deane Zakaos Ewing, and Laurel “even more batsh!t crazy” Aston and “CIA child sex slavery rings!!!” And “masonic ritual abuse” of those who resist their messaging apparatus, and gang stalking blackmail/compromise operations/slander campaigns/ political schemes
  2. Image result for deane zakaos ewing
    The batsh!t crazy gag stalker Deane Zakaos Ewing, of Buffalo New York. RIP you sh!tbag. Zakaos allegedly passed away in a “mysterious death” in 2016. I hope your neverending journey has you rolling around in South Padre Island’s ditches and gutters with Edward Bernay’s dick in your mouth. Or, Deb, from St. Louis County, MN.
  3. the batsh!t crazy story of Laurel Aston. Keep my thesis about the number 13 in mind as you read this story. “The Truth On Ex C.I.A. Human Trafficking Victim Laurel Aston and Bill Cosby and His Son Enis By Laurel Aston”Bill Cosby’s son was murdered in a C.I.A. hit meant for me . On that fateful night ,when Bill Cosby a Black American hero lost his son , Enis Cosby .The C.I.A.had meant to finish me off for good. That fateful night was not long after Nazi C.I.A.assassin and mega Billionaire Stephen Benion had successfully extracted another rape baby from me . Benion my C.I.A.Slave handler and forced husband , did this while holding me under armed guard at our ranch outside Palm Springs in Rancho Santa Fe .While keeping me drugged nearly unconscious. Benion is a German Nazi . I am half Jewish from the sacred Lost Tribes of Israel bloodline.”

These psychological operations include gang stalking, and we saw many gang stalking targets were “911 truthers” who simply wanted the ridiculousness of the situation acknowledged (Dancing Israeli ‘art students’ that even the flaming gay press documented, and the flying Saudi’s who the flaming gay press ALSO documented; and who the Bush’s, the Clintonites, and the “deep state” just love these days); but also that includes UFO’s and aliens, chemtrails, Morgellon’s, and “holistic medicine” as well. In mind control operations, the possibilities are endless, and all of them help nefarious elements of ‘our’ society gain wealth (Do you have Tinitus??!)
Yet the serious researcher of organized gang stalking will certainly become quickly exhausted when they realize that these rabbit holes all lead to other rabbit holes- that some say “tomato” while others say “Frank Tomota,” who, “coincidentally,” used to live in Ed’s Asian barrio. And, who is a Deb Matheny/NE1/etc asociate, and not at all incincidentally an associate of a former LA County coroner who is part of DVIC narrative control.
Or, that frequently, the domestic spy rings that are frequently described as “the CIA” are actually the Mossad working with, or from within our own agencies as we saw them targeting Occupy protesters,  and also working seamlessly within secret operations one day and in American NGO’s the next; or any of many other foreign agents that “our” agencies allow to operate with immunity and impunity in America.
Don’t waste too much time making connections, because at their center, what is important, is that LEA’s and LEO’s all belong to or are deeply affiliated with one or another secret society, and retired military, intelligence and FBI/DHS/CIA all work black operations across America-and the FBI refuses to investigate these illegal, police and intellugence agency affiliated spy rings.
And, that the various Infragard and LEIU’s splattered across the country have made Constitutional due process a laughing stock in every sense. Like Ed said ” I have a few friends who work in the FBI,” just before he drove himself crazy running around in circles on Flightaware.com, one day and then zipping off to San Berdoo the next-and just AFTER I lost this story about airplanes to a long sleek black Chevy Suburban thathad no license plates.
Like this story here, we see that there is indeed a nexus between how NSA “call centers (lol)” are using data, and trickling it out t key players in the dialectic, who then wage inf0-wars and mind wars of all kinds on targeted individuals. Maybe you should rethink a few of your new Fakebook friends too, because it’s estimated that some 40% are .mil contrcators, and other state trolls. This is what mass mind control IS in action.
The researcher should keep the phrase “innocent doesn’t mean not guilty” in mind as they read into and out of gang stalking narratives, because the phrase itself-like much in the gang stalking dialectic- is laced with auto-antonymal meanings often backed up by decades long slander campaigns and police stalking; and that to some, “not guilty” frequently means “not innocent,”even if we have to break the law and commit a few crimes to prove it. ANd, this same is a feature of all blackmail operations, anywhere, ever.
We saw this clearly in the case of the Beatrice Six, known as the largest DNA related exoneration of innocent victims of state practices in American history, that state agents will do anything for a paycheck, and to keep control of their communities safe from “the Devil,” which, more often than not is a code word for “eastern bloc Jews and their Talmudic kabbalah.”
Catholics and Protestants and Baptists all generally view Jewish cultic beliefs a demonic, but also, work “in darkness” to get a chance to sink their teeth into Jewish money of any of the many flavors of banking and political interests, real estate, and then-the hefty barrels of pork that these associated “good peeple” NGO’s receive from the federal government for gang stalking operations.
And, these other spin-offs of Babylonian mystery religion all have their own strange stalking tactics too.
And, so we saw in the Beatrice Six that a child was at the center of the debate, as a lesbian mother was framed as a murderer, and then, shortly thereafter, her child was spirited away by CPS. I don’ have statistics handy, but I have read before that states and the multi-headed hydra of “social services” instantly get a million dollar paycheck for every kidnapped child, while others seem to get away with murder, and worse, as the state looks in.
And then, in the “schizophreniform” narratives of the case of Laurel Aston and Deane Breedlove/ Deane Zakaos Ewing, that they have also demonized a lesbian mother. I can provide a list of names that stretches from Texas, to Colorado, to Georgia, Tennessee, Michigan and Ohio that conects my own personal case, but also, that connects the dot directly to the NSA. Without any doubt, this is a new MHCHAOS, and 13 is the magic number there too.
So, few cases demonstrate the schism in our society more than these cases, for many reasons, not least of which is the criss-crossing of political points, or that it is the old KKK type community policing, but without the burning crosses or the pointy hats, because anonymity emboldens cowardly practics whether it is a switched internet node, or a white sheet:

  1. Children are the future of our nations, whether you are a left-wing tattooed lesbian or a right wing gay person, hiding behind religion; whether you are a single parent, or happily married; whether you are a Democrat or a Republican, (or whatever political parties are in your country.)
  2. Control of children is a lucrative and profitable industry in its own right. In America, organizations that use children as funding sources range from the school districts, to the welfare system, to foster care, and child protective services-all communities derive profits from children.
  3. Hitler notoriously claimed that ‘ he who owns the youth, owns the future/country!’ but also, Hillary Clinton’s politic and it’s associated peonage system also said similar things-‘it takes a village to raise a child!’ and so on.
  4. Religions historically vie over control of children. In every community in America we see religious factions vying for control of the profitable social services industries. These schism’s in America (and likely in other European nations) are quite evident in the culture wars waged between Catholics/Protestants on one side, and Jewish/Progressives (fallen away Catholics/Protestants, the gay community, and their many unhappy others).
  5. Many other features which in and of themselves are a separate novel.

I write this post merely as a template for others to study the strange “schizophreniform” narratives, and then, with the hope that the civil itigators, criminal defense lawyers, sociologists and psychologists, as well as criminological researchers can begin answer the questions “what is organized gang stalking” and “who gets gang stalked,” and what happens in gang stalkin.” and so on.
But we also see it in every day narratives now, as we have devolved into a lawless state of affairs where we are ALL literally wiretapped by the NSA, 24/7. You see-in the DVIC era, starting in 1993 until now, some felt it was alright to bend and break the law, based in their own hunger for power, and worked “in darkness” to not only create inter-generational trauma’s and mind control, but also, to steal babies, and worse.
In other words, the usual suspects are always an inch away from the kids, and they haven’t saved them in all of the time the world has had kids popping out of it. This is what happens when we slide the scale from a law of due process to a law of the jungle. And as I noted above, I rode the Tiger One Time, and that was enough to teach me that these are not too be trusted with law-or pubic policy in general.
This time around, my best is a rolled up pocket Constitution, and the hope that I can get a few journalists properly riled up. That works, sometimes, in Democracies. Other times, it takes a bunch of court cases, or a good class action, and as Marcy Wheeler has noted, we are all targets now.
 

High Risk journalism, Symbolic Interaction Theory, and the blogger/journalist/writer as a threat to Ich, Du, AND the matrix, part 1

Like many activists, whistle blowers, and journalists, bloggers are a highly targeted group of individuals. Yet the most difficult position of all is that bloggers and online writers-unlike journalists and others- do what we do in an individual capacity, for little or no pay. As such, we are perhaps the most fragile threads that hold our Democracy together. And it cannot be missed that the mainstream journalists, as well as many of the fake news outlets are willing to carry stories about how the “conspiracy theorists” and the other nebulous category of “fake news outlets” are a threat to official narrative-indeed their is a war on bloggers afoot.
So, while reputable civil liberties organization ask “What is Wrong With Fusion Centers, ” as the ACLU has asked repeatedly-no MSM carries similar stories. I suspect it is because these centers are actually little more than extensions of narrative control of the owners of the MSM itself.
So, in that spirit, I attempt to answer that exact question, but also have linked general domestic terrorism to these hidden practices online that have had the net effect of not merely chilling speech-but indeed are actually a poison at the root of democracy itself, sprinkled liberally by the MIC/DVIC/PIC collusion.
So- a little documentation is in order. Below is a story drawn from my personal experience as I was threatened by certain specific and nameable and now named individuals who had hidden access to my internet communications and activity at all times-and for nearly a decade. Like other stories I have written, I discovered that my speech was itself a target a bit earlier than most people knew that such was a goal-and I knew the internet was “interactive” against my free will, but had no way to describe it because as we see with the NSA to 16 other agencies pipeline of data theft, proving such a thesis is not only enormous, but cost prohibitive, as even billionaires like Roger McNamee who called Facebook “worse than Hitler’s Propaganda,”hesitate to prove something as monstrous as this is, because it would be a costly battle of the Billionaires, all of whom benefit from the data stolen from Amerian’s.
1564392568188
So cost prohibitive in fact, that the Intercept- the news source that gave us the Edward Snowden story- has still withheld much of his data and documents, despite the fact that the Intercepts multi-billionaire sponsor Pierre Omidyar has the resources for both legal wrangling and costs associated with the blowback of such material. So-imagine the weight of that exact of those possibilities on the shoulders of an individual who has been harmed by this hydra?
So, imagine me, then, as a younger man, having written stories in the largest college monthly newspaper in America, that pissed off the school administrator and his network of state and federal spies-and then, shortly thereafter, me fleeing from unknown online assailants who seem to always know where I am-and who are able to “talk” to me, specifically wherever I am online?
Then, those same ADL and NGO affilliated persons and their relatives show up everywhere you are, including filling your rental properties with bad tenants -and all of those tenants naming these people as references on the renatal applications? Yeah, organized gang stalking is THAT bizarre.

Or, 2004 A.D.

The conversation below is an example of how I have been harassed on the internet–a snapshot in time, from 2011-12. In those days, much as we see today, Craigslist.com is an ideal place for intel gathering, or intel “manufacture.”As we see time and time again, the Intercept and many other reputable news sources cover “manufactured terrorism.”
And of course to all the “good cops” who are reading in-you might want to have a look at how your “deep state” brethren and sistern’s are abusing people online, and putting YOUR lives at risk.
I will leave it to the reader to infer the value to intelligence and police agencies to use Craigslist as such, and especially, I advise the journalist, lawyer, psychologist or friend or relative of any TI who claims they are targeted-and also of course to the researcher of organized gang stalking to play around a bit there, to test my hypotheses.
Then, to note that in a hypothetical scenario where we place Fusion Center operatives-or any of the hundreds of thousands of DHS affiliated contractors, and political hit squads, or other military sponsored speech subverters and crime creators behind a switch-we can infer how such forums can and are used by unethical operators who are driven to find “terrorism” behind every rock, and in every word spoken online.
Indeed-this has become the new normal, as we see police seeking to inject young boys penises with needles based on captured data from a cell phone; or this recent case where one single emoji provokes a DOJ investigation.

Related Story: Manassass, Virginia Dick Pic Cop commits suicide. He was a sex crimes investigator AND part of the Internet Crimes Against Children Task force. Let me now when you start seeing patterns, cuz….

This exchange that I chronicle below is what I suspected to be a state or local or private contractor/agency ‘profiler’ doing a very amateur job of profiling “me”–as they confuse my postings with the postings of another person who rants and raves about single mothers! Also, that the posters variously used local cities as their “nym’s” on the forum, and later, I cajoled the salient details that these were police and police affilliates.rAt that time, I DID NOT know that Fusion Centers were spying on Americans, and waging psychological operations, whereas now, the proof of that is everywhere.
Rule one for profilers: always get “your man,“because men are who gets targeted by these asshats. Rule two: try not to get too caught up in your own farce or bizarre cultic, and symbolic meanings.
This  is also exactly the kind of amateur psychology that they use to target speakers, and get into their head–they assault you, and apply label after label in what can only be described by Max Weber/Herbert Blumer’s approach with symbolic interactionist theory:

“The central principle of the interactionist perspective is that the meaning we derive from and attribute to the world around us is a social construction produced by everyday social interaction. This perspective is focused on how we use and interpret things as symbols to communicate with each other, how we create and maintain a self that we present to the world and a sense of self within us, and how we create and maintain the reality that we believe to be true.”
from Symbolic Interaction Theory: History, Development, and Examples by Nicki Lisa Cole, Ph.D.

As such, in the discussion below the aggressor uses “mental assaults”on what they conceive of as “my” symbol of a single mother.” Also I note that the DVIC’s primary cash cow is also the single mother, whose symbolic persona is fully exploited and capitalized by any of the many nefarious DVIC industries, ranging from the foster care factories to the birthing clinics, to egregious health care costs, to constant and chronic involvement with police and the prison pipeline-not least of which is the 911 call system. How do you sell a police state?
My guess is that creating boogiemen and then policing boogiemen is good-because studies have shown that chronic fear will cause women, and especially mothers to stay in line. Except for “that one”-just that one-who uses her son as a means to gain attention, and who feeds it too the DVIC doctors in the Cash For Kids era.

Related Story: the single mother is a cash cow at the center of Americas religious sectarian white slavery racketeering, as we watch states,wrangling for federal dollars and using children to bring the bacon home, where the federal funds get spent on doctors, police, psychologists, and many other DVIC industries.
christopher-bowen-wright
Watch here as Dallas mother Kaylene Bowen -Wright forces her son into 13 totally unnecessary surgeries as cops, CPS, and especially doctors and psychologists profit from each medically unnecessary surgery, where the boy, eight year old Christopher Bowen was sliced and diced by doctors who literally used him as a human experiment, with full knowledge that the surgeries were unnecessary.
Best of all, the boy was remanded to the mothers “care ” even AFTER she was arrested! ROGS thinks that this is magnitudes of horror worse than #fakerape, and even worse than manufactured terrorism.

Then there are the subsidiary industries of sex workers who raise sex workers, and all of that overseen by “hidden mechanisms” of the baby farmers and Kids for Cash profiteers such as I demonstrate throughout this blog.
And much of this dialectical control mechanism is substantially documented elsewhere, but is significantly demonstrated in the fact that the single mother is the primary archetype of left-wing Catholicism/RUSSO-Greek orthodox, and is a feature of co-opted social narrative of the Magdalene, which is a cult symol of Catholics, but also, a point of political tension between Jews and Catholics in every century. Most notably in Russia and Germany as Jews fought Catholics/Orthodox patriarchy and used the single mother as a rope inn a cultural tug of war.
And, too, we see the archetypal single mother/empowered woman fueled by the Bernaysian dialectic of Liberty Torch bearers in every culture war, and abortion debate. While today, abortion clinics are as highly targeted by organized stalking, we see, too, that sex workers are stalked, as are those who stand for their rights. Lastly, the single mothers fuel leftist and “progressive” political power, as their votes are the primary votes of the Democratic party.
It would seem redundant to state it, but the singe mother is also the centerpiece of socialist organizing. All western communist and all socialist economies are built on the exploitation of women who benefit from progressive dialectics, and who willingly birth children for the use-and abuse- of the state.
And the fact is, that in a country where 72% of African American kids have no fathers in the home-whose fathers were villified or otherwise “objectified” under Martin Buber’s/Max Weber’s/ Ich Du paradigm; where white kids in Detroit have a 40% fatherless rate’s and Hispanics and non-Jewish others have similar troubles–the CIA could plan no better assault on me, or anyone else who gets it: cut the head off, and the body will follow. In other words, single mother raised kids are MORE likely to merely ‘go along with the program and become cannon fodder, prison bed lining,or otherwise take up space in a society that exploits children this way, whereas father involved households, kids stand a better chance at having a life beyond ‘lower tier taxpayer’ which is discouraged at every point in American society, as men are exploited differently than women.

Racial or ethnic group Percent of births considered “non-marital”
Asian Americans and Pacific Islanders 17 percent
Non-Hispanic whites 29 percent
Hispanics 53 percent
American Indian and Native Alaskans 66 percent
Non-Hispanic blacks 73 percent

So-this snippet of the conversation eventually led to a conversation with a Chicago cop-who admitted as much- (there were several actually), and other agents of social/ mind control. Note how they mentioned Kennedy and the FBI--a sure tell that such persons had direct access to my personal narrative.
Have a look at this photograph from one of my many stalkings, below to understand how well connected, and how well hidden these campaigns are, and how well informed. Look at the mid-right frame of this house’s back door, where you will see a bust of JFK at the door.
hazing 4
 
–and then note that these profilers/bullies/harassers are attempting to defeat a simple meme by labeling me as a ‘narcissist’–something I called them many blogs ago, and in other writings (re: Must We Conform” MKULTRA and Cameron, and others).
These hidden internet agents have been playing mental ping pong with me for over a decade (Hi Doug!), trying to infiltrate my friendships, jobs, writings, and so forth–and trying to not only intimidate me to silence, control the words I say, and to limit my ability to demonstrate that what I say is true, or to even put forth my many hypotheses.
And this is the kicker: keep in mind that this conversation/mental assault occurred just around the time I was about to purchase a mirror from Target. I had spoken to another person on a phone, and that person asked me to purchase a mirror. Then, I went to purchase the mirror, and noted certain secific features of persons who were in that store. I picked up a mirror, and put it into my cart, and noticed it was broke–possibly broke in the shopping cart, or I picked bad one, or maybe even broke it myself due to bad handling or bad packaging. I put  the mirror down, and got another one. Keep this in mind as you read on (and I can literally provide hundreds more examples, some of them documented and time stamped as this one was in 2011-12)
Related Story: The CIA’s James Jesus Angleton and a Wandering in the Angletonian world of of Mirrors– versus Lacan and the “Mirror Stage”-the actual “I” of “Ich”
The theme of mirrors, while coincidental (let me know when you start seeing patterns, cuz….) was in this case a matter of less than four hours between an incident, and this exchange online, on Craigslist. Read the exchange from bottom to top to get the full effect. But also, keep this important fact in mind: Craigslist deletes posts after a specified time and then the posts are gone-so CL is an IDEAL forum where dynamic exchanges can happen, and people can be psychologically exploited. In this case, Craigslist has a feature where hidden users can “flag” posts which then get deleted. And, any post that I posted was in fact heavily flagged, and deleted as son as I posted there!
Lastly- look at the threat of “many years of bad luck.” Yup. Again…..patterns….lol. “The Thirteens.”And don’t forget this part of my thesis, which is central to the entire story, because organized gang stalking utilizes the internet for most of it’s psychological operations, and organized gang stalkers utilize gematria and cultic numerology, hoping to instill fear and cause superstitions. so-Psyops and gang stalking  are tied together as deep and long as well heeled endemic, systemic institution wide police/institutional/government/cult/religious corruption-which is ACTUALLY the worlds oldest profession, as it came just AFTER they caught themselves slobbering at the windowsills of someone who they later agreed was a pervert or a whore.
And to the “word-phobic” or “sensitized” or the “crybullies” amongst my readers, pardon my use of “words” to respond to this person into a dialogue that revealed them eventually as working for a police or intelligence agency, but words are effective exploratory tools with which sociologists discover hidden meaning, and hidden operatives via the use of symbolic interactions.
===========================================================================================
Reply to: [email protected]
flag [?] : miscategorized prohibited spam best of
Mirror Mirror on the Wall Who’s the Gayest Of them All (SMGG)
The Single Mother Gay Guy sees himself as a savior of the world by warning us of Single Women Gone Bad because they have children. When the SMGG looks in the Mirror he sees some Narcissistic Hero who is strong enough to set the world STRAIGHT on the evils of Single Women.
But the Single Mother Gay Guy has MANY, MANY years ahead of bad luck since he keeps breaking mirrors after they tell him the truth: “The Single Mother Gay Guy is the Gayest Guy of ALL”.
The Single Mother Gay Guy EXPLODES into a rage of self directed narcissist behavior and he breaks mirrors and more mirrors for telling him the truth.
So Gay.
 
Reply to: [email protected]
flag [?] : miscategorized prohibited spam best of
Why are you bitching about female pedos (The country is overrun by tbag peds)
There was lists of thousands of them posted on here earlier today. Guess who removed them all LOLOLOLLOLOOLOLOLOLLL What a bunch of complete losers and child molesters.
Location: The country is overrun by tbag peds
it’s NOT ok to contact this poster with services or other commercial interests
The Single Mother Guy Saves The World From Women (A Hero in the Mirror Only !!!!)
Holy Fuck- You go save the world you stupid bastard. Forget about Aliens, and Forget about the FBI killing JFK, and Forget about Obama being a Muslim, and Forget about the New World Order……………………………Single Mother Guy Will Save Us From………Women. and not just WOMEN, but…………….Single WOMEN, but not just Single WOMEN…………….He will save us from Single WOMEN with Children !!!!!!!!!!!!!!!! YES you go Guy, they are EVIL……………………..LOL
Re all single motherswhite women pedophiles? SMG Gay Guy Saves World (SMG Latent Homo Saves the World)
HOLY Fuck!
Just as I post that the Single Mother Gay Guy is EXACTLY LIKE a muslim religious nutjob who needs to save the world from Women Gone Bad, the Fucking Latent Homosexual Just Posted the below story To Try And Save Us !!!
I was Right !!!! Holy Fuck its Scary!!!!!…………………………….. The Single Mother Guy NEEDS to Save the Earth From Evil Single Women with Children
Oh My God, you are one insane narcissist bastard !!!!!!!!!!
=======================================
 
Are all single mothers and white women pedophiles???
Date: 2013-01-13, 12:35AM CST
Reply to this post grspg-3542262420pers.craigslist.org
Lisa Biron–a white female pedophile and rapist, AND a single mother, AND a Christian activist–has been convicted of “expoitation” and production of child pornography using her own daughter–but NOT convicted of licking her own daughters twat on film!!!!!!!!!!
How come when men rape kids, they get the worst labels–pedophile, rapist, etc., but when women rape their OWN kids, we call it exploitation?
Manchester, NH Lawyer Arrested On Child Porn, Exploitation Charges
http://www.opposingviews.com/i/society/anti-gay-activist-lisa-biron-found-guilty-child-pornography-after-video-taping-daughter
This is just the tip of the iceberg (the white, female iceberg full of female pedophiles). I wonder if all women who stick up for single mothers are also pedophiles, or pedophile enablers? The evidence is more and more clear that most feminists are pedo’s but now we see Christians getting in on the “action” Too! re re dumbfuck Narcissustic: (You are still a dumbfuck Latent Homo)
The Single Mother Guy CONTINUES to Flirt With Me.
Holy Fucking Mother of Mary. EVEN after I say that the Single Mother Guy is gay and flirts with me, he AGAIN flirts with me by calling ME GAY.
The Single Mother Guy is NOW DIRECTLY fantasizing that I am GAY. He No Longer Sees me as a Lesbian Woman getting Fisted, but as an Actual Gay Guy that he can hug and kiss.
First you Dumbfuck, The Analyses were NOT written by me, they ALL came from books or publications you fucking IDIOT.
The Single Mother Guy JUST AGAIN PROVED he is a Narcissist Gay Latent homosexual in a Different Way when he said THIS:
” (Single Mothers) SM’s have no one to answer to, they have complete pathological control over someone they perceive as ‘weak’ (real projection) etc.
– The Fucking Single Mother Guy is saying that REAL, Single Women with Children do NOT have anyone to answer to, inclduding GOD . Holy fuck, you Gay Latent Homo, do you know what this means?
– It meas that to the Single Mother Guy, Single WOMEN with Children have NOBODY to answer to, and they can do as much harm to the world as they want, and in HIS distorted mind, Single Women need to be put in their place or their existence will destroy the World. Holy Fuck.
NOW We know why the Single Mother Guy needs to put Single Mothers in their place, the Single Mother Guy sees himself as the Savior for the World and only HE is strong enough to see the harm that single women will do to the world.
HOLY FUCK- The Single Mother Guy has the EXACT Same Argument as a Right Wing Muslim Nutjobbie. HE NEEDS To Stop Women from RUINING the World for all the men who can’t see as clearly as he can.
Well Go Fuck Yourself Single Mother Gay Guy. Your Homosexual Repressed Tendencies are shining brightly on you, showing you as the complete Narcissist Asshole that you are.
Fuck You.
.
=====================================================================
.
 
re: dumbfuck has Narcissistic Latent Homosexual Critic
Date: 2013-01-13, 12:19AM CST
Reply to this post b8fb9-3542249480pers.craigslist.org
So–what exactly do you call yourself, Doctor CL Stalker? I think you have been smoking one too many cigars…or was that a pole you had your lips all over? Either way, your obsession with SMG is out of control, and your own gayness is showing–if for no other reason than you are a misandrist, and no one hates authentic men more than fags.
You posted what? Some two or three hours worth of R&R over a guy you have never met before? You are no psychologist, Dr. Strangegay–you sound a bit on the gay side yourself. Here is short a list of why:
1) You describe narcissists in sexist terms using the male pronoun. In fact, there is no act of narcissism more clearly fitting the definition of self involvement that to become a SINGLE MOTHER!
SM’s have no one to answer to, they have complete pathological control over someone they perceive as ‘weak’ (real projection) etc.
2) Narcissists ( the ones you describe–cops, etc) all respond to the single mother memetic–and all hide behind the mantra of “women and children first” while hiding their pathology behind phony acts of heroism–like sticking up for path-narc whores, and single moms.
Location: You are still a dumbfuck Latent Homo
it’s NOT ok to contact this poster with services or other commercial interests
Posting ID: 3542277647
Posted: 2013-01-13, 12:53AM CST
email to a friend


 
AFTERWORDS: To any person reading this who wonders “what happens to gang stalking targets”or who might have questions about hidden policing methods, or psychological operations online, feel free to replicate my results on Craigslist.
I practice the dark arts of investigative blogging, and especially have studied the hidden operations of gang stalkers for well over a decade, starting with a few stories I wrote that challenged or otherwise countered “official source narrative.”
Also, keep in mind that part of my thesis here at my online performance art called ROGS involves mass shooter’s-and specifically that I claim they are harassed into extreme actions, due to these hidden poluce union, LEIU, NGO operators; and that their lives are literally surrounded by these hidden operators, as we saw here, we ROGS predicted key elements of a mass shooting well in advance of the event
So, you can test every ROGS thesis yourself, and understand that ROGS takes the path of non-violent resistance in order to expose these cowards, all of whom already have a pre -paid ticket to their own hell.

Do "magic bullets" kill vampires, too? Happy Samhain ˈsouən/

“Sins of omission”-context on the released JFK papers: 13 Documents You Should Read About the President John F. Kennedy Assassination by the CIA

“A bullet had entered his back at a point slightly above the shoulder to the right of the spine.”

Yup. Shooting people in the back has symbolic meaning, according to symbolic interactionist theory.
As we see the pattern of the CIA’s operation CHAOS in the 1960’s targeting activists and dissidents in the US with a variety of harassment, and as we saw with operation Gladio in Italy targeting Catholics and their mobs; and as we see now with the John F. Kennedy papers-still leaking slowly like a festered wound, we see all over, everywhere now that Democracy in America was killed in a multi-staged coup of Fabian Socialist incrementalism, starting right there.
Related Story: Grist for the Hitler mill-latest JFK papers hint that Hitler lived
And, we see that the bankster’s who issue marching orders to the CIA have now spread the word to 16 other intelligence agencies that are monitoring Americans as if they are terrorists. That is what the NSA nation-wide wiretap was and still is about, times 16.
I have noted my personal connection to the Kennedy family, which is as tenuous and distant as most people’s connections who have a drop of Irish blood in them, but my personal connection goes a little deeper than most for reasons I will not disclose, and for my own safety, and the safety of others. But suffice it to say that the CIA, according to Seymour Hirsh, is running an executive assassination ring right here in the good ‘ol USA.
Here-have a look at this photo of squad cars circling a house in a many years long intimidation campaign with the undertones of constant  blackmail attempts, and constant internet sabotage, and many as-yet reported other subversions- circling a house where community activists and hippies, writers, journalists, gardeners, and others lived.
Yes, real estate is a major part of what organized gang stalking is, and we see now that the Department of Homeland Security-which raided that house one day in an act of selective enforcement,  and hauled away a woman who had fled her own country because of threats by here ex-husband to “cut her head off-” we see ICE as an integral component is OGS.
Yup. And the DVIC is the foot in the door to their larger schemes of social control. Let’s save the women-of course! The DVIC saves women indeed. They save them so well that all the efforts of saving them makes this happen, and this, and this.
Yah. That house set a neighborhood trend in community gardening, and that housed members of the Qiche’/K’iche’ tribe of Guatemala. You might remember the Qiche’ as one of the Mayan tribes, or as “the jungle people who were mercilessly tortured by US interests during the Reagan just-say-no era of Iran Contra; little men,  most of who are barely 5 feet tall; and all of this while certain and specific arms dealers made a killing from selling UZI machine guns; a people that Nobel Peace Prize winning author Rigoberto Menchu wrote about.
I routinely got calls from the various “good guys and gals” charities and NGO’s and union mobsters that I have described elsewhere on this blog. Also note that real estate, and politics was involved, and a major AIPAC sponsored inter-generational political-mob family was involved, and unseated from political districts, and more.
hazing 4
And this all takes on special meaning when we note that bankers are dying in mysterious deaths-and when I say mysterious, that isn’t me saying that, it’s the MSM’s own headlines. Have a look at these two sisters from Minnesota, both bankers, and both dead overnight while staying at a ritzy foreign hotel in what the Sun titles DEATH IN PARADISE: Mystery Death of Two Banker Sisters.
And even the New York Post asks “Why are so many bankers committing suicide?
But it’s happening all over, as key players are being “disappeared,” harassed, stalked, and killed, in classic black operations that are straight out of the CIA/IC manuals, much as Pullitzer Prize  winning journalist  Robert Parry of Newsweek told us of in 1993. Then, have a look at these 13 documents that came before the latest “release”-and say to yourself- “sure. There’s no conspiracy here! MoooOOOOOooooove along now….
The 13’s, though-they’re  definitely a thing in propaganda and narrative, hard to deny that. Get a clue/

13 documents you should read about the JFK assassination
By Randolph Benso
NSAM 263: Getting out of Vietnam — On Oct. 11, 1963, Kennedy signed National Security Action Memorandum 263. This ordered a withdrawal of 1,000 troops out of roughly 16,000 Americans stationed in Vietnam by the end of 1963, with the complete withdrawal by the end of 1965.
NSAM 273: Mysterious timing — Signed on Nov. 26, 1963, this was the first National Security Action Memorandum on Vietnam under President Lyndon Johnson. NSAM 273 effectively overturned Kennedy’s NSAM 263 and ordered the planning of increased activity in Vietnam. The memorandum also authorized open-ended covert operations against North Vietnam. This, in turn, led to the Gulf of Tonkin incident, which President Johnson used to obtain congressional authorization for a drastic escalation of the war. The draft of NSAM 273 was dated Nov. 21, 1963, the day before the assassination; however, Kennedy had not ordered its creation and did not see it. Newly sworn-in President Johnson signed 273 on Nov. 26, the day after Kennedy was buried.
Operations Northwoods: Invading Cuba — Declassified in 1997, this lengthy document has been called the most corrupt plan ever created by the U.S. government. On March 13, 1962, the chairman of the Joint Chiefs of Staff, General Lyman Lemnitzer, submitted this secret plan to Secretary of Defense Robert McNamara.Its purpose was to justify an invasion of Cuba by means of terrorist actions against the U.S.—to be carried out by U.S. military and intelligence. Proposed actions include a “Remember the Maine” incident, “exploding a few plastic bombs” within the U.S. and “to create an incident which will demonstrate convincingly that a Cuban aircraft has attacked and shot down a chartered civil airliner en route from the United States …” Kennedy blocked Northwoods and, in September 1962, replaced Lemnitzer as chairman of the Joint Chiefs.
CIA Document #1035-960: Using politicians and the media to counter criticism of the Warren Report — This document, dated Jan. 4, 1967, and marked PSYCH for Psychological Warfare, directs agents of the CIA to counter critics of the Warren Report by using “liaison and friendly elite contacts (especially politicians and editors)” and “to employ propaganda assets to answer and refute the attacks of the critics.”
House Select Committee on Assassinations final report: A conspiracy behind JFK’s assassination? — In 1975, investigations by the Rockefeller Commission and the Church Committee revealed the CIA had abused its power by engaging in illegal investigations and activities. As a follow-up, the HSCA was created to investigate the assassinations of JFK and MLK. The HSCA issued its findings in 1979, stating, “The committee believes, on the basis of evidence available to it, that President John F. Kennedy was probably assassinated as a result of a conspiracy.” The committee recommended to the Justice Department that the case be reopened. To date, the department has declined to do so.
E. Howard Hunt v. Liberty Lobby Inc.: The CIA’s role in the assassination — On Aug. 16, 1978, Liberty Lobby Inc. published an article by former CIA officer Victor Marchetti in its magazine, The Spotlight. In that article, Marchetti stated that E. Howard Hunt, also a former CIA officer, was involved in the JFK assassination. Hunt sued Liberty Lobby for libel in federal district court and won. However, in the appeals trial, former CIA asset Marita Lorenz testified that on Nov. 21, 1963, the day before the assassination, E. Howard Hunt was in Dallas, where he delivered “sums of money for the so-called operation” to a small group of men that included former CIA agent Frank Sturgis of Watergate fame and Oswald killer Jack Ruby. The federal jury found for Liberty Lobby Inc. and awarded costs to be assessed against Hunt.
E. Howard Hunt deathbed confession: Naming names — In August 2003, former CIA agent E. Howard Hunt lay dying in his Miami home with his son, Saint John Hunt, at his side. E. Howard Hunt began describing the details of “the big event,” including names. Hunt sent an audio taped confession to his son in January 2006, and directed him to release the materials upon his death, which occurred in January 2007.Two months later, Rolling Stone published Hunt’s confession after The New York Times and The Washington Post declined to do so.
CIA Document #1345-1057: the New Orleans connection — Released in 1993, this document states that New Orleans businessman Clay Shaw “was in touch with the DCS [the CIA’s Domestic Contact Service] from December 1948 to May 1956.” In 1966, New Orleans District Attorney Jim Garrison opened an investigation into the New Orleans connection to the assassination of JFK, which formed the basis of Oliver Stone’s film JFK. Garrison’s investigation centered on an association between Shaw, former FBI agent Guy Bannister, pilot David Ferrie and Lee Harvey Oswald. In 1969, Shaw was charged with conspiring to kill Kennedy. Shaw testified under oath that he had never worked for the CIA.
Photo of Lee Harvey Oswald and David Ferrie in the Civil Air Patrol — In 1993, PBS’ Frontline secured a 1951 photograph of the Louisiana Civil Air Patrol in New Orleans that shows both David Ferrie and Lee Harvey Oswald in the same unit. Ferrie was included in New Orleans District Attorney Jim Garrison’s investigation (see previous entry). However, Ferrie denied having ever known Oswald or having had any association with him.
The Bush-Hoover Document: What did Bush the First know? — On Nov. 29, 1963, FBI Director J. Edgar Hoover drafted a memo titled “Assassination of President John F. Kennedy” to Roger Hilsman, the director of the Bureau of Intelligence and Research. In it, Hoover stated, “information was furnished to Mr. George Bush of the Central Intelligence Agency.” This has piqued the interest of researchers because George H.W. Bush wasn’t officially affiliated with the CIA until he was named director in 1976.
Nicholas Katzenbach-Bill Moyers memo: Nothing to see here — On the day of JFK’s funeral, Nov. 25, 1963, this document was sent from Assistant Attorney General Katzenbach to Bill Moyers, press secretary to the newly sworn-in President Johnson. It states, “The public must be satisfied that Oswald was the assassin; that he did not have confederates who are still at large; and that evidence was such that he would have been convicted at trial.”The Warren Commission was created four days later.
In Warren Report, Gerald Ford changes position of JFK’s back wound: The single-bullet theory — In July 1997, pages from the original draft of the Warren Report were released. Among them was a page describing the path of the famous single—or magic—bullet. The memo states, “A bullet had entered his back at a point slightly above the shoulder to the right of the spine.” In pen, Ford changed the report to read, “A bullet had entered the back of his neck at a point slightly to the right of the spine,” thus making the single-bullet theory plausible.
Nov. 22, 1963, Hoover memo: Oswald acted alone — On the afternoon of the assassination, before investigations had been initiated, FBI Director J. Edgar Hoover sent a memo to his executive staff stating that he had called Attorney General Robert F. Kennedy, informing him that “we had the man who killed the President.”
This article appeared in print with the headline “Sins of omission.”

On the difference between schizophrenia and trauma induced psychopathology, and "memetic neuro fasciitis"of the mind part one

Trigger Warning: for those who have been abused with mind control that includes worms, bugs, or parasites, this post contains a video of a worm in a crickets head, causing it to commit suicide

John Forbes Nash, was not schizophrenic: a case study on the effects of bullying, and then OGS bullying-v-organic disorder
John Nash, the great mathematician and the man credited with changing the world, and its economics via,“game theory”, was one of the great coup’de grace of psychology in the last century, and he died in 2015, about the time that myself and others began to discuss and write about the likely fact that he was NOT a schizophrenic in any sense of the word.
And, he died in a car accident just that year-within months of me writing that exact thought,which is a common coincidence. And perhaps I weighted my evaluation of his case as one of the great psychology frauds of the last century, in part, because his biographer Sylvia Nasar is the daughter of a CIA agent who emigrated to the US at the beginning of Operation Paperclip, and during McGill Universities CIA funded MKULTRA experiments.
So, I’m biased, maybe, because it seems that everywhere you look, the literature, and the “psychology” of these era’s is laced with CIA authors, and “information”-aka “intelligence,” but also, religious cultural bias, which infects every opinion, and every psychological diagnoses, many of which are weaponized.
From JD Salinger to many others, we see the sectarian biases creeping into culture, warring with each other through authors, with sooper seekrit agencies mediating culture by acting as hidden interlocutors in the middle of every literary narrative.
And, we also see mass shooters are frequently people who engage in counter-narrative “framing” too, as is indicated in the case of Jared Loughner, who famously shot Gabby Giffords, the darling of gun control (and herself, a gun user), and who met organized gang stalking when he engaged in his love of books.
1546490000675.jpg
Meanwhile, Americas racist -sectarian -religious wars are waged in classrooms, as the toxic ADL sponsors both school curriculum, AND the Israelification of American police, via privately sponsored bribes and “training ”in Israel.
Salingers work,Catcher in the Rye, which is pushed in many American classrooms today as “great literature,” eminates from the half Jewish, half other cultural framework, and was heralded for decades and several well known assassins carried that book when they committed crimes.
In fact, Catcher just came out as another re-incarnation/reaffirmation that the sheeple are still in the pen, in the form of a movie, in this modern era of gang stalking, and mass shooter creation.
Salinger was also the author of many quasi-pedophilic works (Bananafish) and so, what has been widely called the the progenitor of the mass shooter, ala Holden Caulfield, is still used as a form of quintessential CIA based propaganda, even getting a remake this year with Rebel in the Rye; and its,still called clasdic literature, and taught in American schools, despite it being a rather dull book.
Then, other literature, ranging from such classics as One Flew Over the Cuckoos Nest (which I wrote about in the case study of Lucie), to the more recent recruiting tool aimed at white mid-life crisis aged females, Zero Dark Thirty-something, to the interesting but totally flawed/contrived depiction of Nash in A Beautiful Mind- the CIA’s prints are all over the place in American literature; and if not the CIA directly, any of the many other intelligence and police affilliated control each and every narrative of our culture.
But speaking of Fabian Socialism, international banking, and time theft as unconstitutional policing methods take Dworin -sized bites out of due process, -have a look at the question that ‘psychology’ is STILL asking today-I mean- you would think “they” would have  answers by now, right? Or- is there something ‘more?’
And try not to see any patterns, cuz‘….

A Beautiful Mind: What Did John Nash Really Have? Are we sure it was schizophrenia?

The Parasite in the Crickets Head Which Causes It to Commit Suicide
[youtube https://www.youtube.com/watch?v=D7r1S6-op8E&w=854&h=480]
Pop science, unlike pop psychology, is based in actual science. Here, from Popsci.com, you can read more about the actual science that demonstrates how the cricket is killed via direct parasitism  the result of a neuro-parasitic infection by the worm; but not really BY the worm, but rather OF the worm-the worm itself is the infection. And a similar case can be made by indicating that psychological processes are also invaded by intelligence collection via the internet, and other forms of ‘infiltration and infection’ of the actual person who becomes involved in organized gang stalking, aka intelligence and counter-intelligence surveillance, and its tentacles in “community policing.”.
Unlike psychology, in “hard sciences” there is actual footage, actual species involved, and actual video of the cause/effect relationship between the cricket’s suicide and the parasitic worm crawling out of its head, as well as metrics that can measure this relationship directly. For example, a cricket with a horsehair worm in its head will inevitably commit suicide, versus a cricket without a horsehair worm in its head will NOT commit suicide.
In other words, the cricket, once invaded by the worm, will nearly always commit suicide, which is a nearly 100%  predictable, replicable feature of this neuro-parasitic invasion. This is what is called “proof” in scientific circles.
But “delusions” in psychological terms are not nearly as scientific, observable, or scientifically falsifiable as the worm in the crickets head, because the evidence of “psychological infection” cannot be found or observed, or proven.

UPDATE 12-06-2019:Since I wrote this post that you are reading two major pieces of evidence of this “psychological infection” have come to light, as,we see race-based tribal religious sects actually targeting individuals thought processes online, using military grade psycholigical operations, and also, offline, we see weaponized psychological operations waged from Fusion Centers involved in the pre-ballistics of mass shooter events, time and time again, so frequently that I was able to predict key features of a recent mass shooting BEFORE it occured.

As such, we must then observe delusion through a non-objective lens, and through the mechanisms of propaganda in one form or another. And, most of western propaganda is sponsored by corporate, institutional, or military interests, religious and tribalist interests, and, occasionally like ROGS here, unsonsored in any manner.
So, how to differentiate delusion, from belief, from punitive psychology driven narrative?
The worm is neocon -progressive religionists, infecting every law, and policy, while hiding their presence in the cowardly terminoligy of “saving women and children,”aka “white slavery.”

Unlike science, however, psychology does not have the ability to prove or disprove anything with certainty, and although courts allow psychological testiony as nearly as if it is scientific proof or prediction of one thing or another (and it is not), there simply is no actual proof in most psychology- until we come to the point of torture, or other uses of psychology  as a ‘predictor’ of ‘scientific’ outcomes, where we find a shift in standards of ‘proof,’ where psychology takes on a cultish, and nearly religiously vested mantle as something close to religious belief that overlooks, denies, claims igorance, or otherwise “gas-lights” a patients complaints for political expediency, much as we see with the Sheridan and James study, or the Dietrich thesis, both of which are in opposition to the lived experience of Dr. Moss David Posner, who was not only a targeted individual advocate, but also a draft resistor against the total lock-up on narrative of the Military Industrial Complex and its propaganda organs.
So, we must now look at psychology itself as a near-religion, at times directly opposed to science, or in thhe least exsting un-accredited next to it; and also question the political purposes of psychology from a Bernaysian perspective of “pop psy” versus “pop sci”; and as a pseudo science that is literally opposed to science, but partial to being used as a near religion.
Here- have a look at that in the form of the CIA torture psychologists Mitchell and Jessen-both of whom are Mormons. Then, saunter down Sigmund Freud and Edward Bernays lane, where we see propaganda and science literally blurred in true Marxist fashion, with an undertone of utility for certain billionaires and war financiers versus other billionaires and war financiers.
So, here is a snippet from the linked article from the pop psycholology magazine PsychologyToday.com above asking “what did John Forbes Nash REALLY have?” (which is the psychology equivalent of asking who the real killer was in the case of OJ Simpson):

It is a commonplace that John Nash, the Nobel-Prize winning mathematician and economist who recently died, had “schizophrenia.” All his obituaries repeat the formula, and the assumption of the book about his life and the subsequent movie, “A Beautiful Mind,” leave this assumption unchallenged.
But did he really have schizophrenia?
Core schizophrenia begins in adolescence or early adulthood, may involve a psychotic break, certainly involves diminished executive function, affective blunting and a thought disorder. (On this see Edward Shorter, What Psychiatry Left Out Routledge.) The concept of “thought disorder” means inability to think clearly, or in a consecutive manner. It does not necessarily mean the hallucinations and delusions of psychosis.

Related Story: The Guardian implores “don’t use Nash case to sell drugs.”
So, psychology “Today” is asking a question about a dead man, and then, querying data about incidents and interpretations of those incidents from over 65 years ago. Does that indicate to you, the reader, a potential “problem” with psychology-and psychologists? If it doesn’t, then, please-by all means, stuff your head back in Uranus, which, like your opinion, might need more analyses .
But to understand this claim, that Nash WAS NOT SHCIZOPHRENIC, we must go back in time and study the entire century, which is literally impossible in ordinary terms, and up until the ‘invention’ of today’s mind control apparatus, which you are beginning to discover-or already know-is the internet, we could not possibly imagine what someone is “thinking” at any given moment, and then, understand what that individual is “thinking about” or are planning. And certainly, the big boogieman of the “terrorist” has given corporations and governments their reason de etre’ for chronic surveillance.
But the reality is now as it was in Nash’s time: intelligence itself is the TARGET, and the intelligent themselves are “targeted individuals.And this is a fact, correlated across online platforms, and across the entire dialectic: like a parasitic worm that moles into the head of a cricket and then controls or benefits from that crickets actions, such is the condition  of many TI’s and the intelligence agencies.
For most of the last century, psychologies big secret was that it really is Jewish mind control. designed to control or contain, manipulate or profit from innovations in order to benefit “the Jews.” While this is a controversial claim, and some might also infer that it is “anti-semitic” one must only look at the people who make claims of anti-semitism to realize that they themselves are rabid racists, and genocidal psychopaths.
Then, ask the questions that feww seem willing to adk: whyre so very many of thos implicated in spying and data theft councidentally from these desert tribes? Mark Zuckerberg and Facebooj, Karp and Palantir, and mysterious Israelis cropping up in every hacking event, including the Apple Iphone encryption debate?
So, for atheists, and the secular, this is an unavoidable paradox: psychopaths who willingly have subverted our rights of fredom of speech, assembly, and association, in online and offline mobbings, so many of which trace directly to Israel via the NSA~FVEY~Israel unfiltered data collection at the internet switch.
it also must be noted that the wider christian culture finds utility in the net products of Jewish psychopathology, and so, together, Jewish-christian societies have largely conquered the ‘world.’ And we must ask ourselves repeatedly “who is the cricket and who is the worm” one century to the next, because all western religion derives from Abrahamic supremacist narratives.
Related Reading: Shepherds and Sheeple; or ‘how to lead the blind’ from the perspective of OGS
So here below is a short tour in the form of a link farm, of the two men who took on the formidable and profitable(and self appointed) task of mind control of “the masses” in the last generation, Sigmund Freud and Edward Bernay’s. It cannot be missed that both men were related, that they were Jewish; and that the Nazi’s kept copies of their books in their offices.
Also, much like the current crop of torture and mind control psychologists who derive massive profits from their unconscionable work, each attempted to distance themselves from the use of their ideas in Nazi-ism, much as we see the CIAs current torture doctors Mitchell and Jessen excusing their role in torture.

They were using my books as the basis for a destructive campaign against the Jews of Germany. This shocked me, but I knew any human activity can be used for social purposes or misused for antisocial ones.
Edward Bernay’s, on his role in the Holocaust, and other atrocities

Mind Control: It’s happening to you right now.It’s happening to you right now.It’s happening to you right now, from Patterns of Meaning blog
Edward Bernays and influence operations, aka “mind control,” and American women as willing wombs for “Liberty Torches” to light the way to the future.
Crowd psychology, aka “mob psychology” and organized gang stalking
Sub-categories of the manipulation of the masses:

 
With this background above, I will analyze a few of the concepts and practices that affect both individuals, and also to examine narcissism fro the viewpoint tat most media is Jewish controlled media,that puts itself as queen Esther at the gate keeping mechanism in EVERY important discussion in ALL media, and that some versions of Jews zealously guard this monopoly; but also that the “intelligence” aspect of today’s current scheme of NSA-Israel data theft, aka “mass surveillance” is more than passive collection.
Then, I will “single out” John Nash as a perfect victim of hidden abuse and gas lighting, and a perfect target of intelligence agency abuse. And, extra points if you ask-but what about Nashs wife, a foreign bride?
so, because the entire western narrative descends from Talmudic and Torah stories, and those stories shared, or coopted by the warrior and servant class of christians, this form of a mental disordered narration of events taints every single story, by design of the worm, and the cricket.
And so Nash, who won the Nobel Peace prize for the Game Theory that controls much of the world today, and which the CIA and many publuc and private intelligence actors use to manipulate outcomes (and that Nobel prize itself given to those who perpetuate endlessJewish-christian war) we will see that it is at least MORE likely than LESS likely that Nash was a targeted individual, targeted by both Jewish AND dominionist elements of the intelligence community.
So, every idea is interceded, and its efects negotiated, mitigated, or otherwise intercepted at the internet switch, much like John Nashs shed full of notes. And, the intercession of those who seek to replicate, and profit from Jewish-christian culture.

Is gang stalking online real-can "they" actually track my machine as I surf over Tor?

The short answer is, if you have been reading this blog and missed the memo that said “YES THEY ARE TARGETING, TRACKING, GEO-LOCATING, MONITORING, INFLUENCING, and OPERATING on you, your internet connection-and the mind that is using that connectionlike mad scientists at every moment, every time you are online!!!”-then you clearly ARE CRAZY, as some have suggested about “targeted individuals.
This is what I call “feminist jurisprudence” aka “communitarian/community policing.” It cannot be missed that there is a clear ideological link between OGS complaints and elderly white females in technology, politics, the judiciary, or in policing; but especially in the transnational Octopussy that we know as the Panopticon and its attendant plots, political manipulations, and influence/mind control/compromise/blackmail schemes and covert operations.

Related Stories: The Association of Threat Assessment Professionals (ATAP) has linked itself to both gang stalking, AND political /punitive psychology.
More hilariously, the Washington State Fusion Center distributes “mind control” documents to the press, as the Department of Homeland Security renovates the famous “mind control ” facility once occupied by CIA funded doctors who forced patients to take the illicit drug LSD, and unethically tortured children and adults with debunked electro -shock “therapy “.

And worse, they are using the local police, and Fusion Centers, aka, “the domestic spying on citizens apparatus”and the Hegelian conflict oriented communitarian policing scheme to literally cause learned helplessness and fear, in order to enforce conformity, as Fusion Centers (all of which are well hidden, and all 77 have different names across the country) direct resources at “non-conformists.”
Extra points for noticing the number 77 has “mystical value” to religious fanatics, Masonic orders, and others who are invested in harassing citizens with OGS. I am certain all of the religiously deluded morons who work in Fusion Centers actually believe they are doing “gods work,” and that the number 77 means “Son of Circumcision.” Try not to laugh…but I personally like the linguisticexplanation of 77 as a “she goat.”
And while it can make a person FEEL crazy, there are actually programs targeted at EVERYONE that actually involve this form of mind control and influence operation, and that these programs are ill-equipped to decipher human behavior, and that with destructive effects . Here is just ONE example of that, as AI struggles to eradicate “human experience” in order to socially engineer ‘predictable humans’ and using ‘predictive analysis.
And here is one recent example from my own writing online from just today (it took me two days to even write the post ‘live’ in WordPress), but every day, there are thousands of examples available to even the casual observer.
In that light, it is worthy of noting that those who value civil liberty, such as our right to privacy-often overlook the greater right of liberty: the right to consent, or not consent to experiments, or other ‘mind altering’ substances and practices, that are deployed on us as weapons or as research tools. So it is important to note that Tor-the famous privacy software that was made “famous’ by Edward Snowden when he revealed to us that our governments-all five of them, in the Five Eyes Alliance, and others ranging from Israel(which gets every bit and byte of our data unfiltered) to Russia are performing their own experiments.
So-forget about DEW’s and all of that other PsyOp psychobabble, and make yourself aware of Palantir, DataminR, Media Sonar, and more that they are targeting at us, and our online speech every second, AS WE TYPE INTO OUR BROWSERS. OVER TOR….!
Here below is one example from today alone. One of many I caught before the sun met the noon sky:
The example:

  1. I look at today’s statistics about who reads this blog and what they read. I note that my most popular post references the hack of the CIA’s “hacking tools” which I posted in this blog post here. This one post quotes the Intercept, and has links to Wikileaks, where the CIA hacking tools were described as hacking American’s cell phones, and then, destroying the ‘evidence’ that they had hacked my/your/their phone.
  2. I looked around the web for stories that also document how the CIA-and some 16 other US intel agencies alone, not including the entire battalions of soldiers aand seamen and USAF who are hacking American’s at any given time- have destroyed Constitutional due process and leveraged, blackmailed, or otherwise compromised American citizens (and millions of others around the world) because they act with “plausible deniability, and then, impunity. I found this story, about a humble public defender in Washington State, where the CIA hack tools are implicated in hacking citizens.
  3. Using Tor to write this blog,(and using Tor makes one an INSTANT target by these ‘plausibly deniable’ activities by military and civilian agents, agencies, and a host of NGO’s), i read through my stats, and noted “outbound links”-the links that people clicked on my blog to read material that I have linked to OUTSIDE my blog. And, I was under attack the whole time. Here is the story I was writing ‘under attack.’ This caused a net loss of about an hour today alone.
  4. I clicked the “out-bound” link, which was to Urban Dictionary” and the link to a description of “gang stalking methods“. Here, below is a snapshot of that-and notice the advertisement for “CASA” which is a foster care warehouse operation, where state sponsored kidnappings of children are covered up as “foster care placements.” Children who are “placed” in Foster care face an 85% chance of being sexually abused, pimped, or otherwise turned into profitable commodities by these organizations and the related DVIC industries

agang stalking methods
This screen shot, which I have NOT anonymized, for a very specific reason, which I will not disclose, contains all kinds of “meta data” about the machine I am using to compose this posting and nothing more-not a single identifying bit or byte of data connects this screenshot to me, or to this blog-other than the WORDS I use to describe this situation.
As such, I seek to demonstrate that speakers, and words are the actual targets of all of this “sooper seekrit spying,” that claims it is to “protect the little old ladies and the children from rapists and pedophiles” because pedophiles might otherwise sacrifice everyone’s safety for their own liberty in order to to get at  the old ladies and babies whose Constitutional houses are on fire, and burn them to the grounds, tossing their pocket Constitutions into the fire to make it burn faster, and using the broken pieces of civil rights and human rights and even animal rights to build a ladder just to get at the old ladies and babies  even quicker as they plummet out the windows, pre-cooked and ready to rape with shovel handles and pocket Constit…oh never mind that last one(and all of those windows, and Windows 1-10, totally broken already by the “broken windows policing scheme” of the 1990’s)….
So, to recap:
Meta data is personally identifying information that police, investigators, and others who participate in the local, state, and federal level fraud outlined on this blog have been using meta data to make cases against unsuspecting victims of OGS and its accompanying mind control and influence operations. You can Google the term yourself.
But what matters most is a question that now arises in the mind of this researcher-and hopefuly inthe mind of other researchers, lawyers, legal scholars, TI’s, psychologists and others who research organized gang stalking.
And the question is: Why does CASA-an organization that I have roundly criticized over the years, and even now; an organization that has tens of millions in advertising budgets, and tha has notoriously been an integral part of the DVIC scheme-why, exactly, do they have an advertisement on that one weblink, now?
I mean-isn’t web searching and webvertisement coordinated with searches and topics-shouldn’t a ink to “gang stalking methods” have like, a deer tracking book, or a bunch of saggy pants without belts, and some “logo gear” on it; shouldn’t in the very least a link to another website that teaches te “rhythm method” be linked, there? And so, what has CASA have to do with OGS anyways?
I suggest that the answer is in the question-and webterrogation of narrative as well. Webterrogation is not unlike custodial interrogations in many ways, not east of which is that the individual being interrogated is in fact and practice, targeted, and contained, somewhere, at some point. This is not insignificant, but it is also a larger point that I will write about later (especially as pertains to ISP’s and how Infragard members-deputized members of law enforcement, and sh!tloads of political operatives and others literally redirect, re-route, and inject any “live” connection with lots of “who knows what.”)
You can test the science yourself- in fact,my blog here asks any researcher of organized gangstalking to do EXACTLY THAT-test my many theories, hypotheses, and anti-hypotheses against your own, form whatever discipline you practice.
But go over to that link about “gang stalking methods” and see what advertisement YOU get at the top of the page. I got CASA, which is a DVIC subsidiary industry, and a multi-million dollar player in the theft of children across America.
Here below are some links that demonstrates AGAIN, that state level institutions, operatives, and policing itself, is implicated time and time and time again in the pimping, procuring and pornifying of children, as well as the massive crisis PR industry that masks this fact, and gives us boogiemen/drug dealers/terrorists/pedophiles/whistle blowers/journalists/your neighbors farting cat instead ( and it cannot be missed that two of the first five links that were returned to my Tor browser were near, or local to my own location…):

CASA LA: http://casala.org/our-mission/
Sexual abuse in Foster Care: http://www.hg.org/article.asp?id=6703
Is Foster Care modern day slavery? http://medicalkidnap.com/2016/04/15/the-u-s-foster-care-system-modern-day-slavery-and-child-trafficking/

Then, without irony, one must note that Elizabeth Dietrich, one of the few online who has written a scientific thesis as regards OGS, opened her thesis with a brief statement about pornography. This, combined with another part of my thesis-that women’s deviance takes place in unique forms, but especially through positions of power, authority, and then, voyeurism-one cannot help but note that women’s violence-or in the very least, their inability to “comprehend” the violence directed at others is institutional in nature. And this is clearly the case with OGS as well (which is in no way, shape or form similar to the “Pro-Anorexia community” as Dietrich has stated.)
Elizabeth Dietrich’s paper encourages the isolation of victims of OGS. How feminist.
Maybe it’s because Smith College is known as the “Lesbian Capital of the World,” or maybe it’s because all the special snowflakes get better grades when they’re pretty, but Dietrich’s conclusion truly looks like first year work when she comes to the conclusion that

Gang Stalking is just one of the many online communities that uses people’s
conformation bias, meaning making, and wish to belong, to deleterious ends.
For my part-should I ever publish this, I will devote a special chapter to conformation bias, and conformity at the expense of critical thinking….

Related Story: Five Denver Nurses caught looking at a dead man’s amazing cock, then gossiping about it in the lunchroom. Apparently, this is a thing with nurses and other women in the medical community(let me know when you start seeing patterns in western women’s deviance, such as their Freudian “death urge” morphing into endless forever war that kills other women’s sons, lovers, husbands and other babies)
From the very introduction of Dietrichs paper, we see that male dominated spaces such as 4chan and KnowYourMeme, as well as “porn” is an underlying theme of those who officially gas light OGS targets; that, for those who have taken the time to write on the subject (this will be the topic of a later post here). What matters here is that “victims of OGS be isolated” both in Dietrichs narrative, and in that of Sheridan and James, and as such, we see that the two-exactly two papers that addresses the topic-are written by gender feminists, which is telling indeed.
Then, we see emergent norm theory and the interplay of feminist destruction of so-called male dominated spaces throughout her paper, which concludes as I stated above-that victims of OGS should be isolated and ex-communicated from the internet.

CHAPTER I
Introduction
A tautological statement has been growing in popularity among pithy internet-savvy
populations over the last ten years or so: If you ever wonder if it’s on the Internet, it’s on the Internet. Anonymous contributors to websites such as 4Chanand Know Your Meme expanded this idea into a list of 50 Rules of the Internet that include items such as “The Internet has no rules,”and “there is a porn of it, no exceptions.”The root of the joke is derived from a very basic fact: Internet content, for all intents and purposes, is virtually endless. Almost any honest query one enters into a search engine will invariably yield results, usually hundreds of thousands in an impressive .33 seconds, more or less a couple hundredths-of-a-second, depending on what kind
of modem you have. Social connectivity over the Internet is powerful.

.

Organized stalking and CIA operations manual: what you are experiencing is "counter-intelligence stalking."


I get a lot of readers from Russia, the Ukraine and elsewhere who seek information about the CIA phone hacking and then, influence operations, propaganda and gang stalking operations.
While much has been written in the last decade about “far right” groups of “organized thugs” who stalk and harass people, it is important to note that the left is doing this today as the right has lost power-due to tactical assault like OGS. And the left has done this before as well- Stalin’s Russia, Hitler’s Germany (the blur between Jews who profited from the Holocaust one way or another is striking, as we see some Jews today encouraging racism and stalking), and Italyunder Mussolini, in short, anywhere there was totalitarianism,or fascism there is OGS,
In the modern world, formerly respectable governments have allowed groups of citizen spies, known as “non-governmental organizations’ or NGO’s to wage “culture wars’ on individuals, as the police look on and do nothing, because they will get paid no matter what happens to the targets of these stalkings. And, these organizations are likely to be full of religious/sectarian/ foreign agents in the west, many of whom are military trained in psychological operations or other intelligence agency practices that amount to little more than bullying and terror.
See this post here for more about that. But many hidden operators and programs active in our societies and on our internet allow some to wage crime on others, based upon a persons political beliefs or suspected beliefs, based on the illegal capture of our cell phone and internet data that our governments have stolen from us without our informed consent.
I was aware in 2003-4 that all of my personal communications were entrapped because I was a target of multiple local/globalist agenda’s of the welfare state to police state operatives, and other afffiliated sectarian religious or political operators who redirected my internet communications, but others only became aware after Edward Snowden in 2013. Here is a link to the files that Snowden liberated from the spy agencies that document how our governments are targeting our privacy, due process rights, speech, assembly, assoiation etc; and subverting due process).
And targeted individuals were as likely to be high level politicians as they were opposition candidates, or even low level drug dealers with an “in” to the “party circuit” or other social circles. These people who get stalked are what is called “influencers” and while they are the people who suffer the most in OGS, it is really the “larger audience” that is the actual target-the people who the “influencer” can influence. This larger audience is called the “targeted audience” aka the “TA.”
So, one TI can lead agents and agencies to a larger TA-got that? And that is straight out of the CIA operations manual or any of a number of other intelligence agency playbooks-they really are all the same with slight differences that aren’t worth discussing here. This one was from this era, where America lost its grip on industry, and went to a “black cash” budget instead.
And, from high level diplomats to low level drug dealers acrss town from you, OGS is the tactic, various TA’s are the actual targets, whether it is a cop with a vendetta because you banged his wifey who sics the dogs on you in the form of “women’s rights advocates” and the associated “umbrella agencies and NGO’s that get cash for DVIC stalking, or the Russian’s, or the local good guys and their do-gooders who seek to kidnap your child by framing you into a crime, the tactics are IDENTICAL.
Most notorious today are the “women’s sheter advocates” who stalk men in order to creae crime, or the college and university multi-kultural klans and their kovens, but George Sors, Haym Saban, and the right wing billionaires also use OGS and it’s associated “high policing” from state and federal agencies to silence journalists, dissenters,  and activists as if these are all terrorists.
Here below is a bit about the behind the scenes “influence operation” that is taking place around you:
PREFACE TO: CIA Handbook Psychological Warfare.pdf, (or this link in case the prceding link gets deleted AGAIN.)
Guerrilla warfare is essentially a political war. Therefore, its area of operations exceeds the territorial limits of conventional warfare, to penetrate the political entity itself: the “political animal” that Aristotle defined. In effect,the human being should be considered the priority objective in a political war. And conceived as the military target of guerrilla war, the human being has his most critical point in his mind. Once his mind has been reached, the”political animal” has been defeated, without necessarily receiving bullets. Guerrilla warfare is born and grows in the political environment; in the constant combat to dominate that area of political mentality that is inherent to all human beings and which collectively constitutes the “environment” in which guerrilla warfare moves, and which is where precisely its victory or failure is defined. This conception of guerrilla warfare as political war turns Psychological Operations into the decisive factor of the results. The target, then, is the minds of the population, all the population: our troops, the enemy troops and the civilian population. This book is a manual for the training of guerrillas in psychological operations, and its application to the concrete case of the Christian and democratic crusade being waged in Nicaragua by the Freedom Commandos. Welcome!
Reader-Take special note of this :
3. Armed Propaganda
Armed propaganda includes every act carried out, and the good impression that this armed force causes will result in positive attitudes in the population toward that force; and it does not include forced indoctrination. Armed propaganda improves the behavior of the population toward them, and it is not achieved by force.
Hard link here:https://www.scribd.com/document/289525227/CIA-Handbook-Psychological-Warfare-pdf
So, in most cases of OGS, we encounter the common complaint that “slander campaigns” and “rumors” and “defamation” are taking place. These take place around key individuals to gain their complicity, or to gain their compromise, in order to then gain power over the TA. The link above will explain that to you better, but also, other methods of sabotage that are likely being used against you.
I advise you to take nte of the politics and the appearance of individuals who stalk you, which will be the best indicator of “what group” is the one you will need to sue later.
So-in America, the following rules apply: if you are a middle eastern male of Arabic descent, you can bet that white or “Hispanic looking” Jews will be central to targeting you. These will frequently be accompanied by white females and black females with military haircuts and sensible flat shoes.
If you are a black man, you will also be stalked by these same, but also, you will frequently note a tall, white conservative male in their herd and frequently, smiling fat white women. Then, you will notice either a proliferation of down-low-brothers, or overly aggressive “Black Identity” ‘friends on your Facebook and Twitter.
If you are a foreign dignitary, business person, or accused of a crime such as domestic violence or family court related issues, your stalkers will be the above, but more frequently, tattooed lesbians with dubious stories. You will also likely encounter honey nets, attempted sex-stings where these women try to set you up for a rape charge (and then cry #MeToo! on Twitter), and internet pornography that appears out of nowhere.
ANYONE who travels to a small town in America WILL be stalked in a variety of ways that defy our laws and even common sense. So be careful, and keep a hotline open. And-watch THIS MOVIE for reference.
Try to stay sane, and keep your eyes open for these types of stalkers-but mostly, stay creative! And keep a song in your heart….
[youtube https://www.youtube.com/watch?v=Uzae_SqbmDE?ecver=2]
Lastly- a special note for mainland Chinese(and that one guy from Tsinghua university): because communist countries ALL used organized stalking as a form of social control at the height of collectivization, and domestic spying as a tool, you probably know what it looks like already.
And, you laugh as you see it happening here, in the “land of the free,”as America falls without a single shot.
So, read this post instead, just for fun.
 

Do Mormon's have souls? The sordid fact that the CIA torture psychologist was a a Mormon Bishop

In America, “we don’t talk about politics or religion,” which is really like saying the same thing twice, because in nations that are “shepherded” by people who suffer from religious delusions and mythological narratives, the blur is astounding-as is the likelihood that you will encounter institutional psychopaths.
While few are surprised that psychology has a major schizophrenic narrative going as it attempts to rationalize it’s cozy relationship with corporate drug dealers, aka Big Pharma, that other  feature of madness is peeking out: many who work in psychology are themselves master manipulators and institutional sociopaths who hide behind the ultimate “mask of insanity.”
So, again, it is important to detox our minds from the influence operations effects, an when we encounter the terms “no touch torture” and “gang stalking” on the same page, we have to consider that institutional socipaths and organized religion are also nearly one and the same, for telling lies, or presenting myth laced history as fact takes a certain kind of “special person.”
SO without further adieu, I would like to note that one of the two CIA torture psychologists was a Mormon Bishop. That means that 50% of the load that tortured people unconscionably was Mormon.Are you seeing any patterns between that fact and this one?
Are you seeing any patterns yet about claims of “organized gang stalking” or torture, “no touch torture” or institutional sociopathy in the FBI for example? No? Well, keep them blinders on folks-because the ride gets messy when we overlook the fact that the FBI et agency is loaded with these types.
CIA torture Doctor Bruce Jessen is a Mormon Bishop:

An article in the NY Times today talks about more details that have come out about the CIA’s enhanced interrogation techniques after 9/11 and the men who created them. Turns out that both Dr. John Bruce Jessen and Dr. James Mitchell, the two main architects of the techniques (later condemned as torture and ineffective by the Senate Intelligence Committee) are LDS, and Jessen was made a bishop several years later. This guy not only helped devise the torture techniques, but also carried them out and trained others to do so as well. This included fun and lighthearted games (/s) such as the following:

  • Stuff the prisoner in a tiny box and poke them through holes in the side.
  • Waterboarding (in some cases until prisoners became completely unresponsive, with bubbles rising from their mouth, having involuntary stomach and leg spasms, and when they woke up, hysterical pleas for them to stop)
  • Walling (putting the prisoner’s neck in a collar, then using that collar to repeatedly slam them against a wall)
  • Dousing with buckets of ice water while naked and shackled
  • Dangling from the ceiling by the handcuffs for days on end to induce sleep deprivation

He was already a highly controversial public figure well before his calling as a bishop in Spokane WA in 2012. His company made $81 million for their role in developing and implementing these techniques. You can bet he paid tithing on that torture money (thank goodness it didn’t come from the lottery, or the church would have had to reject it!) The stake president who called him was well aware of his involvement but called him an honorable, trustworthy, and humble man and of course defended him (the church is awfully good at defending awful people) saying “the whole story has not been told.” His name was submitted to the First Presidency for approval (as all potential bishops are), and the church spokesman refused to comment on the matter. He was unanimously sustained by his ward as well. He’d also served as bishop for another congregation in the ’80s before all of the torture stuff went down. Luckily he resigned a week later, but holy hell, what poor taste in leadership! And how disturbing that nobody in his ward, stake presidency, or even the first presidency had any qualms about his appointment! I’m breaking out this story next time somebody defends that bishops are by default good people. Bishops don’t deserve to be trusted or respected by default anymore than any random joe shmoe on the street. Some are good, some are bad, and members really need to be critical about who they trust with their spiritual lives and personal matters.

RELATED READING: The son of a federal judge who is ALSO a Mormon kills himself in splashy manner in Las Vegas (the keen reader of my work will note links between my writing on this topic, and Las Vegas, as well as Clark County in general).
So, like I said- and the avid reader of my work will note- this thing of organized gang stalking can go two ways boys and girls. Hey, you there- onlooker’s and lurkers, a question: what could make a guy so depressed that he might kill himself? Hmmm. My guess is “something hidden in darkness.”

Suicide at Vegas Mormon temple was federal judge’s son

Published November 21, 2013 6:57 am

 

Las Vegas • A 26-year-old man who authorities say killed himself in the courtyard of a Mormon temple in Las Vegas was identified Wednesday as the son of a federal appeals court judge.
Scott Greer Bybee of Henderson died in the shooting just before 6:30 p.m. Tuesday while services were being conducted at the temple, police and the Clark County coroner said.
He was the son of 9th U.S. Circuit Court of Appeals Judge Jay Bybee.
No one else was hurt, Las Vegas police Officer Bill Cassell said.
In a statement circulated by a 9th Circuit colleague, Judge Bybee and his wife Dianna Bybee said their son suffered from depression for many years, and they did all they could as parents to help him, including seeking professional advice and treatment.
“While Jay and Dianna mourn for Scott, and grieve for their own loss, they are grateful that he is finally released from his sufferings,” said the statement circulated by Judge Milan D. Smith Jr. of El Segundo, Calif. “They have faith that he is in a better place.”
Church of Jesus Christ of Latter-day Saints spokeswoman Kristen Howey issued a statement calling the incident tragic and saying the thoughts and prayers of church members were with those involved.

Jay Bybee, 60, was nominated to the San Francisco-based 9th Circuit court by President George W. Bush and confirmed by the U.S. Senate in 2003.
He has been criticized for authoring documents in August 2002, later dubbed torture memos, that gave interrogators wide latitude to use techniques including waterboarding during questioning of terrorism detainees at the U.S. detention camp at Guantanamo Bay and at Abu Ghraib prison in Iraq.

What is the "Redirect Method" of targeting individuals? Organized stalking and artificial intelligence (AI)

What is the “Redirect Method” of targeting individuals? Targeted advertising, and targeted minds: mind control by any other name.

UPDATE 09-19-2019:Since I wrote this post a few years ago, it has since been revealed that political NGOs, and police /intellugence agencies and private contractors and specifically the Anti Defamation League has been using this Moonshot CVE method to perform non -consensual surveillance and targeted psychological operations on non -consenting subjects online. This redirection has also been linked to several mass shooters, and beyond simply reinforcing stereotypes of Jews as mind controlling Svengalis, that organization is purely toxic.

Moonshot CVE is designed to manipulate you, your choices, and your political beliefs.
Many online in the community of “targeted individuals” claim that they are subjected to mind control, which, in the day to day world, usually indicates mental illness to psychologists, social workers, and criminal defense attorneys who eventually encounter targeted individuals.These claims can seem outrageous or preposterous-after all-where is the mind control facility? Where is the mad doctor D.E. Cameron, and the electro-shocks and LSD with the CIA funding? And so on.
Those were the old days- now meet the new: artificial intelligence programmed to manipulate web search results targeting individuals thought processes, choices, and emotions via electronic and other methods.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.
-Edward Snowden, NSA whistle blower, on warrantless NSA harassment and targeting of individuals

Here, below, is a snapshot of a real, actual program that is in fact  a form of mind control, where a viewer is “redirected” from one area of interest into another, where those who seek to influence and control the individual then perform an influence operation on the subject-against the subjects “free will”,and without the subjects informed consent.
Here we see that the amorphous and ever changing definition of potential “terrorist” has been applied to 320,000 persons, who have been for whatever reason, arbitrarily labelled first according to their political beliefs as indicated by their internet searches, and then, as potential jihadists or right wing conservatives in America.
Their internet searches are then analyzed using an NSA-like keyword program (Google and the PRISM and XKEYSCORE programs are CIA funded, while startup commpany Moonshot CVE appears to be a British operation , screened with 1700 key words selectors and then redirected in their searches on the internet.
This redirection is without a warrant, and without the informed consent of the searcher. Or: a man-in-the-middle attack, targeting the ambiguity and definitional peculiarities of pure speech alone. And- it is designed to influence peoples actions remotely.
What is most striking is that many early caricatures of mind control from the early 21st century and onward,  utilized hypnosis, and mental influence via “suggestion” as a form of controlling the actions of individuals, and groups, even whole societies.
And here, we see that far beyond the caricature of a Svengali or a pulsing swirl of black and white imagery hypnotizing a subject, we have instead, Google-which collaborates with the CIA/NSA/FBI and all other intelligence agencies-acting as the arbiter and the impetus for guiding an individuals thoughts and actions through suggestion and algorithmic programming.
th(10) Photo: John Barrymore plays Svengali. Today, we see another ROGS thesis validated, as the,Anti Defamation League now deploys psychological operations on unsuspecting Google users who that organization has “othered.”

Not only does Google collaborate with these agencies, but in fact, it has worked specifically with NSA and others to develop programs of social control via search engine results, and more. So, here is one of the latest attempts to influence and alter the behaviors (behavior modification) of people who are targeted with these programs:
From the Intercept:
“A GOOGLE-INCUBATED PROGRAM that has been targeting potential ISIS members with deradicalizing content will soon be used to target violent right-wing extremists in North America, a designer of the program said at an event at the Brookings Institution on Wednesday.
Using research and targeted advertising, the initiative by London-based startup Moonshot CVE and Google’s Jigsaw technology incubator targets potentially violent Jihadis and directs them to a YouTube channel with videos that refute ISIS propaganda.
In the pilot program countering ISIS, the so-called Redirect Method  collected the metadata of 320,000 individuals over the course of eight weeks, using 1,700 keywords, and served them advertisements that led them to the videos. Collectively, the targets watched more than half a million minutes of videos.
The event at Brookings was primarily about the existing program aimed to undermine ISIS recruiting. “I think this is an extremely promising method,” said Richard Stengel, U.S. Undersecretary of State for public diplomacy and public affairs.
Ross Frenett, co-founder of Moonshot, said his company and Jigsaw are now working with funding from private groups, including the Gen Next Foundation, to target other violent extremists, including on the hard right.
“We are very conscious as our own organization and I know Jigsaw are that this [violent extremism] is not solely the problem of one particular group,” Frenett said.”
 
First, they came for the jihadi’s-then they came for the ‘bad ideas’ in peoples minds….then…?

 
This targeting has been going on for decades, specifically targets individuals and whoe classes of persoons, and as we see above in commercial use-these programs are policing  “thoughts” expressed online, and more.
Here, from the early days of Snowden’s leaks:
Glenn Greenwald, reporting for the Guardian, wrote:

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.
“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

CIA and internet backbone surveillance and InfraGard: there is no window between the average American and intelligence agents anymore

Cisco Internet Backbone and CIA, human experimentation, Moonshot CVE, Google Jigsaw
Psychology is struggling to control the narrative of organized gang stalking, and doing a really bad job of it, because some of their favored labels for political dissidents and whistle blowers are being exposed as little more than political smears masked with official diagnostic criterion. And of course, in a the ends justify the means” world, the “state purpose” of fighting boogiemen is tantamount to rational basis social controls, which is why the NSA/CIA/FBI manipulation of the internet backbone is cancer to Democracy.
Paranoia, schizophrenia, delusions that people are being persecuted, followed, or harassed- all of this and more is happening all across America today, as the thousands of miles, and the improbabilities and the impossibilities of actual contact between the average citizen and intelligence officers and agents are no longer impossibilities at all: they are a daily fact of life for every citizen, as Google, Facebook, Snapchat or Twitter have put all of us one click away from these agents every single day.
So, whereas once psychologists could keep institutional and social control of the narratives of “mentally ill” people who claim that the “CIA is spying on me,” or that the “FBI is out to get me,” and other such claims, and psychologists have long ignored these claims as delusions, it is no longer the case that prospective patients are wrong in any sense, because, all of our communications are intercepted, and our lives monitored via our cell phones, Facebook-which has admitted to actual chemically based mind control, aka manipulating dopamine levels in the brain of non-consenting children and adults-to the NSA-FiveEyes(FVEY)-Israel data theft and sifting operation that is in play 24/7.
It forms a de facto and pre-emptive prior restraint of any individuals private thought processes, intentions, and.free will any time they are online.
And, curiously, this is against the US and British constitions- but ALSO many international laws and treaties~and ironically also against the UN charter, and the Universal Declaration of Human Rights!
Previous to the era of the internet, it was nearly un-imaginable that the average person would come into contact with a CIA case officer, FBI handler, NSA agent, or rings of unethical Israeli spies and unregistered foreign agents , or other intelligence agency operators. Today, these same are compiling dossiere’s and databases full of profiles about every one of us, as secret, hidden operators monitor our social media, cell phones, and emails in real time, we  are as close as a click on Facebook, or a phone call to a foreigner. And, our childrens bath tub photos are now accessible to InfraGard, an a host of international players, including Saudi Arabia.
Compounding that, is the fact that these agents have eradicated the barriers between civilian and agency boundaries, as they float in and out of the government, to the corporate sector; in and out of one top-secret clearance and into cold-blooded capitalism the next,  and back again.
This “high policing” aka political policing, aka organized stalking is now a nation wide infection.
So, the next time a patient or a ‘delusional’ or ‘psychotic’ individual tells you that there is a spook on their internet backbone, listen a little bit more, because, well, there is in fact a spook network spread across every connection, at every minute, and a ratio of one security industrial complex worker, police and surveillance role player to every 30 civilians in Amerca alone.
Here- from Forbes magazine, meet Chris Burgess, one of the many spooks on my Cisco router:

Cisco Internet Backbone and CIA https://www.forbes.com/sites/realspin/2012/10/12/what-do-former-cia-spies-do-when-they-quit-the-spy-game/#2df634382374
Chris Burgess, now COO and CSO of Atigeo, a Bellevue, Washington firm focused on mining Big Data. The second was Ren Stelloh, who until July 2012 was CEO
After retiring with 30+ years of service from the Agency, I spent several years as adviser to Cisco System’s Chief Security Officer, and I found Cisco was doing great work; they’re one of the backbones of the internet. The more info you can provide to the more people, the better people can see and understand what was obscured
Now I’m COO and CSO of Atigeo and we’re a compassionate technology company. We want to provide the tools to mine big data, as that is unquestionably the major resource of this century

 

Separating gang stalking claims from electronic weapons harassment reporting: a necessary step to understanding the dialectic, and reports of mind control.

The single most prominent feature of the research that exists in regards to organized gang stalking is that those who claim to be researching it seldom if ever actually speak to those who claim they are targeted.  Let that sink in a bit….
But in the world famous internet pol/study/junk science by Dr.s Lorraine Sheridan and David V.James, they didnt interview a single person in person.
And, as you might expect, predominantly white, middle aged females were the respondents, much like other online hoaxes, and frauds such as Morgellons disease, or sex work abolitionists and prudes pulling the number 13 outof the DVIC/UN Transatlantic Crime/fakerape/NGO money pot.
Then, have a look at a study that concludes that targeted individuals are dangerous co-opters and interlopers on the supremacy of the psychological narrative of the DSM-V:

Diagnosis of Delusions on the Internet:

Bell V, Maiden C, Munoz-Solomando A, Reddy V. (2006) ‘Mind control’ experiences on the internet: implications for the psychiatric diagnosis of delusions.

While this disconnect between psychologists and those they seek to diagnose anonymously is a feature in every study on the subject thus far, it is also clear that there is evidence of a vast, well funded network of intelligence agents and agencies that on one hand, literally target individuals (most notoriously the UK’s “dirty tricks” division, JTRIG), with influence operations, and then, seeks to discredit targeted individuals, it is crucial to psychologists and criminal defense lawyers, as well as social workers and others in the healing professions to understand that no all victims claim that they are harassed with electronic weapons, and that not all those who report electronic harassment, noise campaigns, or other modern media deployments aimed at destroying them or their privacy are delusional.
But in the extant research on this topic, we see that few-if any- of those who have weighed in to this dialectic are willing, or able to separate the many cases of law enforcement, or DHS, or FBI harassment from the intelligence cults, or religious harassment that some targeted individuals endure.

Related Story and UPDATE 10-16-2019: Since I wrote this piece that you are reading, the Anti Defamation League (a race-based organization which is most known for defaming individuals)has confessed that they are using military derived psychological operations online, and targeting non-consenting subjects with actual military PsyOps, and some of THOSE victims of these hidden online operations are now linked to many mass shootings.
In other words, online psycholigical operations,are literally linked both correlated with, and linked to the direct CAUSATION of mass shootings.

In that light, I suggest that it is mportant when encountering these individual victims that any psychologist, or criminal defense lawyer who represents targeted individuals examine the basis of the claims, and look carefully for signs of actual harassment early in the encounter. Also, be aware that the discrediting narrative is very well financed (the DHS and intelligence agency budget was 71 billion in 2016), and that many NSA whistle blowers, actual victims of abuse by police and fire departments, and others report similar symptoms, and similar experiences as targeted individuals.
Here below is one of the few studies online that attempts to understand the ‘phenomenon’ from a perspective of the DSM-V criterion, where we bump into a similar situation as was apparent at the height of the Nixon years, where the horrific illegality and  lawlessness of the CIA’s mind control cover-ups, worked hand in hand with FBI COINTELPRO and a know-nothing MSM to obfuscate actual insight into the scope of these problems-annd the easiest solution was to blame the victims, or in the case of Bell, Ready, and Munoz Solomando, paint them as deviant co-opters of technology:

It is particularly noteworthy that a potentially disabled and disenfranchised group have co-opted available technology
-Bell V, Maiden C, Munoz-Solomando A, Reddy V. (2006)

This is literally the Martha Mitchell effect in action, and in practice as psychologists seek now, as they did then, to discredit actual victims, and squash them into a pill box. While there is little to no doubt that psychopaths, psychotics and delusionals and others are involved in the community (notoriously, the leaders of the so-called TI support group FFCHS has been implicated in 3 mass shooter events), there is also a much larger portion of this community that is “under the influence” of something, and that something has a name: influence operations working with Crisis PR agents and psychology to lend authority to an otherwise debunked narrative.

‘Mind control’ experiences on the internet: Implications for the psychiatric diagnosis of delusions
Abstract
Diagnosis of Delusions on the Internet:

Bell V, Maiden C, Munoz-Solomando A, Reddy V. (2006) ‘Mind control’ experiences on the
internet: implications for the psychiatric diagnosis of delusions.
Psychopathology
, 39(2), 87-91.
Background:
The DSM criteria for a delusion indicate that it should not include any beliefs held by
a person’s ‘culture or subculture’. The internet has many examples of people reporting ‘mind control experiences’ (MCEs) on self-published web pages, many of which suggest a community based around such beliefs and experiences. It was hypothesised that some of these reports are likely to reflect delusional beliefs and the hyperlinks between web reports were likely to show evidence of social structure, demonstrating the ‘culture or subculture’ exemption to be increasingly redundant in light of new technology.
Sampling and Methods:
Texts from web sites reporting MCEs (n = 10), experience of cancer (n =
10), depression (n = 10) and being stalked (n = 10) were identified, and were blind-rated by three independent psychiatrists for the presence of delusions. Hyperlinks from web sites reporting MCEs were used to create a network structure; this was compared with a size-matched, randomly generated network and known social networks from the literature using social network analysis.
Conclusions:
The sampled web-published accounts of MCEs are highly likely to be influenced by
delusional beliefs. Social network analysis suggests there is significant evidence of an online community based around these beliefs. The fact that individuals can form a community based on the content of a potentially delusional belief present a paradox for the DSM diagnostic criteria for a delusion, and suggests the need to revise and revisit the original operational definition in the light of these new technological developments.
It is particularly noteworthy that a potentially disabled and disenfranchised group have co-opted available technology to create a complex, dynamic and information-rich community that serves to support and inform similarly-affected people within the confines of a world view driven by potentially psychotic symptoms. This is a striking example of a support network completely removed from the traditional medico-legal support networks of the state and even the grassroots support networks run by mental health services user groups. In particular it demonstrates that the internet may enable complex support mechanisms without reference to a view of reality held by the authorities or even the mainstream of opinion. Whether this sort of support network works well for all, if any individuals, remains to be seen.
In conclusion, the presence of a complex and evolving online community based around the content of potentially psychotic experience challenges mainstream psychiatric understanding and diagnostic criteria for how a delusion is defined. This paper also presents the first application of internet-based social network analysis to clinical research, which the authors hope will be a useful tool in furthering medical research.
zz

The CIA hack and cell phone surveillance: gang stalking and cell phones

UPDATE 8-13-2020: the link to Spyera software below now goes to an absolutely riduculous page. I suspect that link to Spyera was a front for more spying.
And, the CIA/NSA contractor that is alleged to have dumped the CIAs zero day spy tools (the same types of tools that John Brennans CIA used to spy on US most hallowed institution, the US Congress) has been arrested, and tried, with the result that trial was declared a mistrial. But the agency and its lil’ helpers already had a backup plan: they (whoever “they” are in each case) stashed shitloads of child porn on the guys personal computer servers, which is standard practice in intelligence agencies like the FBI, CIA, Mossad, et al fear that they have a rogue agent who will blow the whistle about military black operations that utilize child porn.
UPDATE  10-04-2020: This post is incredibly popular the last couple days, though its best run.was in 2018, just as CIA contractor Joshua Schulte began to chip away at his political prosecution.
While some have criticised CIA contractor Joshua Schulte for having “weak OpSec (operations security ), in a world of smoke, mirrors, and mirrored cell phones and “electronic implants ” on peoples computers, perhaps no security is the best defense because Schultes own APPs, which are designed to remotely control any and all cell phones, and computers without the user even being aware if it,  provide him the criminal defense of total deniability, as this Obama era critic, and concealed -carry advocate “targeted individual and Libertarian” faces his second trial.
Look at these paragraphs below from Jason Koebler of Vice News (and Vice News itself a politically compromised organization, since its founder abandoned it due to intel agency pressure ) and note that every single claim of “weak security ” and other “evidence ” seeking to tie Schulte to various acts,and actions could easily been performed via a middle man attacker from Israeli, or any other anti-libertarian country.
In other words, any attacker, using Schultes own tools, could impersonate him online, AND make it appear as if he himself was doing it. Intel agency compromise operations,are exactly THAT strange, and brilliant.

  • Schulte’s website allows us to easily connect many of his online personas and accounts to his real identity, discern his politics, his places of residence, and identify his friends and family members. This all came from someone who should, in theory, know better as someone who had access to highly sensitive information.
  • In addition to Project Wizard, Schulte also uploaded screenshots of his Gmail inbox, which have his name as well as emails that show information about his bank, his OKCupid account, his cell phone provider, his friends’ and families’ names, and more.
  • There’s a selfie he took of himself holding a “FUCK OBAMA” pint glass, and a shirtless mirror selfie he took in a hotel bathroom. There’s a folder called “facebook_convos” that are just a series of screenshots of him beefing with his Facebook friends and family about politics. He uploaded a resume, group projects and homework from college, and design files for a 3D printed gun called “The Liberator.”
  • There are narrated video tours of the inside of his house, screenshots of emails he sent to activists advocating for concealed handgun carry permits in Texas, saved IRC chats of “Josh” saying the n-word over and over, and yet more screenshots of his Gmail inbox, which—in the same screenshot—prove that we are looking at “Joshua Schulte’s” inbox and also reveal the pseudonym he used on several different websites. Other files he uploaded tie this pseudonym to a Blogger where he wrote extensively about his libertarian politics. The pseudonym is also present in logged-in screenshots he took of an online quiz that tested his “Brain Performance Index” on a site called Lumosity; he also uploaded a screenshot of the score he got on a MENSA practice test.

In the meantime, there,are literally thousands of APPs that can and do monitor phones in real time.
Targeted individuals often claim that their cell phones are being used as tracking devices, and that intelligence agencies are using them for target practice and experimentation. Now, we know that part of that is true: A disgruntled CIA contractor is alleged to have dumped a list of all the tools that the CIA has been using to spy on us via our cell phones for the last decades. But don’t just point the finger at the CIA, because then, you WILL sound crazy, and Dr.’s Sheridan and James might get a whack at your mind, mind mind!

UPDATE: This post is becoming one of the most popular on this blog. While I experienced “cell phone mirroring” as early as 2010, and “offline computer situation rooms” as early as 2001, you may have just discovered this vast plot against constitutional liberty. Read on, and use my ‘search this blog’ section to find posts relevant to your own OGS.
Then, in a side note, be aware that the US agencies have long farmed out all of their intelligence collection to private contractors, Israeli’s and the Five Eyes Alliance, so any given abuse of your phone could be by : any of 17 US agencies, or any of Britains eight agencies, and many more, not counting the douchebags who work in private security firms, and even local police agencies-and ALL OF IT without a warrant, or even a paper trail.

And the fact is that ALL 17 intelligence agencies in the United States have turned on American citizens, using us for target practice of varying shades of “illegal and unconstitutional” so, they have lot’s of Company (there’s a joke in there, somewhere, about “the Corporation, lol). Your country is also doing these same things to you and your countrymen.

UPDATE: This is one of my most popular posts. So I thought I would add a link for software tat you can buy to do some of the same stuff to these agents and agencies that they are doing to you. Here’s Spyera mirroring and more for cell phones, but there are many others you can use, many freeware (but be careful-most freeware comes with the hidden cost that it was created by-you guessed it….)

You see, these days, electronic tools and toys, entrapments and entrainments of electronic surveillance and propaganda tactics that were once directed at millionaires and mobsters, third world dictators and Iran Contra’s and Osama bin Laden are now directed at ordinary common people who buy houses next to the fire chief, or who seek to trim the budget; or smoke a joint here and there, or who forgot to pay their vehicle tax. This is partially due to the fact  that all of the agencies are crawling with corruption, and blackmailing each other, in the Spirit of the LEIU’s, who, bar none, perform more black bag jobs around America than any CIA agent ever did.

Related Story: Watch this video to see how some of us knew in 2005-2008 that our phones were being used as tracking devices. And, that some would repeat our conversations back to us. Watch it from 4:27 minutes. Disruption campaigns that target activists and others take on purely diabolical and bizarre proportions within six degree’s of a persons relations. The newscatser notes that the FBI use cell phones to “keep tabs on critical conversations between known members of the mafia.”

(psssst: Don’t tell anyone, but this story here about how retired LEO’s work with current LEO’s and intel gencies to perform assasinations and black bag jobs is one of America’s best kept seekrits)
And many wonder how it is that they could write something online, and then, shortly thereafter, have a squad car pull up outside their house.
hazing 4.png
This is enabled by the highly integrated, un-constitutional mechanism of OGS and the tracking in real time of targeted communications of targeted individuals, and coordinated with massive database abuse and fraud on the courts at the local, national, and international level.
Any researcher of OGS can verify that at least, it is true, that indeed 17 intelligence agencies ARE following targets, and doing many other nefarious things as well. Here, below, from the Intercept, is the case of the CIA software that mirrors your cell phone, and uses it to perform MIM attacks on YOURSELF; and here is a full list of the tools that these agencies use to target journalists, whistle blowers, the neighborhood crank, wankers, dole dippers and a few potheads the same as if they are all terrorists, with download links from Wikileaks). But be careful….honeynets and limited hang outs go two ways.

A concerted effort by the CIA produced a library of software attacks to crack into Android smartphones and Apple iPhones, including some that could take full control of the devices, according to documents in a trove of files released by WikiLeaks Tuesday.
The attacks allow for varying levels of access — many powerful enough to allow the attacker to remotely take over the “kernel,” the heart of the operating system that controls the operation of the phone, or at least to have so-called “root” access, meaning extensive control over files and software processes on a device. These types of techniques would give access to information like geolocation, communications, contacts, and more. They would most likely be useful for targeted hacking, rather than mass surveillance. Indeed, one document describes a process by which a specific unit within the CIA “develops software exploits and implants for high priority target cellphones for intelligence collection.”
The WikiLeaks documents also include detailed charts concerning specific attacks the CIA can apparently perform on different types of cellphones and operating systems, including recent versions of iOS and Android — in addition to attacks the CIA has borrowed from other, public sources of malware. Some of the exploits, in addition to those purportedly developed by the CIA, were discovered and released by cybersecurity companies, hacker groups, and independent researchers, and purchased, downloaded, or otherwise acquired by the CIA, in some cases through other members of the intelligence community, including the FBI, NSA, and the NSA’s British counterpart GCHQ , the documents indicate.
One borrowed attack, Shamoon, is a notorious computer virus capable of stealing data and then completely destroying hardware. Persistence, a tool found by the CIA, allows the agency control over the device whenever it boots up again. Another acquired attack, SwampMonkey, allows CIA to get root privileges on undisclosed Android devices.
“This is a very impressive list,” tweeted former GCHQ analyst Matt Tait, noting that at least some of the attacks appeared to still be viable.
Matt Green, cryptographer at Johns Hopkins University, agreed the leak was “impressive,” but concluded there weren’t many “technically surprising” hacks. This lack of originality may have stemmed from a desire on the part of the agency to avoid detection, judging from one document contained in the trove, in which apparent CIA personnel discuss an NSA hacking toolkit known as Equation Group and its public exposure. It was also previously known that the CIA was targeting smartphones; drawing on top-secret documents, The Intercept in 2015 reported on an agency campaign to crack into the iPhone and other Apple products.
In addition to the CIA’s efforts, an FBI hacking division, the Remote Operations Unit, has also been working to discover exploits in iPhones, one of the WikiLeaks documents, the iOS hacking chart, indicates. Last February, while investigating the perpetrator of a mass shooting in San Bernardino, the FBI attempted argued in court that Apple was obligated to give the FBI access to its phones by producing a weakened version of the device’s operating system. If the WikiLeaks documents are authentic, it would appear FBI and other elements of the intelligence community are already deeply involved in discovering their own way into iPhones. The compromise of the documents also calls into question government assurances in the San Bernardino case that any exploit developed by Apple to allow the FBI access to the killer’s phone would never be exposed to criminals or nation states….

….follow the links-connect the dots!
Related Story: The Shadow Brokers Hack in context

Gang stalking and punitive psychology: technology abuse meets bad government policy

Organized stalking is  symptom of a mental disease alright- the creeping institutional psychopathology of America’s encroaching police and military state. And it’s also a social disease, where victims who have not been targeted mock, or deride the claims of those who have been targeted.
What do you call a world where the torturers mock their victims, or a world where psychologists work with the FBI as informants against the interests of patients who have endured hidden abuses?
Between the massive fraud waste and abuse at today’s NSA, which targets individuals with chronic and pervasive surveillance, and targets whistle blowers, and then feeds the interactions between these people to the many other alphabet agencies that use NSA data to then follow, wiretap, and target American citizens, democracy is on a precipice like never before in history.And it doesn’t help that psychology is politicized and allied with torture and abuse, as government seeks to eradicate privacy by outright lying and bullying the nation with one false paradox after another; and the silencing of those who believe that privacy is an important personal right; and perhaps the seat of healing itself?
Never in history has there been a bigger invasion of institutions of healing. Well-there WAS MKULTRA, which set the template of course. And once upon a time some psychiatrists, medical doctors and psychologists still had a conscience, and took a stand against punitive psychology. Meet Dr. Moss David Posner, draft resistor, prison doctor and prisoners advocate, who counseled targeted individuals and who was one himself.

So, maybe ONE other period of history- the Stalin era of the Soviet USSR, a time when psychologists diagnosed the complaints of those who were victims of gulags, and victims of chronic and pervasive surveillance and its subsidiary harassment as “mental illness.”
The term for the political use of psychiatry is well known: the Stalin era of punitive psychology.
One other era of history saw psychiatrists and psychologists abuse the practice and principles, as they colluded with military and CIA funded psychiatrists. And what they are doing today torturing people and mind controlling them a Guantanamo is also well documented as exactly that. So, political abuse of psychiatry is a real thing, as we see at Guantanamo, and in the Martha Mitchell effect.

Related Story: Meet Dr. Christine Sarteschi, a social worker and ponerologist, who works closely with organizations like the Association of Threat Assessment Professionals (ATAP ) and other crisis PR factories, hand in glove to black bag and gaslight victims of OGS, who ATAP notes in their literature are in fact victims of “parallel colluding investigations, ” as she joins Dr.s Lorraine Sheridan, David V.James, Joseph Mengele, and the CIAs Mormon torturers Mitchell and Jessen, in denying the reality of 24/7 police and surveillance state abuses, aka punitive psychology.
Extra points for noticing that many ATAP affiliated private contractors use acronyms that are (coincidentally, of course ) close to PsyOps, the military nym for psychological operations.

Then, take a look at the case of a humble garbage collector named Al Ditty from Minneapolis who took a stand against the militarization of garbage collectors (no shit ), and who then was framed as a suspect, including inferences in mefia that he had “mental health issues,”fired from his job where he had a stellar work record, and then, he was “investigated ” in what ATAP calls the “parallel colluding investigation ” by a corrupt police department that is in the record utilizing gang stalking against reporters.
But also-quite unsurprisingly- psychologists even recently ganged up and wrote a letter calling President Donald Trump a nutter. I mean-the irony meter is probably broken at this point over the “what is organized stalking” but this was just too much. And guess where that letter which featured psychiatrists who HAVE NEVER MET Trump, calling him all kinds of high falutin’ names straight out of the DSM-IV?
Yup-at the New Yarwk Times, the same paper that carried the accolades heralding the enshrinement of the David V. James and Lorraine Sheridan study as an “authoritative” document. I mean- go ahead and make my case for me if you want to, I will be glad to examine your claims, but most outside the echo chamber of psychiatry and psychology-and that which sucks the teats of the DVIC, are insular, incestuous, and single focused, as psychology is proven to be little more politicized sociology with a drug prescription to sell.
While applied-psychology once showed promise as a helping tool, today psychology as junk science or pseudo-science is very well documented, and it stymies any rational person that any president or political figure could condone torture, but they do, right here in America. And, psychologists have colluded with that, too, regardless of whether the president was a controlled asset or not. SO, this emergent internet trend of diagnosing mental illness via anonymous survey’s and other equally challenged methods is just plainly bizarre-schizophrenic projection at best, punitive political theater at worst.
Not surprisingly, the two “great white fathers(patriarchs)” of both propaganda operations and psychiatry were actually relatives: Sigmund Freud the mind bender and his nephew Edward Bernay’s the great spin doctor. And this is by design, and by practice, and echoes the very history of both psychology and propaganda to this day, as complimentary organs of mass mind control and opinion formation as well-which is a clear and stated goal of all propaganda, by definition, and by the stated goals of this slick operation.

Related Story: The birth of the MIC Propaganda complex, mass mind control and influence operations, and it’s historic alliance with psychology. “A week after [President]Wilson’s declaration of war, he[Bernay’s] creates the imaginatively named Committee on Public Information (CPI) to propagandize the war and, quite literally, to mass brainwash America. It marks the beginning of scientifically based mass mind control in America.”

Here below, I offer any researcher of OGS to look in on a dialogue between two people who claim they are targeted individuals, and note the sanity with which they speak. This is a very common fact of OGS victims-most are clear headed and plain spoken, and the only thing they seem to “suffer” is having n redress, and few legal recourses to action against their system sanctioned stalkers. And, that the only element of mental dis-ease displayed in the scenario below is that one suspects the other of being a government agent, and exhibits that exact rational, self protective paranoia.
Here is actual dialogue between targeted individuals on The Intercept forum. Note the dialogue between Galactus and Stan (Stan is a well known person there who believes he is targeted, and he frequently mentions surveillance role players, and has an online presence where he seems to exhibit rational reactions to harm he has experienced in the past. 
No tinfoil hats, now DEW’s, no microwave beams-just a discrediting narrative, some possible PTSD,  and one persons attempt to overcome it through seeking validation-which is not, and will not be forthcoming from politicized psychology any time soon. There’s just TOO MUCH money status and power in the game played by institutional sociopaths of all kinds, on a board that is overlayed on any individual’s personal experience.

JB
March 4 2017, 3:16 p.m.
Who ultimately pays the storage fees for all this data, just sitting in a haystack, waiting to be sorted or not? … Seems mighty expensive, my boondoggle.
? Reply
hans gruber
March 4 2017, 3:14 p.m.
IC operates on need to know
and IC has determined that you dont need to know .. so quit whining
? Reply
Stan ? hans gruber
March 4 2017, 5:01 p.m.
Based on the number and scale of past fuck-ups, it seems the intelligence community doesn’t need to know much either.
? Reply
Galactus-36215
March 4 2017, 3:07 p.m.
Spying on Americans is anything but incidental.
My spouse and I are on 24×7 direct surveillance now via our smartphones for the last several years. We are both US citizens.
Although we’ve not been able to confirm it, we suspect we have been on a Watchlist since 2004. Our overseas mail has been redirected through an office/adress in Singapore, our phones tapped in 2005/6, incessantly questioned and interviewed at the US border every time we enter the US from any overseas trip either personal or for business.
? Reply
Stan ? Galactus-36215
March 4 2017, 5:31 p.m.
This guy has made these claims before while vehemently denying the experiences of others who have been subjected less trivial abuses, such as black-listing, constant organized stalking, and physical assaults.
He’s got that smell. The stasi runs sock puppets here, 24×7, trying to manage impressions. If they’re not tossing that space aliens & mind control slop at real targets, they’re pushing “it’s not so bad” bullshit.
Professional vermin? Volunteer patriot? Another naive zoo animal without a clue? Either way, he’s full of it.
? Reply
Christian C Holmer ? Stan
March 4 2017, 5:50 p.m.
I’ve never once questioned the veracity of the experiences you’ve described over the years. Different people can be targeted in different ways Stan no harm no foul. Weaponizing peer reviewed neuroscience has been at the top of the deep state “to do” list for quite some time.
? Reply
Galactus-36215 ? Stan
March 4 2017, 7:05 p.m.
These events are mutually exclusive. It’s perfectly acceptable for someone to believe one story while rejecting another.
The only ‘smell’ I have is usually when I don’t shower on Saturday mornings.
But have at it. Feel free to name call all you want, it doesn’t bother me. It actually makes me happy and to smile. So, go for it. 🙂
? Reply
Nick Torrent ? Galactus-36215
March 4 2017, 6:27 p.m.
You’ve confirmed this for sure?
? Reply
Galactus-36215 ? Nick Torrent
March 4 2017, 6:55 p.m.
Two very key aspects of this, yes. That’s all I’m will to say at this point.
? Reply