I write about the social phenomenon called "gang stalking. All cases and claims of gang stalking are traceable to current and former police, military, intelligence, security contractors, and their related flying monkeys, targeting citizens. Scientific evidence based "proof" of gang stalking, and gang stalking lawsuits for journalists, psychologists, and criminal defense attorneys to sort the "electronic"psychobabble from the facts.
civil lawsuit artificial intelligence and gang stalking
Keep an eye on this case, as a man sues a gang of stalkers. Complaint includes bizarre activity, to whit:
gang stalkers “boxed him in on the .freeway” across several states, causing life threatening circumstances
gang stalkers placed a camera at the volunteer fire station across from his house, and aimed it at him 24-7
These,are well known complaints, and indeed, police and firefighters are named in several other legal actions as gang stalkers, most famously:
the well known, covered in MSM story of Rick and Lucinda Krlich case of “Small Town Terrorism” which saw success, many restraining orders, and one convicted gang stalker too, named Dick Wittenkugle, aka “DICKWITT”
look here, and here, and here for more about firefighters as gangs of stalkers
U.S. court slaps Saudi crown prince with summons over Canadian hit squad case
The summons lists 12 additional defendants who, dissident Saad Aljabri alleges, were involved in a failed attempt on his life
Aug 10, 2020
“Aljabri has been living in Canada since 2017 after fleeing his homeland following a palace coup. that saw bin Salman put next in line for the throne. Aljabri was the right-hand man of Mohammed bin Nayef, who’s the nephew of King Salman bin Abdulaziz Al Saud. Bin Nayef was deposed in favour of Mohammed bin Salman, making Aljabri a target for the new regime, a source close to the Aljabri family told the National Post earlier this year.
Since then, there have been numerous attempts to coerce Aljabri to return to the Kingdom, including the abduction of two of Aljabri’s adult children, who were forbidden from leaving Saudi Arabia.”
ROGS readers will note that I have discussed these twelve person teams many times, and in many places here at ROGS blog; and I have discussed how these cowards threaten to steal children too, as we see in this case.
Whats most important in cases of OGS however isnt that you are 100% correct in assessing the precise numerology involved but rather, that you have a general idea that it exists at all, because the difference between random crime, and other forms of stalking, is that most gang stalkers are “intellugence trained” meaning that they have trained in military, police, and other related fields.
As such, their levels of organization belie some interesting habits,one of which is the basic structure of their literal team “organization.”
This strange man, Gernot Ueblacker, who wrote to me about a fake kidnapping hoax, uses the number twelve in his liturgical entitled “Mornins Twelve Mafia,”, as do many others.
His father was,the famous Horst Ueblacker who designed the technology of the Eisenhower Tunnel. I suspect his “mafia” is a christian prayer group, with police and intelligence ties, and it was he who claimed that some group was targeting him with NSA Equation Group styled “electronic implants,” in his computer, and that he had tons of evidence, but couldnt produce it when asked.
* There was the case of my mysterious pair of neighbors who always seemed to arrive, and leave their apartment when I did; and my various ways of monitoring my internet revealed that pair monitoring my internet too, via a Motorola router, as I read a news story about Mahmoud Al Mabhouh’s Assassination by an Israeli hit squad in Dubai.
* I discussed it in the case of the Mandalay Bay/ Las Vegas mass shooting too. In that case, a team of five that included Jose Campos cowering in a stairwell as Stephen Paddock allegedly shot up a crowd of key gun control influencers and country music fans.
And, I discussed that five person team a lot in the case of Stephen Paddock, and you can use my search feature to fund other posts about that link.
* I used the number twelve, and also thirteen in several contexts all over this blog for a variety of reasons, none of which are that I am somehow obsessed with it, or that it as personal meaning to me, because it doesn‘t.
It does, however, have meaning to many who operate in policing and intelligence related environments, but also to media and crisis public relations fields. These types use that number to signal to each other online, as we saw with the author of the infamous gang stalkng hit piece called “They See Gangs of Stalkers.”
That author, Mike McPhate is entirely discredited (as is the NYTs ridiculous opinion pages, as we see with the recent welcome resignation of racist propagandist Bari Weiss), and we see his use of the number thirteen in a piece about actual gangs of police, ling after his smear against TIs.
Writing about that linkage would require an extensive, novel length explication, so read these ROGS posts about the thirteens and twelves instead:
* Propaganda and sensationalist news items frequently use the numbers twelve, and thirteen, depending on the targeted audience
– An actual occultist, one of my rabid zionist cyberstalkers, who followed me on Twitter, and whom I later researched intensely after she started her schtick about “face orbs” and talking with the dead, is a former United States Air Force investigator from its OSI division, and she claims to belong to an actual USAF sponsored intelligence cult of 13 members.
I suspect that her cult has something to do with child abductions, and child abuse as we saw with the Col. Aquino scandals, but I dont have proof of that. In order for the ROGS readers to understand the threat that these types of people pose to targeted individuals, a look back at the Satanic Panic era, and specifically at the Presidio Satanic Ritual Abuse hoax, and Col. Acquinos response to his vile, and actual occultist, religious critics is an eye opener.
* Thirteen and spying is even tied together in the Jewish-christian books, bibles and Torahs too. Have a look at how its used in biblical spy activity. ROGS primarilly profiles Jewish-christian terrorists, so I dont know what the numbers twelve and 13 mean to sociopaths like the Saudi Prince in the story above.
On that note, yes, OGS is indeed bizarre, and I urge the reader to use my search feature for other posts about the numbers twelve and thirteen, because it is used as a sign and signifier in OGS cases, for a variety of reasons.
The number twelve in our case at hand is a case of Saudis, not our usual suspects from the Jewish-christian world, and will require more analysis on my part to understand its Arabian and Muslim context.
For now, heres more about the propaganda features of these numbers, from the kabbalistic, cultic, sectarian and oral traditions:
Chabad Jewish kabbalah, the number 13 which is related to the synagogue shootings, and police freemasonry/other poluce occult groups
What Are the 13 Attributes of Mercy?
The number 13 signifies the infinite. The number 12 signifies constraint and order: e.g., the 12 zodiac signs and the 12 months in a year. Above order and control, 13 connotes boundlessness and immeasurability.
Online “personas ” and what to do about them: gang stalking by AI assisted robots and targeted individuals online: a gang stalking conundrum.
Gang stalking is automated, but also, assisted by living breathing humans, who are sometimes paid players, and other times, mere useless idiots who play along with the Mockingbird Effect.
Here, have a look at how I was cyberstalked on Mike Masnicks (fabulous ) blog, Techdirt.com:
The gang stalking started around 2013, when I tried to raise awareness of organized gang stalking. Out of necessity for dealing with a troll farm friendly commenting sytem at Techdirt, I used different “personas” to manage a conversation, but without any software, or automated programs to assist me:
I was defending/empathizing with a guy named Jeffrey Kantor who had been targeted by a Google based algorithym, and that had served him bullshit results, and possibly, those results spoonfed to him after some online gang stalking by Fusion Center operatives and military contractors/AI programs that manipulated his search results.
Back in those days, AI gang stalking was new to the “normies ” whereas I first experienced online “redirection” after I reported on the first Somali manufactured terrorist in the City College News, Mohammed Warsame, who was an FBI snitch.
Redirection is where people search Google, or other search engines for materials and get different results, depending upon who is targeting the searcher based upon an IP address, as we see in the case of ADL online cyberstalking here.
So, the Jewish, parochial journalist (Mike Masnick, of Techdirt.com, for example ) who searches for information about “why do Somalis get…. ” blankety blank, will get Google results for:
And other such discussions, whereas myself, I got results sponsored by shitbags like the Anti Defamation League, and bbbb,,b other shit-persons. I also got Nazi logo laden websites (courtesy of the Bronfman klan and local Fusion Centers, working with Infragard shitbags like that colleges president) every time I searched forresults like, “human rights in Palestine” and so on.
And, besides the ibvious terroris recruitment pop -ups, and as in Arabuc tat I couldnt read, when I searched for information on Somalis, I got stuff like this instead :
and keep in mid tat its not just “the gubmint ” targeting you, but tese das, it could be racist groups like the Anti Defamation League and its octopus of NGOs, or even te Klan, and any of the militant feminist groups who work behind Sexual Violence Centers (also note the para-language involved in nearly all DVIC industries )
I will provide more context at a later date, with evidence.
The gang stalking of Stephen DeVoy: Artificial Intelligence, computer code, and programming, colluding investigations, claims of delusions,illicit hacking and cyber -stalking, and so much more
COINTELPRO Operation Exposed
by Jack Colby
Finally a breakthrough!!
Details from www.stop-fascism.org
I have received an anonymous email alleging the following. I can confirm that the individual that owns the below listed email address is the owner of the “Cheese Board” and I can confirm that there exists a USENET post where he uses the below listed name. The anonymous message alleges that this individual (aka “Cheese”) is KOBE SBM and that he owns the harassment website http://www.kobehq.com
I cannot yet confirm that he does, in fact, own the KOBE website or is KOBE SBM. However, I will take the steps necessary to find if he does. Therefore, until I can confirm it, this statement must be considered merely a report about an email I received and not a statement about Bill Rhoades.
If this information is correct, then he has been running a hate website targeting Arabs, Muslims and Anarchists. It would also follow that he is responsible for libel and defamation against me, including and not limited to false posts in my name and a hate crime against my Salvadoran wife and daughter.
Here is the information quoted exactly as it was sent to me:
To: [email protected]
Subject: I know the identity of kobe superior black man aka kobe headquarters
he is known as cheese on the cheese board his name is bill rhoades his full email address is [email protected]
Here is a post where he associates this name with his email address: here and here.
I intend to turn this information over to the police.
If the information is correct, I thank the person who sent it to me from the bottom of my heart.
In addition to myself, many others have been harassed on his forum in a similar way. This includes a woman who used to post there as “Audrey.” I propose that we need to collectively encourage law enforcement to press criminal charges against him if he turns out to be the owner of the KOBEHQ website.
Cheese once posted at the top of his forum “All anarchists are terrorists.”
I will not connect the dots nor do I assert that the dots are connectable.
(1) While I was working at Cycorp, an individual named Cyndy reported to me. She benefited directly from my removal at Cycorp. Many times she told me that she disagreed with my political philosophy and that she believed my philosophy to be dangerous.
(2) Cyndy was known to many of us as “Mary’s Pet.”
(3) Mary is the wife of the owner of Cycorp and the head of the personnel department.
(4) When I left Cycorp, Mary did not sign a particular form and this caused me some problems. When I accused her of doing this intentionally, she responded that “I was just trying to be friendly by giving it to you in the first place.”
(5) While I worked at Cycorp, during the time that Josiah Hagen was using an Internet appliance from the office (something that is very much out of the usual) and simultaneous with the harassment, he suggested to me that I post on his brothers Internet publication, the DC Registry (owned and operated by Phil Hagen). I declined to do so because it is rightwing.
(6) The DC Registry published an article suggesting that I am a terrorist and that readers report me to the FBI, Secret Service and Homeland Security.
(7) Cyndy leads a project that worked on a joint project with DISA. That project can be used to attack networks and has been the subject of recruitment by the US Government to wage cyber warfare on “enemies of the United States.” (Which now appears to include mere dissident citizens.)
(8) The corporation TAG also worked on a joint project with DISA. TAG is an asset of the NSA.
(9) Cyndy traveled to the DC area to have meetings with DISA on joint projects.
(10) The first person to post as KOBE (and to threaten my job) posted from TAG (or, at least, had a TAG IP Address).
(11) After I posted a warning to people advising them not to work for Cycorp, John Jantos (intimately close to Cyndy) told me that he was angry at me for posting it and did not wish to communicate any longer.
(12) Shortly thereafter the first posts by KOBE HQ left a hint as to KOBE HQ’s identity. The hint was “Swordfish” and “You do play chess, don’t you?”
(13) During my first week at Cycorp, John Jantos and Josiah Hagen invited me over to their house for a dinner of swordfish. Josiah Hagen asked me, “You do play chess, don’t you?”
(14) While at this dinner, I telephoned my family because my Grandmother had died. Josiah Hagen considered me rude to make the telephone call from my cell phone.
(15) The harassers would later publish an article in my name claiming that I had killed my Grandmother (who died thousands of miles away).
(16) While at that dinner, Josiah Hagen claimed that Nietzsche was his favorite philosopher. The harasser would later claim that Nietzsche was his favorite philosopher.
(17) When I demanded that Phil Hagen take down the article suggesting I was a terrorist, he threatened to sue me.
(18) When I let the world know that Phil Hagen refused to take down the article, he threatened to sue me.
(19) After the hint about swordfish and chess, I telephoned Cyndy and asked her if Josiah Hagen could be KOBE HQ. She told me that she did not think so but that “John is disappointed in you.”
(20) One of the harassers posted on Boston IndyMedia, “John is disappointed in you.” She also asked, “whose pet am I?”
(21) KOBE SBM claims to have been recruited by KOBE HQ.
(22) KOBE’s WEBSITE lists members by rank implying a hierarchy.
(23) An owner->pet relationship is similar to a recruiter->recruitee relationship, therefore we should assume, with regard to KOBE, that they would be one and the same relationship.
(24) KOBE HQ has stated, as a proof that I am paranoid, that I sometimes mistake friendly gestures for hostility (see comment by Mary above).
(25) KOBE SBM released information that he/she claims came from my personnel file.
(26) KOBE SBM and KOBE HQ have actively interfered with my search for employment.
(27) Douglas B. Lenat, president of Cycorp, told me that he was on the Unibomber’s hit list. The unibomber claimed to be an anarchist (though a completely different kind of anarchist as my self. I do not believe in using violence unless it is necessary for self defense against violence).
(28) Douglas B. Lenat harassed me for being an anarchist.
(29) Robert Kalhert, a manager at Cycorp, harassed me for being an anarchist.
(30) Charles Klein, a manager at Cycorp, made an issue out of me being an anarchist.
(31) Michael Witbrock, a manager at Cycorp with ties to IndyMedia, told me that a company should be able to fire someone for being an anarchist.
(32) In order to receive severance pay from Cycorp, I was forced to sign a document stating that should I ever discover that I had been discriminated against, I could not sue them for that discrimination.
DOES ANYONE THINK THAT SOMETHING CRIMINAL JUST MIGHT BE GOING ON HERE?
Trigger Warning: This post contains the names of a few people from the “women and their children” crowd who participate in gang stalking. And, I wrote it for whoever is searching this .terminology: “gang stalking babies.”
This post is also dedicated to all of those hard working Bernaysian Liberty Torches who participate in and profit from Organized Gang Stalking-and especially to Morgellon’s sufferers like Ed, in San Francisco, a down and out former federal public defender who, disgraced by federal prosecutoer~cum financial~crimes~investigato Tarek, now works in the Ohio cult of Eikenburg as a toilet slave trainee.
(You might recal Ed as the likely Fusion Center courier from this story, and from extensive correspndence with him that I documented elsewhere,as occulted law enforcement moved into an apartment three doors away from my own. )
Where and when did “high policing,” begin to target men as wage slaves, in the post-modern peonage system? What kind of people do that? The short answer is “racists, manipulative slavery profiteers, and their enablers,” andthose,derivative of Eastern Bloc banksterschemes of the One Percent, most of whom are nebulously Jewish, and well connected tothe DHS gang stalking pork barrel.
From Welfare State to Police State It is not called the welfare “state” for nothing. Unnoticed by reformers and even more striking than the economic effects have been subtle but far-reaching political developments. These developments involve the quiet metamorphosis of welfare from simply a system of public assistance into nothing less than a miniature penal apparatus, replete with its own tribunals, prosecutors, police, and punishments: juvenile and family courts, “matrimonial” lawyers, child protective services, domestic violence units, child-support enforcement agents, and other elements.
Originally created to treat ills endemic to low-income, single-parent homes, this machinery is increasingly intervening with police actions in middle-class families. Kafkaesque in its logic, this machinery lends plausibility to the warnings, most famously by F. A. Hayek in The Road to Serfdom (1944), that socialist and welfare-state principles would eventually threaten not only economic prosperity, but also civil freedom.
I have up until now avoided writing about how the old government programs that the United States “borrowed” from the Nazi’s are still in play in the world but on a much wider scale, including eugenics programs where elements of society attempt to kill off resistance with cleverly worded political phrases, slogans, and clearly religious/sectarian agendas that hide their true intentions in secular law and culture; and that ALL of those agendas stink, because they work from within cultic and sectarian frameworks, and against due process of law.
Or, in this case that follows-vagendas.
Some white women-most notoriously from the “progressive” folds of our politics- perpetuate a form of racism that is very “eastern bloc,” and without concidence, the current money pot of “save the sex trafficked women and their children!” has historical precedent. Then, we can frequently find in the dialectic of OGS references to slavery of one kind or another.
Related Story: The Island of Guernsey-which reads ROGS- settled a lawsuit with 3M for allegedly poisoning people with cancer causing agents found in firefighting foam. Now, The MN State attorney general is suing 3M for $5 billion for potentially causing infertility, and cancer as others contemplate domestic spying and gang stalking lawsuits against Minnesota state agencies.
UPDATE:Minnesotas Attorney General, Lorrie Swanson, noted in some online writing as an actual gangstalker(muchOGS involves the hidden political violations of prosecutors and law enforcement- Minnesota leads the nation in this form of corruption, second only to New York and California) settled quickly, for far less. That skanky bankster whore took 800 million, instead of taking a stand and fighting- and possibly prevailing in a first of its kind prosecution that could have netted far more,possibly into tens of billions, had citizens attained legal standing. This is the bolshevik white female in action: settles quick an low, while keeping her job. These are devoid of morality, or even common sense, like much of the for sale #MeToo whores of our era.
We also see in the work of Stephen Baskerville that these same are every bit as racist/racial and a desperate as Hitler was to promote their version of tribalism, which sometimes takes the form of multi-cultism but not always-sitting down to dinner of a Saturday with any of them finds that their daughters don’t generally marry black men from Chiraq, or Compton.
And, we see their politics nearly always ends with supremacist outcomes, and “word policing.” And lot’s of boogieMAN creation schemes, assisted by the bald headed prick in the administrative offices at some podunk college’s and backwater-states where much gang stalking begins. My reader from Washington State and my associated daily Triune of readers might appreciate my co-option of their phrase there;-)
But let me explain it this way: there is a currently split in the “progressive” vagenda, as a bunch of pussies walk into a bar- or an election; and I’ve got President Barak Obama parked a block away from my house, munching a burger with a progressive voter, after I have endured a years long gang stalking operation (see photo below ).
We saw the beginnings of what is colloquially called the American version of “mind control” and other things in the “Liberty Torches of Freedom” example where Hitler’s guru of propaganda Edward Bernay’s provided a template for “women’s rights”, where he used American women to promote cigarette smoking in the gap years between WW1 and WW2- and we see today that women from these same folds are also willingly manipulated as “vagina hat wearing morons,” today, but even there, those who claim to speak for “all women” are showing a few cracks in the ranks.
So how to solve the problem? Moral panic’s, they say, are the devil’s best friend. Social contagions! Moral diseases! And-lot’s of “working in darkness” with Leon Trotsky’s favorite tool from the devils toolkit-RACISM! But where-and on who- to cast that spell? And who will help? Enter crisis PR and it’s many agents in high heels, with the associated dog and pony show waged “in darkness,” against unsuspecting targets of domestic spying.
All of these things can cause political rifts and nasty splits of all kinds, not least of which is profitable for those who cause them, and use us, one against anther, as they chew through our Constitution, and our rights of due process. This is the case with SESTA, which is a bad bill that claims to seek help for sex trafficking victims, but is in fact, a HUGE broadside against free speech on the internet. And even progressives agree that we all need to pitch in and STOP SESTA.
Related story-Falling through the cracks: Women are throwing their pink pussiehats in the gutter– is it because they think pussies aren’t ‘dirty enough’ or is their something much wider, and deeper? Or-because white Jewish and white female racism has finally bared it’s teeth to cannibalize brown/black/yellow and red pussies?
But who are these cunts who claim to speak for women (as if women cannot speak on their own?) The answer is: they are the same slavers of each and every generation before this one, and they have roots in Eastern Bloc “white Slavery,” and Roman conquests, but also, these SAME people had deep tentacles in the slavery of African American’s, and the peonage of the indentured Irish.
But keep in mind that Protest is Protestant, and we need more of it, but without the veiled intentions of destroying Democracy at the internet switcharoo. And maybe, toss the religion too, so we can all pitch in on this projct, together.
So let me run through a case study drawn from the current online Psychological Operations that were also in play in the run-up to the election of 2016, and the associated offline and actual “gang stalking” that occurred. As the regular reader will note, I have discussed these operations as they affected the proliferation of “mass shooters” in 2016, and how progressive politics encouraged these events-but also encourage the law enforcement agents reading in to note this correlation as well.
Related Photo gallery:President Barak OBAMAs Secret Service Limo, and its cohort, parked a block away from my house, as “Progressive Welfare Cheese Staters”maraud through my neighborhood, leer through my windows, and destroy my security cameras(the great irony is that I voted for him, a move I soon began to regret).
Psychological operations and gang stalking: blurring the narrative, blurring legal, moral, and ethical lines, one targeted speaker at a time, and a strange form of cyber stalking that comes offline, after “secret” operations:
The case of the neverending war on profits derived from “white slavery,” that currently takes the form of the DVIC industrial complex and the massive money pot that has incentivized the transition from welfare state to police state; and the question “who wages these wars?” Then, I ask the reader to Google the phrase “even the gang stalkers” with quotation marks and “follow the money” and compare your results here. And, then have a look at the story of the bat-sh!t crazy Deane Zakaos Ewing, and Laurel “even more batsh!t crazy” Aston and “CIA child sex slavery rings!!!” And “masonic ritual abuse” of those who resist their messaging apparatus, and gang stalking blackmail/compromise operations/slander campaigns/ political schemes
the batsh!t crazy story of Laurel Aston. Keep my thesis about the number 13 in mind as you read this story. “The Truth On Ex C.I.A. Human Trafficking Victim Laurel Aston and Bill Cosby and His Son Enis By Laurel Aston”Bill Cosby’s son was murdered in a C.I.A. hit meant for me . On that fateful night ,when Bill Cosby a Black American hero lost his son , Enis Cosby .The C.I.A.had meant to finish me off for good. That fateful night was not long after Nazi C.I.A.assassin and mega Billionaire Stephen Benion had successfully extracted another rape baby from me . Benion my C.I.A.Slave handler and forced husband , did this while holding me under armed guard at our ranch outside Palm Springs in Rancho Santa Fe .While keeping me drugged nearly unconscious. Benion is a German Nazi . I am half Jewish from the sacred Lost Tribes of Israel bloodline.”
These psychological operations include gang stalking, and we saw many gang stalking targets were “911 truthers” who simply wanted the ridiculousness of the situation acknowledged (Dancing Israeli ‘art students’ that even the flaming gay press documented, and the flying Saudi’s who the flaming gay press ALSO documented; and who the Bush’s, the Clintonites, and the “deep state” just love these days); but also that includes UFO’s and aliens, chemtrails, Morgellon’s, and “holistic medicine” as well. In mind control operations, the possibilities are endless, and all of them help nefarious elements of ‘our’ society gain wealth (Do you have Tinitus??!)
Yet the serious researcher of organized gang stalking will certainly become quickly exhausted when they realize that these rabbit holes all lead to other rabbit holes- that some say “tomato” while others say “Frank Tomota,” who, “coincidentally,” used to live in Ed’s Asian barrio. And, who is a Deb Matheny/NE1/etc asociate, and not at all incincidentally an associate of a former LA County coroner who is part of DVIC narrative control.
Or, that frequently, the domestic spy rings that are frequently described as “the CIA” are actually the Mossad working with, or from within our own agencies as we saw them targeting Occupy protesters, and also working seamlessly within secret operations one day and in American NGO’s the next; or any of many other foreign agents that “our” agencies allow to operate with immunity and impunity in America.
Don’t waste too much time making connections, because at their center, what is important, is that LEA’s and LEO’s all belong to or are deeply affiliated with one or another secret society, and retired military, intelligence and FBI/DHS/CIA all work black operations across America-and the FBI refuses to investigate these illegal, police and intellugence agency affiliated spy rings.
And, that the various Infragard and LEIU’s splattered across the country have made Constitutional due process a laughing stock in every sense. Like Ed said ” I have a few friends who work in the FBI,” just before he drove himself crazy running around in circles on Flightaware.com, one day and then zipping off to San Berdoo the next-and just AFTER I lost this story about airplanes to a long sleek black Chevy Suburban thathad no license plates.
Like this story here, we see that there is indeed a nexus between how NSA “call centers (lol)” are using data, and trickling it out t key players in the dialectic, who then wage inf0-wars and mind wars of all kinds on targeted individuals. Maybe you should rethink a few of your new Fakebook friends too, because it’s estimated that some 40% are .mil contrcators, and other state trolls. This is what mass mind control IS in action.
The researcher should keep the phrase “innocent doesn’t mean not guilty” in mind as they read into and out of gang stalking narratives, because the phrase itself-like much in the gang stalking dialectic- is laced with auto-antonymal meanings often backed up by decades long slander campaigns and police stalking; and that to some, “not guilty” frequently means “not innocent,”even if we have to break the law and commit a few crimes to prove it. ANd, this same is a feature of all blackmail operations, anywhere, ever.
We saw this clearly in the case of the Beatrice Six, known as the largest DNA related exoneration of innocent victims of state practices in American history, that state agents will do anything for a paycheck, and to keep control of their communities safe from “the Devil,” which, more often than not is a code word for “eastern bloc Jews and their Talmudic kabbalah.”
Catholics and Protestants and Baptists all generally view Jewish cultic beliefs a demonic, but also, work “in darkness” to get a chance to sink their teeth into Jewish money of any of the many flavors of banking and political interests, real estate, and then-the hefty barrels of pork that these associated “good peeple” NGO’s receive from the federal government for gang stalking operations.
And, these other spin-offs of Babylonian mystery religion all have their own strange stalking tactics too.
And, so we saw in the Beatrice Six that a child was at the center of the debate, as a lesbian mother was framed as a murderer, and then, shortly thereafter, her child was spirited away by CPS. I don’ have statistics handy, but I have read before that states and the multi-headed hydra of “social services” instantly get a million dollar paycheck for every kidnapped child, while others seem to get away with murder, and worse, as the state looks in.
And then, in the “schizophreniform” narratives of the case of Laurel Aston and Deane Breedlove/ Deane Zakaos Ewing, that they have also demonized a lesbian mother. I can provide a list of names that stretches from Texas, to Colorado, to Georgia, Tennessee, Michigan and Ohio that conects my own personal case, but also, that connects the dot directly to the NSA. Without any doubt, this is a new MHCHAOS, and 13 is the magic number there too.
So, few cases demonstrate the schism in our society more than these cases, for many reasons, not least of which is the criss-crossing of political points, or that it is the old KKK type community policing, but without the burning crosses or the pointy hats, because anonymity emboldens cowardly practics whether it is a switched internet node, or a white sheet:
Children are the future of our nations, whether you are a left-wing tattooed lesbian or a right wing gay person, hiding behind religion; whether you are a single parent, or happily married; whether you are a Democrat or a Republican, (or whatever political parties are in your country.)
Control of children is a lucrative and profitable industry in its own right. In America, organizations that use children as funding sources range from the school districts, to the welfare system, to foster care, and child protective services-all communities derive profits from children.
Hitler notoriously claimed that ‘ he who owns the youth, owns the future/country!’ but also, Hillary Clinton’s politic and it’s associated peonage system also said similar things-‘it takes a village to raise a child!’ and so on.
Religions historically vie over control of children. In every community in America we see religious factions vying for control of the profitable social services industries. These schism’s in America (and likely in other European nations) are quite evident in the culture wars waged between Catholics/Protestants on one side, and Jewish/Progressives (fallen away Catholics/Protestants, the gay community, and their many unhappy others).
Many other features which in and of themselves are a separate novel.
I write this post merely as a template for others to study the strange “schizophreniform” narratives, and then, with the hope that the civil itigators, criminal defense lawyers, sociologists and psychologists, as well as criminological researchers can begin answer the questions “what is organized gang stalking” and “who gets gang stalked,” and what happens in gang stalkin.” and so on.
But we also see it in every day narratives now, as we have devolved into a lawless state of affairs where we are ALL literally wiretapped by the NSA, 24/7. You see-in the DVIC era, starting in 1993 until now, some felt it was alright to bend and break the law, based in their own hunger for power, and worked “in darkness” to not only create inter-generational trauma’s and mind control, but also, to steal babies, and worse.
In other words, the usual suspects are always an inch away from the kids, and they haven’t saved them in all of the time the world has had kids popping out of it. This is what happens when we slide the scale from a law of due process to a law of the jungle. And as I noted above, I rode the Tiger One Time, and that was enough to teach me that these are not too be trusted with law-or pubic policy in general.
This time around, my best is a rolled up pocket Constitution, and the hope that I can get a few journalists properly riled up. That works, sometimes, in Democracies. Other times, it takes a bunch of court cases, or a good class action, and as Marcy Wheeler has noted, we are all targets now.
Even the casual reader of ROGS will note that I have documented the tactics and tools and methods of “organized stalking” in ways that defy the previous dialectic-and, tha I roundly have indicted “progressives,” and people who sit on the Intelligence committee, and, I have noted the perverted, nepotistic vampires of a pig’s feather roll around in hell together, much as J. Edgar Hoover and Edward Bernay’s are doing today, having wedded crisis PR to policing in such a way that democracy was murdered BY these types of people, and no one noticed.
Following yesterday’s bizarre vote in the House, in which many members who opposed President Donald Trump and warn about his abuses of office voted to give him much greater surveillance capabilities, the issue quickly moved to the Senate. Senate Majority Leader Mitch McConnell made a procedural move to ensure no amendments are added, and the bill the Senate will vote on will be basically the awful bill in the House.
Or, as Marcy Wheeler has noted, American’s are noww officially targeted individuals as we now ALL fall under FISA Section 702 “targeted interception of the communications of targeted individuals,” and the FBI/CIA/DEA/NSA/Google back door searches of targeted American’s since 2001-17, and how our government in the form of the NSA data theft pipeline to Israel dropped haystacks on people’s heads in 2001-5, and then, started poking these people with hidden needles with something called “no touch torture,” aka passive aggressive shenanigans on our internet switches courtesy of Fusion Center’s and “the deep state.”
In the case of Sharyl Atkisson, we see all of that and more, with bonus points for actual documentation that, according to an NSA/CIA/DoD trained computer forensics expert- some of her computer hacker’s used USPS IP’s and that she has long been a target of government spying, with a partisan flavor: she reported things that conservatives touted, like Benghazi and Fast and Furious- and she was personally targeted by Barak Obama’s political policing initiatives.
Let’s look at a simple equation, starting with my assertion from last November, where I chronicle how United States Postal Service trucks are frequently cited by gang stalking victims as participants in OGS. Here is a refresher from last November, where I touched on how the USPS policies and practices have long been criticized for making people go crazy, aka “going postal.” I said:
“organized stalking in vehicles frequently involves official vehicles, with no license plates, like this one:
Google returns some 150, 000 results for “mail trucks and gang stalking.”
In the US, the postal service has long used postal employees to stalk and harass non-conformists in the ranks, which is the origin of the term “going postal,” as disgruntled employees became mass shooters because they were mobbed at work, and thus became synonymous with “politicized government workplaces” back in the 1970’s-90’s, just before the Big DVIC Mass Shooter era.
Today, I note that Google returns 320,000 results for mail trucks and gang stalking if I search without quotation marks.
And, so, I also note that many of the mass shooters of the 1970’s-1990’s worked in the Post Office. In fact, so many of them went on rampages after being gang stalked and harassed that the term “going postal” has 7,050,000 results in Google,and is forever ingrained in the American Dialectic as the very definition of workplace-created insanity.
Now, let’s watch another of my many thesis come together, as I validate links between the United States Postal Service, government styled hacking, and bizarre criminality that targets reporters and journalists computers with PLAINBIZARRE tactics and hidden operations that I discussed briefly here, and then, the case of former CBS reporter Sharyl Attkisson, and the USPS, where I ask all the “good peeple” in America’s Political Police the question: What the [email protected] Is the Post Office-which is NOT and American government entity– Doing In ANYONE’S [email protected] Computer? And why are all you “good peeple” in our Alphabet agencies allowing American citizen’s to be targeted by the “deep state?”
As my federal case moves slowly through court system, there is a new development: ongoing forensic work of my computer laptop system has revealed a second government Internet Protocol (IP) address used in the illegal cyber-attacks on my computer laptop system.
The IP addresses don’t belong there.
In a new affidavit filed in federal court last week, cyber-security expert David Scantling states, “[T]he presence of these USPS addresses on [Attkisson’s] computer is not a mistake; it is not a random event; and it is not technically possible for these IP addresses to simply appear on her computer systems without activity by someone using them as part of the cyber-attack.”
Scantling served as a contractor for the National Security Agency (NSA), the Central Intelligence Agency (CIA), and as a Department of Defense (DoD) civilian employee. He’s familiar with “Advanced Persistent Threat” (“APT”) cyber-attacks. In fact, he developed and deployed similar APT cyber-attacks against foreign government, commercial, insurgent and terrorist targets. He also developed and deployed cyber-security countermeasures in the private sector to defend against such attacks.
Interestingly, both government IP addresses found embedded deep in my computer system trace to the U.S. Postal Service (U.S.P.S.), which has been known to cooperate with intelligence agencies on various levels. The U.S.P.S.
In order to understand the totality, and the totalitarian-and sectarian corruption of the “progressives” one must first look at the many cases of reputable journalists who have been targeted by IC and the “deep state” elements that work with immunity and impunity, right under the noses of America’s Finest. Our agencies are totally corrupt.
And the Post Office relationship between the Senate Intelligence Committee and gang stalking even moreso. Most noteably are the sweetheart deals between Richard Blum in real estate. Are you seeing the connection between real estate and gang stalking yet?
Look who owns the Post Office-which is not an American government entity-and look at the “crisis PR” that was waged when the pubic realized that Dianne Feinstein used her connections in government to steer hundreds of millions of “mystery money” from the taxpayer’s pockets into her husband’s business:
Influence? What’s THAT?
Related Story: How “influence operations” under color of law and NSA back door searches-and “mind control experiences on the internet”are destroying American democracy.
Of course not! Plausible criminality requires that we gas light the evidence until we get a day in court-which will NEVER happen because these crooks are waging the NSA blackmail schemes we see today.
Crooks crooks crooks. In postman’s clothing.
So- there is a documented link between organized stalking and mail trucks, OGS and Democrats, and OGS and computer hacking. Without a doubt, we see that one sector of our political wolves are participating in the “deep state” blur between rights and due process on one hand, and highly organized disinformation, and gang stalking.
More and more, we see reporters are targets of the “Fourteen Eyed Monster,” aka the NSA warrantless hacking, redirection, and targeting scheme.And, keep the CIA plausible deniability that I write aout all over ROGS here in mind as you read this case study of computer hacking, redirection, an monitoring of a targeted individual, CBS news reporter Sharyl Attkisson, and American citizen.
And-remember: one of the main threats of “gang stalkers” is that they will force a “target” to go broke suing them.
forensic work of my computer laptop system has revealed a second government Internet Protocol (IP) address used in the illegal cyber-attacks on my computer laptop system
Related Story: How 5-9-or-14 nations are spying on youat any given time, aka the UKUSA (rhymes with Yakuza). Or, “what is a state sponsored shell game, 101.”
a game involving sleight of hand, in which three inverted cups or nutshells are moved about, and contestants must spot which is the one with a pea or other object underneath.
a deceptive and evasive action or ploy, especially a political one.
plural noun: shell games
“officials played a shell game by loading prisoners onto buses during population counts at the jail”
or “What is NSA-14 Other Nations Spying” for the win.
From SharylAttkisson.com: It “is not a mistake; it is not a random event; and it is not technically possible for these IP addresses to simply appear on her computer systems without activity by someone using them as part of the cyber-attack.” –David Scantling, cyber-security expert.
I’m frequently asked about the status of my lawsuit against the U.S. Department of Justice over the secret, unlawful intrusions into my computers, exposed in 2013. As my federal case moves slowly through court system, there is a new development: ongoing forensic work of my computer laptop system has revealed a second government Internet Protocol (IP) address used in the illegal cyber-attacks on my computer laptop system.
The IP addresses don’t belong there.
In a new affidavit filed in federal court last week, cyber-security expert David Scantling states, “[T]he presence of these USPS addresses on [Attkisson’s] computer is not a mistake; it is not a random event; and it is not technically possible for these IP addresses to simply appear on her computer systems without activity by someone using them as part of the cyber-attack.”
Scantling served as a contractor for the National Security Agency (NSA), the Central Intelligence Agency (CIA), and as a Department of Defense (DoD) civilian employee. He’s familiar with “Advanced Persistent Threat” (“APT”) cyber-attacks. In fact, he developed and deployed similar APT cyber-attacks against foreign government, commercial, insurgent and terrorist targets. He also developed and deployed cyber-security countermeasures in the private sector to defend against such attacks.
Interestingly, both government IP addresses found embedded deep in my computer system trace to the U.S. Postal Service (U.S.P.S.), which has been known to cooperate with intelligence agencies on various levels. The U.S.P.S. refused to cooperate with me, prior to my lawsuit, after my forensics expert recovered evidence of an IP address mysteriously residing in my computer. At the time, an agency official dismissed the forensics evidence as some sort of unexplainable mistake, and refused to help us learn how its IP addresses are maintained and accessed so we could identify the perpetrators.
Tracing the evidence of the government-related intrusion to individual participants hasn’t been easy. The attackers attempted to erase their tracks once they were discovered. And neither the U.S.P.S. nor the Department of Justice (DOJ) are voluntarily cooperating. But experts familiar with the tools and tradecraft that are proprietary to government intelligence agencies have painstakingly recovered and pieced together compelling forensic proof as to attribution.
“There can be no reasonable question that an [Advanced Persistent Threat]-style cyber-attack was carried on Attkisson’s computer systems and Internet connection,” stated Scantling in an affidavit filed last week. “Specifically, the APT methods deployed against [Attkisson’s] computers and Internet connection…were sophisticated and of the type only available to government-type activities and operations.”
This latest information builds upon earlier forensic examinations already conducted by: a confidential government-linked source, an independent forensics specialist hired by CBS, and a forensics expert consulting on my lawsuit.
The facts at hand are at odds with widespread attempts to establish public counter-narratives, resulting in reckless reporting in the past that wrongly implied the Department of Justice Inspector General (IG) had rejected any notion of an intrusion into my computer(s). In fact, the IG never even reviewed the primary computer in question—a CBS laptop—because CBS News would not permit it. I had asked the IG to examine my personal computer, in which two independent forensics examiners had also identified evidence of intrusions. The IG investigators found and described to me significant suspicious anomalies in that system much like the CBS laptop, unearthing similar efforts by someone to erase data and evidence. However, when the IG computer experts finished their review, the findings went to higher ups and the resulting report was inexplicably withheld from me in its entirety.
I was shut out.
Many months later, under pressure from Congress, the IG eventually released a very different-sounding summary of its forensics report to the press. It recast or excluded much of what the investigators had told me they’d found. I attempted to obtain the full report and original notes, some of which I reviewed while the investigation was underway, describing the suspicious activity found on my personal computer. However, the IG has stonewalled my Freedom of Information (FOI) requests for these documents for several years. If the Department of Justice won’t comply with FOI law, then what recourse does a citizen have?
Meantime, instead of helping us get at the facts, the Department of Justice (DOJ) has attempted to block the federal lawsuit at every turn. For example, their lawyers improperly ignored our first notice asking that the appropriate U.S. Postal Service employee(s) appear to give testimony for discovery. The DOJ lawyers didn’t even go through the appropriate legal processes to oppose discovery; they literally ignored the motion entirely. If the nation’s top law enforcement body doesn’t follow the rule of law, what recourse does a citizen have?
If the Department of Justice wishes to establish that it had nothing to do with the forensically verified intrusions into my computers, it should help us get to the bottom of who did — instead of obstructing the effort. Above all, in the interest of justice, the Justice Department should want to identify who would have spied on a national journalist reporting on a number of international news stories impacting political officials. To me, there are few more chilling scenarios from the standpoint of constitutional press freedoms and protections in our society.
Deep gratitude to the honest patriots who have been sources for my case because they believe the government attack on a member of the free press is so egregious. (As the case progresses, it’s better to be on the side of the law than exposed as someone who knew but kept silent. Government whistleblowers will receive legal protection.) Contact for Whistleblowers, and for more information: Attorney Tab Turner 501-791-2277 Announcement of lawsuit Recent pleading in case denying DOJ motion to dismiss the lawsuit
Sharyl Attkisson is a five-time Emmy award winning investigative correspondent and recipient of the Edward R. Murrow award for investigative reporting. She hosts the Sinclair weekly Sunday TV program: Full Measure, and is author of two New York Times bestsellers, including the new book: “The Smear: How Shady Political Operatives and Fake News Control What You See, What You Think and How You Vote.”
NSA just released a touchy-feely Q&A, complete with a touchy-feely image of the NSA, explaining “the Impact of Section 702 on the Typical American.”
I shall now shred it.
First note that this document deals with 702? It should be dealing with Title VII, because the entire thing gets reauthorized by 702 reauthorization. That means Sections 704 and 705(b), which are used to target Americans, will be reauthorized. And they have had egregious problems in recent years (even if the problems only affect some subset of around 300 Americans). Sure, Paul Manafort and Carter Page are not your “typical” Americans, but abuses against them would be problematic for reasons that could affect Americans (not least that they could fuck up the Mueller probe if FISA disclosure for defendants weren’t so broken).
The piece starts by talking about how the IC uses 702 to “hunt” for information on “adversaries,” which it suggests include terrorists and hackers.
The U.S. Intelligence Community relies on Section 702 of the Foreign Intelligence Surveillance Act in the constant hunt for information about foreign adversaries determined to harm the nation or our allies. The National Security Agency (NSA), for example, uses this law to target terrorists and thwart their plans. In a time of increasing cyber threats, Section 702 also aids the Intelligence Community’s cybersecurity efforts.
Somehow, it neglects to mention the foreign government certificate — which can target people who aren’t “adversaries” at all, but instead foreign muckety mucks we want to know about — or the counterproliferation certificate — which can target businesses of all kinds that deal in dual use technologies. Not to mention the SysAdmins that it might target for all these purposes.
The piece then lays out in two paragraphs and six questions (I include just one below) the basic principles that 702 can only “target” foreigners overseas.
Under Section 702, the government cannot target a U.S. person anywhere in the world, or any person located in the United States.
Under Section 702, NSA can target foreigners reasonably believed to be located outside the United States only if it has a basis to believe it will acquire certain types of foreign intelligence information that have been authorized for collection.
[snip] Q: Can I, as an American, be the target of Section 702 surveillance? A: No. As an American citizen, you cannot be the target of surveillance under Section 702. Even if you were not an American, you could not be targeted under Section 702 if you were located in the United States.
Effectively, this passage might as well say, “target target target target target target target target target target target target target target target target target target target,”which is how many times (19) the word is used in the touchy-feely piece. The word “incidental” appears just once, where it entertains what happens if one of “Mary’s” foreign relatives were in a terrorist organization….[follow this link to read more!]
The cows are coming home to roost, finally. And, they are taking huge craps on journalism AGAIN.
It really suX to be “that one guy” or gal in Marcy Wheeler’s case, who is “way the [email protected] ahead of ‘the game,’ because then, you get totally gang stalked for decades as the NSA/FBI/CIA/FiveEyes/Israel backdoor butt buddies cornhole all of your communications, and send hidden subverter’s of law and justice into your every relationships in what is called colloquially “organized gang stalking.”
Or, as some have noted, “being accosted, assaulted, delayed, redirected, or robbed outright by the ‘Are You Jewish’ guys.”
All of these subversions are what the Association of Threat Assessment Professionals calls “the colliding parallel investigation, ”as they discuss in their crisis narrative formation, aka “advising law enforcement ” how to discuss this NSA-Israel spying on citizens, and the accompanying psychological operations waged covertly on yargeted persons across America who have no idea what hit them; and, that are causing mass homicides across America. Fifth column indeed- and talk about burying the lede! Pierre Omidyar has shown his fur, and the Intercept has been invaded by the Sterns Gang!
Ask James Risen about that-he’d probably disagree, but at least organized stalking is coming out of the woodwork finally, and then, use my search feature to find posts about how Tor is subverted and “captured” and “entrapped” directly, and always, BY THE NSA, which technically, gives every single Tor user ‘legal standing’to sue for section 702 spying on American’s abuses, because the Tor user can ‘prove’ that they are spied on PERSONALLY by the NSA Data Theft Pipeline Bandits.
Yup-privacy rape is a real thing, and emptywheel covers it like John Ashcroft on the statue of Lady Justice, but in a “good touch” way.
Unlike all of those vagina hat wearing morons that have taken over the Democratic Party everywhere for the sake of weeping vahjayjay’s, Marcy Wheeler focuses on “civil liberties for EVERYONE” instead of those who have a mysterious sacred Isis Temple where they get together and talk about “safe spaces and the sense of belonging when being used like “a Liberty Torch,” and then, march about the worlld in an endless killing spree, to the tune of the bankster’s as hey light the Constitution on fire, and then look around and cry “But there’s nothing to put the fire out!” havng burned down the Barn.
I myself prefer the analogy of being a Maxi-Pad for freedom, because I feel less cramped, and more free, but each to their own.
Here’s Marcy on the “Tor Exception,”which helps every single American to begin to wage a case where they can prove beyond any reasonable doubt that they have been personally targeted, and spied on:
Richard Burr has released his draft Section 702 bill.
Contrary to what you’re reading about it not “reforming” 702, the SSCI bill makes dramatic changes to 702. Effectively, it makes 702 a domestic spying program.
THE SSCI EXPANDS THE KINDS OF CRIMINAL PROSECUTIONS WITH WHICH IT CAN USE SECTION 702 DATA
It does so in Section 5, in what is cynically called “End Use Restriction,” but which is in reality a vast expansion of the uses to which Section 702 data may be used (affirmatively codifying, effectively, a move the IC made in 2015). It permits the use of 702 data in any criminal proceeding that “Affects, involves, or is related to” the national security of the United States (which will include proceedings used to flip informants on top of whatever terrorism, proliferation, or espionage and hacking crimes that would more directly fall under national security) or involves,
Serious bodily injury
Specified offense against a minor
Incapacitation or destruction of critical infrastructure (critical infrastructure can include even campgrounds!)
Cybersecurity, including violations of CFAA
Transnational crime, including transnational narcotics trafficking
Human trafficking (which, especially dissociated from transnational crime, is often used as a ploy to prosecute prostitution; the government also includes assisting undocumented migration to be human trafficking)
This effectively gives affirmative approval to the list of crimes for which the IC can use 702 information laid out by Bob Litt in 2015 (in the wake of the 2014 approval).
Importantly, the bill does not permit judicial review on whether the determination that something “affects, involves, or is related to” national security. Meaning Attorney General Jeff Sessions could decide tomorrow that it can collect the Tor traffic of BLM or BDS activists, and no judge can rule that’s an inappropriate use of a foreign intelligence program.
“So what?” you might ask, this is a foreign surveillance program. So what if they find evidence of child porn in the course of spying on designated foreign targets, and in the process turn it over to the FBI?
The reason this is a domestic spying program is because of two obscure parts of 702 precedent.
THE 2014 EXCEPTION PERMITS NSA TO COLLECT TOR TRAFFIC — INCLUDING THE TRAFFIC OF 430,000 AMERICANS
First, there’s the 2014 exception.
In 2014, the FISC approved an exception to the rule that the NSA must detask from a facility when it discovers that a US person was using it. I laid out the case that the facilities in question were VPNs (collected in the same way PRISM would be) and Tor (probably collected via upstream collection). I suggested then that it was informed speculation, but it was more than that: the 2014 exception is about Tor (though I haven’t been able to confirm the technical details of it).
NSA is collecting Tor traffic, including the traffic of the 430,000 Americans each day who use Tor.
One way to understand how NSA gets away with this is to consider how the use of upstream surveillance with cybersecurity works. As was reported in 2015, NSA can use upstream for cybersecurity purposes, but only if that use is tied to known indicators of compromise of a foreign government hacking group.
On December 29 of last year, the Intelligence Community released a Joint Analysis Report on the hack of the DNC that was considered — for cybersecurity purposes — an utter shitshow. Most confusing at the time was why the IC labeled 367 Tor exit nodes as Russian state hacker indicators of compromise.
But once you realize the NSA can collect on indicators of compromise that it has associated with a nation-state hacking group, and once you realize NSA can collect on Tor traffic under that 2014 exception, then it all begins to make sense. By declaring those nodes indicators of compromise of Russian state hackers, NSA got the ability to collect off of them.
NSA’S MINIMIZATION PROCEDURES PERMIT IT TO RETAIN DOMESTIC COMMUNICATIONS THAT ARE EVIDENCE OF A CRIME
The FISC approved the 2014 exception based on the understanding that NSA would purge any domestic communications collected via the exception in post-tasking process. But NSA’s minimization procedurespermit the retention of domestic communications if the communication was properly targeted (under targeting procedures that include the 2014 exception) and the communication 1) includes significant foreign intelligence information, 2) the communication includes technical database information (which includes the use of encryption), 3) contains information pertaining to an imminent threat of serious harm to life or property OR….[follow this link to read more about how the Fabulous Empty Wheel is one of like, ten journalists around the world who has her head screwed on right] UPDATE: As of today, the Congress has extended the FISA bill, and section 702, which is, and has been, collecting data on American’s since 2001, and through “back door searches” using the data they gain on Americans to further target individuals with many un-Constitutional practices ranging from opening ‘investigations’ and then, hiding the fact that these investigations were started at the NSA; to outright “mind control and influence operations,” and much more as yet disclosed in public.
Or-what actual targeted individuals have been telling us ALL ALONG (as opposed to well financed disinformation and misinformation campaigns like these here.)
The good news however, is that we know with certainty that due to the “Tor exception” any and every American who uses Tor now has de minimis legal standing to challenge this collection. See this post, this one and this one for evidence and suggestions for lawyers and others who wish to build a case of that.
Then, have a look at the Guide to Government Hacking, at the top of ROGS, which was written by the ACLU, the EFF, and the NACDL for civil litigators and criminal defense lawyers in cases where government hacking is likely-which is every and any case, retroactive to 2001, now that we know with certainty that we are indeed being spied on every day.
Lastly-some 420,000 people in the US are spied on EVERY DAY, and we know this with empirical certainty because the NSA targets Tor users in the US, specifically. Here are those statistics from Tor, the Onion Browser-and another metric whereby we can gauge the veracity of the stories of those who claim they are “targeted indviduals:”
And, today, I watched the sun set on actual liberty-the time is drawing near for all of us to pull the wires on the grand internet wiretap. But how to do it?
As many have noted-legitimizing the complaints of targeted individuals is the key. We must cut the group in two, and talk out loud about intelligence level targeting, and leave the “DEW’s and aliens” crowd out of it. And we must separate and remind the agencies that in fact, the theater of operations does NOT include our minds, without informed consent.
And Aaron wasn’t the first, nor will he be the last to be targeted by a corporation in hidden and nefarious assaults on the individual. And like many before him, being “one of those” kind of people who literally slept in closets, and avoided the limelight and its attendant political confusions, I suspect he was overwhelmed when he saw how evil it all is “out there,” and succumbed to pain and sadness.
Well, he wasn’t the fist, and certainly won’t be the last “targeted individual” to undergo such a horrified awakening, and as we see tie and again, corporatism seeks to own you, control you, or destroy you, failing to otherwise neuter your humanity.
So, let’s look back at the words, and actions of anoher Targeted Individual who was beyond reproach, and whose case is well known among those who have also been targeted by the MIC/PIC/DVIC™. And I apologize to any living relatives of Dr. Moss David Posner for weaving his tale into my own™, but I believe it is useful to remember those who have passed, in times when their lives have new, and positive meaning to others, as inspirations, or as examples of courage.
So, as my casual readers are likely unaware, and my Regular Readers™ are well aware, I have incurred the wrath of the Pharisee’s and their hench-demons in the Hate Industrial Complex.
Here is a snapshot of that-My Statistics™ from yesterday:
So-I watched my statistics for about an hour yesterday, and someone in the UK would read a post, and then someone in the US would read a post, and so on. Like as if they were playing ping pong (Hi Doug!™). But this is the effect my writing tends to have on people, because it is a direct challenge to “official narrative.” As we see, time and again, official narrative is itself a total crock of sh!t.
SO, for those who might have come here searching for information about Dr. Posner, who was a targeted individual, it helps to understand the difference between anti-semitism™, the Brand Name™ of the Hate Industry™, and actual anti-semitism, where those inn the business of hate target Jews and others who are vocal, political, and who stand against their Eastern Bloc Slavery Schemes™.
Have a look at Dr. Posner in his own words, and try to see if you can find “patterns” of who targeted individuals are, and why they are targeted, and who targets them. But very importantly, notice that I maintain a balance between my personal views of those who profit from “hate”-and that hate defined by the hate profiteers themselves-and the views of even Dr. Posner, who is at odds with Noam Chomsky, who I cite in my example page on anti-semitism.
Here is Pozner on Chomsky (who I merely use as a reference to how confused the rhetoric of “anti-semitism” is, and how profitable, for a select group of “professional haters.”).
Here-Google this phrase in its entirety, no quotation marks “the self-indulgent and auto-congratulatory Noam Chomsky, arguably one of the most virulent anti-Semitic Jews you can hope to encounter.”
Then, have fun tracing the actual quote- I just don’t have time today to look into a decade old smear of some kind or another.. But here is one version of where it appears:
“…the self-indulgent and auto-congratulatory Noam Chomsky, arguably one of the most virulent anti-Semitic Jews you can hope to encounter. His endless diatribes on what he wants you to believe to be the horrible treatment of the Palestinian people at the hands of the cold-hearted Israeli oppressors are unparalleled in literary hyperbole. Unfortunately, he doesn’t offer one shred of evidence to back this up. He invites you to join him, the consummate Jewish intellect, in collective snobbery by simply accepting (because you are so frightfully well-educated as he is) that what he says is so. I have yet to see one single person stand up and ask, “Dr. Chomsky, what is the evidence for this?” Should this take place, hopefully there will be a paramedic team standing by to resuscitate him.”
Moss David Posner, July 3, 2006
Posner, a medical doctor, a critical thinker, a prisoners rights advocate, a compassionate release proponent, and one who knew how complex the treacherous zionist-dominionist collusions are: “as happened with the Middle Eastern Jewry at the time of the establishment of the state of Israel, when the Zionist government encouraged the Arab governments actually to coerce the Jews to flee, it is entirely possible that the Bush and Olmert governments wish exactly the same thing for American Jewry.”
So, as a victim of actual anti-semitism as opposed to Hate Industry™ anti-semitism, said this some five years before he died (he passed in 2011, just as the DHS was ramping up domestic surveillace, and working with UK IC to target gamers in Gamergate, and “improving” mass domestic wiretapping schemes that have spanned decades):
September 7, 2007 Rally at the Capitol, Sacramento
Remarks made by Moss David Posner, M.D.
My name is Moss David Posner. I have been a physician with the California Department of Corrections for almost five years, before I was forced out. I’m putting my burden down now. I’m out of the picture, but I want to say a few things to you:
Here’s the threat: AB 1539 defines permanent incapacitation, which is the logical first step in compassionate release procedure. If this is diluted down, which appears to be what is happening, virtually no inmate will be able to meet the standard for compassionate release. AB. 1393, was to have put teeth into requests for disclosure of public records, has been gutted by eliminating the order for punitive damages for any agency which refuses to cooperate with lawful requests for records,
If there is—literally—no way out, then the seriously ill inmates are boxed in between being kept in prison, on one side, and being denied appropriate medical care, on the other. You have to push back on two fronts: first, the demand for the humane alternative of release of terminally incapacitated, and second, the demand for the needed care for everyone, especially those who are seriously ill.
In order to help you with the medical end of this dilemma, let me tell you why any hope of improving the medical care of the seriously ill is in such a mess as matters now stand.
Here are my credentials: I started out as a contractor, a staff physician at Pelican Bay. I went to Salinas Valley, where I was subsequently appointed the acting Chief Physician and Surgeon at Salinas Valley State Prison. From there, I was transferred to the Substance Abuse Treatment Facility in Corcoran as the acting Chief Medical Officer. From there, I then transferred to Corcoran-1 and asked by the then-Chief Medical Officer Dr. John Klarich to be the Chief Physician. When I complained about an anti-Semitic death threat, on paper and as defined by a yard captain, my appointment to the chief physician job was cancelled. Dr. Klarich told me this to my face. I have won round one of an action against the Department, and now am waiting on the result of an appellate hearing, which of course the department insisted on.
You see—that was my crime: trying to help inmates.
Let me fill out your picture of what really happens in the medical department.
I ran into brick walls everywhere I went. I worked 14-hour days at SATF, arriving early and not leaving until the restaurants in town closed. I spent hours each night speaking with distressed relatives, and doing whatever I could to make life more bearable for these unfortunate men. I kept detailed files on my computer so that I could have the information at my fingertips should any attorney called—and call they did. They deeply appreciated my help. I even got compliments from the prison law office, and they were upset when I was transferred.
You would think that all this would be appreciated and encouraged. You would think so—but you would be wrong. The California Department of Corrections doesn’t want to help their doctors give quality care.
I cannot count the number of times our requests for consults, requests for outside assistance, requests for equipment were ignored, even laughed at. Our orders were ignored. Some Correctional officers would just ignore appointments with us and with outside consultants. Officers would routinely throw out appliances desperately needed by inmates, when they transferred to other facilities. Orders for important treatments were ignored, and many cases just cancelled.
Read more here about his stance against domestic torture of the elderly, and his PeacePink page here, and here is one of his articles about thought control via disinformation”How to Control Americans—thought control, mind control, disinformation and other naughty things” and how toxic propaganda derived from the heyday of William Colby styled CIA experiments, and Russian “mind control” and brainwashing, aka”Pavlovian conditioning” is taking over our media, written in 2006.
And, here is United States of America, Appellee, v. Moss David Posner, Appellant, 424 F.2d 181 (9th Cir. 1970), where the government decided he was not a “genuine” conscientious objector. Related Stories:The CIA owns everybody of any significance in major media and mind control via artificial intelligence programmed by FiveEyes spy agencies is real-and in use EVERY DAY online, via captology, and IC programs like Moonshot CVE, and standard “coercive persuasion” What is Brainwashing, with pictures, from How Stuff Works
Then, it helps to understand that those who are “in the business of hate” are themselves actual anti-semites™ and worse-unimaginably worse, than even Hitler™; and that all or most talk of Hitler is, in the first place, merely coded speech that distracts the listener away from the fact that those who cry wolf the loudest actually are Worse Than Hitler™-and that they are the descendants of those who built Hitler into the horrible boogieman that he was. SO, while Hitler had power for 12 years, the One Percent and their enablers have hid their atrocities across the entire world, which has lasted for 3500 years or or so.
So, I have documented a distinct link between crisis PR narrative control and how organizations like the Association of Threat Assessment Professionals (ATAP) has deliberately blurred the line between so-called terrorism and domestic violence, utilizing what they call the,”colluding parallel investigation,”and advisinglaw enforcement, LEIUs, and Infragard community policing elements to wage pre-emptive, multiple and never ending investigations on targets;and how auto-antonymal language and double entendre are used in “influence operations”which the ACLU has also noted; and how alternative media is under attack from the “deep state” and it’s hand maidens in civil conspiracy, the psychologists who gaslight TI’s, but who, by proxy, are also those who are causing mass shootings, suicides, social isolation, political corruption, and more.
I have also repeatedly documented the toxic blur between security contractors and police functions that operate in an “intelligence capacity,”as we see a link between the Yellow shirt security contractors and the Stephen Paddock shooting, as well as documented links between Omar Mateen and G4S concurrent with Mateen being “on the FBI radar,” directly because his father is an FBI asset/informant,but how these literally conspire under the ATAP “frame”work and also wage hidden terror and morality/coercion/social conformity/entrapment/social engineering campaigns “in darkness,” and without oversight.
It is these latter subjects who are what can rightfully be called the modern equivalent of Nazi Brownshirts, or Stalinist purge agents, or Israeli Sterns gang members, and the ‘whisper campaign’ is the tactic both groups used to cause strife in local populations. All of that whispering, starts in database abuse, and BOLO’s of various kinds.
In case you don’t recall what a BOLO is, have a look here especially, then here, and here.
Then, have a look at this Wiki site where the excesses of the unethical post 9-11 “information sharing environment” as we see security industry are documented in one specific community, Aspen Hill Maryland, as an organized gang. This Wiki has valuable information, but also some classic total time wasters like the “”Old Men from Out of Town” story started by private detective David Lawson, which, while interesting in the way that other locker room talk is interesting, has no merit in our Constitutional crisis era of total system failure.
From Aspen Hill Wiki:
Local law enforcement has a very effective and legitimate approach to dealing with localized crime problems. This is “PCAT” or “Police Community Action Teams” programs, in which officers from other areas are given significant opportunities to accrue overtime hours, by concentrating forces in one or a few beats. This effectively floods the streets with both uniformed and plainclothes officers.
Some Organized Stalking groups are well aware of this, and they will occasionally flood an area with their own staff during, or more commonly immediately after, periods of PCAT activity. They can expect cooperation from grateful shopkeepers, mall security, and other property-management types who are allowed to believe that these individuals are operating under, or personally possess, police authority. It’s possible that some persons affiliated with such organizations are in fact police officers, or more likely were at one time police officers. Yet the vast majority of these “Fake Cops” are in fact fake cops. Quite frequently they work with, or are part of, “security gangs”.
Some commercial facilities such as shopping centers or office campuses may be unable or unwilling to afford the level of security available through legitimate private security services. Some such may be approached by organizations offering their services to “help clean up the place”. These organizations are, effectively, unlicensed security officers and also often operate as private investigators with no permits. Or, they may possess permits or licenses which do not apply to this sort of work. For example, Bounty Hunters are in fact law-enforcement and may have special permits… which do not apply to any duties outside of seeking bail jumpers. Yet neither the property managers nor the people “apprehended” (usually beaten, intimidated, or frightened away, instead) by these individuals or groups are quite cognizant of the fact that these persons have no legitimate special authority nor license in these places and situations.
Certain specific shopkeepers or property-management people are quite cooperative with either “fake cops” or “security gangs”. To such groups, such enablers are golden. In the rare case that the “fake cops” or “security gang” operatives feel that they are at risk and choose to hide their presence rather than risk the exposure of their operations, such shopkeepers or comparable staffers can act as eyes and ears for the fake cops and/or security gangs. Indeed, given enough time in place, and they may come to manage them, if not in exactly a capacity of being a management-level employee of a corporation or company. Yet they can direct the operations of such organizations, in effect, picking victims.
What makes the documentation of “organized gang stalking” significant in this case is that we see how elements in policing trickle information to security contractors, and “cop wannabees” who then form literal gangs, and use technology and tactics of OGS to seize turf, and “run neighborhoods,” in the disguise of authority; and this, which is a recipe for corruption.
Then, take a look at how “security guards” were an integral feature of “narrative control” in an ever changing story about the Las Vegas shooter Stephen Paddock in order to understand how similar mass shootings are to activities in the Hitler era with Brownshirt marauders corrupting Democracy; and other periods of history where the Constitution of a nation was suspended, diminished, or eradicated entirely.
So, the Maryland Wiki from Aspen Hill has great information, and names some names to some degree, and can help point the researcher, the psychologist, the criminal defense or civil attorney into the right direction in pursuing cases against gang stalkers.
As I have noted, my personal case of OGS began distinctly in 2003-4, and progressed throughout decades, and went into full swing in 2008, and I worked with great lawyers, and began and prevailed in a lawsuit that blossomed to five other independent litigants to literally take a cowardly security contractor OUT OF BUSINESS. As you can see, I am taking my time this time around, and making sure I get it right for everybody.
Without coincidence, 2008 is also when the Department of Homeland Security, working under the “intelligence sharing” platforms where the DEA/FBI/DHS/CIA waged hidden database backdoor searches across agencies, and began to target individuals with ferocity, and devoid of any due process, or even anything resembling due process protections.
In other words, systemic denial of substantive due process became the norm in 2008, as well as a host of other institutional practices that require a separate essay, but simply put: information sharing became indiscriminate, political, slanderous, and frequently sought targets that refused to participate in such a social scheme, which is well documented all over the web as one TI after another becomes targeted with “hidden operations” of many kinds.
Have a look at another of my encounters with hidden internet operators in 2011, which was another big year for DHS backdoor black operations. Like Rose McGwan and tens of tousands of others, we can begin to envision how civil conspiracies of deprivation of rights are traceable to both private contractors, who can be sued for actual damages, and the DHS which can be sued for complicity and reform, which won’t come easy as major senators sitting on the intelligence committees continue to derive substantial kickbacks under the watchful eyes of the FBI and other agencies.
But because the federal government has managed to skirt color of law claims, due process claims, ad substantive due process claims bu claiming state secrets, FISA exceptions, section 702 loopholes and more, I will leave it to actual lawyers to make the larger arguments.
It is at this point, beyond a reasonable doubt that the government acts pre-emptively in these cases with actual prejudice, maliciously, and with selective enforcement, and that the government has excercised bad faith by using back door searches and OTB methods. But for the lay reader, here below is basic Due Process, 14th Amendment where the federal scheme has shifted the burden of proof to the citizen to bring claims:
Every Due Process Clause analysis begins with the question “Has the government deprived some person of life, liberty, or property?” If there has been no government action, or if there has been no deprivation, then there cannot be a Due Process issue; substantive or procedural. Substantive Due Process issues involve the states’ power to regulate certain activities. Procedural Due Process issues involve an analysis of the procedure required by the Constitution when states seek to deprive people of life, liberty or property.
While the majority of persons targeted with these hidden schemes that are waged from behind the DHS and other agencies target low status, low income individuals, a savvy civil or criminal lawyer will see the merits of pursuing redress in cases of OGS because there are other venues whereby proving substantive due process has been occurring on a massive and industrial scale, as we are now faced, literally, with predatory “law enforcement” that is actually not enforcing any laws, but rather, seizing property in record numbers, framing suspects, and using intelligence agency tactics in local communities to create the appearance of crimes instead.
So, OGS has morphed into real estate red-lining, and a CIA styled asset forfeiture racket; but in many other ways too. ANd here is a case from a local community where a citizen has documented other real estate related claims, as did Bob Krlich.
Up until ROGS, few would risk speaking out about ths form of corruption, and worse, the actual language didn’t even exist in many cases, which is by design of the corrupt, and the corruption itself. Look through ROGS foor more links to the dialectic itself-search for tags with “linguistics” and “para-language” and “semantics” and “jargon” for examples.
One of the chief and main reasons this is allowed to continue is because “security gangs” and “private contractors” are not held accountable to the public, and as we see on an industrial scale, the public doesn’t even know what any of the many “hidden operators” online are even doing. And how can you litigate for a client, or in a class action lawsuit of the proof of such a diabolical state-level brownshirt scheme remains under authoritarian control, disguised by “state secrets” and other unchallenged privileges?
Well, it helps to have a starting point, but as we see pre-ROGS, there was a dearth of data that verifies OGS as an actual complaint. Fightgangstalking.com is one of the few who has stuck with the facts, and occasionally whistle blowers step forwards; and there are some highly credible online testimonials and a few court attempts like the case of Jeffrey Kantor, but other than that, where to start?!
So-start with the private security contractors and their chain of oversight. and work your way up, combined with other data that proves patterns of state conduct, substantive due process violations that stem directly from the DHS scheme, and the hidden data about back door searches and the electronic trails they leave that became available since Edward Snowden and corporate collusion at the database level. Further Reading:What is substantive Due Process?
Due Process Clause:
The Fourteenth Amendment reads, in part, that no state shall “deprive any person of life, liberty, or property, without due process of law.” This applies to the states and to local governments. The Due Process Clause of the Fifth Amendment applies to the federal government. Most Due Process issues involve state laws. Common Law:
The two sources of law are statutory law and common law. The common law is that body of rules and principles developed through the courts over time. While legislatures often overrule an area of common law by enacting a statute, and while courts often overrule an area of common law by refusing to follow it further or by handing down a decision which makes use of a competing principle, the common law carries with it the force of law and is generally binding on courts within that jurisdiction. Burden of Proof:
In every case one party or another has the onus of demonstrating the truth of some fact or another. The party who must so demonstrate is said to have the burden of proof. In addition to who carries the burden, the burden can be of different loads. For example, in a criminal case the prosecution carries the burden of proof and must prove every element of the crime “beyond a reasonable doubt.” In most civil cases the plaintiff generally carries the burden of proof but must prove every element of her claim only by “a preponderance of the evidence,” which is far short of “beyond a reasonable doubt.”
The reader might have noticed that gang stalking is gaining credibility as a valid complaint online, and calling it by its proper name: counter-intelligence and police stalking
,as we see in this example where a couple reporters and sociologists held a forum about “the stalker state.”
And, we also see that forums like Reddit and main stream news have begun to cover stories that walk the fine line between covering gang stalking as what it is “a rampant abuse of counter-terrorism funding and propaganda, and high policing as pretext to target the ‘usual suspects:’ the poor, the disenfranchised, the vulnerable, and the marginalized; the dissident voice, and the non-ADL infiltrated activist.”
And the main stream news is aware that they have been asked to put a “spin” on complaints of gang stalking that make it to a court room or two, because their fakenews depends upon near-mythical badguys, and wolf’s at the door that can be relegated to delusional complaints. All western Jewish-Christian-Abrahamic societies work from that level of fakemyth in order to substantiate and affirm their story telling basis based in superstition, and that superstition backed by actual human sacrifices (the Jesus myth is the classic example.)
Here is a case of this EXACT media framing in action, as we see a guy involved in drugs, and murdering another guy, just after he gets a “strange phone call about gang staking.”
Notice that the phone call is described as a “prank,” which seems to require more evidence, and more exploration, because the ROGS thesis holds that it was actually a deep state, or OTB black ops police tactic, or involvement of OTB snitches; or who were directly connected to Fusion Center tracking, and other elements .
In other words, ROGS is saying that this crime-like so many we see today-is possibly and likely the direct result of state leave actors using the obscured tactics of counter-terrorism tactic of gang stalking, and it CAUSED or CONTRIBUTED to a homicide (and keep in mind that the ROGS purpose is to destroy the ability of LEO’s to continue to mask bad behavior, and use illegal tactics and methods while cowering behind the thin veneer of counter-terrorism).
For reference, I have highlighted the relevant text, or linked it to other ROGS posts that discuss how gang stalking tactics affect cases “in darkness”and note that one of the metrics of measuring the ineffectiveness of counter terror gang stalking is that actual homicides are carried out, and many of those are a direct result of this neverending harrassment of targets, as we saw in the Virginia Beach shooting, Ian Long, Mathew Riehl, and many others:
[Prosecutor]Smith argued that the level of violence indicates it was not self-defense.
“A picture can be worth a thousand words, and I think this picture says a lot,” Smith said as he flashed a grisly photo of Maulding’s body across a large screen. “He beat him to a pulp.”
Reichow’s defense attorney, Sean Downs, argued that there are two sides to every story and “sometimes three, four, five. It’s not always going to fit together perfectly for you,” he told the jury.
What the attorneys do seem to agree on is that Reichow and Maulding had been hanging out earlier in the day. They were picked up by another friend, Anne Tanninen, from Maulding’s house and went to a storage unit that Tanninen had rented.
The trio was inside the storage space when Tanninen received a strange phone call, Smith said, from someone talking about $5,000, drugs and picking something up. He said both Reichow and Tanninen shared paranoid beliefs about the world, and they thought they were being “gang stalked.” Gang stalking can include being harassed by an organized group of people. Up until the call, which turned out to be a prank, nothing was out of the ordinary, Smith said. The trio were unloading some items at the storage space, and Maulding was toying around with a bat inside the unit, he said.
Tanninen became upset after the call, however, and started arguing with Reichow, Smith said. She and Maulding confronted Reichow about possibly being associated with the call.
Downs said Maulding started taunting Reichow with the bat, saying “Come here, boy. Come here, boy.” Maulding, who had been drinking earlier in the day, was still intoxicated and threatened Reichow, Downs said.
Or, perhaps the reader today has noticed that Big Tech like Facebook is being indicted BY IT’S OWN CORPORATE OFFICERS as sick and exploitative manipulators of public discourse, AND psychological processes that amount to mind disruption.
Here-from yesterday’s news, is something that I wrote about many months ago, before the MSM picked it up-yet another Facebook CEO/investor/developer has come forwards to blow the whistle on the practice of manipulating dopamine levels in our brains. Keep in mind that their investors are largely drawn from the jingoistic Jewish-Christian fold, for whom no excess of cultic or chemical abuse of children is ever enough to satisfy their bulimic hunger):
“CHAMATH PALIHAPITIYA, A former Facebook executive has spoken out against the social network he helped to create, saying it is ‘ripping society apart'”
He cited an incident in India where hoax messages about kidnappings shared on WhatsApp led to the lynching of seven innocent people, according to reports in The Verge.
During his talk, Mr Palihapitiya called out not only Facebook, but Silicon Valley’s entire system of funding.
He claimed money pumped into the region would be better spent addressing problems like climate change and disease.
Speaking to an audience at Stanford Graduate School of Business, Mr Palihapitiya said: ‘I think we have created tools that are ripping apart the social fabric of how society works.
‘The short-term, dopamine-driven feedback loops we’ve created are destroying how society works.
‘No civil discourse, no cooperation; misinformation, mistruth.
‘And it’s not an American problem — this is not about Russians ads. This is a global problem.’
This is not the first time that prominent figure at Facebook has spoken out about the social network.
For those of you who use such products, my heart goes out to you, and I hope you can read through ROGS here and find “the help you need” to possibly begin a class action lawsuit that will provably be bigger than Big Tobacco if we do it right.
But I haven’t personally used social media since 2005-6, and have never used the social network’s except AS investigative tools, for reasons that I will write about later (it started with total hacking of all my email and academic accounts for nearly a decade, between 2003-13).
But it will take a lawsuit against Facebook and other social media which will expose the multi-headed hydra’s and other monsters that our governments have been pointing at our minds in a direct webterrogation of our personalities, our intentions, our hopes and dreams-and a direct influence operation on our choices, and that, through direct manipulation of our free will, via dopamine.But I would go one step further, and state that the internet itself, weaponized by the FiveEyes, has literally designed this effect.
And certainly, “they” have been literally targeting SOME people differently than other people. Mass shooter Devin Kelley’s Facebook was webwashed after his rampage. Why is that?
Facebook executives admit deliberately manipulating dopamine levels in children to create “positive feedback loops.” Is it possible then, that they also help or enable negative feedback loops? I think Devin Kelley and many other “terrorists” mass shooters are examples of that, as I have studied this since 2005, being fully aware that the internet is “interactive” without our informed consent.
So, the War on Terror is ACTUALLY a war on ideas, and the people who have them-it is a cover operation for mass mind control. Literally using dopamine manipulation and propaganda tactics that other Facebook executives have called “brainwashing on a level that Edward Bernay’s could never have imagined as he powered Hitler, and Big Tobacco.’ But it is also an assault on individuals, and many of thse individuals that LEO’s and all the counter-terror hero’s can use as unpaid HUMINT to lead them to cases that they otherwise could NOT access.
And worse, because of the egregious and outrageous hidden mechanisms, and unchecked, un-monitored use of tactics, and toys and tools of OGS beyond the knowledge of courts of law, we see that citizens are robbed of free will, and instead, are used as unpaid labor that drives federal funding initiatives. This is what “high policing” is and how it has affected society-and individual cases-at large.
Again, do your own research, but there is an over-whelming bunch of evidence and data is increasing that indicates this is true. While George Orwell got it right about Big Government, he missed the part where government would use corporations as front companies, like any CIA operation ever, but this time, it is 17 agencies waging the ongoing Operation MHCHAOS, with augmented internet that targets “bad ideas” and “PRISM’s” and “XKEYSCORES” of words, mind mapping, and SOCMINT profiles long before the activist, dissident, whistle blower, or others, sometimes criminals, get targeted for “disruption.”
And, failing THAT, we now see that “destruction” soon follows, as in the case of the mass shooters, homicides, petty crimes, and more.
The only thing that can be said at this time about the “delusion” of gang stalking, and backed with ROGS Predictive Analysis, and empirical evidence is that psychologists like Dr. Lorraine Sheridan, et al. also share funding sources, and utilize ATAP damage control narratives, every time another layer of this un-constitutional policing scheme is revealed.
When Gamergate happened, few knew that it was a psychological operation that targeted men with the slightest shred of intellect, or a willingness to speak up about a vast and actual conspiracy: the well organized, coordinated and actual conspiracy of the FiveEyes and GCHQ the NSA and the CIA to spy on its on citizens without substantive due process protections.
It is said that only scoundrels and cowards use the flag as a refuge, but less said is that murderers and actual rapists and actual pedophiles and actual terrorists and actual sh!tbags hide behind women and children. Even fewer knew it was a ‘high policing‘ coordinated effort to subvert our democracies via criminalizing pure speech in the disguise of wearing DVIC supplied high heels.
And what few men now today is that this could give them standing to sue the Panoptical Hydra of domestic spies and the NSA itself for civil rights violations, if they know where to look for the data.
They spied on us so badly, and so extremely, that some noted they were spying on each other as boundaries overlapped, and eventually they were forced to wage a huge counter-narrative to domestic spying that was tearing our country apart along gender lines; and those lines arbitrarily drawn by massive privacy rape.
Yup-that’s what Gamergate was, and still is for some, who were gang stalked in that era. And these cowards did that while hiding behind the skirts of “it’s for the women! Be nice to girls and women! Bad men versus good men!” and all that base intellect oriented pap.
And the Domestic Spying apparatus was integral in gang stalking men afterwards. Most people simply didn’t have this information at that time. And that’s how the deep state has now socially engineered the current whisper campaign that is taking men out of office, and woen are hed, somehow, as unnaccountable and without agency in their actions. Here is how bad Gamergate was, and here is what you didn’t know ten about the deep state, which some of us, more than others of you were buried under at the time:
Without men like Edward Snowden to come forward, the insanity of rule by the “deep state” and it’s many white knights in cowardly online bastions of secrecy and working white knight miracles to “save the women and children” in due process raping “darkness” is not only anti-democratic, but it forms the basis of the worst elements of gender-war relics: the ape-like male/lesbian in high heels when he/she needs to save a damsel in distress, and the pseudo-feminist warriors who eat babies for breakfast from seeing what rapacious DVIC slatterns they really are.
However, because most of the world woke up to how American agencies work with British agencies to subvert the letter and the spirit of the law via “high policing” few knew as well that this entails speech policing, and that, mediated by “white knights,” some of whom actually got awards and medals from the Queen herself for stalking men, or encouraging harm to men via OGS.
And keep in mind that these same men are the same that work with women(or ‘in their name’ and all that other chivalric crap) to make this happen to young boys.
As we see repeatedly, high policing is itself the the limitation of male opportunity BY policing initiatives, and cultists are involved at many levels. This is so normalized that these signal to each other using this type of triangle and this type of badge. Abusing young boys for the ‘honor’ of women is the very root of a Jewish-christian culture.
But this guy Matt Forney talks about Gamergate better than I can, without the atheist humanist bent:
If there’s one thing that the Zoe Quinn/Gamergate scandal has revealed, it’s the utter hollowness of the left’s refrain of “actions have consequences.” For the past couple years, leftists have defended their witch hunts against conservative/non-leftist figures with a number of Pharisaical refrains:
“The First Amendment protects you from GOVERNMENT censorship! If a private company wants to fire you because of something you said, they have every right to.”
“The right to free speech doesn’t protect you from the consequences of your actions.”
“You have the right to say whatever you want, and WE have the right to call you an asshole.”
This defense has been employed in every single lynch mob sent after a public figure, whether it was Pax Dickinson, Gavin McInnes or Donald Sterling. The left has even come up with a mocking term to describe people who argue against them: “freeze peach,” which may be the most juvenile, Orwellian terminology I’ve ever heard. It’s certainly a bit odd to see the left defending the right of free association all of a sudden when they’ve been working to dismantle it for the past fifty years with the Civil Rights Act, gay marriage, “anti-discrimination” laws and the like, but their logic makes sense on the surface… right?
Wrong. ….follow this link to learn more
UPDATE: Since I chronicled the story below, the web has been scrubbed of the story mentioned herein, shortly thereafter.
That story was about how Canadian intelligence agencies selectively utilize internet and MSM, to create cross-talk (feedback loops ) to speak with mainland Chinese police investigators, while pursuing a suspect, and a gang of suspects.
There is no difference between actual gang stalkers and actual gang members. Zero- Cero. Zip. Zilch. Nada-except for the federal/state paycheck. And the “high policing” basis of criminal morality, of course.
Oh-that, and the fact that official corruption is better financed, far more brutal, operates with total impunity, and it’s illegality and mercenary scope far better hidden from the courts (as we see with the Section 702 and the FISA charade/masquerade ball), because it is easy to pick easy targets and then, drag them before a judge, and say “look! We got a badguy!” because this serves the social purpose of “security theater,” or, what has been referred to in the gang stalking dialectic as “street theater,” finalized by the three well known and often repeated phrases: gang stalking “ends in institutionalization, incarceration, or suicide.”
Related Google Fun: “Bush phone and gang stalking” returns 514,000 results “Obama phone and gang stalking” returns 641,000 results. “Trump phone and gang stalking” returns 750,000 results. Is organized gang stalking just a phenomenon, or is it the emergence of a social contagion? Emergent norm theory predicts that gang stalking is becoming a new normal-and that’s not good for democracy.
The Alcoholics Anonymous variant is ” incarceration, institutionalization, or death,” and in the online dialogues of gang stalking, we can also find links between it and M. Scott Peck, a Catholic psychologist,and a debunked ponerologist. So, these strange and limited outcomes of organized gang stalking ALSO and without irony, derive from the Cult of Bill W., and AA’s across America.In a tenuous way, this links OGS directly to the FBI, and the curious rise of gang stalking complaints.
It cannot be missed that this is a direct dialectical link to specifically James Comey’s FBI, which ran from 2005 until his firing in 2017 because he had turned the agency into a political police that J.Edgar would only drem of, because they didnt have internet drag queen porn durng Hoover’s reign, which would have kept him very busy-possibly TOO BUSY to wage war on American’s.
And, this AA phrase is also linked directly to Mr. Comey’s chosen buddha, Reinhold Niehbur, who is said to have written the serenity prayer(although a few spurious crickets in the head of Bill W.’s Protestant/Catholic universe dispute the origins-remember; ALL WORDS and SYMBOLS ARE SECTARIAN, and POLITICAL in “WESTERN” JEWISH-cHRISTIANITY)
Sure- real gangs sometimes use cell phones and computers to stalk, harass, and harm people. But keep in mind that all of THOSE phones are monitored by any of 17 agencies here in the US and hundreds of others in the FiveEyes scheme AS CRIME HAPPENS. Then, the “goodguys” sweep in and grab all the cash from the “badguys”, after pre-emptivey pre-targeting real estate after pre-assessing and pre-apraising and predictively pre-empting crimes that could/might/would/will happen in or on or around a house, aka “real estate;”and that just after they have manipulated a rental property via a Fusion Center, or manipulated a landlord from long distance-Virginia to Minnesota for instance-and filled the property with drug dealers and sex offenders (Google “real estate” and “gang stalking,” or “John Lang Fresno” and “sex offender”).
Tell ya what: if John Forbes Nash didn’t sound nuts BEFORE he met those guys, he sure did AFTER he met those guys. I mean- no gang has anything on this new federal-state-local scheme. The goodguys lost and this is all that’s left of the shredded democracy we all once trusted to rely upon due process. It’s enough to make you wear shoes on your head.
Moving on now: some have at times confused the terminology and blurred the line between “organized criminal gangs” and “organized gang stalkers,” which would be a false binary. As we see time and time again, the Hegelian dialectic has demanded that we choose an “us versus them” paradigm. It also makes us look stupid, corrupt, short sighted, and weak.
As I have noted, I am biologically and psychologically unable to think that way, whereas some 98% of American’s and others from cricket headed cultures think that way by default. I admit: it’s a personal flaw. A fault of my birth, also in unfortunate circumstances in a Catholic-Jewish cultureruled from hidden mechanisms and hidden activity from a sky god who sits “in the cloud.”
Related Stories: What is the FBI’s “bizarre” method of off-the-books harassment aka COINTELPRO 2.0? It’s called a “disruption” campaign. And according to byline.com, these are “How the U.S. Federal Bureau of Investigation is violating the liberty and privacy interests of Americans by using extra-judicial investigations designed to never lead to a formal criminal charge.”
But the problem with that type of thinking is that once “we” adopt it (whoever “we” are on that day/that election/that locality), “we”become gangs ourselves, and thus, there can be no actual morality, and no actual higher purpose. And for me at least, the war on terror has actually been a war on ideas, and the people who have them, because the predatory structure of highly institutionalized and RITUALIZED illegality (the inter-connected tribal-religious-sectarian FISA/Section 702/Fusion Center/FBI-DHS-CIA ‘backdoor searches’/ political spying/ targeted police brutality/etc) affects some of us, provably more than others of us.
Here- look where their war on my ideas began. I was just a lil’ ol’ amateur journalist then. Imagine where the narrative would be if I hadn’t become a target of their hidden and brutal and constant attacks on my ability to write? I mean-this happened less than three years ago. Whoever the apophonetic “they” are of course, “on that day” in this bizarre inter-connected web of hidden and constant atrocities against liberty.
So as you might guess, I am the crazy guy on the internet, walking around in cyberspace with a pair of shoes on my head, and nothing but pocket litter in my worn out overhauls. And even that, “they” pick through it like a gold strike.
And, as I have documented repeatedly, in many ways, with the best saved for that one important day in the light, because it will take more than me to gain standing to sue this monstrosity of the Panopticon in a court room. And, there is much more than meets the blog- the rabbit hole goes much deeper than your eyes, there, reading this post. And that is what is colloquially called a “Constitutional crisis,” and a well considered challenge to its basis.
Wheeeeeew. I am glad others are on the case now. I’m very tired! I can’t keep the shoes on my head much longer. AND: my green hat falls off when I hang my head, remembering those oddly timed car accidents. But these, too, will have their day in court, again-because, it is in fact, all related.
And look! The ACLU, and the EFF, and the NACDL now has a manual for civil and criminal litigators to challenge government hacking! And generally, it is becoming more widely known that gang stalking” is actually “counter-surveillance stalking” by the “goodguys,” against “everyone else who ruffles their flying pig feathers. Now, if we can just get them onboard with these many entrapment and containment schemes that all agencies are practicing.
That will be THE game changer-when “we” get wider publicity for the fact that kids like the mass shooter in New Mexico are created from the information “sharing” GCHQ/FBI/CVE fraud that targets our son’s online gaming habits on pure speech grounds-or no grounds other than that they are easy targets, alone in “their mothers basements”; and then “privacy rapes” them, while stirring up gender wars via “Gamergate.” How Catholic/Jewish/Protestant is THAT?
Here- have a look at a Chinese gangsters cell phone from 2012, and see how many forensic clues YOU can pick out from his culture/location/situation/status/power.
How big IS this little guy? One western/American/British linguistic feature is to use diminutives like “little” when speaking about Asian men and women, whereas many Asian cultures and specifically Chinese culture uses the diminutive the opposite way- to state that a person has great status and great power)?
One of the main goals of this blog is to empower those who are being gang stalked, because it is destroying western democracy, which was long a beacon and a bastion to the world. What it is is actually a “disruption” campaign waged from within state agencies. Or, are tese disruptions actually the social engineering of learned helplessness, via the internet and the hidden FiveEyes mechanisms of speech control-which is really mind control, aka thought control? The facts here at ROGS hopefully present you, the reader with that exact dialectical dilemma.
While many maintain that OGS is a “first world” problem, and that the “second and third world nations” benefit from this practice, this is a falsehood- a total lie, because those of us MOST affected by OGS in the first world are EXACTLY the kind of people who could or did do the most for others.
Because when we open the doors to such nefarious practices as inter-linked databases that are full of our data that was stolen from us by the NSA-what we get is a police state in action, as every moron with access to one of many hidden programs is suddenly a sooper seekrit intelligence agent, solving crimes of speech, and targeting bad words and ideas. And, we now know with certainty-this was not then, and is not now “incidental” collection; it was and is a huge blackmail scheme. And what’s more feminine than blackmail?
You see- the feminist moral equivalency shows itself in every century as a conspiracy of our religious orders to wage hidden violence on dissenters in their home nations, as they invade and capitalize upon other nations. India in the 1890’s is the Middle East of today. And those of us who are targeted are those of us who have been targeted before.
They are peace activists, journalists, whistle bowers, humanists, and more, and they are targeted by the collusion of the religious hegemony of Jewish-Catholic-christian dominionists. And Protestant ideological narratology and myth are prominent in every discussion of OGS. These truly are civil and criminal conspiracies that work over decades of time. And I am not for against anything other than the right of speech online-and the rights of those who wish to be left alone, but who are mercilessly bullied by this interconnected and diabolical Panoptical Hydra.
OGS is Western Sectarian Cultural Warfare in practice, but like the Inquisition, the pogroms, or any of many genocides, it targets the Heretic, and the Dissident-but especially targets the “influencers” or, as the CIA/FBI/DHS alphabet amalgam has called us-the “radicalizers,” and they target WORDS-and those of us who use them in accordance with the law.
This blog gets hits from all over the world every day. Ten nations peeked in yesterday alone, and twelve the day before. While the FiveEyes spies are regular visitors here, from UK, US, AU, and so on, he most surprising nation that peeked in was Gambia a few days ago-and I just don’t know enough about Gambia to have any opinion on why someone from there might peek in here.
But also, Estonia! And South Africa! And Finland! And Malaysia! All are peeking in. These last few want to read my posts about how sex workers are used as chess pieces in politics, or used by international NGO’s in a variety of ways, ranging from frauds like Somaly Mam, or otherwise “pimped” by bankster’s and their many headed Hydra NGO’s in order to gain a foothold in local economies.
And, how every time these purely sick social policies where police and security personnel are never questioned about their complicity in crisis PR ends up in yet another attack on the Constitutional rights of the “first world” dwellers. And, how overlooking the backwards, and brutal practice of organized gang stalking by military and police leads, inevitably in some cases to “institutionalization, the commission of crime, or suicide.” Here, have a look at a case that had ALL THREE features.
This is feminist jurisprudence, feminist propaganda, and feminist social engineering in practice. And as e see, when the girls pull on their britches and ride the horse, they are endlesly led to endless wars and homicides. Here, have a look at the Rwanda women’s war-or as you now it “The Rwandan Genocide.”
Eugenics, you might notice, are also a feature within the OGS dialectic. And as we see, women are very efficient killers. This is what the DVIC police and security state IS. But also, a sub-category of OGS, as we see the umbrella of NGO’s funded by international finance stalking across borders, and local LEO’s shining their new high heels every year when the banksters fund a social and cultural war in your country.
Here- have a look at what one of the CIA’s favorite “news weeklies” has to say about Somaly Mam and how “saving girls” always means lots of dead boys on the back end of the dialogue. But as we see here in America and in other places around the world-no one wants to tackle the greater and more common form of slavery- which is primarily the trafficking of male labor. This is capitalism i action-a certain tribal religious version of it anyways, as we see the Jewsh-Catholic-christian dominionists waging it across the world.
Much as we see everywhere, women lying for ca$h is smiled upon by all of the hucksters, bankster’s and DVIC profiteers-because it gets them closer to little girls. And this is their way for thousands of years. I will leave the reader to speculate upon why they do that, but here in this link, you can ask yourself why our propaganda system depends upon horrific lies as The Nation-America’s oldest news magazine- asks “Why Do We Let These Frauds, Pimps, And Liars Anywhere Near Our Children???!!!”
Then, there’s the fact that a certain sect and sectarian element from within our policing structure is racist. I now that sounds implausible-and possibly innacurate-but follow along with me, o.k.? Because in feminist jurisprudence, white women’s tears are a very real, and very effective political ploy. But so too is the cucckoldry exemplified in our current politics of men being blackmailed by incidents far into the distant past, while for women, there is nthing they can do wrong. This is the direct result of Catholic and dominionist influence upon what used to be called feminism-but which is now feminized fascism.
But before I indulge he reader in that, have a look at western societies way of taking “the measure of a man,” through the eyes of Kurt Vonnegut, who survived the fire bombing of Dresden-and take note that gang stalking seeks to CAUSE similar effects and trauma as PTSD; that OGS is trauma based mind control, via black propaganda operations, and hidden data base abuse.
But few understand the short sighted and flawed reasoning that goes into this calculated database abuse that targets political speakers, an men who are specifically and primarily targeted, as these many programs I have outline here at ROGS add us u algorithmically, and then, conflate the data into hypotheticals that have little or nothing t do with reality. Or-what is the real measure of a man anyways?
“Dwayne Hoover, incidentally, had an unusually large penis, and didn’t even know it. The few women he had had anything to do with weren’t sufficiently experienced to know whether he was average or not. The world average was five and seven-eighths inches long, and one and
one-half inches in diameter when engorged with blood. Dwayne’s was seven inches long and two and one-eighth inches in diameter when engorged with blood.
Dwayne’s son Bunny had a penis that was exactly average.
Kilgore Trout had a penis seven inches long, but only one and one-quarter inches in diameter…
Harry LeSabre, Dwayne’s sales manager, had a penis five inches long and two and one-eighth inches in diameter.
Cyprian Ukwende, the black physician from Nigeria, had a penis six and seven-eighths inches long and one and three-quarters inches in diameter.
Don Breedlove, the gas-conversion unit installer who raped Patty Keene, had a penis five and seven-eighths inches long and one and seven-eighths inches in diameter.
Patty Keene had thirty-four-inch hips, a twenty-six-inch waist, and a thirty-four-inch bosom.
Dwayne’s late wife had thirty-six-inch hips, a twenty-eight-inch waist, and a thirty-eight-inch bosom when he married her. She had thirty- nine-inch hips, a thirty-one-inch waist, and a thirty-eight-inch bosom when she ate Dr‚no.
His mistress and secretary, Francine Pefko, had thirty-seven-inch hips, a thirty-inch waist, and a thirty-nine-inch bosom. His stepmother at the time of her death had thirty-four-inch hips, a twenty-four-inch waist, and a thirty-three-inch bosom.”
Also note that the DHS and it’s unnaccountable hidden minions of flying monkey’s, aka “private contractors” targets third party writers, and entire political moveents as we saw with Tea Party activists and Black Lives Matter, and even now as the FBI seeks to throw us all back into the 1960’s era of Hooverian blackmail targeting speakers as “black identity extremists,” -that whole and actual dialectics themselves are targeted! And, the individuals within them (have a look here as some specific, nameable people tried to blackmail me online, using personal information and state databases, using the tactics and methods of Gavin de Becker, who is a DHS beneficiary; and then compare my experience of “mind control” via a specific blackmail attempt to Rose McGowan, who was counter-intelligence stalked by Harvey Weinstein) Related: Information you can use to set up intelligence honey pots to trap the trappers. IC honeypots and sooper seekrit jargon https://electrospaces.blogspot.com/p/nicknames-and-codewords.html