British Intelligence, #gamergate, FiveEyes spying, psychological operations, phony feminism, and gang stalking and legal standing

When Gamergate happened, few knew that it was a psychological operation that targeted men with the slightest shred of intellect, or a willingness to speak up about a vast and actual conspiracy: the well organized, coordinated and actual conspiracy of the FiveEyes and GCHQ the NSA and the CIA to spy on its on citizens without substantive due process protections.
It is said that only scoundrels and cowards use the flag as a refuge, but less said is that murderers and actual rapists and actual pedophiles and actual terrorists and actual sh!tbags hide behind women and children. Even fewer knew it was a ‘high policing‘ coordinated effort to subvert our democracies via criminalizing pure speech in the disguise of wearing DVIC supplied high heels.
Or, this:

cropped-walk-a-mile-military-zpsmxjciqsq-618x383.jpg
If you don’t shut up we will infiltrate your entire life, while hiding behind the thin disguise of protecting women and children! Then we’ll shove a high heel in your mouth if we catch you, like an apple in Andrea Dworkin’s bottomless stomach, which, for some reason never fills up, no matter how many apples, or high heels, or dead babies, or DVIC sandwiches with HAM that we shove in there.

And what few men now today is that this could give them standing to sue the Panoptical Hydra of domestic spies and the NSA itself for civil rights violations, if they know where to look for the data.
They spied on us so badly, and so extremely, that some noted they were spying on each other as boundaries overlapped, and eventually they were forced to wage a huge counter-narrative to domestic spying that was tearing our country apart along gender lines; and those lines arbitrarily drawn by massive privacy rape.
Yup-that’s what Gamergate was, and still is for some, who were gang stalked in that era. And these cowards did that while hiding behind the skirts of “it’s for the women! Be nice to girls and women! Bad men versus good men!” and all that base intellect oriented pap.
And the Domestic Spying apparatus was integral in gang stalking men afterwards. Most people simply didn’t have this information at that time. And that’s how the deep state has now socially engineered the current whisper campaign that is taking men out of office, and woen are hed, somehow, as unnaccountable and without agency in their actions.
Here is how bad Gamergate was, and here is what you didn’t know ten about the deep state, which some of us, more than others of you were buried under at the time:

There were so many NSA and CIA spies working to socially engineer the Gamergate phenomenon that they were targeting each other after they ran out of other victims (and most of those victims were then and are now males whose lives were and still are affected).
How the NSA affiliated Black Ops had infiltrated the entire worlds internet, and used us for target practice
A list of servers [and here] around the world that could tell targeted individuals if they had been personally spied on BY the NSA which deliberately targeted its own citizens from 2001 and forwards (all legal standing to sue for section 702/FISA court violations is based upon articulable individualized harm)
And we didn’t know then that these agencies ranging from the Army to the NSA and more were leaving all of our stolen data unprotected online, all over the place.

Without men like Edward Snowden to come forward, the insanity of rule by the “deep state” and it’s many white knights in cowardly online bastions of secrecy and working white knight miracles to “save the women and children” in due process raping “darkness” is not only anti-democratic, but it forms the basis of the worst elements of gender-war relics: the ape-like male/lesbian in high heels when he/she needs to save a damsel in distress, and the pseudo-feminist warriors who eat babies for breakfast from seeing what rapacious DVIC slatterns they really are.
However, because most of the world woke up to how American agencies work with British agencies to subvert the letter and the spirit of the law via “high policing” few knew as well that this entails speech policing, and that, mediated by “white knights,” some of whom actually got awards and medals from the Queen herself for stalking men, or encouraging harm to men via OGS.
And keep in mind that these same men are the same that work with women(or ‘in their name’ and all that other chivalric crap) to make this happen to young boys.
As we see repeatedly, high policing is itself the the limitation of male opportunity BY policing initiatives, and cultists are involved at many levels. This is so normalized that these signal to each other using this type of triangle and this type of badge. Abusing young boys for the ‘honor’ of women is the very root of a Jewish-christian culture.
But this guy Matt Forney talks about Gamergate better than I can, without the atheist humanist bent:

If there’s one thing that the Zoe Quinn/Gamergate scandal has revealed, it’s the utter hollowness of the left’s refrain of “actions have consequences.” For the past couple years, leftists have defended their witch hunts against conservative/non-leftist figures with a number of Pharisaical refrains:

  • “The First Amendment protects you from GOVERNMENT censorship! If a private company wants to fire you because of something you said, they have every right to.”
  • “The right to free speech doesn’t protect you from the consequences of your actions.”
  • “You have the right to say whatever you want, and WE have the right to call you an asshole.”

This defense has been employed in every single lynch mob sent after a public figure, whether it was Pax DickinsonGavin McInnes or Donald Sterling. The left has even come up with a mocking term to describe people who argue against them: “freeze peach,” which may be the most juvenile, Orwellian terminology I’ve ever heard. It’s certainly a bit odd to see the left defending the right of free association all of a sudden when they’ve been working to dismantle it for the past fifty years with the Civil Rights Act, gay marriage, “anti-discrimination” laws and the like, but their logic makes sense on the surface… right?
Wrong.
….follow this link to learn more

What is "gang stalking"? It is the result of a nation that respects no laws- and a nation 'for sale.'

The article below is from Business Insider in 2012. It documents one of the first official sources that claimed the government had sold our rights to “others,” who were wiretapping the entire nation.
The article chronicles decorated intelligence officer, and NSA whistle-blower William Binney’s ostracization, and excommunication from the cult of intelligence, as well as his harassment by the FBI for trying to save the taxpayers FOUR BILLION DOLLARS- but also, that he tried to preserve “Costitutional Liberty,” aka “due process of law, which Americans have not had since 2004.
In 2012, many already knew that the local police were using and abusing massive databases. Many already knew that ‘somehow’ that police, and multi-agency Task Forces had access to cell phones in real time, and that ‘somehow’ they could track “targeted” communications across a city, or across a continent- and into international jurisdictions (Hi Toronto!)- and that they could repeat back selected words and phrases just to let them know they  are watching.
While these people didn’t have a ‘name’ for it them, we now know it is the current sate of affairs where Fusion Centers were spying on citizens in local environments outside the view of any court, and outside the view of due process of law, and without respect for the Bill of Rights.
These people have a name- they are “targeted individuals,” and here is where the world began to know what “TI’s” knew as far back as 2003-4:

NSA Whistleblower Says The Feds Are Gathering Data On Nearly Every US Citizen

NSA ACLU
The government has been collecting data on nearly every U.S. citizen and assembling webs of their relationships, National Security Agency whistleblower William Binney told the Hackers On Planet Earth (HOPE) conference last week.
Binney worked for the Defense Department’s foreign signals intelligence agency for 32 years before resigning in late 2001 because he “could not stay after the NSA began purposefully violating the Constitution,” according to a statement he made in court records.
On April 20 he gave his first interview after resigning to Democracy Now!, asserting that the FBI raided his home after he blew the whistle on the NSA’s extensive spying on Americans.
On July 2 Binney, along with two other former NSA employees, agreed to provide evidence in the Electronic Frontier Foundation’s lawsuit that alleges the U.S. government operates an illegal mass surveillance program (i.e. Jewel vs. NSA).
His sworn declaration of facts that he’s willing to testify to are both telling and scary:

• In the ’90s Binney supervised the development of a NSA program called “Thin Thread” that was designed to identify international networks of connections between people from their internet communications. Since one side of the communications was domestic, the program encrypted the data so as to protect the privacy of U.S. citizens until a warrant could be obtained.
After 9/11 all safeguards went out the window as “the individual liberties preserved in the U.S. Constitution were no longer a consideration.” Members of his Thin Thread team began implementing a program called the President’s Surveillance Program (PSP), which collected domestic electronic communications traffic without any privacy protections.
• The NSA began seizing and storing most electronic communications passing through 10 to 20 wiretapping rooms in key telecommunication points throughout the country where all data must pass in order to move from one party’s network to another’s, allowing the government to identify and analyze any individual or group through a searchable database.
• Binney cites the $1.2 billion Utah data center currently being built and the new supercomputing center at the NSA headquarters in Fort Meade, Maryland, pointing out that the immense size and computing power of these facilities far exceeds the capacity necessary for storing targeted communications but is “consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications.”
In a nutshell Binney states – with considerable authority – that the NSA has been conducting comprehensive surveillance on U.S. citizens for more than a decade.

 
[youtube https://www.youtube.com/watch?v=JuvJ7tKIF2c&w=561&h=432]

The Shirky-Masnik bureaucracy perpetuation principle

In well organized assaults waged by governments that work in hidden capacities to enforce and socially engineer a society through constant attacks on civil liberties, we frequently find useful idiots who willingly place themselves as obstacles to free speech, and especially, as obstructionist forces that ‘steal time,’ aka ‘time-thieves.’

these are situations where people will often seek to preserve a problem or a falsehood, rather than recognize that it doesn’t need to be that way. There are lots of industries where this is a major issue.
-Mike Masnik of Techdirt.com

Organized gang stalking is one such case where we see this at work-how bureaucracies work in “the gray area of law and social oversight” to prevent insight. This is best embodied in the common phrase that appears in the OGS dialectic “what is hidden” which some use because it is a Masonic/other symbolic speech, while others use it to flaunt their access to the many hidden technologies that I document herein, as well as their ability to abuse others in this capacity.
Obstructionism and OGS are Partners in Crime and Civil Consiracy
Techdirt.com does some of the most reputable, fearless, well written public interest journalism in the history of technology-and journalism. As such, while most MSM journalists cower(or put on their knee pads and slurp down some payola) in the face of the 72 Billion dollar per year NSA/CIA/FBI/DEA privacy rape machine, Mike Masnik, and the excellent writers over there have incurred their unfair share of  detractors.
And, as can be predicted, some of those detractors are little more than liars and punks who live in their mothers basements, and guys like Shiva Ayyadurai, who claimed he invented email. And gay robotic toilet slaves, like Peter Thiel, the guy who worked hard to subvert ALL democratic liberty via the Palantir/CIA/Google collaboration. Notably, Thiel has skipped town, and run off to New Zealand, where he is hiding out, no doubt doing “special work” for his corporate and military and CIA overlords.
In the fight to demolish free speech, the MIC and its DVIC handmaidens use every dirty trick, every crooked backdoor trick to obstruct due process and civil rights; but also useful idiots like Thiel and Ayyadurai are the  backup girls for the band of merry robbers who wantonly lie, cheat or steal to destroy the rights of others while getting filthy rich. They are the contrarians of logic, and the cock-block of free enterprise; and it begins with their pillow bitingly wimpish and vain, immature, fascist impulses, attacking pure speech and then, the free press.
SO it cannot be missed that these same are also on the forefront of the technologies that are currently accessing other peoples privacy via their “inventions, and imputing to those who they steal from “intentions” that are not only false, but aslo” classic Freudian projections, and in that light, they are also perverse voyeurs.
A world of smoke and mirrors indeed. From Techdirt.com, Mike Masnik scores a victory over Shiva Ayyadurai’s perversity, and his perversion and abuse of law:

Case Dismissed: Judge Throws Out Shiva Ayyadurai’s Defamation Lawsuit n

As you likely know, for most of the past nine months, we’ve been dealing with a defamation lawsuit from Shiva Ayyadurai, who claims to have invented email. This is a claim that we have disputed at great length and in great detail, showing how email existed long before Ayyadurai wrote his program. We pointed to the well documented public history of email, and how basically all of the components that Ayyadurai now claims credit for preceded his own work.
We discussed how his arguments were, at best, misleading, such as arguing that the copyright on his program proved that he was the “inventor of email” — since patents and copyrights are very different, and just because Microsoft has a copyright on “Windows” it does not mean it “invented” the concept of a windowed graphical user interface (because it did not). As I have said, a case like this is extremely draining — especially on an emotional level — and can create massive chilling effects on free speech.
A few hours ago, the judge ruled and we prevailed.

Now- an object lesson in how all of these companies-and then, their complete subversion of intelligence agents and agencies have the ability to destroy speech at the switch. Look at this paragraph below:

The Shirky Masnik principle states that bureaucracies will d anything to perpetuate themselves-anything.. And that includes using total sh!tbags like Ayyadurai, or his counterpart in institutional sociopathy, Peter Thiel-who was so mad that he was outed as queer by Gawker media that he sued it into the dirt and put it o ut of business. to subvert the very foundations of both free economies, and free democracies.

 
Do you see the paragraph -how convoluted and broken it is? This paragraph was written as this blog, and the computer it is written with, came under ‘attack’ by ‘unknowns’ and the browser froze, and Tor reported multiple “j-script’ malfunctions. And this, just one day after the same browser, on the same computer, was crashed using an attack I cannot identify-one where the browser opened repeated multiple windows until it was useless ( I could identify it, but I am still researching that particular attack).
You see- speech itself is under attack, by the multiple agents and agencies I describe herein, and that attack is at the site of the speaker, which is me in this case, but this goes on all across democracies everywhere, as the United States, working with the Five Eyes Alliance, and literally HUNDREDS of other agencies, NGO’s target speech itself, online speech, and all other media with disruption campaigns; in this case at the site of speech itself as I type into this blog.
I document this as well as note its psychological, and ‘real world’ effects here, but elsewhere too, I have records of these attacks, which are incessant. And in the “TI” community of gang stalking victims, this is an extremely common complaint, and dis-information agents can be found mocking TI’s with comments such as “yes, I have heard that TI’s frequently complain about sticky keyboards, e-mail theft, and computer hacking.”

In fact, hacking “target’s” is what the NSA and the rest are doing, as even the famous (and well funded) “OSI informers” has noted, alongside the fact that TI’s are also targeted with other nefarious attacks such as “porn deluges.” I have preserved a copy of the web page where OSI informers makes this claim, because frequently, the web gets “scrubbed” after I validate one or another fact or tactic of these hidden operators at our internet switches, and the thousands of programs that are trained on TI’s.
Here is a snippet of “OSI informers”claim/advice:
CYBER-STALKING

Cyber Stalking or Cyber Harassment is a related group of harassing behavior occurring via internet/online. Cyber Stalking includes, but is not limited to; Computer Hacking, “Trolling”, Spamming (Often including “Porn Deluges”, Verbal Assaults, Character Assassination, and Impersonations of the victim. Online harassment is a plank of the harassment protocol. If you have a website devoted to Organized Stalking you may have people emailing you to flame you, or claiming that they are victims & asking for support with the intention of discrediting you.

Now- I will rewrite the paragraph above as it was intended, but I note that my computer literally heated up to an extreme degree, and I was forced eventually to crash the browser, reload, and change settings-this is what is called a “social engineering attack” where hidden operators force the user to change behavior, aka “behavior modification.” And I note that while my computer is less secure in this second attempt to write this post, I can write easily now. See how that works? Seeing any patterns yet?
The Shirky-Masnik Bureaucracy Perpetuation Principle
The Shirky Principle forms the headline of the following piece of writing by Mike Masnik of Techdirt.com forms the Shirky-Masnik Principle stated as below describes how OGS online has become an institutional force,with offline consequences, and especially, how writers are targeted by morons with kewl toolz directed at us from ilitary bases, police and Fusion Centers, as well as NGO’s with dominionists, zionists, and Infragard rats working behind the scenes:

Institutions Will Seek To Preserve The Problem For Which They Are The Solution

by Mike Masnick

Filed Under:
business models, innovator’s dilemma, institutions, problems, solutions


from the the-shirky-principle dept

We already wrote a detailed analysis of Clay Shirky’s recent writeup on complex business models. However, a few of you have sent over Kevin Kelly’s recent post about Shirky’s piece that also compares it to Clayton Christensen’s Innovator’s Dilemma, but thankfully highlights the one key line in Shirky’s piece that may have gotten lost in the original:

“Institutions will try to preserve the problem to which they are the solution.”

Kelly calls this the “Shirky Principle.” To me, it calls to mind Upton Sinclair’s famous line:

“It is difficult to get a man to understand something, when his salary depends upon his not understanding it!”

They are not the same point, but they are related. In both cases, these are situations where people will often seek to preserve a problem or a falsehood, rather than recognize that it doesn’t need to be that way. There are lots of industries where this is a major issue.


The UN's "Transatlantic organized crime" initiative: Pulling the number 13 out of a rabbit hole

I have demonstrated in multiple places on this blog that OGS is frequently implicated in cases that target the “control of the sex supply,” as international banking interests and billionaires seek to become the pimps of our daughters; but also that frequent targets are “free agency prostitutes,” and whole industries where profit is derived from children.

And, let me know if you are starting t see patterns, because….
READ THIS POST ABOUT enjo kosai/enjo kosei FOR REFERENCE, and especially this post, from a famous police misinformation hoax in Texas,where police claimed that gang stalking awareness fliers were laced with fentanyl. These fliers were later linked to the NSA.

OGS is also international; that it utilizes databases illegally, and the this data trickles down to local LEO’s who are devoid of concern for due process of law, but rather, working for internationalist interests for DVIC dollars.

I have also demonstrated that these signal to each other online and off with special “coded language,” and that the with little irony and even blatant lies and conflation, international money and it’s NGO’s seeks to court local populations and then, derive profit from the lucrative “sex trade.”
Here, AGAIN, without irony, we see that these use the number 13, the number of chaos in yet another total lie, and that lie told by an elderly white female.So- have a lok at how these types depend upon numerology and gematria to cause, or maintain superstitions-but also, as a form of veiled threats due to the common vernacular’s jargon about “the thirteens.” As such, it is a sign and a symbol to the oppressed from those who oppress them.

Related Story: Gangs frequently use the number 13, and that have affiliations with international intelligence operations, as well as religious sects that do not respect the rule of law, and these gangs are the modern “pirates” that governments and the IC shake down for cash in an extension of “black cash operations.”
MS13 and Donald Trump
Prison symbols and meaning from CorrectionsOne.com
Gang Awareness Guide from New Jersey State Attorney General

This combination fits a pattern, which is that in the sex trafficking narrative, which is thinly disguised as the “human trafficking” narrative, some seek to control sex itself AS AN INDUSTRY- and that conflation, lying, and then, dastardly, often illegal behind that scenes activity in order for them to create narrative, maintain narrative, or defeat counter-narrative.
And few know about oppression more directly than black/ African American women for who the white female has always been a bane and a shame- and white women who have been in all generations, a willing, and favored tool and a mouth piece- a sock puppet of the oppression of others.
Maya Angelou brought attention to this number in her poetry, as well as it’s potential for racialized meaning, when she called forth her childhood memories of “the Thirteens” which was a “rope skipping song” of our earlier era.
But beyond mere racial display, her version of it (and many kids of our era had their own versions), her version invokes class, gender, but especially- and this cannot be missed- she invokes deeper social issues such as cuckoldry and the carceral state- but with the next layer of the racialized versions of it!
In other words, Angelou’s version of the Thirteens invokes all the same themes that I have covered herein at ROGS, namely the DVIC, the MIC, and the PIC.
so, the Thirteens are themselves a description of  means and method of overt social control as well as covert social control.
Follow the link above for the “white version”of it. But here is the version for black folks:

Your Momma took to shouting,
Your Poppa’s gone to war,
Your sister’s in the streets,
Your brother’s in the bar,
The thirteens. Right On.
Your cousin’s taking smack,
Your uncle’s in the joint,
Your buddy’s in the gutter,
Shooting for his point,
The thirteens. Right On.
And you, you make me sorry,
You out here by yourself,
I’d call you something dirty,
But there just ain’t nothing left,
‘cept
The thirteens. Right On.

And here, below, we see the number 13 “coincidentally” pulled from the hat of someone who is in a position of power, representin foreign interests, and who seeks control of “the sex supply” of another group of people.

Are you seeing patterns yet? But when an “outside group” targets the females of an “inside group” in-group and out-group conflict occurs. SO too, do we see elements of Roberts’ strain theory predict that “deviance” will occur.

SO, at the juncture of the UN and culture wars in Japan, we see a case of western and christian, and Jewish definitional biases used in conquest through moral imperatives cast upon animists and buddhists and Shinto’s.

Strain theory, developed by Robert K. Merton, argued that society may be set up in a way that encourages too much deviance. Merton believed there was a disjunction between socially approved means to success and legitimate cultural goals.
Criminal bias: In sociology and criminology, strain theory states that social structures within society may pressure citizens to commit crime.
Third Way interpretation: western definitional biases conveniently situate themselves in moral imperatives to disrupt local economies via moral shaming; and then creating subsidiary sex supply based cultures, or, this.

Japan to UN: “No, 13% of school students are not doing compensated dating

When Maud de Boer-Buquicchio, the UN’s special rapporteur on the sale of children, child prostitution and child pornography, told the media that Japan should “ban sexually abusive images of children in manga” at the end of her visit in October, you might think the manga industry would be the ones to get all hot under the collar.
Actually, the strongest reaction seems to have come from the Japanese government itself.
It was another comment Maud de Boer-Buquicchio made that has stoked up trouble.
She drew on unknown statistics to claim that “Some 13% of schoolgirls in Japan are involved in enjo kosei“.

Maud de Boer-Buquicchio  japan school girls enjo kosai 13% thirteen percent compensated dating
Aging and elderly white women derive phenomenal amounts of money from claiming to be concerned about how younger, prettier women use their bodies, and they frequently conflate statistics and mythology to gain control of the “sex supply.”

Enjo kosai, as regular readers will know, is the euphemistically named “compensated dating” where school students go on dates with salarymen they meet online in return for money or treats. Hence you can see very young girls with designer bags on their arms. They earn the cash somewhere.
Japan’s Ministry of Foreign Affairs has demanded the remark be officially withdrawn.
It first asked for a source for the claim.
De Boer-Buquicchio apparently responded that she had not relied on one single source because there is no official statistic (we can’t help imagine why…).
“However, many of my interlocutors referred to it as a worrying trend which can easily lead to sexual exploitation of the minors involved in this lucrative business,” she added.
“In the press conference, I made reference to estimates I had seen in open sources to highlight a phenomenon that must be urgently tackled.”
Open sources means websites like this one?
The foreign ministry says her remarks are “inappropriate” and “regrettable”.

Speaking of "what happens to gang stalking targets?" A story from 2014-16

Speaking of espionage- but really quietly of course, here in public, about mission creep and bleed-over into a dying Constitutional Democracy.

“There not using them that way- they’re using them here…”

Background: Consensual Surveillance is what the DHS, ICE, FBI and even state level agencies call their secret warrantless cellphone surveillance. They have been monitoring and manipulating the communications of Americans via Cessna airplanes using technology called Stingrays and Hailstorm here in America since before 2006.
My first encounter with this form of warrantless surveillance by air was in 2011 or so when a little yellow Cessna airplane followed me everywhere, for hours, across a mid-western city.  Then, I pulled my phones battery for the first time ever- and the plane disappeared.
————————————————————————
Low and Slow is the way to go when monitoring American’s speech : off-the-radar, “push-broom” hyper spectral imaging is more than picking up chatter.
The Beechcraft King Air turbo-prop is a beautiful bird. And it’s used to fly domestic surveillance missions in the U.S., and scoop up data about Americans
So- there’s this guy who worked on the electronic navigation and stability systems that are in MRAPs, the spectral imaging and photographic capabilities of FBI spy planes that currently monitor the phones of many Americans without a warrant or even probable cause; and the heavier military grade spectral and thermal imaging systems of CIA, DEA, and USAF surveillance aircraft. He particularly was fond of his work on the Beechcraft King Air line. How could those planes NOT be an engineers favorite- the name alone is so retro and air-crafty.
Related Story: EMARSS aircraft crashes over Iraq– what was it doing?
He said “These things can look down through the roof of your house, and draw a multi-tiered 3D heat map and watch you move through your house in real time.” He really thought highly of those Beechcraft Surveillance planes.

image

All images courtesy of Beechcraft online: http://beechcraft.txtav.com/en/king-air-c90gtx

B100
I met him at a Japanese restaurant in November of 2014, a tonkatsu ramen and saki place in a strip mall next to a hotel where he was a regular; at least, as much of a regular as a guy who moves around a lot,  working for military contractors and weapons manufacturers.
At the time, I was surprised that he was telling me, a virtual stranger, about domestic surveillance in the U.S. done TO Americans by intelligence agencies, BY the #goodguys at every level. I always thought the #badguys and the #otherguys did that stuff in their countries, to their peoples. Turns out some of those guys are training on those same planes as I write.
And, I would love to tell you more, but it might be illegal to do so, cuz, national security and stuff-you know: the Chinese or the North Koreans- maybe the Syrians or ISIS!! might get a leg up,catch us with our pants down, and tap all our phones, or follow us around with airplanes to get at all of our phone data and stuff.
Also, because we know that main stream journalists are so reputable and all, after President Obama authorized the dispensing of propaganda on the American public in 2011. A main stream media so reputable that they forgot to question the surveillance state as it was being built above my head. There are plainly too many military industrial surveillance state ‘official sources’ to wine and dine for stories- real inside scoops about cute puppies, or a stadium or something. Busy busy busy hungry hungry hungry officials: the #goodguys busy and hungry together.
image
Anyways, these MRAPs were designed for military use,in theaters of war, but somehow ended up parked next to your local donut shops all across America.
Related Story: Colorado SWAT team completely demolishes man’s home looking for a shoplifter who stole 15 dollars worth of stuff.
Well: once upon a time on a phone long since stolen, I was making a case in the public’s interest about how airplanes are being used domestically to spy on Americans phone calls, and possibly looking through our roofs. I used Gmail and kept notes and contact info there. And, that story literally got scooped out of my Gmail account, then somehow hit the newspapers- in Minnesota.
image
image
And this guy- I’ll call him Jack- was a mess. He was hammered- absolutely shitfaced; he was all tore up about missing his aged mother- how he wanted a ghostwriter to tell her story to the world.
“Let me tell you- there are good mothers and then there was her: my mother was the best mother ever- anyone could see it. She was like a saint…” and so he went on about his mother.
And he was weeping. Weeping about how his inventions were being mis-used. You see, he works for many of the weapons dealers and arms suppliers that build the bombs and the drones and the MRAPs there in front of your house. He is a military industrial complex engineer.
Here is a project he worked on:
https://www.beechcraft.com/special_missions/aerial_survey.aspx
And this doozy which he made note of:
https://www.beechcraft.com/special_missions/surveillance.aspx
His biggest problem seemed to be that he felt that he had no say in the fact that these tools were being used to target civilians.
“I never gave my consent…they never told me they would be used this way…” and so on. He was horrified when he found out that the multiple agencies were using his toys and tools to target practice on American citizens, here, in America. That the FBI et al were training their pilots and their resources using Americans for practice, without warrants.
There’s this point between men where boundaries become demilitarized- where we drop our guard, and empathize: where we try to comfort another man, which is always awkward. And, where one wonders if the weirdness might be a whole ‘nother level of weird.
Well, the guy stumbled towards me in his stupor, head hanging in his hands- and he was literally slobbering as he gasped one of those horrid sort of drunk guy gasps that precedes horrible crying,  and then sprang at me and was in my arms, where he found a slobbery nook on my shoulder to weep into.
Awkward indeed- blurring boundaries, blurring stories, one minute on about his mother the next, talking about how the technology he designed for  Beechcraft could “look through your ceiling and create a 3D image model” of you as you take a shit in the privacy of your own home. ( Update: here is a story that ran in Popular Science on April 6, 2016, shortly before I wrote this story herein, and shortly after I spoke with a confidential informant: http://www.popsci.com/fbi-planes-used-augmented-reality-to-watch-america)
I said ” Well, these are the kind of tools we need in a war.” He gasped a cry and said “There not using them that way- they’re using them here…” and more weeping.
I couldn’t help but feel my lifelong revulsion to men, and weeping men, but especially- weeping men slobbering snot on my shirt.
But, in some conversations, I guess I overlook my own biases and listen for the story that really matters. And he seemed nice enough, provided an interesting story full of details.
In this case, it was that one detail- that military grade photo-thermal imaging was being used on American citizens.
That seemed important.
Within a day, I bumped into anther guy in the hallway carrying a Stingray sized briefcase- one of those metal kind that you see in the movies. And, the next night, a long black Suburban with no license plates of any kind parked under my motel window. Within three months, the phone where I kept my research and notes about this incident disappeared from my car.
And- the story about how the FBI is using these technologies broke almost immediately after my ability to report it had been erased. This has been the nature of my journalism for over a decade and counting; and why I provide these stories to others now- because control of my personal narrative begins and ends with this strange idea of my personal ‘right to privacy- my right to be left alone.’
But also, it coexists along with the public’s right to know.

Organized gang stalking and Countering Violent Extremism programs: how"Disruption"programs work-a privacy and due process raping boondoggle, and security theater cash cow.

The goal of all of this privacy rape, and due process subversion by the NSA/CIA/FBI/LEO data theft? Who knows, and  whatever-cuz’ it’s “for the children.” And ANYTHING that is for the children is big money in a totalitarian or surveillance state. The ones who aren’t bombed overseas-aka “the remnants of” the “children”-those that are left after the DVIC and the MIC with ts affiliated “industries” has “their way with them,” first. Pre-natal supremacy over ‘the children’ and the MIC is a one way street.
Soft force eugenics and child abuse: how the DVIC and the MIC maintain religious, and narrative supremacy over future generations. Meet the Countering Violent Extremism programs which are really ideological restraints on privacy, rights of assembly, and rights of free expression, coupled with violations of the equal protection clause of the United States Constitution.
Imagine you are a peace activist, or NOT a member of one or another sect/cult/order/denomination of a Jewish-christian religion; or you’re an atheist/humanist/whistle blower/ activist-even a ‘petty criminal’ who smokes pot-and one day, you find that you seem to bump into the same faces all over town-that ‘faces’ re following you. That’s odd, you think: that 6’2″ tall guy in the brown Eddie Bauer loafers, classic Dickey’s slacks, and the close cropped, fawny Germanic brown hair that matches his shoes,and who drives an oversized big red Ford pickup-he was everywhere I was today: whipping into the parking lot at Target, or sweeping into the restaurant that serves the “ethnic food,”and trying to bury his angular 6’2” frame into a booth. Odd, you think- how a guy that big can hide himself behind an 18″ tall menu….
Naw, you think- must be my imagination. The 18″ menu format, I mean.
And then, for weeks, this pattern repeats itself, sometimes with the tall guy, sometimes with others, usually white but frequently erudite and well dressed 6’3″ brown and black people (also, often with dreadlocks and blue suits; or pert Persian women in sensible flats, with cameras in hand, asking to take your picture at peace marches, or anti-apartheid meetings). The squat, weight-lifter framed black woman with the bad weave, and the sensible backpack and recognizable mid-western accent coupled inevitably with the tall brown shoed flatfoot; the Asian man who is a modern Charlie Chan, but with real Asian heritage and ethnicity, showing up on buses, coffee shops, AA meetings maybe (I have that on reliable sources, I promise…).
That’s odd, you think- this has been happening for weeks! Months! YEARS!! And you become a bit ‘paranoid’ and a bit on edge, looking over your shoulder all the time, because those same faces show up frequently; sometimes across the states.
Related Story: The Brennan Center for Justice at NYU CVE link roundup
About then, when you notice, and especially, when you begin to document it in some form-it stops-day after day goes by and you don’t see the tall guy, or the middle eastern or the Kenyan man following you; and the late middle aged shrew with the strange comments in the grocery store about ” I know what you READ!” disappears too. A week or two or a month goes by, and then new things happen: you come home, and the lock on your door is somehow different-usually it is more loose-but now it’s harder to get your key into(this can go both ways, as each lock smith, or lock picking set is different); or there are strange marks on your door jamb (sometimes a three pronged tool is used, other times what appears to be a wide, flat screwdriver).
The Black Bag Job, illustrated:
1563470456369
IMG_20190719_012742
1563470581341
1563470538651
And the internet, of course- you try to log in to Gmail, and as if you are being transferred to a computer across the world-twice-as it takes between seven and twenty seconds just to log in-EVERY TIME, whereas in the past several years, it was a matter of one to three seconds. You notice that you Gmail address has been switched from San Francisco to Irland, or he UK-odd, that you would take the time to notice that-you probably are losing it.
Strange, you think, I haven’t changed ISP’s, or used a new computer, nor have I changed any settings on ANYTHING. And certainly, I don’t live in Kansas, anymore. And certainly, those brand new wireless AP’s that spring up outside your house with kewl names like “MAdame PSycho,” and “Not the FBI Surveillance Van,” or “TAO2” are all in your head. Sure-that’s an option too.
Hmmm. And the pop-ups and advertisements on your computer will take on a life of their own, as for years upon years, you got ESPN, Manchester United schedules,  and “subscribe now!” popups every time you are on the computer reading news for free, or maybe an occasional ad for the “Penis Pump,” or free Viagra samples(no-really that wasn’t my case, I swear) but you now get pop-ups asking you about tinitus, and advertisements for middle eastern vacations-ads in Arabic. Maybe you get the weird pop-up about gun shows in Texas(“deep discounts for LEO’s who buy in bulk!”), as your IP registers in Nebraska….
And, the phone of course- your phone now has the ability to occasionally talk back to you- about what you did yesterday, or an hour ago (and this will happen only once or twice, just so that you cannot begin to document it.)
This is on the surface one of two things: you are going totally and completely bonkers-nuts to the meat grinder mad-you are deteriorating as if your mind has been taken over by ‘something else” that somehow knows who YOU are, and WHERE you are at all times, even if you’ve never owned a gun in your life, or used a penis pump (well-who HASN’T used one of those?!!).
You become pre-occupied with little strange happenings like your garbage being tipped over in your alley, or the long scraping marks left on the siding of your house by a ladder-maybe in your paranoid mind, you connect those random events: the ladder marks to your now debilitated security cameras whose cables had been disconnected RIGHT WHERE THOSE LADDER MARKS scrape your siding, and ding your white aluminum window trim with deep scars and gray marks.
Maybe the little camera left behind in your sons bedroom is a sign of something evil-who knows, right? It’s your word against the deep state, and all of it’s military/LEO/psychologist/MIC/PIC/religionist/occultists-who-work-in-government. And who are you, really? It’s for the Children (hitler youth), after all!
Or, maybe the reports from your neighbors about how they saw other strange fat white men jumping your fences, or signalling to each other from your alley to the street, or using strange hand signals just as they hopped into cabs that JUST HAPPENED TO BE WAITING THERE in front of your house strikes you as “odd” reports from a good and trusted neighbor.
Suuure. Maybe your going crazy-along with your neighbors, who ALL report these things to you. And some of whom are suddenly building fences, or installing their own security lights and cameras.
Yup-you’re nuts, prolly. Orrr mebbe….
Maybe another option that is a little less crazy perhaps: you are being covertly and totally [email protected] with by one of any number of sources ranging from LEO’s to military operations, to strange cultists or organized gangs of pedophiles* that most often are run from within the official cover of state agencies and their affiliated “good guys” and girls (here is one possible case of that. And read through this blog to help understand who else it might be.)
But in many of the early cases-stemming back to around 2001-these were often covert intimidation/recruitment/entrapment/coercion/conformity/manipulation schemes that loosely fall under the category of “countering violent extremism” programs run by any of a number of unethical operators ranging from LEO’s, task forces, and intelligence agencies to private contractors.
And, the one key feature they all have in common has a plausible connection: agents and agencies that practice fraud upon the courts, and fraud upon the Constitution via massive, unchecked database abuse, and surveillance via electronic media such as computers, cell phones, and even televisions. You have been selected, and targeted for intelligence collection (HUMINT), informant recruitment (they want to use you as a rat), or possibly, you have been deemed a criminal, without due process of law,  due to the use of unauthorized access to your computer and Google searches, and, because that access was illegal, and parallel construction not warranted in your case (there’s a joke in there somewhere about warrants) “they” have chosen to use you as a moving target for all their new military grade electronic toys and weapons.
Related Stories: Have a look at the bizarre world of parallel construction from Techdirt.com-the practice of LEO’s breaking the law, and violating the Constitution, and then doing plastic surgery to put a new face on “criminality.”
Sooo…….
Welcome to the shadowy, sketchy, often bizarre (and incredibly well financed) world of CVE programs!

“Countering violent extremism programs have been identified by the government as a top national security priority, but the public knows appallingly little about them,” says Hina Shamsi, director of the ACLU’s National Security Project. “We’re suing because government agencies have repeatedly failed to provide us information that we’ve requested about the nature of their CVE initiatives.”
In a briefing paper released with its lawsuit, the ACLU said that CVE programs often target “people for monitoring based on their beliefs or ideologies,” thus potentially criminalizing speech protected under the First Amendment. It also highlighted past abuses of CVE programs, including instances in which young people who refused to take part were characterized as radicals and where community leaders were told they would have to identity and discuss cases of specific youths with law enforcement.
The Department of Homeland Security declined to comment for this story, citing pending litigation. The Department of Justice did not respond to request for comment.
Government-led CVE efforts in the United States are inspired in large part by programs rolled out in past years in the United Kingdom. Broadly speaking, CVE programs seek to expand counterterrorism efforts beyond law enforcement to involve other government workers, like teachers and social workers, as well as community leaders outside of government, like clergy. They can involve propaganda and other communication strategies as well as monitoring and questioning.
Those programs have been deeply controversial in the UK, where civil society activists have blamed them for exacerbating ethnic tensions within British society while failing to meaningfully fight extremism. In recent months, the U.K. government has also rolled out anti-radicalization programs in schools, which have led to instances in which Muslim schoolchildren have been stigmatized by teachers as potential terrorists.”

*One recurrent theme in almost ALL OGS blogs is that those who are targeted are also slandered with a variety of “labels” ranging from drug dealer/user/ to prostitute to “pedophile”. But the reality is that state organizations, police, psychologists, lawyers, the courts, CPS, foster care, social work, and many other subsidiary organizations are a multi-billion dollar per year domestic industry, subsidized by the Jewish-christian ideological state to get children funneled into the Domestic Violence Industrial Complex (DVIC) by hook or by crook (be the shepherd, not the sheeple and all that.)
Each child that is successfully stolen or otherwise diverted into this “system” is a cash cow (cash sheep?) returning dividends to those who are part of this system. For instance-foster parents can rake in between 800-1800 per month, depending on the state, per child. And any child that becomes involved with CPS ca returns some 70k or so per year to those who participate in this business.
Not surprisingly, Myron May, a man who claimed he was gang stalked, was the product of the multi-million dollar Christian foster care factories that are dotted across America-and no researcher of OGS has yet made this connection between him, and this systematic profiteering off of children as commodities.
Disclaimer: I make no claims herein specifically or intentionally relating to the financing of the Taunton Foster care community, and intend this example as one of many where children are used as cultural capital as well as actual capital. owever, I have long been a critic of the DVIC foster care factories that dot America and that are themselves a 4 billion dollar per year industry. Children taken into foster care stand an 80% ncreased chance of sexual abuse, or othher harmful situataions, and the feminists/internationalist/bolshevik elements of many “progressive” state depend on this revenue, and use it for political action.

Gang Stalking and Fusion Center spying and artificial intelligence: yes, "they" ARE spying on you, in real time

Now that the slow roll-out of totalitarian domestic spying has occured (while you were sleeping, perhaps), we can look back at the many felony lies to Congress by NSA and CIA chiefs, and the local lies from Fusion Centers and the FBI and local police to see that, well, it was all lies (then take a look at how deep state players created a bomb hoax, and a designer bomber who allegedly targeted those exact CIA /FBI /SOROS funded senators and others who lied to Congress ).
And, Democracy was dead after that- those with power had, and do, and will continue to destroy our democracy-because they can, and because YOU are letting it happen.

Related Story: the Association of Threat Assessment Professionals (ATAP) calls police and private contractor sponsored organized gang stalking “colluding parallel investigations.” And many ATAP affiliated private contractors company names are, not surprisingly similar to the military acronym for psychological exploitation of targeted influence operations, aka PsyOps. use is closely associated with Fusion Centers, and a staggering amount of OGS complaints, and their crisis PR is what drives narrative in the press, and in police related public relations. . Americas 77 Fusion Centers are also very well disguised, each of them using different names, so that citizens cannot connect the dots.

Related Story: Washington State Fusion Center distributes bizarre “mind control ”documents to FOIA requestor, who asked for a different set of documents entirely 👽💩👻
From Techdirt.com, in April of 2013-two months BEFORE Edward Snowden:

You may recall that, last fall, a Congressional investigation completely slammed Homeland Security’s “Fusion Centers” — noting that despite DHS insisting that they were critical to “fighting terrorism,” the actual evidence showed that they had done nothing helpful in the fight against terrorism, but were instead chock full of wasteful (possibly fraudulent) spending… and with an added dose of civil liberties violations (just for fun).
“There’s misconceptions on what fusion centers are,” he says. “The misconceptions are that we are conducting spying operations on US citizens, which is of course not the fact. That is absolutely not what we do.” link

But what ARE Fusion centers- and what are they supposed to do? Nobody, anywhere seems to know, but those who have experienced various forms of “electronic harassment,” and strange internet shenanigans certainly know that these centers are doing something. Targeted individuals have been telling us for years, what we all now know.
From the ACLU: what Fusion Centers are supposed to be doing

UPDATE: Police, and Fusion Centers have begun waging media hoaxes attempting to discredit victims of illegal Fusion Center spying, and here we see an actual Fusion Center in Washington state distributing “junk information” to the press about mind control, and here we see local police and sheriffs deliberately waging a media hoax, claiming that a dangerous drug, fentanyl, was put onto fliers that were then placed on squad cars, right outside the police station.