What the hungry, the tired, and the huddled masses are reading today

The statue of liberty has a very odd history, that, like many things we take for granted, has hidden meaning.  In linguistics, hidden meanings are a source of nearly erotic excitement-linguists love to discover layers of meaning in ordinary things.
SO, for example, for us, the phrase “War on Terror” is well known to mean “the war on people who know that the One Percent and its agencies and tax collectors and people targeters target speech more than terrorists,” and so on. Speech IS terror to those who stitched and sewed and who control the sows ear that is the NSA-DEA-FBI-DHS/etc agency nationwide wiretap out of nearly whole cloth.
So, let me jam this post in those pig’s eyes of “theirs” and stop up their silky ears today with the soft cotton of my words, wielded like a sharecroppers plow, by filling the local Fusion Center’s “words and people who use them” entrapper with “what my readers are reading today

I get around of 40-70 readers per day, who read between 3-5 posts each. And they come from many nations, because as we see, culture jamming requires an international focus by writers like me, so that cowardly battalions and squadrons of hidden groups of terrorists get shut down.

Update: 07/28/2019– Iget avbout two hundred reads per day from Israel, Cyprus, Hungary, etc.-anywhere George Soros Open Society is politically active, and most hits, some 80%, come from the USA

By far, my most popular posts are the ones teaching people how to document gang stalking for a civil lawsuit, or how to hack the CIA’s hacks, or how to protect themselves against the thousands of roving gangs of security contractors and other gangs of”community police” and “private contractors” and “security state criminals” that are hacking our online conversations, our lives, our web, and our relationships. And, how to spot actual targeted individuals from the hordes of paid speech killers online.
And, lately, many criminal defense lawyers and civil rights attorneys-maybe some journalists and others who know that gang staling is all too real are downloading the Guide to Government Hacking written by the ACLU, the EFF, and the NACDL
How police frame mentally ill people “in darkness,”but ony after brainwashing them
How retired law enforcement, and other nefarious elements of “our” society get away with murder, and more “in darkness.”
How the NSA steals data and stops innovation by hacking corporations and passing data around to the One Percent and their enablers, that influences politics, and people, via back door searches, and thousands of varieties of wiretaps-and by stealing SIM cards.
ANd this is just a sampling of today’s readers, but many other posts get read too.
And Look at the search language that lands here at my simple, free, wordpress blog, aka my “proving gang stalking is all too real” honeypot:
gang stocking research combating the lies
bolo gang
ex-air force organized stalking
champion gangstalking
osi gang stalking ti
psychopath gang stalking
See? Some bright soul wants to see if someone is actually combatting gang “stocking” as opposed to combatting manufactured terrorism that happens because a huge vampire is attached to our lives.
And the BOLO, aka “party flag” is very real. And, my GPS is still missing, but at least I have help looking for it now. Here-maybe YOU can help me find my “lost” GPS?
And while I am flattered tat someone might think I am ex-AirForce, I am not. I was once a nearly hopeless guy like poor Jurgis Rudkus, an immigrant from Osweiczim, Poland (I think) who encountered hardship and economic necessity in the American dream, and then, I learned to use words like these ones you are reading now!
Then, I especially like the fact that some are making the connection between military operations having bled ALL OVER OUR INTERNET, and into civilian operations,  via “black” operations like OSI informers, who run a variety of military programs that track people, target people and coerce and manipulate information out of people.
In fact, I am so pleased that peope are searching for this, that I am going to write a story about the daughter of a former USAF Major, who was a Playboy Bunny back in the heyday of Hugh Hefner. She is a beautiful woman, even many years after her tour of duty at Hef’s Mansion, and she told me about a weirdly fitted bicycle there, where young girls from UCLA…oh, nevermind. I will write that story later…
But as you can see, writing about organized gang stalking is what we must do in order to restore our democracy. And as you can see, I need help doing it. Have YOU had enough of the bleedover yet? Keep in mind: you swore an oath, and I swear a lot, so we have this in common-we are both fighting for our democracy with the tools our constitution guarantees to us. I got words, you got MRAPs and donu shops and weird USAF flyovers loaded with electronics, and bucketseat britches full of sh!t.
Because this is just the beginning, and it isn’t pretty. And I can’t help but feel a bit fattered at whoever it s that came ere looking for a Champion of Gang Stalking, because he’s not here-the writer has left the building, and in his place, only  the ghost of Vonnegut, who reminds us that Dwayne Hoover was kind of an asshole, and that police states by design CREATE terror, rather than any other thing.
Because Look!
When you give low IQ morons whose ballsack’s are falling out of their pants and overly eager to fall dickhead over gloryhole to make an impression on the ladies, and use those fancy toys that Saint FiveEyes the Panoptical Inquisitor gave them, they eventually create a use for them.
And, failing that, they go a bit nuts themselves:
dwaynes martha.jpg
 

Just in case you need a reminder about “what the boys and their ever thankful girlz will do with toys:”
sky penis
 
Why Neocons should be rounded up and locked away in fiery hot gulags in New Mexico, which has odd policing habits
I personally find layers of joy in looking at web pages for hidden meaning, and especially web pages created by teachers, many of whom are not very web savvy, but whose hearts are nearly always in the right place, despite the American education system being a more nefarious propaganda delivery system then many communist nations.
In act, our education systems have become whole-person rendering plants, enabling a select few, while destroying he vast majority of kids that enter into it. Our schools are virtual experiments in destroying human potential via race-class-gender narratives, while continuing to allow the descendants of Eastern Bloc gangland affiliates to have their way with kids.
So, sometimes in pedagogy, it is important to revisit our terms: what do you call someone who would harm a child? And, draw better lines in our society when some murder the crippled, the mentally ill, or the immigrant
Then, let’s revisit  the statue of Liberty, in the 1920’s, for a few facts about how the fourth generation frequently forgets where they come from, or why they came here to America in the first place, for the sake of the 99% of modern parents whose kids will unfortunately encounter the American education system:

Stories of Jewish immigrants throwing their tefillin overboard upon encountering the freedom and promise of life in the United States may be the stuff of legend, but for Mendel Aisenbach, a Chabad-Lubavitch Chasid from the Crown Heights section of Brooklyn, N.Y., such tales emphasize an important point: When they approached the Statue of Liberty, many of the tired and poor masses from across Europe – a good portion of them Jewish – pushed their identities to recesses deep inside in the quest to become Americans.

Then keep in mind that targeted individuals are not a new phenomenon, anywhere in the world; that targeting has been going on here for many centuries.
Today, we see the American agencies financed and inspired in their targeting by the descendants of this exact group of immigrants; and we see them having no sense of why they are here, as they target and harass and stalk us via databases much as Hitler did.
Look! IBM dealt directly with Holocaust organizers, much the way we see Big Data working across continents, across politics, and across human morality aka Transhumanism to eradicate bad ideas and bad thinkers via Total Information Awarenness, and rampant database targeting (as I chronicle here at ROGS).
And, sometimes, I recall their inspirations then, all those repressed men in tefilin, when I recall a certain obese blonde woman in the classroom of a wonderful American teacher, who I will call “Liz” who taught pedagogy in a midwestern college; and this pudgy blonde who “coincidentally” arrived in my class on inter-disciplinary approaches to solving education problems, which is known in some aspects as “The Pedagogy of the Poor,” which has its origins in the teachings of Paulo Freire’.
You might have noticed that I apply the pedagogy of thee poor to my writings about targeted individuals. This is because the One Percent-the descendants of those who financed Hitler-are actively monitoring all of our communications in real time from their escape pod in Israel after the NSA gives them full access to all of us.
And please, feel free to label me an anti-semite, or a self-loathing secularist, or even a hater of God, Gawd, Gad, G_d, G_d, god, dog, Yeshua Ha Nosering, the Virgin, ISIS, or even a disliker of Hashem the provider of great tidings of Chinook flyers,  but keep in mind that I am well aware that non-Jewish Dick Cheney, ambiguously Jewish Rupert Murdoch, and a definitely Jewish Rothschild are active in that country, financing strife, and doing things FROM Israel that are forbidden by our Constitution. I am well aware that Jews are targeted too. So, yeah, call me wutever.
But one thing you CANNOT call me is a hater of Democracy, or even the Statutes that guide our liberty, aka the Constitution, and its guarantees within our Bill of Rights.
And, as I have inter-generational memory as well, I specifically recall things that most “Americans” do not, like this overweight blonde white female who was affiliated with the Department of Homeland Security, and I recall how many of her written papers that we read out loud in the classroom (for a specific purpose) indicated as much, as she was one of many agents of the neocon Hydra that then had just begun targeting American activists and critical thinkers.
And like we see today, these have infiltrated every singe aspect of our culture so that real “change” will never occur again. The police state never looks like the police state when it is being constructed, because frequently, it looks like someones mom. Hitler did it, Stalin did it, an America has done it today via the memetic that women are somehow beyond blame for social problems.

Related Stories: When Hitler’s Perfect Woman Came to Call-how  Hitler used images of idealized women to build Nazi Germany; and ISIS in the American neocon dialectic, aka “The Virgin Mary flapping her garments like boatsails, as flags of anti-misogynist/anti-sexual harassment/anti-educated male,” and the criminalization of speech on the internet, or, this.

In order for the students of the future to understand how integral the DHS is/was/will continue to be in the destruction of American Democracy, via speech prohibitions and high heels policing, and then, the “phenomenon” of social justice warriors and cry-bullies (SJW’s)  after that, one need only keep in mind the image of plump white women who drew double salaries across America, and who targeted many activists of many races and many classes during the “War on Terror.”
And, unlike American propaganda systems, which are designed to limit the potential of American children, these others are designed to rigorously teach kids hard science, math, and more. It’s as if we have succumbed in totality to international finance treating our children as sheeple.
In order to understand how deeply they have inserted themselves into our children, note that the word sheeple , is one of the words that the One Percent and it’s domestic spying and democracy clearinghouse operation the DHS has “terror watchlisted” at one point or another.
Here, have a look at one such page from the early days of the WWW (back when we still called it the WWW!), before corporatism and the War On Terror infiltrated every level of our propaganda stream, and diddled our children’s minds like Facebook billionaires have admitted to doing today by deliberately, and with impunity manipulating dopamine levels in children’s minds.
Also, keep in mind that during the election of 2016, many of the neocon left were echoed in the propaganda stream calling for MANDATORY USE OF FACEBOOK. Then, compare the ideals of Lady Liberty THEN to this neocon version of Jewish-Catholicism and it’s faux assault on speech via sexism/harassment/misogyny memes; ISIS, indeed.
Mystery cults INDEED. Lady Liberty, indeed. Is it misogynist to say that the resemblance is striking these days? :

The Statue of Liberty

“Give me your tired, your poor,
Your huddled masses yearning to breathe free,
The wretched refuse of your teeming shore.
Send these, the homeless, tempest-tossed to me.
I lift my lamp beside the golden door.”
Google
 Web  www.kidport.com


The Statue of Liberty was a gift to the people of the United States from the people of France. She stands in the middle of the harbor of New York City. She is a symbol of hope and freedom for immigrants.

 

A sea of lights! Or, just some moron, or a Mormon, with rigged tail lights, maybe…

Most if not all blogs that talk about OGS mention being harassed by cars. And, because we know that counter-intelligence stalking is what OGS is, mostly, we can presume that counter-measures within the law are necessary. One of those things that is “within the law” is shaking your tail feathers!
But even then, notice how it is one huge money wasting “make work project” for the surveillance state and it’s many trough slurping cowards.
OGS is perhaps the one situation in law and society where Occam’s Razor, which posits that the simplest explanation is the right one, does not apply, because the simplest explanation is exactly what intel/counter-intel seeks to avoid. And, when those who are tailing you do it in big black SUV’s whose tail lights are equipped to signal like airplane runways (red lights become yellow, become white, or go from red stop lights to flashing blue and reds, and so on, like a signal man with colored flags), well, good luck shaking those.
But do it if you can shake a tail, do it within the law, and if you can’t then get some good photographs. But leave Occam of it, because what you are enduring is NOT simple, by design (read nearly any post on this blog, but especially, the ones that advise you to document everything.)
See how that works? Invent a boogieman, chase the boogieman, and then, when the boogieman gets wise, call in another guys whose job fits the exact same clock-milking scheme as your own job. Niiiiice. Bottomless security theater slop-trough, seemingly endless food supply, AND you own the keys to the boogieman creation complex– until “they” finally chew the bottom out, which is inevitable.
Who do YOU call when the good guys do bad things? I have an idea- don’t call ANYONE. Write about it instead, which leaves a record for others to follow. But don’t forget the basics of the SDR!
From Gabe Suarez, on Warrior Talk, who “cut’s the enemies throats with Occam’s Razor”- and especially note how all of this godguyism is a make work project- that when being harassed by one good guy, call another good guy to shake the tail! 

We used to do tail checks if we were working UC and wanted to know if the bad guys were now surveilling us. Some call this a “cleaning run” as well. We would often see the bad guys do this as well when they suspected they were being followed. The more thorough their cleaning run, the harder it was to follow them discreetly.
The purpose of the tail check is to identify and/or lose surveillance. When you’ve finished a tail check you should feel confident that no one is watching or following. The tail check can be done in various ways or combinations, or by traveling a confusing or unpredictable route. A thorough tail check could take several hours, could cover a large area and involve various means of transportation.
If you identify a “tail”, it is always best to never acknowledges it. Some will want to go confront the tail, but that leads nowhere. After all, when you grab the tail by the lapels and growl at him, he can simply deny everything and that is that.
Use the tail check to observe and if you realize someone is in fact following you, there are some things that can be done to identify them, and/or elude them.
One option is to make a very obvious drop of something inconsequential…a manila envelope with nothing in it, a folded piece of paper, or a gum pack. Leave it on the table at the coffee shop, discreetly place it in someone’s briefcase, etc. Or simply strike up a conversation with a total stranger and the abruptly leave. All of these will diminish the “tail team’s” ability to stay up with you as they redeploy assets to retrieve things and follow inconsequential leads.
Another option – is to make a discreet call to the police identifying the possibly armed man “casing the store” across from your coffee shop. This is another possible use for a burn phone. Watch the police contact the “tail”. Does he show ID? Do they arrest him? Do they act as if he is a colleague? How do they interact with him? This will give you a great deal of information on your “tail”. This can also be used to elude the tail.

A few links on shaking a tail:
Pardon the source’s political views, but the information is excellent.
The cleaning run 101
 

Copies of Nothing: police psychology and the replication of power through willful ignorance, and bullying.

It is nearly impossible to impute to the reader how disproportionate the telling of the story of “targeted individuals” of organized gang stalking is in terms of power versus those who are powerless; or that the issue of “TI’s” is in fact one of “first they came for the ________, and I said nothing, because I wasn’t a (member of the Beatrice Six). But the fact is that beyond interagency collaborationn to subvert the Constitution in the name of “goodguyism,” only the little guys and gals get targeted, while others get “flipped” or otherwise compromised.

Related Story: The Association of Threat Assessment Professionals (ATAP ) is on record calling modern “high policing ” by its proper name,which is the “parallel colluding investigation, ”and has linked this in their literature to “delusions ”. Now, I ask the reader to decide for themselves what OGS is, and take,a look at a retired United States Air Force OSI (USAFOSI) investigator who targeted me on Twitter, accusing me of being a serial murderer, goading me with violence, and, eventually being hacked, with “face orbs ” and a link to pogo-pins placed on my computer, as bizarre -acting people in hoodies ran around outside my apartment .
Organized-and Irgunized gang stalking is THAT weird. And, so was the depopulation /genocide /ethnic cleansing of Palestine, aka the Great Israelification

So let’s take a look at one of the many illegal database schemes that has been minimized or eradicated from our ability to view this illegality in the press, and where innocent people and Americans were targeted by an intelligence agency that was really a multi-agency Hydra of subversion on American-and international shores.
The DEA and the SOD database: They needed a code word to describe their voyeurism, and then, to discredit those they targeted with clandestine, illegal, iun-Constitutional HUMINT campaigns of coercion and terror.

Let’s first take a look at “police psychological profiles” that are generally stuck somewhere in the toilet, as most of the religiously/Freudian afflicted are, and then, add the opportunistic and voyeuristic and eugenic nature of feminist jurisprudence through the eyes of Kurt Vonnegut, who was popular with militarist feminists during the rise of the neocon “left” and the DVIC, where we discovered that women’s violence is well financed, and internationalist, because “hungry hungry hungry!“:
From “Breakfast of Champions,” where Vonnegut- a survivor of the fire-bombing of Dresden– critiques “white male power” but forgets to note “white female privilege,”which is perhaps more deadly, if Dresden, or Holodmor are any example .
wide open beavers.jpg
So, voyeurism (the NSA to local LEO data theft pipeline) and photography ( they frequently make threats that they have secret databases with TI’s pictures in them; and agencies are indeed using our televisions and our laptop camera’s to spy on us according to all major media) is a major them of these neo-fascists and their Hegelian counter parts, and the “TI” is their secret passion, as women’s deviance and violence takes different and creative forms.
If I showed you pictures of “TI’s” you might laugh, or mock them somehow, as many of them appear in mug shots, due to the disproportionate force and fury with which western societies prosecute the poor and the disenfranchised. Many of them, like the now-famous Timothy Trespas, are easily discredited because they “don’t look like “us”.”
Odd, how the bane of aging white feminists everywhere-“lookism” has become the exact tool with which these target and harass people in official source gas lighting, such as the case where the New York Times Mike McPhate conspired with Lorraine Sheridan to cover up this crime in last years article.
I have written about TI’s from a variety of standpoints, but one thing that can be said with certainty is that they are frequently “not” super models or muscle bound ‘heroic’ figures from ancient Greece, though there ARE exceptions. And, like anyone, they ave their faults and flaws.
What makes them different though, is that they are often stripped of the pretenses of power fairly early in life, and have frequently been labeled by those who value power. As such, as Glenn Greenwald has noted, they have “no place to hide,” when operations like the illegal and warrantless  NSA/DEA/CIA/FBI decides to turn their lives into a free for all. so beyond merely being involuntary HUMINT assets, they are also mocked for being so, and with the approval apparently, of “psychology,” despite NONE OF THIS being authorized or even acknowledged in a legal framework anywhere.
I recently spoke with a man who was engaged in a custody dispute with his wife, a former stripper who has an extensive network of admirers in policing, and he described how he was forced onto a stretcher in a bizarre “set up,” much as we saw in the DVIC deterioration of Andy Ostrowski, who once opposed PA Governor Tom Ridge.
The source was locked up on a 72 hour psychiatric hold, to try to create the appearance that he is mentally ill, which is bad enough (tested negative). But the story gets really sick when he describes how “there was even a photographer present taking closeup pictures of my face as they did this, pulling him from his home and placing him in that position, as his young daughter was spirited away by Child Services.”
And I spoke with a woman whose neighbors-wonderful progressives in a “progressive” city, framed her as the neighborhood crank as they waged loud parties next door. Her mugshot looks exactly like that. And then, after they got a fifty year restraining order on her (because she told the judge ‘why don’t you just make it ten, twenty or forty years’) they moved away! See how that works- let me know if you start seeing patterns-because seeing patterns can indicate delusional thinking.
So, the claim that communitarian policing is framing people is not unusual, nor is it unprecedented when individuals take a stand against this nefarious bullying. And this is no small claim, nor is it an uncommon one in the “frame jobs” that much of these make-work projects of our current government is involved in.
And the internet abounds with video’s of “authorities” in power citing vague “rules” or even more un-Constitutional “policies” that prohibit photographers from filming them-public servants-at work in public. So, without a doubt, photography-which is NOT a crime- has become a tool with which institutions collaborate to defame those it targets.
In the video below, some from the DEA gets their authoritarian asses handed to them by an individual who knows that “policies” and “rules” are not LAWS, and that-for now- citizens still have the right to film and photograph these cowards who work anonymously from behind the internet switches plotting the destruction of free speech rights, due process of law, and more; that these who invade our privacy with impunity, and from behind the veil of absolutist secrecy are themselves annoyed by cameras.
And,  the citizen knows that people who cite policies and rules are in fact cowards who hide behind authority, and mobsterism, and the psychopathology of institutions that are destroying Democracy with obstructionism in the gray area of law.
And especially, note the license plates, as these federal agents work in a state that has granted official “anonymity”to public “servants.” In order to understand “what is a police state” one must understand the “privileged immunity and institutional anonymity” of these operatives.
And this, below, is what breeds contempt for the public by these same. And it cannot be missed that the photographer is described as being 5’4″ tall, and is standing against men and women who top the scales at body mass and weight. Welcome to feminist jurisprudence and policing! It seems that the “little people” are an extreme threat:

MUST SEE VIDEO:

“Fascist DEA Scum bags attempting to Censor 1St Amendment freedom of Press”

[youtube https://www.youtube.com/watch?v=kxH9N5oXkgY&w=854&h=480]
 
But for the most part, many if not all TI’s are the product of inter-generational bullying by institutional forces ranging from neighbors and schoolmates to police to mental health professionals, and the hidden networks of “goodguys and gals” who somehow see nothing wrong with “piling on.”So in order to understand my version and interpretation of “TI’s” and OGS, it requires that I define “what is a coward,”as you and others who research organized gang stalking will note that claims that GS are cowards are quite frequent in the online dialectic of OGS, and in fact a staple comment.
So, it cannot be missed that this individual filming is a 5’4″ sprite, unarmed, and questioning the authority of those who are IN FACT AND IN PRACTICE a huge factor in OGS online dialogues. Nor can it be missed that each of these photographers is practicing their rights against thousands of pounds of human meat that makes it’s living from violence, and that they are all armed.
So, beyond institutional sociopathy, and psychopaths whose sickness finds a welcome home in institutions of power, I personally view TI’s as “not mentally ill” anymore than those who pursue them, and “pile on.” It is instructive to note two things about this “phenomenon” that will help put it in perspective

  1. many of those who are “targeted” are people whose civil rights and due process rights were violated in durations of time that defy imagination and are frequently derived from warrantless surveillance and the “War on Terror.”
  2. Nearly all of them that I have talked to report bullying, and “strange” internet encounters with hidden bad actors

Read together, these form a narrative drawn from the replication of status quo superstitions and outright mythological lies that form the narrative of police and state power psychological basis, but also, plain old bullying by any other name.
So, here below is a link farm to stories about how the DEA (which is inseparable in mission or tactical applications, and methodology from the CIA at this point) used a database to illegally, and un-Constitutionally profile, monitor, perform surveillance and harass American citizens.
And for those of us who walk “unarmed” in the world with the expectation that these “goodguys and their gunz and bomz” won’t shoot us for excercising our rights is in fact and in practice, true bravery, because we KNOW they are murderous, slanderous, malevolent crooks who love to “shine a light” on “we the people” but somehow, cringe when the light gets cast on them-or scurry away like cockroaches-the video above is prima facie proof of that.
Special Operations Division (SOD) database abuse and lawsuits to follow? Who would even know where to look for the proof? I have an idea- ask those crazy peepl in the TI community!
Testilying as security theater and “goodguyism gone wild!”: How DEA agents and all other LEO’s use illegally obtained data to create and then “dry clean or launder” a case, aka “parallel construction-as well as to follow peole around and do plainly bizarre sh!t to their internet connections, telephones, cars, homes, etc, etc….
http://bangordailynews.com/2013/08/05/politics/agents-ordered-to-cover-up-dea-program-used-to-investigate-americans-critics-say-methods-unconstitutional/
More on parallel case laundering, dry cleaning alleged crime, and illegal spying
http://www.businessinsider.com/dea-agents-cover-up-spying-program-2013-8?IR=T
Prosecutors and supervisors cover up the program that covers up illegal spying, of “cover up squared,” layers upon layers of subterfuge and criminality from “the good guys and gals”
http://www.rawstory.com/2013/08/secretive-drug-enforcement-agency-dea-unit-told-to-cover-up-massive-spy-program-used-to-investigate-americans/
The cover up of the cover up of the cover ups, layered in a discrediting narrative, aka “who are targeted individuals?” What happens to targeted individuals?”
http://www.reuters.com/article/us-dea-sod/exclusive-u-s-directs-agents-to-cover-up-program-used-to-investigate-americans-idUSBRE97409R20130805
Correction: This post states that the videographer said he is 5‘4″ tall, when in fact, he did not say that.
That quote came from another video like tens of thousands of these types of videos, where those who actually practice civil rights then, become targeted, stalked, and harrassed by intel agents and agencies.
The guy in the video above is around 5’8″, and unarmed. If you got nothin ta hide, the “good guys and gals ”, whats the harm of one lil ol photog?

Organized gang stalking and Countering Violent Extremism programs: how"Disruption"programs work-a privacy and due process raping boondoggle, and security theater cash cow.

The goal of all of this privacy rape, and due process subversion by the NSA/CIA/FBI/LEO data theft? Who knows, and  whatever-cuz’ it’s “for the children.” And ANYTHING that is for the children is big money in a totalitarian or surveillance state. The ones who aren’t bombed overseas-aka “the remnants of” the “children”-those that are left after the DVIC and the MIC with ts affiliated “industries” has “their way with them,” first. Pre-natal supremacy over ‘the children’ and the MIC is a one way street.
Soft force eugenics and child abuse: how the DVIC and the MIC maintain religious, and narrative supremacy over future generations. Meet the Countering Violent Extremism programs which are really ideological restraints on privacy, rights of assembly, and rights of free expression, coupled with violations of the equal protection clause of the United States Constitution.
Imagine you are a peace activist, or NOT a member of one or another sect/cult/order/denomination of a Jewish-christian religion; or you’re an atheist/humanist/whistle blower/ activist-even a ‘petty criminal’ who smokes pot-and one day, you find that you seem to bump into the same faces all over town-that ‘faces’ re following you. That’s odd, you think: that 6’2″ tall guy in the brown Eddie Bauer loafers, classic Dickey’s slacks, and the close cropped, fawny Germanic brown hair that matches his shoes,and who drives an oversized big red Ford pickup-he was everywhere I was today: whipping into the parking lot at Target, or sweeping into the restaurant that serves the “ethnic food,”and trying to bury his angular 6’2” frame into a booth. Odd, you think- how a guy that big can hide himself behind an 18″ tall menu….
Naw, you think- must be my imagination. The 18″ menu format, I mean.
And then, for weeks, this pattern repeats itself, sometimes with the tall guy, sometimes with others, usually white but frequently erudite and well dressed 6’3″ brown and black people (also, often with dreadlocks and blue suits; or pert Persian women in sensible flats, with cameras in hand, asking to take your picture at peace marches, or anti-apartheid meetings). The squat, weight-lifter framed black woman with the bad weave, and the sensible backpack and recognizable mid-western accent coupled inevitably with the tall brown shoed flatfoot; the Asian man who is a modern Charlie Chan, but with real Asian heritage and ethnicity, showing up on buses, coffee shops, AA meetings maybe (I have that on reliable sources, I promise…).
That’s odd, you think- this has been happening for weeks! Months! YEARS!! And you become a bit ‘paranoid’ and a bit on edge, looking over your shoulder all the time, because those same faces show up frequently; sometimes across the states.
Related Story: The Brennan Center for Justice at NYU CVE link roundup
About then, when you notice, and especially, when you begin to document it in some form-it stops-day after day goes by and you don’t see the tall guy, or the middle eastern or the Kenyan man following you; and the late middle aged shrew with the strange comments in the grocery store about ” I know what you READ!” disappears too. A week or two or a month goes by, and then new things happen: you come home, and the lock on your door is somehow different-usually it is more loose-but now it’s harder to get your key into(this can go both ways, as each lock smith, or lock picking set is different); or there are strange marks on your door jamb (sometimes a three pronged tool is used, other times what appears to be a wide, flat screwdriver).
The Black Bag Job, illustrated:
1563470456369
IMG_20190719_012742
1563470581341
1563470538651
And the internet, of course- you try to log in to Gmail, and as if you are being transferred to a computer across the world-twice-as it takes between seven and twenty seconds just to log in-EVERY TIME, whereas in the past several years, it was a matter of one to three seconds. You notice that you Gmail address has been switched from San Francisco to Irland, or he UK-odd, that you would take the time to notice that-you probably are losing it.
Strange, you think, I haven’t changed ISP’s, or used a new computer, nor have I changed any settings on ANYTHING. And certainly, I don’t live in Kansas, anymore. And certainly, those brand new wireless AP’s that spring up outside your house with kewl names like “MAdame PSycho,” and “Not the FBI Surveillance Van,” or “TAO2” are all in your head. Sure-that’s an option too.
Hmmm. And the pop-ups and advertisements on your computer will take on a life of their own, as for years upon years, you got ESPN, Manchester United schedules,  and “subscribe now!” popups every time you are on the computer reading news for free, or maybe an occasional ad for the “Penis Pump,” or free Viagra samples(no-really that wasn’t my case, I swear) but you now get pop-ups asking you about tinitus, and advertisements for middle eastern vacations-ads in Arabic. Maybe you get the weird pop-up about gun shows in Texas(“deep discounts for LEO’s who buy in bulk!”), as your IP registers in Nebraska….
And, the phone of course- your phone now has the ability to occasionally talk back to you- about what you did yesterday, or an hour ago (and this will happen only once or twice, just so that you cannot begin to document it.)
This is on the surface one of two things: you are going totally and completely bonkers-nuts to the meat grinder mad-you are deteriorating as if your mind has been taken over by ‘something else” that somehow knows who YOU are, and WHERE you are at all times, even if you’ve never owned a gun in your life, or used a penis pump (well-who HASN’T used one of those?!!).
You become pre-occupied with little strange happenings like your garbage being tipped over in your alley, or the long scraping marks left on the siding of your house by a ladder-maybe in your paranoid mind, you connect those random events: the ladder marks to your now debilitated security cameras whose cables had been disconnected RIGHT WHERE THOSE LADDER MARKS scrape your siding, and ding your white aluminum window trim with deep scars and gray marks.
Maybe the little camera left behind in your sons bedroom is a sign of something evil-who knows, right? It’s your word against the deep state, and all of it’s military/LEO/psychologist/MIC/PIC/religionist/occultists-who-work-in-government. And who are you, really? It’s for the Children (hitler youth), after all!
Or, maybe the reports from your neighbors about how they saw other strange fat white men jumping your fences, or signalling to each other from your alley to the street, or using strange hand signals just as they hopped into cabs that JUST HAPPENED TO BE WAITING THERE in front of your house strikes you as “odd” reports from a good and trusted neighbor.
Suuure. Maybe your going crazy-along with your neighbors, who ALL report these things to you. And some of whom are suddenly building fences, or installing their own security lights and cameras.
Yup-you’re nuts, prolly. Orrr mebbe….
Maybe another option that is a little less crazy perhaps: you are being covertly and totally [email protected] with by one of any number of sources ranging from LEO’s to military operations, to strange cultists or organized gangs of pedophiles* that most often are run from within the official cover of state agencies and their affiliated “good guys” and girls (here is one possible case of that. And read through this blog to help understand who else it might be.)
But in many of the early cases-stemming back to around 2001-these were often covert intimidation/recruitment/entrapment/coercion/conformity/manipulation schemes that loosely fall under the category of “countering violent extremism” programs run by any of a number of unethical operators ranging from LEO’s, task forces, and intelligence agencies to private contractors.
And, the one key feature they all have in common has a plausible connection: agents and agencies that practice fraud upon the courts, and fraud upon the Constitution via massive, unchecked database abuse, and surveillance via electronic media such as computers, cell phones, and even televisions. You have been selected, and targeted for intelligence collection (HUMINT), informant recruitment (they want to use you as a rat), or possibly, you have been deemed a criminal, without due process of law,  due to the use of unauthorized access to your computer and Google searches, and, because that access was illegal, and parallel construction not warranted in your case (there’s a joke in there somewhere about warrants) “they” have chosen to use you as a moving target for all their new military grade electronic toys and weapons.
Related Stories: Have a look at the bizarre world of parallel construction from Techdirt.com-the practice of LEO’s breaking the law, and violating the Constitution, and then doing plastic surgery to put a new face on “criminality.”
Sooo…….
Welcome to the shadowy, sketchy, often bizarre (and incredibly well financed) world of CVE programs!

“Countering violent extremism programs have been identified by the government as a top national security priority, but the public knows appallingly little about them,” says Hina Shamsi, director of the ACLU’s National Security Project. “We’re suing because government agencies have repeatedly failed to provide us information that we’ve requested about the nature of their CVE initiatives.”
In a briefing paper released with its lawsuit, the ACLU said that CVE programs often target “people for monitoring based on their beliefs or ideologies,” thus potentially criminalizing speech protected under the First Amendment. It also highlighted past abuses of CVE programs, including instances in which young people who refused to take part were characterized as radicals and where community leaders were told they would have to identity and discuss cases of specific youths with law enforcement.
The Department of Homeland Security declined to comment for this story, citing pending litigation. The Department of Justice did not respond to request for comment.
Government-led CVE efforts in the United States are inspired in large part by programs rolled out in past years in the United Kingdom. Broadly speaking, CVE programs seek to expand counterterrorism efforts beyond law enforcement to involve other government workers, like teachers and social workers, as well as community leaders outside of government, like clergy. They can involve propaganda and other communication strategies as well as monitoring and questioning.
Those programs have been deeply controversial in the UK, where civil society activists have blamed them for exacerbating ethnic tensions within British society while failing to meaningfully fight extremism. In recent months, the U.K. government has also rolled out anti-radicalization programs in schools, which have led to instances in which Muslim schoolchildren have been stigmatized by teachers as potential terrorists.”

*One recurrent theme in almost ALL OGS blogs is that those who are targeted are also slandered with a variety of “labels” ranging from drug dealer/user/ to prostitute to “pedophile”. But the reality is that state organizations, police, psychologists, lawyers, the courts, CPS, foster care, social work, and many other subsidiary organizations are a multi-billion dollar per year domestic industry, subsidized by the Jewish-christian ideological state to get children funneled into the Domestic Violence Industrial Complex (DVIC) by hook or by crook (be the shepherd, not the sheeple and all that.)
Each child that is successfully stolen or otherwise diverted into this “system” is a cash cow (cash sheep?) returning dividends to those who are part of this system. For instance-foster parents can rake in between 800-1800 per month, depending on the state, per child. And any child that becomes involved with CPS ca returns some 70k or so per year to those who participate in this business.
Not surprisingly, Myron May, a man who claimed he was gang stalked, was the product of the multi-million dollar Christian foster care factories that are dotted across America-and no researcher of OGS has yet made this connection between him, and this systematic profiteering off of children as commodities.
Disclaimer: I make no claims herein specifically or intentionally relating to the financing of the Taunton Foster care community, and intend this example as one of many where children are used as cultural capital as well as actual capital. owever, I have long been a critic of the DVIC foster care factories that dot America and that are themselves a 4 billion dollar per year industry. Children taken into foster care stand an 80% ncreased chance of sexual abuse, or othher harmful situataions, and the feminists/internationalist/bolshevik elements of many “progressive” state depend on this revenue, and use it for political action.

Organized gang stalking and FBI informants, rats, snitches, and Uncle Tom's: many in the OGS dialectic are actually informants

Below is a Public Service Message:

If you see something, say something. Ratting on others for things real and imagined is as American as apple pie, lemonade stands, and domestic terrorism waged from within government and institutions of status quo power.
Also, if you have a petty vendetta, disagree with your neighbors politics, or saw something bad when you were looking into their windows from underneath their window ledge, report it immediately to someone who will send a squad car over there! We gotta pull together and STOP THE BADGUYS at their windowsills (or, Windows 10), before they come across OUR FENCE and peek into OUR HOMES from underneath OUR WINDOWSILLS!

Scoop by Memphis Commercial Appeal reveals that iconic Martin Luther King photographer Ernest Withers was an FBI informant-a RATand that he ratted on King directly to the FBI the day before King was assassinated in Memphis

“D’Army Bailey, a retired Memphis judge and former activist once watched by the FBI, told the paper that such covert tactics are “something you would expect in the most ruthless, totalitarian regimes.”
The Commercial Appeal found FBI reports indicating that Withers collaborated for years with FBI agents monitoring the civil rights movement. Those FBI reports, the paper’s Marc Perrusquia writes, “reveal a covert, previously unknown side of the beloved photographer.”
Digging into the late Withers’ past wasn’t easy. The Commercial Appeal’s scoop proved to be the result of shoe-leather reporting, determination and a bit of luck.
The newspaper tried unsuccessfully to obtain Withers’ informant file, with the Justice Department rejecting Freedom of Information Act requests and refusing to acknowledge that such a file even exists. However, as  Perrusquia writes, the government did release “369 pages related to a 1970s public corruption probe that targeted Withers — by then a state employee who was taking payoffs — carefully redacting references to informants — with one notable exception.”
And in those documents, the Commercial Appeal notes, the government inadvertently left a single reference to Withers’ informant number, which “unlocked the secret of the photographer’s 1960s political spying when the newspaper located repeated references to the number in other FBI reports released under FOIA 30 years ago.”
Follow this linkthis link to read more!
Iconic photos by Withers here

 
Related story: How Ernest Withers was an FBI rat, and likely aided in the murder of Martin Luther King and other civil rights activists: https://www.yahoo.com/news/blogs/upshot/famed-civil-rights-photographer-doubled-fbi-informant.html
So, apparently, kids,  the path to power and glory is paved with privacy rape, deception, and the corpses of those who dissent, or who are activists against the establishment order. This blog advises you to rat someone out immediately, even if you have to make it up!
Or: How to become President in One Easy Step! The odd case of Ronald Reagan, backstabbing rat:
Fed Up: The FBI’s Harassment and Spying on 1960s Students Revealed in ‘Subversives’ by Seth Rosenfeld

A new book filled with newly released FBI documents paints a damning portrait of the feds spying on, harassing, and denouncing largely innocent Berkeley students in the 1960s—with Ronald Reagan as a star FBI instigator and informant. Michael Kazin on Seth Rosenfeld’s Subversives.
How to become President in one easy step: become an FBI informant like Ronald Reagan
…every biography of Ronald Reagan describes how, in 1966, his repeated denunciations of “the mess at Berkeley” helped him claim the governorship of California in a landslide—and immediately won the hearts and minds of conservatives everywhere who saw the charismatic actor as their best chance to capture the White House….
In the crusade against troublemakers at Berkeley and their supposed codependents, Hoover could always count on the zealous assistance, both covert and public, of a number of national celebrities and local politicians. The most significant of these, Rosenfeld shows, was none other than Ronald Wilson Reagan. Reagan’s close relationship with the FBI began early in the Cold War, when he exchanged “information” about pro-Communist actors, screenwriters, and union officials with agents who stopped by his home in the Hollywood hills.
For the next three decades and more, Reagan became, according to Rosenfeld, “one of the FBI’s best contacts ever.” He routinely passed along to the Bureau rumors about Communists in the film industry and frequently lauded the agency in speeches, press interviews, and on television. So appreciative was Hoover that, in 1965, he stopped his agents from questioning Reagan about his son Michael’s close and rowdy friendship with the son of a top Mafia chieftain, Joseph “Joe Bananas” Bonanno. Instead, the FBI boss ordered his men, as Rosenfeld puts it, “to confidentially warn the father about Michael’s ‘dangerous dalliance.’” Reagan, then considering a gubernatorial campaign, responded with gratitude and relief. A high-ranking G-man reported that “he [Reagan] realized that such an association and actions on the part of his son might well jeopardize any political aspirations he might have.”
Once he took office in Sacramento, Reagan worked diligently in tandem with the Bureau to drive the scourge of radicalism from the premier campus of the state university, and to buff his own image as a defender of Middle American resentments.

 
The past is the present is the future is the mantra of the establishment bullies. More on how the NSA/FBI/CIA domestic data theft pipeline destroys democracy, one conversation, one illegal wiretap, one trumped up dossier- one activist at a a time here.

Organized gang stalking, Scott Crow, disinformation and informants.

Scott Crow, an anarchist, animal rights activist, has gone on record stating that organized “gang stalking is bullshit,”which is alright- because everyone is entitled to an opinion. And as they say, even assholes have those. Opinions, of course. And, I guess for some, it’s easier to love fuzzy or feathered critters and act like cute, four year old anarchists with lil’ diapies full of doodoo, than to deal with the real issues of gross human rights abuses of corporatism colluding with a full blown surveillance/security state to do things to people that were unimagined at the height of America’s last Constitutional crisis of the 1960’s (click here to see the catalogue of surveillance gear available to LEO’s who spy on American citizens without warrants).
But to the hundreds of thousands of people world wide who claim to be harassed by unknown assailants, various electronics ranging from wiretaps and StingRay towers, cell phone emulation, and sound weapons (what’s that clicking on my phone?!), and stalkers- lots of stalkers who do plainly weird shit called street theater- the evidence is against Mr. Crow’s opinion.
There is ample evidence of religions and cults that stalk people; evidence that the intelligence agencies and some really bad  LEO’s stalk people; retired LEO’s stalk people, the USAF and Naval NCIS working with the CIA and others stalk people; a HUGE well heeled operation of conformity enforcement run by the OSI and there is sh!tloads of evidence that it is part of a large, orchestrated crisis PR movement. And of course, every crisis PR movement needs useful idiots, who are just glad the pendulum missed their neck.
Scott Crow.org, on gang stalking:

In the last couple of years I became aware that I have accidentally become the poster child for a marginal, but rising movement.   It’s a movement of the disaffected, and somewhat marginalized in civil society. And like all of us its made of those alienated by the ills of capitalism: our atomized communities,  the overwhelming media (online and corporate) that can reverberate any idea into truth and the growing overwhelming complexities of our social and political spheres.  There is also another important piece that I have to throw into this cauldron that has given rise to this movement too; the farce called the war on terror and its all ensuing baggage of the surveillance state. Sounds intriguing doesn’t it? If you guessed I was talking about anarchy, social justice or even LOLcats you would have guessed wrong.  What I am referring to is an internet phenomena called gangstalking and somehow my surveillance by the FBI and Joint Terrorism Task Force for almost 9 years became the actual proof they all needed to say they were right all along; that they weren’t just paranoid.  Except I wasn’t gangstalked.

Related Story: The famous Civil Rights photographer Ernest Withers-who photographed ALL of the black leaders of the 1960’s, was a paid RAT. Bonus points if you can answer the question: And WHY was this guy at the hotel where Martin Luther King was shot dead?
SO- make of Scott Crow’s opinion what you will, But psychologists and other paid disinformation agents who both benefit directly from drug companies and privatized prison payrolls, and those who work with schizophrenics and sex offenders have even waged a classic “black propaganda” campaign to discredit those who claim they are harassed.
I DUNNO. MEBBE They is all caaaaraaaazy. Or not.
Either way? Any scientist, sociologist, intel agent, or crisis PR moron can take the data provided in this blog and test the many proofs and hypotheses themselves, against historical events like COINTELPRO, and the destruction/co-option of the peace/anti-war/Civil rights movement. You can look for- and find- the evidence that I provide herein-and replicate the methods, and find new validation yourself. I have merely provided a starting point.
But it boils down to this: people like Scott Crow, who was followed, surveilled and harassed by the FBI in what amounts to a fairly traditional investigation of a fairly pasty white traditional ‘suspect’ claims OGS is “total bullshit.” I mean-after all- animal rights people are startlingly quiet about warrantless surveillance, human rights, prison reform, and how the targeted, flawed and sociopathic Countering Violent Extremism programs work with local LEO’s and private security contractors to terrorize TI’s into complicity with snitch culture.
You don’t have to believe me- ask an actual RAT, Greg Monteilh, former FBI informant, about the “murky” practice of “flipping” innocent people into becoming agency informants-from the Guardian UK:

The ex-FBI informant with a change of heart: ‘There is no real hunt. It’s fixed’-Craig Monteilh describes how he pretended to be a radical Muslim in order to root out potential threats, shining a light on some of the bureau’s more ethically murky practices….(follow the link to learn more).

Just off the top of my internet, I can think of these many many validated tactics below that are reported by TI’s. And these days, as the NSA shares data with 16 other intel agencies and targets American citizens, it ain’t gettin’ any prettier out there without due process (even if Mr. Crow thinks it’s all bullshit, some of us still believe in Constitutional Democracy. And Mr. Crow and his pals- most of them animals- don’t read the Constitution anyways.).
A short list of what the NSA et al is doing to American citizens BEFORE they turn the data over to the local LEO’s-from Brian Lehrer-and ask yourself how YOU would feel with this arsenal pointed at YOU, personally:
THE NSA CAN:

  •  track the numbers of both parties on a phone call, as well location, time and duration. (More)
  • It can hack Chinese phones and text messages. (More)
  • It can set up fake internet cafes. (More)
  • It can spy on foreign leaders’ cell phones. (More)
  • It can tap underwater fiber-optic cables. (Clarification: Shane Harris explains that there were reports the NSA was trying to tap directly into cables using submarines, but is now more likely trying to intercept information once it has reached land.) (More)
  • It can track communication within media organizations like Al Jazeera. (More)
  • It can hack into the UN video conferencing system. (More)
  • It can track bank transactions. (More)
  • It can monitor text messages. (More)
  • It can access your email, chat, and web browsing history. (More)
  • It can map your social networks. (More)
  • It can access your smartphone app data. (More)
  • It is trying to get into secret networks like Tor, diverting users to less secure channels. (More)
  • It can go undercover within embassies to have closer access to foreign networks. (More)
  • It can set up listening posts on the roofs of buildings to monitor communications in a city. (More)
  • It can set up a fake LinkedIn. (More)
  • It can track the reservations at upscale hotels. (More)
  • It can intercept the talking points for Ban Ki-moon’s meeting with Obama. (More)
  • It can crack cellphone encryption codes. (More)
  • It can hack computers that aren’t connected to the internet using radio waves. (Update: Clarification — the NSA can access offline computers through radio waves on which it has already installed hidden devices.) (More)
  • It can intercept phone calls by setting up fake base stations. (More)
  • It can remotely access a computer by setting up a fake wireless connection. (More)
  • It can install fake SIM cards to then control a cell phone. (More)
  • It can fake a USB thumb drive that’s actually a monitoring device. (More)
  • It can crack all types of sophisticated computer encryption. (Update: It is trying to build this capability.) (More)
  • It can go into online games and monitor communication. (More)
  • It can intercept communications between aircraft and airports. (More)
  • (Update 1/18) It can physically intercept deliveries, open packages, and make changes to devices. (More) (h/t)
  • (Update 1/18) It can tap into the links between Google and Yahoo data centers to collect email and other data. (More) (h/t)
  • (Update 4/2) It can monitor, in real-time, Youtube views and Facebook “Likes.” (More)
  • (Update 4/2) It can monitor online behavior through free Wi-Fi at Canadian airports. (More)
  • (Update 4/2) It can shut down chat rooms used by Anonymous and identify Anonymous members. (More)
  • (Update 4/2) It can use real-time data to help identify and locate targets for US drone strikes. (More)
  • (Update 4/2) It can collect the IP addresses of visitors to the Wikileaks website. (More)
  • (Update 4/2) It can spy on US law firms representing foreign countries in trade negotiations. (More)
  • (Update 4/2) It can post false information on the Internet in order to hurt the reputation of targets. (More)
  • (Update 4/2) It can intercept and store webcam images. (More)
  • (Update 4/2) It can record phone calls and replay them up to a month later. (More)
  • (Update 6/2) It can harvest images from emails, texts, videoconferencing and more and feed it into facial recognition software. (More)

Did we miss any? Mischaracterize any capabilities? Let us know in the comments, or tweet @brianlehrer.
Suuure. It’s all bullshit- yeah, that sounds about right. Yup-keep your head up your ass, play it safe, m’boy. “They” are prolly all crazy- no electronics involved at all. Nothing to see here move along now….
 

Organized stalking and punitive psychology: the paradox of psychologists as arbiters of the mental health of targeted individuals.

Conflict of interest in psychology? Targeted individuals and mental health: CVE programs and dubious intentions; even more dubious results.
Those who experience the quasi legal, and often illegal interactions targeted at them by intelligence agencies, law enforcement and the wide net of affiliated community groups that perpetrate organized gang stalking, such as the LEIU’s,  are often left debilitated, as the goals of OGS are stated in multiple blogs and videos online, and even Urban Dictionary is aware of these campaigns: they seek to destroy individuals.
Urban Dictionary has a list of the activities that TI’s are subjected to, but there are many more descriptions in the less than academic online discussion communities. One theme is certain to come up:  OGS seeks to destroy relationships or exploit them, isolate individuals, demolish and demoralize individuals and leave them broken and homeless.
Programs like the FBI’s Countering Violent Extremism, or CVE program,  enlists psychologists, social workers, teachers, homeless shelter advocates, and many more community members in the stalking, and harassment that a targeted individual experiences, and the TI has little to no chance of privacy, or the ability to recuperate from the stated goals of OGS. They literally have nowhere to run as they are filleted by this mechanism.
Let’s take a look at what a TI experiences as they are pressured or recruited by an FBI informant- and keep in mind that it is not just Muslim’s who are being targeted, but also that every law enforcement agency has versions of their own programs, targeting trailer park kids and south Central teenagers in other crime creation or infiltration schemes, as the FBI CVE is just the template for a wider range of community policing programs. And, as noted elsewhere in my blog, religious organizations and cults, community groups and others use these tactics too, though the purposes vary, the effect is often the same.
From the Intercept:

First, they target a Muslim[see my note above]: not due to any evidence of intent or capability to engage in terrorism, but rather for the “radical” political views he expresses. In most cases, the Muslim targeted by the FBI is a very young (late teens, early 20s), adrift, unemployed loner who has shown no signs of mastering basic life functions, let alone carrying out a serious terror attack, and has no known involvement with actual terrorist groups.
They then find another Muslim who is highly motivated to help disrupt a “terror plot”: either because they’re being paid substantial sums of money by the FBI or because (as appears to be the case here) they are charged with some unrelated crime and are desperate to please the FBI in exchange for leniency (or both). The FBI then gives the informant a detailed attack plan, and sometimes even the money and other instruments to carry it out, and the informant then shares all of that with the target. Typically, the informant also induces, lures, cajoles, and persuades the target to agree to carry out the FBI-designed plot. In some instances where the target refuses to go along, they have their informant offer huge cash inducements to the impoverished target.
Once they finally get the target to agree, the FBI swoops in at the last minute, arrests the target, issues a press release praising themselves for disrupting a dangerous attack (which it conceived of, funded, and recruited the operatives for), and the DOJ and federal judges send their target to prison for years or even decades (where they are kept in special GITMO-like units). Subservient U.S. courts uphold the charges by applying such a broad and permissive interpretation of “entrapment” that it could almost never be successfully invoked.

Once again, we should all pause for a moment to thank the brave men and women of the FBI for saving us from their own terror plots.

One can, if one really wishes, debate whether the FBI should be engaging in such behavior. For reasons I and many others have repeatedly argued, these cases are unjust in the extreme: a form of pre-emptory prosecution where vulnerable individuals are targeted and manipulated not for any criminal acts they have committed but rather for the bad political views they have expressed. They end up sending young people to prison for decades for “crimes” which even their sentencing judges acknowledge they never would have seriously considered, let alone committed, in the absence of FBI trickery. It’s hard to imagine anyone thinking this is a justifiable tactic, but I’m certain there are people who believe that. Let’s leave that question to the side for the moment in favor of a different issue.

So, psychologists in the very least are diagnosing shadows if they are unaware of these types of programs, and doing a great dis-service to psychology, and to the narrative or proper care of TI’s.
These programs incentivize psychology to act as informants themselves, and to report to the authorities the state of mind and mental health of an individual who does not even know who the hidden secret people and groups.In other words, psychology is truly “in on it,” as we have never seen before.
Especially troubling is how one of the leading privacy rape advocates in America, Senator Dianne Feinstein(who  benefits from a $600 million in government/military contract), correlated child pornography with terrorism, and used that as a tool whereby she could pry away patient-therapist privilege.Where once targeted persons and others had the protection of patient-psychologist privilege, today, the agencies have stripped even that. and, in one eerie reminder of past CIA and psychiatry collusion, we now see that California psychologists are mandated to report patients who “use” child pornography, when in fact the agencies distribute it, and likely use it in terrorist recruitment programs in classic compromise operations. As Bruce Schneier has noted, it is likely there is more to the story of terrorists and bad guys and child porn, because hiding secret messages in cp is like “smugglers hiding kilos of cocaine in bales of marijuana.
There is literally nowhere to hide from this form of institutional abuse, and mis-diagnoses brings back the reminders of the Soviet era and Stalin’s punitive psychology. Agency collusion to undermine victims of government abuses is startlingly similar to earlier era’s of experimentation on citizens.And, because this is a ‘cutting edge’ issue, and fairly new to psychology and criminal defense attorney’s, historical perspective is important, as we know from the past the agencies distribute drugs, and even assassinate people. But few historical examples are better than the story of Pulitzer Prize winning journalist Gary Webb, who first revealed the CIA’s drug running in the US in his expose'”Dark Alliance.
But whatever you, the reader decides, don’t shoot the messenger-or call them crazy.
Related: Academic says that the governments are distributing child pornography and using terrorism as stalking horses to destroy privacy rights.