Who wants to watch a murder tonight?

Dear Fusion Center: I saw something! I am saying something!! The local CIA Operation, a predictive crime and human tracking program called LASER is about to go nuts! And I had to ask the Russian’s about it- because apparently the first amendment and FOIA only works in Communist countries now.

Related Story: What is Operation Laser, and how have CIA programs “gone local?” Here is the Laser operations guide.pdf from LA County.
Dubbed ‘LASER,’ the software program was developed by the CIA’s venture capital arm and connects the dots from 15 separate sources of data to draw links and connections for combating crime. Ultimately it is able to analyze street crime locations, as well as ex-cons and their alliances, the Associated Press reported.
Under the program, a crime intelligence unit creates a list of people’s names, which patrolmen routinely gather when doing street stops and arrests. The lists are marked for information only and include a photo and the license plate numbers of vehicles that people use. This information becomes the starting point for analysis and investigation.
READ MORE:‘Drone-Free LAPD!’ LA residents protest police spy drones

PALANTIR MAPPING SYSTEM/ PALANTIR AUTOMATIC LICENSE PLATE READER (ALPR), and gangs

Look- you and the Five Eyes apparatus are about to watch a murder! Remember Ramsey Orta, the guy who filmed the murder of Eric Garner? He filmed a murder in progress as sh!tty little gang stalkers killed a man for pennies.
Yeah this guy is about to be murdered. This is truly MHCHAOS on acid:
[youtube https://www.youtube.com/watch?v=LfXqYwyzQpM&w=720&h=405]

How is Palantir’s crystal ball used?  How does modern CIA domestic operations  use Palantir to “target individuals”?
“LASER stays on mission, measures dosage, uses Palantir”

Every time I am online profiling assholes, just like you, I find comments like this, here, that some assholes leave on blog comment forums-this was from an article that detailed how gang stalking BY federal powers is designed to protect corporate interests, AND manipulate a young girl who was forcefully incarcerated in a hospital-and, it talked about how an activist was protected by gang banger’s in a prison cell:

Yeah, but were the demons appeased?

Oh My God, its me again. Jaab
LOL.. Poor Amerika, everybody getting raped, raped growin up, raped at their jobs, raped tryin to get a job, raped in prison, raped at the airports, raped on board the aircraft, raped, raped, raped, and now its not just rape, its devil Satanic demon rape. And I though I’d seen it all when everyone stared getting raped in the Airport.

Dude if MS!# are so nice will you house some of them ?
And you are aware that to be one you have to kill before you are in ?
My cousin did 4 years in Prison in El Salvador he can tell you how nice is MS13. He was lucky we had money and he could pay for protection .
Inmates with no money had to fight for the food rape others for food etc…
So go F yourself with this article
———————————————————–

Like most people, I think gang banger’s suck. But only a little less than corrupt police who encourage the brutality in the first place, rather than mitigating it, or working towards better solutions that foster whole communities instead of gang activity.
But what we see instead is a total cognitive dissonance between our social tiers-and how the problems of the or are mocked and derided. But we also see how certain species of human’s use labeling theory in practice-and how “satanic panic” in daily dialogue echoes well documented “gang stalking jargon” to the net effect of othering in an Ich, Du paradigm, and maintaining status quo, and more. So there is little doubt about who it is that these comments are from-what “sector” of the DVIC is plain and clear.
Then, we note how some use rape threats to control other men, and the net effect of an ape-like social structure that perpetuates bad behavior. And all of that with the straw man that has such wide appeal to white female voters. So, truth to power and all that-where’s the man/woman who will shoot Liberty Vallance in the heels this time around?
The Man Who Shot Liberty Valance.jpg
We the peeple need you, pal. And- bring your ROGS BINGO card this time.
From Huffington Post, the story of a gang stalking target, Ramsey Orta:

He Filmed The Death Of Eric Garner. Now He’s Getting Ready To Spend 4 Years In Prison.

Ramsey Orta, who says he’s still haunted by Garner’s death, thinks the NYPD is out for revenge.

LAS VEGAS ― Ramsey Orta says he’ll wake up crying sometimes, and he won’t know why.
A few days will pass, and suddenly he’ll remember the dream. The one where he’s on that block in Staten Island, on that cool July day, filming a police officer putting his friend Eric Garner into a chokehold.
Only this time, Orta feels an arm wrap around his own neck, squeezing tighter and tighter. Until he can’t breathe.
“And then it just goes all black,” Orta said.
There are other dreams too: the one where he’s running from the cops, and the one where somebody in a hoodie walks up to him in a park and shoots him.

“Pretty much all my dreams are messed up,” he said. “I don’t remember the last time I had a nice dream.”

Facebook investor agrees with ROGS: Facebook is worse than Hitler's propaganda

My regular readers will note that day after day, we see that my many “theories” and so on are validated by surprisingly rational people-and, sometimes, by billionaires too. But “mind control experiences on the internet” are real, Dorothy! And-the internet is planned that way from the state level to the corporation that does this crap-these are inter-conected in the endeavor of brainwashing us the peeple- social media like Facebook, Twitter, Snapchat and more are ALL actively seeking to influence us, manipulate our dopamine levels, our choices, and more.
So-if the corporation is doing that, what do you think the Company might be up to? I think all those “color revolutions” and “jasmine” in the ME provide examples of ‘what is possible’ don’t you?
I saw something! I am SAYING something, officer Friendly! I saw some vampires that need a kick in the teeth! And those vampires are using mind control on children-and even putting creepy crap into their Youtube viewing!!!
Here- have a look at what I said a few months back-after I got p!ssed that OGS denialist’s were overlooking how some are using the internet to actually target, harass, and cause harm to others, AFTER they had entrapped all of our data, and passed us around inter-continentally as if we are mere drunken air hostesses or floozies(.)(.)
I said: This here about “memetic neuro fasciitis,”and a bunch of other stuff about how the internet is in fact-and in PRACTICE being used to manipulate urr minds, in real time. And look-the ACLU has noted the Fusion Centers are themselves complicit in manipulating user data, and Twitter even plugged the “firehose” that subverted our free will at the switch. In fact, my lone wolf cry in the wilds has produced what could well be the Snowdenball effect, where the whole spy apparatus gets the firehose turned into its own Panoptical eyeballs. And, gang stalking will take a kick in the teeth too, cuz guess wut? People from 12 nations peeked in here today alone!
lone wolf journalism
And look! Even Tim Cushing over at Techdirt.com [link here] and Mark Harris of Wired is kicking Peter Thiel in his crystal balls. Big Data Lawsuits will be bigger than the Big Tobacco Lawsuits by far:

Mark Harris of Wired has put together a fascinating expose of the company’s work with US law enforcement based on documents obtained via FOIA requests. What’s uncovered does little to alter Palantir’s reputation as an enemy of personal privacy. What’s added to this rep isn’t any more flattering: the documents show Palantir handles data carelessly, ties customers into overpriced support/upgrades, and otherwise acts as though it has to answer to no one.
In one case, files marked as sensitive by a Long Beach drug squad detective were still accessible by other officers who shouldn’t have had access. Multiple emails to Palantir failed to resolve the issue. Making it worse was the fact the problem couldn’t be contained in-house. When agencies sign up for Palantir services, they’re given heavily-discounted rates if they allow their data to be shared with other law enforcement agencies. Detectives hoping to protect sensitive sources and undercover cops from outside access were finding out their employers had signed that option away in exchange for cheaper initial pricing.
That’s just the beginning of Palantir problems uncovered by these public document requests:
In the documents our requests produced, police departments have also accused the company, backed by tech investor and Trump supporter Peter Thiel, of spiraling prices, hard-to-use software, opaque terms of service, and “failure to deliver products” (in the words of one email from the Long Beach police). Palantir might streamline some criminal investigations—but there’s a possibility that it comes at a high cost, for both the police forces themselves and the communities they serve.

Yup- all the hungry yvampires are programming your children, and milking all of our data. Well-not MY data per se, as I don’t use social media, unless I am experimenting or doing security research. I am targeted in other ways that Facebook users are not, because I have been stalked, hacked, harassed, targeted and worse since 2004.when I wrote a few news stories about neo-McCarthyism. How wrong I was then-because it’s so much worse than even ol’ Joe could have told us then.
But, as we see-the FBI takes down web pages after mass shootings- because SOMETHING is wrong over at Facebook, and how some peoles data streaam is influenced-but it’s also wrong all over the web in general. And I am on record as being perhaps the fist person anywhere, ever to draw these comparisons, or point the reader, and the journalists to how “the internet” is being used by actual real people, in real time, to harass and manipulate people online.
Well-have a look at what this lil’ ol’  billionaire is saying a couple days ago: Roger McNamee “likened the techniques of the techniques of the company to Mr Bernays and Hitler’s public relations minister.”
So, to the researcher, the psychologist, and the potential future litigant-but ESPECIALLY to the litigator and the criminal defense attorney, take note that the official denial of organized gang stalking has taken a major hit and that Edward Bernay’s version of brainwashing has made it into the MSM-so ROGS isn’t alone in comparing “the internet” to mind control, or providing examples, as ALL major works of previous propaganda are now in line with the ROGS thesis.
And, while you’re here, please take a copy of the ACLU, EFF, NACDL’s guide to government hacking along with you-now if we can just get to work on a “guide to government mind control practices” we will speed this along, all the way up to the FISA court. (did that ding any bells there at the Fusion Center? I hope so, because police states don’t just go away-add that phrase to your matrix, you will need it at FISA).
Ahhh, I am ready for my closeup, Mr. DeMille! The crazy guy on the internet sayyyys:

Early Facebook investor compares the social network to Nazi propaganda, likens its workers to Goebbels and claims it is creating a climate of ‘fear and anger’

  • Former Facebook investor warns tech giant has ‘absolved itself of responsibility’
  • Roger McNamee likened social network’s methods to Nazi propaganda chief 
  • Comes as analysts expect Facebook usage to go down in teenagers this year 

Speaking in Washington, the former investor said everyone was now ‘in one degree or another addicted’ to the site while he feared the platform was causing people to swap real relationships for phoney ones.

And he likened the techniques of the techniques of the company to Mr Bernays and Hitler’s public relations minister.

‘In order to maintain your attention they have taken all the techniques of Edward Bernays and Joseph Goebbels, and all of the other people from the world of persuasion, and all the big ad agencies, and they’ve mapped it onto an all day product with highly personalised information in order to addict you,’ Mr McNamee told The Telegraph.

Mr McNamee said Facebook was creating a culture of ‘fear and anger’. ‘We have lowered the civil discourse, people have become less civil to each other,’ he said.

Mr McNamee said the tech giant had ‘weaponised’ the First Amendment to ‘essentially absolve themselves of responsibility’. He added: ‘I say this as somebody who was there at the beginning.’
Read more: http://www.dailymail.co.uk/news/article-5071913/Facebook-investor-compares-network-Nazi-propaganda.html#ixzz4yYoieRlW

 

Guest Post from 4rec3s: Gang stalking and artificial intelligence-a world of false positives and death

This essay is based on this post on the Boingboing article, “NSA and GCHQ’s crappy Big Data techniques may be killing thousands of innocents”, which reminded me of a video of a robotic drone-death art installation that really puts this killing into a particularly inhuman perspective.

Notice: This essay does not deal with ‘electronic mind control’, drugging, ‘creating alters’, V2K or paranormal. All these links are from mainstream sources and my purpose is to glue it together as a feasibility of how gangstalking could happen with existing, known technologies. Namely social psychology, HUMINT-based pattern prediction, ubiquitous surveillance and communications.


Gangster Computer God
Every day, increasingly, our reality is validating Francis Dee’s racist, paranoid, schizophrenic prophecy of the “Gangster Computer God Worldwide Secret Containment Policy” as less fiction and more fact (sans the mullatto-jew robot doctors). More fact because it’s become feasible (except for the cosmetic surgery).
Mass surveillance innovations[1][2][3][4][5]), purposeful efforts and accomplishments[6][7][8][9]; a drive towards total information awareness[10] and such compelling integration of technology leading to a Panopticon[11][12], creates a situation in which a system could be devised capable of data-mining and heuristic pattern-of-life analysis of all citizens[12]. Coupling such a system with astoundingly capable AI technology; an extreme willingness to help (and profit motive) by industry[14][15]; an hegelian (‘ends justify the means’) ethos quite contrary to that of Christianity, secular humanism and altruism generally[16][17][18][19][20]; and “machine learning algorithms”[21][22][23][322]; form the constants of an addition equation that yields the very real possibility and therefore threat of an worldwide, technocratic, AI-based Gangstalking system.
Requirements and Purpose
The only requirements are paranoia and an utter lack of trust of the Government towards the global everycitizen[24]. In other words, “to shut down a political enemy by gaslighting[25][26][27][28] them to the extent that they end up in jail or in a mental facility”. There may be other incentives however:

  • Random harassment ‘like a game’
  • Targetted harassment of non-threat ‘undesirables’
  • Spiritual warfare ‘to demoralize the population’
  • Human / Social experimentation
  • Data collection efforts (pushing people around to see where they go / with whom they talk in ‘crisis’ mode)
  • Psychopathologizing an individual through trauma-based mind control—to develop them as asset
  • Playing both the targetted individual and deputized stalker against each other. Why is the TI the only victim?

All Watched Over By Machines Of Loving Grace[29]
Consider the following scenario.
1) You have an AI program that is hooked up with mass surveillance and has decades of social psychology to understand how humans work (HUMANINT + psychology/sociology, ‘game theory’, ‘prisoner’s dilemma’, ‘milgram’s’)[30].
2) The AI program finds ways to manipulate people (stalkers) into ‘being at a certain place at a certain time’, ‘to look out for a certain individual’. Perhaps they’ve been getting fed emails from a “protected’ or ‘authoritative source’ (AI::outreach), someone from an intelligence agency for example, that has ‘deputized’ him/her, to help assist them in tracking down ‘an alleged (serial killer / pedophile / drug dealer / murderer / stalker)‘ in the community. This person then is notified to go to a certain place and ‘watch out for’ this disreputable / potential criminal.

Everyone wants to be a hero. All that is required is exploiting our vanity.

3) This AI program has a deep knowledge of everyone from mass surveillance[1][2][3][4][5]). Enough to ‘predict behavior’ and generate a deep, heuristic, ‘life pattern’ analysis[1][2]
4) The AI knows when you leave your home, when you take a shower, approx where you are located and headed using your cellphone’s gps/wifi and cell tower triangulation sent back to servers. Also, if the AI has access to NRO satellite data, they can actually see you, with a potential resolution of 50 cm2 to 1cm2 (drone)!!
5) Using the ‘pattern of life’ and seeing that you left your home, it can send email / sms / skype / facebook / twitter / foursquare / ‘other’ instant messages to various ‘deputized’ community citizens to ‘watch you’.
6) The targetted individual is now under humanint field surveillance by people who have been tricked, duped with disinformation into thinking they are doing good, protecting the community.


Con Game, Not Mind Kontrol
None of this requires mind control. All it requires is panopticon, vain authoritarians as ‘faux-insiders’, and a highly-available communication network with dynamic asset development and appropriation software.
If this is happening, it’s immoral and abusive and it’s also lacking in manners. Military-industrial aristocrats are supposed to have manners and respect. After all, their guarded culture demands those things. But their development of rights-destroying, ‘tough guy mafioso abuses’ reveal the ruling class as irresponsible, lacking a keen foresight into consequence they claim generally has guided their successes in life and which differentiate them from the masses.
Their lack of manners has created an uncouth robot that reduces everyone to numbered accounts in a microserfdom. This robot is going to mix up the salad fork with the dinner fork, which is a metaphor for ‘killing everyone’—it’s a matter of time before it’s discernments become so specific that everyone, poor and rich alike, need to be subject to ‘quantitative easing’. And that’s too is a metaphor, for this.

What is "gang stalking"? It is the result of a nation that respects no laws- and a nation 'for sale.'

The article below is from Business Insider in 2012. It documents one of the first official sources that claimed the government had sold our rights to “others,” who were wiretapping the entire nation.
The article chronicles decorated intelligence officer, and NSA whistle-blower William Binney’s ostracization, and excommunication from the cult of intelligence, as well as his harassment by the FBI for trying to save the taxpayers FOUR BILLION DOLLARS- but also, that he tried to preserve “Costitutional Liberty,” aka “due process of law, which Americans have not had since 2004.
In 2012, many already knew that the local police were using and abusing massive databases. Many already knew that ‘somehow’ that police, and multi-agency Task Forces had access to cell phones in real time, and that ‘somehow’ they could track “targeted” communications across a city, or across a continent- and into international jurisdictions (Hi Toronto!)- and that they could repeat back selected words and phrases just to let them know they  are watching.
While these people didn’t have a ‘name’ for it them, we now know it is the current sate of affairs where Fusion Centers were spying on citizens in local environments outside the view of any court, and outside the view of due process of law, and without respect for the Bill of Rights.
These people have a name- they are “targeted individuals,” and here is where the world began to know what “TI’s” knew as far back as 2003-4:

NSA Whistleblower Says The Feds Are Gathering Data On Nearly Every US Citizen

NSA ACLU
The government has been collecting data on nearly every U.S. citizen and assembling webs of their relationships, National Security Agency whistleblower William Binney told the Hackers On Planet Earth (HOPE) conference last week.
Binney worked for the Defense Department’s foreign signals intelligence agency for 32 years before resigning in late 2001 because he “could not stay after the NSA began purposefully violating the Constitution,” according to a statement he made in court records.
On April 20 he gave his first interview after resigning to Democracy Now!, asserting that the FBI raided his home after he blew the whistle on the NSA’s extensive spying on Americans.
On July 2 Binney, along with two other former NSA employees, agreed to provide evidence in the Electronic Frontier Foundation’s lawsuit that alleges the U.S. government operates an illegal mass surveillance program (i.e. Jewel vs. NSA).
His sworn declaration of facts that he’s willing to testify to are both telling and scary:

• In the ’90s Binney supervised the development of a NSA program called “Thin Thread” that was designed to identify international networks of connections between people from their internet communications. Since one side of the communications was domestic, the program encrypted the data so as to protect the privacy of U.S. citizens until a warrant could be obtained.
After 9/11 all safeguards went out the window as “the individual liberties preserved in the U.S. Constitution were no longer a consideration.” Members of his Thin Thread team began implementing a program called the President’s Surveillance Program (PSP), which collected domestic electronic communications traffic without any privacy protections.
• The NSA began seizing and storing most electronic communications passing through 10 to 20 wiretapping rooms in key telecommunication points throughout the country where all data must pass in order to move from one party’s network to another’s, allowing the government to identify and analyze any individual or group through a searchable database.
• Binney cites the $1.2 billion Utah data center currently being built and the new supercomputing center at the NSA headquarters in Fort Meade, Maryland, pointing out that the immense size and computing power of these facilities far exceeds the capacity necessary for storing targeted communications but is “consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications.”
In a nutshell Binney states – with considerable authority – that the NSA has been conducting comprehensive surveillance on U.S. citizens for more than a decade.

 
[youtube https://www.youtube.com/watch?v=JuvJ7tKIF2c&w=561&h=432]

The Shirky-Masnik bureaucracy perpetuation principle

In well organized assaults waged by governments that work in hidden capacities to enforce and socially engineer a society through constant attacks on civil liberties, we frequently find useful idiots who willingly place themselves as obstacles to free speech, and especially, as obstructionist forces that ‘steal time,’ aka ‘time-thieves.’

these are situations where people will often seek to preserve a problem or a falsehood, rather than recognize that it doesn’t need to be that way. There are lots of industries where this is a major issue.
-Mike Masnik of Techdirt.com

Organized gang stalking is one such case where we see this at work-how bureaucracies work in “the gray area of law and social oversight” to prevent insight. This is best embodied in the common phrase that appears in the OGS dialectic “what is hidden” which some use because it is a Masonic/other symbolic speech, while others use it to flaunt their access to the many hidden technologies that I document herein, as well as their ability to abuse others in this capacity.
Obstructionism and OGS are Partners in Crime and Civil Consiracy
Techdirt.com does some of the most reputable, fearless, well written public interest journalism in the history of technology-and journalism. As such, while most MSM journalists cower(or put on their knee pads and slurp down some payola) in the face of the 72 Billion dollar per year NSA/CIA/FBI/DEA privacy rape machine, Mike Masnik, and the excellent writers over there have incurred their unfair share of  detractors.
And, as can be predicted, some of those detractors are little more than liars and punks who live in their mothers basements, and guys like Shiva Ayyadurai, who claimed he invented email. And gay robotic toilet slaves, like Peter Thiel, the guy who worked hard to subvert ALL democratic liberty via the Palantir/CIA/Google collaboration. Notably, Thiel has skipped town, and run off to New Zealand, where he is hiding out, no doubt doing “special work” for his corporate and military and CIA overlords.
In the fight to demolish free speech, the MIC and its DVIC handmaidens use every dirty trick, every crooked backdoor trick to obstruct due process and civil rights; but also useful idiots like Thiel and Ayyadurai are the  backup girls for the band of merry robbers who wantonly lie, cheat or steal to destroy the rights of others while getting filthy rich. They are the contrarians of logic, and the cock-block of free enterprise; and it begins with their pillow bitingly wimpish and vain, immature, fascist impulses, attacking pure speech and then, the free press.
SO it cannot be missed that these same are also on the forefront of the technologies that are currently accessing other peoples privacy via their “inventions, and imputing to those who they steal from “intentions” that are not only false, but aslo” classic Freudian projections, and in that light, they are also perverse voyeurs.
A world of smoke and mirrors indeed. From Techdirt.com, Mike Masnik scores a victory over Shiva Ayyadurai’s perversity, and his perversion and abuse of law:

Case Dismissed: Judge Throws Out Shiva Ayyadurai’s Defamation Lawsuit n

As you likely know, for most of the past nine months, we’ve been dealing with a defamation lawsuit from Shiva Ayyadurai, who claims to have invented email. This is a claim that we have disputed at great length and in great detail, showing how email existed long before Ayyadurai wrote his program. We pointed to the well documented public history of email, and how basically all of the components that Ayyadurai now claims credit for preceded his own work.
We discussed how his arguments were, at best, misleading, such as arguing that the copyright on his program proved that he was the “inventor of email” — since patents and copyrights are very different, and just because Microsoft has a copyright on “Windows” it does not mean it “invented” the concept of a windowed graphical user interface (because it did not). As I have said, a case like this is extremely draining — especially on an emotional level — and can create massive chilling effects on free speech.
A few hours ago, the judge ruled and we prevailed.

Now- an object lesson in how all of these companies-and then, their complete subversion of intelligence agents and agencies have the ability to destroy speech at the switch. Look at this paragraph below:

The Shirky Masnik principle states that bureaucracies will d anything to perpetuate themselves-anything.. And that includes using total sh!tbags like Ayyadurai, or his counterpart in institutional sociopathy, Peter Thiel-who was so mad that he was outed as queer by Gawker media that he sued it into the dirt and put it o ut of business. to subvert the very foundations of both free economies, and free democracies.

 
Do you see the paragraph -how convoluted and broken it is? This paragraph was written as this blog, and the computer it is written with, came under ‘attack’ by ‘unknowns’ and the browser froze, and Tor reported multiple “j-script’ malfunctions. And this, just one day after the same browser, on the same computer, was crashed using an attack I cannot identify-one where the browser opened repeated multiple windows until it was useless ( I could identify it, but I am still researching that particular attack).
You see- speech itself is under attack, by the multiple agents and agencies I describe herein, and that attack is at the site of the speaker, which is me in this case, but this goes on all across democracies everywhere, as the United States, working with the Five Eyes Alliance, and literally HUNDREDS of other agencies, NGO’s target speech itself, online speech, and all other media with disruption campaigns; in this case at the site of speech itself as I type into this blog.
I document this as well as note its psychological, and ‘real world’ effects here, but elsewhere too, I have records of these attacks, which are incessant. And in the “TI” community of gang stalking victims, this is an extremely common complaint, and dis-information agents can be found mocking TI’s with comments such as “yes, I have heard that TI’s frequently complain about sticky keyboards, e-mail theft, and computer hacking.”

In fact, hacking “target’s” is what the NSA and the rest are doing, as even the famous (and well funded) “OSI informers” has noted, alongside the fact that TI’s are also targeted with other nefarious attacks such as “porn deluges.” I have preserved a copy of the web page where OSI informers makes this claim, because frequently, the web gets “scrubbed” after I validate one or another fact or tactic of these hidden operators at our internet switches, and the thousands of programs that are trained on TI’s.
Here is a snippet of “OSI informers”claim/advice:
CYBER-STALKING

Cyber Stalking or Cyber Harassment is a related group of harassing behavior occurring via internet/online. Cyber Stalking includes, but is not limited to; Computer Hacking, “Trolling”, Spamming (Often including “Porn Deluges”, Verbal Assaults, Character Assassination, and Impersonations of the victim. Online harassment is a plank of the harassment protocol. If you have a website devoted to Organized Stalking you may have people emailing you to flame you, or claiming that they are victims & asking for support with the intention of discrediting you.

Now- I will rewrite the paragraph above as it was intended, but I note that my computer literally heated up to an extreme degree, and I was forced eventually to crash the browser, reload, and change settings-this is what is called a “social engineering attack” where hidden operators force the user to change behavior, aka “behavior modification.” And I note that while my computer is less secure in this second attempt to write this post, I can write easily now. See how that works? Seeing any patterns yet?
The Shirky-Masnik Bureaucracy Perpetuation Principle
The Shirky Principle forms the headline of the following piece of writing by Mike Masnik of Techdirt.com forms the Shirky-Masnik Principle stated as below describes how OGS online has become an institutional force,with offline consequences, and especially, how writers are targeted by morons with kewl toolz directed at us from ilitary bases, police and Fusion Centers, as well as NGO’s with dominionists, zionists, and Infragard rats working behind the scenes:

Institutions Will Seek To Preserve The Problem For Which They Are The Solution

by Mike Masnick

Filed Under:
business models, innovator’s dilemma, institutions, problems, solutions


from the the-shirky-principle dept

We already wrote a detailed analysis of Clay Shirky’s recent writeup on complex business models. However, a few of you have sent over Kevin Kelly’s recent post about Shirky’s piece that also compares it to Clayton Christensen’s Innovator’s Dilemma, but thankfully highlights the one key line in Shirky’s piece that may have gotten lost in the original:

“Institutions will try to preserve the problem to which they are the solution.”

Kelly calls this the “Shirky Principle.” To me, it calls to mind Upton Sinclair’s famous line:

“It is difficult to get a man to understand something, when his salary depends upon his not understanding it!”

They are not the same point, but they are related. In both cases, these are situations where people will often seek to preserve a problem or a falsehood, rather than recognize that it doesn’t need to be that way. There are lots of industries where this is a major issue.


Organized stalking and "mind control" and influence operations: manipulating voters.

Epilepsy warning: this post contains a swirling graphic image
While our governments, our corporations, and our intelligence and law enforcement agencies believe it is their right to steal our data, and use it to maniulate and even abuse certain people and to wage influence operations on us, in secret, I believe in fair warning, in anticipation of un-intended consequences, hence my epilepsy warning above. This is the difference between consensual behavior, and non-consensual behavior, and the NSA/CIA/FBI/DEA data theft pipeline had  15 year head start on all of us.
Except, me, maybe.
Any cursory research into organized gang stalking reveals that politics are a major factor in “who gets targeted with OGS.” While there are varying levels of targeting, ranging from simple “influence” operations through the internet, to extreme cases where local politicians and others gang up on individuals to harass, intimidate, or otherwise coerce them, the most common “targeting” that individuals face is through advertising.
As we saw in the case of “Moonshot CVE” and in the cases of Twitter monitoring activists and feeding the data to law enforcement and other un-named parties, and programs like DataminR and Media Sonar being used concurrently at Fusion Centers, and the local police department, as well as yet un-named intelligence agency level programs, there is a constant blurring of lines between advertisers, governments, political PAC’s corporations, and then, police and intelligence agencies targeting of activists and others in spying or conformity enforcement operations.
Welcome to PsyOps, mind control, and  world wide”influence by constant suggestion. Now, ad a targeted audience-and a targeted influencer of that audience….
You’re getting sleepy now….count backwards….as I redirect your internet connection….breath deeply….watch as Google suggests a few (harmless) things to you to make your life easier, better, breezier, Nabisco cheddar….
Or, this:
Image result for swirling black and white gif

Plus The Hive Mind:

blak and white thinking.jpg
And that “one guy” somewhere-anywhere in the world hidden behind the switch (with NO accountability, no records of hi/her actions, and no recourse for citizens to sue these bastards), with “the master list”:

cropped-showimage-arcadia-switch
M: Are you there Bob? It’s me, Margaret. Yeah. He said it again. B: Said what? M: He said WASP. B: WASP? hahahaha. They haven’t had any control or power since the sixties. M: Yeah, but he called WASP’s JAP’s B: JAPS!!??? We kicked their asses into the dirt!  And we are STILL kicking their asses into the dirt, lookie, I even sicced the UN on ’em. Those A-rabs are getting hungry for young Jap girls and those Jap men are hogging them all with enjo kosei! The UN is gonna liberate a few of ’em. M: Bob-BoOOOob..slow down! He was talkin’ about those OTHER JAPs….and a few senators too, like Senator Dierand Klikenstein B: Oh, shit. That hits close to home. Better send a few fire trucks past his homeless shelter. Make sure the sirens are low and slow, like an omen or something. Tell the boys that this is a ‘schedule 13’ emergency. M: Not an 11 yet, Bob? B: No-this is schedule 13 stuff, save 11 for the ‘other guys’ M: Got it. Thanks Bob, what woud I do without all your good advice? B: I dunnno-but my ass sure gets sore sitting here for the last 103 years. Maybe you could…M: Don’t even think about it Bob.

Whhoooooo! WHoooooOOOOOOooooOOOoooOOoooOo!
So, to put this in common terms, imagine yourself walking down the sidewalk, dodging blots of chewing gum, and the residue of mop water, or even broken glass dumped across your path. These are ordinary pedestrian obstacles, and most if not all people expect some of that when out walking.
As you continue on your  path, all of a sudden, a bicyclist heads straight towards you, so fast that they seem as if they might just run you over. What do you do? Of course, you step aside, thinking-“what a rude prick. I had the right of way- and bicycles are supposed to ride on the street!”
You brush it off, and continue on your path. An the obstacles become more and more: the couple walking along is as wide as the sidewalk, and you step off into the grass to let them pass. And then, five teenagers on skateboards; and then, at a crosswalk, people are bumping into you from all directions as if you are not there.
These scenarios above are what is described by TI’s who are being gang stalked, and particularly in the last example, this is what is known as “community mbbing,” and also “street theater.” TI’s write endlessly about this online, but they are also described by others who “suffer delusional disorders.” What’s the main difference? Proof- proof is required to indicate that such is actual, real, and happening to you.
In OGS, proof is hard to get, because of the design of community harassment and community policing, but online, it is easier to prove, now that we know with certainty that it IS happening, it IS targeted, and it IS political. And, as we see above, it IS attempting to influence you, your behavior, and your choices.
Here, below, from Breitbart News, we see targeted individuals as swing voters, but we also see that language and particularly, coded and slanderous language is used to label, and further harass or otherwise cause harm to individuals who don’t toe a party line.
While on the surface, it cannot be missed that this targeted “outreach” is yet another example of Democrat demagoguery, it also cannot be missed that “hetero-normative white people” are being labeled in ways that can and do trigger the Department of Homeland Security “threat matrix” and “bad words” lists, as “white supremacists are on every list as “hate groups”:

NH Dem Party Chair Calls Rural, Disaffected Voters ‘White Supremacists’

 

This weekend WMUR’s “CloseUp” interviewed the executive director of “Look Ahead America” Matt Braynard, whose new organization is planning outreach to inactive voters in New Hampshire.
Braynard said, “We’ve identified maybe 15,000 inactive voters who we would consider disaffected, patriotic Americans. And potentially 100,000 or more unregistered adults we’re going to reach out to.”
He explained his organization was using “psychometrics,” saying, “Normally it gets applied to likely voters universes for purposes of persuasion. We are applying it towards identifying patriotic Americans who’ve become disaffected and cynical, so we can engage them on issues relevant to them, get them registered, get them educated and turn them out to vote.”
In response, the chairman of the New Hampshire Democratic Party Ray Buckley said, “The organizing and activating of these extremists, these white supremacists, really could have a detrimental effect on the entire culture of New Hampshire.”

In the aricle above, note the use of the word “psychometrics” which literally means ” the measure of psychological effects in order to cause persuasion.” This is not insignificant, as we see that “influence” is the goal, and that “psychology” is applied as a tool.
In relatively harmless incidents such as this, we must ask ourselves if “influence operations” are harmful, and most likely come up with the answer that they are mildly intrusive, but not necessarily “causing harm.”
However, in these cases, when we add the fact that the data used is derived from the “profiles” that our own ISP’s have sold to outside organizations; and that these profiles are shared and re-sold across gvernment, private industry, political PAC’s, the Five Eyes Alliance, and even in the case of Israel, that our profiles are literally given to a theocratic, apartheid nation state that has not signed any nuclear treaty or even officially disclosed that it is a nuclear power the story of harm versus “no harm” becomes a question that few are willing  to ask out loud; being used against their and it becomes a question where the individual this targeted must make a stand, or simply succumb to being used against their free will in such a manner.
So, this issue of “supremacy” becomes for some of us, a crucial and key point wherein we must ask “whose white supremacy” is being targeted and whose white supremacy is not (most Israeli’s and other supremacist Jews still encourage their daughters to marry only white men). And certainly, other theocratic, nationalistic, racial, and psychological  supremacy becomes part of each persons targeting as well. So-whose decisions are we actually making when we are under chronic and constant “influence operations”?
Regardless of the answer, there is one other level of questionable targeting: the fact that beyond advertisers profiling us, we also have intelligence agencies profiling us, and then, targeting us as well, individually n levels that only nazi maad scientists were able to conceive of in decades past.
Because the past is the present is the future with intelligence agencies, we know with certainty that other, more nefarious and unethical targeting takes place, and that this takes place in secret, without our informed consent- that this entire internet entrapment scheme that has made everyone a target, has now morphed into a wider scheme of political targeting on the ‘consumer’ level; and that despite the consumer’s awareness that it is them, being consumed first, and targeted advertising only after that.
So beyond the citizens rights to protest or even to withdraw from these big data schemes, or the use of our data to make us targets, multiple levels of targeting are taking place at all times, and our decisions are under constant and chronic attack.

Organized stalking and Five Eyes Alliance, disruption, online mobbing, and database abuse: documenting OGS with evidence

Most of those who write about OGS mention that they are frequently the targets of specialized internet harassment that takes various, often personalized forms*. There is the standard theft of email, sometimes as one writes it; there is the recurrent and constant theme of computers being hacked; and online manipulation of speakers who use words to communicate ideas to others, like we see with the outed JTRIG harassment-but the NSA/FBI DITU and military orgs, often working hand in hand with zionist hasbara roaches from Israel are all in on it, trying to censor and manipulate and control online dialogues, and targeting individual speakers.
And, similar things went on in Germany just before the Holocaust as well, with zionists involved at every level. In fact, everywhere you look, these religious fanatics are implicated by even the MSM. Here, the Daily Beast notes that a religious fanatic from Jews for Jesus torched the mosque of the shooter after the Pulse nightclub shooting, and like many of these types do, they also used religion as their basis (click the link- the firebombers statements are telling). So, any keen reader will note that my thesis of fanatical religions-whether Jewish or christian or one or another cult or sect-religion being key to the OGS narrative is validated, over and over.
And speaking of Israeli mind control and cockroaches, and how religion and those who practice it use all forms of coercion and bulying, even invading the heads of it’s targets, with memetc neuro fasciitis- there’s this, from Haaretz:
Israeli Scientists Unlock Secret of Mind Control — in Zombie Cockroaches: Now we know how the jewel wasp turns the bugs into helpless living nurseries.
read more.
But let’s first have a look at the catalogue’s of spy tools that these institutions are using on unsuspecting citizens. And you can imagine others have these tools as well:
The Electronic Frontier Foundation catalogues  NSA spy tools aimed at us AND them-whoever “they are” since “they” became “us too”:https://www.eff.org/files/2014/01/06/20131230-appelbaum-nsa_ant_catalog.pdf

How the CIA spies on you through your TV, and more: https://www.wired.com/2017/03/cia-can-hack-phone-pc-tv-says-wikileaks/

Renowned security guru Bruce Schneier has the British spies catalogue of tools: https://www.schneier.com/blog/archives/2014/07/gchq_catalog_of.html

One of the ways that the claims of TI’s can be tested-one of the simplest ways actually- is for any researcher to merely write a blog about OGS. Then, use the key words “organized gang stalking,” “gang stalking” “targeted individuals,” and any of any number of keywords that PRISM and XKEYSCORE, and their specially trained, biased and calculatingly and deviant religious analysts are targeting.
You will have more rapid results if you mention the fact that the US Department of Homeland Security gives special black budget money into the hundreds of millions to zionist-Jewish groups and organizations affiliated with the Anti-Defamation League, which they use for organized stalking.
Or, if you mention the fact that the FBI is basically a zionist and cult-controlled organization that has benefited from illegal ADL spying operations for generations, and those hidden campaigns of domestic terror/spying are waged by any of a number of fanatical cults and religious sects in America, with the net results being “anonymous tips” from well known informants.

For example-in the summer of 2016, there were two high profile mass shootings, and each one of the shooters shared the fact that one of the many radical sects of radical zionist hatred, called the “Messianic Jews” were involved in workplace mobbing before these events took place. In these cases Sayed Farook who was taunted about religion bullied in the work place by Nicholas Thalasinos, -and the mosque of Omar Mateen, the Florida shooter, was burned by a Messianic Jew from “Jews for Jesus” after the fact of his alleged shooting.

But where were the NYT headlines screaming about this form of domestic terrorism? There weren’t any, because aas I have noted, Jewish-christianity is the cricket, with the worm in its head.

It is also not a stretch to note that these same zionists not only helped create Hitler, but they shared similar goals and killed millions of people (which is ALWAYS the shared goal of fascists, communists, and globalists who are in fact all Fabian Socialists), while using other egregious forms of database abuse, like the IBM punch cards that were used to round up gypsies, dissenters, the mentally ill, and many other categories of people.

Then, link that blog to any substantive conversation about warrantless surveillance, criticize this system of targeting pure speech online (and in our own ‘private’ emails), or criticize the plausible deniability and unaccountability built into this system, and especially criticize any law enforcement body in any of the 5Eyes nation-states, and watch the fireworks begin! Your blog will suddenly become the darling of the Five Eyes nations as the UK, Australia, New Zealand (have a look at what and WHO is in New Zealand now),Canada, and the US start to hit your blog up EVERY DAY, 20-50 hits per day.
You will note that they key in to certain posts and pages that mention their culpability. This blog here is a recent favorite of some who read these specific posts below, nearly every day, in this order-and you can test these results yourself:
1) Gang stalking, Mormons, FBI/CIA recruitment of same
2) Gang stalking and punitive psychology
3) Gang stalking and the Martha Mitchell effect and influence operations; or how retired LEIU members act as auxilliary LEO’s, often outside the law-and as para-judiciary inluencers of the legal process.
4) the CIA and phone hacking/NSA mass surveilance of citizens/ crisis PR counter-narrative about OGS
5) Any post that criticizes, implicates, or indicts LEO’s as particpants in OGS
6) Any post that implicates military involvement in OGS
7) you will especially note that avid readers who target posts about how the surveillance state is a Panopticon especially seek your personal information/contact info/biographical data, and most of THOSE readers from military bases and so on.
In my experience, it takes about a week to ten days before the FiveEyes nations and their many web crawling, word hunting,speaker targeting data analysts, or targeted search bots/Palantir/Media Sonar/etc or any of a number of retired LEIU types and Israeli “mind controllers,” or just plain odd people who are immersed in the even-more-odd disinformation dialectic of the “paranormal” find your blog.
Then, kick your feet up and watch as your email accounts get broken into or your internet gets redirected, and your online life becomes “redirected,” or stalked even by identifiable operators( usually those who follow your blog are affiliated with the groups mentioned above). I advise that you do all of this “anonymously” within reason-but also advise you to use Tor as a research control, just so you can see how easily it is subverted. And then, do ‘timing attacks’ against your own blog using Tor as a control, and your own blog as a subject. Note how slow your blog/s load/s now-or especially, how when you type, your posts begin to drop letters here and there as if your keyboard is full of peanut butter, or cracker crumbs-or screen cast across a Fusion Center control room, or to a couple of squad cars up the block.
Use Tor on one browser, and then use several others- you should find that Tor will be ‘crashed’ frequently AFTER they find your blog, but NOT BEFORE. And, you will find as described above with the ‘suddenly sticky keyboard,” and more. Also, AFTER they find your blog, you will note that Tor loads incredibly slowly, and that frequent time-out errors will occur. Further, if you publish over Tor, you will find it to then be a target of other exploits from the Metasploit toolkit. Teardrop attacks are common, and timing attacks that crash the browser and then time your reconnection to both the internet and your blog-which also leaves your ‘cookie’ and sign in data floating about cyberspace are among the most common attacks.
And-if any of your (hopefully, deliberately anonymized and obscured) blogs become targets of this extra special attention, extra-legal, extra-judicial attention, notice also “what they are reading” across your blogs-that the subject matter frequently seeks to develop a “profile” of the writer as certain posts that contain “personal” information are pieced together to form a parallel constructed “you” in the mind or the dossier of an analyst, investigator, or agency black ops practitioner.
Test it yourself, and prove me wrong-after all, the “pro’s ” and professional activists present a unified front that OGS is a myth- a symptom of mental disease; an indicator that MORE isolation and discrediting is needed to contain the dangers of the world finding out about this practice that benefits those who practice it! So prove me wrong-if you can.
But I have found these things described above for over a decade (as have others), using multiple blogging platforms, multiple computers, from multiple states, countries and localities ranging from communist countries to countries that thrive on mob hush money, to here, in “the land of the free (lol)”and using multiple word/phrase selectors.
These terms and subjects I discuss above are the quickest, and most replicable to get the results I describe, but you can find your own.
The net result is a simple and can be replicated, and prima facie evidence that gang stalking is real in the sense that it triggers both PRISM-like bots and humans, but also triggers intense scrutiny and malfeasance: it is prima facie proof that CERTAIN speakers are targeted, and then harassed, or blog-stalked in the very least, and others are not.
In the US, this means that a pre-judicial mechanism of “denial of equal protection” under the Constitution is in effect at a baseline of un-Constitutional government conduct (and really- most Silicon Valley startups from Google to Twitter and Facebook are ALL funded with seed capital from the CIA, and fully interactive with NSA/CIA/DIA/FBI packet capture/black operations via the internet ‘backbone’/influence operations/redirection/code injection/ at ALL times).
Lastly, I would like to point out another fact of OGS: if and when the writer reveals their actual IP location, or actual contact information, they will also be able to document “web interception and redirection” in a variety of ways. This story herein covers that. I bring this up, because upon the discovery of writers and others who document OGS, the Five Eyes then entraps the blog off shore, or on a server that cannot be traced back to them directly-that hose who work in these intelligence collection hubs ‘contain’ or entrap’ the blogs so that further black ops/surveillance/timing attacks/code injection can take place.
And this too, can be monitored, and data collected to document that OGS online s indeed a “real thing” and evidence of same accrues as soon as a researcher follows the steps outlined above.

  • some things are just TOO predictable: as I wrote this post above, online-live- I was cut off the net, and the AP that I was using disappeared, replaced by several that are unfamiliar to me, or the location from where I blogged this post. I could not log back in because the AP I used( from a well known corporate coffee shop)completely disappeared. You just can’t invent some things. I ket sceen captures, but I do not have an anonymizer to strip the meta-data from those. But you can test this scenario yourself as well.

Gang Stalking and Fusion Center spying and artificial intelligence: yes, "they" ARE spying on you, in real time

Now that the slow roll-out of totalitarian domestic spying has occured (while you were sleeping, perhaps), we can look back at the many felony lies to Congress by NSA and CIA chiefs, and the local lies from Fusion Centers and the FBI and local police to see that, well, it was all lies (then take a look at how deep state players created a bomb hoax, and a designer bomber who allegedly targeted those exact CIA /FBI /SOROS funded senators and others who lied to Congress ).
And, Democracy was dead after that- those with power had, and do, and will continue to destroy our democracy-because they can, and because YOU are letting it happen.

Related Story: the Association of Threat Assessment Professionals (ATAP) calls police and private contractor sponsored organized gang stalking “colluding parallel investigations.” And many ATAP affiliated private contractors company names are, not surprisingly similar to the military acronym for psychological exploitation of targeted influence operations, aka PsyOps. use is closely associated with Fusion Centers, and a staggering amount of OGS complaints, and their crisis PR is what drives narrative in the press, and in police related public relations. . Americas 77 Fusion Centers are also very well disguised, each of them using different names, so that citizens cannot connect the dots.

Related Story: Washington State Fusion Center distributes bizarre “mind control ”documents to FOIA requestor, who asked for a different set of documents entirely 👽💩👻
From Techdirt.com, in April of 2013-two months BEFORE Edward Snowden:

You may recall that, last fall, a Congressional investigation completely slammed Homeland Security’s “Fusion Centers” — noting that despite DHS insisting that they were critical to “fighting terrorism,” the actual evidence showed that they had done nothing helpful in the fight against terrorism, but were instead chock full of wasteful (possibly fraudulent) spending… and with an added dose of civil liberties violations (just for fun).
“There’s misconceptions on what fusion centers are,” he says. “The misconceptions are that we are conducting spying operations on US citizens, which is of course not the fact. That is absolutely not what we do.” link

But what ARE Fusion centers- and what are they supposed to do? Nobody, anywhere seems to know, but those who have experienced various forms of “electronic harassment,” and strange internet shenanigans certainly know that these centers are doing something. Targeted individuals have been telling us for years, what we all now know.
From the ACLU: what Fusion Centers are supposed to be doing

UPDATE: Police, and Fusion Centers have begun waging media hoaxes attempting to discredit victims of illegal Fusion Center spying, and here we see an actual Fusion Center in Washington state distributing “junk information” to the press about mind control, and here we see local police and sheriffs deliberately waging a media hoax, claiming that a dangerous drug, fentanyl, was put onto fliers that were then placed on squad cars, right outside the police station.

Organized gang stalking and pedophiles and sexual morality campaigns

Gang stalking and pedophiles and sex crime’s units and CPS child racketeering

UPDATE 11-11-2019: Western intelligence agencies are activelly using pornography and the associated “free pornography” websites to entrap, and blackmail website visitors.
Much of that takes place from Malaysia, Thailand, the Phillipines, etc., in what is called the “Asian Invasian.”
And, best of all, these scumbags entrap pornography viewers “for Jesus.” via NGOs like this.
Its CIA no matter how you splice it, dice it, or indulge in the “free pornography” psychological operation.

One of the odd paradoxes of our times is that of sexual morality campaigns cloaked in the language “its for the children”, which wages an outright dialectic deception; and then, the blatant social deviance of those who wage these culture wars.
As we see repeatedly in writings about OGS, the stigmatizing label of “pedophile” is one of the main features of OGS complaints.
And, we also see that the majority of children who are sexually abused or harmed, are harmed WHILE IN STATE FOSTER CARE. So, this is a major OGS theme, and we must look at the dialectical distortions of perps/targets from the linguistic standpoint of para-language, but also, auto antonymal meanings to pry meaning from the wider occluded dialectic.
Time and time again, we see that so-called child protective services are little more than child trafficking by another name. And certainly, the case of Andy Ostrowski in Pennsylvania demonstrates what happens to those who challenge the powerful pedophiles that “just love children” from within deep state cover. Each child put into the state system is incentived as an actual “resource” aka a “commodity or product” that can and is capitalized.
States have become to depend upon federal revenue which incentivized child slavery, and the associated “sex trafficking” that we see time and time again in these heinous state sponsored kidnappings:

Foster Children Bring in Great Profits to the State

At another point in the interview, Stefano relates how California benefits financially from having children in foster care. She states that adults who are incarcerated in the penal system on average cost the State about $48,000.00 per prisoner. For children taken in foster care, however, one child can bring in up to $1 million of revenue to the State. Children who need “extra care” are given many medical treatments, such as psychotropic drugs. (See: California’s Crisis: 1 Out of Every 4 Children in California’s Foster Care Prescribed Powerful Psychiatric Drugs)
Stefano gives one example she encountered where a Los Angeles judge sent one mom’s son to a “behavioral modification camp” because he was allegedly labeled “defiant.” He was given electro-shock treatments, and these treatments were billed to the mother at a cost of $7000.00 per week. Stefano stated that the mother is still making payments on these “treatments,” while her son is now 23, and she still has 10 years left on her payment plan. To this day she does not know where her child was sent for these “medical services.”

LA CPS Turning Foster Children Over to Known Sex Abuse Offenders

When Stone asked her who CPS was turning these children over to with such “gruesome” statistics, Stefano replied that what she discovered, and what the Los Angeles Times was kind enough to publish, was that 1000 “convicted sex offenders” had been given a “green light” by CPS to become “approved foster parents” just in Los Angeles County.

CPS Putting Children into Sex Trafficking is a Huge Problem

 
Mental health professionals, social workers, psychiatrists and criminal defense lawyers will note that police investigations by their nature are invasive and often, the investigators must reveal certain information to people who are being interviewed as witnesses, or as potential witnesses to alleged crimes.
But also, these same are complicit in it at every level as now, we see the weaponized investigation used as a tool of “high policing”.
The case of Michael Chadwick Fry of Texas is likely one such case, and there also, we see both extensive jailing of a man who is not guilty of crimes, as the state/county collects federal revenue, and no mechanism exists for victims of these state crimes to unburden themselves of state level predation.
Related Story: Two year old girl kidnapped, tortured, sold to pedophile ring, burned over 80% of her body-because CPS had a quota to fill, and the state wanted money.
And, the researcher of organized gang stalking will find that in nearly every single blog and accessory media that discusses OGS, the phrase “the gang stalkers will tell your neighbors you are a drug dealer, a prostitute, a pedophile,” etc. These are weaponized investigations, where police drag garbage out into the publucs eye about targets-and that stuff, drawn from theoretically protected databases of family courts, juvenile courts, domestic violence courts, or anywhere else that gray area slanders take place, without due process or trials.
Worse, these DHHS/DHS/DVIC whisper campaigns are designed to destroy individuals that LEO’s target for political reasons, and cannot prosecute them for crimes of any kind due to lack of evidence, or due to the fact that police themselves have flagrantly broken the law (the case of Florida state trooper Donna Watts illustrates such an example)cannot prosecute because the information they are investigating is the product of the vast illegal warrantless surveillance that all Americans are subjected to.
This is a major feature in the OGS dialectic, as we see hidden internet actors working to get kids away from parents, because this is what the states DO for revenue-each kidnapped kid is a cool million dollar federal funding trick, turned by state actors.
And, we see that in the case of the Beatrice Six, who spent decades in prison on false charges before they were exonerated official framing and slandeer was central to the narrative; and in the case of Rose McGowan who was stalked by Harvey Weinstein and former Israeli Mossad; and in the many cases online of OGS, ritual slander, and whisper campaigns are central to the “delusion” which is in fact-and practice- the main a feature of a social disease-and also, of the weaponized police“investigation.”
In fact, databases full of personal information are routinely violated across the board, in the absurd situation where our governments hack our social media, and then, leave it wide open on the web, as we saw with the recent NSA hacking programs that left citizens exposed to all kinds of harm; and routinely our data is left open to the public in situations like  the FBI flagrantly violating the constitutional protections of due process some 40,000 times between 9/11, 2001 and 2011 alone.
• Evidence of delays of 2.5 years, on average, between the occurrence of a violation and its eventual reporting to the Intelligence Oversight Board
• Reports of serious misconduct by FBI agents including lying in declarations to courts, using improper evidence to obtain grand jury subpoenas, and accessing password-protected files without a warrant
This practice of defamation begins in databases that are themselves political, and it is beyond due process, and against equal protection under the law, or even the presumption of innocence. And that is by design, as OGS is a form of ritual defamation, practiced by nearly all LEO’s and social services practitioners across the country, and those, affiliated with secret societies, masonic orders, and occult practice by definition of the occult, and, unsurprisingly, a large number of pedophiles work in policing and work with related “social service” industries.
Related Story: Minnesota Reporters stalked by AIPAC and hundreds of local LEO’s. What is a police state?
Worse, as pertains to the smears that affect a persons sexuality and can drive some to the point of madness (Omar Mateen, the Florida night club shooter was widely believed to have been smeared as a homosexual-and, the FBI and security firm G4S was in contact with him multiple times over a three year period, and as we see with the current “full spectrum dominance”he was likely privacy raped by numerous bad actors working in gray/black areas of his life) allows many sworn LEO’s and other social gatekeepers are themselves pedophiles and predators-child abusers and pimps:

Thursday, Jul 10, 2014 01:42 AM UTC
Virginia police have a warrant to take photos of a teenage boy’s erect penis
“We just take him down to the hospital, give him a shot and then take the pictures that we need,” an official said.
Law enforcement officials in Manassas, Va. have come up with a truly creative way to combat the dissemination of child pornography: create more child pornography for comparison! Their first subject could be 17-year-old Manassas
City resident Trey Simms, who faces two felony charges for allegedly sexting his 15-year-old girlfriend.
Prosecutors intend to prove Simms’s guilt by forcing him to provide police with photos of his erect penis, for which a judge actually granted a search warrant (!).
The only problem there is this little detail: the sex crimes officer in charge of this case was himself a pervert and a pedophile, who later killed himself when he was discovered:
A Virginia police officer whose job was to investigate online sex crimes against children committed suicide Tuesday
– moments before he was to be arrested for online sex crimes against children.
Manassas police officer David Edward Abbott, Jr. was the same cop who made  headlines last year when he tried to take photos of a 17-year-old boy’s erect penis for what he claimed was investigative purposes.
A year before that, he won an award for “integrity in investigative work.”
The detective was about to be arrested for having inappropriate relations with two boys, ages 11 and 13, when he killed himself.

And cops who are rapists, pedophiles, child pornographers and more are far more common than you might think-in fact, they are linked time and again to running prostitution rings, starting in the family courts and foster care factories of America, extending that reach well beyond adulthood.
And, judges are complicit so, these cops, social workers, and other “care”providers get sentenced far more leniently than any other pedophile.
Related Reading: Police, Prostitution, and Politics, by Norma Jean Almodovar.
Related Story: Florida cop/Cub scout leader busted after years of raping a little boy for years.
 
And: Some say that police badges actually incorporate the universal symbol of pedophilia and specifically those that advocate for “boy-rape” into their designs:
Police Badges: note the strange triangles
Police badges KLECK - 03_03_17 - B1
FBI bulletin warning about pedophiles
KLECK - 03_03_17 - B4