Manufacturing terrorism suspects, fake web pages, and informants using lots of rope in darkness: modern lynching online and CVE programs

Whether the target is a Muslim, a Mormon cattle rancher, a black activist, or a poor white kid like William Atchison who get stalked online and then offline by agents provocateurs, aka DHS/FBI/DIA/private contractor/NGO/foreign spy outfit unspecified, informants, a few patterns stand out in the data:
UNDERCOVER FBI AGENTS SWARM THE INTERNET SEEKING CONTACT WITH “TERRORISTS”who they then profile via behavioral analysts, psycholigical operations, and then endlessly monitor their speech online and off, in concert with HUNDREDS of agencies, and using NSA data.
The FBI’s online activities are so pervasive that the bureau sometimes finds itself investigating its own people.

Almost all targets of provocation are male.
All targets of provocations are ensnared online, and followed, monitored and more offline for using words~aka pure first amendment protected speech~sometimes for decades since the NSA dumped hay all over needles in a theretofore previously non-existent “haystack.”
All targets of provocateurs have long term contact with people working under the counter-terrorism rubtrik, or so calked community policing, who seek to INFLUENCE the speaker, from hidden or occulted positions online and off (for instance, social workers, college, or DV type “counselors” target and track individuals, usi.g multiple databases, and share information about their targets with police)
All targets of these hidden programs are manipulated in “directed conversations”which is well documented in the online TI community,and this unrecorded anywhere.
All targets are manipulated, and frequently their most base impulses to food, clothing and shelter~indeed, their base drives, what Freud called libido~are used as tools to manipulate them, and much more, as we saw with the Tsaernev family being targeted for a decade BEFORE the Boston bombing, as well as in the cases of the Seattle Somalis employment and travel being stifled by federal agents, hearsay, and policy (not law.)
In any study of what is colloquially called mind control, and stemming from Nazi/US/British styled torture, or the well documented MKULTRA and its companions Monarch, Bluebird, Phoenix, Gladio-all of these used base drives as ways to manipulate subjects and targets.
And, all base drives, stationed a man, or a woman in the middle to impede or encourage the target toward one or another behavioral goal. So, any study of targeted individuals must account for ling term state/federal ibstruction of base drives, and achievements.
Related Story: Niftygerbil, Niftychinchilla, and other Nifty names for Tor nodes, courtesy of the same geniuses who gave the world Monarch and Bluebird.
So, we see now, the entire organized gang stalking dialectic mirrors the ACTUAL complaints of targeted individuals. Refer to the ROGS BINGO card at the top of this blog for comparison.
So, OGS is far from a delusional complaint, and rather,indicative of manufactured terrorisms un Constitutional basis, and the occulted use of informants whose work in online terror/criminal/other incitement is undocumented by design-a totally unchecked use of actual psychological operations-agents provocateurs actions are not on the record, or in courtroom documents either.
So, in the very least, these online influence and psyops using unchecked, unregulated, hidden, occulted and obscured methods, repeated over time, do indeed form, as the good doctor Lorraine Sheridan has noted~a closed echo chamber, echo chamber, where words themselves are the primary targets, as are the individuals who use the words- they are literally under close monitoring every time a banned word hits Google/Wordpress/Twitter, etc.
Here from NBC News is a story about how the FBI uses informants online and on social media in occulted fashion to police pure speech, and then, to target individuals:
https://www.nbcnews.com/storyline/isis-terror/no-lol-matter-fbi-trolls-social-media-would-be-jihadis-n226841s
And here is a bit more about that from the Intercepts Cora Courier in 2017: ghttps://theintercept.com/2017/01/31/undercover-fbi-agents-swarm-the-internet-seeking-contact-with-terrorists/
“”According to the guie, an online counterterrorism investigation can target websites or online networks that the FBI believes terrorists are using “to encourage and recruit members” or to spread propaganda. Such probes may extend to the administrators or creators of those forums, as well as people engaged in “the development of communications security practices” or “acting as ‘virtual couriers’ for terrorist organizations by passing online messages among members or leadership.”
The guide classes as online investigations those that rely primarily on online informants or undercover employees, and those that involve surveilling internet facilities or foreign websites hosted on U.S. servers. The FBI often runs such operations jointly with other U.S. intelligence agencies or “international partners,” according to the document.
Since 2008, the Counterterrorism Division has coordinated these operations under a program called the Net Talon National Initiative. Net Talon uses informants, linguists, and FBI employees working undercover, posing as ordinary internet users, to zero in on terrorists’ use of the internet, according to the guide. The initiative was meant to centralize expertise on particular targets and platforms, to “address intelligence gaps,” and to create a clearinghouse of the intelligence the bureau has collected on terrorists’ use of the internet.
The FBI’s online activities are apparently pervasive and uncoordinated enough to lead to confusion. The document refers to “resources being wasted by investigating or collecting on FBI online identities,” including undercover employees, informants, or people who have already been investigated by other offices or agencies. An FBI official told the Intercept, “You would be in a forum, and you’re like, ‘This person’s way out there,’ and we’ve gone and opened up a case, and sometimes that was a local police department, or a friendly foreign service. There are still instances of that, and deconfliction is still necessary.”
Khurrum Wahid and Joshua Dratel, defense attorneys for Ahmed Omar Abu Ali, answer questions from the media after Abu Ali was sentenced on March 29, 2006, at a federal court in Alexandria, Va. Photo: Alex Wong/Getty Images
THE COUNTERTERRORISM POLICY GUIDE shows just how much flexibility informants and undercover agents have when operating online, even when they’re not working specific targets. The FBI insists that there is nothing to see here: In statements provided to The Intercept, the FBI said that “while there are obvious differences between online and offline environments,” FBI employees and informants working on the internet are subject to the same rules, and that bureau employees can only monitor people’s online activity as part of an authorized investigation.
The guide, however, suggests that the internet offers areas of ambiguity. Much comes down to the questions of what informants can do, as opposed to FBI employees, and whether the goal of an operation should be construed as seeking to obtain specific intelligence, simply watching public websites, or developing a profile for an undercover identity.
For instance, the guide states that an FBI employee can visit a message forum or blog only when the site is relevant to an investigation. An FBI employee, according to the guide, could be an undercover agent or an “online covert employee,” a term that presumably refers to FBI workers other than agents, like analysts. FBI employees can’t chat online with someone who isn’t already the subject of an investigation for the purposes of gathering intelligence on that person. They can, however, “engage in unlimited communication with associates” of a person under investigation, if the conversations are relevant to the investigation.
Informants and undercover FBI employees are also allowed to do a great deal online in the name of “building bona fides,” such as creating fake identities or making themselves appear to be normal commenters on online fora. The guide says that in order to establish credibility, FBI employees “may make postings and communicate with individuals who are neither the subjects nor the associates of subjects … there is no limitation with respect to the amount of communication [they] may initiate in this regard.”
And the FBI is allowed to open new investigations on people it identifies through “passive monitoring or active communication” on websites.
An FBI spokesperson clarified that in order for an undercover or covert employee to monitor a website or forum, the site must already be associated with an investigation, “either because the forum was known to be used by a subject [of an investigation], or because the subjects are there. I can’t be in the forum trying to bait you into conversation.”
However, the FBI acknowledges that when its employees participate in online fora, they interact with people who may be bystanders to whatever activity led the bureau there in the first place. And that is not accidental. “We want to know if the subject has other people who are joining in, which people are part of the activity, and who is just there,” a spokesperson explained.
In other words, FBI agents can post and chat online with people who have nothing to do with an investigation, so long as they aren’t collecting intelligence — but in the course of those online communications, they can decide to start investigating someone.
Michael German, a former FBI agent who is now with the Brennan Center for Justice at New York University Law School, said that agents have always had a little bit of wiggle room in this regard. They can have a certain number of in-person meetings with someone, or in some circumstances go to public meetings or public websites, without identifying themselves as part of the FBI. This helps agents avoid a bureaucratic mess when carrying out a simple “buy and bust” drug sting, for example, German said.
But the ability to conduct unlimited online conversations in the name of building bona fides gives agents “a pretty long rope,” German said.
Criminal defense attorney Khurrum Wahid, who has handled or been an adviser on many national security cases, notes that FBI employees or informants frequently pose as experts offering guidance to lost individuals.
“These uninformed young people go online and become almost smitten with people who show a level of knowledge, who often turn out to be informants or undercovers,” said Wahid.
Informants operate under looser rules than FBI personnel. They are allowed unlimited engagement with a target in the course of an “assessment,” a preliminary investigation that can be opened on a loose tip of suspicious behavior, in order to collect general intelligence on a subject, or to evaluate a potential new informant. Assessments were created as a category in 2008. German finds their allowance for the expansive use of informants problematic.
“What we’ve seen in sting operations is that there is this shady portion before the official operation begins which often involves the informant,” said German. “And then it’s passed off to an agent, and it looks like they are ready to commit a crime pretty quickly.”
Wahid noted that at least in online cases, there are generally logs of all the conversations between suspect and informant, whereas “when it’s a live informant, they can turn off the recorder and we never know what it was all about.”
The use of informants in counterterrorism sting operations has expanded since the 9/11 attacks, when the FBI adopted the mantra that its job is to stop terror attacks before they occur, not just investigate them afterward. The government argues that the anonymity the internet affords to suspects necessitates an aggressive approach, including stings. The FBI’s national security director told the New York Times this summer that “using undercover agents online allowed the FBI to ‘flesh out’ suspects by gaining their trust and persuading them to disclose their real identities.” In some cases, the FBI even created fake webpages in order to draw in suspects.
“Agencies are under a lot of pressure to find a needle in a haystack, something that has haunted us since the beginning of the war on terror,” said Karen Greenberg, director of the Center on National Security at Fordham Law School. “It’s true that the internet has changed everything about how we communicate, but are we just going to be trawling online forever? It turns the principles of criminal investigation on their head.””

Gang stalking veterans: welcome home-now meet HSI/DHS private contractors and surveillance role players who stalk you as a threat to America.

organized gang stalking and veterans
Many veterans report that they are gang stalked, and some speculate that it is necessary to ensure that they don’t go “postal” and shoot up some stuff here; that it is a form of psychic driving meant to de-pattern them much as the famous mind control doctors such as McGill University’s own Donald Ewen Cameron-who was a CIA contractor- perfected in the 1950-70’s. Or as others speculate, that it is a deliberate effort to create Manchurian candidates ho then go ballistic, and drive political narratives, such as the anti-2nd amendment lobbyists using soldiers to drive anti-gun ownership.
Related Story: How the Department of Homeland Security ICE HSI runs a very welll hidden asset forfeiture racket (when was the last time MSM mentioned THAT?Patterns….patterns….) styled after CIA self-funding black operations
The research on organized gang stalking does indicate that veterans are highly targeted, and that their anxieties are only exacerbated by hidden “domestic terror,”waged by the DHS and the associated private contractors” who act in darkness, beyond a chain of command or accountability, and perpetrate illegal or questionable tactics directed at targeted individuals.
Many veterans have also been exposed to classified tactics and technology, and some of these narratives also indicate that they are stalked much the way that whistle blowers are stalked. And some whistle blowers, like Walter Laak of Las Vegas, Nevada, a combat veteran of two tours in Iraq, (LAs Vegas has inordeinately high reports of gang stalking) sometimes confront the hidden cash cow of the FBIs CVE programs, where pastors, social workers, and psychiatrists all report to the FBI, throwing atient confidentiality out the window.
Here is one other such testimony, a plea really, from a veteran named Douglass Lee Thompson:

My personal investigation is a collection of  victims testimonies, public documents and 1000’s of articles on this subject. I am just a Blogger, and Military Combat Veteran, etc.. but the cries for help to State Representative, Congress, and the State’s Attorney Generals office’s points to massive misuse and abuse of high tech electronic surveillance/ harassment equipment, a well funded operation to sabotage selected individuals.
I personally believe this is a “Organized Criminal Cabal” doing this Gang Stalking. After serving my Country  Honorable for over a decade, serving in two Wars, multiple Operations, I do not believe, I can NOT believe this is a act of Government Operations, but a well funded Criminal Operation.
I pray they get taken down by the professions who are voted in to protect American citizens, taken down by those who raised there hand and swore a oath to protect the values established in the United States Constitution, taken down by those who made a solemn declaration I will support and defend the United States against all enemies foreign and domestic..
I believe and have great confidence Gang Stalking will be declared ” Domestic Terrorism probably funded by someone like ISIL/ISIS , that’s a personal opinion, but the fact this Gang Stalking is happening to American Military Veterans, and many others is fact in my book,,, Blogger investigation complete!!!!…
Lets pray the ones in power put a stop to this… and use the legal system to handle the Judges jobs… Letting the legal process work, the U.S. Constitution work.. and give every American Citizen the privilege to pursue, Life, Liberty, & Happiness, all the Apple Pie they can get…. God Bless…
Gang Stalking does not represent any American values, I grew up with, I’ve served with many who would give there life for America… I do not believe the misc articles saying the Government is involved.  I do believe after two years looking deeply into this subject, its a well funded criminal operation,, sounds like Domestic Terrorism, and ISIL/ISIS from what’s on the the news every day…. Lets Pray the victims of ” Gang Stalking find Justice and Protection from those professional charged with protecting American Citizens.  
http://www.douglasleethompson.wordpress.com

 
It is not impossible to imagine that many veterans have been exposed to some as yet disclosed forms of experimentation. It is also possible many veterans are stalked due to the fact that they have been around classified materials, practices, or technology, and that a psychological operation, or influence with a “discrediting narrative,” is being waged in and around their lives.
Had I told you of my own experience with Virginia based companies, institutions, and subversive internet tactics going back to 2005-and told you that hidden technology can mirror my cell phone, and then subvers the functions of encryption by performing a man-in-the-middle attack from the phone itself-that my phone has been at times  you would have laughed at me. After all-who am I to tell you?  But this was the biggest news story in the world as of yesterday, and even mainstream media like MSNBC carried the story.
When one person says one thing, it is anecdotal-but when many say similar things, well, it becomes empirical.And for most people, when they see it in MSM, well, it’s nearly as truthful as the Bible, or the Talmud.
Here below, is from McGill University, which has admitted that they profited from torture and apologized for mind control:

Imagine being trapped in a small room. Your hands covered in gloves, your sight blocked by translucent glasses, and your head covered by a pillow. You cannot touch, taste, see, smell, or feel. You are totally deprived of your senses. This is the imagery of torture in foreign wars, of espionage blockbusters, of terrible nightmares. It seems hardly something that would occur in Montreal. But it did occur, right here at McGill.
Today, many journalists, doctors, and the general public see the Allan Memorial Institute in Royal Victoria Hospital as the cradle of modern torture, a cradle built and rocked by Scottish-born Dr. Donald Ewen Cameron. To the patients of Dr. Ewen Cameron, our university was the site of months of seemingly unending torture disguised as medical experimentation –– an experimentation that destroyed their lives and changed the course of psychological torture forever.
Cameron’s experiments, known as MK-ULTRA subproject 68, were partially funded by the CIA and the Canadian government, and are widely known for their use of LSD, barbiturates, and amphetamines on patients. In the media, they were known as the “mind control” studies done at McGill and were reported as a brainwashing conspiracy from the CIA and the Canadian government. For journalists, the story was a goldmine. LSD use in a CIA experiment was an angle no sensationalist media could reject, especially in the anti-drug frenzy of the 1960s.