From cradle to grave: the East German Stasi stalked babies-and spy novel author John Le Carre

From Mikhail Bulgakov in Russia, hounded by Stalin’s agents for writing the “Gospel for Stalin” aka “the Master and Margherita;” to anti-fascist Ernest Hemingway aka “Papa” in Cuba, who had a bad case of pro-fascist FBI chronic harrassment and wiretapping, – to the “Lost Generations” F. Scott Fitzgerald in Minnesota and Paris, followed by religionists, prohibition prudes, and likely intelligence agents of several organizations and institutions; to John Le Carre, of “Tinker Tailor Soldier Spy” fame, intelligence agencies, and communitarian scum as well as the other and frequently competing side/s of fascist/antifa/communist/capitalists work together in the unified purpose of stalking writers.
In this sense, the current attack on free speech, journalists, and  online communicators indicates that writers themselves are “targeted individuals” today much as they were….forever.
And it is not surprising that African -American author Gloria Naylor, who claimed she was being gang stalked, was also a targeted individual, and likely, she was targeted by dirty DEA scum, who used illegal databases like the SOD to target her [ here is a link to the Naylor story on a blog by an actual TI from Chicago, an ex-con, who claims police and other “mysterious stalkers” have tried to frame into a child homicide from 1992, and routinely threaten his life.]
And Le Carre especially, had a dossier with the East German Stasi that included drawings of his home office, and a description of his safe, and his own father had a dossier in their horde of data that was squeezed out of the willing stoolies of that era. So, we see a pattern in the current and chronic spy apparatus called the NSA-Israel data theft pipeline.

Across the country, people were on the lookout for divergent viewpoints, which were then branded as dangerous to the state. Often to one’s own advantage.
-John Le Carre in 2016 on NPR

While most people have a “fake friend” or two, in a world that has slipped from a democracy to a world that encourages “community policing,” aka snitch culture; and that world augmented with 24/7 social media monitoring, routine and wholesale internet search term and full scale email interception by agencies ranging from the local police to the NSA-Israel data theft pipeline- nearly everyone has a 40% roster of fake friends that work in the military, trolling online speech, but particularly, trolling alternative media and dissenters and activists.
So, to a targeted individual, everyone is a fake friend, or can easily become one after the slander campaigns begin, and worse, these kinds of fake friends carry penalties ranging from psychological and social damage, to imprisonment, and even death.
The Intercept routinely carries stories of how the FBI and any of the various agencies use “profiles” to  target speakers, then, strives to create terrorists and other criminals through enticements and inducements, and coercive behavior of all kinds, but the main tool they use is “human frailty, gullibility, and a desire to be liked.”
Related: The Intercept covers the story of “the Unlikely Jihadi,” Harlem Suarez.
Perhaps the best known intelligence stalking of a writer these days is the case of “Papa” Hemingway who fought fascists in Spain, and drank himself to suicide in Cuba (note to researchers of GS: seeing any patterns yet with the suicide thingy?)

Related Story:Globally acclaimed author and anti-fascist freedom fighter Ernest Hemingway was slandered by some who called him paranoid, and delusional when he stated that his phones,mail, and more were wiretapped, or tampered with by the pro-fascist FBI. As it turns out in MOST of these cases, he was right: they had a 124 page file on him. The reader might recall that the dosdiere was a political tool of fascists, Nazis, and Stalin, but especially and notoriously was used by Marcus Wolfe, head of the East German Stasi.

In the case of F. Scott Fitzgerald, we see a fairly common, and now routine hounding of a man throughout Minnesota and beyond by right wing European Jews, as well as prohibitionist intel agents, who at the time had extensive bootleghing operations spanning from Minnesota, to Candada, and south to Chicago, and intelligence agencies alike, using him as free labour, aka “HUMINT”, and tracking his connections in the era of “Alcohol Prohibition.”
In the case of Mikhail Bulgakov, who was then a famous orchestra conductor and operatic composer, being tailed and harassed by the Stalinist secret services, he notoriously burned his manuscript”The Master and Margherita” several times, as it chronicled the crucifixion of Yeshua through the eyes of coded narratological literary technique, combined with myth. Not surprisingly, it was published 30 years later because the NKVD had preserved a copy!
SO, the case of the intelligence and counter-intelligence staling of John Le Carre, the author of one of the west’s most famous paeans to spying, Tinker Tailor Soldier Spy,unsurprisingly includes the fact that his father was stalked too.
From “Fresh Air” with Terry Gross:

Novelist John Le Carré Reflects On His Own ‘Legacy’ Of Spying

https://www.npr.org/player/embed/548632065/548727155″ />

https://www.npr.org/player/embed/548632065/548727155

Le Carré’s latest book, A Legacy of Spies, revisits some of the characters from his earlier novels, including his most famous protagonist, George Smiley. It follows a protégé of Smiley’s, Peter Guillam, as he re-examines some of his actions from when he was a Cold War spy, including his role in the deaths of another agent and a recruit.
The novel mines the moral tension inherent in espionage — a tension le Carré himself remembers. “I felt I had to suppress my humanity,” he says of his time as a spy. “The lies straight into the face, the befriending, the false befriending. … I suppose I’ve been a lot of people in my 85 years, not all of them very nice people.”
He describes his path from spy to novelist as a “zig-zag journey,” but notes that, ultimately, fiction writing has helped him understand himself better.
“When you really have to put a character together piece-by-piece, what makes it work is a piece of yourself,” he says. “And until that happens, the character doesn’t really have a being at all. So the real joining in fiction writing is that sense of finding all the possibilities of your own character and awarding them in an organized way to the different characters of your creation.”

From Kindergarten to Old Age: A comparison of the inter-generational stalking of John LeCarre and his father-freedom’s just another word for nothin’ left to lose in a nation that foregoes the rule of law
East German society and “snitch culture”from Der Spiegel:

No matter where one shared information, the state would put it to use. The East German reporting system kept track of the country’s citizens from kindergarten, throughout their working lives and even into retirement, via the Volkssolidarität (“People’s Solidarity”) organization, which focused on caring for the elderly. It was part of developing a “socialist personality.” Some began practicing denunciations in childhood, as part of the Young Pioneers, and then as teenagers as part of the FDJ. Files were even kept on schoolchildren: “Wears Western clothes,” “exhibits affinity for punk music,” “demonstrates pacifist attitudes.”
Mutual evaluation, judgment, criticism and self-critique were omnipresent. Across the country, people were on the lookout for divergent viewpoints, which were then branded as dangerous to the state. Often to one’s own advantage.
The losers of this system often didn’t know why their lives suddenly became derailed. After the fall of the Wall, many of them looked for clues in their Stasi files. They wanted to understand why, for example, they were not given a spot in university, why their professional careers suddenly hit a roadblock or why their travel permit was revoked at the last minute. And many were surprised when they found no information at the Federal Commissioner for the Records of the State Security Service of the former German Democratic Republic (BStU), the agency that continues to administer East Germany’s Stasi files today.
Explanations, however, can be found in documents kept in the archives of political parties, factories and universities. There, one learns that skipping a Russian-language class, making an ill-considered comment at the student union or exhibiting a persistent lack of the “proletarian point of view” can all lead to ex-matriculation — which had profound consequences for a lifetime.

And now, back to the story of LeCarre’:

On growing up with a con man dad, and how his childhood prepared him to be a spy
My father was a compulsive liar and in and out of jail, and the people around him were tremendously colorful, amusing people. … I think my own alienation from my environment left me solitary and more reflective; more watchful of other people around me. I think survival, early survival, requires that you have a quick read of people — you can understand them quickly, relate to them quickly, you can scent them in an almost animal way, perhaps sooner, more quickly, than people who had a more settled childhood. So you understand people’s defenses better….
At the age of 5, my mother disappeared. And after that, it was living in the wake of this maverick fellow, who often was enchanting, for a long time. That was my world. … I spent a lot of time, if he left the house, going through his pockets and things, trying to figure out what was going on. We were displaced repeatedly by angry debtors. For quite long periods he was on the run. He was on the run in the United States even, wanted by the forces of the law.
He filled my head with a great lot of truthless material, which I found it necessary to check out as a child, with time. Yes, in that sense, these were the early makings of a spy. … His great passion, which he achieved, was to turn me into a seeming gentleman.

Tinker, Tailor, Soldier-Arms Dealer? The interesting case of inter-generational organized stalking and international spying. Seeing any patterns yet?
Some might see the pattern that Jewish communism inserts itself into dialogues within the wider christian capitalist cultures by spying and infiltration, and targeting “influencers” from the hidden bastions of the intelligence communty, down to the lowly local level’s of “community policing.”

In the cases of of every one of the writers above, Jews were instrumental in the stalking and spying on writers, one way or another, as well as influencing them and their politics. Though Lavrentiy Beria-the head of Stalin’s secret police was Jewish, it is possible that it on his orders, or that it was he himself who saved Bulgakov’s manuscript. Or not.

What THEY are reading: disabling the power of one word which has nebulous but massively important colloquial meaning, and a discrediting value in legal and psychosettings.

One of the common ways that police, prosecutors and judges influence juries; and one way that psychologists are able to broad brush and mis-diagnose mental illness where little or none exists- is that most human beings use common parlance, and unclear colloquial language that, to academics and psychologists, as well as those in the legal system (many of whom genuinely feel that they are a superior “class” of persons who willfully denigrate others with impunitywillfully denigrate others with impunitywillfully denigrate others with impunity) are not precise enough, or clear in the immediate meaning-that in common parlance, which seldom suffers from the factitious disorders and psychopathic lack of compassionate affect that is prevalent in the people who practice in these fields.
Put another way, real people, non-commissioned citizens speak differently than people who hide behind titles and badges and power like institutional sociopaths, and inside Fusion Centers which even the ACLU acknowledges are actually spying on American’s in real time, and deep state propaganda mills and mind control bunkers in Georgia, Maryland, or Virginia (Ohhhh Virginia: have you seen what “THEY” are doing from within the servers at UVA? And that, connected to the huge deep black hole they run from Thailand!).
So, the common person-the lay person- is met at any of the above-mentioned settings with the calculated stupidity of those in power who use blank stares, and failure to make eye contact as signifiers of their willing disregard for common language and meaning that “the average and reasonable person” can infer meaning to, or understand whole cloth upon a single utterance. And that, as they have thrown away our Constitution.
One of those words that stymies even the best psychopaths among  deep state agents, and their associated Booz-Allenaholic types is the word “they.” As in “They are doing this to me.”And in court rooms, psychologists and social workers offices, the ambiguous colloquial nature of “they” stymies each and every trained professional when it comes to state sponsored misconduct, and accountability for institutional harm perpetrated on people outside the iron curtain of state impunity.
Here is a snippet of how this willing stupidity on the part of institutional sociopaths and others plays out:
” Man, they are gang stalking me hard right now, and mobbing my blogs!”
“Who are “They?”
“You know, THEM– the DHS, the CIA, the FBI, who knows? They all work together to slander, malign, and create narratives that benefit the power structure, and the unholy and perverse marriage between the MIC and it’s domestic glory hole the DVIC! And they are mobbing me right now!”
“Well- have you SEEN them? Do you have PROOF of who “they” are?”
“NO-like, these are agents who work within multi-billion dollar industries-and they are sanctioned by governments who look the other way! So, OUR agencies outsource dirty and wet jobs to OTHER agencies who are theoretically not bound by OUR laws! And that think at RAF Croughton! Wow! The Brits were so sickened with what was happening there, they almost kicked “us” out!”
“Yes-but can you prove any of this?”
[ Cut-away to image of homeless guy pulling a couple quarters out of his pocket, along with a Medicaid card, a half smoked cigarette butt,  and some lint. And, for some reason, a small news cliping of an F-15 superimposed above an image of the Virgin Mary, reading a big cash register roll of propaganda from her vagina ]
“Um. How? Who can afford to prove it? It would take millions to follow and stalk them back-to hack THEIR email accounts, and hack THEIR blogs, and to break in to THEIR ADL off the books database full of dossiers that THEY turn over to the DHS/FBI/etc, all of it off the books! In other words- I would have to do criminal things in order to invoke the right to subpoena all of their records and so on-and even then, the DEA burned the SOD database; they will claim national security is why they had to break in to my house and steal all those photos of me nude, in my NERO crown, lounging around the hot-tub with peanut butter on my putz, and the German shepherd?! ”
“So, you can’t prove that THEY exist, can you? That actual people are targeting and harassing you?”
“Um. Well. Not without some form of “power for the people” to subpoena these shitbags. Or maybe- just maybe there exists one cop/LEO/agent/ etc ANYWHERE in the world who will blow the whistle on these low-life mama fuckers and baby bombers…..or….I do have my WordPress “stats and some other vague but admissible circumstantial evidence that indicates I’m probably not wrong ” And they get hit up by the Five Eyed Nations every day-and THEY especially like to read the post about how the CIA/FBI/ et ass industrial complex recruits incestuous Mormons.
And they really really like the post about how LEIU’s and others like the ADL and other racist scumbags run secret spy rings targeting peace activists dissidents, critics and others without oversight, sanction or punishment or even investigation as they follow, stalk, hack and harass people-or who buy the United States Police forces around America cheaper than a Vegas crack whore gets free methadone?? (did I mention that the Anti-Defamation League, which was once busted for spying all over America, was given a slap on the putz by all too willing prosecutors-and THEN the ADL virtually purchased American police cheaper than a rusty Russian oil tanker loaded with fake news??).
Related Story: How the Anti-Defamation League of Spies purchased the power to purchase American police cheaper than a donkey dick show in Juarez, MX.
I mean- who can tell? These are cults within cults! And then- for SOME REASON, they really like my overview of gang staking, and that little bit where I bust them for their “Officer Safety Bulletins,” aka “BOLO’s,” aka “party flags”- and how they use those to monitor, stalk, follow and harass TI’s for YEARS!!?? There is literally one gumshoe for every 30 citizens in the west, and if you add in the Five Eyes circle jerk of hom-erotically charged assfucks who work in the Intel communities, well, WHO KNOWS ANYMORE?? Life is different now that some feel they are empowered to SHIT ALL OVER due process, and wipe their asses with the glorious United States Constitutional rights to privacy-to assembly, and speech, and….and….nothing can exist within the law when the law exists without law!!! Much less legal standing to challenge these creepy neo-zio-nazio’s from East Germany!
“Hmmm. But you still haven’t NAMED anyone. Do you have their names? Who specifically is “following you?” And-are you taking any medication? Will you or won’t you subscribe to the AMA Big Pharma magazine? It’s a magazine about Franz Kafka’s theory of the Panopticon. Every decent citizen should, ought, and must subscribe.
Well, for now, why don’t you just find a hobby-like photography, or…”
“Or blogging about the surveillance industrial complex?”
“No- I would stay away from that- it’s not good for your mental health. Take my word for it- I am here to care about people like you.”
[cut-away to scene in public library in Utah, as a homeless guy types away frantically on a computer that he gained access to after buying fake ID from an undercover agent’s crack addled snitch, who bought it on the Dark Web, after an interesting conversation with someone with an odd pseudonym in an online forum. The lone figure is typing “and just as I  logged in to my bwog, TOR CRASHED INSTANTLY(Teardrop attack, of course)! And- when it was forcefully crashed by one or another agency/softwaretrap/malicious switch/redirection/metasploit, it took my screen-cap of this event with it!
Those fuckers-no warrant requirements anymore, doubled down with hacking help from five other nations, plus several military bases from Pakistan to Japan (Hi Osaka!), to Saudi Arabia UAE- and shit-where’s my metasploit when I need it!!! I am just ONE citizen, and armies and navies, nations and states (Virginia, Maryland, Georgia, and for some reason Ohio and Texas-and especially Kansas, between 2005-20011. This last one reminds me of red shoes and small dogs-probably part of my deep brainwave pattern and frequency distortions brought on by peeking behind the New Iron Curtain- America’s Free Speech Steamroller!]- “they” are aiming Metasploit at me alll thee tiiiimme.]”
Note to self: True story. Oh- and fuck these [email protected] No, wait- I have nothing against [email protected] Fuck these baby bombing, dog dick sucking pedophiles and murderers who hide within Deep State apparatus, twisting words, and narratives using hidden tools and entrapments; speech suppression via real time monitoring of speech; and much more to create pretext and pretense and predicate, silence dissent, and wage war on due process, and the Constitution, while blaming some nebulous agency created “threat” like al Queasy or your-SIS when in fact, most of the time, citizens stand a better chance of being killed by lightning, shot dead by a cop, or killed by non-Islamic domestic terrorists. Yeah- fuck these bastards.
But: before you fuck them, have the camera’s placed just right. And then, do it with a blind fold and slip them some Donkey Dick smeared with Cholula. The internet is the biggest electronic weapon EVER invented. It won’t be hard to parallel construct THAT fact!”
“You sound angry. And your tone-it’s very threatening. As your therapist, I have to inform you that I must call the authorities and report your threats.”
“THREATS??WTF?!! I AM A THREAT NOW??!! WTFFF?”
“Please watch your tone. ”
“Exactly what did I say that was threatening??”
“Well. Donkey Dicks are kind of scary [noticeable sweat beads form on the therapists brow at the mention of donkey’s] Penises are weapons, you know. Most of the ADL, and their cohort of white slaves and Jerusalem syndrome baptized local police find that term offensive. And frankly, I am a bit upset at your deviant masochistic juxtaposition of “Cholula” with the word “penis.””
“But I didn’t SAY PENIS! And the penis was sadistically juxtaposed for maximum effect!!!!
[Cutaway as therapist quickly hits speed dial, to report the word penis to his superiors at the Fusion Center, who immediately send a BOLO out to the local police station.]

cropped-showimage-arcadia-switch
“You said cholo? I’m on it. Waving a weapon of mass deconstruction? WTF is THAT?! But it sounds dangerous-I’ll send a squad or an MRAP over there right away. Oh-and have you got any donuts, or a Starbucks nearby?”

[Sound of vintage teletype tapping out a
BOLO
:
Be on the lookout for a penis. We had an anonymous report that there is the tip of a penis that’s loaded on a cholo, and it is about to get off. Send the bomb squad over there, because the reliable Infragard anonymous tip/institutonal democracy subverter said something about it being really hot. I know the tip was valid, because it was checked out in Israel first, at that ‘special place’ in Tel Aviv ]
[sound of radio crackle from a squad SUV parked behind in the therapists alley where it has been listening in from a celll site simulator the whole time. “Yeah. Tel Aviv. Hehehehe. That was SOME Terror training there in Tel Aviv for suuure….I told that Russian sex slave that I woud “ter her up” Get it? hehehehehe ]
[Sound of Fusion Centerguy. “Yeah…Tel Aviv….mmmmmm. I think I need more training. Or maybe, rescue me a few more bacha boys. Or NOT! hahahahaha.]
Related Story: The MIC-DVIC obsession with watchin’ porn. Or- how to manipulate deep state players minds with their own tools. But [email protected] you, for looking in. How’d THAT feel?
 
 

Organized stalking and Five Eyes Alliance, disruption, online mobbing, and database abuse: documenting OGS with evidence

Most of those who write about OGS mention that they are frequently the targets of specialized internet harassment that takes various, often personalized forms*. There is the standard theft of email, sometimes as one writes it; there is the recurrent and constant theme of computers being hacked; and online manipulation of speakers who use words to communicate ideas to others, like we see with the outed JTRIG harassment-but the NSA/FBI DITU and military orgs, often working hand in hand with zionist hasbara roaches from Israel are all in on it, trying to censor and manipulate and control online dialogues, and targeting individual speakers.
And, similar things went on in Germany just before the Holocaust as well, with zionists involved at every level. In fact, everywhere you look, these religious fanatics are implicated by even the MSM. Here, the Daily Beast notes that a religious fanatic from Jews for Jesus torched the mosque of the shooter after the Pulse nightclub shooting, and like many of these types do, they also used religion as their basis (click the link- the firebombers statements are telling). So, any keen reader will note that my thesis of fanatical religions-whether Jewish or christian or one or another cult or sect-religion being key to the OGS narrative is validated, over and over.
And speaking of Israeli mind control and cockroaches, and how religion and those who practice it use all forms of coercion and bulying, even invading the heads of it’s targets, with memetc neuro fasciitis- there’s this, from Haaretz:
Israeli Scientists Unlock Secret of Mind Control — in Zombie Cockroaches: Now we know how the jewel wasp turns the bugs into helpless living nurseries.
read more.
But let’s first have a look at the catalogue’s of spy tools that these institutions are using on unsuspecting citizens. And you can imagine others have these tools as well:
The Electronic Frontier Foundation catalogues  NSA spy tools aimed at us AND them-whoever “they are” since “they” became “us too”:https://www.eff.org/files/2014/01/06/20131230-appelbaum-nsa_ant_catalog.pdf

How the CIA spies on you through your TV, and more: https://www.wired.com/2017/03/cia-can-hack-phone-pc-tv-says-wikileaks/

Renowned security guru Bruce Schneier has the British spies catalogue of tools: https://www.schneier.com/blog/archives/2014/07/gchq_catalog_of.html

One of the ways that the claims of TI’s can be tested-one of the simplest ways actually- is for any researcher to merely write a blog about OGS. Then, use the key words “organized gang stalking,” “gang stalking” “targeted individuals,” and any of any number of keywords that PRISM and XKEYSCORE, and their specially trained, biased and calculatingly and deviant religious analysts are targeting.
You will have more rapid results if you mention the fact that the US Department of Homeland Security gives special black budget money into the hundreds of millions to zionist-Jewish groups and organizations affiliated with the Anti-Defamation League, which they use for organized stalking.
Or, if you mention the fact that the FBI is basically a zionist and cult-controlled organization that has benefited from illegal ADL spying operations for generations, and those hidden campaigns of domestic terror/spying are waged by any of a number of fanatical cults and religious sects in America, with the net results being “anonymous tips” from well known informants.

For example-in the summer of 2016, there were two high profile mass shootings, and each one of the shooters shared the fact that one of the many radical sects of radical zionist hatred, called the “Messianic Jews” were involved in workplace mobbing before these events took place. In these cases Sayed Farook who was taunted about religion bullied in the work place by Nicholas Thalasinos, -and the mosque of Omar Mateen, the Florida shooter, was burned by a Messianic Jew from “Jews for Jesus” after the fact of his alleged shooting.

But where were the NYT headlines screaming about this form of domestic terrorism? There weren’t any, because aas I have noted, Jewish-christianity is the cricket, with the worm in its head.

It is also not a stretch to note that these same zionists not only helped create Hitler, but they shared similar goals and killed millions of people (which is ALWAYS the shared goal of fascists, communists, and globalists who are in fact all Fabian Socialists), while using other egregious forms of database abuse, like the IBM punch cards that were used to round up gypsies, dissenters, the mentally ill, and many other categories of people.

Then, link that blog to any substantive conversation about warrantless surveillance, criticize this system of targeting pure speech online (and in our own ‘private’ emails), or criticize the plausible deniability and unaccountability built into this system, and especially criticize any law enforcement body in any of the 5Eyes nation-states, and watch the fireworks begin! Your blog will suddenly become the darling of the Five Eyes nations as the UK, Australia, New Zealand (have a look at what and WHO is in New Zealand now),Canada, and the US start to hit your blog up EVERY DAY, 20-50 hits per day.
You will note that they key in to certain posts and pages that mention their culpability. This blog here is a recent favorite of some who read these specific posts below, nearly every day, in this order-and you can test these results yourself:
1) Gang stalking, Mormons, FBI/CIA recruitment of same
2) Gang stalking and punitive psychology
3) Gang stalking and the Martha Mitchell effect and influence operations; or how retired LEIU members act as auxilliary LEO’s, often outside the law-and as para-judiciary inluencers of the legal process.
4) the CIA and phone hacking/NSA mass surveilance of citizens/ crisis PR counter-narrative about OGS
5) Any post that criticizes, implicates, or indicts LEO’s as particpants in OGS
6) Any post that implicates military involvement in OGS
7) you will especially note that avid readers who target posts about how the surveillance state is a Panopticon especially seek your personal information/contact info/biographical data, and most of THOSE readers from military bases and so on.
In my experience, it takes about a week to ten days before the FiveEyes nations and their many web crawling, word hunting,speaker targeting data analysts, or targeted search bots/Palantir/Media Sonar/etc or any of a number of retired LEIU types and Israeli “mind controllers,” or just plain odd people who are immersed in the even-more-odd disinformation dialectic of the “paranormal” find your blog.
Then, kick your feet up and watch as your email accounts get broken into or your internet gets redirected, and your online life becomes “redirected,” or stalked even by identifiable operators( usually those who follow your blog are affiliated with the groups mentioned above). I advise that you do all of this “anonymously” within reason-but also advise you to use Tor as a research control, just so you can see how easily it is subverted. And then, do ‘timing attacks’ against your own blog using Tor as a control, and your own blog as a subject. Note how slow your blog/s load/s now-or especially, how when you type, your posts begin to drop letters here and there as if your keyboard is full of peanut butter, or cracker crumbs-or screen cast across a Fusion Center control room, or to a couple of squad cars up the block.
Use Tor on one browser, and then use several others- you should find that Tor will be ‘crashed’ frequently AFTER they find your blog, but NOT BEFORE. And, you will find as described above with the ‘suddenly sticky keyboard,” and more. Also, AFTER they find your blog, you will note that Tor loads incredibly slowly, and that frequent time-out errors will occur. Further, if you publish over Tor, you will find it to then be a target of other exploits from the Metasploit toolkit. Teardrop attacks are common, and timing attacks that crash the browser and then time your reconnection to both the internet and your blog-which also leaves your ‘cookie’ and sign in data floating about cyberspace are among the most common attacks.
And-if any of your (hopefully, deliberately anonymized and obscured) blogs become targets of this extra special attention, extra-legal, extra-judicial attention, notice also “what they are reading” across your blogs-that the subject matter frequently seeks to develop a “profile” of the writer as certain posts that contain “personal” information are pieced together to form a parallel constructed “you” in the mind or the dossier of an analyst, investigator, or agency black ops practitioner.
Test it yourself, and prove me wrong-after all, the “pro’s ” and professional activists present a unified front that OGS is a myth- a symptom of mental disease; an indicator that MORE isolation and discrediting is needed to contain the dangers of the world finding out about this practice that benefits those who practice it! So prove me wrong-if you can.
But I have found these things described above for over a decade (as have others), using multiple blogging platforms, multiple computers, from multiple states, countries and localities ranging from communist countries to countries that thrive on mob hush money, to here, in “the land of the free (lol)”and using multiple word/phrase selectors.
These terms and subjects I discuss above are the quickest, and most replicable to get the results I describe, but you can find your own.
The net result is a simple and can be replicated, and prima facie evidence that gang stalking is real in the sense that it triggers both PRISM-like bots and humans, but also triggers intense scrutiny and malfeasance: it is prima facie proof that CERTAIN speakers are targeted, and then harassed, or blog-stalked in the very least, and others are not.
In the US, this means that a pre-judicial mechanism of “denial of equal protection” under the Constitution is in effect at a baseline of un-Constitutional government conduct (and really- most Silicon Valley startups from Google to Twitter and Facebook are ALL funded with seed capital from the CIA, and fully interactive with NSA/CIA/DIA/FBI packet capture/black operations via the internet ‘backbone’/influence operations/redirection/code injection/ at ALL times).
Lastly, I would like to point out another fact of OGS: if and when the writer reveals their actual IP location, or actual contact information, they will also be able to document “web interception and redirection” in a variety of ways. This story herein covers that. I bring this up, because upon the discovery of writers and others who document OGS, the Five Eyes then entraps the blog off shore, or on a server that cannot be traced back to them directly-that hose who work in these intelligence collection hubs ‘contain’ or entrap’ the blogs so that further black ops/surveillance/timing attacks/code injection can take place.
And this too, can be monitored, and data collected to document that OGS online s indeed a “real thing” and evidence of same accrues as soon as a researcher follows the steps outlined above.

  • some things are just TOO predictable: as I wrote this post above, online-live- I was cut off the net, and the AP that I was using disappeared, replaced by several that are unfamiliar to me, or the location from where I blogged this post. I could not log back in because the AP I used( from a well known corporate coffee shop)completely disappeared. You just can’t invent some things. I ket sceen captures, but I do not have an anonymizer to strip the meta-data from those. But you can test this scenario yourself as well.

OSI informers and Air Force and gang stalking: it's a real operation

OSI informers and gang stalking and USAF

UPDATE: This post gets almost as many hits per day as the post about CIA/FBI/etc recruitment of Mormons. Apparently, those who stalk “We the People,” are very interested when they get outed as “real.” How nice it feels to track, trap and trace the people who are doing that to “We the People.” Ahhh. Mm–Mmmm good.
The third/fourth most popular posts here are about equal as per the feminist gang stalkers for Domestic Violence Industrial Complex dollars, and the internet “study” by Dr. Lorraine Sheridan and the farce that is Fusion Center subversion of all of our privacy/due process at the switch.
To any civil attorney or criminal defense lawyer, psychologist, or other researcher of Organized Gang Stalking looking in, this is verifiable prima facie evidence that speech is targeted at the site of the speaker, and thereafter.

Targeted individuals and those who seek to debunk “perps” often and frequently claim that one online group, OSInformers, is a disinformation outfit composed of perps who stalk targeted individuals. Also, the claim is that these perps are very well funded, and that mass shooters are often connected to them, or that this is a psychological operation.
And, those who claim this would be right, and the claim has scientific merit, because, in fact, the United States Air Force has a program full of informants called-unsurprisingly- OSI Informant Program. Of the many hits that are generated by this search term below, there are slickly produced video’s, and thousands of comments, but especially, and nefariously, are the Talkshoe podcasts where targeted individuals are mocked, derided, and humiliated. And all of this, because the various U.S. military services are in fact, spying on Americans.
From the ACLU, a case in the courts exposes civilians to un-warranted, non-incidental surveillance-what other programs might they be running off-shore?
Google Search: OSI informers-About 101,000 results
https://www.facebook.com/OrganizedStalkingInformers

 
OSI and gang stalking
https://en.wikipedia.org/wiki/United_States_Air_Force_Office_of_Special_Investigations#Air_Force_Informant_Program
Air Force Informant Program
AFOSI’s Cornerstone is to vigorously solve crime; protect secrets; warn of threats; exploit intelligence opportunities; operate in cyber.[5] AFOSI investigates a wide variety of serious offenses – espionage, terrorism, crimes against property, violence against people, larceny, computer hacking, acquisition fraud, drug use and distribution, financial misdeeds, military desertion, corruption of the contracting process, and any other illegal activity that undermines the mission of the U.S. Air Force or the Department of Defense.
In December 2013, The Colorado Springs Gazette[10] reported that the OSI was operating a Confidential Informant Program at the Air Force Academy which recruited cadets to gather information about other rule breakers and criminals. The program left the recruits to take responsibility for both the initial incident that got them into trouble and any subsequent rule-breaking behavior resulting from the directions of OSI agents. One of the cadets who participated said “…it was effective. We got 15 convictions of drugs, two convictions of sexual assault. We were making a difference. It was motivating, especially with the sexual assaults. You could see the victims have a sense of peace.”[11]
In response, The Air Force Academy Superintendent will now have oversight of the program at the Academy. Though she will be aware of the operations, the Office of Special Investigations will still have command and control of the program.[12]

Organized gang stalking, psychological and influence operations.

A large part of what the organized gang stalking dialectic seems to be is the result of psychological operations, and influence by suggestion. And some 70% of the blogs I have read talk about something called “electronic no touch torture,” which in my mind at least, is an accurate description of how one feels after their privacy is invaded, and or they are subjected to contact with agency level psychological operations. Every agency has a dirty tricks section, and they use them covertly, and judges and juries much less the average citizen are never aware they were there.
Even the world reknowned authorities, and pro -prosecution OGS denialists David V. James and Lorraine Sheridan on OGS agree that the mysterious and nebulous “the internet” creates an “ideological echo chamber,” i.e. that for some, the targeted advertisements, the targeted switches and targeted routers in targeted American communities who have ISP’s that target words, and CEO’s that target speakers, and hidden FBI Infragard agents feeding community policing that trickles in from the internet switch- and for targeted individualsThe internet creates a sort of ‘closed ideology echo chamber’ wherein people who share unusual beliefs reinforce each other’s thinking”
Which is, or course, by systemic design as we see the redirection method being used by “mystery money” funded startups to influence “jihadists” and the equally nebulous “right wing” alike via linguistic analyses, which is known as “persuasion,” and also “soft force mind control, and more. Then there is the direct access to any given targets mind via hacked cell phones, and then, hacked relationships-because that is EXACTLY what the Panopticon via products like Palantir, Moonshot CVE, and “captology” was designed to do.
Most sites and discussions about no touch torture are loaded at the front end and are themselves psychological operations. Butt of the few sites that are not, we see that it is a real concept, and practice.

Psychotherapist Otto Doerr-Zegers, who has treated Chilean victims tortured under General Augusto Pinochet stated; “The psychological component of torture becomes a kind of total theater, a constructed unreality of lies and inversion, in a plot that ends inexorably with the victim’s self-betrayal and destruction. …”
This is similar to the technique of “street theater” that mind control victims described in the Washington Post Magazine article. As torture victims are not mentally ill, mind control victims would not be mentally ill but rather have undergone and are undergoing a traumatic situation comparable to torture, such as the alleged illegal targeting with government mind control weapons.

Here below, is one of the ways it is deployed in the real world, from NBC news, is Britain’s JTRIG dirty tricks division:

“British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”

Imagine yourself sitting down to write an email, and all of a sudden your connection is cut. Then, you look in the body of your email and that masterpiece that you spent some 10 minutes writing to your aunt Alice has also and without explanation, disappeared-and NO COPY EXISTS in you drafts folder.
The first time this happens to you, you would be pissed-but if it happened dozens of times as you write critical stuff-emails to your doctor, a hot tip to your bookie(*jk*), or an even hotter tip to a journalist who believes in Constitutional liberty, you would begin to see patterns in your own mind-that your data is being messed with inside you.And, in fact, the internet has literally come into your home, and changed your behavior even before your fingers hit the keyboard-and altered your actions inside you.
This is what no touch electronic torture really is in real world deployment. And while it may seem insignificant, it has the cumulative effect over time of wearing a person down, letting them know that they are being watched, and that crucial and critical communications are being stopped at one’s fingertips. Important friends and associations are being destroyed each time you bring up these “odd happenings.”
And this, combined with other electronic no touch torture: your computer is hacked repeatedly, or flashing white screens; your cell phone apps turning your phone on and off seemingly at will, or the coincidental amplification of your conversation in your ear. here are literally hundreds of ways that a persons phone can be messed with, and TI’s talk about that too. Taken as a broader picture, it is the cumulative effect that does the damage.
Torture in any form is abhorrent, and never necessary, despite the claims of those who torture, who also happen to be the same people who have collected all of our internet data and are now culling through it  with 17 other agencies for blackmail purposes. If I had told you this is what is happening even five years ago, you would have called me a nutter. And now, I bet, even you are afraid to say it out loud much less do anything about it. First they came for the crazy guy on the internet….
Using neuro-linguistic programming techniques as simple as Google auto search”suggestion,” and subtle verbal intimidation, as well as the deployment of various internet tricks, such as cutting off a persons ability to write blogs, or the interception of emails, much of what we see can be said to have the hallmarks of classic operant conditioning, combined with learned helplessness.
This last link is important because many in the dialectic feel as though they will never be able to overcome their situation. And, the one venue they have, the internet, is subverted at every point as heir blogs get hacked, and their emails intercepted, and so on. Some 50% or more of the hundreds of blogs I have read indicate that these things happen. So it could be an indicator that there is something afoot, as other online communities of bloggers do not report these things, dwell on them, or even infer that they happen.
So, even a casual investigator of this community will readily recognize this feature. And, there appear to be some blogs that use learned helplessness language, and others that d not. Simple phrases like oh, targets, just get used to it, Wherever we go, there will always be gang stalkers,” and so on. A great example of that is the blog https://neverending1.wordpress.com, where the writer never loses the chance to use negative language that reinforces the hopelessness of those who go here for advice.( I refuse to provide a link it is that negative.)
Extra Bonus: Here is the CIA page for psychological operations to control populations.
Sigmund Freud, in “Civilization and its Discontents,” notoriously classified modern men as “men of action,” and the intelligence agencies are really into that.

“The man who is predominantly erotic will give first preference to his emotional relationships to other people; the narcissistic man, who inclines to be self-sufficient, will seek his main satisfactions in his internal mental processes; the man of action will never give up the external world on which he can try out his strength….”
-Sigmund Freud

And, in the targeted individual community, there is no small irony that they begin to refer to themselves as “TI’s” when in fact the PsyWar equivalent is the “TA” meaning targeted audience.
Here from the CIA link above:

The intelligence officer is not inspired by the purpose of merely collecting and evaluating information or making analytic studies. His mission is not an end in itself, but a means to an end — a contribution to the defense and foreign policy objectives of his country. His work is therefore meaningful only to the extent that the information he provides is utilized through appropriate action. The individual operator’s performance, to be sure, does not lose merit if significant information which he acquired in due time and reported to proper authority is not acted upon; but the intelligence organization as a whole has failed to function effectively if the information it produces does not lead to some kind of policy determination or action.

I must at this juncture make note that in classic schizophrenia, there has always been the element that these claim that they are being followed or harassed by the CIA or the FBI. While organized gang stalking DOES have these claims within it, sometimes, even the paranoids are right, as we se now with the Palantir database which is equipped with artificial intelligence an predictive software, as well as a host of other means by which to ‘read a person’s mind’ and control or manipulate their online behaviors.
But it’s simply not fair to blame the CIA for everything, although it is convenient, and the idea is within the vernacular of most people.Since Edward Snowden revealed that the NSA is sweeping up the data of everyone, and all Americans as well, we are now able to track the basic flow of this data in news stories that document the reach of this grand psychological operation we see that the picture is much bigger, in much more horrible ways than the CIA could imagine all by its lonesome.
Here in this link are the tactics and techniques of guiding, misguiding, or poisoning the dialectic entirely, and then, disguising victims in the cloak of mental illness.Any researcher of organized gang stalking will find correlations between the phhrase “electronic harassment” and discrediting tactics outlined in the CIA manual. In the targeted individual community, the psy-war elements are everywhere.
The Five Eyes nations are all in on it, and Great Britain is one of the worst offenders, using the dirty tricks division JTRIG to compromise, blackmail, and discredit targeted individuals.

A slide from the JTRIG dirty tricks and mind control presentation. Note the emphasis of “making something happen in the real world.” Mass shooters anyone? What else are these guys “making to happen?”via The Intercept

Israel has been getting ALL Americans data since forever, and waging hasbara and other psyops across the globe to enforce, reinforce, or otherwise promote Jewish religion and culture (the apartheid, mind control, old lady killing zionist version  of it.)
From the Washington Post:

“The relationship was described in a “Memorandum of Understanding” between the NSA and the Israeli SIGINT National Unit (ISNU)”

So- if those are “our friends”-our enemies must be real shitbags right?  But even China has yet to catch up with us as comes to waging active psy-war on it’s citizens. We can read  CNN as they try to downplay the fact that China is doing EXACTLY what the Five Eyes alliance is doing to suppress, control, discredit and destroy the free speech rights of western nations.Meet the CNN  version of “the Great Cannon of China.”
But-does it hold up well against the Free Speech Steamroller that we use? Only time will tell-or, maybe someone can  get standing to sue our agencies and see what they are really up to. I bet the Chinese are rolling in laughter as they watch how the agencies and law enforcement in general are using our Constitution as toilet paper.
Lastly, it cannot be understated that “the CIA tortured some folks.” And that the American Psychiatry Association provided advice as to how to do this. Meanwhile, their guys always get the help they need when they are done torturing others. I don’t mean to imply that the CIA and other’s are using the internet as a form of torture for some, but YES THAT IS WHAT I AM IMPLYING. But clearly, they aren’t the only ones doing it.
Stalin, Hitler, and their go-to guys in Psychological Operations, Edward Bernays (whose books lined the shelves of all Nazi propaganda officed)and Sigmund Freud, both of them Jewish, had nothing on our guys when it comes to propaganda, and mind control techniques; and China last I checked had no Manchurian Candidates, because as we see time and time again, only western nations and Israel are literally manufacturing terrorists.