Vice online covers "targeted individuals": and of course-the usual suspects of DEW's are prominently featured

My confession: I wrote to Vice magazine online awhile back, and stepped up to the plate for targeted individuals, despite the fact that it has veered far away from its original creator/editors content and purpose. In fact, it would be fair to say that Vice is a fully co-opted media channel. You can read about the history of here
For any who are targeted, it is useful to note that Vice has offices from Montreal, to Venice CA, with an incredibly helpful front desk staffed with special forces trained personel (the Venice office has a Legiinairre at the desk). If you are nice, they will even give you back copies of their fairly EXCELLENT magazine.
Here is Vice online’s Wikipedia entry.
And here is their “About” page where you can tell them your story as well (but be warned: They are aware that a disinformation component of OGS exists, so if you are a troll/shill/low IQ sadist/bully-know that YOU are on notice now.)
When  wrote to them the first time, I knew this was a far greater task than I-an individual- could accomplish by myself, with my story alone. And I knew how it all “works” and I was even threatened, stalked, harassed, and accosted over the years trying to simply validate the “reality” of it, as you will see in my many posts here. I have documented it in other places as well.

Related story: how do NSA spies, police, Fusion Center operatives use documents about “mind control” to discredit their victims, and discourage insight into domestic spying? and how do computer hackers from FBI DITU, DHS computer hacking private contractors, and other intelligence agents and agencies use the term “electronic implants”before, during, and after they wage a compromise operation on a targeted computer/or individual?

I carefully avoided the words, and phrases of disinformation and mis-information that are plugged into the dialectic by the agencies that are in fact, seeding the dialogue with total bullsh!t to cover their tracks. Because organized gang stalking is what I say it is, and we will continue to see my many thesis validated. Here below are all of Vice’s links:

I provided them actual documentation, and I used linguistic and psychological analyses and terminology to make a prima facie case that organized gang stalking and targeting of individuals is a very real thing indeed.
But it is nearly impossible to compete-as an individual- against a public relations and associated security state budget that is well into the hundreds of billions. And even harder to compete against people who have mental illness, or otherwise have been swept/coerced/manipulated into the dialectic.
But there IS hope, and here is part of the results of that endeavor-Vice interviews targeted individuals:
The fact that Vice looked into it is noble, and is a start, but as usual, the crackpots (look at Timothy Trespas, for example) that journalists interviews are always the visible fake victims that NGOs and gang stalking denialists steer into the press.
And no major media covers actual gang stalking victims like this young electrician who was stalked by a police gang strike force, or this guy, Ahmaud Arbery, who was murdered by a gang that included a retired cop, or this woman, who was actually poisoned with lawn chemicals by another gang, that includes police.
Gang stalking is,actually community policing, aka “color of law policing,” complete with an information, and disinformation aspect, and it masks the bizarre, and unconstitutional practices of Fusion Center spying.
But what I provide here at ROGS is a distinctly different product, because while I have encountered the mind control cults, and the psychologists who relegate it to mental illness (to the laughter and delight of Hitler’s Propagandist Edward Bernay’s, who is rolling around in Hades in a pigskin lined coffin every time Big Pharma writes another prescription for social illnesses created by crisis PR and backed by gas-lighting psychologists) and the military operations and seen first hand how military grade psychological operations work, I have avoided any and all discussion of it as anything BUT that, for the most part, because in PsyOps, the main goal is to conform persons via “soft force” influence operations-because for the mos part the TI community are highly suggestible-ad his is by design of the dialectic.
The researcher or reader might also note that as I wrote the paragraphs above, I was hit with an “electronic assault” but not the kind you are used to hearing about. No-my electronic assault was that the router where I am writing from was hit with a “hack” and knocked offline. Then, my browser’s froze, and after some time, registered various scripting errors, and XSS exploits.
And the security researcher will also note that these scripting attacks are common only to hackers and military grade intrusions. Here-you can read up on them here. But also note that my Tor browser was disabled-and that this specific attack blocks the control port, and leaves XSS errors in the console. In my recent experience, the XSS attack on Tor is the most common attack.
Here’s a bit about XSS and “injection” which I have documented since before 2011:

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.
An attacker can use XSS to send a malicious script to an unsuspecting user. The end user’s browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site. These scripts can even rewrite the content of the HTML page. For more details on the different types of XSS flaws, see: Types of Cross-Site Scripting.

So, to the researcher, the attorney, the civil rights specialists, and others trying to understand OGS, but also my thesis, take this one example (and search my blog for the words hack/hacked/exploit) and see how easily the dialectic itself is corrupted online.And, ad the feature of “blackmail and coercion” to these cases. While many people are indeed mentally ill, they are ALSO in a society that has become sociopathic-that we live in nations that have foregone the rule of law, and suspended civil liberty and due process at the switch, without a vote from any one of us.
And- “privacy rape” is a feature of this surveillance and security state culture. So let’s examine the outer fringe of my own hypotheses, drawn from actual experiences:
So- how to understand OGS, then-these people in the video all have clear narratives that defy logic! Ask yourself this, for an example (and refer to the work of Otto Dorr Zoeggers thesis about no-touch torture) combined with conformity and influence operations: if you were an politician AND a secret alcoholic who hid their drinking from peers and colleagues, and someone came into your home via the internet as you were on a christian chatline, and said “I drink Jim Beam and ginger”-as you had a Jim Beam and Ginger in your hand-would that make you feel creepy?
Yup-look at OGS as that kind of mental assault, and that frequently coupled with “electronic harassment” as I just described on my router above.
Or perhaps you are a young gay female with different makeup-and that you surf “Goth” blogs and videos for four hours. And one day, you are chatting up a friend new friend online who just happens to have the exact same tastes in music and makeup-but this friend is a born-again christian who thinks you need to go to church-and you wonder “how can the know me so well?” And then that person says “yeah-I know it’s contradictory-but I felt bad that I surfed Goth videos for FOUR HOURS the other day.”
Yup, your new friend not only knows you, but they also-coincidentally!- did the same thing YOU DID on the same day! Because this is how NGO’s, JTRIG, The FiveEyes, local Infragard saboteurs, and others from Israel, or Georgia and Maryland and Virginia and Thailand, and Osaka…and…are using the internet, and targeting speakers with influence operations derived from data theft.
Fear and coercion is a powerful tool of social control-but he MAIN tool of modern social engineering. And each person is a social engineering exploit in progress.
Now: I will point the reader again to Dr. Mike Wood’s blog, which forever will be seen as my direct and tactical assault on the narrative itself-and that, like a horsehair worm in the head of a cricket, his blog provided an opportunity to do what many victims of these people have wished to do-which is to “draw the cockroaches out of hiding.
Google: Dr. Mike Wood and gang stalking conspiracy theory
Psychologists and social engineers are heavily invested in what many call a “pharmaceutical narrative” of targeted individuals, and as such, frequently overlook, or dismiss the many thesis points that are here, in ROGS. I hope the researchers and civil litigators of the future can incorporate my analyses for a healthier Democracy.
Organized gang stalking is NOT group stalking, it is NOT merely multi-stalking, or anything else similar, because of the breadth, and scope, and severity of these state level to local level operations-this is institutional corruption in action. It is properly called GANG STALKING of TARGETED INDIVIDUALS because it is military grade harsssment, straight out of counter-inteligence training, and it is a tactic of the state that was once deployed on individuals in secret.  Now, it’s called “community policing.”