One hand looks for money, one hand looks for goods. The sordid case of the Chinese billionaire, and the Minnesota honeytrap

(story in progress. Check back later for the finished post)

Happy Friday the Thirteenth: A global technology savant, Mr Qiandong Liu has been vindicated in a #fakerape honeypot sting in Minnesota, on the same day that Clint Eastwoods vindication of the FBI-smeared Richard Jewell gets an image makeover, released today.

1575274996452
The avid ROGs reader will note that I wrote about Richard Jewell awhilea go in a piece entitled “Hey there, Mr. Jewell, can you smile and hold this bomb for the good and nice, and trustworthy all-American FBI agent?

The thirteens are a real thing indeed.

The Two Tiered Economy and Its Connection to Gang Stalking

一只手找钱,一只手找货物
One hand looks for money, one hand looks for goods

Minnesota has a very large, very well organized DVIC entrapment economy, similar to the Russian social climate in 1900,and much like so many US states that depend upon asset forfeiture, or federal dollars that incentivize institutional rape, or child theft, and over one out of four dollars there come from the federal government.

In fact, 26.88% of Minnesota state revenue comes from federal funding, which is heavily tied to a,states,adoption of DVIC policies,and practices. So, the state is relatively low ranked compared to other states that are currently more dependent on federal dollars.

But to understand the link between the two tiered America that has put DVIC mechanisms like gang stalking in place to usurp court trials, and due process procedure avoidant based in “high policing,” tactics, one must understand that it wasnt always the case in that state.

While its transition from a manufacturing/agriculture/construction based economy into a DVIC based economy would make an interesting novel, more recent events there paint a better picture of the clash between a post manufacturing America that is dependent on federal dollars via international banking interests and their attendant practices, and its local, domestic effects on its population.

The case of Qiandong Liu, vindicated from a classic honeytrap scheme, and the case of David Schladetzky, a recent gang stalking target who went ballistic are an interesting vignette, a juxtapisition og locality versus global-ability and an accurate portrait of American democracy in decline.

Minneapolis police documents say woman who alleged she was raped by Chinese billionaire sought money and apology

Related Story: Minneapolis is a hotbed of illegal covert surveillance activity,and even the hotels are wiretapped by “unknown” mystery agents, according to the MSM

I wrote about how various hidden agents and agencies there in Minnesota staged the classic honeytrap to ensnare Mr. Liu, and provided photographs of the pre-honey trap event, staged by the University of Minnesota (I currently advise mainland Chinese to avoid sending their daughters, and especially their sons to that university, due to American policies of gender villification)and also, named the eventual rape accuser( who herself could very well been unaware of how she was being used in that trap, or exactly what agents and agencies put her at the scene), because I am well aware that these things happen in that state, but also well aware of the following:

-Minnesota has high rates of Google searches for gang stalking, and one online blogger, Deb Matheny has documented a vast network of actual gang stalkers there, many of whom work in security, local policedepartments, politics and oter state offices. I will with hold my opinion about Matheny as an author, but have personally validated her claims that several actual named persons are in fact shady gang stalkers, who can be prosecuted.

-the police in that state do in fact stalk reporters, and misuse databases, as documented by major media and several MSM reporters who sued the Electronic Peeping Toms and Tinas of Minnesota, and claimed millions for database abuse

-I personally blew the whistle* on a Minnesota Corporation, 3M, which was allowing Level three breaches of the CHRI database, one of the largest identity management database in the world,and doing so with political motivations, and that investigation covered/trash binned up by a retired FBI agent on their payroll. A single Level three breach is comparable to a terrorist cyber attack, but in fact there were multiple breaches, and that corporation kept them outside the sight of the FBI, and outside of major media reporting; and as batshit crazy gang stalkers hacked my internet and security cameras.

-I have repeatedly documented and named names of both right and left wing gang stalkers in that area, and traced their nation wide networks across the country, even including the son of a United Nations intelligence station chief.

– ROGS was once a humble doorman, at an international bar full of actual intrigue, and actual spies, but where I failed *again* and refused to cooperate with that localities,“deep state,” for which I have paid a heavy price, but also, paid it forward. ROGS recently laughed when he heard about an unexplainable car crash in that area of a rather highly placed official.

-ROGS even had the president of the UN USA park a cohort of SUVs under armed guard outside my house one fine day.

1564329557079

So, with all of that as background, lets look at the difference between.two men, both entrapped in the,same city and,state, both provably spied upon, and “framed”(in the sense of the word framing in BOTH media and public relations, and criminal law, with labelling theory applied).
(to be continued)

Quite notably, Minnesota also has bizarre gang stalking related homicides too.

CNNs Jim Acosta, the honeytrap and butt grabs, gropes, and #fakerape: Americas politics of deference, “progressive”white female privilege, and crybullies revealed

The American right has now latched on to an effective means of defaming rivals and controlling narrative, a tool created by the defamation prone left wing as a useful political tool: #fakerapes, crybullying, and contrived incidents where cameras, camera angles,and more are manipulated to create false light facts.
In the case of President Trumps team, framing CNN propagandist Jim Acosta, we see an aide to the president molested by CNN propagandist Jim Acosta.
In my thesis herein, we see that, repeatedly,men who are FIRST defamed by DVIC high heels policing, are then stalked, framed,and harassed by faggy people and horse-faced lesbian linebackers from the Multi Kultural Klubs and Kovens, or one of many NGOs, and kommunity policing whisper campaigns and that, for YEARS after the initial DVIC slander.
And, we see the number thirteen frequently involved too.

Related story: what does the number 13 mean to witches, and Wiccans?

Again: you dont have to take my word for it, because you can verify my research,and validate it in nearly every case of these political stalkings/defamings/harrassments/homicides/suicides.
So, as we see in cases like Scott Beierle, and others, these men are stalked and slandered as “butt grabbers,”and worse, in gray areas of DVIC paperwork, andinlune and offline terror campaigns.
Well- how exactly do these smears work? Iwill let you decide, as we see time, and time again that tribal-religious elements of neocon, and progressive and conservatuve forces in America embrace #fakerape and continue to wage war on sexual liberty, and liberty in general.
Here is the right wing, adopting #fakerape tactics created in #safespace during the lefts tactical planning for the.now eroded #MeToo political movement:

…“I’ll tell you what: CNN should be ashamed of itself having you working for working for them. You are a rude, terrible person. You shouldn’t be working for CNN,” Trump told Acosta.
The White House later announced it was pulling Acosta’s White House press pass “until further notice,” accusing the CNN reporter of “placing his hands on a young woman just trying to do her job as a White House intern.”
The White House alleged that Acosta had acted brutishly toward an intern who was responsible for handling the press conference’s handheld microphones.
….fillow this link to see a #fakerape in action, courtesy of Sarah Sanders

What the hungry, the tired, and the huddled masses are reading today

The statue of liberty has a very odd history, that, like many things we take for granted, has hidden meaning.  In linguistics, hidden meanings are a source of nearly erotic excitement-linguists love to discover layers of meaning in ordinary things.
SO, for example, for us, the phrase “War on Terror” is well known to mean “the war on people who know that the One Percent and its agencies and tax collectors and people targeters target speech more than terrorists,” and so on. Speech IS terror to those who stitched and sewed and who control the sows ear that is the NSA-DEA-FBI-DHS/etc agency nationwide wiretap out of nearly whole cloth.
So, let me jam this post in those pig’s eyes of “theirs” and stop up their silky ears today with the soft cotton of my words, wielded like a sharecroppers plow, by filling the local Fusion Center’s “words and people who use them” entrapper with “what my readers are reading today

I get around of 40-70 readers per day, who read between 3-5 posts each. And they come from many nations, because as we see, culture jamming requires an international focus by writers like me, so that cowardly battalions and squadrons of hidden groups of terrorists get shut down.

Update: 07/28/2019– Iget avbout two hundred reads per day from Israel, Cyprus, Hungary, etc.-anywhere George Soros Open Society is politically active, and most hits, some 80%, come from the USA

By far, my most popular posts are the ones teaching people how to document gang stalking for a civil lawsuit, or how to hack the CIA’s hacks, or how to protect themselves against the thousands of roving gangs of security contractors and other gangs of”community police” and “private contractors” and “security state criminals” that are hacking our online conversations, our lives, our web, and our relationships. And, how to spot actual targeted individuals from the hordes of paid speech killers online.
And, lately, many criminal defense lawyers and civil rights attorneys-maybe some journalists and others who know that gang staling is all too real are downloading the Guide to Government Hacking written by the ACLU, the EFF, and the NACDL
How police frame mentally ill people “in darkness,”but ony after brainwashing them
How retired law enforcement, and other nefarious elements of “our” society get away with murder, and more “in darkness.”
How the NSA steals data and stops innovation by hacking corporations and passing data around to the One Percent and their enablers, that influences politics, and people, via back door searches, and thousands of varieties of wiretaps-and by stealing SIM cards.
ANd this is just a sampling of today’s readers, but many other posts get read too.
And Look at the search language that lands here at my simple, free, wordpress blog, aka my “proving gang stalking is all too real” honeypot:
gang stocking research combating the lies
bolo gang
ex-air force organized stalking
champion gangstalking
osi gang stalking ti
psychopath gang stalking
See? Some bright soul wants to see if someone is actually combatting gang “stocking” as opposed to combatting manufactured terrorism that happens because a huge vampire is attached to our lives.
And the BOLO, aka “party flag” is very real. And, my GPS is still missing, but at least I have help looking for it now. Here-maybe YOU can help me find my “lost” GPS?
And while I am flattered tat someone might think I am ex-AirForce, I am not. I was once a nearly hopeless guy like poor Jurgis Rudkus, an immigrant from Osweiczim, Poland (I think) who encountered hardship and economic necessity in the American dream, and then, I learned to use words like these ones you are reading now!
Then, I especially like the fact that some are making the connection between military operations having bled ALL OVER OUR INTERNET, and into civilian operations,  via “black” operations like OSI informers, who run a variety of military programs that track people, target people and coerce and manipulate information out of people.
In fact, I am so pleased that peope are searching for this, that I am going to write a story about the daughter of a former USAF Major, who was a Playboy Bunny back in the heyday of Hugh Hefner. She is a beautiful woman, even many years after her tour of duty at Hef’s Mansion, and she told me about a weirdly fitted bicycle there, where young girls from UCLA…oh, nevermind. I will write that story later…
But as you can see, writing about organized gang stalking is what we must do in order to restore our democracy. And as you can see, I need help doing it. Have YOU had enough of the bleedover yet? Keep in mind: you swore an oath, and I swear a lot, so we have this in common-we are both fighting for our democracy with the tools our constitution guarantees to us. I got words, you got MRAPs and donu shops and weird USAF flyovers loaded with electronics, and bucketseat britches full of sh!t.
Because this is just the beginning, and it isn’t pretty. And I can’t help but feel a bit fattered at whoever it s that came ere looking for a Champion of Gang Stalking, because he’s not here-the writer has left the building, and in his place, only  the ghost of Vonnegut, who reminds us that Dwayne Hoover was kind of an asshole, and that police states by design CREATE terror, rather than any other thing.
Because Look!
When you give low IQ morons whose ballsack’s are falling out of their pants and overly eager to fall dickhead over gloryhole to make an impression on the ladies, and use those fancy toys that Saint FiveEyes the Panoptical Inquisitor gave them, they eventually create a use for them.
And, failing that, they go a bit nuts themselves:
dwaynes martha.jpg
 

Just in case you need a reminder about “what the boys and their ever thankful girlz will do with toys:”
sky penis
 
Why Neocons should be rounded up and locked away in fiery hot gulags in New Mexico, which has odd policing habits
I personally find layers of joy in looking at web pages for hidden meaning, and especially web pages created by teachers, many of whom are not very web savvy, but whose hearts are nearly always in the right place, despite the American education system being a more nefarious propaganda delivery system then many communist nations.
In act, our education systems have become whole-person rendering plants, enabling a select few, while destroying he vast majority of kids that enter into it. Our schools are virtual experiments in destroying human potential via race-class-gender narratives, while continuing to allow the descendants of Eastern Bloc gangland affiliates to have their way with kids.
So, sometimes in pedagogy, it is important to revisit our terms: what do you call someone who would harm a child? And, draw better lines in our society when some murder the crippled, the mentally ill, or the immigrant
Then, let’s revisit  the statue of Liberty, in the 1920’s, for a few facts about how the fourth generation frequently forgets where they come from, or why they came here to America in the first place, for the sake of the 99% of modern parents whose kids will unfortunately encounter the American education system:

Stories of Jewish immigrants throwing their tefillin overboard upon encountering the freedom and promise of life in the United States may be the stuff of legend, but for Mendel Aisenbach, a Chabad-Lubavitch Chasid from the Crown Heights section of Brooklyn, N.Y., such tales emphasize an important point: When they approached the Statue of Liberty, many of the tired and poor masses from across Europe – a good portion of them Jewish – pushed their identities to recesses deep inside in the quest to become Americans.

Then keep in mind that targeted individuals are not a new phenomenon, anywhere in the world; that targeting has been going on here for many centuries.
Today, we see the American agencies financed and inspired in their targeting by the descendants of this exact group of immigrants; and we see them having no sense of why they are here, as they target and harass and stalk us via databases much as Hitler did.
Look! IBM dealt directly with Holocaust organizers, much the way we see Big Data working across continents, across politics, and across human morality aka Transhumanism to eradicate bad ideas and bad thinkers via Total Information Awarenness, and rampant database targeting (as I chronicle here at ROGS).
And, sometimes, I recall their inspirations then, all those repressed men in tefilin, when I recall a certain obese blonde woman in the classroom of a wonderful American teacher, who I will call “Liz” who taught pedagogy in a midwestern college; and this pudgy blonde who “coincidentally” arrived in my class on inter-disciplinary approaches to solving education problems, which is known in some aspects as “The Pedagogy of the Poor,” which has its origins in the teachings of Paulo Freire’.
You might have noticed that I apply the pedagogy of thee poor to my writings about targeted individuals. This is because the One Percent-the descendants of those who financed Hitler-are actively monitoring all of our communications in real time from their escape pod in Israel after the NSA gives them full access to all of us.
And please, feel free to label me an anti-semite, or a self-loathing secularist, or even a hater of God, Gawd, Gad, G_d, G_d, god, dog, Yeshua Ha Nosering, the Virgin, ISIS, or even a disliker of Hashem the provider of great tidings of Chinook flyers,  but keep in mind that I am well aware that non-Jewish Dick Cheney, ambiguously Jewish Rupert Murdoch, and a definitely Jewish Rothschild are active in that country, financing strife, and doing things FROM Israel that are forbidden by our Constitution. I am well aware that Jews are targeted too. So, yeah, call me wutever.
But one thing you CANNOT call me is a hater of Democracy, or even the Statutes that guide our liberty, aka the Constitution, and its guarantees within our Bill of Rights.
And, as I have inter-generational memory as well, I specifically recall things that most “Americans” do not, like this overweight blonde white female who was affiliated with the Department of Homeland Security, and I recall how many of her written papers that we read out loud in the classroom (for a specific purpose) indicated as much, as she was one of many agents of the neocon Hydra that then had just begun targeting American activists and critical thinkers.
And like we see today, these have infiltrated every singe aspect of our culture so that real “change” will never occur again. The police state never looks like the police state when it is being constructed, because frequently, it looks like someones mom. Hitler did it, Stalin did it, an America has done it today via the memetic that women are somehow beyond blame for social problems.

Related Stories: When Hitler’s Perfect Woman Came to Call-how  Hitler used images of idealized women to build Nazi Germany; and ISIS in the American neocon dialectic, aka “The Virgin Mary flapping her garments like boatsails, as flags of anti-misogynist/anti-sexual harassment/anti-educated male,” and the criminalization of speech on the internet, or, this.

In order for the students of the future to understand how integral the DHS is/was/will continue to be in the destruction of American Democracy, via speech prohibitions and high heels policing, and then, the “phenomenon” of social justice warriors and cry-bullies (SJW’s)  after that, one need only keep in mind the image of plump white women who drew double salaries across America, and who targeted many activists of many races and many classes during the “War on Terror.”
And, unlike American propaganda systems, which are designed to limit the potential of American children, these others are designed to rigorously teach kids hard science, math, and more. It’s as if we have succumbed in totality to international finance treating our children as sheeple.
In order to understand how deeply they have inserted themselves into our children, note that the word sheeple , is one of the words that the One Percent and it’s domestic spying and democracy clearinghouse operation the DHS has “terror watchlisted” at one point or another.
Here, have a look at one such page from the early days of the WWW (back when we still called it the WWW!), before corporatism and the War On Terror infiltrated every level of our propaganda stream, and diddled our children’s minds like Facebook billionaires have admitted to doing today by deliberately, and with impunity manipulating dopamine levels in children’s minds.
Also, keep in mind that during the election of 2016, many of the neocon left were echoed in the propaganda stream calling for MANDATORY USE OF FACEBOOK. Then, compare the ideals of Lady Liberty THEN to this neocon version of Jewish-Catholicism and it’s faux assault on speech via sexism/harassment/misogyny memes; ISIS, indeed.
Mystery cults INDEED. Lady Liberty, indeed. Is it misogynist to say that the resemblance is striking these days? :

The Statue of Liberty

“Give me your tired, your poor,
Your huddled masses yearning to breathe free,
The wretched refuse of your teeming shore.
Send these, the homeless, tempest-tossed to me.
I lift my lamp beside the golden door.”
Google
 Web  www.kidport.com


The Statue of Liberty was a gift to the people of the United States from the people of France. She stands in the middle of the harbor of New York City. She is a symbol of hope and freedom for immigrants.

 

The porn deluge, compromise operations, OSI Informers, and intelligence assets.

SO, there you are a traveling businessman from any of many countries- but you are a key player in a negotiation between a Chinese billionaire who needs to shuffle some cash out of the country, and an American company that handles EB5 transactions-and you land in Reston, VA after an 18 hour flight.
You also are friends with your countries  liaison to the UN, who works in Japan with the International Transnational Crime initiative, and while none of that is on your mind- it could be on someone else’s mind, because your connections make you a likely target. And you would be a nice acquisition for any intelligence agency or other state level or corporate player, if only…if only…

Related Story: About two years after I wrote this post that you are reading, agents, agencies, and institutions collaborated to spring a “honey pot trap ” on a Chinese billionaire, who was falsely accused of rape in Minnesota. That US based scheme cost his company, and his nation a 90 billion dollar stock market drop. Using ROGS Analysis, I can save you, and your executives billions. Click my contact button for more information.
(also see this link, where I provide background and photos)

You’re tired, but figure a drink or two before bed won’t hurt your sleep any. After a quick rinse in the hotel bath, you go down to the bar in the lobby, where you sit, eyeball some soccer on he widescreen, andthen, in a rush, a woman sits down next to you, and stammers a quick-“Oh, I am sooo sorry!” after bumping your chair, and plopping a suitcase sized ‘purse’ on the other chair.
(pssst: You don’t know this now, but if you one of these phone app‘s, called IMSI catchers in your repertoire, you would be able to “see” some of what could be in her bag- and I’m not talking coupons, compacts, tampons and cookie crumbs.)
Related story: how to catch an IMSI catcher academic .pdf by Bauke Brenninkmeijer
No problem, right? A common occurrence in any bar. You drink your Jameson and real ginger, and notice that she has called the bartender into an interesting dialogue, and your ear drifts in and out of the conversation about an obscure liquor naed “China something or other,” joining your ear to the facts and mis-statements thus:
“But it only grows in the Andies mountains! I am certain that’s what the distributor said,” says the magnificently comely, Sibel Edmonds look-alike who bumped your chair; and who now makes the claim she is a former liquor sales rep.
“No- I know this one,” says the bartender, “because I write a blog online for other bartenders. Cinchona is native to the Andean mountains, but it is cultivated in other places.”
Odd, you think to yourself- you just had this conversation across the world, with someone who claims they are a “naturopathic doctor,” who told you about quinine water, malaria, and how it cures people in developing areas of the world. Bits and pieces of the conversation float back into your mind:
“Confederate doctors used bark to treat malaria, because their medicine supplies were low, or non existent.”
And “quinine” aka tonic water is the base of a god gin and tonic,” and so on.
Your mind drifts into old black and white movies, Humphrey Bogart, and the sound of a drink-any drink in an old B&W movie, “on the rocks.” Rocks were a big deal in the refrigeration era and so on; B&W films are a good match for clever sound engineering that includes the near-onomatopoeia of the word “rocks,” and so on-such is the nature of inner dialogue.
Then, beyond your own better impulses, you venture that “Actually you are both right. Cinchona is in fact native to the Andean mountains, but also it is cultivated in other places. It’s the national tree of Peru, which is kind of funny, because for the most part, it is a shrub.”
The crowd feigns awe, and then makes small talk about every drink under the sun that contains quinine, and despite yourself, you venture forth your extensive knowledge of chinchona thus:

Cinchona (/sɪŋˈknə/ or /-knə/)[2] is a genus of flowering plants in the family Rubiaceae containing at least 23 species of trees and shrubs.[3] They are native to the tropical Andean forests of western South America.[4] A few species are reportedly naturalized in Central America, Jamaica, French Polynesia, Sulawesi, Saint Helena in the South Atlantic, and São Tomé and Príncipe off the coast of tropical Africa. A few species are used as medicinal plants, known as sources for quinine and other compounds

And of course, you remember this odd “conspiracy theory” that the holistic doctor told you about-he one about “mysterious suicides and murders” of holistic doctors. But of course, you don’t bring that up….
“Well, folks, nice talking to you, but I have an early meeting tomorrow-oh, look at that! Later today.”
In your room, you log on to the hotel’s network, and check your email’s, looking forward to the ones that you cannot check, or even acknowledge owning in the communist/theocratic/totalitarian nation that you are from. But hey! You are in America now-land of freedom, and Constitutional rights-and even a first amendment that protects speech in all forms!
But make no mistake- our “good guys” are even more deviant than your “good guys” who chop men’s hands off for stealing a pinch of desert salt, and our guys have a plan for your guys- and you too, because your computer’s unique identifier that is hard coded into your Windows 10 tells every ISP that you are “not from here,”and the way that OUR good guys enforce Biblical narratives, and primitive morality that is the “opposite of free” have lots of plans for you.
So: you check your usual corporate has the usual stuff. Ashley Madison account-that one temptation that you infrequently log into anymore, because, well- feminist jurisprudence enacting itself through hacking-and that SOME people are “making lists!”
SO you check in to the old main stay- your Hushmail account, because, like, no one could or would ever hack THAT– where you find an “invite” for a free trial to a discreet mature and elegant naked lady porn site.
Or, this, which is as American as Apple Pie, and some say, MORE American than apple pie, is currently in conflict with this.
Or cherry pies meet Golem, in Haym Solomon’s bank vault:
IMG_2909.JPG
You click the link, follow a few instructions, and you’re in-your in so deep, that you may never get out again, because that link was a honeypot, and then, your computer is spammed, and windows are popping up, full of dog porn, and horses in the Sonoran desert shtupping moaning senorita’s with swinging double DD’s , and 13 year old’s in swimsuits playfully beckoning you to swim….

Related Story: A few Blasts from the Pastsss There’s a special place in hell for Madeleine Albright
NATO “deeply” regretted killing at least seventeen people when a bomb hit a bus packed with women and children. It also supposedly regretted killing fifteen people after it targeted a hospital with a cluster bomb and killed three diplomats at China’s embassy in Belgrade. After Serbian television criticized Albright and Clinton, it was bombed as well, killing sixteen people.

And what porn deluge would be complete without “Russian disabled woman porn,” where legless and armless “Russian women” who are actually Serbs and Croats kidnapped during the last heroic act of UN good guyism (which was actually an act of good girlism, thanks to Madeleine Albright) tied to trees, squirm under the weight of grunting guys in military gear.
You have been rick-rolled- so…..
Welcome to the porn deluge, 101, which is a staple of military campaigns, terrorist recruitment and compromise operations, intelligence agencies and hairy backed Moldovan porn entrepreneurs alike. While on the surface, it’s just  “spam” to you, it is also a lot of other things that you haven’t yet figured out-but which you will contemplate for days to come.
Either way, and regardless of who set you up or otherwise rick-rolled your ‘un-hackable’ Hushmail, it’s YOU that have been shtupped.

shtup
SHto͝op/
vulgar slang
verb
gerund or present participle: shtupping
  1. have sexual intercourse with (someone).
Welcome to Jewish-christian culture! A place where the good guys and gals act as God! Look no further than that one event, and know that your fanatical religious sects and cults have nothing on our “good guys and gals,” who have pre-emptively shtupped you for the common good-for the children, of course!
The next morning, in the lobby, the fully do-able Sibel Edmonds clone just happens to rush by you at the elevator, which is right next to the sign that says “Stairs–>”.
“Morning traveller!” she says in folksy American colloquial English. “How did you sleep last night?” she asks, with an odd smile on her face.
“Oh I slept just fine, thank you,” you say, regretting the moment you clicked the link.
” Well be careful out there,” she says to you, specifically. ” I hear it’s going to rain today. Better get an umbrella!”
“Oh, thank you,” you say. “Does it rain a lot here?”
“Oh, my,” she says. ” When it rains it pours! It can be a real deluge sometimes.”
“Oh. Well, hope to see you around,” you say, still thinking about the initial link that promised “elegant nude ladies.”
And because you are a man-and these honeypots target men specifically, and in and of themselves are gendered operations that violate even the US Constitutional guarantees of “equal protection under the law,” somehow, the good guys and gals missed that memo.
And you, foreign man, are now a potential”compromised asset.” Or, according to the experts- you are likely suffering from some form of apophenia, should you one day connect the dots.
Related Links (BE CAREFUL!)
American women  and dogs: young women choosing dogs over motherhood or men (and probably a few other things- try not to let your imagination GO WILD!)

 

The CIA hack and cell phone surveillance: gang stalking and cell phones

UPDATE 8-13-2020: the link to Spyera software below now goes to an absolutely riduculous page. I suspect that link to Spyera was a front for more spying.
And, the CIA/NSA contractor that is alleged to have dumped the CIAs zero day spy tools (the same types of tools that John Brennans CIA used to spy on US most hallowed institution, the US Congress) has been arrested, and tried, with the result that trial was declared a mistrial. But the agency and its lil’ helpers already had a backup plan: they (whoever “they” are in each case) stashed shitloads of child porn on the guys personal computer servers, which is standard practice in intelligence agencies like the FBI, CIA, Mossad, et al fear that they have a rogue agent who will blow the whistle about military black operations that utilize child porn.
UPDATE  10-04-2020: This post is incredibly popular the last couple days, though its best run.was in 2018, just as CIA contractor Joshua Schulte began to chip away at his political prosecution.
While some have criticised CIA contractor Joshua Schulte for having “weak OpSec (operations security ), in a world of smoke, mirrors, and mirrored cell phones and “electronic implants ” on peoples computers, perhaps no security is the best defense because Schultes own APPs, which are designed to remotely control any and all cell phones, and computers without the user even being aware if it,  provide him the criminal defense of total deniability, as this Obama era critic, and concealed -carry advocate “targeted individual and Libertarian” faces his second trial.
Look at these paragraphs below from Jason Koebler of Vice News (and Vice News itself a politically compromised organization, since its founder abandoned it due to intel agency pressure ) and note that every single claim of “weak security ” and other “evidence ” seeking to tie Schulte to various acts,and actions could easily been performed via a middle man attacker from Israeli, or any other anti-libertarian country.
In other words, any attacker, using Schultes own tools, could impersonate him online, AND make it appear as if he himself was doing it. Intel agency compromise operations,are exactly THAT strange, and brilliant.

  • Schulte’s website allows us to easily connect many of his online personas and accounts to his real identity, discern his politics, his places of residence, and identify his friends and family members. This all came from someone who should, in theory, know better as someone who had access to highly sensitive information.
  • In addition to Project Wizard, Schulte also uploaded screenshots of his Gmail inbox, which have his name as well as emails that show information about his bank, his OKCupid account, his cell phone provider, his friends’ and families’ names, and more.
  • There’s a selfie he took of himself holding a “FUCK OBAMA” pint glass, and a shirtless mirror selfie he took in a hotel bathroom. There’s a folder called “facebook_convos” that are just a series of screenshots of him beefing with his Facebook friends and family about politics. He uploaded a resume, group projects and homework from college, and design files for a 3D printed gun called “The Liberator.”
  • There are narrated video tours of the inside of his house, screenshots of emails he sent to activists advocating for concealed handgun carry permits in Texas, saved IRC chats of “Josh” saying the n-word over and over, and yet more screenshots of his Gmail inbox, which—in the same screenshot—prove that we are looking at “Joshua Schulte’s” inbox and also reveal the pseudonym he used on several different websites. Other files he uploaded tie this pseudonym to a Blogger where he wrote extensively about his libertarian politics. The pseudonym is also present in logged-in screenshots he took of an online quiz that tested his “Brain Performance Index” on a site called Lumosity; he also uploaded a screenshot of the score he got on a MENSA practice test.

In the meantime, there,are literally thousands of APPs that can and do monitor phones in real time.
Targeted individuals often claim that their cell phones are being used as tracking devices, and that intelligence agencies are using them for target practice and experimentation. Now, we know that part of that is true: A disgruntled CIA contractor is alleged to have dumped a list of all the tools that the CIA has been using to spy on us via our cell phones for the last decades. But don’t just point the finger at the CIA, because then, you WILL sound crazy, and Dr.’s Sheridan and James might get a whack at your mind, mind mind!

UPDATE: This post is becoming one of the most popular on this blog. While I experienced “cell phone mirroring” as early as 2010, and “offline computer situation rooms” as early as 2001, you may have just discovered this vast plot against constitutional liberty. Read on, and use my ‘search this blog’ section to find posts relevant to your own OGS.
Then, in a side note, be aware that the US agencies have long farmed out all of their intelligence collection to private contractors, Israeli’s and the Five Eyes Alliance, so any given abuse of your phone could be by : any of 17 US agencies, or any of Britains eight agencies, and many more, not counting the douchebags who work in private security firms, and even local police agencies-and ALL OF IT without a warrant, or even a paper trail.

And the fact is that ALL 17 intelligence agencies in the United States have turned on American citizens, using us for target practice of varying shades of “illegal and unconstitutional” so, they have lot’s of Company (there’s a joke in there, somewhere, about “the Corporation, lol). Your country is also doing these same things to you and your countrymen.

UPDATE: This is one of my most popular posts. So I thought I would add a link for software tat you can buy to do some of the same stuff to these agents and agencies that they are doing to you. Here’s Spyera mirroring and more for cell phones, but there are many others you can use, many freeware (but be careful-most freeware comes with the hidden cost that it was created by-you guessed it….)

You see, these days, electronic tools and toys, entrapments and entrainments of electronic surveillance and propaganda tactics that were once directed at millionaires and mobsters, third world dictators and Iran Contra’s and Osama bin Laden are now directed at ordinary common people who buy houses next to the fire chief, or who seek to trim the budget; or smoke a joint here and there, or who forgot to pay their vehicle tax. This is partially due to the fact  that all of the agencies are crawling with corruption, and blackmailing each other, in the Spirit of the LEIU’s, who, bar none, perform more black bag jobs around America than any CIA agent ever did.

Related Story: Watch this video to see how some of us knew in 2005-2008 that our phones were being used as tracking devices. And, that some would repeat our conversations back to us. Watch it from 4:27 minutes. Disruption campaigns that target activists and others take on purely diabolical and bizarre proportions within six degree’s of a persons relations. The newscatser notes that the FBI use cell phones to “keep tabs on critical conversations between known members of the mafia.”

(psssst: Don’t tell anyone, but this story here about how retired LEO’s work with current LEO’s and intel gencies to perform assasinations and black bag jobs is one of America’s best kept seekrits)
And many wonder how it is that they could write something online, and then, shortly thereafter, have a squad car pull up outside their house.
hazing 4.png
This is enabled by the highly integrated, un-constitutional mechanism of OGS and the tracking in real time of targeted communications of targeted individuals, and coordinated with massive database abuse and fraud on the courts at the local, national, and international level.
Any researcher of OGS can verify that at least, it is true, that indeed 17 intelligence agencies ARE following targets, and doing many other nefarious things as well. Here, below, from the Intercept, is the case of the CIA software that mirrors your cell phone, and uses it to perform MIM attacks on YOURSELF; and here is a full list of the tools that these agencies use to target journalists, whistle blowers, the neighborhood crank, wankers, dole dippers and a few potheads the same as if they are all terrorists, with download links from Wikileaks). But be careful….honeynets and limited hang outs go two ways.

A concerted effort by the CIA produced a library of software attacks to crack into Android smartphones and Apple iPhones, including some that could take full control of the devices, according to documents in a trove of files released by WikiLeaks Tuesday.
The attacks allow for varying levels of access — many powerful enough to allow the attacker to remotely take over the “kernel,” the heart of the operating system that controls the operation of the phone, or at least to have so-called “root” access, meaning extensive control over files and software processes on a device. These types of techniques would give access to information like geolocation, communications, contacts, and more. They would most likely be useful for targeted hacking, rather than mass surveillance. Indeed, one document describes a process by which a specific unit within the CIA “develops software exploits and implants for high priority target cellphones for intelligence collection.”
The WikiLeaks documents also include detailed charts concerning specific attacks the CIA can apparently perform on different types of cellphones and operating systems, including recent versions of iOS and Android — in addition to attacks the CIA has borrowed from other, public sources of malware. Some of the exploits, in addition to those purportedly developed by the CIA, were discovered and released by cybersecurity companies, hacker groups, and independent researchers, and purchased, downloaded, or otherwise acquired by the CIA, in some cases through other members of the intelligence community, including the FBI, NSA, and the NSA’s British counterpart GCHQ , the documents indicate.
One borrowed attack, Shamoon, is a notorious computer virus capable of stealing data and then completely destroying hardware. Persistence, a tool found by the CIA, allows the agency control over the device whenever it boots up again. Another acquired attack, SwampMonkey, allows CIA to get root privileges on undisclosed Android devices.
“This is a very impressive list,” tweeted former GCHQ analyst Matt Tait, noting that at least some of the attacks appeared to still be viable.
Matt Green, cryptographer at Johns Hopkins University, agreed the leak was “impressive,” but concluded there weren’t many “technically surprising” hacks. This lack of originality may have stemmed from a desire on the part of the agency to avoid detection, judging from one document contained in the trove, in which apparent CIA personnel discuss an NSA hacking toolkit known as Equation Group and its public exposure. It was also previously known that the CIA was targeting smartphones; drawing on top-secret documents, The Intercept in 2015 reported on an agency campaign to crack into the iPhone and other Apple products.
In addition to the CIA’s efforts, an FBI hacking division, the Remote Operations Unit, has also been working to discover exploits in iPhones, one of the WikiLeaks documents, the iOS hacking chart, indicates. Last February, while investigating the perpetrator of a mass shooting in San Bernardino, the FBI attempted argued in court that Apple was obligated to give the FBI access to its phones by producing a weakened version of the device’s operating system. If the WikiLeaks documents are authentic, it would appear FBI and other elements of the intelligence community are already deeply involved in discovering their own way into iPhones. The compromise of the documents also calls into question government assurances in the San Bernardino case that any exploit developed by Apple to allow the FBI access to the killer’s phone would never be exposed to criminals or nation states….

….follow the links-connect the dots!
Related Story: The Shadow Brokers Hack in context