Two Houston cops indicted for homicide, in case of gang stalking no-knock raid that killed two: gang stalker BINGO

What is organized gang stalking?

In a classic case of gang stalking gone wrong, a likely drug task force snitch provides phony information to cops who get a phony warrant, and then murder two homeowners in cold blood,
after stalking them.

Then,the Supreme High Orders of Sooper Seekrit Police go into CYA damage control mode,siccing their Pit dog police union thug Joe Gamaldi on critics bythreatening journalists, and others that they will be individually targeted BY THE POLICE should they criticize this police state action, it is revealed that the cops themselves purchased, and planted dope in the house to create a false narrative.

It just doesnt get much “gang stalkier” than this story-get out the ROGS Bingo card:

1-“the gang stalkers will move in next door to you,” meaning that these snitches on the police chain will then let cops use the home for stake outs, and wiretappung, and other shenanigans
2- “the gang stalkers will tell your neighbors….” that you are a prostitute, a pedophile, a drug dealer, etc.
3-“the only three possible outcomes of gang stalking are that you will be incarcerated, institutionalized, or dead.”
4-the gang stalkers will wage a slander campaign in your neighborhood
5-people who are under threats from gang stalkers feel a need to protect themselves, etc.

First, the two corrupt gang banging cops are indicted, after a case where cops,working with a likely informant poses as the mother of a “victim” and gets two people murdered.

Then, take a look at this story below to weed through the webs of lies that led a racialized police force to murder two people in cold blood(the cops, and their informants are K4 identities, whereas the suspects killed in cold blood are white).

Use ROGS Analysis, and my free BINGO card to note that this is a 100% ROGS BINGO.

Who is the 911 caller in the Harding Street raid?
8b1d6af0-dfee-40ba-9c28-7bb302ca3747_360x203
Patricia Ann Garcia Harding Street raid 911 caller: do snitches still get stitches, in the modern due process free DVIC policing era? I sure hope so.

Patricia Ann Garcia was arrested on federal charges Wednesday morning in connection with the deadly drug raid that killed two people.
HOUSTON — The 911 caller arrested in the Harding Street raid, Patricia Ann Garcia, has a long criminal history dating back to 1984, KHOU 11 Investigates has learned. Among the arrests was one by the same narcotics squad involved in the raid.

Garcia, 52, was arrested this morning and appeared in federal court this afternoon in connection with the deadly January raid that left two people dead.

She was a new name in the ongoing investigation that’s resulted in a felony murder charge for former Houston police officer Gerald Goines and new federal charges for Goines and former officer Steven Bryant.

Garcia is a convicted felon whose recent arrests include one by Houston police in 2013 for possession of cocaine. Garcia was convicted and sentenced to 60 days in jail.

The arrest stemmed from an investigation by Narcotics Squad 15, according to an HPD incident report.

Neither Bryant nor Goines were the arresting officers in that case, but they were members of the squad in 2013, according to court documents. The Harris County District Attorney is currently reviewing hundreds of the squad’s cases.

She was also convicted of felony theft in 1995. The rest of her long rap sheet is misdemeanors — five thefts, an assault of a family member in 2013, four driving while license suspended, with the last one in 2016 and one possession of marijuana.

The only other interaction with HPD she had was in 2002 for one of the driving while license suspended arrests.

Garcia lived just a few houses away on Harding Street where the raid resulted in the deaths of Dennis Tuttle and Rhogena Nicholas, as well as injuries to other Houston police officers.
24b6069e-c1e3-4491-a973-f269ea3764d1_360x203
Dennis Tuttle, 59, and Rhogena Nicholas, 58
Photo by: HPD/KHOU
Dennis Tuttle, 59, and Rhogena Nicholas, 58

READ MORE: Man killed in Harding Street raid was shot 9 times, autopsy report says

The charges against Garcia allege she conveyed false information by making several fake 911 calls. Specifically, on Jan. 8, she allegedly made several calls claiming her daughter was inside the Harding Street location.

According to the indictment, Garcia added that the residents of the home were addicts and drug dealers and that they had guns, including machine guns, inside the home. The charges allege none of Garcia’s claims were true.

Garcia faces a five years in prison for conveying false information.

Rotten and Smelly, Honey-What are "handlers" in the gang stalking dialectic? Gay Talese, Paul Erickson, and young, nubile ingenues~honeypots for hire

A great piece, by a hapless friendenemy of Maria Butina~or:when honey rots, because bees no longer polinate:

Let Me Tell You About My Friend Maria Butina — Who Might Be A Russian Spy

In 2015, my friend and I went to Disney World. Three years later, she went on a solo trip to prison.
Elena Nicolaou
Last Updated February 14, 2019, 11:28 PM
Gay Talese told me I was getting the story wrong. We were sitting next to each other at a sprawling wooden table at Morso, a Manhattan restaurant so far east I could see the Queensboro Bridge stretching into Queens from the window.
This meeting between me, a recent college graduate, and one of world’s most renowned journalists was organized by the now-indicted conservative political operative Paul Erickson, who worked mostly in the shadows to establish connections between the National Rifle Association (NRA), Republicans, and possibly Russia. My mother had met him at a seminar during their 25th Yale college reunion in 2009. He had made her laugh with a characteristically wildly clever joke; by the end of the day, he’d charmed his way into becoming an honorary member of the family.
Advertisement
After the reunion, Paul would punctuate months of silence with spontaneous (and ostentatious) activities for our family, like dinner at Sardi’s, a trip to Disney World, or a dinner with Gay Talese, whom he’d met during the trials of John Wayne Bobbitt in 1993. (Paul was Bobbitt’s media manager and spearheading his “Love Hurts” campaign; Talese was working on a 10,000-word story about the Bobbitts that would never run.)
This roundabout convergence brings us to that snowy evening in March 2017, when Talese told me I couldn’t see what was right in front of me, which was my friend Maria Butina, then 29. Like always, her long, red hair tumbled past her shoulders. She wore no makeup. Just an expression.
“You’re a reporter, right?” Talese asked. I nodded. I had just started my job as an entertainment writer at Refinery29, a publication he’d never heard of. Gay flicked his head toward Maria. She stared back at him with the intensity of someone who knows they are the subject of another person’s conversation. And no one could stare quite like Maria. In an instant or in an angle, her face could switch from bright wonder to an expression that seemed more hawk than woman.
“There’s your story. Her,” he said. “

Manufacturing terrorism suspects, fake web pages, and informants using lots of rope in darkness: modern lynching online and CVE programs

Whether the target is a Muslim, a Mormon cattle rancher, a black activist, or a poor white kid like William Atchison who get stalked online and then offline by agents provocateurs, aka DHS/FBI/DIA/private contractor/NGO/foreign spy outfit unspecified, informants, a few patterns stand out in the data:
UNDERCOVER FBI AGENTS SWARM THE INTERNET SEEKING CONTACT WITH “TERRORISTS”who they then profile via behavioral analysts, psycholigical operations, and then endlessly monitor their speech online and off, in concert with HUNDREDS of agencies, and using NSA data.
The FBI’s online activities are so pervasive that the bureau sometimes finds itself investigating its own people.

Almost all targets of provocation are male.
All targets of provocations are ensnared online, and followed, monitored and more offline for using words~aka pure first amendment protected speech~sometimes for decades since the NSA dumped hay all over needles in a theretofore previously non-existent “haystack.”
All targets of provocateurs have long term contact with people working under the counter-terrorism rubtrik, or so calked community policing, who seek to INFLUENCE the speaker, from hidden or occulted positions online and off (for instance, social workers, college, or DV type “counselors” target and track individuals, usi.g multiple databases, and share information about their targets with police)
All targets of these hidden programs are manipulated in “directed conversations”which is well documented in the online TI community,and this unrecorded anywhere.
All targets are manipulated, and frequently their most base impulses to food, clothing and shelter~indeed, their base drives, what Freud called libido~are used as tools to manipulate them, and much more, as we saw with the Tsaernev family being targeted for a decade BEFORE the Boston bombing, as well as in the cases of the Seattle Somalis employment and travel being stifled by federal agents, hearsay, and policy (not law.)
In any study of what is colloquially called mind control, and stemming from Nazi/US/British styled torture, or the well documented MKULTRA and its companions Monarch, Bluebird, Phoenix, Gladio-all of these used base drives as ways to manipulate subjects and targets.
And, all base drives, stationed a man, or a woman in the middle to impede or encourage the target toward one or another behavioral goal. So, any study of targeted individuals must account for ling term state/federal ibstruction of base drives, and achievements.
Related Story: Niftygerbil, Niftychinchilla, and other Nifty names for Tor nodes, courtesy of the same geniuses who gave the world Monarch and Bluebird.
So, we see now, the entire organized gang stalking dialectic mirrors the ACTUAL complaints of targeted individuals. Refer to the ROGS BINGO card at the top of this blog for comparison.
So, OGS is far from a delusional complaint, and rather,indicative of manufactured terrorisms un Constitutional basis, and the occulted use of informants whose work in online terror/criminal/other incitement is undocumented by design-a totally unchecked use of actual psychological operations-agents provocateurs actions are not on the record, or in courtroom documents either.
So, in the very least, these online influence and psyops using unchecked, unregulated, hidden, occulted and obscured methods, repeated over time, do indeed form, as the good doctor Lorraine Sheridan has noted~a closed echo chamber, echo chamber, where words themselves are the primary targets, as are the individuals who use the words- they are literally under close monitoring every time a banned word hits Google/Wordpress/Twitter, etc.
Here from NBC News is a story about how the FBI uses informants online and on social media in occulted fashion to police pure speech, and then, to target individuals:
https://www.nbcnews.com/storyline/isis-terror/no-lol-matter-fbi-trolls-social-media-would-be-jihadis-n226841s
And here is a bit more about that from the Intercepts Cora Courier in 2017: ghttps://theintercept.com/2017/01/31/undercover-fbi-agents-swarm-the-internet-seeking-contact-with-terrorists/
“”According to the guie, an online counterterrorism investigation can target websites or online networks that the FBI believes terrorists are using “to encourage and recruit members” or to spread propaganda. Such probes may extend to the administrators or creators of those forums, as well as people engaged in “the development of communications security practices” or “acting as ‘virtual couriers’ for terrorist organizations by passing online messages among members or leadership.”
The guide classes as online investigations those that rely primarily on online informants or undercover employees, and those that involve surveilling internet facilities or foreign websites hosted on U.S. servers. The FBI often runs such operations jointly with other U.S. intelligence agencies or “international partners,” according to the document.
Since 2008, the Counterterrorism Division has coordinated these operations under a program called the Net Talon National Initiative. Net Talon uses informants, linguists, and FBI employees working undercover, posing as ordinary internet users, to zero in on terrorists’ use of the internet, according to the guide. The initiative was meant to centralize expertise on particular targets and platforms, to “address intelligence gaps,” and to create a clearinghouse of the intelligence the bureau has collected on terrorists’ use of the internet.
The FBI’s online activities are apparently pervasive and uncoordinated enough to lead to confusion. The document refers to “resources being wasted by investigating or collecting on FBI online identities,” including undercover employees, informants, or people who have already been investigated by other offices or agencies. An FBI official told the Intercept, “You would be in a forum, and you’re like, ‘This person’s way out there,’ and we’ve gone and opened up a case, and sometimes that was a local police department, or a friendly foreign service. There are still instances of that, and deconfliction is still necessary.”
Khurrum Wahid and Joshua Dratel, defense attorneys for Ahmed Omar Abu Ali, answer questions from the media after Abu Ali was sentenced on March 29, 2006, at a federal court in Alexandria, Va. Photo: Alex Wong/Getty Images
THE COUNTERTERRORISM POLICY GUIDE shows just how much flexibility informants and undercover agents have when operating online, even when they’re not working specific targets. The FBI insists that there is nothing to see here: In statements provided to The Intercept, the FBI said that “while there are obvious differences between online and offline environments,” FBI employees and informants working on the internet are subject to the same rules, and that bureau employees can only monitor people’s online activity as part of an authorized investigation.
The guide, however, suggests that the internet offers areas of ambiguity. Much comes down to the questions of what informants can do, as opposed to FBI employees, and whether the goal of an operation should be construed as seeking to obtain specific intelligence, simply watching public websites, or developing a profile for an undercover identity.
For instance, the guide states that an FBI employee can visit a message forum or blog only when the site is relevant to an investigation. An FBI employee, according to the guide, could be an undercover agent or an “online covert employee,” a term that presumably refers to FBI workers other than agents, like analysts. FBI employees can’t chat online with someone who isn’t already the subject of an investigation for the purposes of gathering intelligence on that person. They can, however, “engage in unlimited communication with associates” of a person under investigation, if the conversations are relevant to the investigation.
Informants and undercover FBI employees are also allowed to do a great deal online in the name of “building bona fides,” such as creating fake identities or making themselves appear to be normal commenters on online fora. The guide says that in order to establish credibility, FBI employees “may make postings and communicate with individuals who are neither the subjects nor the associates of subjects … there is no limitation with respect to the amount of communication [they] may initiate in this regard.”
And the FBI is allowed to open new investigations on people it identifies through “passive monitoring or active communication” on websites.
An FBI spokesperson clarified that in order for an undercover or covert employee to monitor a website or forum, the site must already be associated with an investigation, “either because the forum was known to be used by a subject [of an investigation], or because the subjects are there. I can’t be in the forum trying to bait you into conversation.”
However, the FBI acknowledges that when its employees participate in online fora, they interact with people who may be bystanders to whatever activity led the bureau there in the first place. And that is not accidental. “We want to know if the subject has other people who are joining in, which people are part of the activity, and who is just there,” a spokesperson explained.
In other words, FBI agents can post and chat online with people who have nothing to do with an investigation, so long as they aren’t collecting intelligence — but in the course of those online communications, they can decide to start investigating someone.
Michael German, a former FBI agent who is now with the Brennan Center for Justice at New York University Law School, said that agents have always had a little bit of wiggle room in this regard. They can have a certain number of in-person meetings with someone, or in some circumstances go to public meetings or public websites, without identifying themselves as part of the FBI. This helps agents avoid a bureaucratic mess when carrying out a simple “buy and bust” drug sting, for example, German said.
But the ability to conduct unlimited online conversations in the name of building bona fides gives agents “a pretty long rope,” German said.
Criminal defense attorney Khurrum Wahid, who has handled or been an adviser on many national security cases, notes that FBI employees or informants frequently pose as experts offering guidance to lost individuals.
“These uninformed young people go online and become almost smitten with people who show a level of knowledge, who often turn out to be informants or undercovers,” said Wahid.
Informants operate under looser rules than FBI personnel. They are allowed unlimited engagement with a target in the course of an “assessment,” a preliminary investigation that can be opened on a loose tip of suspicious behavior, in order to collect general intelligence on a subject, or to evaluate a potential new informant. Assessments were created as a category in 2008. German finds their allowance for the expansive use of informants problematic.
“What we’ve seen in sting operations is that there is this shady portion before the official operation begins which often involves the informant,” said German. “And then it’s passed off to an agent, and it looks like they are ready to commit a crime pretty quickly.”
Wahid noted that at least in online cases, there are generally logs of all the conversations between suspect and informant, whereas “when it’s a live informant, they can turn off the recorder and we never know what it was all about.”
The use of informants in counterterrorism sting operations has expanded since the 9/11 attacks, when the FBI adopted the mantra that its job is to stop terror attacks before they occur, not just investigate them afterward. The government argues that the anonymity the internet affords to suspects necessitates an aggressive approach, including stings. The FBI’s national security director told the New York Times this summer that “using undercover agents online allowed the FBI to ‘flesh out’ suspects by gaining their trust and persuading them to disclose their real identities.” In some cases, the FBI even created fake webpages in order to draw in suspects.
“Agencies are under a lot of pressure to find a needle in a haystack, something that has haunted us since the beginning of the war on terror,” said Karen Greenberg, director of the Center on National Security at Fordham Law School. “It’s true that the internet has changed everything about how we communicate, but are we just going to be trawling online forever? It turns the principles of criminal investigation on their head.””

Is gang stalking online real-can "they" actually track my machine as I surf over Tor?

The short answer is, if you have been reading this blog and missed the memo that said “YES THEY ARE TARGETING, TRACKING, GEO-LOCATING, MONITORING, INFLUENCING, and OPERATING on you, your internet connection-and the mind that is using that connectionlike mad scientists at every moment, every time you are online!!!”-then you clearly ARE CRAZY, as some have suggested about “targeted individuals.
This is what I call “feminist jurisprudence” aka “communitarian/community policing.” It cannot be missed that there is a clear ideological link between OGS complaints and elderly white females in technology, politics, the judiciary, or in policing; but especially in the transnational Octopussy that we know as the Panopticon and its attendant plots, political manipulations, and influence/mind control/compromise/blackmail schemes and covert operations.

Related Stories: The Association of Threat Assessment Professionals (ATAP) has linked itself to both gang stalking, AND political /punitive psychology.
More hilariously, the Washington State Fusion Center distributes “mind control” documents to the press, as the Department of Homeland Security renovates the famous “mind control ” facility once occupied by CIA funded doctors who forced patients to take the illicit drug LSD, and unethically tortured children and adults with debunked electro -shock “therapy “.

And worse, they are using the local police, and Fusion Centers, aka, “the domestic spying on citizens apparatus”and the Hegelian conflict oriented communitarian policing scheme to literally cause learned helplessness and fear, in order to enforce conformity, as Fusion Centers (all of which are well hidden, and all 77 have different names across the country) direct resources at “non-conformists.”
Extra points for noticing the number 77 has “mystical value” to religious fanatics, Masonic orders, and others who are invested in harassing citizens with OGS. I am certain all of the religiously deluded morons who work in Fusion Centers actually believe they are doing “gods work,” and that the number 77 means “Son of Circumcision.” Try not to laugh…but I personally like the linguisticexplanation of 77 as a “she goat.”
And while it can make a person FEEL crazy, there are actually programs targeted at EVERYONE that actually involve this form of mind control and influence operation, and that these programs are ill-equipped to decipher human behavior, and that with destructive effects . Here is just ONE example of that, as AI struggles to eradicate “human experience” in order to socially engineer ‘predictable humans’ and using ‘predictive analysis.
And here is one recent example from my own writing online from just today (it took me two days to even write the post ‘live’ in WordPress), but every day, there are thousands of examples available to even the casual observer.
In that light, it is worthy of noting that those who value civil liberty, such as our right to privacy-often overlook the greater right of liberty: the right to consent, or not consent to experiments, or other ‘mind altering’ substances and practices, that are deployed on us as weapons or as research tools. So it is important to note that Tor-the famous privacy software that was made “famous’ by Edward Snowden when he revealed to us that our governments-all five of them, in the Five Eyes Alliance, and others ranging from Israel(which gets every bit and byte of our data unfiltered) to Russia are performing their own experiments.
So-forget about DEW’s and all of that other PsyOp psychobabble, and make yourself aware of Palantir, DataminR, Media Sonar, and more that they are targeting at us, and our online speech every second, AS WE TYPE INTO OUR BROWSERS. OVER TOR….!
Here below is one example from today alone. One of many I caught before the sun met the noon sky:
The example:

  1. I look at today’s statistics about who reads this blog and what they read. I note that my most popular post references the hack of the CIA’s “hacking tools” which I posted in this blog post here. This one post quotes the Intercept, and has links to Wikileaks, where the CIA hacking tools were described as hacking American’s cell phones, and then, destroying the ‘evidence’ that they had hacked my/your/their phone.
  2. I looked around the web for stories that also document how the CIA-and some 16 other US intel agencies alone, not including the entire battalions of soldiers aand seamen and USAF who are hacking American’s at any given time- have destroyed Constitutional due process and leveraged, blackmailed, or otherwise compromised American citizens (and millions of others around the world) because they act with “plausible deniability, and then, impunity. I found this story, about a humble public defender in Washington State, where the CIA hack tools are implicated in hacking citizens.
  3. Using Tor to write this blog,(and using Tor makes one an INSTANT target by these ‘plausibly deniable’ activities by military and civilian agents, agencies, and a host of NGO’s), i read through my stats, and noted “outbound links”-the links that people clicked on my blog to read material that I have linked to OUTSIDE my blog. And, I was under attack the whole time. Here is the story I was writing ‘under attack.’ This caused a net loss of about an hour today alone.
  4. I clicked the “out-bound” link, which was to Urban Dictionary” and the link to a description of “gang stalking methods“. Here, below is a snapshot of that-and notice the advertisement for “CASA” which is a foster care warehouse operation, where state sponsored kidnappings of children are covered up as “foster care placements.” Children who are “placed” in Foster care face an 85% chance of being sexually abused, pimped, or otherwise turned into profitable commodities by these organizations and the related DVIC industries

agang stalking methods
This screen shot, which I have NOT anonymized, for a very specific reason, which I will not disclose, contains all kinds of “meta data” about the machine I am using to compose this posting and nothing more-not a single identifying bit or byte of data connects this screenshot to me, or to this blog-other than the WORDS I use to describe this situation.
As such, I seek to demonstrate that speakers, and words are the actual targets of all of this “sooper seekrit spying,” that claims it is to “protect the little old ladies and the children from rapists and pedophiles” because pedophiles might otherwise sacrifice everyone’s safety for their own liberty in order to to get at  the old ladies and babies whose Constitutional houses are on fire, and burn them to the grounds, tossing their pocket Constitutions into the fire to make it burn faster, and using the broken pieces of civil rights and human rights and even animal rights to build a ladder just to get at the old ladies and babies  even quicker as they plummet out the windows, pre-cooked and ready to rape with shovel handles and pocket Constit…oh never mind that last one(and all of those windows, and Windows 1-10, totally broken already by the “broken windows policing scheme” of the 1990’s)….
So, to recap:
Meta data is personally identifying information that police, investigators, and others who participate in the local, state, and federal level fraud outlined on this blog have been using meta data to make cases against unsuspecting victims of OGS and its accompanying mind control and influence operations. You can Google the term yourself.
But what matters most is a question that now arises in the mind of this researcher-and hopefuly inthe mind of other researchers, lawyers, legal scholars, TI’s, psychologists and others who research organized gang stalking.
And the question is: Why does CASA-an organization that I have roundly criticized over the years, and even now; an organization that has tens of millions in advertising budgets, and tha has notoriously been an integral part of the DVIC scheme-why, exactly, do they have an advertisement on that one weblink, now?
I mean-isn’t web searching and webvertisement coordinated with searches and topics-shouldn’t a ink to “gang stalking methods” have like, a deer tracking book, or a bunch of saggy pants without belts, and some “logo gear” on it; shouldn’t in the very least a link to another website that teaches te “rhythm method” be linked, there? And so, what has CASA have to do with OGS anyways?
I suggest that the answer is in the question-and webterrogation of narrative as well. Webterrogation is not unlike custodial interrogations in many ways, not east of which is that the individual being interrogated is in fact and practice, targeted, and contained, somewhere, at some point. This is not insignificant, but it is also a larger point that I will write about later (especially as pertains to ISP’s and how Infragard members-deputized members of law enforcement, and sh!tloads of political operatives and others literally redirect, re-route, and inject any “live” connection with lots of “who knows what.”)
You can test the science yourself- in fact,my blog here asks any researcher of organized gangstalking to do EXACTLY THAT-test my many theories, hypotheses, and anti-hypotheses against your own, form whatever discipline you practice.
But go over to that link about “gang stalking methods” and see what advertisement YOU get at the top of the page. I got CASA, which is a DVIC subsidiary industry, and a multi-million dollar player in the theft of children across America.
Here below are some links that demonstrates AGAIN, that state level institutions, operatives, and policing itself, is implicated time and time and time again in the pimping, procuring and pornifying of children, as well as the massive crisis PR industry that masks this fact, and gives us boogiemen/drug dealers/terrorists/pedophiles/whistle blowers/journalists/your neighbors farting cat instead ( and it cannot be missed that two of the first five links that were returned to my Tor browser were near, or local to my own location…):

CASA LA: http://casala.org/our-mission/
Sexual abuse in Foster Care: http://www.hg.org/article.asp?id=6703
Is Foster Care modern day slavery? http://medicalkidnap.com/2016/04/15/the-u-s-foster-care-system-modern-day-slavery-and-child-trafficking/

Then, without irony, one must note that Elizabeth Dietrich, one of the few online who has written a scientific thesis as regards OGS, opened her thesis with a brief statement about pornography. This, combined with another part of my thesis-that women’s deviance takes place in unique forms, but especially through positions of power, authority, and then, voyeurism-one cannot help but note that women’s violence-or in the very least, their inability to “comprehend” the violence directed at others is institutional in nature. And this is clearly the case with OGS as well (which is in no way, shape or form similar to the “Pro-Anorexia community” as Dietrich has stated.)
Elizabeth Dietrich’s paper encourages the isolation of victims of OGS. How feminist.
Maybe it’s because Smith College is known as the “Lesbian Capital of the World,” or maybe it’s because all the special snowflakes get better grades when they’re pretty, but Dietrich’s conclusion truly looks like first year work when she comes to the conclusion that

Gang Stalking is just one of the many online communities that uses people’s
conformation bias, meaning making, and wish to belong, to deleterious ends.
For my part-should I ever publish this, I will devote a special chapter to conformation bias, and conformity at the expense of critical thinking….

Related Story: Five Denver Nurses caught looking at a dead man’s amazing cock, then gossiping about it in the lunchroom. Apparently, this is a thing with nurses and other women in the medical community(let me know when you start seeing patterns in western women’s deviance, such as their Freudian “death urge” morphing into endless forever war that kills other women’s sons, lovers, husbands and other babies)
From the very introduction of Dietrichs paper, we see that male dominated spaces such as 4chan and KnowYourMeme, as well as “porn” is an underlying theme of those who officially gas light OGS targets; that, for those who have taken the time to write on the subject (this will be the topic of a later post here). What matters here is that “victims of OGS be isolated” both in Dietrichs narrative, and in that of Sheridan and James, and as such, we see that the two-exactly two papers that addresses the topic-are written by gender feminists, which is telling indeed.
Then, we see emergent norm theory and the interplay of feminist destruction of so-called male dominated spaces throughout her paper, which concludes as I stated above-that victims of OGS should be isolated and ex-communicated from the internet.

CHAPTER I
Introduction
A tautological statement has been growing in popularity among pithy internet-savvy
populations over the last ten years or so: If you ever wonder if it’s on the Internet, it’s on the Internet. Anonymous contributors to websites such as 4Chanand Know Your Meme expanded this idea into a list of 50 Rules of the Internet that include items such as “The Internet has no rules,”and “there is a porn of it, no exceptions.”The root of the joke is derived from a very basic fact: Internet content, for all intents and purposes, is virtually endless. Almost any honest query one enters into a search engine will invariably yield results, usually hundreds of thousands in an impressive .33 seconds, more or less a couple hundredths-of-a-second, depending on what kind
of modem you have. Social connectivity over the Internet is powerful.

.

Organized gang stalking and FBI informants, rats, snitches, and Uncle Tom's: many in the OGS dialectic are actually informants

Below is a Public Service Message:

If you see something, say something. Ratting on others for things real and imagined is as American as apple pie, lemonade stands, and domestic terrorism waged from within government and institutions of status quo power.
Also, if you have a petty vendetta, disagree with your neighbors politics, or saw something bad when you were looking into their windows from underneath their window ledge, report it immediately to someone who will send a squad car over there! We gotta pull together and STOP THE BADGUYS at their windowsills (or, Windows 10), before they come across OUR FENCE and peek into OUR HOMES from underneath OUR WINDOWSILLS!

Scoop by Memphis Commercial Appeal reveals that iconic Martin Luther King photographer Ernest Withers was an FBI informant-a RATand that he ratted on King directly to the FBI the day before King was assassinated in Memphis

“D’Army Bailey, a retired Memphis judge and former activist once watched by the FBI, told the paper that such covert tactics are “something you would expect in the most ruthless, totalitarian regimes.”
The Commercial Appeal found FBI reports indicating that Withers collaborated for years with FBI agents monitoring the civil rights movement. Those FBI reports, the paper’s Marc Perrusquia writes, “reveal a covert, previously unknown side of the beloved photographer.”
Digging into the late Withers’ past wasn’t easy. The Commercial Appeal’s scoop proved to be the result of shoe-leather reporting, determination and a bit of luck.
The newspaper tried unsuccessfully to obtain Withers’ informant file, with the Justice Department rejecting Freedom of Information Act requests and refusing to acknowledge that such a file even exists. However, as  Perrusquia writes, the government did release “369 pages related to a 1970s public corruption probe that targeted Withers — by then a state employee who was taking payoffs — carefully redacting references to informants — with one notable exception.”
And in those documents, the Commercial Appeal notes, the government inadvertently left a single reference to Withers’ informant number, which “unlocked the secret of the photographer’s 1960s political spying when the newspaper located repeated references to the number in other FBI reports released under FOIA 30 years ago.”
Follow this linkthis link to read more!
Iconic photos by Withers here

 
Related story: How Ernest Withers was an FBI rat, and likely aided in the murder of Martin Luther King and other civil rights activists: https://www.yahoo.com/news/blogs/upshot/famed-civil-rights-photographer-doubled-fbi-informant.html
So, apparently, kids,  the path to power and glory is paved with privacy rape, deception, and the corpses of those who dissent, or who are activists against the establishment order. This blog advises you to rat someone out immediately, even if you have to make it up!
Or: How to become President in One Easy Step! The odd case of Ronald Reagan, backstabbing rat:
Fed Up: The FBI’s Harassment and Spying on 1960s Students Revealed in ‘Subversives’ by Seth Rosenfeld

A new book filled with newly released FBI documents paints a damning portrait of the feds spying on, harassing, and denouncing largely innocent Berkeley students in the 1960s—with Ronald Reagan as a star FBI instigator and informant. Michael Kazin on Seth Rosenfeld’s Subversives.
How to become President in one easy step: become an FBI informant like Ronald Reagan
…every biography of Ronald Reagan describes how, in 1966, his repeated denunciations of “the mess at Berkeley” helped him claim the governorship of California in a landslide—and immediately won the hearts and minds of conservatives everywhere who saw the charismatic actor as their best chance to capture the White House….
In the crusade against troublemakers at Berkeley and their supposed codependents, Hoover could always count on the zealous assistance, both covert and public, of a number of national celebrities and local politicians. The most significant of these, Rosenfeld shows, was none other than Ronald Wilson Reagan. Reagan’s close relationship with the FBI began early in the Cold War, when he exchanged “information” about pro-Communist actors, screenwriters, and union officials with agents who stopped by his home in the Hollywood hills.
For the next three decades and more, Reagan became, according to Rosenfeld, “one of the FBI’s best contacts ever.” He routinely passed along to the Bureau rumors about Communists in the film industry and frequently lauded the agency in speeches, press interviews, and on television. So appreciative was Hoover that, in 1965, he stopped his agents from questioning Reagan about his son Michael’s close and rowdy friendship with the son of a top Mafia chieftain, Joseph “Joe Bananas” Bonanno. Instead, the FBI boss ordered his men, as Rosenfeld puts it, “to confidentially warn the father about Michael’s ‘dangerous dalliance.’” Reagan, then considering a gubernatorial campaign, responded with gratitude and relief. A high-ranking G-man reported that “he [Reagan] realized that such an association and actions on the part of his son might well jeopardize any political aspirations he might have.”
Once he took office in Sacramento, Reagan worked diligently in tandem with the Bureau to drive the scourge of radicalism from the premier campus of the state university, and to buff his own image as a defender of Middle American resentments.

 
The past is the present is the future is the mantra of the establishment bullies. More on how the NSA/FBI/CIA domestic data theft pipeline destroys democracy, one conversation, one illegal wiretap, one trumped up dossier- one activist at a a time here.

Organized gang stalking, Scott Crow, disinformation and informants.

Scott Crow, an anarchist, animal rights activist, has gone on record stating that organized “gang stalking is bullshit,”which is alright- because everyone is entitled to an opinion. And as they say, even assholes have those. Opinions, of course. And, I guess for some, it’s easier to love fuzzy or feathered critters and act like cute, four year old anarchists with lil’ diapies full of doodoo, than to deal with the real issues of gross human rights abuses of corporatism colluding with a full blown surveillance/security state to do things to people that were unimagined at the height of America’s last Constitutional crisis of the 1960’s (click here to see the catalogue of surveillance gear available to LEO’s who spy on American citizens without warrants).
But to the hundreds of thousands of people world wide who claim to be harassed by unknown assailants, various electronics ranging from wiretaps and StingRay towers, cell phone emulation, and sound weapons (what’s that clicking on my phone?!), and stalkers- lots of stalkers who do plainly weird shit called street theater- the evidence is against Mr. Crow’s opinion.
There is ample evidence of religions and cults that stalk people; evidence that the intelligence agencies and some really bad  LEO’s stalk people; retired LEO’s stalk people, the USAF and Naval NCIS working with the CIA and others stalk people; a HUGE well heeled operation of conformity enforcement run by the OSI and there is sh!tloads of evidence that it is part of a large, orchestrated crisis PR movement. And of course, every crisis PR movement needs useful idiots, who are just glad the pendulum missed their neck.
Scott Crow.org, on gang stalking:

In the last couple of years I became aware that I have accidentally become the poster child for a marginal, but rising movement.   It’s a movement of the disaffected, and somewhat marginalized in civil society. And like all of us its made of those alienated by the ills of capitalism: our atomized communities,  the overwhelming media (online and corporate) that can reverberate any idea into truth and the growing overwhelming complexities of our social and political spheres.  There is also another important piece that I have to throw into this cauldron that has given rise to this movement too; the farce called the war on terror and its all ensuing baggage of the surveillance state. Sounds intriguing doesn’t it? If you guessed I was talking about anarchy, social justice or even LOLcats you would have guessed wrong.  What I am referring to is an internet phenomena called gangstalking and somehow my surveillance by the FBI and Joint Terrorism Task Force for almost 9 years became the actual proof they all needed to say they were right all along; that they weren’t just paranoid.  Except I wasn’t gangstalked.

Related Story: The famous Civil Rights photographer Ernest Withers-who photographed ALL of the black leaders of the 1960’s, was a paid RAT. Bonus points if you can answer the question: And WHY was this guy at the hotel where Martin Luther King was shot dead?
SO- make of Scott Crow’s opinion what you will, But psychologists and other paid disinformation agents who both benefit directly from drug companies and privatized prison payrolls, and those who work with schizophrenics and sex offenders have even waged a classic “black propaganda” campaign to discredit those who claim they are harassed.
I DUNNO. MEBBE They is all caaaaraaaazy. Or not.
Either way? Any scientist, sociologist, intel agent, or crisis PR moron can take the data provided in this blog and test the many proofs and hypotheses themselves, against historical events like COINTELPRO, and the destruction/co-option of the peace/anti-war/Civil rights movement. You can look for- and find- the evidence that I provide herein-and replicate the methods, and find new validation yourself. I have merely provided a starting point.
But it boils down to this: people like Scott Crow, who was followed, surveilled and harassed by the FBI in what amounts to a fairly traditional investigation of a fairly pasty white traditional ‘suspect’ claims OGS is “total bullshit.” I mean-after all- animal rights people are startlingly quiet about warrantless surveillance, human rights, prison reform, and how the targeted, flawed and sociopathic Countering Violent Extremism programs work with local LEO’s and private security contractors to terrorize TI’s into complicity with snitch culture.
You don’t have to believe me- ask an actual RAT, Greg Monteilh, former FBI informant, about the “murky” practice of “flipping” innocent people into becoming agency informants-from the Guardian UK:

The ex-FBI informant with a change of heart: ‘There is no real hunt. It’s fixed’-Craig Monteilh describes how he pretended to be a radical Muslim in order to root out potential threats, shining a light on some of the bureau’s more ethically murky practices….(follow the link to learn more).

Just off the top of my internet, I can think of these many many validated tactics below that are reported by TI’s. And these days, as the NSA shares data with 16 other intel agencies and targets American citizens, it ain’t gettin’ any prettier out there without due process (even if Mr. Crow thinks it’s all bullshit, some of us still believe in Constitutional Democracy. And Mr. Crow and his pals- most of them animals- don’t read the Constitution anyways.).
A short list of what the NSA et al is doing to American citizens BEFORE they turn the data over to the local LEO’s-from Brian Lehrer-and ask yourself how YOU would feel with this arsenal pointed at YOU, personally:
THE NSA CAN:

  •  track the numbers of both parties on a phone call, as well location, time and duration. (More)
  • It can hack Chinese phones and text messages. (More)
  • It can set up fake internet cafes. (More)
  • It can spy on foreign leaders’ cell phones. (More)
  • It can tap underwater fiber-optic cables. (Clarification: Shane Harris explains that there were reports the NSA was trying to tap directly into cables using submarines, but is now more likely trying to intercept information once it has reached land.) (More)
  • It can track communication within media organizations like Al Jazeera. (More)
  • It can hack into the UN video conferencing system. (More)
  • It can track bank transactions. (More)
  • It can monitor text messages. (More)
  • It can access your email, chat, and web browsing history. (More)
  • It can map your social networks. (More)
  • It can access your smartphone app data. (More)
  • It is trying to get into secret networks like Tor, diverting users to less secure channels. (More)
  • It can go undercover within embassies to have closer access to foreign networks. (More)
  • It can set up listening posts on the roofs of buildings to monitor communications in a city. (More)
  • It can set up a fake LinkedIn. (More)
  • It can track the reservations at upscale hotels. (More)
  • It can intercept the talking points for Ban Ki-moon’s meeting with Obama. (More)
  • It can crack cellphone encryption codes. (More)
  • It can hack computers that aren’t connected to the internet using radio waves. (Update: Clarification — the NSA can access offline computers through radio waves on which it has already installed hidden devices.) (More)
  • It can intercept phone calls by setting up fake base stations. (More)
  • It can remotely access a computer by setting up a fake wireless connection. (More)
  • It can install fake SIM cards to then control a cell phone. (More)
  • It can fake a USB thumb drive that’s actually a monitoring device. (More)
  • It can crack all types of sophisticated computer encryption. (Update: It is trying to build this capability.) (More)
  • It can go into online games and monitor communication. (More)
  • It can intercept communications between aircraft and airports. (More)
  • (Update 1/18) It can physically intercept deliveries, open packages, and make changes to devices. (More) (h/t)
  • (Update 1/18) It can tap into the links between Google and Yahoo data centers to collect email and other data. (More) (h/t)
  • (Update 4/2) It can monitor, in real-time, Youtube views and Facebook “Likes.” (More)
  • (Update 4/2) It can monitor online behavior through free Wi-Fi at Canadian airports. (More)
  • (Update 4/2) It can shut down chat rooms used by Anonymous and identify Anonymous members. (More)
  • (Update 4/2) It can use real-time data to help identify and locate targets for US drone strikes. (More)
  • (Update 4/2) It can collect the IP addresses of visitors to the Wikileaks website. (More)
  • (Update 4/2) It can spy on US law firms representing foreign countries in trade negotiations. (More)
  • (Update 4/2) It can post false information on the Internet in order to hurt the reputation of targets. (More)
  • (Update 4/2) It can intercept and store webcam images. (More)
  • (Update 4/2) It can record phone calls and replay them up to a month later. (More)
  • (Update 6/2) It can harvest images from emails, texts, videoconferencing and more and feed it into facial recognition software. (More)

Did we miss any? Mischaracterize any capabilities? Let us know in the comments, or tweet @brianlehrer.
Suuure. It’s all bullshit- yeah, that sounds about right. Yup-keep your head up your ass, play it safe, m’boy. “They” are prolly all crazy- no electronics involved at all. Nothing to see here move along now….
 

Organized gang stalking and fire departments

Organized gang stalking and fire departments
harriscountygangstalking.targeted.one_
In a story covered on ABC’s 20/20,and now, by Courthouse news service,  we have a glimpse of organized stalking of a family by firefighters, police, their relatives, and others who waged an organized horn honking harassment campaign for ten years against one person, who is now suing them.
This organized campaign of harassment included many of the known tactics and actions of gang stalking, including slander, trash thrown on the victims lawn, and eventually, multiple restraining orders against gang stalkers, and even the eventual criminal plea of a firefighter/gang stalker named Dick Wittenkugel.
Hey, gang stalkers: DONT BE A DICKWITT!
Organized Gang Stalking Case Study: Rick and Lucinda Krlich, Ohio
Meet Rick Krlich and his wife Cindy, who have endured a horn honking campaign in Hubbard, Ohio for ten years and counting. He writes about his experience of ongoing harassment on his website “Small Town Terrorism,” the Rick and Cindy Krlich story. Or-who do you call when it is public servants acting in an organized fashion, breaking the law, with help and encouragement from police to firemen to the city legal council?

The presence of numerous public employees among those assaulting the silence around Rick Krlich’s neighborhood isn’t the only questionable behavior in this strange saga. The response of the city’s former Law Director and now sitting judge Jeff Adler creates doubt as to the administration of justice in Hubbard.
Not only did the former Law Director fail to process/prosecute many of the cases against horn blowers, he actually represented one offender, and withdrew from initial agreement to represent more, in appearances before a Trumbull County magistrate.
So ask yourself: He’s supposed to represent the city of Hubbard. The city has an ordinance against horn blowing except to ‘give warning’ to other drivers and pedestrians. Yet he goes into court with people that have been caught on surveillance cameras, and he defends them from being held accountable for violating the city’s law.

[youtube https://www.youtube.com/watch?v=vFY72C0C-Jg&w=249&h=187]
Many incidents of organized stalking mention that fire departments are part of the harassment, and that they use the trucks as ominous reminders to targeted individuals that they cannot escape the harassment.
The main difference between most of these claims and the claims of Rick Krlich is that OGS usually targets low status individuals who have little or no resources with which to fight back or even defend their basic due process rights  or the right to the pursuit of happiness.
But Krlich is now suing, and it is likely he will win, because he had enough money and other resources to film, photograph, and record his stalkers, who at one point drove by his house and honked their horns 100 times per day.

o

Noises in the night…

[youtube https://www.youtube.com/watch?v=vFY72C0C-Jg?controls=0&modestbranding=1&rel=0&showinfo=0]

What you will see here, Dear Reader, is a chronicle of spite.
Undeserved, uninterrupted, unyielding spite, triggered by one man’s belief that he could rely on the legal system to guide him through a simple real estate transaction.
What Garrick Krlich got, instead, was intimidation, frustration — and spite.
Krlich is a small contractor who lives unostentatiously in Hubbard, Ohio’s East Hill neighborhood. Over the years, he has managed to acquire surrounding properties, older homes like his that he turns into well maintained rental properties. He makes a decent living, isn’t greedy for more, and has been, overall, quite contented with his life.
Until the Clemente house next door became empty.
Until the noises in the night began. For more than four years now, the raucous sound of horns blowing has shattered the quiet of the night in the Krlich’s neighborhood, disturbing not only Krlich and his wife, Lucinda, but surrounding residents as well. The Krlichs lie awake, listening … waiting … and then come the sounds of the roaring engines, the screeching tires — and the horns. Horns that seem to be screaming “Go away! Leave! Never come back!”

ROGS Homework assignment: Google through this case, and see if you can identify the partisan/tribal/sectarian affiliations of the city attorney/ judge who crapped all over this case.