I write about the social phenomenon called "gang stalking. All cases and claims of gang stalking are traceable to current and former police, military, intelligence, security contractors, and their related flying monkeys, targeting citizens. Scientific evidence based "proof" of gang stalking, and gang stalking lawsuits for journalists, psychologists, and criminal defense attorneys to sort the "electronic"psychobabble from the facts.
The San Diego Police Department identified the woman Sunday as Anna Conkey, a 31-year-old former intern and freelance digital producer for NBC 7. Conkey is also an SDSU graduate and was in the U.S Navy.
[this is a draft post in progress ]
Dear future attorney /public defender of Anna Conkey, an Asian American journalist who worked for San Diego News 7, as well as the – your client had an epiphany: that organized religion, and the christian Bible is totally full of shit.
I ask that you lend me your ear, and let me help you vindicate your client, using ROGS predictive analysis, which has been batting nearly 100% since Asian American attorney Mathew Riehl was framed as a cop murderer after being gang stalked for many years by neocon elements in academia, the military, crisis PR elements in MSM, and policing.
Your client, carrying her baby, and a handgun, went to her church on Easter to proclaim her newfound wisdom, where she was then accosted and framed as a threat, rather than as an individual in a defensive posture, being accosted by “believers, ” aka gang stalkers, who then twisted the narrative, which ran in the media.
And this is a case study in EVERYTHING THAT I HAVE WRITTEN ABOUT PREVIOUSLY. It is a ROGS BINGO.
Anna is a writer, editor and freelance journalist. She has worked for NBC 7 San Diego as a digital media producer, and at KPBS as an assistant news producer. She has also contributed to the military editorial section of The San Diego Union Tribune, and was the leading web editor of the literary journal Oracle Reviews.
Anna has a background in mass communication tracing back to 2007, where she spent six years doing public affairs, photojournalism, editing, publishing, graphic design and web design for the U.S Navy.
In 2017 Anna graduated with honors from San Diego State University with a double major in journalism and English. In her free time she was involved with the Student Veteran Organization and Society of Professional Journalists, SDSU chapter.
She is currently the mentorship chair for the Asian-American Journalist Association, San Diego chapter. She is also involved with the Veteran Alumni Organization, Society of Professional Journalists, and is a member of the Phi Beta Kappa, Kappa Tau Alpha, Golden Key and Scholars Without Borders national and international honor societies.
Anna is a military spouse and mother of two. She enjoys exploring new places during hiking and camping adventures, reading inspirational novels, writing poetry, and following rabbit trails on her quest for knowledge. She is working on a book to help spread awareness of sex trafficking, and her research on sex trafficking was presented at the SDSU 2017 student research symposium.
Anna Conkey Picbon account @a2zconkey where she posts pictures and rambles on about religious, Biblical crap
Notorious military /police affiliated Godlike Productions conspiracy theory blog [this site has a “terms and conditions ”wall ]talking about Anna Conkey
Everyone hopes the Department of Justice’s inspector general (IG) will fairly investigate surveillance activities conducted on U.S. citizens by the FBI and intel agencies. Just like we hope the IG’s office will reach fair conclusions in its probes of alleged FBI misconduct concerning the Hillary Clinton investigation, leaks to the media and conflicts of interest.
But, for me, there’s reason to be wary.
I turned to the IG’s office in 2013 after independent forensics proved my computers had been infiltrated by remote intruders using software proprietary to a federal intel agency. Instead of fair findings, I got a lot of mischief and stonewalling.
And wait until you hear what I recently learned.
By way of background, in 2013, I filed a complaint with the IG’s office asking it to investigate the government-based computer surveillance. CBS News — where I worked at the time — would not allow the IG to examine my CBS laptop, which had been infiltrated (as CBS publicly announced on Aug. 7, 2013). But I asked the IG to examine one of my personal home computers that was also compromised.
Some of my intel sources didn’t want me to hand over any computer. “You can’t trust the inspector general,” they told me.
But I figured there was little downside. We already had our irrefutable forensics findings from our examinations. If the IG probe was competent and honest, as I expected it might be, then it could turn up names of the government actors responsible. If not, no harm done.
I don’t blame the IG computer investigators for what ultimately went wrong. They got briefed up on Apple forensics for their inspection of my computer, visited my house on numerous occasions, communicated freely, shared findings along the way and seemed to earnestly do a thorough job.
But as the investigation neared a conclusion, things changed.
On their last visit to my house, they wanted to be sure to segregate the malicious activity they identified from any work I might have done on the computer. They told me someone operated the computer in advanced mode, something I don’t know how to do. They found that — like the CBS laptop — the intruders had repeatedly altered the computer’s internal system times and dates. And they discovered that — like the CBS laptop — key files had been destroyed. (We already knew these things and more from our own exams.) We went through pages of their notes together. I asked for copies.
“You can get those later,” the lead investigator assured me. “When the investigation is finished.”
If there’s one thing I’ve learned, it’s that you can’t count on getting something from the government tomorrow. I made contemporaneous notes of the visit and findings.
The weirdest part of the visit was that, for the first time, the IG investigators began insisting the intruders weren’t working remotely but were in my house, sitting at my computer, doing these things. They had dates and times. I told them that was impossible; nobody was sitting at my computer upstairs in my home for hours while my husband was home on those days, at those times. Besides, we already knew from our own forensics that the intruders had operated remotely. My forensics team said the IG experts were not fully competent on their Apple work and, for some reason, seemed to be misreading the remote intrusions as local intrusions. Still, if nothing else, the IG work provided additional confirmation of some of our more basic forensics. No harm done.
Not long after that, my communications with the IG’s office changed. They notified me that their investigation had been “narrowed,” from looking into an illegal intrusion to determining only if there had been a remote intrusion. Nobody would explain to me who narrowed the scope of the probe or why. You’d think they’d be interested in any intrusion, remote or otherwise. Why the distinction?
In the next few weeks, when I learned the IG had finished its investigation into my Apple computer, I asked for my copy of the report. The investigators told me they’d been ordered to send it to the office of IG general counsel Bill Blier for approval.
Over the coming weeks, I repeatedly asked for the findings but was told it was still in the IG general counsel’s office. I formally requested that the general counsel release a copy to me. No luck.
One investigator had told me I could always file a Freedom of Information Act request to obtain my report and notes. I did so; under the law, a response was due within about 30 days. It’s been years.
When the DOJ’s inspector general won’t follow the law, to where can a citizen turn?
Meantime, under pressure from Congress, the IG eventually released what my attorney refers to as a “wiped” summary — not the actual report or notes — with spin that implied there had been no intrusion. This was quickly presented, publicly, by then-Sen. Al Franken (D-Minn.), who had gotten a copy of the summary with lightning speed; and it was dutifully reported by some in an unquestioning press.
The IG’s obfuscation and stonewalling doesn’t adversely impact my lawsuit against the federal government for the computer intrusions. The case is progressing through court with evidence from multiple forensics exams.
As our lawsuit continues, so do our forensics. New computer investigative tools have become available, and grains of evidence have been solidified into forensic mountains. Our evidence involves multiple computers and government I.P. addresses discovered improperly residing in them.
That brings us to the news.
Not long ago, my forensics team asked if I used that Apple computer after the IG returned it. My team was conducting a new exam. “No,” I replied, “it hasn’t functioned since before I gave it to the IG. I just stored it when they returned it. Why?”
“Because — that’s not your hard drive inside the computer they gave back to you,” they told me. “… We know the serial number on the hard drive when you bought it. We recorded the same serial number on our earlier forensics exams. This is a different hard drive. Completely different serial number. Not even close.”
I would never have known if we hadn’t gone back in that computer for additional forensics.
In addition to somebody changing the scope of the IG investigation midstream, and the office withholding from me the notes and the report on my own complaint, somebody also switched out my hard drive before the IG returned it to me.
What does all this mean to the integrity of the DOJ’s inspector general?
Sharyl Attkisson is an Emmy Award-winning investigative journalist, author of The New York Times bestsellers “The Smear” and “Stonewalled,” and host of Sinclair’s Sunday TV program “Full Measure.” Follow her on Twitter @SharylAttkisson.
More and more, we see reporters are targets of the “Fourteen Eyed Monster,” aka the NSA warrantless hacking, redirection, and targeting scheme.And, keep the CIA plausible deniability that I write aout all over ROGS here in mind as you read this case study of computer hacking, redirection, an monitoring of a targeted individual, CBS news reporter Sharyl Attkisson, and American citizen.
And-remember: one of the main threats of “gang stalkers” is that they will force a “target” to go broke suing them.
forensic work of my computer laptop system has revealed a second government Internet Protocol (IP) address used in the illegal cyber-attacks on my computer laptop system
Related Story: How 5-9-or-14 nations are spying on youat any given time, aka the UKUSA (rhymes with Yakuza). Or, “what is a state sponsored shell game, 101.”
a game involving sleight of hand, in which three inverted cups or nutshells are moved about, and contestants must spot which is the one with a pea or other object underneath.
a deceptive and evasive action or ploy, especially a political one.
plural noun: shell games
“officials played a shell game by loading prisoners onto buses during population counts at the jail”
or “What is NSA-14 Other Nations Spying” for the win.
From SharylAttkisson.com: It “is not a mistake; it is not a random event; and it is not technically possible for these IP addresses to simply appear on her computer systems without activity by someone using them as part of the cyber-attack.” –David Scantling, cyber-security expert.
I’m frequently asked about the status of my lawsuit against the U.S. Department of Justice over the secret, unlawful intrusions into my computers, exposed in 2013. As my federal case moves slowly through court system, there is a new development: ongoing forensic work of my computer laptop system has revealed a second government Internet Protocol (IP) address used in the illegal cyber-attacks on my computer laptop system.
The IP addresses don’t belong there.
In a new affidavit filed in federal court last week, cyber-security expert David Scantling states, “[T]he presence of these USPS addresses on [Attkisson’s] computer is not a mistake; it is not a random event; and it is not technically possible for these IP addresses to simply appear on her computer systems without activity by someone using them as part of the cyber-attack.”
Scantling served as a contractor for the National Security Agency (NSA), the Central Intelligence Agency (CIA), and as a Department of Defense (DoD) civilian employee. He’s familiar with “Advanced Persistent Threat” (“APT”) cyber-attacks. In fact, he developed and deployed similar APT cyber-attacks against foreign government, commercial, insurgent and terrorist targets. He also developed and deployed cyber-security countermeasures in the private sector to defend against such attacks.
Interestingly, both government IP addresses found embedded deep in my computer system trace to the U.S. Postal Service (U.S.P.S.), which has been known to cooperate with intelligence agencies on various levels. The U.S.P.S. refused to cooperate with me, prior to my lawsuit, after my forensics expert recovered evidence of an IP address mysteriously residing in my computer. At the time, an agency official dismissed the forensics evidence as some sort of unexplainable mistake, and refused to help us learn how its IP addresses are maintained and accessed so we could identify the perpetrators.
Tracing the evidence of the government-related intrusion to individual participants hasn’t been easy. The attackers attempted to erase their tracks once they were discovered. And neither the U.S.P.S. nor the Department of Justice (DOJ) are voluntarily cooperating. But experts familiar with the tools and tradecraft that are proprietary to government intelligence agencies have painstakingly recovered and pieced together compelling forensic proof as to attribution.
“There can be no reasonable question that an [Advanced Persistent Threat]-style cyber-attack was carried on Attkisson’s computer systems and Internet connection,” stated Scantling in an affidavit filed last week. “Specifically, the APT methods deployed against [Attkisson’s] computers and Internet connection…were sophisticated and of the type only available to government-type activities and operations.”
This latest information builds upon earlier forensic examinations already conducted by: a confidential government-linked source, an independent forensics specialist hired by CBS, and a forensics expert consulting on my lawsuit.
The facts at hand are at odds with widespread attempts to establish public counter-narratives, resulting in reckless reporting in the past that wrongly implied the Department of Justice Inspector General (IG) had rejected any notion of an intrusion into my computer(s). In fact, the IG never even reviewed the primary computer in question—a CBS laptop—because CBS News would not permit it. I had asked the IG to examine my personal computer, in which two independent forensics examiners had also identified evidence of intrusions. The IG investigators found and described to me significant suspicious anomalies in that system much like the CBS laptop, unearthing similar efforts by someone to erase data and evidence. However, when the IG computer experts finished their review, the findings went to higher ups and the resulting report was inexplicably withheld from me in its entirety.
I was shut out.
Many months later, under pressure from Congress, the IG eventually released a very different-sounding summary of its forensics report to the press. It recast or excluded much of what the investigators had told me they’d found. I attempted to obtain the full report and original notes, some of which I reviewed while the investigation was underway, describing the suspicious activity found on my personal computer. However, the IG has stonewalled my Freedom of Information (FOI) requests for these documents for several years. If the Department of Justice won’t comply with FOI law, then what recourse does a citizen have?
Meantime, instead of helping us get at the facts, the Department of Justice (DOJ) has attempted to block the federal lawsuit at every turn. For example, their lawyers improperly ignored our first notice asking that the appropriate U.S. Postal Service employee(s) appear to give testimony for discovery. The DOJ lawyers didn’t even go through the appropriate legal processes to oppose discovery; they literally ignored the motion entirely. If the nation’s top law enforcement body doesn’t follow the rule of law, what recourse does a citizen have?
If the Department of Justice wishes to establish that it had nothing to do with the forensically verified intrusions into my computers, it should help us get to the bottom of who did — instead of obstructing the effort. Above all, in the interest of justice, the Justice Department should want to identify who would have spied on a national journalist reporting on a number of international news stories impacting political officials. To me, there are few more chilling scenarios from the standpoint of constitutional press freedoms and protections in our society.
Deep gratitude to the honest patriots who have been sources for my case because they believe the government attack on a member of the free press is so egregious. (As the case progresses, it’s better to be on the side of the law than exposed as someone who knew but kept silent. Government whistleblowers will receive legal protection.) Contact for Whistleblowers, and for more information: Attorney Tab Turner 501-791-2277 Announcement of lawsuit Recent pleading in case denying DOJ motion to dismiss the lawsuit
Sharyl Attkisson is a five-time Emmy award winning investigative correspondent and recipient of the Edward R. Murrow award for investigative reporting. She hosts the Sinclair weekly Sunday TV program: Full Measure, and is author of two New York Times bestsellers, including the new book: “The Smear: How Shady Political Operatives and Fake News Control What You See, What You Think and How You Vote.”
Webs of associations, connections, presidents and naming names- even some torture. All of that is in a single quote from “Six Degrees of Separation: by John Guare, voicing his observation from the mouth of his character Ouisa Kitteridge:
I read somewhere that everybody on this planet is separated by only six other people. Six degrees of separation between us and everyone else on this planet. The President of the United States, a gondolier in Venice, just fill in the names. I find it extremely comforting that we’re so close. I also find it like Chinese water torture, that we’re so close because you have to find the right six people to make the right connection… -Ouisa Kitteridge in “Six Degrees of Separation”
In my formative years, I watched the movie”Six Degrees of Separation” starring Will Smith, and based on the book by Guare, and have found that, in these privacy and due process raping times, our “associations” are under attack; that the NSA, DHS, FBI, Fusion Centers, and local police have literally stolen our choices of primary “rights of assembly; and association,” by data-warehousing our entire webs of relationships in the huge data bases that I chronicle here at ROGS. And they have done it for over two decades. This is what is meant by “soft force eugenics” in the online gang stalking community, and it works like this. So, what is a “disruption” campaign and how does it affect targeted individuals?
Six Degrees of Separation had, for me, a personal connection, though our “six degrees” is no longer six: it is TWO DEGREES of separation, as the Five Eyes Nations and the NSA-FiveEyes-Israel data theft pipeline have stolen all of our information, and use it to monitor, manipulate, and “disrupt” our relationships, as we are now all connected by a single mouse click at the NSA, or GCHQ, or any of the hundreds and thousands of other “good guys monitoring human relationships” centers across the west. As Edward Snowden said- this is not merely about spying: ‘this is about intellectual property theft,’ and then guilt by association-or vindication by it.
Six Degrees also notably highlights the late era feminism of white females attempting to ’empathize’ with black men, which they simply cannot, being as they are on one hand, the un-empathetic Bernaysian mouthpieces of organized globalism, and on the other, the mistresses of the police state itself, which Guare note’s thus in an exchange between the protagonist Paul, and the white Ouisa:
Ouisa Kittredge: There is so much you don’t know. You are so smart and so stupid. Paul: I’ll be treated with care if you take me to the police. If they don’t know you’re special, they kill you. Ouisa Kittredge: Oh, I don’t think they kill you. Paul: Mrs. Louisa Kittredge, I am black. Ouisa Kittredge: I will deliver you to them with kindness and affection.
I have never been awed by status or power, nor intimidated by it, which for some, poses a problem. And, those “some, I have described elsewhere on this blog as “cowards,” and especially as RATS, nibbling away at the bottom most planks of Constitutional Democracy, and nibbling away at the bottom of the bottomless DVIC slop-trough. And as such, I have come to realize how the Pharisee’s and the scumbags alike all HATE words. And, mine, specifically and especially.
But fame and power interested me slightly in my formative years, for several reasons, not least of which is that when I was kid, I spent a lot of time on Hollywood Blvd, in Hollywood, CA, where Smith used to hang out as well, during his pre- “Fresh Prince of Bel Aire” days.
Generally, he caused quite a stir when he would roll up to Tommy’s, in his late model Benz ( I actually cannot remember what his car was, but I recall that he preferred late model Benzies or something similar) or otherwise show up at a club venue with a gorgeous ingenue strapped to his arm. Those who hung out, or lived on The Blvd-those ranged from teen runaways, to hookers and dope dealers, or punk rockers who squatted on abandoned properties up on Mount Olympus- would stir like bees, and in minutes, everyone knew that Smith was around. He was an “up and coming star” then, and everyone wanted to touch fame, and hope it rubbed off. Except me. I was saving up to pay my way through college when I met a “mind controlled”system child named “Piper.“
I personally was never star struck in any way, and have the unique ability to see people as people, regardless of stature. And I always somehow had a focus on the fact that fame is illusory, and that it can get in the way of other things that are more important. And in Hollywood, in that era, a lot was plainly “not right,” but also, not necessarily wrong either; that things were as they have been for millenia; and even moreso, that I was called to write, which is a tenuous fate for anyone facing “the way tings really are.”
Many years later, as a budding journalist, I tried to “make a difference,” by writing stories that defied “narrative” and that defied those who abuse power, and sought the gritty “facts” instead-and was soundly abused because of it by those that I write about herein and more, all of whom had their own designs on what I could or should do, what I could or should write.
SO when the researcher asks the question “who are targeted individuals?” Who gets gang stalked?” and so on, a simple answer would be that those who defy the lockup on narrative are primary targets, because narrative is the guiding force of corruption; and corruption is profitable; and the truth? Well….you can’t handle the truth.
But the truth is, in a society where Jewish-christians and then, al of their many sects and cults have a lockup on narrative, and where the mouth-piece of choice is the white female and her “others,” who literally CREATE boogiemen like evil Golem’s-those of us who see it another way are plainly dangerous to their old myths and lies, and cover-ups of atrocity after atrocity with their pseudo-morality, called “religion,” which many of our societies most astute have observed is a form of mental illness-but because so many suffer from it, it is the “norm” not the exception.
And so, the irony of me scrabbling around at the feet of Hollywood then was less than ironic, because I couldn’t give a rat’s ass about fame, or power; but “they” did, all of them. Sherman, the script writer, living in his cat-shit littered apartment, and cranking out pulpy manuscripts and cat-pawed screenplays; Henry Rollins playing here or there, the Sick Green Hearts and their heroin addiction (as I recall they were usually too sick to get out of bed and play), and Bukowski’s bungalow blocks away-none of it meant “doodley squat” to me, then or now, as I simply couldn’t write an “ending” to any story I ever attempted- there are just too many new beginnings that the end is plainly outgunned.
Anyways- years later, as a budding college journalist ( I studied journalism because the paragraphs were moronically simple, and most American’s are adept at moronically simple), who worked in a little college news office, at a college that, it turns out, was and still is one of the FBI’s “Somali/immigrant informant recruiting” centers, I once interviewed Lynne Stewart, who passed away in March of this year, 2017.
Stewart was labeled “the Terrorists Lawyer,” by the Bush Administration, because she had the odd trait of being able to represent clients according to the law-every ugly and precious bit of it, and to protect her clients, and to protect due process, and civil liberty zealously, with vigor, and regardless of their politics, or the political climate in which she practiced law. And in a social climate where practicing law and defending clients is demonized by the police, and their racist enablers, even lawyers ‘get no respect.’ especially those who stand for the CONSTITUTION.
But American cops no longer stand for the constitution, and have nearly al never even read it, because they themselves are little more than the paid armies of AIPAC and its enablers.
Cops who hate America give policing a bad name. Here is a “police opinion” of Lynne Stewart, from Michelle Malkin, who has likely chowed down a few sloppy cops dogs in her time. So many in fact that it is surprising that she can even speak freely:
Well, sue, Stewart represented radical leftists, gangster’s and mass murderers, and non-Jewish Nazi’s alike; she represented “the Blind Sheik,” Omar Abdel Rahman, who was an actual terrorist, as opposed to these manufactured terrorists that we see being created today-and Rahman also died this year in Supermax prison, almost as a signal that we are at the end of an era-and no one seems to know it.
But what she was DEFENDING was due process and the Constitution, which is distinctly different than “defending terrorists.” And who could forget that King George thought the founding fathers were themselves terrorists?! And, of course, she represented FBI star witness against organized crime, Sammy “the Bull” Gravano, who gets out of prison today. Gravano was an actual RAT who brought down the Gambino crime family, and John Gotti (at least- the parts of this crime family that are NOT on the FBI payroll, or otherwise working with and for the government.)
Like cancer, rats chew away at self-sustaining organisms, and then, let larger diseases in. Don’t get me wrong- mobsters are plainly dangerous, and plainly scary and all that, and Gravano made “hard choices” but this new thing- this ‘thing of theirs’? This government with no due process ever, and constant slander and spying and the destruction of due process in “gray area” that will NEVER see a day in court (and which they work hard to keep OUT of courts? It’s terrifying in every way. Related Story: The ACLU asks: If the government spied on YOU, and worked behind the scenes to “disrupt” your life, opportunities, and social connections- how would you know?
Some might note in my thesis here, that our current corroded democracy was initiated by secret courts and secret laws, and secret practices in the “gray area” of policing and prosecutor conduct and misconduct. Gravano’s case was one of those that set this trend.
And, too, a cowardly trend was set in journalism as well, by the “nation’s opinion leader” The New York Times. Here is the schmear that the New Yarwk Times put out about Ms. Stewart as an obituary– and I have highlighted the keywords and phrases that indicate a smear-in fact, the entire first paragraph is classic intelligence agency slander:
Lynne F. Stewart, a radical-leftist lawyer who gained wide notice for representing violent, self-described revolutionaries and who spent four years in prison herself, convicted of aiding terrorism, died on Tuesday at her home in Brooklyn. She was 77.
Her son, Geoffrey Stewart, said the cause was complications of cancer and a series of strokes.
Ms. Stewart, who had been treated for breast cancer before entering prison, was granted a “compassionate release” in January 2014 after the cancer had spread and was deemed terminal. Doctors at the time gave her 18 months to live.
A former librarian and teacher, she had taken up the law in the cause of social justice after seeing the squalor in the area around the public school in Harlem where she taught. She built a reputation for representing the poor and the reviled, usually for modest, court-paid fees.
Believing that the American political and capitalist system needed “radical surgery,” as Ms. Stewart put it, she sympathized with clients who sought to fight that system, even with violence, although she did not always endorse their tactics, she said.
One such client was Sheikh Omar Abdel Rahman, the blind Egyptian cleric who was found guilty in 1995 of leading a plot to blow up New York City landmarks, including the United Nations, after some of his followers had driven a powerful bomb into a garage beneath the World Trade Center in 1993, killing six people. Ms. Stewart would visit him in prison, where he was serving a life sentence in solitary confinement. Her death came less than three weeks after his: He died in prison on Feb. 18.
So, when I met her, and covered her story in a little college newspaper that had been ransacked several times (most likely by the college administrator) Stewart was touring the nation under federal indictment, working with the National Association of Criminal Defense Lawyers, and others; and I was being followed around and photographed by cowardly “mystery people” who ranged from tall Ethiopian men in suits, to flat chested blonde women and butch haircuts, or stocky meat-packer shouldered black women with bad weaves- and all of them with bad shoes (usually black, but sometimes “Eddie Bauer brown”).
And I was “crazy” because my relationships were undermined-James became an FBI informant; Laura became a librarian-much like Lynne Stewart herself had been a librarian-and another story I covered about a “terrorist” who was a librarian- librarians are highly targeted individuals, apparently. Let me know if you start seeing patterns, because…
My phone’s were constantly re-routed and redirected-even when I was in foreign lands. There was the “clicking” at the switch-fairly routine surveillance; but, too, the morons who repeated select words and phrases back to me over time. And much more going on as you might imagine; and much of that terrifying and heinous in ways that only deviants at the state level could think up, and disgusting; abhorrent to due process of law.
Many years after the time I interviewed her, my storage locker was broken into. My family mementos box was tossed like a salad, and my papers were scattered between boxes. So my “news clippings” were mixed with “family history” and my book and leaflet collections- the contents of several boxes of distinctly different materials literally became “word salad.”
And, my reporters notebooks had pages torn out of them, and these pages were put int different boxes or otherwise scattered about. Here are the notes these people came to take-and never a single warrant issued to me, or left anywhere. And this happened some five years AFTER I had interviewed and AFTER she was convicted of ‘material support for terrorism” because she did what?
She spoke with a cnvicts family on the phone. Yup. She got ten years for that.
Are you seeing any patterns yet especially patterns about how long they drag these “disruption campaigns” out- and how petty and trifling the ‘offenses’ are? Surely, America is under attack from SOMEONE SOMEWHERE- but it isn’t terrorists, because last I checked, terrorists LOVE speech.
How about this pattern: shortly after I discovered this burglary of my storage locker- which I did not report to police for obvious reasons stated all over this blog- shortly afterwards, “mysterious” pele contacted me on a web forum that has since disappeared from the internet-and thee mystery people were yammering on about how “yeah, THEY can even do sneak and peek searches of your stuff,” and so on.
So, here is evidence of my personal disruption campaign- because I believe in due process of law, and the right-indeed, the IMPERATIVE NECESSITY of attorney’s to vigorously defend their clients:
Look at these notes above ad ask yourself what could POSSIBLY be worth anything to anyone? If your answer was that I was personally villified, terrorized, and sufficiently in horror that I virtually kept quiet for many years, you would be correct- because the outrageous state of affairs of gray area policing, and Kafaka-meets-Orwell-meets-Fabian in the DVIC policing scheme that this country and the west is in today are beyond imagination of the founders, and even beyond the imagination of LEFTISTS of Stewart’s ERA!
So, for those peeking in, and asking yourselves “what is a targeted individual” or “what happens in gang stalking,” know this: I refused to cooperate, capitulate, cop a plea, or otherwise subsume “my” rights to those who approached me in secret, in “darkness” or who used un-Constitutional and undue processes and methods to ensnare or enlist my “support,” or submission.
In other words, in totally corrupted societies, they never come “through the straight gate,” and choose cowardly,ensnaring, entrapping, or blackmailing work-arounds instead. This is what gray area policing, aka Fabian Socialism is meeting the total corruption of institutional power; and all of that WITHOUT JUDICIAL OVERSIGHT, or with judicial complicity.
So there’s that factor, and becoming a rat, like Sammy the Bull. It only takes one rat gnawing away at the bottom of the big huge sloppy pig trough to set a trend. And, as we see with our total surveillance state, DVIC dollars are the Pied Piper that these have followed-and led us over the cliff of this new “thing of theirs”-totalitarianism.
Notice: This essay does not deal with ‘electronic mind control’, drugging, ‘creating alters’, V2K or paranormal. All these links are from mainstream sources and my purpose is to glue it together as a feasibility of how gangstalking could happen with existing, known technologies. Namely social psychology, HUMINT-based pattern prediction, ubiquitous surveillance and communications.
Gangster Computer God
Every day, increasingly, our reality is validating Francis Dee’s racist, paranoid, schizophrenic prophecy of the “Gangster Computer God Worldwide Secret Containment Policy” as less fiction and more fact (sans the mullatto-jew robot doctors). More fact because it’s become feasible (except for the cosmetic surgery).
Mass surveillance innovations), purposeful efforts and accomplishments; a drive towards total information awareness and such compelling integration of technology leading to a Panopticon, creates a situation in which a system could be devised capable of data-mining and heuristic pattern-of-life analysis of all citizens. Coupling such a system with astoundingly capable AI technology; an extreme willingness to help (and profit motive) by industry; an hegelian (‘ends justify the means’) ethos quite contrary to that of Christianity, secular humanism and altruism generally; and “machine learning algorithms”; form the constants of an addition equation that yields the very real possibility and therefore threat of an worldwide, technocratic, AI-based Gangstalking system. Requirements and Purpose
The only requirements are paranoia and an utter lack of trust of the Government towards the global everycitizen. In other words, “to shut down a political enemy by gaslighting them to the extent that they end up in jail or in a mental facility”. There may be other incentives however:
Random harassment ‘like a game’
Targetted harassment of non-threat ‘undesirables’
Spiritual warfare ‘to demoralize the population’
Human / Social experimentation
Data collection efforts (pushing people around to see where they go / with whom they talk in ‘crisis’ mode)
Psychopathologizing an individual through trauma-based mind control—to develop them as asset
Playing both the targetted individual and deputized stalker against each other. Why is the TI the only victim?
All Watched Over By Machines Of Loving Grace
Consider the following scenario. 1) You have an AI program that is hooked up with mass surveillance and has decades of social psychology to understand how humans work (HUMANINT + psychology/sociology, ‘game theory’, ‘prisoner’s dilemma’, ‘milgram’s’). 2) The AI program finds ways to manipulate people (stalkers) into ‘being at a certain place at a certain time’, ‘to look out for a certain individual’. Perhaps they’ve been getting fed emails from a “protected’ or ‘authoritative source’ (AI::outreach), someone from an intelligence agency for example, that has ‘deputized’ him/her, to help assist them in tracking down ‘an alleged (serial killer / pedophile / drug dealer / murderer / stalker)‘ in the community. This person then is notified to go to a certain place and ‘watch out for’ this disreputable / potential criminal.
Everyone wants to be a hero. All that is required is exploiting our vanity.
3) This AI program has a deep knowledge of everyone from mass surveillance). Enough to ‘predict behavior’ and generate a deep, heuristic, ‘life pattern’ analysis 4) The AI knows when you leave your home, when you take a shower, approx where you are located and headed using your cellphone’s gps/wifi and cell tower triangulation sent back to servers. Also, if the AI has access to NRO satellite data, they can actually see you, with a potential resolution of 50 cm2 to 1cm2 (drone)!! 5) Using the ‘pattern of life’ and seeing that you left your home, it can send email / sms / skype / facebook / twitter / foursquare / ‘other’ instant messages to various ‘deputized’ community citizens to ‘watch you’. 6) The targetted individual is now under humanint field surveillance by people who have been tricked, duped with disinformation into thinking they are doing good, protecting the community.
Con Game, Not Mind Kontrol
None of this requires mind control. All it requires is panopticon, vain authoritarians as ‘faux-insiders’, and a highly-available communication network with dynamic asset development and appropriation software.
If this is happening, it’s immoral and abusive and it’s also lacking in manners. Military-industrial aristocrats are supposed to have manners and respect. After all, their guarded culture demands those things. But their development of rights-destroying, ‘tough guy mafioso abuses’ reveal the ruling class as irresponsible, lacking a keen foresight into consequence they claim generally has guided their successes in life and which differentiate them from the masses.
Their lack of manners has created an uncouth robot that reduces everyone to numbered accounts in a microserfdom. This robot is going to mix up the salad fork with the dinner fork, which is a metaphor for ‘killing everyone’—it’s a matter of time before it’s discernments become so specific that everyone, poor and rich alike, need to be subject to ‘quantitative easing’. And that’s too is a metaphor, for this.
Speaking of espionage- but really quietly of course, here in public, about mission creep and bleed-over into a dying Constitutional Democracy.
“There not using them that way- they’re using them here…”
Background:Consensual Surveillance is what the DHS, ICE, FBI and even state level agencies call their secret warrantless cellphone surveillance. They have been monitoring and manipulating the communications of Americans via Cessna airplanes using technology called Stingrays and Hailstorm here in America since before 2006.
My first encounter with this form of warrantless surveillance by air was in 2011 or so when a little yellow Cessna airplane followed me everywhere, for hours, across a mid-western city. Then, I pulled my phones battery for the first time ever- and the plane disappeared.
———————————————————————— Low and Slow is the way to go when monitoring American’s speech : off-the-radar, “push-broom” hyper spectral imaging is more than picking up chatter.
The Beechcraft King Air turbo-prop is a beautiful bird. And it’s used to fly domestic surveillance missions in the U.S., and scoop up data about Americans
So- there’s this guy who worked on the electronic navigation and stability systems that are in MRAPs, the spectral imaging and photographic capabilities of FBI spy planes that currently monitor the phones of many Americans without a warrant or even probable cause; and the heavier military grade spectral and thermal imaging systems of CIA, DEA, and USAF surveillance aircraft. He particularly was fond of his work on the Beechcraft King Air line. How could those planes NOT be an engineers favorite- the name alone is so retro and air-crafty. Related Story: EMARSS aircraft crashes over Iraq– what was it doing?
He said “These things can look down through the roof of your house, and draw a multi-tiered 3D heat map and watch you move through your house in real time.” He really thought highly of those Beechcraft Surveillance planes.
I met him at a Japanese restaurant in November of 2014, a tonkatsu ramen and saki place in a strip mall next to a hotel where he was a regular; at least, as much of a regular as a guy who moves around a lot, working for military contractors and weapons manufacturers.
At the time, I was surprised that he was telling me, a virtual stranger, about domestic surveillance in the U.S. done TO Americans by intelligence agencies, BY the #goodguys at every level. I always thought the #badguys and the #otherguys did that stuff in their countries, to their peoples. Turns out some of those guys are training on those same planes as I write.
And, I would love to tell you more, but it might be illegal to do so, cuz, national security and stuff-you know: the Chinese or the North Koreans- maybe the Syrians or ISIS!! might get a leg up,catch us with our pants down, and tap all our phones, or follow us around with airplanes to get at all of our phone data and stuff.
Also, because we know that main stream journalists are so reputable and all, after President Obama authorized the dispensing of propaganda on the American public in 2011. A main stream media so reputable that they forgot to question the surveillance state as it was being built above my head. There are plainly too many military industrial surveillance state ‘official sources’ to wine and dine for stories- real inside scoops about cute puppies, or a stadium or something. Busy busy busy hungry hungry hungry officials: the #goodguys busy and hungry together.
Anyways, these MRAPs were designed for military use,in theaters of war, but somehow ended up parked next to your local donut shops all across America. Related Story: Colorado SWAT team completely demolishes man’s home looking for a shoplifter who stole 15 dollars worth of stuff.
Well: once upon a time on a phone long since stolen, I was making a case in the public’s interest about how airplanes are being used domestically to spy on Americans phone calls, and possibly looking through our roofs. I used Gmail and kept notes and contact info there. And, that story literally got scooped out of my Gmail account, then somehow hit the newspapers- in Minnesota.
And this guy- I’ll call him Jack- was a mess. He was hammered- absolutely shitfaced; he was all tore up about missing his aged mother- how he wanted a ghostwriter to tell her story to the world.
“Let me tell you- there are good mothers and then there was her: my mother was the best mother ever- anyone could see it. She was like a saint…” and so he went on about his mother.
And he was weeping. Weeping about how his inventions were being mis-used. You see, he works for many of the weapons dealers and arms suppliers that build the bombs and the drones and the MRAPs there in front of your house. He is a military industrial complex engineer.
Here is a project he worked on: https://www.beechcraft.com/special_missions/aerial_survey.aspx
And this doozy which he made note of: https://www.beechcraft.com/special_missions/surveillance.aspx
His biggest problem seemed to be that he felt that he had no say in the fact that these tools were being used to target civilians.
“I never gave my consent…they never told me they would be used this way…” and so on. He was horrified when he found out that the multiple agencies were using his toys and tools to target practice on American citizens, here, in America. That the FBI et al were training their pilots and their resources using Americans for practice, without warrants.
There’s this point between men where boundaries become demilitarized- where we drop our guard, and empathize: where we try to comfort another man, which is always awkward. And, where one wonders if the weirdness might be a whole ‘nother level of weird.
Well, the guy stumbled towards me in his stupor, head hanging in his hands- and he was literally slobbering as he gasped one of those horrid sort of drunk guy gasps that precedes horrible crying, and then sprang at me and was in my arms, where he found a slobbery nook on my shoulder to weep into.
Awkward indeed- blurring boundaries, blurring stories, one minute on about his mother the next, talking about how the technology he designed for Beechcraft could “look through your ceiling and create a 3D image model” of you as you take a shit in the privacy of your own home. ( Update: here is a story that ran in Popular Science on April 6, 2016, shortly before I wrote this story herein, and shortly after I spoke with a confidential informant: http://www.popsci.com/fbi-planes-used-augmented-reality-to-watch-america)
I said ” Well, these are the kind of tools we need in a war.” He gasped a cry and said “There not using them that way- they’re using them here…” and more weeping.
I couldn’t help but feel my lifelong revulsion to men, and weeping men, but especially- weeping men slobbering snot on my shirt.
But, in some conversations, I guess I overlook my own biases and listen for the story that really matters. And he seemed nice enough, provided an interesting story full of details.
In this case, it was that one detail- that military grade photo-thermal imaging was being used on American citizens.
That seemed important.
Within a day, I bumped into anther guy in the hallway carrying a Stingray sized briefcase- one of those metal kind that you see in the movies. And, the next night, a long black Suburban with no license plates of any kind parked under my motel window. Within three months, the phone where I kept my research and notes about this incident disappeared from my car.
And- the story about how the FBI is using these technologies broke almost immediately after my ability to report it had been erased. This has been the nature of my journalism for over a decade and counting; and why I provide these stories to others now- because control of my personal narrative begins and ends with this strange idea of my personal ‘right to privacy- my right to be left alone.’
But also, it coexists along with the public’s right to know.