The going dark problem and Silence on the Wire: silence is a two way street, and the case of Russian counter -surveillance of Americas political police using “low risk” tactical methods.

If you’ve ever sat still, in a quiet room, for a single moment, you know that there is no such thing as actual silence, because your own body makes noise.

“The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,”

Breath, and other organic, natural acoustic utterances or disturbances are a constant compliment to your presence. Then, there are the subsidiary, environmental and natural sounds around you, as the breeze, or the distant hum of nature in its various forms.

And so, this is the human baseline of silence, and it is a valuable starting point within which we discover the fatal flaw of all so called intelligence, and counter -intelligence: the arrogance of intel operators in assessing the value of data received or sent, because after disruption and beyond the human baseline,its all just “other ”noise. And noise then, becomes a two way street.


Related Content:
Free download of Silence on the Wire: Field Guide to Passive Reconnaissance and Indirect Attacks,by Michal Zalewski

So, in a free world, one would expect that the human rights and guarantees of “freedom ” would be maintained nearly religiously; as nearly religion itself, by those who draw paychecks based upon their oaths that they vow to uphold our constitutions.

But thats not what is actually happening in the west, since US, British, and the allied nations began their religion based, tribal-sectarian holy war that kicked off in 2001, and guys like me got to meet the “deep state ” head -on, after writing news stories without tribal -sectarian bias, and true to the form of the principles of journalism, and anticipating the Total Surveillance State.

 

Related Story: Take a look at how I was the first person in America to report on manufactured terrorism, and then, got years and years of black bag jobs,cowardly morons rifling through my belongings, and news stories stolen right out of my phone and email, and everything I describe herein AFTER that and more.

And look how that turned out for me, PERSONALLY.

Indeed, with the US FVEY spying,the accompanying “community policing, ” the western governments can no longer claim that they respect, or uphold anything resembling democracy backed by civil rights and due process procedures, much less freedom of any type.

So, it is here, where western governments have turned ordinary citizens into involuntary, non -consensual surveillance targets( aka Human Intelligence or, HUMINT )where the noise of ones own, voluntary silence is, “disrupted ” by the FVEYs data theft on every persons phone or computer and then, the exploitation of that data by intelligence operators to create what Dr. Lorraine Sheridan and others call “an echo chamber ” both online and off that is mediated by western extremist religious and political ideology, as we see here and here.

So, ROGS, the blog you are reading here, is what is called in psychology, a reaction formation, to the newly emerged total surveillance state, and the death of American democracy, which I once believed in whole heartedly, and fought for, very vainly, with well chosen words.

My country is no longer a democracy, insomuch as it ever was due to the multi-tiered levels of privilege, doled out to the select men and women, contrasted against the multi -tiered levels of slavery, peonage, and debt servitude that these others cast upon the poor, the dissenter or activist; the heretic and others who fall into the hidden slavery nets of any of the many sects and cults of organized religion, working through government apparatus both online and off .

So, this theological filtering, regardless of what cult, or sect, is also the baseline for all western dialogistics as we see in the sectarian targeting of men by known race -based operators; and in the resultant cult practices that follow, such as the un -naming of (primarily ) men in this example here and other examples I provide here at ROGS.

So, in such an environment of what is essentially the mass exploitation if individuals, and groups of individuals, one cannot act of actual free will, because these operations, and these operators, are in constant disruption mode. Its what their version of a society is.

In that light, there are many ways to use silence, and also noise to discern their capabilities, tactics, and methodology, AFTER the fact of them, casting you into their various webs of interaction FIRST.

Keep in mind that the pre -emptive, anti-democracy, anti-due process, sectarian secret police state justifies itself not from law, but from their version of tribal -religious and moral superiority.

In that world, its all binary, I /O data analyses: Kill or be killed; heaven and hell; black or white; Jewish or not Jewish; Republucan or Democrat woman or man, etc.

And it is that analyses which is its flaw, which is why they break and bend, and prostrate the law in gray area policing, aka “high policing ” aka political policing, as we saw with the al Ghazali problem.

So, no small surprise then, when ROGS was able to out a few Department of Defense affilliated persons here who targeted me on US soil as they worked ine or another angle of fraudulent FBI /DHS /Private contractor CVE program, or cult members who cyberstalked me on Twitter, working with Democrat party with operatives INSIDE Twitter monitoring my location; or most recently, yet ANOTHER Department of Defense affilliated, Brookings Institute person following my blog.

As I said: I know what kind of noise is natural, like how this humble electrician and merchant mariner was literally recruited by a gang strike force in LA, versus any of hundreds of bizarre DoD/DHS /FBI /NGO affilliated time wasters they toss,at me, like these guys here

So if little old ROGS, an American citizen who has never been convicted of any crime in any trial based in constitutional law, civil rights, and due process can be targeted and stalked, and harrassed by those I define, and name herein, wha else is goung on in western democracies that remains hidden?

And it is that last question that has,ROGS cheering for all the “bad guys, ” like Russia and China and even lil Kim in North Korea, apparently absent from an important meeting recently, lol. Because when “America, land of the free ” morphed into “America, just another police state, ” ROGS and hundreds of thousands like me got thrown under the bus.

Listen: China is thriving, and Russia protects Edward Snowden to this day, and Kim is no threat to anyone.

But I guarantee that CIA/DIA/NSA /FBI feeding down into “parallel colluding investigations ” and the subsequent constant surveillance of our webs of relationships single -handedly voids the constitutional compact, and the social compact as well.

So, I like to fight back by deploying counter -surveillance directly at those who point it at me, because my personal silence has been “disrupted ”. And in so doing, I learn a lot.

Here below, we see how Russians were able to anihilate FBIs urveillance teams privacy, and also how they were able to use this not -so -covert, sloppy, bizarre surveillance to gain valuable data about US security.

Which, would, under normal circumstances, inevitably undermine US security, if our own agencies hadnt ALREADY done that.

But in total surveillance states, security is ALREADY pre -emptively undermnied by tribal -sectarianism, and those who have deployed high policing on their own citizens .

The case of the Spies who laughed last, at Americans who use their own fellow citizens for “electronic target practice,” or:

FBI Follies, from Russiagate, With Love, via,Yahoo News Exclusive

Exclusive: Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil
Zach Dorfman, Jenna McLaughlin and Sean D. Naylor

Yahoo NewsSeptember 16, 2019

The discovery of Russia’s newfound capacity to crack certain types of encryption was particularly unnerving, according to former U.S. officials.

“Anytime you find out that an adversary has these capabilities, it sets off a ripple effect,” said a former senior national security official. “The Russians are able to extract every capability from any given technology. … They are singularly dangerous in this area.”

The FBI’s discovery of these compromises took place on the heels of what many hoped would be a breakthrough between Washington and Moscow — the Obama administration’s 2009 “reset” initiative, which sought to improve U.S.-Russia relations. Despite what seemed to be some initial progress, the reset soon went awry.

In September 2011, Vladimir Putin announced the launch of his third presidential campaign, only to be confronted during the following months by tens of thousands of protesters accusing him of electoral fraud. Putin, a former intelligence officer, publicly accused then-Secretary of State Hillary Clinton of fomenting the unrest.

It was around this time that Putin’s spies in the United States, operating under diplomatic cover, achieved what a former senior intelligence official called a “stunning” technical breakthrough, demonstrating their relentless focus on the country they’ve long considered their primary adversary.

That effort compromised the encrypted radio systems used by the FBI’s mobile surveillance teams, which track the movements of Russian spies on American soil, according to more than half a dozen former senior intelligence and national security officials. Around the same time, Russian spies also compromised the FBI teams’ backup communications systems — cellphones outfitted with “push-to-talk” walkie-talkie capabilities. “This was something we took extremely seriously,” said a former senior counterintelligence official.

The Russian operation went beyond tracking the communications devices used by FBI surveillance teams, according to four former senior officials. Working out of secret “listening posts” housed in Russian diplomatic and other government-controlled facilities, the Russians were able to intercept, record and eventually crack the codes to FBI radio communications.

Some of the clandestine eavesdropping annexes were staffed by the wives of Russian intelligence officers, said a former senior intelligence official. That operation was part of a larger sustained, deliberate Russian campaign targeting secret U.S. government communications throughout the United States, according to former officials.

The two Russian government compounds in Maryland and New York closed in 2016 played a role in the operation, according to three former officials. They were “basically being used as signals intelligence facilities,” said one former senior national security official.

Russian spies also deployed “mobile listening posts.” Some Russian intelligence officers, carrying signals intelligence gear, would walk near FBI surveillance teams. Others drove vans full of listening equipment aimed at intercepting FBI teams’ communications. For the Russians, the operation was “amazingly low risk in an angering way,” said a former senior intelligence official.

The FBI teams were using relatively lightweight radios with limited range, according to former officials. These low-tech devices allowed the teams to move quickly and discreetly while tracking their targets, which would have been more difficult with clunkier but more secure technology, a former official said. But the outdated radios left the teams’ communications vulnerable to the Russians. “The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,” said the former official.

A former senior counterintelligence official blamed the compromises on a “hodgepodge of systems” ineffective beyond the line of sight. “The infrastructure that was supposed to be built, they never followed up, or gave us the money for it,” said the former official. “The intelligence community has never gotten an integrated system.”

The limitations of the radio technology, said the former senior officials, led the FBI’s surveillance personnel to communicate on the backup systems.

“Eventually they switched to push-to-talk cellphones,” said a former counterintelligence executive. “The tech guys would get upset by that, because if they could intercept radio, they might be able to intercept telephones.”

That is indeed what happened. Those devices were then identified and compromised by Russian intelligence operatives. (A number of other countries’ surveillance teams — including those from hostile services — also transitioned from using radios to cellphones during this time, noted another former official.)

Marcy Wheeler, aka emptywheel, wants you to know that the NSA WANTS you to know that "ON 702, NSA WANTS TO ASSURE YOU YOU’RE NOT A TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET"

What journalists should know about the deep state Alphabetross domestic spying on Americans by the NSA/CIA/DEA/ODNI/FBI/SOD and FiveEyes-Israel Alliance, according to Marcy Wheeler (and I quote):

“ON 702, NSA WANTS TO ASSURE YOU YOU’RE NOT A TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET”


NSA just released a touchy-feely Q&A, complete with a touchy-feely image of the NSA, explaining “the Impact of Section 702 on the Typical American.”
I shall now shred it.
First note that this document deals with 702? It should be dealing with Title VII, because the entire thing gets reauthorized by 702 reauthorization. That means Sections 704 and 705(b), which are used to target Americans, will be reauthorized. And they have had egregious problems in recent years (even if the problems only affect some subset of around 300 Americans). Sure, Paul Manafort and Carter Page are not your “typical” Americans, but abuses against them would be problematic for reasons that could affect Americans (not least that they could fuck up the Mueller probe if FISA disclosure for defendants weren’t so broken).
The piece starts by talking about how the IC uses 702 to “hunt” for information on “adversaries,” which it suggests include terrorists and hackers.

The U.S. Intelligence Community relies on Section 702 of the Foreign Intelligence Surveillance Act in the constant hunt for information about foreign adversaries determined to harm the nation or our allies. The National Security Agency (NSA), for example, uses this law to target terrorists and thwart their plans. In a time of increasing cyber threats, Section 702 also aids the Intelligence Community’s cybersecurity efforts.

Somehow, it neglects to mention the foreign government certificate — which can target people who aren’t “adversaries” at all, but instead foreign muckety mucks we want to know about — or the counterproliferation certificate — which can target businesses of all kinds that deal in dual use technologies. Not to mention the SysAdmins that it might target for all these purposes.
The piece then lays out in two paragraphs and six questions (I include just one below) the basic principles that 702 can only “target” foreigners overseas.

Under Section 702, the government cannot target a U.S. person anywhere in the world, or any person located in the United States.
Under Section 702, NSA can target foreigners reasonably believed to be located outside the United States only if it has a basis to believe it will acquire certain types of foreign intelligence information that have been authorized for collection.
[snip]
Q: Can I, as an American, be the target of Section 702 surveillance?
A: No. As an American citizen, you cannot be the target of surveillance under Section 702. Even if you were not an American, you could not be targeted under Section 702 if you were located in the United States.

Effectively, this passage might as well say, “target target target target target target target target target target
target target target target target target target target target,” which is how many times (19) the word is used in the touchy-feely piece. The word “incidental” appears just once, where it entertains what happens if one of “Mary’s” foreign relatives were in a terrorist organization….[follow this link to read more!]

Google, demographic searches, Facebook, dopamine, criminal defense lawyers, and gang stalking

The reader might have noticed that gang stalking is gaining credibility as a valid complaint online, and calling it by its proper name: counter-intelligence and police stalking
,
as we see in this example where a couple reporters and sociologists held a forum about the stalker state.

And, we also see that forums like Reddit and main stream news have begun to cover stories that walk the fine line between covering gang stalking as what it is “a rampant abuse of counter-terrorism funding and propaganda, and high policing as pretext to target the ‘usual suspects:’ the poor, the disenfranchised, the vulnerable, and the marginalized; the dissident voice, and the non-ADL infiltrated activist.”

Related: Read this brilliant Reddit analysis about how the One Percent have inter-linked their tribal-sectarian racism with artificial intelligence, and the nefarious Facebook and other CIA InQtel startups.
Then, read how ROGS Analysis has scientifically predicted key elements of a recent mass shooting, and also that racists are using labelling theory and framing people online, using military grade psychological operations, targeted at individuals.

And the main stream news is aware that they have been asked to put a “spin” on complaints of gang stalking that make it to a court room or two, because their fakenews depends upon near-mythical badguys, and wolf’s at the door that can be relegated to delusional complaints. All western Jewish-Christian-Abrahamic societies work from that level of fakemyth in order to substantiate and affirm their story telling basis based in superstition, and that superstition backed by actual human sacrifices (the Jesus myth is the classic example.)
Here is a case of this EXACT media framing in action, as we see a guy involved in drugs, and murdering another guy, just after he gets a “strange phone call about gang staking.”
Notice that the phone call is described as a “prank,” which seems to require more evidence, and more exploration, because the ROGS thesis holds that it was actually a deep state, or OTB black ops police tactic, or involvement of OTB snitches; or who were directly connected to Fusion Center tracking, and other elements .
In other words, ROGS is saying that this crime-like so many we see today-is possibly and likely the direct result of state leave actors using the obscured tactics of counter-terrorism tactic of gang stalking, and it CAUSED or CONTRIBUTED to a homicide (and keep in mind that the ROGS purpose is to destroy the ability of LEO’s to continue to mask bad behavior, and use illegal tactics and methods while cowering behind the thin veneer of counter-terrorism).
For reference, I have highlighted the relevant text, or linked it to other ROGS posts that discuss how gang stalking tactics affect cases “in darkness”and note that one of the metrics of measuring the ineffectiveness of counter terror gang stalking is that actual homicides are carried out, and many of those are a direct result of this neverending harrassment of targets, as we saw in the Virginia Beach shooting, Ian Long, Mathew Riehl, and many others:

Murder trial gets underway with opening statements

[Prosecutor]Smith argued that the level of violence indicates it was not self-defense.
A picture can be worth a thousand words, and I think this picture says a lot,” Smith said as he flashed a grisly photo of Maulding’s body across a large screen. “He beat him to a pulp.”
Reichow’s defense attorney, Sean Downs, argued that there are two sides to every story and “sometimes three, four, five. It’s not always going to fit together perfectly for you,” he told the jury.
What the attorneys do seem to agree on is that Reichow and Maulding had been hanging out earlier in the day. They were picked up by another friend, Anne Tanninen, from Maulding’s house and went to a storage unit that Tanninen had rented.
The trio was inside the storage space when Tanninen received a strange phone call, Smith said, from someone talking about $5,000, drugs and picking something up. He said both Reichow and Tanninen shared paranoid beliefs about the world, and they thought they were being “gang stalked.” Gang stalking can include being harassed by an organized group of people.
Up until the call, which turned out to be a prank, nothing was out of the ordinary, Smith said. The trio were unloading some items at the storage space, and Maulding was toying around with a bat inside the unit, he said.
Tanninen became upset after the call, however, and started arguing with Reichow, Smith said. She and Maulding confronted Reichow about possibly being associated with the call.
Downs said Maulding started taunting Reichow with the bat, saying “Come here, boy. Come here, boy.” Maulding, who had been drinking earlier in the day, was still intoxicated and threatened Reichow, Downs said.

Or, perhaps the reader today has noticed that Big Tech like Facebook is being indicted BY IT’S OWN CORPORATE OFFICERS as sick and exploitative manipulators of public discourse, AND psychological processes that amount to mind disruption.
Here-from yesterday’s news, is something that I wrote about many months ago, before the MSM picked it up-yet another Facebook CEO/investor/developer has come forwards to blow the whistle on the practice of manipulating dopamine levels in our brains. Keep in mind that their investors are largely drawn from the jingoistic Jewish-Christian fold, for whom no excess of cultic or chemical abuse of children is ever enough to satisfy their bulimic hunger):

“CHAMATH PALIHAPITIYA, A former Facebook executive has spoken out against the social network he helped to create, saying it is ‘ripping society apart'”

 

He cited an incident in India where hoax messages about kidnappings shared on WhatsApp led to the lynching of seven innocent people, according to reports in The Verge.

During his talk, Mr Palihapitiya called out not only Facebook, but Silicon Valley’s entire system of funding.

He claimed money pumped into the region would be better spent addressing problems like climate change and disease.

Speaking to an audience at Stanford Graduate School of Business, Mr Palihapitiya said: ‘I think we have created tools that are ripping apart the social fabric of how society works.

‘The short-term, dopamine-driven feedback loops we’ve created are destroying how society works.

‘No civil discourse, no cooperation; misinformation, mistruth.

‘And it’s not an American problem — this is not about Russians ads. This is a global problem.’

This is not the first time that prominent figure at Facebook has spoken out about the social network.

For those of you who use such products, my heart goes out to you, and I hope you can read through ROGS here and find “the help you need” to possibly begin a class action lawsuit that will provably be bigger than Big Tobacco if we do it right.
But I haven’t personally used social media since 2005-6, and have never used the social network’s except AS investigative tools, for reasons that I will write about later (it started with total hacking of all my email and academic accounts for nearly a decade, between 2003-13).
But it will take a lawsuit against Facebook and other social media which will expose the multi-headed hydra’s and other monsters that our governments have been pointing at our minds in a direct webterrogation of our personalities, our intentions, our hopes and dreams-and a direct influence operation on our choices, and that, through direct manipulation of our free will, via dopamine.But I would go one step further, and state that the internet itself, weaponized by the FiveEyes, has literally designed this effect.
And certainly, “they” have been literally targeting SOME people differently than other people. Mass shooter Devin Kelley’s Facebook was webwashed after his rampage. Why is that?

Related Stories: Where does the NSA end and Facebook begin? Facebook and its investors range from CIA butt boys like Peter Thiel, to Hong Kong mobster’s such as Li Ka- Shing, to standard front companies, to Goldman Sachs.And, how the FBI and NSA made Facebook the perfect surveillance tool after the great Culling of 2001.

Facebook executives admit deliberately manipulating dopamine levels in children to create “positive feedback loops.” Is it possible then, that they also help or enable negative feedback loops? I think Devin Kelley and many other “terrorists” mass shooters are examples of that, as I have studied this since 2005, being fully aware that the internet is “interactive” without our informed consent.
So, the War on Terror is ACTUALLY a war on ideas, and the people who have them-it is a cover operation for mass mind control. Literally using dopamine manipulation and propaganda tactics that other Facebook executives have called “brainwashing on a level that Edward Bernay’s could never have imagined as he powered Hitler, and Big Tobacco.’ But it is also an assault on individuals, and many of thse individuals that LEO’s and all the counter-terror hero’s can use as unpaid HUMINT to lead them to cases that they otherwise could NOT access.
And worse, because of the egregious and outrageous hidden mechanisms, and unchecked, un-monitored use of tactics, and toys and tools of OGS beyond the knowledge of courts of law, we see that citizens are robbed of free will, and instead, are used as unpaid labor that drives federal funding initiatives. This is what “high policing” is and how it has affected society-and individual cases-at large.
Again, do your own research, but there is an over-whelming bunch of evidence and data is increasing that indicates this is true. While George Orwell got it right about Big Government, he missed the part where government would use corporations as front companies, like any CIA operation ever, but this time, it is 17 agencies waging the ongoing Operation MHCHAOS, with augmented internet that targets “bad ideas” and “PRISM’s” and “XKEYSCORES” of words, mind mapping, and SOCMINT profiles long before the activist, dissident, whistle blower, or others, sometimes criminals, get targeted for “disruption.”
And, failing THAT, we now see that “destruction” soon follows, as in the case of the mass shooters, homicides, petty crimes, and more.

brave new piggies.jpg
And certainly, Brave New World is here, but augmented highly industrious DVIC flying pigs, and an ever morphing wolf at the chimney, via mind control via Facebook-and studies that claim targeted individuals are suffering from delusional disorder.

The only thing that can be said at this time about the “delusion” of gang stalking, and backed with ROGS Predictive Analysis, and empirical evidence is that psychologists like Dr. Lorraine Sheridan, et al. also share funding sources, and utilize ATAP damage control narratives, every time another layer of this un-constitutional policing scheme is revealed.
 
 
 

In Re: The NSA's Great Sim Heist, a corporate hack, and the XKEYSCORE program.

The avid ROGS reader will note that not all hacks are created equal, and while national security is indeed an important and necessary function of our current state of law and justice-not all hacking targets are the same.
That, indeed, politics are behind every single hack. Also- that gang stalking is real, and not necessarily delusional, most of the time; and that all “electronic harassment and directed energy” claims are usually related to eavesdropping and other redirection, and communications systems n one way or another-that a lot of “cross talk” can be inferred from these dialogues.
And, I would like that one special reader to take note of this: while you might think your salary depends upon the will of international banking cartels, many American citizens whose rights and liberties that have been compromised by these schemes are taking notice of how “un-American” some of these inner circle politics are-and how the great American dream for some is itself a target, because politicized racial, sectarian, ethnocentric influences work at times with each other, but also, against each other.
So-while the NSA hack that targeted certain companies cell phone SIM cards once seemed like a good idea I ask you, the special reader if that is the case now-that such a company might in fact and practice deserve MORE protection now? Because if security is the goal, then I would imagine that all the sectarian and appalling partisanship within the “deep state” that we saw ‘then’ might take on new meaning ‘NOW.’
Like I said once upon a time-it seems that everything I write about today, get’s into the news shortly thereafter. And in the case of Senator Al Franken’s recent debacle, which I touched on here months before it happened, or the new fate of Russell Simmon’s, who I touched on here about a month ago is any indicator, you might want to get a manila envelope ready. My imaginary friends  would appreciate it. And, I certainly am not complaining either, because like I said repeatedly-you come in through the front door, or go [email protected] yourself.
AND-if you haven’t heard yet- this is the NSA’s Google:

Source map blah blah
Notice that one beam in the eye of the Panopticon that goes to Washington State, and that other one in Texas. That seems like it will be relevant later, hmmm.

XKEYSCORE

NSA’s Google for the World’s Private Communications

The reach and potency of XKEYSCORE as a surveillance instrument is astonishing. The Guardian report noted that NSA itself refers to the program as its “widest reaching” system. In February of this year, The Intercept reported that NSA and GCHQ hacked into the internal network of Gemalto, the world’s largest provider of cell phone SIM cards, in order to steal millions of encryption keys used to protect the privacy of cell phone communication. XKEYSCORE played a vital role in the spies’ hacking by providing government hackers access to the email accounts of Gemalto employees.
Numerous key NSA partners, including Canada, New Zealand and the U.K., have access to the mass surveillance databases of XKEYSCORE. In March, the New Zealand Herald, in partnership with The Intercept, revealed that the New Zealand government used XKEYSCORE to spy on candidates for the position of World Trade Organization director general and also members of the Solomon Islands government.
These newly published documents demonstrate that collected communications not only include emails, chats and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation (CNE) targeting, intercepted username and password pairs, file uploads to online services, Skype sessions and more.

Bulk collection and population surveillance

XKEYSCORE allows for incredibly broad surveillance of people based on perceived patterns of suspicious behavior. It is possible, for instance, to query the system to show the activities of people based on their location, nationality and websites visited. For instance, one slide displays the search “germansinpakistn,” showing an analyst querying XKEYSCORE for all individuals in Pakistan visiting specific German language message boards.
As sites like Twitter and Facebook become increasingly significant in the world’s day-to-day communications (a Pew study shows that 71 percent of online adults in the U.S. use Facebook), they become a critical source of surveillance data. Traffic from popular social media sites is described as “a great starting point” for tracking individuals, according to an XKEYSCORE presentation titled “Tracking Targets on Online Social Networks.”

Speech Crimes, journalism, and Targeted Individuals: my connection to Sammy "the Bull" Gravano, who got out of prison Monday.

Webs of associations, connections, presidents and naming names- even some torture. All of that is in a single quote from “Six Degrees of Separation: by John Guare, voicing his observation from the mouth of his character Ouisa Kitteridge:

I read somewhere that everybody on this planet is separated by only six other people. Six degrees of separation between us and everyone else on this planet. The President of the United States, a gondolier in Venice, just fill in the names. I find it extremely comforting that we’re so close. I also find it like Chinese water torture, that we’re so close because you have to find the right six people to make the right connection…
-Ouisa Kitteridge in “Six Degrees of Separation”

In my formative years, I watched the movie”Six Degrees of Separation” starring Will Smith, and based on the book by  Guare, and have found that, in these privacy and due process raping times, our “associations” are under attack; that the NSA, DHS, FBI, Fusion Centers, and local police have literally stolen our choices of primary “rights of assembly; and association,” by data-warehousing our entire webs of relationships in the huge data bases that I chronicle here at ROGS. And they have done it for over two decades. This is what is meant by “soft force eugenics” in the online gang stalking community, and it works like this.
So, what is a “disruption” campaign and how does it affect targeted individuals?
Six Degrees of Separation had, for me, a personal connection, though our “six degrees” is no longer six: it is TWO DEGREES of separation, as the Five Eyes Nations and the NSA-FiveEyes-Israel data theft pipeline have stolen all of our information, and use it to monitor, manipulate, and “disrupt” our relationships, as we are now all connected by a single mouse click at the NSA, or GCHQ, or any of the hundreds and thousands of other “good guys monitoring human relationships” centers across the west. As Edward Snowden said- this is not merely about spying: ‘this is about intellectual property theft,’ and then guilt by association-or vindication by it.
Six Degrees also notably highlights the late era feminism of white females attempting to ’empathize’ with black men, which they simply cannot, being as they are on one hand, the un-empathetic Bernaysian mouthpieces of organized globalism, and on the other, the mistresses of the police state itself, which Guare note’s thus in an exchange between the protagonist Paul, and the white Ouisa:

Ouisa Kittredge: There is so much you don’t know. You are so smart and so stupid.
Paul: I’ll be treated with care if you take me to the police. If they don’t know you’re special, they kill you.
Ouisa Kittredge: Oh, I don’t think they kill you.
Paul: Mrs. Louisa Kittredge, I am black.
Ouisa Kittredge: I will deliver you to them with kindness and affection.

 

I have never been awed by status or power, nor intimidated by it, which for some, poses a problem. And, those “some, I have described elsewhere on this blog as “cowards,” and especially as RATS, nibbling away at the bottom most planks of Constitutional Democracy, and nibbling away at the bottom of the bottomless DVIC slop-trough. And as such, I have come to realize how the Pharisee’s and the scumbags alike all HATE words. And, mine, specifically and especially.
But fame and power interested me slightly in my formative years, for several reasons, not least of which is that when I was  kid, I spent a lot of time on Hollywood Blvd, in Hollywood, CA, where Smith used to hang out as well, during his pre- “Fresh Prince of Bel Aire” days.
Generally, he caused quite a stir when he would roll up to Tommy’s, in his late model Benz ( I actually cannot remember what his car was, but I recall that he preferred late model Benzies or something similar) or otherwise show up at a club venue with a gorgeous ingenue strapped to his arm. Those who hung out, or lived on The Blvd-those ranged from teen runaways, to hookers and dope dealers, or punk rockers who squatted on abandoned properties up on Mount Olympus- would stir like bees, and in minutes, everyone knew that Smith was around.
He was an “up and coming star” then, and everyone wanted to touch fame, and hope it rubbed off. Except me. I was saving up to pay my way through college when I met a “mind controlled”system child named “Piper.
I personally was never star struck in any way, and have the unique ability to see people as people, regardless of stature. And I always somehow had a focus on the fact that fame is illusory, and that it can get in the way of other things that are more important. And in Hollywood, in that era, a lot was plainly “not right,” but also, not necessarily wrong either; that things were as they have been for millenia; and even moreso, that I was called to write, which is a tenuous fate for anyone facing “the way tings really are.”
Many years later, as a budding journalist, I tried to “make a difference,” by writing stories that defied “narrative” and that defied those who abuse power, and sought the gritty “facts” instead-and was soundly abused because of it by those that I write about herein and more, all of whom had their own designs on what I could or should do, what I could or should write.
SO when the researcher asks the question “who are targeted individuals?” Who gets gang stalked?” and so on, a simple answer would be that those who defy the lockup on narrative are primary targets, because narrative is the guiding force of corruption; and corruption is profitable; and the truth? Well….you can’t handle the truth.

vlcsnap-2017-12-07-22h26m08s502 (2)
I smell a rat!

But the truth is, in a society where Jewish-christians and then, al of their many sects and cults have a lockup on narrative, and where the mouth-piece of choice is the white female and her “others,” who literally CREATE boogiemen like evil Golem’s-those of us who see it another way are plainly dangerous to their old myths and lies, and cover-ups of atrocity after atrocity with their pseudo-morality, called “religion,” which many of our societies most astute have observed is a form of mental illness-but because so many suffer from it, it is the “norm” not the exception.
And so, the irony of me scrabbling around at the feet of Hollywood then was less than ironic, because I couldn’t give a rat’s ass about fame, or power; but “they” did, all of them. Sherman, the script writer, living in his cat-shit littered apartment, and cranking out pulpy manuscripts and cat-pawed screenplays;  Henry Rollins playing here or there, the Sick Green Hearts and their heroin addiction (as I recall they were usually too sick to get out of bed and play), and Bukowski’s bungalow blocks away-none of it meant “doodley squat” to me, then or now, as I simply couldn’t write an “ending” to any story I ever attempted- there are just too many new beginnings that the end is plainly outgunned.
Anyways- years later, as a budding college journalist ( I studied journalism because the paragraphs were moronically simple, and most American’s are adept at moronically simple), who worked in a little college news office, at a college  that, it turns out, was and still is one of the FBI’s “Somali/immigrant informant recruiting” centers, I once interviewed Lynne Stewart, who passed away in March of this year, 2017.
Stewart was labeled “the Terrorists Lawyer,” by the Bush Administration, because she had the odd trait of being able to represent clients according to the law-every ugly and precious bit of it, and to protect her clients, and to protect due process, and civil liberty zealously, with vigor, and regardless of their politics, or the political climate in which she practiced law. And in a social climate where practicing law and defending clients is demonized by the police, and their racist enablers, even lawyers ‘get no respect.’ especially those who stand for the CONSTITUTION.
But American cops no longer stand for the constitution, and have nearly al never even read it, because they themselves are little more than the paid armies of AIPAC and its enablers.
Cops who hate America give policing a bad name. Here is a “police opinion” of Lynne Stewart, from Michelle Malkin, who has likely chowed down a few sloppy cops dogs in her time. So many in fact that it is surprising that she can even speak freely:

Sicko Terrorist Lynne Stewart: Still Hating Cops

Well, sue, Stewart represented radical leftists, gangster’s and mass murderers, and non-Jewish Nazi’s alike; she represented “the Blind Sheik,” Omar Abdel Rahman, who was an actual terrorist, as opposed to these manufactured terrorists that we see being created today-and Rahman also died this year in Supermax prison, almost as a signal that we are at the end of an era-and no one seems to know it.
But what she was DEFENDING was due process and the Constitution, which is distinctly different than “defending terrorists.” And who could forget that King George thought the founding fathers were themselves terrorists?!
And, of course, she represented FBI star witness against organized crime, Sammy “the Bull” Gravano, who gets out of prison today. Gravano was an actual RAT who brought down the Gambino crime family, and John Gotti (at least- the parts of this crime family that are NOT on the FBI payroll, or otherwise working with and for the government.)
Like cancer, rats chew away at self-sustaining organisms, and then, let larger diseases in. Don’t get me wrong- mobsters are plainly dangerous, and plainly scary and all that, and Gravano made “hard choices” but this new thing- this ‘thing of theirs’? This government with no due process ever, and constant slander and spying and the destruction of due process in “gray area” that will NEVER see a day in court (and which they work hard to keep OUT of courts? It’s terrifying in every way.
Related Story: The ACLU asks: If the government spied on YOU, and worked behind the scenes to “disrupt” your life, opportunities, and social connections- how would you know?

vlcsnap-2017-12-07-23h03m15s193 (2)
Frances-it’s a whole nation FULL of rats!

Some might note in my thesis here, that our current corroded democracy was initiated by secret courts and secret laws, and secret practices in the “gray area” of policing and prosecutor conduct and misconduct. Gravano’s case was one of those that set this trend.
And, too, a cowardly trend was set in journalism as well, by the “nation’s opinion  leader” The New York Times. Here is the schmear that the New Yarwk Times put out about Ms. Stewart as an obituary– and I have highlighted the keywords and phrases that indicate a smear-in fact, the entire first paragraph is classic intelligence agency slander:

Lynne F. Stewart, a radical-leftist lawyer who gained wide notice for representing violent, self-described revolutionaries and who spent four years in prison herself, convicted of aiding terrorism, died on Tuesday at her home in Brooklyn. She was 77.

Her son, Geoffrey Stewart, said the cause was complications of cancer and a series of strokes.

Ms. Stewart, who had been treated for breast cancer before entering prison, was granted a “compassionate release” in January 2014 after the cancer had spread and was deemed terminal. Doctors at the time gave her 18 months to live.

A former librarian and teacher, she had taken up the law in the cause of social justice after seeing the squalor in the area around the public school in Harlem where she taught. She built a reputation for representing the poor and the reviled, usually for modest, court-paid fees.

Believing that the American political and capitalist system needed “radical surgery,” as Ms. Stewart put it, she sympathized with clients who sought to fight that system, even with violence, although she did not always endorse their tactics, she said.

One such client was Sheikh Omar Abdel Rahman, the blind Egyptian cleric who was found guilty in 1995 of leading a plot to blow up New York City landmarks, including the United Nations, after some of his followers had driven a powerful bomb into a garage beneath the World Trade Center in 1993, killing six people. Ms. Stewart would visit him in prison, where he was serving a life sentence in solitary confinement. Her death came less than three weeks after his: He died in prison on Feb. 18.

So, when I met her, and covered her story in a little college newspaper that had been ransacked several times (most likely by the college administrator) Stewart was touring the nation under federal indictment, working with the National Association of Criminal Defense Lawyers, and others; and I was being followed around and photographed by cowardly “mystery people” who ranged from tall Ethiopian men in suits, to flat chested blonde women and butch haircuts, or stocky meat-packer shouldered black women with bad weaves- and all of them with bad shoes (usually black, but sometimes “Eddie Bauer brown”).
And I was “crazy” because my relationships were undermined-James became an FBI informant; Laura became a librarian-much like Lynne Stewart herself had been a librarian-and another story I covered about a “terrorist” who was a librarian- librarians are highly targeted individuals, apparently. Let me know if you start seeing patterns, because…
My phone’s were constantly re-routed and redirected-even when I was in foreign lands. There was the “clicking” at the switch-fairly routine surveillance; but, too, the morons who repeated select words and phrases back to me over time. And much more going on as you might imagine; and much of that terrifying and heinous in ways that only deviants at the state level could think up, and disgusting; abhorrent to due process of law.
Many years after the time I interviewed her, my storage locker was broken into. My family mementos box was tossed like a salad, and my papers were scattered between boxes. So my “news clippings” were mixed with “family history” and my book and leaflet collections- the contents of several boxes of distinctly different materials literally became “word salad.”
And, my reporters notebooks had pages torn out of them, and these pages were put int different boxes or otherwise scattered about. Here are the notes these people came to take-and never a single warrant issued to me, or left anywhere. And this happened some five years AFTER I had interviewed and AFTER she was convicted of ‘material support for terrorism” because she did what?
She spoke with a cnvicts family on the phone. Yup. She got ten years for that.
Are you seeing any patterns yet especially patterns about how long they drag these “disruption campaigns” out- and how petty and trifling the ‘offenses’ are? Surely, America is under attack from SOMEONE SOMEWHERE- but it isn’t terrorists, because last I checked, terrorists LOVE speech.
How about this pattern: shortly after I discovered this burglary of my storage locker- which I did not report to police for obvious reasons stated all over this blog- shortly afterwards, “mysterious” pele contacted me on a web forum that has since disappeared from the internet-and thee mystery people were yammering on about how “yeah, THEY can even do sneak and peek searches of your stuff,” and so on.
So, here is evidence of my personal disruption campaign- because I believe in due process of law, and the right-indeed, the IMPERATIVE NECESSITY of attorney’s to vigorously defend their clients:
lynne stewart notes 1
lynne stewart notes
Look at these notes above ad ask yourself what could POSSIBLY be worth anything to anyone? If your answer was that I was personally villified, terrorized, and sufficiently in horror that I virtually kept quiet for many years, you would be correct- because the outrageous state of affairs of gray area policing, and Kafaka-meets-Orwell-meets-Fabian in the DVIC policing scheme that this country and the west is in today are beyond imagination of the founders, and even beyond the imagination of LEFTISTS of Stewart’s ERA!
So, for those peeking in, and asking yourselves “what is a targeted individual” or “what happens in gang stalking,” know this: I refused to cooperate, capitulate, cop a plea, or otherwise subsume “my” rights to those who approached me in secret, in “darkness” or who used un-Constitutional and undue processes and methods to ensnare or enlist my “support,” or submission.
In other words, in totally corrupted societies, they never come “through the straight gate,” and choose cowardly,ensnaring, entrapping, or  blackmailing work-arounds instead. This is what gray area policing, aka Fabian Socialism is meeting the total corruption of institutional power; and all of that WITHOUT JUDICIAL OVERSIGHT, or with judicial complicity.
So there’s that factor, and becoming a rat, like Sammy the Bull. It only takes one rat gnawing away at the bottom of the big huge sloppy pig trough to set a trend. And, as we see with our total surveillance state, DVIC dollars are the Pied Piper that these have followed-and led us over the cliff of this new “thing of theirs”-totalitarianism.
 

What is "gang stalking"? It is the result of a nation that respects no laws- and a nation 'for sale.'

The article below is from Business Insider in 2012. It documents one of the first official sources that claimed the government had sold our rights to “others,” who were wiretapping the entire nation.
The article chronicles decorated intelligence officer, and NSA whistle-blower William Binney’s ostracization, and excommunication from the cult of intelligence, as well as his harassment by the FBI for trying to save the taxpayers FOUR BILLION DOLLARS- but also, that he tried to preserve “Costitutional Liberty,” aka “due process of law, which Americans have not had since 2004.
In 2012, many already knew that the local police were using and abusing massive databases. Many already knew that ‘somehow’ that police, and multi-agency Task Forces had access to cell phones in real time, and that ‘somehow’ they could track “targeted” communications across a city, or across a continent- and into international jurisdictions (Hi Toronto!)- and that they could repeat back selected words and phrases just to let them know they  are watching.
While these people didn’t have a ‘name’ for it them, we now know it is the current sate of affairs where Fusion Centers were spying on citizens in local environments outside the view of any court, and outside the view of due process of law, and without respect for the Bill of Rights.
These people have a name- they are “targeted individuals,” and here is where the world began to know what “TI’s” knew as far back as 2003-4:

NSA Whistleblower Says The Feds Are Gathering Data On Nearly Every US Citizen

NSA ACLU
The government has been collecting data on nearly every U.S. citizen and assembling webs of their relationships, National Security Agency whistleblower William Binney told the Hackers On Planet Earth (HOPE) conference last week.
Binney worked for the Defense Department’s foreign signals intelligence agency for 32 years before resigning in late 2001 because he “could not stay after the NSA began purposefully violating the Constitution,” according to a statement he made in court records.
On April 20 he gave his first interview after resigning to Democracy Now!, asserting that the FBI raided his home after he blew the whistle on the NSA’s extensive spying on Americans.
On July 2 Binney, along with two other former NSA employees, agreed to provide evidence in the Electronic Frontier Foundation’s lawsuit that alleges the U.S. government operates an illegal mass surveillance program (i.e. Jewel vs. NSA).
His sworn declaration of facts that he’s willing to testify to are both telling and scary:

• In the ’90s Binney supervised the development of a NSA program called “Thin Thread” that was designed to identify international networks of connections between people from their internet communications. Since one side of the communications was domestic, the program encrypted the data so as to protect the privacy of U.S. citizens until a warrant could be obtained.
After 9/11 all safeguards went out the window as “the individual liberties preserved in the U.S. Constitution were no longer a consideration.” Members of his Thin Thread team began implementing a program called the President’s Surveillance Program (PSP), which collected domestic electronic communications traffic without any privacy protections.
• The NSA began seizing and storing most electronic communications passing through 10 to 20 wiretapping rooms in key telecommunication points throughout the country where all data must pass in order to move from one party’s network to another’s, allowing the government to identify and analyze any individual or group through a searchable database.
• Binney cites the $1.2 billion Utah data center currently being built and the new supercomputing center at the NSA headquarters in Fort Meade, Maryland, pointing out that the immense size and computing power of these facilities far exceeds the capacity necessary for storing targeted communications but is “consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications.”
In a nutshell Binney states – with considerable authority – that the NSA has been conducting comprehensive surveillance on U.S. citizens for more than a decade.

 
[youtube https://www.youtube.com/watch?v=JuvJ7tKIF2c&w=561&h=432]

The Shirky-Masnik bureaucracy perpetuation principle

In well organized assaults waged by governments that work in hidden capacities to enforce and socially engineer a society through constant attacks on civil liberties, we frequently find useful idiots who willingly place themselves as obstacles to free speech, and especially, as obstructionist forces that ‘steal time,’ aka ‘time-thieves.’

these are situations where people will often seek to preserve a problem or a falsehood, rather than recognize that it doesn’t need to be that way. There are lots of industries where this is a major issue.
-Mike Masnik of Techdirt.com

Organized gang stalking is one such case where we see this at work-how bureaucracies work in “the gray area of law and social oversight” to prevent insight. This is best embodied in the common phrase that appears in the OGS dialectic “what is hidden” which some use because it is a Masonic/other symbolic speech, while others use it to flaunt their access to the many hidden technologies that I document herein, as well as their ability to abuse others in this capacity.
Obstructionism and OGS are Partners in Crime and Civil Consiracy
Techdirt.com does some of the most reputable, fearless, well written public interest journalism in the history of technology-and journalism. As such, while most MSM journalists cower(or put on their knee pads and slurp down some payola) in the face of the 72 Billion dollar per year NSA/CIA/FBI/DEA privacy rape machine, Mike Masnik, and the excellent writers over there have incurred their unfair share of  detractors.
And, as can be predicted, some of those detractors are little more than liars and punks who live in their mothers basements, and guys like Shiva Ayyadurai, who claimed he invented email. And gay robotic toilet slaves, like Peter Thiel, the guy who worked hard to subvert ALL democratic liberty via the Palantir/CIA/Google collaboration. Notably, Thiel has skipped town, and run off to New Zealand, where he is hiding out, no doubt doing “special work” for his corporate and military and CIA overlords.
In the fight to demolish free speech, the MIC and its DVIC handmaidens use every dirty trick, every crooked backdoor trick to obstruct due process and civil rights; but also useful idiots like Thiel and Ayyadurai are the  backup girls for the band of merry robbers who wantonly lie, cheat or steal to destroy the rights of others while getting filthy rich. They are the contrarians of logic, and the cock-block of free enterprise; and it begins with their pillow bitingly wimpish and vain, immature, fascist impulses, attacking pure speech and then, the free press.
SO it cannot be missed that these same are also on the forefront of the technologies that are currently accessing other peoples privacy via their “inventions, and imputing to those who they steal from “intentions” that are not only false, but aslo” classic Freudian projections, and in that light, they are also perverse voyeurs.
A world of smoke and mirrors indeed. From Techdirt.com, Mike Masnik scores a victory over Shiva Ayyadurai’s perversity, and his perversion and abuse of law:

Case Dismissed: Judge Throws Out Shiva Ayyadurai’s Defamation Lawsuit n

As you likely know, for most of the past nine months, we’ve been dealing with a defamation lawsuit from Shiva Ayyadurai, who claims to have invented email. This is a claim that we have disputed at great length and in great detail, showing how email existed long before Ayyadurai wrote his program. We pointed to the well documented public history of email, and how basically all of the components that Ayyadurai now claims credit for preceded his own work.
We discussed how his arguments were, at best, misleading, such as arguing that the copyright on his program proved that he was the “inventor of email” — since patents and copyrights are very different, and just because Microsoft has a copyright on “Windows” it does not mean it “invented” the concept of a windowed graphical user interface (because it did not). As I have said, a case like this is extremely draining — especially on an emotional level — and can create massive chilling effects on free speech.
A few hours ago, the judge ruled and we prevailed.

Now- an object lesson in how all of these companies-and then, their complete subversion of intelligence agents and agencies have the ability to destroy speech at the switch. Look at this paragraph below:

The Shirky Masnik principle states that bureaucracies will d anything to perpetuate themselves-anything.. And that includes using total sh!tbags like Ayyadurai, or his counterpart in institutional sociopathy, Peter Thiel-who was so mad that he was outed as queer by Gawker media that he sued it into the dirt and put it o ut of business. to subvert the very foundations of both free economies, and free democracies.

 
Do you see the paragraph -how convoluted and broken it is? This paragraph was written as this blog, and the computer it is written with, came under ‘attack’ by ‘unknowns’ and the browser froze, and Tor reported multiple “j-script’ malfunctions. And this, just one day after the same browser, on the same computer, was crashed using an attack I cannot identify-one where the browser opened repeated multiple windows until it was useless ( I could identify it, but I am still researching that particular attack).
You see- speech itself is under attack, by the multiple agents and agencies I describe herein, and that attack is at the site of the speaker, which is me in this case, but this goes on all across democracies everywhere, as the United States, working with the Five Eyes Alliance, and literally HUNDREDS of other agencies, NGO’s target speech itself, online speech, and all other media with disruption campaigns; in this case at the site of speech itself as I type into this blog.
I document this as well as note its psychological, and ‘real world’ effects here, but elsewhere too, I have records of these attacks, which are incessant. And in the “TI” community of gang stalking victims, this is an extremely common complaint, and dis-information agents can be found mocking TI’s with comments such as “yes, I have heard that TI’s frequently complain about sticky keyboards, e-mail theft, and computer hacking.”

In fact, hacking “target’s” is what the NSA and the rest are doing, as even the famous (and well funded) “OSI informers” has noted, alongside the fact that TI’s are also targeted with other nefarious attacks such as “porn deluges.” I have preserved a copy of the web page where OSI informers makes this claim, because frequently, the web gets “scrubbed” after I validate one or another fact or tactic of these hidden operators at our internet switches, and the thousands of programs that are trained on TI’s.
Here is a snippet of “OSI informers”claim/advice:
CYBER-STALKING

Cyber Stalking or Cyber Harassment is a related group of harassing behavior occurring via internet/online. Cyber Stalking includes, but is not limited to; Computer Hacking, “Trolling”, Spamming (Often including “Porn Deluges”, Verbal Assaults, Character Assassination, and Impersonations of the victim. Online harassment is a plank of the harassment protocol. If you have a website devoted to Organized Stalking you may have people emailing you to flame you, or claiming that they are victims & asking for support with the intention of discrediting you.

Now- I will rewrite the paragraph above as it was intended, but I note that my computer literally heated up to an extreme degree, and I was forced eventually to crash the browser, reload, and change settings-this is what is called a “social engineering attack” where hidden operators force the user to change behavior, aka “behavior modification.” And I note that while my computer is less secure in this second attempt to write this post, I can write easily now. See how that works? Seeing any patterns yet?
The Shirky-Masnik Bureaucracy Perpetuation Principle
The Shirky Principle forms the headline of the following piece of writing by Mike Masnik of Techdirt.com forms the Shirky-Masnik Principle stated as below describes how OGS online has become an institutional force,with offline consequences, and especially, how writers are targeted by morons with kewl toolz directed at us from ilitary bases, police and Fusion Centers, as well as NGO’s with dominionists, zionists, and Infragard rats working behind the scenes:

Institutions Will Seek To Preserve The Problem For Which They Are The Solution

by Mike Masnick

Filed Under:
business models, innovator’s dilemma, institutions, problems, solutions


from the the-shirky-principle dept

We already wrote a detailed analysis of Clay Shirky’s recent writeup on complex business models. However, a few of you have sent over Kevin Kelly’s recent post about Shirky’s piece that also compares it to Clayton Christensen’s Innovator’s Dilemma, but thankfully highlights the one key line in Shirky’s piece that may have gotten lost in the original:

“Institutions will try to preserve the problem to which they are the solution.”

Kelly calls this the “Shirky Principle.” To me, it calls to mind Upton Sinclair’s famous line:

“It is difficult to get a man to understand something, when his salary depends upon his not understanding it!”

They are not the same point, but they are related. In both cases, these are situations where people will often seek to preserve a problem or a falsehood, rather than recognize that it doesn’t need to be that way. There are lots of industries where this is a major issue.


Organized Gang Stalking case study: Real Estate, Rotary Club's and www.fightgangstalking.com

Bulletin: I have decided to continue to write at this blog on occasion, as day after day validates that OGS is a very real thing, and actual victims of this have written to me to share their stories (I have not published the accounts of those who I believe to be actual victims without their permission) involving all of the groups and tactics outlined herein.

Related: of the two studies that “examine” gang stalking, and both have recommended that those who claim it be isolated, shunned, silenced, and/or declared “mentally ill.”
And here is how one “community newspaper” has “framed”the narrative of OGS victims fighting back using the First Amendment- the irony meter explodes every time it meets OGS denialists and free speech rights. Especially note who the “badguys” are to that community, and to others who deny OGS:
“The flier that was distributed ” praises “patriots” such as Daniel Ellsberg, who released the “Pentagon papers” in 1971; Edward Snowden, who recently exposed thousands of intelligence documents; and Frank Serpico, a former New York City police officer who blew the whistle on police corruption in the late 1960s and early ’70s.”

And equally important to note is that these posts here, here, here and here have become integral to this narrative, and can be tested and retested against my many hypotheses. And, one of my many hypotheses is that the NSA et ass-hat has been telling us since forever that they are NOT spying on Americans-but targeted individuals and others have been telling us the opposite.
While I have not experienced rape or death threats from anonymous douchebags online or off for a few years now, or minor car burglaries since around December of 2016, or watched floating bubbles on my security camera’s that were placed there after being followed on Twitter by a retired liaison to a foreign intelligence service, or even had any new GPS signals emanating from my car (as tested with a LM-8 bug sweeper, which is one of the best pocket sized bug sweepers I have ever used), or experienced actual “24/7” daily stalking for nearly a year, it is important to note that this blog, and associated writings have been around for nearly a year as well.

[UPDATE 01/13/2018: Well, there were a few things after I wrote this post last year-maybe YOU can help me find my lost/stolen GPS?]

Do you see any correlations? Any causation/correlation errors? Any proofs of my many hypotheses about claims made by those who discuss online and offline gang stalking?
But without any rational doubt, targeted individuals have been telling us with increasing frequency that our government, working with five other “allies” and Israel-beyond spying on American citizens since 2001, is also waging targeted hidden campaigns of “psychological and influence operations” so that their domestic spying scheme never sees a court room challenge.

UPDATE 01/13/2018: Note that the FISA domestic Spying on Citizens bill has passed for another 6 years, as the NSA continues to target citizens tat it has been targeting since it first dumped piles of haystacks on citizens who knew what it was up to in 2001-13. And as Marcy Wheeler, aka emptywheel notes, the lipstick on the pig is not to be called anything but what it is-and what it HAS BEEN, since 2001:

THE SENATE INTELLIGENCE COMMITTEE 702 BILL IS A DOMESTIC SPYING BILL

And, Ms. Wheeler would also like to note that the NSA wants to reassure all the “good peeple” that “targeted individuals” are just the tip of the slippery slope,”
Oh, my-how rude and presumptuous and possibly sexist that I would attempt to speak for Wheeler- I will let her say it herself:

ON 702, NSA WANTS TO ASSURE YOU YOU’RE NOT A TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET TARGET

While legitimate researchers of organized gang stalking would find my thesis validated time and time again, cultists, secret societies, religious fanatics who hide in secular culture, and organized gangs of statist’s and institutional psychopaths will find no such correlations. Academic fraud’s will most certainly find a lack of correlation here as well.
But to continue my thesis: Here is yet another correlation straight from the coveted anus of the Sacred Cow that is Main Stream Media (MSM). It is YET ANOTHER correlation between claims of “organized gang stalking” and “real estate,“which comes to me from www.fightgangstalking.com
In this case of “the Guilford CT Gang Stalkers,” we see once again that real estate related organized stalking, OGS and policing mix together in the toxic brew of secret, occulted, hidden and obscured un-Constitutional harassment, and we also find a real estate developer, who also “coincidentally” is Rotary Club member. I must point out that in the general literature of psychology, coincidence is often mistaken as a feature of delusional thinking. However, any historian, sociologist, or propagandist instantly recognizes the correlation between real estate red lining and coincidence, or KKK activity and coincidence, but also how it is a well known feature of cult activity and religious superstitions. Atheists, secular humanists and rationalists-and many Libertarians for some reason- seldom are obstructed by these last two major hurdles that psychology-by some coincidence-cannot seem to overcome.

Related Story: How the worlds most famous coincidence-the relationship between psychologist, Sigmund Freud and his nephew, the world’s greatest propagandist Edward Bernay’s literally mind-controlled much of the last century much like the NSA-to-Israel-then-to-FiveEyes Alliance is doing today

As I have noted and written about before this is ALSO directly correlated and substantiated in many cases of  OGS. Note especially that the local police are actively working to discredit “whoever” it is that is distributing fliers about OGS that they obtained from the website mentioned above.
Without irony (if this is still possible at this point), also note the following: a whistle blower is being called “anti-government,” and this likely due to the DHS thought and word policing aka the “terrorist threat matrix” which targets pure first ammendment activity by design; and that whistle blower is being “framed” as a threat, rather than as a concerned citizen. Are you seeing any more correlations, kids? Yeah?
Well that’s interesting. Those who derive their income from carefully phrasing what is or isn’t; who is or who isn’t a “threat” can’t seem to find correlations! And even refutation is perceived as a threat. Seeing a pattern there, with the “silencing” and “isolating narrative? No? Then look a little harder. Maybe take a look at the DHS “badwerdz” list.

Guilford Police Investigate Anti-Government Fliers In Mailboxes

July 04, 2014|By DANIELA ALTIMARI, [email protected], The Hartford Courant
GUILFORD — Police are investigating anti-government fliers left in hundreds of mailboxes throughout town over the past two months.
The fliers refer to “gang stalking” and direct recipients to a website that likens U.S. intelligence agencies to the Stasi, the former East Germany’s secret police agency.

“This neighborhood has an ongoing ‘gang stalking’ operation involving covert surveillance and harassment of targeted individuals,” the flier reads.
The website, FightGangStalking.com, professes to expose “the use of illegal counterintelligence tactics against American citizens by U.S. intelligence and law enforcement agencies and private security-intelligence contractors.”
It praises “patriots” such as Daniel Ellsberg, who released the “Pentagon papers” in 1971; Edward Snowden, who recently exposed thousands of intelligence documents; and Frank Serpico, a former New York City police officer who blew the whistle on police corruption in the late 1960s and early ’70s.
Guilford police Det. Martina Jakober said Friday that versions of the fliers began appearing in mailboxes about two months ago, prompting complaints.
Among those filing a complaint was Tony Fappiano, a local real estate agent and a member of the town’s board of ethics. The flier suggests that Fappiano is the “gang-stalking” coordinator and instructs those concerned about the operation to contact him.
The flier also suggests that Guilford police department may have sanctioned the alleged “gang stalking.”
Jakober said neither Fappiano nor the Guilford police is involved in any such surveillance or stalking operation.
Fappiano, who has served on a number of municipal panels, said on Friday that he has no idea why he was mentioned in the flier.
“I’m in business 41 years in this town. … I’m a former member of the economic development commission. Why somebody is targeting me is beyond me,” Fappiano said. “I had nothing to do with it and I look forward to meeting the coward that started this.”
Jakober is investigating whether the fliers constitute harassment. Also, by law, only stamped and metered mail may be placed in a mailbox, so the placement of the fliers in residents’ mailboxes is a violation.
Anyone with information about the fliers is asked to call the Guilford Police Department at 203-453-8061 or the anonymous tip line at 203-453-8240.

Any legitimate researcher of OGS will also connect immediately with other parts of my thesis-that “homelessness” or the threat of it is also a constant here as well.
Did Edward Bernay’s REALLY die, or was he absorbed into the Panopticon?
So if there were “gang stalking BINGO,” such as the case of the argest DNA exoneration in history which vindicated six people who were LITERALLY mind controlled so badly that they STILL have Stockholme Syndrome-but sued the pants off of that city and won 30 MILLION DOLLARS, then this would be a good second place candidate for having B-I-N-G——O.K.
Let’s recap, kids:

  1. real estate
  2. police running disinformation
  3. free speech-speaking up about your targeted harassment is demonized
  4. an individual claimant is villified
  5. isolation is suggested as a cure
  6. Rotary Club/secret societies involved
  7. us-versus-them, goodguy’s-badguy’s binary
  8. homelessness is an under current
  9. information/influence operations in local media
  10. lot’s of mysterious “well who knows fer sure?” and “can you prove it?” and “This guy’s a threat, likely delusional!” and so on
  11. in group, out group inter-relations
  12. hidden/occulted relationships working behind the scenes against an individual
  13. hmmmmm. What might 13 be? Oh Yeah! Disinformation spread through official channels…no wait, um……

Disclaimer: I make no opinion or otherwise make a statement about the individuals involved in this case, but rather, document these as indisputable facts, and actual proof of how “gang stalking” exists in the narrative of modern culture, and how it is interwoven between the powerful, and how it hamstrings the powerless.
Here below is the realtor mentioned in the article-note the associations that I have discussed above, and especially-again, without irony-note that he sits on the local “ethics commission” too!:

Anthony Fappiano [linked in here]

Owner, Shoreline Real Estate Company

Greater New York City Area
Real Estate
Current
  1. Shoreline Real Estate Company
Previous
  1. Guilford Ethics Commission,
  2. Ct Assoc of Realtors-Legislative Committee,
  3. Guilford CT Rotary Club
Education
  1. Univ of Connecticut

Organized stalking and Five Eyes Alliance, disruption, online mobbing, and database abuse: documenting OGS with evidence

Most of those who write about OGS mention that they are frequently the targets of specialized internet harassment that takes various, often personalized forms*. There is the standard theft of email, sometimes as one writes it; there is the recurrent and constant theme of computers being hacked; and online manipulation of speakers who use words to communicate ideas to others, like we see with the outed JTRIG harassment-but the NSA/FBI DITU and military orgs, often working hand in hand with zionist hasbara roaches from Israel are all in on it, trying to censor and manipulate and control online dialogues, and targeting individual speakers.
And, similar things went on in Germany just before the Holocaust as well, with zionists involved at every level. In fact, everywhere you look, these religious fanatics are implicated by even the MSM. Here, the Daily Beast notes that a religious fanatic from Jews for Jesus torched the mosque of the shooter after the Pulse nightclub shooting, and like many of these types do, they also used religion as their basis (click the link- the firebombers statements are telling). So, any keen reader will note that my thesis of fanatical religions-whether Jewish or christian or one or another cult or sect-religion being key to the OGS narrative is validated, over and over.
And speaking of Israeli mind control and cockroaches, and how religion and those who practice it use all forms of coercion and bulying, even invading the heads of it’s targets, with memetc neuro fasciitis- there’s this, from Haaretz:
Israeli Scientists Unlock Secret of Mind Control — in Zombie Cockroaches: Now we know how the jewel wasp turns the bugs into helpless living nurseries.
read more.
But let’s first have a look at the catalogue’s of spy tools that these institutions are using on unsuspecting citizens. And you can imagine others have these tools as well:
The Electronic Frontier Foundation catalogues  NSA spy tools aimed at us AND them-whoever “they are” since “they” became “us too”:https://www.eff.org/files/2014/01/06/20131230-appelbaum-nsa_ant_catalog.pdf

How the CIA spies on you through your TV, and more: https://www.wired.com/2017/03/cia-can-hack-phone-pc-tv-says-wikileaks/

Renowned security guru Bruce Schneier has the British spies catalogue of tools: https://www.schneier.com/blog/archives/2014/07/gchq_catalog_of.html

One of the ways that the claims of TI’s can be tested-one of the simplest ways actually- is for any researcher to merely write a blog about OGS. Then, use the key words “organized gang stalking,” “gang stalking” “targeted individuals,” and any of any number of keywords that PRISM and XKEYSCORE, and their specially trained, biased and calculatingly and deviant religious analysts are targeting.
You will have more rapid results if you mention the fact that the US Department of Homeland Security gives special black budget money into the hundreds of millions to zionist-Jewish groups and organizations affiliated with the Anti-Defamation League, which they use for organized stalking.
Or, if you mention the fact that the FBI is basically a zionist and cult-controlled organization that has benefited from illegal ADL spying operations for generations, and those hidden campaigns of domestic terror/spying are waged by any of a number of fanatical cults and religious sects in America, with the net results being “anonymous tips” from well known informants.

For example-in the summer of 2016, there were two high profile mass shootings, and each one of the shooters shared the fact that one of the many radical sects of radical zionist hatred, called the “Messianic Jews” were involved in workplace mobbing before these events took place. In these cases Sayed Farook who was taunted about religion bullied in the work place by Nicholas Thalasinos, -and the mosque of Omar Mateen, the Florida shooter, was burned by a Messianic Jew from “Jews for Jesus” after the fact of his alleged shooting.

But where were the NYT headlines screaming about this form of domestic terrorism? There weren’t any, because aas I have noted, Jewish-christianity is the cricket, with the worm in its head.

It is also not a stretch to note that these same zionists not only helped create Hitler, but they shared similar goals and killed millions of people (which is ALWAYS the shared goal of fascists, communists, and globalists who are in fact all Fabian Socialists), while using other egregious forms of database abuse, like the IBM punch cards that were used to round up gypsies, dissenters, the mentally ill, and many other categories of people.

Then, link that blog to any substantive conversation about warrantless surveillance, criticize this system of targeting pure speech online (and in our own ‘private’ emails), or criticize the plausible deniability and unaccountability built into this system, and especially criticize any law enforcement body in any of the 5Eyes nation-states, and watch the fireworks begin! Your blog will suddenly become the darling of the Five Eyes nations as the UK, Australia, New Zealand (have a look at what and WHO is in New Zealand now),Canada, and the US start to hit your blog up EVERY DAY, 20-50 hits per day.
You will note that they key in to certain posts and pages that mention their culpability. This blog here is a recent favorite of some who read these specific posts below, nearly every day, in this order-and you can test these results yourself:
1) Gang stalking, Mormons, FBI/CIA recruitment of same
2) Gang stalking and punitive psychology
3) Gang stalking and the Martha Mitchell effect and influence operations; or how retired LEIU members act as auxilliary LEO’s, often outside the law-and as para-judiciary inluencers of the legal process.
4) the CIA and phone hacking/NSA mass surveilance of citizens/ crisis PR counter-narrative about OGS
5) Any post that criticizes, implicates, or indicts LEO’s as particpants in OGS
6) Any post that implicates military involvement in OGS
7) you will especially note that avid readers who target posts about how the surveillance state is a Panopticon especially seek your personal information/contact info/biographical data, and most of THOSE readers from military bases and so on.
In my experience, it takes about a week to ten days before the FiveEyes nations and their many web crawling, word hunting,speaker targeting data analysts, or targeted search bots/Palantir/Media Sonar/etc or any of a number of retired LEIU types and Israeli “mind controllers,” or just plain odd people who are immersed in the even-more-odd disinformation dialectic of the “paranormal” find your blog.
Then, kick your feet up and watch as your email accounts get broken into or your internet gets redirected, and your online life becomes “redirected,” or stalked even by identifiable operators( usually those who follow your blog are affiliated with the groups mentioned above). I advise that you do all of this “anonymously” within reason-but also advise you to use Tor as a research control, just so you can see how easily it is subverted. And then, do ‘timing attacks’ against your own blog using Tor as a control, and your own blog as a subject. Note how slow your blog/s load/s now-or especially, how when you type, your posts begin to drop letters here and there as if your keyboard is full of peanut butter, or cracker crumbs-or screen cast across a Fusion Center control room, or to a couple of squad cars up the block.
Use Tor on one browser, and then use several others- you should find that Tor will be ‘crashed’ frequently AFTER they find your blog, but NOT BEFORE. And, you will find as described above with the ‘suddenly sticky keyboard,” and more. Also, AFTER they find your blog, you will note that Tor loads incredibly slowly, and that frequent time-out errors will occur. Further, if you publish over Tor, you will find it to then be a target of other exploits from the Metasploit toolkit. Teardrop attacks are common, and timing attacks that crash the browser and then time your reconnection to both the internet and your blog-which also leaves your ‘cookie’ and sign in data floating about cyberspace are among the most common attacks.
And-if any of your (hopefully, deliberately anonymized and obscured) blogs become targets of this extra special attention, extra-legal, extra-judicial attention, notice also “what they are reading” across your blogs-that the subject matter frequently seeks to develop a “profile” of the writer as certain posts that contain “personal” information are pieced together to form a parallel constructed “you” in the mind or the dossier of an analyst, investigator, or agency black ops practitioner.
Test it yourself, and prove me wrong-after all, the “pro’s ” and professional activists present a unified front that OGS is a myth- a symptom of mental disease; an indicator that MORE isolation and discrediting is needed to contain the dangers of the world finding out about this practice that benefits those who practice it! So prove me wrong-if you can.
But I have found these things described above for over a decade (as have others), using multiple blogging platforms, multiple computers, from multiple states, countries and localities ranging from communist countries to countries that thrive on mob hush money, to here, in “the land of the free (lol)”and using multiple word/phrase selectors.
These terms and subjects I discuss above are the quickest, and most replicable to get the results I describe, but you can find your own.
The net result is a simple and can be replicated, and prima facie evidence that gang stalking is real in the sense that it triggers both PRISM-like bots and humans, but also triggers intense scrutiny and malfeasance: it is prima facie proof that CERTAIN speakers are targeted, and then harassed, or blog-stalked in the very least, and others are not.
In the US, this means that a pre-judicial mechanism of “denial of equal protection” under the Constitution is in effect at a baseline of un-Constitutional government conduct (and really- most Silicon Valley startups from Google to Twitter and Facebook are ALL funded with seed capital from the CIA, and fully interactive with NSA/CIA/DIA/FBI packet capture/black operations via the internet ‘backbone’/influence operations/redirection/code injection/ at ALL times).
Lastly, I would like to point out another fact of OGS: if and when the writer reveals their actual IP location, or actual contact information, they will also be able to document “web interception and redirection” in a variety of ways. This story herein covers that. I bring this up, because upon the discovery of writers and others who document OGS, the Five Eyes then entraps the blog off shore, or on a server that cannot be traced back to them directly-that hose who work in these intelligence collection hubs ‘contain’ or entrap’ the blogs so that further black ops/surveillance/timing attacks/code injection can take place.
And this too, can be monitored, and data collected to document that OGS online s indeed a “real thing” and evidence of same accrues as soon as a researcher follows the steps outlined above.

  • some things are just TOO predictable: as I wrote this post above, online-live- I was cut off the net, and the AP that I was using disappeared, replaced by several that are unfamiliar to me, or the location from where I blogged this post. I could not log back in because the AP I used( from a well known corporate coffee shop)completely disappeared. You just can’t invent some things. I ket sceen captures, but I do not have an anonymizer to strip the meta-data from those. But you can test this scenario yourself as well.

Organized gang stalking, Scott Crow, disinformation and informants.

Scott Crow, an anarchist, animal rights activist, has gone on record stating that organized “gang stalking is bullshit,”which is alright- because everyone is entitled to an opinion. And as they say, even assholes have those. Opinions, of course. And, I guess for some, it’s easier to love fuzzy or feathered critters and act like cute, four year old anarchists with lil’ diapies full of doodoo, than to deal with the real issues of gross human rights abuses of corporatism colluding with a full blown surveillance/security state to do things to people that were unimagined at the height of America’s last Constitutional crisis of the 1960’s (click here to see the catalogue of surveillance gear available to LEO’s who spy on American citizens without warrants).
But to the hundreds of thousands of people world wide who claim to be harassed by unknown assailants, various electronics ranging from wiretaps and StingRay towers, cell phone emulation, and sound weapons (what’s that clicking on my phone?!), and stalkers- lots of stalkers who do plainly weird shit called street theater- the evidence is against Mr. Crow’s opinion.
There is ample evidence of religions and cults that stalk people; evidence that the intelligence agencies and some really bad  LEO’s stalk people; retired LEO’s stalk people, the USAF and Naval NCIS working with the CIA and others stalk people; a HUGE well heeled operation of conformity enforcement run by the OSI and there is sh!tloads of evidence that it is part of a large, orchestrated crisis PR movement. And of course, every crisis PR movement needs useful idiots, who are just glad the pendulum missed their neck.
Scott Crow.org, on gang stalking:

In the last couple of years I became aware that I have accidentally become the poster child for a marginal, but rising movement.   It’s a movement of the disaffected, and somewhat marginalized in civil society. And like all of us its made of those alienated by the ills of capitalism: our atomized communities,  the overwhelming media (online and corporate) that can reverberate any idea into truth and the growing overwhelming complexities of our social and political spheres.  There is also another important piece that I have to throw into this cauldron that has given rise to this movement too; the farce called the war on terror and its all ensuing baggage of the surveillance state. Sounds intriguing doesn’t it? If you guessed I was talking about anarchy, social justice or even LOLcats you would have guessed wrong.  What I am referring to is an internet phenomena called gangstalking and somehow my surveillance by the FBI and Joint Terrorism Task Force for almost 9 years became the actual proof they all needed to say they were right all along; that they weren’t just paranoid.  Except I wasn’t gangstalked.

Related Story: The famous Civil Rights photographer Ernest Withers-who photographed ALL of the black leaders of the 1960’s, was a paid RAT. Bonus points if you can answer the question: And WHY was this guy at the hotel where Martin Luther King was shot dead?
SO- make of Scott Crow’s opinion what you will, But psychologists and other paid disinformation agents who both benefit directly from drug companies and privatized prison payrolls, and those who work with schizophrenics and sex offenders have even waged a classic “black propaganda” campaign to discredit those who claim they are harassed.
I DUNNO. MEBBE They is all caaaaraaaazy. Or not.
Either way? Any scientist, sociologist, intel agent, or crisis PR moron can take the data provided in this blog and test the many proofs and hypotheses themselves, against historical events like COINTELPRO, and the destruction/co-option of the peace/anti-war/Civil rights movement. You can look for- and find- the evidence that I provide herein-and replicate the methods, and find new validation yourself. I have merely provided a starting point.
But it boils down to this: people like Scott Crow, who was followed, surveilled and harassed by the FBI in what amounts to a fairly traditional investigation of a fairly pasty white traditional ‘suspect’ claims OGS is “total bullshit.” I mean-after all- animal rights people are startlingly quiet about warrantless surveillance, human rights, prison reform, and how the targeted, flawed and sociopathic Countering Violent Extremism programs work with local LEO’s and private security contractors to terrorize TI’s into complicity with snitch culture.
You don’t have to believe me- ask an actual RAT, Greg Monteilh, former FBI informant, about the “murky” practice of “flipping” innocent people into becoming agency informants-from the Guardian UK:

The ex-FBI informant with a change of heart: ‘There is no real hunt. It’s fixed’-Craig Monteilh describes how he pretended to be a radical Muslim in order to root out potential threats, shining a light on some of the bureau’s more ethically murky practices….(follow the link to learn more).

Just off the top of my internet, I can think of these many many validated tactics below that are reported by TI’s. And these days, as the NSA shares data with 16 other intel agencies and targets American citizens, it ain’t gettin’ any prettier out there without due process (even if Mr. Crow thinks it’s all bullshit, some of us still believe in Constitutional Democracy. And Mr. Crow and his pals- most of them animals- don’t read the Constitution anyways.).
A short list of what the NSA et al is doing to American citizens BEFORE they turn the data over to the local LEO’s-from Brian Lehrer-and ask yourself how YOU would feel with this arsenal pointed at YOU, personally:
THE NSA CAN:

  •  track the numbers of both parties on a phone call, as well location, time and duration. (More)
  • It can hack Chinese phones and text messages. (More)
  • It can set up fake internet cafes. (More)
  • It can spy on foreign leaders’ cell phones. (More)
  • It can tap underwater fiber-optic cables. (Clarification: Shane Harris explains that there were reports the NSA was trying to tap directly into cables using submarines, but is now more likely trying to intercept information once it has reached land.) (More)
  • It can track communication within media organizations like Al Jazeera. (More)
  • It can hack into the UN video conferencing system. (More)
  • It can track bank transactions. (More)
  • It can monitor text messages. (More)
  • It can access your email, chat, and web browsing history. (More)
  • It can map your social networks. (More)
  • It can access your smartphone app data. (More)
  • It is trying to get into secret networks like Tor, diverting users to less secure channels. (More)
  • It can go undercover within embassies to have closer access to foreign networks. (More)
  • It can set up listening posts on the roofs of buildings to monitor communications in a city. (More)
  • It can set up a fake LinkedIn. (More)
  • It can track the reservations at upscale hotels. (More)
  • It can intercept the talking points for Ban Ki-moon’s meeting with Obama. (More)
  • It can crack cellphone encryption codes. (More)
  • It can hack computers that aren’t connected to the internet using radio waves. (Update: Clarification — the NSA can access offline computers through radio waves on which it has already installed hidden devices.) (More)
  • It can intercept phone calls by setting up fake base stations. (More)
  • It can remotely access a computer by setting up a fake wireless connection. (More)
  • It can install fake SIM cards to then control a cell phone. (More)
  • It can fake a USB thumb drive that’s actually a monitoring device. (More)
  • It can crack all types of sophisticated computer encryption. (Update: It is trying to build this capability.) (More)
  • It can go into online games and monitor communication. (More)
  • It can intercept communications between aircraft and airports. (More)
  • (Update 1/18) It can physically intercept deliveries, open packages, and make changes to devices. (More) (h/t)
  • (Update 1/18) It can tap into the links between Google and Yahoo data centers to collect email and other data. (More) (h/t)
  • (Update 4/2) It can monitor, in real-time, Youtube views and Facebook “Likes.” (More)
  • (Update 4/2) It can monitor online behavior through free Wi-Fi at Canadian airports. (More)
  • (Update 4/2) It can shut down chat rooms used by Anonymous and identify Anonymous members. (More)
  • (Update 4/2) It can use real-time data to help identify and locate targets for US drone strikes. (More)
  • (Update 4/2) It can collect the IP addresses of visitors to the Wikileaks website. (More)
  • (Update 4/2) It can spy on US law firms representing foreign countries in trade negotiations. (More)
  • (Update 4/2) It can post false information on the Internet in order to hurt the reputation of targets. (More)
  • (Update 4/2) It can intercept and store webcam images. (More)
  • (Update 4/2) It can record phone calls and replay them up to a month later. (More)
  • (Update 6/2) It can harvest images from emails, texts, videoconferencing and more and feed it into facial recognition software. (More)

Did we miss any? Mischaracterize any capabilities? Let us know in the comments, or tweet @brianlehrer.
Suuure. It’s all bullshit- yeah, that sounds about right. Yup-keep your head up your ass, play it safe, m’boy. “They” are prolly all crazy- no electronics involved at all. Nothing to see here move along now….
 

The Military Industrial Complex (MIC) is the domestic partner of the Domestic Violence Industrial Complex(DVIC), and OGS is sign of a deteriorated society in total capitualtion.

The wet dream of all intelligence agencies is to have total control of ‘the masses.’
That is well documented, everywhere. And today, the have begun a program to stalk your children from cradle to grave, as NSA analysts sift through your child’s every online thought, picture, and personal detail, often in real time. But before they do, they often sift through the parent first, and leverage them in ways that only Hitler, and Stalin have done in recent memory; mass surveillance is soft force eugenics in practice, as they can now ( and do) redirect conversations, relationships, and more in real time.
At first glance, the NSA/CIA/FBI mass surveillance scheme of 24/7 secret, chronic, pervasive warrantless spying that has been unleashed upon America and other western nations has little to do with well intentioned programs that combat violence against women, or programs that assist families and children. After all who could argue that these initiatives are in themselves violent, or part of a larger pattern of institutional violence that has had the net effect of waging war on American’s, their families, and their children. And certainly, any person who would make such correlations will be met with one or another form of the meme “What-do you beat your wife?”
beat your wife
It is this last question which was preceded by another more nefarious question that was never really asked in the pre-DVIC era, but which was overlayed upon men and fathers regardless, and contrary to all evidence as a form of ritual defamation: do you beat, rape, molest or otherwise harm your children?
An the implication then was that fathers are dangerous-an mothers safe and secure. But the reality is that the surveillance state was built on the forced march of the absence of fathers, and women whose complicity with endless MIC purposes fully subsidized.
Destroy the family, you destroy the country
The quote above is frequently attributed to Vladimir Lenin, the Soviet strongman, but this attribution isn’t validated by evidence. Regardless, the quote DOES apply to globalists, whose goal is exactly that as they smash Jews against Jews, and blacks against whites, women against men; fascists against communists as we saw recently in Charlottesville VA, because there goal in the Hegelian dialectic is simply to profit.
The destruction of marriages, and families is what provides properly angry, properly gendered an aggressive, low IQ, low status individuals to the Military Industrial Complex, which in turn, is related to the Domestic Violence Industrial Complex, as some 60% of military members come from broken or multi-family homes. It is this upon which our country has been leveraged, one against another, father against mother, and women against men in an odd, primal state of affairs that all but ensures a lack of real morality, an in its place a pseudo ‘God mother and Country’ ethos-the ethos of ignorance an true immorality.
We shall see that these programs of DV have EVERYTHING to do with mass surveillance, as the first ‘victims’ of the double entendre’ of DV were men who resisted the false narrative of DV, and then became victims of social engineered domestic terror, losing their voice and their ability to resist the coming police state.
Marriage- what a quaint notion from an earlier era. Today, it is indisputable that relationships between men and women are in jeopardy-and that the institutions of family and home-the domestic environment- have become so eroded that the courts, social workers, cops and lawyers and judges have become the de facto relationships that American’s are encouraged to have, in lieu of marriage, or even healthy cohabitation arrangements.
This blog examines the “why” is it that people are discouraged from each other, and then, usurped into the larger narrative of DV and it’s associated industries.And the answer might surprise you: attacking marriage, relationship, home and family is a profitable industry backed by some seriously well heeled public relations campaigns.
False Morality as usurper of true morality: How gender, and the CIA Mockingbird MSM has built the foundation of social deterioration, via OGS and propaganda.
Have a look here an take note that the general way in which the media and the social engineers behind the media routinely portray “relationships,”as women are trained to see men as jerks: http://elitedaily.com/dating/subtle-signs-youre-a-jerk-magnet/1911558/
And here are a few more below-note how the MSM encourages women to use denigration and humiliation, and every manner of micro-aggression to describe, examine, or manipulate men, and to ‘frame’ relationships:
Men are narcissistic pricks: http://elitedaily.com/dating/fall-in-love-someone-never-love-you-back/1912273/
Just settle for one-cuz they’re all jerks: http://elitedaily.com/dating/guys-date-suck-at-being-single/1894983/
Yup- they’re all jerks (but get that baby and feed it to Uncle Sam’s ever hungry cannons, because it’s incentivized): http://elitedaily.com/dating/pros-cons-dating-a-jerk/1892195/
This blog attempts to explore the many connections between legal fictions, legal activism, social policies, social engineering, psychology as a tool of mass population control;  propaganda, industries, war, prisons, baby farming, competitive birthing and many more topics. And I attempt to point to an epidemic of apathy and hidden institutionalized objectification and its resultant brutality that has led us to where we are today in a surveillance state, and the situation where the creeping OGS is the disease.
But what are these connections? Hopefully, you find that this blog explores that question, and points the reader in the direction of making sociological, psychological, ideological and other necessary correlations between the newly emerged surveillance state, the complete dismantling of our Constitution that started at the secretive courts and secretive unconstitutional practices of the family courts and the gray areas of rape shield laws, and the FISA court today; and the accompanying due process rights violations that are the norm today, as domestic violence (DV) has been shown to be a double entendre’ that depends from partial truths, and outright domestic terror waged in the name of “the women and children.”.
Mass Surveillance: Now, the MC can look directly into your child’s bath tub, and begin to for it’s mind. Here is a link farm of NSA surveillance abuse-and yes, the DO look a pictures of your kid in the bath tub:
NSA Domestic Spying Abuse: Why you should be outraged about mass surveillance abuse http://blogs.reuters.com/great-debate/2015/05/11/if-youre-not-outraged-about-the-nsa-surveillance-heres-why-you-should-be/
Link farm:
Journalist Michael Hastings, probing the NSA and CIA domestic abuses of American’s, is killed in fiery crash: https://www.thenewamerican.com/usnews/crime/item/15929-journalist-probing-nsa-and-cia-abuses-dies-in-mysterious-crash
Electronic Frontier Foundation
Ongoing, updated ACLU coverage of the NSA/CIA/FBI domestic abuse of data, and citizens: https://www.aclu.org/issues/national-security/privacy-and-surveillance/nsa-surveillance
Electronic Frontier Foundation NSA spying abuse link farm: https://www.eff.org/nsa-spying
Nobel Prize winning writers against NSA abuse: http://www.huffingtonpost.com/2013/12/09/nobel-writers-nsa-_n_4414951.html
NSA abuse is the rule, not the exception: https://www.thenewamerican.com/usnews/constitution/item/16337-nsa-revelations-prove-abuse-is-the-rule-not-the-exception
NSA breaks the privacy rules thousands of times per year-that we KNOW of: https://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html
Why we have the fourth amendment: http://www.washingtonexaminer.com/nsa-and-how-the-fourth-amendment-stops-government-abuses/article/2565387
Bloomberg News http://www.slate.com/blogs/future_tense/2013/08/23/bloomberg_report_nsa_employees_have_deliberately_abused_their_power.html
NSA- A history of Abuse: http://www.freedomworks.org/content/nsa-domestic-spying-history-abuse
Cato Institute link farm: https://www.cato.org/nsa-abuses
Techdirt.com Link farm:
https://www.techdirt.com/articles/20160420/06055234219/fisa-court-still-uncovering-surveillance-abuses-nsa-fbi.shtml
Running list of NSA abuses:
http://www.wnyc.org/story/running-list-what-we-know-nsa-can-do-so-far/
NSA employee’s spying intimately on women: https://www.theguardian.com/world/2013/sep/27/nsa-employee-spied-detection-internal-memo