Guest Post from 4rec3s: Gang stalking and artificial intelligence-a world of false positives and death

This essay is based on this post on the Boingboing article, “NSA and GCHQ’s crappy Big Data techniques may be killing thousands of innocents”, which reminded me of a video of a robotic drone-death art installation that really puts this killing into a particularly inhuman perspective.

Notice: This essay does not deal with ‘electronic mind control’, drugging, ‘creating alters’, V2K or paranormal. All these links are from mainstream sources and my purpose is to glue it together as a feasibility of how gangstalking could happen with existing, known technologies. Namely social psychology, HUMINT-based pattern prediction, ubiquitous surveillance and communications.

Gangster Computer God
Every day, increasingly, our reality is validating Francis Dee’s racist, paranoid, schizophrenic prophecy of the “Gangster Computer God Worldwide Secret Containment Policy” as less fiction and more fact (sans the mullatto-jew robot doctors). More fact because it’s become feasible (except for the cosmetic surgery).
Mass surveillance innovations[1][2][3][4][5]), purposeful efforts and accomplishments[6][7][8][9]; a drive towards total information awareness[10] and such compelling integration of technology leading to a Panopticon[11][12], creates a situation in which a system could be devised capable of data-mining and heuristic pattern-of-life analysis of all citizens[12]. Coupling such a system with astoundingly capable AI technology; an extreme willingness to help (and profit motive) by industry[14][15]; an hegelian (‘ends justify the means’) ethos quite contrary to that of Christianity, secular humanism and altruism generally[16][17][18][19][20]; and “machine learning algorithms”[21][22][23][322]; form the constants of an addition equation that yields the very real possibility and therefore threat of an worldwide, technocratic, AI-based Gangstalking system.
Requirements and Purpose
The only requirements are paranoia and an utter lack of trust of the Government towards the global everycitizen[24]. In other words, “to shut down a political enemy by gaslighting[25][26][27][28] them to the extent that they end up in jail or in a mental facility”. There may be other incentives however:

  • Random harassment ‘like a game’
  • Targetted harassment of non-threat ‘undesirables’
  • Spiritual warfare ‘to demoralize the population’
  • Human / Social experimentation
  • Data collection efforts (pushing people around to see where they go / with whom they talk in ‘crisis’ mode)
  • Psychopathologizing an individual through trauma-based mind control—to develop them as asset
  • Playing both the targetted individual and deputized stalker against each other. Why is the TI the only victim?

All Watched Over By Machines Of Loving Grace[29]
Consider the following scenario.
1) You have an AI program that is hooked up with mass surveillance and has decades of social psychology to understand how humans work (HUMANINT + psychology/sociology, ‘game theory’, ‘prisoner’s dilemma’, ‘milgram’s’)[30].
2) The AI program finds ways to manipulate people (stalkers) into ‘being at a certain place at a certain time’, ‘to look out for a certain individual’. Perhaps they’ve been getting fed emails from a “protected’ or ‘authoritative source’ (AI::outreach), someone from an intelligence agency for example, that has ‘deputized’ him/her, to help assist them in tracking down ‘an alleged (serial killer / pedophile / drug dealer / murderer / stalker)‘ in the community. This person then is notified to go to a certain place and ‘watch out for’ this disreputable / potential criminal.

Everyone wants to be a hero. All that is required is exploiting our vanity.

3) This AI program has a deep knowledge of everyone from mass surveillance[1][2][3][4][5]). Enough to ‘predict behavior’ and generate a deep, heuristic, ‘life pattern’ analysis[1][2]
4) The AI knows when you leave your home, when you take a shower, approx where you are located and headed using your cellphone’s gps/wifi and cell tower triangulation sent back to servers. Also, if the AI has access to NRO satellite data, they can actually see you, with a potential resolution of 50 cm2 to 1cm2 (drone)!!
5) Using the ‘pattern of life’ and seeing that you left your home, it can send email / sms / skype / facebook / twitter / foursquare / ‘other’ instant messages to various ‘deputized’ community citizens to ‘watch you’.
6) The targetted individual is now under humanint field surveillance by people who have been tricked, duped with disinformation into thinking they are doing good, protecting the community.

Con Game, Not Mind Kontrol
None of this requires mind control. All it requires is panopticon, vain authoritarians as ‘faux-insiders’, and a highly-available communication network with dynamic asset development and appropriation software.
If this is happening, it’s immoral and abusive and it’s also lacking in manners. Military-industrial aristocrats are supposed to have manners and respect. After all, their guarded culture demands those things. But their development of rights-destroying, ‘tough guy mafioso abuses’ reveal the ruling class as irresponsible, lacking a keen foresight into consequence they claim generally has guided their successes in life and which differentiate them from the masses.
Their lack of manners has created an uncouth robot that reduces everyone to numbered accounts in a microserfdom. This robot is going to mix up the salad fork with the dinner fork, which is a metaphor for ‘killing everyone’—it’s a matter of time before it’s discernments become so specific that everyone, poor and rich alike, need to be subject to ‘quantitative easing’. And that’s too is a metaphor, for this.

Is gang stalking online real-can "they" actually track my machine as I surf over Tor?

The short answer is, if you have been reading this blog and missed the memo that said “YES THEY ARE TARGETING, TRACKING, GEO-LOCATING, MONITORING, INFLUENCING, and OPERATING on you, your internet connection-and the mind that is using that connectionlike mad scientists at every moment, every time you are online!!!”-then you clearly ARE CRAZY, as some have suggested about “targeted individuals.
This is what I call “feminist jurisprudence” aka “communitarian/community policing.” It cannot be missed that there is a clear ideological link between OGS complaints and elderly white females in technology, politics, the judiciary, or in policing; but especially in the transnational Octopussy that we know as the Panopticon and its attendant plots, political manipulations, and influence/mind control/compromise/blackmail schemes and covert operations.

Related Stories: The Association of Threat Assessment Professionals (ATAP) has linked itself to both gang stalking, AND political /punitive psychology.
More hilariously, the Washington State Fusion Center distributes “mind control” documents to the press, as the Department of Homeland Security renovates the famous “mind control ” facility once occupied by CIA funded doctors who forced patients to take the illicit drug LSD, and unethically tortured children and adults with debunked electro -shock “therapy “.

And worse, they are using the local police, and Fusion Centers, aka, “the domestic spying on citizens apparatus”and the Hegelian conflict oriented communitarian policing scheme to literally cause learned helplessness and fear, in order to enforce conformity, as Fusion Centers (all of which are well hidden, and all 77 have different names across the country) direct resources at “non-conformists.”
Extra points for noticing the number 77 has “mystical value” to religious fanatics, Masonic orders, and others who are invested in harassing citizens with OGS. I am certain all of the religiously deluded morons who work in Fusion Centers actually believe they are doing “gods work,” and that the number 77 means “Son of Circumcision.” Try not to laugh…but I personally like the linguisticexplanation of 77 as a “she goat.”
And while it can make a person FEEL crazy, there are actually programs targeted at EVERYONE that actually involve this form of mind control and influence operation, and that these programs are ill-equipped to decipher human behavior, and that with destructive effects . Here is just ONE example of that, as AI struggles to eradicate “human experience” in order to socially engineer ‘predictable humans’ and using ‘predictive analysis.
And here is one recent example from my own writing online from just today (it took me two days to even write the post ‘live’ in WordPress), but every day, there are thousands of examples available to even the casual observer.
In that light, it is worthy of noting that those who value civil liberty, such as our right to privacy-often overlook the greater right of liberty: the right to consent, or not consent to experiments, or other ‘mind altering’ substances and practices, that are deployed on us as weapons or as research tools. So it is important to note that Tor-the famous privacy software that was made “famous’ by Edward Snowden when he revealed to us that our governments-all five of them, in the Five Eyes Alliance, and others ranging from Israel(which gets every bit and byte of our data unfiltered) to Russia are performing their own experiments.
So-forget about DEW’s and all of that other PsyOp psychobabble, and make yourself aware of Palantir, DataminR, Media Sonar, and more that they are targeting at us, and our online speech every second, AS WE TYPE INTO OUR BROWSERS. OVER TOR….!
Here below is one example from today alone. One of many I caught before the sun met the noon sky:
The example:

  1. I look at today’s statistics about who reads this blog and what they read. I note that my most popular post references the hack of the CIA’s “hacking tools” which I posted in this blog post here. This one post quotes the Intercept, and has links to Wikileaks, where the CIA hacking tools were described as hacking American’s cell phones, and then, destroying the ‘evidence’ that they had hacked my/your/their phone.
  2. I looked around the web for stories that also document how the CIA-and some 16 other US intel agencies alone, not including the entire battalions of soldiers aand seamen and USAF who are hacking American’s at any given time- have destroyed Constitutional due process and leveraged, blackmailed, or otherwise compromised American citizens (and millions of others around the world) because they act with “plausible deniability, and then, impunity. I found this story, about a humble public defender in Washington State, where the CIA hack tools are implicated in hacking citizens.
  3. Using Tor to write this blog,(and using Tor makes one an INSTANT target by these ‘plausibly deniable’ activities by military and civilian agents, agencies, and a host of NGO’s), i read through my stats, and noted “outbound links”-the links that people clicked on my blog to read material that I have linked to OUTSIDE my blog. And, I was under attack the whole time. Here is the story I was writing ‘under attack.’ This caused a net loss of about an hour today alone.
  4. I clicked the “out-bound” link, which was to Urban Dictionary” and the link to a description of “gang stalking methods“. Here, below is a snapshot of that-and notice the advertisement for “CASA” which is a foster care warehouse operation, where state sponsored kidnappings of children are covered up as “foster care placements.” Children who are “placed” in Foster care face an 85% chance of being sexually abused, pimped, or otherwise turned into profitable commodities by these organizations and the related DVIC industries

agang stalking methods
This screen shot, which I have NOT anonymized, for a very specific reason, which I will not disclose, contains all kinds of “meta data” about the machine I am using to compose this posting and nothing more-not a single identifying bit or byte of data connects this screenshot to me, or to this blog-other than the WORDS I use to describe this situation.
As such, I seek to demonstrate that speakers, and words are the actual targets of all of this “sooper seekrit spying,” that claims it is to “protect the little old ladies and the children from rapists and pedophiles” because pedophiles might otherwise sacrifice everyone’s safety for their own liberty in order to to get at  the old ladies and babies whose Constitutional houses are on fire, and burn them to the grounds, tossing their pocket Constitutions into the fire to make it burn faster, and using the broken pieces of civil rights and human rights and even animal rights to build a ladder just to get at the old ladies and babies  even quicker as they plummet out the windows, pre-cooked and ready to rape with shovel handles and pocket Constit…oh never mind that last one(and all of those windows, and Windows 1-10, totally broken already by the “broken windows policing scheme” of the 1990’s)….
So, to recap:
Meta data is personally identifying information that police, investigators, and others who participate in the local, state, and federal level fraud outlined on this blog have been using meta data to make cases against unsuspecting victims of OGS and its accompanying mind control and influence operations. You can Google the term yourself.
But what matters most is a question that now arises in the mind of this researcher-and hopefuly inthe mind of other researchers, lawyers, legal scholars, TI’s, psychologists and others who research organized gang stalking.
And the question is: Why does CASA-an organization that I have roundly criticized over the years, and even now; an organization that has tens of millions in advertising budgets, and tha has notoriously been an integral part of the DVIC scheme-why, exactly, do they have an advertisement on that one weblink, now?
I mean-isn’t web searching and webvertisement coordinated with searches and topics-shouldn’t a ink to “gang stalking methods” have like, a deer tracking book, or a bunch of saggy pants without belts, and some “logo gear” on it; shouldn’t in the very least a link to another website that teaches te “rhythm method” be linked, there? And so, what has CASA have to do with OGS anyways?
I suggest that the answer is in the question-and webterrogation of narrative as well. Webterrogation is not unlike custodial interrogations in many ways, not east of which is that the individual being interrogated is in fact and practice, targeted, and contained, somewhere, at some point. This is not insignificant, but it is also a larger point that I will write about later (especially as pertains to ISP’s and how Infragard members-deputized members of law enforcement, and sh!tloads of political operatives and others literally redirect, re-route, and inject any “live” connection with lots of “who knows what.”)
You can test the science yourself- in fact,my blog here asks any researcher of organized gangstalking to do EXACTLY THAT-test my many theories, hypotheses, and anti-hypotheses against your own, form whatever discipline you practice.
But go over to that link about “gang stalking methods” and see what advertisement YOU get at the top of the page. I got CASA, which is a DVIC subsidiary industry, and a multi-million dollar player in the theft of children across America.
Here below are some links that demonstrates AGAIN, that state level institutions, operatives, and policing itself, is implicated time and time and time again in the pimping, procuring and pornifying of children, as well as the massive crisis PR industry that masks this fact, and gives us boogiemen/drug dealers/terrorists/pedophiles/whistle blowers/journalists/your neighbors farting cat instead ( and it cannot be missed that two of the first five links that were returned to my Tor browser were near, or local to my own location…):

Sexual abuse in Foster Care:
Is Foster Care modern day slavery?

Then, without irony, one must note that Elizabeth Dietrich, one of the few online who has written a scientific thesis as regards OGS, opened her thesis with a brief statement about pornography. This, combined with another part of my thesis-that women’s deviance takes place in unique forms, but especially through positions of power, authority, and then, voyeurism-one cannot help but note that women’s violence-or in the very least, their inability to “comprehend” the violence directed at others is institutional in nature. And this is clearly the case with OGS as well (which is in no way, shape or form similar to the “Pro-Anorexia community” as Dietrich has stated.)
Elizabeth Dietrich’s paper encourages the isolation of victims of OGS. How feminist.
Maybe it’s because Smith College is known as the “Lesbian Capital of the World,” or maybe it’s because all the special snowflakes get better grades when they’re pretty, but Dietrich’s conclusion truly looks like first year work when she comes to the conclusion that

Gang Stalking is just one of the many online communities that uses people’s
conformation bias, meaning making, and wish to belong, to deleterious ends.
For my part-should I ever publish this, I will devote a special chapter to conformation bias, and conformity at the expense of critical thinking….

Related Story: Five Denver Nurses caught looking at a dead man’s amazing cock, then gossiping about it in the lunchroom. Apparently, this is a thing with nurses and other women in the medical community(let me know when you start seeing patterns in western women’s deviance, such as their Freudian “death urge” morphing into endless forever war that kills other women’s sons, lovers, husbands and other babies)
From the very introduction of Dietrichs paper, we see that male dominated spaces such as 4chan and KnowYourMeme, as well as “porn” is an underlying theme of those who officially gas light OGS targets; that, for those who have taken the time to write on the subject (this will be the topic of a later post here). What matters here is that “victims of OGS be isolated” both in Dietrichs narrative, and in that of Sheridan and James, and as such, we see that the two-exactly two papers that addresses the topic-are written by gender feminists, which is telling indeed.
Then, we see emergent norm theory and the interplay of feminist destruction of so-called male dominated spaces throughout her paper, which concludes as I stated above-that victims of OGS should be isolated and ex-communicated from the internet.

A tautological statement has been growing in popularity among pithy internet-savvy
populations over the last ten years or so: If you ever wonder if it’s on the Internet, it’s on the Internet. Anonymous contributors to websites such as 4Chanand Know Your Meme expanded this idea into a list of 50 Rules of the Internet that include items such as “The Internet has no rules,”and “there is a porn of it, no exceptions.”The root of the joke is derived from a very basic fact: Internet content, for all intents and purposes, is virtually endless. Almost any honest query one enters into a search engine will invariably yield results, usually hundreds of thousands in an impressive .33 seconds, more or less a couple hundredths-of-a-second, depending on what kind
of modem you have. Social connectivity over the Internet is powerful.


Organized stalking and "mind control" and influence operations: manipulating voters.

Epilepsy warning: this post contains a swirling graphic image
While our governments, our corporations, and our intelligence and law enforcement agencies believe it is their right to steal our data, and use it to maniulate and even abuse certain people and to wage influence operations on us, in secret, I believe in fair warning, in anticipation of un-intended consequences, hence my epilepsy warning above. This is the difference between consensual behavior, and non-consensual behavior, and the NSA/CIA/FBI/DEA data theft pipeline had  15 year head start on all of us.
Except, me, maybe.
Any cursory research into organized gang stalking reveals that politics are a major factor in “who gets targeted with OGS.” While there are varying levels of targeting, ranging from simple “influence” operations through the internet, to extreme cases where local politicians and others gang up on individuals to harass, intimidate, or otherwise coerce them, the most common “targeting” that individuals face is through advertising.
As we saw in the case of “Moonshot CVE” and in the cases of Twitter monitoring activists and feeding the data to law enforcement and other un-named parties, and programs like DataminR and Media Sonar being used concurrently at Fusion Centers, and the local police department, as well as yet un-named intelligence agency level programs, there is a constant blurring of lines between advertisers, governments, political PAC’s corporations, and then, police and intelligence agencies targeting of activists and others in spying or conformity enforcement operations.
Welcome to PsyOps, mind control, and  world wide”influence by constant suggestion. Now, ad a targeted audience-and a targeted influencer of that audience….
You’re getting sleepy now….count backwards….as I redirect your internet connection….breath deeply….watch as Google suggests a few (harmless) things to you to make your life easier, better, breezier, Nabisco cheddar….
Or, this:
Image result for swirling black and white gif

Plus The Hive Mind:

blak and white thinking.jpg
And that “one guy” somewhere-anywhere in the world hidden behind the switch (with NO accountability, no records of hi/her actions, and no recourse for citizens to sue these bastards), with “the master list”:

M: Are you there Bob? It’s me, Margaret. Yeah. He said it again. B: Said what? M: He said WASP. B: WASP? hahahaha. They haven’t had any control or power since the sixties. M: Yeah, but he called WASP’s JAP’s B: JAPS!!??? We kicked their asses into the dirt!  And we are STILL kicking their asses into the dirt, lookie, I even sicced the UN on ’em. Those A-rabs are getting hungry for young Jap girls and those Jap men are hogging them all with enjo kosei! The UN is gonna liberate a few of ’em. M: Bob-BoOOOob..slow down! He was talkin’ about those OTHER JAPs….and a few senators too, like Senator Dierand Klikenstein B: Oh, shit. That hits close to home. Better send a few fire trucks past his homeless shelter. Make sure the sirens are low and slow, like an omen or something. Tell the boys that this is a ‘schedule 13’ emergency. M: Not an 11 yet, Bob? B: No-this is schedule 13 stuff, save 11 for the ‘other guys’ M: Got it. Thanks Bob, what woud I do without all your good advice? B: I dunnno-but my ass sure gets sore sitting here for the last 103 years. Maybe you could…M: Don’t even think about it Bob.

Whhoooooo! WHoooooOOOOOOooooOOOoooOOoooOo!
So, to put this in common terms, imagine yourself walking down the sidewalk, dodging blots of chewing gum, and the residue of mop water, or even broken glass dumped across your path. These are ordinary pedestrian obstacles, and most if not all people expect some of that when out walking.
As you continue on your  path, all of a sudden, a bicyclist heads straight towards you, so fast that they seem as if they might just run you over. What do you do? Of course, you step aside, thinking-“what a rude prick. I had the right of way- and bicycles are supposed to ride on the street!”
You brush it off, and continue on your path. An the obstacles become more and more: the couple walking along is as wide as the sidewalk, and you step off into the grass to let them pass. And then, five teenagers on skateboards; and then, at a crosswalk, people are bumping into you from all directions as if you are not there.
These scenarios above are what is described by TI’s who are being gang stalked, and particularly in the last example, this is what is known as “community mbbing,” and also “street theater.” TI’s write endlessly about this online, but they are also described by others who “suffer delusional disorders.” What’s the main difference? Proof- proof is required to indicate that such is actual, real, and happening to you.
In OGS, proof is hard to get, because of the design of community harassment and community policing, but online, it is easier to prove, now that we know with certainty that it IS happening, it IS targeted, and it IS political. And, as we see above, it IS attempting to influence you, your behavior, and your choices.
Here, below, from Breitbart News, we see targeted individuals as swing voters, but we also see that language and particularly, coded and slanderous language is used to label, and further harass or otherwise cause harm to individuals who don’t toe a party line.
While on the surface, it cannot be missed that this targeted “outreach” is yet another example of Democrat demagoguery, it also cannot be missed that “hetero-normative white people” are being labeled in ways that can and do trigger the Department of Homeland Security “threat matrix” and “bad words” lists, as “white supremacists are on every list as “hate groups”:

NH Dem Party Chair Calls Rural, Disaffected Voters ‘White Supremacists’


This weekend WMUR’s “CloseUp” interviewed the executive director of “Look Ahead America” Matt Braynard, whose new organization is planning outreach to inactive voters in New Hampshire.
Braynard said, “We’ve identified maybe 15,000 inactive voters who we would consider disaffected, patriotic Americans. And potentially 100,000 or more unregistered adults we’re going to reach out to.”
He explained his organization was using “psychometrics,” saying, “Normally it gets applied to likely voters universes for purposes of persuasion. We are applying it towards identifying patriotic Americans who’ve become disaffected and cynical, so we can engage them on issues relevant to them, get them registered, get them educated and turn them out to vote.”
In response, the chairman of the New Hampshire Democratic Party Ray Buckley said, “The organizing and activating of these extremists, these white supremacists, really could have a detrimental effect on the entire culture of New Hampshire.”

In the aricle above, note the use of the word “psychometrics” which literally means ” the measure of psychological effects in order to cause persuasion.” This is not insignificant, as we see that “influence” is the goal, and that “psychology” is applied as a tool.
In relatively harmless incidents such as this, we must ask ourselves if “influence operations” are harmful, and most likely come up with the answer that they are mildly intrusive, but not necessarily “causing harm.”
However, in these cases, when we add the fact that the data used is derived from the “profiles” that our own ISP’s have sold to outside organizations; and that these profiles are shared and re-sold across gvernment, private industry, political PAC’s, the Five Eyes Alliance, and even in the case of Israel, that our profiles are literally given to a theocratic, apartheid nation state that has not signed any nuclear treaty or even officially disclosed that it is a nuclear power the story of harm versus “no harm” becomes a question that few are willing  to ask out loud; being used against their and it becomes a question where the individual this targeted must make a stand, or simply succumb to being used against their free will in such a manner.
So, this issue of “supremacy” becomes for some of us, a crucial and key point wherein we must ask “whose white supremacy” is being targeted and whose white supremacy is not (most Israeli’s and other supremacist Jews still encourage their daughters to marry only white men). And certainly, other theocratic, nationalistic, racial, and psychological  supremacy becomes part of each persons targeting as well. So-whose decisions are we actually making when we are under chronic and constant “influence operations”?
Regardless of the answer, there is one other level of questionable targeting: the fact that beyond advertisers profiling us, we also have intelligence agencies profiling us, and then, targeting us as well, individually n levels that only nazi maad scientists were able to conceive of in decades past.
Because the past is the present is the future with intelligence agencies, we know with certainty that other, more nefarious and unethical targeting takes place, and that this takes place in secret, without our informed consent- that this entire internet entrapment scheme that has made everyone a target, has now morphed into a wider scheme of political targeting on the ‘consumer’ level; and that despite the consumer’s awareness that it is them, being consumed first, and targeted advertising only after that.
So beyond the citizens rights to protest or even to withdraw from these big data schemes, or the use of our data to make us targets, multiple levels of targeting are taking place at all times, and our decisions are under constant and chronic attack.

Organized stalking and police surveillance of social media: ACLU notes that targeted 'influencers,' activists and other TI's are 'real'

Police Use of Social Media Surveillance Software is Escalating, and Activists are in the Digital Crosshairs

By: Nicole A. Ozer
Map of California, with dots marking the areas where local law enforcement has acquired social media monitoring software

It goes without saying that speaking out against police violence or government overreach shouldn’t land you in a surveillance database. But it can, and it does.

The ACLU of California has received thousands of pages of public records revealing that law enforcement agencies across the state are secretly acquiring social media spying software that can sweep activists into a web of digital surveillance.

This set of public records requests is part of our ongoing work with community groups to shine a light on surveillance technologies and call for community control in decision-making around policing. Last year, we worked with local activists in Fresno to reveal that its police department was using a MediaSonar social media surveillance tool that boasted the capacity to identify so-called “threats to public safety” by monitoring hashtags such as #BlackLivesMatter, #DontShoot, #ImUnarmed, #PoliceBrutality, and #ItsTimeforChange.

But we had a hunch that Fresno was not an isolated case.

So this summer, we requested records from 63 police departments, sheriffs, and district attorneys across California. And what we learned from the documents was alarming.

Of the responses we’ve received, 40% of the agencies (20 in total) have acquired social networking surveillance tools — many of them in the last year.

We found no evidence in the documents of any public notice, debate, community input, or lawmaker vote about use of this invasive surveillance.

And no agency produced a use policy that would limit how the tools were used and help protect civil rights and civil liberties.

The utter lack of transparency, accountability, and oversight is particularly troubling because social media surveillance software used by California law enforcement — tools like MediaSonarX1 Social Discovery, and Geofeedia — are powerful. And our records from Fresno and several other communities reveal that some have been marketed in ways to target protesters.

Our records show that Geofeedia’s marketing materials, for instance, refer to unions and activist groups as “overt threats,” and suggest the product can be used in ways that target activists of color. At least 13 California law enforcement agencies have used or acquired Geofeedia.

In one exchange with law enforcement, a company representative suggested to San Jose Police that they should use the product to surveil the “Ferguson situation,” even though the city is roughly 2,000 miles from Ferguson, Missouri. San Jose Police did in fact use Geofeedia software to monitor South Asian, Muslim, and Sikh protesters only a few days after acquiring it.

An email to the San Diego Sheriff touts a “collection” of social media content curated by Geofeedia following the non-indictment of Darren Wilson.

And yet another promotional email invites the Los Angeles District Attorney to learn how Baltimore used the software to monitor and “stay one step ahead of the rioters” after the police killing of Freddie Gray.

Law enforcement should not be using tools that treat protesters like enemies.

The racist implications of social media surveillance technology are not surprising. We know that when law enforcement gets to conceal the use of surveillance technology, they also get to conceal its misuse. Discriminatory policing that targets communities of color is unacceptable — and secretive, sophisticated surveillance technologies supersize the impact of racial profiling and abuse.

The good news is that we’ve seen that when surveillance is forced into the light, communities have the power to call out racist policing practices and stop discriminatory surveillance in its tracks.

Remember Fresno? Armed with proof of Fresno’s social media surveillance experiment, a diverse coalition of local activistsknown as Faith in the Valley successfully mobilized and organized to pressure the police to roll back their social media surveillance program. The community is now pushing to pass a surveillance technology ordinance to make sure all surveillance technologies are publicly debated.

In Oakland, community members organized against plans to build an expansive Domain Awareness Center that would have collected and stored hundreds of terabytes of data on Oakland residents. Now Oakland has a Privacy Commission that advises the City Council on surveillance decisions and is currently drafting a surveillance technology ordinance.

And in Santa Clara County, right in the heart of Silicon Valley, a diverse coalition successfully organized against plans to buy a Stingray cell phone tracker and then worked to enact a comprehensive surveillance technology ordinance that requires transparency, accountability, and oversight for all surveillance technologies.

In this spirit, a powerful coalition of national organizations is launching a multi-city legislative initiative, Community Control Over Police Surveillance (CCOPS), to introduce more local laws to bring transparency and community control to the acquisition and use of local police surveillance technologies.

Here in California, community members are working in Palo Alto, Fresno, Oakland, Berkeley, Santa Rosa, and Santa Cruz to ensure that similar laws are introduced in their cities.

Whether it’s social networking surveillance, stingrays, or something else we haven’t heard of yet — it’s time to push secret surveillance into the light.

We have the power to stop discriminatory surveillance and put control where it belongs — in the hands of the community.

Nicole Ozer is the Technology and Civil Liberties Policy Director at the ACLU of California. 

Read more about community control and surveillance technology in California:

Psychiatry's BIG "we are junk science" problem and artificial intelligence

Few doubt that psychiatry and psychology are fraught with junk science, or are as fields of study, politically motivated tools of corporate, secular and even sometimes, cultic religious  interests. Indeed, considering the non-secular and perverse narcisssim of Sigmund Freud-himself fueled by cocaine- and his nephew, the great Public Relation’s hypnotist Edward Bernay’s, we see that much of the last century and even today, these fields are little more than ahistorical political sociology with drugs and PR applied to, or around, and directed at the individual experience as a tool of silencing or criminalization of speech, and speakers- much like police science itself.
And all of that, mediated by the gate keeping of narrative that policing -and in the case of OGS especially-the hidden mechanism’s of social control that exert themselves when “mind control”and influence operations via narrative distortion and co-option takes place “at the gate,” which is the person who will claim OGS victimization( I am currently seeking an interview with a several times convicted felon who cliams that he is enduring an attempt to force him to confess to an unsolved child homicide from the 1990’s. He resides in a city that operated a “black site,” where victims were tortured and abused into false confessions.)
In the case of minigh dimol, aka waterinch, we have one persons online testimony to the farce that rehab clinics and their associated echo chamber of psychiatry and psychology attempting to control narrative in a systematic assassination of “the individual” for the direct benefit of the industrial complex of Big Pharma. This destruction of narrative is not a new phenomenon, as psychology has long grappled with knowledge that, in order to be even one drop better than sociology or Svengali science, they would need that extra “something,” to validate their own narrative-that they are a science.Police power functions this way, but so to does junk science which is a lie that travels the world a thousand times before the truth wakes up.
While psychiatry does have a certain political utility, and sometimes, works to envelope the stories of the poor and the disadvantaged in rationalizations that otherwise would not have protection in the wider society, the simple fact is that psychology is little more than sociology with official prescriptions from Big Pharma dope dealers.
And there is very little irony lost on “criminals” and  “drug addicts” and others who encounter legal settings in the form of court rooms, custody hearings,  or other legal attempts to “bypass their humanity and their narrative” aka “transhumanism,” and put in it’s place another thing that has more “utility for the greater good”: aka systemic gate l keeping and control of individual narrative.
Many is the man or woman who has been arrested and dragged into court over the last century as a deviant and a criminal, only to be told that they need to get off of “Mary Juana” or some other club drug such as MDMA as we saw in te case of minigh dimol, and get ON Prozac, or some other drug-of-the-month-club drug that Big Pharma is using to experiment on people.
Never mind the many notorious failures of prescription drugs, or how they are polluting the seas, and never mind that these drugs are themselves time and time again shown to be little better than Mary Juana at controlling the body politic of self-prescribers and “dual diagnoses” people for whom Mary has always worked just fine, and for whom Jim Beam does just the trick, better than any pill of the month. Most studies conclude that Mary and Jim don’t poison the oceans, or the people that use them with discretion.
And it is at the juncture where artificial intelligence meets the internet where we see what a monstrosity “predictive software” like Peter Thiel’s Palantir databases and their manipulative features that can be programmed to form situations of influence and custodial control operations; and DataMinr technology which is programmed to monitor “thought’s” and infer “actions” in real time, like Media Sonar-which was and is used by Fusion Center operatives to control, contain, monitor and influence activists until Twitter cut them off, and Moonshot CVE that is used by advertisers and corporate interests AS WELL AS the many LEO’s around the world that have foregone the “protect and serve” model of policing in favor of a “seize it all, exploit it all, capitalize on it all ” model of policing, to LITERALLY target SPECIFIC INDIVIDUALS and their “ideologies,” as much as they target actual real estate.
And psychology is truly in on it at every level, thick as thieves and fat as rats, and we know this based on the cases of Jessen and Mitchell, the angel of death Joseph Mengele, MKULTRA’s Scottish knight in academic armor DE Cameron, and now Lorraine Sheridan and David V. James and Elizabeth Dietrich that seek to overlay the pseudo-science of psychology over the suffering of targeted individuals of organized gang stalking.
This political abuse of psychology begins when we look at the key component of “schizophrenic narrative,” which has historically been a trouble zone for psychologists, especially in the heyday of CIA psychiatry where D.E. Cameron, first in Europe, and later at the notorious McGill University human torture and experimentation facility in Canada.  So, Cameron and others like the CIA’s official poisoner, the LSD doctor Sidney Gottlieb first diagnosed an entire nation (Germany) with mental illness, and that illness was, apparently, “the patriarchy,” aka “the warrior class,” and then, used children in experiments of all kinds-because in lieu of father’s now decapitated, the children of “the future” were then and are now in their sights.
As transhumanist types like Sheridan and James; and their progenitors Mengele and Gottlieb and especially Cameron, an heir kindred Mitchell and Jessen, for whom removing the “human” from the “experience” is a main goal, as they seek to replace, alter, medicate or otherwise mediate around the lived, human experience that exists in an individual mind; or to create it as a “hive” to be exploited by artificial intelligence in the case of Thiel and his intelligence cult, we see the field of robotics struggling with a unique problem: the problem that psychiatry has always managed to side step, which is the “human soul,” which is based in longevity of memory, and human experience that is sorted out and mediated through human filters within the brain that are stilll entirely unknown, and under-explored-precisely because psychiatry has been medicating AROUND this unknown.
Here below, wehave a study that encapsulates this problem in robotics- the problem of memory, longevity, and lived experience coalescing to form a “whole,”  from Phoebe Sengers:
Schizophrenia and Narrative in Artificial Agents
Phoebe Sengers
From: Leonardo
Volume 35, Number 4, August 2002
pp. 427-431
In lieu of an abstract, here is a brief excerpt of the content:

Schizophrenia and Narrative in Artificial Agents

Phoebe Sengers (bio)
Artificial-agent technology has become commonplace in technical research from computer graphics to interface design and in popular culture through the Web and computer games. On the one hand, the population of the Web and our PCs with characters who reflect us can be seen as a humanization of a previously purely mechanical interface. On the other hand, the mechanization of subjectivity carries the danger of simply reducing the human to the machine. The author argues that predominant artificial intelligence (AI) approaches to modeling agents are based on an erasure of subjectivity analogous to that which appears when people are subjected to institutionalization. The result is agent behavior that is fragmented, depersonalized, lifeless and incomprehensible. Approaching the problem using a hybrid of critical theory and AI agent technology, the author argues that agent behavior should be narratively understandable; she presents a new agent architecture that structures behavior to be comprehensible as narrative.

The premise of this work is that there is something deeply missing from artificial intelligence (AI) or, more specifically, from the currently dominant ways of building artificial agents. This uncomfortable intuition has been with me for a long time, although for most of that time I was not able to articulate it clearly. Artificial agents seem to be lacking a primeval awareness, a coherence of action over time, something one might, for lack of a better metaphor, term “soul.”
Roboticist Rodney Brooks expressed this worry eloquently:

Perhaps it is the case that all the approaches to building intelligent systems are just completely off-base, and are doomed to fail. . . . [C]ertainly it is the case that all biological systems . . . [b]ehave in a way which just simply seems life-like in a way that our robots never do.

Perhaps we have all missed some organizing principle of biological systems, or some general truth about them. Perhaps there is a way of looking at biological systems which will illuminate an inherent necessity in some aspect of the interactions of their parts that is completely missing from our artificial systems. . . . [P]erhaps we are currently missing the juice of life [1].

Here, I argue that the “juice” that we are missing is narrative. The divide-and-conquer methodologies currently used to design artificial agents result in fragmented, depersonalized behavior, which mimics the fragmentation and depersonalization of schizophrenia seen in institutional psychiatry. Anti-psychiatry and narrative psychology suggest that the fundamental problem for both schizophrenic patients and agents is that observers have difficulty understanding them narratively. This motivates my work on a narrative agent architecture, the Expressivator, which structures agent behavior to support narrative, thereby enabling the creation of agents that are intentionally comprehensible.

The Problem

Building complex, integrated artificial agents is one of the dreams of AI. Classically, complex agents are constructed by identifying functional components—natural-language processing, vision, planning, etc.—designing and building each separately and then integrating them into an agent. More recently, some practitioners have argued that the various components of an agent strongly constrain one another and that the complex functionalities of classical AI cannot be easily coordinated into a whole system. Instead, behavior-based AI proposes that the agent be split up, not into disparate cognitive functionalities, but into “behaviors,” such as foraging, sleeping and hunting. Each of these behaviors would integrate all of the agent’s functions for that behavior.
Even such approaches, however, have not been entirely successful in building agents that integrate a wide range of behaviors. Rod Brooks, for example, has stated that one of the challenges of the field is to find a way to build an agent that can integrate many behaviors (he defines “many” as more than a dozen) [2]. Programmers can create robust, subtle, effective and expressive behaviors, but the agent’s overall behavior tends to fall apart gradually as more behaviors are combined. For small numbers of behaviors, this disintegration can be managed by the programmer, but as more behaviors are combined their interactions become so complex that they become at least time-consuming and at worst impossible to manage.


Val is an electrician, and he was approached as a gang stalking recruit in an environment loaded with Durkheim's 'anomie'

Val is a merchant mariner, one of the most noble professions I can think of. When he is not at sea, he works with his family as an apprentice electrician, in a wealthy area of a large city. Then, like most men who are men, he spends some time when he is not at sea hanging out with other men in gritty urban environments, and associating with friends from where he grew up.
The only problem for he and his friends is that they all grew up in one of the biggest and most notorious urban American ghetto’s that is a virtual powder keg of the toxins and effects of racism and the disparity of wealth in America which is more evident every day, and highlighted by the DHS/DEA/FBI/Etc Alohabet asset forfeiture racket that targets real estate for profit.
And, they grew up on a watchlist called the CalGang database, which literally monitors gangster babies from birth as if they are a threat to organized society.
And this database like so many others today which are hidden beyond the view of those who are catalogued in them-this database presumes criminality from birth (and most, if not all DVIC and DHHS lists also are used to track, and target lower tier American males, much like a modern slave net).
As such these men are literally and in every sense “targeted individuals.”

Related Story: It’s time to ask why so many Ferguson, MO Activists are dying in odd “suicides” One of them, Darren Seals, even reported that he was stopped and interrogated by ‘ten men who ‘told me I that I chose the wrong friends.’ Then,shortly thereafter, Seals apparently shot himself in the head, and then, set his own car on fire to hide the evidence.
So, we see that strange suicide is one way to measure the “effectiveness” of gang stalking.
UPDATE: The Daily Beast has documented many more murders of black men in that area, during that time period.

As you have probably guessed by now, Val is also black. Such is the power of stereotypes, but also the power of language used in propaganda-most western people believe that blacks are the primary residents of ghetto’s ( an out dated term in itself, as “the hood” is used by ghetto dwellers all around the world due to Hip Hop music.) And as such, Val hangs out with other black people. And unlike Jewish ghetto’s of earlier era’s, these men are not self segregated.
” I hang out there when I am not at sea, because it’s my way of giving back, and trying to let them know there’s more than that-living there.”
What Val is saying is that he was fortunate, and that he “got out,” of the enforced entrapment and containment scheme that American ghetto’s are-and that in order to inspire others, he feels he has a duty to go back and “associate” with those who are “still there.” And it is this which made him a target of recruitment for gang stalking; and a possible “threat” in the matrix should he not comply with community policing.

Related Story: “Iconic” civil rights era phtographer Ernest Withers photographed all of the major civil rights era leaders at point blank range. And, he was also an FBI informant-a rat and spy. Not incoincidentally, he was with Martin L. King the day he was murdered (try not to let these coincidences bother you when you make the connection between FBI gag stalking and murdered dissidents, authors, activists and “others”)
And,the subject of this “iconic” photo above of the Ferguson protester Edward Crawford fits into the cohincidental patterns you find in the gang stalking dialectic too, as Mr. Crawford was found dead shortly after this photo was taken. Try not to let these patterns with photographs, and photographers bother you-it might make you crazy, according to the experts!

Then, there is a little known fact that black American’s who police their own neighborhoods are tracked, targeted and assassinated for doing so, as we saw in the 1960’s with Black Panthers and others, and even today; whereas Jews have their own police in the Bronx and other places. In fact, in western nations, only Jews are allowed to police “their own.” SO certainly, we must ask who it is that enforces racial barriers, as well as polices speech, and association around these topics.
While association isn’t illegal yet in western countries, in the paradigm of OGS, association becomes a de facto reason whereby police power can entrap and recruit others into the “community policing scheme.” As anyone who has watched the last few decades, change comes very slowly, if at all, and even then, it is mediated by police power, which acts as a gatekeeper between what is “good,” and what is “bad,”- but all of THAT takes place in the many gray area community policing schemes. Good and evil then, are mediated in the internecine battle ground of hidden strife between police power, and “we the people” in a hidden battleground where every day rights and liberties are pphrased-for some, but not all- as “privileges and immunities” or as “necessary compromises.”
Val’s story of being recruited into community policing
” I was back one time, and all of a sudden they swept up on us. We were in a pretty large group, mostly a bunch of guys just hanging out. They put us up on the wall- you know, spread your legs, keep your hands out of your pockets, like that. I had no problem with it really, you get used to it(….) and I complied. Then, after they went through all of our pockets like that the usual stuff(…), they had a job to do (….).”
“So I told them about my service, and he was kind of, you know, surprised, and he took me into his SUV. He was the watch commander- four stripes…and one loop. He asked me why I was hanging around these guys, and I told him what I just told you-because I believe that the only way to make a difference is to come back here, and, you know, show thee guys that there’s something else. He left me his card, and told me to call, you know if you see something and all that. I stilll have his card on my dashboard.”
What Val is describing is the gray area between our Constitutional rights of assembly and rights of association, and the paradox that gray area has produced for exploitation of “the little guy’s” while corporate interests ranging from Peter Thiel’s conspiracy with Google and Palantir, to psychologies reliance on drug comany definitions of mental health. For some, obviously, torture is ok, as lng as it’s the “bad guys” getting water up there nose, or a few “dangerous mentally ill people” popping a few fix-society-by-drugging-you pills when they complain about being “stalked” or “hunted” or otherwise ham stringed and black bagged by gray area policing schemes.
So, for some policing is purely profitable, but for most, the community policing scheme has produced an opposite effect on our society, and on our liberty, that is itself a civil conspiracy by those in power to force the police to become abusers of the Constitution itself.
Due to the lifting of the Constitutional guarantees of rights to life, liberty and the pursuit of happiness,” via the un-Constitutional gray area policing scheme of organized gang stalking, aka community policing,  and the full blown assault on our rights of privacy, speech, press, assembly, and every single other right that can be inferred from the right of privacy not yet enumerated-we see that a vast encroachment on our rights to “freedom of association” are crimped at the internet switch, or our telephones, and thereafter.
So, yes, this can have a disparate effect on select people, not least of which is to with draw from society that “perpetrates” such day to day abuses.
So- I would like to re-examine a main thesis of Dr. Lorraine Sheridan and David V. James, two academics whose lives have been lived in academia-which is a major social disease of our times, and which can lead to an echo chamber effect within researchers who have spent NO time in the real world-that part of it where whole neighborhoods and cities, and communities are .put on eatch lists, or databased as “gang members,” In fact, their famous study on OGS interviewed “the internet.” take a moment to let that sink in.
Then, note that the term “gang stalking” is termed “group stalking” because those who wrote the study are practicing what amounts to a form of class based, and in this case racist and sexist “gas lighting.” This happens because of the social disconnect between the modern transhumanists and actual, real people from across the spectrum who have lives outside of being mouth-pieces for the prison industrial complex. And not insignificantly, academics notoriously live and dwell in “ivory towers,” which Emil Durkheim discussed when he coined the term “anomie.”
For my purposes, I will note that ivory towers, and the incredible amounts of MIC and AIPAC money consumed by academics, can nearly eradicate human conscience, and any sense of ethics, much less insight into issues as complex as OGS as the fat of the DVIC trough swells their senses to dullness, and glues their eyes shut.
Here below is the definition of “anomie,” and some discussion of it next to a summary of the Sheridan James study-and it MUST be noted that those who are “suffering” OGS are being referred BACK INTO THE POLICING SCHEME by Sheridan and James! Let me know if you start seeing paterns here, because obsession with patterns can indicate ‘apophenia,‘ or far worse, common sense, both of which are dangerous to those who live in Ivory Towers, protected by armed assassins:

noun: anomie; noun: anomy
  1. lack of the usual social or ethical standards in an individual or group.
    “the theory that high-rise architecture leads to anomie in the residents”

And here is the summary of Sheridan and James analyses of OGS as a likely “delusional disorder:”

Group-stalking appears to be delusional in basis, but complainants suffer marked psychological and practical sequelae. This is important in assessment of risk in stalking cases, early referral to psychiatric services and allocation of police resources.

So, Val, who I talked with this morning, reported an attempt to recruit him into the community policing scheme, by a “gang strike force” and offered the hint that cooperation with this as a “normative” duty of his citizenship was expected. Val is neither delusional, nor is he suffering trauma, because unlike others in his peer group, he had a father, he respects his fathers authority, and that father was also a world traveler. His father, as opposed to many others who got swept into high heels policing, such as this example here, encouraged individuality within “normative” association.
And, he imparted to Val a desire to “get out and see the world,” which he did. In doing so, Val, unlike his peer group, Val learned about the “hierarchy of relationships,” and probably a thing or two about kyriarchical paradigms, though he didn’t elaborate it as such.
Instead, he had a grasp on what is anomie, what causes it, and he tries to make a difference, realizing that “all things are NOT created equal.”
Here is a bit more about Durkheim’s anomie:
It was popularized by French sociologist Émile Durkheim in his influential book Suicide (1897). Durkheim never uses the term normlessness; rather, he describes anomie as “derangement”, and “an insatiable will”.[3] Durkheim used the term “the malady of the infinite” because desire without limit can never be fulfilled; it only becomes more intense.
Durkheim, who used the concept to speak of the ways in which an individual’s actions are matched, or integrated, with a system of social norms and practices… anomie is a mismatch, not simply the absence of norms.
I have discussed anomie and organized gang stalking in terms of gang stalking being an unethical, illicit and illegal practice that psychology, and policing and the hidden networks of abusive social power that are wielded by “community policing” and NGO’s and other’s who participate in it, and yet because there is an absence of “norms” or even awareness, and worse, that in a society where power is the goal, that “norms” themselves are unhealthy; as do the methods of enforcing them, and that inequitably.
None of these that act as gatekeepers and interpreters of “what is normal” have any insight whatsoever, as I have noted that hose who have written on the topic are part of the official denial of the practice; and those that do are themselves corrupt to the point of being OGS denialists who use power to enforce corruption- that corruption for powers sake IS the norm; and that OGS “symptoms” are anomie that is experienced bu those who cannot in any way participate in our current society.
Academia is ill suited to deal with OGS in any substantive way- and I suggest it is because they are socially disconnected themselves- that they embody the worst that Durkheim could have imagined. And, it is not surprising that  in Durkheim’s anomie, and our current pervasive police and surveillance state, that in:
a society with too much rigidity and little individual discretion could also produce a kind of anomie… Thus, fatalistic suicide arises when a person is too rule-governed
Note that in anomie, suicide is a possible outcome, and in fact was the subject f Durkheim’s analyses- and in the OGS dialectic,  there is nearly a constant drum beat for victims to do exactly that.
This is not incidental- it is an integral component of the eugenic nature inherent to the entire dialectic, and as such, and in the case of Val, who “got out” we see the disparate police power attempting to enlist him in the aid of becoming a rat, rather than an individual attempting to make a difference by merely setting a good example as an accomplished individual. That he is being subtly encouraged to become an informer as a first step into a wider dialectical power base, and thus, recruited into the gray area.
So, of the many things that this one example provides, I cannot tell you if Val was stalked in a specific database before the event he describes. I cannot tell you if Dataminr, Palantir, Media Sonar, or any of the many other ways that our relationships are tracked and monitored by police and others every day were deployed on him because the public does not have open access to these privatized and illicit databases.
But I can tell you with scientific certainty that he was profiled and targeted; and an attempt was made to recruit him to become an informant in his community. And with certainty, I can tell you that this all happened in a highly targeted environment, whose future has been mapped frequently from birth.

Related Story: Meet the actual, illegal, criminal, organized gangs that work in the Los Angeles policing,and tactical units.

Organized stalking and Five Eyes Alliance, disruption, online mobbing, and database abuse: documenting OGS with evidence

Most of those who write about OGS mention that they are frequently the targets of specialized internet harassment that takes various, often personalized forms*. There is the standard theft of email, sometimes as one writes it; there is the recurrent and constant theme of computers being hacked; and online manipulation of speakers who use words to communicate ideas to others, like we see with the outed JTRIG harassment-but the NSA/FBI DITU and military orgs, often working hand in hand with zionist hasbara roaches from Israel are all in on it, trying to censor and manipulate and control online dialogues, and targeting individual speakers.
And, similar things went on in Germany just before the Holocaust as well, with zionists involved at every level. In fact, everywhere you look, these religious fanatics are implicated by even the MSM. Here, the Daily Beast notes that a religious fanatic from Jews for Jesus torched the mosque of the shooter after the Pulse nightclub shooting, and like many of these types do, they also used religion as their basis (click the link- the firebombers statements are telling). So, any keen reader will note that my thesis of fanatical religions-whether Jewish or christian or one or another cult or sect-religion being key to the OGS narrative is validated, over and over.
And speaking of Israeli mind control and cockroaches, and how religion and those who practice it use all forms of coercion and bulying, even invading the heads of it’s targets, with memetc neuro fasciitis- there’s this, from Haaretz:
Israeli Scientists Unlock Secret of Mind Control — in Zombie Cockroaches: Now we know how the jewel wasp turns the bugs into helpless living nurseries.
read more.
But let’s first have a look at the catalogue’s of spy tools that these institutions are using on unsuspecting citizens. And you can imagine others have these tools as well:
The Electronic Frontier Foundation catalogues  NSA spy tools aimed at us AND them-whoever “they are” since “they” became “us too”:

How the CIA spies on you through your TV, and more:

Renowned security guru Bruce Schneier has the British spies catalogue of tools:

One of the ways that the claims of TI’s can be tested-one of the simplest ways actually- is for any researcher to merely write a blog about OGS. Then, use the key words “organized gang stalking,” “gang stalking” “targeted individuals,” and any of any number of keywords that PRISM and XKEYSCORE, and their specially trained, biased and calculatingly and deviant religious analysts are targeting.
You will have more rapid results if you mention the fact that the US Department of Homeland Security gives special black budget money into the hundreds of millions to zionist-Jewish groups and organizations affiliated with the Anti-Defamation League, which they use for organized stalking.
Or, if you mention the fact that the FBI is basically a zionist and cult-controlled organization that has benefited from illegal ADL spying operations for generations, and those hidden campaigns of domestic terror/spying are waged by any of a number of fanatical cults and religious sects in America, with the net results being “anonymous tips” from well known informants.

For example-in the summer of 2016, there were two high profile mass shootings, and each one of the shooters shared the fact that one of the many radical sects of radical zionist hatred, called the “Messianic Jews” were involved in workplace mobbing before these events took place. In these cases Sayed Farook who was taunted about religion bullied in the work place by Nicholas Thalasinos, -and the mosque of Omar Mateen, the Florida shooter, was burned by a Messianic Jew from “Jews for Jesus” after the fact of his alleged shooting.

But where were the NYT headlines screaming about this form of domestic terrorism? There weren’t any, because aas I have noted, Jewish-christianity is the cricket, with the worm in its head.

It is also not a stretch to note that these same zionists not only helped create Hitler, but they shared similar goals and killed millions of people (which is ALWAYS the shared goal of fascists, communists, and globalists who are in fact all Fabian Socialists), while using other egregious forms of database abuse, like the IBM punch cards that were used to round up gypsies, dissenters, the mentally ill, and many other categories of people.

Then, link that blog to any substantive conversation about warrantless surveillance, criticize this system of targeting pure speech online (and in our own ‘private’ emails), or criticize the plausible deniability and unaccountability built into this system, and especially criticize any law enforcement body in any of the 5Eyes nation-states, and watch the fireworks begin! Your blog will suddenly become the darling of the Five Eyes nations as the UK, Australia, New Zealand (have a look at what and WHO is in New Zealand now),Canada, and the US start to hit your blog up EVERY DAY, 20-50 hits per day.
You will note that they key in to certain posts and pages that mention their culpability. This blog here is a recent favorite of some who read these specific posts below, nearly every day, in this order-and you can test these results yourself:
1) Gang stalking, Mormons, FBI/CIA recruitment of same
2) Gang stalking and punitive psychology
3) Gang stalking and the Martha Mitchell effect and influence operations; or how retired LEIU members act as auxilliary LEO’s, often outside the law-and as para-judiciary inluencers of the legal process.
4) the CIA and phone hacking/NSA mass surveilance of citizens/ crisis PR counter-narrative about OGS
5) Any post that criticizes, implicates, or indicts LEO’s as particpants in OGS
6) Any post that implicates military involvement in OGS
7) you will especially note that avid readers who target posts about how the surveillance state is a Panopticon especially seek your personal information/contact info/biographical data, and most of THOSE readers from military bases and so on.
In my experience, it takes about a week to ten days before the FiveEyes nations and their many web crawling, word hunting,speaker targeting data analysts, or targeted search bots/Palantir/Media Sonar/etc or any of a number of retired LEIU types and Israeli “mind controllers,” or just plain odd people who are immersed in the even-more-odd disinformation dialectic of the “paranormal” find your blog.
Then, kick your feet up and watch as your email accounts get broken into or your internet gets redirected, and your online life becomes “redirected,” or stalked even by identifiable operators( usually those who follow your blog are affiliated with the groups mentioned above). I advise that you do all of this “anonymously” within reason-but also advise you to use Tor as a research control, just so you can see how easily it is subverted. And then, do ‘timing attacks’ against your own blog using Tor as a control, and your own blog as a subject. Note how slow your blog/s load/s now-or especially, how when you type, your posts begin to drop letters here and there as if your keyboard is full of peanut butter, or cracker crumbs-or screen cast across a Fusion Center control room, or to a couple of squad cars up the block.
Use Tor on one browser, and then use several others- you should find that Tor will be ‘crashed’ frequently AFTER they find your blog, but NOT BEFORE. And, you will find as described above with the ‘suddenly sticky keyboard,” and more. Also, AFTER they find your blog, you will note that Tor loads incredibly slowly, and that frequent time-out errors will occur. Further, if you publish over Tor, you will find it to then be a target of other exploits from the Metasploit toolkit. Teardrop attacks are common, and timing attacks that crash the browser and then time your reconnection to both the internet and your blog-which also leaves your ‘cookie’ and sign in data floating about cyberspace are among the most common attacks.
And-if any of your (hopefully, deliberately anonymized and obscured) blogs become targets of this extra special attention, extra-legal, extra-judicial attention, notice also “what they are reading” across your blogs-that the subject matter frequently seeks to develop a “profile” of the writer as certain posts that contain “personal” information are pieced together to form a parallel constructed “you” in the mind or the dossier of an analyst, investigator, or agency black ops practitioner.
Test it yourself, and prove me wrong-after all, the “pro’s ” and professional activists present a unified front that OGS is a myth- a symptom of mental disease; an indicator that MORE isolation and discrediting is needed to contain the dangers of the world finding out about this practice that benefits those who practice it! So prove me wrong-if you can.
But I have found these things described above for over a decade (as have others), using multiple blogging platforms, multiple computers, from multiple states, countries and localities ranging from communist countries to countries that thrive on mob hush money, to here, in “the land of the free (lol)”and using multiple word/phrase selectors.
These terms and subjects I discuss above are the quickest, and most replicable to get the results I describe, but you can find your own.
The net result is a simple and can be replicated, and prima facie evidence that gang stalking is real in the sense that it triggers both PRISM-like bots and humans, but also triggers intense scrutiny and malfeasance: it is prima facie proof that CERTAIN speakers are targeted, and then harassed, or blog-stalked in the very least, and others are not.
In the US, this means that a pre-judicial mechanism of “denial of equal protection” under the Constitution is in effect at a baseline of un-Constitutional government conduct (and really- most Silicon Valley startups from Google to Twitter and Facebook are ALL funded with seed capital from the CIA, and fully interactive with NSA/CIA/DIA/FBI packet capture/black operations via the internet ‘backbone’/influence operations/redirection/code injection/ at ALL times).
Lastly, I would like to point out another fact of OGS: if and when the writer reveals their actual IP location, or actual contact information, they will also be able to document “web interception and redirection” in a variety of ways. This story herein covers that. I bring this up, because upon the discovery of writers and others who document OGS, the Five Eyes then entraps the blog off shore, or on a server that cannot be traced back to them directly-that hose who work in these intelligence collection hubs ‘contain’ or entrap’ the blogs so that further black ops/surveillance/timing attacks/code injection can take place.
And this too, can be monitored, and data collected to document that OGS online s indeed a “real thing” and evidence of same accrues as soon as a researcher follows the steps outlined above.

  • some things are just TOO predictable: as I wrote this post above, online-live- I was cut off the net, and the AP that I was using disappeared, replaced by several that are unfamiliar to me, or the location from where I blogged this post. I could not log back in because the AP I used( from a well known corporate coffee shop)completely disappeared. You just can’t invent some things. I ket sceen captures, but I do not have an anonymizer to strip the meta-data from those. But you can test this scenario yourself as well.