Gang stalking and delusions and paranoid complaints: what is Level X thinking and cognitive bias in psychologists/psychology?

In the extant online descriptions of gang stalking, it is readily apparent that many misnomers and type 1 errors are present in most dialogues, which is what can be expected when extremely well financed domestic terrorists target lower educated, lower social status persons, who themselves are often the product of intergenerational poverty.
From Granite Island Group’s description of Technical Counter Surveillance Measures(TCSM), we now turn to “what is Level X thinking”and I will ask the question “why did one well known doctor, Moss Posner M.D. experience being targeted by the MIC while other doctors, such as  psychologists David V. James and Lorraine Sheridan are either willfully ignorant, or cognitively impaired as they relegate claims of gang stalking to delusional complaints.
The simple answer is that they differ on one major point-Posner was a man who once took a principled stand against the MIC/PIC and the other doctors are part of a trend in psychology that is subsidized by the MIC/PIC, and that pathologizes dissent.
So first, here is how ignorance of technology morphs into “threats based on misunderstandings” of technology:

The threat posed by technical surveillance devices may be broken into ten basic levels. As each threat level increases the difficulty of detecting the device increases by an order of magnitude (for levels 1-9).
These threats are clustered into three major groupings, with a fourth major group for emerging technologies or threats based on misunderstandings of technology or (in some cases) pure fantasy.

So, in the quote above, we see a TSCM specialist has named the problem-and that because of the general cognitive dissonance, class bias, and crporate-drug company collusion between modern psychology and human beings in general, the technological factor of OGS is ignored, overlooked, or plainly mocked as we see in the James-Sheridan study.
And so too is the incredibly changed playing field where complaints derive from. Where once we had functioning democracy, we now have totalitarian surveillance apparatus mediating everything from our communications online and offline to the chemicals in our children’s minds.
And this, quite sickeningly, BY DESIGN. of a corporate and state collusion at the internet switch. It is indisputable that we are in the era of chemically based mind alteration via the internet, and the ability of hidden actors, ranging from military psychological operations to advertisers, to intelligence agency programs; using hidden programs that target INDIVIDUALS differently, every time they are online.

Related Story: How hidden actors operated on the computers, the switches, the routers and the minds of people who used any one of those devices for fourteen years. From ArsTechnica “Equation Group malware dubbed GrayFish encrypted its payload with a 1,000-iteration hash of the target machine’s unique NTFS object ID. The technique makes it impossible for researchers to access the final payload without possessing the raw disk image for each individual infected machine. The technique closely resembles one used to conceal a potentially potent warhead in Gauss, a piece of highly advanced malware that shared strong technical similarities with both Stuxnet and Flame. (Stuxnet, according to The New York Times, was a joint operation between the NSA and Israel, while Flame, according to The Washington Post, was devised by the NSA, the CIA, and the Israeli military.)”

Most targets, as we see in many online narratives, are under constant threats that they will “be made homeless,” and many actual homeless people have been targeted by nefarious property developers and even the Department of Homeland Security, which is currently operating a CIA styled self sustaining operation that targets real estate using back door searches and more. In other words- our own agencies are creating work for themselves by literally tracking everything people do online, and then using it as pretext to seize assets.
I recently spoke with one targeted individual who was once aspiring to a career in helicopter mechanics. He spent $35 thousand dolars to go through the program, and then, just before graduation from his program, he met organized gang stalking in the form of an old girlfriend. OGS-or, as it is otherwise known- “small town terrorism,” is similar to what we see with Rick and Cindy Krlich in Ohio, and many other cases where small town groups of insiders conspire in various ways to target individuals who are “not from there,”and especially, who have the ability to “get the hell out of there.”
These people are highly targeted in a variety of ways, and some of those ways are bizarre and similar to what used to be called “peonage systems,” aka “Slavery by Another Name.” As startling as it may be, America in particular, an the west in general still operate on a business model from which the word “peon” derives, but also that took effect after the official end of slavery. But instead of one single plantation, and an overseer and cotton fields, we have the prison system, and tiers of  human debt bondage.
Indeed- in the extant blogs online, we can also find some who discuss TI’s as “slaves.” This is not insignificant when we realize that hidden actors literally stalk unaware victis online from official cover-and that federal funds flow to states and private contractors who entrap, ensnare, enmesh, or otherwise calculatedly “capture” the data of targeted individuals, and whole political groups. There are 17 American agencies alone that have the data of an entire generation, and they are culling through it as I write this.
In the case of my informant, I became interested in his case because he has 1) written about his case online and also 2) written to many senators and others and 3) signed petitions for the government to investigate OGS 4) actually documented names, addresses, hone numbers, webs of relations, and military and civilian titles of those who stalked him and 5) currently has a private detective on retainer investigating his claims.
I also chose to contact him because, for the most part-his claims look like any civil conspiracy anywhere, ever, but with actual electronic harassment raging from a cell phone application that acted as a wiretap, to “strange beliefs” abut other electronics. And-we see a new twist in the old stereotypes. We see a white male, middle thirties, raised in the south, using the internet to find infomation, and being led onn goose chases of every kind when he researches electronic harassment, much the way lower class individuals were led on goose chases about “the devil” in earlier era’s/
I encountered his narrative online, and I will write about it more completely in another post. But for now, I note that: the subject writes well, and speaks very well-better than the average person- and this is why I personally decided to interview him. And I will describe his case as one that has classic Level X thinking errors, which I will explain later, and these fall into both categories of Type 1 AND Type 2 errors of “belief,”as well as valid apophenia-epiphany confusions.
I use this latter phrase as shorthand for now, because when we factor in the many stresses and stressors that OGS entails, and combine them with the plainly bizarre “new world” that the post 911, post due process climate of chronic and pervasive surveillance abuse, muc of it eminating from teh deliberate gray area created by Fusion Centers and DHS sying; and some of that augmented with FBI styled “disruption” from oca community policing initiatives.
And in all of THAT which the ideological, sectarian, total surveillance state and the localized community policing has devolved into, we see in fact that the “new world” is the same old bad world it always was, but with a multi-cultural Klan instead of a white supremacist one, augmented by cell phone and internet “reality” and hidden “experiences,”that had been described inn earlier era’s as “the work of the devil,” by those with minimal education.
What is a “wiretap?” Quibbling over definitions in the era of Total Information Awareness, aka the NSA/FiveEyes/Israel/Fusion Center Total Spying Framework, data theft pipeline.
So, a look back is necessary to understand how this abuse takes place and targets the “uppity” is in order. In days past, the image of a “bug eyed coon” who was constantly “spooked” by “odd and peculiar delusions” was staple of supremacist culture, and “odd delusions” and experiences that cannot be explained, such as hearing the “voice of the devil,” or god was a staple of the stereotype, and more.
Here is the Chicago Police Departments version of the bug eyed coon:
Chicago cops' 'racist' brochure depicts African Americans ...
And here is the pik-a-ninny baby coon from Sanofka:

SANKOFA: 8/15/10 - 8/22/10
Note that the bug eyed pick-a-ninny “cannot understand”

So, because a major part of the OGS dialectic suffers from a paucity of compassion, combined with deliberate and well documented attempts to “isolate” people,  and, like the CPD’s depiction above we see elements of “police personality” leaking out in their in-house literature; or because we see that of the two studies online about organized gang stalking, all of the authors are white, and one third of them likely Jewish (just like the Supreme Court)-it is easy to understand what an uphill battle any targeted individual will encounter to merely name the vast ad actual conspiracy against them, personally, much less describe the technological aspects of it. or in language and in

Related Story: The Racist History of Dr. Seuss, aka Theodor Giessel, an eastern bloc socialist

Psychology and even the DSM-V is perhaps one of the most conservative tools of social control ever invented, and is literally derivative from the heyday of the literal and actual CIA financed “mind control” era of Donald Ewen Cameron and McGill University.
And, much of its focus is little more than a sales pitch for Big Pharma, based on the political “mental illness” of the day. Lastly, if we were to view “mental illness” as derivative of class systems of oppression, insurance claims from chronic surveillance abuse, police brutality, or sex, race, and gender disparity, insurers would go broke; and Big Pharma dope would be seen as little more than medications for social problems, or what most of them are: experimental chemistry and social engineering.
If one were too view the claims of TI’s in such a light, we would find that Level X thinking is the centerpiece of nearly all claims of “electronic weapons.” I can say without a single doubt hat of those I have interviewed, with one singe exception, it is my experience that Level X is a more likely explanation than “delusions and paranoia.”
So- my subjects story is much like many of the stories I have encountered (for instance, David is likely mildly schizophrenic, and definitely compulsive, and superstitous; whereas Lucie actually had contact with illegal and unethical medical programs and earlier era psychology tha too place in a well known setting of “bad practices” and actual human experimentation; and the delusional complaint, which then was a mask for institutional abuses. Or, Frank Olson and John Nash.)
In sort, this subject has given me permission to write about his case, and I will only document what is known, plus the conversation I had with him over several hours.

  1. as above, he was an outsider, trying to get ahead in life
  2. he was followed, monitored by locals for long periods of time
  3. his surveillance then began in earnest because he was not from the local in-group, in an area that is dependent on federal dollars
  4. his old girlfriend and party friends hung out together
  5. his surveillance increased to the point where he became paranoid in the literal and psychological sense
  6. he began to document upwards of fifteen regularly occurring encounters with police, military, and their relatives who did various things ranging from moving in next door to him to following, to vehicle surveillance
  7. his fears, anxieties, and “paranoia” increased
  8. his lady friend sold him  30 dollars worth of drugs around the time he was to graduate his helicopter mechanics program
  9. he was arrested and eventually jailed and put into a prison centered rehab program
  10. before, during, and after the “capture” and after he finished his program, he was under surveillance
  11.  he came to the not-so-unusual belief that it had all been planned, and that some gained a substantial monetary “reward” for his “capture.”
  12. he became increasingly investigative, and vocal, raising awareness of OGS, and especially, he began naming names, and dates, and times, and license plates, and more; he began connecting dots and linking ‘webs of relationships’ that led to his stalking
  13. he was arrested three times and put into a mental hospital on a 72 hour hold shortly after he published his findings. One time, he was held for four months in a jail as he awaited “a mental health assessment,”and competency hearing, wee he was found competent; and the jail was paid, and he was burdened with $50-80 dollars per day to “pay his way” out of it.

Let me know if you start seeing patterns, dear reader. Because obsessions with patterns can indicate mental illness-or solid investigative work. And, it can also reveal wider civil conspiracies, much as we saw in the case of the Beatrice Six.
Now, as I looked into his case, I became aware of another interesting set of facts. The case of my informant comes from Missouri, USA. And : 1) Tom Schweich committed suicide in the same state, after a whisper campaign was waged behind his back 2) the Beatrice Six case also happened in the same state 3) Ferguson protesters and activists have been found in curious suicides there too, and 4) I received an email whose address started with [email protected], where the letter writer let me know that they have a little gang of some sort that travels in pick-up trucks with flags on them. The shortwave radio call sign and a newscaster who died in 2011 is also from the Missouri-Illinois border area.
So, I will leave this for now, and come back to it later. But from all outward signs, it appears that crime is actually crated on some level by, for and within the community policing rubric; and the net effect is that states get federal dollars from this activity. See this post here for more evidence of that.

 

Te gang stalking HAS begun: they are Googling "stephen paddock "strain theory""

It’s not a “war on cops”‘-it’s a war on the Total Bullshit Factory of Crisis PR via the DVIC, and narrative distortion, via phony terrorism and fakenews. Ya wanna stop domestic terrorism? Then retire-donate your fourth and fifth pension to the poor.
The headline above is one of many ways we can study organized gang stalking online, and collect evidence that it iis real, and non-delusional in basis; and it is primarily the way that western religions, cults and sects are hidden in internet capacities policing speech itself-backed by the well heeled domestic spy apparatus and the many many “community policing” schemes “voice” their own fanaticism, and stone people who don’t just go along with the program.

Related Stories: Is MORE surveillance the answer? In the Las Vegas Casino’s “they” are ALWAYS watching-and zooming in on-men like Stephen Paddock-but again-they missed “just that one.” Los Angeles Times asks the WRONG question. Reason.com asks why we have to manufacture terror. Hmmm. Is it to late to point you towards my thesis-and Glenn Greenwald’s thesis, and Jeremy Scahill’s thesis and… then, Mike Masnik of Techdirt.com wonders why all these sooper seekrit agencies are such damn lily-liver cowards about releasing the terrorist watch lists  that are basically hidden lynchings in databases accompanied by OGS (if you have nothing too hide, then…?)So-what’ the deal with all that “manufactured terrorism? I suspect your triple dipping pensions (and your peers in your slopper seekrit LEO cults) are guiding you like magic carpets to the dark side, Godguys and Gals!) What is hidden n darknesssssss!!!!!???

In fact, I have documented searches from certain theocratic nations peeking in here at ROGS at very crucial times, and looking at very crucial and important ROGS posts, such as “I don’t give a rat’s ass what tribe you come from, or your personal ideological insanity, or God, G-d, god, G_d, (((G-d))),  GAWD! or ‘God damn, I can’t believe he said that’ bubble”-let’s form some culture, and toss these 72 BILLION DOLLAR PER YEAR BULLIES AND CULTISTS into their own version of hell/sheol/Brooklyn Heights/Orange County/Little Mogadishu/ or the Pentagram there in Washington D.C.!
And also, one of the good guys is in jeopardy as the state-sponsored mechanism of organized gang stalking has been turned on civil rights lawyers and others who believe in rights as“civil rights lawyer Andy Ostrowski arrested DURING A LIVE PODCAST, for practicing the first amendment” or other parts of my thesis, such as the documented link between how the police, fire and EMS services are used in the DVIC “make work” schemes that “are not on the radar” of those who get paid to gang stalk.
In fact, fire truck stalking is so common, that Rick Krlich in Ohio documented some TEN YEARS of it on video tape, as squad cars, firetrucks, and tens of thousands of other incidents where people drove by his house in the middle of the night blasting their horns (search this blog for posts that mention Ohio– or SESTA….) because the fire chief wanted his real estate; and so, many people across the world today are quite interested in the links between documented “gang stalking and fire departments.”

Related Story: Ohio firefighter Tyler “Roids” Roydston would “save a million dogs before he would save black people” (shout out to Ed in Frisco, and his OGS compadre’s at a well known, well documented domestic terrorism fomenting organization that routinely spies on Americans and feeds the data to the FBI/DHS/ local LEO Democracy subversion teams)-and how “one fingernail” of apathy-becomes the Butterfly Wing effect that OGS is, via the religious/racist fanaticism of some, cast like (incredibly well financed) magic spells upon others.

Today alone, the FiveEyes nations and their many spies are peeking in, saying “Sh!t the cat’s out of the bag!” and zipping cute cat  meme’s across Twitter. And those cat meme’s will likely meet the people who WORK AT TWITTER, or who have illegal and warrantless access to the Twitter firehose who use the platform to undermine speech (they call themselves “the birds”-you can look it up.)
– and some other 48 Americans, Indians, Lebanese (curiously, 12 views….), Hondurans, Danes and Nederlander’s-and many others too want to know how organized gang stalking online (which inevitably comes offline) works in practice.

[Note: as I write this post, WordPress has gone into “freeze” mode as if  an internet gang strike force swept up,and pointed weapons at it, cleaned out it’s pockets full of pocket litter, and then, dropped a calling card. I literally cannot get pages to load, or otherwise publish, aka “prior restraint,” and the blog was knocked offline as the connection kicked me off. Any seasoned hacker knows what that means….
But, like Twitter, there are agents and agencies working WITHIN these corporate platforms that work directly act as de facto government agents, some of them/all of them tasked by agencies and the AG’s of the world to do this. And, these presume that this avoids the implications of prior restraint, which has never been litigated anywhere in these cases. And, my machine heats up, and the fan goes into overdrive/CPU gets hot when these attacks occur over this platform.]

SO- here below, is what comes up on the web when I search the same terms(my blog doesn’t appear on the front page….hehehe) about Paddock and strain theory. See if YOU can spot the disinformation narrative in pre-emptive overdrive, as we see in the search results that UFO’s come up BEFORE any substantive analyses, lol:
Note how “UFOlogists” are discussing strain theory-with a UFO stuck in their mouths like an oversize Oreo cookieStephen Paddock and strain theory:
But despite the crisis PR pre-emptively attempting to squash critical thinking and scientific inquiry into “what is organize gang stalking”we see a few gems in the riff raff- like this in Child Psychology and Human Development journal, which, like the Sheridan and James study and NOT LIKE Alex Vitale’s analyses of the police state, this study of “strain” recomends that kids get fed to police, once they experience the anomie-and, get this: the “moral disengagement” that the surveillance state CAUSES, by design:

Perceived Police Injustice, Moral Disengagement, and Aggression Among Juvenile Offenders: Utilizing the General Strain Theory Model?” is published in Child Psychiatry & Human Development. Devin E. Banks of the School of Science at IUPUI and Katherine Lau of State University of New York at Oneonta are also authors of the study.

And of course, it was promoted online by Fox news(….). So- have a look at the “blaming the victim” model of policing, where community policing inserts itself most insidiously into the “community” and then, peek back at my case study about Val, the gang strike force recruit for a comparison, and then, maybe look at Vitale’s assertion that policing IS the problem (which we see over and over again in the various religious, sectarian, DVIC make work projects above):

Future aggression appears to be highest among youth who do not believe that ethical standards apply to them, which we refer to as moral disengagement, but only when they also perceive injustice by police,” said clinical psychologist Tamika Zapolski, the lead author of the study. “We need to understand the contexts in which these juvenile offenders live so we can foster things like community policing to counter perceptions such as ‘the police are out to get me’ or ‘the police hate everyone in my neighborhood,’” she said.

Researchers say youth involved in the juvenile justice system could benefit from intervention programs addressing perceptions of police injustice as well as moral disengagement.

So what we see over and over again is that the MIC/IC/PIC/DVIC-community policing model is being sold, and resold repeatedly (like an aged old helpless hooker), rather than Vitale’s assertion that policing is the problem itself (a young 16 year old Japanese “enjo kosai” compensated dater model) -and that policing causes and CREATE’s crime in an endless make work project.
Like the DVIC model f the 1980’s-90’s, we see that what worked once, doesn’t work so well now-and it is in fact a predatory, old cow, with her pig companions, chewing through the bottom of an endless trough. And even then, it is struggling to gain currency (literal and social) as we see in the cases where the DHS is really a thinly veiled (pun intended) neo-conservative ploy of asset forfeiture and other gross abuses of power and due process of law or even a ‘moral compass’.
 

Let's talk about RATS: PLAGUERATS and DIRTY RATS, specifically.

DIRTY RATS ROBO RATS PLAGUE RATS SEBACIUM and internet search redirection
Gee- I hope I don’t get in trouble for this Mom-and thanks for letting me sleep in your basement for all these years, but like I said over and over again: I HATE RATS. You can read this here to see how long I have been on record discussing how RATS have taken over our country, and especially, our internet. But Mom, Frankly, either there are laws, or there are not laws, and nations that forego their own Constitutions have no basis in law.
Related Story: CCleaner has been hacked and malwared by the government
And I for one, have not feared terrorists, journalists, pedophiles, or boogiemen since forever (or, 2003-4)- because I  know with scientific certainty that these all work in government, the military, vague NGO’s with snazzy mission statements, or in crisis PR. And especially, I don’t fear nebulous “hackers on the internet” because I know these are the SAME PEOPLE who work in-yeah, Mom, these all work in government, the military, vague NGO’s with snazzy mission statements, or in crisis PR.
Mom, some of us knew about these rats for many years before the MSM and even altMedia decided to take our complaints seriously; but also before we could get at the “proofs” that are necessary in journalism to “prove” that what we say is true. Which only makes one more highly targeted. And again, I say: I am NOT a RAT-but I have been telling you about them for years (use my search feature to understand the context of this phrase here at ROGS).
But lots of other people are RATS, Mom, and they are destroying the American democracy quicker than Ellen DeGeneres can stick her fingers in dykes. Like I have been telling others for years-and nearly EVERYTHING I have been telling others for years- is hitting the news EVERY DAY now.
And Mom, I know we disagree on this, but I thought the Constitution and due process, and law meant something! Now come to find out, it means nothing, because everything is “for the children.” (and here, and here, and here and everywhere). Mom, Hitler did the SAME THINGS, and told us that it “takes a village to raise a child,” and all that, and look how that turned out.
Now, people are waking up, Mom! After only 16 years of this crap, and our country going broke,  and people are talking about RATS nibbling away at our Democracy, and eventually, we know these same will be nibbling away at our children as well, like this little ditty about RATS , from the Intercepts latest Edward Snowden document releases:

Mom- while the Intercept does an amazing job of providing the public with a glimpse of how our own governments are nibbling through the bottom of the huge DVIC trough, and destroying or selling democracy, they frequently miss how those who “come in the name of the children” are also those who go away holding the children by the hand. And, sometimes, the Intercept is ALSO a huge part of the problem, because it is largely becoming partisan media. Mom, I told them about these rats over three years ago, for example.
But, Mom, look at how hese billion dollar Military Industrial Complex subsidiary industries of the DVIC are raking in BILLIONS of dollars per year to “eradicate” problems that have existed since time began, and how they are using the good names of our children to do it. Just today for example, these vampires are reading this, and the many of my stories like this, that chronicles how these “good guys and gals” are subtly threatening our children with phony moral imperatives in the guise of the moral panic industrial complex, aka “Bernaysian Crisis PR”.
Which is why I also read Techdirt.com, by Mike Masnik, who invented the term the Streisand Effect, and his team of writers that covers news and tech news from a legal perspective. You might also remember Masnik as the originator of the Shirky-Masnik bureaucracy Perpetuation Principle as well.
And he, like me, is concerned about all the RATS that have streamed into America from Britain, after they were led here by NSA cheese and DVIC dollars.
Masnik writes about a program that the GCHQ used to undermine anonymity, privacy, and even redirect searches over the eMule and BitTorrent platforms, and selectively send targeted results to targeted persons IP’s (and these agencies-as I have noted EVERYWHERE, are redirecting ALL searches of EVERYONE most of the time) under the thin veneer of goodguyism and ‘saving the children’.
But the “human experimentation” didn’t stop there- not by a longshot, because then, the GCHQ would send the results to London Metro police and the FBI, who then participated in the activity in a variety of ways, ranging from political to other targeted activity, such as malware delivery (and all of this long before the Section 41 ‘changes’ became a “general warrant”-and all of THIS without Congressional oversight, or even judicial approval). And then, they sent their contrived  ‘information’ and ‘anonymous tips’ down to the local level, where gang stalking takes place.

Over in the UK, GCHQ was taking much more proactive steps toward turning torrent traffic into both a weapon and a source of intel.
“The page describes DIRTY RAT, a GCHQ web application used by analysts that at the time had “the capability to identify users sharing/downloading files of interest on the eMule (Kademlia) and BitTorrent networks. … For example, we can report on who (IP address and user ID) is sharing files with ‘jihad’ in the filename on eMule. If there is a new publication of an extremist magazine then we can report who is sharing that unique file on the eMule and BitTorrent networks.”
The RAT was also tasked with gathering info to be shared with law enforcement….
A tool called PLAGUE RAT “has the capability to alter the search results of eMule and deliver tailored content to a target,” the wiki article states. “This capability has been tested successfully on the Internet against ourselves and testing against a real target is being pursued.”

So, Masnik is one of the few who is aware that our Democracies are crawling with RATS, and, so, mom, while I appreciate you letting me live in your basement all these years, I think a change is in order, because sleeping with rats isn’t my idea of America.
More from Masnik:

Released Snowden Doc Shows NSA Thwarting Electronic Dead Drops By Using Email Metadata

from the ‘just-metadata’-strikes-again dept

The latest batch of Snowden docs published at The Intercept cover a lot of ground. The internal informational sheets from the Signals Intelligence Directorate include info on a host of surveillance programs that haven’t been revealed by previous document dumps. Nor do they discuss the programs in full. As such, some of the information is limited.
One of those published last week mentions the NSA’s targeting of internet cafes in Iraq and other Middle Eastern countries using a program called MASTERSHAKE. Using MASTERSHAKE, analysts were apparently able to drill down location info to which target was sitting in which chair at the cafes under surveillance.
Further down the page [PDF], past this brief mention of a program discussed more fully elsewhere, there’s another interesting tidbit. Apparently, the NSA can suss out electronic dead drops using harvested metadata. (h/t Electrospaces)

[REDACTED] will be briefing on THERAPYCHEATER. This is a system that uses metadata analysis to detect and exploit the communication patterns of targets about whom the SIGINT system has no specific a priori knowledge. By identifying suspicious patterns in the access to draft folders of webmail accounts, THERAPYCHEATER will identify email addresses potentially being used in a form of covert communication known as a cyber dead drop. There are numerous examples in both SIGINT and collateral of terrorists using cyber dead drops to communicate operational information and plans.

https://theintercept.com/document/2017/09/13/sebacium-from-gcwiki/

The porn deluge, compromise operations, OSI Informers, and intelligence assets.

SO, there you are a traveling businessman from any of many countries- but you are a key player in a negotiation between a Chinese billionaire who needs to shuffle some cash out of the country, and an American company that handles EB5 transactions-and you land in Reston, VA after an 18 hour flight.
You also are friends with your countries  liaison to the UN, who works in Japan with the International Transnational Crime initiative, and while none of that is on your mind- it could be on someone else’s mind, because your connections make you a likely target. And you would be a nice acquisition for any intelligence agency or other state level or corporate player, if only…if only…

Related Story: About two years after I wrote this post that you are reading, agents, agencies, and institutions collaborated to spring a “honey pot trap ” on a Chinese billionaire, who was falsely accused of rape in Minnesota. That US based scheme cost his company, and his nation a 90 billion dollar stock market drop. Using ROGS Analysis, I can save you, and your executives billions. Click my contact button for more information.
(also see this link, where I provide background and photos)

You’re tired, but figure a drink or two before bed won’t hurt your sleep any. After a quick rinse in the hotel bath, you go down to the bar in the lobby, where you sit, eyeball some soccer on he widescreen, andthen, in a rush, a woman sits down next to you, and stammers a quick-“Oh, I am sooo sorry!” after bumping your chair, and plopping a suitcase sized ‘purse’ on the other chair.
(pssst: You don’t know this now, but if you one of these phone app‘s, called IMSI catchers in your repertoire, you would be able to “see” some of what could be in her bag- and I’m not talking coupons, compacts, tampons and cookie crumbs.)
Related story: how to catch an IMSI catcher academic .pdf by Bauke Brenninkmeijer
No problem, right? A common occurrence in any bar. You drink your Jameson and real ginger, and notice that she has called the bartender into an interesting dialogue, and your ear drifts in and out of the conversation about an obscure liquor naed “China something or other,” joining your ear to the facts and mis-statements thus:
“But it only grows in the Andies mountains! I am certain that’s what the distributor said,” says the magnificently comely, Sibel Edmonds look-alike who bumped your chair; and who now makes the claim she is a former liquor sales rep.
“No- I know this one,” says the bartender, “because I write a blog online for other bartenders. Cinchona is native to the Andean mountains, but it is cultivated in other places.”
Odd, you think to yourself- you just had this conversation across the world, with someone who claims they are a “naturopathic doctor,” who told you about quinine water, malaria, and how it cures people in developing areas of the world. Bits and pieces of the conversation float back into your mind:
“Confederate doctors used bark to treat malaria, because their medicine supplies were low, or non existent.”
And “quinine” aka tonic water is the base of a god gin and tonic,” and so on.
Your mind drifts into old black and white movies, Humphrey Bogart, and the sound of a drink-any drink in an old B&W movie, “on the rocks.” Rocks were a big deal in the refrigeration era and so on; B&W films are a good match for clever sound engineering that includes the near-onomatopoeia of the word “rocks,” and so on-such is the nature of inner dialogue.
Then, beyond your own better impulses, you venture that “Actually you are both right. Cinchona is in fact native to the Andean mountains, but also it is cultivated in other places. It’s the national tree of Peru, which is kind of funny, because for the most part, it is a shrub.”
The crowd feigns awe, and then makes small talk about every drink under the sun that contains quinine, and despite yourself, you venture forth your extensive knowledge of chinchona thus:

Cinchona (/sɪŋˈknə/ or /-knə/)[2] is a genus of flowering plants in the family Rubiaceae containing at least 23 species of trees and shrubs.[3] They are native to the tropical Andean forests of western South America.[4] A few species are reportedly naturalized in Central America, Jamaica, French Polynesia, Sulawesi, Saint Helena in the South Atlantic, and São Tomé and Príncipe off the coast of tropical Africa. A few species are used as medicinal plants, known as sources for quinine and other compounds

And of course, you remember this odd “conspiracy theory” that the holistic doctor told you about-he one about “mysterious suicides and murders” of holistic doctors. But of course, you don’t bring that up….
“Well, folks, nice talking to you, but I have an early meeting tomorrow-oh, look at that! Later today.”
In your room, you log on to the hotel’s network, and check your email’s, looking forward to the ones that you cannot check, or even acknowledge owning in the communist/theocratic/totalitarian nation that you are from. But hey! You are in America now-land of freedom, and Constitutional rights-and even a first amendment that protects speech in all forms!
But make no mistake- our “good guys” are even more deviant than your “good guys” who chop men’s hands off for stealing a pinch of desert salt, and our guys have a plan for your guys- and you too, because your computer’s unique identifier that is hard coded into your Windows 10 tells every ISP that you are “not from here,”and the way that OUR good guys enforce Biblical narratives, and primitive morality that is the “opposite of free” have lots of plans for you.
So: you check your usual corporate has the usual stuff. Ashley Madison account-that one temptation that you infrequently log into anymore, because, well- feminist jurisprudence enacting itself through hacking-and that SOME people are “making lists!”
SO you check in to the old main stay- your Hushmail account, because, like, no one could or would ever hack THAT– where you find an “invite” for a free trial to a discreet mature and elegant naked lady porn site.
Or, this, which is as American as Apple Pie, and some say, MORE American than apple pie, is currently in conflict with this.
Or cherry pies meet Golem, in Haym Solomon’s bank vault:
IMG_2909.JPG
You click the link, follow a few instructions, and you’re in-your in so deep, that you may never get out again, because that link was a honeypot, and then, your computer is spammed, and windows are popping up, full of dog porn, and horses in the Sonoran desert shtupping moaning senorita’s with swinging double DD’s , and 13 year old’s in swimsuits playfully beckoning you to swim….

Related Story: A few Blasts from the Pastsss There’s a special place in hell for Madeleine Albright
NATO “deeply” regretted killing at least seventeen people when a bomb hit a bus packed with women and children. It also supposedly regretted killing fifteen people after it targeted a hospital with a cluster bomb and killed three diplomats at China’s embassy in Belgrade. After Serbian television criticized Albright and Clinton, it was bombed as well, killing sixteen people.

And what porn deluge would be complete without “Russian disabled woman porn,” where legless and armless “Russian women” who are actually Serbs and Croats kidnapped during the last heroic act of UN good guyism (which was actually an act of good girlism, thanks to Madeleine Albright) tied to trees, squirm under the weight of grunting guys in military gear.
You have been rick-rolled- so…..
Welcome to the porn deluge, 101, which is a staple of military campaigns, terrorist recruitment and compromise operations, intelligence agencies and hairy backed Moldovan porn entrepreneurs alike. While on the surface, it’s just  “spam” to you, it is also a lot of other things that you haven’t yet figured out-but which you will contemplate for days to come.
Either way, and regardless of who set you up or otherwise rick-rolled your ‘un-hackable’ Hushmail, it’s YOU that have been shtupped.

shtup
SHto͝op/
vulgar slang
verb
gerund or present participle: shtupping
  1. have sexual intercourse with (someone).
Welcome to Jewish-christian culture! A place where the good guys and gals act as God! Look no further than that one event, and know that your fanatical religious sects and cults have nothing on our “good guys and gals,” who have pre-emptively shtupped you for the common good-for the children, of course!
The next morning, in the lobby, the fully do-able Sibel Edmonds clone just happens to rush by you at the elevator, which is right next to the sign that says “Stairs–>”.
“Morning traveller!” she says in folksy American colloquial English. “How did you sleep last night?” she asks, with an odd smile on her face.
“Oh I slept just fine, thank you,” you say, regretting the moment you clicked the link.
” Well be careful out there,” she says to you, specifically. ” I hear it’s going to rain today. Better get an umbrella!”
“Oh, thank you,” you say. “Does it rain a lot here?”
“Oh, my,” she says. ” When it rains it pours! It can be a real deluge sometimes.”
“Oh. Well, hope to see you around,” you say, still thinking about the initial link that promised “elegant nude ladies.”
And because you are a man-and these honeypots target men specifically, and in and of themselves are gendered operations that violate even the US Constitutional guarantees of “equal protection under the law,” somehow, the good guys and gals missed that memo.
And you, foreign man, are now a potential”compromised asset.” Or, according to the experts- you are likely suffering from some form of apophenia, should you one day connect the dots.
Related Links (BE CAREFUL!)
American women  and dogs: young women choosing dogs over motherhood or men (and probably a few other things- try not to let your imagination GO WILD!)

 

Organized stalking and "mind control" and influence operations: manipulating voters.

Epilepsy warning: this post contains a swirling graphic image
While our governments, our corporations, and our intelligence and law enforcement agencies believe it is their right to steal our data, and use it to maniulate and even abuse certain people and to wage influence operations on us, in secret, I believe in fair warning, in anticipation of un-intended consequences, hence my epilepsy warning above. This is the difference between consensual behavior, and non-consensual behavior, and the NSA/CIA/FBI/DEA data theft pipeline had  15 year head start on all of us.
Except, me, maybe.
Any cursory research into organized gang stalking reveals that politics are a major factor in “who gets targeted with OGS.” While there are varying levels of targeting, ranging from simple “influence” operations through the internet, to extreme cases where local politicians and others gang up on individuals to harass, intimidate, or otherwise coerce them, the most common “targeting” that individuals face is through advertising.
As we saw in the case of “Moonshot CVE” and in the cases of Twitter monitoring activists and feeding the data to law enforcement and other un-named parties, and programs like DataminR and Media Sonar being used concurrently at Fusion Centers, and the local police department, as well as yet un-named intelligence agency level programs, there is a constant blurring of lines between advertisers, governments, political PAC’s corporations, and then, police and intelligence agencies targeting of activists and others in spying or conformity enforcement operations.
Welcome to PsyOps, mind control, and  world wide”influence by constant suggestion. Now, ad a targeted audience-and a targeted influencer of that audience….
You’re getting sleepy now….count backwards….as I redirect your internet connection….breath deeply….watch as Google suggests a few (harmless) things to you to make your life easier, better, breezier, Nabisco cheddar….
Or, this:
Image result for swirling black and white gif

Plus The Hive Mind:

blak and white thinking.jpg
And that “one guy” somewhere-anywhere in the world hidden behind the switch (with NO accountability, no records of hi/her actions, and no recourse for citizens to sue these bastards), with “the master list”:

cropped-showimage-arcadia-switch
M: Are you there Bob? It’s me, Margaret. Yeah. He said it again. B: Said what? M: He said WASP. B: WASP? hahahaha. They haven’t had any control or power since the sixties. M: Yeah, but he called WASP’s JAP’s B: JAPS!!??? We kicked their asses into the dirt!  And we are STILL kicking their asses into the dirt, lookie, I even sicced the UN on ’em. Those A-rabs are getting hungry for young Jap girls and those Jap men are hogging them all with enjo kosei! The UN is gonna liberate a few of ’em. M: Bob-BoOOOob..slow down! He was talkin’ about those OTHER JAPs….and a few senators too, like Senator Dierand Klikenstein B: Oh, shit. That hits close to home. Better send a few fire trucks past his homeless shelter. Make sure the sirens are low and slow, like an omen or something. Tell the boys that this is a ‘schedule 13’ emergency. M: Not an 11 yet, Bob? B: No-this is schedule 13 stuff, save 11 for the ‘other guys’ M: Got it. Thanks Bob, what woud I do without all your good advice? B: I dunnno-but my ass sure gets sore sitting here for the last 103 years. Maybe you could…M: Don’t even think about it Bob.

Whhoooooo! WHoooooOOOOOOooooOOOoooOOoooOo!
So, to put this in common terms, imagine yourself walking down the sidewalk, dodging blots of chewing gum, and the residue of mop water, or even broken glass dumped across your path. These are ordinary pedestrian obstacles, and most if not all people expect some of that when out walking.
As you continue on your  path, all of a sudden, a bicyclist heads straight towards you, so fast that they seem as if they might just run you over. What do you do? Of course, you step aside, thinking-“what a rude prick. I had the right of way- and bicycles are supposed to ride on the street!”
You brush it off, and continue on your path. An the obstacles become more and more: the couple walking along is as wide as the sidewalk, and you step off into the grass to let them pass. And then, five teenagers on skateboards; and then, at a crosswalk, people are bumping into you from all directions as if you are not there.
These scenarios above are what is described by TI’s who are being gang stalked, and particularly in the last example, this is what is known as “community mbbing,” and also “street theater.” TI’s write endlessly about this online, but they are also described by others who “suffer delusional disorders.” What’s the main difference? Proof- proof is required to indicate that such is actual, real, and happening to you.
In OGS, proof is hard to get, because of the design of community harassment and community policing, but online, it is easier to prove, now that we know with certainty that it IS happening, it IS targeted, and it IS political. And, as we see above, it IS attempting to influence you, your behavior, and your choices.
Here, below, from Breitbart News, we see targeted individuals as swing voters, but we also see that language and particularly, coded and slanderous language is used to label, and further harass or otherwise cause harm to individuals who don’t toe a party line.
While on the surface, it cannot be missed that this targeted “outreach” is yet another example of Democrat demagoguery, it also cannot be missed that “hetero-normative white people” are being labeled in ways that can and do trigger the Department of Homeland Security “threat matrix” and “bad words” lists, as “white supremacists are on every list as “hate groups”:

NH Dem Party Chair Calls Rural, Disaffected Voters ‘White Supremacists’

 

This weekend WMUR’s “CloseUp” interviewed the executive director of “Look Ahead America” Matt Braynard, whose new organization is planning outreach to inactive voters in New Hampshire.
Braynard said, “We’ve identified maybe 15,000 inactive voters who we would consider disaffected, patriotic Americans. And potentially 100,000 or more unregistered adults we’re going to reach out to.”
He explained his organization was using “psychometrics,” saying, “Normally it gets applied to likely voters universes for purposes of persuasion. We are applying it towards identifying patriotic Americans who’ve become disaffected and cynical, so we can engage them on issues relevant to them, get them registered, get them educated and turn them out to vote.”
In response, the chairman of the New Hampshire Democratic Party Ray Buckley said, “The organizing and activating of these extremists, these white supremacists, really could have a detrimental effect on the entire culture of New Hampshire.”

In the aricle above, note the use of the word “psychometrics” which literally means ” the measure of psychological effects in order to cause persuasion.” This is not insignificant, as we see that “influence” is the goal, and that “psychology” is applied as a tool.
In relatively harmless incidents such as this, we must ask ourselves if “influence operations” are harmful, and most likely come up with the answer that they are mildly intrusive, but not necessarily “causing harm.”
However, in these cases, when we add the fact that the data used is derived from the “profiles” that our own ISP’s have sold to outside organizations; and that these profiles are shared and re-sold across gvernment, private industry, political PAC’s, the Five Eyes Alliance, and even in the case of Israel, that our profiles are literally given to a theocratic, apartheid nation state that has not signed any nuclear treaty or even officially disclosed that it is a nuclear power the story of harm versus “no harm” becomes a question that few are willing  to ask out loud; being used against their and it becomes a question where the individual this targeted must make a stand, or simply succumb to being used against their free will in such a manner.
So, this issue of “supremacy” becomes for some of us, a crucial and key point wherein we must ask “whose white supremacy” is being targeted and whose white supremacy is not (most Israeli’s and other supremacist Jews still encourage their daughters to marry only white men). And certainly, other theocratic, nationalistic, racial, and psychological  supremacy becomes part of each persons targeting as well. So-whose decisions are we actually making when we are under chronic and constant “influence operations”?
Regardless of the answer, there is one other level of questionable targeting: the fact that beyond advertisers profiling us, we also have intelligence agencies profiling us, and then, targeting us as well, individually n levels that only nazi maad scientists were able to conceive of in decades past.
Because the past is the present is the future with intelligence agencies, we know with certainty that other, more nefarious and unethical targeting takes place, and that this takes place in secret, without our informed consent- that this entire internet entrapment scheme that has made everyone a target, has now morphed into a wider scheme of political targeting on the ‘consumer’ level; and that despite the consumer’s awareness that it is them, being consumed first, and targeted advertising only after that.
So beyond the citizens rights to protest or even to withdraw from these big data schemes, or the use of our data to make us targets, multiple levels of targeting are taking place at all times, and our decisions are under constant and chronic attack.

Bombing suspect mentally ill. Deep State cozies up: another #badguy Foiled! Stop me if you start to see patterns. Obsession with patterns can indicate schizophrenia.

Note to the reader: mental health professionals see patterns and obsession with coincidences as signs of mental illness. Tell me if you see a pattern here, with YET ANOTHER MI kid entrapped in a “terrorist plot.”

Attempted bombing suspect’s family issues statement [full story here]

by Kyle Schwab, & Meg Wingerter Published: August 16, 2017 8:57 AM CDT Updated: August 16, 2017 9:02 AM CDT

Family members of Jerry Drake Varnell issued a statement late Tuesday night regarding his involvement in Saturday’s attempted bombing of a downtown Oklahoma City bank building.
“We as a family are extremely distraught about this situation with our son Jerry Drake Varnell, but what the public must understand is that he is a paranoid schizophrenic and is extremely susceptible to different types of ideology that normal people would deem immoral. Underneath his condition, he is a sweet-hearted person and we are extremely shocked that this event has happened. However, what truly has us flabbergasted is the fact that the FBI knew he was schizophrenic. The State of Oklahoma found him mentally incompetent and we, his parents have legal guardianship over him by the Court. These documents are sealed from the public, which is why no news media outlet has been able to obtain them. The FBI clearly knew that he was schizophrenic because they have gathered every ounce of information on him. Reading the criminal complaint against him has brought us great pause due to the numerous lies from the informant. We do not have an underground bunker! We built our home a few years ago and bought a storage container, as we use it for a storm shelter. We only recently pushed dirt up around it to make it safe. The building is used for storage and is NOT a bunker full of food and supplies, in fact the doors close from the outside. It has neither electricity nor anything that would make it habitable.
What the public should be looking at is the fact that the FBI gave our son the means to make this happen. He has no job, no money, no vehicle, and no driver’s license, due to the fact that he is schizophrenic and we; his parents do everything we can possible to keep him safe and functional. The mental health system has consistently failed us due to the lack of establishments and health care coverage for a person like him….

 
Some say that delusional disorders include irrational fears of patterns, or an unusual obsession with coincidences. In the story above, we see both ‘patterns,’ and ‘coincidences.’
Here is one such coincidence: the family of yet another entrapped defendant  thinks FBI due process reach-around milked their MI son into a plot. This is a pattern with each and every mentally ill kid that is entrapped into a nebulous FBI plot. And you can BET that many others discussed in my thesis were involved as well. Apparently, someone sat down and said “Gee Bob, do you think there might be more money in fake plots, or in the proper care of schizophrenics?”
The short answer, of course, is that there’s waaaaaaay more money in fake terror plots.
Pattern’s:

I would LOOOOOOOOVE to see this kids internet history-and trace all of the connections he had(and did not knw he had) to Fusion Centers, squad cars, the Rotary Club, etc-all of those InfraGard goodguys who are “protecting the wimmin and chilren,” from #badguys- and just to see how much of my many thesis could be validated in this one single case alone.
Coincidence’s:
Human Rights Watch documents ‘sting’ operations
Report raises questions about post-9/11 civil rights

 
Alright folks, try not to let all these “pattern’s and coincidences” cloud YOUR patriotic vision-and keep milking that “anti-turrerismsmsmsms” teat til the cow’s come home to roost. And of course, carry on! Nothing to see here! MooooOOOOOooove along now.
But before you get back to that trough over there (the one with the hen house on top, and the fox, there,  guarding the hens safety) take a look at Google search terms like “”gang stalking” and “neighborhood watch” which returns about 37,100 results worth of “coincidences.” It’s starting to look like a “pattern,” similar to how some say that “community clubs” like the Rotary and more are involved. Hmmm.
 

Try not to make yourself crazy in that echo chamber, lol.
lolololooolooooollllllll.
Then there’s this old blog which documented it too: http://neighborhood-watch-gone-bad.blogspot.com/
and some comenntary:

Neighborhood Watch, Neighborhood Support, Community-Based Policing, Community Watch-Dog Groups, Citizen’s Corps, Community Patrol, Crime Watch, Guardian Angels, Citizen Observer, COPS, TIPS…
These and other such ‘citizen safety’ or ‘crime prevention’ groups, which any citizen can join, are a house-hold name. We put our trust in these groups, who declare themselves to be the ‘eyes and ears’ of the state.
COULD IT BE POSSIBLE THAT CRIMINALS HAVE IN FACT INFILTRATED, STARTED UP, OR HIJACKED MOST NEIGHBORHOOD WATCH-TYPE GROUPS, AND ARE INSTEAD USING THEM AS A FRONT TO VICTIMIZE AN INNOCENT CITIZEN LIKE YOURSELF IN A COORDINATED CAMPAIGN OF TERROR?….Community based policing groups such as neighborhood support are now using neighbor’s to help them to psychologically and socially attack an innocent individual who they have chosen for ‘destruction’.

 
And here is a correlation between an “increase in federal funds for neighbors to wage hidden terror campaigns on other neighbors” and “positive spin” from spin doctors that claims ‘crime goes down’ with community watch groups. Hmmm. I guess that depends upon how you define “crime,” and whether or not you can catch the rat’s at your windowsill.
Here are tools YOU can use to catch these voyeurs, bullies, and internet switch redirectors in action.
 

Gang Stalking and Fusion Center spying and artificial intelligence: yes, "they" ARE spying on you, in real time

Now that the slow roll-out of totalitarian domestic spying has occured (while you were sleeping, perhaps), we can look back at the many felony lies to Congress by NSA and CIA chiefs, and the local lies from Fusion Centers and the FBI and local police to see that, well, it was all lies (then take a look at how deep state players created a bomb hoax, and a designer bomber who allegedly targeted those exact CIA /FBI /SOROS funded senators and others who lied to Congress ).
And, Democracy was dead after that- those with power had, and do, and will continue to destroy our democracy-because they can, and because YOU are letting it happen.

Related Story: the Association of Threat Assessment Professionals (ATAP) calls police and private contractor sponsored organized gang stalking “colluding parallel investigations.” And many ATAP affiliated private contractors company names are, not surprisingly similar to the military acronym for psychological exploitation of targeted influence operations, aka PsyOps. use is closely associated with Fusion Centers, and a staggering amount of OGS complaints, and their crisis PR is what drives narrative in the press, and in police related public relations. . Americas 77 Fusion Centers are also very well disguised, each of them using different names, so that citizens cannot connect the dots.

Related Story: Washington State Fusion Center distributes bizarre “mind control ”documents to FOIA requestor, who asked for a different set of documents entirely 👽💩👻
From Techdirt.com, in April of 2013-two months BEFORE Edward Snowden:

You may recall that, last fall, a Congressional investigation completely slammed Homeland Security’s “Fusion Centers” — noting that despite DHS insisting that they were critical to “fighting terrorism,” the actual evidence showed that they had done nothing helpful in the fight against terrorism, but were instead chock full of wasteful (possibly fraudulent) spending… and with an added dose of civil liberties violations (just for fun).
“There’s misconceptions on what fusion centers are,” he says. “The misconceptions are that we are conducting spying operations on US citizens, which is of course not the fact. That is absolutely not what we do.” link

But what ARE Fusion centers- and what are they supposed to do? Nobody, anywhere seems to know, but those who have experienced various forms of “electronic harassment,” and strange internet shenanigans certainly know that these centers are doing something. Targeted individuals have been telling us for years, what we all now know.
From the ACLU: what Fusion Centers are supposed to be doing

UPDATE: Police, and Fusion Centers have begun waging media hoaxes attempting to discredit victims of illegal Fusion Center spying, and here we see an actual Fusion Center in Washington state distributing “junk information” to the press about mind control, and here we see local police and sheriffs deliberately waging a media hoax, claiming that a dangerous drug, fentanyl, was put onto fliers that were then placed on squad cars, right outside the police station.

Organized gang stalking, psychological and influence operations.

A large part of what the organized gang stalking dialectic seems to be is the result of psychological operations, and influence by suggestion. And some 70% of the blogs I have read talk about something called “electronic no touch torture,” which in my mind at least, is an accurate description of how one feels after their privacy is invaded, and or they are subjected to contact with agency level psychological operations. Every agency has a dirty tricks section, and they use them covertly, and judges and juries much less the average citizen are never aware they were there.
Even the world reknowned authorities, and pro -prosecution OGS denialists David V. James and Lorraine Sheridan on OGS agree that the mysterious and nebulous “the internet” creates an “ideological echo chamber,” i.e. that for some, the targeted advertisements, the targeted switches and targeted routers in targeted American communities who have ISP’s that target words, and CEO’s that target speakers, and hidden FBI Infragard agents feeding community policing that trickles in from the internet switch- and for targeted individualsThe internet creates a sort of ‘closed ideology echo chamber’ wherein people who share unusual beliefs reinforce each other’s thinking”
Which is, or course, by systemic design as we see the redirection method being used by “mystery money” funded startups to influence “jihadists” and the equally nebulous “right wing” alike via linguistic analyses, which is known as “persuasion,” and also “soft force mind control, and more. Then there is the direct access to any given targets mind via hacked cell phones, and then, hacked relationships-because that is EXACTLY what the Panopticon via products like Palantir, Moonshot CVE, and “captology” was designed to do.
Most sites and discussions about no touch torture are loaded at the front end and are themselves psychological operations. Butt of the few sites that are not, we see that it is a real concept, and practice.

Psychotherapist Otto Doerr-Zegers, who has treated Chilean victims tortured under General Augusto Pinochet stated; “The psychological component of torture becomes a kind of total theater, a constructed unreality of lies and inversion, in a plot that ends inexorably with the victim’s self-betrayal and destruction. …”
This is similar to the technique of “street theater” that mind control victims described in the Washington Post Magazine article. As torture victims are not mentally ill, mind control victims would not be mentally ill but rather have undergone and are undergoing a traumatic situation comparable to torture, such as the alleged illegal targeting with government mind control weapons.

Here below, is one of the ways it is deployed in the real world, from NBC news, is Britain’s JTRIG dirty tricks division:

“British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”

Imagine yourself sitting down to write an email, and all of a sudden your connection is cut. Then, you look in the body of your email and that masterpiece that you spent some 10 minutes writing to your aunt Alice has also and without explanation, disappeared-and NO COPY EXISTS in you drafts folder.
The first time this happens to you, you would be pissed-but if it happened dozens of times as you write critical stuff-emails to your doctor, a hot tip to your bookie(*jk*), or an even hotter tip to a journalist who believes in Constitutional liberty, you would begin to see patterns in your own mind-that your data is being messed with inside you.And, in fact, the internet has literally come into your home, and changed your behavior even before your fingers hit the keyboard-and altered your actions inside you.
This is what no touch electronic torture really is in real world deployment. And while it may seem insignificant, it has the cumulative effect over time of wearing a person down, letting them know that they are being watched, and that crucial and critical communications are being stopped at one’s fingertips. Important friends and associations are being destroyed each time you bring up these “odd happenings.”
And this, combined with other electronic no touch torture: your computer is hacked repeatedly, or flashing white screens; your cell phone apps turning your phone on and off seemingly at will, or the coincidental amplification of your conversation in your ear. here are literally hundreds of ways that a persons phone can be messed with, and TI’s talk about that too. Taken as a broader picture, it is the cumulative effect that does the damage.
Torture in any form is abhorrent, and never necessary, despite the claims of those who torture, who also happen to be the same people who have collected all of our internet data and are now culling through it  with 17 other agencies for blackmail purposes. If I had told you this is what is happening even five years ago, you would have called me a nutter. And now, I bet, even you are afraid to say it out loud much less do anything about it. First they came for the crazy guy on the internet….
Using neuro-linguistic programming techniques as simple as Google auto search”suggestion,” and subtle verbal intimidation, as well as the deployment of various internet tricks, such as cutting off a persons ability to write blogs, or the interception of emails, much of what we see can be said to have the hallmarks of classic operant conditioning, combined with learned helplessness.
This last link is important because many in the dialectic feel as though they will never be able to overcome their situation. And, the one venue they have, the internet, is subverted at every point as heir blogs get hacked, and their emails intercepted, and so on. Some 50% or more of the hundreds of blogs I have read indicate that these things happen. So it could be an indicator that there is something afoot, as other online communities of bloggers do not report these things, dwell on them, or even infer that they happen.
So, even a casual investigator of this community will readily recognize this feature. And, there appear to be some blogs that use learned helplessness language, and others that d not. Simple phrases like oh, targets, just get used to it, Wherever we go, there will always be gang stalkers,” and so on. A great example of that is the blog https://neverending1.wordpress.com, where the writer never loses the chance to use negative language that reinforces the hopelessness of those who go here for advice.( I refuse to provide a link it is that negative.)
Extra Bonus: Here is the CIA page for psychological operations to control populations.
Sigmund Freud, in “Civilization and its Discontents,” notoriously classified modern men as “men of action,” and the intelligence agencies are really into that.

“The man who is predominantly erotic will give first preference to his emotional relationships to other people; the narcissistic man, who inclines to be self-sufficient, will seek his main satisfactions in his internal mental processes; the man of action will never give up the external world on which he can try out his strength….”
-Sigmund Freud

And, in the targeted individual community, there is no small irony that they begin to refer to themselves as “TI’s” when in fact the PsyWar equivalent is the “TA” meaning targeted audience.
Here from the CIA link above:

The intelligence officer is not inspired by the purpose of merely collecting and evaluating information or making analytic studies. His mission is not an end in itself, but a means to an end — a contribution to the defense and foreign policy objectives of his country. His work is therefore meaningful only to the extent that the information he provides is utilized through appropriate action. The individual operator’s performance, to be sure, does not lose merit if significant information which he acquired in due time and reported to proper authority is not acted upon; but the intelligence organization as a whole has failed to function effectively if the information it produces does not lead to some kind of policy determination or action.

I must at this juncture make note that in classic schizophrenia, there has always been the element that these claim that they are being followed or harassed by the CIA or the FBI. While organized gang stalking DOES have these claims within it, sometimes, even the paranoids are right, as we se now with the Palantir database which is equipped with artificial intelligence an predictive software, as well as a host of other means by which to ‘read a person’s mind’ and control or manipulate their online behaviors.
But it’s simply not fair to blame the CIA for everything, although it is convenient, and the idea is within the vernacular of most people.Since Edward Snowden revealed that the NSA is sweeping up the data of everyone, and all Americans as well, we are now able to track the basic flow of this data in news stories that document the reach of this grand psychological operation we see that the picture is much bigger, in much more horrible ways than the CIA could imagine all by its lonesome.
Here in this link are the tactics and techniques of guiding, misguiding, or poisoning the dialectic entirely, and then, disguising victims in the cloak of mental illness.Any researcher of organized gang stalking will find correlations between the phhrase “electronic harassment” and discrediting tactics outlined in the CIA manual. In the targeted individual community, the psy-war elements are everywhere.
The Five Eyes nations are all in on it, and Great Britain is one of the worst offenders, using the dirty tricks division JTRIG to compromise, blackmail, and discredit targeted individuals.

A slide from the JTRIG dirty tricks and mind control presentation. Note the emphasis of “making something happen in the real world.” Mass shooters anyone? What else are these guys “making to happen?”via The Intercept

Israel has been getting ALL Americans data since forever, and waging hasbara and other psyops across the globe to enforce, reinforce, or otherwise promote Jewish religion and culture (the apartheid, mind control, old lady killing zionist version  of it.)
From the Washington Post:

“The relationship was described in a “Memorandum of Understanding” between the NSA and the Israeli SIGINT National Unit (ISNU)”

So- if those are “our friends”-our enemies must be real shitbags right?  But even China has yet to catch up with us as comes to waging active psy-war on it’s citizens. We can read  CNN as they try to downplay the fact that China is doing EXACTLY what the Five Eyes alliance is doing to suppress, control, discredit and destroy the free speech rights of western nations.Meet the CNN  version of “the Great Cannon of China.”
But-does it hold up well against the Free Speech Steamroller that we use? Only time will tell-or, maybe someone can  get standing to sue our agencies and see what they are really up to. I bet the Chinese are rolling in laughter as they watch how the agencies and law enforcement in general are using our Constitution as toilet paper.
Lastly, it cannot be understated that “the CIA tortured some folks.” And that the American Psychiatry Association provided advice as to how to do this. Meanwhile, their guys always get the help they need when they are done torturing others. I don’t mean to imply that the CIA and other’s are using the internet as a form of torture for some, but YES THAT IS WHAT I AM IMPLYING. But clearly, they aren’t the only ones doing it.
Stalin, Hitler, and their go-to guys in Psychological Operations, Edward Bernays (whose books lined the shelves of all Nazi propaganda officed)and Sigmund Freud, both of them Jewish, had nothing on our guys when it comes to propaganda, and mind control techniques; and China last I checked had no Manchurian Candidates, because as we see time and time again, only western nations and Israel are literally manufacturing terrorists.