Being Watched: It Might be Your Imagination; and it might not be, too. The 9/10 rule

Here is some excellent advice for anyone who is being gang stalked, from Bev G. at Owlcation.com

Being Watched: It Might be Your Imagination

It starts with a minor incident, such as a trash bin being knocked over late at night, then perhaps the sound of a squirrel in the roof. Your fertile imagination builds on it and attributes every sound, unexpected beep on your phone and passing footsteps to your ‘somebody is watching me’ fear. The fear becomes a phobia.

Although spying does happen, nine times out of ten it is nothing more than a feeling. Many people experience it. Severe cases are called “The Truman Show Delusion” after the movie where Jim Carey’s character realizes that his whole life is just a TV show being broadcast to millions and he is the only one who’s unaware that he is the main character.

Nine times out of Ten

You will frequently be wrong about the incidents you will experience during stalking of any type. You are not wrong because it isn’t happening; you will be wrong because you dont have the right aproach to analysing your situation.

This means that you should be vigilant, and assess your situation rationally, and put fear aside, and replace it with logic. And, human logic says we must be analytical, and willing to eliminate bad information, such as “someone on the internet said the beeping noise outside my house is an electronic weapon!” and replace it with brave exploration. So, dont be afraid to arm yourself with a kitchen knife,and go outside at midnight, where you might find that beeping noise is in fact, your neighbors air conditioner, or something else.

Superstition, fear, and anxiety (especially if you are under the threat of stalking, blackmail, or other modern harassments, like gang stalking) cloud our judgement, and cause our descriptions of events to be flawed, and so we must replace these bad descriptions with facts.

With the United States and western nations generally having completely adopted a total police and surveillance state posture, claims of being spied on by governmant, NGOs, social media, etc. truly do validate the claims of targeted individuals. And, in some communities, groups like community block watches, townhome associations, and others operate much like mobs.

The question is, can you keep your head focused long enough to do the work required to prove your claims, and collect good evidence against gang stalkers? In other words, are you willing to Do the Work to protect yourself, collect sound recordings, photographs, and films from small hidden cameras that you place in your surroundings, and other evidence, and then, file proper police reports about incidents?

Because the main difference between ordinary stalkers (ex-BFs/GFs,random strangers, actual criminal gang members, etc.) is that organized stalkers are utilizing tactics derived in military settings to target you. And modern community mobbing means that you will have a highly organized infrastructure targeted at you. That infrastructure can include:

* Fusion Centers acting as middle men during the gang stalking.

* FBI Infragard agents monitoring your computer and phone usage

* online harassers, bullies, and military trained psychological warfare specialists trying to radicalize you by endless hacking, redirection, and bullying

* community groups like block clubs actively feeding false information to authorities

* private investigators related to Big Pharma connected persons with vendettas, using “psychiatric meta-narratives” ti discredit their targets. Read about the “medical mafia” that was poisoning black people in Detroit area via bogus cancer diagnoses, and the whistle blower who put Dr. Farid Fata in prison.(with.little surprise, we find that this medical mafia is tied to infamous online trolls like Dr. David Gorsky, P.Z.Myers, and several other so called “skeptics”that litter the internet with pseudo-science, blogging from National Geographics,Sciencebligs and other platforms, and pushing the quackery of politicized science and crisis PR narratives. .

And, these tactics are far more elaborate than anything an ordinary stalker will do, precisely becase of their levels of organization, and then, their access to powerful tools, like Fusion Center wiretaps, and high powered electronic spy gear that military contractors are selling to local, domestic police departments.

So, psycholigical operations take te place of mere narcissistic abuse (Lucky Otters Haven writes about that), and instead of one or two stalkers, we now see that the entire, elaborate Panopticon is being waged on individuals.

And that Panopticon includes 24-7 monitoring of all persons social media, license plate tracking, and cell phone monitoring too. So, you must distinguish your anxiety from the real facts on the ground, and then, see if you are being stalked by a group, or an individual.

But be aware that gang stalking starts when you cross paths with an individual coward who works in state and local governments (I usually point to the case of Rick and Cindy Krlich in Hubbard Ohio as the classic case of that, with a clear timeline, great evidence, and well spoken, rational victims of a coward and his gang of thugs in local government) and that it can take you a long time to figure that out.

So, while all stalking shares similar features, organized gang stalking is rightfully called “stalking on steroids,”because it is the poluce, town council members, firefighters and others with access to these modern “tools” doing it.

In the many years I have researched OGS, I have found many groups that do it, and many of those groups are networked, and interlinked. Here is a short list:

1- law enforcement and firefighters, public sector unionists, and their security/intel/health industry associates in the US are the most frequently cited, and documented as gang stalkers. In fact, roughly 75% of all cases I studied begin there.

2- Church and affilliated civic groups, like the Catholic Opus Dei, and Knights of Malta, or Jewish groups and the many NGOs like the ADL, Lutherans, Baptist Presbyters, etc. ALL use their “higher orders” and gang stalking tactics to herd their sheeple. Then, the,affilliated grous like Lions Clubs, and especially Rotary, etc. are all prominent in the harassment of TIs.

3- Non Governmental Organizations (NGOs) are the nexus between the two groups above, and this case highlights how these groups operate with impunity, with disastrous real world effects.

Many sources document the fact that the CIA does its dirty work through international NGOs, but many other intelligence agencies do too. I have encountered agents from Britain, Australia, Israel, Sweden, and many more in my research. Here is one example of one of my personal stalkers here,and another here, and this one affilliated with the US Department of Defense actually followed my blog.

4- Real estate pseudo mafias: nearly 50% of every case I have studied involved real estate red-lining, and complaints of gang stalking during property disputes as we saw with Larry Guzzinos case, and most recently in Canada, in this mass shooting.

5- ALL of these cases involve mercenary security and intelligence agencies working individually, as we saw with Harvey Weinstein harassin.g Rose McGowan with spies from Israeli firm Black Cube. This is clear in this case, and quite notably, an Israeli security firm founded by former spies is on record bragging “We get more customers,every time there is a mass shooting.”

And look at this case of the Pensacola Navy base shooting to see how these shootings just “happen.”

Bev G

A long time ago, I had a stalker. He still pops up now and then. I like to think I can help others in the same situation.

So, have a read through Owlcations “Am I Being Watched”, and learn to differentiate being stalked by an individual, versus being stalked by a group.

And, if you can identify, name,and collect evidence about your stalkers, and all of that links into the inter-connected intelligence web, well, you are being *gang stalked*.


How to Catch a Stalker by Collecting Evidence

It is not recommended that you confront your stalker yourself. Instead, do what you can to collect evidence so the police can help you.

Keep a log describing every single incident, however small, including dates and times.
Take photos, video, and audio recordings if possible. Have hidden security cameras mounted around your property. You can buy many relatively inexpensive counter-surveillance devices online. This reasonably priced HeimVision HMD2 Wireless Rechargeable Battery-Powered Security Camera is small, easy to maintain and perfect for monitoring who is trespassing.
Keep track of any witnesses (with names and contact information).
Keep all emails, texts, letters, voicemail, and records and screenshots of any other electronic communications. Even if they are sent anonymously, each email contains IP information which can help investigators find your stalker, don’t delete them.
Write down the details and license plate numbers of any suspicious vehicles.
Hire an investigator or PI to watch and collect evidence against your suspected stalker.

Traps for Stalkers

I leave you, reader, to your imagination now. Traps. Hmmmm. What might those look like?….

The discrediting of the gang stalking narrative and proof of gang stalking: inbound and outbound links

So:because ROGS-the blog you are reading now-has thoroughly refuted the notion that those who are victims of organized gang stalking are in any way delusional, and that ROGS is making a difference in an Israelified/ADLified world of deference, take a look at the following picture, and note that it is an “inbound link”from the FBIs very own webpages, which are situated in some of the most theoretically secure servers in the world, meaning that in order for someone to click that link INSIDE the FBI webpage HTML where I have linked a post critical of theier ridiculous slogan “Dont be a Puppet”, they would have to have access to the administrative control panel AT that agency (and, un-ironically, that this happened during the longest government shutdown in history, January 2019, in case you wonder what slop-thighed FBI web admins DO on their days off):
1548058383686.jpg
Well, you can decide for yourself if gang stalking is real, or if it is connected to the FBI, because in fact, that agency is merely the corporate bankster army of domestic enforcers, and nothing more, working outside of oversight of citizens, and with total disrespect for anything related to the US constitution, or due process of law.
Or,you can also decide if claims by TIs if strange breakins to their homes are real, or uf shitbags at that agency perform black bag jobs, or if in fact the agency itself isnt a totally corrupt sectarian secret police, as we see the now-shitcanned former head of this agency,former Director James Comey, spouting Rienhold Niehburs philosophies of “Christ in Culture here,” or, as the Intercept has noted, if the Tel Aviv office of the FBI is likely where the ADL and the Mossad plot their targeted webterrogations and webscrubbing after the facts of OGS targeting individuals.
That agency, and the hidden political rot within it simply doesn’t follow any known parameters of law, ever, in what many informed opinions call COINTELPRO 2.0

Related Story: Federal judge castigates SA who performed a black bag job, while he was illegally “embedded” in a corrupt sherrifs department Task Farce, asking “So, if the LAPD or sherrifs department put a badge on a French poodle and elected that gay, Jessica Valenti styled poodle as the Umpiress Gay Gaian Goddess of All Task Farces, is it now a sherrifs deputy too?”.

So, in a world where speech policing of pure speech, first amendment words, ideas, and online performance art via blogs like mine become targets of “lashon hara” white-slavery patrols, and when such things happen,so frequently, and for so many, and for so long without a Constitutional challenge, have a look at what happened AFTER I linked the Association of Threat Assessment Professionals(ATAP) to the creation of crisis via junk science, in what they, and the clusterfuck of 17 spy agencies and Fusion Centers call the “parallel colluding investigation,”and just AFTER yet another unnaccountable asshat committed a felony or two andtried to hack my email AGAIN:
1-the following search language came in to this blog a day or so after someone clicked MY inbound link TO the FBI webpage (which is embedded in the HTML code of every webpage where inbound /outbound links interact with the internet) entitled “Dont be a Puppet” ,which caused their click-which someone clicked -to become MY inbound link FROM the “refferrer” and, just just AFTER someone linked my blog to an interesting right wing/libertarian discussion on Zerohedge

And here is one of the first results from this search language.
homeland security +the cia +nsa and local police gang stalking
gangstalking coven
2-the next day, someone linked the following language to an obsolete search engine named FIREBALL in Germany which officially went offline in 2002, as my stats registered some 20 hits from that country
https://fireball.com/search?q=surveillance+role+players+%2Bgangstalkers+targeted+individuals+%2Bfbi+%2Bcops+%2Bcointelpro+-aliens+-reptilians+-nibiru
This is the discrediting narrative in action, and notice which came FIRST, starting at the inbound link FROM the FBI website, a very ammateur webpage designed by what looks like a 13 year olds attempt to be clever and “do art,” which I mocked in this post here, in the first screencapture.
Then, notice that fireball itself died in 2002, and was absorbed by the NSA fake Googleopus, but is now a conduit for agency level shenanigans.
The death of Fireball:

And now, notice how hidden, cowardly agents, and agencies “frame” the OGS dialectic, wrapping it in total bullshit about aliens, and other time wasting crap of the sort that US military and Psychological and influence Operations practitioners have done historically, linking the agency practice of “colluding parallel investigations,” aka, Organized Gang Stalking, in the same junk-science way they have linked domestic violence to terrorism and the “paranoid delusion” of cyberstalking by agencies who target pure speech online.
This is how neocon, sectarian religious societies ruled by secret police and colinized by racist, sectarian Israeli thought and private junkets to apartheid states works in practice.
And, how dead democratic republics act in the final days of Praetorian democracy :
homeland security +the cia +nsa and local police gang stalking
gangstalking coven
https://fireball.com/search?q=surveillance+role+players+%2Bgangstalkers+targeted+individuals+%2Bfbi+%2Bcops+%2Bcointelpro+-aliens+-reptilians+-nibiru

What are psychological operations (PSYOPS) in OGS: PSOPS, Los Angeles, Jack Palladino,Russell Palarea, Ph.D., President, Operational Psychology Services(OPS ), and cr ISIS PR

ROGS is painting some new targets on peoples names and faces today, and asking why the DHS, the FBI, and every other scumbag alphabet agency is waging war on Americans, due process rights, and civil liberty, via what these agencies, and their cohort pig trough practitioners call “colliding parallel investigations,”according to the Association of Threat Assessment Professionals(ATAP).

“So, a group of security-intel industry people say that claims about criminality in America’s security-intel industry are delusional? Seems persuasive. : )

I wrote to several of the people associated with the August, 2018 ATAP conference-people who I named in the headline of this post, and others, where the speakers officially and with calculated specificity linked Dr. Lorraine Sheridan and David V. James junk science and denialism with actual gang stalking by corporate security and private contractors who work under the “intelligence sharing environment” to the targeting and stalkung if indivuduals, and that they used “police science” mixed with psychology to create that link*.
The active ROGS reader will note that the S &J study quoted in the article “United States of Paranoia: They See Gangs of Stalkers“was actually a poll, much like an advertising survey,or one of those questionaires that borderline personality disordered neurotic federal agents fill out in websites designed for “women,” like the horrifically biased, sh!tposting Jezebel, or Vice magazine online, and that the Sheridan and James “study” was in the form of an anonymous internet survey to purported gang stalking victims, that concluded with the New Yarwk Times and Lorraine Sheridan (who works in the Australian prison system)calling the self-reporting victims a “dangerous tribe of troubled minds.”
The reader might also recall that since that poll,and even before, we have evidence of security contractors, threat “assessors /creators “and major spy agencies polluting the internet with their garbage and conspiracy theories, and that the EXACT NYT that published the fraudulent S &J poll has since then even acknowledged the use of actual sound weapons being deployed on US diplomats too.
[FACEPALM ]
PPL0021YE_1

Related story: Forensic science, like blood splatter evidence, or “bite mark”evidence is junk science, created by whacky people with “police science ” degrees , and judges and juries are waking up to that fact, despite the television crime show crisis PR. Threat Assessment, and its cohort DVIC junk science pushers are this generations forensic fraud

So, you might recall that New York Times piece,was authored by one now-discredited Mike McPhate, who has ironically now adopted the ROGS thesis that hidden, secretive gangs work in policing, and security /intel, to stalk, harass, and murder people outside the laws, and outside of due process.
Follow the links to McPhate’s newsletter, where, again, without irony, he posts his story about the documented hidden gangs that work in LAPD at number 13.
🤑🤐😂👮👮👮👮[FACEPALM]

the link between domestic violence and gang stalking is that security contractors work outside of the law,break the law, and violate due process rights and civil liberties of those they target under the DHS zero-accountability DVIC scheme of “colluding parallel investigations.”

I won’t hold my breath waiting for a response from these “official sources”, because they derive literally billions of dollars of income by manufacturing the cris, and then, linking gang stalking to a “paranoid delusion” rather than linking it to what it is:
Gang stalking is: “unconstitutional, chronic, pervasive surveillance by alphabet agencies, and private contractors who work outside of Constitutional due process, frequently violating civil liberty, and without meaningful or any oversight, and frequently in direct collusion with the FBI/DHS/NSA-leaked-local-via-Fusion Centers, targeting individuals, and especially targeting key constituents in dialectic space like Twitter, Youtube, Facebook, Instagram, Spotify, etc, as documented by the ACLU, and as described in CIA counter-intelligence manuals and psychological operations that target individuals, groups, and entire nations
In fact, a couple of those that I wrote to are the DIRECTORS OF FUSION CENTERS, and without coincidence, it is these same men and women who participated in this series of talks at the 28th Annual ATAP Threat Mangement conference which officially linked gang stalking denialism to their domestic operations against individuals, activists, dissidents, and others, which, in their jargon is called “colluding parallel investigations. ”
But I did manage to get a quote from the widely respected author of Fightgangstalking.com, a military veteran,and security industry professional who was himself gang stalked, and, who has free downloads of fentanyl-free fliers on his website, where you can get literature to help raise awareness about high heeled policing.
When I brought ATAPs fraud to his attention he said “So, a group of security-intel industry people say that claims about criminality in America’s security-intel industry are delusional? Seems persuasive. : )

FGS has chronicled OGS for many years, and his work is respected by many around the world, giving his advertiser, and sponsor-free blog some 500,000 reads in the time it has been around, as compared with ROGS blog here, which got just over 50,000 reads, and unknown impressions in the two years I investigated and written about OGS.
So:”Colluding Parallel Investigations” is what ATAP calls organized gang stalking
OGS is to ATAP and the security industrial complex, aka, the secret police state, what slop is to pigs: more fat.They literally are manufacturing terrorists, via constant, chronic harassment that they call “colliding investigations.”

Related Story: the sordid story of Rakem Balogun is a ROGS Bingo that demonstrates the ROGS thesis perfectly, and also the total failure of the FBI et alphabet to manufacture a terrorist via chronic surveillance and social media bullying, incitement, and harrassment and even phony charges that stemmed from DVIC policing.

And, it is a situation where individuals are monitored, tracked,surveilled, and more sometimes for decades, in privacy raping, Constitution defying, bizarre “investigations,” that involve local, state, and federal agencies, hiding their pseudo -investigations behind NGOs, and community policing in collusion with private contractors, and waged from Fusion Centers (one of which is on record distributing bizarre mind control literature ).
And, of course, I saved screen captures and the actual emails for later, to demonstrate at a later point how stonewalling the facts I outline herein guarantees these people another slurp at the police -state funding barrel.
So, ATAP is the nexus between crisis PR and crisis CREATION, and it “advises” current, and retired police and the vast array of private contractors hidden within this scheme as well as the nefarious LEIUs whothe FBI refuses to investigate, because it is what our nations “deep state”is; and also,the Army of Paul Blarts calls gang stalking a “colluding parallel investigation. ”
And as we see now, ROGS-the blog you are reading now-has changed the entire dialectic, and police-state/tribal -sectarian frauds, hoaxers, and other associated scum, all of whom are draining the taxpayes dry, have begun to respond in a bizarre, sociopathic fashion.
There was the infamous “fentanyl fliers ”hoax waged by mystery people in Texas, where NSA affiliated fliers were put on squad cars, and then, the sherrifs department waged a misinformation/deception campaign.
There was the recent rash of mass shootings where “colluding parallel investigations ” like the gang stalking murder of Mathew Riehl was preceded by a several years long gang stalking by academics, campus police, sherrifs department gang stalkers, and slanderers of all kinds stalked him at school, and across state lines until he was forced into a DVIC connundrum; and all of that, so that our bloated police state can chew through more boards from the bottom of the trough .
Then, their were the designer mass shootings in cases of Cesar Sayoc the Wiley Coyote styled ACME bomber ,who was being stalked by crisis PR agents like Rochelle Ritchie, and other speech police and ADL styled crybullies,as he cartoonishly and allegedly mailed really crappy fake bombs to a designer list of people who lied to Congress, and other tribal-sectarian traitors.
And the Hot Yoga shooting, of course, where a veteran was gang stalked by Kommunity Kulture Klub members, and then, likely murdered one of his slanderers.
And, the Thousand Oaks shooting, where Ian Long, a US marine who saw combat duty was stalked so bad he lived in his garage, before he went ballistic. Ine of his after -death body punchers even claimed she bullied him, and made him run “thirteen miles,”as punishment on a high school track team.
I ask the reader to try to avoid seeing the following patterns in EVERY CASE that occurs:
1-unlitigated he said she said DVIC slanders that precede the shootings
2- that it is a gendered narrative, where mens alleged /purported violence is BOTH preceded AND followed by gangs of horse faced lesbian-like DVIC slanderers, aka, bullies who are women, and members of the Army of Paul Blarts too who couldnt get laid at a dinkey dick show in Mexico if they tried.
3-like the case of Michael Chadwick Fry, also in Texas, where the NSA operates a major listening post, that he ALSO named both crisis PR agents, and specifically FEMALE bullies who stalked him, as he tried to get the word out about a deputy involved homicide.
4-the recent arrest of Andy Ostrowski in the Kid$ for KKa$h state of Pennsylvania, where judges and “womens organizations” literally target men wth hit lists, ad interfere in ever aspect of mens lives, incentivizing child theft. This one case alone valudates OGS, as I have demonstrated with empirical, scientific, and falsifiable evidence.
5-Lastly, notice (or maybe. Not!) that the number 13 appears in every narrative, in many different ways, as Jews, christians, Catholics, and even Wiccans utilize that number when they count coup on a victim of organized gang stalking (use my search feature and the terms: the thirteens; apophenia; 13).
So: What is a psychological operation(PSYOPS),and who wages them?
Well: I will let the reader decide, but first, take a look at the following acronyms, after reading through the ATAP .pdf, keeping your eyes peeled for the following talk, entitled

The Link Between the Neverending Pork Barrel, and Ever-morphig definitions of Terrorism as the DVIC Seeks to Replace the Rule of Constitutional Law with Gang Stalking

Hard link here:
https://c.ymcdn.com/sites/www.atapworldwide.org/resource/resmgr/2018-ATAP-Preliminary-TMC-Pr.pdf
Psychological Operations (PsyOps)in a military setting, includes proaganda wars, influence operations, and neutraization of counter -narrative
Operational Psychology Services(OpPsych,or OPS)– A company funded by Dr. Russell Palarea. This organization linked Dr. Sheridans debunked thesis and its accompanying internet poll and its concusions to the multi-agency money grab known as the “colluding parallel investigation” which is behind every mass shooting in the USA.
http://oppsych.com/about/meet-the-team/
PSOPS A private domestic spy organization in Los Angeles, headed by Jack Palladino, which was the organzation Harvey Weinstein hired to gang stalk Rose McGowan
https://www.npr.org/sections/thetwo-way/2017/11/07/562631069/report-weinstein-hired-agents-to-investigate-and-suppress-accusations-against-hi
*this form of psychology being practiced here by ATAP pundits is called punitive, or political psychology, and was a feature of Stalinist Russia, Nazi Germany, and other periods of history where activists and dissenters were labeled mentally ill and gang stalked, and slandered, frequently imprisoned, and, like Andy Ostrowski, locked up on phony mental health charges.

Lawrence“Larry” Guzzino, gang stalking on steroids, web scrubbing, and missing links

How real is organized gang stalking-and how actively do police, and propaganda elements seek to hide or discredit it as an actual practice, and an abuse of civil procedures and due process?
Just ask Larry Guzzino, whose story about being gang stalked by goons like these was featured in main stream news, just as the Department of Homeland Security began a full assault on due process in 2011, by utilizing gang stalking as a means of social control, as well as socially engineering citizens to accept due process-free “law enforcement,” which I like to call law enfarcement, because thats what DHS tactics are, according to their own playbook.

You see, the DHS (and every other alphabet agency) deliberately attempts to skirt the law, and use military resources to spy on citizens, much as we see in the cases of Dreyer, or the USAF OSI in general, and not get caught at it by using methods and tactical assaults in individuals that are plainly bizarre, as we see in the cases of Andy Ostrowski in the Kid$ for Ca$h state of Pennsylvania where one judge was caught literally selling 3000 children, as “the good guys and gals” looked on, or the cases of whistle blowers Adrian Schoolcraft, and former DHS Julia Davis, who LITERALLY was harassed with DOZENS of neverending investigations AND actual “black helicopters” too.
OGS is THAT bizarre.
I mean- ask Lawrence Guzzino about gang stalking-if you can find Guzzino, you can ask him about OGS, because he seems to have dissappeared after Lieutenant Larry Richards famously acknowledged in news reports that organized gang stalking “existed long before the internet.”
And, like the internet links that I use to prove the case that OGS is real here at ROGS, the validation is apparent not only in the known and documented police practices, but also, in the hidden, or occulted practices of policing.

Related Story: John McAfee, who invented the firstinternet security technology known as anti-virus software, claims he is being gang stalked, and has hired a team of security personell to prove it. Extra points if you notice the Simon Golstein wrote about it online,in FinanceMagnates

.
Here, have fun proving that “webscrubbing” is a real practice of police and intelligence agencies that subvert media, and that seek to hide their practices from “we, the people,” who are concerned that policing itself is the problem,rather than manufactured terrorism,or boogiemen. And, add that to your list of proof of gang stalking,too.
But here is a link that once linked to Guzzinos case,and which documented poluce “framing” in action, which has now been scrubbed from the web:
http://castroville.kionrightnow.com/news/news/506255-deputies-no-pipe-bomb-found-parolees-car
Maybe the avid reader can find that original news story, but for now,it has been scrubbed from the web,as many ofthe things I write about get scrubbed from the web, shortly after I write about them.

Related Stories: I,ROGS, have been followed around by nameable military contractors, and DHS affiliated scum, and named NGOs since 2004, since I wrote a few stories in a college newspaper that the AIPAC/DVIC/Zionist/neocons didnt like.
And, I have named names, and provided hard evidence that this is so, in this story here,where a military contractor from Black& Rossi followed me around Chicago, or this story here where a Lockheed Martin engineer gaveme a great scoop, which was then stolen from my Gmail account, or this story where an acridly fat blonde woman with a Cheshire cat smile and working in the DHS stalked me in a classroom.

The avid reader of ROGS will recall that Guzzinos case started because he is related to police, apparently on his (former?) wifes side.
And, the avid reader will also recall that in his case, the ROGS BINGO card is completely full on every corner and square- that the ROGS BINGO card sounds like a firetruck,blasting by your house at all hours,honking one of its many horns.
And now,we can see that,since I wrote this blog, contacted lawyers, and journalists, and a few people in Washington D.C., that one kind-of main stream writer has even mentioned “gang stalking” as an actual thingin real life,in the case of Libertarian-leaning crypto genius John McAfee, who INVENTED anti-virus.
so,regardless of anything, I present you, the reader with evidence that targeted propaganda, and targeted individuals are intertwined,as domestic agencies work to control the narrative of OGS,and.keep this practice hidden away, far from “the publics right to know.”
And,too, it might also explain why eBay billionaire Pierre Omidyars news outlet, TheIntercept.com has still not released ALL of the Snowden documents too, as lies of ommission are politically beneficial to those who profit from this form of social engineering.

Manufacturing terrorism suspects, fake web pages, and informants using lots of rope in darkness: modern lynching online and CVE programs

Whether the target is a Muslim, a Mormon cattle rancher, a black activist, or a poor white kid like William Atchison who get stalked online and then offline by agents provocateurs, aka DHS/FBI/DIA/private contractor/NGO/foreign spy outfit unspecified, informants, a few patterns stand out in the data:
UNDERCOVER FBI AGENTS SWARM THE INTERNET SEEKING CONTACT WITH “TERRORISTS”who they then profile via behavioral analysts, psycholigical operations, and then endlessly monitor their speech online and off, in concert with HUNDREDS of agencies, and using NSA data.
The FBI’s online activities are so pervasive that the bureau sometimes finds itself investigating its own people.

Almost all targets of provocation are male.
All targets of provocations are ensnared online, and followed, monitored and more offline for using words~aka pure first amendment protected speech~sometimes for decades since the NSA dumped hay all over needles in a theretofore previously non-existent “haystack.”
All targets of provocateurs have long term contact with people working under the counter-terrorism rubtrik, or so calked community policing, who seek to INFLUENCE the speaker, from hidden or occulted positions online and off (for instance, social workers, college, or DV type “counselors” target and track individuals, usi.g multiple databases, and share information about their targets with police)
All targets of these hidden programs are manipulated in “directed conversations”which is well documented in the online TI community,and this unrecorded anywhere.
All targets are manipulated, and frequently their most base impulses to food, clothing and shelter~indeed, their base drives, what Freud called libido~are used as tools to manipulate them, and much more, as we saw with the Tsaernev family being targeted for a decade BEFORE the Boston bombing, as well as in the cases of the Seattle Somalis employment and travel being stifled by federal agents, hearsay, and policy (not law.)
In any study of what is colloquially called mind control, and stemming from Nazi/US/British styled torture, or the well documented MKULTRA and its companions Monarch, Bluebird, Phoenix, Gladio-all of these used base drives as ways to manipulate subjects and targets.
And, all base drives, stationed a man, or a woman in the middle to impede or encourage the target toward one or another behavioral goal. So, any study of targeted individuals must account for ling term state/federal ibstruction of base drives, and achievements.
Related Story: Niftygerbil, Niftychinchilla, and other Nifty names for Tor nodes, courtesy of the same geniuses who gave the world Monarch and Bluebird.
So, we see now, the entire organized gang stalking dialectic mirrors the ACTUAL complaints of targeted individuals. Refer to the ROGS BINGO card at the top of this blog for comparison.
So, OGS is far from a delusional complaint, and rather,indicative of manufactured terrorisms un Constitutional basis, and the occulted use of informants whose work in online terror/criminal/other incitement is undocumented by design-a totally unchecked use of actual psychological operations-agents provocateurs actions are not on the record, or in courtroom documents either.
So, in the very least, these online influence and psyops using unchecked, unregulated, hidden, occulted and obscured methods, repeated over time, do indeed form, as the good doctor Lorraine Sheridan has noted~a closed echo chamber, echo chamber, where words themselves are the primary targets, as are the individuals who use the words- they are literally under close monitoring every time a banned word hits Google/Wordpress/Twitter, etc.
Here from NBC News is a story about how the FBI uses informants online and on social media in occulted fashion to police pure speech, and then, to target individuals:
https://www.nbcnews.com/storyline/isis-terror/no-lol-matter-fbi-trolls-social-media-would-be-jihadis-n226841s
And here is a bit more about that from the Intercepts Cora Courier in 2017: ghttps://theintercept.com/2017/01/31/undercover-fbi-agents-swarm-the-internet-seeking-contact-with-terrorists/
“”According to the guie, an online counterterrorism investigation can target websites or online networks that the FBI believes terrorists are using “to encourage and recruit members” or to spread propaganda. Such probes may extend to the administrators or creators of those forums, as well as people engaged in “the development of communications security practices” or “acting as ‘virtual couriers’ for terrorist organizations by passing online messages among members or leadership.”
The guide classes as online investigations those that rely primarily on online informants or undercover employees, and those that involve surveilling internet facilities or foreign websites hosted on U.S. servers. The FBI often runs such operations jointly with other U.S. intelligence agencies or “international partners,” according to the document.
Since 2008, the Counterterrorism Division has coordinated these operations under a program called the Net Talon National Initiative. Net Talon uses informants, linguists, and FBI employees working undercover, posing as ordinary internet users, to zero in on terrorists’ use of the internet, according to the guide. The initiative was meant to centralize expertise on particular targets and platforms, to “address intelligence gaps,” and to create a clearinghouse of the intelligence the bureau has collected on terrorists’ use of the internet.
The FBI’s online activities are apparently pervasive and uncoordinated enough to lead to confusion. The document refers to “resources being wasted by investigating or collecting on FBI online identities,” including undercover employees, informants, or people who have already been investigated by other offices or agencies. An FBI official told the Intercept, “You would be in a forum, and you’re like, ‘This person’s way out there,’ and we’ve gone and opened up a case, and sometimes that was a local police department, or a friendly foreign service. There are still instances of that, and deconfliction is still necessary.”
Khurrum Wahid and Joshua Dratel, defense attorneys for Ahmed Omar Abu Ali, answer questions from the media after Abu Ali was sentenced on March 29, 2006, at a federal court in Alexandria, Va. Photo: Alex Wong/Getty Images
THE COUNTERTERRORISM POLICY GUIDE shows just how much flexibility informants and undercover agents have when operating online, even when they’re not working specific targets. The FBI insists that there is nothing to see here: In statements provided to The Intercept, the FBI said that “while there are obvious differences between online and offline environments,” FBI employees and informants working on the internet are subject to the same rules, and that bureau employees can only monitor people’s online activity as part of an authorized investigation.
The guide, however, suggests that the internet offers areas of ambiguity. Much comes down to the questions of what informants can do, as opposed to FBI employees, and whether the goal of an operation should be construed as seeking to obtain specific intelligence, simply watching public websites, or developing a profile for an undercover identity.
For instance, the guide states that an FBI employee can visit a message forum or blog only when the site is relevant to an investigation. An FBI employee, according to the guide, could be an undercover agent or an “online covert employee,” a term that presumably refers to FBI workers other than agents, like analysts. FBI employees can’t chat online with someone who isn’t already the subject of an investigation for the purposes of gathering intelligence on that person. They can, however, “engage in unlimited communication with associates” of a person under investigation, if the conversations are relevant to the investigation.
Informants and undercover FBI employees are also allowed to do a great deal online in the name of “building bona fides,” such as creating fake identities or making themselves appear to be normal commenters on online fora. The guide says that in order to establish credibility, FBI employees “may make postings and communicate with individuals who are neither the subjects nor the associates of subjects … there is no limitation with respect to the amount of communication [they] may initiate in this regard.”
And the FBI is allowed to open new investigations on people it identifies through “passive monitoring or active communication” on websites.
An FBI spokesperson clarified that in order for an undercover or covert employee to monitor a website or forum, the site must already be associated with an investigation, “either because the forum was known to be used by a subject [of an investigation], or because the subjects are there. I can’t be in the forum trying to bait you into conversation.”
However, the FBI acknowledges that when its employees participate in online fora, they interact with people who may be bystanders to whatever activity led the bureau there in the first place. And that is not accidental. “We want to know if the subject has other people who are joining in, which people are part of the activity, and who is just there,” a spokesperson explained.
In other words, FBI agents can post and chat online with people who have nothing to do with an investigation, so long as they aren’t collecting intelligence — but in the course of those online communications, they can decide to start investigating someone.
Michael German, a former FBI agent who is now with the Brennan Center for Justice at New York University Law School, said that agents have always had a little bit of wiggle room in this regard. They can have a certain number of in-person meetings with someone, or in some circumstances go to public meetings or public websites, without identifying themselves as part of the FBI. This helps agents avoid a bureaucratic mess when carrying out a simple “buy and bust” drug sting, for example, German said.
But the ability to conduct unlimited online conversations in the name of building bona fides gives agents “a pretty long rope,” German said.
Criminal defense attorney Khurrum Wahid, who has handled or been an adviser on many national security cases, notes that FBI employees or informants frequently pose as experts offering guidance to lost individuals.
“These uninformed young people go online and become almost smitten with people who show a level of knowledge, who often turn out to be informants or undercovers,” said Wahid.
Informants operate under looser rules than FBI personnel. They are allowed unlimited engagement with a target in the course of an “assessment,” a preliminary investigation that can be opened on a loose tip of suspicious behavior, in order to collect general intelligence on a subject, or to evaluate a potential new informant. Assessments were created as a category in 2008. German finds their allowance for the expansive use of informants problematic.
“What we’ve seen in sting operations is that there is this shady portion before the official operation begins which often involves the informant,” said German. “And then it’s passed off to an agent, and it looks like they are ready to commit a crime pretty quickly.”
Wahid noted that at least in online cases, there are generally logs of all the conversations between suspect and informant, whereas “when it’s a live informant, they can turn off the recorder and we never know what it was all about.”
The use of informants in counterterrorism sting operations has expanded since the 9/11 attacks, when the FBI adopted the mantra that its job is to stop terror attacks before they occur, not just investigate them afterward. The government argues that the anonymity the internet affords to suspects necessitates an aggressive approach, including stings. The FBI’s national security director told the New York Times this summer that “using undercover agents online allowed the FBI to ‘flesh out’ suspects by gaining their trust and persuading them to disclose their real identities.” In some cases, the FBI even created fake webpages in order to draw in suspects.
“Agencies are under a lot of pressure to find a needle in a haystack, something that has haunted us since the beginning of the war on terror,” said Karen Greenberg, director of the Center on National Security at Fordham Law School. “It’s true that the internet has changed everything about how we communicate, but are we just going to be trawling online forever? It turns the principles of criminal investigation on their head.””

WA Fusion Center, limited hangouts, disinformatio, misinformation, mind control documents.

Mr X:
The WA state Fusion Center mind control docs are what is called a limited hangout in intelligence circles. The LH is designed to taint a dialogue, or misguide you, but in themselves reveal the cavalier attitude of these domestic spies.
The images widely circulated from raven1.net are among many that were used by one Eleanor White, a self described whistle blower.
She reigned as the go to disinformation specialist about a topic called gang stalking, between 2001- and 2011. White claimed that she was slandered as a pedophile everywhere she went, but in reality, was likely part of the pre-Fusion center deep state, a likely courier for illegally intercepted communications, and the defamation campaigs that followed.
These materials are used to discredit people who psychologists then label as delusional. But as we see, they also nearly and completely describe how the NSA trickles data to state and federal agencies, who then use Fusion Centers, so called community policing elements, and more to monitor activists and dissidents, via real time cell phone tracking, computers, ALPRs, BOLOs, and more, frequently utilizing plainly bizarre methods.
I also wish to inform you that I have been tracked since 2001, by many agencies across America, for many reasons not least of which is that [REDACTED] also wrote the Lewinsky defense, and represented Cheney during the Scooter Libby, Valerie Plame affair; And, a few other things.
I appreciate [REDACTED] FOIA release from the Fusion Center, but also wish to inform you that there are other questions to ask in these cases, because those documents are designed to discredit any who take them too seriously.
The good news is that the real questions that should be asked are easy, once you know where to look.
For instance~regardless of your political stance on gun control~ask about Fusion Centers monitoring activists, and people in alternative media, or even Facebook.
So, black activists, and mass shooters are a great place to start with mind control. Fusion Centers monitor these guys relentlessly, and mercilessly, via phone, computer, ALPRs, and BOLOs.
To understand the mind part, separate it from the control part, outside of due process, and constituting what could arguably be called unusual punishments.
Then, understand it like this: the FVEY nations
cooperate to target and harass each others activists. A great example is a boy named William Atchison, who shot two kids in a NM school, and who was killed by SWAT.
In his case, he was contacted online by British intel, who waged Gamergate across the globe, and also on American citizens, outside the law, and likely in violation of international treaties.
Then, they passed the “anonymous” tip to FBI, who then waged community policing on the boy.
FBI contacted the kid~who never owned a gun in his life~and then FBI CVE kicked in, meaning the kid was frequently followed online and off, by any of many domestic spy/intel/Rotary clubbers/VFW members/etc organizations attempting to “conform him” and these take on plainly bizarre online and offline stalking proportions.
Only after this, did the boy buy a gun, and this we see in case after case after case. Then, the boy goes ballistic, after being isolated and terrorized by literal hidden and actual armies of psychological operations specialists, for WORDS he expressed online.
So, in that one case alone, you can find evidence that what I say above is true, if you learn to ask the right questions.
How many calls went to which Fusion Centers, about What, When, and Why about this one boy, william Atchison. Were ALPRs reporting his license plate every time he drove, and were satellites literally tracking and recording his every move? Which police departments/school officers pinged his computer or cell phone~or did bad stuff like redirect his internet switch?
Did his computer have electronic implants, aka, coded applications that did/do as yet described things/wiretapped/ monitored and utilized key stroke logging?
Etc.
But taken as a whole, the boy was without a doubt, surrounded by influencers, and others who aided, coerced, and manipulated his choices from his first contact online with British intel, who flagged him during Gamergate.
First, they came for the kid online who said bad words (and those words decided by religious theocrats, and others)~then, they came for the mass shooter after they, working internationally, from sectarian religious basis, occulted pisitions along the internet backbone, and in violation of due process, civil rights, and treaties, bullied him mercillessly, via electronic platforms online, commmunity policing offline, and CVE provocateurs.
I hope this can help point you in the right direction.
I can be contacted here, if you wish more details.
Best Regards,
ROGS (my obvious nym)

Washington State, mind control documents, Fusion Center spying, police state bloggers, and GOD BLESS TECHDIRT.COM

DHS Fusion Center Gets Request For Documents On Extremists, Decides To Hand Over Mind Control Docs Instead
from the here’s-the-thing-you-didn’t-ask-for-but-will-probably-enjoy-reading dept

What  is  24-7 monitoring  of targeted  activists,  dissidents,  journalists, and  other  targeted individuals? Fusion Center  spying, the bizarre  quasi-Constitutional DHS/ICE/HSI  methods of secret policing, and the  NSA-Israel-FVEY data  theft  is de facto total  spectrum monitoring and  psycholigical  operations, aka mind  control,  by any  other name.

By  Tim  Cushing, of  Techdirt.com
Once you release a document to a public records requesters, it’s a public record, whether you meant to release it or not. The person handling FOIA requests for the Washington State Fusion Center (a DHS/local law enforcement collaboration known more for its failures than successes) sent Curtis Waltman something unexpected back in April. Waltman asked the Fusion Center for records pertaining to Antifa and white supremacy groups. He did get those records. But he also got something titled “EM effects on human body.zip.”
Instead of intel and assessments on local Antifa/white supremacists, Waltman found things like this:
And this:
The files did not appear to have been generated by any government agency, but rather collected from other sources who thought there might be some way the government could control minds using electronic stimulation or “remote brain mapping.” Why the Fusion Center had them on hand remains a mystery, as does their attachment to a FOIA request containing nothing about electronic mind manipulation.
This inadvertent disclosure has led to more requests for the same documents. Only this time, requesters — like Joshua Eaton of ThinkProgress — are asking specifically for government mind control files.
It appears the Fusion Center first thought about withholding some mind control docs, but somewhere along the line decided it couldn’t pretend the documents that weren’t supposed to be released hadn’t actually been released.
An email chain in the release [PDF] to Eaton contains an apology from the staffer who accidentally sent Waltman the mind control files.
Good afternoon Gretchen,
First of all I want to apologize the same way I apologize with my supervisor Lt Boyle and [redacted] I do not like to give excuses but I really sent this without intention when it was not responsive. I sent the original email to [redacted] with the attachments. I will try not make more mistakes…. Now, because of my error MuckRock sent another PDR. Sorry again for the situation and have great afternoon…
Gretchen (the Public Records Officer for the Washington State Police) tells the staffer not to worry about it. Apparently, sending the wrong files to requesters happens frequently, but otherwise, everyone is doing a great job, including the person who sent mind control files with a batch of extremist docs.
But that apology and forgiveness is preceded by the same staffer asking for another review of documents she already released to another requester, possibly in hopes of denying this release.
Erik,
[redacted] told me if you could review this. Mudrock is claiming that DHS did created this. I think I was not supposed to release this but it was public.
Can you help me what can I tell my Public Disclosure coordinator?
Sorry for the inconvenience
No response from Erik is included in the document so one assumes the release went ahead without his additional input. Now this requester has a copy of this email chain, something pulled from an internet “mind control forum,” and, inexplicably, the KKK documents released to Waltman in response to his FOIA request.
So, if you’re looking to obtain public records but don’t particularly care what records you receive, it appears the Washington State Fusion Center is a great place to try your luck.

Electronic implants, Wikileaks Vault 8, victims of organized gang stalking, hive mind, and honeypits.

ROGS loves the Constitutional guarantees of due process, and ROGS loves America. I am pathetic that way~the grand American delusion is so appealing.
(Vault 8 is an inside joke.)
BUT: The DVIC is actually a war on speakers and words, and without a doubt, the first amendment itself is the target of neocon and tribal, religious interests, now interfacing with the massive influx of Saudi, and other nations cash flows, and the media narrative.
I have been gang stalked since the DVIC was birthed into our lives in 1993 ( the exact same year when the Anti Defamation League was outed as a domestic spy ring that sold out American activists) and became severely gang stalked after I broke a nation wide story in 2003-4 about how America’s agencies manufacture terrorists by occluding access to civil rights and due process.
To journalists, researchers, and others interested in answering the many questions that are presented in the “bizarre” online dialectic of gang stalking, here below is how the CIA (and every other IC agency, private contractor, and the FBI) uses the term “electronic implants,” which describes covert hacking techniques, and plausible deniability in exploitation of targeted computers, targeted computer networks, and targeted individuals.
Without a single doubt, this is empirical evidence of CIA/other IC/NGOs operations on US soil, and anywhere else where OGS is taking place.
And it single handedly validates the inherent mission creep of the WOT redirecting and exploiting domestic targets.

UPDATE 10-19-2019: Almost two years after I wrote this post, and became active online, the ADL implicated itself as actually deploying military psychological operations on target individuals, using artificial intelligence software called Moonshot CVE, which had previously been used in theaters of war; and, perpetuating negative stereotypes of Jewish people as mind controlling Svengalis.

1570435771780
Electronic implants and gang stalking, courtesy of Wikileaks, and Julian Assange, who is literally being isolated, and denied visitation from other people as I write this. And, the American/FVEY deep state has worked tirelessly to force Ecaudor to revoke his asylum.
Isolation, you will recall, is ALSO a major threat/complaint/”delusion” of targeted individuals.


RELATED STORY
:I wrote about the HIVE in coded language long before this story below became mainstream news. The reader can infer that writing openly about such things is dangerous, and also, ROGS personal writing style is somewhat coded for reasons I have explained elsewhere.

The Hive mind in the gang stalkung dialectic online, from Wikileaks.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.
…………..
And-I hope the dood doctors like David V. James, and Lorraine Sheridan-and certainly Dr. Mike Wood, dont get to caught up in the echo chamber as wasps and bees of all kinds swarm them for commentary in these matters.
But OGS is very real, and puts MHCHAOS and MKULTRA to shame.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

The un-naming of a man: Gang stalking, bizarre claims, chemicals, poisons, delusions, and the DHS- man dies, first responders sickened from chemical poisoning in DeKalb County Georgia GA motel room.

As  we  see  time  and  time  again, gang  stalking victims frequently  report bizarre encounters with people  online  and  off  who  threaten  them  with poisons,  chemicals,  and  fear  or  anxiety about being  murdered by  gang  stalkers.

UPDATE 11-07-2019:This post you are reading is very popular lately, after James Douglass Lark apparently blew himself up last week , while under FBI and GBI surveillance in Dekalb County Georgia, under mysterious -even bizarre circumstances.
ROGS suspects that this was a K 4 rated gang stalking gone bad (or good, considering that the goal of police /FBI/ intel agency stalking is to force a person into an institution, prison, or to commit suicide, which is what Lark apparently did, for some reason )
UPDATE: The un-named man has now been named.He was Frances Wilkes, 47, of Stone Mountain Georgia.
BODY IDENTIFIED IN HOTEL ROOM THAT SICKENED THREE DEKALB OFFICERS
The cause of death for Frances Wilkes has not been released.

Related  Story: Yeah- silence THIS: how internet forum boards are attacked by gang stalking denialists, and not  so subtle  threats of  being  poisoned. This is one  example  from  my  own,  PERSONALIZED,  targeted  experience online.
Here  is  a  case  where  actual  intelligence  agents, from  the  US border  patrol  and the  DHS are  alleged to  utilize bizarre  psychological  and  other  harassment  on  a  whistle  blower, including  mystery  poisoning:  Delusions, poison, bizarre claims, and schizophrenic narrative in gang stalking: the case of DHS whistle blower Julia Davis
And,  the  Russians,  of course, are  suspected  of  poisoning  dissenters and detractors in  Britain, which  is  widely  documented  all  over  the  MSM.
And  the  Las  Vegas  shooter Stephen  Paddock was  said to be so delusional, that  he  kept  a  gas mask  handy, with  fears of being   poisoned.
SO:
How  bizarre is  modern gray  area,  due process-free  policing  that utilizes  intelligence  operations on  ordinary  Joe Blows who  said  something online,  and  then,  were stalked,  harassed, framed,  and  worse by  operatives  who  sit  on  the  internet  backbone  in  Toronto  Canada,  or  San  Diego,  CA?
Or  at Los  Angeles  JRIC which uses miltary grade surveillance gear to target people they do not like, , or  who  are  affiliated  with  Princess Megumi,  from  the Masonic  Capital  of California, whose  relative  just  happens  to  be the  deputy  sherrif  in  those  parts? Bacon  bits,  and  blowflies-or  flying  pig-cow  hybrids  in  fishnet  stalkings  and high heels?
I ask  you, the  reader, to decide  how  bizarre claims  of  poison  are  in  the “delusional  complaint” or  organized  stalkung.
Yeah-  organized  gang  stalking  is THAT  BIZARRE.
ROGS  wonders:  who  will  help  me  keep  an  eye  on  this  story,  below?
Get  out the  ROGS  BINGO  card  before  you  file  FOIAs  in  this  case,  and especially, dig for  records  about the  dead  mans  past-  see  if kangaroo courts, mental  health,  unproven lopsided  claims  of domestic  violence,  and more were there. Because  it  is  possible  you  will  find that  soeone, soewhere,  didn’t  like  what  he  said online  or  off. Also notice that it was a workplace conflict related situation
Something  just  ain’t  right  about High  Heeled,   DVIC  policing,  as  these para-military,  quasi-judicial,  extra judicial  suicides,  homicides-and  poisonings  are  taking  place ALL  ACROSS  THE  WESTERN  WORLD, now.
SO,  here  is  the case where  an “un named man” died  in a  motel  room, from  what  federal  agents  and  the Department of Homeland  Security claim were household  cleaning  agents.
__________
Federal agents investigating hazmat situation that sent officers to hospital
By: Wendy Halloran , Rikki Klaus
Updated: May 13, 2018 – 11:31 AM
Federal agents investigating….
DEKALB COUNTY, Ga. – Federal agents are investigating after police found a man dead inside a DeKalb County motel, and then a chemical odor sent officers to the hospital.
Channel 2’s Wendy Halloran said agents with the FBI and the Department of Homeland Security were investigating inside the room late Saturday night.
“We have a dead body in the room and we can’t make any determination on cause of death until they have cleared the scene,” Shiera Campbell, with the DeKalb County Police Department, said.
All police had determined was there was body a man inside a room on the third floor of the United Inn on Memorial Driver in Decatur.
Guests told Halloran that they were stunned when they were told they needed to evacuate their rooms.
“We were all in the sun standing out for a long time when I did find out what was going on. It was kind of sad,” a hotel guest, who only identified himself as Bryan, told Halloran.
Once inside the room, three DeKalb County police officers knew something was very wrong.
“The officers were feeling a little bit dizzy, weren’t feeling too much like themselves, so they quickly came out of the room,” Capt. Eric Jackson with Dekalb County Fire and Rescue said.
The strong chemical smell sent three officers to the hospital. Firefighters then put on hazmat suits and went inside.
“Based on the samples we took we are going to try to attempt to identify whatever that source was,” Jackson told Halloran.
Hour after hour went by Saturday as forensic investigators waited to see if they could go inside to process the scene and the medical examiner remove the body.
Motel guests waited and watched. Some had to move to other rooms.
Hazmat trucks pulled in late in the night, with all signs pointing to something potentially deadly inside that motel room.
It is still unclear what was inside the room.
Police said late Saturday night the body was that of a 48-year-old man.
………..follow  the  links-  connect  the  dots!
_____________
While many  over the  counter chemicals such  as  bleach,  and  ammonia, and  sulphuric  acid  and  more can  be  freely  purchased from  hardware  stores  and big  box  retailers such as Walmart, they  can  also  be  used  to make  dangerous  chemical  weapons.
Was this a case where hidden policing, and possibly, vigilantes or provocateurs tried to force a bombers hand, or otherwise wage attrition for something the un-named man said online? ROGS asks you, the journalist or researcher of organized gang stalking to decide.
But also, decide WITH EVIDENCE and data that you can access by learning to ask the RIGHT QUESTIINS in these odd, bizarre cases, and to adopt the ROGS framework analysis of the claims inherent in these plainbizarre gang stalking events.
We  know  with  empirical  evidence  that the  alphabet  agencies work with local  law  enforcement and  community  mobs to  wage  hidden and highly personalized war,  psychological  war,  that  frequently  ends  in  suicides,  homcides  and mass shootings, and  that  they  wage  these  outside  of  judicial  oversight,  on  targeted  individuals.
We  in case  after  case  of  case  that  these  political, malicious prosecutions primarily target  speech,  and  speakers,  and, that  online  speech bis .targeted  offline.
And,  we see  the  bizarre  claims  of  threats  of  poisoning,  actual  poisoning,  and rarely~EXTREMELY  RARELY~delusional  people  who  fear  pousoning  by  “imaginary”people  they  “”imagine.
MORE LINKS  TO POISON  IN  THE EMERGENT ONLINE DELUSIONAL  GANG STALKING  DIALECTIC:
A credible analysis by a credible researcher of organized gang stalking:
https://medawarscornflakes.blogspot.com/2009/12/toxic-materials-in-stalking.html
And, those OTHER, likely actual gang stalkers, whose comment section was always filled with Lions Club members from OHIO, TEXAS, USAF affiliates, academics who are well known stalkers, and a few retired police (and someone who lived on Duckwood Drive in Eagan MN,in 2013):
https://neverending1.wordpress.com/2010/11/19/gang-stalking-the-gang-stalkers/
And, one for you, the researcher of organized stalking to figure out for yourself-especially if you are a federal agent, or another “good guy or gal” who wants to STOP gang stalking, as we see that it frequently leads to mysterious deaths:
https://perthsgangstalking.wordpress.com/2017/01/12/posions-and-toxins/

Gang stalking BINGO: targeted individual, targeted real estate, targeted electronics, targeted childROGS ren…….

Let  me  know  if,  and  when  you  start  seeing  patterns in  the  data  of  organized  gang  stalking……because  the  Experts  all  agree that  an  obsession  with patterns  can  indicate delusions, and  maybe  even  schizophrenia!
But  there are,  in  fact, links  between  organized  gang stalking and  real  estate, organized  stalking  and kangaroo  DVIC  courts, links between Gang stalking and Electronic implants: (Here is how the NSA uses electronic implants.) and electronic  implants that  monitor  our  computer  activity, sometimes  for  YEARS.

Related  Story: How secret  policing tactical  assaults  can  induce  delusion-like  symptoms in  politically  targeted  individuals,  as  those  targeted  try to  find  words  for  un-Constitutional  government conduct:
Gang stalking and delusions and paranoid complaints: what is Level X thinking and cognitive bias in psychologists/psychology? 
OGS victims obsession  with  patterns can  indicate  delusions to  therapists  and psychologists  on  the  state  teats!

But  here  below is a  case study  in  organized  gang  stalking  that  is  full  of  the  EXACT  patterns that  I  describe here  at  ROGS.  Organized  gang  stalking  IS  what  I  say  it is!
So…BINGO: Lets Play ROGS BINGO, in  the  case  of  the  targeted  activist!
Black  activist jailed  for  Facebook  posts speaks out about secret FBI surveillance that  went  on for  YEARS.
Exclusive: Rakem Balogun spoke out against police brutality. Now he is believed to be the first prosecuted under a secretive US effort to track so-called ‘black identity extremists’
…….. The father of three said he was shocked to later learn that agents investigating “domestic terrorism” had been monitoring him for years and were arresting him that day in part because of his Facebook posts criticizing police.
“It’s tyranny at its finest,” said Balogun, 34. “I have not been doing anything illegal for them to have surveillance on me. I have not hurt anyone or threatened anyone.”
Balogun spoke to the Guardian this week in his first interview since he was released from prison after five months locked up and denied bail while US attorneys tried and failed to prosecute him, accusing him of being a threat to law enforcement and an illegal gun owner.
Balogun, who lost his home and more while incarcerated, is believed to be the first person targeted and prosecuted under a secretive US surveillance effort to track so-called “black identity extremists”.
In a leaked August 2017 report from the FBI’s Domestic Terrorism Analysis Unit, officials claimed that there had been a “resurgence in ideologically motivated, violent criminal activity” stemming from African Americans’ “perceptions of police brutality”.
The counter-terrorism assessment provided minimal data or evidence of threats against police, but discussed a few isolated incidents, notably the case of Micah Johnson who killed five officers in Texas.
The report sparked backlash from civil rights groups and some Democrats, who feared the government would use the broad designation to prosecute activists and groups like Black Lives Matter.
Balogun, who was working full-time for an IT company when he was arrested, has long been an activist, co-founding Guerrilla Mainframe and the Huey P Newton Gun Club, two groups fighting police brutality and advocating for the rights of black gun owners. Some of the work included coordinating meals for the homeless, youth picnics and self-defense classes – but that’s not what interested the FBI.
A march in the wake of the deaths of Alton Sterling and Philando Castile at police hands.
Investigators began monitoring Balogun, whose legal name is Christopher Daniels, after he participated in an Austin, Texas, rally in March 2015 protesting against law enforcement, special agent Aaron Keighley testified in court….follow  the  links  above….connect  the organized  gang  stalking  dots! Because  nearly  ALL  mass shooters  endure YEARS  of these  tactics by hidden  policing,  aka  “High  Policing,  aka Americas secret  police.”

Read through ROGS to note that I indict some of the same suspects that Sharyll Atkisson's lawsuit did: Hillary Clinton, Al Franken, lawsuit, Department of Justice Department of Justice, FISA, Fisc, Obstruction of due process, America's Political Police

Could federal watchdog tamper with Trump wiretap evidence? It may not be a first- The Hill

Could federal watchdog tamper with Trump wiretap evidence? It may not be a first
© Greg Nash

Everyone hopes the Department of Justice’s inspector general (IG) will fairly investigate surveillance activities conducted on U.S. citizens by the FBI and intel agencies. Just like we hope the IG’s office will reach fair conclusions in its probes of alleged FBI misconduct concerning the Hillary Clinton investigation, leaks to the media and conflicts of interest.

But, for me, there’s reason to be wary.

I turned to the IG’s office in 2013 after independent forensics proved my computers had been infiltrated by remote intruders using software proprietary to a federal intel agency. Instead of fair findings, I got a lot of mischief and stonewalling.

And wait until you hear what I recently learned.

By way of background, in 2013, I filed a complaint with the IG’s office asking it to investigate the government-based computer surveillance. CBS News — where I worked at the time — would not allow the IG to examine my CBS laptop, which had been infiltrated (as CBS publicly announced on Aug. 7, 2013). But I asked the IG to examine one of my personal home computers that was also compromised.

Some of my intel sources didn’t want me to hand over any computer. “You can’t trust the inspector general,” they told me.

But I figured there was little downside. We already had our irrefutable forensics findings from our examinations. If the IG probe was competent and honest, as I expected it might be, then it could turn up names of the government actors responsible. If not, no harm done.

I don’t blame the IG computer investigators for what ultimately went wrong. They got briefed up on Apple forensics for their inspection of my computer, visited my house on numerous occasions, communicated freely, shared findings along the way and seemed to earnestly do a thorough job.

But as the investigation neared a conclusion, things changed.

On their last visit to my house, they wanted to be sure to segregate the malicious activity they identified from any work I might have done on the computer. They told me someone operated the computer in advanced mode, something I don’t know how to do. They found that — like the CBS laptop — the intruders had repeatedly altered the computer’s internal system times and dates. And they discovered that — like the CBS laptop — key files had been destroyed. (We already knew these things and more from our own exams.) We went through pages of their notes together. I asked for copies.

“You can get those later,” the lead investigator assured me. “When the investigation is finished.”

If there’s one thing I’ve learned, it’s that you can’t count on getting something from the government tomorrow. I made contemporaneous notes of the visit and findings.

The weirdest part of the visit was that, for the first time, the IG investigators began insisting the intruders weren’t working remotely but were in my house, sitting at my computer, doing these things. They had dates and times. I told them that was impossible; nobody was sitting at my computer upstairs in my home for hours while my husband was home on those days, at those times. Besides, we already knew from our own forensics that the intruders had operated remotely. My forensics team said the IG experts were not fully competent on their Apple work and, for some reason, seemed to be misreading the remote intrusions as local intrusions. Still, if nothing else, the IG work provided additional confirmation of some of our more basic forensics. No harm done.

Not long after that, my communications with the IG’s office changed. They notified me that their investigation had been “narrowed,” from looking into an illegal intrusion to determining only if there had been a remote intrusion. Nobody would explain to me who narrowed the scope of the probe or why. You’d think they’d be interested in any intrusion, remote or otherwise. Why the distinction?

In the next few weeks, when I learned the IG had finished its investigation into my Apple computer, I asked for my copy of the report. The investigators told me they’d been ordered to send it to the office of IG general counsel Bill Blier for approval.

Over the coming weeks, I repeatedly asked for the findings but was told it was still in the IG general counsel’s office. I formally requested that the general counsel release a copy to me. No luck.

One investigator had told me I could always file a Freedom of Information Act request to obtain my report and notes. I did so; under the law, a response was due within about 30 days. It’s been years.

When the DOJ’s inspector general won’t follow the law, to where can a citizen turn?

Meantime, under pressure from Congress, the IG eventually released what my attorney refers to as a “wiped” summary — not the actual report or notes — with spin that implied there had been no intrusion. This was quickly presented, publicly, by then-Sen. Al Franken (D-Minn.), who had gotten a copy of the summary with lightning speed; and it was dutifully reported by some in an unquestioning press.

The IG’s obfuscation and stonewalling doesn’t adversely impact my lawsuit against the federal government for the computer intrusions. The case is progressing through court with evidence from multiple forensics exams.

As our lawsuit continues, so do our forensics. New computer investigative tools have become available, and grains of evidence have been solidified into forensic mountains. Our evidence involves multiple computers and government I.P. addresses discovered improperly residing in them.

That brings us to the news.

Not long ago, my forensics team asked if I used that Apple computer after the IG returned it. My team was conducting a new exam. “No,” I replied, “it hasn’t functioned since before I gave it to the IG. I just stored it when they returned it. Why?”

“Because — that’s not your hard drive inside the computer they gave back to you,” they told me. “… We know the serial number on the hard drive when you bought it. We recorded the same serial number on our earlier forensics exams. This is a different hard drive. Completely different serial number. Not even close.”

I would never have known if we hadn’t gone back in that computer for additional forensics.

In addition to somebody changing the scope of the IG investigation midstream, and the office withholding from me the notes and the report on my own complaint, somebody also switched out my hard drive before the IG returned it to me.

What does all this mean to the integrity of the DOJ’s inspector general?

You decide.

Sharyl Attkisson is an Emmy Award-winning investigative journalist, author of The New York Times bestsellers “The Smear” and “Stonewalled,” and host of Sinclair’s Sunday TV program “Full Measure.” Follow her on Twitter @SharylAttkisson.

An army of Paul Blart the Mall cop and a database walk into the Hero bar: recipes in nauseating social policy and corruption

So, I have documented a distinct link between crisis PR narrative control and how organizations like the Association of Threat Assessment Professionals (ATAP) has deliberately blurred the line between so-called terrorism and domestic violence, utilizing what they call the,”colluding parallel investigation,”and advisinglaw enforcement, LEIUs, and Infragard community policing elements to wage pre-emptive, multiple and never ending investigations on targets;and how auto-antonymal language and double entendre are used in “influence operations”which the ACLU has also noted; and how alternative media is under attack from the “deep state” and it’s hand maidens in civil conspiracy, the psychologists who gaslight TI’s, but who, by proxy, are also those who are causing mass shootings, suicides, social isolation, political corruption, and more.
I have also repeatedly documented the toxic blur between security contractors and police functions that operate in an “intelligence capacity,”as we see a link between the Yellow shirt security contractors and the Stephen Paddock shooting, as well as documented links between Omar Mateen and G4S concurrent with Mateen being “on the FBI radar,” directly because his father is an FBI asset/informant,but how these literally conspire under the ATAP “frame”work and also wage hidden terror and morality/coercion/social conformity/entrapment/social engineering campaigns “in darkness,” and without oversight.
It is these latter subjects who are what can rightfully be called the modern equivalent of Nazi Brownshirts, or Stalinist purge agents, or Israeli Sterns gang members, and the ‘whisper campaign’ is the tactic both groups used to cause strife in local populations. All of that whispering, starts in database abuse, and BOLO’s of various kinds.


UPDATE 10/28/2019
: Actress Rose McGowan, who I mention in this post you are reading , has now sued Harvey Weinstein and his sleazy gang stalking lawyers David Boise and Lisa Bloom, as well as the Mossad affiliated spies that he hired to ruin her life, the spy firm Black Cube of Israel.
Rose McGowan sues Harvey Weinstein, Lisa Bloom, more claiming ‘diabolical’ intimidation plot
Maria Puente

Also note that one of my personal stalkers is also a Mossadi jihadi, and WOW did my blog, and my communications device/s get interesting after I PROVED what gang stalking IS with that one example.

In case you don’t recall what a BOLO is, have a look here especially, then here, and here.
Then, have a look at this Wiki site where the excesses of the unethical post 9-11 “information sharing environment” as we see security industry are documented in one specific community, Aspen Hill Maryland, as an organized gang. This Wiki has valuable information, but also some classic total time wasters like the “”Old Men from Out of Town” story started by private detective David Lawson, which, while interesting in the way that other locker room talk is interesting, has no merit in our Constitutional crisis era of total system failure.
From Aspen Hill Wiki:

“Fake Cops”

Local law enforcement has a very effective and legitimate approach to dealing with localized crime problems. This is “PCAT” or “Police Community Action Teams” programs, in which officers from other areas are given significant opportunities to accrue overtime hours, by concentrating forces in one or a few beats. This effectively floods the streets with both uniformed and plainclothes officers.
Some Organized Stalking groups are well aware of this, and they will occasionally flood an area with their own staff during, or more commonly immediately after, periods of PCAT activity. They can expect cooperation from grateful shopkeepers, mall security, and other property-management types who are allowed to believe that these individuals are operating under, or personally possess, police authority. It’s possible that some persons affiliated with such organizations are in fact police officers, or more likely were at one time police officers. Yet the vast majority of these “Fake Cops” are in fact fake cops. Quite frequently they work with, or are part of, “security gangs”.

“Security Gangs”

Some commercial facilities such as shopping centers or office campuses may be unable or unwilling to afford the level of security available through legitimate private security services. Some such may be approached by organizations offering their services to “help clean up the place”. These organizations are, effectively, unlicensed security officers and also often operate as private investigators with no permits. Or, they may possess permits or licenses which do not apply to this sort of work. For example, Bounty Hunters are in fact law-enforcement and may have special permits… which do not apply to any duties outside of seeking bail jumpers. Yet neither the property managers nor the people “apprehended” (usually beaten, intimidated, or frightened away, instead) by these individuals or groups are quite cognizant of the fact that these persons have no legitimate special authority nor license in these places and situations.

Enablers

Certain specific shopkeepers or property-management people are quite cooperative with either “fake cops” or “security gangs”. To such groups, such enablers are golden. In the rare case that the “fake cops” or “security gang” operatives feel that they are at risk and choose to hide their presence rather than risk the exposure of their operations, such shopkeepers or comparable staffers can act as eyes and ears for the fake cops and/or security gangs. Indeed, given enough time in place, and they may come to manage them, if not in exactly a capacity of being a management-level employee of a corporation or company. Yet they can direct the operations of such organizations, in effect, picking victims.

What makes the documentation of “organized gang stalking” significant in this case is that we see how elements in policing trickle information to security contractors, and “cop wannabees” who then form literal gangs, and use technology and tactics of OGS to seize turf, and “run neighborhoods,” in the disguise of authority; and this, which is a recipe for corruption.
Then, take a look at how “security guards” were an integral feature of “narrative control” in an ever changing story about the Las Vegas shooter Stephen Paddock in order to understand how similar mass shootings are to activities in the Hitler era with Brownshirt marauders corrupting Democracy; and other periods of history where the Constitution of a nation was suspended, diminished, or eradicated entirely.
http://www.latimes.com/nation/la-na-vegas-shooting-20171009-story.html
So, the Maryland Wiki from Aspen Hill has great information, and names some names to some degree, and can help point the researcher, the psychologist, the criminal defense or civil attorney into the right direction in pursuing cases against gang stalkers.
As I have noted, my personal case of OGS began distinctly in 2003-4, and progressed throughout decades, and went into full swing in 2008, and I worked with great lawyers, and began and prevailed in a lawsuit that blossomed to five other independent litigants to literally take a cowardly security contractor OUT OF BUSINESS. As you can see, I am taking my time this time around, and making sure I get it right for everybody.
Without coincidence, 2008 is also when the Department of Homeland Security, working under the “intelligence sharing” platforms where the DEA/FBI/DHS/CIA waged hidden database backdoor searches across agencies, and began to target individuals with ferocity, and devoid of any due process, or even anything resembling due process protections.
In other words, systemic denial of substantive due process became the norm in 2008, as well as a host of other institutional practices that require a separate essay, but simply put: information sharing became indiscriminate, political, slanderous, and frequently sought targets that refused to participate in such a social scheme, which is well documented all over the web as one TI after another becomes targeted with “hidden operations” of many kinds.
Have a look at another of my encounters with hidden internet operators in 2011, which was another big year for DHS backdoor black operations. Like Rose McGwan and tens of tousands of others, we can begin to envision how civil conspiracies of deprivation of rights are traceable to both private contractors, who can  be sued for actual damages, and the DHS which can be sued for complicity and reform, which won’t come easy as major senators sitting on the intelligence committees continue to derive substantial kickbacks under the watchful eyes of the FBI and other agencies.
But because the federal government has managed to skirt color of law claims, due process claims, ad substantive due process claims bu claiming state secrets, FISA exceptions, section 702 loopholes and more, I will leave it to actual lawyers to make the larger arguments.
It is at this point, beyond a reasonable doubt that the government acts pre-emptively in these cases with actual prejudice, maliciously, and with selective enforcement, and that the government has excercised bad faith by using back door searches and OTB methods. But for the lay reader, here below is basic Due Process, 14th Amendment where the federal scheme has shifted the burden of proof to the citizen to bring claims:

Every Due Process Clause analysis begins with the question “Has the government deprived some person of life, liberty, or property?” If there has been no government action, or if there has been no deprivation, then there cannot be a Due Process issue; substantive or procedural.
Substantive Due Process issues involve the states’ power to regulate certain activities.
Procedural Due Process issues involve an analysis of the procedure required by the Constitution when states seek to deprive people of life, liberty or property.

While the majority of persons targeted with these hidden schemes that are waged from behind the DHS and other agencies target low status, low income individuals, a savvy civil or criminal lawyer will see the merits of pursuing redress in cases of OGS because there are other venues whereby proving substantive due process has been occurring on a massive and industrial scale, as we are now faced, literally, with predatory “law enforcement” that is actually not enforcing any laws, but rather, seizing property in record numbers, framing suspects, and using intelligence agency tactics in local communities to create the appearance of crimes instead.
So, OGS has morphed into real estate red-lining, and a CIA styled asset forfeiture racket; but in many other ways too. ANd here is a case from a local community where a citizen has documented other real estate related claims, as did Bob Krlich.
Up until ROGS, few would risk speaking out about ths form of corruption, and worse, the actual language didn’t even exist in many cases, which is by design of the corrupt, and the corruption itself. Look through ROGS foor more links to the dialectic itself-search for tags with “linguistics” and “para-language” and “semantics”  and “jargon” for examples.
One of the chief and main reasons this is allowed to continue is because “security gangs” and “private contractors” are not held accountable to the public, and as we see on an  industrial scale, the public doesn’t even know what any of the many “hidden operators” online are even doing. And how can you litigate for a client, or in a class action lawsuit of the proof of such a diabolical state-level brownshirt scheme remains under authoritarian control, disguised by “state secrets” and other unchallenged privileges?
Well, it helps to have a starting point, but as we see pre-ROGS, there was a dearth of data that verifies OGS as an actual complaint. Fightgangstalking.com is one of the few who has stuck with the facts, and occasionally whistle blowers step forwards; and there are some highly credible online testimonials and a few court attempts like the case of Jeffrey Kantor, but other than that, where to start?!
So-start with the private security contractors and their chain of oversight. and work your way up, combined with other data that proves patterns of state conduct, substantive due process violations that stem directly from the DHS scheme, and the hidden data about back door searches and the electronic trails they leave that became available since Edward Snowden and corporate collusion at the database level.
Further Reading: What is substantive Due Process?

Due Process Clause:
The Fourteenth Amendment reads, in part, that no state shall “deprive any person of life, liberty, or property, without due process of law.” This applies to the states and to local governments. The Due Process Clause of the Fifth Amendment applies to the federal government. Most Due Process issues involve state laws.
Common Law:
The two sources of law are statutory law and common law. The common law is that body of rules and principles developed through the courts over time. While legislatures often overrule an area of common law by enacting a statute, and while courts often overrule an area of common law by refusing to follow it further or by handing down a decision which makes use of a competing principle, the common law carries with it the force of law and is generally binding on courts within that jurisdiction.
Burden of Proof:
In every case one party or another has the onus of demonstrating the truth of some fact or another. The party who must so demonstrate is said to have the burden of proof. In addition to who carries the burden, the burden can be of different loads. For example, in a criminal case the prosecution carries the burden of proof and must prove every element of the crime “beyond a reasonable doubt.” In most civil cases the plaintiff generally carries the burden of proof but must prove every element of her claim only by “a preponderance of the evidence,” which is far short of “beyond a reasonable doubt.”

 

Forensic photography and actual gangs: the difference between gang stalkers and actual gang members

UPDATE: Since I chronicled the story below, the web has been scrubbed of the story mentioned herein, shortly thereafter.
That story was about how Canadian intelligence agencies selectively utilize internet and MSM, to create cross-talk (feedback loops ) to speak with mainland Chinese police investigators, while pursuing a suspect, and a gang of suspects.

There is no difference between actual gang stalkers and actual gang members. Zero- Cero. Zip. Zilch. Nada-except for the federal/state paycheck. And the “high policing” basis of criminal morality, of course.
Oh-that, and the fact that official corruption is better financed, far more brutal, operates with total impunity, and it’s illegality and mercenary scope far better hidden from the courts (as we see with the Section 702 and the FISA charade/masquerade ball), because it is easy to pick easy targets and then, drag them before a judge, and say “look! We got a badguy!” because this serves the social purpose of “security theater,” or, what has been referred to in the gang stalking dialectic as “street theater,” finalized by the three well known and often repeated phrases: gang stalking “ends in institutionalization, incarceration, or suicide.”

Related Google Fun: “Bush phone and gang stalking” returns  514,000 results “Obama phone and gang stalking” returns 641,000 results. “Trump phone and gang stalking” returns  750,000 results. Is organized gang stalking just a phenomenon, or is it the emergence of a social contagion? Emergent norm theory predicts that gang stalking is becoming a new normal-and that’s not good for democracy.

The Alcoholics Anonymous  variant is ” incarceration, institutionalization, or death,” and in the online dialogues of gang stalking, we can also find links between it and M. Scott Peck, a Catholic psychologist,and a debunked ponerologist. So, these strange and limited outcomes  of organized gang stalking ALSO and  without irony, derive from the Cult of Bill W., and AA’s across America.In a tenuous way, this links OGS directly to the FBI, and the curious rise of gang stalking complaints.
It cannot be missed that this is a direct dialectical link to specifically James Comey’s FBI, which ran from 2005 until his firing in 2017 because he had turned the agency into a political police that J.Edgar would only drem of, because they didnt have internet drag queen porn durng Hoover’s reign, which would have kept him very busy-possibly TOO BUSY to wage war on American’s.
And, this AA phrase is also linked directly to Mr. Comey’s chosen buddha, Reinhold Niehbur, who is said to have written the serenity prayer(although a few spurious crickets  in the head of Bill W.’s Protestant/Catholic universe dispute the origins-remember; ALL WORDS and SYMBOLS ARE SECTARIAN, and  POLITICAL in “WESTERN” JEWISH-cHRISTIANITY)
Sure- real gangs sometimes use cell phones and computers to stalk, harass, and harm people. But keep in mind that all of THOSE phones are monitored by any of 17 agencies here in the US and hundreds of others in the FiveEyes scheme AS CRIME HAPPENS. Then, the “goodguys” sweep in and grab all the cash from the “badguys”, after pre-emptivey pre-targeting real estate after pre-assessing and pre-apraising and predictively pre-empting crimes that could/might/would/will happen in or on or around a house, aka “real estate;”and that just after they have manipulated a rental property via a Fusion Center, or manipulated a landlord from long distance-Virginia to Minnesota for instance-and filled the property with drug dealers and sex offenders (Google “real estate” and “gang stalking,” or “John Lang Fresno” and “sex offender”).
Tell ya what: if John Forbes Nash didn’t sound nuts BEFORE he met those guys, he sure did AFTER he met those guys. I mean- no gang has anything on this new federal-state-local scheme. The goodguys lost and this is all that’s left of the shredded democracy we all once trusted to rely upon due process. It’s enough to make you wear shoes on your head.
Or:

chinese gangster 20 Photos from a Chinese gangsters lost cell phone (21 Photos)
This is a photograph of a Chinese gangster, in unfortunate circumstances. I ask you, the reader: why does he have a shoe on his head? Google “Chinese” and “sadness” or “mourning” and “shoe’s on head” But WHAT ABOUT THE WATER BOTTLE?

Moving on now: some have at times confused the terminology and blurred the line between “organized criminal gangs” and “organized gang stalkers,” which would be a false binary. As we see time and time again, the Hegelian dialectic has demanded that we choose an “us versus them” paradigm. It also makes us look stupid, corrupt, short sighted, and weak.
As I have noted, I am biologically and psychologically unable to think that way, whereas some 98% of American’s and others from cricket headed cultures think that way by default. I admit: it’s a personal flaw. A fault of my birth, also in unfortunate circumstances in a Catholic-Jewish cultureruled from hidden mechanisms and hidden activity from a sky god who sits “in the cloud.”

Related Stories: What is the FBI’s “bizarre” method of off-the-books harassment aka COINTELPRO 2.0? It’s called a “disruption” campaign. And according to byline.com, these are “How the U.S. Federal Bureau of Investigation is violating the liberty and privacy interests of Americans by using extra-judicial investigations designed to never lead to a formal criminal charge.”

But the problem with that type of thinking is that once “we” adopt it (whoever “we” are on that day/that election/that locality), “we” become gangs ourselves, and thus, there can be no actual morality, and no actual higher purpose. And for me at least, the war on terror has actually been a war on ideas, and the people who have them, because the predatory structure of highly institutionalized and RITUALIZED  illegality (the inter-connected tribal-religious-sectarian FISA/Section 702/Fusion Center/FBI-DHS-CIA ‘backdoor searches’/ political spying/ targeted police brutality/etc) affects some of us, provably more than others of us.
Here- look where their war on my ideas began. I was just a lil’ ol’ amateur journalist then. Imagine where the narrative would be if I hadn’t become a target of their hidden and brutal and constant attacks on my ability to write? I mean-this happened less than three years ago. Whoever the apophonetic “they” are of course, “on that day” in this bizarre inter-connected web of hidden and constant atrocities against liberty.
So as you might guess, I am the crazy guy on the internet, walking around in cyberspace with a pair of shoes on my head, and nothing but pocket litter in my worn out overhauls. And even that, “they” pick through it like a gold strike.
And, as I have documented repeatedly, in many ways, with the best saved for that one important day in the light, because it will take more than me to gain standing to sue this monstrosity of the Panopticon in a court room. And, there is much more than meets the blog- the rabbit hole goes much deeper than your eyes, there, reading this post. And that is what is colloquially called a “Constitutional crisis,” and a well considered challenge to its basis.
Wheeeeeew. I am glad others are on the case now. I’m very tired! I can’t keep the shoes on my head much longer. AND: my green hat falls off when I hang my head, remembering those oddly timed car accidents. But these, too, will have their day in court, again-because, it is in fact, all related.
And look! The ACLU, and the EFF, and the NACDL now has a manual for civil and criminal litigators to challenge government hacking! And generally, it is becoming more widely known that gang stalking” is actually “counter-surveillance stalking” by the “goodguys,” against “everyone else who ruffles their flying pig feathers. Now, if we can just get them onboard with these many entrapment and containment schemes that all agencies are practicing.
That will be THE game changer-when “we” get wider publicity for the fact that kids like the mass shooter in New Mexico are created from the information “sharing” GCHQ/FBI/CVE fraud that targets our son’s online gaming habits on pure speech grounds-or no grounds other than that they are easy targets, alone in “their mothers basements”; and then “privacy rapes” them, while stirring up gender wars via “Gamergate.” How Catholic/Jewish/Protestant is THAT?
Here- have a look at a Chinese gangsters cell phone from 2012, and see how many forensic clues YOU can pick out from his culture/location/situation/status/power.
How big IS this little guy? One western/American/British linguistic feature is to use diminutives like “little” when speaking about Asian men and women, whereas many Asian cultures and specifically Chinese culture uses the diminutive the opposite way- to state that a person has great status and great power)?
chinese gangster 6 Photos from a Chinese gangsters lost cell phone (21 Photos)
 
 

Sex workers, FiveEyes-DHS-ICE-HSI investigations, asset forfeiture, and fakerape: gang stalking and real estate links.

Anyone who scratches the surface of the OGS dialectic soon discovers that sex workers are frequent targets of stalking, especially women and men who work “independently” away from all the captain save-a-hoes and the various DVIC prostitution profiteers and NGO’s.
But less obvious is that frequently, they are inter-generational targets of all kinds of abuse beyond sexuality: sex workers are a “ca$h cow” for social services and the DVIC, as well as police and psychology. And that, inter-generationally. It is a situation that hasn’t changed in the history of the word, because prostitution is the world’s second oldest profession, just after those who claim to be policing it by peeking through the bushes.
So, as we see that there are also connections between militant lesbianism, state level pimping, and the gender feminist sex wars of the 1980’s, updated to include high heels policing, we see today how “far” these have gone to “own the machinery” of power. Beyond the obvious flaws in their narratology, that of swapping one group of financiers an “patriachs” for another- is the fact that pimping BY women OF women is more frequent these days.
So, let’s explore an actual case scenario drawn directly from life, and directly from the OGS online dialectic. I will not point to my source, but suffice to say that I have documentation ranging from police reports to witness testimony to ICE records of deportations.
Save the women! AND pimp the female sex offenders!
Politics and pimping make strange bedfellows as we see in the current Palestinian styled whisper campaign where western Holy Warriors working from within the DVIC framework run narratives and scripts about saving women from “abuse” as if women have no accountability, or agency in their own lives. The “hidden hand” of “occult activity” aka “culture wars financed by George Soros, et al” is all over these whisper networks, and I suspect, a direct product of “foreign mystery money” that flowed in to our politics after 1993, at the height of the lesbian sex wars where women sough control of other women, pornography, and sex.
And as we see in case after case of OGS where real estate is involved, we also see the hidden  activity of NGO’s and other “morality pimps”who derive their sustenance from federally incentivized crisis PR campaigns. And, the fingerprints of pseudo-feminism are all over organized gang stalking, ranging from the political alliances and allegiances of the “two studies ever on gang stalking” to the online “four horsemen of pseudo-feminism” and the language of those who participate on blogs, to SESTA, and much more. .
So, here is an actual example, drawn from several online stories of how this works in practice:

  1. a political constituent is targeted as an influencer by the hidden FiveEyes/ DHS/local bureau hidden activity and the  apparatus of online speech control (Tom Schweic, a Missouri politician who committed suicide is likely an example of this but there are many more).
  2. the constituent is blackmailed, compromise operations are waged, and a smear campaign begins
  3. ICE targets that persons property and real estate in a hidden investigation as local enforcers selectively enforce codes and ordinances
  4. the HSI pre-crime property assessor shows up in the yard
  5. Rental properties are raided, selectively, tenants are deported
  6. the landlord becomes aware that their rental applicants change from ordinary working people and college students into a steady stream of prostitutes, shady drug dealer types, ethnic/racial activists from NGO’s and local “cliques and mobs” of people
  7. of the candidate pool, the landlord leases to a female sex offender.
  8. other tenants on the property are then suddenly accused of sexual harassment, and attempted rape (as we see today, this has become the norm, not the exception in politics and media-and that litigated in the gray area of public opinion, rather than law).
  9. other tenants sign leases and break them in days, or move in a minimal amount of personal property-just enough to constitute legal tenancy, and enough to get the keys to the property.
  10. security camera’s become targets of destruction, the surrounding neighborhood becomes a battle ground of hidden covert activity, constant break ins and other odd happenings, sometimes with squad cars right up the block.
  11. much more. Here is a site that chronicles this activity, above,  and I suspect the author is themselves a covert, but also possibly an actual TI as they live in a Catholic and Protestant cult saturated area of the world.

 
All of this above will also be accompanied by the usual GS activity ranging from internet and communications manipulations/hacking/disruptions; and every city vehicle ranging from the dog catcher to firetrucks; and bright lights shining through windows and most other features that are well discussed online, and more(how bizarre can you get? This is how bizarre these campaigns are.)
So, as we see, in the research of the extant blogs, there is a connection between sex offenders, sex workers, NGO’s, the FiveEyes, NSA data capture ans backbone activity, and the police practices in some areas of the country that are heavily reliant on federal funding. Fusion Centers, colleges, local police departments, and more will be involved.
And we see time and time again, a connection to “gray area policing,” local syndicates, and a new form of red-lining, where certain state and local actors control the cell block by using heinous, constitutionally cringe-worthy practices.
And, all of that, under color of law, and subversion of internet. There are many cases online where this can be verified if the researcher merely Google’s “real estate and gang stalking.” One case I am currently monitoring has all of these features and more-including claims of directed energy weapons, which I will not discuss, other than to say that it is a feature in that case.
But there are indeed links between organized gang stalking and lesbian feminist sex wars and prostitution, which are under-explored, and until now, hidden away “in darkness,” as they like to say. And, most of THAT begins in academia, via academic stalking, which is a separate blog entirely. And as usual, don’t take my word for it-I’m just the “potentially”dangerous crazy guy on the internet.
Do your own homework, test and retest until the cows come home (which they never will again, now that we are a socialist nation in high heels), because ROGS claims are for the most art, empirical. And, I can name names too.
UPDATE, 03/12/2020:
I wrote this post a couple years ago, and as you might have guessed, the landlord in this case was me, lol.
And recently, while revisiting my evidence, I discovered that one of the tenants mentioned above has now died. Of suicide.
In that case, the tenant was a guy named Jonathan Grey, who was one of those move in/move out lease breakers that I mentioned.He claimed he found a,single cockroach in the home, but never presented it to me.
In that case, he was also a Team USA Minnesota runner, and the nasty gang stalking cunt who threatened me if I didnt let him break his lease–and she threatened me in writing–has a name: Patricia Goodman, the founder of Team USA Minnesota, which has now been renamed, and transferred out of her ownership.
Goodman had threatened to have city agencies declare my property a “sickhouse” akin to a house that had an epidemic in it. I told her I would see her in court, and later, that I would sue her for malicious conduct, AFTER I kicked her ass in court. I never got the chance, but I will publish our letter exchange at a later date.
Here is more on Jonathan Greys suicide.

And here is Patricia Goodwin, an actual gang stalker

And here is her email, feel free to repost it.
[email protected]
 

The new red-lining? Gang stalking, 24/7 harassment complaints, mainstream news, and real estate links

Group stalking, multi-stalking, organized gang stalking and 24/7 harassment complaints: “The victims of the gang stalking have tried seeking relief through police reports and civil complaints that have gone to court, but nothing has changed. My friends have had their house up for sale for over a year because they feel it is the only way to escape the daily staring and leering and name calling that they hear as soon as they step out onto their own deck. New Jersey Herald

Real estate red lining is illegal. Realtors, communities, and independent home sellers cannot discriminate in the sale or rental of property.
However, as we see time and time again, local real estate “syndicates” controlled by elements from within policing can and do exactly that all across America. These collusions are also known as “community policing” volunteers, aka “Red Squads” which are well documented in the historical records, and a practice of the current DHS schemes too. And, at the center of every transaction is a lender, who is the shot caller in these local-to-international mobs (Hi Kevin!).
So- ROGS asks: do banks and lenders show discriminatory preferences for police and fire and state unionists-and their relatives?

Related Story: Have police and fire pension funds turned into racketeering-or worse? Dallas Police and Fire Pension brouhaha asks: How enmeshed are these plans and schemes anyways? RICO seems so long ago! After all- there are so  many “little people” who can be exploited in the modern Kafkaesque drama’s playing out all over America as these elements work to “frame” every discussion to hide insight into “public dealings” that aren’t necessarily “in the PUBLIC’s interests.

Here is a case where again, we see a clear link between real estate and gang stalking, as documented in the New Jersey Herald in 2013.

‘Gang stalking’ threatens lake community family

Posted: Jul. 20, 2013 9:52 pm Updated: Jul. 26, 2013 1:00 am
By: Donna Weatherwalks [click the link for he whole story!]

I live at a lovely lake community where many wonderful people live. However, amid all of the wonderful people is a group of at least eight misguided and sadistic people who have chosen to “gang stalk” two of their other neighbors on the block.
Gang stalking is a known phenomenon which can be difficult to believe and even harder to prove. It involves a group of people who band together for the purpose of targeting another individual or individuals in order to control aspects of their targets’ (victims’) lives and to monitor them 24/7.
I have been witnessing this happening to my friends since June 1, but they have been experiencing the daily stalking since 2011. The victims of the gang stalking have tried seeking relief through police reports and civil complaints that have gone to court, but nothing has changed. My friends have had their house up for sale for over a year because they feel it is the only way to escape the daily staring and leering and name calling that they hear as soon as they step out onto their own deck.
The gang has even gone so far as to call the police to make a false report against my friends in an attempt to get them into trouble. We wonder what they will do next.
Because the gang’s behaviors are not “criminal acts,” the police are limited as to what they can do, and the matter is complicated by the fact that the foremost member of the gang has a family connection with the local police department.

 

And keep in mind that New Jersey is already documented in the record participating in gang stalking-and that Goggle returns 613,000 results for gang stalking and New Jersey, but also that Rotary clubs and other insider (in-groups) are implicated by some in everything from active shooter training that takes place curiously close to actual mass shooter events to crisis PR dilemmas where they ask “is it ok to have arrows on our logo?” and other events that seeks to diminish the second amendment’s protections.
As some/you might have noticed: a movement is afoot to force the Constitution from our hands, through slanted story telling, and “the hidden hand*” of religious doctrines guiding our speech rights. We have the “deep state” with it’s hand in former FBI director James Comey’s ass, puppeting Reinhold Niebuhr, and everywhere you look in the dialectic of OGS you see this other “hidden hand,”which has long been the sign of “Masonic” orders.
Here- just so that you know how non-sectarian free masonry is, look here at the Beatles:

And then look at this controlled asset, Ted Cruz-and I can’t help but wonder whose hand is in his ^ss, or how he is being leveraged into the insanity that is his platform:

But don’t waste too much time over-thinking it, because what matters is that they are all in it one way or another, sticking their cultish Abrahamic/Masonic crap up your arse as if you are a puppet. Then shout out to the moron who designed this page here from the FBI countering violent extemism program (CVE), and the bloody irony of how that thing works in practice-like a hidden hand in your internet switch, on your cell phone, and “around every corner.”

Related Story: Where did 24/7 surveillance of American’s begin? How did the NSA-Israel data theft pipeline happen? When did modern slavery by another name, aka the MIC/DVIC/PIC control of narrative begin? Ask Leo Lewis, Hollywood financed domestic spy.

So: when did the hidden hand take over real estate in America?
They pop up ALL OVER the DVIC money pot starting in 1993, building to a pet cause of “Stalking the Stalkers” in lop-sided domestic violence scenarios that have sought for forty years to throw America into the religious and arch-conservative theocratic paradigms of gendered narrative. As I have said repeatedly, if you scratch the surface of most gang stalking complaints, you will find “secret society” involvement. Lion’s and Tiger’s and Rotary– Oh My!
And the weaponized Boys and Girls Clubs, and the many headed hydra headed AIPAC affiliates and the hydra’s of NGO’s  are all monetized by mystery money and junkets overseas where backdoor deals take place to sell our democracy and erase due process AND the Constitution on the cheap.
With lots of help from behind the curtains of Oz and Fusion Centers, using “high policing”  of course, which are the de facto ground zero for plotting these domestic operations and social engineering, where domestic para-militaries under DHS contracts work with foreign spy rings,  work with blackmailers and gang stalkers in every American community-as these vertically integrated, internecine campaigns of domestic terror are waged on individuals from “outgroups” by the well heeled in-groups; the nexus and gathering point where all modern discrimination takes place.
But gang stalking is real, Dorothy-Look! It’s says so in a newspaper! And we’re not in Oz anymore-we’re in Slipperyslopeville, which is right next to Greater Tel Aviv, and it looks like the ground is shaking under the weight of all that laundered capital that finances the DVIC.
But that could also be my apophenia kicking in too, as my bicameral mind is probably in a classic conflict with Sigmund Freud’s D.E. Cameron Syndrome and under the influence of the polarized Gregory Batesonesque MSM, and exacerbated by psychology’s little “official source gas-lighting” problem.
And worse! For some reason, in bouts of deep apophenia, I obsess over the fact that John Nash’s biographer- the author of “A Beautiful Mind”-was also the daughter of a CIA case officer….yeah, I know: I’m the crazy guy on the internet; just one “potentially dangerous” voice from a tribe of troubled minds who are starting to see the links between real estate and organized gang stalking.
And, a few other things, too, like how “high policing” is what police corruption IS nearly by definition.