Security guard Andres Guardado, 18, murdered by Los Angeles Sherrifs Department gang members: “gang stalking in Koreatown, LA ”

Shortly before the murder of young security guard Andres Guardado by the Los Angeles Sherrifs Department, (LASD), my blog received the following search query:

gang stalking koreatown

As it turns out, Andres Guardado, who was murdered in Gardena CA, by gang members from within the LASD*, lived in — you guessed it: Andres Guardado lived in Los Angeles’ Koreatown.

He lived in Koreatown with his two siblings and parents. “His father and mom are destroyed,” Abarca said. “There are no words to tell them right now.”

And, I wrote about this unusual search query here, as my blog was crippled under a nation-state level attack(which one of my sources suspects came from an international security contractor out of San Diego, with offices in Houston, TX, Mexico, and other locations), and I documented this strange and hyper localized search search query in this post here about gang stalking psychometrics, which referenced that exact search language.

UPDATE: One of the hallmarks of police corruption in these “bizarre ” cases of gang stalking is that the police narrative is always changing, and always includes “gray area high policing ” aka “proactive ” policing and its patently unconstitutional surveillance methods. In this case, we see the sherrifs department seizing the cameras of a small business, and that weeks later, as they murdered Guardado, those cameras were in police impound, preventing the business owner from recording that homicide.

More on that nation state attack here, where we see these cowards and police affilliated security contractor shitbags trying to cover their felony-level tracks(they committed multiple felony breaches, which I documented every step of the way, starting here and ending here, spread out over a year long period of time.) So, even the average reader might conclude that,ROGS –the,author of this blog you are reading — is no spring chicken.

So, increasigngly, we see the American surveillance state and its agents and agencies targeting American citizens with these bizarre, due process free stalkings, and security agencies breaking multiple laws, over national, and international jurisdictions. All of that is prosecutable.

More on nation state cybercriminals in the US -FVEYs Panopticon, and what they do, here.

So, yeah…gang stalking in Los Angeles’ Koreatown is very real, which I touched on briefly here in this post about gangs of police, retired police, military, and ex-military persons and their associates targeting individuals in LA. You can also occasionally see some of my snapshots of these events that appear in the photos at the top of my posts too.

As we see time after time, most strangely timed, and ever increasing mass shootings are preceded immediately and frequently DURING these events (watch the headlines of mass shootings to see how “coincidentally close” undercover cops, off duty cops, and retired cops are ALWAYS on the scene within minutes, and even seconds as we saw with the Ohio shooter Connor Betts, and the Thousand Oaks shooter Ian Long, who appeared to be SPECIFICALLY targeting those he personally knew in policing, and security), and the targeted individuals are followed very closely by constant contact online and offline, with police, undercover police, and police affilliated persons. Ian Long blasted some caps up his personal stalkers asses, and the world is much the wiser, and better for it, because those, “organized gang stalkers ” hace been.denied further game play.

We see these strange cases and bizarre homicides frequently start with years-long police stalking (which is distinctly different than.an actual “investigation ” becausectherecis no specified goal, or written warrant, or purpose, other than to endlesdly surveil a target; and like that of Ahmaud Arbery, whose chances of meeting his stalkers were literally a one out of 17000 chance; and George Floyd, with whom I,share several personal connections, both to that case, but also, to that specific gang stalking police department, where the avid ROGS reader will note that the president of the United States parked his convoy in front of my house as police union thugs, political NGO sponsored criminals, and others ran through my yard and wrecked my security cameras repeatedly. Those of us who record these illegal thugs get extra harassment, the hallmark of “police states ” by the very definition of a police state.

Many thousands of these cases take place every year in the US, as we are mercillessly followed online and off by fanatical sects and gangs within the police and surveillance apparatus.

Our many cases of ruined careers, institutionalization, incarceration, and worse are preceded very closely with gangs of police, and their relatives and associates stalking, and hunting primarily men and boys who refuse to adopt the totalitarian, police state model of a society that has been imposed on us by the One Percent and their many helpers and enablers since the Domestic Violence Industrial Complex (DVIC) was crapped into our lives in 1993, courtesy of people like Joe “Domestic Violence is Gendered Catholic” Biden and others who gender violence as male, instead of a societal problem of both genders (takes two to “tango,” lol).

So let me know when you start seeing patterns of secret police gangs and militarized security contractors harassing and murdering other security guards who believe in democracy, and you can start with my case, where I was a doorman who local cops and security gangs routinely harrassed, or this part of that case here, which traces directly to the homicide of George Floyd in Minneapolis .

For now, have a look at the LASD, murdering a security guard.

Family demands answers after sheriff’s deputy kills armed security guard in Gardena

I urge investigators to search Andres computer for exactly the search language I have listed above. And, for those who doubt ROGS Analysis of organized gang stalking, you can use this article that you are reading as one more example of scientifically testable evidence of “gang stalking in Koreatown. ”

I am sure this wont be the last example of such strange, hyper-localized search queries,and attempts to reach out to mefia outlets about this form of unchecked, unmonitored “investigative privileged ” poluce harassment of targeted individuals, which often precede a calculated, premeditated, TARGETED homicide BY police.

RELATED: Just before the gang stalking of civil rights attorney Andy Ostrowski, who took on both Republican bullies (Gov. Tom Ridge, and also Israeli Yeshiva,Universityv i.

We,saw it with Cosmo Setepenra and the dubious Lance Curve show; we saw it with the cade of Andy Ostrowski in PA, as search language came to.my blog about gang stalking in Pennsylvania, and we will see it again and again until this type of police brutality, directed primarily at men, this poluce tactic of stalking-as-investigation ends.

In the meantime: DEFUND THE POLICE, but also, destroy the DVIC funded and operated DHS /FBI /NGO apparatus that the One Percent has put in place of a constitution, to keep us divided and “privileged ”instead of united as as equals fighting a common enemy under the law.

And, for the reader, heres a story from the other day about security gangs, and even more from a fabulous Wiki that documents these gangs and how active police are working with retired police, community organizations, and non-governmental organizations (NGOs) who provide various levels of funding for “black operations,”in local communities, to target men exactly like Andres Guardado.

RIP, Andres. You are not alone, nor forgotten, as our nation takes on gangs of police, and their dirty work assets in the community.

Related Stories: So many heterosexual black, male activists are being murdered across the country that one must wonder why the GAY activists, like DeRay McKesson, who founded the BLM arent being murdered in similar numbers?

For example, Darren Seals of Ferguson MO, was found dead under mysterious circumstances (bullet in the head, in a burning car), just after two things happened: 1) he connected the dot between NGOs like the Ford Foundation and their Ivy League white-females who work at NGOs coopting movements like his, and 2) he reported on Twitter that he had been pulled over and harassed by a ‘security gang ’

The Ford Foundation is headed by a gay black man, Darren Walker, of Texas, who oversees a 13 billion dollar slush fund which he doles out to NGOs every year, who do “who knows what” with it; and so, ROGS wonders: has the white, supremacist fantasy (or the Jewish supremacist one for that matter) of ending the heterosexual black family now evolved from fakerape crying white females who preceded every lynching in history, to gay black men who hand out money for “social justice? ”

Just a thought….

* Other ways to say guardado:

VERB
saved salvó, guardado, ahorrado, almacenados
kept mantenido, guardado, mantuvo, mantiene, conservado, seguía
filed presentó, archivado, guardado, interpuso, entablaron

* I use the term.gang members when speaking of these types of police, in these types of events, because “proactive policing ” is illegal, and unconstitutional, but difficult to document. The blatant illegality and premeditated criminality (taking the businesses cameras, proactive, aka warrantless surveillance ) and the later murder of Guardado mirror gang activity, regardless of who wears a badge, because due process and civil liberty rights,are preempted in that schema.

New Lawsuit Focuses On Alleged L.A. County Deputy ‘Gangs’: extraordinary claims, extraordinary evidence

Gang stalking is actually police stalking, aka, stalking BY the police, and it is happening all over America, and the FVEYs nations, enabled by NSA/FBI/CIA spying.

Here below, we see how bizarre western policing is, and look into the highly organized Gangs of the LAPD, from Ali Winston of The Appeal:

New Lawsuit Focuses On Alleged L.A. County Deputy ‘Gangs’

Deputy gangs such as the Grim Reapers, the Jump Out Boys, and the Regulators have been accused of brutality and unconstitutional policing in Los Angeles for decades. But the sheriff’s department has not cracked down on the gangs, despite the recommendations of three independent oversight bodies since the early 1990s.

All major American cities have actual gangs working within the departments, doing the bidding of the elite within those communities; and those gangs often incentivized and organized along racial and sectarian lines, which is one of the ways that professional hate groups like the ADL maintain social control as gatekeepers for the One Percent.

These police gangs are now inter-linked digitally in cyberspace, and through fraternal and sororal organizations and NGOs, as well as through various as yet to be disclosed hidden databases maintained by various police unions such as the LEIUs, the FOP, and the ATAP; and hate groups like the ADL.

ROGS first encountered police gangs as a child, watching my father, the grandson of a then famous union organizer, harrassed across several counties and towns, and later, I was harrassed too in various ways (scroll to the bottom of this post for LA related gang stalking stories).

My father was part of the 1960’s civil rights movement, and shook hands with Martin L. King. He helped form the first black owned garbage hauling business in a mafia/mob dominated industry, in a mafia/mob dominated city.

So, I am extremely familiar with the “bizarre” nature of organized gang stalking, and its enforcers in policing.

On that note, and once again to shame and chastise the compromised journalists Mike McPhate and Laura Yan, as well as Dr.s Lorraine Sheridan, and David V.James, I now add this page you are reading to demonstrate that gangs, working in police departments across the world, are real, and in fact, very bizarre.

And, I point you also to my Gary Webb Award for excellence in gang stalking related journalism, which carries a $1000 stipend, and an award in the shape of a gold plated pigs trough, with the bottom chewed out.

So, here below is another example of good major media reporting of police gangs, written in The Appeal in 2018, two years after I began to write ROGS, and now, these stories are blossoming into major news stories about gangs in policing, from a County where I was personally gang stalked, and as I documented it in various ways (follow that link for just one example, but all over this blog, you will find many more).

Claims of Racism and Brutality Dog Los Angeles County Sheriff ‘Deputy Gangs’

It is a law enforcement culture that, ironically, apparently mirrors the very people they target for arrest in anti-gang operations: Deputies in these gangs sport tattoos signifying the number of people they have killed, flash gang signs, and tag buildings with graffiti to mark their territory.

Related ROGS Posts:

ROGS gets surrounded by retired LAPD deputies,and SWAT team members who want to change the narrative.

Mysterious people steal my GPS outside the LA Mormon Temple

ROGS uncovers the K4 affilliated network of gang stalkers from the San Fernando and San Gabriel Valley, whose network of influence spans five states or more

ROGS gets followed around in Los Angeles, much like what happened to Elisa Lam, but I identify an actual stalker, who is actually affilliated with an international spying organization instead of relying upon corrupt, tribal sectarian, and police.

ROGS runs the gauntlet of gang stalking turf in LA

Politics, paranoia, reporters, and stalking: The curious case of the Esquire magazine reporter being stalked by “farmers ” in white SUVs

Well, I am not winning any (tribal -sectarian )brownie points with Mike Masnick of Techdirt.com these days, who seems to feel (without evidence ) that much of my online performance art is based in non-tribal-sectarian actual conspiracies, because I practice non -biased blogging, and you can view that here,(and here, and here, too ) as I document the Anti Defamation League using Moonshot CVE to target the minds and opinions of those it chooses to “other.”
So, because that media format -TD -is one of the most speech tolerant platforms on the entire internet, despite its army of Israelified ADL accolytes, I wish to once again feed the deplatformers MORE evidence of how actual reporters are stalked in the, “real world ” of investigative journalism in the case of the Esquire reporter and the white SUVs.
For reference, heres my post about the “Whisperette” in a postal truck, and another about a Cadillac Escalade full of hackers from Texas that followed me around Hollywood, CA, and yet another about the Mormon mafia rifling through my vehicle, which became extremely common for me after I wrote this story described here and others before it.
So, without further adieu, the story of the Devin Nunes farm in Iowa, and mystery whisperettes in white SUVs, from Esquire.com-because it fits the tribal-sectarian narrative*:
Devin Nunes’s Family Farm Is Hiding a Politically Explosive Secret
</strong

When I walked in the front door of the mayor’s office, I had noticed a mud-spattered white Yukon parked outside. As I was driving to my next interview, I looked in the rearview mirror and noticed the white Yukon again. I drove aimlessly, crisscrossing streets from one end of town to the other. Everywhere I turned, the white Yukon appeared. I was being followed. When I turned the tables and followed the car back, it raced off. We played cat and mouse like that for more than an hour until I finally got a good glimpse of the driver: It was a middle-aged woman with curly, red hair who had a cell phone stuck to her left ear. The cat-and-mouse game started to feel a little dangerous, so I left town for a couple hours. On my way back into Sibley, the same car passed me on the highway. This time, the chubby man from the Lantern was driving. He smiled and waved.
Or maybe I’d made a mistake. White SUVs are common. Could I really be sure that was the same guy and the same Yukon? A woman was driving the car earlier; now it was a man. It didn’t make sense. Maybe I was just being paranoid.
I had a particularly sensitive interview that afternoon with a source who I knew would be taking a risk by talking to me about immigration and labor at NuStar. When I arrived, we talked for a few minutes before the source’s cell phone suddenly rang. The conversation seemed strained. “Sí, aquí está,” the source said. I learned that on the other end of the phone was a man named Flavio, who worked at NuStar. Somehow Flavio knew exactly where I was and whom I was talking to. He warned my source to end the conversation. Not only was I being followed, but I was also being watched, and my sources were being contacted by NuStar.
ADVERTISEMENT – CONTINUE READING BELOW
I left and drove to the local grocery store, where I parked in the open, hoping to draw out whoever was tailing me. I suddenly noticed a man in jeans, a work shirt, and a baseball cap pulled down low. He was talking on his cell phone and walking suspiciously. Was he watching me? I held up a camera to take pictures and he darted away. I followed. His car was parked haphazardly on the side of the road half a block away. He got in and took off while I followed. It was a dark Chevrolet Colorado pickup truck—with California license plates. I ran the license-plate number through a database. The car was registered in Tulare, California…..follow this link -connect the dots!

Sol Pais: "a complete comedy,” courtesy of FBI gang stalking and another suicide: …BONUS BINGO: keep your eyes open for the "coincidental 13s”

Sol Pais, gang stalked from Florida to Colorado, commits suicide as FBI and local police stalk, manipulate her on social media, and monitor her from Fusion Centers.

Of all the things to write about, while being cyber-stalked by “community speech police,” that range from private contractors, to intelligence agencies, to FBI agents, handlers, and behavioral analysts, the young and beatiful Sol Pais became “infatuated” with the Columbine Massacre, according to FBI crisis PR agents, behavioral analysts, and other “handlers”of narrative.

Related Story: a story from the MSM, Denver Post news, describes how an FBI agents son directed the Columbine Massacre, with bonus 13
FBI agent Dwayne Fuselier downplays son Scott Fuseliers Columbine bloody, coincidentally homicidal film that was shot one year before the Columbine Massacre
By Howard Pankratz
Denver Post Legal Affairs Writer
May 13 – An FBI agent investigating the Columbine High School shooting whose son helped produce a video parody in which the school is destroyed says the film is a comedy and not a depiction of gratuitous violence.
Dwayne Fuselier also said the participation of his son, Scott, in the video, which was made more than two years before the April 20 massacre, does not compromise his ability to investigate the case.

“I’ve searched my heart and my soul for anything that was wrong here – that the kids (who made the video) should not have done,” Fuselier said. “There certainly was no evil intent. … It is a terrible irony, and they would never make that video again.”
Fuselier said he was speaking to The Denver Post as a “Columbine parent” – not in his capacity as an FBI agent. Scott Fuselier, now a college sophomore majoring in film and TV production, said Wednesday that the group of Columbine students who made the video “intended it as a complete comedy.”

So, ROGS,for my part as an investigative blogger, I would imagine that the fact that an FBI agents son planned, executed, and directed a movie at Columbine that directly mirrored the slaughter that occured one year later would become a little detail that would draw suspicion, or even “infatuation”.
Or, that writers who write about such things online, later get stalked across the country, and forced into suicide would ring a few bells in the “something is heinously and disastrously wrong with FBI gang stalking, aka ATAP “colluding parallel investigations” (and here, as we see Rotary Club cyber-stalkers like Hamish Brown of Scotland Yard strategizing with ATAP to occlude Fusion Center spying and the WWWwiretaphere too).
Well, RIP, SOL PAIS, and know that you are not alone in being a victim of speech policing, gang stalking, taxpayer draining FBI CVE programs.

Baltimore Detective Sean Suitor: another gang stalking death by “suicide.”

I am about to take a sh!t in the face of the Baltimore police commissioner Gary Tuggle (sounds like snuggle, but with tugs) and take a p!ss on the thin blue line like a free-speech green beret, because writing about police gang stalking can get people killed, and worse….:

Related: FBI initially refused to investigate Detective Suitors death by gang stalking, because it would open thePandoras Box of Panopticon-related electronic surveillance data available to any investigator.

Gary-do you mind if I call you Gary?-you are either a mobbed up piece of shit,or, your investigation into the alleged suicide of Detective Sean Suitor is a fraud.
And I am calling on journalists,and personal injury attorneys to investigate the following via FOIAs,and other means, because this is what gang stalking IS,and how it often ENDS:
Baltimore police commissioner Gary Tuggles investigation into the organized gang stalking related death of Sean Suitor is flawed.

Heres why:
The suggested outcome of police and counter-intelligence perpetrated gang stalking is always one of three well known options, and outcomes, stated in thousands of Talkshoe podcasts,Youtube and Vimeo videos, and thousands of blogs online, that of themselves, form a “threat narrative”:
1-the targeted individual will be driven to madness or phony mental health lockups, as we see with NYPD whistle blower Adrian Schoolcraft, and Pennsylvanias Andy Ostrowski, who brought attention to judges, social workers, CPS,and police LITERALLY selling children in a scandal called Kid$ for Ca$h.

2-frame jobs,set-ups, and parallel constructions of cases and alleged crimes or other charges that lead to incarceration is frequently threatened by the hidden gang stalkers online, (as we saw with the targeted incarceration after stalking ofthe man who filmed the Eric Garner homicide)and also by the hidden internet operations of the United States Air Force Office of Special Investigations, aka “OSI Informers,”, which is a notorious gang stalking operation, included and validated as an actual government-military-police operation/co-operation in Wikipedia, and online in thousands of online postings, blogs,and other media, and not incoincidentally, the Open Systems Interconnection model (OSI model) provides a technical templatewhereby corrupt institutional actors can utilize Fusion Centers, cell phones,and even police squad car GPS and cell phone towers to triangulate and locate every single bad actor who was at, around, near, or far from Detective Sean Suitor in his final days.
Did you query THOSE databases, Gary?
Did you check Suitors online presence, and offline emails for signs of blackmail, or compromise, in the days, weeks, months before this event?
I mean~some of us got that sort of local pork/DHS/Fusion Center/FBI/NGO/community policing blackmail for DECADES.
It seems that, in Suitors case, gang stalking woul be very easy to prove,now that we know how whistleblowers are monitored.
Because if you did, you would have found the most basic evidence-that Suitors phone was AT ALL TIMES connected to the NSA and the Panopticon.
Here is an example of the multi-layered model from Wikipedia whereby these institutional bad actors-most notoriously the FBIs Cowardly Due Process and Constitution Subverting Infragard, who are the exact politicized, sectarians most cited online as actual organized gang stalkers-redirect/switch/re-route/and spy upon citizens “24/7”
1280px-OSI-model-Communication.svg.png
~Mr.Tuggles- did your investigation of Suitors death include data from the 77 Fusion Centers that would have showed you ALL of the devices and web applications connected to Suitors phones?
Or the criss-crossing data points that would show you who was stalking him- I mean-you assholes use cellphone tower dumps all the time to catch all kinds of small fish, and guys with dime bags of weed-so, who was near Suitor in these hours? Who were THEY talking to?
But,Gary, heres a butt-simple version of what Infragard spies, working from Fusion Centers, poluce departments, law offices and and others who abuse our communications do at the local level: they “manage”us in our many electronic“instances,”by“monitoring” of our lives, and incidents, of course.

OSI management,from Wikipedia:

Management functions, i.e. functions that permit to configure, instantiate, monitor, terminate the communications of two or more entities: there is a specific application-layer protocol, common management information protocol (CMIP) and its corresponding service, common management information service (CMIS), they need to interact with every layer in order to deal with their instances.

3- Obviously, suicide is the most frequently suggested outcome f nearly ALL OGS that targets whistle blowers,and others who encounter gang stalking, and obviously, this is Mr. Tuggles official conclusion, despite unprecedented closing down of an entire neighborhood shortly after Suitors death, and unprecedented disinformation campaign run as cover, that ACTUALLY claimed witnesses to a scurrilous suspect that likely NEVER EXISTED and if there was anyone there, they would have been a witness(which is likely why the neighborhood was closed down in the first place.)
So, to the reader, the journalist,the personal injury attorney, and others who are aware of Detective Sean Suitors case, have a look at how incomplete Mr. Tuggles investigation was, in an era where the FBI routinely, and daily flies airplanes above Baltimore, and uses Hyper-spectral, push-broom thermal imaging electronic equiptment that can LITERALLY make a 3D model of you taking a shit in “the privacy of” your house.
Sure~nothing to see.here folks, mive along now.
No electronics or harassment at all, most conspicuously not in Mr. Tuggles “investigation”into the organizedgang stalking of poluce corruption whistle blower Sean Suitors death by curious suicide, one day before he wasto testify about police, racketeering behind the badge.
MooooOOOOooove along now, little sheeple- and dont forget to wear your high heels.
Related Story: Detective Suitors wife rejects the suicide theory.
Like most investigations of police and counter-intelligence gang stalking,all of the new tools and toys that these dirty cops use on citizens to “cut the victims throat with Occams Razors”, can also be used to investigate “strange” police whistle blower “suicides.”
Or, can they?
Is Panopticon just a one way street, littered with those who still recall what a democracy is, and the civilvrights and due process that it stood for, before the NSA-Spying on citizens took hold?
Final Analysis: What is the US Department of Defense Four Layer model?US Department of Defense Four Layer Network model?

Lawrence“Larry” Guzzino, gang stalking on steroids, web scrubbing, and missing links

How real is organized gang stalking-and how actively do police, and propaganda elements seek to hide or discredit it as an actual practice, and an abuse of civil procedures and due process?
Just ask Larry Guzzino, whose story about being gang stalked by goons like these was featured in main stream news, just as the Department of Homeland Security began a full assault on due process in 2011, by utilizing gang stalking as a means of social control, as well as socially engineering citizens to accept due process-free “law enforcement,” which I like to call law enfarcement, because thats what DHS tactics are, according to their own playbook.

You see, the DHS (and every other alphabet agency) deliberately attempts to skirt the law, and use military resources to spy on citizens, much as we see in the cases of Dreyer, or the USAF OSI in general, and not get caught at it by using methods and tactical assaults in individuals that are plainly bizarre, as we see in the cases of Andy Ostrowski in the Kid$ for Ca$h state of Pennsylvania where one judge was caught literally selling 3000 children, as “the good guys and gals” looked on, or the cases of whistle blowers Adrian Schoolcraft, and former DHS Julia Davis, who LITERALLY was harassed with DOZENS of neverending investigations AND actual “black helicopters” too.
OGS is THAT bizarre.
I mean- ask Lawrence Guzzino about gang stalking-if you can find Guzzino, you can ask him about OGS, because he seems to have dissappeared after Lieutenant Larry Richards famously acknowledged in news reports that organized gang stalking “existed long before the internet.”
And, like the internet links that I use to prove the case that OGS is real here at ROGS, the validation is apparent not only in the known and documented police practices, but also, in the hidden, or occulted practices of policing.

Related Story: John McAfee, who invented the firstinternet security technology known as anti-virus software, claims he is being gang stalked, and has hired a team of security personell to prove it. Extra points if you notice the Simon Golstein wrote about it online,in FinanceMagnates

.
Here, have fun proving that “webscrubbing” is a real practice of police and intelligence agencies that subvert media, and that seek to hide their practices from “we, the people,” who are concerned that policing itself is the problem,rather than manufactured terrorism,or boogiemen. And, add that to your list of proof of gang stalking,too.
But here is a link that once linked to Guzzinos case,and which documented poluce “framing” in action, which has now been scrubbed from the web:
http://castroville.kionrightnow.com/news/news/506255-deputies-no-pipe-bomb-found-parolees-car
Maybe the avid reader can find that original news story, but for now,it has been scrubbed from the web,as many ofthe things I write about get scrubbed from the web, shortly after I write about them.

Related Stories: I,ROGS, have been followed around by nameable military contractors, and DHS affiliated scum, and named NGOs since 2004, since I wrote a few stories in a college newspaper that the AIPAC/DVIC/Zionist/neocons didnt like.
And, I have named names, and provided hard evidence that this is so, in this story here,where a military contractor from Black& Rossi followed me around Chicago, or this story here where a Lockheed Martin engineer gaveme a great scoop, which was then stolen from my Gmail account, or this story where an acridly fat blonde woman with a Cheshire cat smile and working in the DHS stalked me in a classroom.

The avid reader of ROGS will recall that Guzzinos case started because he is related to police, apparently on his (former?) wifes side.
And, the avid reader will also recall that in his case, the ROGS BINGO card is completely full on every corner and square- that the ROGS BINGO card sounds like a firetruck,blasting by your house at all hours,honking one of its many horns.
And now,we can see that,since I wrote this blog, contacted lawyers, and journalists, and a few people in Washington D.C., that one kind-of main stream writer has even mentioned “gang stalking” as an actual thingin real life,in the case of Libertarian-leaning crypto genius John McAfee, who INVENTED anti-virus.
so,regardless of anything, I present you, the reader with evidence that targeted propaganda, and targeted individuals are intertwined,as domestic agencies work to control the narrative of OGS,and.keep this practice hidden away, far from “the publics right to know.”
And,too, it might also explain why eBay billionaire Pierre Omidyars news outlet, TheIntercept.com has still not released ALL of the Snowden documents too, as lies of ommission are politically beneficial to those who profit from this form of social engineering.

Manufacturing terrorism suspects, fake web pages, and informants using lots of rope in darkness: modern lynching online and CVE programs

Whether the target is a Muslim, a Mormon cattle rancher, a black activist, or a poor white kid like William Atchison who get stalked online and then offline by agents provocateurs, aka DHS/FBI/DIA/private contractor/NGO/foreign spy outfit unspecified, informants, a few patterns stand out in the data:
UNDERCOVER FBI AGENTS SWARM THE INTERNET SEEKING CONTACT WITH “TERRORISTS”who they then profile via behavioral analysts, psycholigical operations, and then endlessly monitor their speech online and off, in concert with HUNDREDS of agencies, and using NSA data.
The FBI’s online activities are so pervasive that the bureau sometimes finds itself investigating its own people.

Almost all targets of provocation are male.
All targets of provocations are ensnared online, and followed, monitored and more offline for using words~aka pure first amendment protected speech~sometimes for decades since the NSA dumped hay all over needles in a theretofore previously non-existent “haystack.”
All targets of provocateurs have long term contact with people working under the counter-terrorism rubtrik, or so calked community policing, who seek to INFLUENCE the speaker, from hidden or occulted positions online and off (for instance, social workers, college, or DV type “counselors” target and track individuals, usi.g multiple databases, and share information about their targets with police)
All targets of these hidden programs are manipulated in “directed conversations”which is well documented in the online TI community,and this unrecorded anywhere.
All targets are manipulated, and frequently their most base impulses to food, clothing and shelter~indeed, their base drives, what Freud called libido~are used as tools to manipulate them, and much more, as we saw with the Tsaernev family being targeted for a decade BEFORE the Boston bombing, as well as in the cases of the Seattle Somalis employment and travel being stifled by federal agents, hearsay, and policy (not law.)
In any study of what is colloquially called mind control, and stemming from Nazi/US/British styled torture, or the well documented MKULTRA and its companions Monarch, Bluebird, Phoenix, Gladio-all of these used base drives as ways to manipulate subjects and targets.
And, all base drives, stationed a man, or a woman in the middle to impede or encourage the target toward one or another behavioral goal. So, any study of targeted individuals must account for ling term state/federal ibstruction of base drives, and achievements.
Related Story: Niftygerbil, Niftychinchilla, and other Nifty names for Tor nodes, courtesy of the same geniuses who gave the world Monarch and Bluebird.
So, we see now, the entire organized gang stalking dialectic mirrors the ACTUAL complaints of targeted individuals. Refer to the ROGS BINGO card at the top of this blog for comparison.
So, OGS is far from a delusional complaint, and rather,indicative of manufactured terrorisms un Constitutional basis, and the occulted use of informants whose work in online terror/criminal/other incitement is undocumented by design-a totally unchecked use of actual psychological operations-agents provocateurs actions are not on the record, or in courtroom documents either.
So, in the very least, these online influence and psyops using unchecked, unregulated, hidden, occulted and obscured methods, repeated over time, do indeed form, as the good doctor Lorraine Sheridan has noted~a closed echo chamber, echo chamber, where words themselves are the primary targets, as are the individuals who use the words- they are literally under close monitoring every time a banned word hits Google/Wordpress/Twitter, etc.
Here from NBC News is a story about how the FBI uses informants online and on social media in occulted fashion to police pure speech, and then, to target individuals:
https://www.nbcnews.com/storyline/isis-terror/no-lol-matter-fbi-trolls-social-media-would-be-jihadis-n226841s
And here is a bit more about that from the Intercepts Cora Courier in 2017: ghttps://theintercept.com/2017/01/31/undercover-fbi-agents-swarm-the-internet-seeking-contact-with-terrorists/
“”According to the guie, an online counterterrorism investigation can target websites or online networks that the FBI believes terrorists are using “to encourage and recruit members” or to spread propaganda. Such probes may extend to the administrators or creators of those forums, as well as people engaged in “the development of communications security practices” or “acting as ‘virtual couriers’ for terrorist organizations by passing online messages among members or leadership.”
The guide classes as online investigations those that rely primarily on online informants or undercover employees, and those that involve surveilling internet facilities or foreign websites hosted on U.S. servers. The FBI often runs such operations jointly with other U.S. intelligence agencies or “international partners,” according to the document.
Since 2008, the Counterterrorism Division has coordinated these operations under a program called the Net Talon National Initiative. Net Talon uses informants, linguists, and FBI employees working undercover, posing as ordinary internet users, to zero in on terrorists’ use of the internet, according to the guide. The initiative was meant to centralize expertise on particular targets and platforms, to “address intelligence gaps,” and to create a clearinghouse of the intelligence the bureau has collected on terrorists’ use of the internet.
The FBI’s online activities are apparently pervasive and uncoordinated enough to lead to confusion. The document refers to “resources being wasted by investigating or collecting on FBI online identities,” including undercover employees, informants, or people who have already been investigated by other offices or agencies. An FBI official told the Intercept, “You would be in a forum, and you’re like, ‘This person’s way out there,’ and we’ve gone and opened up a case, and sometimes that was a local police department, or a friendly foreign service. There are still instances of that, and deconfliction is still necessary.”
Khurrum Wahid and Joshua Dratel, defense attorneys for Ahmed Omar Abu Ali, answer questions from the media after Abu Ali was sentenced on March 29, 2006, at a federal court in Alexandria, Va. Photo: Alex Wong/Getty Images
THE COUNTERTERRORISM POLICY GUIDE shows just how much flexibility informants and undercover agents have when operating online, even when they’re not working specific targets. The FBI insists that there is nothing to see here: In statements provided to The Intercept, the FBI said that “while there are obvious differences between online and offline environments,” FBI employees and informants working on the internet are subject to the same rules, and that bureau employees can only monitor people’s online activity as part of an authorized investigation.
The guide, however, suggests that the internet offers areas of ambiguity. Much comes down to the questions of what informants can do, as opposed to FBI employees, and whether the goal of an operation should be construed as seeking to obtain specific intelligence, simply watching public websites, or developing a profile for an undercover identity.
For instance, the guide states that an FBI employee can visit a message forum or blog only when the site is relevant to an investigation. An FBI employee, according to the guide, could be an undercover agent or an “online covert employee,” a term that presumably refers to FBI workers other than agents, like analysts. FBI employees can’t chat online with someone who isn’t already the subject of an investigation for the purposes of gathering intelligence on that person. They can, however, “engage in unlimited communication with associates” of a person under investigation, if the conversations are relevant to the investigation.
Informants and undercover FBI employees are also allowed to do a great deal online in the name of “building bona fides,” such as creating fake identities or making themselves appear to be normal commenters on online fora. The guide says that in order to establish credibility, FBI employees “may make postings and communicate with individuals who are neither the subjects nor the associates of subjects … there is no limitation with respect to the amount of communication [they] may initiate in this regard.”
And the FBI is allowed to open new investigations on people it identifies through “passive monitoring or active communication” on websites.
An FBI spokesperson clarified that in order for an undercover or covert employee to monitor a website or forum, the site must already be associated with an investigation, “either because the forum was known to be used by a subject [of an investigation], or because the subjects are there. I can’t be in the forum trying to bait you into conversation.”
However, the FBI acknowledges that when its employees participate in online fora, they interact with people who may be bystanders to whatever activity led the bureau there in the first place. And that is not accidental. “We want to know if the subject has other people who are joining in, which people are part of the activity, and who is just there,” a spokesperson explained.
In other words, FBI agents can post and chat online with people who have nothing to do with an investigation, so long as they aren’t collecting intelligence — but in the course of those online communications, they can decide to start investigating someone.
Michael German, a former FBI agent who is now with the Brennan Center for Justice at New York University Law School, said that agents have always had a little bit of wiggle room in this regard. They can have a certain number of in-person meetings with someone, or in some circumstances go to public meetings or public websites, without identifying themselves as part of the FBI. This helps agents avoid a bureaucratic mess when carrying out a simple “buy and bust” drug sting, for example, German said.
But the ability to conduct unlimited online conversations in the name of building bona fides gives agents “a pretty long rope,” German said.
Criminal defense attorney Khurrum Wahid, who has handled or been an adviser on many national security cases, notes that FBI employees or informants frequently pose as experts offering guidance to lost individuals.
“These uninformed young people go online and become almost smitten with people who show a level of knowledge, who often turn out to be informants or undercovers,” said Wahid.
Informants operate under looser rules than FBI personnel. They are allowed unlimited engagement with a target in the course of an “assessment,” a preliminary investigation that can be opened on a loose tip of suspicious behavior, in order to collect general intelligence on a subject, or to evaluate a potential new informant. Assessments were created as a category in 2008. German finds their allowance for the expansive use of informants problematic.
“What we’ve seen in sting operations is that there is this shady portion before the official operation begins which often involves the informant,” said German. “And then it’s passed off to an agent, and it looks like they are ready to commit a crime pretty quickly.”
Wahid noted that at least in online cases, there are generally logs of all the conversations between suspect and informant, whereas “when it’s a live informant, they can turn off the recorder and we never know what it was all about.”
The use of informants in counterterrorism sting operations has expanded since the 9/11 attacks, when the FBI adopted the mantra that its job is to stop terror attacks before they occur, not just investigate them afterward. The government argues that the anonymity the internet affords to suspects necessitates an aggressive approach, including stings. The FBI’s national security director told the New York Times this summer that “using undercover agents online allowed the FBI to ‘flesh out’ suspects by gaining their trust and persuading them to disclose their real identities.” In some cases, the FBI even created fake webpages in order to draw in suspects.
“Agencies are under a lot of pressure to find a needle in a haystack, something that has haunted us since the beginning of the war on terror,” said Karen Greenberg, director of the Center on National Security at Fordham Law School. “It’s true that the internet has changed everything about how we communicate, but are we just going to be trawling online forever? It turns the principles of criminal investigation on their head.””

WA Fusion Center, limited hangouts, disinformatio, misinformation, mind control documents.

Mr X:
The WA state Fusion Center mind control docs are what is called a limited hangout in intelligence circles. The LH is designed to taint a dialogue, or misguide you, but in themselves reveal the cavalier attitude of these domestic spies.
The images widely circulated from raven1.net are among many that were used by one Eleanor White, a self described whistle blower.
She reigned as the go to disinformation specialist about a topic called gang stalking, between 2001- and 2011. White claimed that she was slandered as a pedophile everywhere she went, but in reality, was likely part of the pre-Fusion center deep state, a likely courier for illegally intercepted communications, and the defamation campaigs that followed.
These materials are used to discredit people who psychologists then label as delusional. But as we see, they also nearly and completely describe how the NSA trickles data to state and federal agencies, who then use Fusion Centers, so called community policing elements, and more to monitor activists and dissidents, via real time cell phone tracking, computers, ALPRs, BOLOs, and more, frequently utilizing plainly bizarre methods.
I also wish to inform you that I have been tracked since 2001, by many agencies across America, for many reasons not least of which is that [REDACTED] also wrote the Lewinsky defense, and represented Cheney during the Scooter Libby, Valerie Plame affair; And, a few other things.
I appreciate [REDACTED] FOIA release from the Fusion Center, but also wish to inform you that there are other questions to ask in these cases, because those documents are designed to discredit any who take them too seriously.
The good news is that the real questions that should be asked are easy, once you know where to look.
For instance~regardless of your political stance on gun control~ask about Fusion Centers monitoring activists, and people in alternative media, or even Facebook.
So, black activists, and mass shooters are a great place to start with mind control. Fusion Centers monitor these guys relentlessly, and mercilessly, via phone, computer, ALPRs, and BOLOs.
To understand the mind part, separate it from the control part, outside of due process, and constituting what could arguably be called unusual punishments.
Then, understand it like this: the FVEY nations
cooperate to target and harass each others activists. A great example is a boy named William Atchison, who shot two kids in a NM school, and who was killed by SWAT.
In his case, he was contacted online by British intel, who waged Gamergate across the globe, and also on American citizens, outside the law, and likely in violation of international treaties.
Then, they passed the “anonymous” tip to FBI, who then waged community policing on the boy.
FBI contacted the kid~who never owned a gun in his life~and then FBI CVE kicked in, meaning the kid was frequently followed online and off, by any of many domestic spy/intel/Rotary clubbers/VFW members/etc organizations attempting to “conform him” and these take on plainly bizarre online and offline stalking proportions.
Only after this, did the boy buy a gun, and this we see in case after case after case. Then, the boy goes ballistic, after being isolated and terrorized by literal hidden and actual armies of psychological operations specialists, for WORDS he expressed online.
So, in that one case alone, you can find evidence that what I say above is true, if you learn to ask the right questions.
How many calls went to which Fusion Centers, about What, When, and Why about this one boy, william Atchison. Were ALPRs reporting his license plate every time he drove, and were satellites literally tracking and recording his every move? Which police departments/school officers pinged his computer or cell phone~or did bad stuff like redirect his internet switch?
Did his computer have electronic implants, aka, coded applications that did/do as yet described things/wiretapped/ monitored and utilized key stroke logging?
Etc.
But taken as a whole, the boy was without a doubt, surrounded by influencers, and others who aided, coerced, and manipulated his choices from his first contact online with British intel, who flagged him during Gamergate.
First, they came for the kid online who said bad words (and those words decided by religious theocrats, and others)~then, they came for the mass shooter after they, working internationally, from sectarian religious basis, occulted pisitions along the internet backbone, and in violation of due process, civil rights, and treaties, bullied him mercillessly, via electronic platforms online, commmunity policing offline, and CVE provocateurs.
I hope this can help point you in the right direction.
I can be contacted here, if you wish more details.
Best Regards,
ROGS (my obvious nym)

Washington State, mind control documents, Fusion Center spying, police state bloggers, and GOD BLESS TECHDIRT.COM

DHS Fusion Center Gets Request For Documents On Extremists, Decides To Hand Over Mind Control Docs Instead
from the here’s-the-thing-you-didn’t-ask-for-but-will-probably-enjoy-reading dept

What  is  24-7 monitoring  of targeted  activists,  dissidents,  journalists, and  other  targeted individuals? Fusion Center  spying, the bizarre  quasi-Constitutional DHS/ICE/HSI  methods of secret policing, and the  NSA-Israel-FVEY data  theft  is de facto total  spectrum monitoring and  psycholigical  operations, aka mind  control,  by any  other name.

By  Tim  Cushing, of  Techdirt.com
Once you release a document to a public records requesters, it’s a public record, whether you meant to release it or not. The person handling FOIA requests for the Washington State Fusion Center (a DHS/local law enforcement collaboration known more for its failures than successes) sent Curtis Waltman something unexpected back in April. Waltman asked the Fusion Center for records pertaining to Antifa and white supremacy groups. He did get those records. But he also got something titled “EM effects on human body.zip.”
Instead of intel and assessments on local Antifa/white supremacists, Waltman found things like this:
And this:
The files did not appear to have been generated by any government agency, but rather collected from other sources who thought there might be some way the government could control minds using electronic stimulation or “remote brain mapping.” Why the Fusion Center had them on hand remains a mystery, as does their attachment to a FOIA request containing nothing about electronic mind manipulation.
This inadvertent disclosure has led to more requests for the same documents. Only this time, requesters — like Joshua Eaton of ThinkProgress — are asking specifically for government mind control files.
It appears the Fusion Center first thought about withholding some mind control docs, but somewhere along the line decided it couldn’t pretend the documents that weren’t supposed to be released hadn’t actually been released.
An email chain in the release [PDF] to Eaton contains an apology from the staffer who accidentally sent Waltman the mind control files.
Good afternoon Gretchen,
First of all I want to apologize the same way I apologize with my supervisor Lt Boyle and [redacted] I do not like to give excuses but I really sent this without intention when it was not responsive. I sent the original email to [redacted] with the attachments. I will try not make more mistakes…. Now, because of my error MuckRock sent another PDR. Sorry again for the situation and have great afternoon…
Gretchen (the Public Records Officer for the Washington State Police) tells the staffer not to worry about it. Apparently, sending the wrong files to requesters happens frequently, but otherwise, everyone is doing a great job, including the person who sent mind control files with a batch of extremist docs.
But that apology and forgiveness is preceded by the same staffer asking for another review of documents she already released to another requester, possibly in hopes of denying this release.
Erik,
[redacted] told me if you could review this. Mudrock is claiming that DHS did created this. I think I was not supposed to release this but it was public.
Can you help me what can I tell my Public Disclosure coordinator?
Sorry for the inconvenience
No response from Erik is included in the document so one assumes the release went ahead without his additional input. Now this requester has a copy of this email chain, something pulled from an internet “mind control forum,” and, inexplicably, the KKK documents released to Waltman in response to his FOIA request.
So, if you’re looking to obtain public records but don’t particularly care what records you receive, it appears the Washington State Fusion Center is a great place to try your luck.

Electronic implants, Wikileaks Vault 8, victims of organized gang stalking, hive mind, and honeypits.

ROGS loves the Constitutional guarantees of due process, and ROGS loves America. I am pathetic that way~the grand American delusion is so appealing.
(Vault 8 is an inside joke.)
BUT: The DVIC is actually a war on speakers and words, and without a doubt, the first amendment itself is the target of neocon and tribal, religious interests, now interfacing with the massive influx of Saudi, and other nations cash flows, and the media narrative.
I have been gang stalked since the DVIC was birthed into our lives in 1993 ( the exact same year when the Anti Defamation League was outed as a domestic spy ring that sold out American activists) and became severely gang stalked after I broke a nation wide story in 2003-4 about how America’s agencies manufacture terrorists by occluding access to civil rights and due process.
To journalists, researchers, and others interested in answering the many questions that are presented in the “bizarre” online dialectic of gang stalking, here below is how the CIA (and every other IC agency, private contractor, and the FBI) uses the term “electronic implants,” which describes covert hacking techniques, and plausible deniability in exploitation of targeted computers, targeted computer networks, and targeted individuals.
Without a single doubt, this is empirical evidence of CIA/other IC/NGOs operations on US soil, and anywhere else where OGS is taking place.
And it single handedly validates the inherent mission creep of the WOT redirecting and exploiting domestic targets.

UPDATE 10-19-2019: Almost two years after I wrote this post, and became active online, the ADL implicated itself as actually deploying military psychological operations on target individuals, using artificial intelligence software called Moonshot CVE, which had previously been used in theaters of war; and, perpetuating negative stereotypes of Jewish people as mind controlling Svengalis.

1570435771780
Electronic implants and gang stalking, courtesy of Wikileaks, and Julian Assange, who is literally being isolated, and denied visitation from other people as I write this. And, the American/FVEY deep state has worked tirelessly to force Ecaudor to revoke his asylum.
Isolation, you will recall, is ALSO a major threat/complaint/”delusion” of targeted individuals.


RELATED STORY
:I wrote about the HIVE in coded language long before this story below became mainstream news. The reader can infer that writing openly about such things is dangerous, and also, ROGS personal writing style is somewhat coded for reasons I have explained elsewhere.

The Hive mind in the gang stalkung dialectic online, from Wikileaks.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.
…………..
And-I hope the dood doctors like David V. James, and Lorraine Sheridan-and certainly Dr. Mike Wood, dont get to caught up in the echo chamber as wasps and bees of all kinds swarm them for commentary in these matters.
But OGS is very real, and puts MHCHAOS and MKULTRA to shame.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

The un-naming of a man: Gang stalking, bizarre claims, chemicals, poisons, delusions, and the DHS- man dies, first responders sickened from chemical poisoning in DeKalb County Georgia GA motel room.

As  we  see  time  and  time  again, gang  stalking victims frequently  report bizarre encounters with people  online  and  off  who  threaten  them  with poisons,  chemicals,  and  fear  or  anxiety about being  murdered by  gang  stalkers.

UPDATE 11-07-2019:This post you are reading is very popular lately, after James Douglass Lark apparently blew himself up last week , while under FBI and GBI surveillance in Dekalb County Georgia, under mysterious -even bizarre circumstances.
ROGS suspects that this was a K 4 rated gang stalking gone bad (or good, considering that the goal of police /FBI/ intel agency stalking is to force a person into an institution, prison, or to commit suicide, which is what Lark apparently did, for some reason )
UPDATE: The un-named man has now been named.He was Frances Wilkes, 47, of Stone Mountain Georgia.
BODY IDENTIFIED IN HOTEL ROOM THAT SICKENED THREE DEKALB OFFICERS
The cause of death for Frances Wilkes has not been released.

Related  Story: Yeah- silence THIS: how internet forum boards are attacked by gang stalking denialists, and not  so subtle  threats of  being  poisoned. This is one  example  from  my  own,  PERSONALIZED,  targeted  experience online.
Here  is  a  case  where  actual  intelligence  agents, from  the  US border  patrol  and the  DHS are  alleged to  utilize bizarre  psychological  and  other  harassment  on  a  whistle  blower, including  mystery  poisoning:  Delusions, poison, bizarre claims, and schizophrenic narrative in gang stalking: the case of DHS whistle blower Julia Davis
And,  the  Russians,  of course, are  suspected  of  poisoning  dissenters and detractors in  Britain, which  is  widely  documented  all  over  the  MSM.
And  the  Las  Vegas  shooter Stephen  Paddock was  said to be so delusional, that  he  kept  a  gas mask  handy, with  fears of being   poisoned.
SO:
How  bizarre is  modern gray  area,  due process-free  policing  that utilizes  intelligence  operations on  ordinary  Joe Blows who  said  something online,  and  then,  were stalked,  harassed, framed,  and  worse by  operatives  who  sit  on  the  internet  backbone  in  Toronto  Canada,  or  San  Diego,  CA?
Or  at Los  Angeles  JRIC which uses miltary grade surveillance gear to target people they do not like, , or  who  are  affiliated  with  Princess Megumi,  from  the Masonic  Capital  of California, whose  relative  just  happens  to  be the  deputy  sherrif  in  those  parts? Bacon  bits,  and  blowflies-or  flying  pig-cow  hybrids  in  fishnet  stalkings  and high heels?
I ask  you, the  reader, to decide  how  bizarre claims  of  poison  are  in  the “delusional  complaint” or  organized  stalkung.
Yeah-  organized  gang  stalking  is THAT  BIZARRE.
ROGS  wonders:  who  will  help  me  keep  an  eye  on  this  story,  below?
Get  out the  ROGS  BINGO  card  before  you  file  FOIAs  in  this  case,  and especially, dig for  records  about the  dead  mans  past-  see  if kangaroo courts, mental  health,  unproven lopsided  claims  of domestic  violence,  and more were there. Because  it  is  possible  you  will  find that  soeone, soewhere,  didn’t  like  what  he  said online  or  off. Also notice that it was a workplace conflict related situation
Something  just  ain’t  right  about High  Heeled,   DVIC  policing,  as  these para-military,  quasi-judicial,  extra judicial  suicides,  homicides-and  poisonings  are  taking  place ALL  ACROSS  THE  WESTERN  WORLD, now.
SO,  here  is  the case where  an “un named man” died  in a  motel  room, from  what  federal  agents  and  the Department of Homeland  Security claim were household  cleaning  agents.
__________
Federal agents investigating hazmat situation that sent officers to hospital
By: Wendy Halloran , Rikki Klaus
Updated: May 13, 2018 – 11:31 AM
Federal agents investigating….
DEKALB COUNTY, Ga. – Federal agents are investigating after police found a man dead inside a DeKalb County motel, and then a chemical odor sent officers to the hospital.
Channel 2’s Wendy Halloran said agents with the FBI and the Department of Homeland Security were investigating inside the room late Saturday night.
“We have a dead body in the room and we can’t make any determination on cause of death until they have cleared the scene,” Shiera Campbell, with the DeKalb County Police Department, said.
All police had determined was there was body a man inside a room on the third floor of the United Inn on Memorial Driver in Decatur.
Guests told Halloran that they were stunned when they were told they needed to evacuate their rooms.
“We were all in the sun standing out for a long time when I did find out what was going on. It was kind of sad,” a hotel guest, who only identified himself as Bryan, told Halloran.
Once inside the room, three DeKalb County police officers knew something was very wrong.
“The officers were feeling a little bit dizzy, weren’t feeling too much like themselves, so they quickly came out of the room,” Capt. Eric Jackson with Dekalb County Fire and Rescue said.
The strong chemical smell sent three officers to the hospital. Firefighters then put on hazmat suits and went inside.
“Based on the samples we took we are going to try to attempt to identify whatever that source was,” Jackson told Halloran.
Hour after hour went by Saturday as forensic investigators waited to see if they could go inside to process the scene and the medical examiner remove the body.
Motel guests waited and watched. Some had to move to other rooms.
Hazmat trucks pulled in late in the night, with all signs pointing to something potentially deadly inside that motel room.
It is still unclear what was inside the room.
Police said late Saturday night the body was that of a 48-year-old man.
………..follow  the  links-  connect  the  dots!
_____________
While many  over the  counter chemicals such  as  bleach,  and  ammonia, and  sulphuric  acid  and  more can  be  freely  purchased from  hardware  stores  and big  box  retailers such as Walmart, they  can  also  be  used  to make  dangerous  chemical  weapons.
Was this a case where hidden policing, and possibly, vigilantes or provocateurs tried to force a bombers hand, or otherwise wage attrition for something the un-named man said online? ROGS asks you, the journalist or researcher of organized gang stalking to decide.
But also, decide WITH EVIDENCE and data that you can access by learning to ask the RIGHT QUESTIINS in these odd, bizarre cases, and to adopt the ROGS framework analysis of the claims inherent in these plainbizarre gang stalking events.
We  know  with  empirical  evidence  that the  alphabet  agencies work with local  law  enforcement and  community  mobs to  wage  hidden and highly personalized war,  psychological  war,  that  frequently  ends  in  suicides,  homcides  and mass shootings, and  that  they  wage  these  outside  of  judicial  oversight,  on  targeted  individuals.
We  in case  after  case  of  case  that  these  political, malicious prosecutions primarily target  speech,  and  speakers,  and, that  online  speech bis .targeted  offline.
And,  we see  the  bizarre  claims  of  threats  of  poisoning,  actual  poisoning,  and rarely~EXTREMELY  RARELY~delusional  people  who  fear  pousoning  by  “imaginary”people  they  “”imagine.
MORE LINKS  TO POISON  IN  THE EMERGENT ONLINE DELUSIONAL  GANG STALKING  DIALECTIC:
A credible analysis by a credible researcher of organized gang stalking:
https://medawarscornflakes.blogspot.com/2009/12/toxic-materials-in-stalking.html
And, those OTHER, likely actual gang stalkers, whose comment section was always filled with Lions Club members from OHIO, TEXAS, USAF affiliates, academics who are well known stalkers, and a few retired police (and someone who lived on Duckwood Drive in Eagan MN,in 2013):
https://neverending1.wordpress.com/2010/11/19/gang-stalking-the-gang-stalkers/
And, one for you, the researcher of organized stalking to figure out for yourself-especially if you are a federal agent, or another “good guy or gal” who wants to STOP gang stalking, as we see that it frequently leads to mysterious deaths:
https://perthsgangstalking.wordpress.com/2017/01/12/posions-and-toxins/

Gang stalking BINGO: targeted individual, targeted real estate, targeted electronics, targeted childROGS ren…….

Let  me  know  if,  and  when  you  start  seeing  patterns in  the  data  of  organized  gang  stalking……because  the  Experts  all  agree that  an  obsession  with patterns  can  indicate delusions, and  maybe  even  schizophrenia!
But  there are,  in  fact, links  between  organized  gang stalking and  real  estate, organized  stalking  and kangaroo  DVIC  courts, links between Gang stalking and Electronic implants: (Here is how the NSA uses electronic implants.) and electronic  implants that  monitor  our  computer  activity, sometimes  for  YEARS.

Related  Story: How secret  policing tactical  assaults  can  induce  delusion-like  symptoms in  politically  targeted  individuals,  as  those  targeted  try to  find  words  for  un-Constitutional  government conduct:
Gang stalking and delusions and paranoid complaints: what is Level X thinking and cognitive bias in psychologists/psychology? 
OGS victims obsession  with  patterns can  indicate  delusions to  therapists  and psychologists  on  the  state  teats!

But  here  below is a  case study  in  organized  gang  stalking  that  is  full  of  the  EXACT  patterns that  I  describe here  at  ROGS.  Organized  gang  stalking  IS  what  I  say  it is!
So…BINGO: Lets Play ROGS BINGO, in  the  case  of  the  targeted  activist!
Black  activist jailed  for  Facebook  posts speaks out about secret FBI surveillance that  went  on for  YEARS.
Exclusive: Rakem Balogun spoke out against police brutality. Now he is believed to be the first prosecuted under a secretive US effort to track so-called ‘black identity extremists’
…….. The father of three said he was shocked to later learn that agents investigating “domestic terrorism” had been monitoring him for years and were arresting him that day in part because of his Facebook posts criticizing police.
“It’s tyranny at its finest,” said Balogun, 34. “I have not been doing anything illegal for them to have surveillance on me. I have not hurt anyone or threatened anyone.”
Balogun spoke to the Guardian this week in his first interview since he was released from prison after five months locked up and denied bail while US attorneys tried and failed to prosecute him, accusing him of being a threat to law enforcement and an illegal gun owner.
Balogun, who lost his home and more while incarcerated, is believed to be the first person targeted and prosecuted under a secretive US surveillance effort to track so-called “black identity extremists”.
In a leaked August 2017 report from the FBI’s Domestic Terrorism Analysis Unit, officials claimed that there had been a “resurgence in ideologically motivated, violent criminal activity” stemming from African Americans’ “perceptions of police brutality”.
The counter-terrorism assessment provided minimal data or evidence of threats against police, but discussed a few isolated incidents, notably the case of Micah Johnson who killed five officers in Texas.
The report sparked backlash from civil rights groups and some Democrats, who feared the government would use the broad designation to prosecute activists and groups like Black Lives Matter.
Balogun, who was working full-time for an IT company when he was arrested, has long been an activist, co-founding Guerrilla Mainframe and the Huey P Newton Gun Club, two groups fighting police brutality and advocating for the rights of black gun owners. Some of the work included coordinating meals for the homeless, youth picnics and self-defense classes – but that’s not what interested the FBI.
A march in the wake of the deaths of Alton Sterling and Philando Castile at police hands.
Investigators began monitoring Balogun, whose legal name is Christopher Daniels, after he participated in an Austin, Texas, rally in March 2015 protesting against law enforcement, special agent Aaron Keighley testified in court….follow  the  links  above….connect  the organized  gang  stalking  dots! Because  nearly  ALL  mass shooters  endure YEARS  of these  tactics by hidden  policing,  aka  “High  Policing,  aka Americas secret  police.”

Read through ROGS to note that I indict some of the same suspects that Sharyll Atkisson's lawsuit did: Hillary Clinton, Al Franken, lawsuit, Department of Justice Department of Justice, FISA, Fisc, Obstruction of due process, America's Political Police

Could federal watchdog tamper with Trump wiretap evidence? It may not be a first- The Hill

Could federal watchdog tamper with Trump wiretap evidence? It may not be a first
© Greg Nash

Everyone hopes the Department of Justice’s inspector general (IG) will fairly investigate surveillance activities conducted on U.S. citizens by the FBI and intel agencies. Just like we hope the IG’s office will reach fair conclusions in its probes of alleged FBI misconduct concerning the Hillary Clinton investigation, leaks to the media and conflicts of interest.

But, for me, there’s reason to be wary.

I turned to the IG’s office in 2013 after independent forensics proved my computers had been infiltrated by remote intruders using software proprietary to a federal intel agency. Instead of fair findings, I got a lot of mischief and stonewalling.

And wait until you hear what I recently learned.

By way of background, in 2013, I filed a complaint with the IG’s office asking it to investigate the government-based computer surveillance. CBS News — where I worked at the time — would not allow the IG to examine my CBS laptop, which had been infiltrated (as CBS publicly announced on Aug. 7, 2013). But I asked the IG to examine one of my personal home computers that was also compromised.

Some of my intel sources didn’t want me to hand over any computer. “You can’t trust the inspector general,” they told me.

But I figured there was little downside. We already had our irrefutable forensics findings from our examinations. If the IG probe was competent and honest, as I expected it might be, then it could turn up names of the government actors responsible. If not, no harm done.

I don’t blame the IG computer investigators for what ultimately went wrong. They got briefed up on Apple forensics for their inspection of my computer, visited my house on numerous occasions, communicated freely, shared findings along the way and seemed to earnestly do a thorough job.

But as the investigation neared a conclusion, things changed.

On their last visit to my house, they wanted to be sure to segregate the malicious activity they identified from any work I might have done on the computer. They told me someone operated the computer in advanced mode, something I don’t know how to do. They found that — like the CBS laptop — the intruders had repeatedly altered the computer’s internal system times and dates. And they discovered that — like the CBS laptop — key files had been destroyed. (We already knew these things and more from our own exams.) We went through pages of their notes together. I asked for copies.

“You can get those later,” the lead investigator assured me. “When the investigation is finished.”

If there’s one thing I’ve learned, it’s that you can’t count on getting something from the government tomorrow. I made contemporaneous notes of the visit and findings.

The weirdest part of the visit was that, for the first time, the IG investigators began insisting the intruders weren’t working remotely but were in my house, sitting at my computer, doing these things. They had dates and times. I told them that was impossible; nobody was sitting at my computer upstairs in my home for hours while my husband was home on those days, at those times. Besides, we already knew from our own forensics that the intruders had operated remotely. My forensics team said the IG experts were not fully competent on their Apple work and, for some reason, seemed to be misreading the remote intrusions as local intrusions. Still, if nothing else, the IG work provided additional confirmation of some of our more basic forensics. No harm done.

Not long after that, my communications with the IG’s office changed. They notified me that their investigation had been “narrowed,” from looking into an illegal intrusion to determining only if there had been a remote intrusion. Nobody would explain to me who narrowed the scope of the probe or why. You’d think they’d be interested in any intrusion, remote or otherwise. Why the distinction?

In the next few weeks, when I learned the IG had finished its investigation into my Apple computer, I asked for my copy of the report. The investigators told me they’d been ordered to send it to the office of IG general counsel Bill Blier for approval.

Over the coming weeks, I repeatedly asked for the findings but was told it was still in the IG general counsel’s office. I formally requested that the general counsel release a copy to me. No luck.

One investigator had told me I could always file a Freedom of Information Act request to obtain my report and notes. I did so; under the law, a response was due within about 30 days. It’s been years.

When the DOJ’s inspector general won’t follow the law, to where can a citizen turn?

Meantime, under pressure from Congress, the IG eventually released what my attorney refers to as a “wiped” summary — not the actual report or notes — with spin that implied there had been no intrusion. This was quickly presented, publicly, by then-Sen. Al Franken (D-Minn.), who had gotten a copy of the summary with lightning speed; and it was dutifully reported by some in an unquestioning press.

The IG’s obfuscation and stonewalling doesn’t adversely impact my lawsuit against the federal government for the computer intrusions. The case is progressing through court with evidence from multiple forensics exams.

As our lawsuit continues, so do our forensics. New computer investigative tools have become available, and grains of evidence have been solidified into forensic mountains. Our evidence involves multiple computers and government I.P. addresses discovered improperly residing in them.

That brings us to the news.

Not long ago, my forensics team asked if I used that Apple computer after the IG returned it. My team was conducting a new exam. “No,” I replied, “it hasn’t functioned since before I gave it to the IG. I just stored it when they returned it. Why?”

“Because — that’s not your hard drive inside the computer they gave back to you,” they told me. “… We know the serial number on the hard drive when you bought it. We recorded the same serial number on our earlier forensics exams. This is a different hard drive. Completely different serial number. Not even close.”

I would never have known if we hadn’t gone back in that computer for additional forensics.

In addition to somebody changing the scope of the IG investigation midstream, and the office withholding from me the notes and the report on my own complaint, somebody also switched out my hard drive before the IG returned it to me.

What does all this mean to the integrity of the DOJ’s inspector general?

You decide.

Sharyl Attkisson is an Emmy Award-winning investigative journalist, author of The New York Times bestsellers “The Smear” and “Stonewalled,” and host of Sinclair’s Sunday TV program “Full Measure.” Follow her on Twitter @SharylAttkisson.

Sex workers, FiveEyes-DHS-ICE-HSI investigations, asset forfeiture, and fakerape: gang stalking and real estate links.

Anyone who scratches the surface of the OGS dialectic soon discovers that sex workers are frequent targets of stalking, especially women and men who work “independently” away from all the captain save-a-hoes and the various DVIC prostitution profiteers and NGO’s.
But less obvious is that frequently, they are inter-generational targets of all kinds of abuse beyond sexuality: sex workers are a “ca$h cow” for social services and the DVIC, as well as police and psychology. And that, inter-generationally. It is a situation that hasn’t changed in the history of the word, because prostitution is the world’s second oldest profession, just after those who claim to be policing it by peeking through the bushes.
So, as we see that there are also connections between militant lesbianism, state level pimping, and the gender feminist sex wars of the 1980’s, updated to include high heels policing, we see today how “far” these have gone to “own the machinery” of power. Beyond the obvious flaws in their narratology, that of swapping one group of financiers an “patriachs” for another- is the fact that pimping BY women OF women is more frequent these days.
So, let’s explore an actual case scenario drawn directly from life, and directly from the OGS online dialectic. I will not point to my source, but suffice to say that I have documentation ranging from police reports to witness testimony to ICE records of deportations.
Save the women! AND pimp the female sex offenders!
Politics and pimping make strange bedfellows as we see in the current Palestinian styled whisper campaign where western Holy Warriors working from within the DVIC framework run narratives and scripts about saving women from “abuse” as if women have no accountability, or agency in their own lives. The “hidden hand” of “occult activity” aka “culture wars financed by George Soros, et al” is all over these whisper networks, and I suspect, a direct product of “foreign mystery money” that flowed in to our politics after 1993, at the height of the lesbian sex wars where women sough control of other women, pornography, and sex.
And as we see in case after case of OGS where real estate is involved, we also see the hidden  activity of NGO’s and other “morality pimps”who derive their sustenance from federally incentivized crisis PR campaigns. And, the fingerprints of pseudo-feminism are all over organized gang stalking, ranging from the political alliances and allegiances of the “two studies ever on gang stalking” to the online “four horsemen of pseudo-feminism” and the language of those who participate on blogs, to SESTA, and much more. .
So, here is an actual example, drawn from several online stories of how this works in practice:

  1. a political constituent is targeted as an influencer by the hidden FiveEyes/ DHS/local bureau hidden activity and the  apparatus of online speech control (Tom Schweic, a Missouri politician who committed suicide is likely an example of this but there are many more).
  2. the constituent is blackmailed, compromise operations are waged, and a smear campaign begins
  3. ICE targets that persons property and real estate in a hidden investigation as local enforcers selectively enforce codes and ordinances
  4. the HSI pre-crime property assessor shows up in the yard
  5. Rental properties are raided, selectively, tenants are deported
  6. the landlord becomes aware that their rental applicants change from ordinary working people and college students into a steady stream of prostitutes, shady drug dealer types, ethnic/racial activists from NGO’s and local “cliques and mobs” of people
  7. of the candidate pool, the landlord leases to a female sex offender.
  8. other tenants on the property are then suddenly accused of sexual harassment, and attempted rape (as we see today, this has become the norm, not the exception in politics and media-and that litigated in the gray area of public opinion, rather than law).
  9. other tenants sign leases and break them in days, or move in a minimal amount of personal property-just enough to constitute legal tenancy, and enough to get the keys to the property.
  10. security camera’s become targets of destruction, the surrounding neighborhood becomes a battle ground of hidden covert activity, constant break ins and other odd happenings, sometimes with squad cars right up the block.
  11. much more. Here is a site that chronicles this activity, above,  and I suspect the author is themselves a covert, but also possibly an actual TI as they live in a Catholic and Protestant cult saturated area of the world.

 
All of this above will also be accompanied by the usual GS activity ranging from internet and communications manipulations/hacking/disruptions; and every city vehicle ranging from the dog catcher to firetrucks; and bright lights shining through windows and most other features that are well discussed online, and more(how bizarre can you get? This is how bizarre these campaigns are.)
So, as we see, in the research of the extant blogs, there is a connection between sex offenders, sex workers, NGO’s, the FiveEyes, NSA data capture ans backbone activity, and the police practices in some areas of the country that are heavily reliant on federal funding. Fusion Centers, colleges, local police departments, and more will be involved.
And we see time and time again, a connection to “gray area policing,” local syndicates, and a new form of red-lining, where certain state and local actors control the cell block by using heinous, constitutionally cringe-worthy practices.
And, all of that, under color of law, and subversion of internet. There are many cases online where this can be verified if the researcher merely Google’s “real estate and gang stalking.” One case I am currently monitoring has all of these features and more-including claims of directed energy weapons, which I will not discuss, other than to say that it is a feature in that case.
But there are indeed links between organized gang stalking and lesbian feminist sex wars and prostitution, which are under-explored, and until now, hidden away “in darkness,” as they like to say. And, most of THAT begins in academia, via academic stalking, which is a separate blog entirely. And as usual, don’t take my word for it-I’m just the “potentially”dangerous crazy guy on the internet.
Do your own homework, test and retest until the cows come home (which they never will again, now that we are a socialist nation in high heels), because ROGS claims are for the most art, empirical. And, I can name names too.
UPDATE, 03/12/2020:
I wrote this post a couple years ago, and as you might have guessed, the landlord in this case was me, lol.
And recently, while revisiting my evidence, I discovered that one of the tenants mentioned above has now died. Of suicide.
In that case, the tenant was a guy named Jonathan Grey, who was one of those move in/move out lease breakers that I mentioned.He claimed he found a,single cockroach in the home, but never presented it to me.
In that case, he was also a Team USA Minnesota runner, and the nasty gang stalking cunt who threatened me if I didnt let him break his lease–and she threatened me in writing–has a name: Patricia Goodman, the founder of Team USA Minnesota, which has now been renamed, and transferred out of her ownership.
Goodman had threatened to have city agencies declare my property a “sickhouse” akin to a house that had an epidemic in it. I told her I would see her in court, and later, that I would sue her for malicious conduct, AFTER I kicked her ass in court. I never got the chance, but I will publish our letter exchange at a later date.
Here is more on Jonathan Greys suicide.

And here is Patricia Goodwin, an actual gang stalker

And here is her email, feel free to repost it.
[email protected]
 

The new red-lining? Gang stalking, 24/7 harassment complaints, mainstream news, and real estate links

Group stalking, multi-stalking, organized gang stalking and 24/7 harassment complaints: “The victims of the gang stalking have tried seeking relief through police reports and civil complaints that have gone to court, but nothing has changed. My friends have had their house up for sale for over a year because they feel it is the only way to escape the daily staring and leering and name calling that they hear as soon as they step out onto their own deck. New Jersey Herald

Real estate red lining is illegal. Realtors, communities, and independent home sellers cannot discriminate in the sale or rental of property.
However, as we see time and time again, local real estate “syndicates” controlled by elements from within policing can and do exactly that all across America. These collusions are also known as “community policing” volunteers, aka “Red Squads” which are well documented in the historical records, and a practice of the current DHS schemes too. And, at the center of every transaction is a lender, who is the shot caller in these local-to-international mobs (Hi Kevin!).
So- ROGS asks: do banks and lenders show discriminatory preferences for police and fire and state unionists-and their relatives?

Related Story: Have police and fire pension funds turned into racketeering-or worse? Dallas Police and Fire Pension brouhaha asks: How enmeshed are these plans and schemes anyways? RICO seems so long ago! After all- there are so  many “little people” who can be exploited in the modern Kafkaesque drama’s playing out all over America as these elements work to “frame” every discussion to hide insight into “public dealings” that aren’t necessarily “in the PUBLIC’s interests.

Here is a case where again, we see a clear link between real estate and gang stalking, as documented in the New Jersey Herald in 2013.

‘Gang stalking’ threatens lake community family

Posted: Jul. 20, 2013 9:52 pm Updated: Jul. 26, 2013 1:00 am
By: Donna Weatherwalks [click the link for he whole story!]

I live at a lovely lake community where many wonderful people live. However, amid all of the wonderful people is a group of at least eight misguided and sadistic people who have chosen to “gang stalk” two of their other neighbors on the block.
Gang stalking is a known phenomenon which can be difficult to believe and even harder to prove. It involves a group of people who band together for the purpose of targeting another individual or individuals in order to control aspects of their targets’ (victims’) lives and to monitor them 24/7.
I have been witnessing this happening to my friends since June 1, but they have been experiencing the daily stalking since 2011. The victims of the gang stalking have tried seeking relief through police reports and civil complaints that have gone to court, but nothing has changed. My friends have had their house up for sale for over a year because they feel it is the only way to escape the daily staring and leering and name calling that they hear as soon as they step out onto their own deck.
The gang has even gone so far as to call the police to make a false report against my friends in an attempt to get them into trouble. We wonder what they will do next.
Because the gang’s behaviors are not “criminal acts,” the police are limited as to what they can do, and the matter is complicated by the fact that the foremost member of the gang has a family connection with the local police department.

 

And keep in mind that New Jersey is already documented in the record participating in gang stalking-and that Goggle returns 613,000 results for gang stalking and New Jersey, but also that Rotary clubs and other insider (in-groups) are implicated by some in everything from active shooter training that takes place curiously close to actual mass shooter events to crisis PR dilemmas where they ask “is it ok to have arrows on our logo?” and other events that seeks to diminish the second amendment’s protections.
As some/you might have noticed: a movement is afoot to force the Constitution from our hands, through slanted story telling, and “the hidden hand*” of religious doctrines guiding our speech rights. We have the “deep state” with it’s hand in former FBI director James Comey’s ass, puppeting Reinhold Niebuhr, and everywhere you look in the dialectic of OGS you see this other “hidden hand,”which has long been the sign of “Masonic” orders.
Here- just so that you know how non-sectarian free masonry is, look here at the Beatles:

And then look at this controlled asset, Ted Cruz-and I can’t help but wonder whose hand is in his ^ss, or how he is being leveraged into the insanity that is his platform:

But don’t waste too much time over-thinking it, because what matters is that they are all in it one way or another, sticking their cultish Abrahamic/Masonic crap up your arse as if you are a puppet. Then shout out to the moron who designed this page here from the FBI countering violent extemism program (CVE), and the bloody irony of how that thing works in practice-like a hidden hand in your internet switch, on your cell phone, and “around every corner.”

Related Story: Where did 24/7 surveillance of American’s begin? How did the NSA-Israel data theft pipeline happen? When did modern slavery by another name, aka the MIC/DVIC/PIC control of narrative begin? Ask Leo Lewis, Hollywood financed domestic spy.

So: when did the hidden hand take over real estate in America?
They pop up ALL OVER the DVIC money pot starting in 1993, building to a pet cause of “Stalking the Stalkers” in lop-sided domestic violence scenarios that have sought for forty years to throw America into the religious and arch-conservative theocratic paradigms of gendered narrative. As I have said repeatedly, if you scratch the surface of most gang stalking complaints, you will find “secret society” involvement. Lion’s and Tiger’s and Rotary– Oh My!
And the weaponized Boys and Girls Clubs, and the many headed hydra headed AIPAC affiliates and the hydra’s of NGO’s  are all monetized by mystery money and junkets overseas where backdoor deals take place to sell our democracy and erase due process AND the Constitution on the cheap.
With lots of help from behind the curtains of Oz and Fusion Centers, using “high policing”  of course, which are the de facto ground zero for plotting these domestic operations and social engineering, where domestic para-militaries under DHS contracts work with foreign spy rings,  work with blackmailers and gang stalkers in every American community-as these vertically integrated, internecine campaigns of domestic terror are waged on individuals from “outgroups” by the well heeled in-groups; the nexus and gathering point where all modern discrimination takes place.
But gang stalking is real, Dorothy-Look! It’s says so in a newspaper! And we’re not in Oz anymore-we’re in Slipperyslopeville, which is right next to Greater Tel Aviv, and it looks like the ground is shaking under the weight of all that laundered capital that finances the DVIC.
But that could also be my apophenia kicking in too, as my bicameral mind is probably in a classic conflict with Sigmund Freud’s D.E. Cameron Syndrome and under the influence of the polarized Gregory Batesonesque MSM, and exacerbated by psychology’s little “official source gas-lighting” problem.
And worse! For some reason, in bouts of deep apophenia, I obsess over the fact that John Nash’s biographer- the author of “A Beautiful Mind”-was also the daughter of a CIA case officer….yeah, I know: I’m the crazy guy on the internet; just one “potentially dangerous” voice from a tribe of troubled minds who are starting to see the links between real estate and organized gang stalking.
And, a few other things, too, like how “high policing” is what police corruption IS nearly by definition.