Politics, paranoia, reporters, and stalking: The curious case of the Esquire magazine reporter being stalked by “farmers ” in white SUVs

Well, I am not winning any (tribal -sectarian )brownie points with Mike Masnick of Techdirt.com these days, who seems to feel (without evidence ) that much of my online performance art is based in non-tribal-sectarian actual conspiracies, because I practice non -biased blogging, and you can view that here,(and here, and here, too ) as I document the Anti Defamation League using Moonshot CVE to target the minds and opinions of those it chooses to “other.”
So, because that media format -TD -is one of the most speech tolerant platforms on the entire internet, despite its army of Israelified ADL accolytes, I wish to once again feed the deplatformers MORE evidence of how actual reporters are stalked in the, “real world ” of investigative journalism in the case of the Esquire reporter and the white SUVs.
For reference, heres my post about the “Whisperette” in a postal truck, and another about a Cadillac Escalade full of hackers from Texas that followed me around Hollywood, CA, and yet another about the Mormon mafia rifling through my vehicle, which became extremely common for me after I wrote this story described here and others before it.
So, without further adieu, the story of the Devin Nunes farm in Iowa, and mystery whisperettes in white SUVs, from Esquire.com-because it fits the tribal-sectarian narrative*:
Devin Nunes’s Family Farm Is Hiding a Politically Explosive Secret
</strong

When I walked in the front door of the mayor’s office, I had noticed a mud-spattered white Yukon parked outside. As I was driving to my next interview, I looked in the rearview mirror and noticed the white Yukon again. I drove aimlessly, crisscrossing streets from one end of town to the other. Everywhere I turned, the white Yukon appeared. I was being followed. When I turned the tables and followed the car back, it raced off. We played cat and mouse like that for more than an hour until I finally got a good glimpse of the driver: It was a middle-aged woman with curly, red hair who had a cell phone stuck to her left ear. The cat-and-mouse game started to feel a little dangerous, so I left town for a couple hours. On my way back into Sibley, the same car passed me on the highway. This time, the chubby man from the Lantern was driving. He smiled and waved.
Or maybe I’d made a mistake. White SUVs are common. Could I really be sure that was the same guy and the same Yukon? A woman was driving the car earlier; now it was a man. It didn’t make sense. Maybe I was just being paranoid.
I had a particularly sensitive interview that afternoon with a source who I knew would be taking a risk by talking to me about immigration and labor at NuStar. When I arrived, we talked for a few minutes before the source’s cell phone suddenly rang. The conversation seemed strained. “Sí, aquí está,” the source said. I learned that on the other end of the phone was a man named Flavio, who worked at NuStar. Somehow Flavio knew exactly where I was and whom I was talking to. He warned my source to end the conversation. Not only was I being followed, but I was also being watched, and my sources were being contacted by NuStar.
ADVERTISEMENT – CONTINUE READING BELOW
I left and drove to the local grocery store, where I parked in the open, hoping to draw out whoever was tailing me. I suddenly noticed a man in jeans, a work shirt, and a baseball cap pulled down low. He was talking on his cell phone and walking suspiciously. Was he watching me? I held up a camera to take pictures and he darted away. I followed. His car was parked haphazardly on the side of the road half a block away. He got in and took off while I followed. It was a dark Chevrolet Colorado pickup truck—with California license plates. I ran the license-plate number through a database. The car was registered in Tulare, California…..follow this link -connect the dots!

Police gang stalking and sextortion: todays search language, 30 day case study gang stalking search language

Search terms: Police,sextortion, blackmail, compromise, domestic violence industrial complex, slimy lesbian linebackers like these types who can be linked to every mass homicide in America, or some of the of the darlings of lesbian academic circles Elizabeth Dietrich and Dr.Lorraine Sheridan,and David V.James,gang stalking search terms, emergent internet, gang stalking psychometrics, criminology
When dirtbag Joe Biden, and other pure scum like rabid misanthrope John Walsh,of Americas Most Wanted fame(Walsh,allied with the police state, and bad actors in police departments along the nefarious drug running corridors of Broward County Florida, where Officer Donna Watts was gang stalked BY police, makes a living exploiting the heinous death of his son,which was due to the the negligent parenting of his wife, who put the child in harms way by leaving the child unattended)began to wage war on men in America, they did it by gendering violence as “male,” much to the pants-pissing glee of horse-faced lesbian linebackers who wear size 13 Star of David maxi-pads, certain neocon progressives, and conservative cunts alike.
But you dont have to take my word for it-have a look at Takis Magazine online, where we see the worst elements of both the religious right,and the pagan/Wiccan/pseudo-feminist left, working TOGETHER in the endeavor of”deplatforming” words,ideas and, SPEAKERS of words and ideas,so that
Anyone who studies organized gang stalking quickly comes to realize that OGS is the primary methodology with which police, and the modern Domestic Violence Industrial Complex wages oppression upon those who challenge its illegal, unconstitutional, stalker state basis, as documented by Hamid Khan and Alice Sperri of The Intercept. And, the roots of it are in the terms “high policing and low policing.”
And so,at this point, I would like the reader/s to note that I have acted as a dullah, and aided the world and targeted individuals specifically, to begin to point the weapons I provide here at this blog,at the names, and faces of those who are targeting them. Use these tools AS weapons, and research the friends, and extended family members even, and do what comes naturally after that.
So, to those who have been targeted, and who want revenge,or justice that cannot be found in DVIC high heeled policing schemes-and who can name names, I advise you to pick up the weapons and tools that I have made available, and go tear some shit up.
Maybe, start at the local police precinct station,or in any of the many pseudo-constitutional court rooms like family courts, and asset forfeiture schemes; maybe in an institutional,or academic setting, as happened in Professor Fuck Your Life Finklesteins class, or in Nikki Giovannis– where your problems began.
And, especially for the lawyers,psychologists,and journalists who have been reading along- have a look at the last 30 days of the search terms that have come in to this blog.
As a case study of organized gang stalking, ROGS is the first blog EVER to do this: I have provided case, after case study of organized gang stalking, free of charge, as a service to the public, and professionals alike.
And,because OGS has only two sides- gang stalking denialists/perpetrators, and gang stalking victims/targeted individuals-even Google can provide you evidence that my “theories”have changed the OGS dialectic forever.
Here, is the last 30 daysof search terms that landed here. And note: almost NONE of the searchers are seeking info about the disinformation aspects ofOGS, aka “DEWs,”aliens,or Morgellons disease.
OGS is this real:
gang stalking 2018
gang stalkinng is rampant in clifornia
osi informers
group stalking lorraine sheridan
cost of gang stalking
minnesota reporter gangstalked pokice hack licence
mind control gang stalking
modern day wire tapping 2018
gangstalking and the occult
fight back: how to build evidence of organized gang stalking for a civil lawsuit eric karistrom
hive mind zombie gangstalkers
gang stalking memphis tn
gangstalking and tainted cigarettes
computer virus, gang stalking
mormons satanic gang stalkers
aclu gang stalking
gangstalking single women
human trafficking, organized stalking, community harassment
gang stalking jobs
gang stalking new york times
antigangstalking law
describe delusional narrative
lorraine sheridan gang stakin
litigation gang stalking by police claims
names of gang stalkers in san diego
gang mind map
dr lorraine sheridan stalking typology
feminism and narcisism
scientology gangstalking
gang psychology
secret research in santa claria
gang stalking fire department fire alarms
how to fight back against police gang stalking
organized stalking and landlords
what cults in toronto do gangstalking
police supervised smart phone gang stalking prograhams
offering a reward for anyone willing to give information on gang stalking
gangstalking the south men taken out of the population
facebook admits mind control
hive mind gangstalkers
gang stalkers are scientology
disabled american vetrans gang stalkers
fire department gangstalking
smart phones, gang stalking, population control
stalking phone hacking
targeted individual campaigns in milwaukee
https://www.tandfonline.com/doi/abs/10.1080/14789949.2015.1054857
gang biases
hamish brown rotary club of perth
telephone redirects gang stalking
do gangstalkers collect evidence
evidence of gang stalking
stalked by the cia
gang stalking russia
police informants gang stalkers
gangstalking patsy
gang stalking in russia
children, gang stalking,
children gang stalked
ktps reporter minnesota gang stalked licence
“craig redd” colorado
organized stalking stasi using youtubers
gangstalking victim conference calls
complaints about gang staulking from police
how prostitutes are used in gang stalking
what are sex perks gangstalking
gang stalking using social media
research organized gang stalking
va tech shooter gang stalked
what is low policing
andy ostrowski mental health evaluation
institutional sociopathy
how to combat gang stalkin
behaviours of occult involved in gang stalking-stories from ti.
gangstalking saint paul minnesota
ncis mental health gangstalking
gang stalkers san diego how to get rid of
police gang stalking and sextortion

Tim Cushing pushing for ROGS' Gary Webb award for excellence in gang stalking journalism?

Of all the ways that ROGS blog-the blog you are reading right now-has changed the discussion about organized gang stalking, I think that my Gary Webb Award for Excellence in journalism is probably my best contribution.
That award carries a one thousand dollar stipend, and the winner also gets a golden trophy of a pigs trough with the bottom chewed out, with two golden .22 caliber bullets dangling above it. I will let the awardee contemplate the design of the award for themselves, but note that Gary Webb reported one of the best series in the history of journalism, won a Pullitzer Prize, and then, got gang stalked to death.

Related Story: What does a blog post written in a free WordPress blog look like when the blog is being tampered with, in real time, by an Infragard member, a Fusion Center, or any of many NSA/Alohabet agency speech suppression tools and tactics? see this post here, where I attempted to link the QaNON “conspiracy theory” to a SWAT team member who greeted the vice president wearing a Qanon patch.
1211118-11-20181201140953

That award is offered for any journalist who can use the term “organized gang stalking” appropriately when discussing this issue.
And, Tim Cushing, of the worlds premiere technology blog, Techdirt.com comes awfully close in this article below, but-not close enough to be a contender YET.
And, lesser journalists are starting to step up to the plate to take a swing at that award, as we see with the reportage in another MSM piece that reported on the organized gang stalking of tech guru John McAffee, the worlds first inventor of anti-virus software.
Well, heres another excellent puece by Cushing, covering due process free and BIZARRE police activity, as they stalk, harass, and spy on people in Boston, MA, which has some of the most deeply entrenched Catholic and neocon racism and hidden theocracy in America:
Lawsuit: Boston PD’s ‘Gang Database’ Says People Who Wear Nikes And Have Been Beat Up By Gang Members Are ‘Gang Associates’
from the guilty-until-negatives-proven dept
The Chinese government uses a number of measures to keep tabs on citizens. One is what’s known as a “citizen score” — a compilation of all the good/bad habits the government can track that determines whether a person should be viewed as a contributor to society or someone the government should take out of circulation.
We do the same thing here in the US. Credit scores determine who gets to live where and what vehicle they can own. It also can affect employment opportunities. This version of a “citizen score” is compiled by private parties who have access to information Americans are given no choice in relinquishing.
But the government also uses point-based systems to determine what kind of citizen you are: one of the good OK guys or possible a menace II to society. The ACLU is currently suing the Boston Police Department over its ad hoc “citizen score.” The BPD adds and subtracts points to add and (possibly?) subtract people from its “gang database.” Things citizens actively do — and even things they passively don’t — can put them on this watchlist.
From the ACLU’s public records lawsuit [PDF]:
Under the point system, a person is designated as a “Gang Associate” if he is assessed six or more points, and a “Gang Member” if he is assessed ten or more points. See Exhibit A, Boston Police Department Rules and Procedures Rule 335.
The point system makes it possible to designate someone a Gang Associate or Gang Member without any allegation that he engaged in violence or criminal activity.
An individual may be assessed eight points for being the victim of gang-related violence.
Yes, you read that right: Boston residents magically become “Gang Associates” if they’re shot at by gang members. Or carjacked. Or mugged. If this happens twice, it appears they’ll be upgraded to “Gang Member” thanks to their inability to avoid being victimized by gang members.

Lawrence“Larry” Guzzino, gang stalking on steroids, web scrubbing, and missing links

How real is organized gang stalking-and how actively do police, and propaganda elements seek to hide or discredit it as an actual practice, and an abuse of civil procedures and due process?
Just ask Larry Guzzino, whose story about being gang stalked by goons like these was featured in main stream news, just as the Department of Homeland Security began a full assault on due process in 2011, by utilizing gang stalking as a means of social control, as well as socially engineering citizens to accept due process-free “law enforcement,” which I like to call law enfarcement, because thats what DHS tactics are, according to their own playbook.

You see, the DHS (and every other alphabet agency) deliberately attempts to skirt the law, and use military resources to spy on citizens, much as we see in the cases of Dreyer, or the USAF OSI in general, and not get caught at it by using methods and tactical assaults in individuals that are plainly bizarre, as we see in the cases of Andy Ostrowski in the Kid$ for Ca$h state of Pennsylvania where one judge was caught literally selling 3000 children, as “the good guys and gals” looked on, or the cases of whistle blowers Adrian Schoolcraft, and former DHS Julia Davis, who LITERALLY was harassed with DOZENS of neverending investigations AND actual “black helicopters” too.
OGS is THAT bizarre.
I mean- ask Lawrence Guzzino about gang stalking-if you can find Guzzino, you can ask him about OGS, because he seems to have dissappeared after Lieutenant Larry Richards famously acknowledged in news reports that organized gang stalking “existed long before the internet.”
And, like the internet links that I use to prove the case that OGS is real here at ROGS, the validation is apparent not only in the known and documented police practices, but also, in the hidden, or occulted practices of policing.

Related Story: John McAfee, who invented the firstinternet security technology known as anti-virus software, claims he is being gang stalked, and has hired a team of security personell to prove it. Extra points if you notice the Simon Golstein wrote about it online,in FinanceMagnates

.
Here, have fun proving that “webscrubbing” is a real practice of police and intelligence agencies that subvert media, and that seek to hide their practices from “we, the people,” who are concerned that policing itself is the problem,rather than manufactured terrorism,or boogiemen. And, add that to your list of proof of gang stalking,too.
But here is a link that once linked to Guzzinos case,and which documented poluce “framing” in action, which has now been scrubbed from the web:
http://castroville.kionrightnow.com/news/news/506255-deputies-no-pipe-bomb-found-parolees-car
Maybe the avid reader can find that original news story, but for now,it has been scrubbed from the web,as many ofthe things I write about get scrubbed from the web, shortly after I write about them.

Related Stories: I,ROGS, have been followed around by nameable military contractors, and DHS affiliated scum, and named NGOs since 2004, since I wrote a few stories in a college newspaper that the AIPAC/DVIC/Zionist/neocons didnt like.
And, I have named names, and provided hard evidence that this is so, in this story here,where a military contractor from Black& Rossi followed me around Chicago, or this story here where a Lockheed Martin engineer gaveme a great scoop, which was then stolen from my Gmail account, or this story where an acridly fat blonde woman with a Cheshire cat smile and working in the DHS stalked me in a classroom.

The avid reader of ROGS will recall that Guzzinos case started because he is related to police, apparently on his (former?) wifes side.
And, the avid reader will also recall that in his case, the ROGS BINGO card is completely full on every corner and square- that the ROGS BINGO card sounds like a firetruck,blasting by your house at all hours,honking one of its many horns.
And now,we can see that,since I wrote this blog, contacted lawyers, and journalists, and a few people in Washington D.C., that one kind-of main stream writer has even mentioned “gang stalking” as an actual thingin real life,in the case of Libertarian-leaning crypto genius John McAfee, who INVENTED anti-virus.
so,regardless of anything, I present you, the reader with evidence that targeted propaganda, and targeted individuals are intertwined,as domestic agencies work to control the narrative of OGS,and.keep this practice hidden away, far from “the publics right to know.”
And,too, it might also explain why eBay billionaire Pierre Omidyars news outlet, TheIntercept.com has still not released ALL of the Snowden documents too, as lies of ommission are politically beneficial to those who profit from this form of social engineering.

Manufacturing terrorism suspects, fake web pages, and informants using lots of rope in darkness: modern lynching online and CVE programs

Whether the target is a Muslim, a Mormon cattle rancher, a black activist, or a poor white kid like William Atchison who get stalked online and then offline by agents provocateurs, aka DHS/FBI/DIA/private contractor/NGO/foreign spy outfit unspecified, informants, a few patterns stand out in the data:
UNDERCOVER FBI AGENTS SWARM THE INTERNET SEEKING CONTACT WITH “TERRORISTS”who they then profile via behavioral analysts, psycholigical operations, and then endlessly monitor their speech online and off, in concert with HUNDREDS of agencies, and using NSA data.
The FBI’s online activities are so pervasive that the bureau sometimes finds itself investigating its own people.

Almost all targets of provocation are male.
All targets of provocations are ensnared online, and followed, monitored and more offline for using words~aka pure first amendment protected speech~sometimes for decades since the NSA dumped hay all over needles in a theretofore previously non-existent “haystack.”
All targets of provocateurs have long term contact with people working under the counter-terrorism rubtrik, or so calked community policing, who seek to INFLUENCE the speaker, from hidden or occulted positions online and off (for instance, social workers, college, or DV type “counselors” target and track individuals, usi.g multiple databases, and share information about their targets with police)
All targets of these hidden programs are manipulated in “directed conversations”which is well documented in the online TI community,and this unrecorded anywhere.
All targets are manipulated, and frequently their most base impulses to food, clothing and shelter~indeed, their base drives, what Freud called libido~are used as tools to manipulate them, and much more, as we saw with the Tsaernev family being targeted for a decade BEFORE the Boston bombing, as well as in the cases of the Seattle Somalis employment and travel being stifled by federal agents, hearsay, and policy (not law.)
In any study of what is colloquially called mind control, and stemming from Nazi/US/British styled torture, or the well documented MKULTRA and its companions Monarch, Bluebird, Phoenix, Gladio-all of these used base drives as ways to manipulate subjects and targets.
And, all base drives, stationed a man, or a woman in the middle to impede or encourage the target toward one or another behavioral goal. So, any study of targeted individuals must account for ling term state/federal ibstruction of base drives, and achievements.
Related Story: Niftygerbil, Niftychinchilla, and other Nifty names for Tor nodes, courtesy of the same geniuses who gave the world Monarch and Bluebird.
So, we see now, the entire organized gang stalking dialectic mirrors the ACTUAL complaints of targeted individuals. Refer to the ROGS BINGO card at the top of this blog for comparison.
So, OGS is far from a delusional complaint, and rather,indicative of manufactured terrorisms un Constitutional basis, and the occulted use of informants whose work in online terror/criminal/other incitement is undocumented by design-a totally unchecked use of actual psychological operations-agents provocateurs actions are not on the record, or in courtroom documents either.
So, in the very least, these online influence and psyops using unchecked, unregulated, hidden, occulted and obscured methods, repeated over time, do indeed form, as the good doctor Lorraine Sheridan has noted~a closed echo chamber, echo chamber, where words themselves are the primary targets, as are the individuals who use the words- they are literally under close monitoring every time a banned word hits Google/Wordpress/Twitter, etc.
Here from NBC News is a story about how the FBI uses informants online and on social media in occulted fashion to police pure speech, and then, to target individuals:
https://www.nbcnews.com/storyline/isis-terror/no-lol-matter-fbi-trolls-social-media-would-be-jihadis-n226841s
And here is a bit more about that from the Intercepts Cora Courier in 2017: ghttps://theintercept.com/2017/01/31/undercover-fbi-agents-swarm-the-internet-seeking-contact-with-terrorists/
“”According to the guie, an online counterterrorism investigation can target websites or online networks that the FBI believes terrorists are using “to encourage and recruit members” or to spread propaganda. Such probes may extend to the administrators or creators of those forums, as well as people engaged in “the development of communications security practices” or “acting as ‘virtual couriers’ for terrorist organizations by passing online messages among members or leadership.”
The guide classes as online investigations those that rely primarily on online informants or undercover employees, and those that involve surveilling internet facilities or foreign websites hosted on U.S. servers. The FBI often runs such operations jointly with other U.S. intelligence agencies or “international partners,” according to the document.
Since 2008, the Counterterrorism Division has coordinated these operations under a program called the Net Talon National Initiative. Net Talon uses informants, linguists, and FBI employees working undercover, posing as ordinary internet users, to zero in on terrorists’ use of the internet, according to the guide. The initiative was meant to centralize expertise on particular targets and platforms, to “address intelligence gaps,” and to create a clearinghouse of the intelligence the bureau has collected on terrorists’ use of the internet.
The FBI’s online activities are apparently pervasive and uncoordinated enough to lead to confusion. The document refers to “resources being wasted by investigating or collecting on FBI online identities,” including undercover employees, informants, or people who have already been investigated by other offices or agencies. An FBI official told the Intercept, “You would be in a forum, and you’re like, ‘This person’s way out there,’ and we’ve gone and opened up a case, and sometimes that was a local police department, or a friendly foreign service. There are still instances of that, and deconfliction is still necessary.”
Khurrum Wahid and Joshua Dratel, defense attorneys for Ahmed Omar Abu Ali, answer questions from the media after Abu Ali was sentenced on March 29, 2006, at a federal court in Alexandria, Va. Photo: Alex Wong/Getty Images
THE COUNTERTERRORISM POLICY GUIDE shows just how much flexibility informants and undercover agents have when operating online, even when they’re not working specific targets. The FBI insists that there is nothing to see here: In statements provided to The Intercept, the FBI said that “while there are obvious differences between online and offline environments,” FBI employees and informants working on the internet are subject to the same rules, and that bureau employees can only monitor people’s online activity as part of an authorized investigation.
The guide, however, suggests that the internet offers areas of ambiguity. Much comes down to the questions of what informants can do, as opposed to FBI employees, and whether the goal of an operation should be construed as seeking to obtain specific intelligence, simply watching public websites, or developing a profile for an undercover identity.
For instance, the guide states that an FBI employee can visit a message forum or blog only when the site is relevant to an investigation. An FBI employee, according to the guide, could be an undercover agent or an “online covert employee,” a term that presumably refers to FBI workers other than agents, like analysts. FBI employees can’t chat online with someone who isn’t already the subject of an investigation for the purposes of gathering intelligence on that person. They can, however, “engage in unlimited communication with associates” of a person under investigation, if the conversations are relevant to the investigation.
Informants and undercover FBI employees are also allowed to do a great deal online in the name of “building bona fides,” such as creating fake identities or making themselves appear to be normal commenters on online fora. The guide says that in order to establish credibility, FBI employees “may make postings and communicate with individuals who are neither the subjects nor the associates of subjects … there is no limitation with respect to the amount of communication [they] may initiate in this regard.”
And the FBI is allowed to open new investigations on people it identifies through “passive monitoring or active communication” on websites.
An FBI spokesperson clarified that in order for an undercover or covert employee to monitor a website or forum, the site must already be associated with an investigation, “either because the forum was known to be used by a subject [of an investigation], or because the subjects are there. I can’t be in the forum trying to bait you into conversation.”
However, the FBI acknowledges that when its employees participate in online fora, they interact with people who may be bystanders to whatever activity led the bureau there in the first place. And that is not accidental. “We want to know if the subject has other people who are joining in, which people are part of the activity, and who is just there,” a spokesperson explained.
In other words, FBI agents can post and chat online with people who have nothing to do with an investigation, so long as they aren’t collecting intelligence — but in the course of those online communications, they can decide to start investigating someone.
Michael German, a former FBI agent who is now with the Brennan Center for Justice at New York University Law School, said that agents have always had a little bit of wiggle room in this regard. They can have a certain number of in-person meetings with someone, or in some circumstances go to public meetings or public websites, without identifying themselves as part of the FBI. This helps agents avoid a bureaucratic mess when carrying out a simple “buy and bust” drug sting, for example, German said.
But the ability to conduct unlimited online conversations in the name of building bona fides gives agents “a pretty long rope,” German said.
Criminal defense attorney Khurrum Wahid, who has handled or been an adviser on many national security cases, notes that FBI employees or informants frequently pose as experts offering guidance to lost individuals.
“These uninformed young people go online and become almost smitten with people who show a level of knowledge, who often turn out to be informants or undercovers,” said Wahid.
Informants operate under looser rules than FBI personnel. They are allowed unlimited engagement with a target in the course of an “assessment,” a preliminary investigation that can be opened on a loose tip of suspicious behavior, in order to collect general intelligence on a subject, or to evaluate a potential new informant. Assessments were created as a category in 2008. German finds their allowance for the expansive use of informants problematic.
“What we’ve seen in sting operations is that there is this shady portion before the official operation begins which often involves the informant,” said German. “And then it’s passed off to an agent, and it looks like they are ready to commit a crime pretty quickly.”
Wahid noted that at least in online cases, there are generally logs of all the conversations between suspect and informant, whereas “when it’s a live informant, they can turn off the recorder and we never know what it was all about.”
The use of informants in counterterrorism sting operations has expanded since the 9/11 attacks, when the FBI adopted the mantra that its job is to stop terror attacks before they occur, not just investigate them afterward. The government argues that the anonymity the internet affords to suspects necessitates an aggressive approach, including stings. The FBI’s national security director told the New York Times this summer that “using undercover agents online allowed the FBI to ‘flesh out’ suspects by gaining their trust and persuading them to disclose their real identities.” In some cases, the FBI even created fake webpages in order to draw in suspects.
“Agencies are under a lot of pressure to find a needle in a haystack, something that has haunted us since the beginning of the war on terror,” said Karen Greenberg, director of the Center on National Security at Fordham Law School. “It’s true that the internet has changed everything about how we communicate, but are we just going to be trawling online forever? It turns the principles of criminal investigation on their head.””

WA Fusion Center, limited hangouts, disinformatio, misinformation, mind control documents.

Mr X:
The WA state Fusion Center mind control docs are what is called a limited hangout in intelligence circles. The LH is designed to taint a dialogue, or misguide you, but in themselves reveal the cavalier attitude of these domestic spies.
The images widely circulated from raven1.net are among many that were used by one Eleanor White, a self described whistle blower.
She reigned as the go to disinformation specialist about a topic called gang stalking, between 2001- and 2011. White claimed that she was slandered as a pedophile everywhere she went, but in reality, was likely part of the pre-Fusion center deep state, a likely courier for illegally intercepted communications, and the defamation campaigs that followed.
These materials are used to discredit people who psychologists then label as delusional. But as we see, they also nearly and completely describe how the NSA trickles data to state and federal agencies, who then use Fusion Centers, so called community policing elements, and more to monitor activists and dissidents, via real time cell phone tracking, computers, ALPRs, BOLOs, and more, frequently utilizing plainly bizarre methods.
I also wish to inform you that I have been tracked since 2001, by many agencies across America, for many reasons not least of which is that [REDACTED] also wrote the Lewinsky defense, and represented Cheney during the Scooter Libby, Valerie Plame affair; And, a few other things.
I appreciate [REDACTED] FOIA release from the Fusion Center, but also wish to inform you that there are other questions to ask in these cases, because those documents are designed to discredit any who take them too seriously.
The good news is that the real questions that should be asked are easy, once you know where to look.
For instance~regardless of your political stance on gun control~ask about Fusion Centers monitoring activists, and people in alternative media, or even Facebook.
So, black activists, and mass shooters are a great place to start with mind control. Fusion Centers monitor these guys relentlessly, and mercilessly, via phone, computer, ALPRs, and BOLOs.
To understand the mind part, separate it from the control part, outside of due process, and constituting what could arguably be called unusual punishments.
Then, understand it like this: the FVEY nations
cooperate to target and harass each others activists. A great example is a boy named William Atchison, who shot two kids in a NM school, and who was killed by SWAT.
In his case, he was contacted online by British intel, who waged Gamergate across the globe, and also on American citizens, outside the law, and likely in violation of international treaties.
Then, they passed the “anonymous” tip to FBI, who then waged community policing on the boy.
FBI contacted the kid~who never owned a gun in his life~and then FBI CVE kicked in, meaning the kid was frequently followed online and off, by any of many domestic spy/intel/Rotary clubbers/VFW members/etc organizations attempting to “conform him” and these take on plainly bizarre online and offline stalking proportions.
Only after this, did the boy buy a gun, and this we see in case after case after case. Then, the boy goes ballistic, after being isolated and terrorized by literal hidden and actual armies of psychological operations specialists, for WORDS he expressed online.
So, in that one case alone, you can find evidence that what I say above is true, if you learn to ask the right questions.
How many calls went to which Fusion Centers, about What, When, and Why about this one boy, william Atchison. Were ALPRs reporting his license plate every time he drove, and were satellites literally tracking and recording his every move? Which police departments/school officers pinged his computer or cell phone~or did bad stuff like redirect his internet switch?
Did his computer have electronic implants, aka, coded applications that did/do as yet described things/wiretapped/ monitored and utilized key stroke logging?
Etc.
But taken as a whole, the boy was without a doubt, surrounded by influencers, and others who aided, coerced, and manipulated his choices from his first contact online with British intel, who flagged him during Gamergate.
First, they came for the kid online who said bad words (and those words decided by religious theocrats, and others)~then, they came for the mass shooter after they, working internationally, from sectarian religious basis, occulted pisitions along the internet backbone, and in violation of due process, civil rights, and treaties, bullied him mercillessly, via electronic platforms online, commmunity policing offline, and CVE provocateurs.
I hope this can help point you in the right direction.
I can be contacted here, if you wish more details.
Best Regards,
ROGS (my obvious nym)

Washington State, mind control documents, Fusion Center spying, police state bloggers, and GOD BLESS TECHDIRT.COM

DHS Fusion Center Gets Request For Documents On Extremists, Decides To Hand Over Mind Control Docs Instead
from the here’s-the-thing-you-didn’t-ask-for-but-will-probably-enjoy-reading dept

What  is  24-7 monitoring  of targeted  activists,  dissidents,  journalists, and  other  targeted individuals? Fusion Center  spying, the bizarre  quasi-Constitutional DHS/ICE/HSI  methods of secret policing, and the  NSA-Israel-FVEY data  theft  is de facto total  spectrum monitoring and  psycholigical  operations, aka mind  control,  by any  other name.

By  Tim  Cushing, of  Techdirt.com
Once you release a document to a public records requesters, it’s a public record, whether you meant to release it or not. The person handling FOIA requests for the Washington State Fusion Center (a DHS/local law enforcement collaboration known more for its failures than successes) sent Curtis Waltman something unexpected back in April. Waltman asked the Fusion Center for records pertaining to Antifa and white supremacy groups. He did get those records. But he also got something titled “EM effects on human body.zip.”
Instead of intel and assessments on local Antifa/white supremacists, Waltman found things like this:
And this:
The files did not appear to have been generated by any government agency, but rather collected from other sources who thought there might be some way the government could control minds using electronic stimulation or “remote brain mapping.” Why the Fusion Center had them on hand remains a mystery, as does their attachment to a FOIA request containing nothing about electronic mind manipulation.
This inadvertent disclosure has led to more requests for the same documents. Only this time, requesters — like Joshua Eaton of ThinkProgress — are asking specifically for government mind control files.
It appears the Fusion Center first thought about withholding some mind control docs, but somewhere along the line decided it couldn’t pretend the documents that weren’t supposed to be released hadn’t actually been released.
An email chain in the release [PDF] to Eaton contains an apology from the staffer who accidentally sent Waltman the mind control files.
Good afternoon Gretchen,
First of all I want to apologize the same way I apologize with my supervisor Lt Boyle and [redacted] I do not like to give excuses but I really sent this without intention when it was not responsive. I sent the original email to [redacted] with the attachments. I will try not make more mistakes…. Now, because of my error MuckRock sent another PDR. Sorry again for the situation and have great afternoon…
Gretchen (the Public Records Officer for the Washington State Police) tells the staffer not to worry about it. Apparently, sending the wrong files to requesters happens frequently, but otherwise, everyone is doing a great job, including the person who sent mind control files with a batch of extremist docs.
But that apology and forgiveness is preceded by the same staffer asking for another review of documents she already released to another requester, possibly in hopes of denying this release.
Erik,
[redacted] told me if you could review this. Mudrock is claiming that DHS did created this. I think I was not supposed to release this but it was public.
Can you help me what can I tell my Public Disclosure coordinator?
Sorry for the inconvenience
No response from Erik is included in the document so one assumes the release went ahead without his additional input. Now this requester has a copy of this email chain, something pulled from an internet “mind control forum,” and, inexplicably, the KKK documents released to Waltman in response to his FOIA request.
So, if you’re looking to obtain public records but don’t particularly care what records you receive, it appears the Washington State Fusion Center is a great place to try your luck.

The Cult of Bill W.'s AA revisited: gang stalking and the policing of anonymity as the National Sherrifs Association polices privacy.

AA,NA, GANG STALKING, AND THE HIDDEN HAND OF THE HIGHER POWER:YOU ARE NOT ANONYMOUS IN AA, OR ANY OTHER RECOVERY INDUSTRY CULT because the National Sheriffs Association and local LEOs, working under due process defying community policing schemes are always there to stalk you, or someone you know in “recovery.”
Bill W. aka Bill Wilson was both a proponent of LSD use, and documented as having occulted ties to both hidden western religion (occult ) and CIA programs of social control.

Read: AA and the occult and also this from the Guardian UK, about Bill W. and the well documented CIA LSD program

Follow this link to watch online terror stalking as they target several individuals.

POLICE USE AA AND NA, etc. MEETINGS TO GATHER EVIDENCE, OR WAGE PSYCHOLOGICAL COERCION, OR INTERROGATION ON TARGETED INDIVIDUALS WHO CANNOT OR WILL NOT BE CONFORMED/COERCED INTO THE JEWISH-CHRISTIAN NARRATOLOGY OF SUBMISSION TO HIDDEN BAD ACTORS AND OCCULTISTS, AKA “HIGHER POWERS”which most frequently are church and police affilliated Masonic lodges, such as Freemasons, Rotary Clubs, Lions Clubs, etc., all of which have been.implicated with solid evidence to “organized gang stalking. ”
Worse, judges, prosecutors, social workers and psychologists are indeed complicit in it, frequently deriving income and other sicial benefits from denying that gang stalking is, “real.”
Then, the multi -billiin dollar cottage industry of “recovery programs” work directly with those denialists, FREQUENTLY REQUIRING AA/NA/SA/ETC AA, as a term and condition of a persons freedom,  as a range of other “healthcare providers” derive billions too.

MANY ORGANIZED STALKINGS BEGIN WITH OCCULTED POLICE INVESTIGATIVE PRIVILEGE/SLANDER CAMPAIGNS, AND THE JUDICIAL, INSTITUTIONAL BLUR BETWEEN RIGHTS AND LAWS OF DUE PROCESS AND RIGHTS TO ANONYMITY, AND THE PSEUDO-THERAPY, PSEUDO -PSYCHOLOGY OF AA.

Related Reading: Mental health, mediated by those who cause law and due process defying disruptions in individuals lives. It cannot be forgotten that when.a, “gang of police ” murdered Ahmaud Arbery, the conservative Jewish -christian smear machine cranked up slanders in the press about his “mental health ”

How western police uphold the Jewish christian (and now, Islamic) mythology of God, G_d, Gawd, THE LAWD /LORD/Allah  and its variants of submission to hidden superstition oriented narrative of mental health, and victims of the hidden hand of gas lighting and privacy invasion by policing mechanisms that defy law and order.
Here is the National Sherrifs statement on mental health, via Policemag online:
http://www.policemag.com/channel/patrol/articles/2007/06/mentally-ill-subjects.aspx
OGS is widely recognized as having only two categories of discourse: OGS victims, and OGS denialists. It is striking to note that of these two binary groups, all OGS denialists are, in some way, direct beneficiaries of the DVIC money pot, while OGS victims are NOT beneficiaries of the DVIC money pot.
The researcher of OGS can easily find empirical evidence of this claim anywhere and everywhere onlune, or, just read through ROGS here, where you will find this scientific, falsifiable proof of OGS.
Then, we also see that Alcoholics Anonymous-like Scientology-sprang up just after the Federal Reserve displaced rural Americans, and eugenically targeted their families, during the 1930’s, and the Great Depression.
Related Story: AA Mobbing is “Bill W. on acid~ literally. Here is Bill W. droping CIA supplied acid, in the era of Frank Olson, who met his fateful end after “falling” from the 13th floor of a hotel, while doped up on acid, as a CIA handler sat next to him.”
Today, many sane people, and those who use reason to solve social problems, are calling these industries what they are: out dated models of cult/sectarian control of our society by the usual suspects.
And, extra points in your ROGS Bingo card for noticing that all of the mobbing, directed conversations, and other bizarre, repeated activity by police, occulted in gang stalking roles strangely mirrors the exact activities used in psychic driving.
Look around ROGS here for evidence that this is so, and also, that therapists all deny that gang stalking is real.

Blogger robboy39 said…
recovery is riddled with National sheriff association members as well as national citizens patrol association they are orginized and when they get your number due to step work or what not conversations you may have, they will turn your life inside out. The gassilghting is illegal and they ignor this it is wide spread. yes they will follow you in to all aspects of your life and reack havock by recurting persons to harass the target anyway possible. the first Narcotics Anonymous was held in a police station owned building this was not a mistake law enforcement has been stalking persons who attend these meetinsg for years.
Old timers as well as newcomers the opertives are diverse by design to build friendships and trust to intrap the target then in a moments time they orginize the group against a single person. i am a victom i am looking to build repor with other victims Robboy39 youtube.
9:36 AM
Blogger robboy39 said…
national citizens police academy alumni association and national sheriffs association lookthen up they are evil. they have harassed me for 4 years. they have broken many laws and need to be held accountable for thier actions……

….follow the links and connect the dots© in your own case!
AND:How deeply are OGS denialists involved in downplaying Bill Ws dabbling with CIA drugs and cult control?
Ask the addictionologists! (addictionology is a pseudo-science similar to ponerology,the study of human evil, lol.) This is how far Jewish-christians will go to mask their occulted religion in secular society.

Electronic implants, Wikileaks Vault 8, victims of organized gang stalking, hive mind, and honeypits.

ROGS loves the Constitutional guarantees of due process, and ROGS loves America. I am pathetic that way~the grand American delusion is so appealing.
(Vault 8 is an inside joke.)
BUT: The DVIC is actually a war on speakers and words, and without a doubt, the first amendment itself is the target of neocon and tribal, religious interests, now interfacing with the massive influx of Saudi, and other nations cash flows, and the media narrative.
I have been gang stalked since the DVIC was birthed into our lives in 1993 ( the exact same year when the Anti Defamation League was outed as a domestic spy ring that sold out American activists) and became severely gang stalked after I broke a nation wide story in 2003-4 about how America’s agencies manufacture terrorists by occluding access to civil rights and due process.
To journalists, researchers, and others interested in answering the many questions that are presented in the “bizarre” online dialectic of gang stalking, here below is how the CIA (and every other IC agency, private contractor, and the FBI) uses the term “electronic implants,” which describes covert hacking techniques, and plausible deniability in exploitation of targeted computers, targeted computer networks, and targeted individuals.
Without a single doubt, this is empirical evidence of CIA/other IC/NGOs operations on US soil, and anywhere else where OGS is taking place.
And it single handedly validates the inherent mission creep of the WOT redirecting and exploiting domestic targets.

UPDATE 10-19-2019: Almost two years after I wrote this post, and became active online, the ADL implicated itself as actually deploying military psychological operations on target individuals, using artificial intelligence software called Moonshot CVE, which had previously been used in theaters of war; and, perpetuating negative stereotypes of Jewish people as mind controlling Svengalis.

1570435771780
Electronic implants and gang stalking, courtesy of Wikileaks, and Julian Assange, who is literally being isolated, and denied visitation from other people as I write this. And, the American/FVEY deep state has worked tirelessly to force Ecaudor to revoke his asylum.
Isolation, you will recall, is ALSO a major threat/complaint/”delusion” of targeted individuals.


RELATED STORY
:I wrote about the HIVE in coded language long before this story below became mainstream news. The reader can infer that writing openly about such things is dangerous, and also, ROGS personal writing style is somewhat coded for reasons I have explained elsewhere.

The Hive mind in the gang stalkung dialectic online, from Wikileaks.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.
…………..
And-I hope the dood doctors like David V. James, and Lorraine Sheridan-and certainly Dr. Mike Wood, dont get to caught up in the echo chamber as wasps and bees of all kinds swarm them for commentary in these matters.
But OGS is very real, and puts MHCHAOS and MKULTRA to shame.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

The un-naming of a man: Gang stalking, bizarre claims, chemicals, poisons, delusions, and the DHS- man dies, first responders sickened from chemical poisoning in DeKalb County Georgia GA motel room.

As  we  see  time  and  time  again, gang  stalking victims frequently  report bizarre encounters with people  online  and  off  who  threaten  them  with poisons,  chemicals,  and  fear  or  anxiety about being  murdered by  gang  stalkers.

UPDATE 11-07-2019:This post you are reading is very popular lately, after James Douglass Lark apparently blew himself up last week , while under FBI and GBI surveillance in Dekalb County Georgia, under mysterious -even bizarre circumstances.
ROGS suspects that this was a K 4 rated gang stalking gone bad (or good, considering that the goal of police /FBI/ intel agency stalking is to force a person into an institution, prison, or to commit suicide, which is what Lark apparently did, for some reason )
UPDATE: The un-named man has now been named.He was Frances Wilkes, 47, of Stone Mountain Georgia.
BODY IDENTIFIED IN HOTEL ROOM THAT SICKENED THREE DEKALB OFFICERS
The cause of death for Frances Wilkes has not been released.

Related  Story: Yeah- silence THIS: how internet forum boards are attacked by gang stalking denialists, and not  so subtle  threats of  being  poisoned. This is one  example  from  my  own,  PERSONALIZED,  targeted  experience online.
Here  is  a  case  where  actual  intelligence  agents, from  the  US border  patrol  and the  DHS are  alleged to  utilize bizarre  psychological  and  other  harassment  on  a  whistle  blower, including  mystery  poisoning:  Delusions, poison, bizarre claims, and schizophrenic narrative in gang stalking: the case of DHS whistle blower Julia Davis
And,  the  Russians,  of course, are  suspected  of  poisoning  dissenters and detractors in  Britain, which  is  widely  documented  all  over  the  MSM.
And  the  Las  Vegas  shooter Stephen  Paddock was  said to be so delusional, that  he  kept  a  gas mask  handy, with  fears of being   poisoned.
SO:
How  bizarre is  modern gray  area,  due process-free  policing  that utilizes  intelligence  operations on  ordinary  Joe Blows who  said  something online,  and  then,  were stalked,  harassed, framed,  and  worse by  operatives  who  sit  on  the  internet  backbone  in  Toronto  Canada,  or  San  Diego,  CA?
Or  at Los  Angeles  JRIC which uses miltary grade surveillance gear to target people they do not like, , or  who  are  affiliated  with  Princess Megumi,  from  the Masonic  Capital  of California, whose  relative  just  happens  to  be the  deputy  sherrif  in  those  parts? Bacon  bits,  and  blowflies-or  flying  pig-cow  hybrids  in  fishnet  stalkings  and high heels?
I ask  you, the  reader, to decide  how  bizarre claims  of  poison  are  in  the “delusional  complaint” or  organized  stalkung.
Yeah-  organized  gang  stalking  is THAT  BIZARRE.
ROGS  wonders:  who  will  help  me  keep  an  eye  on  this  story,  below?
Get  out the  ROGS  BINGO  card  before  you  file  FOIAs  in  this  case,  and especially, dig for  records  about the  dead  mans  past-  see  if kangaroo courts, mental  health,  unproven lopsided  claims  of domestic  violence,  and more were there. Because  it  is  possible  you  will  find that  soeone, soewhere,  didn’t  like  what  he  said online  or  off. Also notice that it was a workplace conflict related situation
Something  just  ain’t  right  about High  Heeled,   DVIC  policing,  as  these para-military,  quasi-judicial,  extra judicial  suicides,  homicides-and  poisonings  are  taking  place ALL  ACROSS  THE  WESTERN  WORLD, now.
SO,  here  is  the case where  an “un named man” died  in a  motel  room, from  what  federal  agents  and  the Department of Homeland  Security claim were household  cleaning  agents.
__________
Federal agents investigating hazmat situation that sent officers to hospital
By: Wendy Halloran , Rikki Klaus
Updated: May 13, 2018 – 11:31 AM
Federal agents investigating….
DEKALB COUNTY, Ga. – Federal agents are investigating after police found a man dead inside a DeKalb County motel, and then a chemical odor sent officers to the hospital.
Channel 2’s Wendy Halloran said agents with the FBI and the Department of Homeland Security were investigating inside the room late Saturday night.
“We have a dead body in the room and we can’t make any determination on cause of death until they have cleared the scene,” Shiera Campbell, with the DeKalb County Police Department, said.
All police had determined was there was body a man inside a room on the third floor of the United Inn on Memorial Driver in Decatur.
Guests told Halloran that they were stunned when they were told they needed to evacuate their rooms.
“We were all in the sun standing out for a long time when I did find out what was going on. It was kind of sad,” a hotel guest, who only identified himself as Bryan, told Halloran.
Once inside the room, three DeKalb County police officers knew something was very wrong.
“The officers were feeling a little bit dizzy, weren’t feeling too much like themselves, so they quickly came out of the room,” Capt. Eric Jackson with Dekalb County Fire and Rescue said.
The strong chemical smell sent three officers to the hospital. Firefighters then put on hazmat suits and went inside.
“Based on the samples we took we are going to try to attempt to identify whatever that source was,” Jackson told Halloran.
Hour after hour went by Saturday as forensic investigators waited to see if they could go inside to process the scene and the medical examiner remove the body.
Motel guests waited and watched. Some had to move to other rooms.
Hazmat trucks pulled in late in the night, with all signs pointing to something potentially deadly inside that motel room.
It is still unclear what was inside the room.
Police said late Saturday night the body was that of a 48-year-old man.
………..follow  the  links-  connect  the  dots!
_____________
While many  over the  counter chemicals such  as  bleach,  and  ammonia, and  sulphuric  acid  and  more can  be  freely  purchased from  hardware  stores  and big  box  retailers such as Walmart, they  can  also  be  used  to make  dangerous  chemical  weapons.
Was this a case where hidden policing, and possibly, vigilantes or provocateurs tried to force a bombers hand, or otherwise wage attrition for something the un-named man said online? ROGS asks you, the journalist or researcher of organized gang stalking to decide.
But also, decide WITH EVIDENCE and data that you can access by learning to ask the RIGHT QUESTIINS in these odd, bizarre cases, and to adopt the ROGS framework analysis of the claims inherent in these plainbizarre gang stalking events.
We  know  with  empirical  evidence  that the  alphabet  agencies work with local  law  enforcement and  community  mobs to  wage  hidden and highly personalized war,  psychological  war,  that  frequently  ends  in  suicides,  homcides  and mass shootings, and  that  they  wage  these  outside  of  judicial  oversight,  on  targeted  individuals.
We  in case  after  case  of  case  that  these  political, malicious prosecutions primarily target  speech,  and  speakers,  and, that  online  speech bis .targeted  offline.
And,  we see  the  bizarre  claims  of  threats  of  poisoning,  actual  poisoning,  and rarely~EXTREMELY  RARELY~delusional  people  who  fear  pousoning  by  “imaginary”people  they  “”imagine.
MORE LINKS  TO POISON  IN  THE EMERGENT ONLINE DELUSIONAL  GANG STALKING  DIALECTIC:
A credible analysis by a credible researcher of organized gang stalking:
https://medawarscornflakes.blogspot.com/2009/12/toxic-materials-in-stalking.html
And, those OTHER, likely actual gang stalkers, whose comment section was always filled with Lions Club members from OHIO, TEXAS, USAF affiliates, academics who are well known stalkers, and a few retired police (and someone who lived on Duckwood Drive in Eagan MN,in 2013):
https://neverending1.wordpress.com/2010/11/19/gang-stalking-the-gang-stalkers/
And, one for you, the researcher of organized stalking to figure out for yourself-especially if you are a federal agent, or another “good guy or gal” who wants to STOP gang stalking, as we see that it frequently leads to mysterious deaths:
https://perthsgangstalking.wordpress.com/2017/01/12/posions-and-toxins/

Gang stalking BINGO: targeted individual, targeted real estate, targeted electronics, targeted childROGS ren…….

Let  me  know  if,  and  when  you  start  seeing  patterns in  the  data  of  organized  gang  stalking……because  the  Experts  all  agree that  an  obsession  with patterns  can  indicate delusions, and  maybe  even  schizophrenia!
But  there are,  in  fact, links  between  organized  gang stalking and  real  estate, organized  stalking  and kangaroo  DVIC  courts, links between Gang stalking and Electronic implants: (Here is how the NSA uses electronic implants.) and electronic  implants that  monitor  our  computer  activity, sometimes  for  YEARS.

Related  Story: How secret  policing tactical  assaults  can  induce  delusion-like  symptoms in  politically  targeted  individuals,  as  those  targeted  try to  find  words  for  un-Constitutional  government conduct:
Gang stalking and delusions and paranoid complaints: what is Level X thinking and cognitive bias in psychologists/psychology? 
OGS victims obsession  with  patterns can  indicate  delusions to  therapists  and psychologists  on  the  state  teats!

But  here  below is a  case study  in  organized  gang  stalking  that  is  full  of  the  EXACT  patterns that  I  describe here  at  ROGS.  Organized  gang  stalking  IS  what  I  say  it is!
So…BINGO: Lets Play ROGS BINGO, in  the  case  of  the  targeted  activist!
Black  activist jailed  for  Facebook  posts speaks out about secret FBI surveillance that  went  on for  YEARS.
Exclusive: Rakem Balogun spoke out against police brutality. Now he is believed to be the first prosecuted under a secretive US effort to track so-called ‘black identity extremists’
…….. The father of three said he was shocked to later learn that agents investigating “domestic terrorism” had been monitoring him for years and were arresting him that day in part because of his Facebook posts criticizing police.
“It’s tyranny at its finest,” said Balogun, 34. “I have not been doing anything illegal for them to have surveillance on me. I have not hurt anyone or threatened anyone.”
Balogun spoke to the Guardian this week in his first interview since he was released from prison after five months locked up and denied bail while US attorneys tried and failed to prosecute him, accusing him of being a threat to law enforcement and an illegal gun owner.
Balogun, who lost his home and more while incarcerated, is believed to be the first person targeted and prosecuted under a secretive US surveillance effort to track so-called “black identity extremists”.
In a leaked August 2017 report from the FBI’s Domestic Terrorism Analysis Unit, officials claimed that there had been a “resurgence in ideologically motivated, violent criminal activity” stemming from African Americans’ “perceptions of police brutality”.
The counter-terrorism assessment provided minimal data or evidence of threats against police, but discussed a few isolated incidents, notably the case of Micah Johnson who killed five officers in Texas.
The report sparked backlash from civil rights groups and some Democrats, who feared the government would use the broad designation to prosecute activists and groups like Black Lives Matter.
Balogun, who was working full-time for an IT company when he was arrested, has long been an activist, co-founding Guerrilla Mainframe and the Huey P Newton Gun Club, two groups fighting police brutality and advocating for the rights of black gun owners. Some of the work included coordinating meals for the homeless, youth picnics and self-defense classes – but that’s not what interested the FBI.
A march in the wake of the deaths of Alton Sterling and Philando Castile at police hands.
Investigators began monitoring Balogun, whose legal name is Christopher Daniels, after he participated in an Austin, Texas, rally in March 2015 protesting against law enforcement, special agent Aaron Keighley testified in court….follow  the  links  above….connect  the organized  gang  stalking  dots! Because  nearly  ALL  mass shooters  endure YEARS  of these  tactics by hidden  policing,  aka  “High  Policing,  aka Americas secret  police.”

An army of Paul Blart the Mall cop and a database walk into the Hero bar: recipes in nauseating social policy and corruption

So, I have documented a distinct link between crisis PR narrative control and how organizations like the Association of Threat Assessment Professionals (ATAP) has deliberately blurred the line between so-called terrorism and domestic violence, utilizing what they call the,”colluding parallel investigation,”and advisinglaw enforcement, LEIUs, and Infragard community policing elements to wage pre-emptive, multiple and never ending investigations on targets;and how auto-antonymal language and double entendre are used in “influence operations”which the ACLU has also noted; and how alternative media is under attack from the “deep state” and it’s hand maidens in civil conspiracy, the psychologists who gaslight TI’s, but who, by proxy, are also those who are causing mass shootings, suicides, social isolation, political corruption, and more.
I have also repeatedly documented the toxic blur between security contractors and police functions that operate in an “intelligence capacity,”as we see a link between the Yellow shirt security contractors and the Stephen Paddock shooting, as well as documented links between Omar Mateen and G4S concurrent with Mateen being “on the FBI radar,” directly because his father is an FBI asset/informant,but how these literally conspire under the ATAP “frame”work and also wage hidden terror and morality/coercion/social conformity/entrapment/social engineering campaigns “in darkness,” and without oversight.
It is these latter subjects who are what can rightfully be called the modern equivalent of Nazi Brownshirts, or Stalinist purge agents, or Israeli Sterns gang members, and the ‘whisper campaign’ is the tactic both groups used to cause strife in local populations. All of that whispering, starts in database abuse, and BOLO’s of various kinds.


UPDATE 10/28/2019
: Actress Rose McGowan, who I mention in this post you are reading , has now sued Harvey Weinstein and his sleazy gang stalking lawyers David Boise and Lisa Bloom, as well as the Mossad affiliated spies that he hired to ruin her life, the spy firm Black Cube of Israel.
Rose McGowan sues Harvey Weinstein, Lisa Bloom, more claiming ‘diabolical’ intimidation plot
Maria Puente

Also note that one of my personal stalkers is also a Mossadi jihadi, and WOW did my blog, and my communications device/s get interesting after I PROVED what gang stalking IS with that one example.

In case you don’t recall what a BOLO is, have a look here especially, then here, and here.
Then, have a look at this Wiki site where the excesses of the unethical post 9-11 “information sharing environment” as we see security industry are documented in one specific community, Aspen Hill Maryland, as an organized gang. This Wiki has valuable information, but also some classic total time wasters like the “”Old Men from Out of Town” story started by private detective David Lawson, which, while interesting in the way that other locker room talk is interesting, has no merit in our Constitutional crisis era of total system failure.
From Aspen Hill Wiki:

“Fake Cops”

Local law enforcement has a very effective and legitimate approach to dealing with localized crime problems. This is “PCAT” or “Police Community Action Teams” programs, in which officers from other areas are given significant opportunities to accrue overtime hours, by concentrating forces in one or a few beats. This effectively floods the streets with both uniformed and plainclothes officers.
Some Organized Stalking groups are well aware of this, and they will occasionally flood an area with their own staff during, or more commonly immediately after, periods of PCAT activity. They can expect cooperation from grateful shopkeepers, mall security, and other property-management types who are allowed to believe that these individuals are operating under, or personally possess, police authority. It’s possible that some persons affiliated with such organizations are in fact police officers, or more likely were at one time police officers. Yet the vast majority of these “Fake Cops” are in fact fake cops. Quite frequently they work with, or are part of, “security gangs”.

“Security Gangs”

Some commercial facilities such as shopping centers or office campuses may be unable or unwilling to afford the level of security available through legitimate private security services. Some such may be approached by organizations offering their services to “help clean up the place”. These organizations are, effectively, unlicensed security officers and also often operate as private investigators with no permits. Or, they may possess permits or licenses which do not apply to this sort of work. For example, Bounty Hunters are in fact law-enforcement and may have special permits… which do not apply to any duties outside of seeking bail jumpers. Yet neither the property managers nor the people “apprehended” (usually beaten, intimidated, or frightened away, instead) by these individuals or groups are quite cognizant of the fact that these persons have no legitimate special authority nor license in these places and situations.

Enablers

Certain specific shopkeepers or property-management people are quite cooperative with either “fake cops” or “security gangs”. To such groups, such enablers are golden. In the rare case that the “fake cops” or “security gang” operatives feel that they are at risk and choose to hide their presence rather than risk the exposure of their operations, such shopkeepers or comparable staffers can act as eyes and ears for the fake cops and/or security gangs. Indeed, given enough time in place, and they may come to manage them, if not in exactly a capacity of being a management-level employee of a corporation or company. Yet they can direct the operations of such organizations, in effect, picking victims.

What makes the documentation of “organized gang stalking” significant in this case is that we see how elements in policing trickle information to security contractors, and “cop wannabees” who then form literal gangs, and use technology and tactics of OGS to seize turf, and “run neighborhoods,” in the disguise of authority; and this, which is a recipe for corruption.
Then, take a look at how “security guards” were an integral feature of “narrative control” in an ever changing story about the Las Vegas shooter Stephen Paddock in order to understand how similar mass shootings are to activities in the Hitler era with Brownshirt marauders corrupting Democracy; and other periods of history where the Constitution of a nation was suspended, diminished, or eradicated entirely.
http://www.latimes.com/nation/la-na-vegas-shooting-20171009-story.html
So, the Maryland Wiki from Aspen Hill has great information, and names some names to some degree, and can help point the researcher, the psychologist, the criminal defense or civil attorney into the right direction in pursuing cases against gang stalkers.
As I have noted, my personal case of OGS began distinctly in 2003-4, and progressed throughout decades, and went into full swing in 2008, and I worked with great lawyers, and began and prevailed in a lawsuit that blossomed to five other independent litigants to literally take a cowardly security contractor OUT OF BUSINESS. As you can see, I am taking my time this time around, and making sure I get it right for everybody.
Without coincidence, 2008 is also when the Department of Homeland Security, working under the “intelligence sharing” platforms where the DEA/FBI/DHS/CIA waged hidden database backdoor searches across agencies, and began to target individuals with ferocity, and devoid of any due process, or even anything resembling due process protections.
In other words, systemic denial of substantive due process became the norm in 2008, as well as a host of other institutional practices that require a separate essay, but simply put: information sharing became indiscriminate, political, slanderous, and frequently sought targets that refused to participate in such a social scheme, which is well documented all over the web as one TI after another becomes targeted with “hidden operations” of many kinds.
Have a look at another of my encounters with hidden internet operators in 2011, which was another big year for DHS backdoor black operations. Like Rose McGwan and tens of tousands of others, we can begin to envision how civil conspiracies of deprivation of rights are traceable to both private contractors, who can  be sued for actual damages, and the DHS which can be sued for complicity and reform, which won’t come easy as major senators sitting on the intelligence committees continue to derive substantial kickbacks under the watchful eyes of the FBI and other agencies.
But because the federal government has managed to skirt color of law claims, due process claims, ad substantive due process claims bu claiming state secrets, FISA exceptions, section 702 loopholes and more, I will leave it to actual lawyers to make the larger arguments.
It is at this point, beyond a reasonable doubt that the government acts pre-emptively in these cases with actual prejudice, maliciously, and with selective enforcement, and that the government has excercised bad faith by using back door searches and OTB methods. But for the lay reader, here below is basic Due Process, 14th Amendment where the federal scheme has shifted the burden of proof to the citizen to bring claims:

Every Due Process Clause analysis begins with the question “Has the government deprived some person of life, liberty, or property?” If there has been no government action, or if there has been no deprivation, then there cannot be a Due Process issue; substantive or procedural.
Substantive Due Process issues involve the states’ power to regulate certain activities.
Procedural Due Process issues involve an analysis of the procedure required by the Constitution when states seek to deprive people of life, liberty or property.

While the majority of persons targeted with these hidden schemes that are waged from behind the DHS and other agencies target low status, low income individuals, a savvy civil or criminal lawyer will see the merits of pursuing redress in cases of OGS because there are other venues whereby proving substantive due process has been occurring on a massive and industrial scale, as we are now faced, literally, with predatory “law enforcement” that is actually not enforcing any laws, but rather, seizing property in record numbers, framing suspects, and using intelligence agency tactics in local communities to create the appearance of crimes instead.
So, OGS has morphed into real estate red-lining, and a CIA styled asset forfeiture racket; but in many other ways too. ANd here is a case from a local community where a citizen has documented other real estate related claims, as did Bob Krlich.
Up until ROGS, few would risk speaking out about ths form of corruption, and worse, the actual language didn’t even exist in many cases, which is by design of the corrupt, and the corruption itself. Look through ROGS foor more links to the dialectic itself-search for tags with “linguistics” and “para-language” and “semantics”  and “jargon” for examples.
One of the chief and main reasons this is allowed to continue is because “security gangs” and “private contractors” are not held accountable to the public, and as we see on an  industrial scale, the public doesn’t even know what any of the many “hidden operators” online are even doing. And how can you litigate for a client, or in a class action lawsuit of the proof of such a diabolical state-level brownshirt scheme remains under authoritarian control, disguised by “state secrets” and other unchallenged privileges?
Well, it helps to have a starting point, but as we see pre-ROGS, there was a dearth of data that verifies OGS as an actual complaint. Fightgangstalking.com is one of the few who has stuck with the facts, and occasionally whistle blowers step forwards; and there are some highly credible online testimonials and a few court attempts like the case of Jeffrey Kantor, but other than that, where to start?!
So-start with the private security contractors and their chain of oversight. and work your way up, combined with other data that proves patterns of state conduct, substantive due process violations that stem directly from the DHS scheme, and the hidden data about back door searches and the electronic trails they leave that became available since Edward Snowden and corporate collusion at the database level.
Further Reading: What is substantive Due Process?

Due Process Clause:
The Fourteenth Amendment reads, in part, that no state shall “deprive any person of life, liberty, or property, without due process of law.” This applies to the states and to local governments. The Due Process Clause of the Fifth Amendment applies to the federal government. Most Due Process issues involve state laws.
Common Law:
The two sources of law are statutory law and common law. The common law is that body of rules and principles developed through the courts over time. While legislatures often overrule an area of common law by enacting a statute, and while courts often overrule an area of common law by refusing to follow it further or by handing down a decision which makes use of a competing principle, the common law carries with it the force of law and is generally binding on courts within that jurisdiction.
Burden of Proof:
In every case one party or another has the onus of demonstrating the truth of some fact or another. The party who must so demonstrate is said to have the burden of proof. In addition to who carries the burden, the burden can be of different loads. For example, in a criminal case the prosecution carries the burden of proof and must prove every element of the crime “beyond a reasonable doubt.” In most civil cases the plaintiff generally carries the burden of proof but must prove every element of her claim only by “a preponderance of the evidence,” which is far short of “beyond a reasonable doubt.”

 

The First Amendment versus the cumulative effect of decades of Fusion Center Spying: time to test drive our rights.

The ROGS reader will note that I have been a target of “the war on pure speech” and due process via “high policing” since 2004, but also, that I saw this coming in 1993 (search this blog for links to these years).
The reader will also note that I have endured decades of harm because I consistently stand on first amendment rights to speech, and have been 1) shot 2) tracked 3) surveilled 4) jailed 5) black bagged 6) slandered 7) much more, because I have stood for speech online and off since forever-but especially after I published stories in 2003-4 that were critical of how internet spyng and offline surveillance were then ad are now measureably worse than anything Joseph McCarthy, COINTELPRO 1, MHCHAOS, or Adolph Hitler EVER did to news media or propaganda and speakers of prtected first amendment speech.
This is all well documented in the record-some Americans are violent animals, who have manipulated the dialectic so abusively that it defies logic, in a lop-sided narrative that pits us against them, women against men, blacks against whites, etc-and “they” all belong to some insider club or another as they do this, in the pure cowardice of secrecy. some, have it far worse than others and some have plainly never been on the downside of our nation’s.
And for the record, ROGS has no more tears to weep for “progressive” white females in power who whinge on about their troubles with guys like Al Franken as if they actually HAVE troubles-these are little more than what Edward Bernay’s did as he manufactured women as pseudo feminist “Liberty Torches“; the handmaidens of the subversion of the Constitution and due process. And NONE of them have ever seen the inside of the jails they built, but should.
I have no tolerance for the one percent, racist zionist’s, dominionists, and others who who work for the One Percent, or new arrivals from India, and other places who have seized the American dialectic of race and forgone any awareness of class issues; or black billionaires like Oprah, for whom no end of derision, or destruction of black men could ever be enough too satisfy her power hunger.
The facts are that white women, for the most part, simply have no burden. Fakerape is a cover for the atrocities that these same wage on primarily low income black, white, and Hispanic men (who they birthed for a state check, and then fed into the prison pipeline), and not just in America; but also, their jaded narrative incessantly murders others around the world.
And too, all of the new arrivals from India, the Middle East, China, or other places have no right whatsoever to wade into the complex dialectic of race in America, without examining who the One Percent are, and how their propaganda system works-and most of them are egregiously wealthy and jaded-not at all the poverty stricken immigrants of decades ago.
These all are co-conspirators in the modern peonage systems of the DVIC, the MIC, and the PIC that targets our own fathers and sons, brothers and friends. Here is more on who these handmaidens off the police state are, from John Whitehead, describing the new peonage system’s in America, and debt bondage:
A Tale of Two America’s  “Despite prior attempts on the federal level and across the country to prevent the profound injustice of locking people in cages because they are too poor to pay a debt,” concludes The Atlantic, “the practice persists every day.”

Related Story: Who are “they”? One of the word games that psychologists/social workers/judges/litigators who are on the state teat like to play is asking you “who are “they”-why are you so important that someone would do this to you?” As if one NEEDS to be important-this is how distorted and out of touch political psychiatry is with the reality of modern policing and political targeting. So tell them to read this post here first, and these here, here, and here in order to understand the diabolical and enormous and unfathomable burden that was foist upon our people after 911
And- who are the One Percent that mocks us, and pits us against each other one generation after the next, in every century, and especially now that our Cnstitution has been suspended, and our own agencies target our citizens every word online, and stalk us in various ways offline?

And so: those who currently milk the DVIC teats (those who get paid hundreds of billions per year) get paid for this, more than anything else. They are complete psychopathic word twisters, and bullies, much as we see with all of this manufactured terrorism that targets the low income, the mentally ill, or the easily manipulated.
SO, in order to understand ROGS’ Thoreau styled peaceful, non-violent resistance to this fully blossomed “security state” that seems to think law does not apply to it, as it applies bizarre, scret, hidden interpretations of law to me/us/you, it is important to understand how long cases are dragged around in hidden dossiere’s and databases that are inaccessible to the public or to those who have been targeted by federal state and local agencies for decades.
And, how this all started at the NSA, when they decided to use a 4 BILLION dollar program to target the speech of American’s, instead of a 3.4 MILLION dollar program, that protected “our” rights (this in and of itself indicates “intent” on the part of government to violate the Constitution, to selectively target individuals and groups, and is prima facie evidence that these speakers were and are targeted; and PRISM, XKEYSCORE, Moonshoot CVE type programs, corporate-government sector collusion, and thousands of other government speech policing activities as well.)
And so, I can state with empirical evidence that  yet another state, federal, or internationalist NGO paid moron who derives their income from speech suppression is reading through stuff I wrote online four years ago, and cross reading other material that I wrote equally long ago. This IS what online gang stalking and speech policing IS-“they” literally databases our communications online, stalk you offline in community policing schemes, for years and years, passing you from one database or Fusion Center to another, without the benefit of a court trial or  court challenge to these practices.
Because, only two people in the world know what my blogs even are, and one of them is my lawyer. The other, is the guy’s/gal’s who listened to my phone in 2004-2016. While on the surface, this will seem a paranoid, or unrealistic claim, I ask the reader to know this: I wrote it here, now, for that EXACT reason, because proving NSA/Fusion Center/DHS/FBI/CIA/FiveEyes/JTRIG data theft and harassment is perhaps one of the most difficult things one could ever attempt to do, but that I attempt it reluctantly, because I have literally had existential threats otherwise. Here- have a look at one of my existential threats, and compare it to this, and this, then, note how I use an underground journalism style here,  and then, decide for yourself.
But this is how online speech policing works, and how it comes offline-this IS what organized gang stalking IS. And, it is against the law, against due process, and against substantive due process-but only if it gets seen in a court room, and sadly, “they” are murdering those of “us” who know this. And-who can afford such a fight in court? This is why fascism is prevailing, on both sides f the political aisle, and in all religious/cultic/sectarian elements in our society. They literaly are DVIC deep in it, together.
One might wonder how I know this about my readers-that they read across blogs, and some of those written half a decade ago? The answer is this: my writing is, primarily, an exercise in pure speech, which has been under attack by federal forces and state actors who hide like cancer along the internet backbone since 2001 (you can easily find my example and today’s proof by Googling “gang stalking” and “psychic driving.”)
In that year, 2001, deep state cults and bankers and states dependent upon federal handouts (otherwise known as “the Cult of Intelligence,”conspired in the sense of true conspiracy to limit our rights of privacy, and every right that could come after that. We are literally in an advanced phase of MHCHAOS, which is a CIA/bankster program to control dissent. And according to the intent of the Constitutional Framers, this is anathema to democracy. But I am one of many who this happens to, and some have it worse than me.
Here is a peek at how this plays itself out online: another blogger was recently imprisoned because some DVIC teat sucking narcissistic prick at the FBI wanted to privacy rape him, and did so because the guy used A SINGLE EMOJI. Then the state paid pathological narcissists kicked in his door, and traumatized his three children-FOR LIFE. His kids are literally scared to open their blinds now. This IS what a police state IS, nearly by definition. Not coincidentally, it is also one of the tactics used during the Palestinian exodus of 1948 and Hitler’s pogroms as well.
Here below is a case that demonstrates how far into the sh!tter pure speech online has been dropped by federal agents and the massive bureaucracy that is the NSA/DHS/FBI/CIA/FiveEyes data rape scheme, where agencies that manufacture terror, use funds to target speakers instead. In other words-the war hasn’t merely morphed from “fightin’ turrerriss'”, but now has openly fired yet another shot across the bow of one of nearly all of the pillars of American Democracy, which is the emoji, expressed in anonymity (….)
From Mike Masnick of Techdirt.com (Masnick is the inventor of the Streisand Effect, and also the Shirky-Masnick Bureaucracy Perpetuation Principle-that states “police states don’t just go away overnight“):

The DOJ’s Bizarre Subpoena Over An Emoji Highlights Its Ridiculous Vendetta Against A Security Researcher

from the lawlessness-under-the-guise-of-law-enforcement dept

Yesterday we broke the crazy story of how the DOJ issued a subpoena to Twitter attempting to identify five Twitter users, not because of anything they had done, but because someone else the DOJ disliked — a security researcher named Justin Shafer — had tweeted an emoji at them in response to a discussion about a different case. You can read all the details in that original post, in case you missed it yesterday. There was so much craziness in that story that I didn’t even get to cover all of it. Some of those named in the subpoena have posted their thoughts — including Ken “Popehat” White and Keith Lee. I suggest reading both, as the subpoena directed at each of them was particularly silly, given that both freely make their identities public. The DOJ didn’t seem to do even the slightest research into the accounts it was demanding info on, or it would have known just how easy it was to “unmask” White and Lee.
As for the other three Twitter accountholders — all of them are anonymous. But the DOJ certainly has zero legal basis for unmasking them. As we’ve discussed repeatedly in the past, anonymous speech is also protected by the First Amendment, and there’s a very high bar for law enforcement to get past to unmask anonymous speakers. EFF’s Kurt Opsahl pointed to a concise statement on this in a recent ruling in the Awtry v. Glassdoor case, which Lee also reposts in his blog:
The Supreme Court has recognized that “an author’s decision to remain anonymous, like other decisions concerning omissions or additions to the content of a publication, is an aspect of the freedom of speech protected by the First Amendment.” McIntyre v. Ohio Elections Comm’n, 514 U.S. 334, 342 (1995). Indeed, “[t]he right to speak anonymously was of fundamental importance to the establishment of our Constitution.” Doe v. 2TheMart.com Inc., 140 F. Supp. 2d 1088, 1092 (W.D. Wash. 2001) (citing McIntyre, 514 U.S. at 341-42). In particular, “Justice Black . . . reminded us that even the arguments favoring the ratification of the Constitution advanced in the Federalist Papers were published under fictitious names.” McIntyre, 514 U.S. at 342 (citing Talley v. California, 362 U.S. 60, 64 (1960)). So too were the responses of the anti-federalists, which were published by authors who used such fictitious names as “Centinel,” “Brutus” and “The Federal Farmer.” In re Anonymous Online Speakers, 661 F.3d 1168, 1172-73 (9th Cir. 2011).
Further, it is well-established that anonymous speech on the Internet, like other types of anonymous speech, enjoys First Amendment protection. In re Anonymous Online Speakers, 661 F.3d 1168, 1173 (9th Cir. 2011)(“online speech stands on the same footing as other speech—there is `no basis for qualifying the level of First Amendment scrutiny that should be applied’ to online speech”) (quoting Reno v. Am. Civil Liberties Union, 521 U.S. 844, 870 (1997)). As the Ninth Circuit has explained, “the ability to speak anonymously on the Internet promotes the robust exchange of ideas and allows individuals to express themselves freely without `fear of economic or official retaliation . . . [or] concern about social ostracism.’” Id.(quoting McIntyre, 514 U.S. at 341-42).
First Amendment protection of anonymous speech “is not unlimited, however, and the degree of scrutiny varies depending on the circumstances and the type of speech at issue.” Id. Political speech is considered to be “core” speech and is afforded the highest level of First Amendment protection. McIntyre, 514 U.S. at 346. Online messages such as the ones at issue here are also entitled to some level of First Amendment protection, even if the hurdle for overcoming that protection is less stringent than it is for political speech. See In re Anonymous Online Speakers, 661 F.3d 1168 at 1177; see also Highfields Capital Mgmt., L.P. v. Doe, 385 F. Supp. 2d 969 (N.D. Cal. 2005) (finding that identity of individual who anonymously posted derogatory comments about a company on an online message board was protected from disclosure under the First Amendment); Art of Living Foundation v. Does 1-10, No. 10-cv-5022 LHK, 2011 WL 5444622, at *5 (N.D. Cal. Nov. 9, 2011) (finding the standard articulated in Highfields applied to anonymously posted online commentary criticizing the plaintiff’s organization).

That the Assistant US Attoreny, Douglas Gardner, who signed off on the subpoena, either didn’t know this or didn’t care is hugely troubling and problematic. As Scott Greenfield colorfully summarizes of the federal agents involved in this case, looking at the details, “this situation is so utterly idiotic as to make one wonder how they can get out of bed without hurting themselves.”

It is important to note that in the one extant study cited online, that “targeted individuals are trapped into an echo chamber” it is extremely difficult, if not impossible for he average targeted individual to prove that they are indeed targeted and that their experiences are the cause of hidden actors. Because what is happening is tha one hidden actor passes your data to another hidden actor,,  and across state lines and across databases for years and years, as “they” build dossiers and tabulate potential speech crimes online.
SO it is beyond a doubt that these hidden actors are what I say they are-and that online speech itself is under attack. In fact, “they” have engineered an entire generation of online speakers who were entrapped at the internet switch from birth, as any kid born in 2001, who woke up to internet use between 2005-2017 has had their ENTIRE ONLINE ACTIVITY recorded at the NSA, and then, that data was given to 16 other US agencies to cull through, as well as Israel, which is a theocratic apartheid state.
Best of all, all of that data that was captured is now stored in Utah, at the Utah Data Center, which is controlled by Mormons. Does that make you think a bit about what is pure speech? What is “free” speech? And what is Online speech?” And especially “can speech be leveraged against a person’s other rights aka blackmail?”
I will let you answer that question yourself, but also leave you to ponder: what if all of your child’s data was kept at the Catholic Vatican; or in Saudi Arabia’s Mecca-maybe at the Forbidden City? Would you trust THOSE people with your data-and all of the back doors they have demonstrated that they use to manipulate you and your choices? So why do you trust the NSA/CIA/Zio-dominionists and their Mormon pets in Utah with it?
Yup-without a doubt, we see certain theocratic interests working from within secular cover to mediate the future of your child, from hidden positions along the cancerous internet backbone. It is extremely hard to document this link.

Related Story: How The NSA Hides Section 702 Surveillance with no oversight, or meaningful reform. Or “the definition of an un-Constitutional surveillance state.”

So-what CAN be documented is the ROGS model of using honeynets to catch stalkers in action. As I have documented- I have ad death threats, rape threats, and worse for many years for just speaking up. And, I have had many people before today’s special reader try to mis-use my words, or otherwise construe their meaning as potentially harmful. Obviously, I am not in this for fun.
Here, have a look at were my actual gang stalking began, in 2003-4, which was a “pure speech” related series of events, as opposed to a bunch of crooked people from various cults and sects of American society harassing me previous to that. And here is when it went into overdrive, and also centered around free speech expressed online.
See how long they-whoever “they” are can drag these things out? Yup. It is an insidious and completely new form of harassment that has up until ROGS avoided being named properly, because it is an overwhelming form of social dysfunction that has been enabled by the total surveillance state. And by design, it is nearly impossible to challenge, in life, or in a court room. But is IS what gang stalking IS online.
Well, as we see today the trend is that the “deep state” has sought by every hook and crook to stop speech at the switch using initiatives and pretexts ranging from “save the 16 year old girls of Japan (so that international bankers and white females can pimp them); to the nefarious Save Eastern Sex Traders Act, which seeks to keep online speech relegated to the middle ages, so that the same tribes and groups can profit from the control women, AND control narratives after that. Because boogiemen, of course. And scapegoating-lots of scapegoating.
And, stealing my GPS here and there too; or working from within public and private sectors and corporate “partnerships” to obfuscate rights; or black bag a reporters notes here and there. Don’t forget that.
 

Sex workers, FiveEyes-DHS-ICE-HSI investigations, asset forfeiture, and fakerape: gang stalking and real estate links.

Anyone who scratches the surface of the OGS dialectic soon discovers that sex workers are frequent targets of stalking, especially women and men who work “independently” away from all the captain save-a-hoes and the various DVIC prostitution profiteers and NGO’s.
But less obvious is that frequently, they are inter-generational targets of all kinds of abuse beyond sexuality: sex workers are a “ca$h cow” for social services and the DVIC, as well as police and psychology. And that, inter-generationally. It is a situation that hasn’t changed in the history of the word, because prostitution is the world’s second oldest profession, just after those who claim to be policing it by peeking through the bushes.
So, as we see that there are also connections between militant lesbianism, state level pimping, and the gender feminist sex wars of the 1980’s, updated to include high heels policing, we see today how “far” these have gone to “own the machinery” of power. Beyond the obvious flaws in their narratology, that of swapping one group of financiers an “patriachs” for another- is the fact that pimping BY women OF women is more frequent these days.
So, let’s explore an actual case scenario drawn directly from life, and directly from the OGS online dialectic. I will not point to my source, but suffice to say that I have documentation ranging from police reports to witness testimony to ICE records of deportations.
Save the women! AND pimp the female sex offenders!
Politics and pimping make strange bedfellows as we see in the current Palestinian styled whisper campaign where western Holy Warriors working from within the DVIC framework run narratives and scripts about saving women from “abuse” as if women have no accountability, or agency in their own lives. The “hidden hand” of “occult activity” aka “culture wars financed by George Soros, et al” is all over these whisper networks, and I suspect, a direct product of “foreign mystery money” that flowed in to our politics after 1993, at the height of the lesbian sex wars where women sough control of other women, pornography, and sex.
And as we see in case after case of OGS where real estate is involved, we also see the hidden  activity of NGO’s and other “morality pimps”who derive their sustenance from federally incentivized crisis PR campaigns. And, the fingerprints of pseudo-feminism are all over organized gang stalking, ranging from the political alliances and allegiances of the “two studies ever on gang stalking” to the online “four horsemen of pseudo-feminism” and the language of those who participate on blogs, to SESTA, and much more. .
So, here is an actual example, drawn from several online stories of how this works in practice:

  1. a political constituent is targeted as an influencer by the hidden FiveEyes/ DHS/local bureau hidden activity and the  apparatus of online speech control (Tom Schweic, a Missouri politician who committed suicide is likely an example of this but there are many more).
  2. the constituent is blackmailed, compromise operations are waged, and a smear campaign begins
  3. ICE targets that persons property and real estate in a hidden investigation as local enforcers selectively enforce codes and ordinances
  4. the HSI pre-crime property assessor shows up in the yard
  5. Rental properties are raided, selectively, tenants are deported
  6. the landlord becomes aware that their rental applicants change from ordinary working people and college students into a steady stream of prostitutes, shady drug dealer types, ethnic/racial activists from NGO’s and local “cliques and mobs” of people
  7. of the candidate pool, the landlord leases to a female sex offender.
  8. other tenants on the property are then suddenly accused of sexual harassment, and attempted rape (as we see today, this has become the norm, not the exception in politics and media-and that litigated in the gray area of public opinion, rather than law).
  9. other tenants sign leases and break them in days, or move in a minimal amount of personal property-just enough to constitute legal tenancy, and enough to get the keys to the property.
  10. security camera’s become targets of destruction, the surrounding neighborhood becomes a battle ground of hidden covert activity, constant break ins and other odd happenings, sometimes with squad cars right up the block.
  11. much more. Here is a site that chronicles this activity, above,  and I suspect the author is themselves a covert, but also possibly an actual TI as they live in a Catholic and Protestant cult saturated area of the world.

 
All of this above will also be accompanied by the usual GS activity ranging from internet and communications manipulations/hacking/disruptions; and every city vehicle ranging from the dog catcher to firetrucks; and bright lights shining through windows and most other features that are well discussed online, and more(how bizarre can you get? This is how bizarre these campaigns are.)
So, as we see, in the research of the extant blogs, there is a connection between sex offenders, sex workers, NGO’s, the FiveEyes, NSA data capture ans backbone activity, and the police practices in some areas of the country that are heavily reliant on federal funding. Fusion Centers, colleges, local police departments, and more will be involved.
And we see time and time again, a connection to “gray area policing,” local syndicates, and a new form of red-lining, where certain state and local actors control the cell block by using heinous, constitutionally cringe-worthy practices.
And, all of that, under color of law, and subversion of internet. There are many cases online where this can be verified if the researcher merely Google’s “real estate and gang stalking.” One case I am currently monitoring has all of these features and more-including claims of directed energy weapons, which I will not discuss, other than to say that it is a feature in that case.
But there are indeed links between organized gang stalking and lesbian feminist sex wars and prostitution, which are under-explored, and until now, hidden away “in darkness,” as they like to say. And, most of THAT begins in academia, via academic stalking, which is a separate blog entirely. And as usual, don’t take my word for it-I’m just the “potentially”dangerous crazy guy on the internet.
Do your own homework, test and retest until the cows come home (which they never will again, now that we are a socialist nation in high heels), because ROGS claims are for the most art, empirical. And, I can name names too.
UPDATE, 03/12/2020:
I wrote this post a couple years ago, and as you might have guessed, the landlord in this case was me, lol.
And recently, while revisiting my evidence, I discovered that one of the tenants mentioned above has now died. Of suicide.
In that case, the tenant was a guy named Jonathan Grey, who was one of those move in/move out lease breakers that I mentioned.He claimed he found a,single cockroach in the home, but never presented it to me.
In that case, he was also a Team USA Minnesota runner, and the nasty gang stalking cunt who threatened me if I didnt let him break his lease–and she threatened me in writing–has a name: Patricia Goodman, the founder of Team USA Minnesota, which has now been renamed, and transferred out of her ownership.
Goodman had threatened to have city agencies declare my property a “sickhouse” akin to a house that had an epidemic in it. I told her I would see her in court, and later, that I would sue her for malicious conduct, AFTER I kicked her ass in court. I never got the chance, but I will publish our letter exchange at a later date.
Here is more on Jonathan Greys suicide.

And here is Patricia Goodwin, an actual gang stalker

And here is her email, feel free to repost it.
[email protected]
 

The new red-lining? Gang stalking, 24/7 harassment complaints, mainstream news, and real estate links

Group stalking, multi-stalking, organized gang stalking and 24/7 harassment complaints: “The victims of the gang stalking have tried seeking relief through police reports and civil complaints that have gone to court, but nothing has changed. My friends have had their house up for sale for over a year because they feel it is the only way to escape the daily staring and leering and name calling that they hear as soon as they step out onto their own deck. New Jersey Herald

Real estate red lining is illegal. Realtors, communities, and independent home sellers cannot discriminate in the sale or rental of property.
However, as we see time and time again, local real estate “syndicates” controlled by elements from within policing can and do exactly that all across America. These collusions are also known as “community policing” volunteers, aka “Red Squads” which are well documented in the historical records, and a practice of the current DHS schemes too. And, at the center of every transaction is a lender, who is the shot caller in these local-to-international mobs (Hi Kevin!).
So- ROGS asks: do banks and lenders show discriminatory preferences for police and fire and state unionists-and their relatives?

Related Story: Have police and fire pension funds turned into racketeering-or worse? Dallas Police and Fire Pension brouhaha asks: How enmeshed are these plans and schemes anyways? RICO seems so long ago! After all- there are so  many “little people” who can be exploited in the modern Kafkaesque drama’s playing out all over America as these elements work to “frame” every discussion to hide insight into “public dealings” that aren’t necessarily “in the PUBLIC’s interests.

Here is a case where again, we see a clear link between real estate and gang stalking, as documented in the New Jersey Herald in 2013.

‘Gang stalking’ threatens lake community family

Posted: Jul. 20, 2013 9:52 pm Updated: Jul. 26, 2013 1:00 am
By: Donna Weatherwalks [click the link for he whole story!]

I live at a lovely lake community where many wonderful people live. However, amid all of the wonderful people is a group of at least eight misguided and sadistic people who have chosen to “gang stalk” two of their other neighbors on the block.
Gang stalking is a known phenomenon which can be difficult to believe and even harder to prove. It involves a group of people who band together for the purpose of targeting another individual or individuals in order to control aspects of their targets’ (victims’) lives and to monitor them 24/7.
I have been witnessing this happening to my friends since June 1, but they have been experiencing the daily stalking since 2011. The victims of the gang stalking have tried seeking relief through police reports and civil complaints that have gone to court, but nothing has changed. My friends have had their house up for sale for over a year because they feel it is the only way to escape the daily staring and leering and name calling that they hear as soon as they step out onto their own deck.
The gang has even gone so far as to call the police to make a false report against my friends in an attempt to get them into trouble. We wonder what they will do next.
Because the gang’s behaviors are not “criminal acts,” the police are limited as to what they can do, and the matter is complicated by the fact that the foremost member of the gang has a family connection with the local police department.

 

And keep in mind that New Jersey is already documented in the record participating in gang stalking-and that Goggle returns 613,000 results for gang stalking and New Jersey, but also that Rotary clubs and other insider (in-groups) are implicated by some in everything from active shooter training that takes place curiously close to actual mass shooter events to crisis PR dilemmas where they ask “is it ok to have arrows on our logo?” and other events that seeks to diminish the second amendment’s protections.
As some/you might have noticed: a movement is afoot to force the Constitution from our hands, through slanted story telling, and “the hidden hand*” of religious doctrines guiding our speech rights. We have the “deep state” with it’s hand in former FBI director James Comey’s ass, puppeting Reinhold Niebuhr, and everywhere you look in the dialectic of OGS you see this other “hidden hand,”which has long been the sign of “Masonic” orders.
Here- just so that you know how non-sectarian free masonry is, look here at the Beatles:

And then look at this controlled asset, Ted Cruz-and I can’t help but wonder whose hand is in his ^ss, or how he is being leveraged into the insanity that is his platform:

But don’t waste too much time over-thinking it, because what matters is that they are all in it one way or another, sticking their cultish Abrahamic/Masonic crap up your arse as if you are a puppet. Then shout out to the moron who designed this page here from the FBI countering violent extemism program (CVE), and the bloody irony of how that thing works in practice-like a hidden hand in your internet switch, on your cell phone, and “around every corner.”

Related Story: Where did 24/7 surveillance of American’s begin? How did the NSA-Israel data theft pipeline happen? When did modern slavery by another name, aka the MIC/DVIC/PIC control of narrative begin? Ask Leo Lewis, Hollywood financed domestic spy.

So: when did the hidden hand take over real estate in America?
They pop up ALL OVER the DVIC money pot starting in 1993, building to a pet cause of “Stalking the Stalkers” in lop-sided domestic violence scenarios that have sought for forty years to throw America into the religious and arch-conservative theocratic paradigms of gendered narrative. As I have said repeatedly, if you scratch the surface of most gang stalking complaints, you will find “secret society” involvement. Lion’s and Tiger’s and Rotary– Oh My!
And the weaponized Boys and Girls Clubs, and the many headed hydra headed AIPAC affiliates and the hydra’s of NGO’s  are all monetized by mystery money and junkets overseas where backdoor deals take place to sell our democracy and erase due process AND the Constitution on the cheap.
With lots of help from behind the curtains of Oz and Fusion Centers, using “high policing”  of course, which are the de facto ground zero for plotting these domestic operations and social engineering, where domestic para-militaries under DHS contracts work with foreign spy rings,  work with blackmailers and gang stalkers in every American community-as these vertically integrated, internecine campaigns of domestic terror are waged on individuals from “outgroups” by the well heeled in-groups; the nexus and gathering point where all modern discrimination takes place.
But gang stalking is real, Dorothy-Look! It’s says so in a newspaper! And we’re not in Oz anymore-we’re in Slipperyslopeville, which is right next to Greater Tel Aviv, and it looks like the ground is shaking under the weight of all that laundered capital that finances the DVIC.
But that could also be my apophenia kicking in too, as my bicameral mind is probably in a classic conflict with Sigmund Freud’s D.E. Cameron Syndrome and under the influence of the polarized Gregory Batesonesque MSM, and exacerbated by psychology’s little “official source gas-lighting” problem.
And worse! For some reason, in bouts of deep apophenia, I obsess over the fact that John Nash’s biographer- the author of “A Beautiful Mind”-was also the daughter of a CIA case officer….yeah, I know: I’m the crazy guy on the internet; just one “potentially dangerous” voice from a tribe of troubled minds who are starting to see the links between real estate and organized gang stalking.
And, a few other things, too, like how “high policing” is what police corruption IS nearly by definition.