Baltimore Detective Sean Suitor: another gang stalking death by “suicide.”

I am about to take a sh!t in the face of the Baltimore police commissioner Gary Tuggle (sounds like snuggle, but with tugs) and take a p!ss on the thin blue line like a free-speech green beret, because writing about police gang stalking can get people killed, and worse….:

Related: FBI initially refused to investigate Detective Suitors death by gang stalking, because it would open thePandoras Box of Panopticon-related electronic surveillance data available to any investigator.

Gary-do you mind if I call you Gary?-you are either a mobbed up piece of shit,or, your investigation into the alleged suicide of Detective Sean Suitor is a fraud.
And I am calling on journalists,and personal injury attorneys to investigate the following via FOIAs,and other means, because this is what gang stalking IS,and how it often ENDS:
Baltimore police commissioner Gary Tuggles investigation into the organized gang stalking related death of Sean Suitor is flawed.

Heres why:
The suggested outcome of police and counter-intelligence perpetrated gang stalking is always one of three well known options, and outcomes, stated in thousands of Talkshoe podcasts,Youtube and Vimeo videos, and thousands of blogs online, that of themselves, form a “threat narrative”:
1-the targeted individual will be driven to madness or phony mental health lockups, as we see with NYPD whistle blower Adrian Schoolcraft, and Pennsylvanias Andy Ostrowski, who brought attention to judges, social workers, CPS,and police LITERALLY selling children in a scandal called Kid$ for Ca$h.

2-frame jobs,set-ups, and parallel constructions of cases and alleged crimes or other charges that lead to incarceration is frequently threatened by the hidden gang stalkers online, (as we saw with the targeted incarceration after stalking ofthe man who filmed the Eric Garner homicide)and also by the hidden internet operations of the United States Air Force Office of Special Investigations, aka “OSI Informers,”, which is a notorious gang stalking operation, included and validated as an actual government-military-police operation/co-operation in Wikipedia, and online in thousands of online postings, blogs,and other media, and not incoincidentally, the Open Systems Interconnection model (OSI model) provides a technical templatewhereby corrupt institutional actors can utilize Fusion Centers, cell phones,and even police squad car GPS and cell phone towers to triangulate and locate every single bad actor who was at, around, near, or far from Detective Sean Suitor in his final days.
Did you query THOSE databases, Gary?
Did you check Suitors online presence, and offline emails for signs of blackmail, or compromise, in the days, weeks, months before this event?
I mean~some of us got that sort of local pork/DHS/Fusion Center/FBI/NGO/community policing blackmail for DECADES.
It seems that, in Suitors case, gang stalking woul be very easy to prove,now that we know how whistleblowers are monitored.
Because if you did, you would have found the most basic evidence-that Suitors phone was AT ALL TIMES connected to the NSA and the Panopticon.
Here is an example of the multi-layered model from Wikipedia whereby these institutional bad actors-most notoriously the FBIs Cowardly Due Process and Constitution Subverting Infragard, who are the exact politicized, sectarians most cited online as actual organized gang stalkers-redirect/switch/re-route/and spy upon citizens “24/7”
1280px-OSI-model-Communication.svg.png
~Mr.Tuggles- did your investigation of Suitors death include data from the 77 Fusion Centers that would have showed you ALL of the devices and web applications connected to Suitors phones?
Or the criss-crossing data points that would show you who was stalking him- I mean-you assholes use cellphone tower dumps all the time to catch all kinds of small fish, and guys with dime bags of weed-so, who was near Suitor in these hours? Who were THEY talking to?
But,Gary, heres a butt-simple version of what Infragard spies, working from Fusion Centers, poluce departments, law offices and and others who abuse our communications do at the local level: they “manage”us in our many electronic“instances,”by“monitoring” of our lives, and incidents, of course.

OSI management,from Wikipedia:

Management functions, i.e. functions that permit to configure, instantiate, monitor, terminate the communications of two or more entities: there is a specific application-layer protocol, common management information protocol (CMIP) and its corresponding service, common management information service (CMIS), they need to interact with every layer in order to deal with their instances.

3- Obviously, suicide is the most frequently suggested outcome f nearly ALL OGS that targets whistle blowers,and others who encounter gang stalking, and obviously, this is Mr. Tuggles official conclusion, despite unprecedented closing down of an entire neighborhood shortly after Suitors death, and unprecedented disinformation campaign run as cover, that ACTUALLY claimed witnesses to a scurrilous suspect that likely NEVER EXISTED and if there was anyone there, they would have been a witness(which is likely why the neighborhood was closed down in the first place.)
So, to the reader, the journalist,the personal injury attorney, and others who are aware of Detective Sean Suitors case, have a look at how incomplete Mr. Tuggles investigation was, in an era where the FBI routinely, and daily flies airplanes above Baltimore, and uses Hyper-spectral, push-broom thermal imaging electronic equiptment that can LITERALLY make a 3D model of you taking a shit in “the privacy of” your house.
Sure~nothing to see.here folks, mive along now.
No electronics or harassment at all, most conspicuously not in Mr. Tuggles “investigation”into the organizedgang stalking of poluce corruption whistle blower Sean Suitors death by curious suicide, one day before he wasto testify about police, racketeering behind the badge.
MooooOOOOooove along now, little sheeple- and dont forget to wear your high heels.
Related Story: Detective Suitors wife rejects the suicide theory.
Like most investigations of police and counter-intelligence gang stalking,all of the new tools and toys that these dirty cops use on citizens to “cut the victims throat with Occams Razors”, can also be used to investigate “strange” police whistle blower “suicides.”
Or, can they?
Is Panopticon just a one way street, littered with those who still recall what a democracy is, and the civilvrights and due process that it stood for, before the NSA-Spying on citizens took hold?
Final Analysis: What is the US Department of Defense Four Layer model?US Department of Defense Four Layer Network model?

Manufacturing terrorism suspects, fake web pages, and informants using lots of rope in darkness: modern lynching online and CVE programs

Whether the target is a Muslim, a Mormon cattle rancher, a black activist, or a poor white kid like William Atchison who get stalked online and then offline by agents provocateurs, aka DHS/FBI/DIA/private contractor/NGO/foreign spy outfit unspecified, informants, a few patterns stand out in the data:
UNDERCOVER FBI AGENTS SWARM THE INTERNET SEEKING CONTACT WITH “TERRORISTS”who they then profile via behavioral analysts, psycholigical operations, and then endlessly monitor their speech online and off, in concert with HUNDREDS of agencies, and using NSA data.
The FBI’s online activities are so pervasive that the bureau sometimes finds itself investigating its own people.

Almost all targets of provocation are male.
All targets of provocations are ensnared online, and followed, monitored and more offline for using words~aka pure first amendment protected speech~sometimes for decades since the NSA dumped hay all over needles in a theretofore previously non-existent “haystack.”
All targets of provocateurs have long term contact with people working under the counter-terrorism rubtrik, or so calked community policing, who seek to INFLUENCE the speaker, from hidden or occulted positions online and off (for instance, social workers, college, or DV type “counselors” target and track individuals, usi.g multiple databases, and share information about their targets with police)
All targets of these hidden programs are manipulated in “directed conversations”which is well documented in the online TI community,and this unrecorded anywhere.
All targets are manipulated, and frequently their most base impulses to food, clothing and shelter~indeed, their base drives, what Freud called libido~are used as tools to manipulate them, and much more, as we saw with the Tsaernev family being targeted for a decade BEFORE the Boston bombing, as well as in the cases of the Seattle Somalis employment and travel being stifled by federal agents, hearsay, and policy (not law.)
In any study of what is colloquially called mind control, and stemming from Nazi/US/British styled torture, or the well documented MKULTRA and its companions Monarch, Bluebird, Phoenix, Gladio-all of these used base drives as ways to manipulate subjects and targets.
And, all base drives, stationed a man, or a woman in the middle to impede or encourage the target toward one or another behavioral goal. So, any study of targeted individuals must account for ling term state/federal ibstruction of base drives, and achievements.
Related Story: Niftygerbil, Niftychinchilla, and other Nifty names for Tor nodes, courtesy of the same geniuses who gave the world Monarch and Bluebird.
So, we see now, the entire organized gang stalking dialectic mirrors the ACTUAL complaints of targeted individuals. Refer to the ROGS BINGO card at the top of this blog for comparison.
So, OGS is far from a delusional complaint, and rather,indicative of manufactured terrorisms un Constitutional basis, and the occulted use of informants whose work in online terror/criminal/other incitement is undocumented by design-a totally unchecked use of actual psychological operations-agents provocateurs actions are not on the record, or in courtroom documents either.
So, in the very least, these online influence and psyops using unchecked, unregulated, hidden, occulted and obscured methods, repeated over time, do indeed form, as the good doctor Lorraine Sheridan has noted~a closed echo chamber, echo chamber, where words themselves are the primary targets, as are the individuals who use the words- they are literally under close monitoring every time a banned word hits Google/Wordpress/Twitter, etc.
Here from NBC News is a story about how the FBI uses informants online and on social media in occulted fashion to police pure speech, and then, to target individuals:
https://www.nbcnews.com/storyline/isis-terror/no-lol-matter-fbi-trolls-social-media-would-be-jihadis-n226841s
And here is a bit more about that from the Intercepts Cora Courier in 2017: ghttps://theintercept.com/2017/01/31/undercover-fbi-agents-swarm-the-internet-seeking-contact-with-terrorists/
“”According to the guie, an online counterterrorism investigation can target websites or online networks that the FBI believes terrorists are using “to encourage and recruit members” or to spread propaganda. Such probes may extend to the administrators or creators of those forums, as well as people engaged in “the development of communications security practices” or “acting as ‘virtual couriers’ for terrorist organizations by passing online messages among members or leadership.”
The guide classes as online investigations those that rely primarily on online informants or undercover employees, and those that involve surveilling internet facilities or foreign websites hosted on U.S. servers. The FBI often runs such operations jointly with other U.S. intelligence agencies or “international partners,” according to the document.
Since 2008, the Counterterrorism Division has coordinated these operations under a program called the Net Talon National Initiative. Net Talon uses informants, linguists, and FBI employees working undercover, posing as ordinary internet users, to zero in on terrorists’ use of the internet, according to the guide. The initiative was meant to centralize expertise on particular targets and platforms, to “address intelligence gaps,” and to create a clearinghouse of the intelligence the bureau has collected on terrorists’ use of the internet.
The FBI’s online activities are apparently pervasive and uncoordinated enough to lead to confusion. The document refers to “resources being wasted by investigating or collecting on FBI online identities,” including undercover employees, informants, or people who have already been investigated by other offices or agencies. An FBI official told the Intercept, “You would be in a forum, and you’re like, ‘This person’s way out there,’ and we’ve gone and opened up a case, and sometimes that was a local police department, or a friendly foreign service. There are still instances of that, and deconfliction is still necessary.”
Khurrum Wahid and Joshua Dratel, defense attorneys for Ahmed Omar Abu Ali, answer questions from the media after Abu Ali was sentenced on March 29, 2006, at a federal court in Alexandria, Va. Photo: Alex Wong/Getty Images
THE COUNTERTERRORISM POLICY GUIDE shows just how much flexibility informants and undercover agents have when operating online, even when they’re not working specific targets. The FBI insists that there is nothing to see here: In statements provided to The Intercept, the FBI said that “while there are obvious differences between online and offline environments,” FBI employees and informants working on the internet are subject to the same rules, and that bureau employees can only monitor people’s online activity as part of an authorized investigation.
The guide, however, suggests that the internet offers areas of ambiguity. Much comes down to the questions of what informants can do, as opposed to FBI employees, and whether the goal of an operation should be construed as seeking to obtain specific intelligence, simply watching public websites, or developing a profile for an undercover identity.
For instance, the guide states that an FBI employee can visit a message forum or blog only when the site is relevant to an investigation. An FBI employee, according to the guide, could be an undercover agent or an “online covert employee,” a term that presumably refers to FBI workers other than agents, like analysts. FBI employees can’t chat online with someone who isn’t already the subject of an investigation for the purposes of gathering intelligence on that person. They can, however, “engage in unlimited communication with associates” of a person under investigation, if the conversations are relevant to the investigation.
Informants and undercover FBI employees are also allowed to do a great deal online in the name of “building bona fides,” such as creating fake identities or making themselves appear to be normal commenters on online fora. The guide says that in order to establish credibility, FBI employees “may make postings and communicate with individuals who are neither the subjects nor the associates of subjects … there is no limitation with respect to the amount of communication [they] may initiate in this regard.”
And the FBI is allowed to open new investigations on people it identifies through “passive monitoring or active communication” on websites.
An FBI spokesperson clarified that in order for an undercover or covert employee to monitor a website or forum, the site must already be associated with an investigation, “either because the forum was known to be used by a subject [of an investigation], or because the subjects are there. I can’t be in the forum trying to bait you into conversation.”
However, the FBI acknowledges that when its employees participate in online fora, they interact with people who may be bystanders to whatever activity led the bureau there in the first place. And that is not accidental. “We want to know if the subject has other people who are joining in, which people are part of the activity, and who is just there,” a spokesperson explained.
In other words, FBI agents can post and chat online with people who have nothing to do with an investigation, so long as they aren’t collecting intelligence — but in the course of those online communications, they can decide to start investigating someone.
Michael German, a former FBI agent who is now with the Brennan Center for Justice at New York University Law School, said that agents have always had a little bit of wiggle room in this regard. They can have a certain number of in-person meetings with someone, or in some circumstances go to public meetings or public websites, without identifying themselves as part of the FBI. This helps agents avoid a bureaucratic mess when carrying out a simple “buy and bust” drug sting, for example, German said.
But the ability to conduct unlimited online conversations in the name of building bona fides gives agents “a pretty long rope,” German said.
Criminal defense attorney Khurrum Wahid, who has handled or been an adviser on many national security cases, notes that FBI employees or informants frequently pose as experts offering guidance to lost individuals.
“These uninformed young people go online and become almost smitten with people who show a level of knowledge, who often turn out to be informants or undercovers,” said Wahid.
Informants operate under looser rules than FBI personnel. They are allowed unlimited engagement with a target in the course of an “assessment,” a preliminary investigation that can be opened on a loose tip of suspicious behavior, in order to collect general intelligence on a subject, or to evaluate a potential new informant. Assessments were created as a category in 2008. German finds their allowance for the expansive use of informants problematic.
“What we’ve seen in sting operations is that there is this shady portion before the official operation begins which often involves the informant,” said German. “And then it’s passed off to an agent, and it looks like they are ready to commit a crime pretty quickly.”
Wahid noted that at least in online cases, there are generally logs of all the conversations between suspect and informant, whereas “when it’s a live informant, they can turn off the recorder and we never know what it was all about.”
The use of informants in counterterrorism sting operations has expanded since the 9/11 attacks, when the FBI adopted the mantra that its job is to stop terror attacks before they occur, not just investigate them afterward. The government argues that the anonymity the internet affords to suspects necessitates an aggressive approach, including stings. The FBI’s national security director told the New York Times this summer that “using undercover agents online allowed the FBI to ‘flesh out’ suspects by gaining their trust and persuading them to disclose their real identities.” In some cases, the FBI even created fake webpages in order to draw in suspects.
“Agencies are under a lot of pressure to find a needle in a haystack, something that has haunted us since the beginning of the war on terror,” said Karen Greenberg, director of the Center on National Security at Fordham Law School. “It’s true that the internet has changed everything about how we communicate, but are we just going to be trawling online forever? It turns the principles of criminal investigation on their head.””

Facebook investor agrees with ROGS: Facebook is worse than Hitler's propaganda

My regular readers will note that day after day, we see that my many “theories” and so on are validated by surprisingly rational people-and, sometimes, by billionaires too. But “mind control experiences on the internet” are real, Dorothy! And-the internet is planned that way from the state level to the corporation that does this crap-these are inter-conected in the endeavor of brainwashing us the peeple- social media like Facebook, Twitter, Snapchat and more are ALL actively seeking to influence us, manipulate our dopamine levels, our choices, and more.
So-if the corporation is doing that, what do you think the Company might be up to? I think all those “color revolutions” and “jasmine” in the ME provide examples of ‘what is possible’ don’t you?
I saw something! I am SAYING something, officer Friendly! I saw some vampires that need a kick in the teeth! And those vampires are using mind control on children-and even putting creepy crap into their Youtube viewing!!!
Here- have a look at what I said a few months back-after I got p!ssed that OGS denialist’s were overlooking how some are using the internet to actually target, harass, and cause harm to others, AFTER they had entrapped all of our data, and passed us around inter-continentally as if we are mere drunken air hostesses or floozies(.)(.)
I said: This here about “memetic neuro fasciitis,”and a bunch of other stuff about how the internet is in fact-and in PRACTICE being used to manipulate urr minds, in real time. And look-the ACLU has noted the Fusion Centers are themselves complicit in manipulating user data, and Twitter even plugged the “firehose” that subverted our free will at the switch. In fact, my lone wolf cry in the wilds has produced what could well be the Snowdenball effect, where the whole spy apparatus gets the firehose turned into its own Panoptical eyeballs. And, gang stalking will take a kick in the teeth too, cuz guess wut? People from 12 nations peeked in here today alone!
lone wolf journalism
And look! Even Tim Cushing over at Techdirt.com [link here] and Mark Harris of Wired is kicking Peter Thiel in his crystal balls. Big Data Lawsuits will be bigger than the Big Tobacco Lawsuits by far:

Mark Harris of Wired has put together a fascinating expose of the company’s work with US law enforcement based on documents obtained via FOIA requests. What’s uncovered does little to alter Palantir’s reputation as an enemy of personal privacy. What’s added to this rep isn’t any more flattering: the documents show Palantir handles data carelessly, ties customers into overpriced support/upgrades, and otherwise acts as though it has to answer to no one.
In one case, files marked as sensitive by a Long Beach drug squad detective were still accessible by other officers who shouldn’t have had access. Multiple emails to Palantir failed to resolve the issue. Making it worse was the fact the problem couldn’t be contained in-house. When agencies sign up for Palantir services, they’re given heavily-discounted rates if they allow their data to be shared with other law enforcement agencies. Detectives hoping to protect sensitive sources and undercover cops from outside access were finding out their employers had signed that option away in exchange for cheaper initial pricing.
That’s just the beginning of Palantir problems uncovered by these public document requests:
In the documents our requests produced, police departments have also accused the company, backed by tech investor and Trump supporter Peter Thiel, of spiraling prices, hard-to-use software, opaque terms of service, and “failure to deliver products” (in the words of one email from the Long Beach police). Palantir might streamline some criminal investigations—but there’s a possibility that it comes at a high cost, for both the police forces themselves and the communities they serve.

Yup- all the hungry yvampires are programming your children, and milking all of our data. Well-not MY data per se, as I don’t use social media, unless I am experimenting or doing security research. I am targeted in other ways that Facebook users are not, because I have been stalked, hacked, harassed, targeted and worse since 2004.when I wrote a few news stories about neo-McCarthyism. How wrong I was then-because it’s so much worse than even ol’ Joe could have told us then.
But, as we see-the FBI takes down web pages after mass shootings- because SOMETHING is wrong over at Facebook, and how some peoles data streaam is influenced-but it’s also wrong all over the web in general. And I am on record as being perhaps the fist person anywhere, ever to draw these comparisons, or point the reader, and the journalists to how “the internet” is being used by actual real people, in real time, to harass and manipulate people online.
Well-have a look at what this lil’ ol’  billionaire is saying a couple days ago: Roger McNamee “likened the techniques of the techniques of the company to Mr Bernays and Hitler’s public relations minister.”
So, to the researcher, the psychologist, and the potential future litigant-but ESPECIALLY to the litigator and the criminal defense attorney, take note that the official denial of organized gang stalking has taken a major hit and that Edward Bernay’s version of brainwashing has made it into the MSM-so ROGS isn’t alone in comparing “the internet” to mind control, or providing examples, as ALL major works of previous propaganda are now in line with the ROGS thesis.
And, while you’re here, please take a copy of the ACLU, EFF, NACDL’s guide to government hacking along with you-now if we can just get to work on a “guide to government mind control practices” we will speed this along, all the way up to the FISA court. (did that ding any bells there at the Fusion Center? I hope so, because police states don’t just go away-add that phrase to your matrix, you will need it at FISA).
Ahhh, I am ready for my closeup, Mr. DeMille! The crazy guy on the internet sayyyys:

Early Facebook investor compares the social network to Nazi propaganda, likens its workers to Goebbels and claims it is creating a climate of ‘fear and anger’

  • Former Facebook investor warns tech giant has ‘absolved itself of responsibility’
  • Roger McNamee likened social network’s methods to Nazi propaganda chief 
  • Comes as analysts expect Facebook usage to go down in teenagers this year 

Speaking in Washington, the former investor said everyone was now ‘in one degree or another addicted’ to the site while he feared the platform was causing people to swap real relationships for phoney ones.

And he likened the techniques of the techniques of the company to Mr Bernays and Hitler’s public relations minister.

‘In order to maintain your attention they have taken all the techniques of Edward Bernays and Joseph Goebbels, and all of the other people from the world of persuasion, and all the big ad agencies, and they’ve mapped it onto an all day product with highly personalised information in order to addict you,’ Mr McNamee told The Telegraph.

Mr McNamee said Facebook was creating a culture of ‘fear and anger’. ‘We have lowered the civil discourse, people have become less civil to each other,’ he said.

Mr McNamee said the tech giant had ‘weaponised’ the First Amendment to ‘essentially absolve themselves of responsibility’. He added: ‘I say this as somebody who was there at the beginning.’
Read more: http://www.dailymail.co.uk/news/article-5071913/Facebook-investor-compares-network-Nazi-propaganda.html#ixzz4yYoieRlW

 

The porn deluge, compromise operations, OSI Informers, and intelligence assets.

SO, there you are a traveling businessman from any of many countries- but you are a key player in a negotiation between a Chinese billionaire who needs to shuffle some cash out of the country, and an American company that handles EB5 transactions-and you land in Reston, VA after an 18 hour flight.
You also are friends with your countries  liaison to the UN, who works in Japan with the International Transnational Crime initiative, and while none of that is on your mind- it could be on someone else’s mind, because your connections make you a likely target. And you would be a nice acquisition for any intelligence agency or other state level or corporate player, if only…if only…

Related Story: About two years after I wrote this post that you are reading, agents, agencies, and institutions collaborated to spring a “honey pot trap ” on a Chinese billionaire, who was falsely accused of rape in Minnesota. That US based scheme cost his company, and his nation a 90 billion dollar stock market drop. Using ROGS Analysis, I can save you, and your executives billions. Click my contact button for more information.
(also see this link, where I provide background and photos)

You’re tired, but figure a drink or two before bed won’t hurt your sleep any. After a quick rinse in the hotel bath, you go down to the bar in the lobby, where you sit, eyeball some soccer on he widescreen, andthen, in a rush, a woman sits down next to you, and stammers a quick-“Oh, I am sooo sorry!” after bumping your chair, and plopping a suitcase sized ‘purse’ on the other chair.
(pssst: You don’t know this now, but if you one of these phone app‘s, called IMSI catchers in your repertoire, you would be able to “see” some of what could be in her bag- and I’m not talking coupons, compacts, tampons and cookie crumbs.)
Related story: how to catch an IMSI catcher academic .pdf by Bauke Brenninkmeijer
No problem, right? A common occurrence in any bar. You drink your Jameson and real ginger, and notice that she has called the bartender into an interesting dialogue, and your ear drifts in and out of the conversation about an obscure liquor naed “China something or other,” joining your ear to the facts and mis-statements thus:
“But it only grows in the Andies mountains! I am certain that’s what the distributor said,” says the magnificently comely, Sibel Edmonds look-alike who bumped your chair; and who now makes the claim she is a former liquor sales rep.
“No- I know this one,” says the bartender, “because I write a blog online for other bartenders. Cinchona is native to the Andean mountains, but it is cultivated in other places.”
Odd, you think to yourself- you just had this conversation across the world, with someone who claims they are a “naturopathic doctor,” who told you about quinine water, malaria, and how it cures people in developing areas of the world. Bits and pieces of the conversation float back into your mind:
“Confederate doctors used bark to treat malaria, because their medicine supplies were low, or non existent.”
And “quinine” aka tonic water is the base of a god gin and tonic,” and so on.
Your mind drifts into old black and white movies, Humphrey Bogart, and the sound of a drink-any drink in an old B&W movie, “on the rocks.” Rocks were a big deal in the refrigeration era and so on; B&W films are a good match for clever sound engineering that includes the near-onomatopoeia of the word “rocks,” and so on-such is the nature of inner dialogue.
Then, beyond your own better impulses, you venture that “Actually you are both right. Cinchona is in fact native to the Andean mountains, but also it is cultivated in other places. It’s the national tree of Peru, which is kind of funny, because for the most part, it is a shrub.”
The crowd feigns awe, and then makes small talk about every drink under the sun that contains quinine, and despite yourself, you venture forth your extensive knowledge of chinchona thus:

Cinchona (/sɪŋˈknə/ or /-knə/)[2] is a genus of flowering plants in the family Rubiaceae containing at least 23 species of trees and shrubs.[3] They are native to the tropical Andean forests of western South America.[4] A few species are reportedly naturalized in Central America, Jamaica, French Polynesia, Sulawesi, Saint Helena in the South Atlantic, and São Tomé and Príncipe off the coast of tropical Africa. A few species are used as medicinal plants, known as sources for quinine and other compounds

And of course, you remember this odd “conspiracy theory” that the holistic doctor told you about-he one about “mysterious suicides and murders” of holistic doctors. But of course, you don’t bring that up….
“Well, folks, nice talking to you, but I have an early meeting tomorrow-oh, look at that! Later today.”
In your room, you log on to the hotel’s network, and check your email’s, looking forward to the ones that you cannot check, or even acknowledge owning in the communist/theocratic/totalitarian nation that you are from. But hey! You are in America now-land of freedom, and Constitutional rights-and even a first amendment that protects speech in all forms!
But make no mistake- our “good guys” are even more deviant than your “good guys” who chop men’s hands off for stealing a pinch of desert salt, and our guys have a plan for your guys- and you too, because your computer’s unique identifier that is hard coded into your Windows 10 tells every ISP that you are “not from here,”and the way that OUR good guys enforce Biblical narratives, and primitive morality that is the “opposite of free” have lots of plans for you.
So: you check your usual corporate has the usual stuff. Ashley Madison account-that one temptation that you infrequently log into anymore, because, well- feminist jurisprudence enacting itself through hacking-and that SOME people are “making lists!”
SO you check in to the old main stay- your Hushmail account, because, like, no one could or would ever hack THAT– where you find an “invite” for a free trial to a discreet mature and elegant naked lady porn site.
Or, this, which is as American as Apple Pie, and some say, MORE American than apple pie, is currently in conflict with this.
Or cherry pies meet Golem, in Haym Solomon’s bank vault:
IMG_2909.JPG
You click the link, follow a few instructions, and you’re in-your in so deep, that you may never get out again, because that link was a honeypot, and then, your computer is spammed, and windows are popping up, full of dog porn, and horses in the Sonoran desert shtupping moaning senorita’s with swinging double DD’s , and 13 year old’s in swimsuits playfully beckoning you to swim….

Related Story: A few Blasts from the Pastsss There’s a special place in hell for Madeleine Albright
NATO “deeply” regretted killing at least seventeen people when a bomb hit a bus packed with women and children. It also supposedly regretted killing fifteen people after it targeted a hospital with a cluster bomb and killed three diplomats at China’s embassy in Belgrade. After Serbian television criticized Albright and Clinton, it was bombed as well, killing sixteen people.

And what porn deluge would be complete without “Russian disabled woman porn,” where legless and armless “Russian women” who are actually Serbs and Croats kidnapped during the last heroic act of UN good guyism (which was actually an act of good girlism, thanks to Madeleine Albright) tied to trees, squirm under the weight of grunting guys in military gear.
You have been rick-rolled- so…..
Welcome to the porn deluge, 101, which is a staple of military campaigns, terrorist recruitment and compromise operations, intelligence agencies and hairy backed Moldovan porn entrepreneurs alike. While on the surface, it’s just  “spam” to you, it is also a lot of other things that you haven’t yet figured out-but which you will contemplate for days to come.
Either way, and regardless of who set you up or otherwise rick-rolled your ‘un-hackable’ Hushmail, it’s YOU that have been shtupped.

shtup
SHto͝op/
vulgar slang
verb
gerund or present participle: shtupping
  1. have sexual intercourse with (someone).
Welcome to Jewish-christian culture! A place where the good guys and gals act as God! Look no further than that one event, and know that your fanatical religious sects and cults have nothing on our “good guys and gals,” who have pre-emptively shtupped you for the common good-for the children, of course!
The next morning, in the lobby, the fully do-able Sibel Edmonds clone just happens to rush by you at the elevator, which is right next to the sign that says “Stairs–>”.
“Morning traveller!” she says in folksy American colloquial English. “How did you sleep last night?” she asks, with an odd smile on her face.
“Oh I slept just fine, thank you,” you say, regretting the moment you clicked the link.
” Well be careful out there,” she says to you, specifically. ” I hear it’s going to rain today. Better get an umbrella!”
“Oh, thank you,” you say. “Does it rain a lot here?”
“Oh, my,” she says. ” When it rains it pours! It can be a real deluge sometimes.”
“Oh. Well, hope to see you around,” you say, still thinking about the initial link that promised “elegant nude ladies.”
And because you are a man-and these honeypots target men specifically, and in and of themselves are gendered operations that violate even the US Constitutional guarantees of “equal protection under the law,” somehow, the good guys and gals missed that memo.
And you, foreign man, are now a potential”compromised asset.” Or, according to the experts- you are likely suffering from some form of apophenia, should you one day connect the dots.
Related Links (BE CAREFUL!)
American women  and dogs: young women choosing dogs over motherhood or men (and probably a few other things- try not to let your imagination GO WILD!)

 

OSI informers and Air Force and gang stalking: it's a real operation

OSI informers and gang stalking and USAF

UPDATE: This post gets almost as many hits per day as the post about CIA/FBI/etc recruitment of Mormons. Apparently, those who stalk “We the People,” are very interested when they get outed as “real.” How nice it feels to track, trap and trace the people who are doing that to “We the People.” Ahhh. Mm–Mmmm good.
The third/fourth most popular posts here are about equal as per the feminist gang stalkers for Domestic Violence Industrial Complex dollars, and the internet “study” by Dr. Lorraine Sheridan and the farce that is Fusion Center subversion of all of our privacy/due process at the switch.
To any civil attorney or criminal defense lawyer, psychologist, or other researcher of Organized Gang Stalking looking in, this is verifiable prima facie evidence that speech is targeted at the site of the speaker, and thereafter.

Targeted individuals and those who seek to debunk “perps” often and frequently claim that one online group, OSInformers, is a disinformation outfit composed of perps who stalk targeted individuals. Also, the claim is that these perps are very well funded, and that mass shooters are often connected to them, or that this is a psychological operation.
And, those who claim this would be right, and the claim has scientific merit, because, in fact, the United States Air Force has a program full of informants called-unsurprisingly- OSI Informant Program. Of the many hits that are generated by this search term below, there are slickly produced video’s, and thousands of comments, but especially, and nefariously, are the Talkshoe podcasts where targeted individuals are mocked, derided, and humiliated. And all of this, because the various U.S. military services are in fact, spying on Americans.
From the ACLU, a case in the courts exposes civilians to un-warranted, non-incidental surveillance-what other programs might they be running off-shore?
Google Search: OSI informers-About 101,000 results
https://www.facebook.com/OrganizedStalkingInformers

 
OSI and gang stalking
https://en.wikipedia.org/wiki/United_States_Air_Force_Office_of_Special_Investigations#Air_Force_Informant_Program
Air Force Informant Program
AFOSI’s Cornerstone is to vigorously solve crime; protect secrets; warn of threats; exploit intelligence opportunities; operate in cyber.[5] AFOSI investigates a wide variety of serious offenses – espionage, terrorism, crimes against property, violence against people, larceny, computer hacking, acquisition fraud, drug use and distribution, financial misdeeds, military desertion, corruption of the contracting process, and any other illegal activity that undermines the mission of the U.S. Air Force or the Department of Defense.
In December 2013, The Colorado Springs Gazette[10] reported that the OSI was operating a Confidential Informant Program at the Air Force Academy which recruited cadets to gather information about other rule breakers and criminals. The program left the recruits to take responsibility for both the initial incident that got them into trouble and any subsequent rule-breaking behavior resulting from the directions of OSI agents. One of the cadets who participated said “…it was effective. We got 15 convictions of drugs, two convictions of sexual assault. We were making a difference. It was motivating, especially with the sexual assaults. You could see the victims have a sense of peace.”[11]
In response, The Air Force Academy Superintendent will now have oversight of the program at the Academy. Though she will be aware of the operations, the Office of Special Investigations will still have command and control of the program.[12]

Organized stalking and the occult

Editors Caution: In the language, “jargon, ” and parlance of military and police occultists, the following post “talks to the dead.” Yeah, I know thats weird, so follow along, ok?
To the targeted individual, (you, perhaps ) that means that retired military and police work with active agents use hidden police and investigative notebooks, databases and files to target you; and police-state “dossiers ” which were once said to be how “communists and Nazis control the public, ” now target you with hidden (occulted ) harassment, profiling, and manipulation (police states are hidden, and police despise democracy ).
See this post for a reference.

Among the many online blogs about organized gang stalking the occult is mentioned, or featured as the main thesis. Because many of those who practice organized stalking are themselves cultists, or involved with religion based stalking, the occult is a recurrent theme.
Here is one example of a former military intelligence officer who claims to have been part of an Air Force think tank/cult experiment from the early 1960’s. This particular writer claims to be a criminal profiler, and part of a group of 13 people who can talk to each other across life and death, and into the afterlife.
Make of that what you will….and I might also add that that person has claimed-in written communication- to be raising kids who “choose” their gender. And, make of THAT what you will as well, but retired military, retired police, and their “gangs of associates” are who gang stalkers,“are,” most of the time, and they work in capacities ranging from the Association of Threat Assessment Professionals (ATAP), to the well known FBI anti-democracy operation called Infragard, to the Society of Cold Case Investigators (you can search this blog for posts that document this).
In the .gif below, the purpose of this ordinary van has been “occulted” to the ordinary observer. (Image courtesy of TargetedOne in Texas)
FBI-APE-VAN
So, when the average targeted individual meets a gang stalker, it is most often a police informant, or some crackpot religionist, a conspiracy theorist, or other occulted person on the internet, or in their real lives, whose “role” is not clear to the target, just like the image of the surveillance van above, whose interior is a rats nest of hidden electronics.
Occult has several meanings, beyond superstition, and religiously delusional purposes. It is used as a noun, a verb, and an adjective. My focus is on its most simple use as a verb: the act of “occluding” insight into something, by people and organizations that are hiding something.
So, because gang stalkers use a sort of euphimistic, military and police jargon related “para-language” (I borrowed that term from linguistics, to apply to this sociological phenomenon) which is part euphimism, part double entendre’, and 100% a sadistic abuse of its targets vulberable status, lets look at the definition, and, as a noun, note superstition, but used as a verb, note that the victim of occulted practices can now take direct action to reveal what is hidden, and who is hiding it.
The same can be said of how other terms and phrases that are used in the OGS dialectic, most notoriously “directed energy weapons” exposed by Edward Snowden and the Intercept as many illegal forms of surveillance, ranging from the full capture NSA-FVEYs-Israel wiretap of western communications, to the swamp of Department of Homeland Security and FBI, and other publicly and privately funded “private surveillance and security contractors” who are draining the western taxpayers “security” slush funds every year.
So:
occult
[əˈkəlt]
NOUN
(the occult)
supernatural, mystical, or magical beliefs, practices, or phenomena.
“a secret society to study alchemy and the occult”
synonyms:
the supernatural · [more]
VERB
cut off from view by interposing something.
“a wooden screen designed to occult the competitors”

UPDATE 08-02-2020 In recent news, we see a religious crackpot, Dr. Stella Immanuel, using language, and descriptions of things that many so-called targeted individuals also describe, ranging from out of body experiences, to forced homosexual liasons, to mysterious orgasms caused by unknown “demons” and so on.

Association_of_Old_Crows_(logo).png
And speaking of old crows-remember this guy? Living forever seems high on the list of those who built the Panopticon, and who today, deploy hidden mind control and influence operations on unsuspecting people all over the world, every day.
And it is at the juncture where artificial intelligence meets the internet, and any of it’s many illicit hidden InfraGard, or other agents, along with any of tens of thousands of other “good guys and gals” where we see what a monstrosity “predictive software” like Peter Thiel’s Palantir databases and their manipulative features that can be programmed to form situations of influence and custodial control operations; and DataMinr technology which is programmed to monitor “thought’s” and infer “actions” in real time, like Media Sonar-which was and is used by Fusion Center operatives to control, contain, monitor and influence activists until Twitter cut them off, and Moonshot CVE that is used by advertisers and corporate interests AS WELL AS the many LEO’s around the world that have foregone the “protect and serve” model of policing in favor of a “seize it all, exploit it all, capitalize on it all ” model of policing, to LITERALLY target SPECIFIC INDIVIDUALS and their “ideologies.”
And psychology is truly in on it at every level, thick as thieves and fat as rats, and we know this based on the cases of Jessen and Mitchell, the angel of death Joseph Mengele, MKULTRA’s Scottish knight in academic armor DE Cameron, and now Lorraine Sheridan and David V. James and Elizabeth Dietrich that seek to overlay the pseudo-science of psychology over the suffering of targeted individuals of organized gang stalking.
This political abuse of psychology begins when we look at the key component of “schizophrenic narrative,” which has historically been a trouble zone for psychologists, especially in the heyday of CIA psychiatry where D.E. Cameron, first in Europe, and later at the notorious McGill University human torture and experimentation facility in Canada.  So, Cameron and others like the CIA’s official poisoner, the LSD doctor Sidney Gottlieb first diagnosed an entire nation (Germany) with mental illness, and that illness was, apparently, “the patriarchy,” aka “the warrior class,” and then, used children in experiments of all kinds-because in lieu of father’s now decapitated, the children of “the future” were then and are now in their sights.
As transhumanist types like Sheridan and James; and their progenitors Mengele and Gottlieb and especially Cameron, an heir kindred Mitchell and Jessen, for whom removing the “human” from the “experience” is a main goal, as they seek to replace, alter, medicate or otherwise mediate around the lived, human experience that exists in an individual mind; or to create it as a “hive” to be exploited by artificial intelligence in the case of Thiel and his intelligence cult, we see the field of robotics struggling with a unique problem: the problem that psychiatry has always managed to side step, which is the “human soul,” which is based in longevity of memory, and human experience that is sorted out and mediated through human filters within the brain that are stilll entirely unknown, and under-explored-precisely because psychiatry has been medicating AROUND this unknown.
And in the OGS dialectic, we see occultists from within law enforcement, and from within many of the other military and private security industry operating as well. I myself have had death threats and more for years for talking about this.
But the linked blog above uses occult symbols and the language of the paranormal. And, that person also claims to be a former USAF OSI investigator. Interestingly, one of the best financed online organized stalking operations is called OSI informers, and they are widely thought to be actual stalkers themselves, and the paranormal is used in these narratives to discredit those who they are targeting, and also, to drive away those rational people who know that the occult is always a huge waste of time.
The heavy saturation of the internet by OSI informers and then the involvement of a group linked to several mass shooters and suicides, Freedom From Covert Harassment and Surveillance (FFCHS),  indicates that they are well financed, much like other operations of population control, and these two groups are the only organized stalking related blogs and outlets where actual contact with mass shooters occurred BEFORE they went on rampage killings.So, because governments and law enforcement are often involved investigating, manipulating, or creating cults and interacting within religious communities, there is overlap in the dialectic.
Superstition is a powerful tool of control, and those who report being gang stalked often report things that could be attributed too the supernatural, which could have a powerful effect on those prone to religion. Gas lighting is one classic example, but also hearing voices and so on could easily influence those who are targeted with OS.
I cannot understate this last point, because previous too the internet, and the wide availability of small cameras a person who is gang stalked had only their word and their experience to draw on, and could easily be relegated into the schizophrenic dustbin.But we see today that the internet is a powerful tool of social control, and intelligence agencies are waging world wide psychological operations. Another term for PsyOps is mind control as we see today that the CIA and others are using Peter Thiel’s Palantir database to influence and even alter our decision making process-to alter our minds. This is what influence operations are.
The internet is full of video’s and stories-narrative’s and counter narratives- that document, in real time, the experiences of those who are stalked, and any researcher can easily determine the facts based on the evidence.
In my research, I have roughly estimated some 5-25% of all narratives to be documenting actual events. And, when we weed out the obvious chatter of video’s like those of OSI and others, we see that many who report OS are indeed struck with stress and emotional pain, even what looks lie psychosis, but also, many of them document real events, and often feel they are being influenced from outside themselves. This is not mental illness in the organic sense, although sometimes that is the case.
In the 1980’s both law enforcement and cults were a hot topic especially because America was then under the power of a fundamentalist Christian narrative. Here is a blast from the past when the term gang stalking hadn’t yet become as popular as it is today. Then, the word of the day was “satanists’ and organized stalking was attributed to the work of the devil.
Today, many in law enforcement are involved much as they were then in mind control and influence operations, but with much bigger budgets. And as we have seen before, many of them signal to each other across the internet using the language of organized gang stalking to identify each other, but also to persecute and prosecute those who they draw into their dialectic.
This, below, is from an issue of Police Chief magazine, when cops derived income from “chasing the devil” and Sataniss’s in the form of the now widely and resoundingly debunked Satanic Child Abuse scandals, and today, we see uncouth members of the law enforcement community acting in dual capacity on one hand to “protect” children” and on the other, fully exploting them down to the bone marrow via various foster care and parental destruction plans, so that their version of reality and religious/narrational control persists into perpetuity (see what I did there? PERPsPERPsPERPs):

By:     Kenneth V. Lanning
                                           Supervisory  Special  Agent
                                           Behavioral Science
                                           Instruction and Research Unit
                                           FBI Academy
                                           Quantico, VA 22135
                                           June, 1989
                            Published by:
                      CultWatch Response, Inc.
                            P.O. Box 1842
                  Colorado Springs, CO  80901-1842
PUBLISHER'S NOTE:  This report is  published under the  Public Domain.
The  author  knows  of  this  publication,  and  neither  approves nor
disapproves. The initial appearance of this report was in the October,
1989 issue of Police Chief Magazine.
In books,  lectures, handout material,  and conversations, the  author
has heard all of the following referred to as satanism:
Church of Satan         Stoner Gangs            New Age
Ordo Templi Orientis    Heavy Metal Music       Astrology
Temple of Set           Rock Music              Channeling
Demonology              KKK                     Transcendental Meditation
Witchcraft              Nazis                   Holistic Medicine
Paganism                Scientology             Buddhism
Santeria                Unification Church      Hinduism
Voodoo                  The Way                 Mormonism
Rosicrucians            Hare Krishna            Islam
Freemasonry             Rajneesh                Orthodox Church
Knights Templar         Religious Cults         Roman Catholicism