Gang stalking BINGO: targeted individual, targeted real estate, targeted electronics, targeted childROGS ren…….

Let  me  know  if,  and  when  you  start  seeing  patterns in  the  data  of  organized  gang  stalking……because  the  Experts  all  agree that  an  obsession  with patterns  can  indicate delusions, and  maybe  even  schizophrenia!
But  there are,  in  fact, links  between  organized  gang stalking and  real  estate, organized  stalking  and kangaroo  DVIC  courts, links between Gang stalking and Electronic implants: (Here is how the NSA uses electronic implants.) and electronic  implants that  monitor  our  computer  activity, sometimes  for  YEARS.

Related  Story: How secret  policing tactical  assaults  can  induce  delusion-like  symptoms in  politically  targeted  individuals,  as  those  targeted  try to  find  words  for  un-Constitutional  government conduct:
Gang stalking and delusions and paranoid complaints: what is Level X thinking and cognitive bias in psychologists/psychology? 
OGS victims obsession  with  patterns can  indicate  delusions to  therapists  and psychologists  on  the  state  teats!

But  here  below is a  case study  in  organized  gang  stalking  that  is  full  of  the  EXACT  patterns that  I  describe here  at  ROGS.  Organized  gang  stalking  IS  what  I  say  it is!
So…BINGO: Lets Play ROGS BINGO, in  the  case  of  the  targeted  activist!
Black  activist jailed  for  Facebook  posts speaks out about secret FBI surveillance that  went  on for  YEARS.
Exclusive: Rakem Balogun spoke out against police brutality. Now he is believed to be the first prosecuted under a secretive US effort to track so-called ‘black identity extremists’
…….. The father of three said he was shocked to later learn that agents investigating “domestic terrorism” had been monitoring him for years and were arresting him that day in part because of his Facebook posts criticizing police.
“It’s tyranny at its finest,” said Balogun, 34. “I have not been doing anything illegal for them to have surveillance on me. I have not hurt anyone or threatened anyone.”
Balogun spoke to the Guardian this week in his first interview since he was released from prison after five months locked up and denied bail while US attorneys tried and failed to prosecute him, accusing him of being a threat to law enforcement and an illegal gun owner.
Balogun, who lost his home and more while incarcerated, is believed to be the first person targeted and prosecuted under a secretive US surveillance effort to track so-called “black identity extremists”.
In a leaked August 2017 report from the FBI’s Domestic Terrorism Analysis Unit, officials claimed that there had been a “resurgence in ideologically motivated, violent criminal activity” stemming from African Americans’ “perceptions of police brutality”.
The counter-terrorism assessment provided minimal data or evidence of threats against police, but discussed a few isolated incidents, notably the case of Micah Johnson who killed five officers in Texas.
The report sparked backlash from civil rights groups and some Democrats, who feared the government would use the broad designation to prosecute activists and groups like Black Lives Matter.
Balogun, who was working full-time for an IT company when he was arrested, has long been an activist, co-founding Guerrilla Mainframe and the Huey P Newton Gun Club, two groups fighting police brutality and advocating for the rights of black gun owners. Some of the work included coordinating meals for the homeless, youth picnics and self-defense classes – but that’s not what interested the FBI.
A march in the wake of the deaths of Alton Sterling and Philando Castile at police hands.
Investigators began monitoring Balogun, whose legal name is Christopher Daniels, after he participated in an Austin, Texas, rally in March 2015 protesting against law enforcement, special agent Aaron Keighley testified in court….follow  the  links  above….connect  the organized  gang  stalking  dots! Because  nearly  ALL  mass shooters  endure YEARS  of these  tactics by hidden  policing,  aka  “High  Policing,  aka Americas secret  police.”

Gang stalking and ritual defamation

One of the single most common features of gang stalking complaints is that slander and defamation is being waged behind a persons back. This is also a main fetaure of what psychologiss call “delusional complaints,” of the type suffered by “schizophrenics.” and others who are “mentally ill.” Indeed, religion is often a main feature of schizophrenic delusions as well.

Related Stories: The Case of the “Slenderman” and schizophrenia; then, the odd circumstances where un-empathetic societies that bomb babies and rape our data seek to label others as having a lack of empathy, aka “psycho’s and anti-socials.”

But in politics, certain elements of our western culture suffer the loathsome an literally communicable disease of “neuro-memetic fasciitis of the mind,” too, by spreading memetic slander and defamation by targeting individuals. And, we see this most commonly in politics, academia, and other institutions.

Related Story Update: Bari Weiss, a pseudo-journalist who wrote the defamational smear referenced below has now quit the New York Times, trying to stave off her inevitable firing, and ironically alleging “bullying” and other dubious claims. It takes one to know one, I suppose. See also this post about liar and fraud Sabrina Rubin Erdelywho notoriously concocted the UVA #fakerape story

Few circumstances in modern psychology, sociology, or policing allow us insight into the nefarious practice of gas lighting and official source anomie than the case of ritual defamation, which is widely used in policing, and especially in DVIC gray area policing aka “community policing.”It is this gray area collusion where many civil conspiracies are hatched these days, and I will provide an example below of such a case, and that case, where actual gang stalking takes place.
So, keep in mind that most OGS is the direct actions of local “mobs” of insiders ranging from union members to police and fire, to academics and other institutional forces working together to control an individual, or to craft, or contain a narrative. This is called “framing” in public relations circles, but also is a feature of “bad jacketing” as well. And, the preferred tool of slander these days originates in database abuses, which then frequently becomes the defamation campaign waged in the thin disguise of “police investigatory privilege” via the massive NSA-Israel–FiveEyes data theft that we see today.
So-bad jacketing and ritual defamation is a practice of religious cults and sects who work in institutions and policing, much as we saw with Andy Ostrowski in The Kids for Cash state of Pennsylvania who was targeted by Republican’s, judges, and Scientologists as well ( a virtual trifecta of OGS) because he advocated for judicial reforms, children’s rights to not be bought and sold for state incentive dollars, and more. So, OGS is political in many/most cases.
Asking “Who stole progressivism” is like asking “who stole feminism.” The answer is: the usual suspects at the Anti Defamation League and its related octopus of NGOs.
This was most evident in the last election cycle, when some noticed that the progressive party had been hijacked by an especially vicious form of hate that can only be described as psychopathic-and that, encouraged by people who “are in  the business of hate.” This is how sick our society has become-that hate is actually a business model for psychopaths and DVIC profiteers. And-it proved how hollow their ethos is.
Here is a bit about ritual defamation as practiced by NGO’s and other political elements in western societies as a form of leverage and compromise operation on a grand scale. And keep in mind that these elements used data bases, and then, as we see with many of the new fakerape’s being rolled out every day in the press, actual rapes are being conflated with mere slanderous allegations of impropriety, with the same effect as if they were actual rapes.
This is what ritual defamation IS, and regardless of any opinion for or against the “necessity” of airing all that dirty laundry, we see without a doubt that the same slanderers are involved time and time again-that those who are “in the business of hate” have left their ideological and linguistic, and tactical fingerprints all over the dialogue. This is what the Whisper Campaign IS, which not in-coincidentally, was also a main feature of the Palestinian Exodus of 1948.
So- what IS ritual defamation, and why does it matter? Well, for starters, it is very Jewish. From Yakov Hirsch, citing Laird Wilcox:

It’s important to recognize and identify the patterns of a ritual defamation. Like all propaganda and disinformation campaigns it is accomplished primarily through the manipulation of words and symbols. It is not used to persuade, but to punish. Although it may have cognitive elements, its thrust is primarily emotional. Ritual Defamation is used to hurt, to intimidate, to destroy, and to persecute, and to avoid the dialogue, debate and discussion upon which a free society depends. On those grounds it must be opposed no matter who tries to justify its use

Then, Hirsch goes on to explain how extremely Jewish the smear campaign is in cultural practice and politics, as he cites one after another Jewish whsiperer in the defamation of BDS supporter Linda Sarsour, and Senator Keith Ellison, (D) MN. Also note how the term anti-semite-like fakerape’s-have deflated meaning in such a dialectic.
Then, notice that these smears routinely appear in the New Yarwk Times, just like the original piece about OGS that inspired ROGS blog. The reader will note that my goal is to reduce and eradicate database abuse, to expose political psychiatry/psychology in action, and, to protect future victims, and also provide help for others who are actual TI’s from all folds of this dialectic. But also, to call the blackmailing cockroaches out of their hidey holes.
For me, I encountered people who used the tactics of Gavin de Becker, who is also a Department of Homeland Security contractor. So, for me, there is little doubt that this is one function of this agency, and it’s IA styled black cash hidden domestic operations. Unlike each and every other blog about OGS, here, I provide evidence of these operations, and links to the wider dialectic
Here is ritual defamation in practice, and it is important to note that it is not a delusional complaint:

The reason for this discrepancy over Sarsour is explained by understanding why she is being defamed.

What Linda Sarsour did or didn’t do is irrelevant; the goal is to make her Palestinian perspective taboo. We see more evidence that Bari Weiss has that frame of mind from her description of Congressman Keith Ellison in her same “hate” article. How does Weiss refer to Congressman Keith Ellison?

“Recall that only a few months ago, Keith Ellison, a man with a long history of defending and working with anti-Semites, was almost made leader of the Democratic National Committee.”

To be clear, Bari Weiss is calling Keith Ellison an “anti-Semite.” Non-anti-Semites don’t “defend” and “work with” anti-Semites. But the question that arises is that we know Keith Ellison is not an anti-Semite. Listen to the Jews who know him best….That Ellison is not an anti-Semite earns him no protection from ritual defamers like Weiss.

….It is noteworthy that Weiss’s conscience is clear, that NYT readers will leave her “hate” column believing Keith Ellison hates Jews. Anti-Semitism is a stain Ellison will never remove. Think of the real world “hate” Weiss intended for Ellison. But Keith Ellison being a “Muslim peacenik,” as JJ Goldberg called him, offered him no protection from Weiss. Because from Weiss’s right-wing Jewish perspective, Keith Ellison has a “forbidden attitude, opinion or belief” that must be made taboo.

We clearly see that ritual defamation is both a feature of politics AND a main complaint of those who are gang stalked. And with little to no doubt, we see that organized gang stalking is in fact and practice, a very Jewish tactic-but also a mob tactic- of social engineering and control. In the example above, we see it toxifying progressive politics, and revealing Jewish racism, but also, we see that all roads lead to Israel, no matter whose side you are on. It’s a win/win for that lobby.
Now, let’s look at community policing for signs and symbols where social interactions can be forensically analysed to see if they are affected by OGS; to see what kinds of politics are involved. But also, to see what kind of “electronics” and databases are used to target individuals.
Here is a case where Bijan Ebrahimi, a crippled immigrant, was pedofied by local police and community stalkers who likely were on his internet connection. “They” eventually murdered him, and set him on fire after a seven year long stalking, and some 80 calls to police, where he was “framed” as an unstable liar, and a pedophile. Welcome to the new religious theocracy! And, the “scapegoat” of Catholic and Jewish rituals, and kabbalists.
Here below is a comment from 2004, when both the internet, and organized gang staking as an occut practice, and gang stalking as a political and social engineering tactic took hold across America. Note the specific name of a specific council member who was named in the blog, the use of coded symbols, the mention of ‘mob’ activity’, as well as elements from police and firefighters being implicated as stalkers. Then, notice that license plates are being tracked (click the link to the full article).
This license plate tracking is not insignificant, because as we saw in the case of the Electronic Peeping Toms of Minnesota and the police stalking of Minnesota reporters, journalists, and lawyers around 2011 (just after the DHS ramped up sectarianism and selective enforcement of law and surveillance) TODAY, we see Automated License Plate Reader’s (ALPR’s) in use across the country. Imagine the impact on or political climate? Then, add the NSA full capture database that has been collected since then…..
From LA Indy Media in 2004:

How to otherwise explain the kids all driving around with the decals?
Well, we make them nervous. And they should be….if they are breaking the law.
Maybe this is why GEORGE NAKXXX, YAKUZA BACKED STATE ASS-EMBLYMAN, gets so much support from some firemen’s cells – uh, we mean unions.

I have preserved this conversation here as well, because frequently, webwashing takes place just AFTER I write about or document online evidence of OGS. But like the example of Who’sA Rat which I provided here, from that same era, we see that OGS is very real, and that attempts are made to control the public’s insight into this nefarious practice. And, so, here we see state paid and union backed actors actively subverting the law-or in the least playing hide and seek on state dollars.
Lastly, here is more about RD from Aletho News:

Ritual Defamation: A Contemporary Academic Example

By Daniel McGowan | Dissident Voice | September 22, 2017

The term ritual defamation was coined by Laird Wilcox to describe the destruction of the reputation of a person by unfair, wrongful, or malicious speech or publication. The defamation is in retaliation for opinions expressed by the victim, with the intention of silencing that person’s influence, and making an example of him so as to discourage similar “insensitivity” to subjects currently ruled as taboo. It is aggressive, organized and skillfully applied, often by a representative of a special interest group, such as, ironically, the Anti-Defamation League.
Ritual defamation is not called “ritual” because it follows any prescribed religious or mystical doctrine, nor is it embraced in any particular document or scripture. Rather, it is ritualistic because it follows a predictable, stereotyped pattern which embraces a number of elements, as in a ritual.
Laird Wilcox enumerated eight basic elements of a ritual defamation:
First, the victim must have violated a particular taboo, usually by expressing or identifying with a forbidden attitude, opinion or belief.
Second, the defamers condemn the character of the victim, never offering more than a perfunctory challenge to the particular attitudes, opinions or beliefs the victim expressed or implied. Character assassination is its primary tool.
Third, the defamers avoid engaging in any kind of debate over the truthfulness or reasonableness of what has been expressed. Their goal is not discussion but rather condemnation, censorship and repression.

Now, when  factor in these facts above, and add to them the “delusional complaint” of schizophrenic paranoid anxieties about whisper campaigns, we see a new picture emerge, and it indicts this practice, and the official source gas-lighting that gies along with it.
I ask the reader to look back upon my thesis and do their own homework now. But also, to note how easily Big Pharma psychologists and prison profiteers work within the OGS Big Data abuse schemes-they are the perfect mockingbirds. Because crisi public relations firms do more than just create messages: they monitor them too, and that, sometimes in real time as the monitor individuals.
Related Story: The Association of Threat Assessment Professional(ATAP ) calls OGS the “colluding parallel investigation. ” ATAP is also on record linking the police and private contractor, multi -agency blur of “community policing ”to gang stalking. But also, to agencies that are affiliated with Fusion Centers, and who literally practice what is called psychological operations.

Who wants to watch a murder tonight?

Dear Fusion Center: I saw something! I am saying something!! The local CIA Operation, a predictive crime and human tracking program called LASER is about to go nuts! And I had to ask the Russian’s about it- because apparently the first amendment and FOIA only works in Communist countries now.

Related Story: What is Operation Laser, and how have CIA programs “gone local?” Here is the Laser operations guide.pdf from LA County.
Dubbed ‘LASER,’ the software program was developed by the CIA’s venture capital arm and connects the dots from 15 separate sources of data to draw links and connections for combating crime. Ultimately it is able to analyze street crime locations, as well as ex-cons and their alliances, the Associated Press reported.
Under the program, a crime intelligence unit creates a list of people’s names, which patrolmen routinely gather when doing street stops and arrests. The lists are marked for information only and include a photo and the license plate numbers of vehicles that people use. This information becomes the starting point for analysis and investigation.
READ MORE:‘Drone-Free LAPD!’ LA residents protest police spy drones

PALANTIR MAPPING SYSTEM/ PALANTIR AUTOMATIC LICENSE PLATE READER (ALPR), and gangs

Look- you and the Five Eyes apparatus are about to watch a murder! Remember Ramsey Orta, the guy who filmed the murder of Eric Garner? He filmed a murder in progress as sh!tty little gang stalkers killed a man for pennies.
Yeah this guy is about to be murdered. This is truly MHCHAOS on acid:
[youtube https://www.youtube.com/watch?v=LfXqYwyzQpM&w=720&h=405]

How is Palantir’s crystal ball used?  How does modern CIA domestic operations  use Palantir to “target individuals”?
“LASER stays on mission, measures dosage, uses Palantir”

Every time I am online profiling assholes, just like you, I find comments like this, here, that some assholes leave on blog comment forums-this was from an article that detailed how gang stalking BY federal powers is designed to protect corporate interests, AND manipulate a young girl who was forcefully incarcerated in a hospital-and, it talked about how an activist was protected by gang banger’s in a prison cell:

Yeah, but were the demons appeased?

Oh My God, its me again. Jaab
LOL.. Poor Amerika, everybody getting raped, raped growin up, raped at their jobs, raped tryin to get a job, raped in prison, raped at the airports, raped on board the aircraft, raped, raped, raped, and now its not just rape, its devil Satanic demon rape. And I though I’d seen it all when everyone stared getting raped in the Airport.

Dude if MS!# are so nice will you house some of them ?
And you are aware that to be one you have to kill before you are in ?
My cousin did 4 years in Prison in El Salvador he can tell you how nice is MS13. He was lucky we had money and he could pay for protection .
Inmates with no money had to fight for the food rape others for food etc…
So go F yourself with this article
———————————————————–

Like most people, I think gang banger’s suck. But only a little less than corrupt police who encourage the brutality in the first place, rather than mitigating it, or working towards better solutions that foster whole communities instead of gang activity.
But what we see instead is a total cognitive dissonance between our social tiers-and how the problems of the or are mocked and derided. But we also see how certain species of human’s use labeling theory in practice-and how “satanic panic” in daily dialogue echoes well documented “gang stalking jargon” to the net effect of othering in an Ich, Du paradigm, and maintaining status quo, and more. So there is little doubt about who it is that these comments are from-what “sector” of the DVIC is plain and clear.
Then, we note how some use rape threats to control other men, and the net effect of an ape-like social structure that perpetuates bad behavior. And all of that with the straw man that has such wide appeal to white female voters. So, truth to power and all that-where’s the man/woman who will shoot Liberty Vallance in the heels this time around?
The Man Who Shot Liberty Valance.jpg
We the peeple need you, pal. And- bring your ROGS BINGO card this time.
From Huffington Post, the story of a gang stalking target, Ramsey Orta:

He Filmed The Death Of Eric Garner. Now He’s Getting Ready To Spend 4 Years In Prison.

Ramsey Orta, who says he’s still haunted by Garner’s death, thinks the NYPD is out for revenge.

LAS VEGAS ― Ramsey Orta says he’ll wake up crying sometimes, and he won’t know why.
A few days will pass, and suddenly he’ll remember the dream. The one where he’s on that block in Staten Island, on that cool July day, filming a police officer putting his friend Eric Garner into a chokehold.
Only this time, Orta feels an arm wrap around his own neck, squeezing tighter and tighter. Until he can’t breathe.
“And then it just goes all black,” Orta said.
There are other dreams too: the one where he’s running from the cops, and the one where somebody in a hoodie walks up to him in a park and shoots him.

“Pretty much all my dreams are messed up,” he said. “I don’t remember the last time I had a nice dream.”

Facebook investor agrees with ROGS: Facebook is worse than Hitler's propaganda

My regular readers will note that day after day, we see that my many “theories” and so on are validated by surprisingly rational people-and, sometimes, by billionaires too. But “mind control experiences on the internet” are real, Dorothy! And-the internet is planned that way from the state level to the corporation that does this crap-these are inter-conected in the endeavor of brainwashing us the peeple- social media like Facebook, Twitter, Snapchat and more are ALL actively seeking to influence us, manipulate our dopamine levels, our choices, and more.
So-if the corporation is doing that, what do you think the Company might be up to? I think all those “color revolutions” and “jasmine” in the ME provide examples of ‘what is possible’ don’t you?
I saw something! I am SAYING something, officer Friendly! I saw some vampires that need a kick in the teeth! And those vampires are using mind control on children-and even putting creepy crap into their Youtube viewing!!!
Here- have a look at what I said a few months back-after I got p!ssed that OGS denialist’s were overlooking how some are using the internet to actually target, harass, and cause harm to others, AFTER they had entrapped all of our data, and passed us around inter-continentally as if we are mere drunken air hostesses or floozies(.)(.)
I said: This here about “memetic neuro fasciitis,”and a bunch of other stuff about how the internet is in fact-and in PRACTICE being used to manipulate urr minds, in real time. And look-the ACLU has noted the Fusion Centers are themselves complicit in manipulating user data, and Twitter even plugged the “firehose” that subverted our free will at the switch. In fact, my lone wolf cry in the wilds has produced what could well be the Snowdenball effect, where the whole spy apparatus gets the firehose turned into its own Panoptical eyeballs. And, gang stalking will take a kick in the teeth too, cuz guess wut? People from 12 nations peeked in here today alone!
lone wolf journalism
And look! Even Tim Cushing over at Techdirt.com [link here] and Mark Harris of Wired is kicking Peter Thiel in his crystal balls. Big Data Lawsuits will be bigger than the Big Tobacco Lawsuits by far:

Mark Harris of Wired has put together a fascinating expose of the company’s work with US law enforcement based on documents obtained via FOIA requests. What’s uncovered does little to alter Palantir’s reputation as an enemy of personal privacy. What’s added to this rep isn’t any more flattering: the documents show Palantir handles data carelessly, ties customers into overpriced support/upgrades, and otherwise acts as though it has to answer to no one.
In one case, files marked as sensitive by a Long Beach drug squad detective were still accessible by other officers who shouldn’t have had access. Multiple emails to Palantir failed to resolve the issue. Making it worse was the fact the problem couldn’t be contained in-house. When agencies sign up for Palantir services, they’re given heavily-discounted rates if they allow their data to be shared with other law enforcement agencies. Detectives hoping to protect sensitive sources and undercover cops from outside access were finding out their employers had signed that option away in exchange for cheaper initial pricing.
That’s just the beginning of Palantir problems uncovered by these public document requests:
In the documents our requests produced, police departments have also accused the company, backed by tech investor and Trump supporter Peter Thiel, of spiraling prices, hard-to-use software, opaque terms of service, and “failure to deliver products” (in the words of one email from the Long Beach police). Palantir might streamline some criminal investigations—but there’s a possibility that it comes at a high cost, for both the police forces themselves and the communities they serve.

Yup- all the hungry yvampires are programming your children, and milking all of our data. Well-not MY data per se, as I don’t use social media, unless I am experimenting or doing security research. I am targeted in other ways that Facebook users are not, because I have been stalked, hacked, harassed, targeted and worse since 2004.when I wrote a few news stories about neo-McCarthyism. How wrong I was then-because it’s so much worse than even ol’ Joe could have told us then.
But, as we see-the FBI takes down web pages after mass shootings- because SOMETHING is wrong over at Facebook, and how some peoles data streaam is influenced-but it’s also wrong all over the web in general. And I am on record as being perhaps the fist person anywhere, ever to draw these comparisons, or point the reader, and the journalists to how “the internet” is being used by actual real people, in real time, to harass and manipulate people online.
Well-have a look at what this lil’ ol’  billionaire is saying a couple days ago: Roger McNamee “likened the techniques of the techniques of the company to Mr Bernays and Hitler’s public relations minister.”
So, to the researcher, the psychologist, and the potential future litigant-but ESPECIALLY to the litigator and the criminal defense attorney, take note that the official denial of organized gang stalking has taken a major hit and that Edward Bernay’s version of brainwashing has made it into the MSM-so ROGS isn’t alone in comparing “the internet” to mind control, or providing examples, as ALL major works of previous propaganda are now in line with the ROGS thesis.
And, while you’re here, please take a copy of the ACLU, EFF, NACDL’s guide to government hacking along with you-now if we can just get to work on a “guide to government mind control practices” we will speed this along, all the way up to the FISA court. (did that ding any bells there at the Fusion Center? I hope so, because police states don’t just go away-add that phrase to your matrix, you will need it at FISA).
Ahhh, I am ready for my closeup, Mr. DeMille! The crazy guy on the internet sayyyys:

Early Facebook investor compares the social network to Nazi propaganda, likens its workers to Goebbels and claims it is creating a climate of ‘fear and anger’

  • Former Facebook investor warns tech giant has ‘absolved itself of responsibility’
  • Roger McNamee likened social network’s methods to Nazi propaganda chief 
  • Comes as analysts expect Facebook usage to go down in teenagers this year 

Speaking in Washington, the former investor said everyone was now ‘in one degree or another addicted’ to the site while he feared the platform was causing people to swap real relationships for phoney ones.

And he likened the techniques of the techniques of the company to Mr Bernays and Hitler’s public relations minister.

‘In order to maintain your attention they have taken all the techniques of Edward Bernays and Joseph Goebbels, and all of the other people from the world of persuasion, and all the big ad agencies, and they’ve mapped it onto an all day product with highly personalised information in order to addict you,’ Mr McNamee told The Telegraph.

Mr McNamee said Facebook was creating a culture of ‘fear and anger’. ‘We have lowered the civil discourse, people have become less civil to each other,’ he said.

Mr McNamee said the tech giant had ‘weaponised’ the First Amendment to ‘essentially absolve themselves of responsibility’. He added: ‘I say this as somebody who was there at the beginning.’
Read more: http://www.dailymail.co.uk/news/article-5071913/Facebook-investor-compares-network-Nazi-propaganda.html#ixzz4yYoieRlW

 

Guest Post from 4rec3s: Gang stalking and artificial intelligence-a world of false positives and death

This essay is based on this post on the Boingboing article, “NSA and GCHQ’s crappy Big Data techniques may be killing thousands of innocents”, which reminded me of a video of a robotic drone-death art installation that really puts this killing into a particularly inhuman perspective.

Notice: This essay does not deal with ‘electronic mind control’, drugging, ‘creating alters’, V2K or paranormal. All these links are from mainstream sources and my purpose is to glue it together as a feasibility of how gangstalking could happen with existing, known technologies. Namely social psychology, HUMINT-based pattern prediction, ubiquitous surveillance and communications.


Gangster Computer God
Every day, increasingly, our reality is validating Francis Dee’s racist, paranoid, schizophrenic prophecy of the “Gangster Computer God Worldwide Secret Containment Policy” as less fiction and more fact (sans the mullatto-jew robot doctors). More fact because it’s become feasible (except for the cosmetic surgery).
Mass surveillance innovations[1][2][3][4][5]), purposeful efforts and accomplishments[6][7][8][9]; a drive towards total information awareness[10] and such compelling integration of technology leading to a Panopticon[11][12], creates a situation in which a system could be devised capable of data-mining and heuristic pattern-of-life analysis of all citizens[12]. Coupling such a system with astoundingly capable AI technology; an extreme willingness to help (and profit motive) by industry[14][15]; an hegelian (‘ends justify the means’) ethos quite contrary to that of Christianity, secular humanism and altruism generally[16][17][18][19][20]; and “machine learning algorithms”[21][22][23][322]; form the constants of an addition equation that yields the very real possibility and therefore threat of an worldwide, technocratic, AI-based Gangstalking system.
Requirements and Purpose
The only requirements are paranoia and an utter lack of trust of the Government towards the global everycitizen[24]. In other words, “to shut down a political enemy by gaslighting[25][26][27][28] them to the extent that they end up in jail or in a mental facility”. There may be other incentives however:

  • Random harassment ‘like a game’
  • Targetted harassment of non-threat ‘undesirables’
  • Spiritual warfare ‘to demoralize the population’
  • Human / Social experimentation
  • Data collection efforts (pushing people around to see where they go / with whom they talk in ‘crisis’ mode)
  • Psychopathologizing an individual through trauma-based mind control—to develop them as asset
  • Playing both the targetted individual and deputized stalker against each other. Why is the TI the only victim?

All Watched Over By Machines Of Loving Grace[29]
Consider the following scenario.
1) You have an AI program that is hooked up with mass surveillance and has decades of social psychology to understand how humans work (HUMANINT + psychology/sociology, ‘game theory’, ‘prisoner’s dilemma’, ‘milgram’s’)[30].
2) The AI program finds ways to manipulate people (stalkers) into ‘being at a certain place at a certain time’, ‘to look out for a certain individual’. Perhaps they’ve been getting fed emails from a “protected’ or ‘authoritative source’ (AI::outreach), someone from an intelligence agency for example, that has ‘deputized’ him/her, to help assist them in tracking down ‘an alleged (serial killer / pedophile / drug dealer / murderer / stalker)‘ in the community. This person then is notified to go to a certain place and ‘watch out for’ this disreputable / potential criminal.

Everyone wants to be a hero. All that is required is exploiting our vanity.

3) This AI program has a deep knowledge of everyone from mass surveillance[1][2][3][4][5]). Enough to ‘predict behavior’ and generate a deep, heuristic, ‘life pattern’ analysis[1][2]
4) The AI knows when you leave your home, when you take a shower, approx where you are located and headed using your cellphone’s gps/wifi and cell tower triangulation sent back to servers. Also, if the AI has access to NRO satellite data, they can actually see you, with a potential resolution of 50 cm2 to 1cm2 (drone)!!
5) Using the ‘pattern of life’ and seeing that you left your home, it can send email / sms / skype / facebook / twitter / foursquare / ‘other’ instant messages to various ‘deputized’ community citizens to ‘watch you’.
6) The targetted individual is now under humanint field surveillance by people who have been tricked, duped with disinformation into thinking they are doing good, protecting the community.


Con Game, Not Mind Kontrol
None of this requires mind control. All it requires is panopticon, vain authoritarians as ‘faux-insiders’, and a highly-available communication network with dynamic asset development and appropriation software.
If this is happening, it’s immoral and abusive and it’s also lacking in manners. Military-industrial aristocrats are supposed to have manners and respect. After all, their guarded culture demands those things. But their development of rights-destroying, ‘tough guy mafioso abuses’ reveal the ruling class as irresponsible, lacking a keen foresight into consequence they claim generally has guided their successes in life and which differentiate them from the masses.
Their lack of manners has created an uncouth robot that reduces everyone to numbered accounts in a microserfdom. This robot is going to mix up the salad fork with the dinner fork, which is a metaphor for ‘killing everyone’—it’s a matter of time before it’s discernments become so specific that everyone, poor and rich alike, need to be subject to ‘quantitative easing’. And that’s too is a metaphor, for this.

Is gang stalking online real-can "they" actually track my machine as I surf over Tor?

The short answer is, if you have been reading this blog and missed the memo that said “YES THEY ARE TARGETING, TRACKING, GEO-LOCATING, MONITORING, INFLUENCING, and OPERATING on you, your internet connection-and the mind that is using that connectionlike mad scientists at every moment, every time you are online!!!”-then you clearly ARE CRAZY, as some have suggested about “targeted individuals.
This is what I call “feminist jurisprudence” aka “communitarian/community policing.” It cannot be missed that there is a clear ideological link between OGS complaints and elderly white females in technology, politics, the judiciary, or in policing; but especially in the transnational Octopussy that we know as the Panopticon and its attendant plots, political manipulations, and influence/mind control/compromise/blackmail schemes and covert operations.

Related Stories: The Association of Threat Assessment Professionals (ATAP) has linked itself to both gang stalking, AND political /punitive psychology.
More hilariously, the Washington State Fusion Center distributes “mind control” documents to the press, as the Department of Homeland Security renovates the famous “mind control ” facility once occupied by CIA funded doctors who forced patients to take the illicit drug LSD, and unethically tortured children and adults with debunked electro -shock “therapy “.

And worse, they are using the local police, and Fusion Centers, aka, “the domestic spying on citizens apparatus”and the Hegelian conflict oriented communitarian policing scheme to literally cause learned helplessness and fear, in order to enforce conformity, as Fusion Centers (all of which are well hidden, and all 77 have different names across the country) direct resources at “non-conformists.”
Extra points for noticing the number 77 has “mystical value” to religious fanatics, Masonic orders, and others who are invested in harassing citizens with OGS. I am certain all of the religiously deluded morons who work in Fusion Centers actually believe they are doing “gods work,” and that the number 77 means “Son of Circumcision.” Try not to laugh…but I personally like the linguisticexplanation of 77 as a “she goat.”
And while it can make a person FEEL crazy, there are actually programs targeted at EVERYONE that actually involve this form of mind control and influence operation, and that these programs are ill-equipped to decipher human behavior, and that with destructive effects . Here is just ONE example of that, as AI struggles to eradicate “human experience” in order to socially engineer ‘predictable humans’ and using ‘predictive analysis.
And here is one recent example from my own writing online from just today (it took me two days to even write the post ‘live’ in WordPress), but every day, there are thousands of examples available to even the casual observer.
In that light, it is worthy of noting that those who value civil liberty, such as our right to privacy-often overlook the greater right of liberty: the right to consent, or not consent to experiments, or other ‘mind altering’ substances and practices, that are deployed on us as weapons or as research tools. So it is important to note that Tor-the famous privacy software that was made “famous’ by Edward Snowden when he revealed to us that our governments-all five of them, in the Five Eyes Alliance, and others ranging from Israel(which gets every bit and byte of our data unfiltered) to Russia are performing their own experiments.
So-forget about DEW’s and all of that other PsyOp psychobabble, and make yourself aware of Palantir, DataminR, Media Sonar, and more that they are targeting at us, and our online speech every second, AS WE TYPE INTO OUR BROWSERS. OVER TOR….!
Here below is one example from today alone. One of many I caught before the sun met the noon sky:
The example:

  1. I look at today’s statistics about who reads this blog and what they read. I note that my most popular post references the hack of the CIA’s “hacking tools” which I posted in this blog post here. This one post quotes the Intercept, and has links to Wikileaks, where the CIA hacking tools were described as hacking American’s cell phones, and then, destroying the ‘evidence’ that they had hacked my/your/their phone.
  2. I looked around the web for stories that also document how the CIA-and some 16 other US intel agencies alone, not including the entire battalions of soldiers aand seamen and USAF who are hacking American’s at any given time- have destroyed Constitutional due process and leveraged, blackmailed, or otherwise compromised American citizens (and millions of others around the world) because they act with “plausible deniability, and then, impunity. I found this story, about a humble public defender in Washington State, where the CIA hack tools are implicated in hacking citizens.
  3. Using Tor to write this blog,(and using Tor makes one an INSTANT target by these ‘plausibly deniable’ activities by military and civilian agents, agencies, and a host of NGO’s), i read through my stats, and noted “outbound links”-the links that people clicked on my blog to read material that I have linked to OUTSIDE my blog. And, I was under attack the whole time. Here is the story I was writing ‘under attack.’ This caused a net loss of about an hour today alone.
  4. I clicked the “out-bound” link, which was to Urban Dictionary” and the link to a description of “gang stalking methods“. Here, below is a snapshot of that-and notice the advertisement for “CASA” which is a foster care warehouse operation, where state sponsored kidnappings of children are covered up as “foster care placements.” Children who are “placed” in Foster care face an 85% chance of being sexually abused, pimped, or otherwise turned into profitable commodities by these organizations and the related DVIC industries

agang stalking methods
This screen shot, which I have NOT anonymized, for a very specific reason, which I will not disclose, contains all kinds of “meta data” about the machine I am using to compose this posting and nothing more-not a single identifying bit or byte of data connects this screenshot to me, or to this blog-other than the WORDS I use to describe this situation.
As such, I seek to demonstrate that speakers, and words are the actual targets of all of this “sooper seekrit spying,” that claims it is to “protect the little old ladies and the children from rapists and pedophiles” because pedophiles might otherwise sacrifice everyone’s safety for their own liberty in order to to get at  the old ladies and babies whose Constitutional houses are on fire, and burn them to the grounds, tossing their pocket Constitutions into the fire to make it burn faster, and using the broken pieces of civil rights and human rights and even animal rights to build a ladder just to get at the old ladies and babies  even quicker as they plummet out the windows, pre-cooked and ready to rape with shovel handles and pocket Constit…oh never mind that last one(and all of those windows, and Windows 1-10, totally broken already by the “broken windows policing scheme” of the 1990’s)….
So, to recap:
Meta data is personally identifying information that police, investigators, and others who participate in the local, state, and federal level fraud outlined on this blog have been using meta data to make cases against unsuspecting victims of OGS and its accompanying mind control and influence operations. You can Google the term yourself.
But what matters most is a question that now arises in the mind of this researcher-and hopefuly inthe mind of other researchers, lawyers, legal scholars, TI’s, psychologists and others who research organized gang stalking.
And the question is: Why does CASA-an organization that I have roundly criticized over the years, and even now; an organization that has tens of millions in advertising budgets, and tha has notoriously been an integral part of the DVIC scheme-why, exactly, do they have an advertisement on that one weblink, now?
I mean-isn’t web searching and webvertisement coordinated with searches and topics-shouldn’t a ink to “gang stalking methods” have like, a deer tracking book, or a bunch of saggy pants without belts, and some “logo gear” on it; shouldn’t in the very least a link to another website that teaches te “rhythm method” be linked, there? And so, what has CASA have to do with OGS anyways?
I suggest that the answer is in the question-and webterrogation of narrative as well. Webterrogation is not unlike custodial interrogations in many ways, not east of which is that the individual being interrogated is in fact and practice, targeted, and contained, somewhere, at some point. This is not insignificant, but it is also a larger point that I will write about later (especially as pertains to ISP’s and how Infragard members-deputized members of law enforcement, and sh!tloads of political operatives and others literally redirect, re-route, and inject any “live” connection with lots of “who knows what.”)
You can test the science yourself- in fact,my blog here asks any researcher of organized gangstalking to do EXACTLY THAT-test my many theories, hypotheses, and anti-hypotheses against your own, form whatever discipline you practice.
But go over to that link about “gang stalking methods” and see what advertisement YOU get at the top of the page. I got CASA, which is a DVIC subsidiary industry, and a multi-million dollar player in the theft of children across America.
Here below are some links that demonstrates AGAIN, that state level institutions, operatives, and policing itself, is implicated time and time and time again in the pimping, procuring and pornifying of children, as well as the massive crisis PR industry that masks this fact, and gives us boogiemen/drug dealers/terrorists/pedophiles/whistle blowers/journalists/your neighbors farting cat instead ( and it cannot be missed that two of the first five links that were returned to my Tor browser were near, or local to my own location…):

CASA LA: http://casala.org/our-mission/
Sexual abuse in Foster Care: http://www.hg.org/article.asp?id=6703
Is Foster Care modern day slavery? http://medicalkidnap.com/2016/04/15/the-u-s-foster-care-system-modern-day-slavery-and-child-trafficking/

Then, without irony, one must note that Elizabeth Dietrich, one of the few online who has written a scientific thesis as regards OGS, opened her thesis with a brief statement about pornography. This, combined with another part of my thesis-that women’s deviance takes place in unique forms, but especially through positions of power, authority, and then, voyeurism-one cannot help but note that women’s violence-or in the very least, their inability to “comprehend” the violence directed at others is institutional in nature. And this is clearly the case with OGS as well (which is in no way, shape or form similar to the “Pro-Anorexia community” as Dietrich has stated.)
Elizabeth Dietrich’s paper encourages the isolation of victims of OGS. How feminist.
Maybe it’s because Smith College is known as the “Lesbian Capital of the World,” or maybe it’s because all the special snowflakes get better grades when they’re pretty, but Dietrich’s conclusion truly looks like first year work when she comes to the conclusion that

Gang Stalking is just one of the many online communities that uses people’s
conformation bias, meaning making, and wish to belong, to deleterious ends.
For my part-should I ever publish this, I will devote a special chapter to conformation bias, and conformity at the expense of critical thinking….

Related Story: Five Denver Nurses caught looking at a dead man’s amazing cock, then gossiping about it in the lunchroom. Apparently, this is a thing with nurses and other women in the medical community(let me know when you start seeing patterns in western women’s deviance, such as their Freudian “death urge” morphing into endless forever war that kills other women’s sons, lovers, husbands and other babies)
From the very introduction of Dietrichs paper, we see that male dominated spaces such as 4chan and KnowYourMeme, as well as “porn” is an underlying theme of those who officially gas light OGS targets; that, for those who have taken the time to write on the subject (this will be the topic of a later post here). What matters here is that “victims of OGS be isolated” both in Dietrichs narrative, and in that of Sheridan and James, and as such, we see that the two-exactly two papers that addresses the topic-are written by gender feminists, which is telling indeed.
Then, we see emergent norm theory and the interplay of feminist destruction of so-called male dominated spaces throughout her paper, which concludes as I stated above-that victims of OGS should be isolated and ex-communicated from the internet.

CHAPTER I
Introduction
A tautological statement has been growing in popularity among pithy internet-savvy
populations over the last ten years or so: If you ever wonder if it’s on the Internet, it’s on the Internet. Anonymous contributors to websites such as 4Chanand Know Your Meme expanded this idea into a list of 50 Rules of the Internet that include items such as “The Internet has no rules,”and “there is a porn of it, no exceptions.”The root of the joke is derived from a very basic fact: Internet content, for all intents and purposes, is virtually endless. Almost any honest query one enters into a search engine will invariably yield results, usually hundreds of thousands in an impressive .33 seconds, more or less a couple hundredths-of-a-second, depending on what kind
of modem you have. Social connectivity over the Internet is powerful.

.

The Shirky-Masnik bureaucracy perpetuation principle

In well organized assaults waged by governments that work in hidden capacities to enforce and socially engineer a society through constant attacks on civil liberties, we frequently find useful idiots who willingly place themselves as obstacles to free speech, and especially, as obstructionist forces that ‘steal time,’ aka ‘time-thieves.’

these are situations where people will often seek to preserve a problem or a falsehood, rather than recognize that it doesn’t need to be that way. There are lots of industries where this is a major issue.
-Mike Masnik of Techdirt.com

Organized gang stalking is one such case where we see this at work-how bureaucracies work in “the gray area of law and social oversight” to prevent insight. This is best embodied in the common phrase that appears in the OGS dialectic “what is hidden” which some use because it is a Masonic/other symbolic speech, while others use it to flaunt their access to the many hidden technologies that I document herein, as well as their ability to abuse others in this capacity.
Obstructionism and OGS are Partners in Crime and Civil Consiracy
Techdirt.com does some of the most reputable, fearless, well written public interest journalism in the history of technology-and journalism. As such, while most MSM journalists cower(or put on their knee pads and slurp down some payola) in the face of the 72 Billion dollar per year NSA/CIA/FBI/DEA privacy rape machine, Mike Masnik, and the excellent writers over there have incurred their unfair share of  detractors.
And, as can be predicted, some of those detractors are little more than liars and punks who live in their mothers basements, and guys like Shiva Ayyadurai, who claimed he invented email. And gay robotic toilet slaves, like Peter Thiel, the guy who worked hard to subvert ALL democratic liberty via the Palantir/CIA/Google collaboration. Notably, Thiel has skipped town, and run off to New Zealand, where he is hiding out, no doubt doing “special work” for his corporate and military and CIA overlords.
In the fight to demolish free speech, the MIC and its DVIC handmaidens use every dirty trick, every crooked backdoor trick to obstruct due process and civil rights; but also useful idiots like Thiel and Ayyadurai are the  backup girls for the band of merry robbers who wantonly lie, cheat or steal to destroy the rights of others while getting filthy rich. They are the contrarians of logic, and the cock-block of free enterprise; and it begins with their pillow bitingly wimpish and vain, immature, fascist impulses, attacking pure speech and then, the free press.
SO it cannot be missed that these same are also on the forefront of the technologies that are currently accessing other peoples privacy via their “inventions, and imputing to those who they steal from “intentions” that are not only false, but aslo” classic Freudian projections, and in that light, they are also perverse voyeurs.
A world of smoke and mirrors indeed. From Techdirt.com, Mike Masnik scores a victory over Shiva Ayyadurai’s perversity, and his perversion and abuse of law:

Case Dismissed: Judge Throws Out Shiva Ayyadurai’s Defamation Lawsuit n

As you likely know, for most of the past nine months, we’ve been dealing with a defamation lawsuit from Shiva Ayyadurai, who claims to have invented email. This is a claim that we have disputed at great length and in great detail, showing how email existed long before Ayyadurai wrote his program. We pointed to the well documented public history of email, and how basically all of the components that Ayyadurai now claims credit for preceded his own work.
We discussed how his arguments were, at best, misleading, such as arguing that the copyright on his program proved that he was the “inventor of email” — since patents and copyrights are very different, and just because Microsoft has a copyright on “Windows” it does not mean it “invented” the concept of a windowed graphical user interface (because it did not). As I have said, a case like this is extremely draining — especially on an emotional level — and can create massive chilling effects on free speech.
A few hours ago, the judge ruled and we prevailed.

Now- an object lesson in how all of these companies-and then, their complete subversion of intelligence agents and agencies have the ability to destroy speech at the switch. Look at this paragraph below:

The Shirky Masnik principle states that bureaucracies will d anything to perpetuate themselves-anything.. And that includes using total sh!tbags like Ayyadurai, or his counterpart in institutional sociopathy, Peter Thiel-who was so mad that he was outed as queer by Gawker media that he sued it into the dirt and put it o ut of business. to subvert the very foundations of both free economies, and free democracies.

 
Do you see the paragraph -how convoluted and broken it is? This paragraph was written as this blog, and the computer it is written with, came under ‘attack’ by ‘unknowns’ and the browser froze, and Tor reported multiple “j-script’ malfunctions. And this, just one day after the same browser, on the same computer, was crashed using an attack I cannot identify-one where the browser opened repeated multiple windows until it was useless ( I could identify it, but I am still researching that particular attack).
You see- speech itself is under attack, by the multiple agents and agencies I describe herein, and that attack is at the site of the speaker, which is me in this case, but this goes on all across democracies everywhere, as the United States, working with the Five Eyes Alliance, and literally HUNDREDS of other agencies, NGO’s target speech itself, online speech, and all other media with disruption campaigns; in this case at the site of speech itself as I type into this blog.
I document this as well as note its psychological, and ‘real world’ effects here, but elsewhere too, I have records of these attacks, which are incessant. And in the “TI” community of gang stalking victims, this is an extremely common complaint, and dis-information agents can be found mocking TI’s with comments such as “yes, I have heard that TI’s frequently complain about sticky keyboards, e-mail theft, and computer hacking.”

In fact, hacking “target’s” is what the NSA and the rest are doing, as even the famous (and well funded) “OSI informers” has noted, alongside the fact that TI’s are also targeted with other nefarious attacks such as “porn deluges.” I have preserved a copy of the web page where OSI informers makes this claim, because frequently, the web gets “scrubbed” after I validate one or another fact or tactic of these hidden operators at our internet switches, and the thousands of programs that are trained on TI’s.
Here is a snippet of “OSI informers”claim/advice:
CYBER-STALKING

Cyber Stalking or Cyber Harassment is a related group of harassing behavior occurring via internet/online. Cyber Stalking includes, but is not limited to; Computer Hacking, “Trolling”, Spamming (Often including “Porn Deluges”, Verbal Assaults, Character Assassination, and Impersonations of the victim. Online harassment is a plank of the harassment protocol. If you have a website devoted to Organized Stalking you may have people emailing you to flame you, or claiming that they are victims & asking for support with the intention of discrediting you.

Now- I will rewrite the paragraph above as it was intended, but I note that my computer literally heated up to an extreme degree, and I was forced eventually to crash the browser, reload, and change settings-this is what is called a “social engineering attack” where hidden operators force the user to change behavior, aka “behavior modification.” And I note that while my computer is less secure in this second attempt to write this post, I can write easily now. See how that works? Seeing any patterns yet?
The Shirky-Masnik Bureaucracy Perpetuation Principle
The Shirky Principle forms the headline of the following piece of writing by Mike Masnik of Techdirt.com forms the Shirky-Masnik Principle stated as below describes how OGS online has become an institutional force,with offline consequences, and especially, how writers are targeted by morons with kewl toolz directed at us from ilitary bases, police and Fusion Centers, as well as NGO’s with dominionists, zionists, and Infragard rats working behind the scenes:

Institutions Will Seek To Preserve The Problem For Which They Are The Solution

by Mike Masnick

Filed Under:
business models, innovator’s dilemma, institutions, problems, solutions


from the the-shirky-principle dept

We already wrote a detailed analysis of Clay Shirky’s recent writeup on complex business models. However, a few of you have sent over Kevin Kelly’s recent post about Shirky’s piece that also compares it to Clayton Christensen’s Innovator’s Dilemma, but thankfully highlights the one key line in Shirky’s piece that may have gotten lost in the original:

“Institutions will try to preserve the problem to which they are the solution.”

Kelly calls this the “Shirky Principle.” To me, it calls to mind Upton Sinclair’s famous line:

“It is difficult to get a man to understand something, when his salary depends upon his not understanding it!”

They are not the same point, but they are related. In both cases, these are situations where people will often seek to preserve a problem or a falsehood, rather than recognize that it doesn’t need to be that way. There are lots of industries where this is a major issue.


Organized stalking and "mind control" and influence operations: manipulating voters.

Epilepsy warning: this post contains a swirling graphic image
While our governments, our corporations, and our intelligence and law enforcement agencies believe it is their right to steal our data, and use it to maniulate and even abuse certain people and to wage influence operations on us, in secret, I believe in fair warning, in anticipation of un-intended consequences, hence my epilepsy warning above. This is the difference between consensual behavior, and non-consensual behavior, and the NSA/CIA/FBI/DEA data theft pipeline had  15 year head start on all of us.
Except, me, maybe.
Any cursory research into organized gang stalking reveals that politics are a major factor in “who gets targeted with OGS.” While there are varying levels of targeting, ranging from simple “influence” operations through the internet, to extreme cases where local politicians and others gang up on individuals to harass, intimidate, or otherwise coerce them, the most common “targeting” that individuals face is through advertising.
As we saw in the case of “Moonshot CVE” and in the cases of Twitter monitoring activists and feeding the data to law enforcement and other un-named parties, and programs like DataminR and Media Sonar being used concurrently at Fusion Centers, and the local police department, as well as yet un-named intelligence agency level programs, there is a constant blurring of lines between advertisers, governments, political PAC’s corporations, and then, police and intelligence agencies targeting of activists and others in spying or conformity enforcement operations.
Welcome to PsyOps, mind control, and  world wide”influence by constant suggestion. Now, ad a targeted audience-and a targeted influencer of that audience….
You’re getting sleepy now….count backwards….as I redirect your internet connection….breath deeply….watch as Google suggests a few (harmless) things to you to make your life easier, better, breezier, Nabisco cheddar….
Or, this:
Image result for swirling black and white gif

Plus The Hive Mind:

blak and white thinking.jpg
And that “one guy” somewhere-anywhere in the world hidden behind the switch (with NO accountability, no records of hi/her actions, and no recourse for citizens to sue these bastards), with “the master list”:

cropped-showimage-arcadia-switch
M: Are you there Bob? It’s me, Margaret. Yeah. He said it again. B: Said what? M: He said WASP. B: WASP? hahahaha. They haven’t had any control or power since the sixties. M: Yeah, but he called WASP’s JAP’s B: JAPS!!??? We kicked their asses into the dirt!  And we are STILL kicking their asses into the dirt, lookie, I even sicced the UN on ’em. Those A-rabs are getting hungry for young Jap girls and those Jap men are hogging them all with enjo kosei! The UN is gonna liberate a few of ’em. M: Bob-BoOOOob..slow down! He was talkin’ about those OTHER JAPs….and a few senators too, like Senator Dierand Klikenstein B: Oh, shit. That hits close to home. Better send a few fire trucks past his homeless shelter. Make sure the sirens are low and slow, like an omen or something. Tell the boys that this is a ‘schedule 13’ emergency. M: Not an 11 yet, Bob? B: No-this is schedule 13 stuff, save 11 for the ‘other guys’ M: Got it. Thanks Bob, what woud I do without all your good advice? B: I dunnno-but my ass sure gets sore sitting here for the last 103 years. Maybe you could…M: Don’t even think about it Bob.

Whhoooooo! WHoooooOOOOOOooooOOOoooOOoooOo!
So, to put this in common terms, imagine yourself walking down the sidewalk, dodging blots of chewing gum, and the residue of mop water, or even broken glass dumped across your path. These are ordinary pedestrian obstacles, and most if not all people expect some of that when out walking.
As you continue on your  path, all of a sudden, a bicyclist heads straight towards you, so fast that they seem as if they might just run you over. What do you do? Of course, you step aside, thinking-“what a rude prick. I had the right of way- and bicycles are supposed to ride on the street!”
You brush it off, and continue on your path. An the obstacles become more and more: the couple walking along is as wide as the sidewalk, and you step off into the grass to let them pass. And then, five teenagers on skateboards; and then, at a crosswalk, people are bumping into you from all directions as if you are not there.
These scenarios above are what is described by TI’s who are being gang stalked, and particularly in the last example, this is what is known as “community mbbing,” and also “street theater.” TI’s write endlessly about this online, but they are also described by others who “suffer delusional disorders.” What’s the main difference? Proof- proof is required to indicate that such is actual, real, and happening to you.
In OGS, proof is hard to get, because of the design of community harassment and community policing, but online, it is easier to prove, now that we know with certainty that it IS happening, it IS targeted, and it IS political. And, as we see above, it IS attempting to influence you, your behavior, and your choices.
Here, below, from Breitbart News, we see targeted individuals as swing voters, but we also see that language and particularly, coded and slanderous language is used to label, and further harass or otherwise cause harm to individuals who don’t toe a party line.
While on the surface, it cannot be missed that this targeted “outreach” is yet another example of Democrat demagoguery, it also cannot be missed that “hetero-normative white people” are being labeled in ways that can and do trigger the Department of Homeland Security “threat matrix” and “bad words” lists, as “white supremacists are on every list as “hate groups”:

NH Dem Party Chair Calls Rural, Disaffected Voters ‘White Supremacists’

 

This weekend WMUR’s “CloseUp” interviewed the executive director of “Look Ahead America” Matt Braynard, whose new organization is planning outreach to inactive voters in New Hampshire.
Braynard said, “We’ve identified maybe 15,000 inactive voters who we would consider disaffected, patriotic Americans. And potentially 100,000 or more unregistered adults we’re going to reach out to.”
He explained his organization was using “psychometrics,” saying, “Normally it gets applied to likely voters universes for purposes of persuasion. We are applying it towards identifying patriotic Americans who’ve become disaffected and cynical, so we can engage them on issues relevant to them, get them registered, get them educated and turn them out to vote.”
In response, the chairman of the New Hampshire Democratic Party Ray Buckley said, “The organizing and activating of these extremists, these white supremacists, really could have a detrimental effect on the entire culture of New Hampshire.”

In the aricle above, note the use of the word “psychometrics” which literally means ” the measure of psychological effects in order to cause persuasion.” This is not insignificant, as we see that “influence” is the goal, and that “psychology” is applied as a tool.
In relatively harmless incidents such as this, we must ask ourselves if “influence operations” are harmful, and most likely come up with the answer that they are mildly intrusive, but not necessarily “causing harm.”
However, in these cases, when we add the fact that the data used is derived from the “profiles” that our own ISP’s have sold to outside organizations; and that these profiles are shared and re-sold across gvernment, private industry, political PAC’s, the Five Eyes Alliance, and even in the case of Israel, that our profiles are literally given to a theocratic, apartheid nation state that has not signed any nuclear treaty or even officially disclosed that it is a nuclear power the story of harm versus “no harm” becomes a question that few are willing  to ask out loud; being used against their and it becomes a question where the individual this targeted must make a stand, or simply succumb to being used against their free will in such a manner.
So, this issue of “supremacy” becomes for some of us, a crucial and key point wherein we must ask “whose white supremacy” is being targeted and whose white supremacy is not (most Israeli’s and other supremacist Jews still encourage their daughters to marry only white men). And certainly, other theocratic, nationalistic, racial, and psychological  supremacy becomes part of each persons targeting as well. So-whose decisions are we actually making when we are under chronic and constant “influence operations”?
Regardless of the answer, there is one other level of questionable targeting: the fact that beyond advertisers profiling us, we also have intelligence agencies profiling us, and then, targeting us as well, individually n levels that only nazi maad scientists were able to conceive of in decades past.
Because the past is the present is the future with intelligence agencies, we know with certainty that other, more nefarious and unethical targeting takes place, and that this takes place in secret, without our informed consent- that this entire internet entrapment scheme that has made everyone a target, has now morphed into a wider scheme of political targeting on the ‘consumer’ level; and that despite the consumer’s awareness that it is them, being consumed first, and targeted advertising only after that.
So beyond the citizens rights to protest or even to withdraw from these big data schemes, or the use of our data to make us targets, multiple levels of targeting are taking place at all times, and our decisions are under constant and chronic attack.

Copies of Nothing: police psychology and the replication of power through willful ignorance, and bullying.

It is nearly impossible to impute to the reader how disproportionate the telling of the story of “targeted individuals” of organized gang stalking is in terms of power versus those who are powerless; or that the issue of “TI’s” is in fact one of “first they came for the ________, and I said nothing, because I wasn’t a (member of the Beatrice Six). But the fact is that beyond interagency collaborationn to subvert the Constitution in the name of “goodguyism,” only the little guys and gals get targeted, while others get “flipped” or otherwise compromised.

Related Story: The Association of Threat Assessment Professionals (ATAP ) is on record calling modern “high policing ” by its proper name,which is the “parallel colluding investigation, ”and has linked this in their literature to “delusions ”. Now, I ask the reader to decide for themselves what OGS is, and take,a look at a retired United States Air Force OSI (USAFOSI) investigator who targeted me on Twitter, accusing me of being a serial murderer, goading me with violence, and, eventually being hacked, with “face orbs ” and a link to pogo-pins placed on my computer, as bizarre -acting people in hoodies ran around outside my apartment .
Organized-and Irgunized gang stalking is THAT weird. And, so was the depopulation /genocide /ethnic cleansing of Palestine, aka the Great Israelification

So let’s take a look at one of the many illegal database schemes that has been minimized or eradicated from our ability to view this illegality in the press, and where innocent people and Americans were targeted by an intelligence agency that was really a multi-agency Hydra of subversion on American-and international shores.
The DEA and the SOD database: They needed a code word to describe their voyeurism, and then, to discredit those they targeted with clandestine, illegal, iun-Constitutional HUMINT campaigns of coercion and terror.

Let’s first take a look at “police psychological profiles” that are generally stuck somewhere in the toilet, as most of the religiously/Freudian afflicted are, and then, add the opportunistic and voyeuristic and eugenic nature of feminist jurisprudence through the eyes of Kurt Vonnegut, who was popular with militarist feminists during the rise of the neocon “left” and the DVIC, where we discovered that women’s violence is well financed, and internationalist, because “hungry hungry hungry!“:
From “Breakfast of Champions,” where Vonnegut- a survivor of the fire-bombing of Dresden– critiques “white male power” but forgets to note “white female privilege,”which is perhaps more deadly, if Dresden, or Holodmor are any example .
wide open beavers.jpg
So, voyeurism (the NSA to local LEO data theft pipeline) and photography ( they frequently make threats that they have secret databases with TI’s pictures in them; and agencies are indeed using our televisions and our laptop camera’s to spy on us according to all major media) is a major them of these neo-fascists and their Hegelian counter parts, and the “TI” is their secret passion, as women’s deviance and violence takes different and creative forms.
If I showed you pictures of “TI’s” you might laugh, or mock them somehow, as many of them appear in mug shots, due to the disproportionate force and fury with which western societies prosecute the poor and the disenfranchised. Many of them, like the now-famous Timothy Trespas, are easily discredited because they “don’t look like “us”.”
Odd, how the bane of aging white feminists everywhere-“lookism” has become the exact tool with which these target and harass people in official source gas lighting, such as the case where the New York Times Mike McPhate conspired with Lorraine Sheridan to cover up this crime in last years article.
I have written about TI’s from a variety of standpoints, but one thing that can be said with certainty is that they are frequently “not” super models or muscle bound ‘heroic’ figures from ancient Greece, though there ARE exceptions. And, like anyone, they ave their faults and flaws.
What makes them different though, is that they are often stripped of the pretenses of power fairly early in life, and have frequently been labeled by those who value power. As such, as Glenn Greenwald has noted, they have “no place to hide,” when operations like the illegal and warrantless  NSA/DEA/CIA/FBI decides to turn their lives into a free for all. so beyond merely being involuntary HUMINT assets, they are also mocked for being so, and with the approval apparently, of “psychology,” despite NONE OF THIS being authorized or even acknowledged in a legal framework anywhere.
I recently spoke with a man who was engaged in a custody dispute with his wife, a former stripper who has an extensive network of admirers in policing, and he described how he was forced onto a stretcher in a bizarre “set up,” much as we saw in the DVIC deterioration of Andy Ostrowski, who once opposed PA Governor Tom Ridge.
The source was locked up on a 72 hour psychiatric hold, to try to create the appearance that he is mentally ill, which is bad enough (tested negative). But the story gets really sick when he describes how “there was even a photographer present taking closeup pictures of my face as they did this, pulling him from his home and placing him in that position, as his young daughter was spirited away by Child Services.”
And I spoke with a woman whose neighbors-wonderful progressives in a “progressive” city, framed her as the neighborhood crank as they waged loud parties next door. Her mugshot looks exactly like that. And then, after they got a fifty year restraining order on her (because she told the judge ‘why don’t you just make it ten, twenty or forty years’) they moved away! See how that works- let me know if you start seeing patterns-because seeing patterns can indicate delusional thinking.
So, the claim that communitarian policing is framing people is not unusual, nor is it unprecedented when individuals take a stand against this nefarious bullying. And this is no small claim, nor is it an uncommon one in the “frame jobs” that much of these make-work projects of our current government is involved in.
And the internet abounds with video’s of “authorities” in power citing vague “rules” or even more un-Constitutional “policies” that prohibit photographers from filming them-public servants-at work in public. So, without a doubt, photography-which is NOT a crime- has become a tool with which institutions collaborate to defame those it targets.
In the video below, some from the DEA gets their authoritarian asses handed to them by an individual who knows that “policies” and “rules” are not LAWS, and that-for now- citizens still have the right to film and photograph these cowards who work anonymously from behind the internet switches plotting the destruction of free speech rights, due process of law, and more; that these who invade our privacy with impunity, and from behind the veil of absolutist secrecy are themselves annoyed by cameras.
And,  the citizen knows that people who cite policies and rules are in fact cowards who hide behind authority, and mobsterism, and the psychopathology of institutions that are destroying Democracy with obstructionism in the gray area of law.
And especially, note the license plates, as these federal agents work in a state that has granted official “anonymity”to public “servants.” In order to understand “what is a police state” one must understand the “privileged immunity and institutional anonymity” of these operatives.
And this, below, is what breeds contempt for the public by these same. And it cannot be missed that the photographer is described as being 5’4″ tall, and is standing against men and women who top the scales at body mass and weight. Welcome to feminist jurisprudence and policing! It seems that the “little people” are an extreme threat:

MUST SEE VIDEO:

“Fascist DEA Scum bags attempting to Censor 1St Amendment freedom of Press”

[youtube https://www.youtube.com/watch?v=kxH9N5oXkgY&w=854&h=480]
 
But for the most part, many if not all TI’s are the product of inter-generational bullying by institutional forces ranging from neighbors and schoolmates to police to mental health professionals, and the hidden networks of “goodguys and gals” who somehow see nothing wrong with “piling on.”So in order to understand my version and interpretation of “TI’s” and OGS, it requires that I define “what is a coward,”as you and others who research organized gang stalking will note that claims that GS are cowards are quite frequent in the online dialectic of OGS, and in fact a staple comment.
So, it cannot be missed that this individual filming is a 5’4″ sprite, unarmed, and questioning the authority of those who are IN FACT AND IN PRACTICE a huge factor in OGS online dialogues. Nor can it be missed that each of these photographers is practicing their rights against thousands of pounds of human meat that makes it’s living from violence, and that they are all armed.
So, beyond institutional sociopathy, and psychopaths whose sickness finds a welcome home in institutions of power, I personally view TI’s as “not mentally ill” anymore than those who pursue them, and “pile on.” It is instructive to note two things about this “phenomenon” that will help put it in perspective

  1. many of those who are “targeted” are people whose civil rights and due process rights were violated in durations of time that defy imagination and are frequently derived from warrantless surveillance and the “War on Terror.”
  2. Nearly all of them that I have talked to report bullying, and “strange” internet encounters with hidden bad actors

Read together, these form a narrative drawn from the replication of status quo superstitions and outright mythological lies that form the narrative of police and state power psychological basis, but also, plain old bullying by any other name.
So, here below is a link farm to stories about how the DEA (which is inseparable in mission or tactical applications, and methodology from the CIA at this point) used a database to illegally, and un-Constitutionally profile, monitor, perform surveillance and harass American citizens.
And for those of us who walk “unarmed” in the world with the expectation that these “goodguys and their gunz and bomz” won’t shoot us for excercising our rights is in fact and in practice, true bravery, because we KNOW they are murderous, slanderous, malevolent crooks who love to “shine a light” on “we the people” but somehow, cringe when the light gets cast on them-or scurry away like cockroaches-the video above is prima facie proof of that.
Special Operations Division (SOD) database abuse and lawsuits to follow? Who would even know where to look for the proof? I have an idea- ask those crazy peepl in the TI community!
Testilying as security theater and “goodguyism gone wild!”: How DEA agents and all other LEO’s use illegally obtained data to create and then “dry clean or launder” a case, aka “parallel construction-as well as to follow peole around and do plainly bizarre sh!t to their internet connections, telephones, cars, homes, etc, etc….
http://bangordailynews.com/2013/08/05/politics/agents-ordered-to-cover-up-dea-program-used-to-investigate-americans-critics-say-methods-unconstitutional/
More on parallel case laundering, dry cleaning alleged crime, and illegal spying
http://www.businessinsider.com/dea-agents-cover-up-spying-program-2013-8?IR=T
Prosecutors and supervisors cover up the program that covers up illegal spying, of “cover up squared,” layers upon layers of subterfuge and criminality from “the good guys and gals”
http://www.rawstory.com/2013/08/secretive-drug-enforcement-agency-dea-unit-told-to-cover-up-massive-spy-program-used-to-investigate-americans/
The cover up of the cover up of the cover ups, layered in a discrediting narrative, aka “who are targeted individuals?” What happens to targeted individuals?”
http://www.reuters.com/article/us-dea-sod/exclusive-u-s-directs-agents-to-cover-up-program-used-to-investigate-americans-idUSBRE97409R20130805
Correction: This post states that the videographer said he is 5‘4″ tall, when in fact, he did not say that.
That quote came from another video like tens of thousands of these types of videos, where those who actually practice civil rights then, become targeted, stalked, and harrassed by intel agents and agencies.
The guy in the video above is around 5’8″, and unarmed. If you got nothin ta hide, the “good guys and gals ”, whats the harm of one lil ol photog?

Organized stalking and police surveillance of social media: ACLU notes that targeted 'influencers,' activists and other TI's are 'real'

Police Use of Social Media Surveillance Software is Escalating, and Activists are in the Digital Crosshairs

By: Nicole A. Ozer
Map of California, with dots marking the areas where local law enforcement has acquired social media monitoring software

It goes without saying that speaking out against police violence or government overreach shouldn’t land you in a surveillance database. But it can, and it does.

The ACLU of California has received thousands of pages of public records revealing that law enforcement agencies across the state are secretly acquiring social media spying software that can sweep activists into a web of digital surveillance.

This set of public records requests is part of our ongoing work with community groups to shine a light on surveillance technologies and call for community control in decision-making around policing. Last year, we worked with local activists in Fresno to reveal that its police department was using a MediaSonar social media surveillance tool that boasted the capacity to identify so-called “threats to public safety” by monitoring hashtags such as #BlackLivesMatter, #DontShoot, #ImUnarmed, #PoliceBrutality, and #ItsTimeforChange.

But we had a hunch that Fresno was not an isolated case.

So this summer, we requested records from 63 police departments, sheriffs, and district attorneys across California. And what we learned from the documents was alarming.

Of the responses we’ve received, 40% of the agencies (20 in total) have acquired social networking surveillance tools — many of them in the last year.

We found no evidence in the documents of any public notice, debate, community input, or lawmaker vote about use of this invasive surveillance.

And no agency produced a use policy that would limit how the tools were used and help protect civil rights and civil liberties.

The utter lack of transparency, accountability, and oversight is particularly troubling because social media surveillance software used by California law enforcement — tools like MediaSonarX1 Social Discovery, and Geofeedia — are powerful. And our records from Fresno and several other communities reveal that some have been marketed in ways to target protesters.

Our records show that Geofeedia’s marketing materials, for instance, refer to unions and activist groups as “overt threats,” and suggest the product can be used in ways that target activists of color. At least 13 California law enforcement agencies have used or acquired Geofeedia.

In one exchange with law enforcement, a company representative suggested to San Jose Police that they should use the product to surveil the “Ferguson situation,” even though the city is roughly 2,000 miles from Ferguson, Missouri. San Jose Police did in fact use Geofeedia software to monitor South Asian, Muslim, and Sikh protesters only a few days after acquiring it.

An email to the San Diego Sheriff touts a “collection” of social media content curated by Geofeedia following the non-indictment of Darren Wilson.

And yet another promotional email invites the Los Angeles District Attorney to learn how Baltimore used the software to monitor and “stay one step ahead of the rioters” after the police killing of Freddie Gray.

Law enforcement should not be using tools that treat protesters like enemies.

The racist implications of social media surveillance technology are not surprising. We know that when law enforcement gets to conceal the use of surveillance technology, they also get to conceal its misuse. Discriminatory policing that targets communities of color is unacceptable — and secretive, sophisticated surveillance technologies supersize the impact of racial profiling and abuse.

The good news is that we’ve seen that when surveillance is forced into the light, communities have the power to call out racist policing practices and stop discriminatory surveillance in its tracks.

Remember Fresno? Armed with proof of Fresno’s social media surveillance experiment, a diverse coalition of local activistsknown as Faith in the Valley successfully mobilized and organized to pressure the police to roll back their social media surveillance program. The community is now pushing to pass a surveillance technology ordinance to make sure all surveillance technologies are publicly debated.

In Oakland, community members organized against plans to build an expansive Domain Awareness Center that would have collected and stored hundreds of terabytes of data on Oakland residents. Now Oakland has a Privacy Commission that advises the City Council on surveillance decisions and is currently drafting a surveillance technology ordinance.

And in Santa Clara County, right in the heart of Silicon Valley, a diverse coalition successfully organized against plans to buy a Stingray cell phone tracker and then worked to enact a comprehensive surveillance technology ordinance that requires transparency, accountability, and oversight for all surveillance technologies.

In this spirit, a powerful coalition of national organizations is launching a multi-city legislative initiative, Community Control Over Police Surveillance (CCOPS), to introduce more local laws to bring transparency and community control to the acquisition and use of local police surveillance technologies.

Here in California, community members are working in Palo Alto, Fresno, Oakland, Berkeley, Santa Rosa, and Santa Cruz to ensure that similar laws are introduced in their cities.

Whether it’s social networking surveillance, stingrays, or something else we haven’t heard of yet — it’s time to push secret surveillance into the light.

We have the power to stop discriminatory surveillance and put control where it belongs — in the hands of the community.

Nicole Ozer is the Technology and Civil Liberties Policy Director at the ACLU of California. 

Read more about community control and surveillance technology in California:

Val is an electrician, and he was approached as a gang stalking recruit in an environment loaded with Durkheim's 'anomie'

Val is a merchant mariner, one of the most noble professions I can think of. When he is not at sea, he works with his family as an apprentice electrician, in a wealthy area of a large city. Then, like most men who are men, he spends some time when he is not at sea hanging out with other men in gritty urban environments, and associating with friends from where he grew up.
The only problem for he and his friends is that they all grew up in one of the biggest and most notorious urban American ghetto’s that is a virtual powder keg of the toxins and effects of racism and the disparity of wealth in America which is more evident every day, and highlighted by the DHS/DEA/FBI/Etc Alohabet asset forfeiture racket that targets real estate for profit.
And, they grew up on a watchlist called the CalGang database, which literally monitors gangster babies from birth as if they are a threat to organized society.
And this database like so many others today which are hidden beyond the view of those who are catalogued in them-this database presumes criminality from birth (and most, if not all DVIC and DHHS lists also are used to track, and target lower tier American males, much like a modern slave net).
As such these men are literally and in every sense “targeted individuals.”

Related Story: It’s time to ask why so many Ferguson, MO Activists are dying in odd “suicides” One of them, Darren Seals, even reported that he was stopped and interrogated by ‘ten men who ‘told me I that I chose the wrong friends.’ Then,shortly thereafter, Seals apparently shot himself in the head, and then, set his own car on fire to hide the evidence.
So, we see that strange suicide is one way to measure the “effectiveness” of gang stalking.
UPDATE: The Daily Beast has documented many more murders of black men in that area, during that time period.

As you have probably guessed by now, Val is also black. Such is the power of stereotypes, but also the power of language used in propaganda-most western people believe that blacks are the primary residents of ghetto’s ( an out dated term in itself, as “the hood” is used by ghetto dwellers all around the world due to Hip Hop music.) And as such, Val hangs out with other black people. And unlike Jewish ghetto’s of earlier era’s, these men are not self segregated.
” I hang out there when I am not at sea, because it’s my way of giving back, and trying to let them know there’s more than that-living there.”
What Val is saying is that he was fortunate, and that he “got out,” of the enforced entrapment and containment scheme that American ghetto’s are-and that in order to inspire others, he feels he has a duty to go back and “associate” with those who are “still there.” And it is this which made him a target of recruitment for gang stalking; and a possible “threat” in the matrix should he not comply with community policing.

Related Story: “Iconic” civil rights era phtographer Ernest Withers photographed all of the major civil rights era leaders at point blank range. And, he was also an FBI informant-a rat and spy. Not incoincidentally, he was with Martin L. King the day he was murdered (try not to let these coincidences bother you when you make the connection between FBI gag stalking and murdered dissidents, authors, activists and “others”)
0505-edward-crawford-tear-gas-canister-8
And,the subject of this “iconic” photo above of the Ferguson protester Edward Crawford fits into the cohincidental patterns you find in the gang stalking dialectic too, as Mr. Crawford was found dead shortly after this photo was taken. Try not to let these patterns with photographs, and photographers bother you-it might make you crazy, according to the experts!

Then, there is a little known fact that black American’s who police their own neighborhoods are tracked, targeted and assassinated for doing so, as we saw in the 1960’s with Black Panthers and others, and even today; whereas Jews have their own police in the Bronx and other places. In fact, in western nations, only Jews are allowed to police “their own.” SO certainly, we must ask who it is that enforces racial barriers, as well as polices speech, and association around these topics.
While association isn’t illegal yet in western countries, in the paradigm of OGS, association becomes a de facto reason whereby police power can entrap and recruit others into the “community policing scheme.” As anyone who has watched the last few decades, change comes very slowly, if at all, and even then, it is mediated by police power, which acts as a gatekeeper between what is “good,” and what is “bad,”- but all of THAT takes place in the many gray area community policing schemes. Good and evil then, are mediated in the internecine battle ground of hidden strife between police power, and “we the people” in a hidden battleground where every day rights and liberties are pphrased-for some, but not all- as “privileges and immunities” or as “necessary compromises.”
Val’s story of being recruited into community policing
” I was back one time, and all of a sudden they swept up on us. We were in a pretty large group, mostly a bunch of guys just hanging out. They put us up on the wall- you know, spread your legs, keep your hands out of your pockets, like that. I had no problem with it really, you get used to it(….) and I complied. Then, after they went through all of our pockets like that the usual stuff(…), they had a job to do (….).”
“So I told them about my service, and he was kind of, you know, surprised, and he took me into his SUV. He was the watch commander- four stripes…and one loop. He asked me why I was hanging around these guys, and I told him what I just told you-because I believe that the only way to make a difference is to come back here, and, you know, show thee guys that there’s something else. He left me his card, and told me to call, you know if you see something and all that. I stilll have his card on my dashboard.”
What Val is describing is the gray area between our Constitutional rights of assembly and rights of association, and the paradox that gray area has produced for exploitation of “the little guy’s” while corporate interests ranging from Peter Thiel’s conspiracy with Google and Palantir, to psychologies reliance on drug comany definitions of mental health. For some, obviously, torture is ok, as lng as it’s the “bad guys” getting water up there nose, or a few “dangerous mentally ill people” popping a few fix-society-by-drugging-you pills when they complain about being “stalked” or “hunted” or otherwise ham stringed and black bagged by gray area policing schemes.
So, for some policing is purely profitable, but for most, the community policing scheme has produced an opposite effect on our society, and on our liberty, that is itself a civil conspiracy by those in power to force the police to become abusers of the Constitution itself.
Due to the lifting of the Constitutional guarantees of rights to life, liberty and the pursuit of happiness,” via the un-Constitutional gray area policing scheme of organized gang stalking, aka community policing,  and the full blown assault on our rights of privacy, speech, press, assembly, and every single other right that can be inferred from the right of privacy not yet enumerated-we see that a vast encroachment on our rights to “freedom of association” are crimped at the internet switch, or our telephones, and thereafter.
So, yes, this can have a disparate effect on select people, not least of which is to with draw from society that “perpetrates” such day to day abuses.
So- I would like to re-examine a main thesis of Dr. Lorraine Sheridan and David V. James, two academics whose lives have been lived in academia-which is a major social disease of our times, and which can lead to an echo chamber effect within researchers who have spent NO time in the real world-that part of it where whole neighborhoods and cities, and communities are .put on eatch lists, or databased as “gang members,” In fact, their famous study on OGS interviewed “the internet.” take a moment to let that sink in.
Then, note that the term “gang stalking” is termed “group stalking” because those who wrote the study are practicing what amounts to a form of class based, and in this case racist and sexist “gas lighting.” This happens because of the social disconnect between the modern transhumanists and actual, real people from across the spectrum who have lives outside of being mouth-pieces for the prison industrial complex. And not insignificantly, academics notoriously live and dwell in “ivory towers,” which Emil Durkheim discussed when he coined the term “anomie.”
For my purposes, I will note that ivory towers, and the incredible amounts of MIC and AIPAC money consumed by academics, can nearly eradicate human conscience, and any sense of ethics, much less insight into issues as complex as OGS as the fat of the DVIC trough swells their senses to dullness, and glues their eyes shut.
Here below is the definition of “anomie,” and some discussion of it next to a summary of the Sheridan James study-and it MUST be noted that those who are “suffering” OGS are being referred BACK INTO THE POLICING SCHEME by Sheridan and James! Let me know if you start seeing paterns here, because obsession with patterns can indicate ‘apophenia,‘ or far worse, common sense, both of which are dangerous to those who live in Ivory Towers, protected by armed assassins:

an·o·mie
ˈanəˌmē/
noun
noun: anomie; noun: anomy
  1. lack of the usual social or ethical standards in an individual or group.
    “the theory that high-rise architecture leads to anomie in the residents”

And here is the summary of Sheridan and James analyses of OGS as a likely “delusional disorder:”

Group-stalking appears to be delusional in basis, but complainants suffer marked psychological and practical sequelae. This is important in assessment of risk in stalking cases, early referral to psychiatric services and allocation of police resources.

So, Val, who I talked with this morning, reported an attempt to recruit him into the community policing scheme, by a “gang strike force” and offered the hint that cooperation with this as a “normative” duty of his citizenship was expected. Val is neither delusional, nor is he suffering trauma, because unlike others in his peer group, he had a father, he respects his fathers authority, and that father was also a world traveler. His father, as opposed to many others who got swept into high heels policing, such as this example here, encouraged individuality within “normative” association.
And, he imparted to Val a desire to “get out and see the world,” which he did. In doing so, Val, unlike his peer group, Val learned about the “hierarchy of relationships,” and probably a thing or two about kyriarchical paradigms, though he didn’t elaborate it as such.
Instead, he had a grasp on what is anomie, what causes it, and he tries to make a difference, realizing that “all things are NOT created equal.”
Here is a bit more about Durkheim’s anomie:
It was popularized by French sociologist Émile Durkheim in his influential book Suicide (1897). Durkheim never uses the term normlessness; rather, he describes anomie as “derangement”, and “an insatiable will”.[3] Durkheim used the term “the malady of the infinite” because desire without limit can never be fulfilled; it only becomes more intense.
Durkheim, who used the concept to speak of the ways in which an individual’s actions are matched, or integrated, with a system of social norms and practices… anomie is a mismatch, not simply the absence of norms.
I have discussed anomie and organized gang stalking in terms of gang stalking being an unethical, illicit and illegal practice that psychology, and policing and the hidden networks of abusive social power that are wielded by “community policing” and NGO’s and other’s who participate in it, and yet because there is an absence of “norms” or even awareness, and worse, that in a society where power is the goal, that “norms” themselves are unhealthy; as do the methods of enforcing them, and that inequitably.
None of these that act as gatekeepers and interpreters of “what is normal” have any insight whatsoever, as I have noted that hose who have written on the topic are part of the official denial of the practice; and those that do are themselves corrupt to the point of being OGS denialists who use power to enforce corruption- that corruption for powers sake IS the norm; and that OGS “symptoms” are anomie that is experienced bu those who cannot in any way participate in our current society.
Academia is ill suited to deal with OGS in any substantive way- and I suggest it is because they are socially disconnected themselves- that they embody the worst that Durkheim could have imagined. And, it is not surprising that  in Durkheim’s anomie, and our current pervasive police and surveillance state, that in:
a society with too much rigidity and little individual discretion could also produce a kind of anomie… Thus, fatalistic suicide arises when a person is too rule-governed
Note that in anomie, suicide is a possible outcome, and in fact was the subject f Durkheim’s analyses- and in the OGS dialectic,  there is nearly a constant drum beat for victims to do exactly that.
This is not incidental- it is an integral component of the eugenic nature inherent to the entire dialectic, and as such, and in the case of Val, who “got out” we see the disparate police power attempting to enlist him in the aid of becoming a rat, rather than an individual attempting to make a difference by merely setting a good example as an accomplished individual. That he is being subtly encouraged to become an informer as a first step into a wider dialectical power base, and thus, recruited into the gray area.
So, of the many things that this one example provides, I cannot tell you if Val was stalked in a specific database before the event he describes. I cannot tell you if Dataminr, Palantir, Media Sonar, or any of the many other ways that our relationships are tracked and monitored by police and others every day were deployed on him because the public does not have open access to these privatized and illicit databases.
But I can tell you with scientific certainty that he was profiled and targeted; and an attempt was made to recruit him to become an informant in his community. And with certainty, I can tell you that this all happened in a highly targeted environment, whose future has been mapped frequently from birth.

Related Story: Meet the actual, illegal, criminal, organized gangs that work in the Los Angeles policing,and tactical units.

Organized stalking and Five Eyes Alliance, disruption, online mobbing, and database abuse: documenting OGS with evidence

Most of those who write about OGS mention that they are frequently the targets of specialized internet harassment that takes various, often personalized forms*. There is the standard theft of email, sometimes as one writes it; there is the recurrent and constant theme of computers being hacked; and online manipulation of speakers who use words to communicate ideas to others, like we see with the outed JTRIG harassment-but the NSA/FBI DITU and military orgs, often working hand in hand with zionist hasbara roaches from Israel are all in on it, trying to censor and manipulate and control online dialogues, and targeting individual speakers.
And, similar things went on in Germany just before the Holocaust as well, with zionists involved at every level. In fact, everywhere you look, these religious fanatics are implicated by even the MSM. Here, the Daily Beast notes that a religious fanatic from Jews for Jesus torched the mosque of the shooter after the Pulse nightclub shooting, and like many of these types do, they also used religion as their basis (click the link- the firebombers statements are telling). So, any keen reader will note that my thesis of fanatical religions-whether Jewish or christian or one or another cult or sect-religion being key to the OGS narrative is validated, over and over.
And speaking of Israeli mind control and cockroaches, and how religion and those who practice it use all forms of coercion and bulying, even invading the heads of it’s targets, with memetc neuro fasciitis- there’s this, from Haaretz:
Israeli Scientists Unlock Secret of Mind Control — in Zombie Cockroaches: Now we know how the jewel wasp turns the bugs into helpless living nurseries.
read more.
But let’s first have a look at the catalogue’s of spy tools that these institutions are using on unsuspecting citizens. And you can imagine others have these tools as well:
The Electronic Frontier Foundation catalogues  NSA spy tools aimed at us AND them-whoever “they are” since “they” became “us too”:https://www.eff.org/files/2014/01/06/20131230-appelbaum-nsa_ant_catalog.pdf

How the CIA spies on you through your TV, and more: https://www.wired.com/2017/03/cia-can-hack-phone-pc-tv-says-wikileaks/

Renowned security guru Bruce Schneier has the British spies catalogue of tools: https://www.schneier.com/blog/archives/2014/07/gchq_catalog_of.html

One of the ways that the claims of TI’s can be tested-one of the simplest ways actually- is for any researcher to merely write a blog about OGS. Then, use the key words “organized gang stalking,” “gang stalking” “targeted individuals,” and any of any number of keywords that PRISM and XKEYSCORE, and their specially trained, biased and calculatingly and deviant religious analysts are targeting.
You will have more rapid results if you mention the fact that the US Department of Homeland Security gives special black budget money into the hundreds of millions to zionist-Jewish groups and organizations affiliated with the Anti-Defamation League, which they use for organized stalking.
Or, if you mention the fact that the FBI is basically a zionist and cult-controlled organization that has benefited from illegal ADL spying operations for generations, and those hidden campaigns of domestic terror/spying are waged by any of a number of fanatical cults and religious sects in America, with the net results being “anonymous tips” from well known informants.

For example-in the summer of 2016, there were two high profile mass shootings, and each one of the shooters shared the fact that one of the many radical sects of radical zionist hatred, called the “Messianic Jews” were involved in workplace mobbing before these events took place. In these cases Sayed Farook who was taunted about religion bullied in the work place by Nicholas Thalasinos, -and the mosque of Omar Mateen, the Florida shooter, was burned by a Messianic Jew from “Jews for Jesus” after the fact of his alleged shooting.

But where were the NYT headlines screaming about this form of domestic terrorism? There weren’t any, because aas I have noted, Jewish-christianity is the cricket, with the worm in its head.

It is also not a stretch to note that these same zionists not only helped create Hitler, but they shared similar goals and killed millions of people (which is ALWAYS the shared goal of fascists, communists, and globalists who are in fact all Fabian Socialists), while using other egregious forms of database abuse, like the IBM punch cards that were used to round up gypsies, dissenters, the mentally ill, and many other categories of people.

Then, link that blog to any substantive conversation about warrantless surveillance, criticize this system of targeting pure speech online (and in our own ‘private’ emails), or criticize the plausible deniability and unaccountability built into this system, and especially criticize any law enforcement body in any of the 5Eyes nation-states, and watch the fireworks begin! Your blog will suddenly become the darling of the Five Eyes nations as the UK, Australia, New Zealand (have a look at what and WHO is in New Zealand now),Canada, and the US start to hit your blog up EVERY DAY, 20-50 hits per day.
You will note that they key in to certain posts and pages that mention their culpability. This blog here is a recent favorite of some who read these specific posts below, nearly every day, in this order-and you can test these results yourself:
1) Gang stalking, Mormons, FBI/CIA recruitment of same
2) Gang stalking and punitive psychology
3) Gang stalking and the Martha Mitchell effect and influence operations; or how retired LEIU members act as auxilliary LEO’s, often outside the law-and as para-judiciary inluencers of the legal process.
4) the CIA and phone hacking/NSA mass surveilance of citizens/ crisis PR counter-narrative about OGS
5) Any post that criticizes, implicates, or indicts LEO’s as particpants in OGS
6) Any post that implicates military involvement in OGS
7) you will especially note that avid readers who target posts about how the surveillance state is a Panopticon especially seek your personal information/contact info/biographical data, and most of THOSE readers from military bases and so on.
In my experience, it takes about a week to ten days before the FiveEyes nations and their many web crawling, word hunting,speaker targeting data analysts, or targeted search bots/Palantir/Media Sonar/etc or any of a number of retired LEIU types and Israeli “mind controllers,” or just plain odd people who are immersed in the even-more-odd disinformation dialectic of the “paranormal” find your blog.
Then, kick your feet up and watch as your email accounts get broken into or your internet gets redirected, and your online life becomes “redirected,” or stalked even by identifiable operators( usually those who follow your blog are affiliated with the groups mentioned above). I advise that you do all of this “anonymously” within reason-but also advise you to use Tor as a research control, just so you can see how easily it is subverted. And then, do ‘timing attacks’ against your own blog using Tor as a control, and your own blog as a subject. Note how slow your blog/s load/s now-or especially, how when you type, your posts begin to drop letters here and there as if your keyboard is full of peanut butter, or cracker crumbs-or screen cast across a Fusion Center control room, or to a couple of squad cars up the block.
Use Tor on one browser, and then use several others- you should find that Tor will be ‘crashed’ frequently AFTER they find your blog, but NOT BEFORE. And, you will find as described above with the ‘suddenly sticky keyboard,” and more. Also, AFTER they find your blog, you will note that Tor loads incredibly slowly, and that frequent time-out errors will occur. Further, if you publish over Tor, you will find it to then be a target of other exploits from the Metasploit toolkit. Teardrop attacks are common, and timing attacks that crash the browser and then time your reconnection to both the internet and your blog-which also leaves your ‘cookie’ and sign in data floating about cyberspace are among the most common attacks.
And-if any of your (hopefully, deliberately anonymized and obscured) blogs become targets of this extra special attention, extra-legal, extra-judicial attention, notice also “what they are reading” across your blogs-that the subject matter frequently seeks to develop a “profile” of the writer as certain posts that contain “personal” information are pieced together to form a parallel constructed “you” in the mind or the dossier of an analyst, investigator, or agency black ops practitioner.
Test it yourself, and prove me wrong-after all, the “pro’s ” and professional activists present a unified front that OGS is a myth- a symptom of mental disease; an indicator that MORE isolation and discrediting is needed to contain the dangers of the world finding out about this practice that benefits those who practice it! So prove me wrong-if you can.
But I have found these things described above for over a decade (as have others), using multiple blogging platforms, multiple computers, from multiple states, countries and localities ranging from communist countries to countries that thrive on mob hush money, to here, in “the land of the free (lol)”and using multiple word/phrase selectors.
These terms and subjects I discuss above are the quickest, and most replicable to get the results I describe, but you can find your own.
The net result is a simple and can be replicated, and prima facie evidence that gang stalking is real in the sense that it triggers both PRISM-like bots and humans, but also triggers intense scrutiny and malfeasance: it is prima facie proof that CERTAIN speakers are targeted, and then harassed, or blog-stalked in the very least, and others are not.
In the US, this means that a pre-judicial mechanism of “denial of equal protection” under the Constitution is in effect at a baseline of un-Constitutional government conduct (and really- most Silicon Valley startups from Google to Twitter and Facebook are ALL funded with seed capital from the CIA, and fully interactive with NSA/CIA/DIA/FBI packet capture/black operations via the internet ‘backbone’/influence operations/redirection/code injection/ at ALL times).
Lastly, I would like to point out another fact of OGS: if and when the writer reveals their actual IP location, or actual contact information, they will also be able to document “web interception and redirection” in a variety of ways. This story herein covers that. I bring this up, because upon the discovery of writers and others who document OGS, the Five Eyes then entraps the blog off shore, or on a server that cannot be traced back to them directly-that hose who work in these intelligence collection hubs ‘contain’ or entrap’ the blogs so that further black ops/surveillance/timing attacks/code injection can take place.
And this too, can be monitored, and data collected to document that OGS online s indeed a “real thing” and evidence of same accrues as soon as a researcher follows the steps outlined above.

  • some things are just TOO predictable: as I wrote this post above, online-live- I was cut off the net, and the AP that I was using disappeared, replaced by several that are unfamiliar to me, or the location from where I blogged this post. I could not log back in because the AP I used( from a well known corporate coffee shop)completely disappeared. You just can’t invent some things. I ket sceen captures, but I do not have an anonymizer to strip the meta-data from those. But you can test this scenario yourself as well.

Organized gang stalking and Countering Violent Extremism programs: how"Disruption"programs work-a privacy and due process raping boondoggle, and security theater cash cow.

The goal of all of this privacy rape, and due process subversion by the NSA/CIA/FBI/LEO data theft? Who knows, and  whatever-cuz’ it’s “for the children.” And ANYTHING that is for the children is big money in a totalitarian or surveillance state. The ones who aren’t bombed overseas-aka “the remnants of” the “children”-those that are left after the DVIC and the MIC with ts affiliated “industries” has “their way with them,” first. Pre-natal supremacy over ‘the children’ and the MIC is a one way street.
Soft force eugenics and child abuse: how the DVIC and the MIC maintain religious, and narrative supremacy over future generations. Meet the Countering Violent Extremism programs which are really ideological restraints on privacy, rights of assembly, and rights of free expression, coupled with violations of the equal protection clause of the United States Constitution.
Imagine you are a peace activist, or NOT a member of one or another sect/cult/order/denomination of a Jewish-christian religion; or you’re an atheist/humanist/whistle blower/ activist-even a ‘petty criminal’ who smokes pot-and one day, you find that you seem to bump into the same faces all over town-that ‘faces’ re following you. That’s odd, you think: that 6’2″ tall guy in the brown Eddie Bauer loafers, classic Dickey’s slacks, and the close cropped, fawny Germanic brown hair that matches his shoes,and who drives an oversized big red Ford pickup-he was everywhere I was today: whipping into the parking lot at Target, or sweeping into the restaurant that serves the “ethnic food,”and trying to bury his angular 6’2” frame into a booth. Odd, you think- how a guy that big can hide himself behind an 18″ tall menu….
Naw, you think- must be my imagination. The 18″ menu format, I mean.
And then, for weeks, this pattern repeats itself, sometimes with the tall guy, sometimes with others, usually white but frequently erudite and well dressed 6’3″ brown and black people (also, often with dreadlocks and blue suits; or pert Persian women in sensible flats, with cameras in hand, asking to take your picture at peace marches, or anti-apartheid meetings). The squat, weight-lifter framed black woman with the bad weave, and the sensible backpack and recognizable mid-western accent coupled inevitably with the tall brown shoed flatfoot; the Asian man who is a modern Charlie Chan, but with real Asian heritage and ethnicity, showing up on buses, coffee shops, AA meetings maybe (I have that on reliable sources, I promise…).
That’s odd, you think- this has been happening for weeks! Months! YEARS!! And you become a bit ‘paranoid’ and a bit on edge, looking over your shoulder all the time, because those same faces show up frequently; sometimes across the states.
Related Story: The Brennan Center for Justice at NYU CVE link roundup
About then, when you notice, and especially, when you begin to document it in some form-it stops-day after day goes by and you don’t see the tall guy, or the middle eastern or the Kenyan man following you; and the late middle aged shrew with the strange comments in the grocery store about ” I know what you READ!” disappears too. A week or two or a month goes by, and then new things happen: you come home, and the lock on your door is somehow different-usually it is more loose-but now it’s harder to get your key into(this can go both ways, as each lock smith, or lock picking set is different); or there are strange marks on your door jamb (sometimes a three pronged tool is used, other times what appears to be a wide, flat screwdriver).
The Black Bag Job, illustrated:
1563470456369
IMG_20190719_012742
1563470581341
1563470538651
And the internet, of course- you try to log in to Gmail, and as if you are being transferred to a computer across the world-twice-as it takes between seven and twenty seconds just to log in-EVERY TIME, whereas in the past several years, it was a matter of one to three seconds. You notice that you Gmail address has been switched from San Francisco to Irland, or he UK-odd, that you would take the time to notice that-you probably are losing it.
Strange, you think, I haven’t changed ISP’s, or used a new computer, nor have I changed any settings on ANYTHING. And certainly, I don’t live in Kansas, anymore. And certainly, those brand new wireless AP’s that spring up outside your house with kewl names like “MAdame PSycho,” and “Not the FBI Surveillance Van,” or “TAO2” are all in your head. Sure-that’s an option too.
Hmmm. And the pop-ups and advertisements on your computer will take on a life of their own, as for years upon years, you got ESPN, Manchester United schedules,  and “subscribe now!” popups every time you are on the computer reading news for free, or maybe an occasional ad for the “Penis Pump,” or free Viagra samples(no-really that wasn’t my case, I swear) but you now get pop-ups asking you about tinitus, and advertisements for middle eastern vacations-ads in Arabic. Maybe you get the weird pop-up about gun shows in Texas(“deep discounts for LEO’s who buy in bulk!”), as your IP registers in Nebraska….
And, the phone of course- your phone now has the ability to occasionally talk back to you- about what you did yesterday, or an hour ago (and this will happen only once or twice, just so that you cannot begin to document it.)
This is on the surface one of two things: you are going totally and completely bonkers-nuts to the meat grinder mad-you are deteriorating as if your mind has been taken over by ‘something else” that somehow knows who YOU are, and WHERE you are at all times, even if you’ve never owned a gun in your life, or used a penis pump (well-who HASN’T used one of those?!!).
You become pre-occupied with little strange happenings like your garbage being tipped over in your alley, or the long scraping marks left on the siding of your house by a ladder-maybe in your paranoid mind, you connect those random events: the ladder marks to your now debilitated security cameras whose cables had been disconnected RIGHT WHERE THOSE LADDER MARKS scrape your siding, and ding your white aluminum window trim with deep scars and gray marks.
Maybe the little camera left behind in your sons bedroom is a sign of something evil-who knows, right? It’s your word against the deep state, and all of it’s military/LEO/psychologist/MIC/PIC/religionist/occultists-who-work-in-government. And who are you, really? It’s for the Children (hitler youth), after all!
Or, maybe the reports from your neighbors about how they saw other strange fat white men jumping your fences, or signalling to each other from your alley to the street, or using strange hand signals just as they hopped into cabs that JUST HAPPENED TO BE WAITING THERE in front of your house strikes you as “odd” reports from a good and trusted neighbor.
Suuure. Maybe your going crazy-along with your neighbors, who ALL report these things to you. And some of whom are suddenly building fences, or installing their own security lights and cameras.
Yup-you’re nuts, prolly. Orrr mebbe….
Maybe another option that is a little less crazy perhaps: you are being covertly and totally [email protected] with by one of any number of sources ranging from LEO’s to military operations, to strange cultists or organized gangs of pedophiles* that most often are run from within the official cover of state agencies and their affiliated “good guys” and girls (here is one possible case of that. And read through this blog to help understand who else it might be.)
But in many of the early cases-stemming back to around 2001-these were often covert intimidation/recruitment/entrapment/coercion/conformity/manipulation schemes that loosely fall under the category of “countering violent extremism” programs run by any of a number of unethical operators ranging from LEO’s, task forces, and intelligence agencies to private contractors.
And, the one key feature they all have in common has a plausible connection: agents and agencies that practice fraud upon the courts, and fraud upon the Constitution via massive, unchecked database abuse, and surveillance via electronic media such as computers, cell phones, and even televisions. You have been selected, and targeted for intelligence collection (HUMINT), informant recruitment (they want to use you as a rat), or possibly, you have been deemed a criminal, without due process of law,  due to the use of unauthorized access to your computer and Google searches, and, because that access was illegal, and parallel construction not warranted in your case (there’s a joke in there somewhere about warrants) “they” have chosen to use you as a moving target for all their new military grade electronic toys and weapons.
Related Stories: Have a look at the bizarre world of parallel construction from Techdirt.com-the practice of LEO’s breaking the law, and violating the Constitution, and then doing plastic surgery to put a new face on “criminality.”
Sooo…….
Welcome to the shadowy, sketchy, often bizarre (and incredibly well financed) world of CVE programs!

“Countering violent extremism programs have been identified by the government as a top national security priority, but the public knows appallingly little about them,” says Hina Shamsi, director of the ACLU’s National Security Project. “We’re suing because government agencies have repeatedly failed to provide us information that we’ve requested about the nature of their CVE initiatives.”
In a briefing paper released with its lawsuit, the ACLU said that CVE programs often target “people for monitoring based on their beliefs or ideologies,” thus potentially criminalizing speech protected under the First Amendment. It also highlighted past abuses of CVE programs, including instances in which young people who refused to take part were characterized as radicals and where community leaders were told they would have to identity and discuss cases of specific youths with law enforcement.
The Department of Homeland Security declined to comment for this story, citing pending litigation. The Department of Justice did not respond to request for comment.
Government-led CVE efforts in the United States are inspired in large part by programs rolled out in past years in the United Kingdom. Broadly speaking, CVE programs seek to expand counterterrorism efforts beyond law enforcement to involve other government workers, like teachers and social workers, as well as community leaders outside of government, like clergy. They can involve propaganda and other communication strategies as well as monitoring and questioning.
Those programs have been deeply controversial in the UK, where civil society activists have blamed them for exacerbating ethnic tensions within British society while failing to meaningfully fight extremism. In recent months, the U.K. government has also rolled out anti-radicalization programs in schools, which have led to instances in which Muslim schoolchildren have been stigmatized by teachers as potential terrorists.”

*One recurrent theme in almost ALL OGS blogs is that those who are targeted are also slandered with a variety of “labels” ranging from drug dealer/user/ to prostitute to “pedophile”. But the reality is that state organizations, police, psychologists, lawyers, the courts, CPS, foster care, social work, and many other subsidiary organizations are a multi-billion dollar per year domestic industry, subsidized by the Jewish-christian ideological state to get children funneled into the Domestic Violence Industrial Complex (DVIC) by hook or by crook (be the shepherd, not the sheeple and all that.)
Each child that is successfully stolen or otherwise diverted into this “system” is a cash cow (cash sheep?) returning dividends to those who are part of this system. For instance-foster parents can rake in between 800-1800 per month, depending on the state, per child. And any child that becomes involved with CPS ca returns some 70k or so per year to those who participate in this business.
Not surprisingly, Myron May, a man who claimed he was gang stalked, was the product of the multi-million dollar Christian foster care factories that are dotted across America-and no researcher of OGS has yet made this connection between him, and this systematic profiteering off of children as commodities.
Disclaimer: I make no claims herein specifically or intentionally relating to the financing of the Taunton Foster care community, and intend this example as one of many where children are used as cultural capital as well as actual capital. owever, I have long been a critic of the DVIC foster care factories that dot America and that are themselves a 4 billion dollar per year industry. Children taken into foster care stand an 80% ncreased chance of sexual abuse, or othher harmful situataions, and the feminists/internationalist/bolshevik elements of many “progressive” state depend on this revenue, and use it for political action.

NSA spying, intelligence cults, and "meta-organized" stalking

At this point in time, we can safely say that most complaints of gang stalking involve contact at man y levels with the vast, unnaccountable, and hidden surveillance apparatus that we now know as ” the end of Constitutional Democracy” in the west.
Using multitudinous, alphabeticus intelligence agencies, and police forces across the globe, and across America, the rights and freedoms that citizens thought were guaranteed have been torn from the roots of democracy, and poisons applied to that which is left.
In America alone, the NSA theft of our data has now resulted in that data being turned over to 17 spy agencies, to do with it what they will. And as the past is the best predictor of the future, that means that the numbers of “targeted individuals” will increase exponentially and build critical mass so that many of those who claim to have been targeted in the past will now have company from many others- perhaps your own son, daughter, or significant other.
And, maybe at that point, you will remember that you were quite content to watch and do nothing as others appeared ‘crazy’ and you did nothing. And, maybe then, you too will join me in bringing awareness to this topic. Because- “first they came for the [ ________ ]and I said nothing….”
Related story: gang stalking and “electronic implants”: How the NSA, Israeli spooks, and other agencies use the words electronic “implants,”when speaking of hacking through air-gapped systems,such as the case of the Iranian nuclear program, from Ars Technica
Because, of course, all of our unfiltered, whole capture raw and unfiltered data was shared with Israel first, for the last deacdes– and of course, they would NEVER do anything bad with it, cuz, Holocaust! And zionist/dominionist religious fanatics are our friends- right? Who could possibly know more about building a better mouse trap?
Strange equivocation, that.

Law & Disorder —

NSA to share data with other agencies without “minimizing” American information

Rules opposed by civil liberties and privacy advocates.

Image: Ulrich Baumgarten / Getty Images News

On Thursday The New York Times reported that the Obama administration had recently finalized rules to give the National Security Agency (NSA) more leeway in sharing its vast trove of intercepted communications with the 15 other government agencies that make up the Intelligence Community.

Previously, agencies like the Drug Enforcement Agency and the Federal Bureau of Investigation would have to request information on a target from the NSA. The NSA, in turn, would retrieve communications pertaining to that target and scrub the documents of information that was considered irrelevant to the search, including the names of innocent Americans—a process called “minimization.” Now, that middle step has been cut out. The agencies need only get approval from the NSA to access its data, and agents from the agencies are expected to carry out minimization on their own.As The New York Times puts it, “Essentially, the government is reducing the risk that the NSA will fail to recognize that a piece of information would be valuable to another agency, but increasing the risk that officials will see private information about innocent people.” Although the agency analysts who will have access to the NSA’s surveillance powers are directed to ignore and redact information pertaining to innocent Americans, if they see evidence of criminal acts in the data they access, they are directed to hand it over to the Justice Department.

Gang Stalking and Fusion Center spying and artificial intelligence: yes, "they" ARE spying on you, in real time

Now that the slow roll-out of totalitarian domestic spying has occured (while you were sleeping, perhaps), we can look back at the many felony lies to Congress by NSA and CIA chiefs, and the local lies from Fusion Centers and the FBI and local police to see that, well, it was all lies (then take a look at how deep state players created a bomb hoax, and a designer bomber who allegedly targeted those exact CIA /FBI /SOROS funded senators and others who lied to Congress ).
And, Democracy was dead after that- those with power had, and do, and will continue to destroy our democracy-because they can, and because YOU are letting it happen.

Related Story: the Association of Threat Assessment Professionals (ATAP) calls police and private contractor sponsored organized gang stalking “colluding parallel investigations.” And many ATAP affiliated private contractors company names are, not surprisingly similar to the military acronym for psychological exploitation of targeted influence operations, aka PsyOps. use is closely associated with Fusion Centers, and a staggering amount of OGS complaints, and their crisis PR is what drives narrative in the press, and in police related public relations. . Americas 77 Fusion Centers are also very well disguised, each of them using different names, so that citizens cannot connect the dots.

Related Story: Washington State Fusion Center distributes bizarre “mind control ”documents to FOIA requestor, who asked for a different set of documents entirely 👽💩👻
From Techdirt.com, in April of 2013-two months BEFORE Edward Snowden:

You may recall that, last fall, a Congressional investigation completely slammed Homeland Security’s “Fusion Centers” — noting that despite DHS insisting that they were critical to “fighting terrorism,” the actual evidence showed that they had done nothing helpful in the fight against terrorism, but were instead chock full of wasteful (possibly fraudulent) spending… and with an added dose of civil liberties violations (just for fun).
“There’s misconceptions on what fusion centers are,” he says. “The misconceptions are that we are conducting spying operations on US citizens, which is of course not the fact. That is absolutely not what we do.” link

But what ARE Fusion centers- and what are they supposed to do? Nobody, anywhere seems to know, but those who have experienced various forms of “electronic harassment,” and strange internet shenanigans certainly know that these centers are doing something. Targeted individuals have been telling us for years, what we all now know.
From the ACLU: what Fusion Centers are supposed to be doing

UPDATE: Police, and Fusion Centers have begun waging media hoaxes attempting to discredit victims of illegal Fusion Center spying, and here we see an actual Fusion Center in Washington state distributing “junk information” to the press about mind control, and here we see local police and sheriffs deliberately waging a media hoax, claiming that a dangerous drug, fentanyl, was put onto fliers that were then placed on squad cars, right outside the police station.