The going dark problem and Silence on the Wire: silence is a two way street, and the case of Russian counter -surveillance of Americas political police using “low risk” tactical methods.

If you’ve ever sat still, in a quiet room, for a single moment, you know that there is no such thing as actual silence, because your own body makes noise.

“The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,”

Breath, and other organic, natural acoustic utterances or disturbances are a constant compliment to your presence. Then, there are the subsidiary, environmental and natural sounds around you, as the breeze, or the distant hum of nature in its various forms.

And so, this is the human baseline of silence, and it is a valuable starting point within which we discover the fatal flaw of all so called intelligence, and counter -intelligence: the arrogance of intel operators in assessing the value of data received or sent, because after disruption and beyond the human baseline,its all just “other ”noise. And noise then, becomes a two way street.


Related Content:
Free download of Silence on the Wire: Field Guide to Passive Reconnaissance and Indirect Attacks,by Michal Zalewski

So, in a free world, one would expect that the human rights and guarantees of “freedom ” would be maintained nearly religiously; as nearly religion itself, by those who draw paychecks based upon their oaths that they vow to uphold our constitutions.

But thats not what is actually happening in the west, since US, British, and the allied nations began their religion based, tribal-sectarian holy war that kicked off in 2001, and guys like me got to meet the “deep state ” head -on, after writing news stories without tribal -sectarian bias, and true to the form of the principles of journalism, and anticipating the Total Surveillance State.

 

Related Story: Take a look at how I was the first person in America to report on manufactured terrorism, and then, got years and years of black bag jobs,cowardly morons rifling through my belongings, and news stories stolen right out of my phone and email, and everything I describe herein AFTER that and more.

And look how that turned out for me, PERSONALLY.

Indeed, with the US FVEY spying,the accompanying “community policing, ” the western governments can no longer claim that they respect, or uphold anything resembling democracy backed by civil rights and due process procedures, much less freedom of any type.

So, it is here, where western governments have turned ordinary citizens into involuntary, non -consensual surveillance targets( aka Human Intelligence or, HUMINT )where the noise of ones own, voluntary silence is, “disrupted ” by the FVEYs data theft on every persons phone or computer and then, the exploitation of that data by intelligence operators to create what Dr. Lorraine Sheridan and others call “an echo chamber ” both online and off that is mediated by western extremist religious and political ideology, as we see here and here.

So, ROGS, the blog you are reading here, is what is called in psychology, a reaction formation, to the newly emerged total surveillance state, and the death of American democracy, which I once believed in whole heartedly, and fought for, very vainly, with well chosen words.

My country is no longer a democracy, insomuch as it ever was due to the multi-tiered levels of privilege, doled out to the select men and women, contrasted against the multi -tiered levels of slavery, peonage, and debt servitude that these others cast upon the poor, the dissenter or activist; the heretic and others who fall into the hidden slavery nets of any of the many sects and cults of organized religion, working through government apparatus both online and off .

So, this theological filtering, regardless of what cult, or sect, is also the baseline for all western dialogistics as we see in the sectarian targeting of men by known race -based operators; and in the resultant cult practices that follow, such as the un -naming of (primarily ) men in this example here and other examples I provide here at ROGS.

So, in such an environment of what is essentially the mass exploitation if individuals, and groups of individuals, one cannot act of actual free will, because these operations, and these operators, are in constant disruption mode. Its what their version of a society is.

In that light, there are many ways to use silence, and also noise to discern their capabilities, tactics, and methodology, AFTER the fact of them, casting you into their various webs of interaction FIRST.

Keep in mind that the pre -emptive, anti-democracy, anti-due process, sectarian secret police state justifies itself not from law, but from their version of tribal -religious and moral superiority.

In that world, its all binary, I /O data analyses: Kill or be killed; heaven and hell; black or white; Jewish or not Jewish; Republucan or Democrat woman or man, etc.

And it is that analyses which is its flaw, which is why they break and bend, and prostrate the law in gray area policing, aka “high policing ” aka political policing, as we saw with the al Ghazali problem.

So, no small surprise then, when ROGS was able to out a few Department of Defense affilliated persons here who targeted me on US soil as they worked ine or another angle of fraudulent FBI /DHS /Private contractor CVE program, or cult members who cyberstalked me on Twitter, working with Democrat party with operatives INSIDE Twitter monitoring my location; or most recently, yet ANOTHER Department of Defense affilliated, Brookings Institute person following my blog.

As I said: I know what kind of noise is natural, like how this humble electrician and merchant mariner was literally recruited by a gang strike force in LA, versus any of hundreds of bizarre DoD/DHS /FBI /NGO affilliated time wasters they toss,at me, like these guys here

So if little old ROGS, an American citizen who has never been convicted of any crime in any trial based in constitutional law, civil rights, and due process can be targeted and stalked, and harrassed by those I define, and name herein, wha else is goung on in western democracies that remains hidden?

And it is that last question that has,ROGS cheering for all the “bad guys, ” like Russia and China and even lil Kim in North Korea, apparently absent from an important meeting recently, lol. Because when “America, land of the free ” morphed into “America, just another police state, ” ROGS and hundreds of thousands like me got thrown under the bus.

Listen: China is thriving, and Russia protects Edward Snowden to this day, and Kim is no threat to anyone.

But I guarantee that CIA/DIA/NSA /FBI feeding down into “parallel colluding investigations ” and the subsequent constant surveillance of our webs of relationships single -handedly voids the constitutional compact, and the social compact as well.

So, I like to fight back by deploying counter -surveillance directly at those who point it at me, because my personal silence has been “disrupted ”. And in so doing, I learn a lot.

Here below, we see how Russians were able to anihilate FBIs urveillance teams privacy, and also how they were able to use this not -so -covert, sloppy, bizarre surveillance to gain valuable data about US security.

Which, would, under normal circumstances, inevitably undermine US security, if our own agencies hadnt ALREADY done that.

But in total surveillance states, security is ALREADY pre -emptively undermnied by tribal -sectarianism, and those who have deployed high policing on their own citizens .

The case of the Spies who laughed last, at Americans who use their own fellow citizens for “electronic target practice,” or:

FBI Follies, from Russiagate, With Love, via,Yahoo News Exclusive

Exclusive: Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil
Zach Dorfman, Jenna McLaughlin and Sean D. Naylor

Yahoo NewsSeptember 16, 2019

The discovery of Russia’s newfound capacity to crack certain types of encryption was particularly unnerving, according to former U.S. officials.

“Anytime you find out that an adversary has these capabilities, it sets off a ripple effect,” said a former senior national security official. “The Russians are able to extract every capability from any given technology. … They are singularly dangerous in this area.”

The FBI’s discovery of these compromises took place on the heels of what many hoped would be a breakthrough between Washington and Moscow — the Obama administration’s 2009 “reset” initiative, which sought to improve U.S.-Russia relations. Despite what seemed to be some initial progress, the reset soon went awry.

In September 2011, Vladimir Putin announced the launch of his third presidential campaign, only to be confronted during the following months by tens of thousands of protesters accusing him of electoral fraud. Putin, a former intelligence officer, publicly accused then-Secretary of State Hillary Clinton of fomenting the unrest.

It was around this time that Putin’s spies in the United States, operating under diplomatic cover, achieved what a former senior intelligence official called a “stunning” technical breakthrough, demonstrating their relentless focus on the country they’ve long considered their primary adversary.

That effort compromised the encrypted radio systems used by the FBI’s mobile surveillance teams, which track the movements of Russian spies on American soil, according to more than half a dozen former senior intelligence and national security officials. Around the same time, Russian spies also compromised the FBI teams’ backup communications systems — cellphones outfitted with “push-to-talk” walkie-talkie capabilities. “This was something we took extremely seriously,” said a former senior counterintelligence official.

The Russian operation went beyond tracking the communications devices used by FBI surveillance teams, according to four former senior officials. Working out of secret “listening posts” housed in Russian diplomatic and other government-controlled facilities, the Russians were able to intercept, record and eventually crack the codes to FBI radio communications.

Some of the clandestine eavesdropping annexes were staffed by the wives of Russian intelligence officers, said a former senior intelligence official. That operation was part of a larger sustained, deliberate Russian campaign targeting secret U.S. government communications throughout the United States, according to former officials.

The two Russian government compounds in Maryland and New York closed in 2016 played a role in the operation, according to three former officials. They were “basically being used as signals intelligence facilities,” said one former senior national security official.

Russian spies also deployed “mobile listening posts.” Some Russian intelligence officers, carrying signals intelligence gear, would walk near FBI surveillance teams. Others drove vans full of listening equipment aimed at intercepting FBI teams’ communications. For the Russians, the operation was “amazingly low risk in an angering way,” said a former senior intelligence official.

The FBI teams were using relatively lightweight radios with limited range, according to former officials. These low-tech devices allowed the teams to move quickly and discreetly while tracking their targets, which would have been more difficult with clunkier but more secure technology, a former official said. But the outdated radios left the teams’ communications vulnerable to the Russians. “The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,” said the former official.

A former senior counterintelligence official blamed the compromises on a “hodgepodge of systems” ineffective beyond the line of sight. “The infrastructure that was supposed to be built, they never followed up, or gave us the money for it,” said the former official. “The intelligence community has never gotten an integrated system.”

The limitations of the radio technology, said the former senior officials, led the FBI’s surveillance personnel to communicate on the backup systems.

“Eventually they switched to push-to-talk cellphones,” said a former counterintelligence executive. “The tech guys would get upset by that, because if they could intercept radio, they might be able to intercept telephones.”

That is indeed what happened. Those devices were then identified and compromised by Russian intelligence operatives. (A number of other countries’ surveillance teams — including those from hostile services — also transitioned from using radios to cellphones during this time, noted another former official.)

Revisiting the case of Andy Ostrowski: organized gang stalking, federal judges, and political policing

Andy Ostrowski, a civil rights attorney, was gang stalked in Wilkes-Barre, Pennsylvania last year, his personal electronics were monitored from Fusion Centers, and local Wilkes-Barre police literally marauded through his yard,and,as is frequently threatened online by the “hidden”operatives at the internet switch- he was on multiple occasions licked up for “mental health evaluations.”
So,to the researchers of organized gang stalking, criminal and civil defense lawyers, etc.-please note this update in Ostrowskis case below,and the actual mob involved in his back story, as we see how bad actors in the judiciary,work with cortupt political police, and psychologists to literally frame suspects, and entire political narratives.
Because sometimes, the organized mob
is real, and gang stalking denialists Dr.Sheridan, James,et al are purely complicit.
From Happyvalleycitizen.com, the story of a local and possibly literal mob of gang stalkers, working over egregious periods of time to stalk, frame, and harass a civil rights lawyer,with actual Fusion Center hacking and electronic harassment to boot.

Every civil lawyer takes on cases that challenge big government entities or powerful insurance companies, but the marked difference I noticed when scrolling through and looking at Ostrowski’s cases were that there were a plethora of cases that were challenging the Pennsylvania judiciary directly. As in, the message seemed to be it’s okay if you want to go after big government or corporate America, but don’t you dare touch the judiciary. I realize having this perspective when considering Ostrowski is challenging in mostly part due to who Ostrowski is or you think he is. For those reasons, I bolster my findings by pointing out his disbarred law partner Don Bailey.
Don Bailey, (attorney for former PA treasurer who committed suicide during live television on a press conference, and was accused of some pretty nasty financial fraud allegation), caught my attention due to the cases that he was known for. Activists like Molly Biancovo or Mike Ferrence are active in promoting this idea that the Pa court Judges in Superior Court are Italian placed and part of some sort of some type of mob organization. I laughed at this idea initially, it’s like hearing someone claim that the moon landing was fake. But when you start to draw the lines that connect the relations, to the people sitting on the Superior and Supreme Courts, there is also something unsettling about the nepotism. Molly specifically first drew my attention to the Zapalla crime family out of Pittsburgh. One Zapalla brother is the Allegheny County District Attorney, but if you look a little deeper, most (almost all) of these judges have some sort of ties to the Zapalla family. Like I said, it’s one of those ideas that is so hard to wrap your head around, I resisted the inference from the beginning. Difference is, I was curious and skeptical enough to look and see what she was ranting and raving about. I wasn’t expecting there to be any merit to what Biancovo was claiming, yet the close ties are shocking.

Sloppy Cops: Judge slams FBI for improper cellphone search, stingray use "They are not the only instances of sloppy, inappropriate law enforcement work." What is organized gang stalking?

What is “bad faith” and how organized gang stalking is “fraud upon the courts.”
Federal Agent describes how he gang stalks, breaks the laws, shits on due process of law, performs gas lighting black bag jobs, which are known as “gas lighting” in the OGS dialectic.

Stonie Carlson,FBI agent describes how he performs the black bag job:
“When we approached Apartment 405, I knocked on the door loudly, as I have hundreds of times,” Carlson wrote in a November 2017 declaration. “When I knocked, the door swung open as if it had not been latched shut in the first place. Never before in my career had this happened, and its occurrence struck me as troubling and concerning, especially in the high-crime area in which the apartment was located. I immediately began to fear for the well-being of anyone who might be inside. I decided to conduct a safety sweep of the apartment.”

A case from California highlights how a bad actor in the FBI,Stonie Carlson(who lives in Alameda,CA)liesto get warrants, breaks in to peoples houses without leaving a warrant, and much more “criminality.”
Or: what is “gas lighting” as pertains to illegal government breakins, aka black bag jobs?
Lets examine the breadth and scope of how sherrifs departments are willingly corrupted by neverending investigations that use illegal means and unconstitutional methods to get“the bad guys.”()
Corruption in California, or: Caliphonication, and illegal activity by cops who work in federal Task FARCES, from ArsTechnica.com
During a December 2017 hearing, Judge Chhabria also had this incredible exchange with Randall Leonard, an Assistant United States Attorney who argued that because Agent Carlson was part of a sheriff-federal task force, he should be considered a sheriff, with all the rights of a state “peace officer.”
Judge Chhabria didn’t buy it.
THE COURT: Federal law makes him a sheriff under California law?
MR. LEONARD: Well, I mean—
THE COURT: So if federal law said that all French poodles are sheriffs under California law, would that be OK?
MR. LEONARD: Of course not, Your Honor.
THE COURT: There would have to be California law saying, “Yes, we agree that French poodles are sheriffs;” right?
MR. LEONARD: Certainly.
THE COURT: Otherwise French poodles would not be a sheriff under California law, right?
MR. LEONARD: That’s right.

Electronic implants, Wikileaks Vault 8, victims of organized gang stalking, hive mind, and honeypits.

ROGS loves the Constitutional guarantees of due process, and ROGS loves America. I am pathetic that way~the grand American delusion is so appealing.
(Vault 8 is an inside joke.)
BUT: The DVIC is actually a war on speakers and words, and without a doubt, the first amendment itself is the target of neocon and tribal, religious interests, now interfacing with the massive influx of Saudi, and other nations cash flows, and the media narrative.
I have been gang stalked since the DVIC was birthed into our lives in 1993 ( the exact same year when the Anti Defamation League was outed as a domestic spy ring that sold out American activists) and became severely gang stalked after I broke a nation wide story in 2003-4 about how America’s agencies manufacture terrorists by occluding access to civil rights and due process.
To journalists, researchers, and others interested in answering the many questions that are presented in the “bizarre” online dialectic of gang stalking, here below is how the CIA (and every other IC agency, private contractor, and the FBI) uses the term “electronic implants,” which describes covert hacking techniques, and plausible deniability in exploitation of targeted computers, targeted computer networks, and targeted individuals.
Without a single doubt, this is empirical evidence of CIA/other IC/NGOs operations on US soil, and anywhere else where OGS is taking place.
And it single handedly validates the inherent mission creep of the WOT redirecting and exploiting domestic targets.

UPDATE 10-19-2019: Almost two years after I wrote this post, and became active online, the ADL implicated itself as actually deploying military psychological operations on target individuals, using artificial intelligence software called Moonshot CVE, which had previously been used in theaters of war; and, perpetuating negative stereotypes of Jewish people as mind controlling Svengalis.

1570435771780
Electronic implants and gang stalking, courtesy of Wikileaks, and Julian Assange, who is literally being isolated, and denied visitation from other people as I write this. And, the American/FVEY deep state has worked tirelessly to force Ecaudor to revoke his asylum.
Isolation, you will recall, is ALSO a major threat/complaint/”delusion” of targeted individuals.


RELATED STORY
:I wrote about the HIVE in coded language long before this story below became mainstream news. The reader can infer that writing openly about such things is dangerous, and also, ROGS personal writing style is somewhat coded for reasons I have explained elsewhere.

The Hive mind in the gang stalkung dialectic online, from Wikileaks.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.
…………..
And-I hope the dood doctors like David V. James, and Lorraine Sheridan-and certainly Dr. Mike Wood, dont get to caught up in the echo chamber as wasps and bees of all kinds swarm them for commentary in these matters.
But OGS is very real, and puts MHCHAOS and MKULTRA to shame.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

Google, demographic searches, Facebook, dopamine, criminal defense lawyers, and gang stalking

The reader might have noticed that gang stalking is gaining credibility as a valid complaint online, and calling it by its proper name: counter-intelligence and police stalking
,
as we see in this example where a couple reporters and sociologists held a forum about the stalker state.

And, we also see that forums like Reddit and main stream news have begun to cover stories that walk the fine line between covering gang stalking as what it is “a rampant abuse of counter-terrorism funding and propaganda, and high policing as pretext to target the ‘usual suspects:’ the poor, the disenfranchised, the vulnerable, and the marginalized; the dissident voice, and the non-ADL infiltrated activist.”

Related: Read this brilliant Reddit analysis about how the One Percent have inter-linked their tribal-sectarian racism with artificial intelligence, and the nefarious Facebook and other CIA InQtel startups.
Then, read how ROGS Analysis has scientifically predicted key elements of a recent mass shooting, and also that racists are using labelling theory and framing people online, using military grade psychological operations, targeted at individuals.

And the main stream news is aware that they have been asked to put a “spin” on complaints of gang stalking that make it to a court room or two, because their fakenews depends upon near-mythical badguys, and wolf’s at the door that can be relegated to delusional complaints. All western Jewish-Christian-Abrahamic societies work from that level of fakemyth in order to substantiate and affirm their story telling basis based in superstition, and that superstition backed by actual human sacrifices (the Jesus myth is the classic example.)
Here is a case of this EXACT media framing in action, as we see a guy involved in drugs, and murdering another guy, just after he gets a “strange phone call about gang staking.”
Notice that the phone call is described as a “prank,” which seems to require more evidence, and more exploration, because the ROGS thesis holds that it was actually a deep state, or OTB black ops police tactic, or involvement of OTB snitches; or who were directly connected to Fusion Center tracking, and other elements .
In other words, ROGS is saying that this crime-like so many we see today-is possibly and likely the direct result of state leave actors using the obscured tactics of counter-terrorism tactic of gang stalking, and it CAUSED or CONTRIBUTED to a homicide (and keep in mind that the ROGS purpose is to destroy the ability of LEO’s to continue to mask bad behavior, and use illegal tactics and methods while cowering behind the thin veneer of counter-terrorism).
For reference, I have highlighted the relevant text, or linked it to other ROGS posts that discuss how gang stalking tactics affect cases “in darkness”and note that one of the metrics of measuring the ineffectiveness of counter terror gang stalking is that actual homicides are carried out, and many of those are a direct result of this neverending harrassment of targets, as we saw in the Virginia Beach shooting, Ian Long, Mathew Riehl, and many others:

Murder trial gets underway with opening statements

[Prosecutor]Smith argued that the level of violence indicates it was not self-defense.
A picture can be worth a thousand words, and I think this picture says a lot,” Smith said as he flashed a grisly photo of Maulding’s body across a large screen. “He beat him to a pulp.”
Reichow’s defense attorney, Sean Downs, argued that there are two sides to every story and “sometimes three, four, five. It’s not always going to fit together perfectly for you,” he told the jury.
What the attorneys do seem to agree on is that Reichow and Maulding had been hanging out earlier in the day. They were picked up by another friend, Anne Tanninen, from Maulding’s house and went to a storage unit that Tanninen had rented.
The trio was inside the storage space when Tanninen received a strange phone call, Smith said, from someone talking about $5,000, drugs and picking something up. He said both Reichow and Tanninen shared paranoid beliefs about the world, and they thought they were being “gang stalked.” Gang stalking can include being harassed by an organized group of people.
Up until the call, which turned out to be a prank, nothing was out of the ordinary, Smith said. The trio were unloading some items at the storage space, and Maulding was toying around with a bat inside the unit, he said.
Tanninen became upset after the call, however, and started arguing with Reichow, Smith said. She and Maulding confronted Reichow about possibly being associated with the call.
Downs said Maulding started taunting Reichow with the bat, saying “Come here, boy. Come here, boy.” Maulding, who had been drinking earlier in the day, was still intoxicated and threatened Reichow, Downs said.

Or, perhaps the reader today has noticed that Big Tech like Facebook is being indicted BY IT’S OWN CORPORATE OFFICERS as sick and exploitative manipulators of public discourse, AND psychological processes that amount to mind disruption.
Here-from yesterday’s news, is something that I wrote about many months ago, before the MSM picked it up-yet another Facebook CEO/investor/developer has come forwards to blow the whistle on the practice of manipulating dopamine levels in our brains. Keep in mind that their investors are largely drawn from the jingoistic Jewish-Christian fold, for whom no excess of cultic or chemical abuse of children is ever enough to satisfy their bulimic hunger):

“CHAMATH PALIHAPITIYA, A former Facebook executive has spoken out against the social network he helped to create, saying it is ‘ripping society apart'”

 

He cited an incident in India where hoax messages about kidnappings shared on WhatsApp led to the lynching of seven innocent people, according to reports in The Verge.

During his talk, Mr Palihapitiya called out not only Facebook, but Silicon Valley’s entire system of funding.

He claimed money pumped into the region would be better spent addressing problems like climate change and disease.

Speaking to an audience at Stanford Graduate School of Business, Mr Palihapitiya said: ‘I think we have created tools that are ripping apart the social fabric of how society works.

‘The short-term, dopamine-driven feedback loops we’ve created are destroying how society works.

‘No civil discourse, no cooperation; misinformation, mistruth.

‘And it’s not an American problem — this is not about Russians ads. This is a global problem.’

This is not the first time that prominent figure at Facebook has spoken out about the social network.

For those of you who use such products, my heart goes out to you, and I hope you can read through ROGS here and find “the help you need” to possibly begin a class action lawsuit that will provably be bigger than Big Tobacco if we do it right.
But I haven’t personally used social media since 2005-6, and have never used the social network’s except AS investigative tools, for reasons that I will write about later (it started with total hacking of all my email and academic accounts for nearly a decade, between 2003-13).
But it will take a lawsuit against Facebook and other social media which will expose the multi-headed hydra’s and other monsters that our governments have been pointing at our minds in a direct webterrogation of our personalities, our intentions, our hopes and dreams-and a direct influence operation on our choices, and that, through direct manipulation of our free will, via dopamine.But I would go one step further, and state that the internet itself, weaponized by the FiveEyes, has literally designed this effect.
And certainly, “they” have been literally targeting SOME people differently than other people. Mass shooter Devin Kelley’s Facebook was webwashed after his rampage. Why is that?

Related Stories: Where does the NSA end and Facebook begin? Facebook and its investors range from CIA butt boys like Peter Thiel, to Hong Kong mobster’s such as Li Ka- Shing, to standard front companies, to Goldman Sachs.And, how the FBI and NSA made Facebook the perfect surveillance tool after the great Culling of 2001.

Facebook executives admit deliberately manipulating dopamine levels in children to create “positive feedback loops.” Is it possible then, that they also help or enable negative feedback loops? I think Devin Kelley and many other “terrorists” mass shooters are examples of that, as I have studied this since 2005, being fully aware that the internet is “interactive” without our informed consent.
So, the War on Terror is ACTUALLY a war on ideas, and the people who have them-it is a cover operation for mass mind control. Literally using dopamine manipulation and propaganda tactics that other Facebook executives have called “brainwashing on a level that Edward Bernay’s could never have imagined as he powered Hitler, and Big Tobacco.’ But it is also an assault on individuals, and many of thse individuals that LEO’s and all the counter-terror hero’s can use as unpaid HUMINT to lead them to cases that they otherwise could NOT access.
And worse, because of the egregious and outrageous hidden mechanisms, and unchecked, un-monitored use of tactics, and toys and tools of OGS beyond the knowledge of courts of law, we see that citizens are robbed of free will, and instead, are used as unpaid labor that drives federal funding initiatives. This is what “high policing” is and how it has affected society-and individual cases-at large.
Again, do your own research, but there is an over-whelming bunch of evidence and data is increasing that indicates this is true. While George Orwell got it right about Big Government, he missed the part where government would use corporations as front companies, like any CIA operation ever, but this time, it is 17 agencies waging the ongoing Operation MHCHAOS, with augmented internet that targets “bad ideas” and “PRISM’s” and “XKEYSCORES” of words, mind mapping, and SOCMINT profiles long before the activist, dissident, whistle blower, or others, sometimes criminals, get targeted for “disruption.”
And, failing THAT, we now see that “destruction” soon follows, as in the case of the mass shooters, homicides, petty crimes, and more.

brave new piggies.jpg
And certainly, Brave New World is here, but augmented highly industrious DVIC flying pigs, and an ever morphing wolf at the chimney, via mind control via Facebook-and studies that claim targeted individuals are suffering from delusional disorder.

The only thing that can be said at this time about the “delusion” of gang stalking, and backed with ROGS Predictive Analysis, and empirical evidence is that psychologists like Dr. Lorraine Sheridan, et al. also share funding sources, and utilize ATAP damage control narratives, every time another layer of this un-constitutional policing scheme is revealed.
 
 
 

Guest Post from 4rec3s: Gang stalking and artificial intelligence-a world of false positives and death

This essay is based on this post on the Boingboing article, “NSA and GCHQ’s crappy Big Data techniques may be killing thousands of innocents”, which reminded me of a video of a robotic drone-death art installation that really puts this killing into a particularly inhuman perspective.

Notice: This essay does not deal with ‘electronic mind control’, drugging, ‘creating alters’, V2K or paranormal. All these links are from mainstream sources and my purpose is to glue it together as a feasibility of how gangstalking could happen with existing, known technologies. Namely social psychology, HUMINT-based pattern prediction, ubiquitous surveillance and communications.


Gangster Computer God
Every day, increasingly, our reality is validating Francis Dee’s racist, paranoid, schizophrenic prophecy of the “Gangster Computer God Worldwide Secret Containment Policy” as less fiction and more fact (sans the mullatto-jew robot doctors). More fact because it’s become feasible (except for the cosmetic surgery).
Mass surveillance innovations[1][2][3][4][5]), purposeful efforts and accomplishments[6][7][8][9]; a drive towards total information awareness[10] and such compelling integration of technology leading to a Panopticon[11][12], creates a situation in which a system could be devised capable of data-mining and heuristic pattern-of-life analysis of all citizens[12]. Coupling such a system with astoundingly capable AI technology; an extreme willingness to help (and profit motive) by industry[14][15]; an hegelian (‘ends justify the means’) ethos quite contrary to that of Christianity, secular humanism and altruism generally[16][17][18][19][20]; and “machine learning algorithms”[21][22][23][322]; form the constants of an addition equation that yields the very real possibility and therefore threat of an worldwide, technocratic, AI-based Gangstalking system.
Requirements and Purpose
The only requirements are paranoia and an utter lack of trust of the Government towards the global everycitizen[24]. In other words, “to shut down a political enemy by gaslighting[25][26][27][28] them to the extent that they end up in jail or in a mental facility”. There may be other incentives however:

  • Random harassment ‘like a game’
  • Targetted harassment of non-threat ‘undesirables’
  • Spiritual warfare ‘to demoralize the population’
  • Human / Social experimentation
  • Data collection efforts (pushing people around to see where they go / with whom they talk in ‘crisis’ mode)
  • Psychopathologizing an individual through trauma-based mind control—to develop them as asset
  • Playing both the targetted individual and deputized stalker against each other. Why is the TI the only victim?

All Watched Over By Machines Of Loving Grace[29]
Consider the following scenario.
1) You have an AI program that is hooked up with mass surveillance and has decades of social psychology to understand how humans work (HUMANINT + psychology/sociology, ‘game theory’, ‘prisoner’s dilemma’, ‘milgram’s’)[30].
2) The AI program finds ways to manipulate people (stalkers) into ‘being at a certain place at a certain time’, ‘to look out for a certain individual’. Perhaps they’ve been getting fed emails from a “protected’ or ‘authoritative source’ (AI::outreach), someone from an intelligence agency for example, that has ‘deputized’ him/her, to help assist them in tracking down ‘an alleged (serial killer / pedophile / drug dealer / murderer / stalker)‘ in the community. This person then is notified to go to a certain place and ‘watch out for’ this disreputable / potential criminal.

Everyone wants to be a hero. All that is required is exploiting our vanity.

3) This AI program has a deep knowledge of everyone from mass surveillance[1][2][3][4][5]). Enough to ‘predict behavior’ and generate a deep, heuristic, ‘life pattern’ analysis[1][2]
4) The AI knows when you leave your home, when you take a shower, approx where you are located and headed using your cellphone’s gps/wifi and cell tower triangulation sent back to servers. Also, if the AI has access to NRO satellite data, they can actually see you, with a potential resolution of 50 cm2 to 1cm2 (drone)!!
5) Using the ‘pattern of life’ and seeing that you left your home, it can send email / sms / skype / facebook / twitter / foursquare / ‘other’ instant messages to various ‘deputized’ community citizens to ‘watch you’.
6) The targetted individual is now under humanint field surveillance by people who have been tricked, duped with disinformation into thinking they are doing good, protecting the community.


Con Game, Not Mind Kontrol
None of this requires mind control. All it requires is panopticon, vain authoritarians as ‘faux-insiders’, and a highly-available communication network with dynamic asset development and appropriation software.
If this is happening, it’s immoral and abusive and it’s also lacking in manners. Military-industrial aristocrats are supposed to have manners and respect. After all, their guarded culture demands those things. But their development of rights-destroying, ‘tough guy mafioso abuses’ reveal the ruling class as irresponsible, lacking a keen foresight into consequence they claim generally has guided their successes in life and which differentiate them from the masses.
Their lack of manners has created an uncouth robot that reduces everyone to numbered accounts in a microserfdom. This robot is going to mix up the salad fork with the dinner fork, which is a metaphor for ‘killing everyone’—it’s a matter of time before it’s discernments become so specific that everyone, poor and rich alike, need to be subject to ‘quantitative easing’. And that’s too is a metaphor, for this.

CIA and internet backbone surveillance and InfraGard: there is no window between the average American and intelligence agents anymore

Cisco Internet Backbone and CIA, human experimentation, Moonshot CVE, Google Jigsaw
Psychology is struggling to control the narrative of organized gang stalking, and doing a really bad job of it, because some of their favored labels for political dissidents and whistle blowers are being exposed as little more than political smears masked with official diagnostic criterion. And of course, in a the ends justify the means” world, the “state purpose” of fighting boogiemen is tantamount to rational basis social controls, which is why the NSA/CIA/FBI manipulation of the internet backbone is cancer to Democracy.
Paranoia, schizophrenia, delusions that people are being persecuted, followed, or harassed- all of this and more is happening all across America today, as the thousands of miles, and the improbabilities and the impossibilities of actual contact between the average citizen and intelligence officers and agents are no longer impossibilities at all: they are a daily fact of life for every citizen, as Google, Facebook, Snapchat or Twitter have put all of us one click away from these agents every single day.
So, whereas once psychologists could keep institutional and social control of the narratives of “mentally ill” people who claim that the “CIA is spying on me,” or that the “FBI is out to get me,” and other such claims, and psychologists have long ignored these claims as delusions, it is no longer the case that prospective patients are wrong in any sense, because, all of our communications are intercepted, and our lives monitored via our cell phones, Facebook-which has admitted to actual chemically based mind control, aka manipulating dopamine levels in the brain of non-consenting children and adults-to the NSA-FiveEyes(FVEY)-Israel data theft and sifting operation that is in play 24/7.
It forms a de facto and pre-emptive prior restraint of any individuals private thought processes, intentions, and.free will any time they are online.
And, curiously, this is against the US and British constitions- but ALSO many international laws and treaties~and ironically also against the UN charter, and the Universal Declaration of Human Rights!
Previous to the era of the internet, it was nearly un-imaginable that the average person would come into contact with a CIA case officer, FBI handler, NSA agent, or rings of unethical Israeli spies and unregistered foreign agents , or other intelligence agency operators. Today, these same are compiling dossiere’s and databases full of profiles about every one of us, as secret, hidden operators monitor our social media, cell phones, and emails in real time, we  are as close as a click on Facebook, or a phone call to a foreigner. And, our childrens bath tub photos are now accessible to InfraGard, an a host of international players, including Saudi Arabia.
Compounding that, is the fact that these agents have eradicated the barriers between civilian and agency boundaries, as they float in and out of the government, to the corporate sector; in and out of one top-secret clearance and into cold-blooded capitalism the next,  and back again.
This “high policing” aka political policing, aka organized stalking is now a nation wide infection.
So, the next time a patient or a ‘delusional’ or ‘psychotic’ individual tells you that there is a spook on their internet backbone, listen a little bit more, because, well, there is in fact a spook network spread across every connection, at every minute, and a ratio of one security industrial complex worker, police and surveillance role player to every 30 civilians in Amerca alone.
Here- from Forbes magazine, meet Chris Burgess, one of the many spooks on my Cisco router:

Cisco Internet Backbone and CIA https://www.forbes.com/sites/realspin/2012/10/12/what-do-former-cia-spies-do-when-they-quit-the-spy-game/#2df634382374
Chris Burgess, now COO and CSO of Atigeo, a Bellevue, Washington firm focused on mining Big Data. The second was Ren Stelloh, who until July 2012 was CEO
After retiring with 30+ years of service from the Agency, I spent several years as adviser to Cisco System’s Chief Security Officer, and I found Cisco was doing great work; they’re one of the backbones of the internet. The more info you can provide to the more people, the better people can see and understand what was obscured
Now I’m COO and CSO of Atigeo and we’re a compassionate technology company. We want to provide the tools to mine big data, as that is unquestionably the major resource of this century

 

Wiretap and gang stalking and paranoia: the internet as a tool of investigation, and spreading paranoia

Wiretap and gang stalking and paranoia and psychology
There is ample evidence that agents and agencies, and institutional psychopaths and others are using the internet to actually cause paranoia, and spread fear. Don’t believe me? Just ask ‘the internet:’

Google search: How do I find out if I am under investigation?
Answer: This question makes me think the asker is paranoid because they did something wrong or paranoid because they have some type of mental illness.  Neither are good and you should either 1. stop doing something wrong or 2. seek medical help.”
Answered by:Robert Anspaugh, worked at Federal Bureau of Investigation
https://www.quora.com/How-do-I-find-out-if-I-am-under-investigation

Surveillance, intrusion, violation, and privacy rape are all major themes of gang stalking stories. Whether it is complaints of being wiretapped, or a feeling of being followed, and harassed secretly it is empirically documented in blog after blog that paranoia is a major theme. In the example above, this is what I call “webterrogation,” where the internet is used by many people as an investigative tool, or just as a tool whereby they can abuse their power.
And while the internet can be a valuable investigative tool whereby cold cases are solved by web forums like Websleuths, it is also a tool whereby LEO’s use and misuse databases and InfraGard to settle scores, harass, and unethically interrogate people.
It is the duty of criminal defense lawyers, psychologists and others to represent the best interests of their clients, and in cases where wiretaps are claimed, we must expand our paradigm beyond the quaint “pen register” of the 1970’s, and understand that the internet, cell phones, databases, and everything that interacts with them forms a total surveillance tool, much less the thousands of hidden programs that run on it.
While today’s victim of gang stalking has the advantage of being able to point to specific government programs and tactics that were hidden in the era before Edward Snowden, every narrative of the past must be viewed in light of few facts: that, in fact, any American that uses a phone are ALL wiretapped on some level, and, some are specifically targeted for NSA extra-judicial surveillance, even if we don’t call it a wiretap.
As revealed in the scandal with President Trump stating that “Obama wiretapped my phone,” and the ensuing nit-picking in the partisan media of the factual basis of “what is a wiretap, exactly?”- there is no longer any doubt that Trump Tower was in fact wiretapped, that his associates were in fact under surveillance, and that the “deep state” did it. And no rational person-no psychologist or criminal defense lawyer, or other interpreter or trier of facts could state that wiretap abuse is not rampant , and in  fact, the new normal in America’s nascent police state.
Here, below from Techdirt.com is a story about a prosecutor who not only used wiretap orders to target enemies, but also- hundreds of times- simply forged a judges signature to do so. Ridiculous, abusive, and illegal-sure. But she, like most corrupt prosecutors, will likely get a slap on the wrist, as this form of prosecutorial misconduct is seldom discovered, and nearly never punished.
This case is the exception, not the rule, though in light of the Snowden leaks and others, abuse can be presumed in most post-Snowden cases; and this one only got noticed because of the massive scale of her operation:

More Prosecutors Abusing Their Access And Power To Illegally Eavesdrop On Conversations
from the give-’em-enough-leash dept
Last time we checked in with (former) Brooklyn prosecutor Tara Lenich, she was facing state charges for abusing wiretap warrants to listen in on conversations between a police detective and one of her colleagues. This stemmed from what was termed a “personal entanglement” between her and the detective.
The wiretap warrants couldn’t be obtained without a judge’s signature. Since there was no probable cause for the warrant, no judge would sign them. Lenich had a solution. She just forged the judge’s signature on the warrant. And then she kept forging judges’ signatures, stretching out her illicit surveillance for more than a year, with a faked signature on every 30-day renewal.
Lenich is now facing federal charges. An indictment handed down by DOJ pretty much repeats the allegation of the state charges, detailing Lenich’s long-running, extremely-personal wiretap operation.
Related Story: Kansas prosecutors illegally monitored over 700 attorney’s conversations with clients, destroying attorney client privilege.
http://www.thedailybeast.com/articles/2017/03/27/700-attorneys-spied-on-in-one-prison-investigator-finds.html?via=desktop&source=twitter