What is the "Redirect Method" of targeting individuals? Organized stalking and artificial intelligence (AI)

What is the “Redirect Method” of targeting individuals? Targeted advertising, and targeted minds: mind control by any other name.

UPDATE 09-19-2019:Since I wrote this post a few years ago, it has since been revealed that political NGOs, and police /intellugence agencies and private contractors and specifically the Anti Defamation League has been using this Moonshot CVE method to perform non -consensual surveillance and targeted psychological operations on non -consenting subjects online. This redirection has also been linked to several mass shooters, and beyond simply reinforcing stereotypes of Jews as mind controlling Svengalis, that organization is purely toxic.

Moonshot CVE is designed to manipulate you, your choices, and your political beliefs.
Many online in the community of “targeted individuals” claim that they are subjected to mind control, which, in the day to day world, usually indicates mental illness to psychologists, social workers, and criminal defense attorneys who eventually encounter targeted individuals.These claims can seem outrageous or preposterous-after all-where is the mind control facility? Where is the mad doctor D.E. Cameron, and the electro-shocks and LSD with the CIA funding? And so on.
Those were the old days- now meet the new: artificial intelligence programmed to manipulate web search results targeting individuals thought processes, choices, and emotions via electronic and other methods.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.
-Edward Snowden, NSA whistle blower, on warrantless NSA harassment and targeting of individuals

Here, below, is a snapshot of a real, actual program that is in fact  a form of mind control, where a viewer is “redirected” from one area of interest into another, where those who seek to influence and control the individual then perform an influence operation on the subject-against the subjects “free will”,and without the subjects informed consent.
Here we see that the amorphous and ever changing definition of potential “terrorist” has been applied to 320,000 persons, who have been for whatever reason, arbitrarily labelled first according to their political beliefs as indicated by their internet searches, and then, as potential jihadists or right wing conservatives in America.
Their internet searches are then analyzed using an NSA-like keyword program (Google and the PRISM and XKEYSCORE programs are CIA funded, while startup commpany Moonshot CVE appears to be a British operation , screened with 1700 key words selectors and then redirected in their searches on the internet.
This redirection is without a warrant, and without the informed consent of the searcher. Or: a man-in-the-middle attack, targeting the ambiguity and definitional peculiarities of pure speech alone. And- it is designed to influence peoples actions remotely.
What is most striking is that many early caricatures of mind control from the early 21st century and onward,  utilized hypnosis, and mental influence via “suggestion” as a form of controlling the actions of individuals, and groups, even whole societies.
And here, we see that far beyond the caricature of a Svengali or a pulsing swirl of black and white imagery hypnotizing a subject, we have instead, Google-which collaborates with the CIA/NSA/FBI and all other intelligence agencies-acting as the arbiter and the impetus for guiding an individuals thoughts and actions through suggestion and algorithmic programming.
th(10) Photo: John Barrymore plays Svengali. Today, we see another ROGS thesis validated, as the,Anti Defamation League now deploys psychological operations on unsuspecting Google users who that organization has “othered.”

Not only does Google collaborate with these agencies, but in fact, it has worked specifically with NSA and others to develop programs of social control via search engine results, and more. So, here is one of the latest attempts to influence and alter the behaviors (behavior modification) of people who are targeted with these programs:
From the Intercept:
“A GOOGLE-INCUBATED PROGRAM that has been targeting potential ISIS members with deradicalizing content will soon be used to target violent right-wing extremists in North America, a designer of the program said at an event at the Brookings Institution on Wednesday.
Using research and targeted advertising, the initiative by London-based startup Moonshot CVE and Google’s Jigsaw technology incubator targets potentially violent Jihadis and directs them to a YouTube channel with videos that refute ISIS propaganda.
In the pilot program countering ISIS, the so-called Redirect Method  collected the metadata of 320,000 individuals over the course of eight weeks, using 1,700 keywords, and served them advertisements that led them to the videos. Collectively, the targets watched more than half a million minutes of videos.
The event at Brookings was primarily about the existing program aimed to undermine ISIS recruiting. “I think this is an extremely promising method,” said Richard Stengel, U.S. Undersecretary of State for public diplomacy and public affairs.
Ross Frenett, co-founder of Moonshot, said his company and Jigsaw are now working with funding from private groups, including the Gen Next Foundation, to target other violent extremists, including on the hard right.
“We are very conscious as our own organization and I know Jigsaw are that this [violent extremism] is not solely the problem of one particular group,” Frenett said.”
First, they came for the jihadi’s-then they came for the ‘bad ideas’ in peoples minds….then…?

This targeting has been going on for decades, specifically targets individuals and whoe classes of persoons, and as we see above in commercial use-these programs are policing  “thoughts” expressed online, and more.
Here, from the early days of Snowden’s leaks:
Glenn Greenwald, reporting for the Guardian, wrote:

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.
“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Organized gang stalking and DHS HSI Investigations and database abuse

UPDATE 09/24/2019: Since I began writing the ROGS blog, new facts have been exposed in major media that validate every single thesis statement in this blog. So, never doubt the power of one voice, or the power of free speech- I have changed the media narrative entirely in my tactical assault on gang stalking narrative.
The following post discusses military grade psychological operations (PsyOps) targeting citizens. When I wrote it, the MSM had not yet disclised that the racist, sectarian Anti Defamation League has been secretly targeting people with the Redirect method, or that organizations like the Association of Threat Assessment Professionals, which advises all of the law enforcement agencies I name herein, has been practicing “colluding parallel investigations” on targeted individuals; or that Fusion Centers are actually dabbling in nefarious psychological operations; or that Fusion Center directors are trained in PsyOps either.

The internet is talking to me!
How massive databases that steal the virtual identities of citizens can and are abused, especially when combined with psycholigical and influence operations; and how Google, the NSA, Palantir, artificial intelligence, database abuse, and quasi-legal investigations can-and do-conspire to create the appearance of mental illness in “targeted individuals.”

Databases are forever, and they now hold all of us hostage to corporate and government  interests, as our personal data, including whole capture emails, phone call recordings, health and wealth information, entire maps of our online and offline relationships, our entire browsing histories, and much more have enabled hidden operators to access our minds and our decisions from behind the curtains of color of law practices

On the surface, any complaint of organized gang stalking includes what could be classified as paranoid psychosis with”psychotic features.” Classic psychosis entails hearing voices, and having conversations with imaginary people, or other creatures and entities like god, or demons, and so on. Then, there is the often cited claim that these victims, or targeted individuals are followed, and that certain other things occur, which defy rational or logical-or psychological explanations. Then, psychologists generally label these victims as delusional, much as victims of child abuse, or domestic violence were once labeled as delusional.
This is all documented in the literature. However, in reality today, we can see and begin to document something that wasn’t available to psychologists in years past: we can use metrics, and measurements, and screen captures, and IP address location, and alternative news sources to document that in fact, many claims of this nature can be verified, or validated; tested against a new hypotheses.
And, we can look at the modern techniques, tactics, and programs of modern policing that indicate that psychology is out of touch with reality, not the targeted individuals. The fact that police can and do use massive databases that inform them about very intimate and personal details of each individual they target is in and of itself a horrific spectre; a naked abuse of power.
Each police or other agency involvement is no longer as simple as a couple of arrest records, and an address. No-these modern databases have entire family histories in them with webs of interconnected relations; entire web browsing histories and categories that profile individuals; modern databases are essentially mind maps, with augmented personal data, and predictive analyses.
This is bad enough for these unfortunates who encounter agencies that use these databases-but far more troubling is that each encounter adds to the possibility of further exploitation of any individual, as these agents and agencies also pen investigations like never before in our history-and pass the investigations back and forth sometimes for years, as we frequently see in the cases of mass shooters, and purported gang members, petty criminals; whistle blowers, journalists-your neighbor, maybe.
Because the internet is forever, we can also document actual conversations and engage with subjects who claim that the internet talks to them. The internet podcast like websites of Talkshoe provide endless glimpses of likely provocateurs manipulating these subjects, and also, sowing misinformation and disinformation. I will not provide links because I believe these sites are plainly harmful, especially some of the stuff on Talkshoe.
But there are many more examples that any researcher can find. And too, the many blogs and video’s that document OGS as well often do reference databases, or use information gleaned about a target to exploit that target.
I didn’t sign up for this!
Databases are forever, and they now hold all of us hostage to corporate and government  interests, as our personal data, including whole capture emails, phone call recordings, health and wealth information, entire maps of our online and offline relationships, our entire browsing histories, and much more have enabled hidden operators to access our minds and our decisions from behind the curtains of color of law practices. The Intercept, the paper that published Edwar Snowden’s leaks, has been actively revealing story after story about how databases are used and abused.
Here  is one example of the breadth and scope of the Palantir database to profile, track, run surveillance and communicate with ‘suspects’ and targeted individuals online-and predict, influence, manipulate; suggest, guide, and control the movements and decisions of these individuals in real time. so, when you next encounter a client, or a  patient who complains of these things, take into account that “even paranoids are right sometimes,” and increasingly, paranoia itself is looking like it is a mis-diagnoses:
From The Intercept:
Palantir Provides the Engine for Donald Trump’s Deportation Machine
Spencer Woodman
March 2 2017, 6:18 p.m.
Immigration and Customs Enforcement is deploying a new intelligence system called Investigative Case Management (ICM), created by Palantir Technologies, that will assist in President Donald Trump’s efforts to deport millions of immigrants from the United States…
ICM funding documents analyzed by The Intercept make clear that the system is far from a passive administrator of ICE’s case flow. ICM allows ICE agents to access a vast “ecosystem” of data to facilitate immigration officials in both discovering targets and then creating and administering cases against them. The system provides its users access to intelligence platforms maintained by the Drug Enforcement Administration, the Bureau of Alcohol, Tobacco, Firearms and Explosives, the Federal Bureau of Investigation, and an array of other federal and private law enforcement entities. It can provide ICE agents access to information on a subject’s schooling, family relationships, employment information, phone records, immigration history, foreign exchange program status, personal connections, biometric traits, criminal records, and home and work addresses.
“What we have here is a growing network of interconnected databases that together are drawing in more and more information,” said Jay Stanley, a privacy expert at the American Civil Liberties Union. “If President Trump’s rhetoric on mass deportations is going to be turned into reality, then we’re going to see these tools turned in that direction, and these documents show that there are very powerful and intrusive tools that can be used toward that end.”
Although ICM appears to have been originally conceived for use by ICE’s office of Homeland Security Investigations (HSI), the system appears to be widely available to agents within ICE. Officers of ICE’s Enforcement and Removal Office (ERO) — the U.S. government’s primary deportation force — access the system to gather information for both criminal and civil cases against immigrants, according to a June 2016 disclosure by the Department of Homeland Security, although ERO will use a separate system to manage its civil cases. “HSI and ERO personnel use the information in ICM to document and inform their criminal investigative activities and to support the criminal prosecutions arising from those investigations,” states the DHS filing. “ERO also uses ICM data to inform its civil cases.”
ICE’s Office of the Principal Legal Advisor also uses ICM to represent the office in “exclusion, deportation, and removal proceedings,” among other matters, according to the DHS disclosure.
The DHS disclosure states that Homeland Security Investigations is ICM’s primary user….
Although ICE’s enforcement focuses overwhelmingly on immigrants, the ICM funding documents make clear the intelligence tool can also be aimed at U.S. citizens. “Citizenship can be established a variety of ways to include biographical and biometric system checks,” one document states. “U.S. Citizens are still subject to criminal prosecution and thus are a part of ICM.”
The scope of ICM’s use appears to have expanded during the system’s development. The hundreds of pages of funding documents from 2014 make no mention whatsoever of ICE’s Enforcement and Removal Office (ERO). On the contrary, the 2014 records state that ICM was launched as primarily an HSI initiative and meant for use by HSI agents. Yet by June of last year, this appears to have changed: The recent DHS privacy disclosure repeatedly states that ERO uses ICM to support aspects of its mission.
This is not the only case in which it has remained unclear what kind of limits ICE has on the sorts of missions for which its intelligence systems can be used.
A spokesperson for Palantir declined to provide comment for this story. ICE did not respond to a list of questions, including whether FALCON — ICE’s advanced intelligence and analytics system for Homeland Security Investigations — is also made available to ERO agents.

Organized stalking, CIA mind control, and the Palantir database: mass population control is no longer science fiction-or a conspiracy theory.

Mind control and the CIA: how the CIA started Palantir database, which can read your mind-and influence your choices. Now, 17 spy agencies know what you did last night-and ten years ago.

“collected communications not only include emails, chats, and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation targeting, intercepted username and password pairs, file uploads to online services, Skype sessions, and more.” For the NSA and its global partners, XKEYSCORE makes all of this as searchable as a hotel reservation site.”

How Peter Thiel’s Palantir Helped the NSA Spy on the Whole World

From The Intercept- the news journal that published Edward Snowden’s reveals:

“Palantir” is generally used interchangeably to refer to both Thiel and Karp’s company and the software that company creates. Its two main products are Palantir Gotham and Palantir Metropolis, more geeky winks from a company whose Tolkien namesake is a type of magical sphere used by the evil lord Sauron to surveil, trick, and threaten his enemies across Middle Earth. While Palantir Metropolis is pegged to quantitative analysis for Wall Street banks and hedge funds, Gotham (formerly Palantir Government) is designed for the needs of intelligence, law enforcement, and homeland security customers. Gotham works by importing large reams of “structured” data (like spreadsheets) and “unstructured” data (like images) into one centralized database, where all of the information can be visualized and analyzed in one workspace. For example, a 2010 demo showed how Palantir Government could be used to chart the flow of weapons throughout the Middle East by importing disparate data sources like equipment lot numbers, manufacturer data, and the locations of Hezbollah training camps. Palantir’s chief appeal is that it’s not designed to do any single thing in particular, but is flexible and powerful enough to accommodate the requirements of any organization that needs to process large amounts of both personal and abstract data….
documents provided by Edward Snowden, that Palantir has helped expand and accelerate the NSA’s global spy network, which is jointly administered with allied foreign agencies around the world. Notably, the partnership has included building software specifically to facilitate, augment, and accelerate the use of XKEYSCORE, one of the most expansive and potentially intrusive tools in the NSA’s arsenal. According to Snowden documents published by The Guardian in 2013, XKEYSCORE is by the NSA’s own admission its “widest reaching” program, capturing “nearly everything a typical user does on the internet.” A subsequent report by The Intercept showed that XKEYSCORE’s “collected communications not only include emails, chats, and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation targeting, intercepted username and password pairs, file uploads to online services, Skype sessions, and more.” For the NSA and its global partners, XKEYSCORE makes all of this as searchable as a hotel reservation site.

In the online and offline communities of those who claim they are being gang stalked, it is common that mind control is mentioned. Whereas once it was in the realm of conspiracy theory, today we see that the CIA has in fact financed, and co-created Palantir, which can influence your mind, your choices, your relationships and more-much much more. And all of that, from behind the curtains.
Mind control is real Dorothy!And we are definitely not in Kansas anymore.We are now in the old USSR, or East Germany in the 60’s. Or, San Francisco. Yeah, San Francisco! The tech capital of the new world order and the Panopticon.