Online “personas ” and what to do about them: gang stalking by AI assisted robots and targeted individuals online

Online “personas ” and what to do about them: gang stalking by AI assisted robots and targeted individuals online: a gang stalking conundrum.

Gang stalking is automated, but also, assisted by living breathing humans, who are sometimes paid players, and other times, mere useless idiots who play along with the Mockingbird Effect.

Here, have a look at how I was cyberstalked on Mike Masnicks (fabulous ) blog, Techdirt.com:

The gang stalking started around 2013, when I tried to raise awareness of organized gang stalking. Out of necessity for dealing with a troll farm friendly commenting sytem at Techdirt, I used different “personas” to manage a conversation, but without any software, or automated programs to assist me:

https://www.techdirt.com/articles/20131210/07555625519/lawsuit-claims-accidental-google-search-led-to-years-government-investigation-harrassment.shtml

I responded to a comment from a guy name George Boneyard, which I referenced here.

I was defending/empathizing with a guy named Jeffrey Kantor who had been targeted by a Google based algorithym, and that had served him bullshit results, and possibly, those results spoonfed to him after some online gang stalking by Fusion Center operatives and military contractors/AI programs that manipulated his search results.

Back in those days, AI gang stalking was new to the “normies ” whereas I first experienced online “redirection” after I reported on the first Somali manufactured terrorist in the City College News, Mohammed Warsame, who was an FBI snitch.

Redirection is where people search Google, or other search engines for materials and get different results, depending upon who is targeting the searcher based upon an IP address, as we see in the case of ADL online cyberstalking here.

So, the Jewish, parochial journalist (Mike Masnick, of Techdirt.com, for example ) who searches for information about “why do Somalis get…. ” blankety blank, will get Google results for:

https://www.somalispot.com/threads/why-do-innocent-people-get-punished.76125/

https://www.somalinet.com/forums/viewtopic.php?t=357328

And other such discussions, whereas myself, I got results sponsored by shitbags like the Anti Defamation League, and bbbb,,b other shit-persons. I also got Nazi logo laden websites (courtesy of the Bronfman klan and local Fusion Centers, working with Infragard shitbags like that colleges president) every time I searched forresults like, “human rights in Palestine” and so on.

And, besides the ibvious terroris recruitment pop -ups, and as in Arabuc tat I couldnt read, when I searched for information on Somalis, I got stuff like this instead :


Why do Somalis smell bad
?

And, occassionally, stuff like this:

https://www.mnopedia.org/somali-and-somali-american-experiences-minnesota

But always, reverting to this:

Etc.

If you guessed that not all searches online are equal, you would be correct. Because our filtered internet serves some of us, different results than others of us.

Now, take a look at how I predicted that:

1 the Redirect Method will be used by the Anti Defamation League to bully, target, and harass individuals

2 the Anti Defamation League (and Mike Masnicks in -house trolls ) bully commenters online.

Its a ROGS BINGO.

So, now when I go online, I practice persona management, and I recommend it to anyone who is being targeted in the Panopticon.

Read this article about how defense contractors use persona management to target us,

https://m.dailykos.com/stories/2011/02/16/945768/-UPDATED-The-HB-Gary-Email-That-Should-Concern-Us-All

and keep in mid tat its not just “the gubmint ” targeting you, but tese das, it could be racist groups like the Anti Defamation League and its octopus of NGOs, or even te Klan, and any of the militant feminist groups who work behind Sexual Violence Centers (also note the para-language involved in nearly all DVIC industries )

I will provide more context at a later date, with evidence.

The discrediting of the gang stalking narrative and proof of gang stalking: inbound and outbound links

So:because ROGS-the blog you are reading now-has thoroughly refuted the notion that those who are victims of organized gang stalking are in any way delusional, and that ROGS is making a difference in an Israelified/ADLified world of deference, take a look at the following picture, and note that it is an “inbound link”from the FBIs very own webpages, which are situated in some of the most theoretically secure servers in the world, meaning that in order for someone to click that link INSIDE the FBI webpage HTML where I have linked a post critical of theier ridiculous slogan “Dont be a Puppet”, they would have to have access to the administrative control panel AT that agency (and, un-ironically, that this happened during the longest government shutdown in history, January 2019, in case you wonder what slop-thighed FBI web admins DO on their days off):
1548058383686.jpg
Well, you can decide for yourself if gang stalking is real, or if it is connected to the FBI, because in fact, that agency is merely the corporate bankster army of domestic enforcers, and nothing more, working outside of oversight of citizens, and with total disrespect for anything related to the US constitution, or due process of law.
Or,you can also decide if claims by TIs if strange breakins to their homes are real, or uf shitbags at that agency perform black bag jobs, or if in fact the agency itself isnt a totally corrupt sectarian secret police, as we see the now-shitcanned former head of this agency,former Director James Comey, spouting Rienhold Niehburs philosophies of “Christ in Culture here,” or, as the Intercept has noted, if the Tel Aviv office of the FBI is likely where the ADL and the Mossad plot their targeted webterrogations and webscrubbing after the facts of OGS targeting individuals.
That agency, and the hidden political rot within it simply doesn’t follow any known parameters of law, ever, in what many informed opinions call COINTELPRO 2.0

Related Story: Federal judge castigates SA who performed a black bag job, while he was illegally “embedded” in a corrupt sherrifs department Task Farce, asking “So, if the LAPD or sherrifs department put a badge on a French poodle and elected that gay, Jessica Valenti styled poodle as the Umpiress Gay Gaian Goddess of All Task Farces, is it now a sherrifs deputy too?”.

So, in a world where speech policing of pure speech, first amendment words, ideas, and online performance art via blogs like mine become targets of “lashon hara” white-slavery patrols, and when such things happen,so frequently, and for so many, and for so long without a Constitutional challenge, have a look at what happened AFTER I linked the Association of Threat Assessment Professionals(ATAP) to the creation of crisis via junk science, in what they, and the clusterfuck of 17 spy agencies and Fusion Centers call the “parallel colluding investigation,”and just AFTER yet another unnaccountable asshat committed a felony or two andtried to hack my email AGAIN:
1-the following search language came in to this blog a day or so after someone clicked MY inbound link TO the FBI webpage (which is embedded in the HTML code of every webpage where inbound /outbound links interact with the internet) entitled “Dont be a Puppet” ,which caused their click-which someone clicked -to become MY inbound link FROM the “refferrer” and, just just AFTER someone linked my blog to an interesting right wing/libertarian discussion on Zerohedge

And here is one of the first results from this search language.
homeland security +the cia +nsa and local police gang stalking
gangstalking coven
2-the next day, someone linked the following language to an obsolete search engine named FIREBALL in Germany which officially went offline in 2002, as my stats registered some 20 hits from that country
https://fireball.com/search?q=surveillance+role+players+%2Bgangstalkers+targeted+individuals+%2Bfbi+%2Bcops+%2Bcointelpro+-aliens+-reptilians+-nibiru
This is the discrediting narrative in action, and notice which came FIRST, starting at the inbound link FROM the FBI website, a very ammateur webpage designed by what looks like a 13 year olds attempt to be clever and “do art,” which I mocked in this post here, in the first screencapture.
Then, notice that fireball itself died in 2002, and was absorbed by the NSA fake Googleopus, but is now a conduit for agency level shenanigans.
The death of Fireball:

And now, notice how hidden, cowardly agents, and agencies “frame” the OGS dialectic, wrapping it in total bullshit about aliens, and other time wasting crap of the sort that US military and Psychological and influence Operations practitioners have done historically, linking the agency practice of “colluding parallel investigations,” aka, Organized Gang Stalking, in the same junk-science way they have linked domestic violence to terrorism and the “paranoid delusion” of cyberstalking by agencies who target pure speech online.
This is how neocon, sectarian religious societies ruled by secret police and colinized by racist, sectarian Israeli thought and private junkets to apartheid states works in practice.
And, how dead democratic republics act in the final days of Praetorian democracy :
homeland security +the cia +nsa and local police gang stalking
gangstalking coven
https://fireball.com/search?q=surveillance+role+players+%2Bgangstalkers+targeted+individuals+%2Bfbi+%2Bcops+%2Bcointelpro+-aliens+-reptilians+-nibiru

Organized gang stalking and police explorers, police cadets, and the police personality

THIS WILL BE THE LAST POST ON THIS BLOG, AS MY RESEARCH HAS COME TO AN END FOR NOW. READ THIS POST TO THE END FOR IMPORTANT INFORMATION
Police cadets wreak havoc, commit crimes under the tutelage of seasoned officers.

UPDATE: This post below all but predicted what has followed as one under-aged female police cadet claims that she was the target of sexual impropriety in this case.
Weapons Cache seized at home of LAPD officer accused of having sex with underaged police cadet.
This is a predictable pattern, and an even more common practice in police departments EVERYWHERE across America. As we watch America turn into an extension of the carceral state-as racial tensions and stratifications nearly overshaodwed the last election; as pedofication has become a tool whereby police and state canruin a persons reputation-we see here, a case where those in authority-those charged with upholding our Constitution- are in fact themselves often at the center of hidden crime, and the creation of criminality itself.

One of the most understated issues in OGS is the fact that police and other LEO’s or intelligence agencies use recruits, and those recruits need practice-but how to get it?

The short bus answer is that they use targeted individuals for target practice, as they direct police cadets/explorers in various covert harassment campaigns, and frequently drum up cases using these recruits, as well s hidden tools and hiden tactics outside the law.All agencies do it in one form or another, and the rational citizen will realize that many online testimonies are actually descriptions where citizens catch intelligence agencies, security contractors, and LEO’s in the act.

This is documented across many online blogs, or suggested in them, and most TI’s can tell you that they suspect as much. Further, one will note the frequent use of the word “gang stalking recruit,” in the extant writing on the subject.

As such, they “practice” investigation techniques, and surveillance, and use the unwitting as targets of their interests in the wider OGS scheme of hidden abuse. There have been reports of these types creeping through peoples yards, breaking into houses and cars, flashing lasers at targets and many more things. A dilligent researcher can find this evidence.

This story below comes from the LAPD, but all police cadet programs run this way, and this below is one example of several things:

  1. indicators of what the “police personality” is at it’s heart-there is a very fine line between criminality and miscreants and “trusted” LEO’s. Note in the linked article that one of these miscreant cadets was literally the POSTER CHILD of this program.
  2. that the criminality is expressed within the realm of authority-that part of the job is literally a con job.
  3. That these are “trusted” members of a “trusted” program-and they operated within supervision, and WITH official titles. That their criminality expressed itself within the boundaries of oversight.

“They gamed that system,” which is part of the job.
 

LAPD cadets stole police cars and may have impersonated officers, chief says

Kate Mather, Richard Winton and James Queally
The Los Angeles Police Department has long hailed its cadet program as a successful partnership between police and the city’s young residents. The initiative is designed to help cadets develop life-building skills, bond with officers and volunteer at events such as Dodgers games and the L.A. Marathon.
But on Wednesday night, three of those teenagers crossed paths with city police officers in a way that LAPD officials surely hoped would never happen — when they became suspects.

Racing through the streets of South L.A. in a pair of stolen police cruisers, three teenage cadets led LAPD officers on car chases that ended in separate crashes, Chief Charlie Beck said Thursday afternoon.
The chases sparked an investigation that revealed some of the cadets may have also stolen a bulletproof vest, two stun guns and two police radios, the chief said.

The embarrassing incident has prompted a “top-to-bottom” review of the cadet program as well as the systems the LAPD uses to check out and track its equipment.
“We’re going to look at this, we’re going to look at how they did it, and we’re going to make sure it can’t be done again,” Beck said.
The teens, who were not identified because they are minors, were arrested in connection with the theft of the cruisers and other LAPD property, Beck said. All three teens are members of the cadet program and from 15 to 17 years old, Beck said. He added that all three teens were involved in the vehicle thefts but that it was not immediately clear which teens were involved in the theft of the other equipment.

LAPD cruisers have to be signed out through an automated system before they are driven out of a department motor pool, but the cadets were “sophisticated enough” to manipulate the system by logging in with the name of a sergeant who they knew was on vacation.
“They gamed that system,” Beck said.

Gang stalking, DHS, and law enforcement

It is widely documented in nearly every blog that discusses organized gang stalking that there is or has been police, FBI, DHS, or other agency involvement (much of it mis-attributed, as we see in the case of LEIU’s that they work in “darkness” and complicity with bad actors, across disciplines, and from within the hidey-holes of the “see something say soomething, even if you make it up” framework; and they do this with total impunity-even the FBI does not have access to the LEIU files*- and as such, like a gang or criminal enterprise itself), and all gang stalking is deeply rooted in deep state tools and database abuse where a targeted individuals data was gleaned illegally and without a warrant, and then used to “spook” them in a variety of ways, that any researcher of organized stalking is already likely familiar with.
Why the NSA database abuse is far worse than anyone could ever imagine.
But others note that surveillance role players and contractors with the Department of Homeland Security are also clearly involved in these activities. So in my research, I use this as one measure of the veracity of writings and video’s that document it. Gavin Seim has many video’s where we can watch the process in action as chubby government workers hide behind “rules and reguations” that they pulled out of a hat, rather than laws and due process, which are written in our Constitutions.
In security and especially covert operations, those who deploy these tactics do not want them widely known. And articles that chronicle the stalking of Rose McGowan by an army of spies provides a template of the horrific potential to coerce and frame individuals when we allow a surveillance state to go unchecked, and unaccountable. The cases of James McClynas of Florida and Rick Krlich of Ohio are also notable cases that document the abuses of local syndicates and city councils that were covered by MSM.
So, to a researcher of organized gang stalking, you will note that blogs that discuss this, but also provide documentation of this are valuable allies to falsifiable evidence that it exists, as opposed to bloggers who write about aliens, the devil, and talking to dead people.

Related Story: How Law Enforcement Intelligence Unit’s (LEIU’s) have destroyed any semblance of the US as a Democracy and the Constitution, one black bag job, one blackmail and compromise operation, one dossier at a time. From Project Censored- the top censored story of the 1970’s Project Censored- the top censored story of the 1970’s, and how it affects us today. [full text is available online]

The trick for the researcher is to uncover which is which, and then, to weed out the blogs and videos that are classic misinformation and disinformation, as well those that are purely deep state mind control operations, as we see here . For example, most blogs and video’s that reference Directed Energy Weapons, and electronic’s that are bizarre; or websites that dabble in the absurdly paranormal, although some are just odd accounts of unique worldviews, sprinkled with paranoia. And-most of the accounts are written by these same DHS/private contractor/NGO’s/foreign spies, unregistered foreign agents, and other scumbags working under the “community policing” and CVE schemes.
But any cursory search of the how-to and the who-to-target of propaganda and influence operations can be found online, and compared to these many blogs and accounts of OGS. Here is just one of the many declassified Psychological Operations manuals of the CIA. And here is the famous Simple Sabotage manual as well. PsyOps is a major feature of these operations.
Other clues that blogs and videos of gang stalking are psychological operations is that they give patently bad advice, such as https://neverending1.wordpress.com ( a site that borders on psychological sadism), which once advised TI’s to put a jar of water next to an electrical outlet; or sites that are very well funded, as is the case with OSI informers and others. Interestingly, several of the commenters at NE1 are Lions Club members, and others who fit certain profiles, as I have described herein, and many of them have now deleted or closed their blogs since I wrote about them. Others have gone on to work in OSI-type disinformation honey net operations.
In my experience, my rough estimate is that some 5-25% of all blogs are actually people who are indeed targeted individuals (TI’s) and the rest are useful idiots (some 45-50%) who work in and around LE communities, or subsidiary to them; some 20% are actually agency or agency affiliated. And small number of them are mentally ill, elderly, or just lonely people trying to fit in (these also show up in many blogs, like the neverending1 blog).
FightGangStalking.com is one apparently decent site that seems to steer clear of honey-netting or “DEW” misinformation, as of 2/28/2017 (so far-many of these sites start out well, and then get taken over, or manipulated by agencies, as many of them are just entrapment schemes.) So,  fightgangstalking.com, is notable among the many blogs because the writer only documents verifiable news sources and stories that any researcher of organized gang stalking can refer to as an official source. And, the writer is a former security industry worker.
Related: Here is a suite of free and pay-for investigative tools from Einvestigator.com that you can use to study your stalkers.
Also, and perhaps most importantly, the blog author gives credible background information about themselves, is open to dialogue ( we have exchanged emails), and does NOT allow a comments section. This last point is important because the great majority of blogs are a sort of free for all of madness, manipulation, mind control/influence operations, or honeypots whereby investigators entrap those who comment, or like Dr. Mike Wood’s blog on Conspiracy Theory Psychology, the comments eventually become disinformation outlets due to the well oiled crisis PR industry that I describe elsewhere.
The author of FGS is also familiar with the fact that much of gang stalking is perpetrated by security contractors and surveillance role players, and disreputable blackmaailers who work in any of themay “spy rings” that permeate the west today, likely funded by black budget’s and grants from the Department of Homeland Security and others. These quasi-investigations take on Orwellian proportions, and are highly reminiscent of the brutal psychological operations and blackmailing population control East German Stasi tactics of the 1960’s. But also, exactly like the case of Rose McGowan, who was followed, monitored, harassed, and manipulated across the globe for decades by an army of spies hired by Harvey Weinstein.
Surveillance role players and gang stalking
In the same way that members of the organized stalking community raised awareness that the NSA and other agencies were breaking the letter and the spirit of the law by wiretapping them, all American’s now know tat TI’s were right-the NSA is tapping all of our phones. And worse, continuing the harassment of TI’s by distributing that data to 15 other agencies long before that was made public. As some of us predicted in 2003-4, it will NOT get any more Constitutional around here, any time soon. Police states simply don’t go away-because they work in secret, and against due process at every step, building traps over periods of decades in some cases, as we see with Rose McGowan, who was followed for three decades by private spies.
TI’s are now warning that the Department of Homeland Security is using surveillance role players and cowardly, subversive, hidden armies of rats and snitches to target and harass them, and implicating the LEIU’s and others. This is not insignificant, because the DHS is actually said to be based on the model of the Stasi, and many today forget that it was a former Stasi agent, Markus Wolf,  that was consulted to set up the DHS in its early years.
From 2005:

Why would Homeland Security hire former Stasi chief Markus Wolfe and former head of the KGB General Yevgeni Primakov?
Is this part of the Bush anti-terror strategy? After all, Wolfe is the man who is credited with building up the feared East German secret police that was responsible for the disappearance and deaths of thousands of citizens. And, Primakov’s record is not any better. As skipper of the KGB he was driving force behind the machinery of state terror; a legacy that still has a chilling affect on many Russians.
Now, apparently, they’ve found a new place to hang their hats at Homeland Security. Or have they? Perhaps, the numerous stories on the internet are just fabrications intended to mislead independent research. That’s certainly one possibility. But, consider this; for those who have followed the activities of the current administration (the torture, the deception, the death squads, the destruction of Falluja) stories like this are difficult to discount. As a matter of fact, the hiring of Primakov and Wolfe seems fairly consistent with the long-term goals of the Bush team.