Organized gang stalking and pedophiles and sexual morality campaigns

Gang stalking and pedophiles and sex crime’s units and CPS child racketeering

UPDATE 11-11-2019: Western intelligence agencies are activelly using pornography and the associated “free pornography” websites to entrap, and blackmail website visitors.
Much of that takes place from Malaysia, Thailand, the Phillipines, etc., in what is called the “Asian Invasian.”
And, best of all, these scumbags entrap pornography viewers “for Jesus.” via NGOs like this.
Its CIA no matter how you splice it, dice it, or indulge in the “free pornography” psychological operation.

One of the odd paradoxes of our times is that of sexual morality campaigns cloaked in the language “its for the children”, which wages an outright dialectic deception; and then, the blatant social deviance of those who wage these culture wars.
As we see repeatedly in writings about OGS, the stigmatizing label of “pedophile” is one of the main features of OGS complaints.
And, we also see that the majority of children who are sexually abused or harmed, are harmed WHILE IN STATE FOSTER CARE. So, this is a major OGS theme, and we must look at the dialectical distortions of perps/targets from the linguistic standpoint of para-language, but also, auto antonymal meanings to pry meaning from the wider occluded dialectic.
Time and time again, we see that so-called child protective services are little more than child trafficking by another name. And certainly, the case of Andy Ostrowski in Pennsylvania demonstrates what happens to those who challenge the powerful pedophiles that “just love children” from within deep state cover. Each child put into the state system is incentived as an actual “resource” aka a “commodity or product” that can and is capitalized.
States have become to depend upon federal revenue which incentivized child slavery, and the associated “sex trafficking” that we see time and time again in these heinous state sponsored kidnappings:

Foster Children Bring in Great Profits to the State

At another point in the interview, Stefano relates how California benefits financially from having children in foster care. She states that adults who are incarcerated in the penal system on average cost the State about $48,000.00 per prisoner. For children taken in foster care, however, one child can bring in up to $1 million of revenue to the State. Children who need “extra care” are given many medical treatments, such as psychotropic drugs. (See: California’s Crisis: 1 Out of Every 4 Children in California’s Foster Care Prescribed Powerful Psychiatric Drugs)
Stefano gives one example she encountered where a Los Angeles judge sent one mom’s son to a “behavioral modification camp” because he was allegedly labeled “defiant.” He was given electro-shock treatments, and these treatments were billed to the mother at a cost of $7000.00 per week. Stefano stated that the mother is still making payments on these “treatments,” while her son is now 23, and she still has 10 years left on her payment plan. To this day she does not know where her child was sent for these “medical services.”

LA CPS Turning Foster Children Over to Known Sex Abuse Offenders

When Stone asked her who CPS was turning these children over to with such “gruesome” statistics, Stefano replied that what she discovered, and what the Los Angeles Times was kind enough to publish, was that 1000 “convicted sex offenders” had been given a “green light” by CPS to become “approved foster parents” just in Los Angeles County.

CPS Putting Children into Sex Trafficking is a Huge Problem

 
Mental health professionals, social workers, psychiatrists and criminal defense lawyers will note that police investigations by their nature are invasive and often, the investigators must reveal certain information to people who are being interviewed as witnesses, or as potential witnesses to alleged crimes.
But also, these same are complicit in it at every level as now, we see the weaponized investigation used as a tool of “high policing”.
The case of Michael Chadwick Fry of Texas is likely one such case, and there also, we see both extensive jailing of a man who is not guilty of crimes, as the state/county collects federal revenue, and no mechanism exists for victims of these state crimes to unburden themselves of state level predation.
Related Story: Two year old girl kidnapped, tortured, sold to pedophile ring, burned over 80% of her body-because CPS had a quota to fill, and the state wanted money.
And, the researcher of organized gang stalking will find that in nearly every single blog and accessory media that discusses OGS, the phrase “the gang stalkers will tell your neighbors you are a drug dealer, a prostitute, a pedophile,” etc. These are weaponized investigations, where police drag garbage out into the publucs eye about targets-and that stuff, drawn from theoretically protected databases of family courts, juvenile courts, domestic violence courts, or anywhere else that gray area slanders take place, without due process or trials.
Worse, these DHHS/DHS/DVIC whisper campaigns are designed to destroy individuals that LEO’s target for political reasons, and cannot prosecute them for crimes of any kind due to lack of evidence, or due to the fact that police themselves have flagrantly broken the law (the case of Florida state trooper Donna Watts illustrates such an example)cannot prosecute because the information they are investigating is the product of the vast illegal warrantless surveillance that all Americans are subjected to.
This is a major feature in the OGS dialectic, as we see hidden internet actors working to get kids away from parents, because this is what the states DO for revenue-each kidnapped kid is a cool million dollar federal funding trick, turned by state actors.
And, we see that in the case of the Beatrice Six, who spent decades in prison on false charges before they were exonerated official framing and slandeer was central to the narrative; and in the case of Rose McGowan who was stalked by Harvey Weinstein and former Israeli Mossad; and in the many cases online of OGS, ritual slander, and whisper campaigns are central to the “delusion” which is in fact-and practice- the main a feature of a social disease-and also, of the weaponized police“investigation.”
In fact, databases full of personal information are routinely violated across the board, in the absurd situation where our governments hack our social media, and then, leave it wide open on the web, as we saw with the recent NSA hacking programs that left citizens exposed to all kinds of harm; and routinely our data is left open to the public in situations like  the FBI flagrantly violating the constitutional protections of due process some 40,000 times between 9/11, 2001 and 2011 alone.
• Evidence of delays of 2.5 years, on average, between the occurrence of a violation and its eventual reporting to the Intelligence Oversight Board
• Reports of serious misconduct by FBI agents including lying in declarations to courts, using improper evidence to obtain grand jury subpoenas, and accessing password-protected files without a warrant
This practice of defamation begins in databases that are themselves political, and it is beyond due process, and against equal protection under the law, or even the presumption of innocence. And that is by design, as OGS is a form of ritual defamation, practiced by nearly all LEO’s and social services practitioners across the country, and those, affiliated with secret societies, masonic orders, and occult practice by definition of the occult, and, unsurprisingly, a large number of pedophiles work in policing and work with related “social service” industries.
Related Story: Minnesota Reporters stalked by AIPAC and hundreds of local LEO’s. What is a police state?
Worse, as pertains to the smears that affect a persons sexuality and can drive some to the point of madness (Omar Mateen, the Florida night club shooter was widely believed to have been smeared as a homosexual-and, the FBI and security firm G4S was in contact with him multiple times over a three year period, and as we see with the current “full spectrum dominance”he was likely privacy raped by numerous bad actors working in gray/black areas of his life) allows many sworn LEO’s and other social gatekeepers are themselves pedophiles and predators-child abusers and pimps:

Thursday, Jul 10, 2014 01:42 AM UTC
Virginia police have a warrant to take photos of a teenage boy’s erect penis
“We just take him down to the hospital, give him a shot and then take the pictures that we need,” an official said.
Law enforcement officials in Manassas, Va. have come up with a truly creative way to combat the dissemination of child pornography: create more child pornography for comparison! Their first subject could be 17-year-old Manassas
City resident Trey Simms, who faces two felony charges for allegedly sexting his 15-year-old girlfriend.
Prosecutors intend to prove Simms’s guilt by forcing him to provide police with photos of his erect penis, for which a judge actually granted a search warrant (!).
The only problem there is this little detail: the sex crimes officer in charge of this case was himself a pervert and a pedophile, who later killed himself when he was discovered:
A Virginia police officer whose job was to investigate online sex crimes against children committed suicide Tuesday
– moments before he was to be arrested for online sex crimes against children.
Manassas police officer David Edward Abbott, Jr. was the same cop who made  headlines last year when he tried to take photos of a 17-year-old boy’s erect penis for what he claimed was investigative purposes.
A year before that, he won an award for “integrity in investigative work.”
The detective was about to be arrested for having inappropriate relations with two boys, ages 11 and 13, when he killed himself.

And cops who are rapists, pedophiles, child pornographers and more are far more common than you might think-in fact, they are linked time and again to running prostitution rings, starting in the family courts and foster care factories of America, extending that reach well beyond adulthood.
And, judges are complicit so, these cops, social workers, and other “care”providers get sentenced far more leniently than any other pedophile.
Related Reading: Police, Prostitution, and Politics, by Norma Jean Almodovar.
Related Story: Florida cop/Cub scout leader busted after years of raping a little boy for years.
 
And: Some say that police badges actually incorporate the universal symbol of pedophilia and specifically those that advocate for “boy-rape” into their designs:
Police Badges: note the strange triangles
Police badges KLECK - 03_03_17 - B1
FBI bulletin warning about pedophiles
KLECK - 03_03_17 - B4

What is the "Redirect Method" of targeting individuals? Organized stalking and artificial intelligence (AI)

What is the “Redirect Method” of targeting individuals? Targeted advertising, and targeted minds: mind control by any other name.

UPDATE 09-19-2019:Since I wrote this post a few years ago, it has since been revealed that political NGOs, and police /intellugence agencies and private contractors and specifically the Anti Defamation League has been using this Moonshot CVE method to perform non -consensual surveillance and targeted psychological operations on non -consenting subjects online. This redirection has also been linked to several mass shooters, and beyond simply reinforcing stereotypes of Jews as mind controlling Svengalis, that organization is purely toxic.

Moonshot CVE is designed to manipulate you, your choices, and your political beliefs.
Many online in the community of “targeted individuals” claim that they are subjected to mind control, which, in the day to day world, usually indicates mental illness to psychologists, social workers, and criminal defense attorneys who eventually encounter targeted individuals.These claims can seem outrageous or preposterous-after all-where is the mind control facility? Where is the mad doctor D.E. Cameron, and the electro-shocks and LSD with the CIA funding? And so on.
Those were the old days- now meet the new: artificial intelligence programmed to manipulate web search results targeting individuals thought processes, choices, and emotions via electronic and other methods.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.
-Edward Snowden, NSA whistle blower, on warrantless NSA harassment and targeting of individuals

Here, below, is a snapshot of a real, actual program that is in fact  a form of mind control, where a viewer is “redirected” from one area of interest into another, where those who seek to influence and control the individual then perform an influence operation on the subject-against the subjects “free will”,and without the subjects informed consent.
Here we see that the amorphous and ever changing definition of potential “terrorist” has been applied to 320,000 persons, who have been for whatever reason, arbitrarily labelled first according to their political beliefs as indicated by their internet searches, and then, as potential jihadists or right wing conservatives in America.
Their internet searches are then analyzed using an NSA-like keyword program (Google and the PRISM and XKEYSCORE programs are CIA funded, while startup commpany Moonshot CVE appears to be a British operation , screened with 1700 key words selectors and then redirected in their searches on the internet.
This redirection is without a warrant, and without the informed consent of the searcher. Or: a man-in-the-middle attack, targeting the ambiguity and definitional peculiarities of pure speech alone. And- it is designed to influence peoples actions remotely.
What is most striking is that many early caricatures of mind control from the early 21st century and onward,  utilized hypnosis, and mental influence via “suggestion” as a form of controlling the actions of individuals, and groups, even whole societies.
And here, we see that far beyond the caricature of a Svengali or a pulsing swirl of black and white imagery hypnotizing a subject, we have instead, Google-which collaborates with the CIA/NSA/FBI and all other intelligence agencies-acting as the arbiter and the impetus for guiding an individuals thoughts and actions through suggestion and algorithmic programming.
th(10) Photo: John Barrymore plays Svengali. Today, we see another ROGS thesis validated, as the,Anti Defamation League now deploys psychological operations on unsuspecting Google users who that organization has “othered.”

Not only does Google collaborate with these agencies, but in fact, it has worked specifically with NSA and others to develop programs of social control via search engine results, and more. So, here is one of the latest attempts to influence and alter the behaviors (behavior modification) of people who are targeted with these programs:
From the Intercept:
“A GOOGLE-INCUBATED PROGRAM that has been targeting potential ISIS members with deradicalizing content will soon be used to target violent right-wing extremists in North America, a designer of the program said at an event at the Brookings Institution on Wednesday.
Using research and targeted advertising, the initiative by London-based startup Moonshot CVE and Google’s Jigsaw technology incubator targets potentially violent Jihadis and directs them to a YouTube channel with videos that refute ISIS propaganda.
In the pilot program countering ISIS, the so-called Redirect Method  collected the metadata of 320,000 individuals over the course of eight weeks, using 1,700 keywords, and served them advertisements that led them to the videos. Collectively, the targets watched more than half a million minutes of videos.
The event at Brookings was primarily about the existing program aimed to undermine ISIS recruiting. “I think this is an extremely promising method,” said Richard Stengel, U.S. Undersecretary of State for public diplomacy and public affairs.
Ross Frenett, co-founder of Moonshot, said his company and Jigsaw are now working with funding from private groups, including the Gen Next Foundation, to target other violent extremists, including on the hard right.
“We are very conscious as our own organization and I know Jigsaw are that this [violent extremism] is not solely the problem of one particular group,” Frenett said.”
 
First, they came for the jihadi’s-then they came for the ‘bad ideas’ in peoples minds….then…?

 
This targeting has been going on for decades, specifically targets individuals and whoe classes of persoons, and as we see above in commercial use-these programs are policing  “thoughts” expressed online, and more.
Here, from the early days of Snowden’s leaks:
Glenn Greenwald, reporting for the Guardian, wrote:

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.
“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Gang stalking, DHS, and law enforcement

It is widely documented in nearly every blog that discusses organized gang stalking that there is or has been police, FBI, DHS, or other agency involvement (much of it mis-attributed, as we see in the case of LEIU’s that they work in “darkness” and complicity with bad actors, across disciplines, and from within the hidey-holes of the “see something say soomething, even if you make it up” framework; and they do this with total impunity-even the FBI does not have access to the LEIU files*- and as such, like a gang or criminal enterprise itself), and all gang stalking is deeply rooted in deep state tools and database abuse where a targeted individuals data was gleaned illegally and without a warrant, and then used to “spook” them in a variety of ways, that any researcher of organized stalking is already likely familiar with.
Why the NSA database abuse is far worse than anyone could ever imagine.
But others note that surveillance role players and contractors with the Department of Homeland Security are also clearly involved in these activities. So in my research, I use this as one measure of the veracity of writings and video’s that document it. Gavin Seim has many video’s where we can watch the process in action as chubby government workers hide behind “rules and reguations” that they pulled out of a hat, rather than laws and due process, which are written in our Constitutions.
In security and especially covert operations, those who deploy these tactics do not want them widely known. And articles that chronicle the stalking of Rose McGowan by an army of spies provides a template of the horrific potential to coerce and frame individuals when we allow a surveillance state to go unchecked, and unaccountable. The cases of James McClynas of Florida and Rick Krlich of Ohio are also notable cases that document the abuses of local syndicates and city councils that were covered by MSM.
So, to a researcher of organized gang stalking, you will note that blogs that discuss this, but also provide documentation of this are valuable allies to falsifiable evidence that it exists, as opposed to bloggers who write about aliens, the devil, and talking to dead people.

Related Story: How Law Enforcement Intelligence Unit’s (LEIU’s) have destroyed any semblance of the US as a Democracy and the Constitution, one black bag job, one blackmail and compromise operation, one dossier at a time. From Project Censored- the top censored story of the 1970’s Project Censored- the top censored story of the 1970’s, and how it affects us today. [full text is available online]

The trick for the researcher is to uncover which is which, and then, to weed out the blogs and videos that are classic misinformation and disinformation, as well those that are purely deep state mind control operations, as we see here . For example, most blogs and video’s that reference Directed Energy Weapons, and electronic’s that are bizarre; or websites that dabble in the absurdly paranormal, although some are just odd accounts of unique worldviews, sprinkled with paranoia. And-most of the accounts are written by these same DHS/private contractor/NGO’s/foreign spies, unregistered foreign agents, and other scumbags working under the “community policing” and CVE schemes.
But any cursory search of the how-to and the who-to-target of propaganda and influence operations can be found online, and compared to these many blogs and accounts of OGS. Here is just one of the many declassified Psychological Operations manuals of the CIA. And here is the famous Simple Sabotage manual as well. PsyOps is a major feature of these operations.
Other clues that blogs and videos of gang stalking are psychological operations is that they give patently bad advice, such as https://neverending1.wordpress.com ( a site that borders on psychological sadism), which once advised TI’s to put a jar of water next to an electrical outlet; or sites that are very well funded, as is the case with OSI informers and others. Interestingly, several of the commenters at NE1 are Lions Club members, and others who fit certain profiles, as I have described herein, and many of them have now deleted or closed their blogs since I wrote about them. Others have gone on to work in OSI-type disinformation honey net operations.
In my experience, my rough estimate is that some 5-25% of all blogs are actually people who are indeed targeted individuals (TI’s) and the rest are useful idiots (some 45-50%) who work in and around LE communities, or subsidiary to them; some 20% are actually agency or agency affiliated. And small number of them are mentally ill, elderly, or just lonely people trying to fit in (these also show up in many blogs, like the neverending1 blog).
FightGangStalking.com is one apparently decent site that seems to steer clear of honey-netting or “DEW” misinformation, as of 2/28/2017 (so far-many of these sites start out well, and then get taken over, or manipulated by agencies, as many of them are just entrapment schemes.) So,  fightgangstalking.com, is notable among the many blogs because the writer only documents verifiable news sources and stories that any researcher of organized gang stalking can refer to as an official source. And, the writer is a former security industry worker.
Related: Here is a suite of free and pay-for investigative tools from Einvestigator.com that you can use to study your stalkers.
Also, and perhaps most importantly, the blog author gives credible background information about themselves, is open to dialogue ( we have exchanged emails), and does NOT allow a comments section. This last point is important because the great majority of blogs are a sort of free for all of madness, manipulation, mind control/influence operations, or honeypots whereby investigators entrap those who comment, or like Dr. Mike Wood’s blog on Conspiracy Theory Psychology, the comments eventually become disinformation outlets due to the well oiled crisis PR industry that I describe elsewhere.
The author of FGS is also familiar with the fact that much of gang stalking is perpetrated by security contractors and surveillance role players, and disreputable blackmaailers who work in any of themay “spy rings” that permeate the west today, likely funded by black budget’s and grants from the Department of Homeland Security and others. These quasi-investigations take on Orwellian proportions, and are highly reminiscent of the brutal psychological operations and blackmailing population control East German Stasi tactics of the 1960’s. But also, exactly like the case of Rose McGowan, who was followed, monitored, harassed, and manipulated across the globe for decades by an army of spies hired by Harvey Weinstein.
Surveillance role players and gang stalking
In the same way that members of the organized stalking community raised awareness that the NSA and other agencies were breaking the letter and the spirit of the law by wiretapping them, all American’s now know tat TI’s were right-the NSA is tapping all of our phones. And worse, continuing the harassment of TI’s by distributing that data to 15 other agencies long before that was made public. As some of us predicted in 2003-4, it will NOT get any more Constitutional around here, any time soon. Police states simply don’t go away-because they work in secret, and against due process at every step, building traps over periods of decades in some cases, as we see with Rose McGowan, who was followed for three decades by private spies.
TI’s are now warning that the Department of Homeland Security is using surveillance role players and cowardly, subversive, hidden armies of rats and snitches to target and harass them, and implicating the LEIU’s and others. This is not insignificant, because the DHS is actually said to be based on the model of the Stasi, and many today forget that it was a former Stasi agent, Markus Wolf,  that was consulted to set up the DHS in its early years.
From 2005:

Why would Homeland Security hire former Stasi chief Markus Wolfe and former head of the KGB General Yevgeni Primakov?
Is this part of the Bush anti-terror strategy? After all, Wolfe is the man who is credited with building up the feared East German secret police that was responsible for the disappearance and deaths of thousands of citizens. And, Primakov’s record is not any better. As skipper of the KGB he was driving force behind the machinery of state terror; a legacy that still has a chilling affect on many Russians.
Now, apparently, they’ve found a new place to hang their hats at Homeland Security. Or have they? Perhaps, the numerous stories on the internet are just fabrications intended to mislead independent research. That’s certainly one possibility. But, consider this; for those who have followed the activities of the current administration (the torture, the deception, the death squads, the destruction of Falluja) stories like this are difficult to discount. As a matter of fact, the hiring of Primakov and Wolfe seems fairly consistent with the long-term goals of the Bush team.

Organized gang stalking, psychological and influence operations.

A large part of what the organized gang stalking dialectic seems to be is the result of psychological operations, and influence by suggestion. And some 70% of the blogs I have read talk about something called “electronic no touch torture,” which in my mind at least, is an accurate description of how one feels after their privacy is invaded, and or they are subjected to contact with agency level psychological operations. Every agency has a dirty tricks section, and they use them covertly, and judges and juries much less the average citizen are never aware they were there.
Even the world reknowned authorities, and pro -prosecution OGS denialists David V. James and Lorraine Sheridan on OGS agree that the mysterious and nebulous “the internet” creates an “ideological echo chamber,” i.e. that for some, the targeted advertisements, the targeted switches and targeted routers in targeted American communities who have ISP’s that target words, and CEO’s that target speakers, and hidden FBI Infragard agents feeding community policing that trickles in from the internet switch- and for targeted individualsThe internet creates a sort of ‘closed ideology echo chamber’ wherein people who share unusual beliefs reinforce each other’s thinking”
Which is, or course, by systemic design as we see the redirection method being used by “mystery money” funded startups to influence “jihadists” and the equally nebulous “right wing” alike via linguistic analyses, which is known as “persuasion,” and also “soft force mind control, and more. Then there is the direct access to any given targets mind via hacked cell phones, and then, hacked relationships-because that is EXACTLY what the Panopticon via products like Palantir, Moonshot CVE, and “captology” was designed to do.
Most sites and discussions about no touch torture are loaded at the front end and are themselves psychological operations. Butt of the few sites that are not, we see that it is a real concept, and practice.

Psychotherapist Otto Doerr-Zegers, who has treated Chilean victims tortured under General Augusto Pinochet stated; “The psychological component of torture becomes a kind of total theater, a constructed unreality of lies and inversion, in a plot that ends inexorably with the victim’s self-betrayal and destruction. …”
This is similar to the technique of “street theater” that mind control victims described in the Washington Post Magazine article. As torture victims are not mentally ill, mind control victims would not be mentally ill but rather have undergone and are undergoing a traumatic situation comparable to torture, such as the alleged illegal targeting with government mind control weapons.

Here below, is one of the ways it is deployed in the real world, from NBC news, is Britain’s JTRIG dirty tricks division:

“British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”

Imagine yourself sitting down to write an email, and all of a sudden your connection is cut. Then, you look in the body of your email and that masterpiece that you spent some 10 minutes writing to your aunt Alice has also and without explanation, disappeared-and NO COPY EXISTS in you drafts folder.
The first time this happens to you, you would be pissed-but if it happened dozens of times as you write critical stuff-emails to your doctor, a hot tip to your bookie(*jk*), or an even hotter tip to a journalist who believes in Constitutional liberty, you would begin to see patterns in your own mind-that your data is being messed with inside you.And, in fact, the internet has literally come into your home, and changed your behavior even before your fingers hit the keyboard-and altered your actions inside you.
This is what no touch electronic torture really is in real world deployment. And while it may seem insignificant, it has the cumulative effect over time of wearing a person down, letting them know that they are being watched, and that crucial and critical communications are being stopped at one’s fingertips. Important friends and associations are being destroyed each time you bring up these “odd happenings.”
And this, combined with other electronic no touch torture: your computer is hacked repeatedly, or flashing white screens; your cell phone apps turning your phone on and off seemingly at will, or the coincidental amplification of your conversation in your ear. here are literally hundreds of ways that a persons phone can be messed with, and TI’s talk about that too. Taken as a broader picture, it is the cumulative effect that does the damage.
Torture in any form is abhorrent, and never necessary, despite the claims of those who torture, who also happen to be the same people who have collected all of our internet data and are now culling through it  with 17 other agencies for blackmail purposes. If I had told you this is what is happening even five years ago, you would have called me a nutter. And now, I bet, even you are afraid to say it out loud much less do anything about it. First they came for the crazy guy on the internet….
Using neuro-linguistic programming techniques as simple as Google auto search”suggestion,” and subtle verbal intimidation, as well as the deployment of various internet tricks, such as cutting off a persons ability to write blogs, or the interception of emails, much of what we see can be said to have the hallmarks of classic operant conditioning, combined with learned helplessness.
This last link is important because many in the dialectic feel as though they will never be able to overcome their situation. And, the one venue they have, the internet, is subverted at every point as heir blogs get hacked, and their emails intercepted, and so on. Some 50% or more of the hundreds of blogs I have read indicate that these things happen. So it could be an indicator that there is something afoot, as other online communities of bloggers do not report these things, dwell on them, or even infer that they happen.
So, even a casual investigator of this community will readily recognize this feature. And, there appear to be some blogs that use learned helplessness language, and others that d not. Simple phrases like oh, targets, just get used to it, Wherever we go, there will always be gang stalkers,” and so on. A great example of that is the blog https://neverending1.wordpress.com, where the writer never loses the chance to use negative language that reinforces the hopelessness of those who go here for advice.( I refuse to provide a link it is that negative.)
Extra Bonus: Here is the CIA page for psychological operations to control populations.
Sigmund Freud, in “Civilization and its Discontents,” notoriously classified modern men as “men of action,” and the intelligence agencies are really into that.

“The man who is predominantly erotic will give first preference to his emotional relationships to other people; the narcissistic man, who inclines to be self-sufficient, will seek his main satisfactions in his internal mental processes; the man of action will never give up the external world on which he can try out his strength….”
-Sigmund Freud

And, in the targeted individual community, there is no small irony that they begin to refer to themselves as “TI’s” when in fact the PsyWar equivalent is the “TA” meaning targeted audience.
Here from the CIA link above:

The intelligence officer is not inspired by the purpose of merely collecting and evaluating information or making analytic studies. His mission is not an end in itself, but a means to an end — a contribution to the defense and foreign policy objectives of his country. His work is therefore meaningful only to the extent that the information he provides is utilized through appropriate action. The individual operator’s performance, to be sure, does not lose merit if significant information which he acquired in due time and reported to proper authority is not acted upon; but the intelligence organization as a whole has failed to function effectively if the information it produces does not lead to some kind of policy determination or action.

I must at this juncture make note that in classic schizophrenia, there has always been the element that these claim that they are being followed or harassed by the CIA or the FBI. While organized gang stalking DOES have these claims within it, sometimes, even the paranoids are right, as we se now with the Palantir database which is equipped with artificial intelligence an predictive software, as well as a host of other means by which to ‘read a person’s mind’ and control or manipulate their online behaviors.
But it’s simply not fair to blame the CIA for everything, although it is convenient, and the idea is within the vernacular of most people.Since Edward Snowden revealed that the NSA is sweeping up the data of everyone, and all Americans as well, we are now able to track the basic flow of this data in news stories that document the reach of this grand psychological operation we see that the picture is much bigger, in much more horrible ways than the CIA could imagine all by its lonesome.
Here in this link are the tactics and techniques of guiding, misguiding, or poisoning the dialectic entirely, and then, disguising victims in the cloak of mental illness.Any researcher of organized gang stalking will find correlations between the phhrase “electronic harassment” and discrediting tactics outlined in the CIA manual. In the targeted individual community, the psy-war elements are everywhere.
The Five Eyes nations are all in on it, and Great Britain is one of the worst offenders, using the dirty tricks division JTRIG to compromise, blackmail, and discredit targeted individuals.

A slide from the JTRIG dirty tricks and mind control presentation. Note the emphasis of “making something happen in the real world.” Mass shooters anyone? What else are these guys “making to happen?”via The Intercept

Israel has been getting ALL Americans data since forever, and waging hasbara and other psyops across the globe to enforce, reinforce, or otherwise promote Jewish religion and culture (the apartheid, mind control, old lady killing zionist version  of it.)
From the Washington Post:

“The relationship was described in a “Memorandum of Understanding” between the NSA and the Israeli SIGINT National Unit (ISNU)”

So- if those are “our friends”-our enemies must be real shitbags right?  But even China has yet to catch up with us as comes to waging active psy-war on it’s citizens. We can read  CNN as they try to downplay the fact that China is doing EXACTLY what the Five Eyes alliance is doing to suppress, control, discredit and destroy the free speech rights of western nations.Meet the CNN  version of “the Great Cannon of China.”
But-does it hold up well against the Free Speech Steamroller that we use? Only time will tell-or, maybe someone can  get standing to sue our agencies and see what they are really up to. I bet the Chinese are rolling in laughter as they watch how the agencies and law enforcement in general are using our Constitution as toilet paper.
Lastly, it cannot be understated that “the CIA tortured some folks.” And that the American Psychiatry Association provided advice as to how to do this. Meanwhile, their guys always get the help they need when they are done torturing others. I don’t mean to imply that the CIA and other’s are using the internet as a form of torture for some, but YES THAT IS WHAT I AM IMPLYING. But clearly, they aren’t the only ones doing it.
Stalin, Hitler, and their go-to guys in Psychological Operations, Edward Bernays (whose books lined the shelves of all Nazi propaganda officed)and Sigmund Freud, both of them Jewish, had nothing on our guys when it comes to propaganda, and mind control techniques; and China last I checked had no Manchurian Candidates, because as we see time and time again, only western nations and Israel are literally manufacturing terrorists.