“Targeted” individual journalism wins the Taylor Award: who wants to apply for the Gary Webb Award for Excellence in gang stalking journalism?

The series “Targeted,” by the Tampa Bay Times chronicled the targeted individual program run by Chris Nocco, a corrupt county sheriff.

Pasco County parents and teachers are calling for changes to a secretive Sheriff’s Office program that uses student data to profile schoolchildren as potential future criminals, with some demanding the practice be stopped

Then, it began winning awards for fairness, and truth in journalism.

From Harvard University`s Nieman Foundation, a story of “the best of gang stalking journalism:”

Cambridge, Mass. – “Targeted,” an in-depth investigation by the Tampa Bay Times into a police program that for years monitored, intimidated and harassed families in Pasco County Florida, is winner of the 2020 Taylor Family Award for Fairness in Journalism.

The reporting by Kathleen McGrory and Neil Bedi revealed that ten years ago, the Sheriff’s Office in Pasco County, Florida, created a secretive data-driven system ostensibly designed to proactively combat crime. The algorithm instead was used to try to predict which residents might break the law. During the last five years, the sheriff’s department used that information to target nearly 1,000 people and assigned deputies to repeatedly show up at their homes, often without probable cause, a warrant or evidence of a crime.

The Gary Webb Award for Excellence in Gang Stalking Journalism is still open for submissions, if any enterprising journalist is interested.

Val is an electrician. So was Ahmaud Arbery, killed by two wild, fatassed Georgia pigs

Let me know when you start seeing patterns. Patterns like, who the police and their hidden gangs of retired police, firefighters, NGOs, community close bs like Rotary International, Lions clubs, etc. and their deceptive, psychiatric meta -narrative enabling academic mouthpieces target for “gang stalking.”

Or, the difference between “is” and,“was”in the organized gang stalking dialectic, where targeted individuals are cyberstalked, followed, and threatened online and off.

So, who was Ahmaud Arbery?
Val is an electrician (and he was gang stalked by an LAPD gang strike force). Ahmaud Arbery was also aspiring to that guild, as he studied to become an electrician too.

11Alive’s sister station, First Coast News, reports that Ahmaud Arbery was a football player and graduated from Brunswick High School in 2012. He went on to attend South Georgia Technical College.

His mother, Wander Cooper, said her son was pursuing a career as an electrician.

Arbery was 25 years old at the time his death.

Last I checked, curiosity is not a crime, and while some are feeding the media false narratives “we saw Arbery go into a construction site!” and inferring that he entered that site to steal, most rational people know that people who are studying construction, study constructions too.

There is nothing unusual about that.

Except that a retired cop, his drooling, fatass son, and another neighbor, working with police to frame,a narrative, formed a “posse” aka “gang”, and then literally hunted Arbery down, and shot him in cold blood AFTER Arbery tried to avoid a confrontation (several times) with these armed strangers.

So, yeah. This was a “gang stalking” that went bad, and fortunately there was video of all the events, and that video contradicts the deliberate coverup of this modern lynching.

Related Story : They are called pigs for a reason. Look at this fat jowelled, overfed wild Georgia pig, as an example.
OIP.0FuwYlY4IExJHTxqBzi4CQHaFj

The hunter had to use an assault rifle to take that wild, fat pig down.

Revisiting the Scott Bierle Tallahassee Hot Yoga shooting: when political operatives harass targets

My readers might have noticed that gang stalking is political, and that politicians are frequently directly involved, and in DIRECT PROXIMITY TO mass shootings, or that these target individuals with bizarre conduct.

So bizarre is gang stalking, that I personally had the president of the United States park his limo and security detail one block away from my house during the election cycle, as he had a hamburger with an “empowered woman”. It may, or may not have had anything to do with me whatsoever, right?.

I voted for the guy in the previous election, and even organized the defacto second headquarters of that party in that state, but that didnt stop the shenanigans *:

1564329557079

You see: I was being followed, slandered, and blackmailed at the time by named persons, and organizations (have a look at my recent follower affilliated with the DoD here, and also, this loon who is the former liason to Israeli intelligence too). I had morons in hoodies running through my yard at night, and worse.

And, curiously, one of my stalkers also attended a yoga center, and that center, run by rap moghul and tycoon Russell Simmons.

And, it affected my choices.

But it DIDNT cloud my judgement, or close my eyes to all the little details either. You can see some of that here and I name a few names here too.

Related: The recent crazy story about an exotic dancer, Jessica Prim, aka a sex worker being framed as a nutter after being gang stalked for her politics, and things she said online.

Importantly, we see another ROGS thesis validated, because *influence operations* were clearly linked to that event. As we see time and again, police are implicated and heavilly involved AS stalkers in most cases.

It reminds me of this other sex worker who ended up getting framed for fake bombs, which were mailed to deep dtate actors. I mean, really: how does someone even get George Soros, or former CIA chief John Brennnans home address anyways? Modern PsyOps are plainly bizzare..

Scott Bierle, a Florida man with two masters degrees, and an Army veteran, shot up the Hot Yoga in Tallahasee, and likely killed several of the women who were harassing hi with slanders and unproven claims about his sexual proclivities(he was framed by political operatuves as an ass grabber, and arrested twice, charges dropped. Welcome to Womens Empowerment, y’all)

So, its necessary to follow up these cases to see if new evidence emerges. And, in the cade of Scott Bierele, we see coincidence AGAIN: a state legislator affilliated with Democrats “just happened to be there,” as the shooting “just happened.”

And, that “just happened” in Broward County, FL, which seems to be one of the epicenters of these events, having also incited the Parkland school shooting too.

Well, lookie here! And “what a coincidence!!”

Democrat operative at the scene of the mass shooting, much as we saw with Jared Loughner and the darling of gun control, Gabby Giffords. It looks like the Dem.operatives are learning how to keep their distance from the mass shootings they create.


State Rep. Kristin Jacobs was witness to aftermath of yoga studio shooting

Jeffrey Schweers | Tallahassee Democrat

Kristin Jacobs, who represents the Broward County community of Parkland in the Legislature, was a barside witness to the mass shooting at Betton and Thomasville roads.

The events that unfolded before her eyes echoed the horror her constituents went through nine months ago when a shooter broke into Marjory Stoneman Douglas High and killed 17 students and school employees.

Extra bonus points for how the Jewish christian and (R) v (D) narrative is also at the center of these events: Bierely was a Reagan Republican.

And, one of the chief gun control crisis narrators from that area is an actual child trafficker, cop, and “mediator”Jeffrey Kasky

So, child trafficking is a billions of dollars scheme in the US and one of the major industries underlying the Jewish christian narrative of culture there, and everywhere you find these people.

Related: The left and right wing political operatives fingerprints are all over these mass shootings.
So, small surprise that my blog was hacked (as was my phone, and other devices)and temporarily titled “Q” Also, the logo at the top of my blog, with the militant police force was added(I left it there for reasons I will not disclose) shortly theteafter.

Because gang stalking is bi-partisan, and I merely document it. But secretly, I think Trump has a handle on “who” the deep state is, whereas Obama was a child of the CIA itself. Neither of them are doing shit for democracy though.

Well, Rest in Peace, Ms. Jacobs. I heard you got a dose of cancer and ate radiation before you died….“theyre zapping me right now!” HAHAHA….gang stalker humor.

Heres more about how Democrats define womens “empowerment”:

“Jacobs is survived by her sons, Richard Hames and Mitchell Jacobs; a daughter, Lauren Donaldson and her husband, Chris; grandchildren Tyler, Mirabelle and Kelsey; ex-husband Stu Jacobs; and boyfriend Steve Vancore.”

Fuck me, did you follow,aling with that epitaph? ‘Survived by two kids with different last names, an.ex husband, a current husband, and a boyfriend.” WTF.

Better yet, DONT fuck me, American woman. Stay away from me-hee.Just let me be-he-he-he.

Well, going forward, maybe, you and Scott Bierele there in hell can have a chat about Yoga poses in the gang stalking dialectic. Or, chat about all of that non-coincidental gang stalking thats going on down in Broward County.

*
shenanigans
[SHəˈnanəɡənz]
NOUN
shenanigan (noun)

secret or dishonest activity or maneuvering.
“widespread financial shenanigans had ruined the fortunes of many”
synonyms:
deceitfulness · deceit · deception · deviousness · [more]
silly or high-spirited behavior; mischief.
synonyms:
mischief · mischievousness · naughtiness · badness · bad behavior · misbehavior · misconduct · misdemeanor · perversity · pranks · tricks · larks · capers · joking · jesting · clowning · buffoonery · roguery · devilry · funny business · diablerie · tomfoolery · monkey tricks · monkey business · goings-on · hanky-panky · carry-on · carryings-on · jiggery-pokery · deviltry

Online “personas ” and what to do about them: gang stalking by AI assisted robots and targeted individuals online

Online “personas ” and what to do about them: gang stalking by AI assisted robots and targeted individuals online: a gang stalking conundrum.

Gang stalking is automated, but also, assisted by living breathing humans, who are sometimes paid players, and other times, mere useless idiots who play along with the Mockingbird Effect.

Here, have a look at how I was cyberstalked on Mike Masnicks (fabulous ) blog, Techdirt.com:

The gang stalking started around 2013, when I tried to raise awareness of organized gang stalking. Out of necessity for dealing with a troll farm friendly commenting sytem at Techdirt, I used different “personas” to manage a conversation, but without any software, or automated programs to assist me:

https://www.techdirt.com/articles/20131210/07555625519/lawsuit-claims-accidental-google-search-led-to-years-government-investigation-harrassment.shtml

I responded to a comment from a guy name George Boneyard, which I referenced here.

I was defending/empathizing with a guy named Jeffrey Kantor who had been targeted by a Google based algorithym, and that had served him bullshit results, and possibly, those results spoonfed to him after some online gang stalking by Fusion Center operatives and military contractors/AI programs that manipulated his search results.

Back in those days, AI gang stalking was new to the “normies ” whereas I first experienced online “redirection” after I reported on the first Somali manufactured terrorist in the City College News, Mohammed Warsame, who was an FBI snitch.

Redirection is where people search Google, or other search engines for materials and get different results, depending upon who is targeting the searcher based upon an IP address, as we see in the case of ADL online cyberstalking here.

So, the Jewish, parochial journalist (Mike Masnick, of Techdirt.com, for example ) who searches for information about “why do Somalis get…. ” blankety blank, will get Google results for:

https://www.somalispot.com/threads/why-do-innocent-people-get-punished.76125/

https://www.somalinet.com/forums/viewtopic.php?t=357328

And other such discussions, whereas myself, I got results sponsored by shitbags like the Anti Defamation League, and bbbb,,b other shit-persons. I also got Nazi logo laden websites (courtesy of the Bronfman klan and local Fusion Centers, working with Infragard shitbags like that colleges president) every time I searched forresults like, “human rights in Palestine” and so on.

And, besides the ibvious terroris recruitment pop -ups, and as in Arabuc tat I couldnt read, when I searched for information on Somalis, I got stuff like this instead :


Why do Somalis smell bad
?

And, occassionally, stuff like this:

https://www.mnopedia.org/somali-and-somali-american-experiences-minnesota

But always, reverting to this:

Etc.

If you guessed that not all searches online are equal, you would be correct. Because our filtered internet serves some of us, different results than others of us.

Now, take a look at how I predicted that:

1 the Redirect Method will be used by the Anti Defamation League to bully, target, and harass individuals

2 the Anti Defamation League (and Mike Masnicks in -house trolls ) bully commenters online.

Its a ROGS BINGO.

So, now when I go online, I practice persona management, and I recommend it to anyone who is being targeted in the Panopticon.

Read this article about how defense contractors use persona management to target us,

https://m.dailykos.com/stories/2011/02/16/945768/-UPDATED-The-HB-Gary-Email-That-Should-Concern-Us-All

and keep in mid tat its not just “the gubmint ” targeting you, but tese das, it could be racist groups like the Anti Defamation League and its octopus of NGOs, or even te Klan, and any of the militant feminist groups who work behind Sexual Violence Centers (also note the para-language involved in nearly all DVIC industries )

I will provide more context at a later date, with evidence.

Kära Sverige: din USDOJ kille i Thailand är bara CIA lite. Jag kommer att göra mina nya vänner medvetna om det

Dear Soon to be New Friends:

You have recently been approached by a representative of an organization that had “information” about how they can use the religious “science” of ponerology and internet black magic to help you enforce a hypothetical moral code, or some vague, or unwritten laws.

And, deep in their sales pitch, they offered you a bribe, in the form of grant money,or other financial reward or incentive to help you, personally, or your country in general down the great new road to the future. But there is a problem with that rationale, and it is this: with religious orders, the future is always the past, and their offer to you can only lead you, and those they have approached, back there.

Well, you might have noticed that this blog you are reading,( as I type it,) is a useful spy hunting tool and that the author-the guy writing this from a fully entrapped communications device, is a useful and reliable, proven spy hunter, who is familiar with how these “good people” operate, online, and off, and that I am deeply familiar with their religious, tribal,theocratic, sectarian, and coded online psychological operations.

You might also have noted that I can train teams of other spy hunters to do what I do, but to do it better, because everything works better if everyone is on the same team-and if we all get a paycheck, of course. And, because it takes a huge amount of time and resources to do it.

Related Story: Look at how India is waking up to the fact that western spy agencies by proxy of “corporations” like Facebook and Twitter have been entrapping their soldiers, and others in sensitive infrastructure positions, using social media, and “religious gurus” and utilizing “honeytraps.”


‘Crucial source of intelligence’: Indian Army urges officers to wipe Facebook accounts & avoid WhatsApp over security gaps
15 Nov, 2019 01:19

So, in that light, I would ask you to take special note of the religious and tribal sectarian affiliations of your recent informers, and then, notice THEIR affilliation with my own Department of State, and Department of Defense, and other levels of our “deep state.”

But also, please especially notice that our spy agencies are targeting your networks, and switches, using these types of tools, all of which leave electronic signatures behind if you know where to look; but also that certain online dialigues can lead you to these people who use those pieces of code, and even subsidiary languages online. And, that everything is not always what it appears to be.

In western theology, there is the concept of scapegoating, which featured heavily in recent tribal sectarian holidays. The story is basically thus:

A tribe full of baby bombers and affilliated seething lunatics refuses to be held responsible for their hateful crimes and high misdemeanors that they perpetrate on others across the globe, and so, with high pomp, and ceremony, they blame a goat for their crimes, even marking that goat with a “red” scarf.

Yeah, I thought you might chuckle at that last part. Me too.

Well, anyways, they then throw this goat off a cliff, much the way that we see in this odd case from the USA, or this one from Australia, but ESPECIALLY this one, which involved a foreign born billionaire encountering the perverse honey traps that western governments are using to compromise you, your diplomats, your citizens, and others who are integral to your countries public safety.

So, read the headline above from that perspective, and then, lets return to the narrative of the goat.

As you know, the western dialectic is infused with signs and signifiers that are not always apparent, and the goat is one such narrative that we see repeating in many forms in the western theology, and for many sundry reasons.

But here, lets focus on what is seldom discussed in liturgies that appear during this holiday season: what happens to the goat after they toss it off a hill, or, in this case, off of Capitol Hill?

Well, a little known fact about the goat is this: once kicked into the wilds, it becomes a beacon, easily followed due to it red scarf, and, that goat will inevitably fend for itself.

This of course, means that the goat will find new sources of food, water, and shelter, as well as to bring actual, and real predators out of their internet hiding places. And then, of course,the shitbags who tossed the goat all pounce on the food, water, shelter-and you, eventually.

So, I think you might be interested in hearing more? You know where to find me if you want to hear more.

Best Regards,

ROGS

The un-naming of a man: Was the recent West Texas shooting the result of Christian cultists, using police to gang stalk an un-named man?

All over the media narratives of mass shootings, we see the reporters using quotes from bystanders* who declare one or another form of religious delusion about God, Gawd, G-D, but seldom do we ever see a quote with “God damn,”in it, as regards the batshit crazy methods of high policing, aka gang stalking and harassing men, using 24/7 Fusion Center monitoring, cyber-stalking, and offline pseudo-investigating men based on first amendment protected speech until they go ballistic.
In the story below, keep your eyes peeled for people invoking God, G-d, Gawd and the Lawd in a curious twisting of objectivity in journalism, as journalists conflate the free press with neocon tribalistic narrative.

Related Update: since I wrote this post, and asked “why dont gang stalkers say GOD DAMN!,” Progressive candidate Beto O’Rourke has created a tee shirt that says this: …..
https://m.newser.com/story/279914/orourke-campaign-sells-f-ed-up-t-shirts-after-mass-shooting.html

Then, note that the Association of Threat Assessment Professionals, which advises the various alphabet agencies like the FBI and DHS, to LEIUs,and other organizations that are documented as practicing gang stalking calls this high policing “the colliding parallel investigation,”and this organization has steadily morphed the definition of terrorist into many variants of what used to be ordinary domestic crimes, but also, most nefariously, they advise the
various community policing groups to deploy psychological operations on targets of their abusive, personalized, weaponized,pseudo-investigations.
I have provided evidence, and documented how neocon-religious factions in several specific locations around America routinely harrass, and manipulate primarily males into taking up arms against gang stalkers( as we see in this example here, or this one) who utilize community policing primarily by polucing speech, aka, these target people who use first amendment protected speech.
And, I have also noted how both left wing, and right wing cults and sects BOTH are using gang stalking to further their political aims, and I even predicted two key elements of the recent Virginia Beach mass shooting, with nearly perfect scientific veracity, and that, with a ROGS BINGO BONUS,when the media narrative of that shooting actually quoted a man who said that the workplace tolerated “pranks”that utilized Feemasonry and symbolism as a form of harrassment.
So, here is yet another feature of these religion based gang stalkings of targeted individuals that frequently end in mass homicides, suicides, incarceration, or institutionalization: the un-naming of a man and less commonly, a woman as we saw in the case of Sol Pais, who was gang stalked by religious elements who stalked and bullied her as an avowed Satanist, but who was merely a reaction formation to organized religion).
So, lets look at the strange cases of mass shootings in Texas, and the other equally strange cases that make headlines there.
1-Michael Chadwick Fry attempts to take back the narrative of a deputy involved homicide where, he believes, he was the intended victim, and then, he encountered high policing, and“witches”(you really cannot make this shit up-the cultists and sectarians that suck the slush funds of the DVIC are that bizarre).
2- The bizarre “fentanyl-laced flyers” hoax, where law enforcement elements quoted in the press asked that the readers believe that some person or group placed fliers on squad cars directly outside a police station which is armed with cameras; and those flyers were from NSA-affiliated Targeted Justice to boot.
3-The recent El Paso shooting, where Fort Bliss featured in the narrative, and it was,said that a Fort Bliss soldier had saved children during the shooting, which is ironic to the core, since Fort Bliss is part of the US military child porn distribution, and terrorist radicalization cyber command, aka its aninternet “middleman”.
4- Devin Kelley, a complete ROGS BINGO👻💩💀😂
5-The FBI-CVE-DVIC complete mis-fire in the case of Rakem Balogun, framed as a terrorist many years after his DVIC initiation.
I could go on and on about how Texas (like Ohio, New York, Florida, and California are epicenters of gang stalking, but for now, just use my search feature for more Texas stories) is becoming a feature in mass shooting related false narratives, but I will stick with the one at hand, where a mass shooter is,“known to law enforcement,” but for SOME REASON, the sheriff refuses to name the man in the story below.
So- what is the un-naming of a man, and why does it matter here?It matters, because the un-naming directly evokes religious apicalyptic writings, and, ine relugious sects corruption of the original text, to whit:

Is it possible for a person’s name to be erased from the Book of Life?

I will let the reader do the homework now, but start with this salient question linked above, because the short answer is this: only the bastardized Anglo-christian King James Bible sects and cults within law enforcement actually believe that a) there is a “book” of life, and b) that christians like them owe a duty to their murder-based Gawd/Lawd to un-name people (other Jewish-christians have similar beliefs, but not as of radical practices, because as we saw with the KKK and lynchings, we see today with the creation-through-police-harrassment of mass shooters, a sort of reverse lynching).
Th Un-naming of a Man:


At least 21 shot, five killed in shooting in West Texas

Odessa Police Chief Michael Gerke says that at least 21 people have been injured by gunfire and five killed in a shooting in West Texas.
At a news conference Saturday, Gerke also says that at least three law enforcement officers were among those shot.

Police say the suspect killed after a West Texas shooting spree was a white male in his 30s.
Odessa Police Chief Michael Gerke declined to name him but said he has some idea who he is.

He spoke after a chaotic afternoon during which police reported that a suspect hijacked a U.S. Postal Service vehicle and began firing at random in the area of Odessa and Midland, hitting multiple people. Police initially reported that there could be more than one shooter, but Gerke says authorities now believe it was one shooter.

And finally, to see how involved the mefia, and media personalities are in both creating false narrative, but also defending themselves from it, have a look at the case of Anna Conkey, NBC reporter, and military trained mass communications deep cover religionist, bringing her gun to church one fine day.
*bystander interviews are supposed to be nearly random and should be conducted by un-biased reporters who seek facts, and according to long established, unbiased journalistic practices.
But in fact and practice, all mefia is biased, which is to be expected in free societies. However, the addition of military-trained mass communications specialists like,Anna Conkey who I mentioned above, or ADL sponsored K4 journalists like any of the thousands of journalists in the MSM adds an even more extremist perspective.
Then, when we look at the cozy relationships between the “bystander” in the cases of the Ten Thousand Oaks shooter Ian Long, or the “councidental” narrative control agent Rochelle Ritchie in both the Baltimore case of murdered Freddy Gray AND her narration of the Wiley E. Coyote fake-bomber Cesar Sayoc, another picture emerges about both bystander interviews, and crisis Public Relations agents.
This peculiar pre-incident relationship is best demonstrated by the case of Michael Chadwick Fry, in Texas, who actually named a crisis PR agent, Tom Reedy in his fliers.

Sol Pais suicide, failed FBI CVE programs aka community policing, Israelification, and Fusion Centers.

she had never made a specific threat against a specific school.

(Newser) – Sol Pais, the Florida 18-year-old who was reportedly obsessed with the Columbine school shooting and caused that school and many others to go on lockout last week when she flew to Colorado and bought a gun, was likely dead before the lockout even occurred, authorities say. Pais flew from Miami to Denver on Monday, bought a pump-action shotgun and two boxes of ammunition near Littleton, then took a rideshare to Mount Evans. A massive manhunt ensued after her parents reported her missing and police warned of apparent threats indicating she could be targeting Columbine as the 20th anniversary of the school shooting approached; she was ultimately found dead Wednesday. But the local undersheriff now says she likely killed herself on the remote mountainside Monday night, and that that was likely her intent all along.
No credit card purchases or cellphone pings indicate the high school senior left Mount Evans once she was dropped off late Monday afternoon. Even if she didn’t kill herself that night, police say she was cut off from the outside world with no cell signal in the area and no transportation. “She had no idea what occurred from late Monday afternoon to Tuesday when a search for her began and to Wednesday when her body was found,” Clear Creek County Undersheriff Bruce Snelling tells the Denver Post. “The logical likelihood was she was here to end her journey. … This poor, mentally ill girl needed help and probably never got it.” Police followed footprints in deep snow on the mountain and found her body, which appeared to have been dead more than a day, about three-quarters of a mile from a lodge. An FBI agent in the Denver office notes that while agents considered her a credible threat, she had never made a specific threat against a specific school. (More on the “red flags” she raised here.)

Tim Cushing pushing for ROGS' Gary Webb award for excellence in gang stalking journalism?

Of all the ways that ROGS blog-the blog you are reading right now-has changed the discussion about organized gang stalking, I think that my Gary Webb Award for Excellence in journalism is probably my best contribution.
That award carries a one thousand dollar stipend, and the winner also gets a golden trophy of a pigs trough with the bottom chewed out, with two golden .22 caliber bullets dangling above it. I will let the awardee contemplate the design of the award for themselves, but note that Gary Webb reported one of the best series in the history of journalism, won a Pullitzer Prize, and then, got gang stalked to death.

Related Story: What does a blog post written in a free WordPress blog look like when the blog is being tampered with, in real time, by an Infragard member, a Fusion Center, or any of many NSA/Alohabet agency speech suppression tools and tactics? see this post here, where I attempted to link the QaNON “conspiracy theory” to a SWAT team member who greeted the vice president wearing a Qanon patch.
1211118-11-20181201140953

That award is offered for any journalist who can use the term “organized gang stalking” appropriately when discussing this issue.
And, Tim Cushing, of the worlds premiere technology blog, Techdirt.com comes awfully close in this article below, but-not close enough to be a contender YET.
And, lesser journalists are starting to step up to the plate to take a swing at that award, as we see with the reportage in another MSM piece that reported on the organized gang stalking of tech guru John McAffee, the worlds first inventor of anti-virus software.
Well, heres another excellent puece by Cushing, covering due process free and BIZARRE police activity, as they stalk, harass, and spy on people in Boston, MA, which has some of the most deeply entrenched Catholic and neocon racism and hidden theocracy in America:
Lawsuit: Boston PD’s ‘Gang Database’ Says People Who Wear Nikes And Have Been Beat Up By Gang Members Are ‘Gang Associates’
from the guilty-until-negatives-proven dept
The Chinese government uses a number of measures to keep tabs on citizens. One is what’s known as a “citizen score” — a compilation of all the good/bad habits the government can track that determines whether a person should be viewed as a contributor to society or someone the government should take out of circulation.
We do the same thing here in the US. Credit scores determine who gets to live where and what vehicle they can own. It also can affect employment opportunities. This version of a “citizen score” is compiled by private parties who have access to information Americans are given no choice in relinquishing.
But the government also uses point-based systems to determine what kind of citizen you are: one of the good OK guys or possible a menace II to society. The ACLU is currently suing the Boston Police Department over its ad hoc “citizen score.” The BPD adds and subtracts points to add and (possibly?) subtract people from its “gang database.” Things citizens actively do — and even things they passively don’t — can put them on this watchlist.
From the ACLU’s public records lawsuit [PDF]:
Under the point system, a person is designated as a “Gang Associate” if he is assessed six or more points, and a “Gang Member” if he is assessed ten or more points. See Exhibit A, Boston Police Department Rules and Procedures Rule 335.
The point system makes it possible to designate someone a Gang Associate or Gang Member without any allegation that he engaged in violence or criminal activity.
An individual may be assessed eight points for being the victim of gang-related violence.
Yes, you read that right: Boston residents magically become “Gang Associates” if they’re shot at by gang members. Or carjacked. Or mugged. If this happens twice, it appears they’ll be upgraded to “Gang Member” thanks to their inability to avoid being victimized by gang members.

Michael Chadwick Fry, Sheriff Tracy Murphree,and claims of brainwashing: I invite Mr. Frys public defender to contact me ASAP, for a ROGS BINGO card: gang stalking case study

Dear future Texas public defender of Michael Chadwick Fry: please contact me here at the ROGS blog, because you will need the free ROGS Bingo card to understand your case.
1536180580800
Your defendant claims that he was brainwashed, and, semantics aside, I believe him.
Your client has named some names, and he encountered odd things after witnessing a deputy involved homicide of hs friend, and your client has also named some names that in themselves have an interesting history in that area.
I would focus in on the Sheriffs department media spokesperson too, because Fry (apparently) named him prominently on his flyers, and that person has an interesting academic history. I can testify with unimpeachable evidence that I have encountered these same types acting in undercover capacity to skirt the law.
And as we see in nearly ALL cases where claims of of mind control and influence operations, or gang stalking operations are presented, so we see that Fry was attempting to garner media attention to an attemp to frame him somehow, and even states that he was the intended target of an institutional homicide.

Related Story: Nearly all major mass shooter events, and other “odd”cases like this reveal that these men and boys partcipated in alternative media and counter-narrative.
We ALSO see that alleged shooters are frequently “on police radar” for years and years as they are stalked inline and off, but ALSO that many-ranging from Omar Mateen whose father was an FBI informant and also had an alternative news show, to Mathew Riehl who used Facebook, and many more were in fact, stalked by local, state and federal poluce but ALSO that their web pages are webscrubbed after their events, often at the direct request of Israel.

And while these claims initially look like classic “delusions,” I urge you to bear with me, as I am prepared to offer you free assistance to understand his claims, and also, organized gang stalking~and please, read this article first, about a media hoax in your area that attempts to discredit people who claim they are under an influence operation.
You see: your client has all the signs and symptoms of being what is colloquially called a “targeted individual of organized gang stalking”and the “symptoms”likely appeared just AFTER witnessing the homicide of his friend, just AFTER he was railroaded multiple times, and spending many months in jail, held for aggregious amounts of time in jails-but apparently NEVER found guilty of crimes.
you might like to know that Dr.Otto Dorr Zoeggers discusses such things in context to torture here and correlates that with what can be descrubed as mind control.
All of that, good defender, is already a full ROGS BINGO, but wait! Theres much more…..

https://answers.yahoo.com/question/index?qid=20090209123524AAPoDtb
http://www.paganlibrary.com/introductory/witchcraft-some_answers.php
https://www.sheriffstx.org/county_map/county/2584
https://m.washingtontimes.com/news/2018/feb/28/tracy-murphree-texas-sheriff-deputies-we-do-not-ta/
https://www.angelo.edu/dept/english_modern_languages/alumni_spotlight.php

‘Wake Up America’: TX Sheriff Rants On Terror After UK Attack

Manufacturing terrorism suspects, fake web pages, and informants using lots of rope in darkness: modern lynching online and CVE programs

Whether the target is a Muslim, a Mormon cattle rancher, a black activist, or a poor white kid like William Atchison who get stalked online and then offline by agents provocateurs, aka DHS/FBI/DIA/private contractor/NGO/foreign spy outfit unspecified, informants, a few patterns stand out in the data:
UNDERCOVER FBI AGENTS SWARM THE INTERNET SEEKING CONTACT WITH “TERRORISTS”who they then profile via behavioral analysts, psycholigical operations, and then endlessly monitor their speech online and off, in concert with HUNDREDS of agencies, and using NSA data.
The FBI’s online activities are so pervasive that the bureau sometimes finds itself investigating its own people.

Almost all targets of provocation are male.
All targets of provocations are ensnared online, and followed, monitored and more offline for using words~aka pure first amendment protected speech~sometimes for decades since the NSA dumped hay all over needles in a theretofore previously non-existent “haystack.”
All targets of provocateurs have long term contact with people working under the counter-terrorism rubtrik, or so calked community policing, who seek to INFLUENCE the speaker, from hidden or occulted positions online and off (for instance, social workers, college, or DV type “counselors” target and track individuals, usi.g multiple databases, and share information about their targets with police)
All targets of these hidden programs are manipulated in “directed conversations”which is well documented in the online TI community,and this unrecorded anywhere.
All targets are manipulated, and frequently their most base impulses to food, clothing and shelter~indeed, their base drives, what Freud called libido~are used as tools to manipulate them, and much more, as we saw with the Tsaernev family being targeted for a decade BEFORE the Boston bombing, as well as in the cases of the Seattle Somalis employment and travel being stifled by federal agents, hearsay, and policy (not law.)
In any study of what is colloquially called mind control, and stemming from Nazi/US/British styled torture, or the well documented MKULTRA and its companions Monarch, Bluebird, Phoenix, Gladio-all of these used base drives as ways to manipulate subjects and targets.
And, all base drives, stationed a man, or a woman in the middle to impede or encourage the target toward one or another behavioral goal. So, any study of targeted individuals must account for ling term state/federal ibstruction of base drives, and achievements.
Related Story: Niftygerbil, Niftychinchilla, and other Nifty names for Tor nodes, courtesy of the same geniuses who gave the world Monarch and Bluebird.
So, we see now, the entire organized gang stalking dialectic mirrors the ACTUAL complaints of targeted individuals. Refer to the ROGS BINGO card at the top of this blog for comparison.
So, OGS is far from a delusional complaint, and rather,indicative of manufactured terrorisms un Constitutional basis, and the occulted use of informants whose work in online terror/criminal/other incitement is undocumented by design-a totally unchecked use of actual psychological operations-agents provocateurs actions are not on the record, or in courtroom documents either.
So, in the very least, these online influence and psyops using unchecked, unregulated, hidden, occulted and obscured methods, repeated over time, do indeed form, as the good doctor Lorraine Sheridan has noted~a closed echo chamber, echo chamber, where words themselves are the primary targets, as are the individuals who use the words- they are literally under close monitoring every time a banned word hits Google/Wordpress/Twitter, etc.
Here from NBC News is a story about how the FBI uses informants online and on social media in occulted fashion to police pure speech, and then, to target individuals:
https://www.nbcnews.com/storyline/isis-terror/no-lol-matter-fbi-trolls-social-media-would-be-jihadis-n226841s
And here is a bit more about that from the Intercepts Cora Courier in 2017: ghttps://theintercept.com/2017/01/31/undercover-fbi-agents-swarm-the-internet-seeking-contact-with-terrorists/
“”According to the guie, an online counterterrorism investigation can target websites or online networks that the FBI believes terrorists are using “to encourage and recruit members” or to spread propaganda. Such probes may extend to the administrators or creators of those forums, as well as people engaged in “the development of communications security practices” or “acting as ‘virtual couriers’ for terrorist organizations by passing online messages among members or leadership.”
The guide classes as online investigations those that rely primarily on online informants or undercover employees, and those that involve surveilling internet facilities or foreign websites hosted on U.S. servers. The FBI often runs such operations jointly with other U.S. intelligence agencies or “international partners,” according to the document.
Since 2008, the Counterterrorism Division has coordinated these operations under a program called the Net Talon National Initiative. Net Talon uses informants, linguists, and FBI employees working undercover, posing as ordinary internet users, to zero in on terrorists’ use of the internet, according to the guide. The initiative was meant to centralize expertise on particular targets and platforms, to “address intelligence gaps,” and to create a clearinghouse of the intelligence the bureau has collected on terrorists’ use of the internet.
The FBI’s online activities are apparently pervasive and uncoordinated enough to lead to confusion. The document refers to “resources being wasted by investigating or collecting on FBI online identities,” including undercover employees, informants, or people who have already been investigated by other offices or agencies. An FBI official told the Intercept, “You would be in a forum, and you’re like, ‘This person’s way out there,’ and we’ve gone and opened up a case, and sometimes that was a local police department, or a friendly foreign service. There are still instances of that, and deconfliction is still necessary.”
Khurrum Wahid and Joshua Dratel, defense attorneys for Ahmed Omar Abu Ali, answer questions from the media after Abu Ali was sentenced on March 29, 2006, at a federal court in Alexandria, Va. Photo: Alex Wong/Getty Images
THE COUNTERTERRORISM POLICY GUIDE shows just how much flexibility informants and undercover agents have when operating online, even when they’re not working specific targets. The FBI insists that there is nothing to see here: In statements provided to The Intercept, the FBI said that “while there are obvious differences between online and offline environments,” FBI employees and informants working on the internet are subject to the same rules, and that bureau employees can only monitor people’s online activity as part of an authorized investigation.
The guide, however, suggests that the internet offers areas of ambiguity. Much comes down to the questions of what informants can do, as opposed to FBI employees, and whether the goal of an operation should be construed as seeking to obtain specific intelligence, simply watching public websites, or developing a profile for an undercover identity.
For instance, the guide states that an FBI employee can visit a message forum or blog only when the site is relevant to an investigation. An FBI employee, according to the guide, could be an undercover agent or an “online covert employee,” a term that presumably refers to FBI workers other than agents, like analysts. FBI employees can’t chat online with someone who isn’t already the subject of an investigation for the purposes of gathering intelligence on that person. They can, however, “engage in unlimited communication with associates” of a person under investigation, if the conversations are relevant to the investigation.
Informants and undercover FBI employees are also allowed to do a great deal online in the name of “building bona fides,” such as creating fake identities or making themselves appear to be normal commenters on online fora. The guide says that in order to establish credibility, FBI employees “may make postings and communicate with individuals who are neither the subjects nor the associates of subjects … there is no limitation with respect to the amount of communication [they] may initiate in this regard.”
And the FBI is allowed to open new investigations on people it identifies through “passive monitoring or active communication” on websites.
An FBI spokesperson clarified that in order for an undercover or covert employee to monitor a website or forum, the site must already be associated with an investigation, “either because the forum was known to be used by a subject [of an investigation], or because the subjects are there. I can’t be in the forum trying to bait you into conversation.”
However, the FBI acknowledges that when its employees participate in online fora, they interact with people who may be bystanders to whatever activity led the bureau there in the first place. And that is not accidental. “We want to know if the subject has other people who are joining in, which people are part of the activity, and who is just there,” a spokesperson explained.
In other words, FBI agents can post and chat online with people who have nothing to do with an investigation, so long as they aren’t collecting intelligence — but in the course of those online communications, they can decide to start investigating someone.
Michael German, a former FBI agent who is now with the Brennan Center for Justice at New York University Law School, said that agents have always had a little bit of wiggle room in this regard. They can have a certain number of in-person meetings with someone, or in some circumstances go to public meetings or public websites, without identifying themselves as part of the FBI. This helps agents avoid a bureaucratic mess when carrying out a simple “buy and bust” drug sting, for example, German said.
But the ability to conduct unlimited online conversations in the name of building bona fides gives agents “a pretty long rope,” German said.
Criminal defense attorney Khurrum Wahid, who has handled or been an adviser on many national security cases, notes that FBI employees or informants frequently pose as experts offering guidance to lost individuals.
“These uninformed young people go online and become almost smitten with people who show a level of knowledge, who often turn out to be informants or undercovers,” said Wahid.
Informants operate under looser rules than FBI personnel. They are allowed unlimited engagement with a target in the course of an “assessment,” a preliminary investigation that can be opened on a loose tip of suspicious behavior, in order to collect general intelligence on a subject, or to evaluate a potential new informant. Assessments were created as a category in 2008. German finds their allowance for the expansive use of informants problematic.
“What we’ve seen in sting operations is that there is this shady portion before the official operation begins which often involves the informant,” said German. “And then it’s passed off to an agent, and it looks like they are ready to commit a crime pretty quickly.”
Wahid noted that at least in online cases, there are generally logs of all the conversations between suspect and informant, whereas “when it’s a live informant, they can turn off the recorder and we never know what it was all about.”
The use of informants in counterterrorism sting operations has expanded since the 9/11 attacks, when the FBI adopted the mantra that its job is to stop terror attacks before they occur, not just investigate them afterward. The government argues that the anonymity the internet affords to suspects necessitates an aggressive approach, including stings. The FBI’s national security director told the New York Times this summer that “using undercover agents online allowed the FBI to ‘flesh out’ suspects by gaining their trust and persuading them to disclose their real identities.” In some cases, the FBI even created fake webpages in order to draw in suspects.
“Agencies are under a lot of pressure to find a needle in a haystack, something that has haunted us since the beginning of the war on terror,” said Karen Greenberg, director of the Center on National Security at Fordham Law School. “It’s true that the internet has changed everything about how we communicate, but are we just going to be trawling online forever? It turns the principles of criminal investigation on their head.””

WA Fusion Center, limited hangouts, disinformatio, misinformation, mind control documents.

Mr X:
The WA state Fusion Center mind control docs are what is called a limited hangout in intelligence circles. The LH is designed to taint a dialogue, or misguide you, but in themselves reveal the cavalier attitude of these domestic spies.
The images widely circulated from raven1.net are among many that were used by one Eleanor White, a self described whistle blower.
She reigned as the go to disinformation specialist about a topic called gang stalking, between 2001- and 2011. White claimed that she was slandered as a pedophile everywhere she went, but in reality, was likely part of the pre-Fusion center deep state, a likely courier for illegally intercepted communications, and the defamation campaigs that followed.
These materials are used to discredit people who psychologists then label as delusional. But as we see, they also nearly and completely describe how the NSA trickles data to state and federal agencies, who then use Fusion Centers, so called community policing elements, and more to monitor activists and dissidents, via real time cell phone tracking, computers, ALPRs, BOLOs, and more, frequently utilizing plainly bizarre methods.
I also wish to inform you that I have been tracked since 2001, by many agencies across America, for many reasons not least of which is that [REDACTED] also wrote the Lewinsky defense, and represented Cheney during the Scooter Libby, Valerie Plame affair; And, a few other things.
I appreciate [REDACTED] FOIA release from the Fusion Center, but also wish to inform you that there are other questions to ask in these cases, because those documents are designed to discredit any who take them too seriously.
The good news is that the real questions that should be asked are easy, once you know where to look.
For instance~regardless of your political stance on gun control~ask about Fusion Centers monitoring activists, and people in alternative media, or even Facebook.
So, black activists, and mass shooters are a great place to start with mind control. Fusion Centers monitor these guys relentlessly, and mercilessly, via phone, computer, ALPRs, and BOLOs.
To understand the mind part, separate it from the control part, outside of due process, and constituting what could arguably be called unusual punishments.
Then, understand it like this: the FVEY nations
cooperate to target and harass each others activists. A great example is a boy named William Atchison, who shot two kids in a NM school, and who was killed by SWAT.
In his case, he was contacted online by British intel, who waged Gamergate across the globe, and also on American citizens, outside the law, and likely in violation of international treaties.
Then, they passed the “anonymous” tip to FBI, who then waged community policing on the boy.
FBI contacted the kid~who never owned a gun in his life~and then FBI CVE kicked in, meaning the kid was frequently followed online and off, by any of many domestic spy/intel/Rotary clubbers/VFW members/etc organizations attempting to “conform him” and these take on plainly bizarre online and offline stalking proportions.
Only after this, did the boy buy a gun, and this we see in case after case after case. Then, the boy goes ballistic, after being isolated and terrorized by literal hidden and actual armies of psychological operations specialists, for WORDS he expressed online.
So, in that one case alone, you can find evidence that what I say above is true, if you learn to ask the right questions.
How many calls went to which Fusion Centers, about What, When, and Why about this one boy, william Atchison. Were ALPRs reporting his license plate every time he drove, and were satellites literally tracking and recording his every move? Which police departments/school officers pinged his computer or cell phone~or did bad stuff like redirect his internet switch?
Did his computer have electronic implants, aka, coded applications that did/do as yet described things/wiretapped/ monitored and utilized key stroke logging?
Etc.
But taken as a whole, the boy was without a doubt, surrounded by influencers, and others who aided, coerced, and manipulated his choices from his first contact online with British intel, who flagged him during Gamergate.
First, they came for the kid online who said bad words (and those words decided by religious theocrats, and others)~then, they came for the mass shooter after they, working internationally, from sectarian religious basis, occulted pisitions along the internet backbone, and in violation of due process, civil rights, and treaties, bullied him mercillessly, via electronic platforms online, commmunity policing offline, and CVE provocateurs.
I hope this can help point you in the right direction.
I can be contacted here, if you wish more details.
Best Regards,
ROGS (my obvious nym)

Washington State, mind control documents, Fusion Center spying, police state bloggers, and GOD BLESS TECHDIRT.COM

DHS Fusion Center Gets Request For Documents On Extremists, Decides To Hand Over Mind Control Docs Instead
from the here’s-the-thing-you-didn’t-ask-for-but-will-probably-enjoy-reading dept

What  is  24-7 monitoring  of targeted  activists,  dissidents,  journalists, and  other  targeted individuals? Fusion Center  spying, the bizarre  quasi-Constitutional DHS/ICE/HSI  methods of secret policing, and the  NSA-Israel-FVEY data  theft  is de facto total  spectrum monitoring and  psycholigical  operations, aka mind  control,  by any  other name.

By  Tim  Cushing, of  Techdirt.com
Once you release a document to a public records requesters, it’s a public record, whether you meant to release it or not. The person handling FOIA requests for the Washington State Fusion Center (a DHS/local law enforcement collaboration known more for its failures than successes) sent Curtis Waltman something unexpected back in April. Waltman asked the Fusion Center for records pertaining to Antifa and white supremacy groups. He did get those records. But he also got something titled “EM effects on human body.zip.”
Instead of intel and assessments on local Antifa/white supremacists, Waltman found things like this:
And this:
The files did not appear to have been generated by any government agency, but rather collected from other sources who thought there might be some way the government could control minds using electronic stimulation or “remote brain mapping.” Why the Fusion Center had them on hand remains a mystery, as does their attachment to a FOIA request containing nothing about electronic mind manipulation.
This inadvertent disclosure has led to more requests for the same documents. Only this time, requesters — like Joshua Eaton of ThinkProgress — are asking specifically for government mind control files.
It appears the Fusion Center first thought about withholding some mind control docs, but somewhere along the line decided it couldn’t pretend the documents that weren’t supposed to be released hadn’t actually been released.
An email chain in the release [PDF] to Eaton contains an apology from the staffer who accidentally sent Waltman the mind control files.
Good afternoon Gretchen,
First of all I want to apologize the same way I apologize with my supervisor Lt Boyle and [redacted] I do not like to give excuses but I really sent this without intention when it was not responsive. I sent the original email to [redacted] with the attachments. I will try not make more mistakes…. Now, because of my error MuckRock sent another PDR. Sorry again for the situation and have great afternoon…
Gretchen (the Public Records Officer for the Washington State Police) tells the staffer not to worry about it. Apparently, sending the wrong files to requesters happens frequently, but otherwise, everyone is doing a great job, including the person who sent mind control files with a batch of extremist docs.
But that apology and forgiveness is preceded by the same staffer asking for another review of documents she already released to another requester, possibly in hopes of denying this release.
Erik,
[redacted] told me if you could review this. Mudrock is claiming that DHS did created this. I think I was not supposed to release this but it was public.
Can you help me what can I tell my Public Disclosure coordinator?
Sorry for the inconvenience
No response from Erik is included in the document so one assumes the release went ahead without his additional input. Now this requester has a copy of this email chain, something pulled from an internet “mind control forum,” and, inexplicably, the KKK documents released to Waltman in response to his FOIA request.
So, if you’re looking to obtain public records but don’t particularly care what records you receive, it appears the Washington State Fusion Center is a great place to try your luck.

The Cult of Bill W.'s AA revisited: gang stalking and the policing of anonymity as the National Sherrifs Association polices privacy.

AA,NA, GANG STALKING, AND THE HIDDEN HAND OF THE HIGHER POWER:YOU ARE NOT ANONYMOUS IN AA, OR ANY OTHER RECOVERY INDUSTRY CULT because the National Sheriffs Association and local LEOs, working under due process defying community policing schemes are always there to stalk you, or someone you know in “recovery.”
Bill W. aka Bill Wilson was both a proponent of LSD use, and documented as having occulted ties to both hidden western religion (occult ) and CIA programs of social control.

Read: AA and the occult and also this from the Guardian UK, about Bill W. and the well documented CIA LSD program

Follow this link to watch online terror stalking as they target several individuals.

POLICE USE AA AND NA, etc. MEETINGS TO GATHER EVIDENCE, OR WAGE PSYCHOLOGICAL COERCION, OR INTERROGATION ON TARGETED INDIVIDUALS WHO CANNOT OR WILL NOT BE CONFORMED/COERCED INTO THE JEWISH-CHRISTIAN NARRATOLOGY OF SUBMISSION TO HIDDEN BAD ACTORS AND OCCULTISTS, AKA “HIGHER POWERS”which most frequently are church and police affilliated Masonic lodges, such as Freemasons, Rotary Clubs, Lions Clubs, etc., all of which have been.implicated with solid evidence to “organized gang stalking. ”
Worse, judges, prosecutors, social workers and psychologists are indeed complicit in it, frequently deriving income and other sicial benefits from denying that gang stalking is, “real.”
Then, the multi -billiin dollar cottage industry of “recovery programs” work directly with those denialists, FREQUENTLY REQUIRING AA/NA/SA/ETC AA, as a term and condition of a persons freedom,  as a range of other “healthcare providers” derive billions too.

MANY ORGANIZED STALKINGS BEGIN WITH OCCULTED POLICE INVESTIGATIVE PRIVILEGE/SLANDER CAMPAIGNS, AND THE JUDICIAL, INSTITUTIONAL BLUR BETWEEN RIGHTS AND LAWS OF DUE PROCESS AND RIGHTS TO ANONYMITY, AND THE PSEUDO-THERAPY, PSEUDO -PSYCHOLOGY OF AA.

Related Reading: Mental health, mediated by those who cause law and due process defying disruptions in individuals lives. It cannot be forgotten that when.a, “gang of police ” murdered Ahmaud Arbery, the conservative Jewish -christian smear machine cranked up slanders in the press about his “mental health ”

How western police uphold the Jewish christian (and now, Islamic) mythology of God, G_d, Gawd, THE LAWD /LORD/Allah  and its variants of submission to hidden superstition oriented narrative of mental health, and victims of the hidden hand of gas lighting and privacy invasion by policing mechanisms that defy law and order.
Here is the National Sherrifs statement on mental health, via Policemag online:
http://www.policemag.com/channel/patrol/articles/2007/06/mentally-ill-subjects.aspx
OGS is widely recognized as having only two categories of discourse: OGS victims, and OGS denialists. It is striking to note that of these two binary groups, all OGS denialists are, in some way, direct beneficiaries of the DVIC money pot, while OGS victims are NOT beneficiaries of the DVIC money pot.
The researcher of OGS can easily find empirical evidence of this claim anywhere and everywhere onlune, or, just read through ROGS here, where you will find this scientific, falsifiable proof of OGS.
Then, we also see that Alcoholics Anonymous-like Scientology-sprang up just after the Federal Reserve displaced rural Americans, and eugenically targeted their families, during the 1930’s, and the Great Depression.
Related Story: AA Mobbing is “Bill W. on acid~ literally. Here is Bill W. droping CIA supplied acid, in the era of Frank Olson, who met his fateful end after “falling” from the 13th floor of a hotel, while doped up on acid, as a CIA handler sat next to him.”
Today, many sane people, and those who use reason to solve social problems, are calling these industries what they are: out dated models of cult/sectarian control of our society by the usual suspects.
And, extra points in your ROGS Bingo card for noticing that all of the mobbing, directed conversations, and other bizarre, repeated activity by police, occulted in gang stalking roles strangely mirrors the exact activities used in psychic driving.
Look around ROGS here for evidence that this is so, and also, that therapists all deny that gang stalking is real.

Blogger robboy39 said…
recovery is riddled with National sheriff association members as well as national citizens patrol association they are orginized and when they get your number due to step work or what not conversations you may have, they will turn your life inside out. The gassilghting is illegal and they ignor this it is wide spread. yes they will follow you in to all aspects of your life and reack havock by recurting persons to harass the target anyway possible. the first Narcotics Anonymous was held in a police station owned building this was not a mistake law enforcement has been stalking persons who attend these meetinsg for years.
Old timers as well as newcomers the opertives are diverse by design to build friendships and trust to intrap the target then in a moments time they orginize the group against a single person. i am a victom i am looking to build repor with other victims Robboy39 youtube.
9:36 AM
Blogger robboy39 said…
national citizens police academy alumni association and national sheriffs association lookthen up they are evil. they have harassed me for 4 years. they have broken many laws and need to be held accountable for thier actions……

….follow the links and connect the dots© in your own case!
AND:How deeply are OGS denialists involved in downplaying Bill Ws dabbling with CIA drugs and cult control?
Ask the addictionologists! (addictionology is a pseudo-science similar to ponerology,the study of human evil, lol.) This is how far Jewish-christians will go to mask their occulted religion in secular society.

Electronic implants, Wikileaks Vault 8, victims of organized gang stalking, hive mind, and honeypits.

ROGS loves the Constitutional guarantees of due process, and ROGS loves America. I am pathetic that way~the grand American delusion is so appealing.
(Vault 8 is an inside joke.)
BUT: The DVIC is actually a war on speakers and words, and without a doubt, the first amendment itself is the target of neocon and tribal, religious interests, now interfacing with the massive influx of Saudi, and other nations cash flows, and the media narrative.
I have been gang stalked since the DVIC was birthed into our lives in 1993 ( the exact same year when the Anti Defamation League was outed as a domestic spy ring that sold out American activists) and became severely gang stalked after I broke a nation wide story in 2003-4 about how America’s agencies manufacture terrorists by occluding access to civil rights and due process.
To journalists, researchers, and others interested in answering the many questions that are presented in the “bizarre” online dialectic of gang stalking, here below is how the CIA (and every other IC agency, private contractor, and the FBI) uses the term “electronic implants,” which describes covert hacking techniques, and plausible deniability in exploitation of targeted computers, targeted computer networks, and targeted individuals.
Without a single doubt, this is empirical evidence of CIA/other IC/NGOs operations on US soil, and anywhere else where OGS is taking place.
And it single handedly validates the inherent mission creep of the WOT redirecting and exploiting domestic targets.

UPDATE 10-19-2019: Almost two years after I wrote this post, and became active online, the ADL implicated itself as actually deploying military psychological operations on target individuals, using artificial intelligence software called Moonshot CVE, which had previously been used in theaters of war; and, perpetuating negative stereotypes of Jewish people as mind controlling Svengalis.

1570435771780
Electronic implants and gang stalking, courtesy of Wikileaks, and Julian Assange, who is literally being isolated, and denied visitation from other people as I write this. And, the American/FVEY deep state has worked tirelessly to force Ecaudor to revoke his asylum.
Isolation, you will recall, is ALSO a major threat/complaint/”delusion” of targeted individuals.


RELATED STORY
:I wrote about the HIVE in coded language long before this story below became mainstream news. The reader can infer that writing openly about such things is dangerous, and also, ROGS personal writing style is somewhat coded for reasons I have explained elsewhere.

The Hive mind in the gang stalkung dialectic online, from Wikileaks.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.
…………..
And-I hope the dood doctors like David V. James, and Lorraine Sheridan-and certainly Dr. Mike Wood, dont get to caught up in the echo chamber as wasps and bees of all kinds swarm them for commentary in these matters.
But OGS is very real, and puts MHCHAOS and MKULTRA to shame.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

The un-naming of a man: Gang stalking, bizarre claims, chemicals, poisons, delusions, and the DHS- man dies, first responders sickened from chemical poisoning in DeKalb County Georgia GA motel room.

As  we  see  time  and  time  again, gang  stalking victims frequently  report bizarre encounters with people  online  and  off  who  threaten  them  with poisons,  chemicals,  and  fear  or  anxiety about being  murdered by  gang  stalkers.

UPDATE 11-07-2019:This post you are reading is very popular lately, after James Douglass Lark apparently blew himself up last week , while under FBI and GBI surveillance in Dekalb County Georgia, under mysterious -even bizarre circumstances.
ROGS suspects that this was a K 4 rated gang stalking gone bad (or good, considering that the goal of police /FBI/ intel agency stalking is to force a person into an institution, prison, or to commit suicide, which is what Lark apparently did, for some reason )
UPDATE: The un-named man has now been named.He was Frances Wilkes, 47, of Stone Mountain Georgia.
BODY IDENTIFIED IN HOTEL ROOM THAT SICKENED THREE DEKALB OFFICERS
The cause of death for Frances Wilkes has not been released.

Related  Story: Yeah- silence THIS: how internet forum boards are attacked by gang stalking denialists, and not  so subtle  threats of  being  poisoned. This is one  example  from  my  own,  PERSONALIZED,  targeted  experience online.
Here  is  a  case  where  actual  intelligence  agents, from  the  US border  patrol  and the  DHS are  alleged to  utilize bizarre  psychological  and  other  harassment  on  a  whistle  blower, including  mystery  poisoning:  Delusions, poison, bizarre claims, and schizophrenic narrative in gang stalking: the case of DHS whistle blower Julia Davis
And,  the  Russians,  of course, are  suspected  of  poisoning  dissenters and detractors in  Britain, which  is  widely  documented  all  over  the  MSM.
And  the  Las  Vegas  shooter Stephen  Paddock was  said to be so delusional, that  he  kept  a  gas mask  handy, with  fears of being   poisoned.
SO:
How  bizarre is  modern gray  area,  due process-free  policing  that utilizes  intelligence  operations on  ordinary  Joe Blows who  said  something online,  and  then,  were stalked,  harassed, framed,  and  worse by  operatives  who  sit  on  the  internet  backbone  in  Toronto  Canada,  or  San  Diego,  CA?
Or  at Los  Angeles  JRIC which uses miltary grade surveillance gear to target people they do not like, , or  who  are  affiliated  with  Princess Megumi,  from  the Masonic  Capital  of California, whose  relative  just  happens  to  be the  deputy  sherrif  in  those  parts? Bacon  bits,  and  blowflies-or  flying  pig-cow  hybrids  in  fishnet  stalkings  and high heels?
I ask  you, the  reader, to decide  how  bizarre claims  of  poison  are  in  the “delusional  complaint” or  organized  stalkung.
Yeah-  organized  gang  stalking  is THAT  BIZARRE.
ROGS  wonders:  who  will  help  me  keep  an  eye  on  this  story,  below?
Get  out the  ROGS  BINGO  card  before  you  file  FOIAs  in  this  case,  and especially, dig for  records  about the  dead  mans  past-  see  if kangaroo courts, mental  health,  unproven lopsided  claims  of domestic  violence,  and more were there. Because  it  is  possible  you  will  find that  soeone, soewhere,  didn’t  like  what  he  said online  or  off. Also notice that it was a workplace conflict related situation
Something  just  ain’t  right  about High  Heeled,   DVIC  policing,  as  these para-military,  quasi-judicial,  extra judicial  suicides,  homicides-and  poisonings  are  taking  place ALL  ACROSS  THE  WESTERN  WORLD, now.
SO,  here  is  the case where  an “un named man” died  in a  motel  room, from  what  federal  agents  and  the Department of Homeland  Security claim were household  cleaning  agents.
__________
Federal agents investigating hazmat situation that sent officers to hospital
By: Wendy Halloran , Rikki Klaus
Updated: May 13, 2018 – 11:31 AM
Federal agents investigating….
DEKALB COUNTY, Ga. – Federal agents are investigating after police found a man dead inside a DeKalb County motel, and then a chemical odor sent officers to the hospital.
Channel 2’s Wendy Halloran said agents with the FBI and the Department of Homeland Security were investigating inside the room late Saturday night.
“We have a dead body in the room and we can’t make any determination on cause of death until they have cleared the scene,” Shiera Campbell, with the DeKalb County Police Department, said.
All police had determined was there was body a man inside a room on the third floor of the United Inn on Memorial Driver in Decatur.
Guests told Halloran that they were stunned when they were told they needed to evacuate their rooms.
“We were all in the sun standing out for a long time when I did find out what was going on. It was kind of sad,” a hotel guest, who only identified himself as Bryan, told Halloran.
Once inside the room, three DeKalb County police officers knew something was very wrong.
“The officers were feeling a little bit dizzy, weren’t feeling too much like themselves, so they quickly came out of the room,” Capt. Eric Jackson with Dekalb County Fire and Rescue said.
The strong chemical smell sent three officers to the hospital. Firefighters then put on hazmat suits and went inside.
“Based on the samples we took we are going to try to attempt to identify whatever that source was,” Jackson told Halloran.
Hour after hour went by Saturday as forensic investigators waited to see if they could go inside to process the scene and the medical examiner remove the body.
Motel guests waited and watched. Some had to move to other rooms.
Hazmat trucks pulled in late in the night, with all signs pointing to something potentially deadly inside that motel room.
It is still unclear what was inside the room.
Police said late Saturday night the body was that of a 48-year-old man.
………..follow  the  links-  connect  the  dots!
_____________
While many  over the  counter chemicals such  as  bleach,  and  ammonia, and  sulphuric  acid  and  more can  be  freely  purchased from  hardware  stores  and big  box  retailers such as Walmart, they  can  also  be  used  to make  dangerous  chemical  weapons.
Was this a case where hidden policing, and possibly, vigilantes or provocateurs tried to force a bombers hand, or otherwise wage attrition for something the un-named man said online? ROGS asks you, the journalist or researcher of organized gang stalking to decide.
But also, decide WITH EVIDENCE and data that you can access by learning to ask the RIGHT QUESTIINS in these odd, bizarre cases, and to adopt the ROGS framework analysis of the claims inherent in these plainbizarre gang stalking events.
We  know  with  empirical  evidence  that the  alphabet  agencies work with local  law  enforcement and  community  mobs to  wage  hidden and highly personalized war,  psychological  war,  that  frequently  ends  in  suicides,  homcides  and mass shootings, and  that  they  wage  these  outside  of  judicial  oversight,  on  targeted  individuals.
We  in case  after  case  of  case  that  these  political, malicious prosecutions primarily target  speech,  and  speakers,  and, that  online  speech bis .targeted  offline.
And,  we see  the  bizarre  claims  of  threats  of  poisoning,  actual  poisoning,  and rarely~EXTREMELY  RARELY~delusional  people  who  fear  pousoning  by  “imaginary”people  they  “”imagine.
MORE LINKS  TO POISON  IN  THE EMERGENT ONLINE DELUSIONAL  GANG STALKING  DIALECTIC:
A credible analysis by a credible researcher of organized gang stalking:
https://medawarscornflakes.blogspot.com/2009/12/toxic-materials-in-stalking.html
And, those OTHER, likely actual gang stalkers, whose comment section was always filled with Lions Club members from OHIO, TEXAS, USAF affiliates, academics who are well known stalkers, and a few retired police (and someone who lived on Duckwood Drive in Eagan MN,in 2013):
https://neverending1.wordpress.com/2010/11/19/gang-stalking-the-gang-stalkers/
And, one for you, the researcher of organized stalking to figure out for yourself-especially if you are a federal agent, or another “good guy or gal” who wants to STOP gang stalking, as we see that it frequently leads to mysterious deaths:
https://perthsgangstalking.wordpress.com/2017/01/12/posions-and-toxins/