CIA and internet backbone surveillance and InfraGard: there is no window between the average American and intelligence agents anymore

Cisco Internet Backbone and CIA, human experimentation, Moonshot CVE, Google Jigsaw
Psychology is struggling to control the narrative of organized gang stalking, and doing a really bad job of it, because some of their favored labels for political dissidents and whistle blowers are being exposed as little more than political smears masked with official diagnostic criterion. And of course, in a the ends justify the means” world, the “state purpose” of fighting boogiemen is tantamount to rational basis social controls, which is why the NSA/CIA/FBI manipulation of the internet backbone is cancer to Democracy.
Paranoia, schizophrenia, delusions that people are being persecuted, followed, or harassed- all of this and more is happening all across America today, as the thousands of miles, and the improbabilities and the impossibilities of actual contact between the average citizen and intelligence officers and agents are no longer impossibilities at all: they are a daily fact of life for every citizen, as Google, Facebook, Snapchat or Twitter have put all of us one click away from these agents every single day.
So, whereas once psychologists could keep institutional and social control of the narratives of “mentally ill” people who claim that the “CIA is spying on me,” or that the “FBI is out to get me,” and other such claims, and psychologists have long ignored these claims as delusions, it is no longer the case that prospective patients are wrong in any sense, because, all of our communications are intercepted, and our lives monitored via our cell phones, Facebook-which has admitted to actual chemically based mind control, aka manipulating dopamine levels in the brain of non-consenting children and adults-to the NSA-FiveEyes(FVEY)-Israel data theft and sifting operation that is in play 24/7.
It forms a de facto and pre-emptive prior restraint of any individuals private thought processes, intentions, and.free will any time they are online.
And, curiously, this is against the US and British constitions- but ALSO many international laws and treaties~and ironically also against the UN charter, and the Universal Declaration of Human Rights!
Previous to the era of the internet, it was nearly un-imaginable that the average person would come into contact with a CIA case officer, FBI handler, NSA agent, or rings of unethical Israeli spies and unregistered foreign agents , or other intelligence agency operators. Today, these same are compiling dossiere’s and databases full of profiles about every one of us, as secret, hidden operators monitor our social media, cell phones, and emails in real time, we  are as close as a click on Facebook, or a phone call to a foreigner. And, our childrens bath tub photos are now accessible to InfraGard, an a host of international players, including Saudi Arabia.
Compounding that, is the fact that these agents have eradicated the barriers between civilian and agency boundaries, as they float in and out of the government, to the corporate sector; in and out of one top-secret clearance and into cold-blooded capitalism the next,  and back again.
This “high policing” aka political policing, aka organized stalking is now a nation wide infection.
So, the next time a patient or a ‘delusional’ or ‘psychotic’ individual tells you that there is a spook on their internet backbone, listen a little bit more, because, well, there is in fact a spook network spread across every connection, at every minute, and a ratio of one security industrial complex worker, police and surveillance role player to every 30 civilians in Amerca alone.
Here- from Forbes magazine, meet Chris Burgess, one of the many spooks on my Cisco router:

Cisco Internet Backbone and CIA https://www.forbes.com/sites/realspin/2012/10/12/what-do-former-cia-spies-do-when-they-quit-the-spy-game/#2df634382374
Chris Burgess, now COO and CSO of Atigeo, a Bellevue, Washington firm focused on mining Big Data. The second was Ren Stelloh, who until July 2012 was CEO
After retiring with 30+ years of service from the Agency, I spent several years as adviser to Cisco System’s Chief Security Officer, and I found Cisco was doing great work; they’re one of the backbones of the internet. The more info you can provide to the more people, the better people can see and understand what was obscured
Now I’m COO and CSO of Atigeo and we’re a compassionate technology company. We want to provide the tools to mine big data, as that is unquestionably the major resource of this century

 

NCIS, US Navy, targeted individuals and surveillance of Americans: criminal defense lawyers and gang stalking

It is no longer a secret that the United States military, and its various intelligence collectors are targeting Americans. Criminal defense lawyers should be especially keen to note that the ACLU has been fighting a case since 2014, where a Navy NCIS officer was wiretapping American citizens internet connections.
From the Electronic Frontier Foundation:

Military investigators with the Naval Criminal Investigative Service (“NCIS”) launched an investigation into online criminal activity by anyone in the state of Washington without limiting their search to military personnel or computers.

And from the ACLU:
In United States v. Dreyer, a Naval Criminal Investigative Service (NCIS) officer stationed in Georgia believed he was entitled to conduct Internet surveillance of any computer within a specific jurisdiction and did not have to limit his monitoring to U.S. military or government computers or personnel. While monitoring computers in the state of Washington, he identified an IP address sharing child pornography, determined the IP address belonged to Dreyer, and passed that information along to local police who arrested Dreyer.

The problem? Dreyer, like most residents of Washington, was a civilian and had no connection to the military. The Posse Comitatus Act (PCA), a federal statute enacted in 1876, prohibits the military from investigating civilians and otherwise participating in civilian law enforcement activities.
In the district court, Dreyer unsuccessfully challenged the NCIS surveillance as a violation of the PCA, but a three-judge panel of the Ninth Circuit reversed. Noting this wasn’t the first time the NCIS had engaged in this sort of activity, the appellate court found the surveillance “extraordinary” and in clear violation of the PCA. Most importantly, the panel found that the evidence NCIS obtained should be suppressed. This is the first time a federal court has suppressed evidence obtained in violation of the PCA (a few state courts have suppressed PCA violations). The government asked the court to rehear the case but abandoned any argument that there was a PCA violation. Instead, the government merely urged the court to reconsider its decision to suppress the evidence. The Ninth Circuit agreed to reconsider, deciding to have the case argued again before an 11-judge en banc panel.

Separating gang stalking claims from electronic weapons harassment reporting: a necessary step to understanding the dialectic, and reports of mind control.

The single most prominent feature of the research that exists in regards to organized gang stalking is that those who claim to be researching it seldom if ever actually speak to those who claim they are targeted.  Let that sink in a bit….
But in the world famous internet pol/study/junk science by Dr.s Lorraine Sheridan and David V.James, they didnt interview a single person in person.
And, as you might expect, predominantly white, middle aged females were the respondents, much like other online hoaxes, and frauds such as Morgellons disease, or sex work abolitionists and prudes pulling the number 13 outof the DVIC/UN Transatlantic Crime/fakerape/NGO money pot.
Then, have a look at a study that concludes that targeted individuals are dangerous co-opters and interlopers on the supremacy of the psychological narrative of the DSM-V:

Diagnosis of Delusions on the Internet:

Bell V, Maiden C, Munoz-Solomando A, Reddy V. (2006) ‘Mind control’ experiences on the internet: implications for the psychiatric diagnosis of delusions.

While this disconnect between psychologists and those they seek to diagnose anonymously is a feature in every study on the subject thus far, it is also clear that there is evidence of a vast, well funded network of intelligence agents and agencies that on one hand, literally target individuals (most notoriously the UK’s “dirty tricks” division, JTRIG), with influence operations, and then, seeks to discredit targeted individuals, it is crucial to psychologists and criminal defense lawyers, as well as social workers and others in the healing professions to understand that no all victims claim that they are harassed with electronic weapons, and that not all those who report electronic harassment, noise campaigns, or other modern media deployments aimed at destroying them or their privacy are delusional.
But in the extant research on this topic, we see that few-if any- of those who have weighed in to this dialectic are willing, or able to separate the many cases of law enforcement, or DHS, or FBI harassment from the intelligence cults, or religious harassment that some targeted individuals endure.

Related Story and UPDATE 10-16-2019: Since I wrote this piece that you are reading, the Anti Defamation League (a race-based organization which is most known for defaming individuals)has confessed that they are using military derived psychological operations online, and targeting non-consenting subjects with actual military PsyOps, and some of THOSE victims of these hidden online operations are now linked to many mass shootings.
In other words, online psycholigical operations,are literally linked both correlated with, and linked to the direct CAUSATION of mass shootings.

In that light, I suggest that it is mportant when encountering these individual victims that any psychologist, or criminal defense lawyer who represents targeted individuals examine the basis of the claims, and look carefully for signs of actual harassment early in the encounter. Also, be aware that the discrediting narrative is very well financed (the DHS and intelligence agency budget was 71 billion in 2016), and that many NSA whistle blowers, actual victims of abuse by police and fire departments, and others report similar symptoms, and similar experiences as targeted individuals.
Here below is one of the few studies online that attempts to understand the ‘phenomenon’ from a perspective of the DSM-V criterion, where we bump into a similar situation as was apparent at the height of the Nixon years, where the horrific illegality and  lawlessness of the CIA’s mind control cover-ups, worked hand in hand with FBI COINTELPRO and a know-nothing MSM to obfuscate actual insight into the scope of these problems-annd the easiest solution was to blame the victims, or in the case of Bell, Ready, and Munoz Solomando, paint them as deviant co-opters of technology:

It is particularly noteworthy that a potentially disabled and disenfranchised group have co-opted available technology
-Bell V, Maiden C, Munoz-Solomando A, Reddy V. (2006)

This is literally the Martha Mitchell effect in action, and in practice as psychologists seek now, as they did then, to discredit actual victims, and squash them into a pill box. While there is little to no doubt that psychopaths, psychotics and delusionals and others are involved in the community (notoriously, the leaders of the so-called TI support group FFCHS has been implicated in 3 mass shooter events), there is also a much larger portion of this community that is “under the influence” of something, and that something has a name: influence operations working with Crisis PR agents and psychology to lend authority to an otherwise debunked narrative.

‘Mind control’ experiences on the internet: Implications for the psychiatric diagnosis of delusions
Abstract
Diagnosis of Delusions on the Internet:

Bell V, Maiden C, Munoz-Solomando A, Reddy V. (2006) ‘Mind control’ experiences on the
internet: implications for the psychiatric diagnosis of delusions.
Psychopathology
, 39(2), 87-91.
Background:
The DSM criteria for a delusion indicate that it should not include any beliefs held by
a person’s ‘culture or subculture’. The internet has many examples of people reporting ‘mind control experiences’ (MCEs) on self-published web pages, many of which suggest a community based around such beliefs and experiences. It was hypothesised that some of these reports are likely to reflect delusional beliefs and the hyperlinks between web reports were likely to show evidence of social structure, demonstrating the ‘culture or subculture’ exemption to be increasingly redundant in light of new technology.
Sampling and Methods:
Texts from web sites reporting MCEs (n = 10), experience of cancer (n =
10), depression (n = 10) and being stalked (n = 10) were identified, and were blind-rated by three independent psychiatrists for the presence of delusions. Hyperlinks from web sites reporting MCEs were used to create a network structure; this was compared with a size-matched, randomly generated network and known social networks from the literature using social network analysis.
Conclusions:
The sampled web-published accounts of MCEs are highly likely to be influenced by
delusional beliefs. Social network analysis suggests there is significant evidence of an online community based around these beliefs. The fact that individuals can form a community based on the content of a potentially delusional belief present a paradox for the DSM diagnostic criteria for a delusion, and suggests the need to revise and revisit the original operational definition in the light of these new technological developments.
It is particularly noteworthy that a potentially disabled and disenfranchised group have co-opted available technology to create a complex, dynamic and information-rich community that serves to support and inform similarly-affected people within the confines of a world view driven by potentially psychotic symptoms. This is a striking example of a support network completely removed from the traditional medico-legal support networks of the state and even the grassroots support networks run by mental health services user groups. In particular it demonstrates that the internet may enable complex support mechanisms without reference to a view of reality held by the authorities or even the mainstream of opinion. Whether this sort of support network works well for all, if any individuals, remains to be seen.
In conclusion, the presence of a complex and evolving online community based around the content of potentially psychotic experience challenges mainstream psychiatric understanding and diagnostic criteria for how a delusion is defined. This paper also presents the first application of internet-based social network analysis to clinical research, which the authors hope will be a useful tool in furthering medical research.
zz

Organized gang stalking and monitoring and BOLO

Many people who claim they are targeted individuals say that they are tracked wherever they go. In law enforcement and security industries, there is something called a BOLO alert, and BOLO stands for “Be On The Look Out” for someone.
Modern technology in use and practice today has enabled this exact form of targeting of individual, and all LEO’s use these technologies in real time to track and monitor people across cities, states, and state lines, but also, you will see in the writings of targeted individuals that there is a subtle and pervasive attempt to create hopelessness in the target, as the claims sometimes state that ” they can track you wherever you go,”and “it will never stop,” and so on.
All of that is true, as we know today that Homeland Security has massive databases, and dossiers’ on every American. And, the CIA financed the Palantir database system as well as Google, and both of these track people in real time.
Other programs tat are in use every minute, every hour on every American includes cell phone surveillance, and social media monitoring. Wile many say “well, I have noting to worry about, and noting to hide,” I would like to point you to this story here, about how the Nazi Third Reich used IBM pre-computers to track individuals, and used punch cards to round up those who became its victims.
I would also like to state tat at this time, I am currently seeking documents and street camera video footage from a large western city known for gambling, wherein I was “gang stalked” most likely because a BOLO had been issued. As with most scientific claims, there must be scientific evidence, and video footage is pretty good evidence. As noted elsewhere, I have been compiling a lot of actual, falsifiable and often court room worthy evidence that in fact, organized gang stalking is a real thing.
To the researcher, I ask that you simply note that similar things have happened elsewhere, under different names and historical periods, but in my case, do your own research, and test mine against whatever other evidence you wish. I am sure that my claim- that I was followed multiple times, across a city, and security guards and police volunteers positioned themselves directly at my back, on video, in multiple places over a three day period, at odd times, last August. These volunteers wear distinctive yellow shirts, and use bicycles up and down the main boulevard, and are easily identifiable on camera.
I also had security guards, the guys in yellow shirts, and a large, friendly Hispanic man named “Leo” and a crew of what appeared to be four undercover cops/citizen volunteers outside my hotel room door, and a hacker along with them in a hoodie. While many claims of targeted individuals are easily testable, few do test the claims, because most are thougt to be mentally ill. In my case, I have studied the things I say above  and I was only aware of these types of stalkings, because I have studied it for periods of years, going back to 2003, and now know ow to document it. Your methods may differ, but mine are designed to old up in court, and in sociological research studies as well.
But perhaps most importantly, is that the researcher be aware that there is a vast network of agents and agencies who seek to discredit those who claim that this is a ‘real’ thing versus a mental illness, and multiple agencies work together to minimize te view that what they are doing is anything but legal, or Constitutional. In my case, you can decide for yourself.
UPDATE 12/15/2017:
Security gangs are becoming a feature in America because see-something-say-something, combined with an unnaccountable justice system has encouraged rampant criminality in policing and security industry. This is also what “brownshirts” were in the time of Hitler.
Nearly all mass shootings, and their activity is widely documented across multiple sources as creating crime, or creating or participating in a criminal climate. Indeed, many mass shooters or others implicated in “fake manufactured terrorism” are themselves former security team members: Google Omar Mateen, Devin Kelley, Dahir Adan, just to name a few who were security guards.
Here is one description of security gangs from Maryland, from a Wiki source that documents the activity of “fake cops” and security gangs-what better place to hide state level crime than in “security?” How original….:

“Security Gangs”

Some commercial facilities such as shopping centers or office campuses may be unable or unwilling to afford the level of security available through legitimate private security services. Some such may be approached by organizations offering their services to “help clean up the place”. These organizations are, effectively, unlicensed security officers and also often operate as private investigators with no permits. Or, they may possess permits or licenses which do not apply to this sort of work. For example, Bounty Hunters are in fact law-enforcement and may have special permits… which do not apply to any duties outside of seeking bail jumpers. Yet neither the property managers nor the people “apprehended” (usually beaten, intimidated, or frightened away, instead) by these individuals or groups are quite cognizant of the fact that these persons have no legitimate special authority nor license in these places and situations.

If you use my search feature, and the phrase “yellow shirts” you will find that “yellow shirts” are implicated in the Las Vegas shooting, and you will find that I described the operations method of such a security gang above, long before that shooting occurred. I specifically said “two yellow shirts and two undercovers and one guy named Leo.”
Las Vegas Shooter Narrative is Constantly Changing
This is a five person team, and you will note that an exactly similar squad of 2yellow/2 UC/1other  was mentioned “outside the shooters door” in the constantly morphing  narrative of the Stephen Paddock shooting, were we saw: 1) a constantly changing narrative 2) a sketchy story told by a security guard 3) this guard disappearing into another country within days of the shooting 3) the narrative morphed and changed dramatically.
But get out the ROGS BINGO card in these cases, because security gangs are a real feature of modern policing-they are the dirty work rats trying to chew their way up the mast. And, the Paul Blart’s who couldn’t get laid in a whorehouse in Las Vegas.

Gang stalking and whistle blower and mental illness: NYPD's Adrian Schoolcraft

Good Reads: NYPD whistle blower, and NYPD officer Adrian Schoolcraft sent to psych ward 
Most, if not all organized gang stalking activity, or claims of such activity, involve police or other agency involvement. And, one of the claims that is frequently used to discredit those who allege they are being harassed or otherwise manipulated, and sometimes even “mind controlled,” is that these people are mentally ill.I once thought this was true as well, until it happened to me in a similar, but different fashion.
In this case-look up there at the top of this blog-and get out the ROGS BINGO card, because Schoolcrafts case is a ROGS BINGO.

  1. narrative control
  2. 2. actual gang strike forces and hidden in-group tactics and methds
  3. discrediting via claims of mental illness
  4. access by authorities to actual sound weapons
  5. colluson between psychologists and police
  6. an actual conspiracy of deprivation of civil rights
  7. etc.

More and more, we see that those who attempt to create a false narrative loaded with mis- and disinformation (like: Directed Energy Weapons!! UFO’s!!) about gang stalking are in fact encouraging the Martha Mitchell effect among researchers of organized stalking, criminal defense attorney’s, social workers,  journalists, and even psychologists.
And, as sociologist Alex Vitale and others are starting to talk about-there is something wrong with policing in general. It’s not a lack of funding, or a lack of diversity initiatives-it’s the lack of morality, sprinkled with endemic corruption and Israelifiation. Sure-we all have families and all that-but I cannot count on a scientific calculator how many families are destroyed by this current policing scheme.
Here- you can even watch a “directed energy” attack in action as a phone app-Vortex- redirects and hijacks a cell phone:
[youtube https://www.youtube.com/watch?v=DAuEcd5hlio&w=854&h=480]
Lastly- and without irony- Ramsey Orta, who took the footage of Eric Garners murder by the NYPD was gang stalked because he was a whistle blower just as Schoolcraft was suing for being railroaded and gang stalked, and  the NYPD had in fact used electronic sound weapons on peaceful protesters. What do you think such demented people would do a “one of their own” who crossed the ‘thin blue line?’

So far hundreds of people have been arrested for protesting peacefully and over the weekend the NYPD deployed the “LRAD”, which is a sound cannon that projects a painful tone into peoples ears while commanding them to disperse.

Meet Adrian Schoolcraft, NYPD whistle blower who refused to issue phony tickets and make false arrests- and then became a target of “political and punitive psychology”

EXCLUSIVE: NYPD quota whistleblower settles case against hospital over holding him in psych ward

Adrian Schoolcraft had claimed that his fellow 81st Precinct officers conspired to have him held against his will in a Jamaica Hospital psych for six days after he complained of a quota system.

Adrian Schoolcraft had claimed that his fellow 81st Precinct officers conspired to have him held against his will in a Jamaica Hospital psych for six days after he complained of a quota system.
(Freelance/for New York Daily News)

NYPD whistleblower Adrian Schoolcraft has settled his case against the Jamaica Hospital doctors who put him in a psych ward, bringing an end to his explosive case.Schoolcraft, who settled his claims against the city for $600,000 in September, had charged his fellow officers conspired to have him held against his will at the hospital for six days after he complained of a quota system at the 81st Precinct in Bedford-Stuyvesant, Brooklyn.Schoolcraft, 40, alleged that two doctors bought the NYPD’s story that Schoolcraft was crazy without considering that the disgruntled cop was actually telling the truth in October 2009.
A Jamaica Hospital spokesman had no comment.
FRANK SERPICO DRAGGED INTO FELLOW WHISTLEBLOWER ADRIAN SCHOOLCRAFT’S NYPD SUIT

The CIA hack and cell phone surveillance: gang stalking and cell phones

UPDATE 8-13-2020: the link to Spyera software below now goes to an absolutely riduculous page. I suspect that link to Spyera was a front for more spying.
And, the CIA/NSA contractor that is alleged to have dumped the CIAs zero day spy tools (the same types of tools that John Brennans CIA used to spy on US most hallowed institution, the US Congress) has been arrested, and tried, with the result that trial was declared a mistrial. But the agency and its lil’ helpers already had a backup plan: they (whoever “they” are in each case) stashed shitloads of child porn on the guys personal computer servers, which is standard practice in intelligence agencies like the FBI, CIA, Mossad, et al fear that they have a rogue agent who will blow the whistle about military black operations that utilize child porn.
UPDATE  10-04-2020: This post is incredibly popular the last couple days, though its best run.was in 2018, just as CIA contractor Joshua Schulte began to chip away at his political prosecution.
While some have criticised CIA contractor Joshua Schulte for having “weak OpSec (operations security ), in a world of smoke, mirrors, and mirrored cell phones and “electronic implants ” on peoples computers, perhaps no security is the best defense because Schultes own APPs, which are designed to remotely control any and all cell phones, and computers without the user even being aware if it,  provide him the criminal defense of total deniability, as this Obama era critic, and concealed -carry advocate “targeted individual and Libertarian” faces his second trial.
Look at these paragraphs below from Jason Koebler of Vice News (and Vice News itself a politically compromised organization, since its founder abandoned it due to intel agency pressure ) and note that every single claim of “weak security ” and other “evidence ” seeking to tie Schulte to various acts,and actions could easily been performed via a middle man attacker from Israeli, or any other anti-libertarian country.
In other words, any attacker, using Schultes own tools, could impersonate him online, AND make it appear as if he himself was doing it. Intel agency compromise operations,are exactly THAT strange, and brilliant.

  • Schulte’s website allows us to easily connect many of his online personas and accounts to his real identity, discern his politics, his places of residence, and identify his friends and family members. This all came from someone who should, in theory, know better as someone who had access to highly sensitive information.
  • In addition to Project Wizard, Schulte also uploaded screenshots of his Gmail inbox, which have his name as well as emails that show information about his bank, his OKCupid account, his cell phone provider, his friends’ and families’ names, and more.
  • There’s a selfie he took of himself holding a “FUCK OBAMA” pint glass, and a shirtless mirror selfie he took in a hotel bathroom. There’s a folder called “facebook_convos” that are just a series of screenshots of him beefing with his Facebook friends and family about politics. He uploaded a resume, group projects and homework from college, and design files for a 3D printed gun called “The Liberator.”
  • There are narrated video tours of the inside of his house, screenshots of emails he sent to activists advocating for concealed handgun carry permits in Texas, saved IRC chats of “Josh” saying the n-word over and over, and yet more screenshots of his Gmail inbox, which—in the same screenshot—prove that we are looking at “Joshua Schulte’s” inbox and also reveal the pseudonym he used on several different websites. Other files he uploaded tie this pseudonym to a Blogger where he wrote extensively about his libertarian politics. The pseudonym is also present in logged-in screenshots he took of an online quiz that tested his “Brain Performance Index” on a site called Lumosity; he also uploaded a screenshot of the score he got on a MENSA practice test.

In the meantime, there,are literally thousands of APPs that can and do monitor phones in real time.
Targeted individuals often claim that their cell phones are being used as tracking devices, and that intelligence agencies are using them for target practice and experimentation. Now, we know that part of that is true: A disgruntled CIA contractor is alleged to have dumped a list of all the tools that the CIA has been using to spy on us via our cell phones for the last decades. But don’t just point the finger at the CIA, because then, you WILL sound crazy, and Dr.’s Sheridan and James might get a whack at your mind, mind mind!

UPDATE: This post is becoming one of the most popular on this blog. While I experienced “cell phone mirroring” as early as 2010, and “offline computer situation rooms” as early as 2001, you may have just discovered this vast plot against constitutional liberty. Read on, and use my ‘search this blog’ section to find posts relevant to your own OGS.
Then, in a side note, be aware that the US agencies have long farmed out all of their intelligence collection to private contractors, Israeli’s and the Five Eyes Alliance, so any given abuse of your phone could be by : any of 17 US agencies, or any of Britains eight agencies, and many more, not counting the douchebags who work in private security firms, and even local police agencies-and ALL OF IT without a warrant, or even a paper trail.

And the fact is that ALL 17 intelligence agencies in the United States have turned on American citizens, using us for target practice of varying shades of “illegal and unconstitutional” so, they have lot’s of Company (there’s a joke in there, somewhere, about “the Corporation, lol). Your country is also doing these same things to you and your countrymen.

UPDATE: This is one of my most popular posts. So I thought I would add a link for software tat you can buy to do some of the same stuff to these agents and agencies that they are doing to you. Here’s Spyera mirroring and more for cell phones, but there are many others you can use, many freeware (but be careful-most freeware comes with the hidden cost that it was created by-you guessed it….)

You see, these days, electronic tools and toys, entrapments and entrainments of electronic surveillance and propaganda tactics that were once directed at millionaires and mobsters, third world dictators and Iran Contra’s and Osama bin Laden are now directed at ordinary common people who buy houses next to the fire chief, or who seek to trim the budget; or smoke a joint here and there, or who forgot to pay their vehicle tax. This is partially due to the fact  that all of the agencies are crawling with corruption, and blackmailing each other, in the Spirit of the LEIU’s, who, bar none, perform more black bag jobs around America than any CIA agent ever did.

Related Story: Watch this video to see how some of us knew in 2005-2008 that our phones were being used as tracking devices. And, that some would repeat our conversations back to us. Watch it from 4:27 minutes. Disruption campaigns that target activists and others take on purely diabolical and bizarre proportions within six degree’s of a persons relations. The newscatser notes that the FBI use cell phones to “keep tabs on critical conversations between known members of the mafia.”

(psssst: Don’t tell anyone, but this story here about how retired LEO’s work with current LEO’s and intel gencies to perform assasinations and black bag jobs is one of America’s best kept seekrits)
And many wonder how it is that they could write something online, and then, shortly thereafter, have a squad car pull up outside their house.
hazing 4.png
This is enabled by the highly integrated, un-constitutional mechanism of OGS and the tracking in real time of targeted communications of targeted individuals, and coordinated with massive database abuse and fraud on the courts at the local, national, and international level.
Any researcher of OGS can verify that at least, it is true, that indeed 17 intelligence agencies ARE following targets, and doing many other nefarious things as well. Here, below, from the Intercept, is the case of the CIA software that mirrors your cell phone, and uses it to perform MIM attacks on YOURSELF; and here is a full list of the tools that these agencies use to target journalists, whistle blowers, the neighborhood crank, wankers, dole dippers and a few potheads the same as if they are all terrorists, with download links from Wikileaks). But be careful….honeynets and limited hang outs go two ways.

A concerted effort by the CIA produced a library of software attacks to crack into Android smartphones and Apple iPhones, including some that could take full control of the devices, according to documents in a trove of files released by WikiLeaks Tuesday.
The attacks allow for varying levels of access — many powerful enough to allow the attacker to remotely take over the “kernel,” the heart of the operating system that controls the operation of the phone, or at least to have so-called “root” access, meaning extensive control over files and software processes on a device. These types of techniques would give access to information like geolocation, communications, contacts, and more. They would most likely be useful for targeted hacking, rather than mass surveillance. Indeed, one document describes a process by which a specific unit within the CIA “develops software exploits and implants for high priority target cellphones for intelligence collection.”
The WikiLeaks documents also include detailed charts concerning specific attacks the CIA can apparently perform on different types of cellphones and operating systems, including recent versions of iOS and Android — in addition to attacks the CIA has borrowed from other, public sources of malware. Some of the exploits, in addition to those purportedly developed by the CIA, were discovered and released by cybersecurity companies, hacker groups, and independent researchers, and purchased, downloaded, or otherwise acquired by the CIA, in some cases through other members of the intelligence community, including the FBI, NSA, and the NSA’s British counterpart GCHQ , the documents indicate.
One borrowed attack, Shamoon, is a notorious computer virus capable of stealing data and then completely destroying hardware. Persistence, a tool found by the CIA, allows the agency control over the device whenever it boots up again. Another acquired attack, SwampMonkey, allows CIA to get root privileges on undisclosed Android devices.
“This is a very impressive list,” tweeted former GCHQ analyst Matt Tait, noting that at least some of the attacks appeared to still be viable.
Matt Green, cryptographer at Johns Hopkins University, agreed the leak was “impressive,” but concluded there weren’t many “technically surprising” hacks. This lack of originality may have stemmed from a desire on the part of the agency to avoid detection, judging from one document contained in the trove, in which apparent CIA personnel discuss an NSA hacking toolkit known as Equation Group and its public exposure. It was also previously known that the CIA was targeting smartphones; drawing on top-secret documents, The Intercept in 2015 reported on an agency campaign to crack into the iPhone and other Apple products.
In addition to the CIA’s efforts, an FBI hacking division, the Remote Operations Unit, has also been working to discover exploits in iPhones, one of the WikiLeaks documents, the iOS hacking chart, indicates. Last February, while investigating the perpetrator of a mass shooting in San Bernardino, the FBI attempted argued in court that Apple was obligated to give the FBI access to its phones by producing a weakened version of the device’s operating system. If the WikiLeaks documents are authentic, it would appear FBI and other elements of the intelligence community are already deeply involved in discovering their own way into iPhones. The compromise of the documents also calls into question government assurances in the San Bernardino case that any exploit developed by Apple to allow the FBI access to the killer’s phone would never be exposed to criminals or nation states….

….follow the links-connect the dots!
Related Story: The Shadow Brokers Hack in context

Gang stalking and punitive psychology: technology abuse meets bad government policy

Organized stalking is  symptom of a mental disease alright- the creeping institutional psychopathology of America’s encroaching police and military state. And it’s also a social disease, where victims who have not been targeted mock, or deride the claims of those who have been targeted.
What do you call a world where the torturers mock their victims, or a world where psychologists work with the FBI as informants against the interests of patients who have endured hidden abuses?
Between the massive fraud waste and abuse at today’s NSA, which targets individuals with chronic and pervasive surveillance, and targets whistle blowers, and then feeds the interactions between these people to the many other alphabet agencies that use NSA data to then follow, wiretap, and target American citizens, democracy is on a precipice like never before in history.And it doesn’t help that psychology is politicized and allied with torture and abuse, as government seeks to eradicate privacy by outright lying and bullying the nation with one false paradox after another; and the silencing of those who believe that privacy is an important personal right; and perhaps the seat of healing itself?
Never in history has there been a bigger invasion of institutions of healing. Well-there WAS MKULTRA, which set the template of course. And once upon a time some psychiatrists, medical doctors and psychologists still had a conscience, and took a stand against punitive psychology. Meet Dr. Moss David Posner, draft resistor, prison doctor and prisoners advocate, who counseled targeted individuals and who was one himself.

So, maybe ONE other period of history- the Stalin era of the Soviet USSR, a time when psychologists diagnosed the complaints of those who were victims of gulags, and victims of chronic and pervasive surveillance and its subsidiary harassment as “mental illness.”
The term for the political use of psychiatry is well known: the Stalin era of punitive psychology.
One other era of history saw psychiatrists and psychologists abuse the practice and principles, as they colluded with military and CIA funded psychiatrists. And what they are doing today torturing people and mind controlling them a Guantanamo is also well documented as exactly that. So, political abuse of psychiatry is a real thing, as we see at Guantanamo, and in the Martha Mitchell effect.

Related Story: Meet Dr. Christine Sarteschi, a social worker and ponerologist, who works closely with organizations like the Association of Threat Assessment Professionals (ATAP ) and other crisis PR factories, hand in glove to black bag and gaslight victims of OGS, who ATAP notes in their literature are in fact victims of “parallel colluding investigations, ” as she joins Dr.s Lorraine Sheridan, David V.James, Joseph Mengele, and the CIAs Mormon torturers Mitchell and Jessen, in denying the reality of 24/7 police and surveillance state abuses, aka punitive psychology.
Extra points for noticing that many ATAP affiliated private contractors use acronyms that are (coincidentally, of course ) close to PsyOps, the military nym for psychological operations.

Then, take a look at the case of a humble garbage collector named Al Ditty from Minneapolis who took a stand against the militarization of garbage collectors (no shit ), and who then was framed as a suspect, including inferences in mefia that he had “mental health issues,”fired from his job where he had a stellar work record, and then, he was “investigated ” in what ATAP calls the “parallel colluding investigation ” by a corrupt police department that is in the record utilizing gang stalking against reporters.
But also-quite unsurprisingly- psychologists even recently ganged up and wrote a letter calling President Donald Trump a nutter. I mean-the irony meter is probably broken at this point over the “what is organized stalking” but this was just too much. And guess where that letter which featured psychiatrists who HAVE NEVER MET Trump, calling him all kinds of high falutin’ names straight out of the DSM-IV?
Yup-at the New Yarwk Times, the same paper that carried the accolades heralding the enshrinement of the David V. James and Lorraine Sheridan study as an “authoritative” document. I mean- go ahead and make my case for me if you want to, I will be glad to examine your claims, but most outside the echo chamber of psychiatry and psychology-and that which sucks the teats of the DVIC, are insular, incestuous, and single focused, as psychology is proven to be little more politicized sociology with a drug prescription to sell.
While applied-psychology once showed promise as a helping tool, today psychology as junk science or pseudo-science is very well documented, and it stymies any rational person that any president or political figure could condone torture, but they do, right here in America. And, psychologists have colluded with that, too, regardless of whether the president was a controlled asset or not. SO, this emergent internet trend of diagnosing mental illness via anonymous survey’s and other equally challenged methods is just plainly bizarre-schizophrenic projection at best, punitive political theater at worst.
Not surprisingly, the two “great white fathers(patriarchs)” of both propaganda operations and psychiatry were actually relatives: Sigmund Freud the mind bender and his nephew Edward Bernay’s the great spin doctor. And this is by design, and by practice, and echoes the very history of both psychology and propaganda to this day, as complimentary organs of mass mind control and opinion formation as well-which is a clear and stated goal of all propaganda, by definition, and by the stated goals of this slick operation.

Related Story: The birth of the MIC Propaganda complex, mass mind control and influence operations, and it’s historic alliance with psychology. “A week after [President]Wilson’s declaration of war, he[Bernay’s] creates the imaginatively named Committee on Public Information (CPI) to propagandize the war and, quite literally, to mass brainwash America. It marks the beginning of scientifically based mass mind control in America.”

Here below, I offer any researcher of OGS to look in on a dialogue between two people who claim they are targeted individuals, and note the sanity with which they speak. This is a very common fact of OGS victims-most are clear headed and plain spoken, and the only thing they seem to “suffer” is having n redress, and few legal recourses to action against their system sanctioned stalkers. And, that the only element of mental dis-ease displayed in the scenario below is that one suspects the other of being a government agent, and exhibits that exact rational, self protective paranoia.
Here is actual dialogue between targeted individuals on The Intercept forum. Note the dialogue between Galactus and Stan (Stan is a well known person there who believes he is targeted, and he frequently mentions surveillance role players, and has an online presence where he seems to exhibit rational reactions to harm he has experienced in the past. 
No tinfoil hats, now DEW’s, no microwave beams-just a discrediting narrative, some possible PTSD,  and one persons attempt to overcome it through seeking validation-which is not, and will not be forthcoming from politicized psychology any time soon. There’s just TOO MUCH money status and power in the game played by institutional sociopaths of all kinds, on a board that is overlayed on any individual’s personal experience.

JB
March 4 2017, 3:16 p.m.
Who ultimately pays the storage fees for all this data, just sitting in a haystack, waiting to be sorted or not? … Seems mighty expensive, my boondoggle.
? Reply
hans gruber
March 4 2017, 3:14 p.m.
IC operates on need to know
and IC has determined that you dont need to know .. so quit whining
? Reply
Stan ? hans gruber
March 4 2017, 5:01 p.m.
Based on the number and scale of past fuck-ups, it seems the intelligence community doesn’t need to know much either.
? Reply
Galactus-36215
March 4 2017, 3:07 p.m.
Spying on Americans is anything but incidental.
My spouse and I are on 24×7 direct surveillance now via our smartphones for the last several years. We are both US citizens.
Although we’ve not been able to confirm it, we suspect we have been on a Watchlist since 2004. Our overseas mail has been redirected through an office/adress in Singapore, our phones tapped in 2005/6, incessantly questioned and interviewed at the US border every time we enter the US from any overseas trip either personal or for business.
? Reply
Stan ? Galactus-36215
March 4 2017, 5:31 p.m.
This guy has made these claims before while vehemently denying the experiences of others who have been subjected less trivial abuses, such as black-listing, constant organized stalking, and physical assaults.
He’s got that smell. The stasi runs sock puppets here, 24×7, trying to manage impressions. If they’re not tossing that space aliens & mind control slop at real targets, they’re pushing “it’s not so bad” bullshit.
Professional vermin? Volunteer patriot? Another naive zoo animal without a clue? Either way, he’s full of it.
? Reply
Christian C Holmer ? Stan
March 4 2017, 5:50 p.m.
I’ve never once questioned the veracity of the experiences you’ve described over the years. Different people can be targeted in different ways Stan no harm no foul. Weaponizing peer reviewed neuroscience has been at the top of the deep state “to do” list for quite some time.
? Reply
Galactus-36215 ? Stan
March 4 2017, 7:05 p.m.
These events are mutually exclusive. It’s perfectly acceptable for someone to believe one story while rejecting another.
The only ‘smell’ I have is usually when I don’t shower on Saturday mornings.
But have at it. Feel free to name call all you want, it doesn’t bother me. It actually makes me happy and to smile. So, go for it. 🙂
? Reply
Nick Torrent ? Galactus-36215
March 4 2017, 6:27 p.m.
You’ve confirmed this for sure?
? Reply
Galactus-36215 ? Nick Torrent
March 4 2017, 6:55 p.m.
Two very key aspects of this, yes. That’s all I’m will to say at this point.
? Reply

Organized gang stalking and fire departments

Organized gang stalking and fire departments
harriscountygangstalking.targeted.one_
In a story covered on ABC’s 20/20,and now, by Courthouse news service,  we have a glimpse of organized stalking of a family by firefighters, police, their relatives, and others who waged an organized horn honking harassment campaign for ten years against one person, who is now suing them.
This organized campaign of harassment included many of the known tactics and actions of gang stalking, including slander, trash thrown on the victims lawn, and eventually, multiple restraining orders against gang stalkers, and even the eventual criminal plea of a firefighter/gang stalker named Dick Wittenkugel.
Hey, gang stalkers: DONT BE A DICKWITT!
Organized Gang Stalking Case Study: Rick and Lucinda Krlich, Ohio
Meet Rick Krlich and his wife Cindy, who have endured a horn honking campaign in Hubbard, Ohio for ten years and counting. He writes about his experience of ongoing harassment on his website “Small Town Terrorism,” the Rick and Cindy Krlich story. Or-who do you call when it is public servants acting in an organized fashion, breaking the law, with help and encouragement from police to firemen to the city legal council?

The presence of numerous public employees among those assaulting the silence around Rick Krlich’s neighborhood isn’t the only questionable behavior in this strange saga. The response of the city’s former Law Director and now sitting judge Jeff Adler creates doubt as to the administration of justice in Hubbard.
Not only did the former Law Director fail to process/prosecute many of the cases against horn blowers, he actually represented one offender, and withdrew from initial agreement to represent more, in appearances before a Trumbull County magistrate.
So ask yourself: He’s supposed to represent the city of Hubbard. The city has an ordinance against horn blowing except to ‘give warning’ to other drivers and pedestrians. Yet he goes into court with people that have been caught on surveillance cameras, and he defends them from being held accountable for violating the city’s law.

[youtube https://www.youtube.com/watch?v=vFY72C0C-Jg&w=249&h=187]
Many incidents of organized stalking mention that fire departments are part of the harassment, and that they use the trucks as ominous reminders to targeted individuals that they cannot escape the harassment.
The main difference between most of these claims and the claims of Rick Krlich is that OGS usually targets low status individuals who have little or no resources with which to fight back or even defend their basic due process rights  or the right to the pursuit of happiness.
But Krlich is now suing, and it is likely he will win, because he had enough money and other resources to film, photograph, and record his stalkers, who at one point drove by his house and honked their horns 100 times per day.

o

Noises in the night…

[youtube https://www.youtube.com/watch?v=vFY72C0C-Jg?controls=0&modestbranding=1&rel=0&showinfo=0]

What you will see here, Dear Reader, is a chronicle of spite.
Undeserved, uninterrupted, unyielding spite, triggered by one man’s belief that he could rely on the legal system to guide him through a simple real estate transaction.
What Garrick Krlich got, instead, was intimidation, frustration — and spite.
Krlich is a small contractor who lives unostentatiously in Hubbard, Ohio’s East Hill neighborhood. Over the years, he has managed to acquire surrounding properties, older homes like his that he turns into well maintained rental properties. He makes a decent living, isn’t greedy for more, and has been, overall, quite contented with his life.
Until the Clemente house next door became empty.
Until the noises in the night began. For more than four years now, the raucous sound of horns blowing has shattered the quiet of the night in the Krlich’s neighborhood, disturbing not only Krlich and his wife, Lucinda, but surrounding residents as well. The Krlichs lie awake, listening … waiting … and then come the sounds of the roaring engines, the screeching tires — and the horns. Horns that seem to be screaming “Go away! Leave! Never come back!”

ROGS Homework assignment: Google through this case, and see if you can identify the partisan/tribal/sectarian affiliations of the city attorney/ judge who crapped all over this case.