ROGS BINGOs are EVERYWHERE: note the use of the term “Ravens”in the following Reuters piece about “targets ”

As I demonstrate all throughout ROGS, the sooner that journalists, attorneys, psychologists, etc. adopt the ROGS predictive analysis in cases of organized gang stalking, the quicker you resolve the quandry of “high policing v delusional disorder” connundrum presented by our out -of -control domestic spying on citizens problem.

they saw the mission cross a red line: targeting fellow Americans for surveillance.

And, you can solve cases and vindicate the narratives of targeted individuals, who are stalked, harrassed, and frequently murdered, or who go on rampage killings in America, and elsewhere, after being stalked and harrassed by US /British /Israeli /private contractors and other Panopticon affiliated hackers and spies.
Notice in the following piece, that the NSA is directly implicated, and a female spy is involved stalking activists, and also, the use of the term “ravens”as I have documented here,with Eleanor White, and here and many other places in the OGS dialectic.
But ravens, blackbirds, and crows are SYNONYMOUS with signals intelligence operations (SIGINT) and black operations that target individuals and wage actual “electronic warfare.”
Without further adieu, a tale of NSA trained spies,waging black operations over the internet, working as private contractors, speech police, and highly organized, methodical bullies, targeting individuals,around the world, and inside the USA.
From Reuters:
January 30, 2019
Special Report – Inside the UAE’s secret hacking team of U.S. mercenaries
Christopher Bing, Joel Schectman
WASHINGTON (Reuters) – Two weeks after leaving her position as an intelligence analyst for the U.S. National Security Agency in 2014, Lori Stroud was in the Middle East working as a hacker for an Arab monarchy.
She had joined Project Raven, a clandestine team that included more than a dozen former U.S. intelligence operatives recruited to help the United Arab Emirates engage in surveillance of other governments, militants and human rights activists critical of the monarchy.
Stroud and her team, working from a converted mansion in Abu Dhabi known internally as “the Villa,” would use methods learnt from a decade in the U.S intelligence community to help the UAE hack into the phones and computers of its enemies.
Stroud had been recruited by a Maryland cybersecurity contractor to help the Emiratis launch hacking operations, and for three years, she thrived in the job. But in 2016, the Emiratis moved Project Raven to a UAE cybersecurity firm named DarkMatter. Before long, Stroud and other Americans involved in the effort say they saw the mission cross a red line: targeting fellow Americans for surveillance.
“I am working for a foreign intelligence agency who is targeting U.S. persons,” she told Reuters. “I am officially the bad kind of spy.”
The story of Project Raven reveals how former U.S. government hackers have employed state-of-the-art cyber-espionage tools on behalf of a foreign intelligence service that spies on human rights activists, journalists and political rivals.
Interviews with nine former Raven operatives, along with a review of thousands of pages of project documents and emails, show that surveillance techniques taught by the NSA were central to the UAE’s efforts to monitor opponents. The sources interviewed by Reuters were not Emirati citizens.
The operatives utilized an arsenal of cyber tools, including a cutting-edge espionage platform known as Karma, in which Raven operatives say they hacked into the iPhones of hundreds of activists, political leaders and suspected terrorists. Details of the Karma hack were described in a separate Reuters article today.

Gang stalking and delusions and paranoid complaints: what is Level X thinking and cognitive bias in psychologists/psychology?

In the extant online descriptions of gang stalking, it is readily apparent that many misnomers and type 1 errors are present in most dialogues, which is what can be expected when extremely well financed domestic terrorists target lower educated, lower social status persons, who themselves are often the product of intergenerational poverty.
From Granite Island Group’s description of Technical Counter Surveillance Measures(TCSM), we now turn to “what is Level X thinking”and I will ask the question “why did one well known doctor, Moss Posner M.D. experience being targeted by the MIC while other doctors, such as  psychologists David V. James and Lorraine Sheridan are either willfully ignorant, or cognitively impaired as they relegate claims of gang stalking to delusional complaints.
The simple answer is that they differ on one major point-Posner was a man who once took a principled stand against the MIC/PIC and the other doctors are part of a trend in psychology that is subsidized by the MIC/PIC, and that pathologizes dissent.
So first, here is how ignorance of technology morphs into “threats based on misunderstandings” of technology:

The threat posed by technical surveillance devices may be broken into ten basic levels. As each threat level increases the difficulty of detecting the device increases by an order of magnitude (for levels 1-9).
These threats are clustered into three major groupings, with a fourth major group for emerging technologies or threats based on misunderstandings of technology or (in some cases) pure fantasy.

So, in the quote above, we see a TSCM specialist has named the problem-and that because of the general cognitive dissonance, class bias, and crporate-drug company collusion between modern psychology and human beings in general, the technological factor of OGS is ignored, overlooked, or plainly mocked as we see in the James-Sheridan study.
And so too is the incredibly changed playing field where complaints derive from. Where once we had functioning democracy, we now have totalitarian surveillance apparatus mediating everything from our communications online and offline to the chemicals in our children’s minds.
And this, quite sickeningly, BY DESIGN. of a corporate and state collusion at the internet switch. It is indisputable that we are in the era of chemically based mind alteration via the internet, and the ability of hidden actors, ranging from military psychological operations to advertisers, to intelligence agency programs; using hidden programs that target INDIVIDUALS differently, every time they are online.

Related Story: How hidden actors operated on the computers, the switches, the routers and the minds of people who used any one of those devices for fourteen years. From ArsTechnica “Equation Group malware dubbed GrayFish encrypted its payload with a 1,000-iteration hash of the target machine’s unique NTFS object ID. The technique makes it impossible for researchers to access the final payload without possessing the raw disk image for each individual infected machine. The technique closely resembles one used to conceal a potentially potent warhead in Gauss, a piece of highly advanced malware that shared strong technical similarities with both Stuxnet and Flame. (Stuxnet, according to The New York Times, was a joint operation between the NSA and Israel, while Flame, according to The Washington Post, was devised by the NSA, the CIA, and the Israeli military.)”

Most targets, as we see in many online narratives, are under constant threats that they will “be made homeless,” and many actual homeless people have been targeted by nefarious property developers and even the Department of Homeland Security, which is currently operating a CIA styled self sustaining operation that targets real estate using back door searches and more. In other words- our own agencies are creating work for themselves by literally tracking everything people do online, and then using it as pretext to seize assets.
I recently spoke with one targeted individual who was once aspiring to a career in helicopter mechanics. He spent $35 thousand dolars to go through the program, and then, just before graduation from his program, he met organized gang stalking in the form of an old girlfriend. OGS-or, as it is otherwise known- “small town terrorism,” is similar to what we see with Rick and Cindy Krlich in Ohio, and many other cases where small town groups of insiders conspire in various ways to target individuals who are “not from there,”and especially, who have the ability to “get the hell out of there.”
These people are highly targeted in a variety of ways, and some of those ways are bizarre and similar to what used to be called “peonage systems,” aka “Slavery by Another Name.” As startling as it may be, America in particular, an the west in general still operate on a business model from which the word “peon” derives, but also that took effect after the official end of slavery. But instead of one single plantation, and an overseer and cotton fields, we have the prison system, and tiers of  human debt bondage.
Indeed- in the extant blogs online, we can also find some who discuss TI’s as “slaves.” This is not insignificant when we realize that hidden actors literally stalk unaware victis online from official cover-and that federal funds flow to states and private contractors who entrap, ensnare, enmesh, or otherwise calculatedly “capture” the data of targeted individuals, and whole political groups. There are 17 American agencies alone that have the data of an entire generation, and they are culling through it as I write this.
In the case of my informant, I became interested in his case because he has 1) written about his case online and also 2) written to many senators and others and 3) signed petitions for the government to investigate OGS 4) actually documented names, addresses, hone numbers, webs of relations, and military and civilian titles of those who stalked him and 5) currently has a private detective on retainer investigating his claims.
I also chose to contact him because, for the most part-his claims look like any civil conspiracy anywhere, ever, but with actual electronic harassment raging from a cell phone application that acted as a wiretap, to “strange beliefs” abut other electronics. And-we see a new twist in the old stereotypes. We see a white male, middle thirties, raised in the south, using the internet to find infomation, and being led onn goose chases of every kind when he researches electronic harassment, much the way lower class individuals were led on goose chases about “the devil” in earlier era’s/
I encountered his narrative online, and I will write about it more completely in another post. But for now, I note that: the subject writes well, and speaks very well-better than the average person- and this is why I personally decided to interview him. And I will describe his case as one that has classic Level X thinking errors, which I will explain later, and these fall into both categories of Type 1 AND Type 2 errors of “belief,”as well as valid apophenia-epiphany confusions.
I use this latter phrase as shorthand for now, because when we factor in the many stresses and stressors that OGS entails, and combine them with the plainly bizarre “new world” that the post 911, post due process climate of chronic and pervasive surveillance abuse, muc of it eminating from teh deliberate gray area created by Fusion Centers and DHS sying; and some of that augmented with FBI styled “disruption” from oca community policing initiatives.
And in all of THAT which the ideological, sectarian, total surveillance state and the localized community policing has devolved into, we see in fact that the “new world” is the same old bad world it always was, but with a multi-cultural Klan instead of a white supremacist one, augmented by cell phone and internet “reality” and hidden “experiences,”that had been described inn earlier era’s as “the work of the devil,” by those with minimal education.
What is a “wiretap?” Quibbling over definitions in the era of Total Information Awareness, aka the NSA/FiveEyes/Israel/Fusion Center Total Spying Framework, data theft pipeline.
So, a look back is necessary to understand how this abuse takes place and targets the “uppity” is in order. In days past, the image of a “bug eyed coon” who was constantly “spooked” by “odd and peculiar delusions” was staple of supremacist culture, and “odd delusions” and experiences that cannot be explained, such as hearing the “voice of the devil,” or god was a staple of the stereotype, and more.
Here is the Chicago Police Departments version of the bug eyed coon:
Chicago cops' 'racist' brochure depicts African Americans ...
And here is the pik-a-ninny baby coon from Sanofka:

SANKOFA: 8/15/10 - 8/22/10
Note that the bug eyed pick-a-ninny “cannot understand”

So, because a major part of the OGS dialectic suffers from a paucity of compassion, combined with deliberate and well documented attempts to “isolate” people,  and, like the CPD’s depiction above we see elements of “police personality” leaking out in their in-house literature; or because we see that of the two studies online about organized gang stalking, all of the authors are white, and one third of them likely Jewish (just like the Supreme Court)-it is easy to understand what an uphill battle any targeted individual will encounter to merely name the vast ad actual conspiracy against them, personally, much less describe the technological aspects of it. or in language and in

Related Story: The Racist History of Dr. Seuss, aka Theodor Giessel, an eastern bloc socialist

Psychology and even the DSM-V is perhaps one of the most conservative tools of social control ever invented, and is literally derivative from the heyday of the literal and actual CIA financed “mind control” era of Donald Ewen Cameron and McGill University.
And, much of its focus is little more than a sales pitch for Big Pharma, based on the political “mental illness” of the day. Lastly, if we were to view “mental illness” as derivative of class systems of oppression, insurance claims from chronic surveillance abuse, police brutality, or sex, race, and gender disparity, insurers would go broke; and Big Pharma dope would be seen as little more than medications for social problems, or what most of them are: experimental chemistry and social engineering.
If one were too view the claims of TI’s in such a light, we would find that Level X thinking is the centerpiece of nearly all claims of “electronic weapons.” I can say without a single doubt hat of those I have interviewed, with one singe exception, it is my experience that Level X is a more likely explanation than “delusions and paranoia.”
So- my subjects story is much like many of the stories I have encountered (for instance, David is likely mildly schizophrenic, and definitely compulsive, and superstitous; whereas Lucie actually had contact with illegal and unethical medical programs and earlier era psychology tha too place in a well known setting of “bad practices” and actual human experimentation; and the delusional complaint, which then was a mask for institutional abuses. Or, Frank Olson and John Nash.)
In sort, this subject has given me permission to write about his case, and I will only document what is known, plus the conversation I had with him over several hours.

  1. as above, he was an outsider, trying to get ahead in life
  2. he was followed, monitored by locals for long periods of time
  3. his surveillance then began in earnest because he was not from the local in-group, in an area that is dependent on federal dollars
  4. his old girlfriend and party friends hung out together
  5. his surveillance increased to the point where he became paranoid in the literal and psychological sense
  6. he began to document upwards of fifteen regularly occurring encounters with police, military, and their relatives who did various things ranging from moving in next door to him to following, to vehicle surveillance
  7. his fears, anxieties, and “paranoia” increased
  8. his lady friend sold him  30 dollars worth of drugs around the time he was to graduate his helicopter mechanics program
  9. he was arrested and eventually jailed and put into a prison centered rehab program
  10. before, during, and after the “capture” and after he finished his program, he was under surveillance
  11.  he came to the not-so-unusual belief that it had all been planned, and that some gained a substantial monetary “reward” for his “capture.”
  12. he became increasingly investigative, and vocal, raising awareness of OGS, and especially, he began naming names, and dates, and times, and license plates, and more; he began connecting dots and linking ‘webs of relationships’ that led to his stalking
  13. he was arrested three times and put into a mental hospital on a 72 hour hold shortly after he published his findings. One time, he was held for four months in a jail as he awaited “a mental health assessment,”and competency hearing, wee he was found competent; and the jail was paid, and he was burdened with $50-80 dollars per day to “pay his way” out of it.

Let me know if you start seeing patterns, dear reader. Because obsessions with patterns can indicate mental illness-or solid investigative work. And, it can also reveal wider civil conspiracies, much as we saw in the case of the Beatrice Six.
Now, as I looked into his case, I became aware of another interesting set of facts. The case of my informant comes from Missouri, USA. And : 1) Tom Schweich committed suicide in the same state, after a whisper campaign was waged behind his back 2) the Beatrice Six case also happened in the same state 3) Ferguson protesters and activists have been found in curious suicides there too, and 4) I received an email whose address started with [email protected], where the letter writer let me know that they have a little gang of some sort that travels in pick-up trucks with flags on them. The shortwave radio call sign and a newscaster who died in 2011 is also from the Missouri-Illinois border area.
So, I will leave this for now, and come back to it later. But from all outward signs, it appears that crime is actually crated on some level by, for and within the community policing rubric; and the net effect is that states get federal dollars from this activity. See this post here for more evidence of that.


Speaking of "what happens to gang stalking targets?" A story from 2014-16

Speaking of espionage- but really quietly of course, here in public, about mission creep and bleed-over into a dying Constitutional Democracy.

“There not using them that way- they’re using them here…”

Background: Consensual Surveillance is what the DHS, ICE, FBI and even state level agencies call their secret warrantless cellphone surveillance. They have been monitoring and manipulating the communications of Americans via Cessna airplanes using technology called Stingrays and Hailstorm here in America since before 2006.
My first encounter with this form of warrantless surveillance by air was in 2011 or so when a little yellow Cessna airplane followed me everywhere, for hours, across a mid-western city.  Then, I pulled my phones battery for the first time ever- and the plane disappeared.
Low and Slow is the way to go when monitoring American’s speech : off-the-radar, “push-broom” hyper spectral imaging is more than picking up chatter.
The Beechcraft King Air turbo-prop is a beautiful bird. And it’s used to fly domestic surveillance missions in the U.S., and scoop up data about Americans
So- there’s this guy who worked on the electronic navigation and stability systems that are in MRAPs, the spectral imaging and photographic capabilities of FBI spy planes that currently monitor the phones of many Americans without a warrant or even probable cause; and the heavier military grade spectral and thermal imaging systems of CIA, DEA, and USAF surveillance aircraft. He particularly was fond of his work on the Beechcraft King Air line. How could those planes NOT be an engineers favorite- the name alone is so retro and air-crafty.
Related Story: EMARSS aircraft crashes over Iraq– what was it doing?
He said “These things can look down through the roof of your house, and draw a multi-tiered 3D heat map and watch you move through your house in real time.” He really thought highly of those Beechcraft Surveillance planes.


All images courtesy of Beechcraft online:

I met him at a Japanese restaurant in November of 2014, a tonkatsu ramen and saki place in a strip mall next to a hotel where he was a regular; at least, as much of a regular as a guy who moves around a lot,  working for military contractors and weapons manufacturers.
At the time, I was surprised that he was telling me, a virtual stranger, about domestic surveillance in the U.S. done TO Americans by intelligence agencies, BY the #goodguys at every level. I always thought the #badguys and the #otherguys did that stuff in their countries, to their peoples. Turns out some of those guys are training on those same planes as I write.
And, I would love to tell you more, but it might be illegal to do so, cuz, national security and stuff-you know: the Chinese or the North Koreans- maybe the Syrians or ISIS!! might get a leg up,catch us with our pants down, and tap all our phones, or follow us around with airplanes to get at all of our phone data and stuff.
Also, because we know that main stream journalists are so reputable and all, after President Obama authorized the dispensing of propaganda on the American public in 2011. A main stream media so reputable that they forgot to question the surveillance state as it was being built above my head. There are plainly too many military industrial surveillance state ‘official sources’ to wine and dine for stories- real inside scoops about cute puppies, or a stadium or something. Busy busy busy hungry hungry hungry officials: the #goodguys busy and hungry together.
Anyways, these MRAPs were designed for military use,in theaters of war, but somehow ended up parked next to your local donut shops all across America.
Related Story: Colorado SWAT team completely demolishes man’s home looking for a shoplifter who stole 15 dollars worth of stuff.
Well: once upon a time on a phone long since stolen, I was making a case in the public’s interest about how airplanes are being used domestically to spy on Americans phone calls, and possibly looking through our roofs. I used Gmail and kept notes and contact info there. And, that story literally got scooped out of my Gmail account, then somehow hit the newspapers- in Minnesota.
And this guy- I’ll call him Jack- was a mess. He was hammered- absolutely shitfaced; he was all tore up about missing his aged mother- how he wanted a ghostwriter to tell her story to the world.
“Let me tell you- there are good mothers and then there was her: my mother was the best mother ever- anyone could see it. She was like a saint…” and so he went on about his mother.
And he was weeping. Weeping about how his inventions were being mis-used. You see, he works for many of the weapons dealers and arms suppliers that build the bombs and the drones and the MRAPs there in front of your house. He is a military industrial complex engineer.
Here is a project he worked on:
And this doozy which he made note of:
His biggest problem seemed to be that he felt that he had no say in the fact that these tools were being used to target civilians.
“I never gave my consent…they never told me they would be used this way…” and so on. He was horrified when he found out that the multiple agencies were using his toys and tools to target practice on American citizens, here, in America. That the FBI et al were training their pilots and their resources using Americans for practice, without warrants.
There’s this point between men where boundaries become demilitarized- where we drop our guard, and empathize: where we try to comfort another man, which is always awkward. And, where one wonders if the weirdness might be a whole ‘nother level of weird.
Well, the guy stumbled towards me in his stupor, head hanging in his hands- and he was literally slobbering as he gasped one of those horrid sort of drunk guy gasps that precedes horrible crying,  and then sprang at me and was in my arms, where he found a slobbery nook on my shoulder to weep into.
Awkward indeed- blurring boundaries, blurring stories, one minute on about his mother the next, talking about how the technology he designed for  Beechcraft could “look through your ceiling and create a 3D image model” of you as you take a shit in the privacy of your own home. ( Update: here is a story that ran in Popular Science on April 6, 2016, shortly before I wrote this story herein, and shortly after I spoke with a confidential informant:
I said ” Well, these are the kind of tools we need in a war.” He gasped a cry and said “There not using them that way- they’re using them here…” and more weeping.
I couldn’t help but feel my lifelong revulsion to men, and weeping men, but especially- weeping men slobbering snot on my shirt.
But, in some conversations, I guess I overlook my own biases and listen for the story that really matters. And he seemed nice enough, provided an interesting story full of details.
In this case, it was that one detail- that military grade photo-thermal imaging was being used on American citizens.
That seemed important.
Within a day, I bumped into anther guy in the hallway carrying a Stingray sized briefcase- one of those metal kind that you see in the movies. And, the next night, a long black Suburban with no license plates of any kind parked under my motel window. Within three months, the phone where I kept my research and notes about this incident disappeared from my car.
And- the story about how the FBI is using these technologies broke almost immediately after my ability to report it had been erased. This has been the nature of my journalism for over a decade and counting; and why I provide these stories to others now- because control of my personal narrative begins and ends with this strange idea of my personal ‘right to privacy- my right to be left alone.’
But also, it coexists along with the public’s right to know.