Tim Cushing pushing for ROGS' Gary Webb award for excellence in gang stalking journalism?

Of all the ways that ROGS blog-the blog you are reading right now-has changed the discussion about organized gang stalking, I think that my Gary Webb Award for Excellence in journalism is probably my best contribution.
That award carries a one thousand dollar stipend, and the winner also gets a golden trophy of a pigs trough with the bottom chewed out, with two golden .22 caliber bullets dangling above it. I will let the awardee contemplate the design of the award for themselves, but note that Gary Webb reported one of the best series in the history of journalism, won a Pullitzer Prize, and then, got gang stalked to death.

Related Story: What does a blog post written in a free WordPress blog look like when the blog is being tampered with, in real time, by an Infragard member, a Fusion Center, or any of many NSA/Alohabet agency speech suppression tools and tactics? see this post here, where I attempted to link the QaNON “conspiracy theory” to a SWAT team member who greeted the vice president wearing a Qanon patch.
1211118-11-20181201140953

That award is offered for any journalist who can use the term “organized gang stalking” appropriately when discussing this issue.
And, Tim Cushing, of the worlds premiere technology blog, Techdirt.com comes awfully close in this article below, but-not close enough to be a contender YET.
And, lesser journalists are starting to step up to the plate to take a swing at that award, as we see with the reportage in another MSM piece that reported on the organized gang stalking of tech guru John McAffee, the worlds first inventor of anti-virus software.
Well, heres another excellent puece by Cushing, covering due process free and BIZARRE police activity, as they stalk, harass, and spy on people in Boston, MA, which has some of the most deeply entrenched Catholic and neocon racism and hidden theocracy in America:
Lawsuit: Boston PD’s ‘Gang Database’ Says People Who Wear Nikes And Have Been Beat Up By Gang Members Are ‘Gang Associates’
from the guilty-until-negatives-proven dept
The Chinese government uses a number of measures to keep tabs on citizens. One is what’s known as a “citizen score” — a compilation of all the good/bad habits the government can track that determines whether a person should be viewed as a contributor to society or someone the government should take out of circulation.
We do the same thing here in the US. Credit scores determine who gets to live where and what vehicle they can own. It also can affect employment opportunities. This version of a “citizen score” is compiled by private parties who have access to information Americans are given no choice in relinquishing.
But the government also uses point-based systems to determine what kind of citizen you are: one of the good OK guys or possible a menace II to society. The ACLU is currently suing the Boston Police Department over its ad hoc “citizen score.” The BPD adds and subtracts points to add and (possibly?) subtract people from its “gang database.” Things citizens actively do — and even things they passively don’t — can put them on this watchlist.
From the ACLU’s public records lawsuit [PDF]:
Under the point system, a person is designated as a “Gang Associate” if he is assessed six or more points, and a “Gang Member” if he is assessed ten or more points. See Exhibit A, Boston Police Department Rules and Procedures Rule 335.
The point system makes it possible to designate someone a Gang Associate or Gang Member without any allegation that he engaged in violence or criminal activity.
An individual may be assessed eight points for being the victim of gang-related violence.
Yes, you read that right: Boston residents magically become “Gang Associates” if they’re shot at by gang members. Or carjacked. Or mugged. If this happens twice, it appears they’ll be upgraded to “Gang Member” thanks to their inability to avoid being victimized by gang members.

Gang stalking BINGO: targeted individual, targeted real estate, targeted electronics, targeted childROGS ren…….

Let  me  know  if,  and  when  you  start  seeing  patterns in  the  data  of  organized  gang  stalking……because  the  Experts  all  agree that  an  obsession  with patterns  can  indicate delusions, and  maybe  even  schizophrenia!
But  there are,  in  fact, links  between  organized  gang stalking and  real  estate, organized  stalking  and kangaroo  DVIC  courts, links between Gang stalking and Electronic implants: (Here is how the NSA uses electronic implants.) and electronic  implants that  monitor  our  computer  activity, sometimes  for  YEARS.

Related  Story: How secret  policing tactical  assaults  can  induce  delusion-like  symptoms in  politically  targeted  individuals,  as  those  targeted  try to  find  words  for  un-Constitutional  government conduct:
Gang stalking and delusions and paranoid complaints: what is Level X thinking and cognitive bias in psychologists/psychology? 
OGS victims obsession  with  patterns can  indicate  delusions to  therapists  and psychologists  on  the  state  teats!

But  here  below is a  case study  in  organized  gang  stalking  that  is  full  of  the  EXACT  patterns that  I  describe here  at  ROGS.  Organized  gang  stalking  IS  what  I  say  it is!
So…BINGO: Lets Play ROGS BINGO, in  the  case  of  the  targeted  activist!
Black  activist jailed  for  Facebook  posts speaks out about secret FBI surveillance that  went  on for  YEARS.
Exclusive: Rakem Balogun spoke out against police brutality. Now he is believed to be the first prosecuted under a secretive US effort to track so-called ‘black identity extremists’
…….. The father of three said he was shocked to later learn that agents investigating “domestic terrorism” had been monitoring him for years and were arresting him that day in part because of his Facebook posts criticizing police.
“It’s tyranny at its finest,” said Balogun, 34. “I have not been doing anything illegal for them to have surveillance on me. I have not hurt anyone or threatened anyone.”
Balogun spoke to the Guardian this week in his first interview since he was released from prison after five months locked up and denied bail while US attorneys tried and failed to prosecute him, accusing him of being a threat to law enforcement and an illegal gun owner.
Balogun, who lost his home and more while incarcerated, is believed to be the first person targeted and prosecuted under a secretive US surveillance effort to track so-called “black identity extremists”.
In a leaked August 2017 report from the FBI’s Domestic Terrorism Analysis Unit, officials claimed that there had been a “resurgence in ideologically motivated, violent criminal activity” stemming from African Americans’ “perceptions of police brutality”.
The counter-terrorism assessment provided minimal data or evidence of threats against police, but discussed a few isolated incidents, notably the case of Micah Johnson who killed five officers in Texas.
The report sparked backlash from civil rights groups and some Democrats, who feared the government would use the broad designation to prosecute activists and groups like Black Lives Matter.
Balogun, who was working full-time for an IT company when he was arrested, has long been an activist, co-founding Guerrilla Mainframe and the Huey P Newton Gun Club, two groups fighting police brutality and advocating for the rights of black gun owners. Some of the work included coordinating meals for the homeless, youth picnics and self-defense classes – but that’s not what interested the FBI.
A march in the wake of the deaths of Alton Sterling and Philando Castile at police hands.
Investigators began monitoring Balogun, whose legal name is Christopher Daniels, after he participated in an Austin, Texas, rally in March 2015 protesting against law enforcement, special agent Aaron Keighley testified in court….follow  the  links  above….connect  the organized  gang  stalking  dots! Because  nearly  ALL  mass shooters  endure YEARS  of these  tactics by hidden  policing,  aka  “High  Policing,  aka Americas secret  police.”

Special Agent Larry "Clint" Wooten, county sherriff's and top LEO's ask: so-what should we do with 'that one bad apple' who gang stalks people to suicide

Once again, the excellent blog medawarscornflakes has produced a story about organized gang stalking, where a group of individuals were describes as a gang, stalked like a gang, treated like a gang, indicted as a gang, implicated in a coonspiracy-but later found factually innocent of all charges.
The story involves a whistle blower who is a Special Agent of the Bureau of Land Management (BLM), SA Wooten. The whistle blower cites the Whistle Blowers protections statutes within the official documentation.
Here is one take on “that one guy,” from the Salt Lake Tribune:

Public Enemy No. 1 for rural Utah sheriffs just happens to be a fellow peace officer: Dan Love, the Bureau of Land Management’s special agent in charge.

Elected law enforcement officers from Nephi to Blanding call him an arrogant and dishonest bully who has little regard for local authority and dodges accountability, derailing a collaborative approach to police work on the state’s federal lands.

Love reportedly just laughed when Garfield County Sheriff James “Danny” Perkins relayed ranchers’ complaints about federal officers

Medawars describes incredibly uprofessional conduct, deliberate attempts at hiding evidence including shredding documents, and a sadistic practice of harassing people until they commit suicide, aka “death by gang stalking.” The Special Agent went on record describing a “kill list”of targeted individuals who a particularly sadistic and unprofessional agent claimed he had stalked to death.
The story has political implications, and if you use the ROGS BINGO card, you will strike gang stalker gold. You might remember that Medawars brought my attention to a case of gang stalking in Texas that involves retired FBI agents, and agents from several other federal agencies, that I covered it here.
As we see time and time again, real estate is at the center of much gang stalking, as are document shredding, retired LEO’s and the LEIU members who participate in this illegal practice. And, once again here is an actual piece of evidence that gang stalking is an actual practice of federal agents working  within many agencies.
But let’s have Medawars tell it:

Dec. 18th, 2017

Kill Books and Organised Stalking: a Spin-Off from the Bundy Case

This article is not about the Bundy case itself: it is about something else, not unrelated, of course, which is pointed up by some of the evidence which has emerged from independent investigations of the Bundy case. There are other respected bloggers who have specialised on this subject and Medawar doesn’t intend to duplicate their hard work or get into pointless arguments: readers can go to them directly.
That being said, anyone remotely interested in the Bundy case should view or read the source material referred to immediately below.
This is a link to a (slightly shakey, but bear with it) YouTube video of Washington State Representative Matt Shea reading from a document of “17-18” pages, which is based on an e-mail sent by Special Agent Larry Wooten to Andrew D. Goldsmith, Associate Deputy Attorney General.
In it, (at roughly time index 13:00 onwards) Mr Shea recounts Special Agent Wooten’s claims that Former Special Agent in Charge Dan Love had  a “Kill Book”: a sort of trophy, containing details of cases where Love proudly claimed to have caused three people in Utah to commit suicide.
Here is a link to Mr Shea’s source material, the communication from Special Agent Wooten.  (It’s a .pdf document). Medawar recommends that readers not only carefully read, but download this. (In this form the document is 16 pages, starting with page 2.) In the first paragraph on page 8 (according to the document’s own numbering, page 7 as far as a .pdf reader is concerned), the “Kill Book” is mentioned.
Medawar would like readers to note that this document is not uncritical of Cliven Bundy and cannot fairly be represented as political propaganda in his cause, or an endorsement of his actions, which Special Agent Wooten believes probably broke several laws and risked an armed engagement which might well have cost innocent lives. It is implicit in Wooten’s view, that Mr Bundy stubbornly acted in a way which actually completely played into the hands of SAC Dan Love and others shown by the document to be highly prejudiced, biased and unprofessional. Special Agent Wooten also implies that, given the grotesque and at times almost unbelievable bias and misconduct within the BLM’s Office of Law Enforcement and Security, that had Mr Bundy recognised the Federal Government and legal system and used them properly, he would have been in a very strong position, because his opponents had mishandled and concealed evidence at every turn -and apparently continue to do so.

What actually matters most here:

The three people in Utah whom SAC Dan Love boasted of having driven to suicide, using (or misusing) his powers and position and the indulgent tolerance of his superiors for misconduct on his part. We know little about them, other than that Dan Love boasted of having caused their deaths in the course of his “work”. There’s no evidence for any of them being a confrontation artist who might be said to have engineered his own doom. They were US citizens, who for one reason or another came to the attention of Dan Love and the BLM, and they are dead.
It is apparent from the context that Dan Love hounded these people in precisely the way that the “targeted individual” community has long claimed that gang-stalkers or “organised stalkers” do. In doing this, from within a Federal Law Enforcement agency, Dan Love must have engaged in a conspiracy with his colleagues, both supervisors and subordinates, to deny these individuals their constitutional, civil and other rights. This is a Federal Felony: “Denial of Rights” under USC 18 Section 241. See also the single-most read article on this blog.
There should be a prompt and thorough criminal Federal investigation into Dan Love and his colleagues for at least three counts of this felony.

Gang stalking and ritual defamation

One of the single most common features of gang stalking complaints is that slander and defamation is being waged behind a persons back. This is also a main fetaure of what psychologiss call “delusional complaints,” of the type suffered by “schizophrenics.” and others who are “mentally ill.” Indeed, religion is often a main feature of schizophrenic delusions as well.

Related Stories: The Case of the “Slenderman” and schizophrenia; then, the odd circumstances where un-empathetic societies that bomb babies and rape our data seek to label others as having a lack of empathy, aka “psycho’s and anti-socials.”

But in politics, certain elements of our western culture suffer the loathsome an literally communicable disease of “neuro-memetic fasciitis of the mind,” too, by spreading memetic slander and defamation by targeting individuals. And, we see this most commonly in politics, academia, and other institutions.

Related Story Update: Bari Weiss, a pseudo-journalist who wrote the defamational smear referenced below has now quit the New York Times, trying to stave off her inevitable firing, and ironically alleging “bullying” and other dubious claims. It takes one to know one, I suppose. See also this post about liar and fraud Sabrina Rubin Erdelywho notoriously concocted the UVA #fakerape story

Few circumstances in modern psychology, sociology, or policing allow us insight into the nefarious practice of gas lighting and official source anomie than the case of ritual defamation, which is widely used in policing, and especially in DVIC gray area policing aka “community policing.”It is this gray area collusion where many civil conspiracies are hatched these days, and I will provide an example below of such a case, and that case, where actual gang stalking takes place.
So, keep in mind that most OGS is the direct actions of local “mobs” of insiders ranging from union members to police and fire, to academics and other institutional forces working together to control an individual, or to craft, or contain a narrative. This is called “framing” in public relations circles, but also is a feature of “bad jacketing” as well. And, the preferred tool of slander these days originates in database abuses, which then frequently becomes the defamation campaign waged in the thin disguise of “police investigatory privilege” via the massive NSA-Israel–FiveEyes data theft that we see today.
So-bad jacketing and ritual defamation is a practice of religious cults and sects who work in institutions and policing, much as we saw with Andy Ostrowski in The Kids for Cash state of Pennsylvania who was targeted by Republican’s, judges, and Scientologists as well ( a virtual trifecta of OGS) because he advocated for judicial reforms, children’s rights to not be bought and sold for state incentive dollars, and more. So, OGS is political in many/most cases.
Asking “Who stole progressivism” is like asking “who stole feminism.” The answer is: the usual suspects at the Anti Defamation League and its related octopus of NGOs.
This was most evident in the last election cycle, when some noticed that the progressive party had been hijacked by an especially vicious form of hate that can only be described as psychopathic-and that, encouraged by people who “are in  the business of hate.” This is how sick our society has become-that hate is actually a business model for psychopaths and DVIC profiteers. And-it proved how hollow their ethos is.
Here is a bit about ritual defamation as practiced by NGO’s and other political elements in western societies as a form of leverage and compromise operation on a grand scale. And keep in mind that these elements used data bases, and then, as we see with many of the new fakerape’s being rolled out every day in the press, actual rapes are being conflated with mere slanderous allegations of impropriety, with the same effect as if they were actual rapes.
This is what ritual defamation IS, and regardless of any opinion for or against the “necessity” of airing all that dirty laundry, we see without a doubt that the same slanderers are involved time and time again-that those who are “in the business of hate” have left their ideological and linguistic, and tactical fingerprints all over the dialogue. This is what the Whisper Campaign IS, which not in-coincidentally, was also a main feature of the Palestinian Exodus of 1948.
So- what IS ritual defamation, and why does it matter? Well, for starters, it is very Jewish. From Yakov Hirsch, citing Laird Wilcox:

It’s important to recognize and identify the patterns of a ritual defamation. Like all propaganda and disinformation campaigns it is accomplished primarily through the manipulation of words and symbols. It is not used to persuade, but to punish. Although it may have cognitive elements, its thrust is primarily emotional. Ritual Defamation is used to hurt, to intimidate, to destroy, and to persecute, and to avoid the dialogue, debate and discussion upon which a free society depends. On those grounds it must be opposed no matter who tries to justify its use

Then, Hirsch goes on to explain how extremely Jewish the smear campaign is in cultural practice and politics, as he cites one after another Jewish whsiperer in the defamation of BDS supporter Linda Sarsour, and Senator Keith Ellison, (D) MN. Also note how the term anti-semite-like fakerape’s-have deflated meaning in such a dialectic.
Then, notice that these smears routinely appear in the New Yarwk Times, just like the original piece about OGS that inspired ROGS blog. The reader will note that my goal is to reduce and eradicate database abuse, to expose political psychiatry/psychology in action, and, to protect future victims, and also provide help for others who are actual TI’s from all folds of this dialectic. But also, to call the blackmailing cockroaches out of their hidey holes.
For me, I encountered people who used the tactics of Gavin de Becker, who is also a Department of Homeland Security contractor. So, for me, there is little doubt that this is one function of this agency, and it’s IA styled black cash hidden domestic operations. Unlike each and every other blog about OGS, here, I provide evidence of these operations, and links to the wider dialectic
Here is ritual defamation in practice, and it is important to note that it is not a delusional complaint:

The reason for this discrepancy over Sarsour is explained by understanding why she is being defamed.

What Linda Sarsour did or didn’t do is irrelevant; the goal is to make her Palestinian perspective taboo. We see more evidence that Bari Weiss has that frame of mind from her description of Congressman Keith Ellison in her same “hate” article. How does Weiss refer to Congressman Keith Ellison?

“Recall that only a few months ago, Keith Ellison, a man with a long history of defending and working with anti-Semites, was almost made leader of the Democratic National Committee.”

To be clear, Bari Weiss is calling Keith Ellison an “anti-Semite.” Non-anti-Semites don’t “defend” and “work with” anti-Semites. But the question that arises is that we know Keith Ellison is not an anti-Semite. Listen to the Jews who know him best….That Ellison is not an anti-Semite earns him no protection from ritual defamers like Weiss.

….It is noteworthy that Weiss’s conscience is clear, that NYT readers will leave her “hate” column believing Keith Ellison hates Jews. Anti-Semitism is a stain Ellison will never remove. Think of the real world “hate” Weiss intended for Ellison. But Keith Ellison being a “Muslim peacenik,” as JJ Goldberg called him, offered him no protection from Weiss. Because from Weiss’s right-wing Jewish perspective, Keith Ellison has a “forbidden attitude, opinion or belief” that must be made taboo.

We clearly see that ritual defamation is both a feature of politics AND a main complaint of those who are gang stalked. And with little to no doubt, we see that organized gang stalking is in fact and practice, a very Jewish tactic-but also a mob tactic- of social engineering and control. In the example above, we see it toxifying progressive politics, and revealing Jewish racism, but also, we see that all roads lead to Israel, no matter whose side you are on. It’s a win/win for that lobby.
Now, let’s look at community policing for signs and symbols where social interactions can be forensically analysed to see if they are affected by OGS; to see what kinds of politics are involved. But also, to see what kind of “electronics” and databases are used to target individuals.
Here is a case where Bijan Ebrahimi, a crippled immigrant, was pedofied by local police and community stalkers who likely were on his internet connection. “They” eventually murdered him, and set him on fire after a seven year long stalking, and some 80 calls to police, where he was “framed” as an unstable liar, and a pedophile. Welcome to the new religious theocracy! And, the “scapegoat” of Catholic and Jewish rituals, and kabbalists.
Here below is a comment from 2004, when both the internet, and organized gang staking as an occut practice, and gang stalking as a political and social engineering tactic took hold across America. Note the specific name of a specific council member who was named in the blog, the use of coded symbols, the mention of ‘mob’ activity’, as well as elements from police and firefighters being implicated as stalkers. Then, notice that license plates are being tracked (click the link to the full article).
This license plate tracking is not insignificant, because as we saw in the case of the Electronic Peeping Toms of Minnesota and the police stalking of Minnesota reporters, journalists, and lawyers around 2011 (just after the DHS ramped up sectarianism and selective enforcement of law and surveillance) TODAY, we see Automated License Plate Reader’s (ALPR’s) in use across the country. Imagine the impact on or political climate? Then, add the NSA full capture database that has been collected since then…..
From LA Indy Media in 2004:

How to otherwise explain the kids all driving around with the decals?
Well, we make them nervous. And they should be….if they are breaking the law.
Maybe this is why GEORGE NAKXXX, YAKUZA BACKED STATE ASS-EMBLYMAN, gets so much support from some firemen’s cells – uh, we mean unions.

I have preserved this conversation here as well, because frequently, webwashing takes place just AFTER I write about or document online evidence of OGS. But like the example of Who’sA Rat which I provided here, from that same era, we see that OGS is very real, and that attempts are made to control the public’s insight into this nefarious practice. And, so, here we see state paid and union backed actors actively subverting the law-or in the least playing hide and seek on state dollars.
Lastly, here is more about RD from Aletho News:

Ritual Defamation: A Contemporary Academic Example

By Daniel McGowan | Dissident Voice | September 22, 2017

The term ritual defamation was coined by Laird Wilcox to describe the destruction of the reputation of a person by unfair, wrongful, or malicious speech or publication. The defamation is in retaliation for opinions expressed by the victim, with the intention of silencing that person’s influence, and making an example of him so as to discourage similar “insensitivity” to subjects currently ruled as taboo. It is aggressive, organized and skillfully applied, often by a representative of a special interest group, such as, ironically, the Anti-Defamation League.
Ritual defamation is not called “ritual” because it follows any prescribed religious or mystical doctrine, nor is it embraced in any particular document or scripture. Rather, it is ritualistic because it follows a predictable, stereotyped pattern which embraces a number of elements, as in a ritual.
Laird Wilcox enumerated eight basic elements of a ritual defamation:
First, the victim must have violated a particular taboo, usually by expressing or identifying with a forbidden attitude, opinion or belief.
Second, the defamers condemn the character of the victim, never offering more than a perfunctory challenge to the particular attitudes, opinions or beliefs the victim expressed or implied. Character assassination is its primary tool.
Third, the defamers avoid engaging in any kind of debate over the truthfulness or reasonableness of what has been expressed. Their goal is not discussion but rather condemnation, censorship and repression.

Now, when  factor in these facts above, and add to them the “delusional complaint” of schizophrenic paranoid anxieties about whisper campaigns, we see a new picture emerge, and it indicts this practice, and the official source gas-lighting that gies along with it.
I ask the reader to look back upon my thesis and do their own homework now. But also, to note how easily Big Pharma psychologists and prison profiteers work within the OGS Big Data abuse schemes-they are the perfect mockingbirds. Because crisi public relations firms do more than just create messages: they monitor them too, and that, sometimes in real time as the monitor individuals.
Related Story: The Association of Threat Assessment Professional(ATAP ) calls OGS the “colluding parallel investigation. ” ATAP is also on record linking the police and private contractor, multi -agency blur of “community policing ”to gang stalking. But also, to agencies that are affiliated with Fusion Centers, and who literally practice what is called psychological operations.

How to document organized gang stalking: Gavin de Beckers perverse philosophy and blackmail

In order to document gag staking and gang stalking, you have to have a “starting date” or an approximate “date of onset.” In psychology, the time or date of “onset” is also a feature of a mental health diagnoses. And, as I demonstrate repeatedly psychologists and the “healing community”are weaponized, and politicized, and frequently-especially when the FBI conspires to recruit them in political gang stalking-that countering violent extremism programs are merely COINTELPRO 2.0.
In my case, I not only have the exact time and date where actual blackmail based on political causes (cause stalking) occurred, but also where the tactics and methods of “multi-stalking” took over my life and internet connections, and phone calls entirely- November, 3rd, 2011.
The issue’s then were free speech and first amendment, anonymity, and how hidden operations were taking place online-and I was an early exponent of actual transparency, which we see today that the internet for some is the “god” with which they perform black bag jobs, wage morality campaigns, entrap our children and manipulate their minds and more.
And, those who did it-did it for for decades-frequently quoting from Gavin de Becker’s tactics and techniques of blackmail and slander in the name of “security.” Same eastern bloc blackmail tactics, different century. Here is one example (feel free to sue me for this)-and get out your ROGS BINGO card:

“The damage that could be done to him simply should not be considered. It is irrelevant to any considerations.”
Would you want his blog taken down? Or a letter-writing campaign warning his employer? (Warning an employer privately is another of Gavin de Becker’s professional tactics.) Would you go looking for his personal info to see where he hangs out and who his friends are? A simple missive giving the basic information on the off chance that that will shut him up is sufficient. If one wants to out him.
Would you go looking for his personal info to see where he hangs out and who his friends are? Do you want to send warnings to his family members or his Facebook contacts or his local newspaper or volunteer organization or whatever? Do you want his real name and blog, atheism and all, just floating around the net so that any prospective employer, journalist, competitor or social contact can find it IF they look? (This came up with nursing-student x’s rant, though he outed himself.) Is it okay if someone ELSE does any of these things without consulting you? (Giving his name to other people privately still increases the odds that he gets outed by someone.)

I had been aware for many years that I was a target of entrapment and conformity campaigns-but unlike the 99.99999% of everyone else-I simply cannot be bought, leveraged, blackmailed or compromised-I have seen this sort of gray area policing and social engineering before in many places in history, where due process is a burden for those who prefer official source slander instead. They call it “totalitarianism” and it happens in dictatorships and banana republics; it is the preferred tool of Jewish shtetl’s, the Judenrate, and communists; fascist monarchies, right wing para-military coup led nations; family courts and bordello’s, street gangs and prison snitch operations and worse.
Indeed- a sort of “detachment” occurs in people who are subjected to long term trauma, where they simply cannot relate to the bizarre circumstances around them, when a sort of total theater occurs. But this is what OGS is designed to do to people as well, and the 1960’s version of these programs proved as much.
But unlike others who have endured these long-term institutional sociopaths, I also have names, and IP addresses-and a dialectical and linguistic chain of evidence that verifies my story. Without a doubt, and for the sake of others who are victimized with political policing or CVE programs- I will lend my name to the evidence I present herein. And, I can name names all the way up the DVIC food chain, and DHS/FBI/DEA/CIA who perpetrate sectarian, religious, cultic OGS-and all of that starts in local police departments.
And- I have actual damages forthcoming. But this is how difficult OGS is to document-from today, forward, it has been a seven year long process. So- I wrote ROGS so that YOU can be quicker on your feet and document these people who are undermining due process, and democracy, at our internet switch-and stalking targeted persons after unauthorized abuse of access to data and dossier’s.
Here is the basic case:
I was once an active constituent in a community, who wrote in pseudonym’s online, and influenced major political dialogues. I also activated for progressive causes, but also for the Constitution, the first amendment an due process. As you will see throughout ROGS, some progressives are in conflict with due process as they seek to create their version of change, which, without irony, is exactly what a certain class/tribe/sect/cult of people did in Russia in 1917, in Germany up until 1932, in Rwanda in the 1990’s, and other places ongoing and in many other socialized/communized places across the world.
So, here is my personal case study-which I have used to “diagnose” other exampes from other peoples lives, in order to semantically divorce the psychological gas-lighting on this topic from the semiotic truth behind them as instances of blackmail, entrapment schemes, leverage and compromise operations and more; and to “bring the blackmail into the light.
In my case, I was being blackmailed by a literal, local “gang” of political persons connected to actual gangs, political offices, and police power. It included well known political machine, database abuse, a whisper campaign, and of course-gray area policing which I have documented across the dialectic of ROGS, on this very blog. But I can name names, and will do so in the proper forum.
However, in my case, it took me years to find the data from the original blackmail attempt, which I am now in possession of. I came into possession of the knwledge of this data a few years back-but I did not have the actual links to OGS, or thw actual data that I provide now. AND: using my method, I can help YOU speed up your case of civil conspiracy, but ALSO I can show you where to look for your blackmailers.
Here-have a look at a comment that took me nearly seven years to find, because the people who conspired then actually hid the evdence of it afterwards-so, my personal “civil conspiracy” discovery moment started three days ago, based upon my discovery on 11/10/2017 of an entire internet conversation that took place online around seven years ago. And it is important to note that my personal blackmailers spanned continents from Australia, and England, and frequently cited Gavin De Becker’s work.
My personal blackmailers occupied state offices, police departments, and non-governmental organizations; my stalkers were linked together through collegiate email’s, and institutional databases. And all of this-is so far beyond the grasp of mos targeted speakers online that it is simply no possible to capture them at it, unless you know where to look.
I started with linguistics, and what at the time i had no words for, which we know now as the CVE schema working under the DHS as a de facto modern COINTELPRO. Proving even one case is the beginning of tipping the world in the right direction, so you can have a look at my case here.
Gavin de Becker is one of the many heads of the DVIC hydra that derives weaalth from exploiting people in secret, using illegal practices that, if discovered, can hep you gain legal standing to sue “these people” in court, but aso, to validate OGS as a hidden practice.
Becker’s techniques, you might recall, are well known in blackmail and compromise operations-and frequently found in online dialogues of organized gang stalking. He is also a major DVIC profiteer, and a moral campaigner, pandering for federal dollars, and his “work” is linked across the country in all kinds of civil conspiracies where organized gangs of DVIC stalkers and crybullies use the internet to spy, selectively target and enforce,  cause harm, and then play victim as those who they targeted respond with unorthodox or irrational practices, such as we see with altRight trolls DOXing the crybullies today, the way these flying monkey’s targeted the altRight several years back.
Here below is the ONE comment from blackmailers. One of them-the one who inserted dialogues about de Becker- at that time had an IP in Los Angeles CA, while others worked from Australia and the midwestern states of the US; and several were academics active in politics, political figures ranging from senators and lawyers, federal agents and others who were then selling the tools and toys that Edward Snowden revealed. I can and evntually will document it in it’s entirety-but this is where our current hidden police state, mediated at the ISP level began.
How does internet policing take place: proof of organized gang stalking via state vendors and offices 101
The first comment here is not the primary blackmailer, but rather, part of the “ideological echo chamber” that was formed by five specific participants and ONE actual person who  claimed to have “my” data” and that data from a state level database.
Then-after I called them out for blackmail? They literally conspired, in the definition of the term “conspiracy” to webscrub their trail. This all happened on a major web platform, on a international forum, and it took considerable political clout to cause a major web provider to webscrub an entire web forum-but they did it. And-someone else saved the data elsewhere; and all of this has left a vast web presence.
Meet my blackmailer, and note that actual political offices have been elected to, and actual database thefts have occurred, real estate markets and public policies impacted-and all of that under the watchful eyes of “the good guys and gallies” since this event happened November 3rd, 2011.
Note the layers and subtleties of the threat narrative based in gray area policing tactics-but also note that ACTUAL blackmail and that, from state and federal, and local databases:

Blackmailer says: One of those decisions is easy. I know who “x” is. I’ve met him, in fact. He’s local to me, but that’s all you’re going to find out from me about who he is unless I think someone’s safety depends on it. This is partly because he’s the only x I’ve seen actually engage in activism–for racial minorities rather than men who feel abused. It’s partly because he is actually a victim of a system………It’s partly because I know someone who has access to protected information about him.………………
Blackmailer says: Now a meatspace acquaintance of his has found out what he’s been up and was not made any happier by the revelation. In fact, this person took x’s real name and gave it to x, one of the people x’s been particularly ugly in attacking. We’ve been discussing what to do with it. The location checks out with comments he’s left on x, where he’s banned but morphing to leave x-style comments. It’s also checks out with regionalisms on his blog. We’re confident of having the right guy. We just have to decide what to do about it.
The uses of pseudonymity have come up in the discussion, of course, and there is an argument to be made that the power is on the side of those of us making the decision, We’re all well-connected and respected.
So the challenge is this: Knowing what I know, having the information I do, give me a good reason why I’m not morally obligated to attach his real name to this kind of behavior as publicly as I can.
Anon:4214 “#4208 & 4211 So you two are saying that x actually has some private information which reveals some of the commentators here to be self-serving
ROGS says:It’s getting so Soprano around here…!
The only actual defense to secwet information held by blackmailers is a full publication and a map to the addresses, and/or other easily obtainable public information, or local info about the personal places, people and things–the habits of a blackmailer, and the3ir enablers.
The trick with blackmail, though, is that the identity of the blackmailer is supposed to be secwet too! Not such a good job when the blackmailer outs themselves though.
And, if the maps and tax records, and local calls to the housing inspectors and so forth doesn’t get ‘er done–or some random madman with a vendetta doesn’t show up– you presuppose a few truly anonymous, super secwet, out-state Big City boys with black gloves, binoculars, bathroom photographs,poisoned pet baits, and tire irons can do the deeds–just for good jolly laughs and all.

The reader will note my attempts at humor, in the face of those who are engaged in blackmail or attempting to compromise me. As I have said-humor is your best defense against this vast conspiracy, where institutions, colleges, police power, and politics seek to compromise and individual-they are mocking due process at every step, and with impunity, because the individual is seldom aware of what hit them. One can only parody such blatant, endemic  corruption. It is also a good way to call it what it is, rather than fall prey to their blackmail, and adopt their terms.
The reader will also note that everything I said in the last paragraph is exactly hat had been done to me. All of it except the poisoned pets, as I had been under OGS for nearlysix years BEFORE they began the blackmail-and as you look through ROGS you will see other evidence of my claim. But you will also note the distinct absence of many other features of the ROGS dialectic-for instance, I will not at this time provide an answer to “why do victims of OGS use strange language, or adopt linguistic and dialectic conventions of OGS that other blogs have in them?”
The short answer-and why ROS here is an incomplete story with minimal evidence-the short answer is tha the story itself didn’t come to me for free, and it cost me actual damages. The story, then, is to “be sold, not told,” as one censored writer once said.
My reader will note that in cases such as Harvey Weinstein, and in the general media today, we see certain blackmail tactics and techniques being hidden behind law office fronts, and state level investigations in the name of counter-terror, but make no mistake- these are political blackmail schemes at their very center, and public officials are involved .
And so we also see these campaigns of leverage and blackmail ensconced in the colleges and in the NGO’s( the case of Rose McGowan and how Weinstein hired Black Cube to follow, harass, intimidate, and blackmail her, provides us a glimpse of how all of this works-get out the ROGS BINGO card for these cases.)
And, we see college servers being used to plot nefarious crimes, and which hold vast troves of evidence of how “counter-terrorism” has been translated by some as “political opposition and dissent.” Then, we also see that these counter-terrorism “service providers” are in fact and practice involved at every level, as we see in my case, as Gavin de Becker was frequently cited in a make-work project that spans the depth and breadth of liberty, lie a wet blanket..
So- in my case-which spanned decades, as the internet grew and “evolved” with the hep of well disguised hidden actions and hidden actors-and of the mysterious and “delusional complaints,”and comments that “gee the cops can’t seem to help out” we see now, the psychologists are in on it,  as are the entire DVIC industries of wholesale exploitation of persons.
I have provided for you, the reader, a glimpse of my seven years of research. And there is so much to these cases that it simply boggles the mind of anyone who is targeted by firms like de Becker’s, and political machines that are state and federal level stalking. I am simply not one who can be blackmailed, or compromised-and this is what OGS is primarily.
If you read through ROGS here, you will see how you can build your case, or refute the case they are trying to put on you. And you wil see that at every single level, politics are involved, and investigations under color of law and authority. You will also see a vast bleed-over between military operations and stalking of civilians.
You will see that, primarily, the vampires who despise free enterprise, and who derive their financing from nursing the state teats are those who are most often responsible for OGS. This is the primary tool that some are using to create their version of a “new world order,” and none of it follows la or due process-and ALL of it starts and ends at our access to the internet.
As I write this today, I note that some 11 nations looked in here yesterday. And, I also note that the news itself is reporting what I have documented since 2004. This web of internet crime that has at it’s roots zionist and dominionist elements work in secret, in darkness, to pervert law and civilized discourse. The problem isn’t words- the problem is the billions of dollars that ave weaponized speech, and use it against us in the great goal of recreeating the dark ages, a time when their versions of God, god, G-d, G_d, Gawwd, and God Damn for all of us to cower before.
But as a a student of history, I saw this coming in 1993, and began writing about it-but the obstacles that I faced then have only increased, as others made billions to suppress my words, compromise me or my choices, or outright sabotage my reputation.
And so it is that last point where I began to write ROGS, as they have revealed themselves as what I say “they” are, whoever “they” are. And today, we see that nearly all MSM is beginning to write about what I wrote then.
This is not insignificant-as I have long been a target of many nefarious actors, working from hidden capacities ranging from crybullies and fraudster’s to  local masonic elements, to NGO’s that are dependent on the state teats to college administrators and counter-terrorism fake hero’s and computer programmers in Infragard; Ruby on Rails designers, and programmers;  to stall and obfuscate these simple truths that, when viewed in totality, are quite a complex web of interconnected conspiracies in and of themselves; but that ATEOD? A really just a simple thing in practice: it is organized gang stalking, and it is how a corrupted Democracy works in it’s end days.
And when I lifted mysef up from the ashes of this vast and terrible thing, I discovered only one simple fact: no matter how complicated all of this is? There is ony ONE conspiracy, and I am NOT part of it.
It is the conspiracy of silence around how these things work against a demoocratic government; and against law and due process-and now, you are listening, and hopefully, ending your own silence.
But one thing that OGS is NOT: it isn’t “delusional people” on the internet-it is people who have no idea what hit them, who use the words that scumbags and security contractors, cultists and sectarians and DVIC teat suckers give them to describe their experiences after raping their privacy, and wasting their time. And I will have no part in that, because first they came for the crazy guy on the internet, and I said nothing; because I wasn’t the crazy guy on the internet. And then….

Facebook admits to using actual mind manipulation on children: gang stalking and paranoia

Day after day, we see the ROGS thesis validated in the MSM now-and it is no surprise that this blog is slowly becoming an “opinion leader” on the topic. Less surprising that it is also highly targeted by hacking-in fact, my Tor browser is literally seamless today, and it loads pages in rapid speeds (which NO ONE has ever written in context to Tor, ever.)
But, Facebook investor Sean Parker admits that Facebook does indeed manipulate children’s minds. And:  Facebook does indeed manipulate children’s mind’s personally, individually, AND INTENTIONALLY. Here- have a look at mashable.com’s analyses of that.
I suggest that we revisit Dr. Lorraine Sheridan’s and David V. James thesis again about targeted individuals-and especially to revisit the questionable work of other psychiatrists and psychologists who deny that the internet and “mind control” are delusions-because Facebook DELIBERATELY manipulated the dopamine receptors in these kids minds.
Related Story: Right Wing disinfo outlet wraps the FBI deletion of Texas shooter Devin Kelley’s Facebook posts in gibberish to hide whatever “mind control” had happened there.
And: in order to understand ROGS many thesis-get out the ROGS BINGO card now, and have a look at the mind contrl aspects as they relate to suggestibility; and my many other thesis statements, and my main thesis of influence operations creating mass shooters-and to see how prescient and not-full-of-shit my theories are, have a look at how Sean Parker slams the sh!t out of Facebooks “mind control,” and look around the internet to see hat ROGS has been right ALL ALONG. And I did it for free-see? I didn’t even need an MRAP or even a donut shop to park it at- I did it free!
1570435771780
Wei Ren Min Fu Wu indeed. Conspiracy theory indeed:
Move along Dr. Lorraine, and Dr. David-and all your hench-persons in  Big Policing and all of other Flyying Minions in the Rotary Club-nothing to see here-mooooOOOOOOOOoooooove along now *oink.*
No one wants your police and surveillance and Big Pharma dope state anymore- or the exploitation of narrative (aka total bullshit, fear mongering and lies) that comes with it-go sell it to the Saudi’s-but eave me out of it.
From Mashable:

Sean Parker made billions off of Facebook. Today he basically called it evil.

“the goal was clear: “How do we consume as much of your time and conscious attention as possible?”
The key, Parker added, to keeping people focused and returning to Facebook was to give them a steady, dopamine drip of validation.
“The inventors, creators — it’s me it’s Mark [Zuckerberg], it’s Kevin Systrom at Instagram… it’s all these people — understood this consciously, and we did it anyway,” said Parker.
Parker said he now worries that Facebook is changing society and “God only knows what it’s doing to our children’s brains.”

Well-knowing that NOW certainly doesn’t get me, or others like Jeffrey Kantor, who is suing Apian Corporation any closer to having the legal standing to get the evidence we need to sue this state-corporate collusion. Hmmmm.
But ROGS is on the case! I don’t need to protect MY pension to do the right thing, and lance this boil that is the security and surveillance state!
And LOOK-
I can write in it as easy as if I was in Opera, or Firefox. And not a single j-script error as I noted the other day, while this version was under attack for hours. It’s sooper fast! Where have we seen the deep state improving the user experience before, and making it easier, faster, and more accessible? Oh, yeah! They did that here  and Mike Masnik of Techdirt covered it well.
Masnik, you might remember gave us the concept of the Streisand effect, where, when a person or an institution tries to suppress discussion about a topic it gets more popular. Gang stalking is one of those topics. But also, Mike Masnik covered Jeffrey Kantor’s lawsuit about organized gang stalking practiced by DHS funded security apparatus assholes.
You might remember Kantor’s lawsuit, because he is Jewish security contractor, and he was stalked in a highly christian locality. Well, if you don’t recall Kantor: here is a bit about it, and it happened in the pre-ROGS era, where these low-life brownshirts and their flying monkey’s waged 1948 Palestinian Exodus styled whisper campaigns about people, and tried to ruin their lives, using that sh!tbag DHS contractor Gavin de Becker’s Nazi-esque tactics.
And, Mike Masnik ALSO gave us the concept of the Shirky-Masnik bureaucracy perpetuation principle too, which states that “police states don’t just go away easily- they squeal in high heels, and re-brand themselves to a new group of political cunts for whom power is the ONLY goal.
You know: feminist jurisprudence and it’s many headed Hydra of “it’s for the children” saviors- the Ends Justify the Means Peeple, aka the “DVIC” and all of its handmaidens who would get on their knees for bankster bucks, but sell ther own sons for cannon fodder.
Or, who skin them, and turn them into Prison Industrial Complex bed liners.

High Risk journalism and "symbolic interaction" theory: the blogger/journalist/writer as a threat to Ich, Du AND the matrix, part 2

THIS POST AND ITS COMPANION, PART1,  IS DEDICATED TO “BULLETHEAD,” A HOMELESS MAN I MET RUMMAGING THROUGH A SALVATION ARMY DUMPSTER, COMBING THE POCKETS OF DONATED CLOTHES, LOOKING FOR CHANGE ONE DAY. BULLETHEAD TOLD ME “I NEVER HAD ANY PARENTS-THEY DUMPED ME IN A PARKING LOT AND LEFT ME THERE AT 17 DAYS OLD.” AS THE READER MIGHT GUESS, THE SYSTEM I DESCRIBE HEREIN PREYED UPON HIM FROM THAT DAY FORWARDS, INCLUDING MULTIPLE FOSTER CARE ARRANGEMENTS AND THREE STINTS IN PRISON.

So- if one thing is clear to the reader of ROGS, I hope it is this: this entire blog is a Giant Fuck You to the surveillance state, for the sake of whoever it is that comprises the part of “we the people” who are part of the lowest tiers of our two tiered society, and who are most likely to be oppressed with organized gang staking.
And ROGS is also an act of civil disobedience in the spirit of Thoreau, or Socrates and as such, has increased the likelihood that I am a target of the many cowards who work “in darkness” to stifle speech itself at the site of the speaker. In my earlier incarnations as a writer, who is not a collaborator or a Judenrate spokesperson, I followed the rules of a pre-fascist America, and was sorely punished for it, starting in 2003-4.

Related: Fighting with words What is Civil Disobedience, and how you can use it to fight organized gang stalking in the internet era. Especially look at point number four, here, about “dismantling unwanted enterprises.” With certainty, we know who does it, why they do it, and now, you know HOW they do it-and to whom. I have named many of those I encountered in my journey of forced conformity to the emergent post Constitutional police and surveillance state, but you might find many more who have contributed to your personalized stalking by state agents and “community policing” initiates. And, the ACLU asks “What’s Wrong With Fusion Centers?”

The active reader here will also notice that OGS is highly personalized, and that it takes place in the hidden spaces of online discourse, “disrupted” by hidden state agents and agencies, and as such, incredibly difficult to document. As we saw in the case of Andy Ostrowski being hauled off  for using words, we will see increasingly more common in America and the west in general. And so, it takes special tactics and special tools to first reveal it, and then, to cause/force/ or cause to be revealed in open public spaces, like court rooms, before juries, which is the last resort in corrupted Democratic states.
But it is simply beyond the means and resources of one person to attempt to reveal this new version of MHCHAOS/COINTELPRO 2.0, much less build a counter-resistance to it, or to be able to reach out to those targeted individuals who have no idea what they are going through-and so I have resorted to unorthodox speech conventions and narrative, as well as pointing fingers at those who are part of the nation-wide gas-lighting on this topic; and all of this complimented by unorthodox methods of discovery of things as yet to be revealed.
And so, I have met the enemy, and it is mine; but too,  yours now.
As I have demonstrated links between psychologists, propaganda and influence operations, hidden technologies, policing and intelligence agency tactics and methods of gang stalking-and especially, the direct and articulable involvement of “secret societies” and religious sects and cults that work within our institutions-and in direct contravention of those who claim OGS is a delusional complaint (and especially as I have differentiated apophenia from epiphany, and also, encouraged the need to separate the dialectic into two parts that disregard the disinformation tropes of “electronic DEWS, and poisons, and UFO’s, etc.”- I have demonstrated that it has links to many well known and well documented “usual suspects.”
The Department of Homeland Security and it’s 77 Tentacles of Speech Suppression combined with hidden whisper campaigns and slander, stalking, and bullying are the Primary  Suspects-and the Coordinated Attack on the Constitution is the Clue-naming names takes time.
Since the Department of Homeland Security, and it’s 77 tentacles called Fusion Center’s that stretch across America with the goal of monitoring “pure speech” is actively disrupting and subverting our Constitution-and indeed has targeted people who write about this online-it is important to look at a phrase that those who work in that schema deploy against speakers.
As usual, I encourage you to avoid nearly ALL discussions of mind control online, and stick to what we know with empirical facts,that can be researched, and tested as hypotheses such as the fact that the US budget includes nearly a billion dollars for crisis PR alone, and this includes intensive and blatantly political “influence operations.”
But here is a general opinion about “mind control” and the matrix(the first link or so in Google)-and it cannot be dismissed that the matrix is a common, well known phrase in police and intelligence dialogues. It is also part of a constant and pervasive threat narrative where cyber-stalkers mock their victims.
The phrase is “hyper-dimensional matrix attacks,“(HDMA) which is related to another phrase, which is “threat matrix,” and then a stated goal of the United States Military Industrial Complex working within the DVIC and the DHS and also working with internationalist NGO’s and “mystery money billionaires”: “full spectrum dominance.” It cannot be understated that as zionists work with the equally fanatical dominionists and other to force upon us the Hegelian Dialectical binaries-it is a lose/lose for Constitutional rights and due process.

“If you are wishy washy, agnostic, and conservative in your decision making, perhaps because you’re afraid of making mistakes or being definitive, you will receive constant attacks because you’re straddling the fence and that is where you’re most easily tipped over to either side by the least amount of force.” from Montalk.net, which takes its name from a well known CIA base of operations, and which is interwoven with mind control programs and influence operations.

Then, there’s the feature that those of us who refuse to “choose,” or who repeatedly and with vigor flee from these people, are targeted and severely harassed by these hidden internet operators who are incentivized by United Nations funding, to the grassroots local level, and all of this on top of the burdensome Five Eyes and Israeli cyber-squads of speech police.
And, we see time and time again, that persons incited into acts of terrorism frequently describe that they were ‘forced to watch ISIS videos’ and other odd claims-claims that have merit when we see the process of HDMA in action, and that semiotic analyses is necessary to liberate the ‘occult meaning’ from the facts on the ground.
Here- have a look at the various “spectrums” involved with harassing this one random  person whose cell phone has been hijacked. And ask yourself how many ‘dimensions’ of dominance are being exerted over this individual:
[youtube https://www.youtube.com/watch?v=DAuEcd5hlio&w=854&h=480]
I get a lot of readers who are affiliated with military or intelligence, or one of the thousands of heads of the Hydra that is the interconnected “goodguy and gal” organizations that stalk “we the people” when we express ourselves online, and attempt to utilize the first amendment* and who then stalk speakers offline.
How do I know that about my readership? Because I am an unpaid profiler myself, and, just like some of my readers, I do this for fun-and because it needs to be done, in order to attempt to repair or restore our flailing Praetorian Democracy. I simply had NO CHOICE but to learn who it is that is subverting the internet (hint: it’s NOT the Russians or the Chinese).
And-with empirical certainty, I can tell you that deep state players who are ideologically Republican, AND Democrat are united in this endeavor-as if somehow, partisanship disappears at the hidden doors of the Fusion Centers and the military bases and the unified goal of InfraGArd members who hide behind screen nyms and think tanks, law firms, and “human rights” organizations has as its goal the ultimate downfall of our own nation AS a nation-because this nation was founded on privacy first-and speech, association, and assembly only after that.
But also, I am an avid profiler and well aware of police psychology especially-because in the early days of internet gang stalking, where military trolls, and police and agents and agencies hid behind the internet switches, manipulating blogs and search results, I was far ahead of the curve in watching this new tech-savvy police state grow up around our democracy. In fact so head of the curve that recent stalker-a “block captain” who knew some details about “my” private life-he said ” yeah, that’s what we’re worried about.”
Yah, Who TF are “we” is a good question indeed. Apparently, they don’t want all these seekrits to spill out-they don’t want others to know what I know about how this top down suppression of speakers goes. “We” indeed.
And, I have literally been stalked, stopped, and questioned for decades AS I WROTE stuff online. Yup-that sound too unreal to be true doesn’t it? Well-because y writing is part honeynet, and part observation and commentary, I will leave you to wonder about that claim. And, because one of the chief threats that these make online is “yeah, it would cost a ton of money for you to prove what yu are saying.”
And also, as we see with the recent Intercept article that chronicles the set-em-up and knock-em-down methods of the Department of Homeland Security real estate racket’s that draws from database abuse of citizens going back over 16 years, yah-and that, accompanied by the “delusional beliefs” that gang stalkers target real estate(which I have documented for years here, here, and here, and all over the web generally) yah- I know what I am talking about, and THEY do too.
And so I learned how to profile those who are profiling us-those who themselves fit several categories of DSM-5 mental illness-those who are themselves cyber-stalkers. And as I show you here, and here, and in many other places on this blog, I kinda know what I am talking about.
SO-because policing has itself evolved from a “protect and serve” model to one that can only be called deep state black operations styled after what Robert Parry called a “Fooling America” we to have to change our ways of seeing the world-and our safety in it-we have to find a third way, and perhaps a fourth in order to escape their binary slaughters.
The word is mightier than the sword. how pure speech can be a vehicle to force them to challenge YOU in court: use their language wisely.
So I recommend that you read a few of the blogs that those who are stalking you online read. And- it;s hard to beat PoliceOne when it comes to the mindset and the jargn, and the argot language that demonstrate the thought processes of the lower tier foot-soldiers in ordinary policing.
Then there’s the threads on Reddit.com, where you can watch both covert investigations AND covert harassment happen to ordinary citizens who wonder about topics like gang stalking. But also, as I demonstrate here, Reddit is invaluable for finding conversation from intelligence agents, or others in the lower echelon IC community, or it’s affiliated circle of relations.
But to truly understand someone, or a group of someone’s who approach you with hostility and violence, as if you are an adversary, you must know the mind of those people from the perspective of psychology. While sociology is a great starting point, psychology is the upper-tier gibberish that helps you understand their motives, and reasoning-but especially helps you to “get inside their minds” as psychological operations that they use every day against YOU can be waged back, so that you can wage “free speech” online.
The actual proper name for organized gang stalking is police and counter-intelligence stalking. But when you use that proper name, you become a target of these hidden operations, as words-and especially words critical of this huge ca$h cow, are a “threat” to their paychecks, and the fraud of these terror creation factories.
There are many blogs online that talk about police psychology, but one that I have peeked into lately is www.policepsychologyblog.com , which is where I found some discussion on Hamish Brown. Mr. Brown, you might recall is the guy who travels the world advising police that they should stalk suspected stalkers-but also, this eye for an eye mentalty has affected ALL OF POLICING, it is also a tactic of social control-as we see time and again that police stalking (which is the actual proper name for OGS) is increasing across the west, and America in particular. Yah, so, this guy here. This eye for an eye fellow, who even won an award for such advice is the guy who said “sure, why not adopt an eye for an eye justce, like any other fanatical religious state?(I’m looking at YOU, Saudi Arabia/)
Yeah- I am sooooo not worried about religious fanatics from overseas-Allahu Yeshua! Allahu Number 13! Allahu DHS sooper seekrit initiatives and nation wide disruption campaigns! Yup- and it is his symbolic linkage between domestic violence and mass shooters where the creeping surveillance state works its best “magic.” It cannot be missed that his involvement in secret societies across the world, and that involvement which  started when he was a spokesman for Scotland Yard-and very likely freemasonryia Scottish Rite’s and Rotary Clubs, or the attendant link now to eye for an eye justice has become a new “normal.”
And so. like I say, if your gonna get targeted and stalked, it might as well be the WHOLE army of hidden sh!tbags who police PURE SPEECH online, and that, pre-emptive of any due process to even formulate a sentence unfettered by the hobbling of our democracy negotiated at foreign switches.
Because words are just words-and stalking stalkers (and journalists and activists, and dissidents and whistle blowers, and eventually EVERYONE, cuz-first they came for….and I said nothing….) is somehow OK, here is a list of police officers and others who contribute to the blog, which is excellent reading, but also, a glimpse into the minds of those who use political psychology to control the masses.
Have FUN reading, and get a few tips about the minds of those who practice predatory gang stalking and hide it behind official jargon and argot language. Profile those who profile you. Because they sure have fun following advice like Mr Brown’s. Imagine of the whole word took Mr. Brown’s advice seriously….we might as well be a Saudi like state, chopping people hands off, and plucking their eyes out(gee, I hope I don’t get cyber-stalked, or group stalked, or gang stalked, or otherwise lose my rights of speech, assembly, association, commerce, or rights of pursuit of happiness, or privacy  not yet enumerated for this).
Here are a few police psychoogists who migh have a clue what gang stalking is-is it a “delusion????”
Dr. Douglas Gentz, Ok.
Dr. Marla Friedman, Il.
Dr. Elizabeth Thompson, Ca.
Dr. Anne Bisek, Ca.
Dr. Bill Cottringer, Wa.
Fr. Joseph D’Angelo, N. Y.
Marcus Clarke, Yorkshire, UK
Dr. Tammy McCoy-Arballo, Ca.
Dr. Ellen Kirschman, Ca.
Julie Derby Jaecksch, Ca.
Yocheved Pahmer, N. Y.
Dr. Scott Stubenrauch, Il.
Det. Gary Travers, NY
Dr. Kammie Juzwin, Il.
Dr. Laurence Miller, Fl.
Dr. Ron Martinelli, Ca.
Susan Ciano, NY
Chief George Filenko, Il.
Lt. James Kiernan, NY
Sgt. John Rogowski, NY
Dr. Robin Kroll, Il.
Dr. Robert John Zagar, Il.
Dr. James Garbarino, IL
Dr. Nancy Bohl-Penrod, Ca.
Dr. Adam Pasciak, Mi.
Dr. Mark Foreman, Ca.
Hamish Brown MBE, England
Dr. Geoff Dean, Australia
Brandon Northern, Il.
Paul Cech, Pa.
Lt. Jason Childers, Tx
Dr. Matthew J. Sharps, Ca.
Dr. Patricia Robinson, Az.
Dr. Philip Swift, Co.
Dr. LaMaurice Gardner, Mi.
Keith Bettinger, NV.

Organized gang stalking in action: Who wants to watch a case of gang stalking unfold before your eyes? Guo Wengui 郭文贵 does battle in the jiang hu.

The reader might have noticed that the things I write about could get me killed-or worse. But don’t worry ’bout ‘lil ‘ol me! In my case, I know where to point the finger, and it ISN’T at some random face in the usual suspects gallery. Nope. In my case-you can read through this bog and see where I point. Look there first for those who would do me in.
Related Story: How the “porn deluge” is used in compromise operations
But organized gang stalking is real, it is well financed, and in the United States, you are MORE LIKELY than LESS LIKELY to be “shaken down” or harassed BY law enforcement than by an “organized gang,” until you cut a deal. Because in America,  intel and counter-intel, private security firms with rats in the ranks, and retired LEO’s working under the OGS rubrik have virtually replaced any actual gang, or organized crime.

Guo Wengui. For the security professional in training, the psychologist or sociologist or FBI rat who is trying to figure out what OGS is, drive yourself NUTS! And look at the book in the background of the picture. Yeah- that book. See if you can follow the money….or die crazy tryin’!

SO, in one sense, I feel TOTALLY SAFE in America-I know that no random criminals will do me in. But those other guys….
For those who are following my thesis, this case would be a good one-in fact an IDEAL case,  where you can observe many of my thesis points in action, where you will find:

  1. real estate
  2. a whistle blower unlike any I have written about so far
  3. internet sabotage and  Facebook disappearances
  4. language with coded meaning
  5. espionage, threats and intelligence agency jargon
  6. media spin doctors, crisis PR and multi-agency involvement in “narrative”
  7. a sex charge that the TI is a “rapist” laid against the accused by his own government
  8. strange electronic happenings (just watch)
  9. hundreds of millions of dollars at stake- to answer the question “who finances gang stalking?”
  10.  counter-narrative and much much more.

Guo Wengui September 2nd Video English Subtitle: Sun lijun and Meng jianzhu’s conspiracy Episode 2

[youtube https://www.youtube.com/watch?v=aGjBsAB46fI&w=854&h=480]
And, as we see- and as my thesis maintains-there are no clear lines between who the Fed’s shake down, and who they don’t in OGS, because the lines blur in the hidden gray area-in the jiang hu that OGS is. And then, when you add the fact that retired IC persons and LEIU’s are all in on it, a person’s life becomes a sea of anxiety about “who is who?”
Oh- and lots of slander f you don’t go along with their grand plan. It won’t be long before someone or other claims that Guo is a cult member or some other nefarious and false charge by our government or his own. So 郭先生 would be wise to get some good PR BEFORE that happens.

Related Story: Falun Gong is a Cult started by a Chinese Billionaire who skipped out of China without paying taxes.
In spook world- the smoke and mirrors are designed to keep all of this hidden from you, AND make you nuts trying to figure it out, as they “bleed you out,”and blur your relational framework, and attempt to distort your associations. While it may be a cnvenient way for psychologists like Lorraine Sheridan, David V. James and others to gas light those who are gang stalked-especially the impoverished and the disenfranchised-it is worthwhile for the researcher of organized gang stalking to look a little deeper into the abyss-but not TOO deeper, which can be dangerous.
Organized Gang Stalking Case Study: Chinese Billionaire Guo Wengui Seeks Asylum in New York, from Breitbart.com:

Self-exiled Chinese real-estate mogul Guo Wengui blasted what he called the “kleptocracy” running China, and warned that a wave of Chinese spies are being dispatched to “decimate” the United States – where Guo is currently sheltered.

And, as we see in case after case, many retired American LEO’s and intelligence agents act as go-betweens, bag men, performing black bag jobs of all kinds, utilizing “intelligence” that was lifted illegally from “official databases,” as we see with the LEIU’s, and the domestic spy rngs of the ADL; and the sliding door between the FBI and corporations like Lockheed Martin, and the absolute veil of impunity around the CIA and EVERYWHERE, ALL THE TIME, and so on.
SO, for an individual targeted at the highest levels, it is safe to say that plainly weird sh!t can, does, and will happen. And when it does-who do YOU call? In America, all the switches are wiretapped, and all of the “good guys” are drooling to get at your pocket book-because they really, really like to be hero’s who “return peoples wallet’s,” but not until AFTER they squeeze a few pennies -or a few million dollars out of them.
And if that should happen, you can always just shoot me an email. I have a few ideas those “other guys” don’t have. And, I know the difference between a field and a swamp-you can bet on that.

What is "gang stalking"? It is the result of a nation that respects no laws- and a nation 'for sale.'

The article below is from Business Insider in 2012. It documents one of the first official sources that claimed the government had sold our rights to “others,” who were wiretapping the entire nation.
The article chronicles decorated intelligence officer, and NSA whistle-blower William Binney’s ostracization, and excommunication from the cult of intelligence, as well as his harassment by the FBI for trying to save the taxpayers FOUR BILLION DOLLARS- but also, that he tried to preserve “Costitutional Liberty,” aka “due process of law, which Americans have not had since 2004.
In 2012, many already knew that the local police were using and abusing massive databases. Many already knew that ‘somehow’ that police, and multi-agency Task Forces had access to cell phones in real time, and that ‘somehow’ they could track “targeted” communications across a city, or across a continent- and into international jurisdictions (Hi Toronto!)- and that they could repeat back selected words and phrases just to let them know they  are watching.
While these people didn’t have a ‘name’ for it them, we now know it is the current sate of affairs where Fusion Centers were spying on citizens in local environments outside the view of any court, and outside the view of due process of law, and without respect for the Bill of Rights.
These people have a name- they are “targeted individuals,” and here is where the world began to know what “TI’s” knew as far back as 2003-4:

NSA Whistleblower Says The Feds Are Gathering Data On Nearly Every US Citizen

NSA ACLU
The government has been collecting data on nearly every U.S. citizen and assembling webs of their relationships, National Security Agency whistleblower William Binney told the Hackers On Planet Earth (HOPE) conference last week.
Binney worked for the Defense Department’s foreign signals intelligence agency for 32 years before resigning in late 2001 because he “could not stay after the NSA began purposefully violating the Constitution,” according to a statement he made in court records.
On April 20 he gave his first interview after resigning to Democracy Now!, asserting that the FBI raided his home after he blew the whistle on the NSA’s extensive spying on Americans.
On July 2 Binney, along with two other former NSA employees, agreed to provide evidence in the Electronic Frontier Foundation’s lawsuit that alleges the U.S. government operates an illegal mass surveillance program (i.e. Jewel vs. NSA).
His sworn declaration of facts that he’s willing to testify to are both telling and scary:

• In the ’90s Binney supervised the development of a NSA program called “Thin Thread” that was designed to identify international networks of connections between people from their internet communications. Since one side of the communications was domestic, the program encrypted the data so as to protect the privacy of U.S. citizens until a warrant could be obtained.
After 9/11 all safeguards went out the window as “the individual liberties preserved in the U.S. Constitution were no longer a consideration.” Members of his Thin Thread team began implementing a program called the President’s Surveillance Program (PSP), which collected domestic electronic communications traffic without any privacy protections.
• The NSA began seizing and storing most electronic communications passing through 10 to 20 wiretapping rooms in key telecommunication points throughout the country where all data must pass in order to move from one party’s network to another’s, allowing the government to identify and analyze any individual or group through a searchable database.
• Binney cites the $1.2 billion Utah data center currently being built and the new supercomputing center at the NSA headquarters in Fort Meade, Maryland, pointing out that the immense size and computing power of these facilities far exceeds the capacity necessary for storing targeted communications but is “consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications.”
In a nutshell Binney states – with considerable authority – that the NSA has been conducting comprehensive surveillance on U.S. citizens for more than a decade.

 
[youtube https://www.youtube.com/watch?v=JuvJ7tKIF2c&w=561&h=432]

Ohio firefighter Tyler Roysdon: ‘One dog is more important than a million’ African Americans. Or קשי״א בל״א תירו״ץ

Jewish fingernail’s, dogs, and firefighters in organized gang stalking: Ohio has a gang stalking problem( and probably an ADL problem too.)
In case one wonders “who are gang stalkers,” or “what kind of people participate in gang stalking,” and especially “do firefighters participate in gang stalking,” one need look no further than the headline above to understand the mind of organized gang stalkers. Like police and other LEO’s, intelligence agents and others, firemen and EMS personnel fit certain profiles, and the police personality is closely related to other ‘mind sets’ of many first responder’s.
And, many online have claimed that fire fighters use fire trucks as a form of intimidation, or harassment, which on the surface, strikes a “reasonable person” as an absurd claim. Until we look at the personality of firefighters and other “good guys,”combined with the “profile of the good guys” who have also historically been linked to lynchings, and Ku Klux Klan activity, and much more.
Then, when we factor in OGS and Department of Homeland Security grants to Jewish organizations which are rife with racists and “dual citizens” who have no loyalty to America, the picture emerges that there could well be a “conspiracy” afoot, as Dr. Mike Wood has suggested.
Related Story: What do Jewish Groups DO with the hundreds of millions of dollars tat the get from the Department of Homeland Security every year? Where did this 110 million dollars in fiscal year 2015 go, for example? There are scientific correlations between “the rise of gang stalking” and DHS grants to Jewish organizations. And, correlations with communism, community policing, and the Hegelian Dalectic
From the MSN news:

An Ohio firefighter appears to have put his job in jeopardy by posting offensive comments to Facebook.
Until last week, Tyler Roysdon suited up as a volunteer firefighter in Franklin Township, a small town in southwestern Ohio, about 40 miles north of Cincinnati.
But, according to station WHIO, a recent Facebook back-and-forth caught the 20-year-old writing that in a burning building he would choose to save a dog before an African American because “one dog is more important than a million [expletive],” he wrote, using the n-word.
The post — arriving at a time when racial tensions are cranked high across the nation and debates are endlessly waged over what actually constitutes offensive speech — has since been deleted from Roysdon’s account. But the statement did not disappear before being spotted by local authorities.

Then, to understand how OGS has taken hold in America, a little background about how the Anti Defamation League- a Jewish hate group whose sole purpose is to stir up racism and profit from it- has infiltrated every aspect of policing and the subsidiary professions (and the public schools as well.)
Have a look at this arrest of a Utah nurse who was taking a stand for due process by refusing a cop to do an illegal blood draw; or take a look at this article about how the ADL trains American police in Israeli-zionist tactics of “us versus them,” good versus evil” binaries that do a great disservice to democracy anywhere.
Then, to understand my thesis about occultists and others working from within public institutions, and especially from within policing, to wage war on America via the DVIC, one must understand how deeply Jewish culture incubates terrorism, and how Jewish terrorists are well disguised today in most MSM narratives.
For an example, look no further than this statement, made by a Jewish zionist, to understand how zionist gang stalking is:
When Dr. Baruch Goldstein blew up a mosque in 1994 (seeing any patterns yet with the dates?), zionists huddled together and worshipped this act of violence as if it were the coming of a new messiah. The rabbi who gave the eulogy for the bomber famously said:

“One million Arabs are not worth a Jewish fingernail,” Rabbi Yaacov Perrin said in a eulogy. At the service in Jerusalem, attended by 300 people, one man shouted, “We are all Goldstein,” an opinion echoed across Qiryat Arba by neighbors who said variously that they approved of his attack on the Arabs or at the least could not judge him.
This condoning of mass killing has shocked and repulsed many Israelis, including Prime Minister Yitzhak Rabin. One funeral home in Jerusalem was reported to have refused to ritually prepare Dr. Goldstein’s body for burial.

So, time and time again, we see the rise of OGS working with other social elements to disguise both Jewish racism, and also, Jewish involvement, because Jewish terrorism is at work everywhere you look in America, from colleges where academic stalking takes place (and certainly, Dr.’s Sheridan, James, and Woods, et al, like all academics, are prone to the pull of zionist forces in academia), to policing, where we see the ADL sponsoring trips for American police to Israel, Jewish terrorism has become institutionalized.
Now- regarding superstiotions, and conformity, and influence/mind control operations, it is important to view how the statement about one Jewish fingernail has become the exact sentiment of the firefighter mentioned above-who believes that one dg is worth more than a million black human beings: the secret is in Jewish Kabballah, and zionist “othering,” aka “Ich, du,” as Dr. Mike Wood refereed to in his blog about conspiracy theory psychology.
But also, the banality of clinical, plain old fashioned superstitions, to whit “Why do Jews Cut their Fingernails Out of Order?

There is indeed an ancient custom of not cutting nails sequentially. The earliest mention seems to be in a version of Masechet Kallah quoted by the Machzor Vitry, written by Rabbi Simchah ben Shmuel of Vitry (who passed away in 1105, the same year as his teacher, Rabbi Shlomo Yitzchaki (Rashi)).1 There we are told that one should be careful not to cut his nails in order, since it can bring forgetfulness, poverty, and premature death of one’s children.2
Sounds mysterious? Well, to add to the mystery, here is a cryptic Hebrew phrase related to this custom:3
קשי״א בל״א תירו״ץ
This literally translates as “question without answer,” which some take as an indicator that the deeper reasons behind this custom are not readily apparent.4

So, it is not a stretch by any measure and metric to draw the correlation between the rise of OGS as a frm oof othering, and as a form of conformity enforcement; but also to note that it is derived from a tradition where the harassment, violation, de-humanization, and even the murder of some is ok to those whose superstitions are more sacred than human life.

Narcissistic abuse, versus targeted individuals who are frequently trauma survivors.

Few situations present a more clear picture of institutional sociopaths who are actually somewhere on the scale between narcissistic bullies and full blown psychopaths than that of OGS and targeted individuals. And certainly, the current psychology is just not up with the times, as we face the most intrusive, privacy raping, mind melding force that ever existed: the internet and the Panopticon it has created.
Related Reading: Mind Control Experiences on the Internet: implications for the psychiatric diagnoses of delusions

Trauma bonded survivors “can come to find that it can be almost impossible to relate to anyone, even family or old friends, except superficially. There is a biological craving for intensity that no normal relationship will satisfy. This provides a feeling of being totally alone, and totally empty”

Not only do TI’s fit the profile of intelligence agency assets that are easily exploited, but they also fit many criterion for victims of common bullying.
So, my  reader might find it interesting that in propaganda operations, the numbers DO indicate certain things to readers who understand the ‘coded’ nature of propaganda, and speech itself. Have a look here, at the use of the number 13 in propaganda, and then, here below for the use of the number 12. I recommend that the reader read the entire post in order to connect my thesis with military grade trauma creation through propaganda, but here below, I have simply focused on the authors number “three”

12 Classic Propaganda Techniques Narcissists Use to Manipulate You

3) The Big Lie:  Spinning a lie so outrageous that others are at a loss where to even begin to refute it.
Narcissists are convinced that whatever they say in the moment is 100 percent true just because they are saying it. Lying often comes naturally. They know that the bigger the lie, the more it may overwhelm others’ critical faculties.
Example:  A narcissist when confronted with a credit-card bill evidence of an extra-marital affair:  “I’ve never been to that hotel in my life. That hotel is notorious for making up fake check-in records and then blackmailing innocent people like me. There was a big article online about that a while back. You probably saw it. I might even have an email from the hotel trying to blackmail me in my inbox right now. I will fight this slander all the way to the Supreme Court. They will be sorry they ever made up this lie about me.”

 
And, many in the OGS dialectic complain of narcissistic abuse, which any researcher will readily find to be true based on the many online blogs about this topic; and others seem to relish their positions hidden away on the internet backbone, which gives the psychopath ideal cover to sadistically persecute those whom they target.
Then, in order to comprehend the psychological aspects of it, it is helpful to know with certainty that psychology is, for the most part, not a “hard science,” but is instead, a centuries long attempt at mind control, through labeling theory an especially, through Public Relations, hence the term “pop-psychology.” In other words, psychology is the literal outward manifestation of “the lie that repeats itself so often it becomes a truth,” despite it being a lie in the first place.
And, much like today’s current ideological basis for neverending war, we see that those who bomb others first are “hero’s” and those who suggest better alternatives are “loser’s and badguys.”
1575274396350
So lets filter the dialectic through these two “mental illnesses,” those of narcissism, meeting victims of OGS, through first examining how trite and inaccurate most diagnoses can be, and how the ‘diagnoses’ are little more than labels that indicate conformity or resistance to it, or that indicate ‘ideal personalities’ versus ‘personalities that cannot be easily realized, and then idealized by the observer.”
Look! Even YOU can spot a narcissist! (and based in current propaganda, an male th i no easily conformable to the biological clocks o 20-30 something fertile myrtles is likely to end up being discussed on some internet chat forum by one of these as one of those ‘bad men.’ How dare he find his own life/time/biological impulses more important than my own!)
How to spot a narcissist with just on question.
Now, let’s look at the profile of many TI’s that I personally have encountered, but also, which is evident from reading their blogs online: many TI’s are classic victims of trauma, and then, trauma bonding through narcissistic abuse, aka OGS.
Trauma Bonding: from abuseandrelationships.org
We see time and time again that those who are drawn/coerced/manipulated/blackmailed/pushed/other into the OGS dialectic online have indicated trauma-there are literally too many examples to point at, ranging from drug addicts swept into OGS by LEO’s, or people who have been black bag jobbed by any of the numerous security contractors that derive funding fro the DHS, to prostitutes who have been pushed by hidden forces into online discourse; to whistle blowers whose careers ended when they “did the RIGHT thing.”[the reader can use my search feature to find examples, or just Google it.]
Most sites on bullying document this trauma connection, but here is a bit about trauma bonding from the link directly above- and it cannot be missed that isolation is a factor:

Trauma Bonding

Bonding is a biological and emotional process that makes people more important to each other over time. Unlike love, trust, or attraction, bonding is not something that can be lost. It is cumulative and only gets greater, never smaller. Bonding grows with spending time together, living together, eating together, making love together, having children together, and being together during stress or difficulty. Bad times bond people as strongly as good times, perhaps more so.
Bonding is in part why it is harder to leave an abusive relationship the longer it continues. Bonding makes it hard to enforce boundaries, because it is much harder to keep away from people to whom we have bonded. In leaving a long relationship, it is not always useful to judge the correctness of the decision by how hard it is, because it will always be hard.
Moreover, experiencing together extreme situations and extreme feelings tends to bond people in a special way.. Trauma bonding, a term developed by Patrick Carnes, is the misuse of fear, excitement, sexual feelings, and sexual physiology to entangle another person. Many primary aggressors tend toward extreme behavior and risk taking, and trauma bonding is a factor in their relationships.
Strangely, growing up in an unsafe home makes later unsafe situations have more holding power. This has a biological basis beyond any cognitive learning. It is trauma in one’s history that makes for trauma bonding. Because trauma (and developmental trauma or early relational trauma is epidemic) cause numbing around many aspects of intimacy, traumatized people often respond positively to a dangerous person or situation because it makes them feel. It is neither rational nor irrational. If survivors can come to see that part of the attraction is, while very unwanted, a natural process, they may be able to understand those feelings and manage the situation more intentionally.
An excellent book on the effects of trauma (and repair) is The Body Keeps the Score: Brain, Mind, and Body in the Healing of Trauma by Bessel van der Kolk MD
Intense relationships also tend to hijack all of a survivor’s relating capacity. It is like a state of being burnt out. First, while it is very easy to become attached to a very chaotic and inconsistent person, it is simply not possible to form a consistent internal object representation (feeling memory) about them. When separated from the intense partner, the urge to make contact is usually intense because it is a stable feeling memory (or internal object) that makes separation from an important other person tolerable in any circumstance.
Second. the survivor can come to find that it can be almost impossible to relate to anyone, even family or old friends, except superficially. There is a biological craving for intensity that no normal relationship will satisfy. This provides a feeling of being totally alone, and totally empty.
 

Organized gang stalking and the porn deluge, part one

UPDATE 12-20-2019: I wrote this post that you are about to read about two years ago, and we recently saw that the Pensacola shooter Mohammed Alshamrani had been sexually harassed by a Navy trainer who used the language of pornography to slander and humiliate the shooter in front of his colleagues.  The reference was to the phrase “porn stash ”and it included the fact that the guy was also being cyber -stalked by actual FBI and Mossad affiliated cyberstalkers, making that case a complete ROGS Bingo, in context to weaponized pornography which I  covered here and then here also.

It is well documented that a persons sexuality is a factor of organized gang stalking. Some online blogs talk about Madonna’s cult and pimping. Others talk about being pedofied by local police (and some of THOSE accounts of who have complained online tie their cases directly to local police practices ), and as I have documented time and again, free agent or independent prostitutes (women who are not on the payroll of an NGO, working out of the “women’s shelters” or otherwise turning a federally funded trick through conflation of saving children/saving prostitutes/society) are highly targeted.

Related Stories: Cop is sleeping with a man’s wife, gets caught. Solution? Cop pedofies a man who spends five years in jail. Then, man gets out, sues and wins 16 MILLION DOLLARS. Yeah, buttie- you can have the wife, I’ll take the cash.
Is NGO pimping the new sex slavery? the real sex slavery is fraud, lies and constant conflation pandering for federal and NGO dollars, which is worth hundreds of billions per year. And, the net effect? Certain groups control women’s sexuality, and hence the ‘sex trade’ while demonizing individuality or individual choice.
And, in intelligence operations, swallows and ravens are also a well known subject of interest and practice. Swallows being female’s who can be prostituted for intelligence and ravens being males, or gigolo’s with an intelligence purpose.

So, it is not surprising that pornography is a mainstay in the dialectic as well, because agencies ranging from UN sponsored NGO’s, the ADL and it’s umbrella propaganda organs ranging from the women’s groups to the school curriculum sponsorships;  to the military to standard police practices all use moral panic, and hysteria as a way to create or enforce compliance, to compromise and blackmail assets and also to leverage politicians and politics.
Related Story: Big Brothers and Sisters of America, and volunteers are part of the pattern of OGS
Without getting too deeply into “who runs the porn industry” or why, now, pornography is free all over the internet (and, like most CIA startups, like Google, Palantir, Moonshot CVE, and so many others- one must ask “where’s the money in free porn?” And the answer would be “like the aforementioned CIA/intel agency startups, the money comes from the CIA, and to the NGO’s, etec.- and beyond click baiting revenue, the real profits are what a citizen can be leveraged into or out of afterwards.)
So, here is a tutorial on “the porn deluge” and how it is related to the organized gang stalking dialectic:
There are “About 446,000 results” for the search term “porn deluge” in Google. The first result is a story about a crossword puzzle,  search which sparked a deluge of porn;and crossword puzzles are long a favorite of intelligence agency recruitment, communications, and old fashioned spycraft.
Then, a Google search of the terms “porn deluge and gang stalking” returns “About 31,100 results,” and the very first result is commentary about being put on lists, much as Zionists the world over are threatening to do with those who do not agree with them. The link is to  a well known OGS site.
Link: https://gangstalking.wordpress.com/list/

Hello world.
This blog is going to be about my adventures with gang stalking. I really didn’t choose this adventure, it choose me about six years or so ago. I didn’t ask for it, but I am living it, and so now I will share my adventures with you all.

Not one single part of that post returns the search language described above. there’s food for thought.
Now: when I modify the search terms and bracket the actual terms with quotations, thus “porn deluge” and “gang stalking,” I get  “About 4,620 results.”
And guess what? Elizabeth Dietrich’s paper-the one she wrote at Smith College, aka the gender lesbian capital of America-the one where she recommends that targeted individuals be locked away somewhere, far away from internet access? Yeah, this paper. Yup-her paper is the second result in Google for the search terms above. Here- have  a look yourself:
The paper that is referenced by this search term:
Gang stalking _ internet connectivity as an emerging mental health problem, By Elizabeth Dietrich

[UPDATE, 11-07-2019]:I removed the link to Liz Dietrichs academic paper above, because I noticed that some smartass had automated it to download once per day from my website. While automated downloadscan serve a purpose, in this case, it was mist likely Dietrich herself, or one of her scummy colleagues who did it, which would artificially inflate her shit papers rankings, causing it to look like people actually consider her garbage worthy.

porn deluge and dietrich
Now, in order to fully flesh out the connection between the porn deluge and OGS (and note how INFREQUENTLY it appears online, compared to “John Lang, Fresno, CA marine, who apparently killed himself by stabbing himself in the back, and setting his own house on fire, as firetrucks parked just blocks away, claimed that he was framed with chid porn-which has some 1.2 million mentions online), we must first validate the fact that “feminism and NGO’s” are heavily involved in the distribution of porn, and also that the DVIC is integral in this endeavor, that political causes (cause stalking) is involved, and that “progressive” and and that feminist jurisprudence has a hand in it is a formidable task, much like the rest of the “proof” required to in  fact, confirm OGS as a modern cultural practice.
So let’s look at one of the first links in the screen capture above, and then, note that OGS recruitment is a factor here, much as Lang described, from the link to 911NWO.com:

BAITING/ENTRAPMENT
The term Baiting is a stalking tactic used to lure a victim into environments, or situations, which cause further problems to the victim. Often Baiting involves tricking a victim into committing a crime or unknowingly engaging in an illegal activity. To lure into dangerous, difficult, or a compromising situations. Members of these Organized Stalking and Harassment groups will try to lure targets into various situations for the sole purpose of setting them up. Setting up targets could involve getting them arrested, institutionalized, set up on fake sexual harassment charges, drug charges, illegal pornographic materials, etc. Once this happens, it puts targets at risk for entrapment into becoming members themselves.

So, recruitment, entrapment, and pornography are all factors, along with the usual complaints of harassment and s on, according to that author. But it’s not enough to prove the link to the porn deluge and other parts of my thesis that I describe above, So let’s read deeper where we see that thee “porn deluge” has been described as a “tactical” assault and part of cyber-stalking:
From “OSI informers Facebook page:”

CYBER-STALKING
Cyber Stalking or Cyber Harassment is a related group of harassing behavior occurring via internet/online. Cyber Stalking includes, but is not limited to; Computer Hacking, “Trolling”, Spamming (Often including “Porn Deluges”, Verbal Assaults, Character Assassination, and Impersonations of the victim. Online harassment is a plank of the harassment protocol.

So- the porn deluge is a “thing” in OGS indeed. But let’s step out of America for a minute to see if it is an international thing, like the UN’s Transnational Crime initiatives that work in darkness:
And look!
It’s a thing in Italy, a country that not only was subject to CIA operations after WW2 called “Gladio” but also, that has a high population of Catholics, lot’s of easily targeted black cash operations in a Mafia culture, and a historic target of “progressive” leftists as well:

PORNO DELUGE: REATO tipico del gang stalking.
Chiunque entra illecitamente nelle vostre cose LE PUO’ RUBARE e farci di
tutto e di piu’…ed a VOSTRO NOME.
Dalla CASA – COMPUTERS – CELLULARI ECC…
Le immagini rubate, si possono decontestualizzare, foto-videomontare,
mixare o essere inviate a qualcuno o a siti indecenti COME SE FOSSERO
STATE INVIATE DA VOI con furto di password o di identità di e.mail, account
di network ecc…

So, Gladio is a well documented social disruption operation, that targeted “the patriarchy” of Italy just after the war, much as McGill Universities schizophrenia doctor D.E. Cameron’s work targeted Germany. Let’s take a look at Gladio from Wikispooks.com, a website wiki that is a repository for information about spy agencies- but also, how FBI whistle blower Sibel Edmonds has described it:

Operation Gladio B is a classified development of the original Operation Gladio, the NATO/CIA/MI6-backed network of fascist “stay-behind” cells trained to carry out bombings and assassinations in the event of a Soviet invasion of Europe. Sibel Edmonds revealed “Operation Gladio B” as an FBI codename adopted in 1997 for ongoing relations between US intelligence, the Pentagon and Al Qaeda.[1] This substituted Muslims for fascists, and continues to carry out false flag attacks, especially in Europe, as part of a global strategy of tension. According to Daniel Ellsberg, her information is “far more explosive than the Pentagon Papers“.[2] She summarizes the objective of Gladio B as “projecting U.S. power in the former Soviet sphere of influence to access previously untapped strategic energy and mineral reserves for U.S. and European companies; pushing back Russian and Chinese power; and expanding the scope of lucrative criminal activities, particularly illegal arms and drugs trafficking.”[3]

Note especially the operation’s focus on illegal activity to target citizens. But where’s the porn, you ask? Prove the porn part!
Well, refer back if you will to the commentary with Dietrich and OGS. For this next magic trick, I will produce porn deluges from OSI informers-you remember them, don’t you-those USAF guys and gals who operate a world wide snitch operation? Yeah, these guys (not those other guys-you know, the ones who are always threatening defamation and libel lawsuits, No- those are different guys I assure you ….)
Well the OSI informers have noted the porn deluge in their many online ‘works;’ and others in the OGS dialectic as well. One such blog, thatrandomcandidate.com noted in 2015-just at the run-up to the election year-that “they” are watching “your” porn habits.
Or more precisecely, that “your porn” is watching you:

Your Porn Is Watching You
“Porn watchers everywhere are being tracked, and if software engineer Brett Thomas is right, it would be easy to out them, along with an extensive list of every clip they’ve viewed.”
“If you are watching porn online in 2015, even in incognito mode, you should expect that at some point your porn viewing history will be publicly released and attached to your name,” Thomas proclaimed in a blog post titled ​“Online Porn Could Be the Next Big Privacy Scandal,” shortly after.
” …you’re not just sending a request to the porn site—a so-called first-party request. You’re sending third-party requests to Google, to the web-tracking company AddThis, and to a company called Pornvertising, too, even if you’re browsing in private mode. You’re also sending other data that can be used to identify your computer, like your IP address.”
Read more at:   http://motherboard.vice.com/read/your-porn-is-watching-you

Then, in classic Mockingbird fashion, we see the claims and the literature, and the “methodology” expressed by OSI repeated all over the net, to whit- how to “control TI’s” from another Facebook page that also documents claims of “mind control“:

What is Gang Stalking and TI social control?
T.I. Gang Stalking is a framework of social control of group of people and this framework can be used by any system (even non-government system) to attempt to control an individual or group of people without doing anything illegal in the control framework. From this fact, things are very clear that whoever wants to gangstalk the TI they don’t want to do anything illegal as a part of gang-stalking.
TI gang stalking allows to inflict enormous pain to the T.I.  
TI gang stalking is planned in such a way the actions involved in the TI gang stalking are designed considering the loop-holes in the law.

The last claim on that page cannot be understated-that the targeting and harassment of a TI includes a well organized, carefully crafted exploitation that considers “the loopholes in the law.” Certainly, that IS what a porn deluge would be, if it weren’t for the fact that the basic due process of a civilians rights to privacy hadn’t first been abrogated at the internet switch, and then, the individual so targeted was targeted with a moral paradigm that legal porn is anything but that in the first place.
And even the ACLU has noted that such military practices crosses the lines into the civilian word, and violate Posse Comitatus, and more in the case of Dreyer, where the Navy targeted an entire states communications and then, prosecuted a civilian that was caught in a “porn deluge.”
But morality campaigns- religiously charged propaganda that masquerades as secular in purpose-disguise themselves as a superior cause, aka “cause stalking” in order to create policy. And certainly, as we shall see, porn deluges are themselves thinly veiled religion.
UPDATE: 10-08-2017
Mike Masnik of Techdirt.com documents the political wrangling around the SESTA bill, which is a thinly disguised morality campaign where arch-conservatives are making claims that control of the internet, and censorship, and especially, all of the secret cult activity in the NSA/DHS/FBI/CIA/Israel data theft pipeline is “for the children.” Stop me when you start seeing patterns about how some use children, and exploit them in the narrative, as well as to actually “stalk kids” from birth, while making sh!tloads of money at it.

SESTA Is Being Pushed As The Answer To A Sex Trafficking ‘Epidemic’ That Simply Doesn’t Exist

from the reality-check dept

The rationale behind the Section 230-upending SESTA bill is that sex trafficking is such a huge problem, some collateral damage is a small price to pay. The push begins with the targeted criminal behavior itself. No one wants to appear as though they’re opposed to fighting trafficking, so that scores some quick wins with a few legislators. It continues with inflated numbers suggesting trafficking has become a multi-billion dollar industry here in the US.
Two backers of an earlier human trafficking bill – Rep. Bob Goodlatte and Rep. Ann Wagner — both cited unsupported numbers while discussing the criminal activity. Goodlatte claimed “child sex trafficking alone is a $9.8 billion industry.” Wagner’s money quote was about the same — $9.5 billion — but didn’t narrow it down to just child sex trafficking.
It doesn’t matter whether the number included children or not. The numbers are false. The Washington Post dug into the stats and couldn’t find anything independently verifiable that added up to the $9 billion price tag asserted here. What WaPo found was the $9 billion was a worldwide estimate based on some very questionable extrapolation from a few small data sets with large sampling errors. The paper tracked the numbers all the way back to figures provided by ICE in 2003, which was a worldwide estimate that also included human smuggling.

Masnik’s analyses notes how the current round of attacks against the first amendment are driven by Catholic and Jewish interests that seek to control our culture with sex and morality panics, and lots of TOTAL LIES (Catholics and Jews lying in rder to maintain supremacy? Whodathunkit!) Because, you see, if everyone believes the same thing-that if “a community of believers shares strange beliefs” then, it’s NOT delusional thinking.

Neo Nazi's and other alt-Right hate groups are using gang stalking tactics to DOX those who DOX'd them

I have documented how hidden groups with official cover ranging from Infragard members to the LEIU’s and those who work in NGO’s and under the umbrella of “community policing” to steal data, and build dossier’s on Americans. And I have documented that both the left and the right do it, albeit differently in some specific cases.
Micah Lee of the Intercept notes that “homelessness,” and rape threats as are a host of other complains that Targeted Individuals mention on their blogs, and that these are all features of DOX campaigns in garden variety internet and online stalking from police departments,Fusion Centers,and political NGOs that comes offline via policing and community organization harassment:

doxing efforts associated with prior online hate campaigns have forced targets to leave their homes in the face of death threats, rape threats, and other forms of harassment. And those attacks were mounted even before President Donald Trump came to power
….
so-called alt-right members collected private information from over 50 anti-fascist activists from the states of California, Florida, Illinois, Iowa, Maryland, Massachusetts, Minnesota, Missouri, Nebraska, North Carolina, South Dakota, Texas, Virginia, and Washington.
The information collected often included photographs, social media profiles, home address, phone numbers, email addresses, date of birth, driver license numbers, vehicle information, place of employment, and in one instance, a social security number

And I have written about how they are abusing databases around America and using the illegally obtained data to DOX people they don’t like or otherwise using those databases to gain compromising information and how they pass it around in hidden gossip and slander campaigns; and that “Anonymous” is a co-opted movement where these hidden operators are actually cops and other’s who are charged with protecting American’s are in fact compromising them instead
This is what police states DO at the beginning of the END of a democracy.

The photo above is President Barak O‘Bamas presidential convoy parked at Matts Bar in Minneapolis, one block away from my house after I had endured an entire year of bizzare gang stalking by so called Progressives, local NGOs, and Jewish groups sponsored by the DHS, who tracked my every movement via Fusion Centers, Stingrays, and computer hacking.
I mentioned briefly that I was privy to watching the neo-con left encroach on a major database that leaked the personal information of cops, and others, and that certain individuals in that case were specifically targeting “white males.”
The “hidden hand,”and reprehensible slanders of racist groups like the Anti Defamation League are everywhere in these cases, and police chiefs look the other way, lest they fall victim to political slanders.
I eventually pushed a situation where this “leakage” was revealed, and then, I watched as no one gave a shit, and the whistle blower was framed as a “racist,” and more, and then, slandered in the “official record” in exactly that language.
So it’s hard to care about others getting DOX’d now, especially those on the left who targeted those on the right when Obama was in power. And I might point out to the savvy reader (only long term readers will understand this reference) that under Obama, gang stalking of criminals became frame jobs, and slander campaigns, hacking and warrantless intrusion of political enemies and fence sitters, as a way to intimidate, enforce conformity or to encourage silence-that Obama was known to park his army of Secret Service in front of the houses of people that Democrats targeted, personally, based on what his political allies said.
So now, I watch as the pendulum begins to swing the other way, and kind of laugh, or mock those who laughed, or mocked me. And I especially nte that of those DOX’d, we have the academic opportunity to interview them and ask simple questions, like “Have you been directed into conversations of organized gang stalking?” Or “has your internet developed it’s own mind is constant redirection taking place?”
And my answer would be this: it is not likely that these things are being  done to those who are swept up in this round of harassment-because even though right wingers are brash, crass, abrasive and threatening- unlike the left, they have not yet directed the full toolkit of compromise and blackmail operations at the left. That, somehow, the right seems to maintain a boundary between who is and who isn’t a “foreign enemy,” nor does the right seem to work within the “umbrella” of NGO’s and UN sponsored database abuse.
From the Intercept’s security and technology wizard, and Micah Lee, a tale of gang stalking 101:

Chat logs obtained from message boards used by neo-Nazis and other far-right groups show a concerted effort to compile private information on leftist enemies and circulate the data to encourage harassment or violence.
The messages were obtained by an anonymous source, who infiltrated and gained the trust of white nationalists and other right-wingers, and has been leaking the material to Unicorn Riot, a “decentralized media collective” that emerged from leftist protest movements.
The chat logs originate from various web discussion communities hosted by the provider Discord and closed to the public. The communities, which have names like “Vibrant Diversity,” “Ethnoserver,” “Safe Space 3,” “4th Reich,” and “Charlottesville 2.0,” range from having 36 users to 1,269 users. The most active, with nearly a quarter million messages over seven months, is “Vibrant Diversity,” a neo-Nazi community forum that includes a channel called “#oven,” where users share racist memes. The 4th Reich server, the second most active, has 130,000 messages over the course of four months and includes a channel called “#rare_hitlers,” where users share propaganda posters and other glorified media from Nazi Germany. The “Charlottesville 2.0” server, which contains 35,000 messages, is where the “Unite the Right” hate rally in Charlottesville was organized.
This article is based solely on chat logs from a community called “Pony Power” (Unicorn Riot published the logs yesterday). The Pony Power server has 50 users, and the chat logs contain just over 1,000 messages, posted over the course of 10 days and ranging in topic from far-right politics to advice about digital and operational security to debates about the legal limits of online behavior. The primary activity on the Pony Power server is posting private information, like names, photos, home addresses, and phone numbers of dozens of anti-fascist activists.
Victims of the outings, also known as “doxing,” described reactions ranging from terror to anger to annoyance, and have variously turned to friends and family for support and locked down their accounts. They said the Pony Power doxing campaign is just the latest in a series of online efforts by neo-Nazis and their allies to marginalize their opponents. The information compiled on Pony Power hasn’t yet been distributed to the larger right-wing extremist community. However, doxing efforts associated with prior online hate campaigns have forced targets to leave their homes in the face of death threats, rape threats, and other forms of harassment. And those attacks were mounted even before President Donald Trump came to power on the back of racist attacks against his predecessor, Mexicans, and Muslims, and before he embraced white nationalists and encouraged violence against protesters at campaign rallies.
People chatting on the Pony Power server spoke openly, as though behind closed doors, often using offensive slurs. So be warned, some of the following conversations are hard to stomach….
….follow this link to read more!

 

The Shirky-Masnik bureaucracy perpetuation principle

In well organized assaults waged by governments that work in hidden capacities to enforce and socially engineer a society through constant attacks on civil liberties, we frequently find useful idiots who willingly place themselves as obstacles to free speech, and especially, as obstructionist forces that ‘steal time,’ aka ‘time-thieves.’

these are situations where people will often seek to preserve a problem or a falsehood, rather than recognize that it doesn’t need to be that way. There are lots of industries where this is a major issue.
-Mike Masnik of Techdirt.com

Organized gang stalking is one such case where we see this at work-how bureaucracies work in “the gray area of law and social oversight” to prevent insight. This is best embodied in the common phrase that appears in the OGS dialectic “what is hidden” which some use because it is a Masonic/other symbolic speech, while others use it to flaunt their access to the many hidden technologies that I document herein, as well as their ability to abuse others in this capacity.
Obstructionism and OGS are Partners in Crime and Civil Consiracy
Techdirt.com does some of the most reputable, fearless, well written public interest journalism in the history of technology-and journalism. As such, while most MSM journalists cower(or put on their knee pads and slurp down some payola) in the face of the 72 Billion dollar per year NSA/CIA/FBI/DEA privacy rape machine, Mike Masnik, and the excellent writers over there have incurred their unfair share of  detractors.
And, as can be predicted, some of those detractors are little more than liars and punks who live in their mothers basements, and guys like Shiva Ayyadurai, who claimed he invented email. And gay robotic toilet slaves, like Peter Thiel, the guy who worked hard to subvert ALL democratic liberty via the Palantir/CIA/Google collaboration. Notably, Thiel has skipped town, and run off to New Zealand, where he is hiding out, no doubt doing “special work” for his corporate and military and CIA overlords.
In the fight to demolish free speech, the MIC and its DVIC handmaidens use every dirty trick, every crooked backdoor trick to obstruct due process and civil rights; but also useful idiots like Thiel and Ayyadurai are the  backup girls for the band of merry robbers who wantonly lie, cheat or steal to destroy the rights of others while getting filthy rich. They are the contrarians of logic, and the cock-block of free enterprise; and it begins with their pillow bitingly wimpish and vain, immature, fascist impulses, attacking pure speech and then, the free press.
SO it cannot be missed that these same are also on the forefront of the technologies that are currently accessing other peoples privacy via their “inventions, and imputing to those who they steal from “intentions” that are not only false, but aslo” classic Freudian projections, and in that light, they are also perverse voyeurs.
A world of smoke and mirrors indeed. From Techdirt.com, Mike Masnik scores a victory over Shiva Ayyadurai’s perversity, and his perversion and abuse of law:

Case Dismissed: Judge Throws Out Shiva Ayyadurai’s Defamation Lawsuit n

As you likely know, for most of the past nine months, we’ve been dealing with a defamation lawsuit from Shiva Ayyadurai, who claims to have invented email. This is a claim that we have disputed at great length and in great detail, showing how email existed long before Ayyadurai wrote his program. We pointed to the well documented public history of email, and how basically all of the components that Ayyadurai now claims credit for preceded his own work.
We discussed how his arguments were, at best, misleading, such as arguing that the copyright on his program proved that he was the “inventor of email” — since patents and copyrights are very different, and just because Microsoft has a copyright on “Windows” it does not mean it “invented” the concept of a windowed graphical user interface (because it did not). As I have said, a case like this is extremely draining — especially on an emotional level — and can create massive chilling effects on free speech.
A few hours ago, the judge ruled and we prevailed.

Now- an object lesson in how all of these companies-and then, their complete subversion of intelligence agents and agencies have the ability to destroy speech at the switch. Look at this paragraph below:

The Shirky Masnik principle states that bureaucracies will d anything to perpetuate themselves-anything.. And that includes using total sh!tbags like Ayyadurai, or his counterpart in institutional sociopathy, Peter Thiel-who was so mad that he was outed as queer by Gawker media that he sued it into the dirt and put it o ut of business. to subvert the very foundations of both free economies, and free democracies.

 
Do you see the paragraph -how convoluted and broken it is? This paragraph was written as this blog, and the computer it is written with, came under ‘attack’ by ‘unknowns’ and the browser froze, and Tor reported multiple “j-script’ malfunctions. And this, just one day after the same browser, on the same computer, was crashed using an attack I cannot identify-one where the browser opened repeated multiple windows until it was useless ( I could identify it, but I am still researching that particular attack).
You see- speech itself is under attack, by the multiple agents and agencies I describe herein, and that attack is at the site of the speaker, which is me in this case, but this goes on all across democracies everywhere, as the United States, working with the Five Eyes Alliance, and literally HUNDREDS of other agencies, NGO’s target speech itself, online speech, and all other media with disruption campaigns; in this case at the site of speech itself as I type into this blog.
I document this as well as note its psychological, and ‘real world’ effects here, but elsewhere too, I have records of these attacks, which are incessant. And in the “TI” community of gang stalking victims, this is an extremely common complaint, and dis-information agents can be found mocking TI’s with comments such as “yes, I have heard that TI’s frequently complain about sticky keyboards, e-mail theft, and computer hacking.”

In fact, hacking “target’s” is what the NSA and the rest are doing, as even the famous (and well funded) “OSI informers” has noted, alongside the fact that TI’s are also targeted with other nefarious attacks such as “porn deluges.” I have preserved a copy of the web page where OSI informers makes this claim, because frequently, the web gets “scrubbed” after I validate one or another fact or tactic of these hidden operators at our internet switches, and the thousands of programs that are trained on TI’s.
Here is a snippet of “OSI informers”claim/advice:
CYBER-STALKING

Cyber Stalking or Cyber Harassment is a related group of harassing behavior occurring via internet/online. Cyber Stalking includes, but is not limited to; Computer Hacking, “Trolling”, Spamming (Often including “Porn Deluges”, Verbal Assaults, Character Assassination, and Impersonations of the victim. Online harassment is a plank of the harassment protocol. If you have a website devoted to Organized Stalking you may have people emailing you to flame you, or claiming that they are victims & asking for support with the intention of discrediting you.

Now- I will rewrite the paragraph above as it was intended, but I note that my computer literally heated up to an extreme degree, and I was forced eventually to crash the browser, reload, and change settings-this is what is called a “social engineering attack” where hidden operators force the user to change behavior, aka “behavior modification.” And I note that while my computer is less secure in this second attempt to write this post, I can write easily now. See how that works? Seeing any patterns yet?
The Shirky-Masnik Bureaucracy Perpetuation Principle
The Shirky Principle forms the headline of the following piece of writing by Mike Masnik of Techdirt.com forms the Shirky-Masnik Principle stated as below describes how OGS online has become an institutional force,with offline consequences, and especially, how writers are targeted by morons with kewl toolz directed at us from ilitary bases, police and Fusion Centers, as well as NGO’s with dominionists, zionists, and Infragard rats working behind the scenes:

Institutions Will Seek To Preserve The Problem For Which They Are The Solution

by Mike Masnick

Filed Under:
business models, innovator’s dilemma, institutions, problems, solutions


from the the-shirky-principle dept

We already wrote a detailed analysis of Clay Shirky’s recent writeup on complex business models. However, a few of you have sent over Kevin Kelly’s recent post about Shirky’s piece that also compares it to Clayton Christensen’s Innovator’s Dilemma, but thankfully highlights the one key line in Shirky’s piece that may have gotten lost in the original:

“Institutions will try to preserve the problem to which they are the solution.”

Kelly calls this the “Shirky Principle.” To me, it calls to mind Upton Sinclair’s famous line:

“It is difficult to get a man to understand something, when his salary depends upon his not understanding it!”

They are not the same point, but they are related. In both cases, these are situations where people will often seek to preserve a problem or a falsehood, rather than recognize that it doesn’t need to be that way. There are lots of industries where this is a major issue.


From cradle to grave: the East German Stasi stalked babies-and spy novel author John Le Carre

From Mikhail Bulgakov in Russia, hounded by Stalin’s agents for writing the “Gospel for Stalin” aka “the Master and Margherita;” to anti-fascist Ernest Hemingway aka “Papa” in Cuba, who had a bad case of pro-fascist FBI chronic harrassment and wiretapping, – to the “Lost Generations” F. Scott Fitzgerald in Minnesota and Paris, followed by religionists, prohibition prudes, and likely intelligence agents of several organizations and institutions; to John Le Carre, of “Tinker Tailor Soldier Spy” fame, intelligence agencies, and communitarian scum as well as the other and frequently competing side/s of fascist/antifa/communist/capitalists work together in the unified purpose of stalking writers.
In this sense, the current attack on free speech, journalists, and  online communicators indicates that writers themselves are “targeted individuals” today much as they were….forever.
And it is not surprising that African -American author Gloria Naylor, who claimed she was being gang stalked, was also a targeted individual, and likely, she was targeted by dirty DEA scum, who used illegal databases like the SOD to target her [ here is a link to the Naylor story on a blog by an actual TI from Chicago, an ex-con, who claims police and other “mysterious stalkers” have tried to frame into a child homicide from 1992, and routinely threaten his life.]
And Le Carre especially, had a dossier with the East German Stasi that included drawings of his home office, and a description of his safe, and his own father had a dossier in their horde of data that was squeezed out of the willing stoolies of that era. So, we see a pattern in the current and chronic spy apparatus called the NSA-Israel data theft pipeline.

Across the country, people were on the lookout for divergent viewpoints, which were then branded as dangerous to the state. Often to one’s own advantage.
-John Le Carre in 2016 on NPR

While most people have a “fake friend” or two, in a world that has slipped from a democracy to a world that encourages “community policing,” aka snitch culture; and that world augmented with 24/7 social media monitoring, routine and wholesale internet search term and full scale email interception by agencies ranging from the local police to the NSA-Israel data theft pipeline- nearly everyone has a 40% roster of fake friends that work in the military, trolling online speech, but particularly, trolling alternative media and dissenters and activists.
So, to a targeted individual, everyone is a fake friend, or can easily become one after the slander campaigns begin, and worse, these kinds of fake friends carry penalties ranging from psychological and social damage, to imprisonment, and even death.
The Intercept routinely carries stories of how the FBI and any of the various agencies use “profiles” to  target speakers, then, strives to create terrorists and other criminals through enticements and inducements, and coercive behavior of all kinds, but the main tool they use is “human frailty, gullibility, and a desire to be liked.”
Related: The Intercept covers the story of “the Unlikely Jihadi,” Harlem Suarez.
Perhaps the best known intelligence stalking of a writer these days is the case of “Papa” Hemingway who fought fascists in Spain, and drank himself to suicide in Cuba (note to researchers of GS: seeing any patterns yet with the suicide thingy?)

Related Story:Globally acclaimed author and anti-fascist freedom fighter Ernest Hemingway was slandered by some who called him paranoid, and delusional when he stated that his phones,mail, and more were wiretapped, or tampered with by the pro-fascist FBI. As it turns out in MOST of these cases, he was right: they had a 124 page file on him. The reader might recall that the dosdiere was a political tool of fascists, Nazis, and Stalin, but especially and notoriously was used by Marcus Wolfe, head of the East German Stasi.

In the case of F. Scott Fitzgerald, we see a fairly common, and now routine hounding of a man throughout Minnesota and beyond by right wing European Jews, as well as prohibitionist intel agents, who at the time had extensive bootleghing operations spanning from Minnesota, to Candada, and south to Chicago, and intelligence agencies alike, using him as free labour, aka “HUMINT”, and tracking his connections in the era of “Alcohol Prohibition.”
In the case of Mikhail Bulgakov, who was then a famous orchestra conductor and operatic composer, being tailed and harassed by the Stalinist secret services, he notoriously burned his manuscript”The Master and Margherita” several times, as it chronicled the crucifixion of Yeshua through the eyes of coded narratological literary technique, combined with myth. Not surprisingly, it was published 30 years later because the NKVD had preserved a copy!
SO, the case of the intelligence and counter-intelligence staling of John Le Carre, the author of one of the west’s most famous paeans to spying, Tinker Tailor Soldier Spy,unsurprisingly includes the fact that his father was stalked too.
From “Fresh Air” with Terry Gross:

Novelist John Le Carré Reflects On His Own ‘Legacy’ Of Spying

https://www.npr.org/player/embed/548632065/548727155″ />

https://www.npr.org/player/embed/548632065/548727155

Le Carré’s latest book, A Legacy of Spies, revisits some of the characters from his earlier novels, including his most famous protagonist, George Smiley. It follows a protégé of Smiley’s, Peter Guillam, as he re-examines some of his actions from when he was a Cold War spy, including his role in the deaths of another agent and a recruit.
The novel mines the moral tension inherent in espionage — a tension le Carré himself remembers. “I felt I had to suppress my humanity,” he says of his time as a spy. “The lies straight into the face, the befriending, the false befriending. … I suppose I’ve been a lot of people in my 85 years, not all of them very nice people.”
He describes his path from spy to novelist as a “zig-zag journey,” but notes that, ultimately, fiction writing has helped him understand himself better.
“When you really have to put a character together piece-by-piece, what makes it work is a piece of yourself,” he says. “And until that happens, the character doesn’t really have a being at all. So the real joining in fiction writing is that sense of finding all the possibilities of your own character and awarding them in an organized way to the different characters of your creation.”

From Kindergarten to Old Age: A comparison of the inter-generational stalking of John LeCarre and his father-freedom’s just another word for nothin’ left to lose in a nation that foregoes the rule of law
East German society and “snitch culture”from Der Spiegel:

No matter where one shared information, the state would put it to use. The East German reporting system kept track of the country’s citizens from kindergarten, throughout their working lives and even into retirement, via the Volkssolidarität (“People’s Solidarity”) organization, which focused on caring for the elderly. It was part of developing a “socialist personality.” Some began practicing denunciations in childhood, as part of the Young Pioneers, and then as teenagers as part of the FDJ. Files were even kept on schoolchildren: “Wears Western clothes,” “exhibits affinity for punk music,” “demonstrates pacifist attitudes.”
Mutual evaluation, judgment, criticism and self-critique were omnipresent. Across the country, people were on the lookout for divergent viewpoints, which were then branded as dangerous to the state. Often to one’s own advantage.
The losers of this system often didn’t know why their lives suddenly became derailed. After the fall of the Wall, many of them looked for clues in their Stasi files. They wanted to understand why, for example, they were not given a spot in university, why their professional careers suddenly hit a roadblock or why their travel permit was revoked at the last minute. And many were surprised when they found no information at the Federal Commissioner for the Records of the State Security Service of the former German Democratic Republic (BStU), the agency that continues to administer East Germany’s Stasi files today.
Explanations, however, can be found in documents kept in the archives of political parties, factories and universities. There, one learns that skipping a Russian-language class, making an ill-considered comment at the student union or exhibiting a persistent lack of the “proletarian point of view” can all lead to ex-matriculation — which had profound consequences for a lifetime.

And now, back to the story of LeCarre’:

On growing up with a con man dad, and how his childhood prepared him to be a spy
My father was a compulsive liar and in and out of jail, and the people around him were tremendously colorful, amusing people. … I think my own alienation from my environment left me solitary and more reflective; more watchful of other people around me. I think survival, early survival, requires that you have a quick read of people — you can understand them quickly, relate to them quickly, you can scent them in an almost animal way, perhaps sooner, more quickly, than people who had a more settled childhood. So you understand people’s defenses better….
At the age of 5, my mother disappeared. And after that, it was living in the wake of this maverick fellow, who often was enchanting, for a long time. That was my world. … I spent a lot of time, if he left the house, going through his pockets and things, trying to figure out what was going on. We were displaced repeatedly by angry debtors. For quite long periods he was on the run. He was on the run in the United States even, wanted by the forces of the law.
He filled my head with a great lot of truthless material, which I found it necessary to check out as a child, with time. Yes, in that sense, these were the early makings of a spy. … His great passion, which he achieved, was to turn me into a seeming gentleman.

Tinker, Tailor, Soldier-Arms Dealer? The interesting case of inter-generational organized stalking and international spying. Seeing any patterns yet?
Some might see the pattern that Jewish communism inserts itself into dialogues within the wider christian capitalist cultures by spying and infiltration, and targeting “influencers” from the hidden bastions of the intelligence communty, down to the lowly local level’s of “community policing.”

In the cases of of every one of the writers above, Jews were instrumental in the stalking and spying on writers, one way or another, as well as influencing them and their politics. Though Lavrentiy Beria-the head of Stalin’s secret police was Jewish, it is possible that it on his orders, or that it was he himself who saved Bulgakov’s manuscript. Or not.