The going dark problem and Silence on the Wire: silence is a two way street, and the case of Russian counter -surveillance of Americas political police using “low risk” tactical methods.

If you’ve ever sat still, in a quiet room, for a single moment, you know that there is no such thing as actual silence, because your own body makes noise.

“The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,”

Breath, and other organic, natural acoustic utterances or disturbances are a constant compliment to your presence. Then, there are the subsidiary, environmental and natural sounds around you, as the breeze, or the distant hum of nature in its various forms.

And so, this is the human baseline of silence, and it is a valuable starting point within which we discover the fatal flaw of all so called intelligence, and counter -intelligence: the arrogance of intel operators in assessing the value of data received or sent, because after disruption and beyond the human baseline,its all just “other ”noise. And noise then, becomes a two way street.


Related Content:
Free download of Silence on the Wire: Field Guide to Passive Reconnaissance and Indirect Attacks,by Michal Zalewski

So, in a free world, one would expect that the human rights and guarantees of “freedom ” would be maintained nearly religiously; as nearly religion itself, by those who draw paychecks based upon their oaths that they vow to uphold our constitutions.

But thats not what is actually happening in the west, since US, British, and the allied nations began their religion based, tribal-sectarian holy war that kicked off in 2001, and guys like me got to meet the “deep state ” head -on, after writing news stories without tribal -sectarian bias, and true to the form of the principles of journalism, and anticipating the Total Surveillance State.

 

Related Story: Take a look at how I was the first person in America to report on manufactured terrorism, and then, got years and years of black bag jobs,cowardly morons rifling through my belongings, and news stories stolen right out of my phone and email, and everything I describe herein AFTER that and more.

And look how that turned out for me, PERSONALLY.

Indeed, with the US FVEY spying,the accompanying “community policing, ” the western governments can no longer claim that they respect, or uphold anything resembling democracy backed by civil rights and due process procedures, much less freedom of any type.

So, it is here, where western governments have turned ordinary citizens into involuntary, non -consensual surveillance targets( aka Human Intelligence or, HUMINT )where the noise of ones own, voluntary silence is, “disrupted ” by the FVEYs data theft on every persons phone or computer and then, the exploitation of that data by intelligence operators to create what Dr. Lorraine Sheridan and others call “an echo chamber ” both online and off that is mediated by western extremist religious and political ideology, as we see here and here.

So, ROGS, the blog you are reading here, is what is called in psychology, a reaction formation, to the newly emerged total surveillance state, and the death of American democracy, which I once believed in whole heartedly, and fought for, very vainly, with well chosen words.

My country is no longer a democracy, insomuch as it ever was due to the multi-tiered levels of privilege, doled out to the select men and women, contrasted against the multi -tiered levels of slavery, peonage, and debt servitude that these others cast upon the poor, the dissenter or activist; the heretic and others who fall into the hidden slavery nets of any of the many sects and cults of organized religion, working through government apparatus both online and off .

So, this theological filtering, regardless of what cult, or sect, is also the baseline for all western dialogistics as we see in the sectarian targeting of men by known race -based operators; and in the resultant cult practices that follow, such as the un -naming of (primarily ) men in this example here and other examples I provide here at ROGS.

So, in such an environment of what is essentially the mass exploitation if individuals, and groups of individuals, one cannot act of actual free will, because these operations, and these operators, are in constant disruption mode. Its what their version of a society is.

In that light, there are many ways to use silence, and also noise to discern their capabilities, tactics, and methodology, AFTER the fact of them, casting you into their various webs of interaction FIRST.

Keep in mind that the pre -emptive, anti-democracy, anti-due process, sectarian secret police state justifies itself not from law, but from their version of tribal -religious and moral superiority.

In that world, its all binary, I /O data analyses: Kill or be killed; heaven and hell; black or white; Jewish or not Jewish; Republucan or Democrat woman or man, etc.

And it is that analyses which is its flaw, which is why they break and bend, and prostrate the law in gray area policing, aka “high policing ” aka political policing, as we saw with the al Ghazali problem.

So, no small surprise then, when ROGS was able to out a few Department of Defense affilliated persons here who targeted me on US soil as they worked ine or another angle of fraudulent FBI /DHS /Private contractor CVE program, or cult members who cyberstalked me on Twitter, working with Democrat party with operatives INSIDE Twitter monitoring my location; or most recently, yet ANOTHER Department of Defense affilliated, Brookings Institute person following my blog.

As I said: I know what kind of noise is natural, like how this humble electrician and merchant mariner was literally recruited by a gang strike force in LA, versus any of hundreds of bizarre DoD/DHS /FBI /NGO affilliated time wasters they toss,at me, like these guys here

So if little old ROGS, an American citizen who has never been convicted of any crime in any trial based in constitutional law, civil rights, and due process can be targeted and stalked, and harrassed by those I define, and name herein, wha else is goung on in western democracies that remains hidden?

And it is that last question that has,ROGS cheering for all the “bad guys, ” like Russia and China and even lil Kim in North Korea, apparently absent from an important meeting recently, lol. Because when “America, land of the free ” morphed into “America, just another police state, ” ROGS and hundreds of thousands like me got thrown under the bus.

Listen: China is thriving, and Russia protects Edward Snowden to this day, and Kim is no threat to anyone.

But I guarantee that CIA/DIA/NSA /FBI feeding down into “parallel colluding investigations ” and the subsequent constant surveillance of our webs of relationships single -handedly voids the constitutional compact, and the social compact as well.

So, I like to fight back by deploying counter -surveillance directly at those who point it at me, because my personal silence has been “disrupted ”. And in so doing, I learn a lot.

Here below, we see how Russians were able to anihilate FBIs urveillance teams privacy, and also how they were able to use this not -so -covert, sloppy, bizarre surveillance to gain valuable data about US security.

Which, would, under normal circumstances, inevitably undermine US security, if our own agencies hadnt ALREADY done that.

But in total surveillance states, security is ALREADY pre -emptively undermnied by tribal -sectarianism, and those who have deployed high policing on their own citizens .

The case of the Spies who laughed last, at Americans who use their own fellow citizens for “electronic target practice,” or:

FBI Follies, from Russiagate, With Love, via,Yahoo News Exclusive

Exclusive: Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil
Zach Dorfman, Jenna McLaughlin and Sean D. Naylor

Yahoo NewsSeptember 16, 2019

The discovery of Russia’s newfound capacity to crack certain types of encryption was particularly unnerving, according to former U.S. officials.

“Anytime you find out that an adversary has these capabilities, it sets off a ripple effect,” said a former senior national security official. “The Russians are able to extract every capability from any given technology. … They are singularly dangerous in this area.”

The FBI’s discovery of these compromises took place on the heels of what many hoped would be a breakthrough between Washington and Moscow — the Obama administration’s 2009 “reset” initiative, which sought to improve U.S.-Russia relations. Despite what seemed to be some initial progress, the reset soon went awry.

In September 2011, Vladimir Putin announced the launch of his third presidential campaign, only to be confronted during the following months by tens of thousands of protesters accusing him of electoral fraud. Putin, a former intelligence officer, publicly accused then-Secretary of State Hillary Clinton of fomenting the unrest.

It was around this time that Putin’s spies in the United States, operating under diplomatic cover, achieved what a former senior intelligence official called a “stunning” technical breakthrough, demonstrating their relentless focus on the country they’ve long considered their primary adversary.

That effort compromised the encrypted radio systems used by the FBI’s mobile surveillance teams, which track the movements of Russian spies on American soil, according to more than half a dozen former senior intelligence and national security officials. Around the same time, Russian spies also compromised the FBI teams’ backup communications systems — cellphones outfitted with “push-to-talk” walkie-talkie capabilities. “This was something we took extremely seriously,” said a former senior counterintelligence official.

The Russian operation went beyond tracking the communications devices used by FBI surveillance teams, according to four former senior officials. Working out of secret “listening posts” housed in Russian diplomatic and other government-controlled facilities, the Russians were able to intercept, record and eventually crack the codes to FBI radio communications.

Some of the clandestine eavesdropping annexes were staffed by the wives of Russian intelligence officers, said a former senior intelligence official. That operation was part of a larger sustained, deliberate Russian campaign targeting secret U.S. government communications throughout the United States, according to former officials.

The two Russian government compounds in Maryland and New York closed in 2016 played a role in the operation, according to three former officials. They were “basically being used as signals intelligence facilities,” said one former senior national security official.

Russian spies also deployed “mobile listening posts.” Some Russian intelligence officers, carrying signals intelligence gear, would walk near FBI surveillance teams. Others drove vans full of listening equipment aimed at intercepting FBI teams’ communications. For the Russians, the operation was “amazingly low risk in an angering way,” said a former senior intelligence official.

The FBI teams were using relatively lightweight radios with limited range, according to former officials. These low-tech devices allowed the teams to move quickly and discreetly while tracking their targets, which would have been more difficult with clunkier but more secure technology, a former official said. But the outdated radios left the teams’ communications vulnerable to the Russians. “The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,” said the former official.

A former senior counterintelligence official blamed the compromises on a “hodgepodge of systems” ineffective beyond the line of sight. “The infrastructure that was supposed to be built, they never followed up, or gave us the money for it,” said the former official. “The intelligence community has never gotten an integrated system.”

The limitations of the radio technology, said the former senior officials, led the FBI’s surveillance personnel to communicate on the backup systems.

“Eventually they switched to push-to-talk cellphones,” said a former counterintelligence executive. “The tech guys would get upset by that, because if they could intercept radio, they might be able to intercept telephones.”

That is indeed what happened. Those devices were then identified and compromised by Russian intelligence operatives. (A number of other countries’ surveillance teams — including those from hostile services — also transitioned from using radios to cellphones during this time, noted another former official.)

What is "gang stalking"? It is the result of a nation that respects no laws- and a nation 'for sale.'

The article below is from Business Insider in 2012. It documents one of the first official sources that claimed the government had sold our rights to “others,” who were wiretapping the entire nation.
The article chronicles decorated intelligence officer, and NSA whistle-blower William Binney’s ostracization, and excommunication from the cult of intelligence, as well as his harassment by the FBI for trying to save the taxpayers FOUR BILLION DOLLARS- but also, that he tried to preserve “Costitutional Liberty,” aka “due process of law, which Americans have not had since 2004.
In 2012, many already knew that the local police were using and abusing massive databases. Many already knew that ‘somehow’ that police, and multi-agency Task Forces had access to cell phones in real time, and that ‘somehow’ they could track “targeted” communications across a city, or across a continent- and into international jurisdictions (Hi Toronto!)- and that they could repeat back selected words and phrases just to let them know they  are watching.
While these people didn’t have a ‘name’ for it them, we now know it is the current sate of affairs where Fusion Centers were spying on citizens in local environments outside the view of any court, and outside the view of due process of law, and without respect for the Bill of Rights.
These people have a name- they are “targeted individuals,” and here is where the world began to know what “TI’s” knew as far back as 2003-4:

NSA Whistleblower Says The Feds Are Gathering Data On Nearly Every US Citizen

NSA ACLU
The government has been collecting data on nearly every U.S. citizen and assembling webs of their relationships, National Security Agency whistleblower William Binney told the Hackers On Planet Earth (HOPE) conference last week.
Binney worked for the Defense Department’s foreign signals intelligence agency for 32 years before resigning in late 2001 because he “could not stay after the NSA began purposefully violating the Constitution,” according to a statement he made in court records.
On April 20 he gave his first interview after resigning to Democracy Now!, asserting that the FBI raided his home after he blew the whistle on the NSA’s extensive spying on Americans.
On July 2 Binney, along with two other former NSA employees, agreed to provide evidence in the Electronic Frontier Foundation’s lawsuit that alleges the U.S. government operates an illegal mass surveillance program (i.e. Jewel vs. NSA).
His sworn declaration of facts that he’s willing to testify to are both telling and scary:

• In the ’90s Binney supervised the development of a NSA program called “Thin Thread” that was designed to identify international networks of connections between people from their internet communications. Since one side of the communications was domestic, the program encrypted the data so as to protect the privacy of U.S. citizens until a warrant could be obtained.
After 9/11 all safeguards went out the window as “the individual liberties preserved in the U.S. Constitution were no longer a consideration.” Members of his Thin Thread team began implementing a program called the President’s Surveillance Program (PSP), which collected domestic electronic communications traffic without any privacy protections.
• The NSA began seizing and storing most electronic communications passing through 10 to 20 wiretapping rooms in key telecommunication points throughout the country where all data must pass in order to move from one party’s network to another’s, allowing the government to identify and analyze any individual or group through a searchable database.
• Binney cites the $1.2 billion Utah data center currently being built and the new supercomputing center at the NSA headquarters in Fort Meade, Maryland, pointing out that the immense size and computing power of these facilities far exceeds the capacity necessary for storing targeted communications but is “consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications.”
In a nutshell Binney states – with considerable authority – that the NSA has been conducting comprehensive surveillance on U.S. citizens for more than a decade.

 
[youtube https://www.youtube.com/watch?v=JuvJ7tKIF2c&w=561&h=432]

Organized gang stalking and Countering Violent Extremism programs: how"Disruption"programs work-a privacy and due process raping boondoggle, and security theater cash cow.

The goal of all of this privacy rape, and due process subversion by the NSA/CIA/FBI/LEO data theft? Who knows, and  whatever-cuz’ it’s “for the children.” And ANYTHING that is for the children is big money in a totalitarian or surveillance state. The ones who aren’t bombed overseas-aka “the remnants of” the “children”-those that are left after the DVIC and the MIC with ts affiliated “industries” has “their way with them,” first. Pre-natal supremacy over ‘the children’ and the MIC is a one way street.
Soft force eugenics and child abuse: how the DVIC and the MIC maintain religious, and narrative supremacy over future generations. Meet the Countering Violent Extremism programs which are really ideological restraints on privacy, rights of assembly, and rights of free expression, coupled with violations of the equal protection clause of the United States Constitution.
Imagine you are a peace activist, or NOT a member of one or another sect/cult/order/denomination of a Jewish-christian religion; or you’re an atheist/humanist/whistle blower/ activist-even a ‘petty criminal’ who smokes pot-and one day, you find that you seem to bump into the same faces all over town-that ‘faces’ re following you. That’s odd, you think: that 6’2″ tall guy in the brown Eddie Bauer loafers, classic Dickey’s slacks, and the close cropped, fawny Germanic brown hair that matches his shoes,and who drives an oversized big red Ford pickup-he was everywhere I was today: whipping into the parking lot at Target, or sweeping into the restaurant that serves the “ethnic food,”and trying to bury his angular 6’2” frame into a booth. Odd, you think- how a guy that big can hide himself behind an 18″ tall menu….
Naw, you think- must be my imagination. The 18″ menu format, I mean.
And then, for weeks, this pattern repeats itself, sometimes with the tall guy, sometimes with others, usually white but frequently erudite and well dressed 6’3″ brown and black people (also, often with dreadlocks and blue suits; or pert Persian women in sensible flats, with cameras in hand, asking to take your picture at peace marches, or anti-apartheid meetings). The squat, weight-lifter framed black woman with the bad weave, and the sensible backpack and recognizable mid-western accent coupled inevitably with the tall brown shoed flatfoot; the Asian man who is a modern Charlie Chan, but with real Asian heritage and ethnicity, showing up on buses, coffee shops, AA meetings maybe (I have that on reliable sources, I promise…).
That’s odd, you think- this has been happening for weeks! Months! YEARS!! And you become a bit ‘paranoid’ and a bit on edge, looking over your shoulder all the time, because those same faces show up frequently; sometimes across the states.
Related Story: The Brennan Center for Justice at NYU CVE link roundup
About then, when you notice, and especially, when you begin to document it in some form-it stops-day after day goes by and you don’t see the tall guy, or the middle eastern or the Kenyan man following you; and the late middle aged shrew with the strange comments in the grocery store about ” I know what you READ!” disappears too. A week or two or a month goes by, and then new things happen: you come home, and the lock on your door is somehow different-usually it is more loose-but now it’s harder to get your key into(this can go both ways, as each lock smith, or lock picking set is different); or there are strange marks on your door jamb (sometimes a three pronged tool is used, other times what appears to be a wide, flat screwdriver).
The Black Bag Job, illustrated:
1563470456369
IMG_20190719_012742
1563470581341
1563470538651
And the internet, of course- you try to log in to Gmail, and as if you are being transferred to a computer across the world-twice-as it takes between seven and twenty seconds just to log in-EVERY TIME, whereas in the past several years, it was a matter of one to three seconds. You notice that you Gmail address has been switched from San Francisco to Irland, or he UK-odd, that you would take the time to notice that-you probably are losing it.
Strange, you think, I haven’t changed ISP’s, or used a new computer, nor have I changed any settings on ANYTHING. And certainly, I don’t live in Kansas, anymore. And certainly, those brand new wireless AP’s that spring up outside your house with kewl names like “MAdame PSycho,” and “Not the FBI Surveillance Van,” or “TAO2” are all in your head. Sure-that’s an option too.
Hmmm. And the pop-ups and advertisements on your computer will take on a life of their own, as for years upon years, you got ESPN, Manchester United schedules,  and “subscribe now!” popups every time you are on the computer reading news for free, or maybe an occasional ad for the “Penis Pump,” or free Viagra samples(no-really that wasn’t my case, I swear) but you now get pop-ups asking you about tinitus, and advertisements for middle eastern vacations-ads in Arabic. Maybe you get the weird pop-up about gun shows in Texas(“deep discounts for LEO’s who buy in bulk!”), as your IP registers in Nebraska….
And, the phone of course- your phone now has the ability to occasionally talk back to you- about what you did yesterday, or an hour ago (and this will happen only once or twice, just so that you cannot begin to document it.)
This is on the surface one of two things: you are going totally and completely bonkers-nuts to the meat grinder mad-you are deteriorating as if your mind has been taken over by ‘something else” that somehow knows who YOU are, and WHERE you are at all times, even if you’ve never owned a gun in your life, or used a penis pump (well-who HASN’T used one of those?!!).
You become pre-occupied with little strange happenings like your garbage being tipped over in your alley, or the long scraping marks left on the siding of your house by a ladder-maybe in your paranoid mind, you connect those random events: the ladder marks to your now debilitated security cameras whose cables had been disconnected RIGHT WHERE THOSE LADDER MARKS scrape your siding, and ding your white aluminum window trim with deep scars and gray marks.
Maybe the little camera left behind in your sons bedroom is a sign of something evil-who knows, right? It’s your word against the deep state, and all of it’s military/LEO/psychologist/MIC/PIC/religionist/occultists-who-work-in-government. And who are you, really? It’s for the Children (hitler youth), after all!
Or, maybe the reports from your neighbors about how they saw other strange fat white men jumping your fences, or signalling to each other from your alley to the street, or using strange hand signals just as they hopped into cabs that JUST HAPPENED TO BE WAITING THERE in front of your house strikes you as “odd” reports from a good and trusted neighbor.
Suuure. Maybe your going crazy-along with your neighbors, who ALL report these things to you. And some of whom are suddenly building fences, or installing their own security lights and cameras.
Yup-you’re nuts, prolly. Orrr mebbe….
Maybe another option that is a little less crazy perhaps: you are being covertly and totally [email protected] with by one of any number of sources ranging from LEO’s to military operations, to strange cultists or organized gangs of pedophiles* that most often are run from within the official cover of state agencies and their affiliated “good guys” and girls (here is one possible case of that. And read through this blog to help understand who else it might be.)
But in many of the early cases-stemming back to around 2001-these were often covert intimidation/recruitment/entrapment/coercion/conformity/manipulation schemes that loosely fall under the category of “countering violent extremism” programs run by any of a number of unethical operators ranging from LEO’s, task forces, and intelligence agencies to private contractors.
And, the one key feature they all have in common has a plausible connection: agents and agencies that practice fraud upon the courts, and fraud upon the Constitution via massive, unchecked database abuse, and surveillance via electronic media such as computers, cell phones, and even televisions. You have been selected, and targeted for intelligence collection (HUMINT), informant recruitment (they want to use you as a rat), or possibly, you have been deemed a criminal, without due process of law,  due to the use of unauthorized access to your computer and Google searches, and, because that access was illegal, and parallel construction not warranted in your case (there’s a joke in there somewhere about warrants) “they” have chosen to use you as a moving target for all their new military grade electronic toys and weapons.
Related Stories: Have a look at the bizarre world of parallel construction from Techdirt.com-the practice of LEO’s breaking the law, and violating the Constitution, and then doing plastic surgery to put a new face on “criminality.”
Sooo…….
Welcome to the shadowy, sketchy, often bizarre (and incredibly well financed) world of CVE programs!

“Countering violent extremism programs have been identified by the government as a top national security priority, but the public knows appallingly little about them,” says Hina Shamsi, director of the ACLU’s National Security Project. “We’re suing because government agencies have repeatedly failed to provide us information that we’ve requested about the nature of their CVE initiatives.”
In a briefing paper released with its lawsuit, the ACLU said that CVE programs often target “people for monitoring based on their beliefs or ideologies,” thus potentially criminalizing speech protected under the First Amendment. It also highlighted past abuses of CVE programs, including instances in which young people who refused to take part were characterized as radicals and where community leaders were told they would have to identity and discuss cases of specific youths with law enforcement.
The Department of Homeland Security declined to comment for this story, citing pending litigation. The Department of Justice did not respond to request for comment.
Government-led CVE efforts in the United States are inspired in large part by programs rolled out in past years in the United Kingdom. Broadly speaking, CVE programs seek to expand counterterrorism efforts beyond law enforcement to involve other government workers, like teachers and social workers, as well as community leaders outside of government, like clergy. They can involve propaganda and other communication strategies as well as monitoring and questioning.
Those programs have been deeply controversial in the UK, where civil society activists have blamed them for exacerbating ethnic tensions within British society while failing to meaningfully fight extremism. In recent months, the U.K. government has also rolled out anti-radicalization programs in schools, which have led to instances in which Muslim schoolchildren have been stigmatized by teachers as potential terrorists.”

*One recurrent theme in almost ALL OGS blogs is that those who are targeted are also slandered with a variety of “labels” ranging from drug dealer/user/ to prostitute to “pedophile”. But the reality is that state organizations, police, psychologists, lawyers, the courts, CPS, foster care, social work, and many other subsidiary organizations are a multi-billion dollar per year domestic industry, subsidized by the Jewish-christian ideological state to get children funneled into the Domestic Violence Industrial Complex (DVIC) by hook or by crook (be the shepherd, not the sheeple and all that.)
Each child that is successfully stolen or otherwise diverted into this “system” is a cash cow (cash sheep?) returning dividends to those who are part of this system. For instance-foster parents can rake in between 800-1800 per month, depending on the state, per child. And any child that becomes involved with CPS ca returns some 70k or so per year to those who participate in this business.
Not surprisingly, Myron May, a man who claimed he was gang stalked, was the product of the multi-million dollar Christian foster care factories that are dotted across America-and no researcher of OGS has yet made this connection between him, and this systematic profiteering off of children as commodities.
Disclaimer: I make no claims herein specifically or intentionally relating to the financing of the Taunton Foster care community, and intend this example as one of many where children are used as cultural capital as well as actual capital. owever, I have long been a critic of the DVIC foster care factories that dot America and that are themselves a 4 billion dollar per year industry. Children taken into foster care stand an 80% ncreased chance of sexual abuse, or othher harmful situataions, and the feminists/internationalist/bolshevik elements of many “progressive” state depend on this revenue, and use it for political action.

The Panopticon and gang stalking complaints: 24/7 harassment is what the Panopticon was designed to do

Gang stalking and symptoms and 24/7 harassment and trauma based mind control (TBMC): hidden in plain sight

“At it’s centre, the victim’s known as “Targeted Individuals” or “TI” for short claiming to be consistently harassed 24/7 by unknown perpetrators that to those around them can see no apparent activity is obviously going to become labelled with some form of mental illness.”
–https://gangstalkinginfoblog.wordpress.com/2016/02/

In my experience, this phrase-this claim of 24/7 harassment- appears in some 75% of all the blogs I have read. The reader should note that all of my estimates are ‘shoestring’ estimates, meaning that my data is an opinion, based in intensive research-not yet collated and verified.
More often than not, the 24/7 claim appears in blogs that attempt to discredit or mock  TI’s. However, because OGS is in part an influence operation with features of mind control, it also appears that many TI’s adopt the language of those who stalk them. This is common in Stockholm Syndrome  as we see with the Beatrice Six, but also in operand conditioning and other nefarious victim/torturer  scenarios as well.
And, this is common in torture and blackmail situations where victims attempt to side with their torturer. It famously has been called “Stockholm syndrome,“in the extreme case, and in OGS, we see that it is frequently referred to as “NTT” or “no touch torture”in most online blogs and video’s.
The phrase “24/7” is itself a relic of street culture, and has it’s origins in gang or prison environments too, such as “24/7 lockdown” and so on. But what is important to note is this: in classic mental conditioning, aka behavioral experiments, as well as social engineering, and trauma based mind control, it really doesn’t take much to make a target feel as though they are under constant observation. All it takes is one, well planned event, and then, reminders of the event placed here and there, much like the kinds that are described on TI blogs and video’s.
No Touch Torture (NTT) is also officially part of the CIA’s torture protocols, and because we know that there is virtually no window between intelligence agents and the public these days, and that 17 intelligence agencies are involved in culling through the NSA’s illegally entrapped data of all Americans,  it is not hard to imagine that these things take place. But in the cases we have evidence, it is clear that there is a component of NTT in effect.
Then, if you add Fusion Center spying that can put a squad car in front of someones house within minutes of them logging on to a computer, and some redirection when they are online, and the ‘symptoms’ are no longer imaginary or schizophreniform, but instead are descriptions of the disease itself. And, the disease is social engineering that employs 24/7 surveillance and monitoring of a person via ther cell phone, computers, and programs like the CIA’s Laser, which is used in every day policing.
These programs were put in place quietly over a decade and a half, and few knew about them, or what they do. But we know now: they monitor us in real time.
Here are two actual examples of lawsuits and stories where rea time monitoring activity of citizens under the “watch” of unknown perpetrators made the national news:
Someone in a store or at your job repeats something back to you, and that something just happens to be exactly what you read about on the internet last night. Then, you are stalked and harassed for years, risking you and sounding like a crazy person after you figure out how it was done. This is the famous Jeffrey Kantor lawsuit, documented by the American Bar Association’s ABA online journal:

Autocomplete search led to government stalking, lawsuit contends

image

Image from Shutterstock.

A former employee with a government contractor claims the government began a campaign of harassment against him because of Google’s autocomplete feature.
Jeffrey Kantor says in a federal lawsuit (PDF) that he intended to search for “How do I build a radio-controlled airplane?” in October 2009 because he was thinking of making the toy for his son’s birthday. After he typed “How do I build a,” Google completed the search with the word “bomb,” and Kantor inadvertently hit enter. Courthouse News Service has the story.
The suit names several government officials as defendants, including Attorney General Eric Holder.
Kantor alleges that government investigators visited him at work after the unfortunate search, monitored his book purchases and computer searches, and attached a GPS device to his car….[click to read more]

 
Then there is the complaint (symptom) where your home is entered and  victim suspects they are being filmed all the time.
This happens surreptitiously after you are gas-lighted- things are moved around in your apartment, and windows and doors are left in curious positions. Such as the case of Dr. Facika Tafara, who runs a family health clinic in San Diego (which is arguably the gang stalking capital of America)whose home was broken into on multiple occasions, and at one point the people responsible left behind a small spy camera:
[youtube https://www.youtube.com/watch?v=U0mjwAPtcRY&w=854&h=480]
 
These two incidents can provoke different levels of paranoia, distrust, fear, and other emotions that indicate trauma. But in OGS, these events are repeated over years, and often escalated to absurd points over time (Bob Deis, the Krlich’s of Ohio) so much so that even beginning to describe these experiences, compounded by time, makes one sound crazy simply because of duration.Therapists and lawyers should note that the “onset” of the “symptoms” can be correlated to real life events, rather than as organic brain disease.
For the criminal defense attorney, the psychologist, or the therapist, it is crucial to view the patient/TI claimant/ actual victim through this lens of TBMC, and its effects over time. And ask yourself as a ‘rational’ or ‘reasonable’ person: How much of your personal information would you be able to hear repeated back to you before you exhibit signs of paranoia?
How many small camera’s left behind in your home can you tolerate? It only takes one for most people before they are spooked-but for TI’s it is often years of these occult activities, that are practiced in the ‘community policing’ schema’s across the western world. And, both incidents share features of known instances of gang stalking: Kantor is Jewish in a highly Christian part of America, and Tafara is a family health practitioner, and many abortion doctors as well as alternative medicine clinics are prime targets of documented group and gang stalking.

Gang stalking veterans: welcome home-now meet HSI/DHS private contractors and surveillance role players who stalk you as a threat to America.

organized gang stalking and veterans
Many veterans report that they are gang stalked, and some speculate that it is necessary to ensure that they don’t go “postal” and shoot up some stuff here; that it is a form of psychic driving meant to de-pattern them much as the famous mind control doctors such as McGill University’s own Donald Ewen Cameron-who was a CIA contractor- perfected in the 1950-70’s. Or as others speculate, that it is a deliberate effort to create Manchurian candidates ho then go ballistic, and drive political narratives, such as the anti-2nd amendment lobbyists using soldiers to drive anti-gun ownership.
Related Story: How the Department of Homeland Security ICE HSI runs a very welll hidden asset forfeiture racket (when was the last time MSM mentioned THAT?Patterns….patterns….) styled after CIA self-funding black operations
The research on organized gang stalking does indicate that veterans are highly targeted, and that their anxieties are only exacerbated by hidden “domestic terror,”waged by the DHS and the associated private contractors” who act in darkness, beyond a chain of command or accountability, and perpetrate illegal or questionable tactics directed at targeted individuals.
Many veterans have also been exposed to classified tactics and technology, and some of these narratives also indicate that they are stalked much the way that whistle blowers are stalked. And some whistle blowers, like Walter Laak of Las Vegas, Nevada, a combat veteran of two tours in Iraq, (LAs Vegas has inordeinately high reports of gang stalking) sometimes confront the hidden cash cow of the FBIs CVE programs, where pastors, social workers, and psychiatrists all report to the FBI, throwing atient confidentiality out the window.
Here is one other such testimony, a plea really, from a veteran named Douglass Lee Thompson:

My personal investigation is a collection of  victims testimonies, public documents and 1000’s of articles on this subject. I am just a Blogger, and Military Combat Veteran, etc.. but the cries for help to State Representative, Congress, and the State’s Attorney Generals office’s points to massive misuse and abuse of high tech electronic surveillance/ harassment equipment, a well funded operation to sabotage selected individuals.
I personally believe this is a “Organized Criminal Cabal” doing this Gang Stalking. After serving my Country  Honorable for over a decade, serving in two Wars, multiple Operations, I do not believe, I can NOT believe this is a act of Government Operations, but a well funded Criminal Operation.
I pray they get taken down by the professions who are voted in to protect American citizens, taken down by those who raised there hand and swore a oath to protect the values established in the United States Constitution, taken down by those who made a solemn declaration I will support and defend the United States against all enemies foreign and domestic..
I believe and have great confidence Gang Stalking will be declared ” Domestic Terrorism probably funded by someone like ISIL/ISIS , that’s a personal opinion, but the fact this Gang Stalking is happening to American Military Veterans, and many others is fact in my book,,, Blogger investigation complete!!!!…
Lets pray the ones in power put a stop to this… and use the legal system to handle the Judges jobs… Letting the legal process work, the U.S. Constitution work.. and give every American Citizen the privilege to pursue, Life, Liberty, & Happiness, all the Apple Pie they can get…. God Bless…
Gang Stalking does not represent any American values, I grew up with, I’ve served with many who would give there life for America… I do not believe the misc articles saying the Government is involved.  I do believe after two years looking deeply into this subject, its a well funded criminal operation,, sounds like Domestic Terrorism, and ISIL/ISIS from what’s on the the news every day…. Lets Pray the victims of ” Gang Stalking find Justice and Protection from those professional charged with protecting American Citizens.  
http://www.douglasleethompson.wordpress.com

 
It is not impossible to imagine that many veterans have been exposed to some as yet disclosed forms of experimentation. It is also possible many veterans are stalked due to the fact that they have been around classified materials, practices, or technology, and that a psychological operation, or influence with a “discrediting narrative,” is being waged in and around their lives.
Had I told you of my own experience with Virginia based companies, institutions, and subversive internet tactics going back to 2005-and told you that hidden technology can mirror my cell phone, and then subvers the functions of encryption by performing a man-in-the-middle attack from the phone itself-that my phone has been at times  you would have laughed at me. After all-who am I to tell you?  But this was the biggest news story in the world as of yesterday, and even mainstream media like MSNBC carried the story.
When one person says one thing, it is anecdotal-but when many say similar things, well, it becomes empirical.And for most people, when they see it in MSM, well, it’s nearly as truthful as the Bible, or the Talmud.
Here below, is from McGill University, which has admitted that they profited from torture and apologized for mind control:

Imagine being trapped in a small room. Your hands covered in gloves, your sight blocked by translucent glasses, and your head covered by a pillow. You cannot touch, taste, see, smell, or feel. You are totally deprived of your senses. This is the imagery of torture in foreign wars, of espionage blockbusters, of terrible nightmares. It seems hardly something that would occur in Montreal. But it did occur, right here at McGill.
Today, many journalists, doctors, and the general public see the Allan Memorial Institute in Royal Victoria Hospital as the cradle of modern torture, a cradle built and rocked by Scottish-born Dr. Donald Ewen Cameron. To the patients of Dr. Ewen Cameron, our university was the site of months of seemingly unending torture disguised as medical experimentation –– an experimentation that destroyed their lives and changed the course of psychological torture forever.
Cameron’s experiments, known as MK-ULTRA subproject 68, were partially funded by the CIA and the Canadian government, and are widely known for their use of LSD, barbiturates, and amphetamines on patients. In the media, they were known as the “mind control” studies done at McGill and were reported as a brainwashing conspiracy from the CIA and the Canadian government. For journalists, the story was a goldmine. LSD use in a CIA experiment was an angle no sensationalist media could reject, especially in the anti-drug frenzy of the 1960s.

Gang stalking and surveillance role players

Meet Robert Guffy of Cal State University, author of Chameleo which documents one man’s experience being gang stalked by organized military figures:

Robert Guffey

Robert Guffey is a lecturer in the Department of English at California State University – Long Beach. His most recent book is CHAMELEO: A STRANGE BUT TRUE STORY OF INVISIBLE SPIES, HEROIN ADDICTION, AND HOMELAND SECURITY (OR Books). His first novel, UNTIL THE LAST DOG DIES, is scheduled to be published by Night Shade/Skyhorse in November of 2017.

Guffy writes at Cryptoscatology:

“The desire for control runs rampant through our 21st century society.  What with the advent of Facebook, YouTube, and other such self-surveillance technology, many citizens aren’t afraid of the rise of Big Brother anymore.  Instead, they want to be Big Brother.  To find evidence of this strange sociological phenomenon, glance through your local newspaper; you might come across a mysterious ad searching for “surveillance role players.”  You may very well have seen these ads and passed right over them, not understanding what you were seeing (yes, just like Poe’s purloined letter).
In August of 2013 an intriguing ad popped up on Craigslist.  This ad seems to give an official name to the perpetrators who engage in gangstalking.  For years targeted individuals had no idea what the gangstalkers called themselves.  One can’t ignore the significance of the Orwellian, bureaucratic language at play here:
Surveillance Role Players and Practical Exercise Role Player (San Diego)
The MASY Group is looking for motivated surveillance role players (SRPs) and scenario driven practical exercise Role Players (RPs) to support military training activities in the San Diego, California region. Qualified personnel should demonstrate an established track record of conducting surveillance operations at various discretion levels, supporting surveillance training and military practical exercise training. Individuals with previous military, intelligence community and law enforcement experience are highly preferred.”

Surveillance Role Players appear to be contractors who work under the federal umbrella of alphabet agencies in counter-intelligence. In an ordinary world, or in a democracy, this would be seen as a good thing, the government contracting mercenaries…right?
The only problem is, that these mercenaries are training here, on American soil, targeting other Americans in hidden campaigns of domestic terror that defy the Constitution.And that’s not right…right? Like-Americans have rights, right?
I mean- who knows anymore who is who in the many agencies that work in secret, applying secret interpretations of law, secret surveillance, secret black operations, secret etc. They could be the Russians for all I know anymore- there are just so many secrets, and black bag jobs, and black operations all across the country today-who can keep up?
We’re all so free- I’m lovin’ me freedumb!
Nope, not according to these guys.Wouldn’t it be nice if we all lived our lives like we are on a military base, subject to military laws, and military control-right? Oh wait- that’s not a Democracy-that’s a totalitarian, authoritarian, rank and file scheme that in and of itself defies and defiles and destroys democracies all over the world today.
And who needs a Constitution at the border anyways-the border which some say is 100 miles thick. Let me get my map out, and see if I can count one hundred miles inland. No wait-fuck that, I’m calling the ACLU ASAP. We need to fix that map/Constitution conflict.
Follow the link above to Cryptoscatology to learn more about Chameleo, and night vision goggles or something way more shady.
 

Gang stalking, DHS, and law enforcement

It is widely documented in nearly every blog that discusses organized gang stalking that there is or has been police, FBI, DHS, or other agency involvement (much of it mis-attributed, as we see in the case of LEIU’s that they work in “darkness” and complicity with bad actors, across disciplines, and from within the hidey-holes of the “see something say soomething, even if you make it up” framework; and they do this with total impunity-even the FBI does not have access to the LEIU files*- and as such, like a gang or criminal enterprise itself), and all gang stalking is deeply rooted in deep state tools and database abuse where a targeted individuals data was gleaned illegally and without a warrant, and then used to “spook” them in a variety of ways, that any researcher of organized stalking is already likely familiar with.
Why the NSA database abuse is far worse than anyone could ever imagine.
But others note that surveillance role players and contractors with the Department of Homeland Security are also clearly involved in these activities. So in my research, I use this as one measure of the veracity of writings and video’s that document it. Gavin Seim has many video’s where we can watch the process in action as chubby government workers hide behind “rules and reguations” that they pulled out of a hat, rather than laws and due process, which are written in our Constitutions.
In security and especially covert operations, those who deploy these tactics do not want them widely known. And articles that chronicle the stalking of Rose McGowan by an army of spies provides a template of the horrific potential to coerce and frame individuals when we allow a surveillance state to go unchecked, and unaccountable. The cases of James McClynas of Florida and Rick Krlich of Ohio are also notable cases that document the abuses of local syndicates and city councils that were covered by MSM.
So, to a researcher of organized gang stalking, you will note that blogs that discuss this, but also provide documentation of this are valuable allies to falsifiable evidence that it exists, as opposed to bloggers who write about aliens, the devil, and talking to dead people.

Related Story: How Law Enforcement Intelligence Unit’s (LEIU’s) have destroyed any semblance of the US as a Democracy and the Constitution, one black bag job, one blackmail and compromise operation, one dossier at a time. From Project Censored- the top censored story of the 1970’s Project Censored- the top censored story of the 1970’s, and how it affects us today. [full text is available online]

The trick for the researcher is to uncover which is which, and then, to weed out the blogs and videos that are classic misinformation and disinformation, as well those that are purely deep state mind control operations, as we see here . For example, most blogs and video’s that reference Directed Energy Weapons, and electronic’s that are bizarre; or websites that dabble in the absurdly paranormal, although some are just odd accounts of unique worldviews, sprinkled with paranoia. And-most of the accounts are written by these same DHS/private contractor/NGO’s/foreign spies, unregistered foreign agents, and other scumbags working under the “community policing” and CVE schemes.
But any cursory search of the how-to and the who-to-target of propaganda and influence operations can be found online, and compared to these many blogs and accounts of OGS. Here is just one of the many declassified Psychological Operations manuals of the CIA. And here is the famous Simple Sabotage manual as well. PsyOps is a major feature of these operations.
Other clues that blogs and videos of gang stalking are psychological operations is that they give patently bad advice, such as https://neverending1.wordpress.com ( a site that borders on psychological sadism), which once advised TI’s to put a jar of water next to an electrical outlet; or sites that are very well funded, as is the case with OSI informers and others. Interestingly, several of the commenters at NE1 are Lions Club members, and others who fit certain profiles, as I have described herein, and many of them have now deleted or closed their blogs since I wrote about them. Others have gone on to work in OSI-type disinformation honey net operations.
In my experience, my rough estimate is that some 5-25% of all blogs are actually people who are indeed targeted individuals (TI’s) and the rest are useful idiots (some 45-50%) who work in and around LE communities, or subsidiary to them; some 20% are actually agency or agency affiliated. And small number of them are mentally ill, elderly, or just lonely people trying to fit in (these also show up in many blogs, like the neverending1 blog).
FightGangStalking.com is one apparently decent site that seems to steer clear of honey-netting or “DEW” misinformation, as of 2/28/2017 (so far-many of these sites start out well, and then get taken over, or manipulated by agencies, as many of them are just entrapment schemes.) So,  fightgangstalking.com, is notable among the many blogs because the writer only documents verifiable news sources and stories that any researcher of organized gang stalking can refer to as an official source. And, the writer is a former security industry worker.
Related: Here is a suite of free and pay-for investigative tools from Einvestigator.com that you can use to study your stalkers.
Also, and perhaps most importantly, the blog author gives credible background information about themselves, is open to dialogue ( we have exchanged emails), and does NOT allow a comments section. This last point is important because the great majority of blogs are a sort of free for all of madness, manipulation, mind control/influence operations, or honeypots whereby investigators entrap those who comment, or like Dr. Mike Wood’s blog on Conspiracy Theory Psychology, the comments eventually become disinformation outlets due to the well oiled crisis PR industry that I describe elsewhere.
The author of FGS is also familiar with the fact that much of gang stalking is perpetrated by security contractors and surveillance role players, and disreputable blackmaailers who work in any of themay “spy rings” that permeate the west today, likely funded by black budget’s and grants from the Department of Homeland Security and others. These quasi-investigations take on Orwellian proportions, and are highly reminiscent of the brutal psychological operations and blackmailing population control East German Stasi tactics of the 1960’s. But also, exactly like the case of Rose McGowan, who was followed, monitored, harassed, and manipulated across the globe for decades by an army of spies hired by Harvey Weinstein.
Surveillance role players and gang stalking
In the same way that members of the organized stalking community raised awareness that the NSA and other agencies were breaking the letter and the spirit of the law by wiretapping them, all American’s now know tat TI’s were right-the NSA is tapping all of our phones. And worse, continuing the harassment of TI’s by distributing that data to 15 other agencies long before that was made public. As some of us predicted in 2003-4, it will NOT get any more Constitutional around here, any time soon. Police states simply don’t go away-because they work in secret, and against due process at every step, building traps over periods of decades in some cases, as we see with Rose McGowan, who was followed for three decades by private spies.
TI’s are now warning that the Department of Homeland Security is using surveillance role players and cowardly, subversive, hidden armies of rats and snitches to target and harass them, and implicating the LEIU’s and others. This is not insignificant, because the DHS is actually said to be based on the model of the Stasi, and many today forget that it was a former Stasi agent, Markus Wolf,  that was consulted to set up the DHS in its early years.
From 2005:

Why would Homeland Security hire former Stasi chief Markus Wolfe and former head of the KGB General Yevgeni Primakov?
Is this part of the Bush anti-terror strategy? After all, Wolfe is the man who is credited with building up the feared East German secret police that was responsible for the disappearance and deaths of thousands of citizens. And, Primakov’s record is not any better. As skipper of the KGB he was driving force behind the machinery of state terror; a legacy that still has a chilling affect on many Russians.
Now, apparently, they’ve found a new place to hang their hats at Homeland Security. Or have they? Perhaps, the numerous stories on the internet are just fabrications intended to mislead independent research. That’s certainly one possibility. But, consider this; for those who have followed the activities of the current administration (the torture, the deception, the death squads, the destruction of Falluja) stories like this are difficult to discount. As a matter of fact, the hiring of Primakov and Wolfe seems fairly consistent with the long-term goals of the Bush team.