Online “personas ” and what to do about them: gang stalking by AI assisted robots and targeted individuals online

Online “personas ” and what to do about them: gang stalking by AI assisted robots and targeted individuals online: a gang stalking conundrum.

Gang stalking is automated, but also, assisted by living breathing humans, who are sometimes paid players, and other times, mere useless idiots who play along with the Mockingbird Effect.

Here, have a look at how I was cyberstalked on Mike Masnicks (fabulous ) blog, Techdirt.com:

The gang stalking started around 2013, when I tried to raise awareness of organized gang stalking. Out of necessity for dealing with a troll farm friendly commenting sytem at Techdirt, I used different “personas” to manage a conversation, but without any software, or automated programs to assist me:

https://www.techdirt.com/articles/20131210/07555625519/lawsuit-claims-accidental-google-search-led-to-years-government-investigation-harrassment.shtml

I responded to a comment from a guy name George Boneyard, which I referenced here.

I was defending/empathizing with a guy named Jeffrey Kantor who had been targeted by a Google based algorithym, and that had served him bullshit results, and possibly, those results spoonfed to him after some online gang stalking by Fusion Center operatives and military contractors/AI programs that manipulated his search results.

Back in those days, AI gang stalking was new to the “normies ” whereas I first experienced online “redirection” after I reported on the first Somali manufactured terrorist in the City College News, Mohammed Warsame, who was an FBI snitch.

Redirection is where people search Google, or other search engines for materials and get different results, depending upon who is targeting the searcher based upon an IP address, as we see in the case of ADL online cyberstalking here.

So, the Jewish, parochial journalist (Mike Masnick, of Techdirt.com, for example ) who searches for information about “why do Somalis get…. ” blankety blank, will get Google results for:

https://www.somalispot.com/threads/why-do-innocent-people-get-punished.76125/

https://www.somalinet.com/forums/viewtopic.php?t=357328

And other such discussions, whereas myself, I got results sponsored by shitbags like the Anti Defamation League, and bbbb,,b other shit-persons. I also got Nazi logo laden websites (courtesy of the Bronfman klan and local Fusion Centers, working with Infragard shitbags like that colleges president) every time I searched forresults like, “human rights in Palestine” and so on.

And, besides the ibvious terroris recruitment pop -ups, and as in Arabuc tat I couldnt read, when I searched for information on Somalis, I got stuff like this instead :


Why do Somalis smell bad
?

And, occassionally, stuff like this:

https://www.mnopedia.org/somali-and-somali-american-experiences-minnesota

But always, reverting to this:

Etc.

If you guessed that not all searches online are equal, you would be correct. Because our filtered internet serves some of us, different results than others of us.

Now, take a look at how I predicted that:

1 the Redirect Method will be used by the Anti Defamation League to bully, target, and harass individuals

2 the Anti Defamation League (and Mike Masnicks in -house trolls ) bully commenters online.

Its a ROGS BINGO.

So, now when I go online, I practice persona management, and I recommend it to anyone who is being targeted in the Panopticon.

Read this article about how defense contractors use persona management to target us,

https://m.dailykos.com/stories/2011/02/16/945768/-UPDATED-The-HB-Gary-Email-That-Should-Concern-Us-All

and keep in mid tat its not just “the gubmint ” targeting you, but tese das, it could be racist groups like the Anti Defamation League and its octopus of NGOs, or even te Klan, and any of the militant feminist groups who work behind Sexual Violence Centers (also note the para-language involved in nearly all DVIC industries )

I will provide more context at a later date, with evidence.

The going dark problem and Silence on the Wire: silence is a two way street, and the case of Russian counter -surveillance of Americas political police using “low risk” tactical methods.

If you’ve ever sat still, in a quiet room, for a single moment, you know that there is no such thing as actual silence, because your own body makes noise.

“The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,”

Breath, and other organic, natural acoustic utterances or disturbances are a constant compliment to your presence. Then, there are the subsidiary, environmental and natural sounds around you, as the breeze, or the distant hum of nature in its various forms.

And so, this is the human baseline of silence, and it is a valuable starting point within which we discover the fatal flaw of all so called intelligence, and counter -intelligence: the arrogance of intel operators in assessing the value of data received or sent, because after disruption and beyond the human baseline,its all just “other ”noise. And noise then, becomes a two way street.


Related Content:
Free download of Silence on the Wire: Field Guide to Passive Reconnaissance and Indirect Attacks,by Michal Zalewski

So, in a free world, one would expect that the human rights and guarantees of “freedom ” would be maintained nearly religiously; as nearly religion itself, by those who draw paychecks based upon their oaths that they vow to uphold our constitutions.

But thats not what is actually happening in the west, since US, British, and the allied nations began their religion based, tribal-sectarian holy war that kicked off in 2001, and guys like me got to meet the “deep state ” head -on, after writing news stories without tribal -sectarian bias, and true to the form of the principles of journalism, and anticipating the Total Surveillance State.

 

Related Story: Take a look at how I was the first person in America to report on manufactured terrorism, and then, got years and years of black bag jobs,cowardly morons rifling through my belongings, and news stories stolen right out of my phone and email, and everything I describe herein AFTER that and more.

And look how that turned out for me, PERSONALLY.

Indeed, with the US FVEY spying,the accompanying “community policing, ” the western governments can no longer claim that they respect, or uphold anything resembling democracy backed by civil rights and due process procedures, much less freedom of any type.

So, it is here, where western governments have turned ordinary citizens into involuntary, non -consensual surveillance targets( aka Human Intelligence or, HUMINT )where the noise of ones own, voluntary silence is, “disrupted ” by the FVEYs data theft on every persons phone or computer and then, the exploitation of that data by intelligence operators to create what Dr. Lorraine Sheridan and others call “an echo chamber ” both online and off that is mediated by western extremist religious and political ideology, as we see here and here.

So, ROGS, the blog you are reading here, is what is called in psychology, a reaction formation, to the newly emerged total surveillance state, and the death of American democracy, which I once believed in whole heartedly, and fought for, very vainly, with well chosen words.

My country is no longer a democracy, insomuch as it ever was due to the multi-tiered levels of privilege, doled out to the select men and women, contrasted against the multi -tiered levels of slavery, peonage, and debt servitude that these others cast upon the poor, the dissenter or activist; the heretic and others who fall into the hidden slavery nets of any of the many sects and cults of organized religion, working through government apparatus both online and off .

So, this theological filtering, regardless of what cult, or sect, is also the baseline for all western dialogistics as we see in the sectarian targeting of men by known race -based operators; and in the resultant cult practices that follow, such as the un -naming of (primarily ) men in this example here and other examples I provide here at ROGS.

So, in such an environment of what is essentially the mass exploitation if individuals, and groups of individuals, one cannot act of actual free will, because these operations, and these operators, are in constant disruption mode. Its what their version of a society is.

In that light, there are many ways to use silence, and also noise to discern their capabilities, tactics, and methodology, AFTER the fact of them, casting you into their various webs of interaction FIRST.

Keep in mind that the pre -emptive, anti-democracy, anti-due process, sectarian secret police state justifies itself not from law, but from their version of tribal -religious and moral superiority.

In that world, its all binary, I /O data analyses: Kill or be killed; heaven and hell; black or white; Jewish or not Jewish; Republucan or Democrat woman or man, etc.

And it is that analyses which is its flaw, which is why they break and bend, and prostrate the law in gray area policing, aka “high policing ” aka political policing, as we saw with the al Ghazali problem.

So, no small surprise then, when ROGS was able to out a few Department of Defense affilliated persons here who targeted me on US soil as they worked ine or another angle of fraudulent FBI /DHS /Private contractor CVE program, or cult members who cyberstalked me on Twitter, working with Democrat party with operatives INSIDE Twitter monitoring my location; or most recently, yet ANOTHER Department of Defense affilliated, Brookings Institute person following my blog.

As I said: I know what kind of noise is natural, like how this humble electrician and merchant mariner was literally recruited by a gang strike force in LA, versus any of hundreds of bizarre DoD/DHS /FBI /NGO affilliated time wasters they toss,at me, like these guys here

So if little old ROGS, an American citizen who has never been convicted of any crime in any trial based in constitutional law, civil rights, and due process can be targeted and stalked, and harrassed by those I define, and name herein, wha else is goung on in western democracies that remains hidden?

And it is that last question that has,ROGS cheering for all the “bad guys, ” like Russia and China and even lil Kim in North Korea, apparently absent from an important meeting recently, lol. Because when “America, land of the free ” morphed into “America, just another police state, ” ROGS and hundreds of thousands like me got thrown under the bus.

Listen: China is thriving, and Russia protects Edward Snowden to this day, and Kim is no threat to anyone.

But I guarantee that CIA/DIA/NSA /FBI feeding down into “parallel colluding investigations ” and the subsequent constant surveillance of our webs of relationships single -handedly voids the constitutional compact, and the social compact as well.

So, I like to fight back by deploying counter -surveillance directly at those who point it at me, because my personal silence has been “disrupted ”. And in so doing, I learn a lot.

Here below, we see how Russians were able to anihilate FBIs urveillance teams privacy, and also how they were able to use this not -so -covert, sloppy, bizarre surveillance to gain valuable data about US security.

Which, would, under normal circumstances, inevitably undermine US security, if our own agencies hadnt ALREADY done that.

But in total surveillance states, security is ALREADY pre -emptively undermnied by tribal -sectarianism, and those who have deployed high policing on their own citizens .

The case of the Spies who laughed last, at Americans who use their own fellow citizens for “electronic target practice,” or:

FBI Follies, from Russiagate, With Love, via,Yahoo News Exclusive

Exclusive: Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil
Zach Dorfman, Jenna McLaughlin and Sean D. Naylor

Yahoo NewsSeptember 16, 2019

The discovery of Russia’s newfound capacity to crack certain types of encryption was particularly unnerving, according to former U.S. officials.

“Anytime you find out that an adversary has these capabilities, it sets off a ripple effect,” said a former senior national security official. “The Russians are able to extract every capability from any given technology. … They are singularly dangerous in this area.”

The FBI’s discovery of these compromises took place on the heels of what many hoped would be a breakthrough between Washington and Moscow — the Obama administration’s 2009 “reset” initiative, which sought to improve U.S.-Russia relations. Despite what seemed to be some initial progress, the reset soon went awry.

In September 2011, Vladimir Putin announced the launch of his third presidential campaign, only to be confronted during the following months by tens of thousands of protesters accusing him of electoral fraud. Putin, a former intelligence officer, publicly accused then-Secretary of State Hillary Clinton of fomenting the unrest.

It was around this time that Putin’s spies in the United States, operating under diplomatic cover, achieved what a former senior intelligence official called a “stunning” technical breakthrough, demonstrating their relentless focus on the country they’ve long considered their primary adversary.

That effort compromised the encrypted radio systems used by the FBI’s mobile surveillance teams, which track the movements of Russian spies on American soil, according to more than half a dozen former senior intelligence and national security officials. Around the same time, Russian spies also compromised the FBI teams’ backup communications systems — cellphones outfitted with “push-to-talk” walkie-talkie capabilities. “This was something we took extremely seriously,” said a former senior counterintelligence official.

The Russian operation went beyond tracking the communications devices used by FBI surveillance teams, according to four former senior officials. Working out of secret “listening posts” housed in Russian diplomatic and other government-controlled facilities, the Russians were able to intercept, record and eventually crack the codes to FBI radio communications.

Some of the clandestine eavesdropping annexes were staffed by the wives of Russian intelligence officers, said a former senior intelligence official. That operation was part of a larger sustained, deliberate Russian campaign targeting secret U.S. government communications throughout the United States, according to former officials.

The two Russian government compounds in Maryland and New York closed in 2016 played a role in the operation, according to three former officials. They were “basically being used as signals intelligence facilities,” said one former senior national security official.

Russian spies also deployed “mobile listening posts.” Some Russian intelligence officers, carrying signals intelligence gear, would walk near FBI surveillance teams. Others drove vans full of listening equipment aimed at intercepting FBI teams’ communications. For the Russians, the operation was “amazingly low risk in an angering way,” said a former senior intelligence official.

The FBI teams were using relatively lightweight radios with limited range, according to former officials. These low-tech devices allowed the teams to move quickly and discreetly while tracking their targets, which would have been more difficult with clunkier but more secure technology, a former official said. But the outdated radios left the teams’ communications vulnerable to the Russians. “The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,” said the former official.

A former senior counterintelligence official blamed the compromises on a “hodgepodge of systems” ineffective beyond the line of sight. “The infrastructure that was supposed to be built, they never followed up, or gave us the money for it,” said the former official. “The intelligence community has never gotten an integrated system.”

The limitations of the radio technology, said the former senior officials, led the FBI’s surveillance personnel to communicate on the backup systems.

“Eventually they switched to push-to-talk cellphones,” said a former counterintelligence executive. “The tech guys would get upset by that, because if they could intercept radio, they might be able to intercept telephones.”

That is indeed what happened. Those devices were then identified and compromised by Russian intelligence operatives. (A number of other countries’ surveillance teams — including those from hostile services — also transitioned from using radios to cellphones during this time, noted another former official.)

Washington State, mind control documents, Fusion Center spying, police state bloggers, and GOD BLESS TECHDIRT.COM

DHS Fusion Center Gets Request For Documents On Extremists, Decides To Hand Over Mind Control Docs Instead
from the here’s-the-thing-you-didn’t-ask-for-but-will-probably-enjoy-reading dept

What  is  24-7 monitoring  of targeted  activists,  dissidents,  journalists, and  other  targeted individuals? Fusion Center  spying, the bizarre  quasi-Constitutional DHS/ICE/HSI  methods of secret policing, and the  NSA-Israel-FVEY data  theft  is de facto total  spectrum monitoring and  psycholigical  operations, aka mind  control,  by any  other name.

By  Tim  Cushing, of  Techdirt.com
Once you release a document to a public records requesters, it’s a public record, whether you meant to release it or not. The person handling FOIA requests for the Washington State Fusion Center (a DHS/local law enforcement collaboration known more for its failures than successes) sent Curtis Waltman something unexpected back in April. Waltman asked the Fusion Center for records pertaining to Antifa and white supremacy groups. He did get those records. But he also got something titled “EM effects on human body.zip.”
Instead of intel and assessments on local Antifa/white supremacists, Waltman found things like this:
And this:
The files did not appear to have been generated by any government agency, but rather collected from other sources who thought there might be some way the government could control minds using electronic stimulation or “remote brain mapping.” Why the Fusion Center had them on hand remains a mystery, as does their attachment to a FOIA request containing nothing about electronic mind manipulation.
This inadvertent disclosure has led to more requests for the same documents. Only this time, requesters — like Joshua Eaton of ThinkProgress — are asking specifically for government mind control files.
It appears the Fusion Center first thought about withholding some mind control docs, but somewhere along the line decided it couldn’t pretend the documents that weren’t supposed to be released hadn’t actually been released.
An email chain in the release [PDF] to Eaton contains an apology from the staffer who accidentally sent Waltman the mind control files.
Good afternoon Gretchen,
First of all I want to apologize the same way I apologize with my supervisor Lt Boyle and [redacted] I do not like to give excuses but I really sent this without intention when it was not responsive. I sent the original email to [redacted] with the attachments. I will try not make more mistakes…. Now, because of my error MuckRock sent another PDR. Sorry again for the situation and have great afternoon…
Gretchen (the Public Records Officer for the Washington State Police) tells the staffer not to worry about it. Apparently, sending the wrong files to requesters happens frequently, but otherwise, everyone is doing a great job, including the person who sent mind control files with a batch of extremist docs.
But that apology and forgiveness is preceded by the same staffer asking for another review of documents she already released to another requester, possibly in hopes of denying this release.
Erik,
[redacted] told me if you could review this. Mudrock is claiming that DHS did created this. I think I was not supposed to release this but it was public.
Can you help me what can I tell my Public Disclosure coordinator?
Sorry for the inconvenience
No response from Erik is included in the document so one assumes the release went ahead without his additional input. Now this requester has a copy of this email chain, something pulled from an internet “mind control forum,” and, inexplicably, the KKK documents released to Waltman in response to his FOIA request.
So, if you’re looking to obtain public records but don’t particularly care what records you receive, it appears the Washington State Fusion Center is a great place to try your luck.

Gang stalking BINGO: targeted individual, targeted real estate, targeted electronics, targeted childROGS ren…….

Let  me  know  if,  and  when  you  start  seeing  patterns in  the  data  of  organized  gang  stalking……because  the  Experts  all  agree that  an  obsession  with patterns  can  indicate delusions, and  maybe  even  schizophrenia!
But  there are,  in  fact, links  between  organized  gang stalking and  real  estate, organized  stalking  and kangaroo  DVIC  courts, links between Gang stalking and Electronic implants: (Here is how the NSA uses electronic implants.) and electronic  implants that  monitor  our  computer  activity, sometimes  for  YEARS.

Related  Story: How secret  policing tactical  assaults  can  induce  delusion-like  symptoms in  politically  targeted  individuals,  as  those  targeted  try to  find  words  for  un-Constitutional  government conduct:
Gang stalking and delusions and paranoid complaints: what is Level X thinking and cognitive bias in psychologists/psychology? 
OGS victims obsession  with  patterns can  indicate  delusions to  therapists  and psychologists  on  the  state  teats!

But  here  below is a  case study  in  organized  gang  stalking  that  is  full  of  the  EXACT  patterns that  I  describe here  at  ROGS.  Organized  gang  stalking  IS  what  I  say  it is!
So…BINGO: Lets Play ROGS BINGO, in  the  case  of  the  targeted  activist!
Black  activist jailed  for  Facebook  posts speaks out about secret FBI surveillance that  went  on for  YEARS.
Exclusive: Rakem Balogun spoke out against police brutality. Now he is believed to be the first prosecuted under a secretive US effort to track so-called ‘black identity extremists’
…….. The father of three said he was shocked to later learn that agents investigating “domestic terrorism” had been monitoring him for years and were arresting him that day in part because of his Facebook posts criticizing police.
“It’s tyranny at its finest,” said Balogun, 34. “I have not been doing anything illegal for them to have surveillance on me. I have not hurt anyone or threatened anyone.”
Balogun spoke to the Guardian this week in his first interview since he was released from prison after five months locked up and denied bail while US attorneys tried and failed to prosecute him, accusing him of being a threat to law enforcement and an illegal gun owner.
Balogun, who lost his home and more while incarcerated, is believed to be the first person targeted and prosecuted under a secretive US surveillance effort to track so-called “black identity extremists”.
In a leaked August 2017 report from the FBI’s Domestic Terrorism Analysis Unit, officials claimed that there had been a “resurgence in ideologically motivated, violent criminal activity” stemming from African Americans’ “perceptions of police brutality”.
The counter-terrorism assessment provided minimal data or evidence of threats against police, but discussed a few isolated incidents, notably the case of Micah Johnson who killed five officers in Texas.
The report sparked backlash from civil rights groups and some Democrats, who feared the government would use the broad designation to prosecute activists and groups like Black Lives Matter.
Balogun, who was working full-time for an IT company when he was arrested, has long been an activist, co-founding Guerrilla Mainframe and the Huey P Newton Gun Club, two groups fighting police brutality and advocating for the rights of black gun owners. Some of the work included coordinating meals for the homeless, youth picnics and self-defense classes – but that’s not what interested the FBI.
A march in the wake of the deaths of Alton Sterling and Philando Castile at police hands.
Investigators began monitoring Balogun, whose legal name is Christopher Daniels, after he participated in an Austin, Texas, rally in March 2015 protesting against law enforcement, special agent Aaron Keighley testified in court….follow  the  links  above….connect  the organized  gang  stalking  dots! Because  nearly  ALL  mass shooters  endure YEARS  of these  tactics by hidden  policing,  aka  “High  Policing,  aka Americas secret  police.”

Have you noticed the CIA listens in to key discussions online?

The headline up there is an inside joke-it came from inside my head. You see, lot’s of people think that sooper seekrit agencies like the CIA listens to us all. But that’s not true! That’s crazy! And worse- a “potentially dangerous tribe of troubled minds” in the organized gang stalking online community are starting to talk about their troubles online! They must be stopped!
But the truth is, the CIA listens to some of us, more than others of us in this modern Operation Gladio/aka CHAOS. And: the star chambers wage battle between six pointed stars versus five pointed stars, and MORE CHAOS!!!! With some THIRTEENS thrown in to the lions den (lions are seldom reported to wear high heels, but there are exceptions. Like when the rotary wheel is used as a form of domestic NTT, and Mooses and Elks and Lions Bears conspire in High Heels Policing. Ooops. Bears are Russians-never mind)
Related Story: The Privacy Raping Boondoggle That is the NSA/FiveEyes-Israel (New Zealand) data theft pipeline. What’s in a name? The FOUR MILLION DOLLAR Thin Thread versus the FOUR BILLION DOLLAR Trailblazer.
And William Binney, who recently sat down with the CIA director, is one of those “troubled people.” He has even lent his name to the targeted individual community, to investigate gang stalking. Yeah, for real.
And the Washington Post-one of the deep states favorite places to take a leak-say’s “Binney is playing with fire!” Let me know if that sounds like a threatening/threat narrative laden headline (does the use of THAT word up my DHS “threat matrix score?”)-because that could indicate paranoia, and we would have to get you some mental health treatment. Maybe, the CIA’s Mormon torturers, Mitchell and Jessen could take a whack at you in a black site, and get YOU the help YOU need! Because psychologists are in on it at every level-to help you, of course.
Here-let’s have a look at what one of the Rubin Klan have to say about that meeting (you might start to see patterns in journalism when people who are in the Klan of Rubin show up pin a narrative. Here-look at this Rubin sand-witch- a serial rape hoaxer):
William Binney About to Get Tossed Into Sheol!!! According to Jennifer Rubin
My Post colleague Aaron Blake reports:

The Intercept just broke a pretty big story: CIA Director Mike Pompeo reportedly met with the purveyor of a disputed theory about the internal Democratic National Committee emails that were released last year — a theory that runs counter to the intelligence community’s own long-standing conclusions about the matter.
It’s not the first example of Pompeo doing something that has been put under microscope. But there is a common thread running through just about every example: Pompeo doing and saying questionable things involving Russia — and those questionable things tend to lean in a pro-Trump direction.

I still remember when “those people” said the “deep state” was a conspiracy theory-do you? Yeah, and now look-Google has 42 MILLION results for that exact term. Sorry, Dr’s Mike, and Lorraine, and David- but the troubled minds tribe is growing! And- deep state is really a code word for “traitors.”
And even our own government has noted that SOMEONE likely has an actual sound cannon that was used on our diplomats in Cuba. Never mind the narrative distortion that has gone on since this story broke-because “webwashing” is a real thing.
Ever notice how the things I write about here at ROGS happen in “real news” shortly after I get on the case? Yeah-it’s a pattern-my long term case of apophenia following me around like Gloria Ghost. You might have forgotten Gloria, so here is a picture of my damned sell in dis’ dress:

rabbit
This is my imaginary friend, Gloria Ghost, the scar faced bunny. Only I can see her-she’s totally in my head. Psychologists tell me it’s apophenia. Some people say Gloria is full of sh!t, but I always correct them, and let them know that it’s not sh!t-it’s dumpsters full of garbage called a “dossiere'” with augmented reality at the internet switch, and recycling of old, tired tropes and narratives of moral panics dating back to 1913. Gloria is Edward Bernay’s favorite daughter- he lit her on fire and called her a “Liberty Torch.” Poor poor Gloria.

Well-who knew? My old neighbor Doug’s friend Pompeo called one of my favorite whistle blowers, William Binney into his star chamber the other day-no kidding. And I’m pretty sure that it was Doug who made it happen (Hi Doug! Where dd you disappear to anyways-and was REAL ESTATE involved?). So, I think now is a good time to revisit my “theory” of the horsehair worm in the crickets head, which I call “memetic neuro-fasciitis of the mind.”
Or, as you know it “the NSA data entrapment scheme that targets ALL American’s and uses the collected data to steal elections by harassing, manipulating, and “no touch torturing” political opponents of the deep state (aka the “gay mafia”) and so on.
You might remember Bill Binney as a true and real American Hero who built a sooper seekrit internet email and phone call interception machine back around 2001, the goal of which was to capture intelligence on FOREIGN spies and bad guys. But because his machine respected our Constitutional rights of due process, and was extremely cost effective, coming in just under FOUR MILLION- he was fired, and the NSA built a FOUR BILLION dollar machine instead, and targeted AMERICANS and politics. Then, they tossed that machine in the dumpster, and built one that cost 72 BILLION per year.
Then, the FBI kicked his door in to shut him up from talking about it. You can beat the charge, but you can’t beat the ride, they say.
Well- how else to build and enforce, and police, and re-police a narrative that demands a climate of domestic terror??!! And how to get more monies for all those helpful, and hungry hungry hungry DVIC Gloria Bunnies in high heels? I have an idea! How about we AMERITHRAX the crap out of the narrative? Yeah! Go team black/red! Here- from Washington’s bloghave a look at the AMERITHRAX hoax, which claimed the lives of five American’s.
Good Ol’ FBI-I guess every totalitarian bankster state needs a domestic political police to suppress, intimidate, bully, frame, and harass journalists and dissenters and writers and save cute puppies and all that- to save them from those who break into our Windows 10 to get a grab at our kids, or wage years long black bag jobs. I mean-Hitler had the SS and all those brownshirted patriots stalking for Der Muterland, and Stalin had the Cheka and the NKDV, and who can forget how well the Stasi worked in East Germany as John LeCarre’ wrote about folks who tinker around behind the scenes and exploit the narrative itself(or whose asses get fatter by the day counting beans in the DHS right now)!?
Well anyways- if you have been following my writing for the last few years before this blog, you will see I have chronicled these deep state “disruption campaigns” since around 2004. Yeah- not a profitable business model, that’s for sure. BUT: a very important check against the balance sheet which is always hungry hungry hungry! Checks and balanceslike alternative media and blogging– are the thinnest and most fragile threads that sew our democracy together, so that those who would-and can and do-tear us apart don’t get their way.
Here’s a bit from the VIPS memo, which is a complete refutation of the DNC “Russian Hacking” narrative, which documents INSTEAD a “someone most likely copied the data to a thumb drive” narrative (maybe the drive had a case of bad USB??):

MEMORANDUM FOR: The President
FROM: Veteran Intelligence Professionals for Sanity (VIPS)
SUBJECT: Was the “Russian Hack” an Inside Job?
Executive Summary
Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computer. After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device.

Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack. Of equal importance, the forensics show that the copying was performed on the East coast of the U.S. Thus far, mainstream media have ignored the findings of these independent studies [see here and here].
Independent analyst Skip Folden, who retired after 25 years as the IBM Program Manager for Information Technology, US, who examined the recent forensic findings, is a co-author of this Memorandum. He has drafted a more detailed technical report titled “Cyber-Forensic Investigation of ‘Russian Hack’ and Missing Intelligence Community Disclaimers,” and sent it to the offices of the Special Counsel and the Attorney General. VIPS member William Binney, a former Technical Director at the National Security Agency, and other senior NSA “alumni” in VIPS attest to the professionalism of the independent forensic findings.
The recent forensic studies fill in a critical gap. Why the FBI neglected to perform any independent forensics on the original “Guccifer 2.0” material remains a mystery – as does the lack of any sign that the “hand-picked analysts” from the FBI, CIA, and NSA, who wrote the “Intelligence Community Assessment” dated January 6, 2017, gave any attention to forensics.
NOTE: There has been so much conflation of charges about hacking that we wish to make very clear the primary focus of this Memorandum. We focus specifically on the July 5, 2016 alleged Guccifer 2.0 “hack” of the DNC server. In earlier VIPS memoranda we addressed the lack of any evidence connecting the Guccifer 2.0 alleged hacks and WikiLeaks, and we asked President Obama specifically to disclose any evidence that WikiLeaks received DNC data from the Russians [see here and here].
Addressing this point at his last press conference (January 18), he described “the conclusions of the intelligence community” as “not conclusive,” even though the Intelligence Community Assessment of January 6 expressed “high confidence” that Russian intelligence “relayed material it acquired from the DNC … to WikiLeaks.”
Obama’s admission came as no surprise to us. It has long been clear to us that the reason the U.S. government lacks conclusive evidence of a transfer of a “Russian hack” to WikiLeaks is because there was no such transfer. Based mostly on the cumulatively unique technical experience of our ex-NSA colleagues, we have been saying for almost a year that the DNC data reached WikiLeaks via a copy/leak by a DNC insider (but almost certainly not the same person who copied DNC data on July 5, 2016).
From the information available, we conclude that the same inside-DNC, copy/leak process was used at two different times, by two different entities, for two distinctly different purposes:
-(1) an inside leak to WikiLeaks before Julian Assange announced on June 12, 2016, that he had DNC documents and planned to publish them (which he did on July 22) – the presumed objective being to expose strong DNC bias toward the Clinton candidacy; and
-(2) a separate leak on July 5, 2016, to pre-emptively taint anything WikiLeaks might later publish by “showing” it came from a “Russian hack.”
*  *  *
Mr. President:
This is our first VIPS Memorandum for you, but we have a history of letting U.S. Presidents know when we think our former intelligence colleagues have gotten something important wrong, and why. For example, our first such memorandum, a same-day commentary for President George W. Bush on Colin Powell’s U.N. speech on February 5, 2003, warned that the “unintended consequences were likely to be catastrophic,” should the U.S. attack Iraq and “justify” the war on intelligence that we retired intelligence officers could readily see as fraudulent and driven by a war agenda.

The January 6 “Intelligence Community Assessment” by “hand-picked” analysts from the FBI, CIA, and NSA seems to fit into the same agenda-driven category. It is largely based on an “assessment,” not supported by any apparent evidence, that a shadowy entity with the moniker “Guccifer 2.0” hacked the DNC on behalf of Russian intelligence and gave DNC emails to WikiLeaks.
The recent forensic findings mentioned above have put a huge dent in that assessment and cast serious doubt on the underpinnings of the extraordinarily successful campaign to blame the Russian government for hacking. The pundits and politicians who have led the charge against Russian “meddling” in the U.S. election can be expected to try to cast doubt on the forensic findings, if they ever do bubble up into the mainstream media. But the technical limitations of today’s Internet are widely understood. We are prepared to answer any substantive challenges on their merits.
You may wish to ask CIA Director Mike Pompeo what he knows about this. Our own lengthy intelligence community experience suggests that it is possible that neither former CIA Director John Brennan, nor the cyber-warriors who worked for him, have been completely candid with their new director regarding how this all went down.

HAhahahahaHahaha. Apophenia. Epiphanies. Hahahahahaha. I’m going CRAAaaaAAAAzzzYYY!. Mmmmmmbwahaahahahhaaha.
And now, you are too. But-it IS all related indeed-to politics and political policing of words themselves. Try not to get too involved in all the pattterns….But if you REALLY want to go nuts, decipher the meaning of all those letters just above this paragraph. That should keep you busy for awhile-I mean-you lard asses have nothing better to do anyways.
Well sure- looking for Stephen Paddocks hard drive and all. That will keep you busy the same way that Oswald thingy kept you busy for 60 years or so. HAHAHHAHAHAHAHAHAAHa.
Yeah- it’s in the party van.
FBI caught with its pants down, and its game wide open in Asia-is that really a bad thing?!?FBI_Party_van2FBI_Party_van2.jpg

What is "gang stalking"? It is the result of a nation that respects no laws- and a nation 'for sale.'

The article below is from Business Insider in 2012. It documents one of the first official sources that claimed the government had sold our rights to “others,” who were wiretapping the entire nation.
The article chronicles decorated intelligence officer, and NSA whistle-blower William Binney’s ostracization, and excommunication from the cult of intelligence, as well as his harassment by the FBI for trying to save the taxpayers FOUR BILLION DOLLARS- but also, that he tried to preserve “Costitutional Liberty,” aka “due process of law, which Americans have not had since 2004.
In 2012, many already knew that the local police were using and abusing massive databases. Many already knew that ‘somehow’ that police, and multi-agency Task Forces had access to cell phones in real time, and that ‘somehow’ they could track “targeted” communications across a city, or across a continent- and into international jurisdictions (Hi Toronto!)- and that they could repeat back selected words and phrases just to let them know they  are watching.
While these people didn’t have a ‘name’ for it them, we now know it is the current sate of affairs where Fusion Centers were spying on citizens in local environments outside the view of any court, and outside the view of due process of law, and without respect for the Bill of Rights.
These people have a name- they are “targeted individuals,” and here is where the world began to know what “TI’s” knew as far back as 2003-4:

NSA Whistleblower Says The Feds Are Gathering Data On Nearly Every US Citizen

NSA ACLU
The government has been collecting data on nearly every U.S. citizen and assembling webs of their relationships, National Security Agency whistleblower William Binney told the Hackers On Planet Earth (HOPE) conference last week.
Binney worked for the Defense Department’s foreign signals intelligence agency for 32 years before resigning in late 2001 because he “could not stay after the NSA began purposefully violating the Constitution,” according to a statement he made in court records.
On April 20 he gave his first interview after resigning to Democracy Now!, asserting that the FBI raided his home after he blew the whistle on the NSA’s extensive spying on Americans.
On July 2 Binney, along with two other former NSA employees, agreed to provide evidence in the Electronic Frontier Foundation’s lawsuit that alleges the U.S. government operates an illegal mass surveillance program (i.e. Jewel vs. NSA).
His sworn declaration of facts that he’s willing to testify to are both telling and scary:

• In the ’90s Binney supervised the development of a NSA program called “Thin Thread” that was designed to identify international networks of connections between people from their internet communications. Since one side of the communications was domestic, the program encrypted the data so as to protect the privacy of U.S. citizens until a warrant could be obtained.
After 9/11 all safeguards went out the window as “the individual liberties preserved in the U.S. Constitution were no longer a consideration.” Members of his Thin Thread team began implementing a program called the President’s Surveillance Program (PSP), which collected domestic electronic communications traffic without any privacy protections.
• The NSA began seizing and storing most electronic communications passing through 10 to 20 wiretapping rooms in key telecommunication points throughout the country where all data must pass in order to move from one party’s network to another’s, allowing the government to identify and analyze any individual or group through a searchable database.
• Binney cites the $1.2 billion Utah data center currently being built and the new supercomputing center at the NSA headquarters in Fort Meade, Maryland, pointing out that the immense size and computing power of these facilities far exceeds the capacity necessary for storing targeted communications but is “consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications.”
In a nutshell Binney states – with considerable authority – that the NSA has been conducting comprehensive surveillance on U.S. citizens for more than a decade.

 
[youtube https://www.youtube.com/watch?v=JuvJ7tKIF2c&w=561&h=432]

Copies of Nothing: police psychology and the replication of power through willful ignorance, and bullying.

It is nearly impossible to impute to the reader how disproportionate the telling of the story of “targeted individuals” of organized gang stalking is in terms of power versus those who are powerless; or that the issue of “TI’s” is in fact one of “first they came for the ________, and I said nothing, because I wasn’t a (member of the Beatrice Six). But the fact is that beyond interagency collaborationn to subvert the Constitution in the name of “goodguyism,” only the little guys and gals get targeted, while others get “flipped” or otherwise compromised.

Related Story: The Association of Threat Assessment Professionals (ATAP ) is on record calling modern “high policing ” by its proper name,which is the “parallel colluding investigation, ”and has linked this in their literature to “delusions ”. Now, I ask the reader to decide for themselves what OGS is, and take,a look at a retired United States Air Force OSI (USAFOSI) investigator who targeted me on Twitter, accusing me of being a serial murderer, goading me with violence, and, eventually being hacked, with “face orbs ” and a link to pogo-pins placed on my computer, as bizarre -acting people in hoodies ran around outside my apartment .
Organized-and Irgunized gang stalking is THAT weird. And, so was the depopulation /genocide /ethnic cleansing of Palestine, aka the Great Israelification

So let’s take a look at one of the many illegal database schemes that has been minimized or eradicated from our ability to view this illegality in the press, and where innocent people and Americans were targeted by an intelligence agency that was really a multi-agency Hydra of subversion on American-and international shores.
The DEA and the SOD database: They needed a code word to describe their voyeurism, and then, to discredit those they targeted with clandestine, illegal, iun-Constitutional HUMINT campaigns of coercion and terror.

Let’s first take a look at “police psychological profiles” that are generally stuck somewhere in the toilet, as most of the religiously/Freudian afflicted are, and then, add the opportunistic and voyeuristic and eugenic nature of feminist jurisprudence through the eyes of Kurt Vonnegut, who was popular with militarist feminists during the rise of the neocon “left” and the DVIC, where we discovered that women’s violence is well financed, and internationalist, because “hungry hungry hungry!“:
From “Breakfast of Champions,” where Vonnegut- a survivor of the fire-bombing of Dresden– critiques “white male power” but forgets to note “white female privilege,”which is perhaps more deadly, if Dresden, or Holodmor are any example .
wide open beavers.jpg
So, voyeurism (the NSA to local LEO data theft pipeline) and photography ( they frequently make threats that they have secret databases with TI’s pictures in them; and agencies are indeed using our televisions and our laptop camera’s to spy on us according to all major media) is a major them of these neo-fascists and their Hegelian counter parts, and the “TI” is their secret passion, as women’s deviance and violence takes different and creative forms.
If I showed you pictures of “TI’s” you might laugh, or mock them somehow, as many of them appear in mug shots, due to the disproportionate force and fury with which western societies prosecute the poor and the disenfranchised. Many of them, like the now-famous Timothy Trespas, are easily discredited because they “don’t look like “us”.”
Odd, how the bane of aging white feminists everywhere-“lookism” has become the exact tool with which these target and harass people in official source gas lighting, such as the case where the New York Times Mike McPhate conspired with Lorraine Sheridan to cover up this crime in last years article.
I have written about TI’s from a variety of standpoints, but one thing that can be said with certainty is that they are frequently “not” super models or muscle bound ‘heroic’ figures from ancient Greece, though there ARE exceptions. And, like anyone, they ave their faults and flaws.
What makes them different though, is that they are often stripped of the pretenses of power fairly early in life, and have frequently been labeled by those who value power. As such, as Glenn Greenwald has noted, they have “no place to hide,” when operations like the illegal and warrantless  NSA/DEA/CIA/FBI decides to turn their lives into a free for all. so beyond merely being involuntary HUMINT assets, they are also mocked for being so, and with the approval apparently, of “psychology,” despite NONE OF THIS being authorized or even acknowledged in a legal framework anywhere.
I recently spoke with a man who was engaged in a custody dispute with his wife, a former stripper who has an extensive network of admirers in policing, and he described how he was forced onto a stretcher in a bizarre “set up,” much as we saw in the DVIC deterioration of Andy Ostrowski, who once opposed PA Governor Tom Ridge.
The source was locked up on a 72 hour psychiatric hold, to try to create the appearance that he is mentally ill, which is bad enough (tested negative). But the story gets really sick when he describes how “there was even a photographer present taking closeup pictures of my face as they did this, pulling him from his home and placing him in that position, as his young daughter was spirited away by Child Services.”
And I spoke with a woman whose neighbors-wonderful progressives in a “progressive” city, framed her as the neighborhood crank as they waged loud parties next door. Her mugshot looks exactly like that. And then, after they got a fifty year restraining order on her (because she told the judge ‘why don’t you just make it ten, twenty or forty years’) they moved away! See how that works- let me know if you start seeing patterns-because seeing patterns can indicate delusional thinking.
So, the claim that communitarian policing is framing people is not unusual, nor is it unprecedented when individuals take a stand against this nefarious bullying. And this is no small claim, nor is it an uncommon one in the “frame jobs” that much of these make-work projects of our current government is involved in.
And the internet abounds with video’s of “authorities” in power citing vague “rules” or even more un-Constitutional “policies” that prohibit photographers from filming them-public servants-at work in public. So, without a doubt, photography-which is NOT a crime- has become a tool with which institutions collaborate to defame those it targets.
In the video below, some from the DEA gets their authoritarian asses handed to them by an individual who knows that “policies” and “rules” are not LAWS, and that-for now- citizens still have the right to film and photograph these cowards who work anonymously from behind the internet switches plotting the destruction of free speech rights, due process of law, and more; that these who invade our privacy with impunity, and from behind the veil of absolutist secrecy are themselves annoyed by cameras.
And,  the citizen knows that people who cite policies and rules are in fact cowards who hide behind authority, and mobsterism, and the psychopathology of institutions that are destroying Democracy with obstructionism in the gray area of law.
And especially, note the license plates, as these federal agents work in a state that has granted official “anonymity”to public “servants.” In order to understand “what is a police state” one must understand the “privileged immunity and institutional anonymity” of these operatives.
And this, below, is what breeds contempt for the public by these same. And it cannot be missed that the photographer is described as being 5’4″ tall, and is standing against men and women who top the scales at body mass and weight. Welcome to feminist jurisprudence and policing! It seems that the “little people” are an extreme threat:

MUST SEE VIDEO:

“Fascist DEA Scum bags attempting to Censor 1St Amendment freedom of Press”

[youtube https://www.youtube.com/watch?v=kxH9N5oXkgY&w=854&h=480]
 
But for the most part, many if not all TI’s are the product of inter-generational bullying by institutional forces ranging from neighbors and schoolmates to police to mental health professionals, and the hidden networks of “goodguys and gals” who somehow see nothing wrong with “piling on.”So in order to understand my version and interpretation of “TI’s” and OGS, it requires that I define “what is a coward,”as you and others who research organized gang stalking will note that claims that GS are cowards are quite frequent in the online dialectic of OGS, and in fact a staple comment.
So, it cannot be missed that this individual filming is a 5’4″ sprite, unarmed, and questioning the authority of those who are IN FACT AND IN PRACTICE a huge factor in OGS online dialogues. Nor can it be missed that each of these photographers is practicing their rights against thousands of pounds of human meat that makes it’s living from violence, and that they are all armed.
So, beyond institutional sociopathy, and psychopaths whose sickness finds a welcome home in institutions of power, I personally view TI’s as “not mentally ill” anymore than those who pursue them, and “pile on.” It is instructive to note two things about this “phenomenon” that will help put it in perspective

  1. many of those who are “targeted” are people whose civil rights and due process rights were violated in durations of time that defy imagination and are frequently derived from warrantless surveillance and the “War on Terror.”
  2. Nearly all of them that I have talked to report bullying, and “strange” internet encounters with hidden bad actors

Read together, these form a narrative drawn from the replication of status quo superstitions and outright mythological lies that form the narrative of police and state power psychological basis, but also, plain old bullying by any other name.
So, here below is a link farm to stories about how the DEA (which is inseparable in mission or tactical applications, and methodology from the CIA at this point) used a database to illegally, and un-Constitutionally profile, monitor, perform surveillance and harass American citizens.
And for those of us who walk “unarmed” in the world with the expectation that these “goodguys and their gunz and bomz” won’t shoot us for excercising our rights is in fact and in practice, true bravery, because we KNOW they are murderous, slanderous, malevolent crooks who love to “shine a light” on “we the people” but somehow, cringe when the light gets cast on them-or scurry away like cockroaches-the video above is prima facie proof of that.
Special Operations Division (SOD) database abuse and lawsuits to follow? Who would even know where to look for the proof? I have an idea- ask those crazy peepl in the TI community!
Testilying as security theater and “goodguyism gone wild!”: How DEA agents and all other LEO’s use illegally obtained data to create and then “dry clean or launder” a case, aka “parallel construction-as well as to follow peole around and do plainly bizarre sh!t to their internet connections, telephones, cars, homes, etc, etc….
http://bangordailynews.com/2013/08/05/politics/agents-ordered-to-cover-up-dea-program-used-to-investigate-americans-critics-say-methods-unconstitutional/
More on parallel case laundering, dry cleaning alleged crime, and illegal spying
http://www.businessinsider.com/dea-agents-cover-up-spying-program-2013-8?IR=T
Prosecutors and supervisors cover up the program that covers up illegal spying, of “cover up squared,” layers upon layers of subterfuge and criminality from “the good guys and gals”
http://www.rawstory.com/2013/08/secretive-drug-enforcement-agency-dea-unit-told-to-cover-up-massive-spy-program-used-to-investigate-americans/
The cover up of the cover up of the cover ups, layered in a discrediting narrative, aka “who are targeted individuals?” What happens to targeted individuals?”
http://www.reuters.com/article/us-dea-sod/exclusive-u-s-directs-agents-to-cover-up-program-used-to-investigate-americans-idUSBRE97409R20130805
Correction: This post states that the videographer said he is 5‘4″ tall, when in fact, he did not say that.
That quote came from another video like tens of thousands of these types of videos, where those who actually practice civil rights then, become targeted, stalked, and harrassed by intel agents and agencies.
The guy in the video above is around 5’8″, and unarmed. If you got nothin ta hide, the “good guys and gals ”, whats the harm of one lil ol photog?

Organized stalking and police surveillance of social media: ACLU notes that targeted 'influencers,' activists and other TI's are 'real'

Police Use of Social Media Surveillance Software is Escalating, and Activists are in the Digital Crosshairs

By: Nicole A. Ozer
Map of California, with dots marking the areas where local law enforcement has acquired social media monitoring software

It goes without saying that speaking out against police violence or government overreach shouldn’t land you in a surveillance database. But it can, and it does.

The ACLU of California has received thousands of pages of public records revealing that law enforcement agencies across the state are secretly acquiring social media spying software that can sweep activists into a web of digital surveillance.

This set of public records requests is part of our ongoing work with community groups to shine a light on surveillance technologies and call for community control in decision-making around policing. Last year, we worked with local activists in Fresno to reveal that its police department was using a MediaSonar social media surveillance tool that boasted the capacity to identify so-called “threats to public safety” by monitoring hashtags such as #BlackLivesMatter, #DontShoot, #ImUnarmed, #PoliceBrutality, and #ItsTimeforChange.

But we had a hunch that Fresno was not an isolated case.

So this summer, we requested records from 63 police departments, sheriffs, and district attorneys across California. And what we learned from the documents was alarming.

Of the responses we’ve received, 40% of the agencies (20 in total) have acquired social networking surveillance tools — many of them in the last year.

We found no evidence in the documents of any public notice, debate, community input, or lawmaker vote about use of this invasive surveillance.

And no agency produced a use policy that would limit how the tools were used and help protect civil rights and civil liberties.

The utter lack of transparency, accountability, and oversight is particularly troubling because social media surveillance software used by California law enforcement — tools like MediaSonarX1 Social Discovery, and Geofeedia — are powerful. And our records from Fresno and several other communities reveal that some have been marketed in ways to target protesters.

Our records show that Geofeedia’s marketing materials, for instance, refer to unions and activist groups as “overt threats,” and suggest the product can be used in ways that target activists of color. At least 13 California law enforcement agencies have used or acquired Geofeedia.

In one exchange with law enforcement, a company representative suggested to San Jose Police that they should use the product to surveil the “Ferguson situation,” even though the city is roughly 2,000 miles from Ferguson, Missouri. San Jose Police did in fact use Geofeedia software to monitor South Asian, Muslim, and Sikh protesters only a few days after acquiring it.

An email to the San Diego Sheriff touts a “collection” of social media content curated by Geofeedia following the non-indictment of Darren Wilson.

And yet another promotional email invites the Los Angeles District Attorney to learn how Baltimore used the software to monitor and “stay one step ahead of the rioters” after the police killing of Freddie Gray.

Law enforcement should not be using tools that treat protesters like enemies.

The racist implications of social media surveillance technology are not surprising. We know that when law enforcement gets to conceal the use of surveillance technology, they also get to conceal its misuse. Discriminatory policing that targets communities of color is unacceptable — and secretive, sophisticated surveillance technologies supersize the impact of racial profiling and abuse.

The good news is that we’ve seen that when surveillance is forced into the light, communities have the power to call out racist policing practices and stop discriminatory surveillance in its tracks.

Remember Fresno? Armed with proof of Fresno’s social media surveillance experiment, a diverse coalition of local activistsknown as Faith in the Valley successfully mobilized and organized to pressure the police to roll back their social media surveillance program. The community is now pushing to pass a surveillance technology ordinance to make sure all surveillance technologies are publicly debated.

In Oakland, community members organized against plans to build an expansive Domain Awareness Center that would have collected and stored hundreds of terabytes of data on Oakland residents. Now Oakland has a Privacy Commission that advises the City Council on surveillance decisions and is currently drafting a surveillance technology ordinance.

And in Santa Clara County, right in the heart of Silicon Valley, a diverse coalition successfully organized against plans to buy a Stingray cell phone tracker and then worked to enact a comprehensive surveillance technology ordinance that requires transparency, accountability, and oversight for all surveillance technologies.

In this spirit, a powerful coalition of national organizations is launching a multi-city legislative initiative, Community Control Over Police Surveillance (CCOPS), to introduce more local laws to bring transparency and community control to the acquisition and use of local police surveillance technologies.

Here in California, community members are working in Palo Alto, Fresno, Oakland, Berkeley, Santa Rosa, and Santa Cruz to ensure that similar laws are introduced in their cities.

Whether it’s social networking surveillance, stingrays, or something else we haven’t heard of yet — it’s time to push secret surveillance into the light.

We have the power to stop discriminatory surveillance and put control where it belongs — in the hands of the community.

Nicole Ozer is the Technology and Civil Liberties Policy Director at the ACLU of California. 

Read more about community control and surveillance technology in California:

Speaking of "what happens to gang stalking targets?" A story from 2014-16

Speaking of espionage- but really quietly of course, here in public, about mission creep and bleed-over into a dying Constitutional Democracy.

“There not using them that way- they’re using them here…”

Background: Consensual Surveillance is what the DHS, ICE, FBI and even state level agencies call their secret warrantless cellphone surveillance. They have been monitoring and manipulating the communications of Americans via Cessna airplanes using technology called Stingrays and Hailstorm here in America since before 2006.
My first encounter with this form of warrantless surveillance by air was in 2011 or so when a little yellow Cessna airplane followed me everywhere, for hours, across a mid-western city.  Then, I pulled my phones battery for the first time ever- and the plane disappeared.
————————————————————————
Low and Slow is the way to go when monitoring American’s speech : off-the-radar, “push-broom” hyper spectral imaging is more than picking up chatter.
The Beechcraft King Air turbo-prop is a beautiful bird. And it’s used to fly domestic surveillance missions in the U.S., and scoop up data about Americans
So- there’s this guy who worked on the electronic navigation and stability systems that are in MRAPs, the spectral imaging and photographic capabilities of FBI spy planes that currently monitor the phones of many Americans without a warrant or even probable cause; and the heavier military grade spectral and thermal imaging systems of CIA, DEA, and USAF surveillance aircraft. He particularly was fond of his work on the Beechcraft King Air line. How could those planes NOT be an engineers favorite- the name alone is so retro and air-crafty.
Related Story: EMARSS aircraft crashes over Iraq– what was it doing?
He said “These things can look down through the roof of your house, and draw a multi-tiered 3D heat map and watch you move through your house in real time.” He really thought highly of those Beechcraft Surveillance planes.

image

All images courtesy of Beechcraft online: http://beechcraft.txtav.com/en/king-air-c90gtx

B100
I met him at a Japanese restaurant in November of 2014, a tonkatsu ramen and saki place in a strip mall next to a hotel where he was a regular; at least, as much of a regular as a guy who moves around a lot,  working for military contractors and weapons manufacturers.
At the time, I was surprised that he was telling me, a virtual stranger, about domestic surveillance in the U.S. done TO Americans by intelligence agencies, BY the #goodguys at every level. I always thought the #badguys and the #otherguys did that stuff in their countries, to their peoples. Turns out some of those guys are training on those same planes as I write.
And, I would love to tell you more, but it might be illegal to do so, cuz, national security and stuff-you know: the Chinese or the North Koreans- maybe the Syrians or ISIS!! might get a leg up,catch us with our pants down, and tap all our phones, or follow us around with airplanes to get at all of our phone data and stuff.
Also, because we know that main stream journalists are so reputable and all, after President Obama authorized the dispensing of propaganda on the American public in 2011. A main stream media so reputable that they forgot to question the surveillance state as it was being built above my head. There are plainly too many military industrial surveillance state ‘official sources’ to wine and dine for stories- real inside scoops about cute puppies, or a stadium or something. Busy busy busy hungry hungry hungry officials: the #goodguys busy and hungry together.
image
Anyways, these MRAPs were designed for military use,in theaters of war, but somehow ended up parked next to your local donut shops all across America.
Related Story: Colorado SWAT team completely demolishes man’s home looking for a shoplifter who stole 15 dollars worth of stuff.
Well: once upon a time on a phone long since stolen, I was making a case in the public’s interest about how airplanes are being used domestically to spy on Americans phone calls, and possibly looking through our roofs. I used Gmail and kept notes and contact info there. And, that story literally got scooped out of my Gmail account, then somehow hit the newspapers- in Minnesota.
image
image
And this guy- I’ll call him Jack- was a mess. He was hammered- absolutely shitfaced; he was all tore up about missing his aged mother- how he wanted a ghostwriter to tell her story to the world.
“Let me tell you- there are good mothers and then there was her: my mother was the best mother ever- anyone could see it. She was like a saint…” and so he went on about his mother.
And he was weeping. Weeping about how his inventions were being mis-used. You see, he works for many of the weapons dealers and arms suppliers that build the bombs and the drones and the MRAPs there in front of your house. He is a military industrial complex engineer.
Here is a project he worked on:
https://www.beechcraft.com/special_missions/aerial_survey.aspx
And this doozy which he made note of:
https://www.beechcraft.com/special_missions/surveillance.aspx
His biggest problem seemed to be that he felt that he had no say in the fact that these tools were being used to target civilians.
“I never gave my consent…they never told me they would be used this way…” and so on. He was horrified when he found out that the multiple agencies were using his toys and tools to target practice on American citizens, here, in America. That the FBI et al were training their pilots and their resources using Americans for practice, without warrants.
There’s this point between men where boundaries become demilitarized- where we drop our guard, and empathize: where we try to comfort another man, which is always awkward. And, where one wonders if the weirdness might be a whole ‘nother level of weird.
Well, the guy stumbled towards me in his stupor, head hanging in his hands- and he was literally slobbering as he gasped one of those horrid sort of drunk guy gasps that precedes horrible crying,  and then sprang at me and was in my arms, where he found a slobbery nook on my shoulder to weep into.
Awkward indeed- blurring boundaries, blurring stories, one minute on about his mother the next, talking about how the technology he designed for  Beechcraft could “look through your ceiling and create a 3D image model” of you as you take a shit in the privacy of your own home. ( Update: here is a story that ran in Popular Science on April 6, 2016, shortly before I wrote this story herein, and shortly after I spoke with a confidential informant: http://www.popsci.com/fbi-planes-used-augmented-reality-to-watch-america)
I said ” Well, these are the kind of tools we need in a war.” He gasped a cry and said “There not using them that way- they’re using them here…” and more weeping.
I couldn’t help but feel my lifelong revulsion to men, and weeping men, but especially- weeping men slobbering snot on my shirt.
But, in some conversations, I guess I overlook my own biases and listen for the story that really matters. And he seemed nice enough, provided an interesting story full of details.
In this case, it was that one detail- that military grade photo-thermal imaging was being used on American citizens.
That seemed important.
Within a day, I bumped into anther guy in the hallway carrying a Stingray sized briefcase- one of those metal kind that you see in the movies. And, the next night, a long black Suburban with no license plates of any kind parked under my motel window. Within three months, the phone where I kept my research and notes about this incident disappeared from my car.
And- the story about how the FBI is using these technologies broke almost immediately after my ability to report it had been erased. This has been the nature of my journalism for over a decade and counting; and why I provide these stories to others now- because control of my personal narrative begins and ends with this strange idea of my personal ‘right to privacy- my right to be left alone.’
But also, it coexists along with the public’s right to know.

What is the Domestic Violence Industrial Complex, and who pays for it?

The Domestic Violence Industrial Complex is a privacy raping gray area policing scheme, a dismal failure at protecting rights, or children, or anyone else, and it’s a well-oiled tax-dollar sucking vampire.
Martin S. Fiebert of California State University Long Beach has been telling us that all along, but -for some reason-no one wants to note that women’s assaults on their spouses and partners occur more frequently, or that the very core of “international feminism” is overt and covert attacks on men.
Why is that? My guess is this privacy raping, domestic violence waging boondoggle that we now know as a full blown police and surveillance state that targets us all now is very profitable to some people, and not helping We The People one bit. And, sometimes, vampires NEED a kick in the teeth-I know this from personal experience (see my ‘who is the author of ROGS’ section).
Here, below we see a woman murdering her kids, her kids father, and that fathers girlfriend, because-as we have known forever-some women who entrap men in baby scams are themselves psychopaths. And-for some reason- the DVIC has overlooked this since, well, forever. Not that the DVIC isn’t highly concerned for childrenbecause Kids for Cash is what pays their bills, and buys them lots of nice real estate as well.
Which bears out one part of my thesis, which is that some in the system are purely profiteering from children, exploiting human relationships, and all of that under the guise and the appearance of “protecting the children.”
So at the end of this particular story below, a story about the oppressed girl next door, Jessica Edens, whose womanly frailty and “patriarchal oppressed” life caused her to murder her kids and two others, we can see who the real “winners” are:
THE DVIC SCORECARD:
DVIC: $72 billion or more per year for MRAPs parked in front of Ye Olden Tymes Donut Shoppe, or any Starbucks during break-which occurs all across America at noon, 2:30, four p.m., 8-8-30 p.m., 10 p.m., etc. Added bonus round:  DVIC lawyers got paid in the custody fight, social workers got to run around for hours saying “who knows what really happened!?”; the cops got paid for the delivering restraining orders, moving men out of houses, slanderous paperwork, and associated costs. And the psychologists and other’s at the “Fusion Center” somehow missed this act of “domestic terrorism,” perhaps due to the deliberatly slanderous profiles of men as domestic abusers and pedophiles.
We The People: minus three more children, one father, and that fathers girlfriend, a woman who probably wasn’t a psychopath, and DEFINITELY wasn’t the narcissistic sociopath that ensnared him with children in the first place.
Prison Industrial Complex (PIC) plus one more at plus/minus $40K per bed, per year. Prison psychologist: plus one more “client” in a “case file,” net 5-25k per year.
Mom’s Gone Mad:

“On July 13, Jessica Edens stole a .40 caliber handgun from her parents’ house, drove to the apartment complex where her husband lives and shot and killed Meredith Rahme, his coworker and alleged girlfriend. Afterward, she drove off and called her husband once before shooting and killing their 5-year-old daughter, Harper, and her 9-year-old son, Hayden, in the back of her Jeep.
She then called him again to say, “Everyone you love is gone. Do you hear me? I’m about to be gone too” before turning the gun on herself. Police have indicated that she wanted revenge after a bitter custody battle with her husband, and her suicide notes appear to confirm that theory.
RELATED: Text messages reveal the chilling reason why a mom killed her children and herself
In the note left for her husband Benjamin, Edens wrote, “You have caused me more pain [than] I’ve ever been in in my life. You have caused my children pain. I hope you rot one day for what you have done to me and my kids … I hope you live with pain and shame and guilt for the rest of your life.”

The thing about gang stalking though, is that it is largely non-partisan, and wholly fascist, as part of the master plan of globalists is divide and conquer: first they create the right and left, then they smash them together like Ken and Barbie in a back yard tiff. So regardless of whether one is zionist/dominionist, racist/anti-racist, communist/fascist- “they” win! Because YOU have adopted their dualistic and Hegelian conflict oriented paradigm.
Even feminists get gang stalked. And Jews, and Catholics and ex-Mormons; Roma gypsies, the homeless, ex-cons; drug addicts and lawyers, journalists, and others.
And in this light, the case of Seana Sperling-a woman who is being gang stalked in the “progressive” state of Oregon stands out as interesting, as does the well known case of Rachel Orban, who is being gang stalked in Boston MA (and it is important to note that those who raise awareness about gang stalking in Massachusets are villified BY THE POLICE, and stalked as thought criminals, as in this case here).
Here, below, Ms. Sperling-who is one of those many “rape is everywhere” types, claims she is being gang stalked. Possibly it is because she ‘has a Jewish sounding name(….) and possibly it is because she is a Roma gypsy(….)’. But also, like many white women such as Rachel Dolezal, the head of the National Association for the Advancement of Colored People(NAACP), she is white, and perhaps psychologically deluded by rote of the curent crybully narratives into believing she is not, or that somehow female whiteness carries some ‘invisibility cloak’ properties of mystical protection that it does not.
Among white females, the phenomenon of being a “shiksa” also carries with it the weight of being whatever other ethnicity competes against it, as the white female is forever in distress, with ample, wealthy, balding, old, smelly eastern bloc socialists dying to ‘help them’.
Then, she goes on to blame the right wing of politics, and indicates that like so many so-called feminist cause based stalkings, derived from the ADL political rhetoric, or Jewish Federation and other AIPAC and “progressive” type slander campaigns, it could go either way. These organizations are snout-deep in all of the federal dollars that the DVIC slurps up every year, and they are right there at the front of the massive DHS crisis PR industry as well, that continues to manufacture crisis after crisis that only they benefit from, snout deep in the trough.
While Ms. Sperling is quick to accuse the right wing, she misses the opportunity to ask the question “what do Jewish and Progressive groups, and then, the “umbrella” of “human rights” groups that masquerade as do-goodniks do with the money that the Department of Homeland Security grant them every year” as these groups get between 94 and 97 percent of every dollar that the DHS ‘spends’ on dealing with the ever morphing and nebulous ‘security threats’ that they-for some reason- are always under. And words certainly seem to be more dangerous than IED’s on this topic, aas we see time and again as they trip all over themselves to label every common crime an act of “domestic terrorism.”
While this is on the surface seems a necessary and decent use of such black budget funds, it is interesting to note that in the long history of America,  most if not ALL Swastika hoaxes and ‘bomb threats’ are perpetrated BY Jews ON other Jews (for example, only blacks,whites, and Hispanics have been lynching victims), and that even the much heralded  ACLU case of defending Nazi’s right to free speech was a case that involved one of the many Jewish Nazi’s- Frank Collin.
I remeber how tattooed concentration camp survivors taked in hushed tones about his Jewishness, almost ashamed to admit it- that the famous “Nazi” of Skokie Illinois was himself a Jew; and whereas tens of thousands of other American’s are mercilessly and brutally slandered, maligned, stalked, beaten, or murdered every year Jews and white women are not amongst the dead for the most part. So much like shiksa’s masquerading as the treasured house slaves of the Khazarian’s, we see Frank Collin masquerading as a racist in order to keep the forever-in-crisis narrative alive.
And, we see a sort of “culling” taking place in the case of Sperling and others. Let me know when and if you start seeing patterns, as ‘irrational’ fears or obsessions with patterns can indicate delusional thinking. And worse, those who take action against others due to these irrational fears are certainly clinical, if not outright sociopathological.
Blood money, blood libel, black budgets, and Seana Sperling’s complaint-is she writing about ritual defamation, or Zigeunernacht, the “Night of the Gypsies”- or is something else afoot, such as the slanderous rhetoric of some reaching into academia targeting others?
You decide.

The Vilification Industry and the Surveillance State, by Seana Sperling

:

Being under surveillance and the slander that accompanies these lists, can wreak havoc with your career and your life as I have found out. If you apply for a job, the watch team will contact the prospective employer claiming you are under investigation for something, and you will not hear back. If the prospective employer does an Internet search of your name and finds a false Police Report or false Police Record they will not call back. If you go for an eye exam, go for a haircut, the snitch groups will call them up, thus you will be treated badly.
I found a false Police Record under my name on www.instantcheckmate.com. This website claims to have “Real Records,” but is a con. I have no record and I am not a criminal, terrorist, pervert or whatever. I clicked on my name and at the top of the page that opened read: “CAUTION: This background report is very graphic. We do not censor our reports. We trust you to use this information responsibly. Please do not abuse this tool, or we could be forced to take it offline. The content of the report might shock you, so please prepare for the unexpected.” I paid the $9.95 to see what I was being accused of this time. There was no record. I contacted the site and threatened litigation and they took the slander down the next day. I called City Hall Records and said I was finding things online about some sort of Police Record and they confirmed that they had nothing negative about me.
Award winning Author, Gloria Naylor writes about this type of vilification and organized bullying in her fictionalized memoir 1996. What begins with a simple dispute with a neighbor escalates into a DEA investigation and gullible citizens are manipulated into stalking and harassing Naylor everywhere she goes. She writes of how friends turned on her and were actually aiding the bullies

 

A special note to my special readers: THIS will be my last post here on THIS blog.

DDOs Attacks , internet surveillance from Fusion Centers, and OGS: Read this as if it was YOU that just got hit with a DDOS attack (your fifth in two days), which slowed your own writing down and took you offline until you could reboot
A note to the “special” and “specialist” reader’s who have been following along: due to the fact that my last story about guns, under-aged sexcapades , police cadet’s and the police personality, that post becoming a sort of target itself, it is important to note that I have had more hits to this blog from Thailand, an exceptional amount from the chief Five Eyes Alliance nations looking at “key” posts; and especially from readers who are exceptionally curious about my writing in re: the LAPD.
So I must issue a disclaimer: I have nothng personally against police, nor do I hold a grudge for the many decades wherein certain and specific nameable, identifiably associated police and their affiliated specific shitbags waged blackmail, whisper campaigns, slander, and attempted at times to levy, frame, falsely acuse, or otherwise encourage or facilitate false charges against me (those specific cowards amongst you know who you are specifically, and who your bretheren and sisterns are as well.) It is not my intent to malign police, or the noble profession that it ONCE WAS, nor to tarnish or impugn the badge (well, maybe a little bit.)
But rather, this blog is an appeal to those in the IC who sit behind NSA-Israel trickling down toFusion Center, trickling down to local LEO jobs, treating human beings as target practice; those in the IC who use back-doors like common criminals, and illicit hand-offs of data theft-goods to subvert due process; to those in law enforcement who are tired of sitting their at the donut shop/Starbucks in East LA, as your ride idle’s on, knowing that the game is rigged, that your promotion depends upon complicity, and feeling powerless to do the right thing, even as your buttie across town Tweets you a picture of the latest target to mock, deride, and entrap/stalk/harass.
But I urge you, as I have urged myself and others, to come forwards, and reveal what you know, which is certainly more than I know.
And on that note, I am as aware now s I was at all times that my life is in jeopardy, as is your own, but also, I have survived multiple shootings of various kinds, and outlived the worst of slander’s by multiple groups and org’s informed by coward’s and cowardly databases, and even more cowardly Taser attacks. In other words- take a breath bro’s and sistern’s-and do the right thing.
In the time since I stopped writing this blog, I have met multiple United States Veteran’s-some of them explosives experts who are stalked for their knowledge, by unknown asaillants (and it is not PTSD in the clinical sense that they are describing to me); some of them wiremen who refuse to climb pole outside a targets house, and refusing to pull wires that enhance illegal operations directed at American citizens; and I have met other targets, some of them just bootlegs-but all of them stalked into silence.
Too, I have met homeless or “houseless”hackers, electronics specialists, and more, all of whom claim one or another form of OGS, or targeting by “the good guys.” Some of them even resembled the profile of the victim’s of being drummed out of the ranks, as did Gavin Long, who was framed with dishonorable discharge and hording women’s underwear….
But OGS is a real thing, and perverse, archaic, ethnic, religious tribal, and social manipulation of sexuality, relationships, and hence the future of these men is more than just a barracks joke. If anything, it’s an indicator that the ASVAB selects for sexual deviants and sheeple who have sex hang-ups: and that those then become the arbiters and gate-keepers of “our” society. Or, as you know it “the norm.”
A short list of their complaints from this week alone:

  1. tail lights knocked out time and time again-this is s symbolic thing. Also, Philando Castile also endured many tail lights knocked out before he was murdered in front of a four year old child, by an Israelified encounter while in the drivers seat of his car.
  2. mysterious encounters with people with surveilance gear; stranger false arrests
  3. gas-lighting of various kinds rangingfrom things oved around their yards to outright vandalism
  4. relationships ruined, and then, isolation
  5. their medical claims and records being burned in mysterious arsons, or by theft from storage lockers and desk tops.
  6. Paper work lost at the VA multiple times, blocking claims of disability.
  7. Being followed by property developers or their hird security details that seek to drive them from their homes, or lock them up on 51-50 holds-long enough fr any agency to sneak into their homes and do any of the above.

And, most nefariously, I have met AGAIN the simple fact that when I try to publish this blog, it comes under attack-the entire system freezes, and locks up. The blog becomes “un-publishable.” And that, just after I tried to link to this update about the connection between corruption of police cadets, hidden practices in police dpartments all across America, and how looking in my windows, or into my Windows 10; or looking the other way at official endemic and systemic  corruption is not the solution.
No matter how many of my blogs “you” pop, another and another will spring up. Like Whack-a-mole. The first time I was shot, in cold blood, I didn’t quite know why-and that, as I awoke, literally, on Friday the 13th. Make of it what you will.
But every 13 thereafter? You only empowered ths story, and every one that has and will come after it. I have met the Gollum, and the Gollum is mine. Be careful you are on the right side of this story.
Related Stories, and Five Eyes-the New Axis of Evil, and Peter Theil. Or “How the Fourth Reich and the Zionists became BFF”
Who is spying on YOUR neighborhood? https://www.aclu.org/whos-spying-your-neighborhood-map
More on Fusion Centers: https://www.aclu.org/other/more-about-fusion-centers
 

Abbreviations of FVEY government agencies

Abbr Agency Country
ASD Australian Signals Directorate Australia
CIA Central Intelligence Agency United States
CSE Communications Security Establishment Canada
CSIS Canadian Security Intelligence Service Canada
FBI Federal Bureau of Investigation United States
GCHQ Government Communications Headquarters United Kingdom
GCSB Government Communications Security Bureau New Zealand
MI5 The Security Service United Kingdom
MI6 Secret Intelligence Service United Kingdom
NSA National Security Agency United States

Five Eyes Spying links: https://www.techdirt.com/search-g.php?num=20&q=Five+Eyes+&search=Search
Peter Thiel and Palantir spying on your children’s children’s children: https://theintercept.com/2017/02/22/how-peter-thiels-palantir-helped-the-nsa-spy-on-the-whole-world/
Five Eyes meets in New Zealand-Peter Thiel’s new “home”: https://www.rt.com/viral/385722-five-eyes-spying-alliance/
The Five Eyes Alliance is selling you cheap: https://www.theatlantic.com/politics/archive/2013/06/is-the-five-eyes-alliance-conspiring-to-spy-on-you/277190/
Facebook’s Mark Zuckerberg isn’t a good neighbor-and you invited him underneath your windowsill inthe first place: http://www.inquisitr.com/2712367/facebooks-mark-zuckerberg-is-not-a-good-neighbor/
 
 
 

Organized gang stalking and Countering Violent Extremism programs: how"Disruption"programs work-a privacy and due process raping boondoggle, and security theater cash cow.

The goal of all of this privacy rape, and due process subversion by the NSA/CIA/FBI/LEO data theft? Who knows, and  whatever-cuz’ it’s “for the children.” And ANYTHING that is for the children is big money in a totalitarian or surveillance state. The ones who aren’t bombed overseas-aka “the remnants of” the “children”-those that are left after the DVIC and the MIC with ts affiliated “industries” has “their way with them,” first. Pre-natal supremacy over ‘the children’ and the MIC is a one way street.
Soft force eugenics and child abuse: how the DVIC and the MIC maintain religious, and narrative supremacy over future generations. Meet the Countering Violent Extremism programs which are really ideological restraints on privacy, rights of assembly, and rights of free expression, coupled with violations of the equal protection clause of the United States Constitution.
Imagine you are a peace activist, or NOT a member of one or another sect/cult/order/denomination of a Jewish-christian religion; or you’re an atheist/humanist/whistle blower/ activist-even a ‘petty criminal’ who smokes pot-and one day, you find that you seem to bump into the same faces all over town-that ‘faces’ re following you. That’s odd, you think: that 6’2″ tall guy in the brown Eddie Bauer loafers, classic Dickey’s slacks, and the close cropped, fawny Germanic brown hair that matches his shoes,and who drives an oversized big red Ford pickup-he was everywhere I was today: whipping into the parking lot at Target, or sweeping into the restaurant that serves the “ethnic food,”and trying to bury his angular 6’2” frame into a booth. Odd, you think- how a guy that big can hide himself behind an 18″ tall menu….
Naw, you think- must be my imagination. The 18″ menu format, I mean.
And then, for weeks, this pattern repeats itself, sometimes with the tall guy, sometimes with others, usually white but frequently erudite and well dressed 6’3″ brown and black people (also, often with dreadlocks and blue suits; or pert Persian women in sensible flats, with cameras in hand, asking to take your picture at peace marches, or anti-apartheid meetings). The squat, weight-lifter framed black woman with the bad weave, and the sensible backpack and recognizable mid-western accent coupled inevitably with the tall brown shoed flatfoot; the Asian man who is a modern Charlie Chan, but with real Asian heritage and ethnicity, showing up on buses, coffee shops, AA meetings maybe (I have that on reliable sources, I promise…).
That’s odd, you think- this has been happening for weeks! Months! YEARS!! And you become a bit ‘paranoid’ and a bit on edge, looking over your shoulder all the time, because those same faces show up frequently; sometimes across the states.
Related Story: The Brennan Center for Justice at NYU CVE link roundup
About then, when you notice, and especially, when you begin to document it in some form-it stops-day after day goes by and you don’t see the tall guy, or the middle eastern or the Kenyan man following you; and the late middle aged shrew with the strange comments in the grocery store about ” I know what you READ!” disappears too. A week or two or a month goes by, and then new things happen: you come home, and the lock on your door is somehow different-usually it is more loose-but now it’s harder to get your key into(this can go both ways, as each lock smith, or lock picking set is different); or there are strange marks on your door jamb (sometimes a three pronged tool is used, other times what appears to be a wide, flat screwdriver).
The Black Bag Job, illustrated:
1563470456369
IMG_20190719_012742
1563470581341
1563470538651
And the internet, of course- you try to log in to Gmail, and as if you are being transferred to a computer across the world-twice-as it takes between seven and twenty seconds just to log in-EVERY TIME, whereas in the past several years, it was a matter of one to three seconds. You notice that you Gmail address has been switched from San Francisco to Irland, or he UK-odd, that you would take the time to notice that-you probably are losing it.
Strange, you think, I haven’t changed ISP’s, or used a new computer, nor have I changed any settings on ANYTHING. And certainly, I don’t live in Kansas, anymore. And certainly, those brand new wireless AP’s that spring up outside your house with kewl names like “MAdame PSycho,” and “Not the FBI Surveillance Van,” or “TAO2” are all in your head. Sure-that’s an option too.
Hmmm. And the pop-ups and advertisements on your computer will take on a life of their own, as for years upon years, you got ESPN, Manchester United schedules,  and “subscribe now!” popups every time you are on the computer reading news for free, or maybe an occasional ad for the “Penis Pump,” or free Viagra samples(no-really that wasn’t my case, I swear) but you now get pop-ups asking you about tinitus, and advertisements for middle eastern vacations-ads in Arabic. Maybe you get the weird pop-up about gun shows in Texas(“deep discounts for LEO’s who buy in bulk!”), as your IP registers in Nebraska….
And, the phone of course- your phone now has the ability to occasionally talk back to you- about what you did yesterday, or an hour ago (and this will happen only once or twice, just so that you cannot begin to document it.)
This is on the surface one of two things: you are going totally and completely bonkers-nuts to the meat grinder mad-you are deteriorating as if your mind has been taken over by ‘something else” that somehow knows who YOU are, and WHERE you are at all times, even if you’ve never owned a gun in your life, or used a penis pump (well-who HASN’T used one of those?!!).
You become pre-occupied with little strange happenings like your garbage being tipped over in your alley, or the long scraping marks left on the siding of your house by a ladder-maybe in your paranoid mind, you connect those random events: the ladder marks to your now debilitated security cameras whose cables had been disconnected RIGHT WHERE THOSE LADDER MARKS scrape your siding, and ding your white aluminum window trim with deep scars and gray marks.
Maybe the little camera left behind in your sons bedroom is a sign of something evil-who knows, right? It’s your word against the deep state, and all of it’s military/LEO/psychologist/MIC/PIC/religionist/occultists-who-work-in-government. And who are you, really? It’s for the Children (hitler youth), after all!
Or, maybe the reports from your neighbors about how they saw other strange fat white men jumping your fences, or signalling to each other from your alley to the street, or using strange hand signals just as they hopped into cabs that JUST HAPPENED TO BE WAITING THERE in front of your house strikes you as “odd” reports from a good and trusted neighbor.
Suuure. Maybe your going crazy-along with your neighbors, who ALL report these things to you. And some of whom are suddenly building fences, or installing their own security lights and cameras.
Yup-you’re nuts, prolly. Orrr mebbe….
Maybe another option that is a little less crazy perhaps: you are being covertly and totally [email protected] with by one of any number of sources ranging from LEO’s to military operations, to strange cultists or organized gangs of pedophiles* that most often are run from within the official cover of state agencies and their affiliated “good guys” and girls (here is one possible case of that. And read through this blog to help understand who else it might be.)
But in many of the early cases-stemming back to around 2001-these were often covert intimidation/recruitment/entrapment/coercion/conformity/manipulation schemes that loosely fall under the category of “countering violent extremism” programs run by any of a number of unethical operators ranging from LEO’s, task forces, and intelligence agencies to private contractors.
And, the one key feature they all have in common has a plausible connection: agents and agencies that practice fraud upon the courts, and fraud upon the Constitution via massive, unchecked database abuse, and surveillance via electronic media such as computers, cell phones, and even televisions. You have been selected, and targeted for intelligence collection (HUMINT), informant recruitment (they want to use you as a rat), or possibly, you have been deemed a criminal, without due process of law,  due to the use of unauthorized access to your computer and Google searches, and, because that access was illegal, and parallel construction not warranted in your case (there’s a joke in there somewhere about warrants) “they” have chosen to use you as a moving target for all their new military grade electronic toys and weapons.
Related Stories: Have a look at the bizarre world of parallel construction from Techdirt.com-the practice of LEO’s breaking the law, and violating the Constitution, and then doing plastic surgery to put a new face on “criminality.”
Sooo…….
Welcome to the shadowy, sketchy, often bizarre (and incredibly well financed) world of CVE programs!

“Countering violent extremism programs have been identified by the government as a top national security priority, but the public knows appallingly little about them,” says Hina Shamsi, director of the ACLU’s National Security Project. “We’re suing because government agencies have repeatedly failed to provide us information that we’ve requested about the nature of their CVE initiatives.”
In a briefing paper released with its lawsuit, the ACLU said that CVE programs often target “people for monitoring based on their beliefs or ideologies,” thus potentially criminalizing speech protected under the First Amendment. It also highlighted past abuses of CVE programs, including instances in which young people who refused to take part were characterized as radicals and where community leaders were told they would have to identity and discuss cases of specific youths with law enforcement.
The Department of Homeland Security declined to comment for this story, citing pending litigation. The Department of Justice did not respond to request for comment.
Government-led CVE efforts in the United States are inspired in large part by programs rolled out in past years in the United Kingdom. Broadly speaking, CVE programs seek to expand counterterrorism efforts beyond law enforcement to involve other government workers, like teachers and social workers, as well as community leaders outside of government, like clergy. They can involve propaganda and other communication strategies as well as monitoring and questioning.
Those programs have been deeply controversial in the UK, where civil society activists have blamed them for exacerbating ethnic tensions within British society while failing to meaningfully fight extremism. In recent months, the U.K. government has also rolled out anti-radicalization programs in schools, which have led to instances in which Muslim schoolchildren have been stigmatized by teachers as potential terrorists.”

*One recurrent theme in almost ALL OGS blogs is that those who are targeted are also slandered with a variety of “labels” ranging from drug dealer/user/ to prostitute to “pedophile”. But the reality is that state organizations, police, psychologists, lawyers, the courts, CPS, foster care, social work, and many other subsidiary organizations are a multi-billion dollar per year domestic industry, subsidized by the Jewish-christian ideological state to get children funneled into the Domestic Violence Industrial Complex (DVIC) by hook or by crook (be the shepherd, not the sheeple and all that.)
Each child that is successfully stolen or otherwise diverted into this “system” is a cash cow (cash sheep?) returning dividends to those who are part of this system. For instance-foster parents can rake in between 800-1800 per month, depending on the state, per child. And any child that becomes involved with CPS ca returns some 70k or so per year to those who participate in this business.
Not surprisingly, Myron May, a man who claimed he was gang stalked, was the product of the multi-million dollar Christian foster care factories that are dotted across America-and no researcher of OGS has yet made this connection between him, and this systematic profiteering off of children as commodities.
Disclaimer: I make no claims herein specifically or intentionally relating to the financing of the Taunton Foster care community, and intend this example as one of many where children are used as cultural capital as well as actual capital. owever, I have long been a critic of the DVIC foster care factories that dot America and that are themselves a 4 billion dollar per year industry. Children taken into foster care stand an 80% ncreased chance of sexual abuse, or othher harmful situataions, and the feminists/internationalist/bolshevik elements of many “progressive” state depend on this revenue, and use it for political action.

Organized gang stalking, Scott Crow, disinformation and informants.

Scott Crow, an anarchist, animal rights activist, has gone on record stating that organized “gang stalking is bullshit,”which is alright- because everyone is entitled to an opinion. And as they say, even assholes have those. Opinions, of course. And, I guess for some, it’s easier to love fuzzy or feathered critters and act like cute, four year old anarchists with lil’ diapies full of doodoo, than to deal with the real issues of gross human rights abuses of corporatism colluding with a full blown surveillance/security state to do things to people that were unimagined at the height of America’s last Constitutional crisis of the 1960’s (click here to see the catalogue of surveillance gear available to LEO’s who spy on American citizens without warrants).
But to the hundreds of thousands of people world wide who claim to be harassed by unknown assailants, various electronics ranging from wiretaps and StingRay towers, cell phone emulation, and sound weapons (what’s that clicking on my phone?!), and stalkers- lots of stalkers who do plainly weird shit called street theater- the evidence is against Mr. Crow’s opinion.
There is ample evidence of religions and cults that stalk people; evidence that the intelligence agencies and some really bad  LEO’s stalk people; retired LEO’s stalk people, the USAF and Naval NCIS working with the CIA and others stalk people; a HUGE well heeled operation of conformity enforcement run by the OSI and there is sh!tloads of evidence that it is part of a large, orchestrated crisis PR movement. And of course, every crisis PR movement needs useful idiots, who are just glad the pendulum missed their neck.
Scott Crow.org, on gang stalking:

In the last couple of years I became aware that I have accidentally become the poster child for a marginal, but rising movement.   It’s a movement of the disaffected, and somewhat marginalized in civil society. And like all of us its made of those alienated by the ills of capitalism: our atomized communities,  the overwhelming media (online and corporate) that can reverberate any idea into truth and the growing overwhelming complexities of our social and political spheres.  There is also another important piece that I have to throw into this cauldron that has given rise to this movement too; the farce called the war on terror and its all ensuing baggage of the surveillance state. Sounds intriguing doesn’t it? If you guessed I was talking about anarchy, social justice or even LOLcats you would have guessed wrong.  What I am referring to is an internet phenomena called gangstalking and somehow my surveillance by the FBI and Joint Terrorism Task Force for almost 9 years became the actual proof they all needed to say they were right all along; that they weren’t just paranoid.  Except I wasn’t gangstalked.

Related Story: The famous Civil Rights photographer Ernest Withers-who photographed ALL of the black leaders of the 1960’s, was a paid RAT. Bonus points if you can answer the question: And WHY was this guy at the hotel where Martin Luther King was shot dead?
SO- make of Scott Crow’s opinion what you will, But psychologists and other paid disinformation agents who both benefit directly from drug companies and privatized prison payrolls, and those who work with schizophrenics and sex offenders have even waged a classic “black propaganda” campaign to discredit those who claim they are harassed.
I DUNNO. MEBBE They is all caaaaraaaazy. Or not.
Either way? Any scientist, sociologist, intel agent, or crisis PR moron can take the data provided in this blog and test the many proofs and hypotheses themselves, against historical events like COINTELPRO, and the destruction/co-option of the peace/anti-war/Civil rights movement. You can look for- and find- the evidence that I provide herein-and replicate the methods, and find new validation yourself. I have merely provided a starting point.
But it boils down to this: people like Scott Crow, who was followed, surveilled and harassed by the FBI in what amounts to a fairly traditional investigation of a fairly pasty white traditional ‘suspect’ claims OGS is “total bullshit.” I mean-after all- animal rights people are startlingly quiet about warrantless surveillance, human rights, prison reform, and how the targeted, flawed and sociopathic Countering Violent Extremism programs work with local LEO’s and private security contractors to terrorize TI’s into complicity with snitch culture.
You don’t have to believe me- ask an actual RAT, Greg Monteilh, former FBI informant, about the “murky” practice of “flipping” innocent people into becoming agency informants-from the Guardian UK:

The ex-FBI informant with a change of heart: ‘There is no real hunt. It’s fixed’-Craig Monteilh describes how he pretended to be a radical Muslim in order to root out potential threats, shining a light on some of the bureau’s more ethically murky practices….(follow the link to learn more).

Just off the top of my internet, I can think of these many many validated tactics below that are reported by TI’s. And these days, as the NSA shares data with 16 other intel agencies and targets American citizens, it ain’t gettin’ any prettier out there without due process (even if Mr. Crow thinks it’s all bullshit, some of us still believe in Constitutional Democracy. And Mr. Crow and his pals- most of them animals- don’t read the Constitution anyways.).
A short list of what the NSA et al is doing to American citizens BEFORE they turn the data over to the local LEO’s-from Brian Lehrer-and ask yourself how YOU would feel with this arsenal pointed at YOU, personally:
THE NSA CAN:

  •  track the numbers of both parties on a phone call, as well location, time and duration. (More)
  • It can hack Chinese phones and text messages. (More)
  • It can set up fake internet cafes. (More)
  • It can spy on foreign leaders’ cell phones. (More)
  • It can tap underwater fiber-optic cables. (Clarification: Shane Harris explains that there were reports the NSA was trying to tap directly into cables using submarines, but is now more likely trying to intercept information once it has reached land.) (More)
  • It can track communication within media organizations like Al Jazeera. (More)
  • It can hack into the UN video conferencing system. (More)
  • It can track bank transactions. (More)
  • It can monitor text messages. (More)
  • It can access your email, chat, and web browsing history. (More)
  • It can map your social networks. (More)
  • It can access your smartphone app data. (More)
  • It is trying to get into secret networks like Tor, diverting users to less secure channels. (More)
  • It can go undercover within embassies to have closer access to foreign networks. (More)
  • It can set up listening posts on the roofs of buildings to monitor communications in a city. (More)
  • It can set up a fake LinkedIn. (More)
  • It can track the reservations at upscale hotels. (More)
  • It can intercept the talking points for Ban Ki-moon’s meeting with Obama. (More)
  • It can crack cellphone encryption codes. (More)
  • It can hack computers that aren’t connected to the internet using radio waves. (Update: Clarification — the NSA can access offline computers through radio waves on which it has already installed hidden devices.) (More)
  • It can intercept phone calls by setting up fake base stations. (More)
  • It can remotely access a computer by setting up a fake wireless connection. (More)
  • It can install fake SIM cards to then control a cell phone. (More)
  • It can fake a USB thumb drive that’s actually a monitoring device. (More)
  • It can crack all types of sophisticated computer encryption. (Update: It is trying to build this capability.) (More)
  • It can go into online games and monitor communication. (More)
  • It can intercept communications between aircraft and airports. (More)
  • (Update 1/18) It can physically intercept deliveries, open packages, and make changes to devices. (More) (h/t)
  • (Update 1/18) It can tap into the links between Google and Yahoo data centers to collect email and other data. (More) (h/t)
  • (Update 4/2) It can monitor, in real-time, Youtube views and Facebook “Likes.” (More)
  • (Update 4/2) It can monitor online behavior through free Wi-Fi at Canadian airports. (More)
  • (Update 4/2) It can shut down chat rooms used by Anonymous and identify Anonymous members. (More)
  • (Update 4/2) It can use real-time data to help identify and locate targets for US drone strikes. (More)
  • (Update 4/2) It can collect the IP addresses of visitors to the Wikileaks website. (More)
  • (Update 4/2) It can spy on US law firms representing foreign countries in trade negotiations. (More)
  • (Update 4/2) It can post false information on the Internet in order to hurt the reputation of targets. (More)
  • (Update 4/2) It can intercept and store webcam images. (More)
  • (Update 4/2) It can record phone calls and replay them up to a month later. (More)
  • (Update 6/2) It can harvest images from emails, texts, videoconferencing and more and feed it into facial recognition software. (More)

Did we miss any? Mischaracterize any capabilities? Let us know in the comments, or tweet @brianlehrer.
Suuure. It’s all bullshit- yeah, that sounds about right. Yup-keep your head up your ass, play it safe, m’boy. “They” are prolly all crazy- no electronics involved at all. Nothing to see here move along now….
 

The Military Industrial Complex (MIC) is the domestic partner of the Domestic Violence Industrial Complex(DVIC), and OGS is sign of a deteriorated society in total capitualtion.

The wet dream of all intelligence agencies is to have total control of ‘the masses.’
That is well documented, everywhere. And today, the have begun a program to stalk your children from cradle to grave, as NSA analysts sift through your child’s every online thought, picture, and personal detail, often in real time. But before they do, they often sift through the parent first, and leverage them in ways that only Hitler, and Stalin have done in recent memory; mass surveillance is soft force eugenics in practice, as they can now ( and do) redirect conversations, relationships, and more in real time.
At first glance, the NSA/CIA/FBI mass surveillance scheme of 24/7 secret, chronic, pervasive warrantless spying that has been unleashed upon America and other western nations has little to do with well intentioned programs that combat violence against women, or programs that assist families and children. After all who could argue that these initiatives are in themselves violent, or part of a larger pattern of institutional violence that has had the net effect of waging war on American’s, their families, and their children. And certainly, any person who would make such correlations will be met with one or another form of the meme “What-do you beat your wife?”
beat your wife
It is this last question which was preceded by another more nefarious question that was never really asked in the pre-DVIC era, but which was overlayed upon men and fathers regardless, and contrary to all evidence as a form of ritual defamation: do you beat, rape, molest or otherwise harm your children?
An the implication then was that fathers are dangerous-an mothers safe and secure. But the reality is that the surveillance state was built on the forced march of the absence of fathers, and women whose complicity with endless MIC purposes fully subsidized.
Destroy the family, you destroy the country
The quote above is frequently attributed to Vladimir Lenin, the Soviet strongman, but this attribution isn’t validated by evidence. Regardless, the quote DOES apply to globalists, whose goal is exactly that as they smash Jews against Jews, and blacks against whites, women against men; fascists against communists as we saw recently in Charlottesville VA, because there goal in the Hegelian dialectic is simply to profit.
The destruction of marriages, and families is what provides properly angry, properly gendered an aggressive, low IQ, low status individuals to the Military Industrial Complex, which in turn, is related to the Domestic Violence Industrial Complex, as some 60% of military members come from broken or multi-family homes. It is this upon which our country has been leveraged, one against another, father against mother, and women against men in an odd, primal state of affairs that all but ensures a lack of real morality, an in its place a pseudo ‘God mother and Country’ ethos-the ethos of ignorance an true immorality.
We shall see that these programs of DV have EVERYTHING to do with mass surveillance, as the first ‘victims’ of the double entendre’ of DV were men who resisted the false narrative of DV, and then became victims of social engineered domestic terror, losing their voice and their ability to resist the coming police state.
Marriage- what a quaint notion from an earlier era. Today, it is indisputable that relationships between men and women are in jeopardy-and that the institutions of family and home-the domestic environment- have become so eroded that the courts, social workers, cops and lawyers and judges have become the de facto relationships that American’s are encouraged to have, in lieu of marriage, or even healthy cohabitation arrangements.
This blog examines the “why” is it that people are discouraged from each other, and then, usurped into the larger narrative of DV and it’s associated industries.And the answer might surprise you: attacking marriage, relationship, home and family is a profitable industry backed by some seriously well heeled public relations campaigns.
False Morality as usurper of true morality: How gender, and the CIA Mockingbird MSM has built the foundation of social deterioration, via OGS and propaganda.
Have a look here an take note that the general way in which the media and the social engineers behind the media routinely portray “relationships,”as women are trained to see men as jerks: http://elitedaily.com/dating/subtle-signs-youre-a-jerk-magnet/1911558/
And here are a few more below-note how the MSM encourages women to use denigration and humiliation, and every manner of micro-aggression to describe, examine, or manipulate men, and to ‘frame’ relationships:
Men are narcissistic pricks: http://elitedaily.com/dating/fall-in-love-someone-never-love-you-back/1912273/
Just settle for one-cuz they’re all jerks: http://elitedaily.com/dating/guys-date-suck-at-being-single/1894983/
Yup- they’re all jerks (but get that baby and feed it to Uncle Sam’s ever hungry cannons, because it’s incentivized): http://elitedaily.com/dating/pros-cons-dating-a-jerk/1892195/
This blog attempts to explore the many connections between legal fictions, legal activism, social policies, social engineering, psychology as a tool of mass population control;  propaganda, industries, war, prisons, baby farming, competitive birthing and many more topics. And I attempt to point to an epidemic of apathy and hidden institutionalized objectification and its resultant brutality that has led us to where we are today in a surveillance state, and the situation where the creeping OGS is the disease.
But what are these connections? Hopefully, you find that this blog explores that question, and points the reader in the direction of making sociological, psychological, ideological and other necessary correlations between the newly emerged surveillance state, the complete dismantling of our Constitution that started at the secretive courts and secretive unconstitutional practices of the family courts and the gray areas of rape shield laws, and the FISA court today; and the accompanying due process rights violations that are the norm today, as domestic violence (DV) has been shown to be a double entendre’ that depends from partial truths, and outright domestic terror waged in the name of “the women and children.”.
Mass Surveillance: Now, the MC can look directly into your child’s bath tub, and begin to for it’s mind. Here is a link farm of NSA surveillance abuse-and yes, the DO look a pictures of your kid in the bath tub:
NSA Domestic Spying Abuse: Why you should be outraged about mass surveillance abuse http://blogs.reuters.com/great-debate/2015/05/11/if-youre-not-outraged-about-the-nsa-surveillance-heres-why-you-should-be/
Link farm:
Journalist Michael Hastings, probing the NSA and CIA domestic abuses of American’s, is killed in fiery crash: https://www.thenewamerican.com/usnews/crime/item/15929-journalist-probing-nsa-and-cia-abuses-dies-in-mysterious-crash
Electronic Frontier Foundation
Ongoing, updated ACLU coverage of the NSA/CIA/FBI domestic abuse of data, and citizens: https://www.aclu.org/issues/national-security/privacy-and-surveillance/nsa-surveillance
Electronic Frontier Foundation NSA spying abuse link farm: https://www.eff.org/nsa-spying
Nobel Prize winning writers against NSA abuse: http://www.huffingtonpost.com/2013/12/09/nobel-writers-nsa-_n_4414951.html
NSA abuse is the rule, not the exception: https://www.thenewamerican.com/usnews/constitution/item/16337-nsa-revelations-prove-abuse-is-the-rule-not-the-exception
NSA breaks the privacy rules thousands of times per year-that we KNOW of: https://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html
Why we have the fourth amendment: http://www.washingtonexaminer.com/nsa-and-how-the-fourth-amendment-stops-government-abuses/article/2565387
Bloomberg News http://www.slate.com/blogs/future_tense/2013/08/23/bloomberg_report_nsa_employees_have_deliberately_abused_their_power.html
NSA- A history of Abuse: http://www.freedomworks.org/content/nsa-domestic-spying-history-abuse
Cato Institute link farm: https://www.cato.org/nsa-abuses
Techdirt.com Link farm:
https://www.techdirt.com/articles/20160420/06055234219/fisa-court-still-uncovering-surveillance-abuses-nsa-fbi.shtml
Running list of NSA abuses:
http://www.wnyc.org/story/running-list-what-we-know-nsa-can-do-so-far/
NSA employee’s spying intimately on women: https://www.theguardian.com/world/2013/sep/27/nsa-employee-spied-detection-internal-memo
 

The Panopticon and gang stalking complaints: 24/7 harassment is what the Panopticon was designed to do

Gang stalking and symptoms and 24/7 harassment and trauma based mind control (TBMC): hidden in plain sight

“At it’s centre, the victim’s known as “Targeted Individuals” or “TI” for short claiming to be consistently harassed 24/7 by unknown perpetrators that to those around them can see no apparent activity is obviously going to become labelled with some form of mental illness.”
–https://gangstalkinginfoblog.wordpress.com/2016/02/

In my experience, this phrase-this claim of 24/7 harassment- appears in some 75% of all the blogs I have read. The reader should note that all of my estimates are ‘shoestring’ estimates, meaning that my data is an opinion, based in intensive research-not yet collated and verified.
More often than not, the 24/7 claim appears in blogs that attempt to discredit or mock  TI’s. However, because OGS is in part an influence operation with features of mind control, it also appears that many TI’s adopt the language of those who stalk them. This is common in Stockholm Syndrome  as we see with the Beatrice Six, but also in operand conditioning and other nefarious victim/torturer  scenarios as well.
And, this is common in torture and blackmail situations where victims attempt to side with their torturer. It famously has been called “Stockholm syndrome,“in the extreme case, and in OGS, we see that it is frequently referred to as “NTT” or “no touch torture”in most online blogs and video’s.
The phrase “24/7” is itself a relic of street culture, and has it’s origins in gang or prison environments too, such as “24/7 lockdown” and so on. But what is important to note is this: in classic mental conditioning, aka behavioral experiments, as well as social engineering, and trauma based mind control, it really doesn’t take much to make a target feel as though they are under constant observation. All it takes is one, well planned event, and then, reminders of the event placed here and there, much like the kinds that are described on TI blogs and video’s.
No Touch Torture (NTT) is also officially part of the CIA’s torture protocols, and because we know that there is virtually no window between intelligence agents and the public these days, and that 17 intelligence agencies are involved in culling through the NSA’s illegally entrapped data of all Americans,  it is not hard to imagine that these things take place. But in the cases we have evidence, it is clear that there is a component of NTT in effect.
Then, if you add Fusion Center spying that can put a squad car in front of someones house within minutes of them logging on to a computer, and some redirection when they are online, and the ‘symptoms’ are no longer imaginary or schizophreniform, but instead are descriptions of the disease itself. And, the disease is social engineering that employs 24/7 surveillance and monitoring of a person via ther cell phone, computers, and programs like the CIA’s Laser, which is used in every day policing.
These programs were put in place quietly over a decade and a half, and few knew about them, or what they do. But we know now: they monitor us in real time.
Here are two actual examples of lawsuits and stories where rea time monitoring activity of citizens under the “watch” of unknown perpetrators made the national news:
Someone in a store or at your job repeats something back to you, and that something just happens to be exactly what you read about on the internet last night. Then, you are stalked and harassed for years, risking you and sounding like a crazy person after you figure out how it was done. This is the famous Jeffrey Kantor lawsuit, documented by the American Bar Association’s ABA online journal:

Autocomplete search led to government stalking, lawsuit contends

image

Image from Shutterstock.

A former employee with a government contractor claims the government began a campaign of harassment against him because of Google’s autocomplete feature.
Jeffrey Kantor says in a federal lawsuit (PDF) that he intended to search for “How do I build a radio-controlled airplane?” in October 2009 because he was thinking of making the toy for his son’s birthday. After he typed “How do I build a,” Google completed the search with the word “bomb,” and Kantor inadvertently hit enter. Courthouse News Service has the story.
The suit names several government officials as defendants, including Attorney General Eric Holder.
Kantor alleges that government investigators visited him at work after the unfortunate search, monitored his book purchases and computer searches, and attached a GPS device to his car….[click to read more]

 
Then there is the complaint (symptom) where your home is entered and  victim suspects they are being filmed all the time.
This happens surreptitiously after you are gas-lighted- things are moved around in your apartment, and windows and doors are left in curious positions. Such as the case of Dr. Facika Tafara, who runs a family health clinic in San Diego (which is arguably the gang stalking capital of America)whose home was broken into on multiple occasions, and at one point the people responsible left behind a small spy camera:
[youtube https://www.youtube.com/watch?v=U0mjwAPtcRY&w=854&h=480]
 
These two incidents can provoke different levels of paranoia, distrust, fear, and other emotions that indicate trauma. But in OGS, these events are repeated over years, and often escalated to absurd points over time (Bob Deis, the Krlich’s of Ohio) so much so that even beginning to describe these experiences, compounded by time, makes one sound crazy simply because of duration.Therapists and lawyers should note that the “onset” of the “symptoms” can be correlated to real life events, rather than as organic brain disease.
For the criminal defense attorney, the psychologist, or the therapist, it is crucial to view the patient/TI claimant/ actual victim through this lens of TBMC, and its effects over time. And ask yourself as a ‘rational’ or ‘reasonable’ person: How much of your personal information would you be able to hear repeated back to you before you exhibit signs of paranoia?
How many small camera’s left behind in your home can you tolerate? It only takes one for most people before they are spooked-but for TI’s it is often years of these occult activities, that are practiced in the ‘community policing’ schema’s across the western world. And, both incidents share features of known instances of gang stalking: Kantor is Jewish in a highly Christian part of America, and Tafara is a family health practitioner, and many abortion doctors as well as alternative medicine clinics are prime targets of documented group and gang stalking.