Are gang stalking and child trafficking related: gangstalking 2020

(This post is in progress, check back later)

One fairly consistent search term that comes to my blog is the title of this post.

Are gang stalking and child trafficking related?

The short answer is GANG STALKING AND CHILD TRAFFICKING ARE DEFINITELY RELATED), but not as you might think of either gangs of stalkers, or actual child trafficking, which is the buying and selling of children on a sordid hidden black market of human flesh, with the net goal and effect of child labor or child sexual exploitation.

Related Stories: The Annie E. Casey Foundation, like many other NGOs, is implicated in many children-for-profit activities, and even “liberals” are criticising their form of child exploitation. From the Capital Research Center, a story of fake-progressives profiteering, and exploiting children, and more specifically, black children:

Harsh Critique of Child-Welfare Policy Includes Blame of Liberal Foundations

While the above scenarios are gut wrenching, horrifying, and do indeed occur, what happens far more frequently, is that states and counties across America derive direct financial benefits from essentially exploiting men, women and children as financial resources, and the states get those resources from non governmental organizations(NGOs) whose talent pool is directly associated with spy agencies like the CIA, DoD, Mi6, Swedish, and other intelligence agencies, or, US domestic NGOs that benefit from federal dollars, and philanthropic organizations, all of whom stipulate how the money can be spent. And all of these have an agenda, pushing policies that are religious and political in nature.

Related Stories: Jewish-christian history and culture is a slavery-based system of social control, and how the trope of “missing and exploited children” became a political cash cow for those who perpetuate this form of culture: the case of Americas most unsolved child disappearance, Marjorie West.

Marjorie West “disappeared in 1938 in the height of illegal adoption groups all over the country. There is a very good chance she was picked up by a broker for them who was “hunting” to get a child to their liking.

Then, take a look at the unique-and odd- business model of one of the Parkland shootings most vocal parents, connections between concert and event security providers and illicit child adoptions, and also, the symbolism of the designs on US police badges, for reference.

For one example of how police in the US fill jail cells with innocent people(and similarly, pray upon single parents, and utilize foster care industries, and psychologists chairs use kids this way), in order for their city and its privatized jails to get funds, take a look at this mans tale, or the case of the Beatrice Six, the largest DNA based wrongful conviction of innocent people in US history. And of course, in the latter case, a cash-strapped US state and county and its covert religionists operating in official capacitiesgot an instant one million dollar federal check for stealing a lesbians child, after framing her and others for a heinous murder.

Or, watch the movie Kids for Cash, a story about one judge literally selling over 3000 children.

Kids for Cash

Home

3,000 kids. One judge. The scandal that rocked the nation. … “It’s a huge story, and Kids for Cash provides a measure of justice.”

On the surface of my claim here, we see a difficult thesis, right? States and the DVIC industries preying upon children. After all, states and state workers, and the affilliated subsidiary industries are the “good upstanding, law abiding people,” right?

Well, in case after case after case, we see these local and state actors are in fact, highly organized, highly criminal, and wholly unnaccountable to the public at large.

And, we see that these unaccountable agencies essentially write their own laws, sponsor their own studies, and monitor themselves and their own affiliates too. In other words these good people operate literally outside of the law, and
outside of the guarantees of rights and civil liberties of citizens outlined in the US constitution. The DVIC is literally a system of modern slavery, complete with its own pseudo-factual, pseudo-legal framework, targeted at the powerless by elements of both the left and right wings of the political spectrum.

And, when we think about philanthropy, its the same general idea: these are the good people, right?

But increasingly, we see that these ideas of social good and goodguy and goodgalism are in fact ripe for corruption, and are frequently thin cover for profit schemes and social engineering and dysfunction–because in the Domestic Violence Industrial Complex (DVIC), its a constant “make work” project: create the dysfunction, then police the dysfunction.

Related Stories: The use of non-governmental organizations(NGOs) to infiltrate and influence politics,and societies is a tribal, sectarian, and bi-partisan effort. Most famously, the US CIA and other intelligence agencies use front companies and fake NGOs to accomplish goals, including assassinations. But international billionaires like George Soros also front NGOs, as do religious groups as I have described herein, most insidiously those that claim that free agent prostitutes are really “slaves”. It is primarily these NGOs that give US police their DVIC marching orders, because these NGOs contribute to many police coffers. And, many nations are waking up to these CIA/intelligence agency backed NGOs, and kicking them out of their country too

And under the DVIC, there is only gray area of law, because it exists as its own entity, outside of America constitutional law. So, the civil rights and due processes of law that we are taught in school, and through media simply do not apply under the DVIC, whose operations are frequently in violation of the Constitution, and that many liberal and conservatives have noted this as well.

Sources across the political lines agree that the USA and its FVEY associates are in fact operating two tiered justice sytems, with even the Huffington Post weighing in on it, and progressives themselves talking about how private prisons, and bail bondsman, and privatized pprobation outfits prey upon the poor.

The conservative scholar Stephen Baskerville notes that the DVIC has its own courts, its own police, its own punishments, and, most importantly, those who head those industries are “devouring their own children.”

So, yeah: organizations that claim to protect women and children, are actually preying upon, and profiteering from them, and most sources agree on that point.

So if you came here to my blog to get help, or validation, you are in the right place. These organized operations and their operatives will indeed do the following:

* there are thousands of cases where single parents report strange people at their childrens bus stops, or their children reporting strange encounters with strange people.

* there are uncounted stories of atheists and non-conformist parents being stalked and slandered by religious fanatics, and many single parents are isolated by whisper campaigns

* most of what you read onine about people “trying to make you crazy” are in fact, organized groups of community bullies, whose goal is to separate you from your child/ren by leveraging personal information, and more, and some of that directly derived from Fusion Center, and DHS private contractor spying

☞The case of NBC reporter Anna Conkey, who was involved with bizarre online and offline relugious nutcases is instructive on these points

So, because these organized efforts are most strikingly and provably community efforts, assisted by DVIC/PUC/ mental health meta-narrative profiteers, there is no doubt that this happens.

So for those who are reading this are looking for evidence and validation, let me explain how that community effort works, and who does it specifically, and where they get the money to do it.

State agencies get funding from a variety of sources, and create jobs with allocated resources. You will note that of those jobs, none of them manufacture, or sell products, nor do they create jobs in the sense of actual physical work that produces physical products. In fact, none of these federal dollar initiatives, or the NGO financed social programming does, because all they do is create narratives, and then, financial incentives for those who uphold those narratives.

So, we have social workers doing social work. But what is that work, exactly? And psychiatrists prescribing pills, and psychologists monitoring narratives. But no real, or meaningful jobs for those they monitor, because those who are monitored ARE the product created BY these DVIC industrialists.

And, we have gang stalking by private contractors, cops, retired cops, and their DVIC affilliates using unethical, and illegal methods to literally manufacture criminals, as we saw with the recent attempted frame job turned homicide of Ahmaud Arbery. I mean, the statistical odds of Ahmaud Arbery meeting his gang stalkers face to face in his town were nearly and literally a one out of 17,000 chance.

So, the child racketeering that we see today, in examples like the Kids for Cash scandal of the very Catholic/conservative religious,area of Pennsylvania, and similar schemes like it are related, because christian-Jewish non-governmental aencies (NGOs) are working with various law “enforcement” agencies in hidden and secretive ways, to associate, and/or attach themselves to your child.

Let me explain.

A quick review of both of these terms that *tey* use is in order.

Please review these ROGS posts for context:

How an actual gang of police, firefighters, and other “community policing” mobs of their associates, and other city workers harassed Rick Krlich in Ohio.

Krlich got civil restraining orders/ orders for protection against over 16 gang stalkers in Hubbard, Ohio, and look at how one of those harassers was later convicted of filing false fire reports, and convivted of stealing from the town treasury.

The Rick and Cindy Krlich case highlights an actual gang of city workers, police and fire personell harassing a man for over ten years, and in the civil filings, the judge called those police, firefighter, and other harassers liars, and frauds.

Who are the gang stalkers?

So, we see that police,firefighters, their friends and associates, and other so-called “public servants” are who actual gang stalkers are.

Now, lets take a look at the issue of how gang stalkers use language and words online and offline.

A short dictionary of gang stalker terms:

noise harassment: In the cases I have studied, this term has several meanings, depending on who the stalkers are. So, it can mean

* an undercover police car, or other police/fire/lcal mob affilliated person in such a car (Dodge Chargers, Mustangs, and other “muscle cars” with loud tail pipes) sitting up the block from a targets house, rumbling its engine all night long.

* in the thousands of documented cases of firefighters waging siren harassment, the Rick and Cindy Krlich case study provides the best evidence, and a decade of film, photo, and license plates that led to court cases.

* the police and fire union harassed former Stockton, CA City Manager Bob Deis by actually buying the house across the street from his, and then, banged hammers, and used loud construction tools at all hours of night and day to harass him with noise.

electronic weapons: when you compare the gang stalking denialist with the gang stalking denialists ramble on about *psychotronic brain zappers, satellite mind reading, through the wall microwaves* and other gibberish as I demonstrate in this example here

* actual victims of gang stalking, on the other hand, talk about how Fusion Centers are used to target, and cyberstalk activists,and dissidents in America and the FVEYs nations, by utilizing wiretaps, cell phone and social media tracking, and more.

of child trafficking, and how that term has a double meaning, l

The porn deluge, compromise operations, OSI Informers, and intelligence assets.

SO, there you are a traveling businessman from any of many countries- but you are a key player in a negotiation between a Chinese billionaire who needs to shuffle some cash out of the country, and an American company that handles EB5 transactions-and you land in Reston, VA after an 18 hour flight.
You also are friends with your countries  liaison to the UN, who works in Japan with the International Transnational Crime initiative, and while none of that is on your mind- it could be on someone else’s mind, because your connections make you a likely target. And you would be a nice acquisition for any intelligence agency or other state level or corporate player, if only…if only…

Related Story: About two years after I wrote this post that you are reading, agents, agencies, and institutions collaborated to spring a “honey pot trap ” on a Chinese billionaire, who was falsely accused of rape in Minnesota. That US based scheme cost his company, and his nation a 90 billion dollar stock market drop. Using ROGS Analysis, I can save you, and your executives billions. Click my contact button for more information.
(also see this link, where I provide background and photos)

You’re tired, but figure a drink or two before bed won’t hurt your sleep any. After a quick rinse in the hotel bath, you go down to the bar in the lobby, where you sit, eyeball some soccer on he widescreen, andthen, in a rush, a woman sits down next to you, and stammers a quick-“Oh, I am sooo sorry!” after bumping your chair, and plopping a suitcase sized ‘purse’ on the other chair.
(pssst: You don’t know this now, but if you one of these phone app‘s, called IMSI catchers in your repertoire, you would be able to “see” some of what could be in her bag- and I’m not talking coupons, compacts, tampons and cookie crumbs.)
Related story: how to catch an IMSI catcher academic .pdf by Bauke Brenninkmeijer
No problem, right? A common occurrence in any bar. You drink your Jameson and real ginger, and notice that she has called the bartender into an interesting dialogue, and your ear drifts in and out of the conversation about an obscure liquor naed “China something or other,” joining your ear to the facts and mis-statements thus:
“But it only grows in the Andies mountains! I am certain that’s what the distributor said,” says the magnificently comely, Sibel Edmonds look-alike who bumped your chair; and who now makes the claim she is a former liquor sales rep.
“No- I know this one,” says the bartender, “because I write a blog online for other bartenders. Cinchona is native to the Andean mountains, but it is cultivated in other places.”
Odd, you think to yourself- you just had this conversation across the world, with someone who claims they are a “naturopathic doctor,” who told you about quinine water, malaria, and how it cures people in developing areas of the world. Bits and pieces of the conversation float back into your mind:
“Confederate doctors used bark to treat malaria, because their medicine supplies were low, or non existent.”
And “quinine” aka tonic water is the base of a god gin and tonic,” and so on.
Your mind drifts into old black and white movies, Humphrey Bogart, and the sound of a drink-any drink in an old B&W movie, “on the rocks.” Rocks were a big deal in the refrigeration era and so on; B&W films are a good match for clever sound engineering that includes the near-onomatopoeia of the word “rocks,” and so on-such is the nature of inner dialogue.
Then, beyond your own better impulses, you venture that “Actually you are both right. Cinchona is in fact native to the Andean mountains, but also it is cultivated in other places. It’s the national tree of Peru, which is kind of funny, because for the most part, it is a shrub.”
The crowd feigns awe, and then makes small talk about every drink under the sun that contains quinine, and despite yourself, you venture forth your extensive knowledge of chinchona thus:

Cinchona (/sɪŋˈknə/ or /-knə/)[2] is a genus of flowering plants in the family Rubiaceae containing at least 23 species of trees and shrubs.[3] They are native to the tropical Andean forests of western South America.[4] A few species are reportedly naturalized in Central America, Jamaica, French Polynesia, Sulawesi, Saint Helena in the South Atlantic, and São Tomé and Príncipe off the coast of tropical Africa. A few species are used as medicinal plants, known as sources for quinine and other compounds

And of course, you remember this odd “conspiracy theory” that the holistic doctor told you about-he one about “mysterious suicides and murders” of holistic doctors. But of course, you don’t bring that up….
“Well, folks, nice talking to you, but I have an early meeting tomorrow-oh, look at that! Later today.”
In your room, you log on to the hotel’s network, and check your email’s, looking forward to the ones that you cannot check, or even acknowledge owning in the communist/theocratic/totalitarian nation that you are from. But hey! You are in America now-land of freedom, and Constitutional rights-and even a first amendment that protects speech in all forms!
But make no mistake- our “good guys” are even more deviant than your “good guys” who chop men’s hands off for stealing a pinch of desert salt, and our guys have a plan for your guys- and you too, because your computer’s unique identifier that is hard coded into your Windows 10 tells every ISP that you are “not from here,”and the way that OUR good guys enforce Biblical narratives, and primitive morality that is the “opposite of free” have lots of plans for you.
So: you check your usual corporate has the usual stuff. Ashley Madison account-that one temptation that you infrequently log into anymore, because, well- feminist jurisprudence enacting itself through hacking-and that SOME people are “making lists!”
SO you check in to the old main stay- your Hushmail account, because, like, no one could or would ever hack THAT– where you find an “invite” for a free trial to a discreet mature and elegant naked lady porn site.
Or, this, which is as American as Apple Pie, and some say, MORE American than apple pie, is currently in conflict with this.
Or cherry pies meet Golem, in Haym Solomon’s bank vault:
IMG_2909.JPG
You click the link, follow a few instructions, and you’re in-your in so deep, that you may never get out again, because that link was a honeypot, and then, your computer is spammed, and windows are popping up, full of dog porn, and horses in the Sonoran desert shtupping moaning senorita’s with swinging double DD’s , and 13 year old’s in swimsuits playfully beckoning you to swim….

Related Story: A few Blasts from the Pastsss There’s a special place in hell for Madeleine Albright
NATO “deeply” regretted killing at least seventeen people when a bomb hit a bus packed with women and children. It also supposedly regretted killing fifteen people after it targeted a hospital with a cluster bomb and killed three diplomats at China’s embassy in Belgrade. After Serbian television criticized Albright and Clinton, it was bombed as well, killing sixteen people.

And what porn deluge would be complete without “Russian disabled woman porn,” where legless and armless “Russian women” who are actually Serbs and Croats kidnapped during the last heroic act of UN good guyism (which was actually an act of good girlism, thanks to Madeleine Albright) tied to trees, squirm under the weight of grunting guys in military gear.
You have been rick-rolled- so…..
Welcome to the porn deluge, 101, which is a staple of military campaigns, terrorist recruitment and compromise operations, intelligence agencies and hairy backed Moldovan porn entrepreneurs alike. While on the surface, it’s just  “spam” to you, it is also a lot of other things that you haven’t yet figured out-but which you will contemplate for days to come.
Either way, and regardless of who set you up or otherwise rick-rolled your ‘un-hackable’ Hushmail, it’s YOU that have been shtupped.

shtup
SHto͝op/
vulgar slang
verb
gerund or present participle: shtupping
  1. have sexual intercourse with (someone).
Welcome to Jewish-christian culture! A place where the good guys and gals act as God! Look no further than that one event, and know that your fanatical religious sects and cults have nothing on our “good guys and gals,” who have pre-emptively shtupped you for the common good-for the children, of course!
The next morning, in the lobby, the fully do-able Sibel Edmonds clone just happens to rush by you at the elevator, which is right next to the sign that says “Stairs–>”.
“Morning traveller!” she says in folksy American colloquial English. “How did you sleep last night?” she asks, with an odd smile on her face.
“Oh I slept just fine, thank you,” you say, regretting the moment you clicked the link.
” Well be careful out there,” she says to you, specifically. ” I hear it’s going to rain today. Better get an umbrella!”
“Oh, thank you,” you say. “Does it rain a lot here?”
“Oh, my,” she says. ” When it rains it pours! It can be a real deluge sometimes.”
“Oh. Well, hope to see you around,” you say, still thinking about the initial link that promised “elegant nude ladies.”
And because you are a man-and these honeypots target men specifically, and in and of themselves are gendered operations that violate even the US Constitutional guarantees of “equal protection under the law,” somehow, the good guys and gals missed that memo.
And you, foreign man, are now a potential”compromised asset.” Or, according to the experts- you are likely suffering from some form of apophenia, should you one day connect the dots.
Related Links (BE CAREFUL!)
American women  and dogs: young women choosing dogs over motherhood or men (and probably a few other things- try not to let your imagination GO WILD!)

 

Is gang stalking online real-can "they" actually track my machine as I surf over Tor?

The short answer is, if you have been reading this blog and missed the memo that said “YES THEY ARE TARGETING, TRACKING, GEO-LOCATING, MONITORING, INFLUENCING, and OPERATING on you, your internet connection-and the mind that is using that connectionlike mad scientists at every moment, every time you are online!!!”-then you clearly ARE CRAZY, as some have suggested about “targeted individuals.
This is what I call “feminist jurisprudence” aka “communitarian/community policing.” It cannot be missed that there is a clear ideological link between OGS complaints and elderly white females in technology, politics, the judiciary, or in policing; but especially in the transnational Octopussy that we know as the Panopticon and its attendant plots, political manipulations, and influence/mind control/compromise/blackmail schemes and covert operations.

Related Stories: The Association of Threat Assessment Professionals (ATAP) has linked itself to both gang stalking, AND political /punitive psychology.
More hilariously, the Washington State Fusion Center distributes “mind control” documents to the press, as the Department of Homeland Security renovates the famous “mind control ” facility once occupied by CIA funded doctors who forced patients to take the illicit drug LSD, and unethically tortured children and adults with debunked electro -shock “therapy “.

And worse, they are using the local police, and Fusion Centers, aka, “the domestic spying on citizens apparatus”and the Hegelian conflict oriented communitarian policing scheme to literally cause learned helplessness and fear, in order to enforce conformity, as Fusion Centers (all of which are well hidden, and all 77 have different names across the country) direct resources at “non-conformists.”
Extra points for noticing the number 77 has “mystical value” to religious fanatics, Masonic orders, and others who are invested in harassing citizens with OGS. I am certain all of the religiously deluded morons who work in Fusion Centers actually believe they are doing “gods work,” and that the number 77 means “Son of Circumcision.” Try not to laugh…but I personally like the linguisticexplanation of 77 as a “she goat.”
And while it can make a person FEEL crazy, there are actually programs targeted at EVERYONE that actually involve this form of mind control and influence operation, and that these programs are ill-equipped to decipher human behavior, and that with destructive effects . Here is just ONE example of that, as AI struggles to eradicate “human experience” in order to socially engineer ‘predictable humans’ and using ‘predictive analysis.
And here is one recent example from my own writing online from just today (it took me two days to even write the post ‘live’ in WordPress), but every day, there are thousands of examples available to even the casual observer.
In that light, it is worthy of noting that those who value civil liberty, such as our right to privacy-often overlook the greater right of liberty: the right to consent, or not consent to experiments, or other ‘mind altering’ substances and practices, that are deployed on us as weapons or as research tools. So it is important to note that Tor-the famous privacy software that was made “famous’ by Edward Snowden when he revealed to us that our governments-all five of them, in the Five Eyes Alliance, and others ranging from Israel(which gets every bit and byte of our data unfiltered) to Russia are performing their own experiments.
So-forget about DEW’s and all of that other PsyOp psychobabble, and make yourself aware of Palantir, DataminR, Media Sonar, and more that they are targeting at us, and our online speech every second, AS WE TYPE INTO OUR BROWSERS. OVER TOR….!
Here below is one example from today alone. One of many I caught before the sun met the noon sky:
The example:

  1. I look at today’s statistics about who reads this blog and what they read. I note that my most popular post references the hack of the CIA’s “hacking tools” which I posted in this blog post here. This one post quotes the Intercept, and has links to Wikileaks, where the CIA hacking tools were described as hacking American’s cell phones, and then, destroying the ‘evidence’ that they had hacked my/your/their phone.
  2. I looked around the web for stories that also document how the CIA-and some 16 other US intel agencies alone, not including the entire battalions of soldiers aand seamen and USAF who are hacking American’s at any given time- have destroyed Constitutional due process and leveraged, blackmailed, or otherwise compromised American citizens (and millions of others around the world) because they act with “plausible deniability, and then, impunity. I found this story, about a humble public defender in Washington State, where the CIA hack tools are implicated in hacking citizens.
  3. Using Tor to write this blog,(and using Tor makes one an INSTANT target by these ‘plausibly deniable’ activities by military and civilian agents, agencies, and a host of NGO’s), i read through my stats, and noted “outbound links”-the links that people clicked on my blog to read material that I have linked to OUTSIDE my blog. And, I was under attack the whole time. Here is the story I was writing ‘under attack.’ This caused a net loss of about an hour today alone.
  4. I clicked the “out-bound” link, which was to Urban Dictionary” and the link to a description of “gang stalking methods“. Here, below is a snapshot of that-and notice the advertisement for “CASA” which is a foster care warehouse operation, where state sponsored kidnappings of children are covered up as “foster care placements.” Children who are “placed” in Foster care face an 85% chance of being sexually abused, pimped, or otherwise turned into profitable commodities by these organizations and the related DVIC industries

agang stalking methods
This screen shot, which I have NOT anonymized, for a very specific reason, which I will not disclose, contains all kinds of “meta data” about the machine I am using to compose this posting and nothing more-not a single identifying bit or byte of data connects this screenshot to me, or to this blog-other than the WORDS I use to describe this situation.
As such, I seek to demonstrate that speakers, and words are the actual targets of all of this “sooper seekrit spying,” that claims it is to “protect the little old ladies and the children from rapists and pedophiles” because pedophiles might otherwise sacrifice everyone’s safety for their own liberty in order to to get at  the old ladies and babies whose Constitutional houses are on fire, and burn them to the grounds, tossing their pocket Constitutions into the fire to make it burn faster, and using the broken pieces of civil rights and human rights and even animal rights to build a ladder just to get at the old ladies and babies  even quicker as they plummet out the windows, pre-cooked and ready to rape with shovel handles and pocket Constit…oh never mind that last one(and all of those windows, and Windows 1-10, totally broken already by the “broken windows policing scheme” of the 1990’s)….
So, to recap:
Meta data is personally identifying information that police, investigators, and others who participate in the local, state, and federal level fraud outlined on this blog have been using meta data to make cases against unsuspecting victims of OGS and its accompanying mind control and influence operations. You can Google the term yourself.
But what matters most is a question that now arises in the mind of this researcher-and hopefuly inthe mind of other researchers, lawyers, legal scholars, TI’s, psychologists and others who research organized gang stalking.
And the question is: Why does CASA-an organization that I have roundly criticized over the years, and even now; an organization that has tens of millions in advertising budgets, and tha has notoriously been an integral part of the DVIC scheme-why, exactly, do they have an advertisement on that one weblink, now?
I mean-isn’t web searching and webvertisement coordinated with searches and topics-shouldn’t a ink to “gang stalking methods” have like, a deer tracking book, or a bunch of saggy pants without belts, and some “logo gear” on it; shouldn’t in the very least a link to another website that teaches te “rhythm method” be linked, there? And so, what has CASA have to do with OGS anyways?
I suggest that the answer is in the question-and webterrogation of narrative as well. Webterrogation is not unlike custodial interrogations in many ways, not east of which is that the individual being interrogated is in fact and practice, targeted, and contained, somewhere, at some point. This is not insignificant, but it is also a larger point that I will write about later (especially as pertains to ISP’s and how Infragard members-deputized members of law enforcement, and sh!tloads of political operatives and others literally redirect, re-route, and inject any “live” connection with lots of “who knows what.”)
You can test the science yourself- in fact,my blog here asks any researcher of organized gangstalking to do EXACTLY THAT-test my many theories, hypotheses, and anti-hypotheses against your own, form whatever discipline you practice.
But go over to that link about “gang stalking methods” and see what advertisement YOU get at the top of the page. I got CASA, which is a DVIC subsidiary industry, and a multi-million dollar player in the theft of children across America.
Here below are some links that demonstrates AGAIN, that state level institutions, operatives, and policing itself, is implicated time and time and time again in the pimping, procuring and pornifying of children, as well as the massive crisis PR industry that masks this fact, and gives us boogiemen/drug dealers/terrorists/pedophiles/whistle blowers/journalists/your neighbors farting cat instead ( and it cannot be missed that two of the first five links that were returned to my Tor browser were near, or local to my own location…):

CASA LA: http://casala.org/our-mission/
Sexual abuse in Foster Care: http://www.hg.org/article.asp?id=6703
Is Foster Care modern day slavery? http://medicalkidnap.com/2016/04/15/the-u-s-foster-care-system-modern-day-slavery-and-child-trafficking/

Then, without irony, one must note that Elizabeth Dietrich, one of the few online who has written a scientific thesis as regards OGS, opened her thesis with a brief statement about pornography. This, combined with another part of my thesis-that women’s deviance takes place in unique forms, but especially through positions of power, authority, and then, voyeurism-one cannot help but note that women’s violence-or in the very least, their inability to “comprehend” the violence directed at others is institutional in nature. And this is clearly the case with OGS as well (which is in no way, shape or form similar to the “Pro-Anorexia community” as Dietrich has stated.)
Elizabeth Dietrich’s paper encourages the isolation of victims of OGS. How feminist.
Maybe it’s because Smith College is known as the “Lesbian Capital of the World,” or maybe it’s because all the special snowflakes get better grades when they’re pretty, but Dietrich’s conclusion truly looks like first year work when she comes to the conclusion that

Gang Stalking is just one of the many online communities that uses people’s
conformation bias, meaning making, and wish to belong, to deleterious ends.
For my part-should I ever publish this, I will devote a special chapter to conformation bias, and conformity at the expense of critical thinking….

Related Story: Five Denver Nurses caught looking at a dead man’s amazing cock, then gossiping about it in the lunchroom. Apparently, this is a thing with nurses and other women in the medical community(let me know when you start seeing patterns in western women’s deviance, such as their Freudian “death urge” morphing into endless forever war that kills other women’s sons, lovers, husbands and other babies)
From the very introduction of Dietrichs paper, we see that male dominated spaces such as 4chan and KnowYourMeme, as well as “porn” is an underlying theme of those who officially gas light OGS targets; that, for those who have taken the time to write on the subject (this will be the topic of a later post here). What matters here is that “victims of OGS be isolated” both in Dietrichs narrative, and in that of Sheridan and James, and as such, we see that the two-exactly two papers that addresses the topic-are written by gender feminists, which is telling indeed.
Then, we see emergent norm theory and the interplay of feminist destruction of so-called male dominated spaces throughout her paper, which concludes as I stated above-that victims of OGS should be isolated and ex-communicated from the internet.

CHAPTER I
Introduction
A tautological statement has been growing in popularity among pithy internet-savvy
populations over the last ten years or so: If you ever wonder if it’s on the Internet, it’s on the Internet. Anonymous contributors to websites such as 4Chanand Know Your Meme expanded this idea into a list of 50 Rules of the Internet that include items such as “The Internet has no rules,”and “there is a porn of it, no exceptions.”The root of the joke is derived from a very basic fact: Internet content, for all intents and purposes, is virtually endless. Almost any honest query one enters into a search engine will invariably yield results, usually hundreds of thousands in an impressive .33 seconds, more or less a couple hundredths-of-a-second, depending on what kind
of modem you have. Social connectivity over the Internet is powerful.

.

Organized stalking and punitive psychology: the paradox of psychologists as arbiters of the mental health of targeted individuals.

Conflict of interest in psychology? Targeted individuals and mental health: CVE programs and dubious intentions; even more dubious results.
Those who experience the quasi legal, and often illegal interactions targeted at them by intelligence agencies, law enforcement and the wide net of affiliated community groups that perpetrate organized gang stalking, such as the LEIU’s,  are often left debilitated, as the goals of OGS are stated in multiple blogs and videos online, and even Urban Dictionary is aware of these campaigns: they seek to destroy individuals.
Urban Dictionary has a list of the activities that TI’s are subjected to, but there are many more descriptions in the less than academic online discussion communities. One theme is certain to come up:  OGS seeks to destroy relationships or exploit them, isolate individuals, demolish and demoralize individuals and leave them broken and homeless.
Programs like the FBI’s Countering Violent Extremism, or CVE program,  enlists psychologists, social workers, teachers, homeless shelter advocates, and many more community members in the stalking, and harassment that a targeted individual experiences, and the TI has little to no chance of privacy, or the ability to recuperate from the stated goals of OGS. They literally have nowhere to run as they are filleted by this mechanism.
Let’s take a look at what a TI experiences as they are pressured or recruited by an FBI informant- and keep in mind that it is not just Muslim’s who are being targeted, but also that every law enforcement agency has versions of their own programs, targeting trailer park kids and south Central teenagers in other crime creation or infiltration schemes, as the FBI CVE is just the template for a wider range of community policing programs. And, as noted elsewhere in my blog, religious organizations and cults, community groups and others use these tactics too, though the purposes vary, the effect is often the same.
From the Intercept:

First, they target a Muslim[see my note above]: not due to any evidence of intent or capability to engage in terrorism, but rather for the “radical” political views he expresses. In most cases, the Muslim targeted by the FBI is a very young (late teens, early 20s), adrift, unemployed loner who has shown no signs of mastering basic life functions, let alone carrying out a serious terror attack, and has no known involvement with actual terrorist groups.
They then find another Muslim who is highly motivated to help disrupt a “terror plot”: either because they’re being paid substantial sums of money by the FBI or because (as appears to be the case here) they are charged with some unrelated crime and are desperate to please the FBI in exchange for leniency (or both). The FBI then gives the informant a detailed attack plan, and sometimes even the money and other instruments to carry it out, and the informant then shares all of that with the target. Typically, the informant also induces, lures, cajoles, and persuades the target to agree to carry out the FBI-designed plot. In some instances where the target refuses to go along, they have their informant offer huge cash inducements to the impoverished target.
Once they finally get the target to agree, the FBI swoops in at the last minute, arrests the target, issues a press release praising themselves for disrupting a dangerous attack (which it conceived of, funded, and recruited the operatives for), and the DOJ and federal judges send their target to prison for years or even decades (where they are kept in special GITMO-like units). Subservient U.S. courts uphold the charges by applying such a broad and permissive interpretation of “entrapment” that it could almost never be successfully invoked.

Once again, we should all pause for a moment to thank the brave men and women of the FBI for saving us from their own terror plots.

One can, if one really wishes, debate whether the FBI should be engaging in such behavior. For reasons I and many others have repeatedly argued, these cases are unjust in the extreme: a form of pre-emptory prosecution where vulnerable individuals are targeted and manipulated not for any criminal acts they have committed but rather for the bad political views they have expressed. They end up sending young people to prison for decades for “crimes” which even their sentencing judges acknowledge they never would have seriously considered, let alone committed, in the absence of FBI trickery. It’s hard to imagine anyone thinking this is a justifiable tactic, but I’m certain there are people who believe that. Let’s leave that question to the side for the moment in favor of a different issue.

So, psychologists in the very least are diagnosing shadows if they are unaware of these types of programs, and doing a great dis-service to psychology, and to the narrative or proper care of TI’s.
These programs incentivize psychology to act as informants themselves, and to report to the authorities the state of mind and mental health of an individual who does not even know who the hidden secret people and groups.In other words, psychology is truly “in on it,” as we have never seen before.
Especially troubling is how one of the leading privacy rape advocates in America, Senator Dianne Feinstein(who  benefits from a $600 million in government/military contract), correlated child pornography with terrorism, and used that as a tool whereby she could pry away patient-therapist privilege.Where once targeted persons and others had the protection of patient-psychologist privilege, today, the agencies have stripped even that. and, in one eerie reminder of past CIA and psychiatry collusion, we now see that California psychologists are mandated to report patients who “use” child pornography, when in fact the agencies distribute it, and likely use it in terrorist recruitment programs in classic compromise operations. As Bruce Schneier has noted, it is likely there is more to the story of terrorists and bad guys and child porn, because hiding secret messages in cp is like “smugglers hiding kilos of cocaine in bales of marijuana.
There is literally nowhere to hide from this form of institutional abuse, and mis-diagnoses brings back the reminders of the Soviet era and Stalin’s punitive psychology. Agency collusion to undermine victims of government abuses is startlingly similar to earlier era’s of experimentation on citizens.And, because this is a ‘cutting edge’ issue, and fairly new to psychology and criminal defense attorney’s, historical perspective is important, as we know from the past the agencies distribute drugs, and even assassinate people. But few historical examples are better than the story of Pulitzer Prize winning journalist Gary Webb, who first revealed the CIA’s drug running in the US in his expose'”Dark Alliance.
But whatever you, the reader decides, don’t shoot the messenger-or call them crazy.
Related: Academic says that the governments are distributing child pornography and using terrorism as stalking horses to destroy privacy rights.