ROGS Bingo: George Floyd murdered by police gang, and his FORMER COWORKER, Derek Chauvin.

What is organized gang stalking?

When police and security contractor gangs use labelling theory to slander individuals, stalk them, and then, kill them, as we saw in the case of George Floyd.

ROGS is, once again “bringing people together.” Take a look at how non -random was te murder of George Floyd:

George Floyd, ex-cop Derek Chauvin worked at same club last year: former boss
By Nelson Oliveira
New York Daily News
May 29, 2020 | 4:44 PM

A former Minneapolis club owner says George Floyd and the ex-cop accused of murdering him this week may have met when they worked security jobs for her business last year.

Derek Chauvin, the white officer who was charged with third-degree murder and manslaughter on Friday, had a side gig as a security guard at El Nuevo Rodeo for nearly 17 years, Maya Santamaria revealed Thursday. Floyd, the unarmed black man who died in Chauvin’s custody, also worked there last year — though the woman is not sure if they ever met.

And, of course! The murderous gang members wife (a real estate agent) divorces him the next day after he is charged. Who wants to bet that Chauvin and his wife have some real estate to protect from inevitable lawsuits?

So, some might have noticed that police and their pals are an organized gang that operates unnaccountably in the USA, and that Minnesota leads the nation every year in police brutality complaints, which costs its primarily white population some serious cash.

We see this every time cops kill some guyafter driving him crazy with gang stalking.

And after gang stalking them online,and off, many men go ballistic. Others just get murdered. It happened to Ahmaud Arbery who was,stalked by a police gang. It happened to Duncan Socrates Lempwho was literally murdered in his sleep. It happened to so many others, because US police are an armed gang.

So, one might take note that whatever cocksucker in Texas, via Kuwait, hacked my devices awhile ago, are on notice: ROGS is ready for whatever you pigs want to bring. Hell, I write from easilly hacked devices. Wanna guess why?

Yup. Dirty pigs are on notice, and others ARE watching, eating popcorn the whole time. See you whenever you arrive. And CHEERS to you fakeass murderous “American heroes” who shit your badges every night, wondering if all your dirt will come back to haunt you. Or, darken your skin, lol.

Lets dish dirt, shall we?

tenor(2)

You see, the good thing about police corruption in the US is that it gives other countries a heads up as to who the corrupt ones are. Like a virus, or a cancer, your types spread. And, knowing this, makes you more easily traced-and trapped .

So, just like the many staged attacks you and your kind waged from Texas NSA, its all traceable too, and gives all of us “good people” a few clues about how desperate your kind are to perpetuate “bad culture.”

Bye, bye, Mrs. Minnesota Pie. I bet you are divorcing Derek Chauvin to protect your real estate. But maybe, you could have spoken up a bit sooner about the gang that your disgraced hubby belongs to, and their gang stalking pseudo-due process.

America is no longer a democracy, in any sense of the word. In fact, by definition, its a full blown police state.

Disclaimer: ROGS knew Derek Chauvin in passing, and possibly I also likely knew Tou Thao, the officer who kept the crowd at bay as Chauvin murdered Floyd, likely after police informants framed him with a fake twenty dollar bill.

Police tactics in Minneapolis are just that corrupt, which I noted here many years ago when I was working security there, and being gang stalked and harassed by police and their affilliated anti-constitution scum.

ROGS is aware of the activity that took place at El Nuevo Rodeo,and personally.know the owner of that building (a Paledtinian.real estate racketeer ) and the owner of that club, which was in fact, a major “gang” crossroads, where many primarily Mexican gangs congregated, as did corrupt police who use unconstitutional policing tactics such as Fusion Centers and militarized, Israelified policing tactics to monitor those alleged to be in gangs.

In the time I knew Chauvin, Minneapolis police and their associated community policing scum that take orders from the local DHS /FBI/State police and Infragard rats were routinely black-bagging my homes and businesses.

Especially vexatious in that area were these scum below, which I captured on hidden camera, and who black bagged my houses without a warrant served, ever.

1564328824415

Readers will also note that Minnesota,and its police apparatus aka, “the Electronic Peeping Toms of Minnesota” are well documented (here too ).

This form of police voyeurism there, (and Amy Klobuchars perverse use of state police )also gang stalk, harass, and spy on reporters too.

So, like the 1/17000 odds in the murder of Ahmaud Arbery, there was zero chance George Floyds murder was random.

And, again : ROGS Analysis is batting nearly 1000% proving that “gang stalking ” is what corrupt, murderous police and security gangs do, and NOT AT ALL a delusion, as this case demonstrates once again: ROGS tells it like it is, without the Police /masonic /religious cult psychobabble.

One hand looks for money, one hand looks for goods. The sordid case of the Chinese billionaire, and the Minnesota honeytrap

(story in progress. Check back later for the finished post)

Happy Friday the Thirteenth: A global technology savant, Mr Qiandong Liu has been vindicated in a #fakerape honeypot sting in Minnesota, on the same day that Clint Eastwoods vindication of the FBI-smeared Richard Jewell gets an image makeover, released today.

1575274996452
The avid ROGs reader will note that I wrote about Richard Jewell awhilea go in a piece entitled “Hey there, Mr. Jewell, can you smile and hold this bomb for the good and nice, and trustworthy all-American FBI agent?

The thirteens are a real thing indeed.

The Two Tiered Economy and Its Connection to Gang Stalking

一只手找钱,一只手找货物
One hand looks for money, one hand looks for goods

Minnesota has a very large, very well organized DVIC entrapment economy, similar to the Russian social climate in 1900,and much like so many US states that depend upon asset forfeiture, or federal dollars that incentivize institutional rape, or child theft, and over one out of four dollars there come from the federal government.

In fact, 26.88% of Minnesota state revenue comes from federal funding, which is heavily tied to a,states,adoption of DVIC policies,and practices. So, the state is relatively low ranked compared to other states that are currently more dependent on federal dollars.

But to understand the link between the two tiered America that has put DVIC mechanisms like gang stalking in place to usurp court trials, and due process procedure avoidant based in “high policing,” tactics, one must understand that it wasnt always the case in that state.

While its transition from a manufacturing/agriculture/construction based economy into a DVIC based economy would make an interesting novel, more recent events there paint a better picture of the clash between a post manufacturing America that is dependent on federal dollars via international banking interests and their attendant practices, and its local, domestic effects on its population.

The case of Qiandong Liu, vindicated from a classic honeytrap scheme, and the case of David Schladetzky, a recent gang stalking target who went ballistic are an interesting vignette, a juxtapisition og locality versus global-ability and an accurate portrait of American democracy in decline.

Minneapolis police documents say woman who alleged she was raped by Chinese billionaire sought money and apology

Related Story: Minneapolis is a hotbed of illegal covert surveillance activity,and even the hotels are wiretapped by “unknown” mystery agents, according to the MSM

I wrote about how various hidden agents and agencies there in Minnesota staged the classic honeytrap to ensnare Mr. Liu, and provided photographs of the pre-honey trap event, staged by the University of Minnesota (I currently advise mainland Chinese to avoid sending their daughters, and especially their sons to that university, due to American policies of gender villification)and also, named the eventual rape accuser( who herself could very well been unaware of how she was being used in that trap, or exactly what agents and agencies put her at the scene), because I am well aware that these things happen in that state, but also well aware of the following:

-Minnesota has high rates of Google searches for gang stalking, and one online blogger, Deb Matheny has documented a vast network of actual gang stalkers there, many of whom work in security, local policedepartments, politics and oter state offices. I will with hold my opinion about Matheny as an author, but have personally validated her claims that several actual named persons are in fact shady gang stalkers, who can be prosecuted.

-the police in that state do in fact stalk reporters, and misuse databases, as documented by major media and several MSM reporters who sued the Electronic Peeping Toms and Tinas of Minnesota, and claimed millions for database abuse

-I personally blew the whistle* on a Minnesota Corporation, 3M, which was allowing Level three breaches of the CHRI database, one of the largest identity management database in the world,and doing so with political motivations, and that investigation covered/trash binned up by a retired FBI agent on their payroll. A single Level three breach is comparable to a terrorist cyber attack, but in fact there were multiple breaches, and that corporation kept them outside the sight of the FBI, and outside of major media reporting; and as batshit crazy gang stalkers hacked my internet and security cameras.

-I have repeatedly documented and named names of both right and left wing gang stalkers in that area, and traced their nation wide networks across the country, even including the son of a United Nations intelligence station chief.

– ROGS was once a humble doorman, at an international bar full of actual intrigue, and actual spies, but where I failed *again* and refused to cooperate with that localities,“deep state,” for which I have paid a heavy price, but also, paid it forward. ROGS recently laughed when he heard about an unexplainable car crash in that area of a rather highly placed official.

-ROGS even had the president of the UN USA park a cohort of SUVs under armed guard outside my house one fine day.

1564329557079

So, with all of that as background, lets look at the difference between.two men, both entrapped in the,same city and,state, both provably spied upon, and “framed”(in the sense of the word framing in BOTH media and public relations, and criminal law, with labelling theory applied).
(to be continued)

Quite notably, Minnesota also has bizarre gang stalking related homicides too.

Parma, Ohio,gang stalking, policing-for-profits, Crisis PR agents, Fusion Center tracking, and what to do about it: break the Deep State at the switch

The deep state is basically just massive corruption, enabled by NSAFVEYs-Israeli political spying, starting at the internet switch, and utiluzing the policing for profit model of social control.
Routinely,we see intelligence agencies, police and their affiliates, and other institutional corruption, working behind the scenes using Fusion Centers,and institutional or corporate mechanisms like the Twitter “firehose” to violate due process rights,target dissenters from hidden databases, and more, enabled by the trickle-down data capture schemes of the NSA-FBI-DHS-DEA-Etc whole nation wiretap of our communications systems.

Related Story: what is webwashing, and webscrubbing,and how does it relate to psychological operations online that create mass shooters, so-called incel terrorist and car crashers, and many others who are profiled, andstalked,and harrassed online and off by hidden agents and agencies? Read “FACEBOOK scrubs webpages because the Pentagon and our lil Pal Israel tell them to.”
Then, ask yourself: when did America become a religious extremist, sectarian police state?

An old story from Parma Ohio, which sits in the asshole of the gang stalking universe, demonstrates the predatory policing methods of for-profit policing that Rutherford Institute constitutional scholarJohn Whitehead has documented, and which has replaced the protect and serve model ofpolicing since the beginning of the DVIC in 1993.
Have a read through this, from Scumbagged.com, to watch how citizensin a predatory for-profit policing town reveal one gross abuse after another by Parma police,only to have some anonymous crisis PR troll named”Jack”come in at the very end of the discussion to try to frame the whistle blower as abad person, and diminish ordenigrate insight into corrupt profit based policing.And- notice the connection to real estate, for extra ROGS bingo points.

The city of Parma and it’s residents have a tough road ahead of them, literally. Home values have declined by more than 20% since 2007, businesses are leaving, stores are closing, drugs & crime are running rampant & the cities police officers are harassing & gang stalking their motorists.
The individuals who could make things better, who should be focused on cleaning up the city & making Parma a safer & better place to live, simply aren’t. The Parma Police are too busy and primarily focused on what is known as gang stalking. In this article, you will see first hand as Parma Police Sergeant John Porec deliberately harasses & gang stalks Matt Osbourne, all of which was caught on video.

And that, which has replaced due process, civil liberty,and the rule of law in American communities, starting in 1993 as well.
AND,if you read through this blog post written by a tow truck driver,we see that the greater, more important story of predatory policing is slightly diffused by one or another city/state/crisis PR agent, who attempts to discredit the complaintant, and distract the readers from the larger issue of for-profit policing.
If you read deep into OGS narratives, you will nearly ALWAYS find police/NGO/institutional affiliates gas-lighting individual narratives(shout out to Maggie K.in Minnesota- a crisis PR agent,and graduate of UWA Puget Sound,who will be a named party in a coming lawsuit), as we see here, in the case of Michael C. Fry of Texas,who actually named the Denton County sherrifs crisis PR agent Tim Reedy in his flyers as he tried to draw attention to gang stalking, and narrative control elements; to the case of designer-bomber-scapegoat Cesar Sayoc, who shared associations with narrative control agent and former spokespersonforHouse Democrats Rochelle Ritchie, who was curiously close to both police,and prosecutors in the execution of Freddie Gray, in Baltimore, MD,and who also-for some as-yet disclosed reason-was both the primary crybully, but also the point-person who fingered Cesar Sayoc a month before the bizarre bomb hoax that he is alleged to have perpetrated.
While the regular ROGS reader will note that many well documented cases of OGS, like the case of Rick Krlich of OH,and my passing mention of the case if a gang stalked journalist in OH,by a Pentagon affiliated “private contractor”, and also here,
And, much like Broward County FL, where we see the Q-Anon “conspiracy” being advertised by SWAT team members(who are integral players in the hidden so-called deep state that is encouraged by the NSA-FVEYs-Israel whole nation wiretap of America) and Minneapolis,MN, which is in the record gang stalking reporters,while using OGS to suppress dissenters,and corrupt the political process,and the entire state of California, which has some of the highest rates of Google searches for gang stalking related complaints,and, one of the best online accounts of how organized gang stalking IS police and police affiliated NGOs and institutions working to control the American political process,outside the scope of the Constitutional rights of citizens.

Electronic implants, Wikileaks Vault 8, victims of organized gang stalking, hive mind, and honeypits.

ROGS loves the Constitutional guarantees of due process, and ROGS loves America. I am pathetic that way~the grand American delusion is so appealing.
(Vault 8 is an inside joke.)
BUT: The DVIC is actually a war on speakers and words, and without a doubt, the first amendment itself is the target of neocon and tribal, religious interests, now interfacing with the massive influx of Saudi, and other nations cash flows, and the media narrative.
I have been gang stalked since the DVIC was birthed into our lives in 1993 ( the exact same year when the Anti Defamation League was outed as a domestic spy ring that sold out American activists) and became severely gang stalked after I broke a nation wide story in 2003-4 about how America’s agencies manufacture terrorists by occluding access to civil rights and due process.
To journalists, researchers, and others interested in answering the many questions that are presented in the “bizarre” online dialectic of gang stalking, here below is how the CIA (and every other IC agency, private contractor, and the FBI) uses the term “electronic implants,” which describes covert hacking techniques, and plausible deniability in exploitation of targeted computers, targeted computer networks, and targeted individuals.
Without a single doubt, this is empirical evidence of CIA/other IC/NGOs operations on US soil, and anywhere else where OGS is taking place.
And it single handedly validates the inherent mission creep of the WOT redirecting and exploiting domestic targets.

UPDATE 10-19-2019: Almost two years after I wrote this post, and became active online, the ADL implicated itself as actually deploying military psychological operations on target individuals, using artificial intelligence software called Moonshot CVE, which had previously been used in theaters of war; and, perpetuating negative stereotypes of Jewish people as mind controlling Svengalis.

1570435771780
Electronic implants and gang stalking, courtesy of Wikileaks, and Julian Assange, who is literally being isolated, and denied visitation from other people as I write this. And, the American/FVEY deep state has worked tirelessly to force Ecaudor to revoke his asylum.
Isolation, you will recall, is ALSO a major threat/complaint/”delusion” of targeted individuals.


RELATED STORY
:I wrote about the HIVE in coded language long before this story below became mainstream news. The reader can infer that writing openly about such things is dangerous, and also, ROGS personal writing style is somewhat coded for reasons I have explained elsewhere.

The Hive mind in the gang stalkung dialectic online, from Wikileaks.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.
…………..
And-I hope the dood doctors like David V. James, and Lorraine Sheridan-and certainly Dr. Mike Wood, dont get to caught up in the echo chamber as wasps and bees of all kinds swarm them for commentary in these matters.
But OGS is very real, and puts MHCHAOS and MKULTRA to shame.
Hive
9 November, 2017
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. “perfectly-boring-looking-domain.com”) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a “hidden” CIA server called ‘Blot’.
The cover domain delivers ‘innocent’ content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users – a HTTPS server option that is not widely used: Optional Client Authentication. But Hive uses the uncommon Optional Client Authentication so that the user browsing the website is not required to authenticate – it is optional. But implants talking to Hive do authenticate themselves and can therefore be detected by the Blot server. Traffic from implants is sent to an implant operator management gateway called Honeycomb (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.
Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.
The documentation for Hive is available from the WikiLeaks Vault7 series.

Gang stalking and Electronic implants: Here is how the NSA uses electronic implants.

I first experienced an electronic implant in or around 2004-5. Computer implants are real, NSA and other agency break-ins to hardware and software are real, and documented in main stream news.

In case you were sleeping during the takeover of the United States by the so-called “deep state,”(and it might be noted that both left wing AND right wing opinion leaders agree that the deep state, aka criminal syndicates in government, are real. And, the Harvard Law Review documents debt bondage, a shadow justice system, and a bizarre “deep state” second tier of the justice system that preys upon the poor in the USA, aka the collusion between corporations, international finance and its hydra’s and Octopussies of NGO’s slopping the troughs of American police and intelligence agencies such as the FBI, the CIA and the DHS, as the NSA spies on all of us and trickles data out to Fusion Centers, here is one of the phrases they use online to distort the meaning of the phrase “gang stalking,” and to obscure their illegal actions:
They stuck “electronic implants”in me!!!!!
1575275037998
Electronic implants are very real in many ways, but not the way they are discussed in the online dialectic of OGS. In fact, the use of the term as a biological implant is designed to obscure other more real implants, because in case after case ranging from intellectual property theft BY the state or a subsidiary corporate, private intel gathering firms like Facebook, or the host of DHS/FBI /ADL “contractors” who stalk political targets, to major spy operations-all deploy malware, spyware, and electronic code to infect the cell phones, computers, and other electronics of targeted persons.
1575275037998
And surely as we see in case after case of mass shooters, we see long term agency involvement in those peoples lives as predicate for these mass homicides, and quite frequently, contact with zionism, FBI careerist shitbags banking on the unnaccountability of CVE programs and their accompanying “parallel colluding investigations” aka gang stalking,  and Jewish/zionist Supremacy in college settings, as we saw with the recent Texas cases, and dozens of others ranging from Stephen Paddock, to this guy here, Mathew Riehl, an attorney who himself ranted AGAINST Nazi’s and the Eastern Bloc Judenrate’s favorite go-to pundit, white females, before he was shot in cold blood in Colorado after invoking his Constitutional rights to be served a warrant before he is gunned down in his own home by Israelified “Ich, Du” Buberism and Hegel, in a steroid can.

Related Story: The Doctrine of Superior People-How a racist and actual Cabal of misanthropes murder with impunity, wage slander and disinformation, steal resources, control cultures, buy police forces cheaper than dime store drag queen lipstick, and get away with it, century after century-and blame it all on YOU!

And dozens of other well documented abuses of databases, and actual electronic snooping and hacking such as the Minnesota cases of reporters stalked by hundreds of NGOs/AIPAC/federal dollar/DVIC funding related stalkings- to cases of journalists like former CBS investigative reporter Sharyll Atkisson are sabotaged and spied on by political police (the FBI, DHS, et al are merely that), we do in fact see electronic implants as part of the illegal Constitution defying nature of the FISA court coup, the DHS sectarianism,  and the attendant cowardly conduct at the SCOTUS.
As I have noted, my personal circumstances indicate that I have been targeted by multiple cause based/ religion based/ and other stalkers for decades, because I defy their mystery cults and religions-but also because I refuse to be circumscribed by their un-Constitutional gray area policing methods, and have been a first amendment fighter and more for decades (Here’s lookin’ at YOU Phil!)
I first experienced an electronic implant in or around 2004-5, as progressive organizations and institutions ranging from colleges, to state agencies and their attendant database abuses worked to frame me/harass me/ implicate me/ cause me to be “flipped” as a useful idiot to their political causes, or otherwise charged criminally in a variety of ways.
There I was, sitting in a college newsroom, when the computer redirected, all by itself, as if a spell had been cast upon it! To Nazi-land!….an imaginary place created generation after generation by the SAME FOLKS, as international bankers create, and then gut local economies.
But what really mattered then more than anything, was that they attempted to defuse my activism by following me around with nebulously middle eastern photographers, and tried to neuter my ability to have political effect. And what an effect!
Only lately is MSM talking about how a militant, AIPAC financed zionist sect of rapists and baby killers has taken over our airwaves, and purchased our police cheaper than donkey-dick-meat in a Mexican strip bar. Its an actual multi-billion dollar industry,where some-like the famous case of the Jewish nazi Frank Collin play both sides of the drama,and get paid in each role.

Related Story: Why has the American Civil Liberties Union(ACLU)dropped so many free speech, assembly,association, and privacy balls in the last decades, despite having ample funding, and amplecauses to challenge FISA courtera NSA spying? The answermughtbe: the same answer we always come back to, which is “why is the case of Frank Collin~nee~Cohen, the famous Jewish Nazi of Skokie, IL,revered as a victory forfree speech, when so.many other cases(like prisoners reading materials) NOT heralded,or defended by this group?”

Well, at least Marcy Wheeler sees the utility of the word “targeted” now, and how it pertains to individuals, despite her emergent socialist bent (oh, those poor deluded young people, dont they know thatthey are useful idiots for the other four tentacles of the Bilderbergtopuss?…) And the Intercept-despite its ADL sponsorship, occasionally takes on organized gang stalking in one way or another-especially the manufactured terrorism parts of it, as these cases-case after case after case indicate that OGS is in fact a precipitator, and NOT a mental illness at all. Get out the ROGS BINGO card!
See the source image
And while this benefited a few people in the short term-like the bald headed AIPAC sponsored college president, a notorious AIPAC shill and an American Studies professor/rat whose favorite read then was “Blood in the Face” by notorious James Ridgeway ( a likely informant), and a handful of dirty cops whose testosterone outweighs their shrinking testicles- in the wider dialectic.
And, it revealed to me that the facts I put forward herein are true and replicable elements of how the political processes of America are entirely broken-but also how a lawsuit could begin to challenge these practices. I mean- a few militant armed American neo -Nazis/alt-Rightists/bad-guy-racists-du-jour (those who aren’t Jewish in the first place, like the famous Nazi of Skokie, Frank Collin, ne~ Cohen, or who aren’t working for the agencies, if any can be found) have NOTHING on people who can purchase the American police cheaper than trailer park trucker meth made out of truck-stop pep pills.
But actual electronic implants aren’t anything like what you read about online, and anything to the contrary is pure insanity. You see: agents of the state and its Israelified, racist, zionazi sponsored spy aparatizionazi sponsored spy aparati literally gave me a computer that phoned home to a local political precinct, several political organizations in a certain state, the local police department, and computer servers located curiously between a college and these various agency operated and  maintained computer main frames.
And THOSE main frames were situated curiously close to SEVERAL of the above named agencies. They were literally within blocks of each other, as is the case with most cities and towns across America. But, of course, much of the evidence of THAT disappeared in a burglary in 2009, which I have documented elsewhere.
Well- of course I sabotaged the crap out of their sooper seekrit recruitments, entrapments and implantations, much to their chagrin, and found friends who were less crappy than them. And here below is how they were using implants then, but only I and a select few others knew this, and many of those are now deceased, distanced and afraid, or otherwise co-opted. And, my discovery THEN is when the break-ins to my homes began in force as well, because I laughed in their faces, every time.

How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

“Equation Group” ran the most advanced hacking operation ever uncovered.

In an exhaustive report published Monday at the Kaspersky Security Analyst Summit here, researchers stopped short of saying Equation Group was the handiwork of the NSA—but they provided detailed evidence that strongly implicates the US spy agency.
First is the group’s known aptitude for conducting interdictions, such as installing covert implant firmware in a Cisco Systems router as it moved through the mail.

Second, a highly advanced keylogger in the Equation Group library refers to itself as “Grok” in its source code. The reference seems eerily similar to a line published last March in an Intercept article headlined “How the NSA Plans to Infect ‘Millions’ of Computers with Malware.” The article, which was based on Snowden-leaked documents, discussed an NSA-developed keylogger called Grok.
….read the full article on the NSA’s 14 year hidden domestic spy operation here.
Gray area policing, aka “high policing,” and Grayfish computer intrusions
<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

 
Well, anyways- for the researcher of organized gang stalking, the legal defense counsel or civil litigator who encounters the “gang stalking dialectic” or one of its many actual victims-and for the sworn *cough, cough* peace officers whose goal is to uphold our law and our Constitution-I suggest you have a read through that article-because now, other nations are peeking in here, quite routinely-and some of THOSE are peeking at you as you peek in at my writing.
And, for those who I have named herein-I suggest you keep your eyes open at night, because the moon near YOUR house will be getting brighter. A LOT brighter now.  Bright enough to encompass whole families.
Try not to see patterns, though….and maybe, watch your back, too. Apophenia, and all that kind of makes life hard, if you know what I mean. And certainly, that trick you played on Sharyll Atkisson wasn’t funny. Yup-I hear gang stalkers want to make you go broke fighting for your rights in courts that have deaf ears and blind eyes.

Six codenames

In all, Kaspersky has tied at least six distinct pieces of malware to Equation Group. They include:
EquationLaser: an early implant in use from 2001 to 2004.
DoubleFantasy: a validator-style trojan designed to confirm if the infected person is an intended target. People who are confirmed get upgraded to either EquationDrug or GrayFish.
EquationDrug: also known as Equestre, this is a complex attack platform that supports 35 different modules and 18 drivers. It is one of two Equation Group malware platforms to re-flash hard drive firmware and use virtual file systems to conceal malicious files and stolen data.
It was delivered only after a target had been infected with DoubleFantasy and confirmed to be a target. It was introduced in 2002 and was phased out in 2013 in favor of the more advanced GrayFish.

GrayFish: the successor to EquationDrug and the most sophisticated of all the Equation Group attack platforms. It resides completely in the registry and relies on a bootkit to take hold each time a computer starts. Whereas EquationDrug re-flashed hard drives for six models, GrayFish re-flashed 12 classes of hard drives. GrayFish exploits a vulnerability in the CloneCD driver ElbyCDIO.sys—and possibly drivers of other programs—to bypass Windows code-signing requirements.

<img src="https://cdn.arstechnica.net/wp-content/uploads/2015/02/grayfish_architecture-640×555.png" alt="The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code ("blue pill", "red pill" – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly "swallows."

The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.” width=”640″ height=”555″ />

Enlarge/ The VBR means Virtual Boot Record. It is a special area of the disk that is responsible for loading the operating system. The Pill is an injected piece of code (“blue pill”, “red pill” – Matrix references) that is responsible for hijacking the OS loading. It works by carefully altering the loading mechanism to include malicious code that the OS blindly “swallows.”The BBSVC service is another GRAYFISH mechanism used when the Pill cannot be injected, for some unknown reason. It loads further stages of Grayfish at the time the OS starts. In essence, it’s a weaker mechanism than the pill, because it exposes one single malicious executable on the hard drive of the victims. This is why BBSVC is a polymorphic executable, filled with gibberish and random data to make it hard to detect. The platform kernel “fvexpy.sys” is one of the core components of Grayfish. It is designed to run in Windows kernel mode and provide functions for the platform components.

GrayFish is the crowning achievement of the Equation Group. The malware platform is so complex that Kaspersky researchers still understand only a fraction of its capabilities and inner workings. Key to the sophistication of GrayFish is its bootkit, which allows it to take extraordinarily granular control of the machines it infects.
“This allows it to control the launching of Windows at each stage,” Kaspersky’s written report explained. “In fact, after infection, the computer is not run by itself anymore: it is GrayFish that runs it step by step, making the necessary changes on the fly.”

Fanny: A computer worm that exploited what in 2008 were two zero-day vulnerabilities in Windows to self-replicate each time an infected USB stick was inserted into a targeted computer. The main purpose of Fanny was to conduct reconnaissance on sensitive air-gapped networks. After infecting a computer not connected to the Internet, Fanny collected network information and saved it to a hidden area of the USB drive. If the stick was later plugged in to an Internet-computer, it would upload the data to attacker servers and download any attacker commands. If the stick was later plugged into the air-gapped machine, the downloaded commands would be executed. This process would continue each time the stick was switched between air-gapped and Internet-connected machines.

Kaspersky Lab

TripleFantasy: A full-featured backdoor sometimes used in tandem with GrayFish.

Want to know the real reason the “deep state”(aka AIPAC sponsord organizations, racist sectarian political factions that hide behind NGO’s, and of course, every other American “law enforcement agency”  is at war with Kaspersky? Read the full article!But I for one, am not scared of the Chinese, or the Russians taking over anything.
Hell, I will show them to your door;-)
Related Story: That time-just that ONE-where I was approached by someone from Vegas who knew about these hacks, and wrote to me here at ROGS.

Gang stalking children and babies: cults and sects and CPS stalk children for profit-and the Pink Pussiehat movement is showing cracks! deedni תיקון עולם‬ .

UPDATE 09/24/2019:Since I wrote this post a couple years ago, it has now been disclosed that notorious anti-democracy, anti-free speech organizations, and tribal sectarian race supremacist organizations like the Anti Defamation League are actually using military grade psychological operations to stalk, monitor, and harass targeted individuals, using military grade programs like Moonshot CVE, and others that do even worse things. Its not “mind control” if “we” do it, right?
NEVER DOUBT THE POWER OF ONE VOICE. This blog that you are reading, ROGS has changed the dialectic entirely
Related Story: Rita,Katz, and her misanthropic quest to vindicate her father, an Israeli spy, comes home to Pensacola, FL: a primer i manufactured terrorism 101

Trigger Warning: This post contains the names of a few people from the “women and their children” crowd who participate in gang stalking. And, I wrote it for whoever is searching this .terminology: “gang stalking babies.”

But first, a free announcement from the STOP SESTA sponsors:

Let’s tell Congress: SESTA wouldn’t stop sex trafficking, but it would strangle online communities.

This post is also dedicated to all of those hard working Bernaysian Liberty Torches who participate in and profit from Organized Gang Stalking-and especially to Morgellon’s sufferers like Ed, in San Francisco,  a down and out former federal public defender who, disgraced by federal prosecutoer~cum financial~crimes~investigato Tarek,  now works in the Ohio cult of Eikenburg as a toilet slave trainee.
(You might recal Ed as the likely Fusion Center courier from this story, and from extensive correspndence with him that I documented elsewhere,as occulted law enforcement moved into an apartment three doors away from my own. )
Where and when did “high policing,” begin to target men as wage slaves, in the post-modern peonage system? What kind of people do that? The short answer is “racists, manipulative slavery profiteers, and their enablers,” andthose,derivative of Eastern Bloc banksterschemes of the One Percent, most of whom are nebulously Jewish, and well connected tothe DHS gang stalking pork barrel.
 

From Welfare State to Police State
It is not called the welfare “state” for nothing. Unnoticed by reformers and even more striking than the economic effects have been subtle but far-reaching political developments. These developments involve the quiet metamorphosis of welfare from simply a system of public assistance into nothing less than a miniature penal apparatus, replete with its own tribunals, prosecutors, police, and punishments: juvenile and family courts, “matrimonial” lawyers, child protective services, domestic violence units, child-support enforcement agents, and other elements.
Originally created to treat ills endemic to low-income, single-parent homes, this machinery is increasingly intervening with police actions in middle-class families. Kafkaesque in its logic, this machinery lends plausibility to the warnings, most famously by F. A. Hayek in The Road to Serfdom (1944), that socialist and welfare-state principles would eventually threaten not only economic prosperity, but also civil freedom.
-STEPHEN BASKERVILLE

I have up until now avoided writing about how the old government programs that the United States “borrowed” from the Nazi’s are still in play in the world but on a much wider scale, including eugenics programs where elements of society attempt to kill off resistance with cleverly worded political phrases, slogans, and clearly religious/sectarian agendas that hide their true intentions in secular law and culture; and that ALL of those agendas stink, because they work from within cultic and sectarian frameworks, and against due process of law.
Or, in this case that follows-vagendas.
Some white women-most notoriously from the “progressive” folds of our politics- perpetuate a form of racism that is very “eastern bloc,” and without concidence, the current money pot of “save the sex trafficked women and their children!” has historical precedent. Then, we can frequently find in the dialectic of OGS references to slavery of one kind or another.

Related Story: The Island of Guernsey-which reads ROGS- settled a lawsuit with 3M for allegedly poisoning people with cancer causing agents found in firefighting foam. Now, The MN State attorney general is suing 3M for $5 billion for potentially causing infertility, and cancer as others contemplate domestic spying and gang stalking lawsuits against Minnesota state agencies.
UPDATE:Minnesotas Attorney General, Lorrie Swanson, noted in some online writing as an actual gangstalker(muchOGS involves the hidden political violations of prosecutors and law enforcement- Minnesota leads the nation in this form of corruption, second only to New York and California) settled quickly, for far less. That skanky bankster whore took 800 million, instead of taking a stand and fighting- and possibly prevailing in a first of its kind prosecution that could have netted far more,possibly into tens of billions,  had citizens attained legal standing.  This is the bolshevik white female in action: settles quick an low, while keeping her job. These are devoid of morality, or even common sense, like much of the for sale #MeToo whores of our era.

 
We also see in the work of Stephen Baskerville that these same are every bit as racist/racial and a desperate as Hitler was to promote their version of tribalism, which sometimes takes the form of multi-cultism but not always-sitting down to dinner of a Saturday with any of them finds that their daughters don’t generally marry black men from Chiraq, or Compton.
And, we see their politics nearly  always ends with supremacist outcomes, and “word policing.” And lot’s of boogieMAN creation schemes, assisted by the bald headed prick in the administrative offices at some podunk college’s and backwater-states where much gang stalking begins. My reader from Washington State and my associated daily Triune of readers might appreciate my co-option of their phrase there;-)

Related Story: Why are most people who report Morgellon’s “disease” white, middle aged females?

But let me explain it this way: there is a currently split in the “progressive” vagenda, as a bunch of pussies walk into a bar- or an election; and I’ve got President Barak Obama parked a block away from my house, munching a burger with a progressive voter, after I have endured a years long gang stalking operation (see photo below ).

Related image
From the Jewish Progressive magazine Forward: “For thousands in the anti-Trump movement, the pink “pussyhat” is a symbol of resistance. For its co-creator Jayna Zweiman, it’s also an act of “Tikkun Olam,” while others ask if something isn’t a little fishy in the progressive folds, as desperate tribalists try to get their fingers into some “color”.[image and text from Forward magazine]
We saw the beginnings of what is colloquially called the American version of “mind control” and other things in the “Liberty Torches of Freedom” example where Hitler’s guru of propaganda Edward Bernay’s provided a template for “women’s rights”, where he used American women to promote cigarette smoking in the gap years between WW1 and WW2- and we see today that women from these same folds are also willingly manipulated as “vagina hat wearing morons,” today, but even there, those who claim to speak for “all women” are showing a few cracks in the ranks.
Progressive women intimidate fay men, and women’s violence is under-explored in academic settings 我一次他妈的老虎
Wǒ yīcì tā mā de lǎohǔ, or-wo sao hu yi ci guo.

So how to solve the problem? Moral panic’s, they say, are the devil’s best friend. Social contagions! Moral diseases! And-lot’s of “working in darkness” with Leon Trotsky’s favorite tool from the devils toolkit-RACISM! But where-and on who- to cast that spell? And who will help? Enter crisis PR and it’s many agents in high heels, with the associated dog and pony show waged “in darkness,” against unsuspecting targets of domestic spying.
All of these things can cause political rifts and nasty splits of all kinds, not least of which is profitable for those who cause them, and use us, one against anther, as they chew through our Constitution, and our rights of due process. This is the case with SESTA, which is a bad bill that claims to seek help for sex trafficking victims, but is in fact, a HUGE broadside against free speech on the internet. And even progressives agree that we all need to pitch in and STOP SESTA.

Related story-Falling through the cracks: Women are throwing their pink pussiehats in the gutter– is it because they think pussies aren’t ‘dirty enough’ or is their something much wider, and deeper? Or-because white Jewish and white female racism has finally bared it’s teeth to cannibalize brown/black/yellow and red pussies?

Related image
Something stinks in white-woman-privilege-land (even WITH Ed in San Francisco on the case): Are brown, black and yellow women tired of having white women’s privileged pink pussies on their heads all the time, and having the hand of Eastern Bloc banksters up their crotch, using them like Puppets? Don’t Be a Puppet!

But who are these cunts who claim to speak for women (as if women cannot speak on their own?) The answer is: they are the same slavers of each and every generation before this one, and they have roots in Eastern Bloc “white Slavery,” and Roman conquests, but also, these SAME people had deep tentacles in the slavery of African American’s, and the peonage of the indentured Irish.
But keep in mind that Protest is Protestant, and we need more of it, but without the veiled intentions of destroying Democracy at the internet switcharoo. And maybe, toss the religion too, so we can all pitch in on this projct, together.
So let me run through a case study drawn from the current online Psychological Operations that were also in play in the run-up to the election of 2016, and the associated offline and actual “gang stalking” that occurred. As the regular reader will note, I have discussed these operations as they affected the proliferation of “mass shooters” in 2016, and how progressive politics encouraged these events-but also encourage the law enforcement agents reading in to note this correlation as well.

Related Photo gallery:President Barak OBAMAs Secret Service Limo, and its cohort, parked a block away from my house, as “Progressive Welfare Cheese Staters”maraud through my neighborhood, leer through my windows, and destroy my security cameras(the great irony is that I voted for him, a move I soon began to regret).

Psychological operations and gang stalking: blurring the narrative, blurring legal, moral,  and ethical lines, one targeted speaker at a time, and a strange form of cyber stalking that comes offline, after “secret” operations:

  1. The case of the neverending war on profits derived from “white slavery,” that currently takes the form of the DVIC industrial complex and the massive money pot that has incentivized the transition from welfare state to police state; and the question “who wages these wars?” Then, I ask the reader to Google the phrase “even the gang stalkers” with quotation marks and “follow the money” and compare your results here. And, then have a look at the story of the bat-sh!t crazy Deane Zakaos Ewing, and Laurel “even more batsh!t crazy” Aston and “CIA child sex slavery rings!!!” And “masonic ritual abuse” of those who resist their messaging apparatus, and gang stalking blackmail/compromise operations/slander campaigns/ political schemes
  2. Image result for deane zakaos ewing
    The batsh!t crazy gag stalker Deane Zakaos Ewing, of Buffalo New York. RIP you sh!tbag. Zakaos allegedly passed away in a “mysterious death” in 2016. I hope your neverending journey has you rolling around in South Padre Island’s ditches and gutters with Edward Bernay’s dick in your mouth. Or, Deb, from St. Louis County, MN.
  3. the batsh!t crazy story of Laurel Aston. Keep my thesis about the number 13 in mind as you read this story. “The Truth On Ex C.I.A. Human Trafficking Victim Laurel Aston and Bill Cosby and His Son Enis By Laurel Aston”Bill Cosby’s son was murdered in a C.I.A. hit meant for me . On that fateful night ,when Bill Cosby a Black American hero lost his son , Enis Cosby .The C.I.A.had meant to finish me off for good. That fateful night was not long after Nazi C.I.A.assassin and mega Billionaire Stephen Benion had successfully extracted another rape baby from me . Benion my C.I.A.Slave handler and forced husband , did this while holding me under armed guard at our ranch outside Palm Springs in Rancho Santa Fe .While keeping me drugged nearly unconscious. Benion is a German Nazi . I am half Jewish from the sacred Lost Tribes of Israel bloodline.”

These psychological operations include gang stalking, and we saw many gang stalking targets were “911 truthers” who simply wanted the ridiculousness of the situation acknowledged (Dancing Israeli ‘art students’ that even the flaming gay press documented, and the flying Saudi’s who the flaming gay press ALSO documented; and who the Bush’s, the Clintonites, and the “deep state” just love these days); but also that includes UFO’s and aliens, chemtrails, Morgellon’s, and “holistic medicine” as well. In mind control operations, the possibilities are endless, and all of them help nefarious elements of ‘our’ society gain wealth (Do you have Tinitus??!)
Yet the serious researcher of organized gang stalking will certainly become quickly exhausted when they realize that these rabbit holes all lead to other rabbit holes- that some say “tomato” while others say “Frank Tomota,” who, “coincidentally,” used to live in Ed’s Asian barrio. And, who is a Deb Matheny/NE1/etc asociate, and not at all incincidentally an associate of a former LA County coroner who is part of DVIC narrative control.
Or, that frequently, the domestic spy rings that are frequently described as “the CIA” are actually the Mossad working with, or from within our own agencies as we saw them targeting Occupy protesters,  and also working seamlessly within secret operations one day and in American NGO’s the next; or any of many other foreign agents that “our” agencies allow to operate with immunity and impunity in America.
Don’t waste too much time making connections, because at their center, what is important, is that LEA’s and LEO’s all belong to or are deeply affiliated with one or another secret society, and retired military, intelligence and FBI/DHS/CIA all work black operations across America-and the FBI refuses to investigate these illegal, police and intellugence agency affiliated spy rings.
And, that the various Infragard and LEIU’s splattered across the country have made Constitutional due process a laughing stock in every sense. Like Ed said ” I have a few friends who work in the FBI,” just before he drove himself crazy running around in circles on Flightaware.com, one day and then zipping off to San Berdoo the next-and just AFTER I lost this story about airplanes to a long sleek black Chevy Suburban thathad no license plates.
Like this story here, we see that there is indeed a nexus between how NSA “call centers (lol)” are using data, and trickling it out t key players in the dialectic, who then wage inf0-wars and mind wars of all kinds on targeted individuals. Maybe you should rethink a few of your new Fakebook friends too, because it’s estimated that some 40% are .mil contrcators, and other state trolls. This is what mass mind control IS in action.
The researcher should keep the phrase “innocent doesn’t mean not guilty” in mind as they read into and out of gang stalking narratives, because the phrase itself-like much in the gang stalking dialectic- is laced with auto-antonymal meanings often backed up by decades long slander campaigns and police stalking; and that to some, “not guilty” frequently means “not innocent,”even if we have to break the law and commit a few crimes to prove it. ANd, this same is a feature of all blackmail operations, anywhere, ever.
We saw this clearly in the case of the Beatrice Six, known as the largest DNA related exoneration of innocent victims of state practices in American history, that state agents will do anything for a paycheck, and to keep control of their communities safe from “the Devil,” which, more often than not is a code word for “eastern bloc Jews and their Talmudic kabbalah.”
Catholics and Protestants and Baptists all generally view Jewish cultic beliefs a demonic, but also, work “in darkness” to get a chance to sink their teeth into Jewish money of any of the many flavors of banking and political interests, real estate, and then-the hefty barrels of pork that these associated “good peeple” NGO’s receive from the federal government for gang stalking operations.
And, these other spin-offs of Babylonian mystery religion all have their own strange stalking tactics too.
And, so we saw in the Beatrice Six that a child was at the center of the debate, as a lesbian mother was framed as a murderer, and then, shortly thereafter, her child was spirited away by CPS. I don’ have statistics handy, but I have read before that states and the multi-headed hydra of “social services” instantly get a million dollar paycheck for every kidnapped child, while others seem to get away with murder, and worse, as the state looks in.
And then, in the “schizophreniform” narratives of the case of Laurel Aston and Deane Breedlove/ Deane Zakaos Ewing, that they have also demonized a lesbian mother. I can provide a list of names that stretches from Texas, to Colorado, to Georgia, Tennessee, Michigan and Ohio that conects my own personal case, but also, that connects the dot directly to the NSA. Without any doubt, this is a new MHCHAOS, and 13 is the magic number there too.
So, few cases demonstrate the schism in our society more than these cases, for many reasons, not least of which is the criss-crossing of political points, or that it is the old KKK type community policing, but without the burning crosses or the pointy hats, because anonymity emboldens cowardly practics whether it is a switched internet node, or a white sheet:

  1. Children are the future of our nations, whether you are a left-wing tattooed lesbian or a right wing gay person, hiding behind religion; whether you are a single parent, or happily married; whether you are a Democrat or a Republican, (or whatever political parties are in your country.)
  2. Control of children is a lucrative and profitable industry in its own right. In America, organizations that use children as funding sources range from the school districts, to the welfare system, to foster care, and child protective services-all communities derive profits from children.
  3. Hitler notoriously claimed that ‘ he who owns the youth, owns the future/country!’ but also, Hillary Clinton’s politic and it’s associated peonage system also said similar things-‘it takes a village to raise a child!’ and so on.
  4. Religions historically vie over control of children. In every community in America we see religious factions vying for control of the profitable social services industries. These schism’s in America (and likely in other European nations) are quite evident in the culture wars waged between Catholics/Protestants on one side, and Jewish/Progressives (fallen away Catholics/Protestants, the gay community, and their many unhappy others).
  5. Many other features which in and of themselves are a separate novel.

I write this post merely as a template for others to study the strange “schizophreniform” narratives, and then, with the hope that the civil itigators, criminal defense lawyers, sociologists and psychologists, as well as criminological researchers can begin answer the questions “what is organized gang stalking” and “who gets gang stalked,” and what happens in gang stalkin.” and so on.
But we also see it in every day narratives now, as we have devolved into a lawless state of affairs where we are ALL literally wiretapped by the NSA, 24/7. You see-in the DVIC era, starting in 1993 until now, some felt it was alright to bend and break the law, based in their own hunger for power, and worked “in darkness” to not only create inter-generational trauma’s and mind control, but also, to steal babies, and worse.
In other words, the usual suspects are always an inch away from the kids, and they haven’t saved them in all of the time the world has had kids popping out of it. This is what happens when we slide the scale from a law of due process to a law of the jungle. And as I noted above, I rode the Tiger One Time, and that was enough to teach me that these are not too be trusted with law-or pubic policy in general.
This time around, my best is a rolled up pocket Constitution, and the hope that I can get a few journalists properly riled up. That works, sometimes, in Democracies. Other times, it takes a bunch of court cases, or a good class action, and as Marcy Wheeler has noted, we are all targets now.
 

Have you noticed the CIA listens in to key discussions online?

The headline up there is an inside joke-it came from inside my head. You see, lot’s of people think that sooper seekrit agencies like the CIA listens to us all. But that’s not true! That’s crazy! And worse- a “potentially dangerous tribe of troubled minds” in the organized gang stalking online community are starting to talk about their troubles online! They must be stopped!
But the truth is, the CIA listens to some of us, more than others of us in this modern Operation Gladio/aka CHAOS. And: the star chambers wage battle between six pointed stars versus five pointed stars, and MORE CHAOS!!!! With some THIRTEENS thrown in to the lions den (lions are seldom reported to wear high heels, but there are exceptions. Like when the rotary wheel is used as a form of domestic NTT, and Mooses and Elks and Lions Bears conspire in High Heels Policing. Ooops. Bears are Russians-never mind)
Related Story: The Privacy Raping Boondoggle That is the NSA/FiveEyes-Israel (New Zealand) data theft pipeline. What’s in a name? The FOUR MILLION DOLLAR Thin Thread versus the FOUR BILLION DOLLAR Trailblazer.
And William Binney, who recently sat down with the CIA director, is one of those “troubled people.” He has even lent his name to the targeted individual community, to investigate gang stalking. Yeah, for real.
And the Washington Post-one of the deep states favorite places to take a leak-say’s “Binney is playing with fire!” Let me know if that sounds like a threatening/threat narrative laden headline (does the use of THAT word up my DHS “threat matrix score?”)-because that could indicate paranoia, and we would have to get you some mental health treatment. Maybe, the CIA’s Mormon torturers, Mitchell and Jessen could take a whack at you in a black site, and get YOU the help YOU need! Because psychologists are in on it at every level-to help you, of course.
Here-let’s have a look at what one of the Rubin Klan have to say about that meeting (you might start to see patterns in journalism when people who are in the Klan of Rubin show up pin a narrative. Here-look at this Rubin sand-witch- a serial rape hoaxer):
William Binney About to Get Tossed Into Sheol!!! According to Jennifer Rubin
My Post colleague Aaron Blake reports:

The Intercept just broke a pretty big story: CIA Director Mike Pompeo reportedly met with the purveyor of a disputed theory about the internal Democratic National Committee emails that were released last year — a theory that runs counter to the intelligence community’s own long-standing conclusions about the matter.
It’s not the first example of Pompeo doing something that has been put under microscope. But there is a common thread running through just about every example: Pompeo doing and saying questionable things involving Russia — and those questionable things tend to lean in a pro-Trump direction.

I still remember when “those people” said the “deep state” was a conspiracy theory-do you? Yeah, and now look-Google has 42 MILLION results for that exact term. Sorry, Dr’s Mike, and Lorraine, and David- but the troubled minds tribe is growing! And- deep state is really a code word for “traitors.”
And even our own government has noted that SOMEONE likely has an actual sound cannon that was used on our diplomats in Cuba. Never mind the narrative distortion that has gone on since this story broke-because “webwashing” is a real thing.
Ever notice how the things I write about here at ROGS happen in “real news” shortly after I get on the case? Yeah-it’s a pattern-my long term case of apophenia following me around like Gloria Ghost. You might have forgotten Gloria, so here is a picture of my damned sell in dis’ dress:

rabbit
This is my imaginary friend, Gloria Ghost, the scar faced bunny. Only I can see her-she’s totally in my head. Psychologists tell me it’s apophenia. Some people say Gloria is full of sh!t, but I always correct them, and let them know that it’s not sh!t-it’s dumpsters full of garbage called a “dossiere'” with augmented reality at the internet switch, and recycling of old, tired tropes and narratives of moral panics dating back to 1913. Gloria is Edward Bernay’s favorite daughter- he lit her on fire and called her a “Liberty Torch.” Poor poor Gloria.

Well-who knew? My old neighbor Doug’s friend Pompeo called one of my favorite whistle blowers, William Binney into his star chamber the other day-no kidding. And I’m pretty sure that it was Doug who made it happen (Hi Doug! Where dd you disappear to anyways-and was REAL ESTATE involved?). So, I think now is a good time to revisit my “theory” of the horsehair worm in the crickets head, which I call “memetic neuro-fasciitis of the mind.”
Or, as you know it “the NSA data entrapment scheme that targets ALL American’s and uses the collected data to steal elections by harassing, manipulating, and “no touch torturing” political opponents of the deep state (aka the “gay mafia”) and so on.
You might remember Bill Binney as a true and real American Hero who built a sooper seekrit internet email and phone call interception machine back around 2001, the goal of which was to capture intelligence on FOREIGN spies and bad guys. But because his machine respected our Constitutional rights of due process, and was extremely cost effective, coming in just under FOUR MILLION- he was fired, and the NSA built a FOUR BILLION dollar machine instead, and targeted AMERICANS and politics. Then, they tossed that machine in the dumpster, and built one that cost 72 BILLION per year.
Then, the FBI kicked his door in to shut him up from talking about it. You can beat the charge, but you can’t beat the ride, they say.
Well- how else to build and enforce, and police, and re-police a narrative that demands a climate of domestic terror??!! And how to get more monies for all those helpful, and hungry hungry hungry DVIC Gloria Bunnies in high heels? I have an idea! How about we AMERITHRAX the crap out of the narrative? Yeah! Go team black/red! Here- from Washington’s bloghave a look at the AMERITHRAX hoax, which claimed the lives of five American’s.
Good Ol’ FBI-I guess every totalitarian bankster state needs a domestic political police to suppress, intimidate, bully, frame, and harass journalists and dissenters and writers and save cute puppies and all that- to save them from those who break into our Windows 10 to get a grab at our kids, or wage years long black bag jobs. I mean-Hitler had the SS and all those brownshirted patriots stalking for Der Muterland, and Stalin had the Cheka and the NKDV, and who can forget how well the Stasi worked in East Germany as John LeCarre’ wrote about folks who tinker around behind the scenes and exploit the narrative itself(or whose asses get fatter by the day counting beans in the DHS right now)!?
Well anyways- if you have been following my writing for the last few years before this blog, you will see I have chronicled these deep state “disruption campaigns” since around 2004. Yeah- not a profitable business model, that’s for sure. BUT: a very important check against the balance sheet which is always hungry hungry hungry! Checks and balanceslike alternative media and blogging– are the thinnest and most fragile threads that sew our democracy together, so that those who would-and can and do-tear us apart don’t get their way.
Here’s a bit from the VIPS memo, which is a complete refutation of the DNC “Russian Hacking” narrative, which documents INSTEAD a “someone most likely copied the data to a thumb drive” narrative (maybe the drive had a case of bad USB??):

MEMORANDUM FOR: The President
FROM: Veteran Intelligence Professionals for Sanity (VIPS)
SUBJECT: Was the “Russian Hack” an Inside Job?
Executive Summary
Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computer. After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device.

Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack. Of equal importance, the forensics show that the copying was performed on the East coast of the U.S. Thus far, mainstream media have ignored the findings of these independent studies [see here and here].
Independent analyst Skip Folden, who retired after 25 years as the IBM Program Manager for Information Technology, US, who examined the recent forensic findings, is a co-author of this Memorandum. He has drafted a more detailed technical report titled “Cyber-Forensic Investigation of ‘Russian Hack’ and Missing Intelligence Community Disclaimers,” and sent it to the offices of the Special Counsel and the Attorney General. VIPS member William Binney, a former Technical Director at the National Security Agency, and other senior NSA “alumni” in VIPS attest to the professionalism of the independent forensic findings.
The recent forensic studies fill in a critical gap. Why the FBI neglected to perform any independent forensics on the original “Guccifer 2.0” material remains a mystery – as does the lack of any sign that the “hand-picked analysts” from the FBI, CIA, and NSA, who wrote the “Intelligence Community Assessment” dated January 6, 2017, gave any attention to forensics.
NOTE: There has been so much conflation of charges about hacking that we wish to make very clear the primary focus of this Memorandum. We focus specifically on the July 5, 2016 alleged Guccifer 2.0 “hack” of the DNC server. In earlier VIPS memoranda we addressed the lack of any evidence connecting the Guccifer 2.0 alleged hacks and WikiLeaks, and we asked President Obama specifically to disclose any evidence that WikiLeaks received DNC data from the Russians [see here and here].
Addressing this point at his last press conference (January 18), he described “the conclusions of the intelligence community” as “not conclusive,” even though the Intelligence Community Assessment of January 6 expressed “high confidence” that Russian intelligence “relayed material it acquired from the DNC … to WikiLeaks.”
Obama’s admission came as no surprise to us. It has long been clear to us that the reason the U.S. government lacks conclusive evidence of a transfer of a “Russian hack” to WikiLeaks is because there was no such transfer. Based mostly on the cumulatively unique technical experience of our ex-NSA colleagues, we have been saying for almost a year that the DNC data reached WikiLeaks via a copy/leak by a DNC insider (but almost certainly not the same person who copied DNC data on July 5, 2016).
From the information available, we conclude that the same inside-DNC, copy/leak process was used at two different times, by two different entities, for two distinctly different purposes:
-(1) an inside leak to WikiLeaks before Julian Assange announced on June 12, 2016, that he had DNC documents and planned to publish them (which he did on July 22) – the presumed objective being to expose strong DNC bias toward the Clinton candidacy; and
-(2) a separate leak on July 5, 2016, to pre-emptively taint anything WikiLeaks might later publish by “showing” it came from a “Russian hack.”
*  *  *
Mr. President:
This is our first VIPS Memorandum for you, but we have a history of letting U.S. Presidents know when we think our former intelligence colleagues have gotten something important wrong, and why. For example, our first such memorandum, a same-day commentary for President George W. Bush on Colin Powell’s U.N. speech on February 5, 2003, warned that the “unintended consequences were likely to be catastrophic,” should the U.S. attack Iraq and “justify” the war on intelligence that we retired intelligence officers could readily see as fraudulent and driven by a war agenda.

The January 6 “Intelligence Community Assessment” by “hand-picked” analysts from the FBI, CIA, and NSA seems to fit into the same agenda-driven category. It is largely based on an “assessment,” not supported by any apparent evidence, that a shadowy entity with the moniker “Guccifer 2.0” hacked the DNC on behalf of Russian intelligence and gave DNC emails to WikiLeaks.
The recent forensic findings mentioned above have put a huge dent in that assessment and cast serious doubt on the underpinnings of the extraordinarily successful campaign to blame the Russian government for hacking. The pundits and politicians who have led the charge against Russian “meddling” in the U.S. election can be expected to try to cast doubt on the forensic findings, if they ever do bubble up into the mainstream media. But the technical limitations of today’s Internet are widely understood. We are prepared to answer any substantive challenges on their merits.
You may wish to ask CIA Director Mike Pompeo what he knows about this. Our own lengthy intelligence community experience suggests that it is possible that neither former CIA Director John Brennan, nor the cyber-warriors who worked for him, have been completely candid with their new director regarding how this all went down.

HAhahahahaHahaha. Apophenia. Epiphanies. Hahahahahaha. I’m going CRAAaaaAAAAzzzYYY!. Mmmmmmbwahaahahahhaaha.
And now, you are too. But-it IS all related indeed-to politics and political policing of words themselves. Try not to get too involved in all the pattterns….But if you REALLY want to go nuts, decipher the meaning of all those letters just above this paragraph. That should keep you busy for awhile-I mean-you lard asses have nothing better to do anyways.
Well sure- looking for Stephen Paddocks hard drive and all. That will keep you busy the same way that Oswald thingy kept you busy for 60 years or so. HAHAHHAHAHAHAHAHAAHa.
Yeah- it’s in the party van.
FBI caught with its pants down, and its game wide open in Asia-is that really a bad thing?!?FBI_Party_van2FBI_Party_van2.jpg

I get letters,part tang, as in "Tong." And triads.

長時間沒有看到龍! Hao jiu bu jian, jiu long tong!
Hong Kong has been peeking in and reading this blog ever since the apartheid bankster state of South Africa sent out the cricket signal. And we know who THOSE guys are, right Beijing? The MSS prolly is on your case already-and if they are not, shoot me an email, and they WILL BE (because all the good guy software looks for words like “shooot”).
And-Heng Choon- if this is you peeking in, shoot me an email-I will explain gang stalking to you, personally, because those who get gang stalked aren’t what you think they are-and certainly, “an eye for an eye policing” has led us down a slippery slope indeed.
For others looking in (and note that I am NOT looking in to THEIR worlds) here is a bit about Heng Choon “Oliver” Chan, and how western narrative is mediated by “whisper campaigns,” long before they approach substance:

“Oliver’s research focuses on sexual homicide, offender profiling, sex offending, homicide, stalking behavior, and criminological issues related to the Asian population.”

So, Oliver, if this IS you peeking in, of course, I can understand why you would be interested in this blog. Because my intent here- as you might infer- is to MURDER the ability of gang stalkers to use such a life-wrecking “investigative technique,” and relegate OGS to “delusional complaint,”by disguising state level criminality in “goodguyism.”
As such-you might want to have a look at the CIA LSD experiments and actual, documented “mind control”, and how one of America’s most famous gangster bosses, Whitey Bulger, was an unwitting victim of this practice. I have a few clues here- a nice start point where you can peek at how CIA narrative became the exact sociopathic dialectic we are engaged in here, at the bottom of this post about a “homeless schizophrenic delusional” named Lucie. And, I have known more than one mob widow bilked of her entire retirement by gang stalking schemes; and currently am observing similar in action elsewhere.
Then, you might want to Google “CIA black operations, and self funding operations,” and compare these results to the fact that Bulger had some six FBI on his payroll, and was famously used as an “earner” for 28 years while he was “on the run.”
Delusions indeed. Today alone, this blohg ot 80 reads from the US, and some seven other nations ranging from Denmark (who is avidly reading) to Autralia (Hi, Curtin University!-did _______________ get ahold of you?). Here is te list of today’s countries that  read, on average, three posts per click:
United States
Denmark
Switzerland
Germay
Canada
Hong Kong
Japan
I think I hear the sounds of a donkey show, and a Balaam beating time to my writing!(and probably a few gender lesbians who get off on war porn, and smelly old bald headed Eastern Bloc socialists too,  looking for clues to the hidden patriarchy! And without a doubt, a few desk jockies in local LEO’s are looking for that extra stripe-or hoping that I don’t write about THEM next– like that douchebag three-striper and his beeyotch Maria and her merry band of Gomez’ at “the library” a couple years back.)
Perhaps the hardest thing for most researchers of organized gang staking to grasp is how complicit agencies such as the FBI and the DHS are in it. That these have adopted the tactics of the CIA’s “Operation Gladio” and are now targeting their own populations, and frequently, illegally using whole human lives as unpaid HUMINT. Or that these can and do pimp young girls or sell drugs, or run weapons all over the globe that are eventually used in homicides, such as we saw with “Fast and Furious.”
Then, perhaps the second hardest thing to grasp is that psychologists and criminologists-just like FBI agents and so on-are sometimes, easily purchased as opinions; or because of racial/ethnic/tribal alliances.
But I’m us’ doin’ mah job, writin’.
So- I got a letter today, one of the few that actually looks authentic-so for the journalists and lawyers peeking in, here is a glimpse of what gang stalking looks like in practice-how the DVIC and it’s “disruption campaigns” work in  practice-and keep in mind the Stephen Paddock story where I implicate the Paul Blart’s of Las Vegas in possibly gang stalking him, or shaking him down-I mean, imagine just the pocket litter in that guys room? Any first responder knows that Paddocks trash contained tens of thousands of dollars alone, much less how they can/do/did/will divvy up whatever they spirited away from the crime scene.
How insane is America under Countering Violent Extremism programs? Start with America’s 1 million security guards, who the DVIC fueled police use as rats (because they are rats) in the gray area of law and due process. There is as yet, no law against these rats stalking people.
This letter from my inbox below is just the tip of a huge Panopticon (and to the writer-note this: I have anonymized any personal data-there wasn’t much of it- and because these things are happening all over America right now, there is zero chance these incidents of dirty cops forcing you to break the law will be recognized as you, personally. This literally IS how gang stalkers work, and it is happening EVERYWHERE. See this video by Gavin Seim, as rats are trained in to East Germany, 1952, by a moron who never reaad the Constitution.

But writer, note also, this blogs email is highly monitored, and hacked-I set it up FOR that reason. And, it’s ok to write the word terrorist in an email-because it’s a low priority for PRISM, and Google CIA/NSA/Fusion Center feed. But words like “first amendment” and “Constitution” especially “my rights” freak these domestic terrorists out, and are more likely to trigger Fusion Center hero’s, and Paul Blart- and maybe get you SWAT-ted or killed in your pajama’s with a toothbrush in your hand, cuz’ “he has a weapon!!!!”
But please read my “fight back” and “how to document” sections of ROGS- and sit back as the gang stalking begins! But this time, have a camera in your hand, one in your pocket, and whatever else you feel you need to document these punks):
I get Letters, part Triad:

I was hired to do “security” work for an apartment complex a few years ago.
A company stepped in after they tossed the old one. Soon I was “working ” for a cop in an apartment house full of terris[terrorists]. Basic repeat my private conversations, show up at shops, follow me through the store and to work and home. The cop gave me an address and asked me to sit in apartment complex lot because someone has been “stealing “. I thought ” isn’t that your job?”. Which I verbatim said to him and refused to do because that’s shady. Ever since followed around by creeps who nearly hit me on the street with their cars and make peace signs at me. Yell things outside my apartment and fuck up my internet connection. It’s better than it was a few years ago but it has never stopped. What to do?.
My car was hit twice, I was only in it once. My friends all act weird af now to me. Cop called me a psycho and made me carry an untraceable phone. Thought I was going to be killed for awhile. People would sit in their cars outside my house waiting for me to leave.

To those who have been following along in this great Sheherazade quality striptease of online performance art that I call the ROGS blog, will note the “cadence” of the speaker/writer. I will leave it at that. And, to the writer, again-please follow the directions in my self-help sections.
But it reminds me of this case, where a mosque was bombed literally BLOCKS away from the local Fusion Center (let me know if you start seeing patterns).
That mosque was also the target of burglaries aka “black bag jobs” just after the bombing (let me know if you are seeing….) And, the crisis PR that ran, in a progressive state infiltrated at every level with people who hate the constitution (let me know if you…) will get more federal funding for each “incident of HATE.’
Then- and this is perhaps the most salient point in all of this- notice that another high profile incident in Minnesota-one that will gain the state some federal funds-has similar undertones (and if it seems to the reader that I am indicting local LEO’s and security guards as being complicit in the harassment and targeting of individuals who have intelligence value-yes, that is what I am saying. And, these who do this should be prosecuted as criminals.)
The Minnesota DVIC Embezzlers, and The Somali Mall shooter* aka The Crossroads Mall shooter**of Minnesota.
In Minnesota, there is a huge Somali population, and they are perhaps the single most preyed upon group of people I have ever met in the US. Local agencies ranging from LEO’s to the FBI, to the DHS and even security guards attempt to recruit them as rat’s, rather than to recruit them as “employee’s with a paycheck.”
This is not insignificant in the next case, that of security guard and IT/computer student Dahir Adan, who left his mothers’ house one night, elated that he was going to get a new Iphone, and then-for some reason-he ends up stabbing a few locals, and an ‘undercover cop’ who ALSO just happens to run a gun range, and have some power in granting/denying a gun permit-yeah, THAT guy just HAPPENS to be there, where the “stabber” is getting a new Iphone.
I mean, sure-LOT’S of people leave the house one day, looking forward to the privacy and security that and Iphone can give them,  and they say to themselves “I can’t WAIT to get my new Iphone!” And then, as they go to get it, they say to themselves- “Now that I am getting this new, fabulous, and privacy laden new toy, I think I will  STAB a few people, and get shot to death!!

Yah-HELL NO.

It just doesn’t work like that. I have been stabbed, I know others who have been stabbed, and so on-and not one of them said to themselves “Hey-I think I will go stab a bunch of people,” EVER. And, the last guy I met who had been stabbed-an old cholo scrubbing up in a bathroom, whose head had literally LITERALLY been cleaved from ear to ear in and split in two at some point-whose body was covered in maps of scars and tatooes-he had been stabbed some 11 times, and all of the wounds were festering.
He said “those guys jumped me. They were robbing me, and I should have just gave them the money. Then they just started stabbing me.”
Yah- basic cost-benefit analyses, Holmes. But domestic terrorism, in my experience and in my studies-is nearly 100% contrived and manufactured bullshit. Stabbings, on the other hand are a backup plan when criminals decide to do crime-or when someone is on the defense, and trying their damnedest to NOT arm themselves with a gun.
Knives are primarily defensive weapons, and anyone who has ever used one, been knifed by one, or otherwise owned one KNOWS that this is true-so take this into account as you study these totally bullshit manufactured terrorism events with “knives.” And, nearly EVERY site that discusses knives discusses them as DEFENSIVE weapons:
Choosing the right knife
And others state that knives are a mere backup/ alternative to be used ONLY where guns are not possible
In Minnesota then, we see in-group, out group dynamics on acid. That MHCHAOS has come home to roost and rut like pigs at a trough on top a henhouse, on top of the flowing slop of the DVIC money pile.(That would make a great editorial cartoon…). In other words- I saw firsthand how those nasty locals there (and elsewhere in America) play around with truth-and it ain’t the truth. It’s not even close.
And, as you read through ROGS here, especially the journalists and the lawyers-note that I speak from experience-and that organized gang stalking is what I say it is, and Minnesota state and local agencies are  a HUGE part of OGS. And as StingRay lawsuits are just starting to see a day in court, notice that the Minnesota FBI has pre-emptively started burning evidence of their use.
But also note, that I was writing about this happening there in that state-two years before Edward Snowden and Glenn Greenwald’s Intercept were born. Here- have a look at what else is happening there.
As a journalist, and as a writer, I am not partisan, and cannot be leveraged or silenced, because no Democracy I have ever heard of did well when these things happen. And with what I have seen and the actions-the literal framing that takes place in that state-are enough for me to throw in the towel. But instead-many have questions-thousands of them, and the wrong questions are a waste of time; and so for others, I write ROGS here, so that YOU will learn to ask the right questions when you get that chance.
Related reading: The Accent Signage Shooting in Minnesota, 2012
America is being duped and robbed, Fast and Furiously, by LEO’s and others who have sold themselves to High Heels Policing

Even the novice student of propaganda studies will note that a Google search of the phrase “fast and furious” give tens of millions of hits for a movie starring one of the most talent-less actors to ever hit the big screen, Vin Diesel. THAT search turns up “About 57,100,000 results.” Please shoot me when you start seeing patterns between the billions of dollars in crisis PR, and propaganda-and cover-ups.
Because “naming names” is the difference between understanding an issue, versus being drowned in total bullshit, and again and again, I have demonstrated that the OGS dialectic is filled with total bullshit, pumped full of AIPAC and Israelification, and as such-and as is my goal- I seek to demolish this hidden abuse of power, and the entire dialectic itself. Because-as I see time and again as major media picks u where I left off-yup, the word is mightier than any sword, or Buck knife, no matter how they try to frame someone, or frame an issue.
So-a Google search for “operation fast and furious” returns less results than Vin Diesels ugly slack-jawed mug, but MORE proper names, and dates, and so on.
And most importantly- it returns the name of a very corrupt operation that is like most US agencies these days, steeped in “black ca$h operations.” That search tells us that the Bureau of Alcohol, Tobacco and Firearms got a few people killed because they used guns as racking devices-and it tells us the proper name of the operation: The ATF gun walking scandal.
So-when analyzing the gang stalking dialectic, start with the fact that they are intelligence honeypots, and many people are being leveraged, squeezed, or otherwise framed and stalked-but that naming proper names is important, but many are simply overwhelmed as individuals and without a “voice” or the legal representation they need to name names, and tell stories. But also, connect the dots in between the lines (yeah, Ed H. in Frisco- thanks for those names last year. Despite your intentions, you gave me the bread crumbs I need to write ROGS. So-go save some dogs, because you speak their language. And Tarek’s too.)
So-in the west, most illegal arms sales can be traced directly to cops, agencies, and others affiliated with them. One story that I haven’t fully written is how in Toronto, 2005, some local LEO’s told me they were working on a case where American LEO’s were running guns across the border-and of course- of course! One of the first most notable shootings of that era happened shortly thereafter. I will leave it the the “intelligent” reader to speculate….
So- learn to ask the right questions, Ethan, Starling, Jeremy, et al. And hopefully certain questions should arise in a researcher. And, you’re doing a great job so far-keep up the good work.
For example-one recent hypothetical that should be asked is “ was Stephen Paddock, the Las Vegas shooter, connected to a gun running operation?” and so on. To prove that would be hard-because most illegal gun running takes place BY officials and those who have a license to sell them.
But as we see the narrative spin take place- the guy was a one man arsenal, going back to 1983, as the FBI of Whitey Bulger’s era transitioned to an FBI of Janet “Kill the babies first ask questions later” Reno. And, as definitions of “institutional psychopath” changed and morphed into “sometimes there’s a few bad apples,” and “well, we do whatever we have to do to get the bad guys,” and especially, “well, the good guys have to get the bad guys.”
Got it.
Another good example-and for some reason-of course!-the main stream media never asks the right questions-but many still wonder why a former Israeli intelligence officer is a gun dealer in Florida, whose gun showed up in the Paris terror attacks? Any slightly rational person might peek into that-unless of course, you get paid no matter what side of the DVIC teat you are nursing.
*Sigh* No one in media likes to ask the hard questions anymore- or follow the story to a natural conclusion.
I will not speculate on these links, because I just don’t have the budget for a team of lawyers-or a team of personal body guards right now (although if any of my avid readers or “followers” would care to contact me-I do have an  opening at a banana republic embassy that could use a security team. The contract is a shoe-in. )
Also, many fail to grasp the fact that international organizations like the United Nations is complicit in crime, in order to drive social policies in “targeted audiences.” If you have any doubt about this, just Google “manufactured terrorism” or especially bookmark “The Intercept,” and “Techdirt.com” in your Midori browser, so that you can see how deep the rabbit hole goes-and to see that national police agencies participate in or overlook local crimes in order to create, or allow to be created large and more “headline grabbing” crimes.that net them BILLIONS of dollars.
Sure- why not? Go get that low level “guy in poverty who can be bullied”, or Freddie Gray off the streets.
Big headlines are PR gold-like “What is the link between domestic violence and mass shooters and Las Vegas shooter Stephen Paddock?
Well, I guess I would be thrilled if someone made this into a big headline “the link between Rotary Clubs, and crisis PR, and retired cops, and how SWAT teams have been Israelified; logos with guns on them, and manufactured fake-shooter events.”
Or maybe more headlines about how an eye for an eye is how terrorists-and the “good guys” think. I dunno-but that seems important. Then again, I’m not in my old age, slopping through several pensions, and trying desperately to capture the eye’s and attentions of white female sociopaths in their early forties either. Or even FBI agents and DHS trolls-though these cannot be avoided in most dialectics of OGS.
*Minnesota has several

What is "gang stalking"? It is the result of a nation that respects no laws- and a nation 'for sale.'

The article below is from Business Insider in 2012. It documents one of the first official sources that claimed the government had sold our rights to “others,” who were wiretapping the entire nation.
The article chronicles decorated intelligence officer, and NSA whistle-blower William Binney’s ostracization, and excommunication from the cult of intelligence, as well as his harassment by the FBI for trying to save the taxpayers FOUR BILLION DOLLARS- but also, that he tried to preserve “Costitutional Liberty,” aka “due process of law, which Americans have not had since 2004.
In 2012, many already knew that the local police were using and abusing massive databases. Many already knew that ‘somehow’ that police, and multi-agency Task Forces had access to cell phones in real time, and that ‘somehow’ they could track “targeted” communications across a city, or across a continent- and into international jurisdictions (Hi Toronto!)- and that they could repeat back selected words and phrases just to let them know they  are watching.
While these people didn’t have a ‘name’ for it them, we now know it is the current sate of affairs where Fusion Centers were spying on citizens in local environments outside the view of any court, and outside the view of due process of law, and without respect for the Bill of Rights.
These people have a name- they are “targeted individuals,” and here is where the world began to know what “TI’s” knew as far back as 2003-4:

NSA Whistleblower Says The Feds Are Gathering Data On Nearly Every US Citizen

NSA ACLU
The government has been collecting data on nearly every U.S. citizen and assembling webs of their relationships, National Security Agency whistleblower William Binney told the Hackers On Planet Earth (HOPE) conference last week.
Binney worked for the Defense Department’s foreign signals intelligence agency for 32 years before resigning in late 2001 because he “could not stay after the NSA began purposefully violating the Constitution,” according to a statement he made in court records.
On April 20 he gave his first interview after resigning to Democracy Now!, asserting that the FBI raided his home after he blew the whistle on the NSA’s extensive spying on Americans.
On July 2 Binney, along with two other former NSA employees, agreed to provide evidence in the Electronic Frontier Foundation’s lawsuit that alleges the U.S. government operates an illegal mass surveillance program (i.e. Jewel vs. NSA).
His sworn declaration of facts that he’s willing to testify to are both telling and scary:

• In the ’90s Binney supervised the development of a NSA program called “Thin Thread” that was designed to identify international networks of connections between people from their internet communications. Since one side of the communications was domestic, the program encrypted the data so as to protect the privacy of U.S. citizens until a warrant could be obtained.
After 9/11 all safeguards went out the window as “the individual liberties preserved in the U.S. Constitution were no longer a consideration.” Members of his Thin Thread team began implementing a program called the President’s Surveillance Program (PSP), which collected domestic electronic communications traffic without any privacy protections.
• The NSA began seizing and storing most electronic communications passing through 10 to 20 wiretapping rooms in key telecommunication points throughout the country where all data must pass in order to move from one party’s network to another’s, allowing the government to identify and analyze any individual or group through a searchable database.
• Binney cites the $1.2 billion Utah data center currently being built and the new supercomputing center at the NSA headquarters in Fort Meade, Maryland, pointing out that the immense size and computing power of these facilities far exceeds the capacity necessary for storing targeted communications but is “consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications.”
In a nutshell Binney states – with considerable authority – that the NSA has been conducting comprehensive surveillance on U.S. citizens for more than a decade.

 
[youtube https://www.youtube.com/watch?v=JuvJ7tKIF2c&w=561&h=432]

The organized gang stalking of Bill McGaughey of Minneapolis Minnesota: "Kill my landlord!"

What is the Domestic Violence Industrial Complex(DVIC), and gendering violence as “male”? Hidden political agenda, and religion replacing law, and jury trials.

In my thesis, one can easily pick out some patterns that no doubt apply to many people, across the socio-economic spectrum, ranging from well established journalists, to the dangerous, and infamous gangster babies of the CalGang database, to drug users, to middle class aspirants as common as electricians; ranging from al-leftists to alRightists; Jews to christians.
In other words, OGS isn’t some imaginary thing that afflicts random “crazy people” or people with ‘advanced sequelae of mental illness’ as Dr. Lorraine Sheridan, David V. James, and others such as Christine Sarteschi, from PA, where a civil rights lawyer who took on the Penn state pedophiles, and the former head of the DHS itself, Tom Ridge was gang stalked by DVIC black operations, would have you believe.
Sarteschi, Sheridan and James are the current opinion leaders of gang stalking denialism, running cover for the 24/7 surveillance state, and its parasitic DVIC companions in Fusion Centers that are in fact and practice monitoring the communications and political associations of targeted activists, dissidents, and influential Americans.

STORY UPDATE: Since I wrote this post a couple years ago -this post that you are reading now- the Anti Defamation League, allied with multi-alphabet agencies, has conceded, and acknowledged that it is using military grade psychological influence operations on targeted individuals, without informed consent. This military grade influence operation is known as the redirect method, and it is followed by online and offline monitoring, stalking, and incitement of targeted individuals.

Here, we see Dr. Christine Sarteschi and David V.James running disinformation in Canada, as reported by the CBC, as Sarteschi claims -without evidence -that she has never seen a, “real ” case if OGS, despite ample evidence to the contrary world wide.
Instead, OGS is a verifiable assault on civil liberty, and constitutional democracy at every core level that targets individuals, frequently targeting “key constituents” or “influencers” in key dialogues or dialectics.
In fact, the NSA/FBI/CIA/DHS/DEA/Israel/to Fusion Centers etc data theft pipeline has enabled a new form of oppression that has the ability to target people in ways that were little moe than intelligence agency fantasies previous to the internet; and the means and methods- and the scope-the likes of which the world has never seen, are plainly hard to imagine, because the internet is frequently used in fact and in practice literally as a mind control venue, and a full time influence operation.
Related Story: Bill McGaughey has run for many political offices, as an independent candidate, i.e.~ AIPAC and other racist, sectarian zionist organizations, Soros/Koch sponsored NGOs, and the deep state HATE independents who cannot be corrupted or purchased-or blackmailed.
OGS strikes the core of identity, and structure, selectively targeting individuals in various ways. In the case of Bill McGaughey of Minneapolis Minnesota, he wrote the manual on ” Landlord Advocate,” in Minneapolis, for which he was resoundingly punished with police practices that had long been targeted almost exclusively at young black, or Hispanic kids, sometimes at white trailer trash, and occasionally at Asians, or other immigrants. And not surprisingly, community policing was a factor.
For context: Kill My Landlord, by Eddie Murphy on Saturday Night Live
Dark and lonely on the summer night.
Kill my landlord, kill my landlord.
Watchdog barking – Do he bite?
Kill my landlord, kill my landlord.
Slip in his window,
Break his neck!
Then his house
I start to wreck!
Got no reason —
What the heck!
Kill my landlord, kill my landlord.
C-I-L-L …
My land – lord …

And then, Kill My Landlord, by The Coup
[youtube https://www.youtube.com/watch?v=FR2VDqr9koI&w=854&h=480]
 
Lastly, the murder-by-defamation of Bill McGaughey in DVIC paperwork: framing a narrative of “bad men and good women”

So, when you add into this massive data-basing of “human-computer-interface” we see that the real world effects are in fact, applied selectively-for now- and targeted individuals are frequently just the experimental portion of that. TI’s are the “first they came for my landlord, and I said nothing, because I wasn’t a landlord” aspect of Hegelian policing.
But how to prove such a wide ranging thesis? How to document that such IS TRUE, or COULD BE TRUE?
And the short form answer to that is this: the past, is the present is the future, but NOW with the “augmented reality” of the internet interfacing with every person questions, problems, joyful Youtube watching; the sending of a new infants picture through email- all of this is intermediated by “middle men,”and women who are never seen, never held accountable; and all of whom are acting as “God” when they participate in OGS.
So, in order to see how the past has dealt with “organizing” gang stalking of individuals, it helps to have some data, and a name or two as a starting point. Then, let’s take a look at how data interacts at the switch, and the interplay between “internet” and real life.
I will examine the case of Bill McGaughey, of Minneapolis Minnesota as a point of convergence between old fashioned, pre-internet era practices, and the post-internet reality of highly organized, meta-organized, gang stalking. I use this case for several reasons:

  1. his case came to a head after an 11 year period-and the term gang stalking was growing in use online as the internet itself matured, as did OGS tactics.
  2. his case fits a classic OGS scenario of state and federal initiatives of the Domestic Violence Industrial Complex interacting with human relationships, with real estate, and control of a woma as an asset, and as and end goal.
  3. His case describes OGS to the letter, as experienced by Bob Deis, James McClynas, and Jeff Pataky, and any more, and also as described to me by a source whose theory can be seen here.
  4. Real estate, false or one sided claims of domestic violence, official slander, libel and defamation, possible links with foreign intelligence, one-sided policing, a link to Virginia (CIA, and other big tech, or NGO HQ) and more figure in, much as we seen across the board with OGS cases.
  5.  I corresponded with McGaughey for awhile, and while he did not feel that his own situation was “gang stalking” he also did not want any more publicity, hoping his troubles would go just away.
  6.  In the online dialectic of OGS, any researcher will find that men who have foreign wives are highly targeted (especially in military OGS).
  7. many forms of coercive custody and control, despite innocence of any crime. As OGS online is largely an influence operation, there are also factors of direct mind control involved, not least of which is causing targets to “trigger,” which is well known in the community

As usual, I ask you, the reader, to question everything I say, and to cross check or cross validate it with other evidence, or to dismiss what I say outright if you are so predisposed.
McGaughey’s story, which you can purchase online for Kindle, begins thus:

After eleven years of marriage, my wife and I had been discussing divorce. Either we could agree to an amicable settlement or fight it out in the courts. My wife was fishing for financial information to use against me. I was still trying to decide if we should have a divorce.
Matters came to a head on Friday, February 18, 2011. This was three days before my 70th birthday. My wife Rose (not her real name), born and raised in China, was 54 years of age. She was in the process of mailing packages of books to her daughter who lives in northern Virginia. My wife and I lived in adjoining units on the second floor of a four-plex located in Minneapolis, Minnesota.

It begins with a few of my favorite thesis points, doesn’t it? A DVIC scenario, real estate, a foreign bride, and Virginia, a state where the CIA head quarters sits pleasantly Farming out “self sustaining” operations. And of course- of course!- lop-sided story telling, aka narrative control.
But let’s have McGaughey tell it:

There was a knock on the front door….two Minneapolis police officers let themselves into the house. One was a white-male officer and the other was an Asian female, most likely Hmong…. I expected to have a rational conversation about the incident with the police.
Immediately after I had closed the door, the white-male police officer standing in back of me ordered me to face the door and put my hands behind my back. He slipped handcuffs on my wrists. Then the female officer led me down the steps to the squad car parked in front of the house. I said nothing and the officers asked me no questions. I thought there might still be bite marks on the back of my wrist that I could use to explain what happened.
My arms were held tightly behind my back. The female officer turned on a computer and asked me a set of routine questions. I asked if she would take a look at the bite marks on the back of my hand. She said she would in a few minutes but never did. The handcuffs were squeezing my wrists so hard that I felt a loss of circulation. When I pointed this out to the female officer, she loosened the handcuffs and the circulation began to return. During that time, she asked me no questions. Neither did she look at the bite marks that I had mentioned.
At length, the male police officer returned to the car. He read me my “Miranda rights”.

 
So: “no touch torture,” coercive control, one sided story telling, and of course- “progressives!” Then, when you read through his story, other details emerge, such as how many “make work” projects overlap each other, and how the shakedown racket is state actions, much like “asset forfeiture” (which becomes a threat in his story too.)
So, he’s “booked in,” and th usual pleasantries are exchanged between inmates, and then, suggestions of suicide, which are standard OP in all jails:

I was then taken to a desk where an Asian woman asked questions pertaining to my mental health. Did I have suicidal thoughts? Did I think people were out to get me? That was the tenor of her questioning. I answered “no” to all such questions. At the end of the interview, I expressed the opinion that I was in jail because of “manufactured” charges. With surprising candor, the woman remarked that this sometimes happens.

The story itself reads like a fairly typical DVIC initiation, where a man is being accused, and then policed, and then railroaded though “gray area policing” at all levels, and at all times is seen as guilty, with the need to prove his innocence, or cop a plea.
And all of THAT includes that should e speak up, he could face “enhanced measures” that all but solidify a verdict already delivered-BECAUSE the gray area policing has been invoked in the first place; as if the right to a trial is itself a threat, and the pre-punishment is gray area schemes of asset forfeiture and more, such as “parking tickets”.
And it cannot be missed that the underlying threat feared and faced by McGaughey is “homelessness” Here, again, one of the themes of OGS itself:

The down side of guilty pleas was that the offenses were “enhanceable”. In other words, if a particular offense was repeated, the punishment would be more severe. Misdemeanors would become felonies if the same conduct happened three times. I had been charged with a misdemeanor and was determined not to plead guilty to any charge.
There was also a young man named Zubay. The victim had said that she was willing to drop the charges. She wanted to remove the “no contact” order. Zubay claimed that he had not physically assaulted this person. However, the police report said that he had tried to smother her. Judge Wernick glanced at the police report and decided that the “no contact” order should continue.
The judge heard at least twenty cases that day. Having parked in a two-hour zone on the street, I was worried that Joe’s car might be ticketed. Joe was less concerned. We listened to a case where a man had violated an order for protection. If I heard the judge correctly, he was saying that violations of court orders such as those for no contact with the alleged victims would be charged as felonies regardless of the original offense.
Despite his courteous demeanor, Judge Wernick struck me as a martinet who was unconcerned with people’s real-life needs. Chief among his callous proclivities, I imagined, was the judge’s fondness for making defendants suddenly homeless in the dead of winter.

At this point, I would like to note that his case took place in 2011 and forwards, where several things were happening in policing, in politics, in reall estate,  and in banking. All of this can be researched by others, but simply put: McGaughey is an “old white man” who is the arch enemy of “progressives” nationally, but particularly in the state of Minnesota.And in such cultural environments, this OWM is a target (just look at who the targets were in the McClynas, Pataky, and many other cases where real estate, and the DVIC with gray area policing is a primary feature.)
So, part of the progressive narrative is the “re-distribution of wealth,” and also, in the Hegelian dialectic, the confrontation between the old power and the new power, which McGaughey states and restates many times in different ways.
Lastly, complaints of OGS are dramatically just after each election of Barak Obama, whose platform is well known: he is a child of the CIA and also, of the DVIC itself, and all of the “progressive” rhetoric of the preceding era’s. So, this case of OS is the cream on top of the DVIC cake- taking property from “old white men,” in gray area policing.
Again- go over to his site, buy his book, or whatever, but especially note how this nightmare ends up: with multiple court dates, jail payments, coercive custody and control, one sided story telling, soft force torture- and especially, state agencies, and agents deriving income from gray area policing in a grand “make work project”with a civil asset forfeiture threat, and the state sitting poised to pounce on the property to boot.

Four days later, a green Day-Glo sheet was posted on the front door of my house which read: “NOTICE In accordance with Chapter 244, Section 244.1450 and 244.1470 and/or Chapter 249 of the Housing Maintenance Code of the City of Minneapolis, the premises, building and structure hereon located at 1702 Glenwood Ave. N. are hereby declared unfit for human habitation and dangerous to life and health because of: LACK OF MAINTENANCE. You as owner are hereby ordered to abate the conditions above cited by 10-APR-2011. Failure to bring the building into compliance will result in the building being condemned.”

Minneapolis is a huge gang stalking city, in a hugely targeted state, and all of this has the distinct odor of “feminist jurisprudence,” and the DVIC. One of the main platforms of that state’s particular OGS is discriminatory code enforcement, and the associated state/city/ federally funded initiatives of social control though property control.
Related Story: How the DVIC is a huge make work project, and the “Dworkin Prophecy” come true.
In fact, many reports of OGS from Minnesota claim that sex offenders are used to coerce property owners; or that the “women’s advocates” use female sex offenders and prostitutes to stalk/entrap/inform, and even that they use fakerape complaints to leverage men. such is the nature of the well heeled Minnesota gray area policing scheme (the state takes in some 65 BILLION DOLLARS per year from federal initiatives that leverage people out of house and home, and create dependency; while their governor- Mark Dayton- can barely speak a single clear sentence because he’s all hopped up on Big Pharma dope all the time).
So, here below, again- note the names of all the female judges and advocates, as we teeter between watching one man’s life existentially threatened, leveraged, and possibly foreclosed, until:

“ Dear Mr. McGaughey:
I am dismissing the above entitled charges (domestic assault) against you. Enclosed is a copy of the notice of dismissal to the court that will be filed on March 19, 2012. I have also informed the judge that I am dismissing the case. There is no need for you to appear in court on March 26, 2012, as the trial will be cancelled upon my dismissal.
Sincerely,

Jennifer A. Saunders
Assistant Minneapolis City Attorney

Ah, but it’s not over until the fat lady sings! Because in gray area policing, “not guilty” also means “not innocent.” See how that works- and how neatly feminist jurisprudence manages to escape jury trials-where guilt or innocence can be decided, by LAW instead of by gray area he-said/she said? Niiiice.

Therefore, those charges were also dismissed. Yet, here was a Divorce Court judge continuing to treat me as if I might be guilty of Domestic Abuse even though my innocence had legally been established. Or had it been, really?

In gray area policing, one never knows “for sure” if a man is guilty. Niiiiice how that works-and how it keeps the DVIC happy, and fat-very fat. While one cannot prove innocence under the DVIC and feminist jurisprudence, or especially in a total surveillance state- we can prove that “they” are all snout deep in it, and chewing out the bottom of the trough-that’s one thing we can prove, with evidence.
 
 

Organized stalking and police surveillance of social media: ACLU notes that targeted 'influencers,' activists and other TI's are 'real'

Police Use of Social Media Surveillance Software is Escalating, and Activists are in the Digital Crosshairs

By: Nicole A. Ozer
Map of California, with dots marking the areas where local law enforcement has acquired social media monitoring software

It goes without saying that speaking out against police violence or government overreach shouldn’t land you in a surveillance database. But it can, and it does.

The ACLU of California has received thousands of pages of public records revealing that law enforcement agencies across the state are secretly acquiring social media spying software that can sweep activists into a web of digital surveillance.

This set of public records requests is part of our ongoing work with community groups to shine a light on surveillance technologies and call for community control in decision-making around policing. Last year, we worked with local activists in Fresno to reveal that its police department was using a MediaSonar social media surveillance tool that boasted the capacity to identify so-called “threats to public safety” by monitoring hashtags such as #BlackLivesMatter, #DontShoot, #ImUnarmed, #PoliceBrutality, and #ItsTimeforChange.

But we had a hunch that Fresno was not an isolated case.

So this summer, we requested records from 63 police departments, sheriffs, and district attorneys across California. And what we learned from the documents was alarming.

Of the responses we’ve received, 40% of the agencies (20 in total) have acquired social networking surveillance tools — many of them in the last year.

We found no evidence in the documents of any public notice, debate, community input, or lawmaker vote about use of this invasive surveillance.

And no agency produced a use policy that would limit how the tools were used and help protect civil rights and civil liberties.

The utter lack of transparency, accountability, and oversight is particularly troubling because social media surveillance software used by California law enforcement — tools like MediaSonarX1 Social Discovery, and Geofeedia — are powerful. And our records from Fresno and several other communities reveal that some have been marketed in ways to target protesters.

Our records show that Geofeedia’s marketing materials, for instance, refer to unions and activist groups as “overt threats,” and suggest the product can be used in ways that target activists of color. At least 13 California law enforcement agencies have used or acquired Geofeedia.

In one exchange with law enforcement, a company representative suggested to San Jose Police that they should use the product to surveil the “Ferguson situation,” even though the city is roughly 2,000 miles from Ferguson, Missouri. San Jose Police did in fact use Geofeedia software to monitor South Asian, Muslim, and Sikh protesters only a few days after acquiring it.

An email to the San Diego Sheriff touts a “collection” of social media content curated by Geofeedia following the non-indictment of Darren Wilson.

And yet another promotional email invites the Los Angeles District Attorney to learn how Baltimore used the software to monitor and “stay one step ahead of the rioters” after the police killing of Freddie Gray.

Law enforcement should not be using tools that treat protesters like enemies.

The racist implications of social media surveillance technology are not surprising. We know that when law enforcement gets to conceal the use of surveillance technology, they also get to conceal its misuse. Discriminatory policing that targets communities of color is unacceptable — and secretive, sophisticated surveillance technologies supersize the impact of racial profiling and abuse.

The good news is that we’ve seen that when surveillance is forced into the light, communities have the power to call out racist policing practices and stop discriminatory surveillance in its tracks.

Remember Fresno? Armed with proof of Fresno’s social media surveillance experiment, a diverse coalition of local activistsknown as Faith in the Valley successfully mobilized and organized to pressure the police to roll back their social media surveillance program. The community is now pushing to pass a surveillance technology ordinance to make sure all surveillance technologies are publicly debated.

In Oakland, community members organized against plans to build an expansive Domain Awareness Center that would have collected and stored hundreds of terabytes of data on Oakland residents. Now Oakland has a Privacy Commission that advises the City Council on surveillance decisions and is currently drafting a surveillance technology ordinance.

And in Santa Clara County, right in the heart of Silicon Valley, a diverse coalition successfully organized against plans to buy a Stingray cell phone tracker and then worked to enact a comprehensive surveillance technology ordinance that requires transparency, accountability, and oversight for all surveillance technologies.

In this spirit, a powerful coalition of national organizations is launching a multi-city legislative initiative, Community Control Over Police Surveillance (CCOPS), to introduce more local laws to bring transparency and community control to the acquisition and use of local police surveillance technologies.

Here in California, community members are working in Palo Alto, Fresno, Oakland, Berkeley, Santa Rosa, and Santa Cruz to ensure that similar laws are introduced in their cities.

Whether it’s social networking surveillance, stingrays, or something else we haven’t heard of yet — it’s time to push secret surveillance into the light.

We have the power to stop discriminatory surveillance and put control where it belongs — in the hands of the community.

Nicole Ozer is the Technology and Civil Liberties Policy Director at the ACLU of California. 

Read more about community control and surveillance technology in California:

Organized stalking, police stalking, database abuse and journalists and reporters

The curious, sexually charged gang stalking of Minnesota reporters

Imagine police from over one hundred and eighty (180)  agencies combing through a database, gossiping in email’s and in radio chatter, and then, driving by your house (on a relatively quiet block), and stalking you in databases to look at your drivers license photo. Then, they were talking about you behind your back.
Then the identity theft, computer hacking, redirections of your internet searches, online blogs about your personality, and other strange occurrences “happened,”and you had no idea who was behind it? And: the current line of nearly all peace officers is that “people who say they are stalked by mysterious gangs are delusional.”

Related Story: MSM reporter Sharyl Atkisson of FOX news suing the Department of Justice for computer hacking, redirection, and leaving classified documents on her computer. DOJ says “Catch Me If You Can!” as it hides the ball.
And: “It’s not Us-maybe, ask one of our other Five Eyes Partners or Israel!” Or-ask this Fourteen Eyed Monster aka the UKUSA Agreement (which rhymes with “Yakuza easement”)
Attkisson alleges that three separate computer forensic exams showed that hackers used sophisticated methods to surreptitiously monitor her work between 2011 and 2013.
“I just think it’s important to send a message that people shouldn’t be victimized and throw up their hands and think there’s nothing they can do and they’re powerless,” Attkisson said in an interview”

What would you do? Well, in Minnesota, which is a notorious gang stalking state, where the one party rule of “progressive” DFL politics prevail most of the time, the reporters who found out about the source of their stalking and the abuse of the drivers database sued the cr^p out of the police, and the state:

“officers from different law enforcement agencies “monitored” Miles by driving past her house, and she believes they got her address through the illegal accesses.”

I bet you would ask yourself how you became a targeted individual-“Why me?” and “What did I do wrong,” and a host of other questions. And then, it would slowly sink in that you had done nothing wrong; and then it would sink in that you had been compromised, and you might feel violated-like that dirty feeling after someone knows a secret about you. Because-that is what organized state level gang staling is designed to do.
So-what would you do about it? Well, Minnesota journalist Jessica Miles and several other Minnesota reporters filed lawsuits because police, and their hydra of community policing stalkers were harassing them, and  database stalking them-thousands of times.
Here is how Tim Cushing of Techdirt.com wrote about it (and it is interesting to note that Techdirt is being sued by a big fat egotistical liar and mama’s boy named Shiva Ayyadurai in an attempt to crush free speech and press rights, via a frivolous lawsuit and shut down a vibrant and brilliant media outlet over Ayyadurai’s false claim that he invented email as we know it.)

State Approved Stalking: MN Newscaster’s License Info Viewed 1,380 Times

from the more-access-than-oversight:-always-a-bad-idea dept

Just recently we covered the story of the rampant abuse of Minnesota driver’s license data and the resulting lawsuits, including one featuring 18 plaintiffs. One of the plaintiffs, Steve Drazkowski, is a state representative that had his information illegally accessed over 600 times by various state employees, something he believes was politically motivated.
Well, a Minnesota newscaster has Drazkowski beat.

 
And this, below from the Minneapolis Star Tribune:

KSTP-TV anchor has her driver’s license data searched 1,380 times, lawsuit alleges

Suit says Jessica Miles was “shocked and disgusted” to learn that her driver’s license info was accessed by officers and personnel from about 180 different departments and agencies.

Jessica Miles, a KSTP-TV midday anchor and reporter, became the news herself on Monday.

Miles filed a federal lawsuit claiming that her private driver’s license information was illegally searched about 1,380 times, believed to be the highest number so far in the mushrooming scandal.

Miles is the on-air last name of Jessica Kampschroer. Her husband, Cory Kampschroer, was looked up 92 times and joined her in the lawsuit. He is a digital news manager at KSTP and previously worked as a reporter and anchor for WCCO Radio.

Miles is one of about 20 people who have sued a slew of local and state government agencies after obtaining information from the Department of Public Safety (DPS) that public employees had illegally accessed their private records.

“On July 30, 2013, Jessica was shocked and disgusted to learn from DPS that it had determined that officers and personnel from approximately 180 different departments and agencies had reviewed and improperly obtained or used her private data,” her lawsuit states.

In case you ever wondered what police and firemen are doing when their not saving old ladies, cute kitties and puppies, and saving children-of course!-saving children from rapists and pedophiles who start fires just so they can rape and eat children in mid-air, as the pre-cooked kids jump out of fifteen story windows (all of the windows pre-broken of course by the “Broken Windows Policing schemes), then this above is your answer.
Because the facts are, there simply isn’t that much crime around those parts, and the only fire that needs to get put out might crimp the pensions of gang stalkers. And, that roasted pig that shows up on Minnesota’s dorrstep every year in the form of a 65 BILLION DOLLAR appropriation for DVIC policies.
But Miles wasn’t alone then, and she isn’t alone now, as gang stalking grows as a threat to democracy itself, because police are in on it at every level, from the database on down, as well as a host of InfraGard members and others with access to the internet switches, and the blackmail that can be inferred from this collusion, as Fusion Centers in Minnesota are used as political tools of targeted spying.
And they stalk their own as quick as the stalk others.  Attractive women-long the bane of lesbian feminists and old cops on pensions-even Brooke Bass, herself a lawyer for the police union was gang stalked in these databases, and in the real world as well.
And Beth McDonough a KSTP reporter was gang stalked too.
In fact, gang stalking is becoming so common that it has emerged that targeted individuals are frequently involved in media, journalism, and alternative media alike. Even the crew of Alex Jones Info-wars was stalked by a “terrorism task force.”
I advise you to research gang stalking and reporters-a Google search easily turns up thousands of hits. While the fashion is to focus on some crazy guy stalking a good looking reporter, the reality on the ground is that political campaigns, and police, stalk those who work in media.
Then, when you factor in how prosecutors and the legal system is frequently in on it, and that they hide behind authority and play the victim in the crybully narrative when their unethical or illegal practices are exposed, as in the cases of the discredited CIA psychologists and those who discredit gang stalking as a legitimate complaint, we see clear pattern: gang stalking is a real thing, with a well oiled counter-narrative to discredit those who complain of it, and tese days, it is very partisan; and very AIPAC-y.
Most importantly, each and every single “women’s organization” and their affiliated battalions of human right’s advocates was then, and is now silent about the sexually charged gang stalking of Minnesota reporters by hordes of police driving by their houses all day and night. See how that works in “progressive” states? All of the victim advocates, the save the women and their children’s lobbyists,  and the police are curiously silent about this form of highly organized stalking.
So, we can only speculate that these same are you in on it? It seems SJW moral equivalence is showing like wolf’s fur underneath sheep’s wool, aka Fabian Socialism and its “community policing” scheme, aka “organized stalking,” because all of the “civil rights” and “human rights” organizations in Mnnesota are strangely silent about this form of staling.
Is it because they are doing it, along with the DFL as some have suggested? Or is that one of the LGBTI’s new bi-polar hairstyles for crotch faced advocates again, saying “castrate all the rapists! RApe is everywhere! Men’s rights people and hetero enablers are all whiners!” And all of this, straight out of a communist manifesto, aka the “Hegelian Dialectic.”
The  Electronic Peeping Tom’s of Minnesota: List of reporters gang stalked by Minnesota police agencies and other electronic Peeping Tom’s
Jay Kolls of KSTP
Jessica Miles, as noted above
Beth McDonough as noted above
Fox9 news anchor Alix Kendal was stalked multiple times by Minnesota cops
Related Stories: Minneapolis police chief Janee’ Harteau fires herself after she failed to come to the defense of a white woman from Australia who was shot by a Somali police officer. And of course, the Minnesota crisis PR machine was quick to slap the word RAAAAAAAPE all over the headlines. I dunno-perhaps more white women need to get shot* to understand what the rest of us are going through.
Is their a curious trend in news people being gang stalked? Is “control of the media” a component to gang stalking? Ask Vester Lee Flanagan, who was being secretly blackmailed before he went on a news room rampage.
United States declares “Alarming levels of Israeli spy rings in the US.
How did the Anti Defamation League and the Law Enforcement Intelligence Unit(LEIU) spying scandals get swept under the rug, between the 1970’s and 2003-and today these spying, back bag job operations have become America’s NSA/FBI/CIA/DHS data theft pipeline, and America’s total surveillance state?
 
*Note to my special JTRIG/DHS/FBI/SJW NGO’s and their DVIC accomplices, who routinely hack my writing in progress, and other voyeuristic profilers and government sponsored, bankster funded word police: while it is obvious that your training does not include the use of words to solve social problems, unless those words pop out on the screen their in front of you, and mediated by Big Data abuse, or unless you yourselves derive direct benefits-and your kind entirely fail to understand the first amendment- a short explainer is necessary.
This phrase, signified with an *asterisk is a mere conjecture, a juxtaposition of words that can cause and create an emotional response in a reader, not necessarily a suggestion for “Change” and not a threat, or otherwise to be construed as one.
However, if some random reader interprets that phrase as the “voice of God,” and does exactly that, I advise you to talk amongst yourselves and your co-subverters of the Constitutional guarantees of privacy, liberty, free speech and press, and due process in general- consult about “what is organized gang stalking,” and maybe, note this link below to an AP news story which documents that the United States Diplomatic service has kicked two Cubans out of the country, because Cubans are suspected of having used electronic weapons on our own diplomats, which was in yesterdays news, 08-10-2017.

“US diplomats in Cuba ‘suffered severe hearing loss'” as “investigators are looking into whether elements of the Cuban government placed sonic devices that produce non-audible sound inside or outside the residences of roughly five US Embassy staffers with the intent of deafening them.”

And, should any of you sh!tbags construe it that way, expect a lawsuit-and with my winnings, I will hunt you down like a deer, and when I find your cowardly stalking, hacking, black bag jobbing asses, I will sue you and then hire private investigators, crisis PR manufacturers, and surveillance role players to stalk you, your husbands, wives and children into the dirt for the rest of your lives, and into generations yet unborn, using your own databases to blackmail you with-if I haven’t already done that herein.
This is not to be construed as a threat-it’s a promise, one form of legal, peaceful, non-violent resistance, as I live for the word, and proper legal due process in a forum to express that, which is indeed, a more courageous act, and definitely mightier than the sword, if the Constitution is any guide. And all that, of course, if the judge isn’t already compromised in this grand scheme of database fraud and abuse, or otherwise involved in statist-cult activity.
Click this link for a REWARD OFFERED FOR THE ARREST, CAPTURE AND SUCCESSFUL PROSECUTION OF OGS PERPETRATORS who operate with impunity under color of law and authority.
-those who have been abused n the manner above would do well to revisit their personal organized gang stalking, and apply for the reward.